Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
.
Real Time Predictive Models – Are They Possible?
Summary: At least one instance of Real Time Predictive Model development in a streaming data problem has been shown to be more accurate than its batch counterpart. Whether this can be generalized is still an open question. It does challenge the assumption that Time-to-Insight can never be real time.
A few months back I was making my way through the latest literature on “real time analytics” and “in stream analytics” and my blood pressure was rising. The cause was the developer-driven hyperbole that claimed that the creation of brand new insights using advanced analytics has become “real time”. My reaction at the time, Humbug.
The issue then as now is the failure to differentiate between time-to-action and time-to-insight. Not infrequently the statements about ‘fast data’ are accompanied by a diagram like this, which to me has a fatal flaw.
The flaw, to my way of thinking, is that there are really two completely different tasks here with very different time frames.
Time-to-Action: Typically the customer-generated trigger comes in one side, enters your transactional platform where it may be scored, next best offers formulated, recommenders updated, or any number of other automated tasks may take place. Based on these predetermined routines the desired and pre-planned action comes out, not infrequently in an action that is fed back to the customer. Time-to-Action can indeed be real time, right down to milliseconds.
Time-to-Insight: These actions and the algorithms that created them were preplanned. That is, a team of data scientist spent time and effort to explore the data, clean, transform, and perhaps normalize it, selected features, and then built a number of models until one proved to their satisfaction that it was sufficiently robust to be implemented in the transactional system. That is Time-to-Insight, and that is decidedly not real time.
Is Real Time Predictive Model Development Even Possible?
Especially now that streaming data processing has become such a hot topic I wanted to revisit my earlier conclusion and see if real time analytics, specifically the creation of new predictive models, could in fact be real-time, and truly on-the-fly.
Batch versus Streaming Fundamentals
First off, let me be clear that we’re talking about streaming data problems, or perhaps more correctly ‘unbound data’ problems. If it’s not streaming, it’s by definition batch.
1. Batch processing has always been the paradigm for predictive analytics. This generally implied using the whole data set (or a large sample) that was sufficiently large to allow for good model development.
2. Batch allowed time to consider, clean, and transform the data. Batch also allowed for data scientists to experiment with different machine learning tools to optimize accuracy.
3. But perhaps most difficult to get around is that in streaming data the samples must necessarily be smaller than the whole. Even windowing techniques that amount to micro-batch must necessarily be only a small fraction of the total data. Yes, window size can be balanced with the need for decision latency. That is to say, a window can be several minutes’ worth, or even hours’ worth of data if that suits your business need. A window might contain several thousand or even a hundred thousand observations under these assumptions. This might work in modeling some kinds of human purchase behavior but not for fraud detection or many factory-floor fault detection problems, and it’s not the norm in streaming. Normally windows are measured in seconds or milliseconds with proportionately smaller data included.
The “Correctness” Problem and Lambda Architecture
Whether we are talking about quantitative analytics (sums, medians, top-N, standard deviations, and the like) or actual predictive models, streaming analytics was always said to have a “correctness” problem. That is, calculations produced on a subset of the data could only approximate the accuracy of the same calculation conducted on the whole data set.
This “correctness” argument has come under fire since both the streaming (subset) calculation and the batch (entire data set) calculations are approximations of the true condition. As a result, Tyler Akidau, a leading developer of streaming systems at Google says “Streaming systems have long been relegated [unfairly] to a somewhat niche market of providing low-latency, inaccurate/speculative results, often in conjunction with a more capable batch system to provide eventually correct results, i.e. the Lambda Architecture.
If you’re not familiar with the Lambda Architecture model, Akidau goes on to explain “the basic idea is that you run a streaming system alongside a batch system, both performing essentially the same calculation. The streaming system gives you low-latency, inaccurate results (either because of the use of an approximation algorithm, or because the streaming system itself does not provide correctness), and sometime later a batch system rolls along and provides you with correct output.”
The Surprising Finding
With all these factors seemingly raising insurmountable barriers to real-time predictive analytics I was surprised to find one example where it is not only successful, but actually claims greater accuracy than the same model run in batch.
The example comes from UK-based Mentat Innovations (ment.at) which in December 2015 published these results regarding their proprietary predictive modeling package called “Streaming Random Forests”. Without repeating all of their detail which you can see here, here is a brief summary.
Using a well-known public database (ELEC2) which is used as a benchmark in streaming data literature:
Each record contains a timestamp, as well as four covariates capturing aspects of electricity demand and supply for the Australian New South Wales (NSW) Electricity Market from May 1996 to December 1998.
To quote directly from their findings:
Below we report the error rate (lower is better) achieved by a sliding window implementation of random forests using the randomForest package in R, for 8 different window sizes (left group of bars in the Figure below). When the dataset is ordered by timestamp, the best performing window size is 100, on the lower end of the scale. This is classic case of “more data does not equal more information”: using 100 times more data (w=10,000 vs w=100) almost doubles (175%) the error rate!!
To drive the point home, we took the same data, but presented it to the classifier in random order so that it was no longer possible to take advantage of temporal effects. In this case, without any temporal effects, indeed the accuracy improved with larger window sizes.
The advantage that a well-calibrated streaming method can have over its offline counterpart in a streaming context is quite dramatic: in this case, the best-performing streaming classifier has an error rate of 12%, whereas a random forest trained on the entire dataset (minus 10% withheld for testing) achieves an error rate of 24%. A fraction of the data, double the accuracy!
Let me repeat the central finding. They have built a more accurate real time classifier using a very small amount of windowed data that lends itself to very low latency real time streaming systems. And they have demonstrated that the accuracy is greater than for the same data run in batch.
What we have here is a breakthrough in real time predictive analytics. In fairness, presenting any gradient decent tool such as neural nets with the data sorted in time sequence is not a new idea. This is a procedure that’s been used for some time to reduce the likelihood of overfitting to local optima, a problem extremely common in gradient decent tools.
Does it Generalize?
Here are the claims that Mentat makes:
• No need for classifier selection and tuning (window size or otherwise).
• No need for you to host the decision engine for your web app.
• No need for you to monitor the performance of your model and decide when and how to retrain it - the self-tuning engine monitors performance and ensures it remains optimal at all times.
• No need for you to scale out as you get more data.
These strike me as generally supportable claims based on their demonstration experiment. Providing the data in time series means less probability of overfitting. The problem of temporal drift in your models is eliminated as each recalculation includes the next data points and means your model remains up to date.
Whether this approach is appropriate for your specific situation is open for consideration.
• One issue would be the need for extremely low latency.
• Another would be the assumption that your model is prone to drift in fairly short time frames that would make the constant updating a worthwhile feature.
• Still a third would be the apparent simplicity and elimination of other ‘moving parts’ in a traditional system.
Taking nothing away from their accomplishment this is the first and indeed the only example of real time predictive modeling I have personally been able to find. If you know of others please add a comment and reference to this article.
About the author: Bill Vorhies is Editorial Director for Data Science Central and has practiced as a data scientist and commercial predictive modeler since 2001. He can be reached at:
[email protected]
Views: 15782
Tags: forests, modeling, predictive, random, streaming
Comment
You need to be a member of Data Science Central to add comments!
Join Data Science Central
Comment by Mathieu Landry on October 4, 2016 at 3:53pm
As we approach real-time insight, the paradox of synchronous present-shaping-future and future-shaping-present becomes philosophically fascinating! ...the birth of AI just around the corner?
Comment by D. Fuller on August 29, 2016 at 8:39am
Good discussion! I have a couple of questions: Why wouldn't machine learning techniques based on stochastic gradient descent (SGD) be considered "real-time?" And why wouldn't instance-based methods, such as kNN that does not require global training, be considered real-time predictive?
Comment by Boris Shmagin on August 28, 2016 at 3:09pm
It is a long and interesting post. However, there is no extrapolation in mathematics, only interpolation. Mathematics considered this topics starting from Gödel.
Then cybernetic came, starting from predicting aircraft location as target for an artillery gun, there is a literature on this topic.
I think that some logic may be developed in modern application for business predictions.
Comment by Parker LAU on January 25, 2016 at 5:08pm
Great article!! really insightful!
Comment by Ram Sangireddy on January 25, 2016 at 10:49am
Dr. Vorhies, thank you for sharing the insightful information on latest development. However, a few clarifications:
1. As only smaller data sets are being used from small window sizes of real-time data, why even build random forests? Why not build some simpler decision trees that may perform similar or better? That may save some computational overhead?
2. More importantly, it appears that a classification/predictive model is being rebuilt on real-time data for every window; then, what is the new data to be used to score against the model? That is, in practical world, we build the predictive model on historical batch of the data, and then use that model to score the real-time event/transaction data (for example, fraud classification/scoring in credit card transactions in real-time). That leads to my next question:
3. To build the classification/prediction model, the data already has to be labeled with an actual known outcome. How practical is it to assume that the real-time event data is already known with the actual outcome? For same credit card fraud detection example above, while the transaction can be predicted/scored as fraud/not-fraud in real-time, the actual outcome is not known for a while..is it not?
© 2021 TechTarget, Inc. Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service | ESSENTIALAI-STEM |
To the knowledge base
Setting up an analog door intercom system in the FRITZ!Box
You can set up an analog door intercom system in the FRITZ!Box and then talk with visitors and open the door when you are away from home if you route the door call to an external telephone number, for example. If the door intercom system has a camera, you can have the image from the door intercom system displayed on a FRITZ!Fon or FRITZ!App Fon.
Requirements / Restrictions
• The door intercom system must have an a/b interface that uses DTMF tone dialing. Other 2-wire or 4-wire solutions are not supported.
• Only functions that the door intercom system provides according to the 1TR110 standard can be used with it. Any proprietary functions (functions not defined in this standard) it offers cannot be used.
• The camera for the door intercom system saves images in JPG/JPEG, PNG or GIF file format. Other file formats, for example MJPG/MJPEG, are not supported.
• The camera makes the images available via HTTPS, HTTP, or FTP.
• To show the images, a FRITZ!Fon with color display (FRITZ!Fon MT-F, C4, or newer) must be used.
1 Connecting the door intercom system
1. Connect the door intercom system to an analog extension on the FRITZ!Box (for example "FON 1").
2 Setting up a door intercom system
1. Click "Telephony" in the FRITZ!Box user interface.
2. Click "Telephony Devices" in the "Telephony" menu.
3. If the analog extension (for example "FON 1") that you connected the door intercom system to is already listed, click the (Delete) button for the device.
4. Click the "Configure New Device" button.
5. Enable the option "Door intercom system" and click "Next".
6. Enable the option "Door intercom system with a/b interface" and click "Next".
7. When a bell button is pressed, the door intercom system calls the destination telephone number. In the field "Telephone Number of the Doorbell", enter the number assigned to the individual doorbells in the door intercom system. To open additional fields, click "Add Doorbell".
Important:You may not use any internal telephone numbers of telephony devices connected to the FRITZ!Box for the bell buttons.
8. From the drop-down list "Route Doorbells to", select the telephones or telephone number the doorbell should be routed to:
Important:You can either select one or several internal numbers, or you can select an external telephone number. You cannot combine internal and external numbers.
• If you want a specific telephone to ring, select the respective telephone.
• If you want all of the connected telephones (broadcast call) to ring, select "All telephones".
• If you want an external telephone number (for example another telephone line, mobile telephone) to ring, select "Telephone number" and enter the destination telephone number.
• If you want several telephones connected to the FRITZ!Box (call group) to ring:
1. Select the option "Call group".
2. Select up to four telephones to be included in the call group.
3. Click "OK".
9. Click "Next" and then "Apply" to save the settings.
3 Configuring the door intercom system
1. Click "Telephony" in the FRITZ!Box user interface.
2. Click "Telephony Devices" in the "Telephony" menu.
3. Click the (Edit) button for the door intercom system.
4. From the drop-down list "Outgoing calls via", select the outgoing call number that should be used if you want to route the doorbell to a mobile telephone or an external line.
5. If you want to use the "Open" function key on a FRITZ!Fon or with FRITZ!App Fon, enter the character sequence for the door opener.
6. If the door intercom system is equipped with a camera or you use an IP camera in your home network, enter the complete web address with the image files in the "Live image" field. This URL must end with the file format of the image (for example image.jpg). The image is then displayed on the FRITZ!Fon and in FRITZ!App Fon when there is a call from the door intercom system. If you set up the "Calls" push service for the door intercom system, the FRITZ!Box sends you a push service mail including a camera image, either for all calls or only for the missed calls.
7. Click "Apply" to save the settings.
4 Entering tone intervals in the door intercom system
The following step is only necessary if you have to enter the interval for a ringing tone and busy signal in the door intercom system (standard according to 1TR110):
1. Enter 1000 ms +- 100 ms tone, 4000 ms +- 400 ms pause (425 Hz +- 10%) for the ringing tone.
2. Enter 480 ms +/- 48 ms tone, 480 ms +/- 48 ms pause (425 Hz +- 10%) for the busy signal.
5 Notes on the live image displayed by FRITZ!Fon
The FRITZ!Fon only rings three times if you set up the live image function so that video transmission is not disturbed. If you want it to ring longer, add another telephone without live image to the call group. This telephone will continue to signal the call from the door intercom system.
Use the "OK" key to switch between Standard View and zoom, and use the navigation keys to change the area of the image displayed in the zoomed-in view. The selected area is then used for the next call.
6 Setting up a door intercom system on the Mesh Repeater as well
If you set up an additional FRITZ!Box as a Mesh Repeater, you can forward the doorbell of the door intercom system to the Mesh Repeater. In addition, you can also see the live image and use the door opener on a FRITZ!Fon that is registered to the Mesh Repeater. In our guide Setting up a door intercom system on a Mesh Repeater you will find instructions on configuring it. | ESSENTIALAI-STEM |
During World War II, the Nazi developed several seriously powerful weapons. One of those superior and devastating weapons was Great Gustav. As you might assume, the Nazi wanted weapons that are bigger than anything seen before. Many of those weapons remained only as projects that were never realized.
But Gustav, was the biggest gun and artillery weapon ever to be used in combat. Gustav fired the heaviest shells ever known. Built before the occupation of France, Gustav was designed to penetrate the walls of French Maginot Line.
Engineer Erich Muller was tasked with designing the gun. At the end, the plans included weapons with the calibers of 70cm, 80cm, 85cm, and 1 meter. Muller designed a gun that can fire a projectile weighting 7 tons.
He built the first test model in 1939, and Gustav did not disappoint. The gun was able to penetrate seven meters concrete wall and 1 meter steel wall. Gustav was the first gun, while Dora was the second gun Muller made for the Nazi. Gustav was 47.3 meters long, 7.1 meters wide, and 11.6 meters tall. The gun weighted 1350 tons, and 250 soldiers were needed to operate the gun. In addition, 2500 soldiers were tasked to lay down the tracks for the movement of Gustav.
The Battle was an English victory in the Hundred Years’ War. The battle took place on October 25th, 1415, near Agincourt, a town in Northern France.King Henry V led the Eng... | FINEWEB-EDU |
Reusing object files without creating targets
Hi,
I have an interesting problem. Our current build system reuses object files from other directories all the time. I have played around with using Object Libraries for an implementation in CMake. This would work great, but we want to be able to use Visual Studio Solutions. When we use Object Libraries, we end up creating 1100+ targets and with Visual Studio, this creates 1100+ projects, which takes forever to load and uses a heavy amount of CPU and memory usage. I understand that using Object Libraries is the correct “CMake” way to go, but is there any work around so we can still use Visual Studio?
Thanks,
Carter Olsen
I believe that Visual Studio now supports loading up any CMake build tree, including those using the Ninja generator, so that may be one way of doing it. Anything else I can think of would require reorganizing the code into fewer targets since targets are basically the only abstraction offered, sorry. | ESSENTIALAI-STEM |
Joel Sternfeld
Joel Sternfeld (born June 30, 1944) is an American fine-art photographer. He is best known for his large-format color pictures of contemporary American life and identity. His work contributed to the establishment of color photography as a respected artistic medium. Furthering the tradition of roadside photography started by Walker Evans in the 1930s, Sternfeld documents people and places with unexpected excitement, despair, tenderness, and hope. Ever since the 1987 publication of his landmark “American Prospects,” Sternfeld’s work has interwoven the conceptual and political, while being steeped in history, landscape theory and his passion for the passage of the seasons. Sternfeld’s is a beautiful and sad portrait of America - ironic, lyrical, unfinished, seeing without judging.
Life and work
Sternfeld earned a BA from Dartmouth College. He began taking color photographs in 1970 after learning the color theory of Johannes Itten and Josef Albers. Color is an important element of his photographs.
He is the recipient of two Guggenheim Fellowships and spent a year in Italy on a Rome Prize. He currently teaches at Sarah Lawrence College, where he holds the Noble Foundation Chair in Art and Cultural History. Sternfeld's work is held in the collection of the Museum of Modern Art in New York, among many other notable institutions listed in the "Collections" section.
First Pictures (1969-1976)
Sternfeld initially started taking pictures in 1969 with a 35mm camera and Kodachrome slide film. These pictures mark the beginning of Sternfeld’s interest in documenting the American condition. The pictures are an insight into the development of his color arrangements which eventually resulted in a new language for color photography most notable in American Prospects. Sternfeld, in addition to other colorists like William Eggleston and Stephen Shore were crucial pioneers in the medium. This body of work was first published in 2012 by Steidl publishing house.
American Prospects (1978-1984)
American Prospects, (first published in 1987, most recently published in 2012) is Sternfeld's most known book and explores the complexity of human-altered landscapes in the United States. He began it in 1978, when color photography was still in its infancy as an art medium. Using a large-format camera, his photographs harken back to the traditions of 19th century photography, yet are applied to everyday scenes, like a Wet n' Wild waterpark, or a suburban street in the South. He captured the faltering "prospects" (both views and opportunities) of the time. Because of his early street work, Sternfeld was awarded a Guggenheim Fellowship, which funded his initial tour of the states. The American Prospects photos are of people, buildings, and mostly landscapes from the multiple trips Sternfeld took between 1978 and 1984.
Campagna Romana: The Countryside of Ancient Rome
Campagna Romana was initially published in 1992 by Knopf publishing house. After being awarded the Rome Prize fellowship, Sternfeld extensively photographed the countryside around Rome. The pictures document the interaction between the grand romantic ruins and the invasion of modernity. Several of the images are created to form panoramic images that sometime stretch over several images. This technique presents the sweeping vistas of the countryside while also setting up contrasts between the images within each piece. In one such work, a crumbling fragment of an ancient wall huddles forlornly in one frame of a four-panel piece, surrounded by the scaffolding-clad buildings of a new apartment complex.
On This Site: Landscape in Memoriam
On This Site: Landscape in Memoriam (first published with Steidl in 1996), is a collection of pictures from famous crime sites in America. The eerily normal locations are seemingly remains left behind after tragedies, their hidden stories disturbingly invisible. Next to each photograph is text about the events that happened at that location.
Hart Island a Potter's Field in New York City
From 1991 to 1994 Sternfeld worked with Melinda Hunt to document New York City's public cemetery on Hart Island, resulting in the book "Hart Island" (1998).
Stranger Passing
Initially published by Bulfinch in 2001, and then by Steidl in 2012, Stranger Passing consists of a series of portraits that have roots in his initial project American Prospects. Over a period of fifteen years Joel Sternfeld travelled across America and took portrait photographs that form in Douglas R. Nickel’s words an “intelligent, unscientific, interpretive sampling of what Americans looked like at the century’s end.” Unlike historical portraits which represent significant people in staged surroundings, Sternfeld’s subjects are uncannily “normal”: a banker having an evening meal, a teenager collecting shopping carts in a parking lot, a homeless man holding his bedding.
Using August Sander’s classic photograph of three peasants on their way to a dance as a starting point, Sternfeld employed a conceptual strategy that amounts to a new theory of the portrait, which might be termed “The Circumstantial Portrait”.
Exhibitions
* 1976: Recent Color Photographs by Joel Sternfeld and Recent Work by Lois Johnson, Peale House Galleries, Pennsylvania Academy of the Fine Arts, Philadelphia, PA
* 1980: Daniel Wolf, Inc., New York, NY
* 1981: Larry Fink and Joel Sternfeld: Photographs, San Francisco Museum of Modern Art, San Francisco, CA
* 1981: The New Color, Everson Museum of Art, Syracuse, NY
* 1982: Joel Sternfeld, Blue Sky, Oregon Center for the Photographic Arts, Portland, OR
* 1984: American Prospects, Daniel Wolf, Inc., New York, NY
* 1984: Three Americans (Jim Goldberg, Robert Adams, Joel Sternfeld), Museum of Modern Art, New York, NY
* 1985: Joel Sternfeld, Higashikawa International Photo Festival, Higashikawa, Japan
* 1985: Joel Sternfeld, Dartmouth College, Hanover, NH
* 1985: New Color Photography, The Halsted Gallery, Birmingham, MI
* 1985: Joel Sternfeld, Afterimage Gallery, Dallas, TX
* 1987-1989: American Prospects: The Photographs of Joel Sternfeld, Museum of Fine Arts Houston, Houston, TX; Baltimore Museum of Art, Baltimore, MD; Detroit Institute of Arts, Detroit, MI; Museum of Contemporary Art, La Jolla, CA; The National Gallery of Canada, Ottawa, Canada
* 1989: Contemporary Photographs, Pace/MacGill Gallery, New York, NY
* 1991: Campagna Romana: The Roman Countryside, Pace/MacGill Gallery, New York, NY
* 1997: On This Site, Pace Wildenstein MacGill, Los Angeles, CA
* 2001: Stranger Passing, San Francisco Museum of Modern Art, San Francisco, CA
* 2001: Walking the High Line, Pace Wildenstein Gallery, New York, NY
* 2002: Treading on Kings: Protesting the G8 in Genoa, WhiteBox Art Center, New York, NY
* 2002-2003: Joel Sternfeld, The Photographers’ Gallery, London, United Kingdom
* 2004: American Prospects and Before, Luhring Augustine, New York, NY
* 2005: Sweet Earth: Experimental Utopias in America, Luhring Augustine, New York, NY
* 2008: The Geography of No Place: American Utopias, Buchmann Galerie, Berlin, Germany
* 2008: Oxbow Archive, Luhring Augustine, New York, NY
* 2009: Joel Sternfeld: On This Site, Buchmann Galerie, Berlin, Germany
* 2011: Joel Sternfeld – Farbfotografien seit 1970, Museum Folkwang, Essen, Germany.
* 2011-2012: C/O Berlin, Berlin, Germany
* 2011–2012: Joel Sternfeld – Color Photographs since 1970, Foam Fotografiemuseum Amsterdam, Netherlands.
* 2012: Joel Sternfeld – Color Photographs since 1970, Albertina, Wien, Austria.
* 2012: Joel Sternfeld: First Pictures, Luhring Augustine, New York, NY
* 2012: Joel Sternfeld: Campagna Romana, Buchmann Galerie, Berlin, Germany
* 2013-2014: Carnegie International, Carnegie Museum of Art, Pittsburgh, PA
* 2017: Joel Sternfeld: Colour Photographs 1977-1988, Beetles + Huxley, London, England
* 2017-2018: Joel Sternfeld: Stranger Passing / To Joseph Palmer, Buchmann Galerie, Berlin, Germany
Awards
* 1978: Guggenheim Fellowship.
* 1980: New York State Council for the Arts Creative Artist Public Service Fellowship.
* 1980: National Endowment for the Arts Fellowship.
* 1982: Guggenheim Fellowship.
* 1983: American Council for the Arts Emerging Artist Award
* 1985: Grand Prize, Higashikawa International Photo Festival, Japan.
* 1987-1988: Shifting Foundation Fellowship
* 1990–91: Prix de Rome.
* 2004: Citigroup Photography Prize, in association with The Photographers' Gallery, London.
* 2013: Montgomery Fellowship, Dartmouth College.
* 2017: Honorary Fellowship of the Royal Photographic Society, Bath, UK.
Publications
* Campagna Romana: The Countryside of Ancient Rome. New York, NY: Alfred A. Knopf, 1992. ISBN 978-0-67941-578-7.
* Hart Island. Zurich, Berlin, New York: Scalo, 1998. ISBN 978-3-931141-90-5. Includes a text by Melinda Hunt.
* Treading on Kings. Göttingen: Steidl, 2003. ISBN 978-3-88243-837-6.
* When It Changed. Göttingen: Steidl, 2008. ISBN 978-3-8652-1-278-8.
* Sweet Earth-Experimental Utopias in America. Göttingen: Steidl, 2008. ISBN 978-3-86521-124-8.
* Oxbow Archive. Göttingen: Steidl, 2008. ISBN 978-3-86521-786-8.
* iDubai. Göttingen: Steidl, 2010. ISBN 978-3-86521-916-9.
* First Pictures. Göttingen: Steidl, 2011. ISBN 978-3-86930-309-3.
* Walking the High Line. Göttingen: Steidl, 2012. ISBN 978-3-86521-982-4.
* On This Site: Landscape in Memorian. Göttingen: Steidl, 2012. ISBN 978-3-86930-434-2.
* Stranger Passing. Göttingen: Steidl, 2012. ISBN 978-3-86930-499-1.
* American Prospects. New York, NY: Distributed Art Publishers / Göttingen: Steidl, 2012. ISBN 978-3-88243-915-1.
* Rome After Rome. Göttingen: Steidl, 2018. ISBN<PHONE_NUMBER>
* Landscape as Longing: Queens, New York. Göttingen: Steidl, 2017. ISBN<PHONE_NUMBER>.
* Our Loss. Göttingen: Steidl, 2019. ISBN 978-3-95829-658-9.
Collections
Sternfeld's work is held in the following public collection:
* Museum of Modern Art, New York: 71 works (as of August 2023)
* J. Paul Getty Museum, Los Angeles, CA
* San Francisco Museum of Modern Art, San Francisco, CA
* Victoria and Albert Museum, London, England
* Whitney Museum of American Art, New York, NY | WIKI |
Reg Leafe
Reginald James Leafe (15 December 1914 – 2001) was a FIFA referee in the 1950s and early 1960s.
Career
He was appointed to the 1955 FA Cup Final at Wembley on 7 May 1955, when Newcastle United beat Manchester City 3–1. He was subsequently an English representative at the 1958 FIFA World Cup, taking charge of the Group A game between West Germany and Argentina on 8 June 1958. He then refereed a quarter-final tie as Sweden defeated the Soviet Union 2–0 on 19 June 1958.
Barcelona v Real Madrid, European Cup 1960
Despite being the man in the middle for the famous Wolves versus Honvéd match in 1954 (his award of a penalty against Kovaks allowing Wolves to come back into the tie), Leafe is known on the continent as the referee who once disallowed 4 goals in the "El Clásico" match-up between Real Madrid and FC Barcelona in a 2nd round match in the European Cup.
In the first leg Arthur Ellis had awarded a late, controversial penalty for Barcelona when Sandor Kocsis was fouled outside the Madrid penalty area. In the second leg at the Nou Camp Leafe took charge. Kenneth Wolstenholme, for the BBC, called it "the game of all time". The mood of the evening was summed up, later, by the normally dignified Santiago Bernabeu commenting that Leafe was Barcelona's best player.
There are doubts as to whether Leafe was the man for the job. In total he disallowed four Real goals, and the game finished 2–1 to Barcelona. Phil Ball, a football historian, who saw footage of the game, remarked that the protests carried some substance since none of the goals "appear to be illegal in any way". Later Alfredo Di Stéfano remarked: "UEFA people didn't like us dominating 'their' cup. That's why they got English referees to make sure we didn't. After all, English referees were supposed to be the best. No one would suspect anything."†
Rapid Vienna v Benfica, European Cup, 1961
Later that season in the second leg of the semi-final in Austria, Leafe was at the centre of a massive row when deciding that the Rapid Vienna forward Robert Dienst had dived in the Benfica penalty area in the last minutes of the game. Various appeals to restore calm fell on deaf ears and the tie became the first European Cup match in history to be abandoned.
With Benfica winning the tie 4–1, Béla Guttmann later said to Leafe: "You should have let them have their penalty...It would have saved us a lot of trouble, and it wouldn’t have helped them reach the final anyway".
"Even if a team were leading by a hundred goals to nil", Leafe is said to have replied, "I would still not grant their opponents an unwarranted penalty".
Print
* †50 Years of the European Cup and Champions' League (ed. Radnedge), 2006, p. 45 | WIKI |
Topics:
Early Impressions of High-Intensity Focused Ultrasound for Prostate Cancer
Early Impressions of High-Intensity Focused Ultrasound for Prostate Cancer
This well-written review article provides a very balanced report on high-intensity focused ultrasound (HIFU) for the treatment of localized prostate cancer. The authors briefly describe the technology behind HIFU and some technical aspects of the procedure. They also provide a comprehensive review of ongoing clinical trials and previously published reports using HIFU.
The take-home message can be summarized as follows: HIFU seems to be moderately effective in treating localized prostate cancer, at least in the short term. Given the lack of long-term follow-up, HIFU cannot be recommended as primary therapy outside a clinical trial.
PSA Issues
Many of the published reports used neoadjuvant hormonal therapy, making it difficult to understand the prostate-specific antigen (PSA) results. A PSA nadir of < 0.5 ng/mL seems obtainable, and the use of the American Society for Therapeutic Radiology and Oncology (ASTRO) definition for tumor recurrence (three consecutive rises) seems reasonable. However, if HIFU truly destroys the prostate tissue, then the PSA should stay below 0.2 ng/mL. If portions of the prostate are treated subtherapeutically—thus supporting the use of the ASTRO definition of tumor recurrence—then prostate cancer could be untreated, bringing into question the efficacy of the treatment itself.
The reason why the PSA may rise after radiation therapy to the prostate is that radiation is more deadly to actively growing tumor than to normal tissue, and some patients will have a rising PSA due to the presence of benign tissue. HIFU destroys tissue using thermal energy, resulting in coagulative necrosis, and may also use acoustical energy. Therefore, there should be no normal prostate tissue in the zone of treatment.
Risks of Treatment
HIFU appears to be most effective in the treatment of small prostates. The need for a transurethral resection of the prostate (TURP) prior to HIFU is problematic and highlights the need for better technology to allow a deeper focal point. The side-effect profile of HIFU seems similar to cryotherapy or radiation seed implants. All three therapies can result in impotency, incontinence, and, rarely, fistulas. These complications occur due to heat, radiation, or cooling of the neurovascular bundles and urinary sphincter. If the entire prostate is to be treated, these structures are at risk—especially the neurovascular bundles.
The studies to date have not reported patient-defined incontinence and impotency results, making it diffcult to assess the true risk of HIFU. One side effect that seems specific to HIFU is sloughing of the treated prostate tissue. This is a significant problem resulting in urinary retention in most patients, although the long-term retention rate is low. Ongoing clinical trials should elucidate the frequency and severity of these complications.
Role of HIFU?
With these mixed results, it is unclear what HIFU will add to the currently established treatments of cryotherapy and radiation seed implants. It may well be the ability to perform truly focal therapy of the prostate. Cryotherapy needs to treat at least one-half of the prostate due to the ice ball formation, and the physics of radiation seed implantation makes it difficult to treat less than the entire prostate. HIFU has the ability to treat focal lesions accurately and hopefully effectively. The focal point of HIFU is very accurate, and in the appropriate patient may provide treatment to isolated prostate cancer without the morbidity that can occur by treating the entire gland. Clinical trials are needed to answer this question.
—David P. Wood, MD
Please Wait 20 seconds or click here to close | ESSENTIALAI-STEM |
Advanced I/O (Tone Output and Shift I/O etc.)
This library is used to generate a square wave, input/output serial data and read a pulse.
tone
Description
Generates a square wave of the specified frequency (and 50% duty cycle) on a pin. This is useful for playing sounds with a buzzer.
Syntax
tone(int pin, int frequency, int duration)
Parameters
pin: The pin on which to generate the tone
frequency: The frequency of the tone [Hz]
duration: The duration of the tone in milliseconds (optional)
Returns
Nothing
noTone
Description
Stops the generation of a square wave triggered by tone(). If you want to play different pitches on multiple pins, you need to call noTone() on one pin before calling tone() on the next pin.
Syntax
noTone(int pin)
Parameters
pin: The pin on which to stop generating the tone
Returns
Nothing
shiftOut
Description
Shifts out a byte of data one bit at a time. Starts from either the most (the leftmost) or least (the rightmost) significant bit. Each bit is written in turn to a data pin, after which a clock pin is pulsed (taken high, then low) to indicate that the bit is available. This is a software implementation; see also the SPI library, which provides a hardware implementation that is faster but works only on specific pins.
Syntax
shiftOut(int dataPin, int clockPin, bitOrder, unsigned char value)
Parameters
dataPin: The pin on which to output each bit
clockPin: The pin to toggle once the dataPin has been set to the correct value
bitOrder: Which order to shift out the bits; either MSBFIRST or LSBFIRST.
value: The data to shift out.(8-bit data)
Returns
Nothing
shiftIn
Description
Shifts in a byte of data one bit at a time. Starts from either the most (the leftmost) or least (the rightmost) significant bit. For each bit, the clock pin is pulled high, the next bit is read from the data line, and then the clock pin is taken low. This is a software implementation.
Syntax
unsigned char shiftIn(unsigned char dataPin, unsigned char clockPin, bitOrder)
Parameters
dataPin: The pin on which to input each bit
clockPin: The pin to toggle to signal a read from the dataPin
bitOrder: Which order to shift in the bits; either MSBFIRST or LSBFIRST
Returns
The value read (8-bit data)
shiftOutEx
Description
Shifts out multiple bytes (up to 32 bits) of data one bit at a time. Starts from either the most (the leftmost) or least (the rightmost) significant bit. Each bit is written in turn to a data pin, after which a clock pin is pulsed (taken high, then low) to indicate that the bit is available. This is a software implementation.
Syntax
shiftOutEx(int dataPin,int clockPin, bitOrder, int len, unsigned long value)
Parameters
dataPin: The pin on which to output each bit
clockPin: The pin to toggle once the dataPin has been set to the correct value
bitOrder: Which order to shift out the bits; either MSBFIRST or LSBFIRST
len: Number of output bits
value: The data to shift out (32 bits or lesser. In the case of MSBFIRST, the most significant bit should be filled.)
Returns
Nothing
pulseIn
Description
Reads a pulse (either HIGH or LOW) on a pin. For example, if the value is HIGH, pulseIn() waits for the pin to go HIGH, starts timing, then waits for the pin to go LOW and stops timing. Returns the length of the pulse in microseconds. Gives up and returns 0 if no pulse starts within a specified time out.
Syntax
unsigned long pulseIn(int pin, int val, unsigned long timeout)
Parameters
pin: The number of the pin on which you want to read the pulse
val: Type of pulse to read: either HIGH or LOW
timeout: The number of microseconds to wait for the pulse to start; default is one second (option)
Returns
The length of the pulse (in microseconds) or 0 if no pulse started before the timeout
Example
Melody using tone.
#include <Arduino.h>
void setup(){
}
void loop(){
tone(3, 523); // C4
delay(200);
noTone(3);
tone(3, 587); // D4
delay(200);
noTone(3);
tone(3, 659); // E4
delay(400);
noTone(3);
} | ESSENTIALAI-STEM |
Ichabod and Me
Ichabod and Me is an American sitcom television series starring Robert Sterling and George Chandler that aired in the United States during the 1961–62 television season. It depicts the life of a New York City newspaper reporter who moves to a small New England town and becomes the publisher of its newspaper.
Premise
Tiring of life in New York City, where he had worked as a reporter at the New York Times, and wanting to raise his six-year-old son Benjie in a different environment, 44-year-old widower Bob Major moves with Benjie to Phippsboro, a small, sleepy rural town in New Hampshire with a population of about 3,000, where he purchases the town's only newspaper, the weekly Phippsboro Bulletin, from its longtime owner and editor, Ichabod Adams. Bob's big-city attitudes and ideas often clash with the small-town ways of the natives of Phippsboro, who are stereotypical rural New Englanders – taciturn, frugal, suspicious of strangers like him, and set in their ways; he is prone to writing inflammatory editorials in the Bulletin calling for progress in the town to bring it into the mid-20th century and raising the ire of the townspeople, who tend to oppose change. Ichabod – who is in his 60s, owns most of the town and serves it in many capacities, including as its mayor for the past 28 years, its school superintendent, and its traffic commissioner — remains involved in the operation of the newspaper. Ichabod is bemused by Bob and friendly toward him, offering him fatherly wisdom and advising him on how to navigate conflicts with his neighbors.
Also in Bob's life in Phippsboro are Ichabod's adult daughter Abby, who lives with Ichabod and at first views the highly eligible Bob with disdain, but then warms to him, takes a romantic interest in him, and eventually becomes his girlfriend; Aunt Livvy, the stern-faced but soft-hearted housekeeper for Bob and Benjie; Jonathan Baylor, a wide-eyed high school student who is Bob's only regular employee at the Phippsboro Bulletin; and Olaf, one of the townspeople. Martin Perkins, a typically taciturn New Englander who runs the local hardware store, and his friend Colby, the owner and operator of Colby's Seed and Fertilizer, are longtime Phippsboro residents who serve on the city council and share a suspicion of Bob and his activities. Bob complains about how hard it is to keep a secret in Phippsboro, where residents – Martin and Colby in particular – listen in on the town's party line to eavesdrop on other people's business.
Cast
* Robert Sterling...Robert "Bob" Major
* George Chandler...Ichabod Adams
* Christine White...Abigail "Abby" Adams
* Jimmy Mathers...Benjamin "Benjie" Major (recurring)
* Reta Shaw...Aunt Lavinia ("Livvy") (recurring)
* Guy Raymond...Martin Perkins (recurring)
* Forrest Lewis...Colby (recurring)
* Jimmy Hawkins...Jonathan Baylor
* Burt Mustin...Olaf (recurring)
The pilot "Adam's Apples", aired in 1960, had a somewhat different cast. Fred Beir played Terrence "Terry" Major, later recast and renamed Bob Major for the actual series. Dorothy Neumann played Aunt Lavinia ("Livvy"), and Pitt Herbert played Martin Perkins. Burt Mustin, who played the recurring role of Olaf in the series, played a character called Burt in the pilot. Chandler and White appeared in the pilot in their series roles.
Origins
George Chandler created the Ichabod Adams character in 1956 in "Goodbye, Grey Flannel," an episode of the dramatic series Robert Montgomery Presents, with Lee Bowman co-starring as "Mr. Major", a forerunner of the Bob Major character of Ichabod and Me. The success of the episode prompted Chandler to return as Ichabod in a 1957 episode of Robert Montgomery Presents entitled "One Smart Apple."
The two Robert Montgomery Presents episodes led to the filming of a pilot for Ichabod and Me entitled "Adam's Apples." It included George Chandler as Ichabod and Christine White as his daughter Abby, but differed from the regular series in several ways. In "Adam's Apples," a character named Terrence "Terry" Major, portrayed by Fred Beir, gives up life as an advertising executive in New York City and retires to Phippsboro to become a gentleman farmer, and he rents property from Ichabod. Terry is childless, but has a dog named Fownes, after his former boss in New York. Dorothy Neumann portrays Livvy, Pitt Herbert portrays Martin Perkins, and Burt Mustin appears as a character named Burt rather than Olaf. The pilot does not include the Jonathan Baylor, Benjie Major, or Colby characters and makes no mention of Phippsboro's newspaper. It aired in April 1960 as an episode of General Electric Theater but did not sell as a regular series.
Despite the pilot's failure, Chandler felt strongly about getting a regular series on the air based on the Ichabod Adams and "Mr. Major" characters. He took the initiative in forming a partnership with co-creators Joe Connelly and Bob Mosher and with comedian Jack Benny, whose production company put up much of the funding for the regular series Ichabod and Me. The show's premise was retooled for the regular series, with a character named Bob Major giving up life as a newspaper reporter in New York and moving to Phippsboro with his son Benjie, where he purchases the local newspaper from Ichabod, with Robert Sterling rather than Beir playing the role of Bob. With the success of The Andy Griffith Show, a rural-themed CBS situation comedy which began its long and successful run during the 1960–1961 season, and the planned premiere on CBS in the 1961–1962 season of Window on Main Street starring Robert Young — which some observers viewed as bearing similarities to Ichabod and Me — CBS saw a potentially successful series in Ichabod and Me and picked it up for its 1961–1962 schedule.
Production
A low-key situation comedy, Ichabod and Me was created and produced by Joe Connelly and Bob Mosher — who served as its executive producers – in association with Jack Benny's JaMco Productions, and Irving Paley served as series producer. It was co-sponsored by the Quaker Oats Company and the Kent and York Imperial-Sized Cigarette brands of the P. Lorillard Tobacco Company.
Both the pilot and the regular series were filmed at Revue Studios in Hollywood, California. The show was in black and white with a laugh track. Hank Simms was the show's announcer.
Pete Rugolo and His Orchestra performed the opening and closing theme of Ichabod and Me, which was an updated, uptempo arrangement of the traditional folk song "The Girl I Left Behind Me" — a fife-and-drum-corps classic which connoted the American Revolutionary War era in New England. It appeared with the title "Ichabod and Me Theme" as a track on Rugolo's 1962 album TV's Top Themes.
Jimmy Mathers, who portrayed Benjie Major, was the brother of Jerry Mathers, who starred in Leave It to Beaver at the time. However, the Benjie and Livvy roles were rather minor ones in Ichabod and Me, and the two characters did not even appear in a number of episodes.
Ichabod and Me′s most noteworthy guest star was screenwriter, playwright, television producer, narrator, and television host Rod Serling, who had gained fame in the 1950s for his live television dramas and as creator of the anthology series The Twilight Zone, which had debuted in 1959. He portrayed a reclusive counterculture novelist in the episode "The Celebrity," which aired on March 20, 1962, in what CBS billed as his dramatic debut. Uncomfortable with acting, Serling said of his appearance on Ichabod and Me, "I never had a line that resembled the English language."
Reception
The Red Skelton Show drew high ratings and appealed especially to rural audiences, and CBS hoped it would provide a good lead-in for Ichabod and Me, so it scheduled Ichabod and Me to follow The Red Skelton Show. Ichabod and Me met with poor critical reviews that suggested such scheduling would not succeed in building an audience for the series. In her column of September 27, 1961, Associated Press television critic Cynthia Lowry wrote that Ichabod and Me amounted to a "pretty tired, clumsy effort" and offered the opinion that its stereotyped depiction of rural New Englanders was more likely to offend residents of New England than attract them to the show. The same day, syndicated columnist Harriet Van Horne wrote of CBS that "A network that would buy Ichabod for prime evening time would buy the Brooklyn Bridge from a tavern drunk — and pay cash." Variety panned Ichabod and Me in its October 4, 1961, issue as "just another run-of-the-mill situation comedy, typically innocuous in its content and wholly bland in its approach...there were no surprises and few laughs on its first outing."
Ichabod and Me struggled to attract an audience. Rod Serling's guest appearance drew some attention to the series in March 1962, but did not improve its ratings, and by April 1962 Robert Sterling was acknowledging in interviews that the show was unlikely to return for a second season. He expressed bewilderment at the rules of television, likened an actor's selection of a television role to little more than gambling, with success having nothing to do with the role's quality, and criticized sponsors for becoming too prone to withdraw support for a television series at the first sign of early weakness in viewership. Disgusted with the television industry after the cancellation of Ichabod and Me, Sterling made only sporadic television appearances after the series came to an end in mid-1962.
Broadcast history
The pilot for Ichabod and Me aired on April 24, 1960, as an episode of General Electric Theater entitled "Adam's Apples." Ichabod and Me premiered as a regular series on September 26, 1961, and aired on CBS on Tuesdays at 9:30 p.m. Eastern Time. The competition for Ichabod and Me was not considered formidable: It consisted of the second half of the Leslie Nielsen police drama The New Breed on ABC until November 14, 1961, when The New Breed moved to 8:30 pm. Eastern Time and Bert Parks's game show Yours for a Song began airing at 9:30 pm. Eastern on ABC, while on NBC Ichabod and Me aired opposite the second half of The Dick Powell Show, an anthology series. However, CBS cancelled Ichabod and Me after only a single season, and its 36th and final new episode was broadcast on June 5, 1962. Reruns of the show then aired in its regular time slot until September 18, 1962. | WIKI |
The Ancient Roman History of May Day
Many western cultures have lost their connection to May Day. This ancient festival has strong ties to ancient Rome and has permeated our own culture.
Many of us over the age of 40 remember celebrations of the May Queen. A girl was chosen to be the Queen of the May and crowned with a wreath of flowers. Often she was the honored member of a May Day parade with flowers scattered before her.
The May crowning has its origins in the honoring of the Roman goddess Flora, the goddess of flowers. Romans would walk to Flora's temple, their arms filled with flowers they had gathered from the fields. They would lay the flowers around her feet and her head would be crowned with a fresh wreath of flowers. Children would wind flower garlands around the temple. Tradition had it that the first child to bring flowers to honor Flora would be lucky all year long.
As with many Roman festivals, the festival of Floralia lasted several days. It began on April 28th and lasted until May 3rd. As part of the festival slaves were given a special day free of labor and restrictions--as long as they returned to their master's home by nightfall. This tradition was carried forth throughout Europe as Labor Day or Worker's Day.
The Maypole was not originally connected with the celebrations surrounding Flora, but transformed from various festivals. The use of the pole was first connected with Pan the Greek and Roman god of fertility. The Romans transferred its used to festivals and celebrations surrounding Maia, the mother of Mercury. It is for her that the month of May is named.
As the Romans colonized Europe and Britain they took their May customs with them. The Maypole was embraced by the Britains and parts of Floralia celebration were integrated into Beltane celebrations (meaning 'Bel-fire,' the fire of the Celtic god of light) which also included a Maypole. The dances associated with Floralia were interwoven into the Maypole dances, creating the famous Maypole dance of ribbons.
England became the holder the ancient Roman customs and made them the popular festivals that many recall today.
You Should Also Read:
Italian Culture and Travel
Christmas in Ancient Rome
Editor's Picks Articles
Top Ten Articles
Content copyright © 2022 by Paula Laurita. All rights reserved.
This content was written by Paula Laurita. If you wish to use this content in any manner, you need written permission. Contact Cinzia Aversa for details. | FINEWEB-EDU |
pthread_key_create()
Create a thread-specific data key
Synopsis:
#include <pthread.h>
int pthread_key_create( pthread_key_t * key,
void (*destructor)( void * ) );
Arguments:
key
A pointer to a pthread_key_t object where the function can store the new key.
destructor
NULL, or a function to be called when you destroy the key.
Library:
libc
Use the -l c option to qcc to link against this library. This library is usually included automatically.
Description:
The pthread_key_create() function creates a thread-specific data key that's available to all threads in the process and binds an optional destructor function destructor to the key. If the function completes successfully the new key is returned in key.
Note: Although the same key may be used by different threads, the values bound to the key using pthread_setspecific() are maintained on a per-thread basis and persist only for the lifetime of the thread.
When you create a key, the value NULL is bound with the key in all active threads. When you create a thread, the value NULL is bound to all defined keys in the new thread.
You can optionally associate a destructor function with each key value. At thread exit, if the key has a non-NULL destructor pointer, and the thread has a non-NULL value bound to the key, the destructor function is called with the bound value as its only argument. The order of destructor calls is undefined if more than one destructor exists for a thread when it exits.
If, after all destructor functions have been called for a thread, there are still non-NULL bound values, the destructor function is called repeatedly a maximum of PTHREAD_DESTRUCTOR_ITERATIONS times for each non-NULL bound value.
Returns:
EOK
Success.
EAGAIN
Insufficient system resources to create key, or PTHREAD_KEYS_MAX has been exceeded.
ENOMEM
Insufficient memory to create key.
Examples:
This example shows how you can use thread-specific data to provide per-thread data in a thread-safe function:
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <pthread.h>
pthread_key_t buffer_key;
void buffer_key_destruct( void *value )
{
free( value );
pthread_setspecific( buffer_key, NULL );
}
char *lookup( void )
{
char *string;
string = (char *)pthread_getspecific( buffer_key );
if( string == NULL ) {
string = (char *) malloc( 32 );
sprintf( string, "This is thread %d\n", pthread_self() );
pthread_setspecific( buffer_key, (void *)string );
}
return( string );
}
void *function( void *arg )
{
while( 1 ) {
puts( lookup() );
}
return( 0 );
}
int main( void )
{
pthread_key_create( &buffer_key,
&buffer_key_destruct );
pthread_create( NULL, NULL, &function, NULL );
/* Let the threads run for 60 seconds. */
sleep( 60 );
return EXIT_SUCCESS;
}
Classification:
POSIX 1003.1
Safety:
Cancellation point No
Interrupt handler No
Signal handler No
Thread Yes
Caveats:
Before each destructor is called, the thread's value for the corresponding key is set to NULL. Calling:
pthread_setspecific( key, NULL );
in a key destructor isn't required; this lets you use the same destructor for several keys. | ESSENTIALAI-STEM |
Key targets for multi-target ligands designed to combat neurodegeneration
Resumen: HIGHLIGHTS • Compounds that interact with multiple targets but minimally with the cytochrome P450 system (CYP) address the many factors leading to neurodegeneration. • Acetyl- and Butyryl-cholineEsterases (AChE, BChE) and Monoamine Oxidases A/B (MAO A, MAO B) are targets for Multi-Target Designed Ligands (MTDL). • ASS234 is an irreversible inhibitor of MAO A > MAO B and has micromolar potency against the cholinesterases. • ASS234 is a poor CYP substrate in human liver, yielding the depropargylated metabolite. • SMe1EC2, a stobadine derivative, showed high radical scavenging property, in vitro and in vivo giving protection in head trauma and diabetic damage of endothelium. • Control of mitochondrial function and morphology by manipulating fission and fusion is emerging as a target area for therapeutic strategies to decrease the pathological outcome of neurodegenerative diseases. Growing evidence supports the view that neurodegenerative diseases have multiple and common mechanisms in their aetiologies. These multifactorial aspects have changed the broadly common assumption that selective drugs are superior to "dirty drugs" for use in therapy. This drives the research in studies of novel compounds that might have multiple action mechanisms. In neurodegeneration, loss of neuronal signaling is a major cause of the symptoms, so preservation of neurotransmitters by inhibiting the breakdown enzymes is a first approach. Acetylcholinesterase (AChE) inhibitors are the drugs preferentially used in AD and that one of these, rivastigmine, is licensed also for PD. Several studies have shown that monoamine oxidase (MAO) B, located mainly in glial cells, increases with age and is elevated in Alzheimer (AD) and Parkinson''s Disease''s (PD). Deprenyl, a MAO B inhibitor, significantly delays the initiation of levodopa treatment in PD patients. These indications underline that AChE and MAO are considered a necessary part of multi-target designed ligands (MTDL). However, both of these targets are simply symptomatic treatment so if new drugs are to prevent degeneration rather than compensate for loss of neurotransmitters, then oxidative stress and mitochondrial events must also be targeted. MAO inhibitors can protect neurons from apoptosis by mechanisms unrelated to enzyme inhibition. Understanding the involvement of MAO and other proteins in the induction and regulation of the apoptosis in mitochondria will aid progress toward strategies to prevent the loss of neurons. In general, the oxidative stress observed both in PD and AD indicate that antioxidant properties are a desirable part of MTDL molecules. After two or more properties are incorporated into one molecule, the passage from a lead compound to a therapeutic tool is strictly linked to its pharmacokinetic and toxicity. In this context the interaction of any new molecules with cytochrome P450 and other xenobiotic metabolic processes is a crucial point. The present review covers the biochemistry of enzymes targeted in the design of drugs against neurodegeneration and the cytochrome P450-dependent metabolism of MTDLs.
Idioma: Inglés
DOI: 10.3389/fnins.2016.00375
Año: 2016
Publicado en: Frontiers in neuroscience 10 (2016), 375 [24 pp]
ISSN: 1662-4548
Factor impacto JCR: 3.566 (2016)
Categ. JCR: NEUROSCIENCES rank: 83 / 258 = 0.322 (2016) - Q2 - T1
Factor impacto SCIMAGO: 1.941 - Neuroscience (miscellaneous) (Q1)
Financiación: info:eu-repo/grantAgreement/EUR/COST/CM1103
Financiación: info:eu-repo/grantAgreement/ES/MICINN/BIO2013-42978-P
Tipo y forma: Article (Published version)
Área (Departamento): Área Bioquímica y Biolog.Mole. (Dpto. Bioq.Biolog.Mol. Celular)
Creative Commons You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
Exportado de SIDERAL (2020-02-21-13:54:20)
Visitas y descargas
Este artículo se encuentra en las siguientes colecciones:
Articles
Record created 2016-10-19, last modified 2020-02-21
Versión publicada:
PDF
Rate this document:
Rate this document:
1
2
3
(Not yet reviewed) | ESSENTIALAI-STEM |
Selected Publications:
Spleen-derived macrophages are readily polarized into classically activated (M1) or alternatively activated (M2) states. Mulder R, Banete A and Basta S. Immunobiology. 2014
TLR2 subunit agonists are superior inducers of pro-inflammatory mediators than inactivated Mycobacterium butyricum. Gambhir V, Yildiz C, Siddiqui S, Guzzo C, Mulder R, Szewczuk M, Gee K and *Basta S. Cellular Immunology. 2012. 280:101-7.
Interleukin-27 induces TLR4 expression on human monocytes via a STAT3 and NF-kB dependent pathway. Guzzo, C., Ayer A, Banfield B, Basta S, and Gee K. J Immunol. 2012. 15;188(2):864-73.
CD8+ T Cell Immunodominance To Lymphocytic Choriomeningitis Virus is Modified in the Presence of Toll-Like Receptor Agonists. Siddiqui S and Basta S. J. Virol. 2011;85(24):13224-33.
Influence of 1,25(OH)2D3 on TLR-induced activation of antigen presenting cells is dependent on the order of receptor engagement. Gambhir V, Kim J, Siddiqui S, Jones G and Basta S. Immunobiology. 2011 216:988-96.
TLR engagement prior to virus infection influences MHC-I antigen presentation in an epitope-dependent manner as a result of nitric oxide release. Siddiqui S, Alatery A, Kus A, Basta SJ. Leukoc. Biol. 2011 .89:457-68
The role of antigen presentation by esophageal epithelial cells in eosinophilic esophagitis. Mulder DJ, Pooni A, Mak N, David J. Hurlbut DJ, Basta S, and Justinich C. American Journal of Pathology. 2011. 178:744-53.
IL-7 engages multiple mechanisms to overcome chronic viral infection and limit organ pathology. Pellegrini M, Calzascia T, Elford A, Shahinian A, Lang P, Morre M, Tedder T, Sparwasser T, Nussenzweig M, Basta S., Ohashi P and Mak T. Cell. 18:601-13 2011.
Delivery of exogenous antigens and the induction of cytotoxic T Lymphocyte responses. kim J, Ganbhir V, Alatery A, and Basta, S. J. Biomed. Biotechnol. 2010:218752. 2010. Invited Review for the special issue on "Cytotoxic T Lymphocytes and Vaccine Development"
The outcome of cross-priming during virus infection is not directly linked to the ability of the antigen to be cross-presented. Alatery A, Tarrab E, Lamarre A, and Basta, S. Eur J Immunol. 2010. 40(8):2190-9. 2010.
Cross but not direct presentation of cell-associated virus antigens by spleen macrophages is influenced by their differentiation state. Alatery A, Siddiqui S, Chan M, Kus A, Petrof E, and Basta, S. Immunol & Cell Biology. 2010. 88:3-12.
Altered Immunodominance hierarchies of CD8+ T cells in the spleen after infection at different sites is contingent on high virus inoculum. Siddiqui, S, Tarrab E, Lamarre A, and Basta, S. Microbes & Infection. 2010. 12:324-30.
Coencapsulation of adjuvants and antigen into the same biodegradable microspheres enables the generation of potent cytotoxic T lymphocyte responses. Schlosser E, Fischer S, Basta S, Busch D, Gander B, and Groettrup M. Vaccine. 2008. 26:1626-37.
Cross-priming of a single viral protein from lymphocytic choriomeningitis virus alters immunodominance hierarchies of CD8+ T cells during subsequent viral infections. Dunbar E, Alatery A and Basta S. Viral Immunology. 2007. 20:585-98.
The cross-priming pathway: A portrait of an intricate immune system. Basta S and Alatery A. Scandinavian Journal of Immunology. 2007. 65:311–319. Review.
Reversal in the Immunodominance Hierarchy in Secondary CD8+ T Cell Responses to Influenza A Virus: Roles for Cross-Presentation and Lysis-Independent Immunodomination. Chen W, Pang K, Masterman K, Kennedy G, Basta S, Dimopoulos N, Hornung F, Smyth M, Bennink JR, and Yewdell. JW. J. Immunol. 2004. 173:5021-5027.
CD8+ T cell cross-priming via transfer of proteasome substrates. *Norbury CC, *Basta S, Donohue KB, Tscharke DC, Princiotta MF, Berglund P, Gibbs J, Bennink JR, & Yewdell JW. Science. 2004. 304:1318-21. *Primary authorship.
Cross-priming of CD8+ T cells by viral and tumor antigens is a robust phenomenon. Chen W, Masterman K, Basta S, Haeryfar SM, Dimopoulos N, Knowles B, Bennink JR and Yewdell JW. Eur. J. Immunol. 2004. 34:194–199.
A survival game of hide and seek: Cytomegaloviruses and MHC class I Antigen Presentation Pathways. Basta S, and Bennink JR. Viral Immunology. 2003. 16:231-242. REVIEW.
Heat-Aggregated Noninfectious Influenza Virus Induces a More Balanced CD8(+)-T-Lymphocyte Immunodominance Hierarchy Than Infectious Virus. Cho Y, Basta S, Chen W, Bennink JR, Yewdell JW. J. Virol. 2003. 77:4679-84.
Inhibitory effects of cytomegalovirus proteins US2 and US11 point to contributions from direct priming and cross-priming in induction of vaccinia virus-specific CD8(+) T cells. Basta S, Chen W, Bennink JR, Yewdell JW. J Immunol. 2002.
A novel influenza A virus mitochondrial protein that iduces cell death. Chen W, Calvo PA, Malide D, Gibbs J, Schubert U, Bacik I, Basta S, O'Neill R, Schickli J, Palese P, Henklein P, Bennink JR, Yewdell JW. Nat. Med. 2001. 7:1306-12.
Modulation of monocytic cell activity and virus susceptibility during differentiation into macrophages. Basta S, Knoetig SM, Spagnuolo-Weaver M, Allan G, McCullough KC. J. Immunol. 1999. 162:3961-9. | ESSENTIALAI-STEM |
Tuesday , April 23 2024
Exploring the Benefits of a Thermal Imager App
What is a Thermal Imager App?
Thermal Imager App
A thermal imager app is a mobile application that uses the camera on your smartphone to capture infrared radiation emitted by objects and convert it into a visible image. The resulting image is called a thermogram or thermal image, and it can be used to identify temperature differences on a surface or in an environment. These apps are often used by professionals in various industries, such as electrical and mechanical engineers, building inspectors, firefighters, and hunters, as well as by hobbyists interested in home improvements and DIY projects.
Most thermal imager apps work by using the thermal sensors built into the camera of your smartphone. These sensors let the app measure the temperature of the objects that appear in the camera’s field of view. The app then processes the data to create a map of the temperatures, which it displays on your screen as a color-coded image. The colors typically range from blue (for the coldest areas) to red or white (for the hottest areas). The resulting image can provide a lot of useful information, such as hotspots on electrical circuits, heat loss from windows and doors, and even the location of wildlife in the dark.
One of the main advantages of thermal imager apps is that they are more affordable and widely accessible than traditional thermal imaging cameras. Professional-grade thermal imaging cameras can cost thousands of dollars, but a thermal imager app can be downloaded for a fraction of that cost, or sometimes even for free. Additionally, many thermal imager apps are lightweight, easy to use, and can be used in conjunction with other apps, such as photo editing software, to produce more sophisticated and detailed analyses.
However, there are also some limitations to thermal imager apps. One major drawback is that they can only measure temperatures on surfaces that are visible by the camera’s sensors. This means that they cannot see through walls or other solid barriers to detect temperature differences in hidden areas. Furthermore, the accuracy of a thermal imager app may be affected by external factors, such as ambient temperature, humidity, and distance from the object being measured. Therefore, it is important to use thermal imagers in conjunction with other measurement tools and to calibrate them regularly to ensure accurate readings.
Despite their limitations, thermal imager apps have revolutionized the way we think about thermal imaging and have made this valuable technology more accessible and affordable for everyday use. Whether you are a homeowner looking to identify drafts in your house, a hunter trying to track game in the darkness, or a professional engineer inspecting machinery, a thermal imager app can be a valuable tool to have in your arsenal.
How Does the Technology Work?
Thermal imaging technology
Thermal imaging technology works by detecting the temperature of objects in the form of infrared radiation. This is the same kind of radiation that is emitted by our bodies as heat. Thermal imagers use a specially designed lens to focus the infrared radiation onto a detector, which then converts the signal into an image that can be viewed and analyzed.
There are two main types of thermal imaging technology: uncooled and cooled detectors. Uncooled detectors are the most common and are typically found in consumer-grade thermal cameras. These detectors are made from a special type of material that changes in resistance as the temperature changes, which produces an electrical signal that can be measured and converted into an image. Cooled detectors, on the other hand, use a small refrigerator to cool the detector to extremely low temperatures. This makes them much more sensitive and accurate, but also much more expensive.
Thermal imaging technology is based on the fact that all objects above absolute zero (-273.15°C or -459.67°F) emit some level of infrared radiation. The amount of radiation that an object emits is directly related to its temperature, with hotter objects emitting more radiation than cooler objects. By detecting and measuring this radiation, thermal imagers can create a visual representation of the temperature of the object being imaged.
Thermal imaging technology is used in a wide range of applications, including industrial and commercial inspections, security and surveillance, firefighting, and search and rescue. By detecting and visualizing temperature differences, thermal imagers can help identify potential problems before they become serious issues. For example, thermal imaging cameras can be used to detect hot spots in electrical equipment, which could indicate a potential fire hazard. They can also be used to identify leaks in roofs and walls, which could lead to water damage.
Thermal imaging technology has also been used to study and monitor wildlife. By detecting differences in temperature between animals and their surroundings, researchers can better understand animal behavior and habitat use. For example, thermal imaging cameras have been used to monitor bird nests, track the movements of large mammals like elephants and rhinos, and even study the behavior of bats.
Overall, thermal imaging technology is a powerful tool that allows us to see the world in a new way. By detecting and visualizing temperature differences, thermal imagers can help us identify potential problems and improve our understanding of the natural world.
Uses and Applications of Thermal Imager Apps
Thermal Imager Apps
Thermal Imagers are devices that detect and capture infrared radiations emitted by any object and convert them into visible images. Thermal imager apps, on the other hand, are mobile apps that use a phone’s camera and algorithms to create thermal images. These apps have various uses and applications, which we are going to discuss in this article.
1. Home Inspection and Maintenance
Thermal Imager Apps for Home Inspection
Thermal imager apps can be used during a home inspection to detect issues related to insulation, moisture intrusion, and electrical faults. The app’s camera can quickly scan the entire house for hot and cold spots, indicating any insulation problems. It can also detect moisture build-up in walls and ceilings, which can lead to mold and structural damage if not dealt with quickly.
The app can also be used to detect electrical hotspots, which may indicate electrical faults in wires, panels, and circuit breakers. Electrical faults can lead to power surges, electrical fires, and other hazards. By using a thermal imager app, homeowners and inspectors can detect these issues early on, saving future costs and potential hazards.
2. Health and Safety
Thermal Imager Apps for health
Thermal imager apps can also be used to detect health issues. Fever is often the first sign of illness, and thermal imagers can detect it by measuring body temperature. This app can be very useful during COVID-19, where people are required to measure their temperature before entering buildings and public places. Moreover, it can also detect other health issues such as arthritis, inflammation, and muscle strains.
Thermal imaging can also be used to identify safety hazards, such as gas leaks and fire hazards. It can detect gas leaks by identifying gas pockets that produce heat, greatly reducing the risk of gas explosions. It can also detect areas of high temperature, indicating potential fire hazards before they become dangerous.
3. Hunting and Outdoor Activities
Thermal Imager Apps for hunting
Thermal imager apps can be used in hunting and other outdoor activities such as camping and hiking. In hunting, the app can detect heat signatures from animals, helping hunters track down their prey. This feature is especially useful when hunting at night, where animals are harder to see and stalk. The app can also be used to detect other animals, such as snakes and other dangerous creatures, that are hidden in the brush or undergrowth.
During camping and hiking, the app can detect campfires and other heat sources, helping campers locate other camping groups, and identify potential safety hazards.
4. Automotive and Machinery Inspections
Thermal Imager Apps in Automotive
Thermal imager apps can also be used in automotive and machinery inspections. The app can detect potential engine issues by identifying hotspots and temperature changes in different parts of the engine. This information can help mechanics locate and correct issues before they become bigger problems, reducing repair costs and increasing safety.
The app can also be used to detect issues with brakes, tires, and other parts of the car that can malfunction, leading to accidents and other hazards. In machinery inspections, it can quickly detect issues such as overheating, friction, and malfunctioning parts.
Thermal Imager Apps are versatile tools that can be used in different fields and applications. Whether it’s for home inspection, health and safety, hunting, or automotive and machinery inspections, this app provides an efficient and practical solution for detecting issues that are invisible to the naked eye.
Key Features to Look for in a Thermal Imager App
Thermal Imager App
Thermal imaging technology is a crucial tool for a variety of industries, including maintenance and repair, security, and firefighting. One of the most efficient ways to access thermal imaging is through a mobile application. Thermal imager apps are typically designed to allow common mobile devices to function as thermal imagers. In this article, we shall explore some of the features to look for in a thermal imager app.
Multiple Color Palette Options
Color Palette Options
Most thermal imager apps come with a range of color palette options designed to highlight specific temperatures. The colors may vary from one app to another, and therefore, it is essential to select an app that offers multiple color palette options. A good thermal imager app should give the user control over the color palettes. The user should be able to choose a color palette that suits their preferences and the nature of their job. For instance, firefighters and security personnel might prefer a high-contrast palette option that makes it easier to identify any anomalies.
Data Recording and Image Manipulation
Data Recording and Image Manipulation
It is essential to choose a thermal imager app that offers image recording and manipulation features. A good app should provide the functionality to store and share images and data through the user’s device. Thermal imagers generate large amounts of data, and it is impractical to keep all the data on the device; therefore, it is necessary to have an app with cloud-based storage. Some apps also come with in-built editing tools that allow the user to manipulate the thermal image to highlight key areas.
Real-Time Temperature Measurement
Real-Time Temperature Measurement
Real-time temperature measurement is arguably one of the most important features to consider when selecting a thermal imager app. The app should provide accurate temperature measurements in real-time. It is advisable to choose an app that allows the user to set the emittance value, which ensures that the thermal measurements generated are accurate. Real-time temperature measurement is critical in a variety of industries, including firefighting and industrial maintenance, where temperature changes may occur rapidly.
Easy to Use Interface
Easy to Use Interface
Another crucial factor to consider when selecting a thermal imager app is the ease of use of the interface. The app should come with a user-friendly interface that allows quick and effortless navigation. Look for an app that provides a simplified menu layout and offers quick access to essential functions such as recording, image manipulation, and temperature measurement. The user interface should be intuitive enough for users who are not familiar with thermal imaging technology.
Conclusion
In conclusion, selecting the right thermal imager app depends on the user’s specific needs. Some of the key features to look for in a thermal imager app include multiple color palettes, data recording, real-time temperature measurement, and an easy-to-use interface. Additionally, the app should be compatible with the user’s device and offer cloud-based storage capabilities. By considering these factors, users can maximize their thermal imaging capabilities and achieve better results in their professional roles.
Top Thermal Imager Apps on the Market Today
Thermal Imager App
Thermal imager apps are now becoming more and more popular in the market, and for good reason. These apps are not only easy to use, but they can also be incredibly useful in a variety of scenarios, from home maintenance to outdoor adventures. In this article, we will take a look at the top thermal imager apps on the market today.
1. FLIR ONE
FLIR ONE
FLIR ONE is one of the most popular thermal imager apps on the market. It comes with a camera attachment that you can easily connect to your phone, allowing you to see the temperature of any object or room, day or night. The app also features an easy-to-use interface, allowing you to easily adjust the temperature range and color palette.
2. Seek Thermal
Seek Thermal
The Seek Thermal app works with a thermal camera attachment that is designed to work with smartphones, making it a perfect tool for outdoor enthusiasts. This app is ideal for detecting wildlife, finding hotspots in electrical systems, and more. The Seek Thermal app is also very easy to use, with a simple interface that makes it easy to adjust settings and take photos.
3. Thermal Camera Fx
Thermal Camera Fx
The Thermal Camera Fx app is another popular option for those who are interested in thermal imaging. This app allows you to see the temperature of any object or area, and it also comes with a number of different filters that you can use to customize your thermal images. The Thermal Camera Fx app is available for both Android and iOS devices.
4. Therm-App
Therm-App
Therm-App is a high-performance thermal imaging app that is designed for professionals. It comes with a thermal camera attachment that is compatible with both Android and iOS devices, making it easy to take thermal images of any situation. The app also features a number of different settings that you can use to customize your thermal images, making it a versatile tool for a variety of different applications.
5. Thermal Imaging Camera
Thermal Imaging Camera
Thermal Imaging Camera is a popular app that is designed to work with smartphones. It comes with a thermal camera attachment that you can use to take thermal images of your surroundings. Additionally, the app features a number of different settings that allow you to customize your images to suit your needs. Whether you are interested in using thermal imaging for home maintenance or outdoor adventures, the Thermal Imaging Camera app is a great option.
Thermal imager apps are incredibly useful tools that can be used in a variety of different scenarios. Whether you are a professional looking for a high-performance app or just someone who is interested in exploring the world of thermal imaging, there is an app out there that will meet your needs. Consider any of the above apps and take your thermal imaging to the next level. | ESSENTIALAI-STEM |
The Community for Technology Leaders
Green Image
ABSTRACT
<p><b>Abstract</b>—We propose a method to handle approximate searching by image content in medical image databases. Image content is represented by attributed relational graphs holding features of objects and relationships between objects. The method relies on the assumption that a fixed number of "labeled" or "expected" objects (e.g., "heart," "lungs," etc.) are common in all images of a given application domain in addition to a variable number of "unexpected" or "unlabeled" objects (e.g., "tumor," "hematoma," etc.). The method can answer queries by example, such as "<it>find all X-rays that are similar to Smith's X-ray</it>." The stored images are mapped to points in a multidimensional space and are indexed using state-of-the-art database methods (R-trees). The proposed method has several desirable properties:</p><la><li t="(a) "><p>Database search is approximate, so that all images up to a prespecified degree of similarity (tolerance) are retrieved.</p></li><li t="(b) "><p>It has no "false dismissals" (i.e., all images qualifying query selection criteria are retrieved).</p></li><li t="(c) "><p>It is much faster than sequential scanning for searching in the main memory and on the disk (i.e., by up to an order of magnitude), thus scaling-up well for large databases.</p></li></la>
INDEX TERMS
Image database, image retrieval by content, query by example, image content representation, attributed relational graph, image indexing, R-tree, similarity searching.
CITATION
Euripides G.M. Petrakis, Christos Faloutsos, "Similarity Searching in Medical Image Databases", IEEE Transactions on Knowledge & Data Engineering, vol. 9, no. , pp. 435-447, May-June 1997, doi:10.1109/69.599932
122 ms
(Ver 3.3 (11022016)) | ESSENTIALAI-STEM |
Carl Thomas
Carl Thomas may refer to:
* Carl Thomas (baseball) (1932–2013), American Major League Baseball pitcher
* Carl Thomas (basketball) (born 1969), American basketball player
* Carl Thomas (singer) (born 1972), American R&B singer
* Tre Thomas (Carl Grady Thomas III, born 1975), American football player
* Carl Thomas, member of dance music group K-Klass
* Carl Thomas, fictional character in On Beauty | WIKI |
Wikipedia:Articles for deletion/Nature Camp
The result was redirect to George Washington and Jefferson National Forests. Content can be merged at editorial discretion. Regards, A rbitrarily 0 ( talk ) 21:31, 17 March 2010 (UTC)
Nature Camp
* – ( View AfD View log • )
Zero sources, fails WP:V. No bias against retention if RSs can be found before close, or against recreation if sources become available later --AbsolutDan (talk) 13:03, 2 March 2010 (UTC) Please add new comments below this notice. Thanks, C T J F 8 3 chat 09:49, 9 March 2010 (UTC)
* Keep Plenty of sources see and appears largely verifiable. Not to say that it shouldn't be gutted a bit for WP:NPOV and possible WP:V issues in places (maybe even stubified) and then rebuilt. Polargeo (talk) 15:06, 2 March 2010 (UTC)
* Note: This debate has been included in the list of Virginia-related deletion discussions. -- • Gene93k (talk) 16:32, 2 March 2010 (UTC)
* Note: This debate has been included in the list of Organizations-related deletion discussions. -- • Gene93k (talk) 16:32, 2 March 2010 (UTC)
* Relisted to generate a more thorough discussion so consensus may be reached.
* Delete - sources are local. No national coverage. Does not meet criteria in WP:ORG. SilkTork *YES! 17:15, 10 March 2010 (UTC)
* Can be reduced to a few sentences and merged to George Washington and Jefferson National Forests per WP:Local. SilkTork *YES! 09:03, 11 March 2010 (UTC)
* Merge sounds good to me too. --AbsolutDan (talk) 12:54, 11 March 2010 (UTC)
* Merge as per SilkTork. The main problem I have with this entry is that the name is non-unique. Polargeo found media hits by searching for "Nature Camp" "George Washington". But if you omit "George Washington" from the search, you find lots of hits for other, equally well-sourced entities called "Nature Camp" in Florida, Connecticut, Tennessee, and probably other places; I didn't look any further. --MelanieN (talk) 19:20, 13 March 2010 (UTC)
* Delete unless verifiable information from significant sources are found. I did not see even a hint of notability in the text, and thee are no WP:RS backing the article. Google cont does not equate to notability. Dloh cierekim 07:28, 14 March 2010 (UTC)
* Question has anyone done a side-by-side comparison between the article and the subject's webpage? The lead and a later paragraph are derived from the webpage. It's late at night or early morning, so maybe I'm not seeing clearly, but I would like to suggest CSDG11 w/ a dash of G12. Dloh cierekim 07:37, 14 March 2010 (UTC)
* Another one para 3 line 1. Dloh cierekim 07:40, 14 March 2010 (UTC)
* Google search for "Nature Camp" " the Virginia Federation" I have not been through all these, so I don't know. If anyone would care to winnow. This is an example of what I found. Only blurbs, asides, and promo's. Nothing significant. Subject does not meet the WP:GNG. Dloh cierekim 08:14, 14 March 2010 (UTC)
* PS and then off to bed With all due respect to Polargeo, I'm afraid those news links all point to trivial blurbs and mentions that are not enough, really, to satisfy the "significant coverage" requirement of the GNG. A local paragraph or three, here and there, (at most) and mostly about a fortunate child winning a scholarship to go there, and not supporting the content of the article. G'night, Dloh cierekim 08:23, 14 March 2010 (UTC)
* PPS- I don't think there's enough notability to warrant a merge. Dloh cierekim 16:15, 14 March 2010 (UTC)
* Keep per polargeo. It's labeled as a stub and there is enough material around to meet WP:V and WP:NPOV with a little work. If the page isn't improved in a few months, delete it then. —Preceding unsigned comment added by Last1in (talk • contribs) 14:02, 16 March 2010 (UTC)
* Delete I don't think the available material shows that this particular camp is in any way distinctive. DGG ( talk ) 03:18, 17 March 2010 (UTC)
* Redirect to George Washington and Jefferson National Forests for now. There are significant sources as linked by User:Polargeo. Perhaps in the future, it can be written with the available sources in an npov manner.-- Pink Bull 18:08, 17 March 2010 (UTC)
| WIKI |
Hikma
Hikma (حكمة), or other romanisations such as Hikmah and Hekme, may refer to:
Education
* Al-Hikmah University, a private university in Ilorin, Nigeria
* Al-Hikma University (Baghdad), a former university in Baghdad, Iraq
* Dar Al-Hekma University, a women's tertiary institute in Jeddah, Saudi Arabia
* Collège de la Sagesse, also known as Al Hekmeh, private school in Beirut, Lebanon
* Sagesse High School, also known as Hekmeh High School, a private school in Beirut, Lebanon
* Université La Sagesse, also known as Al Hekmeh University, academic institute in Furn-El-Chebak, Lebanon
* House of Wisdom (Bayt al-Ḥikmah), a former library and translation institute in Baghdad, Iraq
Sports
* Sagesse SC, also known as Hekmeh, a Lebanese multi-sports club
* Sagesse SC (basketball), a Lebanese basketball club
* Sagesse SC (football), a Lebanese football club
Other
* Hikmah, the concept of wisdom in Islamic philosophy
* Hikma Pharmaceuticals, a British multinational pharmaceutical company
* Al Hekma Tower, a skyscraper in Dubai, United Arab Emirates | WIKI |
Evaluation of a Geothermal System for Cooling Stormwater Pond Outflows – Brampton, Ontario
The replacement of natural cover with impervious surfaces during urban development results in significantly higher runoff volumes and rates, which can lead to flooding, stream erosion, aquatic habitat degradation and downstream infrastructure damage. Stormwater ponds are used to help mitigate these impacts by temporarily storing water during storm events, and releasing it slowly to streams at peak flow rates equal to or less than occurred prior to development. Unfortunately, the exposure of stored pond water to solar radiation causes significant warming. Higher outflow temperatures (often greater than 30°C) are detrimental to aquatic life because many species are sensitive to even small changes in temperature. Currently the Ministry of Natural Resources and Forestry suggests a maximum temperature of 24°C for the protection of endangered redside dace, but even cooler temperatures are preferred for brook trout and other headwater species.
To help provide cost effective solutions for addressing provincial thermal mitigation requirements, this project investigates the efficacy and feasibility of applying geothermal technology to cool stormwater discharged from a pond in the City of Brampton. Geothermal is often deployed in conjunction with a heat pump as an efficient means to heat and cool buildings. However, in this project, the system ‘load’ is warm stormwater runoff rather than the heating or cooling load of a building. The system consists of a deep geothermal borehole (approximately 180 m) connected in a closed loop with a pond heat exchanger. The pond heat exchanger is made from coils of polyethylene pipe and is installed inside a concrete vault downstream of the pond outlet. A heat transfer fluid flows through the closed loop and is able to transfer heat energy from the pond heat exchanger and reject it to the deep ground. When warm pond outflows move through the vault on their way to the stream, they pass over the coils of the pond heat exchanger, which extracts heat energy from the water, sending it to the closed loop and into the ground.
A small-scale pilot system is being installed and monitored at a stormwater pond in Brampton beginning in 2019. It will be evaluated to determine its cost effectiveness and capacity to cool stormwater. Results will be used to provide sizing and design recommendations for full-scale system implementation on other ponds. Long term operation and maintenance requirements will also be documented.
| ESSENTIALAI-STEM |
Wikipedia:Files for discussion/2016 October 24
File:Padayappa Swing Scene.jpg
The result of the discussion was: no consensus. — ξ xplicit 01:04, 12 December 2016 (UTC)
* File:Padayappa Swing Scene.jpg ([ delete] | talk | [ history] | links | [ logs])  – uploaded by Ssven2 ( [ notify] | contribs | uploads | upload log).
Fails WP:NFCC, no contextual significance given. §§Dharmadhyaksha§§ {Talk / Edits} 10:38, 13 October 2016 (UTC)
* Excuse me! I think the swing scene is one of the film's most iconic scenes, and it has been supported by this source. Kailash29792 (talk) 10:46, 13 October 2016 (UTC)
* Did you read NFCC#8? §§Dharmadhyaksha§§ {Talk / Edits} 03:55, 14 October 2016 (UTC)
* Yes. The still represents makes a significant contribution to the article by illustrating the appearance of the titular character in that film and in that particular scene. Its akin to the "Here's Johnny" scene in The Shining, for instance. — Ssven2 Speak 2 me 00:55, 15 October 2016 (UTC)
* Please quote us NFCC#8 and give your justification thereupon. I don't care about Jhonny and his Pappa. §§Dharmadhyaksha§§ {Talk / Edits} 12:42, 15 October 2016 (UTC)
* I still think the scene is as iconic as the drum dance in Chandralekha (1948), and the supporting source reads, "The swing scene in Padaiyappa is thought to be legendary today", and there is even an explanation as to what inspired the scene: "The scene [...] was inspired by an incident in Ramayana that has Hanuman fashioning a seat for himself using his tail after being insulted at Ravana’s palace." Kailash29792 (talk) 06:35, 20 October 2016 (UTC)
* Re-read my earlier replies. §§Dharmadhyaksha§§ {Talk / Edits} 09:36, 26 October 2016 (UTC)
Relisted to generate a more thorough discussion and clearer consensus.
Please add new comments below this notice. Thanks, — ξ xplicit 01:17, 24 October 2016 (UTC) Keep It seems like the swing scene is one of the main aspects that the movie is identified with. If you google "swing scene in Padayappa", pages discussing the scene in the movie go up to at least page 4 of the results. Because it seems that movie is indeed identified with the scene, the image does seem to meet the NFCC 8 requirement. Viewing the image will increase the readers understanding of the movie and how it is perceived. Rybkovich (talk) 02:09, 25 October 2016 (UTC)
* I specifically object to that part per NFCC8; the omission of this image would not be detrimental to the understanding of context. What are we seeing in here that people can't image? §§Dharmadhyaksha§§ {Talk / Edits} 05:48, 26 October 2016 (UTC)
* We are seeing a still from an image without which the film would not have been as iconic as it is today. Kailash29792 (talk) 03:10, 15 November 2016 (UTC)
* Sorry! Typo there. What are we seeing in here that people can't imagine? §§Dharmadhyaksha</i>§§ {Talk / Edits} 04:54, 15 November 2016 (UTC)
File:ABS-CBN Sports and Action 2016 logo.png
The result of the discussion was: convert to PD-ineligible-USonly. This does not meet the threshold of originality in the United States, but there is insufficient information in regards to how it stands in the Philippines. — ξ <sup style="color:#000000;">xplicit 01:04, 12 December 2016 (UTC)
* File:ABS-CBN Sports and Action 2016 logo.png ([ delete] | talk | [ history] | links | [ logs])  – uploaded by Eric abiog ( [ notify] | contribs | uploads | upload log).
Non-free TV station logo being used in ABS-CBN Sports and Action and DWRC-TV. File has a non-free use rationale for the article about the network, but does not have a rationale for the article about the affiliate. File's non-free us in the primary article seems fine as it show the branding of the network itself; non-free use in the affiliate article, however, does not seem appropriate per number 17 of WP:NFC since affiliate stations are generally considered "child entities" of the network. A logo specific to this particular station, however, would most likely be acceptable. Suggest keep in "ABS-CBN Sports and Action" and remove from "DWRC-TV", unless it possible to convert this to public domain or some other free license. -- Marchjuly (talk) 04:32, 24 October 2016 (UTC)
* Image seems to be simple enough to change the licensing to PD-logo. If not support nom on the keep and remove statement. Salavat (talk) 08:55, 28 October 2016 (UTC)
Commonplace (album) cover art
The result of the discussion was: delete second listed file only. — ξ <sup style="color:#000000;">xplicit 01:04, 12 December 2016 (UTC)
* File:ELT Commonplace.jpg ([ delete] | talk | [ history] | links | [ logs])  – uploaded by ReyBrujo ( [ notify] | contribs | uploads | upload log).
* File:ELT CommonplaceDVD.jpg ([ delete] | talk | [ history] | links | [ logs])  – uploaded by ReyBrujo ( [ notify] | contribs | uploads | upload log).
Both files are being used in Commonplace (album). There is a non-free use rationale provided for each files use in the article, but they are quite similar in design, etc. so it's not clear why both are needed per WP:NFCC. There doesn't seem to be any reason why the differences between CD cover art and the CD/DVD covert cannot be explained as needed using text. Suggest keep for "File:ELT Commonplace.jpg" since this appears to be the primary cover for the album, and remove for "File:ELT CommonplaceDVD.jpg" since this is not really needed per WP:NFCC and there is no real discussion of this particular version so it's use appears decorative. -- Marchjuly (talk) 06:19, 24 October 2016 (UTC)
* Support nom, keep for "File:ELT Commonplace.jpg" and remove for "File:ELT CommonplaceDVD.jpg". Salavat (talk) 08:53, 28 October 2016 (UTC)
* Delete second DVD file per nom. §§<i style="color:#E0115F;">Dharmadhyaksha</i>§§ {Talk / Edits} 07:30, 18 November 2016 (UTC)
File:Moebiusstrip.svg
The result of the discussion was: Delete; deleted by AnomieBOT ⚡ 02:01, 12 December 2016 (UTC)
* File:Moebiusstrip.svg ([ delete] | talk | [ history] | links | [ logs])  – uploaded by Jakob.scholbach ( [ notify] | contribs | uploads | upload log).
Unused, no encyclopedic use F ASTILY 07:44, 24 October 2016 (UTC)
File:ITS WET...! OIL PAINTING BY RAJASEKHARAN.jpg
The result of the discussion was: keep. Uploader has verified their identity to OTRS<PHONE_NUMBER>000483). (non-admin closure) Anup [Talk] 10:02, 26 October 2016 (UTC)
* <span class="plainlinks nourlexpansion lx" id="File:ITS WET...! OIL PAINTING BY RAJASEKHARAN.jpg">File:ITS WET...! OIL PAINTING BY RAJASEKHARAN.jpg ([ delete] | talk | [ history] | links | [ logs])  – uploaded by Rajasekharan Parameswaran ( [ notify] | contribs | uploads | upload log).
Uploader claims to be author of the work; but we do not know for sure if it is the same person. They need to verify their identity or at least send a permission-letter. Anup [Talk] 10:04, 24 October 2016 (UTC)
| WIKI |
Buchmann Galerie
The Buchmann Galerie is an international contemporary art gallery with locations in Berlin, Germany and in Lugano in the Swiss canton of Ticino.
History
Founded in 1975 in St. Gallen, Switzerland, the gallery has been located in the city center of Lugano since 2013. In Germany, the gallery opened in 1995. Since 2005, it has run two adjacent exhibition spaces in Berlin to host two parallel shows or one comprehensive exhibition.
The Berlin gallery regularly hosts solo exhibitions of its artists, often with remarkable large-format paintings or sculptures, in addition to thematic exhibitions such as the group show Keramik in 2023.
The Buchmann Galerie initiated and developed Tony Cragg’s drawing archive and represents it for the artist. In this capacity, the gallery was involved in the artist’s exhibition at the Nordic Watercolour Museum in 2007.
Since 2008 André Buchmann has been a member of the board of the Cragg Foundation Wuppertal.
Artists
The gallery represents international mid-career and established artists with a focus on sculpture and painting.
* Anna & Bernhard Blume
* Daniel Buren
* Pedro Cabrita Reis
* Lawrence Carroll
* Tony Cragg
* Martin Disler
* Alberto Garutti
* Wolfgang Laib
* Jason Martin
* Tatsuo Miyajima
* Wilhelm Mundt
* Bettina Pousttchi
* Fiona Rae
* Joel Sternfeld
* William Tucker
* Clare Woods | WIKI |
Bumper Bar Buying Guide
Bumper Bar Buying Guide
Bumper bars were first developed to protect cars and trucks from scratches and dents caused by large rocks. The bars are a series of metal or plastic tubes that are moulded and welded together to cover the more vulnerable spots on the front or back of a vehicle. Bumper bars can also provide enough protection during a collision that a car or truck is still drivable. Research is the best way to determine whether a bumper bar is appropriate and which type is the best option. Look at the types, material, and additional features of these accessories in order to buy the right one. A bumper bar can be bought from car manufacturers, auto stores, and listing sites like eBay.
Types of Bumper Bars
Bumper bars are designed to provide protection for the front or back bumper of larger cars, 4x4s, SUVs, and trucks. The bars were designed initially to protect from heavy shrubs and rocks encountered while driving through rough terrain. They can also stand up to the impact of a large animal and help protect the front of the vehicle from damage. Some bumper bars are designed to deflect rocks and debris that may fly up from the road to keep the paintwork from being dented or scratched.
Bumper bars can consist of just one small bar stretched across the bumper or a more complex series of tubes that cover the entire grill and headlight system. Bumper bars are designed to attach to a car or truck using factory preset holes in the vehicle's bumper. This means that it is important to search for bumper bars by the vehicle's make, model, and year in order to get the right fit. There are several types of bumper bars. The best type depends on where most of the driving is done, what the vehicle is typically used for, and personal taste.
Bull Bars
Bull bars are designed to protect the front of a car or truck from curbs and rocks. They protect the bumper and the lower half of the grill. Bull bars are less visually dominating on the front of a car or truck. They consist of one inverted U-shaped tube with a crossbar along the bumper, and are usually made of steel. Bull bars may come with skid plates.
Skid Plates
A skid plate is a tough sheet of steel welded to the bottom of a bull bar that helps provide further protection for the front bumper from pebbles and debris that may fly up from the road, and larger rocks. Skid plates can be removable or permanently fixed to the car or truck, depending on the brand.
Centre Grill Guard
The centre grill guard provides rugged protection only for the front centre of the car or truck. It is a roughly square shape of tubes with crossbars designed to protect the entire grill and the front of the bumper. They are intended to protect against a front impact with an animal, such as a kangaroo. Some centre grill guards come with extra lights.
Full Grill Guard
The full grill guard is the most impressive of the bumper bars available for the front of a car or truck. It provides complete front end protection of the bumper, grill, headlights, and even the sides of the vehicle; it guards against front and side impacts. It consists of two centre uprights of tubes to protect the grill, with two cross bars that extend across the entire front end and wrap around the sides of the headlights. Full grill guards provide the most protection for the front of a car or truck and are popular for off-road driving or travelling around a ranch.
Rear Bumper Guard
The rear bumper guard is a steel tube that wraps across the entire back bumper. It is great for protection in urban environments where a car or truck may be in a rear-end collision or accidentally hit another vehicle while parallel parking.
Materials for Bumper Bars
Bumper bars are available in a number of materials, such as aluminium, steel, polycarbonate, and polyethylene. Each of the materials offers different levels of protection, depending on the circumstances of the car or truck. For example, steel bumper bars are more rigid and do much more to protect a vehicle from impact with a large wild animal. Polycarbonate and polyethylene are more flexible and safer for pedestrians in case of an accident when driving in urban areas.
Material
Description
Example
Steel
Iron alloy
Corrosion resistant
Easy to clean
Low maintenance
Durable
Hard
Recyclable
Westin
Aluminium
Metal
Corrosion resistant
Lightweight
Malleable
Soft
Recyclable
Aries
Polycarbonate
Plastic
Lightweight
Strong
Impact resistant
Heat resistant
Recyclable
BMW Bumper Bar
Polyethylene
Plastic
Lightweight
Cheap
Stiff
Strong
Resists oils, gas, and acids
Recyclable
Smart Bar
The most commonly used materials for bumper bars are steel and aluminium. Synthetic materials are used increasingly for both bumper bars and grill guards for original manufacturer parts for trucks and 4x4s. Polyethylene and polycarbonate bumper bars are designed to act like a spring helping to deflect large animals and people off the vehicle and causing them less damage.
Accessories for Bumper Bars
Bumper bars can support additional accessories to make them even more useful for a driver. These accessories include extra lights, a radio antenna, and winch plates. Additional lights are useful for driving at night or searching for lost farm animals in heavy shrubbery. Radio antennas are typically mounted on the bumper bars affixed to various vehicles where the driver needs to communicate with others, such as park rangers or owners of large amounts of land. Winch plates are sturdy plates welded onto a bumper bar that can serve as a mounting spot for a winch on a truck.
How to Buy Bumper Bars on eBay
You can find bumper bars on eBay listed by a number of dealers and individual sellers. These products can be found in any condition from new to used. To search for bumper bars, use the eBay search engine, which is available from any page on the website. Simply type in keywords that describe the type of bumper bar that you are looking for, or search for brand names or materials. For example, type in "ARB bull bar" to find a product for a particular brand. You may also try searching for exterior car parts in the eBay Deals section. This section is filled with items handpicked by eBay that have excellent features, such as low prices or free delivery. Read the item description carefully to ensure that the bumper bar fits the make, model, and year of your vehicle.
Conclusion
Bumper bars are popular accessories that protect the front and back of a car or truck from minor damage cause by dirt and debris, scratches from shrubs, and even the impact of a wild animal, such as a kangaroo. Bumper bars attach to a car or truck using the preset factory holes in the vehicle bumper. There are several types of bumper bars to choose from. The full grill guard provides complete protection for the front end, grill, headlights, and sides of a vehicle. A bull bar is a less prominent accessory that only covers the front bumper and part of the grill. Bumper bars are made from a variety of materials ranging from steel to polyethylene. Bumper bars can also serve as a mounting platform for accessories like lights and winches. Bumper bars can be purchased from a range of eBay sellers.
Bumper Bar|Bull Bar|Skid Plate|Centre Grill Guard|Full Grill Guard
Have something to share, create your own Guide... Write a Guide
Explore more Guides
Choose a template | ESSENTIALAI-STEM |
Personality/Lectures/Dispositional perspectives
About this page
* This page contains lecturer's notes for a 2nd-year undergraduate tertiary-level unit on "Personality and Individual Differences" at the University of Canberra, 2008. These notes were contributed to (offline) by two key authors - James Neill and Michele Fleming and then converted to wikitext from .doc using OpenOffice.org/Writer, so they still need some tidying up.
* Feel free to help out and to improve the material, although it may be better to copy the material and then link to and build specific pages.
* The purpose of this lecture is to introduce and discuss dispositional perspectives of personality, particularly personality types and personality traits, to consider the personality vs. situation debate and the notion of interactionism.
Overview
Sometimes you see the terms “traits” and “dispositions’ used interchangeably. However, the trait perspective is really only a part of the dispositional perspective (albeit the largest part).
Dispositions refer to underlying, relatively stable, characteristic psychological that people carry around with them, that are somehow part of them” (Carver & Scheier, 2000, p.54). Or “a person’s inherent qualities of mind and character”.
The “trait” approach most clearly emphasizes what is known more broadly as the dispositional perspective but another way to approach the concept of dispositions is to consider people as “types” or alternatively to view people’s dispositions in terms of their enduring motivational characteristics that vary in strength from person to person (i.e. their needs and motives). So today we’ll have a look at types as well as traits and we’ll look at peoples needs and motives as though they were specific traits.
Some of the things we’ll consider today are:
* Types
* Traits
* many
* single
* essential
* Situation versus Personality Debate
* Interactionism
* Strengths and Limitations
Dispositional perspectives
The dispositional perspective is the most basic, traditional approach to personality. It creates systems for classification and description of characteristics on which:
* people differ
* and which individuals consistently display:
* between situations
* over time
Two major themes and assumptions
STABILITY of personality i.e. people display consistency in their actions, thoughts, and feelings BETWEEN situations and OVER time. In other words, unpredictability is the exception rather than the rule (i.e. unpredictability doesn’t define the essence of personality).
Note that some psychologists, such as social psychologists, would argue that too much emphasis is placed on the stability of personality. The idea behind this assumption is that YOU ARE THE SAME PERSON YOU USED TO BE AND WILL BE IN THE FUTURE.
2. DIFFERENCES between people. The composition of dispositions varies from person to person. Each person’s personality consists of a pattern of dispositional qualities which form a unique combination in each person.
Types versus Traits
(put in table)
* Traits are now more in favour than types.
* categoryCharacterNumber
* Type discontinuous, discrete,Few qualitative
* Traitcontinuous, degree,Many
* quantitative
Types
Type theory aims to classify people into distinct CATEGORIES. i.e. this type or that. Types are regarded as categories that are distinct and discontinuous. e.g. you are one or the other. Male/Female are discontinuous categories.
Ancient Greek Humours
Ancient Greeks (e.g. Hippocrates 400 BC, Galen, 140/150 AD): 4 types of people:
Excess of one of 4 bodily fluids determined personality (put into table)
* Humor/PersonalityFluidCharacterBig 5
* Cholericyellow bileIrritableAgreeable
* Melancholicblack bileDepressed Neurotic
* SanguinebloodOptimisticOpenness
* PhlegmaticphlegmCalm Neurotic
* So, no conscientiousness or extraversion.
Sheldon's Somatotypes
(convert to table)
* William Sheldon (1940, 1942, cited in Phares, 1991) classified according to body type. He called this a person’s somatotype. An individual is given a rating from 1 to 7 on each of three body types:
* Body TypeCharacterShape
* Ectomorphcerebrotonic (quiet, fragile
* restrained, nonassertive,lean
* somewhat withdrawn delicatesensitivepoor muscles
* Mesomorphsomatotonic (active, muscular
* assertive, vigorous,
* combative
* Endomorphviscerotonic (relaxed, plump
* sociable, comfort-lovingbuxom
* tolerant, peaceful
Sheldon measured the proportions of hundreds of juvenile delinquent boys and concluded that they were generally mesomorphs (Ornstein, 1993).
Body types have been criticized for very weak empirical methodology and are not generally used in psychology. Type theory in general has been criticized as over-simplistic because it overlooks the multi-dimensional nature of personality.
Types: An update
Having said that however, there is still a lot of interest in Jungian types, as witnessed by the popularity of the MBTI. Some would say that Individual Differences may be qualitative not quantitative. That is that there may be a difference in the qualities that people possess rather than, as trait theory would have us believe, we all possess certain traits it’s just a case of how much or how little we possess (the quantity).
Block (1971) identified 5 personality types among male participants in a study. Now these types were found only to exist in mostly white, intelligent and relatively affluent males. A number of subsequent studies conducted in the 1990s, however seems to bear out three of Block’s 5 identified types.
* Well-adjusted or Resilient person: adaptable, flexible, resourceful, interpersonally successful
* Overcontrolling: this is a maladjusted type; uptight, and difficult to deal with ===
* Undercontrolled: another maladjusted type; impulsive, psooible risky, delinquent or even criminal behaviour; unsafe sex etc.
The Trait Approach
Allport and Odbert (1936) “''Those individual differences that are most salient and socially relevant in people’s lives will eventually become encoded into their language; the more important such a difference, the more likely is it to become expressed as a single word”. ''
This has become known as the lexical approach or hypothesis (lexical = having to do with words or a vocabulary).
What Allport and Odbert did, though, was to go through two of the most comprehensive dictionaries of the English language available at the time, and extracted 17,953 words to describe the way people are psychologically different from each other: personality-describing adjectives that they found describing observable and relatively permanent traits.
e.g. shy, trustworthy, laconic, phlegmatic, kind, conscientious, anxious, etc. all these words describe personality traits Trait approach tries to formalise this and use traits to explain and predict behaviour
Definitions
In general, trait theory assumes that people differ on variables or dimensions that are CONTINUOUS. People are seen to differ in the AMOUNTS or QUANTITIES of a characteristic rather than differ in the QUALITY of their characteristics.
* Traits are distinguishing qualities or characteristics of a person
* Traits are a readiness to think or act in a similar fashion in response to a variety of different stimuli or situations
Traits: Nomothetic vs Idiographic
However the whole issue of whether a trait exists in all people to a greater or lesser degree is complicated by different views of the trait perspective.
There are two different views as to whether all traits exist in all people. These two views, called the Idiographic and the Nomothetic approach, were named as such by Gordon Allport, often known as the father of personality theory.
* The Idiographic view emphasizes that each person has a unique psychological structure and that some traits are possessed by only one person; and that there are times when it is impossible to compare one person with others. This viewpoint also emphasizes that traits may differ in importance from person to person (cardinal, central and secondary traits). It tends to use case studies, bibliographical information, diaries etc for information gathering.
* The Nomothetic view, on the other hand, emphasizes comparability among individuals but sees people as unique in their combination of traits. This viewpoint sees traits as having the same psychological meaning in everyone. The belief is that people differ only in the amount of each trait. It is this which constitutes their uniqueness. This approach tends to use self-report personality questions, factor analysis etc. People differ in their positions along a continuum in the same set of traits. Most contemporary psychologists tend towards a nomothetic approach (and the trait approach is often viewed solely as a nomothetic approach these days), but they are aware of how a trait may be slightly different from person to person in the way that it is expressed.
Basic questions
Need to look for the meaning that underlies the trait, rather than simply at the name.
* What traits are basic/essential to personality?
* How many are there?
* How do we find out?
* Note that labeling of traits is subjective: hence different theorists label similar or same traits using different words.
Allport (1897-1967)
Gordon Allport, as I mentioned is often called the father of personality theory: He was very much a trait theorist and believed in the individuality and uniqueness of the person and that people have consistent personalities. As long ago as 1921, he and his brother Floyd, published a book called Personality Traits: Their Classification and Measurement.
Allport attempted to blend nomothetic and idiographic perspectives: he called this blend the morphogenic approach.
Allport believed that each person had traits of various types:
* 1) Individual: traits possessed by one person
* 2) Common: traits possessed by many people
* 3) Cardinal traits: One trait that dominates the person
* 4) Central traits: small number of traits important traits that may affect many behaviours
* 5) Secondary traits: many consistent traits which are not often exhibited
* 6) Motivational traits: Very strongly felt traits
* 7) Stylistic traits: Less strongly felt traits.
Allport believed that through autobiographies, letters and diaries an understanding of an individual’s personality could be gained. He studied 301 letters written by a woman he called Jenny Gove Masterson over a period of 11 years and was able to describe Jenny in terms of 8 traits. He published this a work in 1965 called Letters from Jenny.
The Many Trait Approach
* Some theorists look at many traits at once when investigating personality. They try to determine which traits are correlated with certain behaviours, thereby gaining understanding of the underpinnings of various behaviours as well as the more general workings of personality. An example of this approach is to look at correlates of different behaviours, such as the ability to delay gratification, political orientation and drug taking as some examples.
* Example: An interesting study was one in which young children who were rated as being emotionally unstable, disobedient, domineering, aggressive, teasing, fidgety, restless, and susceptible to stress were found nearly a decade later at age 14 years to be using illegal drugs. The implication of using this many trait approach is you can get to have an understanding of what sort of personality underpins a certain type of behaviour (in this case drug-taking). The practical implications of this are that instead of anti-drug campaigns targeted at 14 year olds we should have campaigns at helping problem behaviours and susceptibility to stress at an earlier age.
The Single Trait Approach
* Much research focuses on a single trait: its origin, nature, and consequences. An example of three single traits that have received wide attention and have been the subject of investigation in hundreds of studies. These are:
* conscientiousness
* self-monitoring
* authoritarianism
Single Trait: Authoritarianism
The personality trait of authoritarianism has been extensively studied for the last 50 years. Much initial research was done as a reaction to the outrages which occurred in Nazi Germany during WWII. Authoritarianism began to be studied in order to try to understand its nature and its origin. Authoritarianism is felt to lie at the heart of racial prejudice. The Authoritarian personality may be described a person who is unthinking and inflexible, is submissive to authority, is aggressive, (in other words they are often worshipful up and contemptuous down) superstitious, fascinated by power, cynical and hostile, and may be sexually repressed.
The origins of authoritarianism have also been studied but the research is extremely difficult to conduct. It is difficult to determine the early childhood experiences of adult authoritarians in any detail and then it is hard to extricate what might be learned attitudes, or down to oppressive parental child-rearing styles or even to some gene being implicated.
The Essential Trait Approach
* Many psychologists have tried to reduce the many traits to a few essential ones:
* Murray (1938): 27 “needs”
* Cattell (1949) (16 traits)
* Eysenck (e.g. 1967; Eysenck & Eysenck, 1968): 3 traits
* Costa & McCrae (e.g. 1985, 1988; McCrae & Costa, 1986, 1987): 5 traits
Needs: Murray (1893 - 1988)
Exam tomorrow vs Excellent Party tonight Achievement Need vs Affiliation, or Play Need
* Henry Murray was active in developing a theory of motivation throughout the 1930s, 40s, 50s and 60s. Murray was in fact the author of the TAT (which you looked at in tutes last week). He believed that a need is a “potentiality or readiness to respond in a certain way under certain given circumstances… It is a noun which stands for the fact that a certain trend is apt to recur” (Murray, et al. 138, p. 124).
* A major assumption of Murray’s theory was that behaviour is driven by an internal state of disequilibrium. In other words we have a LACK of something and this drives us. We are dissatisfied and we desire something. Murray classified needs as being either
* Primary needs (or viscerogenic needs, which are biologically based):
* food, water, air, sex, avoidance of pain
* Secondary needs (or psychogenic needs, which either derive from our biological needs or are inherent in our psychological nature):
* Murray came up with 27, psychogenic needs which he saw as largely unconscious needs: e.g.
* achievement, recognition, acquisition
* dominance, aggression, autonomy
* affiliation, rejection, harmavoidance
* nurturance, play, cognizance (asking questions of others)
* The strength of a need depends on how it compares with your other needs rather than how other people rate on that need:
* Murray believed that whether a need is activated or not can very much depend on the situation (what he called the press). If passing the exam is going to mean passing or failing the whole course and then getting kicked out of home then your Harmavoidance Need and your Achievement needs might come into play and overwhelm your Affiliation or Play needs so you stay at home and study!
* Murray believed that stronger needs are expressed more often over time and lead to more intense behaviour.
Basic needs
* Since the 1960s and 1970s the main Needs studies have focused on Achievement, Power, Affiliation and Intimacy.
Need for Achievement (Achievement Motivation) Studied extensively by David McLelland in the 70s.
* single most researched need
* desire to do things well, overcome obstacles, to do thing better
high AM choosing more difficult task than low AM (because they want to find out about their abilities)
Need for Power: studied intensely by David Winter in the 70s
* desire to have dominance, impact on others, prestige, position, and influence over others
* concerned about controlling the image of themselves that is portrayed to others
Need for Affiliation: studied by McAdam in the 80s
* desire to spend time with other people
* there are thought to be a number of subcomponents: e.g. need for social comparison, need for emotional support, need for positive stimulation, and need for attention from others
* Need for Intimacy
* desire to experience warm, close, and communicative exchanges with another person ---> desire to merge self with another
* need for more one to one interactions
* higher levels of self-disclosure, more listening
* correlates .58 with need for affiliation (medium to high correlation)
* Murray’s Needs’ theory is sometime studied as part of the trait perspective as “needs” are seen as akin to traits. But often you’ll see Needs’ theory studied within the psychoanalytic perspective as it is seen as a DRIVE theory of personality.
Traits: Cattell (1905 - present)
Language is a useful source of information about personality. A quality described by many words is likely to be a more important part of personality. Cattell used this lexical criterion in determining his original list of trait names. He narrowed Allport and Odbert’s (1936) listing of 17,000+ words down to 171 trait names. Cattell collected self-ratings on these words and then conducted factor analysis. He used both observer and behavioural data. The result was his 16 personality factors (16 PF):
Details of 16PF
* 1) WARMTH: reserved v warm
* 2) REASONING: concrete reasoning v abstract reasoning
* 3) EMOTIONAL STABILITY: reactive v emotionally stable
* 4) DOMINANCE: deferential v dominant
* 5) LIVELINESS: serious v lively
* 6) RULE CONSCIOUSNESS: expedient v rule-conscious
* 7) SOCIAL BOLDNESS: shy v socially bold
* 8) SENSITIVITY: utilitarian v sensitive
* 9) VIGILANCE: trusting v vigilant
* 10) ABSTRACTNESS: practical v imaginative
* 11) PRIVATENESS: forthright v private
* 12) APPREHENSION: self-assured v apprehensive
* 13) OPENNESS TO CHANGE: traditional v open-to-change
* 14) SELF: group-oriented v self-reliant
* 15) PERFECTIONISM: tolerates disorder v perfectionist
* 16) relaxed v tense
Hans Eysenck (1916 -1997)
Eysenck believed initially that all people could be described in terms of two supertraits, which he believed had a biological basis:
* 1) Introversion-extraversion (continuum of sociability, dominance, liveliness etc).
* 2) Emotionality-stability (neuroticism) (continuum of upset and distress).
Eysenck’s proposals for a biological basis for these dimensions will be examined in the next lecture.
Psychoticism added later: less researched. This was a predisposition towards becoming either psychotic or sociopathic (psychologically unattached to other people). Also, a tendency to be hostile, manipulative, and impulsive.
EPQ
* 2nd-order Factor Analysis of the 16PF shows two factors:
* introversion/extraversion and anxiety. So the underlying factors of Cattell’s scales are very similar to Eysenck’s.
The Big Five
A remarkably strong consensus of what traits are basic has emerged over the last 20 years. Five superordinate factors have emerged and are referred to as the Big Five or the 5-factor model. These five factors are well supported by a wide variety of research.
The early evidence supporting a 5-factor model was first published by Fiske, in 1949. During the 1980s and 90s a vast array of research has combined to support the 5 factors. Not everyone however agrees in the naming of the five supertraits.
The 5-factor model is commonly measured by the NEO by Costa and McCrae (1985, 1988, McCrae & Costa, 186, 1987).
The Big 5 according to the NEO are Neuroticism, Extraversion, Openness to Experience, Agreeableness and Conscientiousness (Remember OCEAN).
Each Supertrait is measured by 6 facets (or subordinate traits).
Table giving details of the Big Five
Table giving details of the Big Five facet scales
Table of labels used by authors to refer to the big 5% traits.
The last row provides a characterization by Peabody & Goldberg, 1989 of the life domain to which the trait pertains.
Although I said there is quite a degree of consensus about the factors some theorists actually feel that they should be labeled one way or another, ALSO just what a factor looks like depends what measures were included in the study!
Factor 3, as I have it listed here, openness to experience, is probably the factor about which there is the LEAST consensus. Some theorists suggest that this factor is measuring a kind of intellect: the imaginative side rather than the logical side.
Some theorists, such as Eysenck suggest that personality can be explained in as little as three factors, others see the need for one or two more factors than 5. Recently, some theorists have posited that personality is more fully explained by a 6-factor model (Ashton, et al., 2004; Ashton & Lee, 2001). The extra 6th factor that emerges is typically one that revolves around honesty, fairness, sincerity, modesty and lack of greed. It has been named Honesty-Humility by Lee and Ashton, 2004. This addition of a 6th factor represents a major departure from the Big 5 model. The Honesty-Humility factor comprises four facets: sincerity, fairness, modesty and greed avoidance. The 6-factor model has been called the HEXACO model by Lee and Ashton (2004).
Traits: Stable?
Costa, McCrae and Arenberg (1980) conducted a longitudinal study of 460 males aged 17-85 over a 6 to 12 year period. They found correlations of .70+ over time for extraversion and high correlations for neuroticism. Studies generally show decline in E and N as people age and indeed increases in A from 60s to 80s & 90s (Field & Millsap, 1991)
Helson and Moane (1987) studied women from 27 to 43 in their longitudinal study; Helson and Wink (1993) then assessed them at age 52 and found women become more dominant, independent, and self-confident over time
Individual differences in stability/consistency
Situation vs Personality Debate
In 1968, Walter Mischel published a book Personality and Assessment (this book is in fact usually interpreted as arguing that Personality doesn’t exist and can’t be assessed!). Mischel argues that was not actually his point. What he in fact argued was that personality is too variable from one situation to the next to allow individual differences to be characterized accurately in terms if broad personality traits, and furthermore that trait measures don’t predict behaviour as well as many psychologists claim. Thus the person-situation debate was born.
EXAMPLE: Girl very anxious sitting in Doctors, keeps looking at time, screwing up her hanky, jumps whenever a name is called.
Now, is she behaving in that fashion because of her PERSONALITY (highly anxious personality) or because of the SITUATION ( because she’s worried about finding out whether she’s pregnant or not!)?
Does the personality of an individual transcend the immediate situation and moment to provide a consistent guide to his or her actions OR is what a person does completely dependent upon the situation he or she is in at the time?
Pro-situation
1960/1970s, evidence suggested low correlation between personality and behaviour (i.e. personality coefficient of approx. .20 to .40. If you use the common squared correlation method there is an upper limit of only 16% i.e. only 16% of variance in behaviour is explained by personality. So what use are traits if they explain so little of behaviour? And are situational variables better predictors of behaviour!? NO. Situational variables are no better at predicting behaviour than personality variables e.g. .36-.42 (similar upper limit) (Funder & Ozer, 1983)
Pro-personality
Low correlations between personality traits and behaviour do not necessarily prove the value of situational variables (the “cause” of the behaviour may be an unmeasured personality variable!). Bear in mind that there is not a high correlation between situational variables and behaviour.
Lack of ability of traits to predict behaviour is based upon trying to predict specific behaviours e.g. how happy you will be in next week’s lecture versus how happy you will be over the entire year! So much research in the past tried to predict single acts at single times.
Rosenthal and Rubin (1982, as cited in Funder, 2001) claim that we should not consider that a correlation of .40 leads to only 16% of the variance being explained, rather they suggest using the Binomial effect size display (BEFD) which would lead to a correlation of .40 meaning 70% accuracy in predicting behaviour!
People choose situations: that is, personality predisposes peoples’ choice of environment (librarian versus salesperson – VPI).
Interactionism: Interactionist Perspective
Traits and Situations interact to influence behaviour
(How else could it be? - like the genetics vs. environment issue, one cannot exist without the other)
Trait and Situationist perspective are too simplistic: it is more complex than that. Different situations affect different people in different ways. Some situations allow expression of personality; other situations provoke a narrower range of behaviour.
Behaviour = personality x interpretation of the situation
Individual differences in personality-situation consistency: e.g. high and low self-monitors. High self-monitors display less consistency in their behaviour and try to adapt more to the situation.
Research has shown that a trait will show up only in a situation where it is relevant (Kenrick & Funder, 1991). So anxiety may only show up in certain situations. Thus the situation may to a certain extent predict the behaviour but the personality of the individual will predict if and how much anxiety will be shown. And of course some situations bring out the similar behaviours in most everyone whereas some situations will lead to real differences in behaviours.
Some situations allow expression of personality, others provoke narrower range of behaviour Some individuals more consistent
Interactionism
Person-situation debate has lead to more dynamic approach to understanding how personality traits and situations interact to produce a person’s behaviour. INCLUDE QUOTE FROM PHARES (1991, p. 244)
* Traits do not have a constant influence on behaviour...sometimes trait differences matter a lot, sometimes only a little
* People display traits by choosing situations, not just by reacting to them
AGAINST
* Doesn’t explain how or why personality works: naming a phenomenon doesn’t explain it
* Poor decisions may be made on the basis of trait scores (e.g. diagnosis of someone as in need of institutionalization – more likely to have happened in the past than now).
* Arbitrary decisions about traits (through factor analysis: what to study and what constitutes a trait)
* Behaviour is not always consistent: this is a challenge for trait theorists who see traits as consistent over time and place
* Possibly limited predictive ability: cannot explain why people may behave differently in different situations (though could be due to the way it has been studied)
* Little explanation for origins of traits: with the exception of Eysenck
FOR
* Useful description and assessment of personality
* Some stability across time and situations has been found – element of predictive power (been with my husband for nearly 25 years – glad my husband’s personality doesn’t keep changing!)
* Although decisions arbitrary, several researchers, using different approaches, coincided in similar views
* Personality traits useful for research purposes
* Allows comparison of individual differences & provides an objective, scientific approach
* Thus, an interactionist perspective is considered important for the future. | WIKI |
Question: On August 10, we celebrate St. Lawrence. He was a deacon who valued the true treasures of the church. Can you tell us more about him?
Answer: There is little known about Lawrence other than he was a deacon in Rome during the reign of Emperor Valerian from 253-259. In 258, Valerian began a persecution of the leaders of the Roman Church. Lawrence was in charge of the purse for the church of Rome. Roman officials in need of money demanded that the riches of the church be handed over to them. Lawrence asked for a few days to gather them.
Lawrence took the money he had charge over and distributed it to the poor of Rome. Then he gathered all the homeless and the poor together. When the Roman officials came again demanding the riches of the church, Lawrence pointed to the destitute and homeless, saying that these are the true riches of the church.
For this he was imprisoned and tortured. Lawrence was put to death by burning on a gridiron. It is said that as he was dying, he told his executioners to turn him over because he was done on one side and needed to be fully cooked for the Lord.
Lawrence continues to be a model for us today. The church needs continual reminders that its riches are the people. The primary purpose and mission of the church is to be continually sensitive to the needs of all God’s people, most especially the least of our brothers and sisters. | FINEWEB-EDU |
Page:Songs from the Southern Seas and Other Poems (1873).djvu/19
Y tale which I have brought is of a time Ere that fair Southern land was stained with crime, Brought thitherward in reeking ships and cast Like blight upon the coast, or like a blast From angry levin on a fair young tree, That stands thenceforth a piteous sight to see. So stands this land to-day beneath the sun,— A weltering plague-spot; while not any one Of all the Christian lands upon the earth, Not e'en the rock that last had ocean birth, Would call her sister,—she, the fairest shore In all the Southern Ocean o'er and o'er. Poor Cinderella! she must weep her woe, Because an elder sister wills it so. | WIKI |
21
What is the correct script to run a certain exe file on a post build event?
3
• An example: msdn.microsoft.com/en-us/library/ke5z92ks.aspx Commented Oct 9, 2011 at 13:11
• 2
Just as you would run this .exe from command-line. So, specify your .exe with full path and enclose it in double-quotes if either path or executable name contain spaces. Commented Oct 9, 2011 at 13:12
• @SergeyKudriavtsev: Thanks! Would you like to write it as answer so I can mark it as the correct answer?
– MichaelS
Commented Oct 9, 2011 at 13:39
3 Answers 3
27
Just as you would run this .exe from command-line. So, specify your .exe with full path and enclose it in double-quotes if either path or executable name contain spaces.
0
12
Provided answer is correct, however providing the full path is not always necessary.
Example: run one of the projects output executable.
• (optionally) Configure post-build event to run Always
• use a path relative to the project path. E.g.: "$(ProjectDir)bin\Debug\maybe_just_refreshed.exe" or better version suggested by m93a: "$(TargetDir)maybe_just_refreshed.exe" (this compansates for the cases when output location is customized (not the default bin\Debug).
7
• 1
Instead of "$(ProjectDir)bin\Debug\maybe_just_refreshed.exe" you could use "$(TargetDir)maybe_just_refreshed.exe".
– csha
Commented Jun 19, 2017 at 9:16
• @m93a - I have incorporated your suggestion in the answer. Besides being shorter, it also works for custom output locations. Thanks. Commented Oct 12, 2017 at 11:27
• @Latency - Check this question. Do you correctly point to an executable file? ECHO commands might help to see in output the actual path that it is trying to execute. Commented Nov 29, 2018 at 20:12
• call "$(TargetPath)" <--- otherwise you get 9009 error.
– Latency
Commented Nov 29, 2018 at 20:28
• @Latency - not sure, but I think$(TargetPath) points to the output executable / assembly folder while $(ProjectDir) points to project's base directory. So, the answer might need adapting based on actual setup (type of project, project build configuration etc.). Commented Nov 29, 2018 at 20:34
3
None of these answers worked for me.
Even though my exe was at the file path I provided, it still exited with a code of "whatever" and never worked.
Then I did this:
cd $(ProjectDir)
"MyProgram.exe"
...both on separate lines in the post build event command line editor.
My app is located in the project directory. They didn't work on the same line, but separate lines worked fine.
Your Answer
By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.
Not the answer you're looking for? Browse other questions tagged or ask your own question. | ESSENTIALAI-STEM |
Top Netflix, streaming shows this week: 'Big Mouth,' '13 Reasons Why'
Every week, Parrot Analytics provides Business Insider with a list of the nine most in-demand original TV shows on streaming services.This week's includes Netflix's "Big Mouth" and DC Universe's "Titans."Visit Business Insider's homepage for more stories.Netflix's "Big Mouth" is back for its third season, much to the delight of fans.Every week, Parrot Analytics provides Business Insider with a list of the nine most in-demand TV shows on streaming services. The data is based on "demand expressions," Parrot Analytics' globally standardized TV demand measurement unit. Audience demand reflects the desire, engagement, and viewership weighted by importance, so a stream or download is a higher expression of demand than a "like" or comment on social media, for instance.Below are this week's nine most popular original shows on Netflix and other streaming services:
9. "Orange Is the New Black" (Netflix)
Average demand expressions: 23,143,208Description: "A privileged New Yorker ends up in a women's prison when a past crime catches up with her in this Emmy-winning series from the creator of 'Weeds'."Rotten Tomatoes critic score (Season 7): 97%What critics said: "It's still impossible to pin 'Orange Is the New Black' down, except to say that it was an amazing vehicle for exploring the complex humanity of these women when it wanted to be—and it definitely wanted to be that show in its final season, and in much of its finale. " — The AV Club (Season 7)The seventh and final season premiered on Netflix July 26.
8. "Lucifer" (Netflix)
Average demand expressions: 24,195,272Description: "Bored with being the Lord of Hell, the devil relocates to Los Angeles, where he opens a nightclub and forms a connection with a homicide detective."Rotten Tomatoes critic score (Season 4): 100%What critics said: "While there's certainly a sense of familiarity, there's also more of a cinematic quality to the show's structure which becomes apparent as each episode flows flawlessly into the next despite a new murder to investigate." — Den of Geek (season 4)Season 4 premiered on Netflix May 8.
7. "Good Omens" (Amazon Prime Video)
Average demand expressions: 24,611,869Description: "Aziraphale and Crowley, of Heaven and Hell respectively, have grown rather fond of the Earth. So it's terrible news that it's about to end. The armies of Good and Evil are amassing. The Four Horsemen are ready to ride. Everything is going according to the Divine Plan … except that someone seems to have misplaced the Antichrist. Can our heroes find him and stop Armageddon before it's too late?"Rotten Tomatoes critic score (Season 1): 83%What critics said: "Among its copious jokes, 'Good Omens' has the wit and good taste to mock 'The Sound of Music' on multiple occasions. For that alone it deserves an Emmy." — New York TimesSeason 1 premiered on Prime Video May 31.
6. "Big Mouth" (Netflix)
Average demand expressions: 26,014,790Description: "Teenage friends find their lives upended by the wonders and horrors of puberty in this edgy comedy from real-life pals Nick Kroll and Andrew Goldberg."Rotten Tomatoes critic score (Season 3): 100%What critics said: "Big Mouth's choice to directly address toxic masculinity is welcome in part because the series draws natural connections between different kinds of intolerance — and their solutions — without equating them with one another." — The Atlantic (Season 3)Season 3 premiered on Netflix October 4.
5. "13 Reasons Why" (Netflix)
Average demand expressions: 29,496,575Description: "Secrets. Lies. Revenge. Everyone at Liberty High has something to hide ... and the truth is about to come out."Rotten Tomatoes critic score (Season 3): 12%What critics said: "By cluttering its plot with preposterous drama even as it strains for uplift, or at least some greater meaning, the series undermines its own intention-and winds up making itself useful to no one in particular." — Vanity Fair (Season 3)Season 3 premiered August 23 on Netflix.
4. "The Boys" (Amazon Prime Video)
Average demand expressions: 30,595,007Description: "'The Boys' is an irreverent take on what happens when superheroes, who are as popular as celebrities, as influential as politicians and as revered as Gods, abuse their superpowers rather than use them for good. It's the powerless against the super powerful as The Boys embark on a heroic quest to expose the truth about 'The Seven,' and their formidable Vought backing."Rotten Tomatoes critic score (Season 1): 83%What critics said: "Taking on the #MeToo movement, power, and our right to stand against said power, The Boys is the perfect kind of show for 2019, and we can't wait to see where it takes us next." — The Mary Sue (Season 1)Season 1 premiered July 26 on Amazon Prime Video.
3. "The Dark Crystal: Age of Resistance" (Netflix)
Average demand expressions: 33,518,920Description: "As power-hungry overlords drain life from the planet Thra, a group of brave Gelfling unite on a quest to save their world and fight off the darkness."Rotten Tomatoes critic score (Season 1): 86%What critics said: "Blending the high and the low, the juvenile and the mature, the real and the digital, the intimate and the extravagant, Age of Resistance realizes its grand aesthetic and narrative ambitions with thrilling, poignant skill." — The Daily Beast (Season 1)Season 1 premiered on Netflix August 30.
2. "Titans" (DC Universe)
Average demand expressions: 52,360,693Description: "'Titans' follows young heroes from across the DC Universe as they come of age and find belonging in a gritty take on the classic Teen Titans franchise. Dick Grayson and Rachel Roth, a special young girl possessed by a strange darkness, get embroiled in a conspiracy that could bring Hell on Earth. Joining them along the way are the hot-headed Starfire and lovable Beast Boy. Together they become a surrogate family and team of heroes."Rotten Tomatoes critic score (Season 2): 80%What critics said: "Season 2 has taken the best things about season 1, and elevated them." — Forbes (Season 2)Season 2 premiered on DC Universe September 6.
1. "Stranger Things" (Netflix)
Average demand expressions: 111,026,906Description: "When a young boy vanishes, a small town uncovers a mystery involving secret experiments."Rotten Tomatoes critic score (Season 3): 90%What critics said: "Change is a scary thing ... In not just reacting to the literal growth of its actors but actively establishing a future that shifts the status quo, Stranger Things is striving to do so anyway." — The Ringer (Season 3)Season 3 premiered July 4 on Netflix. | NEWS-MULTISOURCE |
SYNOPSIS
FvwmClean is spawned by fvwm, so no command line invocation will work.
DESCRIPTION
The FvwmClean module performs actions on windows which have not had the keyboard focus for a specific length of time. This is intended to help alleviate the problem of leaving programs running in unused portions of your desktop.
FvwmClean reads the same .fvwmrc file as fvwm reads when it starts up, and looks for lines similar to "*FvwmNoClutter 3600 Iconify".
COPYRIGHTS
The FvwmClean program, and the concept for interfacing this module to the Window Manager, are all original work by Robert Nation
Copyright 1994, Robert Nation. No guarantees or warranties or anything are provided or implied in any way whatsoever. Use this program at your own risk. Permission to use this program for any purpose is given, as long as the copyright is kept intact.
INITIALIZATION
During initialization, FvwmClean will eventually search a configuration file which describes the time-outs and actions to take. The configuration file is the same file that fvwm used during initialization.
If the FvwmClean executable is linked to another name, ie ln -s FvwmClean OtherClutter, then another module called OtherClutter can be started, with a completely different configuration than FvwmClean, simply by changing the keyword FvwmClean to OtherClutter. This way multiple clutter-reduction programs can be used.
INVOCATION
FvwmClean can be invoked by inserting the line 'Module FvwmClean' in the .fvwmrc file. This can be placed on a line by itself, if FvwmClean is to be spawned during fvwm's initialization, or can be bound to a menu or mouse button or keystroke to invoke it later. Fvwm will search directory specified in the ModulePath configuration option to attempt to locate FvwmClean.
CONFIGURATION OPTIONS
FvwmClean reads the same .fvwmrc file as fvwm reads when it starts up, and looks for lines similar to "*FvwmClean 3600 Iconify". The format of these lines is "*FvwmClean [time] [command]", where command is any fvwm built-in command, and time is the time in seconds between when a window looses focus and when the command is executed. At most 3 actions can be specified.
AUTHOR
Robert Nation | ESSENTIALAI-STEM |
Knowledge Base Article
Article Type: How To
Product: Symphony
Product Version: 6.12
Component: Symphony Client
Device Brands:
Created: 30-Sep-2013 4:59:56 PM
Last Updated:
Generic de-warping functionality is supported in Symphony for Axis M3007 and Eneo 5MP Fisheye
Feature
Generic de-warping functionality is supported in Symphony v6.12.2 for Axis M3007 and Eneo 5MP Fisheye, and for Generic (Axis and Eneo), Vivotek, Oncam, and Immervision cameras
Solution
Task 1: Enable panoramic technology for the Axis or Eneo camera:
1. In the Server Configuration dialog box, click the Video tab.
2. Select the Enable panoramic technology check box.
3. From the drop-down lists, select Generic and a Position (wall, ceiling, ground).
Task 2: Select panoramic modes from the context menu of the panel for the camera.
1. Right-click on the panel displaying video (live or historical) from the Axis camera.
2. Select Dewarp. All options are displayed.
context-sensitive menu
Average rating:
Please log in to rate.
Rated by 3, Viewed by 3700 | ESSENTIALAI-STEM |
Pevensey Court House
Pevensey Court House, formerly known as Pevensey Town Hall, is a municipal building in the High Street, Pevensey, East Sussex, England. The structure, which currently accommodates a local history museum, is a Grade II listed building.
History
The current building, which was commissioned to replace a 14th-century court house, was designed in the medieval style, built in rubble masonry and was completed in around 1540. It was then extended, with the construction of a north facing wing and the installation of a porch at the top of the external staircase, in 1830. A cement render finish was added at that time as well.
The design of the enlarged building involved a main block which was orientated east to west together with a north facing wing. It featured an external staircase on the eastern side leading up to a porch on the first floor. The building was fenestrated by a prominent oriel window on the first floor at the end of the north facing wing, and by a casement window on the right-hand side of the main block, also facing north. The north facing wing was gabled and the main block was covered by a hipped roof. Internally, the principal rooms were a lock-up for incarcerating petty criminals on the ground floor, and a courtroom, which was 18 feet long and 14 feet wide, as well as a robing room, on the first floor.
The borough council, which had met in the council chamber, was abolished under the Municipal Corporations Act 1883, and the assets of the borough, including the building, were transferred to the newly formed Pevensey Town Trust in 1890.
One of the last people to be incarcerated in the prison cells was Betty Breach, who was found guilty of assaulting her drunken husband in 1887: after local protests, the magistrate who had sentenced Breach, apologised and released her. The building was used to imprison a captured German airman and was also used as a mortuary during the Second World War.
The court house subsequently served as a museum. Exhibits accessioned to the collection included the seals of the borough which dated to around 1230, the official weights and measures of the borough, and a replica of a scene from the Bayeux Tapestry, depicting the landing of William the Conqueror at Pevensey in 1066, which was hand-embroidered in the 1980s. | WIKI |
File talk:35th Squadron - Cyclone's Flying Circus - Three Mile, New Guinea, c. September 1943.jpg
Spelling error
This needs to be moved to correct the spelling of "Guinea" - I don't see how to do that. Thayne Harbaugh (talk) 16:43, 14 December 2016 (UTC)
* That would be done by "moving" the file. It's a bit technical and requires a file mover to do it. You can find out more at WP:FMV. I think in this case probably both WP:FNC and WP:FNC apply. -- Marchjuly (talk) 11:30, 17 December 2016 (UTC) | WIKI |
Talk:Battle of al-Hasakah (2022)
Article title
Multiple sources are calling this a battle stating that ISIS forces are in control of several areas of the city, as such it should be renamed to Battle of Al-Hasakah since sources are referring to it as a battle. See here, .XavierGreen (talk) 20:37, 22 January 2022 (UTC)
* By far the more name is "Hasakah Riot" or "Hasakah Jailbreak" moreover no according to the SOHR they are contained entirely to the prison. Des Vallee (talk) 23:14, 22 January 2022 (UTC)
* The "riot" sources you listed are from an entirely unrelated incident in 2020.XavierGreen (talk) 03:08, 23 January 2022 (UTC)
* While these are large-scale clashes, I am wondering why it's called a 'battle' when almost all sources I've seen are regarding it as a prison riot, jailbreak attempt, or clashes at worst. Common usage would have it thought that "The Battle of al-Hasakah" would be a serious attempt at taking over the city, whereas this is a jailbreak focused on a small geographic area making up only a block or two of Hasakah city itself centred around a particular building. IMO Hasakah jailbreak attempt/Hasakah prison riot or something like that would be a more appropriate title. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 14:02, 23 January 2022 (UTC)
* Even if confined to the prison incidents of this scale and nature are still generally called battles such as the Battle of Qala-i-Jangi.
similarities between Qala-i-Jangi and al-Sina'a Really the only difference between Qala-i-Jangi and al-Sina'a is that al-Sina'a was caused by an outside attack instead of an internal uprising. Thus I think we should keep the name as it is.--Garmin21 (talk) 19:51, 24 January 2022 (UTC)
* Both contained members of an armed group with prior military experience
* Both had the prisoners seizing the armory of the prison
* Both lasted multiple days
* Both had major armed battles killing dozens
* Both contained airstrikes
* Title is too broad, I suggest change to al-Sina'a prison raid Sgnpkd (talk) 04:07, 25 January 2022 (UTC)
* The raid was only the first part of the battle. If ISIS just attacked the prison and freed prisoners with no battle starting then al-Sina'a prison raid would be a far better name but since a large drawn-out multi-day battle happened I suggest either keeping the name as it is or changing it to Battle of al-Sina'a prison.--Garmin21 (talk) 16:15, 25 January 2022 (UTC)
Battle over?
I'm under the impression this is for the most part over. I can't seem to find any indication that the battle is still ongoing thus we've nothing to record on the timeline, it would seem strange to say the battle is still ongoing yet we've got not info on the ground following the 29th. I think it's safe to say the battle is over. Thoughts?ThePaganUK (talk) 17:56, 31 January 2022 (UTC) guys i mean go read the news SDF forces have more advantage than isis even they caught most prisoners that even they captured all prisoners then why IS won the batlle??? IS THIS LOGIC?? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 22:51, 1 February 2022 (UTC)
* While there are still multiple raids being carried out each day it is over, now we are in the crackdown phase which we can put in an aftermath section but the battle ended when the last groups of ISIS fighters surrendered.--Garmin21 (talk) 01:45, 2 February 2022 (UTC)
I mean please publish right informations how SDF and ISIS won the battle at the same time?? i thin SDF Won the battle if you have resources please put it with it Thanks for answering with news and informations SDF Won it — Preceding unsigned comment added by <IP_ADDRESS> (talk) 10:06, 2 February 2022 (UTC)
Aye I do think the SDF won the battle when looking at the event from a military point of view, hence why I referred their victory as 'a tactical victory'. So far I've seen no evidence they captured all of the prisoners that escaped hence why I believe this is also a strategic IS victory, as it was their intention to free as many prisoners as possible... and they did to an extent.ThePaganUK (talk) 16:08, 2 February 2022 (UTC)
* Bro i mean the military sect is more important they killed and captured lot isis and the martyers is one IS side not kurdish forces and i think it is SDF victory not IS victory i mean please publish right informations thanks/// — Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:01, 2 February 2022 (UTC)
* As I've already pointed out, there's a massive difference in meaning between the words 'tactical' and 'strategic'. The prison housed anywhere betwenn 3,500 to 4,000 IS prisoners, so far only 1,600 of them have been recaptured or have turned themselves in. IS managing to spring thousands of its fighters was exactly what they intended to do even if it meant hundreds of them being killed, hence why this is a Tactical SDF Victory whilst also a IS Strategic Victory, because IS largely achieved it's main aim. Propaganda cuts both ways; on wiki we post facts with evidence not personal opinions. There is no 3rd party source that says all the IS prisoners were captured, in fact we see the opposite:
SOHR1 ref:https://www.syriahr.com/en/236388/ SOHR2 ref:https://www.syriahr.com/en/236395/
ThePaganUK (talk) 21:14, 2 February 2022 (UTC)
* We could put "IS Strategic Victory" in the results section only if there are sources that can explicitly confirm the result as such, as per WP:Verifiability. At the moment there aren't. Thus, any personal analysis of the situation/result is contrary to WP:OR and WP:SYNTH guidelines. EkoGraf (talk) 09:28, 3 February 2022 (UTC)
Guys but we have to know this IS leader/Abu Ibrahim Al Qurayshi/ killed you right that you said is imprisons escaped but still it is battle that even if they escaped but still they recontrolled the prison by kurdish forces they win goes for SDF not even isis
SDD won
Please don’t change it SDF won it not isis please don’t spread propagandas <IP_ADDRESS> (talk) 15:09, 2 February 2022 (UTC)
To be fair, how can you subsume this event as a total SDF victory, IS did accomplish gains presumably, I suppose someone should add “IS propaganda victory”, or “IS strategic victory”. Stathmopoda orbiculata (talk) 21:02, 4 February 2022 (UTC)
Children were in the prison
I strongly believe it is important to mention Children were in the prison. Some more info https://www.unicef.org/press-releases/children-caught-al-hasakah-prison-violence-must-be-evacuated-safety — Preceding unsigned comment added by PointyPenBoy (talk • contribs) 18:20, 20 February 2022 (UTC)
Extended-confirmed-protected edit request on 11 December 2023
Please change “Rojava” to “Autonomous Administration of North and East Syria”. Rojava does not accurately refer to the whole of Northeast Syria, it simply means Western (Syrian) Kurdistan. Bruhlobob (talk) 14:43, 11 December 2023 (UTC)
* Red information icon with gradient background.svg Not done: please provide reliable sources that support the change you want to be made. Lewcm Talk to me! 12:55, 13 December 2023 (UTC)
* Sure, any reliable source would tell you that the polity in question is not named “Rojava” but the “Autonomous Administration of North and East Syria”.
* I-Aaron, II-Emily, I-Stein, II-Burchfield https://www.atlanticcouncil.org/wp-content/uploads/2019/11/The-Future-of-Northeast-Syria.pdf Atlantic Council. August 2019. Retrieved 24 December 2023.
* https://euaa.europa.eu/country-guidance-syria-2023/33-syrian-democratic-forces-and-asayish European Union Agency for Asylum. February 2023. Retrieved 24 December 2023 Bruhlobob (talk) 04:36, 25 December 2023 (UTC)
* Hi thanks for the sources, because of the extensive use of "Rojava" on the page and other pages that it links to, I'm going to reopen this request for another editor to review as I don't believe I know enough about this topic to make the change. Thanks, Lewcm Talk to me! 21:10, 28 December 2023 (UTC)
* Thank you, I appreciate your reply. I have to ask, is there any particular reason this specific page is locked? Bruhlobob (talk) 23:41, 28 December 2023 (UTC)
* It has been protected to prevent further disruption. M.Bitton (talk) 22:40, 29 December 2023 (UTC)
* I must insist again that “Rojava” be changed. The official name of the polity should be used rather than it’s common informal name. I have provided multiple sources and can provide many more. Bruhlobob (talk) 04:58, 31 December 2023 (UTC)
* Pictogram voting comment.svg Note: Feel free to provide as many sources as you feel are necessary. Please note that these sources must be formatted according to those already in use with the article, per WP:CITEVAR. When ready to proceed with the correctly formatted sources, please open a new edit request. Spintendo 23:47, 31 December 2023 (UTC)
* Thank you, I appreciate you reply. Again, I’m happy to provide more sources, but are the previous two sources not correctly formatted? Do you disagree with the requested edit or do you not believe the two sources are enough? Bruhlobob (talk) 01:50, 27 January 2024 (UTC) | WIKI |
3 Top EV Industry Trends to Watch in 2023
InvestorPlace - Stock Market News, Stock Advice & Trading Tips
Undoubtedly, 2022 was an excellent year for the EV industry. In the U.S., 5.7% of all vehicles sold during the year were electric. That’s notable, because 5% has historically been a tipping point for mass adoption across other countries. This trend strongly suggests sustained future growth, and eliminates fears that the EV revolution will be a flash in the pan. They’re here to stay, meaning everyone will watch top EV industry trends in 2023.
Those trends will affect participants from manufacturers to consumers to regulators and more. Let’s dive in, as these widespread catalysts take investors in the electrification realm on a wild ride.
Changing Tax Credits
Source: Roschetzky Photography / Shutterstock.com
One of the most important trends in the EV sector this year is the changing tax credits. Federal income tax credit rules for EVs are changing significantly in 2023. The Inflation Reduction Act (IRA) is an important legislation related to this conversation.
The IRA effectively reshaped the eligibility landscape for EVs. Some manufacturers had been ineligible for the credit, as it required 200,000 EV sales per the previous regulations. The IRA removed that clause, making those manufacturers eligible again. At the same time, the IRA now requires EVs to be made in North America, invalidating previously-qualified EVs.
The Department of Energy is undertaking a massive push to convert light-duty vehicles to electric vehicles. The impetus was a study finding that it would be the most significant opportunity to achieve a net-zero economy by 2050.
Further, tax credits will only apply to specific vehicle classes at certain price points. Large EVS must be priced below $80,000, and small EVs below $55,000.
Lower Prices
Source: Zigres / Shutterstock.com
Lower prices are a clear focal point across the EV sector in 2023. Elon Musk has slashed prices on the most popular Tesla (NASDAQ:TSLA) vehicles several times this year. So far, rival legacy auto manufacturers Ford (NYSE:F) and General Motors (NYSE:GM) have remained firmly committed to keeping prices unchanged.
Musk’s intent is clear. Tesla aims to produce 2 million vehicles in 2023, double the number it had a year ago. Margins will decrease, but the logic is that the volume increase will more than makeup for that decline. Tesla’s rivals warn that its fleet of vehicles may already be stale and need a refresh. In focusing on volume, they warn Tesla will fall farther behind.
While the outcome of Tesla’s strategy remains to be seen, lower prices are likely to be a norm for 2023. The government’s incentivizing of lower-priced vehicles in combination with credits could spare demand in lower-priced cars. Meanwhile, volume has become a paramount metric, and other manufacturers may lower prices and follow Tesla’s lead to spike sales.
A Focus on Infrastructure
Source: Shutterstock
I think 2023 will see a continued focus on infrastructure. If mass EV adoption is here, it will require a massive push to make charging infrastructure more available.
The Biden Administration’s bipartisan Infrastructure Act is a big part of that conversation. It sets out goals for 500,000 EV chargers along U.S. highways by 2030. In addition, it aims to spur auto manufacturers to have 50% of all new car sales comprised of EVs by 2030.
The law earmarks $7.5 billion for charging, $10 billion for clean transportation, and $7 billion for batteries. There are currently 130,000 EV chargers on U.S. roads. If 500,000 charging stations are to be built by 2030, it’s clear that a lot of activity will have to occur in the interim.
Overall, look for a significant push toward all things infrastructure build-out related. Those chargers will need to be more available, reliable, and user-friendly. Government investment means that firms engaged in any such activities have apparent advantages for the medium-term.
On the date of publication, Alex Sirois did not have (either directly or indirectly) any positions in the securities mentioned in this article. The opinions expressed in this article are those of the writer, subject to the InvestorPlace.com Publishing Guidelines.
Alex Sirois is a freelance contributor to InvestorPlace whose personal stock investing style is focused on long-term, buy-and-hold, wealth-building stock picks.Having worked in several industries from e-commerce to translation to education and utilizing his MBA from George Washington University, he brings a diverse set of skills through which he filters his writing.
The post 3 Top EV Industry Trends to Watch in 2023 appeared first on InvestorPlace.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
One dead, eighteen injured in Florida lightning strike
disasters and accidents
One person is dead and 18 others injured after lightning struck a church group's Fourth of July celebration in Lakeland, Florida, United States yesterday. The group were outside playing soccer and volleyball when either a single bolt or a series of them hit.
Polk County Sheriff Grady Judd said, "It's very sad to see folks just celebrating the Fourth, in a way that you would hope people would celebrate the Fourth, with friends and family, and a lightning strike, an act of God occurred, and one person died". 19 people were transported to hospitals; one was later pronounced dead.
Despite some clouds in the area, the lightning reportedly caught many off guard. Judd noted, "This is Florida. There's build up every afternoon."
No buildings or structures sustained damage, so it is unclear exactly where the bolt struck. The church members were described as "exceptionally composed considering the tragedy."
On average, there are 1.5 million lightning strikes per year in the state, causing more fatalities than hurricanes, tornadoes, and other meteorological hazards. | NEWS-MULTISOURCE |
Role of Hyperledger Fabric in Blockchain
Blockchain technology offers a plethora of possibilities for creativity. It has the potential to transform industries by radically altering the way they are conducted.
So, how can developers get started writing code for blockchain networks? We suggest beginning with a thorough understanding of the Hyperledger Fabric project.
What Is Hyperledger Fabric?
Hyperledger Fabric is a plug-and-play blockchain architecture that serves as a platform for developing blockchain-based products, technologies, and frameworks for private businesses.
How Hyperledger Fabric Works?
Traditional blockchain networks are incapable of supporting anonymous transfers and sensitive contracts, which are critical for companies. Hyperledger Fabric was created as a flexible, scalable, and stable foundation for providing industrial blockchain applications in response to this.
Hyperledger Fabric is an open-access platform for private and permissioned enterprise networks in which the names and functions of the participants are exposed to the other members. It’s intended to serve as a basis for creating modular solutions.
It enables plug-and-play functionality for components such as the ledger database, consensus process, and membership facilities. It makes use of container technologies to provide network stability, scalability, and confidentiality that is enterprise-ready.
Modular architecture
Hyperledger Fabric’s scalable architecture divides the transaction management workflow into three stages: smart contracts, also known as chain code, which provide the system’s distributed logic processing and consensus, transaction ordering, transaction authentication, and dedication. This separation has several advantages:
• The number of confidence levels and authentication is minimized, which leaves the network and processing clean.
• Network scalability has been improved.
• Overall better results
Furthermore, Hyperledger Fabric’s support for plug-and-play of different components makes for quick reuse of existing features and ready-made module integration.
The participants on the network have three distinct roles:
• Endorser
• Committer
• Consenter
In a nutshell, the transaction request is sent to the endorser peer following the number of endorsers specified in the endorsement policy. A batch or block of transactions is sent to the committer after the endorser(s) have given their approval(s). Committers ensure that the endorsing protocol was implemented and that no purchases are in dispute. The transfers are committed to the ledger until all checks have been completed.
The network’s scalability and efficiency are improved when only verifying instructions — such as signatures and read/write sets — are transmitted over it. Only endorsers and committers have access to the transaction, which improves confidentiality by limiting access to critical data points to a smaller number of people.
Example of Hyperledger Fabric
Assume a manufacturer needs to ship pens at a special price to a specific store or market of retailers (e.g., all Indian retailers) but does not want to expose the price to other markets (i.e., Chinese retailers).
Since other individuals, such as customs, a distribution firm, and a lending bank, may be interested in the product’s movement, the private price may be disclosed to both parties if a simple implementation of blockchain technology is used to facilitate this transaction.
Hyperledger Fabric solves this problem by keeping confidential transactions private on the network; only those who need to know are privy to the information. On the blockchain, data partitioning requires individual data points to be available only to those who need to see them.
--
--
--
Love podcasts or audiobooks? Learn on the go with our new app.
Recommended from Medium
Introducing the ReneVerse part 2
Blockchain 101: Blockchains and Consensus Mechanisms
An overview of ShareRing’s growing list of collaborators
The Trust-Less Economy: What Blockchain Technology Says About the Overall Well-Being of Humanity
Let’s Talk Blockchain Generations
Blockchain generations
The yAxis project launches on Avalanche with an APR boost times 2.5
The yAxis project launches on Avalanche with an APR boost times 2.5
Cryptocurrencies like Bitcoin (BTC) and Ethereum (ETH) are powered by a decentralized open-source…
Get the Medium app
A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Yashasvi Gupta
Yashasvi Gupta
More from Medium
How is DeFi Trying to Replace the Insurance Professional?
Skills every programmer should seek to scale up in Web3 space
NFTs… Beyond Art.
5 Responsibilities of a Smart-Contract Auditor | ESSENTIALAI-STEM |
Concerto pathétique
The Concerto pathétique (S.258/2), completed in 1866, is Franz Liszt's most substantial and ambitious two-piano work. At least three piano concerto arrangements of the work have been made by other composers, based on Liszt's suggestions.
History and significance
In 1851 Breitkopf & Härtel published the solo piano work Grosses Concert-Solo (in modern editions as Grosses Konzertsolo) (S.176) by Franz Liszt. Though not as popular as the later Piano Sonata in B minor by the same composer, the work achieves significance by the fact that it anticipates the Sonata as a large-scale nonprogrammatic work. It shows structural similarities to the Sonata and obvious thematic relationship to both the Sonata and the Faust Symphony.
One unpublished earlier version of the work exists, titled in French in the manuscript Grand Solo de concert (S.175a). This version differs structurally from the published Grosses Concert-Solo, thus revealing the existence of interesting material for a study on the genesis of Liszt’s gradual innovations in constructing a large-scale musical organism, which were to come to full fruition in the Sonata.
In 1866 a two-piano version was published under the title Concerto pathétique (S.258/2) which, though not differing structurally from the Grosses Concert-Solo, introduces a more effective layout of the musical thoughts, mainly due to an innovative concerto-like treatment of the two-piano ensemble. The initial conception of a projected piano concerto can further be proved by a number of extant piano concerto arrangements by various composers, including orchestra sketches by Liszt himself (the unpublished manuscript containing the piece's original (French) title Grand solo de concert) (S.365).
While the solo piano version is rarely performed today, the Concerto pathétique has become a repertoire piece of the two-piano genre.
Genesis of the "four-movements-in-one" form
The experimental nature of the Concerto pathétique gives it an outstanding presence in the Liszt oeuvre. The composer made many attempts to find an appropriate title — Grand solo de concert, Grand Concert, Morceau de Concert, etc. — indicating that this work was an experiment with new forms. Even the Piano Concerto No. 2 in A Major which Liszt begun work on in the same year (1849) as the Grand Solo de concert/Grosses Concert-Solo had its genesis ten years earlier in a seemingly self-contradictory entitled work Concerto sans orchestre (S.524a). The fact that the solo Grosses Concert-Solo has been overshadowed by the later two-piano version has obscured the importance of the former as one of Liszt’s largest and most ambitious original works for the instrument. The Grosses Concert-Solo anticipates several of the most salient features of Liszt's undisputed masterwork, the Piano Sonata in B minor, namely the nonprogrammatic "four-movements-in-one" form.
The earlier unpublished solo version (S.175a) as well as the unpublished orchestra accompaniment sketches for a projected piano concerto version (S.365) do not contain the slow Andante sostenuto middle section, which shows that Liszt’s initial conception was one virtuoso sonata-allegro movement with exposition, development, recapitulation, and coda. The new "comprehensive" sonata form is the result of an insertion of a slow movement (sometimes compared to the Lento sostenuto of Chopin’s Fantasy in F minor) between exposition and development and a cyclic recurrence of the slow movement theme between recapitulation and coda in order to achieve unity. Since this afterthought of Liszt does not quite agree with the initial intentions, the result is a somewhat loose rhapsodic structure with interlinked sections held together by a few insertions.
Liszt did not smooth out those "rough edges." He simply used some of the thematic material to compose an entirely new work in similar large-scale form — the Sonata in B minor. Here the form convinces because the thematic ideas have been contrived to match each other, which makes the thematic transformation, already apparent in the Grosses Concert-Solo and many earlier works, more natural. In contrast to the Grosses Concert-Solo the accompaniment figurations in the sonata are permeated by thematic allusions resulting in a more logically compelling development of ideas.
It is typical for Liszt that he did not destroy the earlier solo work (Grosses Concert-Solo) but rearranged it in the two-piano version Concerto pathétique. Since Liszt had projected a piano concerto version but dropped the plan, the two-piano arrangement can be seen as a sort of compromise. In this version Liszt seems to have been more interested in the concerto-like effects of the two-piano ensemble than in structural innovations, because he left the overall design of the solo version unaltered. The suggestion of a concerto version can be detected in various remarks such as quasi arpa, quasi timpani, etc., and the fact that the first piano part is more virtuosic throughout. Later concerto arrangers, like Eduard Reuss (1885, corrected by Liszt (S.365a)), Richard Burmeister (1898) or Gábor Darvas (1952), have usually incorporated the second piano part into the orchestra part.
Despite the structural relationship between the Concerto pathétique and the Sonata, Liszt always rejected the idea of a preconceived form. In his Faust Symphony, which employs related thematic material, he does not attempt to write another "four-movement-in-one" work.
Concert piece or concerto?
The word concert(o), except for its spelling, is the only consistent part of the various titles of the Concerto pathétique, though its meaning is open to interpretation. The German word Concert (modern spelling Konzert) could mean both concert and concerto, but the titles Grosses Concert-Solo or Grand solo de concert seem just to denote a large-scale concert piece (as opposed to a short salon piece for example), whereas Concerto pathétique calls to mind a concerto. The prefix Concert (Konzert) or the French de concert could also mean a concerto-like and/or one-movement work for solo and orchestra (such as Schumann's Konzertstück and Konzert-Allegro, Chopin's Allegro de concert, or Weber's Konzertstück, one of Liszt's "war horses"). Such a Konzertstück (concertino) form seems to be indicated by the title Morceau de concert [sic] (pour piano sans orchestre).
The existence of sketches (in Liszt’s hand) for a piano concerto version of the Grosses Concert-Solo give evidence to the concerto character of the solo version. Liszt was not the only composer to have written a "concerto without orchestra".
The term concerto might also point to certain formal procedures. Liszt’s later addition of the Andante sostenuto part to the solo version results in sectional tempo (and mood) changes somewhat related to a baroque concerto. Another heritage from the baroque age is the idea of competing forces (solo against orchestra for example). The two-piano medium is excellently suited for projecting this concert style (also recognized by Stravinsky's Concerto per due pianoforti soli or Busoni's Duettino concertante). In a solo piece the idea of struggling forces would be expressed by different moods (registers, modes, keys, dynamics, tempos, etc.) pitted against each other (the opposing characters in Faust). It cannot be doubted that there exists more than just a technical connotation of the term concerto for Liszt's unlimited imagination.
The adjective grand could mean large-scale and/or indicate a certain grandeur of character, expression, or style. It is commonly used by Romantic composers (Chopin's Grande polonaise brillante). But the German groß does not have that connotation in Grosses Concert-Solo. | WIKI |
Where Do You Connect VDG Cable On Motherboard?
Where Does VDG Cable Go on Motherboard
The VDG is a three-pin connector that is intended for use with older Gigabyte and Aorus motherboards. This connector is not compatible with case fan headers, and attempting to connect a VDG cable to a case fan header will result in your RGB controller failing. It’s worth noting that most other brands use a four-pin connector and that Gigabyte has transitioned to this type of connector on more recent motherboard models.
when connecting RGB components to your Gigabyte or Aorus motherboard, make sure to use the VDG connector for compatibility and to avoid any issues.
You must use the same connector for other brands that use the four-pin connector with one pin missing. Connect this to one of the D-LED connectors on the motherboard. Instead, use a four-pin LED C1 or LED C2 connector. These are 12 volts and will cause your RGB controller to fail.
Most fan kits use PWM+ARGB controllers, allowing you to connect and control up to eight 6-pin RGB fans and two LED strips. The hub works better with the most popular RGB LED lighting software, such as AURA Sync or RGB Fusion. This allows it to be connected to a motherboard that supports it and gives it complete control over how the fans light up and spin.
Keep reading, and i will explain more about the VDG cable on your motherboard and how, where you should connect it.
How to Connect VDG Cable to Motherboard: A Step-by-Step Guide
To properly install a VDG cable on the motherboard, follow these steps:
Step 1: Power off the computer and unplug it from the wall.
Step 2: Open the computer case by removing any screws or clips that hold the case together. Set the case aside in a safe and secure location.
Step 3: Locate the VDG connector on the motherboard. It should be located near the bottom of the board and the other connectors for the power supply and storage devices.
Step 4: Carefully align the VDG cable with the connector, ensuring that the pins on the cable match up with the pins on the connector.
Step 5: Press the cable into the connector until it is fully seated. Ensure that the cable is not bent or twisted and that all the pins are properly aligned.
Step 6: Once the cable is securely attached to the motherboard, replace the computer case and secure it with the screws or clips you removed earlier.
Step 7: Plug the computer back in and power it on.
Precautions for Connecting the VDG Cable to the Motherboard
It is important to know that different motherboards and cables may have slightly different requirements.
So it is best to follow the manufacturer’s instructions for attaching the cable to the motherboard. If you can’t place your hands on the hard copy, you can visit the manufacturer’s website to search for the e-copy.
In addition, be gentle when handling the cable and the motherboard to avoid damaging the delicate components.
You also want to ensure the pins on the cable and the connector are properly aligned before pressing the cable into the connector to avoid damage.
Common Problems When Connecting VDG Cables to the Motherboard and Fixes
If you are having difficulty installing a VDG cable on the motherboard, here are some troubleshooting tips to try:
Damaged or bent pins:
One of the common reasons why connecting VDG cables to the motherboard doesn’t yield the expected outcomes is that there are damaged or bent pins. So, check the cable and the connector for any damage or bent pins, as this may prevent the cable from fitting properly or from working at all.
Reversible Connectors
Some VDG cables have reversible connectors that can be inserted into the connector in either direction. If the cable is still not fitting properly, try reversing it and inserting it into the connector again.
You can also try gently wiggling it back and forth to help it seat properly. Do not use excessive force, as this can damage the cable or the motherboard.
Damaged VDG connectors or cable
Some motherboards have multiple VDG connectors that may work better with your cable. If the cable still does not fit properly, try using a different cable or a different VDG connector on the motherboard.
connector and pin alignment
Ensure that the cable and the connector are properly aligned before pressing the cable into the connector. If the pins on the cable and the connector are not aligned, the cable may not fit properly or work.
If none of these troubleshooting tips work, I recommend you contact technical support for further assistance.
No Vdg on Motherboard
If your motherboard does not have a VDG (Virtual Display Ground) header, you will not be able to directly connect the VDG cable from your case to the motherboard. However, there are a few solutions you can try.
First, you can check if your motherboard has an RGB header that is compatible with your VDG cable. Some VDG cables may work with RGB headers, but you will need to check your motherboard manual to see if this is possible.
If your motherboard does not have a compatible RGB header, you can purchase an RGB controller that is compatible with your VDG cable. These controllers allow you to connect your VDG cable to the controller and then control the lighting through software.
Alternatively, if your motherboard has a spare USB 2.0 header, you may be able to connect the VDG cable to a USB to VDG adapter, which will allow you to control the lighting through software.
It’s important to note that not all solutions may be compatible with your specific case or motherboard, so be sure to do thorough research and consult the manuals before attempting any modifications.
Some motherboards may have multiple VDG connectors to support multiple display devices.
How To Connect VDG to ARGB Headers
To connect VDG (Gigabyte and Aorus) RGB components to an ARGB (Asus, MSI, ASRock) motherboard, you will need a converter cable. The VDG connector uses a different pin layout than the ARGB connector, so a converter cable is necessary to ensure compatibility.
You can find these converter cables for sale online or at your local computer hardware store. When purchasing a converter cable, make sure to select one that specifically supports VDG to ARGB conversion to ensure proper functionality.
Once you have the converter cable, you can connect the VDG connector from your RGB component to the VDG end of the converter cable, and then connect the ARGB end of the converter cable to the ARGB header on your motherboard. This will allow you to control your Gigabyte or Aorus RGB components with your Asus, MSI, ASRock, or other ARGB motherboard.
What Happens When You Wrongly Connect the VDG Cable on the Motherboard?
The VDG cable carries the video signal from the motherboard to the monitor or other display device. If the cable is not properly attached to the motherboard, the computer may not be able to display any video at all.
In addition, improper placement of the VDG cable can cause signal interference or other problems that can affect the quality of the video display.
Knowing where the VDG cable goes on the motherboard, you can ensure that it is properly installed and that your computer can display video properly.
Final thoughts
There is barely a difference between regular aRGB and VDG, except that some Gigabyte boards come with an adapter for aRGB.
You can even try using hubs designed with VDG and VD_G (aRGB) connections. You’ll need an RGB controller if your board only has a jRGB port and no VDG or VD_G ports. I recommend using either Razer or Cooler Master.
But if you have a controller hub that comes with the fans, stick with it since it has a remote and controls the RGB of the fans and the AIO.
Scroll to Top | ESSENTIALAI-STEM |
Page:History of England (Macaulay) Vol 2.djvu/582
wife; she had no other wish than to be subject to him; the most cruel injury that could be done to her would be to set her up as his competitor; and she never could regard any person who took such a course as her true friend. The Tories had still one hope. Anne might insist on her own rights, and on those of her children. No effort was spared to stimulate her ambition, and to alarm her conscience. Her uncle Clarendon was especially active. A few weeks only had elapsed since the hope of wealth and greatness had impelled him to bely the boastful professions of his whole life, to desert the royal cause, to join with the Wildmans and Fergusons, nay, to propose that the King should be sent a prisoner to a foreign land and immured in a fortress begirt by pestilential marshes. The lure which had produced this strange transformation was the Viceroyalty of Ireland. Soon, however, it appeared that the proselyte had little chance of obtaining the splendid prize on which his heart was set. He found that others were consulted on Irish affairs. His advice was never asked, and, when obtrusively and importunately offered, was coldly received. He repaired many times to Saint James's Palace, but could scarcely obtain a word or a look. One day the Prince was writing, another day he wanted fresh air and must ride in the Park; on a third he was closeted with officers on military business and could see nobody. Clarendon saw that he was not likely to gain anything by the sacrifice of his principles, and determined to take them back again. In December ambition had converted him into a rebel. In January disappointment reconverted him into a royalist. The uneasy consciousness that he had not been a consistent Tory gave a peculiar acrimony to his Toryism. In the House of Lords he had done all in his power to prevent a settlement. He now exerted, for the same end, all his influence over the Princess Anne. But his influence over her was small indeed when compared with that of the Churchills, who wisely called to their help two powerful allies, Tillotson, who, as a spiritual director, had, at that time, immense authority, and Lady Russell, whose | WIKI |
Build details
Build information
State
complete
Epoch
None
Version
0.20.2
Release
13.el7
Started
2020-03-16 03:36:31
Finished
2020-03-16 03:40:22
Koji repo
1409969
Koji tasks
complete
noarch
└42517169 closed
Build logs
noarch
Dependency changes from previous build
git
1.8.3.1-20.el7
1.8.3.1-21.el7_7
3
libcurl
7.29.0-54.el7_7.1
7.29.0-54.el7_7.2
3
php-fedora-autoloader
1.0.0-1.el7
1.0.1-2.el7
3
perl-Git
1.8.3.1-20.el7
1.8.3.1-21.el7_7
4
curl
7.29.0-54.el7_7.1
7.29.0-54.el7_7.2
B
systemd-libs
219-67.el7_7.2
219-67.el7_7.3
B
sqlite
3.7.17-8.el7
3.7.17-8.el7_7.1
B
binutils
2.27-41.base.el7_7.1
2.27-41.base.el7_7.2
B
systemd
219-67.el7_7.2
219-67.el7_7.3
B
kernel-headers
3.10.0-1062.9.1.el7
3.10.0-1062.12.1.el7
B | ESSENTIALAI-STEM |
Server Side Rendering and Client Side Rendering
Server Side Rendering and Client Side Rendering
Photo by Markus Spiske / Unsplash
Introduction
Even though, an HTML document with CSS and JavaScript is all it takes to make up a website, it's the rendering process which gives the user a good experience when interacting with the website.
Staring at a blank screen till the website is built up by the browser gives a bad user experience. A loading screen with progress meter makes the difference. You also don’t want to wait longer for the website to be available for interactions. Hence, the web developers take a call on how to render a website to give a smooth and uniform experience to the user.
A web developer makes the choice of how to render a page, depending on factors like, how complex the UI of a website, how much information has to be presented on the website, is the page more dynamic or closer to a static page and others.
To look into what happens when you visit a website, you enter the URL of a website you want to visit, your computer (Client Computer) sends an HTTP request to a backend computer called a server, asking to provide the required data to view that website.
Depending on what the server sends (an already rendered HTML file or data like for the client to render the webpage on its own), the rendering can be classified as either client side rendering or server side rendering.
There are other ways of rendering a website, but these two are the most popular, and all others have just leveraged these two for optimal use case. Most times, you would take the best of both for a user experience you would want to achieve.
Let's try to understand what server side rendering and client side rendering really are, and the pros and cons of using each.
Client Side Rendering
From the beginning of web development, Server Side Rendering was the go-to rendering process, owing to the web technologies and their capabilities at the time, but with the rise of single page application framework, client side rendering gained popularity.
In client side rendering, a server will send raw data to the client and the client will take care of rendering it from scratch. The server would send a near-to-empty HTML document and the links to the JavaScript. Once, the client has all the data from the server, it will start building the HTML page and load up the CSS, JavaScript for viewing and interacting. This may result in a slow load of the page in the first render, but it would be faster for the subsequent renders as it already has the data available locally to interaction, and it does not have to make a new request to the server.
Unlike the server side rendering, the user would not be able to view the page until the above process of rendering is completed. While in the server side rendering process, the user would have a pre-rendered HTML page to view, whilst the browser is loading up the scripts for interactions.
So on the client side rendering process, you won’t have the viewable page until the scripts are executed. The final rendered page is both viewable and intractable. The below image from Walmart’s Tech Blog shows us how the client side rendering process works.
Client Side Rendering from Walmart Global Tech Blog
Server Side Rendering
Let’s look at Server Side Rendering now. In this rendering process, the client makes a request to the server, asking for the files to view the website, just like the client side rendering process, but now, the server sends an HTML document which is ready to be viewed on the client. On the first render itself, you will have a viewable HTML document. Simultaneously, the browser will download the required JavaScript from the server. Once you have the scripts, the framework gets executed, making the page intractable.
The below diagram from the Walmart Tech Blog gives a pictorial representation of the same.
Server Side Rendering from Walmart Global Tech Blog
For every other routing, a new request will be sent to the server for an HTML page. The server will go through the entire process of building the viewable HTML page and sends the JavaScript files as and when the client requests.
So the server side render will give you a viewable page faster, but it won’t be intractable right away, whereas the client side render will take time on the initial load but give you a completed intractable page.
Differences and good parts:
In client side rendering, every route will be dynamically handled by the client itself, meaning it would not make frequent requests for every routing. As an example, if you are on the home of a website, and you click on the products links, you will be routed to the products page and this product page is dynamically built by JavaScript on the client itself with the data it has, rather than making a new request to the server to provide the products page data.
As you may notice, the client saves time by not waiting for a server response, thus giving a good user experience in the second and subsequent renders. This is done by the framework, on the client. The server sends most of the data on initial request, such that the framework can do the routing by dynamically building pages.
By this, the subsequent rendering of pages is faster as it is done locally.
Whereas in the server side rendering, for every route to a new page, a fresh request is made to the server. Then, you will have a ready to view HTML document and browser has to download, load JS all again.
That implies, the server side rendering is slower on the subsequent renders.
Good parts of Client Side Rendering:
• Fast rendering once the website loads up.
• Can handle big amount of logic and data authorization.
Not so good parts:
• poor for Search Engine Optimization
• initial loading takes time compared to server side rendered page.
To conclude, use client side rendering, If your application has more dynamic data, complex UI, bigger number of users and does not emphasize on SEO content.
Good parts of Server Side Rendering:
• Initial load up is faster than the client side rendering.
• Good for Search Engine Optimization
Not so good parts:
• Makes a lot of server requests.
• Full page loading takes time and reloads.
• Bad choice for application with a lot of interactivity
So, when to use Server side rendering. Use SSR, if your application is with complex UI with fewer interactions, or close to a static page and a less number of people use it.
Hope this introductory article on client side rendering and server side rendering, gave you a basic understanding. But a point to be made, developers use an amalgamation of both of this to achieve the behavior they desire. This gave raise to other rendering processes like pre-rendering, static side generation, isomorphic. We will get into this later when we deep dive into the details of rendering in future articles.
Resources and References:
Medium blog by Walmart Global Tech - Server Side Rendering over Client Side Rendering
Stack Overflow answer to Client Side vs Server Side Rendering - Client Side Rendering vs Server Side Rendering
If you want to stay up-to-date with the latest insights in Artificial Intelligence, DevOps, Cloud, Linux, Programming, Blockchain, Productivity, and more, subscribe to my Weekly Newsletter. You’ll also get access to my tutorials, tips, and guides, as well as resources from other experts in these fields. | ESSENTIALAI-STEM |
Wikipedia:Peer review/Sugar Ray Robinson/archive1
Sugar Ray Robinson
This peer review discussion has been closed. I've listed this article for peer review because I would like to get it to FA status eventually and think a peer review would be appropriate. I will be buying some more books when finances allow so I can add more secondary sources, but would like comments on what is there now.
Thanks, AaronY (talk) 22:26, 3 December 2010 (UTC)
* Comments from Jappalang
* There are several dead links used by the article as sources; these should be fixed.
Sources
* Why is boxrec.com used, especially when below it states "BoxRec : this data may be incomplete and/or inaccurate"? Case in point: "Total fights" is claimed to be 200 because of boxrecs; however, numerous books including the biographies used in this article has pointed to 202 as the number. Why is a fansite used? Use the books that have been written about this boxing legend.
* What is this "Gene Fullmer" link (http://www.ibhof.com/fullmer.htm), which is now a homestead front page? What makes it a reliable source?
* Why is the TV.com page, a page that seemingly can be edited by any one, used to reference Sugar Ray's guest appearance when more reliable sources are available?
* The www.cmgworldwide.com links are dead; what makes them reliable?
* I believe boxing.about.com/od/history/a/ring_punchers.htm should not be linked per WP:LINKVIO; several AFDs have determined that complete reproductions of Top X lists are copyright violations unless the host was given permission to do so. Find the magazine and provide details of its article for the citation.
* www.secondsout.com/Legends/inthiscornercfm.cfm?ccs=402&cs=9896 does not point to an article by Patrick Kehoe.
* Use Google books to have an idea of which books would be best, and consult the associated Wikiprojects on which would be best used. Look for biographies (it seems some of which are used in this article) written by acknowledged experts in the field. Several magazines also have articles on the man and his relatives; these can be used to expand his personal life section (provided they do not contradict more reliable accounts).
* Check out the university published books; these tend to have the better "quality" so as to speak (since the higher-education centres have vetted their accuracy and topical insight). They offer a look at the man through a different set of eyes than sports biographies; these books can help in expanding sections beyond Sugar Ray's impact on the sports.
Early life
* "... first obtain an AAU membership card."
* Abbreviations should be stated in full on first mention, accompanied by the abbreviated name. See Manual of Style.
* "... by borrowing a card from his friend Ray Robinson."
* The source did not state Ray Robinson as his friend. Other sources (deadtree ones) have pointed out that they were just from the same gym (although Sugar Ray knew of Ray Robinson). Sugar Ray was not said to have initiated the "borrowing". It seems George gave him the card to use. Whatever the case, it might invite less controversy to say "... by using a card from an older gym mate, Ray Robinson, who had unexpectedly stopped boxing." or such (and cite the sources).
* "Subsequently told that his style was "sweet as sugar" by future manager George Gainford, Smith Jr. became known as "Sugar" Ray Robinson."
* Was it the manager or the reporter who said "sweet as sugar" (sources differ)? It might be better to find the most reliable sources and look into this (or specifically spell out who said it was George).
* "..., and actually lived on the same block as Louis in Detroit when Robinson was 11 and Louis was 17."
* The sentence is overly dramatic (as if it was such a big deal). It might be more appropriate to cast it as "...; coincidentally, in 1932 Robinson and Louis lived in the same block in Detroit"
Early career
* "Robinson then defeated his childhood idol former champion Henry Armstrong. Robinson only fought Armstrong because Armstrong was in need of finances. By now Armstrong was an old fighter, and Robinson later stated that he carried Armstrong."
* Uncited, and what does "carried Armstrong" mean? The project's main audience may not be familiar with boxing.
* "... the only other mark on Robinson's record ..."
* Beware. There were only two entries on Robinson's record, or is "mark" here used as a boxing jargon? Be explicit; i.e. "negative mark".
Welterweight Champion
* "Before that fight, Robinson had a dream that he was going to accidentally kill Doyle in the ring. As a result, he decided to pull out of the fight. However, a priest and a minister convinced him to go ahead with the bout. His foe, however, died from the injuries he sustained."
* The source attributed this to "Some people said". It is not proven fact and should not be stated as such. Furthermore, the source makes no mention of "a priest and a minister".
Stopping review of the boxing history content here; I think content would best be reviewed when more reliable sources (books) have been integrated, and the uncited information are referenced.
Decline
* TKO: abbreviation as before
After retiring as a boxer
* Were there any studies that investigated his Alzheimer's disease? Note that this requires high-quality reliable sources per WP:MEDRS.
* What other business ventures/career did he attempt? There seem to be something missing (see the restaurant concern below).
Personal life
* How was his relationship with his family members? Does he have any other hobbies?
Legacy
* Three quotes is too many. This is not a quote farm. One could be fine; although it can be argued that all can be integrated into the prose.
* Instead of listing year by year the accolades given to him by each publication, would it be better to collate and present them by theme? This may not be a big deal; the number of accolades is not so long yet as to make it a repetitive "listy" read.
* "His glamorous restaurant, Sugar Ray's, ..."
* What/where is this restaurant? Why is it suddenly mentioned here? What happened to it?
* "... such as Sugar Ray Leonard, Sugar Shane Mosley, and UFC fighter "Sugar" Rashad Evans."
* I would rather the homage list be restricted to established notable fighters. Leonard and Mosley are world title holders, same as the original Sugar Ray; it seems mighty undue to list Evans along them.
See also
* Why is "List of male boxers" here? This is such a general link that it serves no point at all.
* "Ring Magazine pound for pound" could have been linked in the sentence that mentions the magazine's ranking of Sugar Ray as the best pound for pound, so it is redundant here.
Images
* File:Sugar Ray Robinson 1966.jpg
* I think from reading the article, this photograph should not be taken in 1966 if the text is correct. His last ring appearance was Madison Square Garden on December 10, 1965, right?
Of great concern is that there are several uncited sentences in the article. Please cite them to the sources used for these sentences. Grammar-wise, there is quite a heavy use of noun plus -ing constructs; please refer to User:Tony1/Noun plus -ing on the issues with these constructs and how to resolve/improve them. Jappalang (talk) 08:14, 11 December 2010 (UTC) | WIKI |
Talk:Dmitri Berlinsky
What is the relations between Dmitri and Valentin Berlinsky? Alex Bakharev (talk) 01:26, 11 April 2009 (UTC)
Article issues
I just added a tag to this article. The only secondary source is the NYT, a 1991 review of one concert that includes a little bio info. Most of this article is unsupported by that source. Firefangledfeathers (talk) 18:19, 10 April 2021 (UTC) | WIKI |
Rioux (disambiguation)
Rioux may refer to:
* Rioux, French commune in Charente-Maritime
* Rioux-Martin, French commune in Charente
* Christien Rioux, computer security specialist
* Erin Rioux, a NYC-based musician
* Geneviève Rioux (b. 1961), Canadian actress
* Gerry Rioux (b. 1959), Canadian hockey player
* Jean-Antoine Rioux (1925-2017), French parasitologist
* Johnny Rioux (b. 1974), American musician
* Laurent Rioux, Canadian NASCAR driver
* Pierre Rioux (b. 1962), Canadian hockey player | WIKI |
Baconian method
From Wikipedia, the free encyclopedia
(Redirected from Idols of the mind)
Jump to: navigation, search
The Baconian method is the investigative method developed by Sir Francis Bacon. The method was put forward in Bacon's book Novum Organum (1620), or 'New Method', and was supposed to replace the methods put forward in Aristotle's Organon. This method was influential upon the development of the scientific method in modern science; but also more generally in the early modern rejection of medieval Aristotelianism. With the upcoming Romanticism in the 19th century, it was replaced by Humboldtian science.[1][2][3]
Description in the Novum Organum[edit]
Bacon's view of induction[edit]
Bacon's method is an example of the application of inductive reasoning. By reasoning using "induction", Bacon meant the ability to generalize a finding stepwise, based on accumulating data. He advised proceeding by this method, or in other words, by building a case from the ground up. He wrote in the Novum Organum that
"Our only hope, then is in genuine Induction... There is the same degree of licentiousness and error in forming Axioms, as in abstracting Notions: and that in the first principles, which depend in common induction. Still more is this the case in Axioms and inferior propositions derived from Syllogisms." (See for example, aphorism XVII of the Novum Organum.)
Approach to causality[edit]
The method consists of procedures for isolating and further investigating the form nature, or cause, of a phenomenon, including the method of agreement, method of difference, and method of concomitant variation.[4]
Bacon suggests that you draw up a list of all things in which the phenomenon you are trying to explain occurs, as well as a list of things in which it does not occur. Then you rank your lists according to the degree in which the phenomenon occurs in each one. Then you should be able to deduce what factors match the occurrence of the phenomenon in one list and don't occur in the other list, and also what factors change in accordance with the way the data had been ranked.
Thus, if an army is successful when commanded by Essex, and not successful when not commanded by Essex: and when it is more or less successful according to the degree of involvement of Essex as its commander, then it is scientifically reasonable to say that being commanded by Essex is causally related to the army's success.
From this Bacon suggests that the underlying cause of the phenomenon, what he calls the "form," can be approximated by interpreting the results of one's observations. This approximation Bacon calls the "First Vintage." It is not a final conclusion about the formal cause of the phenomenon but merely a hypothesis. It is only the first stage in the attempt to find the form and it must be scrutinized and compared to other hypotheses. In this manner, the truth of natural philosophy is approached "by gradual degrees," as stated in his Novum Organum.
Refinements[edit]
The "Baconian method" does not end at the First Vintage. Bacon described numerous classes of Instances with Special Powers, cases in which the phenomenon one is attempting to explain is particularly relevant. These instances, of which Bacon describes 27 in the Novum Organum, aid and accelerate the process of induction.
Aside from the First Vintage and the Instances with Special Powers, Bacon enumerates additional "aids to the intellect" which presumably are the next steps in his method. These additional aids, however, were never explained beyond their initial limited appearance in Novum Organum.
Natural history[edit]
The Natural History of Pliny the Elder was a classical Roman encyclopedia work. Induction, for Bacon's followers, meant a type of rigour applied to factual matters. Reasoning should not be applied in plain fashion to just any collection of examples, an approach identified as "Plinian". In considering natural facts, a fuller survey was required to form a basis for going further.[5] Bacon made it clear he was looking for more than "a botany" with discursive accretions.[6]
In concrete terms, the cabinet of curiosities, exemplifying the Plinian approach, was to be upgraded from a source of wonderment to a challenge to science.[7] The main source in Bacon's works for the approach was his Sylva Sylvarum, and it suggested a more systematic collection of data in the search for causal explanations.[8]
Underlying the method, as applied in this context, are therefore the "tables of natural history" and the ways in which they are to be constructed. Bacon's background in the common law has been proposed as a source for this concept of investigation.[9]
As a general intellectual programme, Bacon's ideas on "natural history" have been seen as a broad influence on British writers later in the 17th century, in particular in economic thought and within the Royal Society.[10]
Idols of the mind (idola mentis)[edit]
Bacon also listed what he called the idols (false images) of the mind. He described these as things which obstructed the path of correct scientific reasoning.
1. Idols of the Tribe (Idola tribus): This is humans' tendency to perceive more order and regularity in systems than truly exists, and is due to people following their preconceived ideas about things.
2. Idols of the Cave (Idola specus): This is due to individuals' personal weaknesses in reasoning due to particular personalities, likes and dislikes.
3. Idols of the Marketplace (Idola fori): This is due to confusions in the use of language and taking some words in science to have a different meaning than their common usage.
4. Idols of the Theatre (Idola theatri): This is the following of academic dogma and not asking questions about the world.
These four fallacies are sometimes compared to a similar list in the first part of Roger Bacon's Opus Majus which, although it was much older, had not been printed in Francis Bacon's time.
Influence[edit]
Thomas Browne the physician (1605–82) was one of the first scientists to adhere to the empiricism of the Baconian method. His encyclopaedia Pseudodoxia Epidemica (1646–76) includes numerous examples of Baconian investigative methodology; and its preface paraphrases lines from Bacon's essay On Truth in his 1605 work The Advancement of Learning. Isaac Newton's saying hypotheses non fingo (I don't frame hypotheses) occurs in later editions of the Principia. It represents his preference for rules that could be demonstrated, as opposed to unevidenced hypotheses.
The Baconian method was further developed and promoted by John Stuart Mill. His 1843 book, A System of Logic, was an effort to shed further light on issues of causation. In this work, he formulated the five principles of inductive reasoning now known as Mill's methods.
See also[edit]
Notes[edit]
1. ^ Böhme, Hartmut: Ästhetische Wissenschaft, in: Matices, Nr. 23, 1999, S. 37-41
2. ^ Cannon, Susan Faye: Science in Culture: The Early Victorian Period, New York 1978
3. ^ Dettelbach, Michael: Humboldtian Science, in: Jardine, N./Secord, J./Sparry, E. C.(ed): Cultures of Natural History, Cambridge 1996
4. ^ Hesse, M. B. (1964), “Francis Bacon's Philosophy of Science”, in A Critical History of Western Philosophy, ed. D. J. O'Connor, New York, pp. 141—52.
5. ^ Pomata, Gianna; Siraisi, Nancy G. (2005). Historia: Empiricism and Erudition in Early Modern Europe. MIT Press. p. 113. ISBN 978-0-262-16229-6.
6. ^ von Linné, Carl (31 May 2001). Nemesis Divina. Edited and Translated with Explanatory Notes by M. J. Petry. Springer. p. 45. ISBN 978-0-7923-6820-5.
7. ^ Ewalt, Margaret R. (2008). Peripheral Wonders: Nature, Knowledge, and Enlightenment in the Eighteenth-century Orinoco. Associated University Presse. p. 128. ISBN 978-0-8387-5689-8.
8. ^ Cantor, G. N.; Christie, J. R. R.; Hodge, M. J. S.; Olby, R. C. (6 August 2012). Companion to the History of Modern Science. Routledge. p. 260. ISBN 978-1-134-97751-2.
9. ^ Radman, Zdravko (1 January 1995). From a Metaphorical Point of View: A Multidisciplinary Approach to the Cognitive Content of Metaphor. Walter de Gruyter. p. 28. ISBN 978-3-11-014554-0.
10. ^ Wilbur Applebaum (29 June 2000). Encyclopedia of the Scientific Revolution: From Copernicus to Newton. Taylor & Francis. p. 110. ISBN 978-0-203-80186-4.
References[edit] | ESSENTIALAI-STEM |
2018 Cincinnati Bengals season
The 2018 season was the Cincinnati Bengals' 49th season in the National Football League (NFL), their 51st overall and their 16th and final under head coach Marvin Lewis. The Bengals failed to improve upon their 2017 campaign as they collapsed to a 6–10 finish (after a 4–1 start) to finish in 4th place in the AFC North. This marked the 3rd consecutive season the Bengals have failed to make the playoffs.
Longtime coach Marvin Lewis and team owner Mike Brown announced a mutual parting of ways following this season after 16 seasons, and despite leading them to 4 division titles, and 7 winning seasons/playoff appearances, Lewis was unable to lead the Bengals to a playoff win. He holds the record for most wins, seasons, and playoff losses for a head coach without a playoff win.
Draft
Draft trades
* The Bengals traded their first- and sixth-round selections (12th and 187th overall) to Buffalo in exchange for Buffalo's first- and fifth-round selections and tackle Cordy Glenn
* The Bengals traded a conditional selection to Jacksonville in exchange for defensive end Chris Smith. As Smith was on the Bengals' active roster for at least six games during the 2017 season, Jacksonville acquired Cincinnati's seventh-round selection (230th overall).
* The Bengals traded linebacker Marquis Flowers to New England in exchange for New England's seventh-round selection (249th overall).
* The Bengals traded their 2nd round pick (46th overall) and a 3rd round pick (100th overall) to the Kansas City Chiefs in exchange for the Chiefs' 2nd round pick (54th overall) and 3rd round pick (78th overall).
Roster changes
* August 2: Released WR Brandon LaFell after two seasons with the team.
* August 19: Released S George Iloka, who started every game the past two seasons. Iloka spent his first six years in the league with the Bengals.
* August 24: Terminated the contract of DT Chris Baker, who was signed this past offseason as a free agent.
Schedule
Note: Intra-division opponents are in bold text.
Week 1: at Indianapolis Colts
The Bengals opened the 2018 NFL season in Indianapolis. After trading field goals in the first quarter, the Colts took the lead on Andrew Luck's first touchdown pass since Week 17 of the 2016 NFL season to TE Eric Ebron. After Indianapolis added another Adam Vinatieri field goal, Cincinnati trailed 13-3 in the second quarter before WR John Ross caught a 3-yard TD pass from Andy Dalton for his first career NFL catch and touchdown. The Colts took a 23-10 lead in the third quarter after a T. Y. Hilton TD catch, but the Bengals went on to score 17 unanswered points, including touchdowns by A. J. Green and Joe Mixon, and held a 27-23 lead with less than four minutes to go in the fourth quarter. Bengals safety Shawn Williams was ejected earlier in the game on an unnecessary roughness call for a helmet-to-helmet hit on Andrew Luck and was replaced in the secondary by Clayton Fejedelem. With the Colts driving to win the game late in the fourth, Fejedelem hit Colts TE Jack Doyle forcing a fumble and returned it 83-yards for a touchdown, sealing the victory for the Bengals.
Week 2: vs. Baltimore Ravens
The Bengals played their division rival, the Baltimore Ravens, in their home opener on Thursday Night Football and started the night on fire. WR A. J. Green caught three touchdown passes in the first half to give the Bengals an early 21-0 lead. Dalton added another touchdown pass to WR Tyler Boyd, but the Ravens closed the cap with TE Mark Andrews hauling in a Joe Flacco touchdown pass to cut the Ravens deficit to 14 at halftime. After a Justin Tucker field goal closed the gap even further in the third quarter, Ravens WR John Brown caught a 21-yard touchdown pass from Flacco to get the Ravens within five with less than 10 minutes to go in the game. Cincinnati tacked on a field goal to increase the lead to eight with just under three minutes to go in the game. With the Ravens trying to tie the game, Bengals safety Shawn Williams got a strip-sack on Flacco and the Bengals recovered the fumble. Cincinnati added a 40-yard field goal by Randy Bullock to put the game out of reach and start the season 2-0 for the first time since 2015.
Week 3: at Carolina Panthers
The Bengals faced the Panthers in their second road game of the season and took an early lead on a Giovani Bernard TD run, but the Panthers answered back with a Cam Newton TD run. Later in the first quarter Andy Dalton threw his first interception of the day, a pass intended for John Ross, but it was intercepted by Donte Jackson. In the second quarter, WR Devin Funchess and RB C. J. Anderson both caught TD passes from Newton and Carolina took a 21–14 lead into the half. In the third, Dalton was picked off again by Efe Obada and a second Newton TD run extended the Panthers lead to 14. Cincinnati soon followed with a TD by WR Tyler Boyd decreasing the Panthers' lead to seven. With less than four minutes to go in the game, another Dalton pass intended for Ross was once again intercepted by Jackson. A Graham Gano field goal made the score 31–21 and in the last few seconds of the game Dalton threw a pass intended for Tyler Eifert in the end zone, but was picked by Luke Kuechly for Dalton's fourth interception of the game. The loss drops the Bengals to 2–1.
Week 4: at Atlanta Falcons
For the second-straight week, the Bengals were on the road against an opponent from the NFC South, the Atlanta Falcons. The scoring started early as Falcons rookie RB Ito Smith scored his first NFL TD on the opening possession of the game. The Bengals started scoring some points of their own in the first quarter with a 15-yard TD pass from Andy Dalton to Tyler Eifert and a Giovani Bernard TD run to give the Bengals a 14–7 lead after one. Points continued to be put on the board in the second quarter with TE Logan Paulsen hauling in a TD pass from Matt Ryan, but Cincinnati answered quickly with John Ross' second TD of the season. Matt Ryan's second TD pass of the game to Calvin Ridley tied the game and the Bengals quickly regained the lead on Giovani Bernard's second TD run. Atlanta was able to get in field goal range at the end of the half and Matt Bryant kicked a 55-yard field goal to put the score at 28–24 in favor of the Bengals. The scoring slowed in the third quarter with a 28-yard Matt Bryant field goal being the only points added to the scoreboard, but the Bengals lost TE Tyler Eifert to a broken ankle. With the Bengals holding a 28–27 lead going into the fourth quarter, WR Calvin Ridley scored his second TD of the game to finally give the Falcons the lead, 33–28. Cincinnati and Atlanta then traded field goals to give the Falcons a 36–31 advantage with just over four minutes to go in the game. QB Andy Dalton led a 16 play, 75-yard drive, including two conversions on fourth down, that ended with a 13-yard TD pass to A. J. Green with seven seconds remaining on the clock. The Bengals failed on their two-point conversion, but kept the Falcons from scoring in the final seconds to improve to 3–1.
Week 5: vs. Miami Dolphins
In the first Sunday home game of the season, the Bengals (3–1) took on the Miami Dolphins (3–1) and the first score of the game didn't come until midway through the second quarter. A Kenyan Drake TD catch from Ryan Tannehill gave the Dolphins a 7–0 lead and then a punt return by Jakeem Grant put the Dolphins up 14–0 at the half. The Bengals and Dolphins traded field goals in the third quarter as Miami took a 17–3 lead into the fourth quarter. The Bengals cut the deficit to 7 after Joe Mixon caught a TD pass from QB Andy Dalton, who threw the ball up as he was being sacked. Then the Bengals defense took over with DE Michael Johnson intercepting a Ryan Tannehill pass, one that hit his own offensive lineman, and took it 22-yards for a TD. After a Randy Bullock field goal and with the Bengals leading 20–17, DE Carlos Dunlap had a strip-sack on Tannehill and the fumble was recovered by rookie DE Sam Hubbard, who returned 19-yards for a TD. The Bengals would hold on to win 27–17 and remain in first place in the AFC North with a 4–1 record.
Week 6: vs. Pittsburgh Steelers
After scoring 27 unanswered points to get the win last week, the Bengals hosted the arch rival Pittsburgh Steelers for the first of two meeting this season. The Bengals scored first when Andy Dalton found Tyler Boyd on a 2-yard pass to make it 7–0 for the only points of the first quarter. In the second quarter, the Steelers took the lead when James Conner ran for two 1-yard touchdowns to make it 7–7 and then 14–7. The Bengals managed to tie the game up at halftime when Dalton found Boyd again on a 14-yard pass to make it 14–14. In the third quarter, the Steelers regained the lead when Chris Boswell kicked a 21-yard field goal to make it 17–14. The Steelers would increase their lead in the fourth quarter when Boswell kicked another field goal from 24 yards out to make it 20–14. The Bengals drove down the field and took the lead when Joe Mixon ran for a 4-yard touchdown to make it 21–20 with just over a minute to go in the game. The Steelers completed the comeback though when Ben Roethlisberger found Antonio Brown on a 31-yard pass (with a successful 2-point conversion) to make the final score 28–21. The Bengals fall to 4–2 and are now tied with the Baltimore Ravens for the AFC North lead. The Steelers now sit only a half game back.
Week 7: at Kansas City Chiefs
NBC flexed this game from 1:00 pm. ET to primetime Sunday night and the Bengals came in with just a 1–8 record on Sunday Night under head coach Marvin Lewis. Kansas City took their opening drive 95-yards ending with a Kareem Hunt TD catch from QB Patrick Mahomes. Mahomes found Hunt again at the start of the second quarter to give the Chiefs a 14–0 lead. Andy Dalton and the Bengals responded with a 77-yard drive that ended with a TD catch by TE C. J. Uzomah. The Bengals defense continued to struggle in stopping the Chiefs explosive offense though and Kansas City scored 10 more points to take a 24–7 lead at halftime. The Bengals deficit grew in the third quarter with Kareem Hunt rushing for a TD and then Dalton threw a pick-six on the Bengals first offensive play of the second half to put the Chiefs ahead 38–7. Randy Bullock added a field goal to cut the deficit to 28, but Tyreek Hill's TD catch at the beginning of the fourth quarter put the Chiefs back up 35 where the score stood for the rest of the game. The Cincinnati defense gave up a season high 45 points and 551-yards of offense as the Bengals fell out of first place in the AFC North. Cincinnati is now 1–9 on Sunday night under Lewis while falling to 4-3 on the season.
Week 8: vs. Tampa Bay Buccaneers
The Bengals started off strong with two TD runs by Joe Mixon and a TD catch from Tyler Boyd to go up 21–0 with just over five minutes to go in the second quarter. The Bucs answered with a 60-yard pass to DeSean Jackson, but the Bengals answered right back with a 17–yard pass to A. J. Green. Tampa Bay added a field goal at the end of the half to trail 27–9. After Bucs QB Jameis Winston threw his fourth interception of the game, which was returned 21-yards for a TD by Jessie Bates, he was benched and Ryan Fitzpatrick took over for Tampa Bay. Fitzpatrick would orchestrate an 18-point comeback by leading drives that ended in a field goal and TD passes to Mike Evans and O.J. Howard. Fitzpatrick then connected with Chris Godwin on a two-point conversion to tie the game at 34 with 1:05 remaining on the clock. Andy Dalton lead an eight play, 50-yard drive that ended with a 44-yard field goal by Randy Bullock as time expired to win the game for the Bengals. Having held on for the victory, the Bengals have now recorded at least one victory at Paul Brown Stadium against each of the 31 other franchises.
The team improved to 5-3 as they head into their bye week.
Week 10: vs. New Orleans Saints
After a tough win at home over the Bucs, the Bengals stayed home for a game against the Saints. In the first quarter, the Saints score first when Drew Brees found Michael Thomas a 7-yard pass to make it 7-0. The Bengals would tie it up as Andy Dalton found John Ross on a 2-yard pass to make it 7-7. In the second quarter, the Saints' offense exploded as they scored 4 touchdowns: Brees found Mark Ingram II on a 28-yard pass. This would be followed up by Alvin Kamara running for 2 touchdowns: from 4 and 1 yards out. Finally, Brees found Thomas again on a 17-yard pass to make it 14-7, 21-7, 28-7, and then 35-7 at halftime. In the third quarter, the Saints continued to dominate as Wil Lutz kicked a 29-yard field goal to make it 38-7. This would be followed by Brees running for a 1-yard touchdown to make it 45-7. Lutz then put up 2 more field goals in the fourth quarter from 42 and 41 yards out to make it 48-7 and then 51-7. The Bengals scored later on in the quarter when backup QB Jeff Driskel ran for a 27-yard touchdown to make the final score 51-14.
With the loss, the Bengals fell to 5-4.
Week 11: at Baltimore Ravens
After a horrifying loss at home, the Bengals traveled to Baltimore for Game 2 against the Ravens. In the first quarter, the Ravens made it 7-0 after Alex Collins ran for a 7-yard touchdown for the only score. The Bengals however would tie the game up in the second quarter when Joe Mixon ran for a 1-yard touchdown to make it 7-7. Justin Tucker would give his Ravens the lead back when he scored 2 field goals from 28 and 56 yards out to make it 10-7 and then 13-7 at halftime. In the third quarter, the Bengals retook the lead when Andy Dalton found Matt Lengel on a 4-yard pass to make it 14-13. They would increase their lead when Dalton threw another pass: A 22-yard pass to John Ross to make it 21-13. The Ravens however, managed to tie the game back up when Gus Edwards ran for an 11-yard touchdown (with a successful 2-point conversion) to make it 21-21. In the fourth quarter, Tucker kicked his third field goal of the day: A 24-yard field goal to make it 24-21. After that, the Ravens' defense was able to shut down the Bengals' offense and the Ravens held on for the win.
With the loss, the Bengals fell to 5-5.
Week 12: vs. Cleveland Browns
With their 7-game winning streak against the Browns snapped, the Bengals fell to 5-6. Making matters worse, quarterback Andy Dalton was injured in the third quarter after be tried to recover a fumble. Despite trailing 35-7 in the third quarter, the Bengals made it interesting late, but could not complete the comeback under backup Jeff Driskel. It was later revealed that Dalton would miss the remainder of the season with a broken thumb, ironically the same thumb he broke a few years earlier.
Week 13: vs. Denver Broncos
With the loss, the Bengals fell to 5-7. Making matters even worse than the week before, star receiver AJ Green was injured in the second quarter and had to be helped off by a cart. He was seen later slamming his helmet to the ground and screaming. It was later revealed that he would miss the rest of the season with a broken toe.
Week 14: at Los Angeles Chargers
With the loss, the Bengals dropped to 5-8. The team is also guaranteed their third straight non-winning season. They would 3-peat this process for the first time since the 2006-08 seasons.
Week 15: vs. Oakland Raiders
With the win, the Bengals improved to 6-8. This was Marvin Lewis's last win with the team. Despite leading 17-0 at one time, the Raiders continued to hang around, but were hurt by turnovers and drops. Despite the win, a Tennessee Titans win over the Washington Redskins eliminated the Bengals from playoff contention
Week 16: at Cleveland Browns
With the loss, the Bengals dropped to 6-9 assuring them last place in the AFC North. The team also posted 3 consecutive losing seasons for the first time since the 2000-02 seasons. They were also swept by the Browns for the first time since 2002. The loss also assured that the team would finish last in the AFC North.
Week 17: at Pittsburgh Steelers
With the loss, the Bengals finished their year with a record of 6-10. In Marvin Lewis's last game with the team, the Bengals lost a sluggish game to the Steelers, their 8th straight loss in the rivalry. Despite taking a 10-0 lead in the second quarter, the Steelers went on a 16-3 run to finish the game. | WIKI |
Page:United States Statutes at Large Volume 34 Part 1.djvu/1321
FIFTY-NINTH CONGRESS. Sess. II. Ch. 2914. 1907. 129] Navy Department hereinafter stated, the same being in full for, and the receipt of the same to be taken and accepted in each case as a full and tina] release and discharge of the respective claims, namely: (1) To reimburse Passed Assistant Paymaster Henry de F. Mel the H¤¤rs de F- Melamount paid by him for an ash lighter lost while in the service of the Government and checked against his accounts, thirty dollars. (2) To reimburse the American consul—general at Rio de Janeiro, A¤¤¤{l¤¤¤ .¤<>¤=·¤!- Brazil, the amount expended by him in assisting a supposed deserter gmm ’ Bum from the Navy to return to the United States for the purpose of snrrendering to the naval authorities, thirty-two dollars and sixty-three cents. · (3) To pay for services rendered and for expenses incurred b Dvwdsiif Hanson. Dowdall, anson, and McNeill, of Shanghai, China, in connection with and M°N° u` proceedings in admiralty in the collision cases of the United States · naval collier Saturn against the British shi N ewchwan g and the United States ship Wilmington against the British tug Rocket, two thousand and fifteen dollars and forty-five cents. (4) To pay to Wontner and Sons, of London, England, expenses W0¤¢¤¤r¤¤d Som. incurred an for services rendered inlconnection with the appeal to ‘ the privy council at London in the collision case of the Saturn against the Newchwang, four hundred and seventy-one dollars and sixty cents. ' (5) To ay the costs of the defendant in the suit of the Saturn against ··s¤mn-nr i-. ··xewthe Newchwang, four hundred and thirty-two dollars and eight cents. °§,,‘§‘,§Ei;,€¤d,ngsu,,_ (6) To pay to William Gresham the value of a dory wrecked in a wiummemnam. collision with a ferry launch at the navy-yard, Portsmouth, New Hampshire, twelve dollars. (7) To compensate George A. 'Strong for in'uries to his landing can-gsA.s:m¤g. stage and boats at the western end of Fox 1slan<i'l‘horoughfare by the pmsing of a torpedo boat at high speed, fifty dollars. (8)o pay to the owner o the schooner yacht Clytie the actual Y•¤M "¤1y¤i¤.” expense o repairing damages sustained in a collision with the United States steamer Winslow, one thousand eight hundred and ninety-four dollars and twenty cents. (9) To compensate the New York and New Jersey Transportation ,g;W{gj_¤¤ga!jev Company for detention to the boat Shamrock while repairing damage comgmy. `P° mu sustained in a collision with the United States naval collier Leonidas, sixty-tive dollars. (10) To reimburse Rittenhouse Moore for time lost in executing Rmsnnsnse trims. his contract with the War Department for dred rin in the Potomac ’ River, on account of practice firing at Indian Hind; proving ground, four hundred dollars and fifty cents. (11) To reimburse Paymaster Dexter Tiffany, junior, the amount D°’“’°"T‘"*"*>'-i*· paid for injuries to a pilot boat by the tug Rapido in a collision with the steamer Union, forty-six dollars and forty cents. (12) To pay to the Panama Railroad Company the cost of making C,f;;:,'j{,f R*'“’°**‘* good the damage to two pontoons, nine hundred and forty-nine dollars ` and seventy-four cents. (13) To reimburse the owner of the schooner yacht Crusader the Y'“’*""C’“’°"°'-" actual cost of repairs necessitated by a collision with a naval ferry launch in Newport Harbor, thirty-six dollars and eighty-six cents. (14) To pay the value of a yawl belonging to the schooner General L§§,*‘§‘;‘;j,;_,“IG*“°”l Levi Harris, destroyed in a collision with a naval ferry launch at the navy-yard, Norfolk, Virginia, thirty dollars. (15) To reimburse Vllalter C. Strung the actual cost of repairs to his “'““°' C- S"“”€· launch Cu id, made necessarp by being damaged bya stern wave from the United) States steamer O’ rien, forty-two dollars and fifty cents. (16) To pay to Cornelius B. Smith the cost of repairs to his wharf C°'¤°““S B- S’¤”h· and boat which were damaged by a stern wave from the United States steamer Decatur-, twenty-six dollars. (17 ) To allow in the accounts of Pay Director Eustace B. Rogers, E“m°°B-R°€°¤‘~ while fleet paymaster of the Asiatic Fleet, the amount paid for repairs | WIKI |
Table of Contents
Preferences
Profiles > Advanced
Triggers
Triggers are actions that are performed when text matching a regular expression is received. Each trigger has a regular expression, which defines when it runs. It has an action, which defines what it performs, and it has an optional parameter, whose meaning depends on the action. When the parameter is textual, \0 is replaced with the entire match, and \1...\9 are replaced with match groups. Each trigger has a checkbox in the "Instant" column. Instant triggers run as soon as text matching the regular expression is matched; triggers that are not instant only match after the cursor moves off the current line (such as whena newline is received).
Full details can be found at Triggers.
Semantic History
Semantic history is used to open a file when you Cmd-Click on it. The current working directory for each line in the terminal is tracked to help find files. If Semantic History is set to "Open with default app," then files are passed to the OS to be opened with whatever is associated. Alternatively, you can choose "Open URL..." to open a specific URL (with \1 replaced with the filename and \2 replaced with the line number, if applicable). If you choose "Open with editor..." then text files will be opened with the designated editor, while other files are opened with the default app for their file type. For more flexibility, choose "Run command..." and specify a command to execute. \1 will be replaced with the file name, \2 will be replaced with the line number (if applicable), \3 with text in the line prior to the click location, \4 with text in the line subsequent to the click location, and \5 for the working directory of the line clicked on. Finally, "Always run command..." is like "Run command...," but takes effect even if the object clicked on is not an existing filename.
Automatic Profile Switching
You can specify rules that, when satisified, changes any session's profile to this one. See Automatic Profile Switching for all the details. | ESSENTIALAI-STEM |
Talk:Flyscooters
Merge proposal
Proposing to merge Flyscooters Il Bello and Flyscooters La Vie here as the individual products don't warrant their own pages. Klbrain (talk) 10:49, 2 October 2019 (UTC)
* Merge — WP:PRODUCT supports nominator's rationale: "If a non-notable product or service has its own article, be bold and merge it into an article with a broader scope". --Dennis Bratland (talk) 17:45, 2 October 2019 (UTC)
* ✅ Klbrain (talk) 19:33, 9 September 2020 (UTC) | WIKI |
Computational investigations of ion conduction mechanisms using enhanced sampling methods
Ceccarini, Luisa (2011) Computational investigations of ion conduction mechanisms using enhanced sampling methods, [Dissertation thesis], Alma Mater Studiorum Università di Bologna. Dottorato di ricerca in Scienze farmaceutiche, 23 Ciclo.
Documenti full-text disponibili:
[img] Documento PDF (English) - Accesso riservato - Richiede un lettore di PDF come Xpdf o Adobe Acrobat Reader
Download (15MB)
Abstract
Proper ion channels’ functioning is a prerequisite for a normal cell and disorders involving ion channels, or channelopathies, underlie many human diseases. Long QT syndromes (LQTS) for example may arise from the malfunctioning of hERG channel, caused either by the binding of drugs or mutations in HERG gene. In the first part of this thesis I present a framework to investigate the mechanism of ion conduction through hERG channel. The free energy profile governing the elementary steps of ion translocation in the pore was computed by means of umbrella sampling simulations. Compared to previous studies, we detected a different dynamic behavior: according to our data hERG is more likely to mediate a conduction mechanism which has been referred to as “single-vacancy-like” by Roux and coworkers (2001), rather then a “knock-on” mechanism. The same protocol was applied to a model of hERG presenting the Gly628Ser mutation, found to be cause of congenital LQTS. The results provided interesting insights about the reason of the malfunctioning of the mutant channel. Since they have critical functions in viruses’ life cycle, viral ion channels, such as M2 proton channel, are considered attractive targets for antiviral therapy. A deep knowledge of the mechanisms that the virus employs to survive in the host cell is of primary importance in the identification of new antiviral strategies. In the second part of this thesis I shed light on the role that M2 plays in the control of electrical potential inside the virus, being the charge equilibration a condition required to allow proton influx. The ion conduction through M2 was simulated using metadynamics technique. Based on our results we suggest that a potential anion-mediated cation-proton exchange, as well as a direct anion-proton exchange could both contribute to explain the activity of the M2 channel.
Abstract
Tipologia del documento
Tesi di dottorato
Autore
Ceccarini, Luisa
Supervisore
Co-supervisore
Dottorato di ricerca
Scuola di dottorato
Scienze chimiche
Ciclo
23
Coordinatore
Settore disciplinare
Settore concorsuale
Parole chiave
hERG M2 molecular dynamics umbrella sampling metadynamics
URN:NBN
Data di discussione
12 Aprile 2011
URI
Altri metadati
Gestione del documento: Visualizza la tesi
^ | ESSENTIALAI-STEM |
User:Dhanan/sandbox
Mikel Guillen is a Canadian film director, screenwriter, producer, and cinematographer, based in Toronto.
Guillen's films typically involves themes relating to melancholia, sadness, poetry, anonymity, isolation, nostalgia, displacement, identity, spirituality, minimalism, and mysticism.
He is involved in the remodernist film movement, which includes “Ascending”, a film Guillen co-directed alongside Nick Block.
Influential avant-garde filmmaker and critic R. Bruce Elder said about Ascending: “The austerity is extremely elegant and the cinematography astonishing, many of the images were reduced to a stern, minimal architecture”.
//In 2015, Guillen co-founded an avant-garde film collective titled “ANTE RADIX ITER”, with Scott Barely, Jesse Richards, Andrés Arce Maldonado and Camelia Mirescu.
Filmography
* La Musique Interne (2008)
* Sangria (2009)
* The Pirate Tapes (2011)
* Ascending (2012)
* Soutenir F (2013)
* The Natural State (2014)
* La Savoir Faire de Nobody (2014)
* I deserve (2015)
* The Sadness of the Trees (1994) | WIKI |
Add Source Repo Providers
Updated 1 month ago by Michael Cretzman
You can add one or more Git repositories (Github, Bitbucket, GitLab, etc) as Source Repo Providers in Harness. Once added, a Git repo can be used to sync your Harness account and applications with your repo. Next, any changes you make in your repo or in Harness are automatically synched.
You can use multiple repositories. You can sync the Harness account-level to one repo or branch, and sync each Harness application with its own repo or branch.
For information about using Git repos to perform GitOps with Harness, see Configuration as Code (GitOps). For information on triggering Harness workflows and pipelines using Git Webhooks, see Add a Trigger.
This topic covers the following:
Harness Sync Options
Here are the options for syncing Harness with your repos:
• One Harness application can be on one repo/branch.
• Multiple Harness applications can be on one repo, all in one branch, or each application in its own branch.
• A Harness application cannot be in multiple repos.
• When you create a new Harness application, you can choose to sync it with a repo.
• If you create a new Harness application in a synched repo (by adding the required files and folders), Harness will sync and add the new Harness application.
• If you move a synched Harness application from one repo to a new repo, Harness will accept changes from the new repo only.
• Admins that want access to all synched Harness applications in the repo must have an admin account in the Git repo that contains all the applications.
For information about synching scenarios, see Sync Scenarios Overview.
Add a Source Repo Provider
Before Harness syncs with your Git repo it will confirm that all Harness' settings are in a valid state. If a connection is not working, such as a connection to an Artifact Server or Cloud Provider, Harness will not sync with your Git repo.
To add a source repo, do the following:
1. Click Setup.
2. Click Connectors.
3. Click Source Repo Providers, and then click Add Source Repo Provider. The Git Connector dialog appears.
4. Fill out the Git Connector dialog and click SUBMIT. The Git Connector dialog has the following fields.
Field
Description
Name
Enter a name for the repo connection. This is the name you will select when you sync your Harness account and applications in Configuration as Code.
You could create a Source Repo Provider for the Harness admin account, such as Admin_GitLab. Later, you can create a Source Repo account for each Harness user, such as J_User_GitLab.
HTTPS/SSH
Select HTTPS or SSH for the connection. You will need to provide the protocol-relevant URL in URL.
If you use Two-Factor Authentication for your Git repo, connect over HTTS or SSH.
For SSH, ensure that the key is not OpenSSH, but rather RSA or another algorithm.
If you log into Bitbucket using a Google account, you can create an application password in Bitbucket to use with Harness. For steps on this, see App passwords from Atlassian.
To sync with GitLab, you will need to generate a SSH key pair and add the SSH key to your GitLab account. For more information, see Generating a new SSH key pair from GitLab.
URL
Enter the URL for your Git repo. Ensure it matches the option you selected in HTTPS/SSH.
Username and Password/Token
Enter the credentials for the repo user account.
If you have set up Two Factor Authentication in your Git repo, then you need to generate a personal access token in your repo and enter that token in the Password/Token field. In Github, you can set up the personal access token at https://github.com/settings/tokens/new.
SSH Key
If you selected SSH as the connection protocol, you must add the SSH Key for use with the connection. If you added a key in Harness Secrets Management, you can select it here. For more information, see Secrets Management.
To add a new key, click the drop-down and select Add New SSH Key. The SSH Configuration dialog appears.
In User Name, for GitHub, Bitbucket, and GitLab connections, enter git. Ensure it is lowercase and do not use any other name.
git is the only value you should use in User Name when adding an SSH key for GitHub, Bitbucket, and GitLab.
For AWS CodeCommit, in User Name, enter the SSH Key ID that was generated when you uploaded your SSH public key to CodeCommit.
In Credentials, paste in the key or key file path, enter a display name, and then click SUBMIT.
Branch Name
Enter the branch name to sync with Harness, such as master, dev, or myAppName. Do not enter the full URL to the branch.
Generate Webhook URL
Enable this checkbox if you want to sync Harness with your repo bidirectionally. Changes made on either end will be synched. If you simply want Harness changes synched unidirectionally with the repo, disable this checkbox.
When you use this Source Repo Provider to sync a Harness application to a repo bidirectionally, any account or application that uses this Source Repo provider will be synched bidirectionally. For more information, see Configuration as Code (GitOps).
Customize Commit Attributes (Git Sync Only)
When Harness commits or push a change to Git as part of synching, it uses Harness.io and support@harness.io as the author and commit email address of that commit.
In some cases, you might have strong pre-commit limitations on who may or may not commit. In that case, you need to provide an author name and email that is approved to push on that repo.
You can add an Author Name and Author Email address that will be applied whenever a synch with the Git repo is made by Harness.
Usage Scope
If you want to restrict the use of a provider to specific applications and environments, do the following:
In Usage Scope, click the drop-down under Applications, and click the name of the application.
In Environments, click the name of the environment.
Using the Webhook
If you selected the Generate Webhook URL option when adding your Source Repo Provider, the Generated Webhook URL dialog appears. Copy the URL and use it in your repo to enable your repo to sync changes to Harness.
GitHub
Modify the Content type to application/json and use the Just the push event trigger option:
Bitbucket
Use the Repository push event trigger.
For information on Bitbucket Webhooks, see Manage webhooks from Bitbucket.
Bitbucket Post Webhooks Plugin
Webhooks do not work with older versions of Bitbucket. You need to install the Post Webhooks for Bitbucket plugin in Bitbucket to enable Harness to allow two-way sync with Bitbucket.
If you are using a locally-hosted BitBucket server and a different Webhooks plugin, the push event payload sent to Harness is different than the Post Webhooks for Bitbucket plugin, and this payload can cause issues. Ensure that you install the Post Webhooks for Bitbucket plugin. The Post Webhooks for Bitbucket plugin will send the push event payload in a format Harness can use.
GitLab
Use the Push events trigger.
Next Steps
Once a Source Repo Provider is set up, you can use it at the Harness account-level and application-level to sync your account and/or applications with your Git repo. For more information, see Configuration as Code.
How did we do? | ESSENTIALAI-STEM |
Chicago Tribune: Chicago breaking news, sports, business, entertainment, weather and traffic - Chicago Tribune
President Barack Obama on Tuesday commuted the sentence of Oscar Lopez Rivera, who was serving 70 years in prison for his role in an organization that plotted bombings, prison escapes and armed robberies in an effort to secure independence for Puerto Rico. President Barack Obama commuted the sentence of Oscar Lopez Rivera, who was serving 70 years in prison for his role in FALN, an organization that plotted bombings, prison escapes and armed robberies in an effort to secure independence for Puerto Rico. Stereotypes about women in sports lead to a don&apost-ask-don&apost-tell atmosphere that keeps many closeted, coaches and advocates told the Tribune. Ehab Qasem said he paused briefly while holding a metal baseball bat in the hallway of Palos Park residents John Granat Sr. and his wife, Maria Granat&aposs home. Christopher Wyma, who was standing next to Qasem, sensed the hesitation and started slapping him on the back of the neck. Michael Keaton, Nick Offerman and John Carroll Lynch star in The Founder. Michael Keaton, Nick Offerman and John Carroll Lynch star in The Founder. The Founder, an intriguing, skeptical biopic, portrays Ray Kroc -- widely admired today as a business genius with vision -- as a man with a ruthless streak and the legal wherewithal to kick the real founders to the curb. The U.S. and Russia, still massively armed with nuclear weapons, will soon be led by men unschooled in the nuclear realities of the Cold War. Worse, both Vladimir Putin and Donald Trump are nationalistic, often impulsive, taken to acting first and thinking later. Short for compromising material in Russian, kompromat is the intersection of news and blackmail. It&aposs the ability to sully the reputations of political opponents or pressure allies through images, videos, promises of disclosures, perhaps even some high-quality faked documentation. Gutless. How else is the Illinois General Assembly to be described when it allowed Michael Madigan to remain in control of the General Assembly? I cannot possibly state strongly enough how dangerous it is that President-elect Donald Trump has embraced the notion that vaccination is the cause of autism. Refreshingly, the best player in Mavericks franchise history remains one of its humblest. By the end of Tuesday night&aposs taut meeting at the United Center, a Marquette alumni game had broken out. When it ended, one beat two. Wesley Matthews&apos 3-pointer with 11.7 seconds left off a defensive breakdown gave the Mavericks a 99-98 victory over the Bulls, who were swept in the two-game season... The revolving door at left wing on the Blackhawks&apos top line has been spinning all season as coach Joel Quenneville continues to search for a complement for center Jonathan Toews and Marian Hossa. With the Hawks offense lagging of late including scoring slumps for both Toews and Hossa and a... Chris Bosio&aposs list of chores start with getting acclimated with veteran newcomers Wade Davis and Koji Uehara, who have plenty of postseason experience but were plagued by injuries last season. Boeing Chief Executive Officer Dennis Muilenburg said he made some great progress in face-to-face talks with Donald Trump on the president-elect&aposs demand to hold down costs on the next-generation version of Air Force One. Through an agreement announced Tuesday with publicly traded Cardtronics, Citi will take over ATMs at about 1,000 Walgreens and Duane Reade drugstores in markets that include Chicago and New York City. If you&aposre looking for someone to feel sorry for, consider the state&aposs richest man, Ken Griffin. The flagship fund at the gazillionaire&aposs hedge fund firm, Citadel, recorded its worst results in eight years in 2016, according to trade rag Institutional Investor&aposs Alpha. Citadel&aposs Wellington fund... Margo Georgiadis ⇒, a Google executive with strong ties to Chicago, will take over as CEO of toymaker Mattel on Feb. 8, the company announced Tuesday. Her digital experience could help the company dive further into interactive toys, an industry watcher said. Georgiadis had been serving as Google&aposs... Move over, Berlin. Take a number, Vienna. The Chicago Symphony Orchestra was in town over the weekend, pushing those other bands to the side as it matched its storied musical prowess against the architectural majesty of the Elbphilharmonie, the newest of the world&aposs elite classical music performance... Stop by the movie theater this awards season and you might wonder exactly what decade we're living in. From Fences to Hidden Figures, The Founder to Loving and even on some level 20th Century Women the mid- to late-20th century remains compelling turf to filmmakers. Consider the number... At first, most inmates at the Lake County Adult Corrections Facility were watching the Packers-Cowboys game. Only a few had wandered over to another TV, where a performance of Too Hot to Handel: The Jazz-Gospel Messiah was being live-streamed from the Auditorium Theatre to the jail in downtown... Spoilers ahead Some dreams come to an end. New Trier High School grad Elizabeth Whitelaw was sent home on Monday&aposs episode of The Bachelor after she failed to secure a rose from Nick Viall during the rose ceremony. You&aposre gonna do great, Whitelaw told Viall in her exit. Whitelaw, a marketing... Thousands of people apply annually to be on the Disney Parks Moms Panel, a hand-picked group of diverse, die-hard Disney fans not all of them moms who help others plan Disney vacations by answering questions and offering tips online (www.disneyparksmomspanel.com). Beth Shea of Vernon Hills... Step through the revolving front door at Next Apartments, and you&aposll likely be greeted by the official house dog, Daisy. She&aposs a sweet-natured Newfoundland, and her job is to welcome visitors and residents, give kisses and generally be adorable. Next is a new luxury rental community at 347 W.... Five years ago, Barrington native Veronica Roth gained instant fame when Divergent, her debut young-adult novel, hit the best-seller lists. Two more books followed, and at last count the trilogy has sold a whopping 35 million copies, according to Roth&aposs publisher. The three movies based on the... The new year is often about losing weight, finally taking a meditation class or perhaps launching a new job search but here's a resolution to add, compliments of David Musicant find miracles in the worst moments. The 51-year-old Franklin Lakes, N.J., man is an admitted Type A, nailing it in private... Some Uber riders can now use pre-tax dollars to pay for carpool rides in Chicago. The ride-hailing company said Wednesday it has expanded a program that allows riders to use commuter benefits debit cards for UberPool rides, which arranges rides with other passengers going in the same direction... Late last year, just in time for Christmas shopping, Rachel Rhoads got a nice surprise. One of her secret savings accounts had grown to $900 behind her back. Rhoads, a 37-year-old Los Angeles-based sales director for a jewelry line, has an account with Digit, a financial technology company with... Nintendo has finally raised the curtain on the Nintendo Switch, its first console since 2012, and set out an ambitious vision for how home and mobile gaming could blend in the future. These are the basics: The console will be $300, about $50 pricier than expected, and comes with two motion-sensitive... All around the National Mall, what look like strange, giant meatballs or cheese wheels on a stick have been mysteriously cropping up. Fenced in and padlocked, these towering structures might easily be confused for spy equipment or extra security perhaps not a bad guess for a city that&aposs among... Jay Cutler was able to get away to Mexico last week to celebrate his wife&aposs 30th birthday, but the Bears quarterback couldn&apost escape criticism as some social media users slammed his vacation body. He looks so flabby, one Instagram user commented on a picture of Cutler, wearing a Nike tank top... At one point referring to Nicholette Lawrence as a monster mom, a Lake County Circuit Court judge sentenced her to 43 years in prison Tuesday for the murder of her 11-year-old daughter, Raashanai Coley. Raashanai was found emaciated and dead in her Waukegan home after Lawrence called police to... One moment, Jayson Thomas was on the Oregon beach with his 3-year-old son. The next, they were gone, swept away by a sneaker wave as his wife looked on. The man and his boy were but the latest to be lost to a sneaker wave, which are prevalent in the Pacific Northwest. A leading expert says there... A former contestant on the reality show The Apprentice filed a defamation lawsuit Tuesday against President-elect Donald Trump over his response to her allegations that he groped her during a job interview in 2007. Summer Zervos, a California restaurant owner who appeared on the show in 2006,... I was stunned not so much by what Republican President-elect Donald Trump just said about health care as by when he said it. For virtually his entire presidential campaign, Trump spewed airy, grandiose promises about his plans for replacing Obamacare (the Affordable Care Act) with something cheaper... A key reason the Republican Party is having such a hard time with the replacement part of repeal and replace is that Obamacare is virtually the same privatized mandate plan it pushed for since President Richard Nixon first proposed the National Health Strategy in 1971 then again in 1974. Then... Hamilton creator Lin-Manuel Miranda said he was sobbing with gratitude about the news that President Obama commuted the sentence of Puerto Rican nationalist Oscar Lopez Rivera and said he would play Alexander Hamilton at a Chicago performance for Lopez Rivera. I wish I was with every Puerto... A 5-year-old girl accidentally shot herself in the abdomen on the West Side on Tuesday evening, police said. The shooting occurred inside a house in the 3700 block of West Ferdinand Street in East Garfield Park about 8:05 p.m. The girl accidentally shot herself with a handgun and was taken by her... The picture of Chicago in much of the country and even in much of the Chicago area is a city awash in blood amid a surge in murder and other violent crime. Is this a war-torn country? asked candidate Donald Trump during a debate in September. Though the president-elect is famously prone to... Democrats attacked Betsy DeVos, President-elect Donald Trump&aposs education nominee, calling her unfit for the job during a contentious confirmation hearing Tuesday evening, while Republicans defended her as a bold reformer who would disrupt the status quo in U.S. education. DeVos told skeptical senators... President Vladimir Putin took a parting shot at the Obama administration Tuesday, accusing it of trying to undermine Donald Trump&aposs legitimacy with fake allegations and binding the president-elect hand and foot to prevent him from fulfilling his election promises. In his first public remarks... Standing before parishioners in his historic Joliet church, the Rev. Peter Jankowski said years of internal conflict had brought him to this difficult moment. In an emotional homily, the parish priest publicly blew the whistle on his diocese for alleged past failures that he said put children at... Holding Puerto Rican flags and Free Oscar Lopez-Rivera signs, dozens of community members and former revolutionaries on Tuesday filled a small Humboldt Park community theater. The impromptu celebration came just hours after President Barack Obama commuted Lopez&apos prison sentence for his role in... In response to your Monday editorial Clemency for Leonard Peltier? Never, I was the United States attorney who supervised the prosecution of Leonard Peltier during the critical post-trial period. In December 2016, I wrote to President Barack Obama to support his clemency petition as being in... Former Chicago police Superintendent Garry McCarthy has been subpoenaed by lawyers handling former U.S. Rep. Jesse Jackson Jr.&aposs divorce from former Ald. Sandi Jackson. Court papers filed late Tuesday demand that McCarthy turn over any emails, text messages, phone records or social media exchanges... In the late 1980s, as the Cold War neared its end, a veteran Cold Warrior reminisced in Chicago about the nuclear button and the thinking of the men who controlled it. It was an insight that holds meaning today. McGeorge Bundy was the national security adviser for Presidents John Kennedy and Lyndon... More than 22,000 people are expected to attend the Women&aposs March on Chicago Saturday, a day forecast to reach the unseasonably high temperature of 57 degrees. The march, set for the day after President-elect Donald Trump&aposs inauguration, will take place in solidarity with the Women&aposs March on Washington,... Ehab Qasem said he paused briefly while holding a metal baseball bat in the darkened hallway outside the bedroom of rural Palos Park residents John Granat Sr. and his wife, Maria Granat. Christopher Wyma, who was standing next to Qasem in the early morning hours of Sept. 11, 2011, and who also... Before Donald Trump establishes himself in the White House, here&aposs hoping he does something huge for American journalism. He&aposs already been a huge boon to journalists, serving as a pinata for thwacks and clicks and fear and clicks and panic and clicks and outrage, shame, clicks and more clicks. But... Courtney Graham said everything was going smoothly with her assistant coaching job with Drake University&aposs women&aposs basketball team. The Bulldogs were building the program, and Graham said she was handling her recruiting and scouting responsibilities well, resulting in bonuses and positive performance... The list of Democrats snubbing President-elect Donald Trump&aposs inauguration continued to grow Tuesday, with several members of the Illinois delegation among about 60 members of the U.S. House who declared their intentions to be elsewhere at noon Friday. Mayor Rahm Emanuel is also skipping the ceremony,... President Barack Obama&aposs decision Tuesday to commute Chelsea Manning&aposs sentence brought fresh attention to another figure involved in the Army leaker&aposs case: Julian Assange. On Twitter last week, Assange&aposs anti-secrecy site WikiLeaks posted, If Obama grants Manning clemency Assange will agree... Outgoing President Barack Obama has lined up a new office and is starting to build a staff as he gets ready to join an exclusive club as the fifth living former president. For months, Obama has made small talk about his future plans, typically describing a trip to the beach and a drink served in... February 15 The first day for clubs to designate franchise or transition players. The Bears could use the franchise tag on receiver Alshon Jeffery for a second straight season, but that would require a guaranteed one-year contract worth $17.52 million. For reference, the highest salary cap hit... Goodness knows: The national tour of Wicked is returning to Chicago for a seven-week engagement during the holiday season at the end of this year, Broadway in Chicago announced Monday. The hit musical will be making its fourth visit to Chicago (one of which lasted for years). As is usual, the... | NEWS-MULTISOURCE |
Talk:Classical music/Archive 10
Technical execution
Article currently reads in part ...technical mastery, as demonstrated by the proportionately high amount of schooling and private study most successful classical musicians have had when compared to "popular" genre musicians...
At best this needs rephrasing and sourcing. What it seems to be saying or at least suggesting is that classical music achieves and/or requires a higher level of technical execution than popular music.
Is this NPOV or even remotely accurate? I'm skeptical. It seems to me to be naive repeating of an urban legend which is widely believed by fans both of classical and of popular music, and which may once have been true (I'm skeptical even of that) but hasn't been true in my lifetime.
Two of the original members of Midnight Oil are known to me personally. The enormous amount of tuition and practice that was required to attain their status in popular music, and the level of technical execution that this produced, was at least equal to that of the classical musicians I know, some of whom are of similar calibre and status in their fields.
And I think this would be generally true. Sydney Conservatorium has had courses in Jazz for some decades. There have been Trinity examinations on drum kit since 2012.
Arguably drum kit is now a classical instrument too. Some years ago I attended a concert given by a friend as part of her masters degree in performance on the flute at Sydney Conservatorium, in the School of Classical Music there of course, and one of the four pieces she performed was scored for flute and three drum kits. So there is some crossover.
But that is not the point. Trinity and the Con are both producing high-calibre popular musicians, and by calibre I include their level of technical execution. And I think this is happening worldwide and across all popular genres, and has been for some time.
Part of the problem is, like all urban legends, there will probably be no trouble finding reliable sources to support this one!
And it's also complicated by the fact that it is part of the publicity machine for some popular acts to portray them as unskilled or semi-skilled. Most Rolling Stones fans would be surprised to learn that drummer Charlie Watts was already an accomplished sight-reader before joining the band. And that was in 1963. His technical skills have never been showcased and discussed in the way that they would be were he an equally ranked classical musician.
And there is a point to be made along those lines. There's a sense in which excellence is always aspired to in classical music, while there's a somewhat different approach in popular music.
But this distinction is far more subtle than our current article would indicate. Currently, what it says is at the very least unsourced and highly POV, and there are some grounds for thinking it's just plain inaccurate. Andrewa (talk) 23:28, 24 February 2014 (UTC)
* Agree that some rephrasing might be in order. But although there are plenty of examples of popular musicians with intensive academic training, it's difficult to argue seriously that that's a necessary qualification for entry into the profession, whereas in classical music it's pretty unavoidable. So there's definitely a difference in the field. It's possible to find 9-year-olds singing "O mio babbino caro" but it's definitely the exception (and note that's a TV show, not really a professional gig), whereas popular musicians without formal training are pretty common. It's a bit strong to call that difference an "urban legend".
* Jazz is a somewhat different kettle of fish, since it's largely made the transition from a popular art form into an academic one. —Wahoofive (talk) 23:36, 24 February 2014 (UTC)
* Thanks for the reply! I'd love to see you have a go at rephrasing the section in question. I don't want to cut the section out, because I can see what they're trying to say and I think it's important. But I am struggling to rephrase it myself.
* I'll accept your claim that Miley Cyrus doesn't have intensive academic training, and her music is not familiar to me. But her father Billy Ray Cyrus shows every sign of having worked just as hard and long on his music as any classically trained musician, and his execution is excellent. So I'd expect his daughter to be the same. I could be wrong.
* Perhaps I should say that, to the despair of several singing teachers and coaches, three of my favourite vocalists are Chuck Berry, Mick Jagger and Mark Knopfler.
* I'm interested in other examples of popular musicians who have gained entry into the profession without intensive training. This training may often be less formal, you'll notice I've left out your term academic, but my experience indicates that it's equally intensive, that the technical execution is equally demanding, and that the training is becoming more and more academic.
* Actually, at many levels the technical execution of classically trained string players in particular leaves a lot to be desired. Not just at school concerts but also at others at a supposedly far higher standard, and not once but regularly, I have thought silently to myself, if ever my guitar or mandolin were as badly out of tune as those violins, even at a school dance I'd be seriously worried about being booed off stage. OK, mine are far less challenging instruments in that regard, but... well, it's not as simple as our article currently indicates. Classical audiences clap such endeavours, I've even joined in the applause, it was commendable even if not very musical. I can assure you that a pub or wine bar would not.
* Popular musicians probably do start to get paid for performances at a significantly lower standard than classical. My local pub bands get paid at least enough to cover their lights and road crew if they're doing well, while the members of local symphony orchestras at what seems to me to be a comparable standard pay fees to belong. But at and even near the top, there's less difference if any, in my experience.
* So there's a lot going on, and it would be really good to get this right! While also avoiding the WP:OR trap of course. Andrewa (talk) 01:36, 25 February 2014 (UTC)
* People like Jimi Hendrix and Jimmy Page didn't attend music classes on guitar, not for any substantial time anyway; they were essentially self-taught (not least from records they heard and tried to imitate) and (as working musicians) shaped by gigging with the people they met early in their careers, both in local bands and as session men or on-the-road players. Page, by the time he quit the studio session-man circuit around 1965, had learnt to read notated music fluently (not just chord analysis I figure but actual scores and sheet music, and had gathered a lot of playing routine of course - the source here is a very interesting and entertaining dual interview with Jimmy Page and Jeff Beck in Mojo (UK) from the summer of 2004 - while Hendrix is supposed to never have learnt to read or write notated sheet music. But both of them were excellent and precise in their treatment of phrases and notes of course, even without any effects - for Hendrix, just check out the improvised stretch from Woodstock and Villanova Junction just after it - the timing and delicate, quick execution of complex, exposed phrases are just amazing.
* And Hendrix actually told his father in a letter around 1965/66 that "it's not supposed to sound clean these days, they want it played a bit sloppy now" - sloppy as in fast, improvised phrasing and more deliberate attack and gritty tone bends. He knew how to play in a technically flawless way, with clear, '50s style phrasing, but he deliberately went beyond that point. <IP_ADDRESS> (talk) 11:27, 22 July 2014 (UTC)
* Yes, well said. And most fans of Ginger Baker and Charlie Watts would be surprised to know that both of these top "popular" musicians learned sight reading early in their careers. It's not part of the hype! Watts' cover was not blown until a fairly recent biography of Baker revealed that when Watts left his swing band to join the Rolling Stones his replacement was Baker, and to achieve this, Watts gave Baker a crash course in sight reading, at which he was already accomplished. Andrewa (talk) 18:43, 11 March 2015 (UTC)
Time to be bold
No change to the section in question. Reluctantly tagging it. Andrewa (talk) 00:51, 15 March 2014 (UTC)
Better Historical Information/Definition Needed
The article asserts that the term "classical" originaled around 1836 in an attempt to "cannonize" the period from Bach to Beethoven "...as a golden age."
Well and good, but that only explains the use of the term to define what is known in western music history as the Classical Period, from roughly 1750 - 1820.
It tells us nothing about how or when the term "classical music" came to be regarded as a synonym for what has variously been called "art music", "serious music", "formal music", "concert hall music", "long-hair music", and a host of others. Given that the ostensible purpose of this article is to explain not the classical period, but the broader, more generic sense of "classical music", this seems a serious omission.
Moreover, including the current explanation of the origin of the term as a description of music of the classical period without following with any date or explanation of the origin of the more generic usage is confusing and misleading. There is no point in bringing up the former unless as a preface to the latter, and the latter should appear in the very first paragraph of the article.
Indeed, modern usage of the term "classical music" is so vague and variable that I question the rationale for even having such an article, and spending so much space enumerating lists of "characteristics" upon which no one agrees, and to which there are as many exceptions as examples. This whole article might be better reduced to a paragraph, or even a footnote, in the Classical period (music) article. In fact, it is already mentioned in the introduction to that article. Perhaps sufficiently? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:50, 13 June 2014 (UTC)
Many popular or literary writers on music (as opposed to people who are writing publicity-style pieces, stuff connected to the marketing machine for "classical" music) use "classical music" effectively as a synonym of "music of the Common practice period", or firmly rooted in the traditions of that kind of music (e.g. for the latter: Britten, Hindemith, Bernstein, Puccini). Music that's mostly in well-defined major or minor keys (except for some of the early part of the timespan), which is built on recurrent themes (mostly original themes, not borrowed) and melodies rather than grooves or obviously constructed "sound effects" - and which, in larger, more "serious" pieces tends to emphasize the evolution, contrasting and elaboration of themes into new shapes, reversals, combinations... The space for improvisation in performance is by no means not there, but limited and (sometimes, especially post-1800) nonexistent. Movements and songs are expected to be played in a given pre-defined order, not randomly picked and shuffled by the musicians or the audience.
20th century serious music made a series of decisive breaks with much of these rules, from Schoenberg to Stockhausen, and the real reason that modern art music is still filed as classical music in record shops, music magazines, on the radio and so on is mostly commercial. I'm not saying this as a put-down of Stravinsky, Messiaen, Ligeti or anyone else, their music and their artistic skill, but if 20th century modernist music had had to be filed under a new label that set it fully apart from classical, it would be a considerably harder sell, a harder chunk to integrate into the "serious music" performing and schooling business. Also, music writers, conductors and musicians today have little interest in keeping up fights over the legitimacy of the breaks that happened from around 1910 onwards, so the presence of the end of a period around those decades, ca 1910-1945, isn't acknowledged in the way we talk about classical music. <IP_ADDRESS> (talk) 12:51, 21 July 2014 (UTC)
Gallery of composers
The collage is in conflict with WP:NOETHNICGALLERIES # 4: Articles about ethnic groups or similarly large human populations should not be illustrated by a photomontage or gallery of images of group members; see this RfC"; The (multi-part) RfC also supported the broad interpretation of the rule, i.e. that it affects diverse articles such as Amputation and Child, and this one by extension. I would argue that having a gallery here is decidedly against the spirit of that RFC's conclusions, namely that any selection of people from a population [here, of classical composers] represents a violation of NPOV and NOR. Even without that RfC, I maintain that the gallery of composer portraits, faces of many of them not exactly being well-known to the general public, is a poor choice for a lead image of an over-arching article such as this one. If there is a lead image, it should be something representative of the entire genre, such as one of a symphonic orchestra. I searched a bit at commons:Category:Symphony orchestras but did not find an appropriate image (high-quality, well-focused image with musicians actually playing). No such user (talk) 08:18, 11 March 2016 (UTC)
* I can't work out what was proposed in the cited RfC or what the closing remarks mean. I skimmed the discussion and can find nothing pertaining to this particular situation here. I based my reversal on my reading of the text you quoted at WP:NOETHNICGALLERIES; this article is not about an ethnic group nor about a similarly large human population. It's about the work of a very small group of creative artists, and the collage depicts some of its more illustrious members. (Some may want to discuss the selection of the 16 portraits, but I'm not aware of any such thing in the >5 years this collage existed.) I note that our Spanish colleagues use this collage in the template for their WikiProject, es:Wikiproyecto:Música clásica, and it consequently appears on hundreds of pages there. As for its suitability as a lead image, one should note that the subject, classical music, consists of much more than orchestras playing, but composers are always involved. NPOV and NOR are of course involved in any use of images, be they presented as a concise and annotated collage or strewn across the article, but, as I wrote, I'm not aware of any such argument here in this regard. -- Michael Bednarek (talk) 22:30, 11 March 2016 (UTC)
* , since this isn't an "article about an ethnic group or similarly large human population", that sub-guideline (which by the way is only a sub-guideline, not a policy) doesn't apply. Per WP:BRD, you will need to establish consensus here before removing the image. If your concern is simply that "many of them not exactly being well-known to the general public": I looked at the selections and there is only one (Aram Khachaturian) who is arguably not a universal household name, so I personally can't understand your statement, however I think you are free to suggest replacements for any of the inclusions in the montage. Softlavender (talk) 23:37, 11 March 2016 (UTC)
* Look, folks, I ain't rules-enforcer, and I obey BRD. I just share the rather widespread disdain aversion expressed in that RFC on appropriateness of crammed portrait galleries to represent a subject of any kind of article: here, Classical music composers, of which there have been tens of thousands worldwide throughout the history. I invite you to read just a few first comments of the RFC, and I'll explain how those comments apply to this article:
* First and foremost, how does this gallery contribute to the reader's understanding of the topic? How does a reader understand the classical music by just looking at a 5x4 matrix of faces?
* Selection bias (NOR). Why these 20 faces? Is there an official "Top 20 of all times classical music composers" in a reliable source? Why there are only composers on that gallery? Surely, at least some of performers should deserve an appearance?
* NPOV. Let's just focus on the bottom row: Why Grieg, Elgar, Rachmaninoff, Gershwin and Hachathurian? My 20th century favorites are Schoenberg, Stravinsky, Bartok, Boulez and Reich (and I could even find a source to support my choice). Should I now replace that collage with the one of my favorites (and then comes someone else with theirs?) We ought to have some kind of stability.
* I'm willing to suggest replacements for the *whole* montage, but I'm of firm opinion that the montage has to go in its entirety. It looks amateurish, it does not represent the topic of the article well, and I don't think you will find a similar article elsewhere with a similar choice of a lead/front-page image. The RFC just got rid of the whole bunch of similar problematic images, and this one, frankly, got under the radar as a rather unexpected type of article to host one. It's the collage itself that is the problem, not just the selection of faces therein. No such user (talk) 23:04, 12 March 2016 (UTC)
Timeline error
Note that the entry for Enrique Granados is misspelled and mislinked to Enrique Grandos (although it shows as a blue link on the Timeline). Attempts to fix the spelling and link produce this mess. Does anyone have a idea of how to fix the error? Voceditenore (talk) 07:28, 11 September 2016 (UTC)
* I have sent a note to the author ( Erik Zachte ), and for the moment reverted to the incorrect spelling. Many of the obvious workarounds leave the timeline broken, so perhaps the first thing would be to work out what the error on line 16 really is. Imaginatorium (talk) 08:36, 11 September 2016 (UTC)
* It's bizarre. Maybe someone at Help:Timeline can help? -- Michael Bednarek (talk) 09:35, 11 September 2016 (UTC)
* I think I am getting there -- I have at least a version with Granados spelled correctly. But I'm looking at a few other improvements. I think the Initial-Family name format is very klutzy for composers, and except for disamBiGuation (what a ridiculously long word for a simple concept) just surname would be neater. Any other ideas? Imaginatorium (talk) 09:44, 11 September 2016 (UTC)
I seem to have mended the spelling, by applying high-level computer science techniques (otherwise known as switching everything off, then switching it back on again).
Anyway, some progress, I hope. Imaginatorium (talk) 10:19, 11 September 2016 (UTC)
* I also extended the range to 2025, and left the living composers up to 2016, but this currently requires manually updating the current year in the beginning of the script.
* I changed most names from Granados onward to show just surname. Unless anyone thinks this is a terrible idea (I mean, "L Beethoven"?) I suggest changing them all.
* I think the current text looks horrible: blodgy blue in a mis-spaced font. Perhaps the font can be changed, but I don't know how to find out what fonts are available on the server. I finally realised that the blue colour is because these are links (urgh); it might be possible to change this, or if only the font could be made cleaner... (but possibly the software relies on a monospaced font?)
External links modified
Hello fellow Wikipedians,
I have just modified 1 one external link on Classical music. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20120916075557/http://www.issaquah.wednet.edu/documents/highschool/Schedule/Arts/Achievement.pdf to http://www.issaquah.wednet.edu/documents/highschool/Schedule/Arts/Achievement.pdf
Cheers.— InternetArchiveBot (Report bug) 23:50, 25 November 2016 (UTC)
What a mess!
Another article that leaves me totally puzzled. I won't do much about it, I am too busy elsewhere, but let me quote some of the reasons of my puzzlement.
Lede
* I don't understand why this article is not merged with Art music, while it begins: "Classical music is art music produced or rooted in the traditions of Western music", and Art music begins: "Art music (also known as Western classical music [...])"; and the article Classical period (music) defines Classical music, in the "colloquial" sense of the term, "a synonym for Western art music".
* "While a more accurate term is also used to refer to the period from 1750 to 1820 (the Classical period)". I suppose that this means "while a more accurate usage of the term would refer to ...": the term remains the same!
* "... this article is about the broad span of time from roughly the 11th century to the present day", but a few lines later it claims to include the Middle Ages, beginning in 500.
* "The central norms of this tradition became codified between 1550 and 1900, which is known as the common-practice period." However, the article Common practice period states that it began in 1650.
* The periodisation that follows and the dates given are highly questionable. "Baroque" appears both in the early music period and in the common-practice period. The medieval period is said to begin in 500, while the article Medieval music says that it began in 400 (but without justifying that date either). The date of 1804 for the beginning of the Romantic period is puzzling, as are those for the 20th century (beginning in 1901?) and for its subsections, "modern", "high modern" and "contemporary".
* "... staff notation, in use since about the 16th century." ???
* "Western staff notation is used by composers to indicate to the performer the pitches (e.g., melodies, basslines, chords), tempo, meter and rhythms." All music notations, Western or not, indicate pitches and durations. They say little about whether these form melodies, basslines or chords. Staff notation, in addition, indicates neither tempo (which might be indicated otherwhise, e.g. by metronome markings) nor meter.
* "The term "classical music" did not appear until the early 19th century". The term is found in Rousseau's Dictionnaire, 1768, p. 463. art. "Style".
* You're right about the specific issues cited above, but I think there are more fundamental problems with the whole concept.
* The word "classical" in any other area of arts means from ancient Greece and Rome, but not in music, even though some periods of music history saw themselves as attempting to re-create the music of that era.
* The average person would equate troubador music, Dowland's lute songs, or Baroque ground-bass improvisation to "classical music," even though those arguably aren't "art music". The distinction between "classical music" and "popular music", while clear-cut in the modern day, wasn't really a significant distinction in past centuries, exacerbated now because to modern ears, the styles of such types of music are indistinguishable. In the eighteenth century, they might have made a distinction between "court music," "church music," and "popular music", the last of which would include things like operas and oratorios, which 99.99% of people now would classify as "classical." Art music (like "art" in general) isn't very easy to define, but I'm not sure it means the same thing as "classical". An awful lot of classical composers (including Palestrina, Bach, and Mozart) saw themselves as craftsmen, throwing something together to meet an immediate need, rather than creating great art.
* "Classical music" in the modern age primarily exists as a "museum culture", performing predominantly music of the distant past, a century or more ago, contrasted with popular music, which is heavily focused on recent composition. Classical music performers and contemporary composers are widely viewed as akin to archaeologists, specializing in the study of ancient relics for their own sake. This might be a more useful focus for this article than a rehash of Western music history.
* I doubt we'll be able to find a consensus among secondary sources on how to approach these matters, but before we can revise the article effectively, we have to start by figuring out what it's supposed to be about. —Wahoofive (talk) 18:32, 8 April 2017 (UTC)
* I agree with most of what you write, Wahoofive – yet:
* I did not usually think of "classical" as refering to ancient Greece or Rome, although you are right about that. For me, "classical" denotes something that can be considered a model (and I add in petto "for use in class" – just to remind me of a plausible, if not really correct etymology of the term). Palestrina's counterpoint, for instance, was considered "classical" by Fux – and remains by many of us since. It certainly never occured to me to consider the early Baroque opera as "classical", even although it did attempt to re-create Greek performances. Never mind. What is meant in the article really is "Western art music", or "Western learned music", or things like that.
* The average person that you mention appears to call "Classical music" anything that can be found on CD in music shops and that is not "pop" music. I don't think that the purpose of WP is to answer to that kind of definition; on the contrary, I hope (and I trust) that WP might increase the overall intellectual level of average people. We should at least begin the article with something like "Despite what average people think, classical music is ...". For sure, people in the 18th century and earlier did not make the kind of distinction that this article wants to make. But that merely proves that its name is ill chosen. "Art music" makes little sense: is there music that is not art? "Learned music" (musique savante) is odd, but might express better what is or should be here at stake.
* Having spent most of my professional life dealing with ... classical music, I am very much aware of being some kind of museologist, and this may indeed may be a better focus for the article. On the other hand, it strikes me that this kind of music had a tremendous impact on humanity: I doubt that any other domain of knowledge but philosophy produced comparable bulks of theoretical writings. The case of music is a very particular one, not only for the West, but for the history of mankind in general.
* I have great doubts about SP's policy concerning secondary sources. I do believe that some of the best WP articles do rely mainly on primary sources – and, after all, why not. The important point is to have references, and not to draw from them unjustified conclusions. I tend to envisage WP somewhat as how medieval theorists worked, always building on the auctoritas of the ancients, always trustful in them, but nevertheless building new knowledge by novel choices of quotations. We certainly won't find sources, primary or secondary, about what the average person thinks "classical music" is. But we will find sources about what we think the average person should think about classical music. — Hucbald.SaintAmand (talk) 20:08, 8 April 2017 (UTC)
Literature
* The reason for the title of this section is obscure. The section appears to refer mainly to musical notation: would that be what is meant by [musical] Literature?
* "The key characteristic of European classical music that distinguishes it from popular music and folk music is that the repertoire tends to be written down in musical notation, creating a musical part or score." If notation were the main characteristic of classical music, then the music before the introduction of notation, in the 11th century, would not be "classical". In addition, all popular and folk music dating before the first music recordings in the late 19th century is known to us only through notation.
* "That said, the score does not provide complete and exact instructions on how to perform a historical work." Isn't this incompatible with the idea that the difference between "classical music" and popular and folk music is that the first is not improvised, contrarily to the others?
* "Although Classical music in the 2000s has lost most of its tradition for musical improvisation..." I would have thought that aleatory music, in the 2000s, had returned to the tradition of improvisation...
Instrumentation and vocal practices
The subsections that follow, on Medieval, Renaissance, Baroque, Classical, Romantic, Modern, High Modern, Postmodern and Post-postmodern, make no sense at all. They do not belong to this article, they might find a place (after emendations and corrections) in a history of instruments and a history of music. But almost everything is false, or naive, or both.
* "The instruments currently used in most classical music were largely invented before the mid-19th century (often much earlier) and codified in the 18th and 19th centuries." Is that true also for medieval instruments? It seems that the article is never at ease deciding between "classical" music in its general ("colloquial") sense and its specific one.
* "The symphony orchestra is the most widely known medium for classical music". Same confusion here. The symphony orchestra has been unknown to most of the long "classical music", from 500 to 1750 at the earliest.
I think I'll stop here: — this is too distressing. Hucbald.SaintAmand (talk) 21:12, 8 April 2017 (UTC)
Of Opera, Cantatas and Oratorios
Britannica says that the form of cantatas (which can be verified by looking at cantatas from Bach and Telemann) is usually based on the form of operas: "Lutheran ministers, notably Erdmann Neumeister, encouraged the absorption of secular music into the church service. They provided German Protestant composers with cycles of texts for sacred cantatas based on the operatic aria form." (emphasis mine), and (after making a distinction between secular and sacred cantatas): "The precise nature of the two styles varied, both finally taking on characteristics of the recitative-aria combination of contemporary opera."
Referring to oratorios, Britannica again (here) notes the operatic elements of the form: "Toward the mid-17th century Giacomo Carissimi introduced a more sober type [...] His oratorios [... are] basically operatic" and says about Händel's oratorios that thay "are essentially theatrical presentations that reflect his experience as an opera composer. Most of his oratorios use biblical stories put into modern librettos. Influenced by opera, masque, and even Greek tragedy, they were performed by opera singers in theatres".
This other source (I'll allow you to judge it's reliability on your own) gives that "Opera is a staged work with sets and costumes. Oratorios are (usually) done in a concert format with men in formal wear and women in gowns. However, [...] the primary difference between these two genres rests on their subject matter."
I can probably keep citing sources all night long, but that's not the point of this exercise. The main difference, as I said, is usually subject, location and scope: maybe "derivative forms" is slightly inaccurate, I'll write "related forms" instead. <IP_ADDRESS> (talk) 23:13, 4 November 2017 (UTC)
"Dissolution of the tonal system"
Since someone just copied this from Common practice period I'll ask here: what does this mean? I understand for example "the dissolution of the Hapsburg empire", because it means that the Hapsburg empire ceased to exist. But tonality has not exactly gone away. (Despite the fact that Schoenberg I believe is quoted as saying that within twenty years every street worker in Vienna would be singing 12-note tone rows.) Of course the term "common practice period" is used, but it seems in practice to mean "you know, conventional harmony"; the set of "rules" broken by Debussy and others. These people certainly broke the rules, but they neither destroyed nor damaged tonality, they just produced music outside the system of conventional harmony (whether actually "atonal" or not). The date of 1910 is also suspiciously precise -- it would make sense if supported by a quote from someone worth listening to placing it with the publication of Xyz. The article is pretty much a disaster, as others have mentioned. The suspicious (and ungrammatical) list of "periods" of the 20th century for a start. But mustn't ramble. Imaginatorium (talk) 04:51, 5 November 2017 (UTC)
* One thing for sure: this article needs a lot of work. As for your question, I think the statement really should say something like "dissolution of the hegemony of common-practice tonality". In truth, "the rules" were being broken long before Debussy. Personally, I point the finger at that dastardly enemy of Tonality Johann Sebastian Bach, though perhaps things might still have been salvaged had it not been for the depredations of Beethoven and Schubert. Yes, 1910 is ludicrously late as a terminus.—Jerome Kohl (talk) 06:07, 5 November 2017 (UTC)
* Yeah, I agree 1910 is a late date, which is why I didn't give any precise ones in that section (only saying it spans the Baroque, Classical and Romantic periods). However, defining common practice as only Baroque + Classical (as was in the article before my edit) is even more wrong. As for your statement that "tonality has not exactly gone away" - of course it hasn't, but so haven't forms typical of those periods yet we agree that those periods are long gone (for example, people still (rarely, but...) write fugues). Agree article is an absolute mess, which is why we can try to remove what is wrong and fix (or at least, attempt to) parts which are salvageable. <IP_ADDRESS> (talk) 14:05, 5 November 2017 (UTC)
The image in the lead
So, nobody seems to agree on how this should be dealt with. The current version (actually: the one that was there before page protection) is, arguably, not satisfactory: why those 20 composers? is this really the best picture we can have to represent classical music? why composers?
In the above section (Talk:Classical music), "No such user" argues that having an arbitrary gallery goes against the result of some RfC from February last year. While I personally disagree with that interpretation (which seems to have been aimed at something completely different in the first place), it remains true that a gallery of composers might not be the best option.
As I see it, the following options present themselves:
* Option A Reinstate the removed version (File:Classical music composers montage.JPG)
* Option B Change/remove some composers (make a new version)
* Option C Put something other than composers (example only for demonstration purposes File:Cesare Gennari Orfeo.jpg)
* Option D Remove the image completely (and do not replace)
What is your opinion, and more importantly, why? <IP_ADDRESS> (talk) 01:23, 9 December 2017 (UTC)
* Tricky one since 'classical music' encompasses so much. I'm not a fan of the removed version both from'representational' and 'design' perspectives. IMHO one unifying image is preferable (from a design perspective) to a composite image of 20 composers (which is relatively 'busy' given the viewer's attention span).I would go for option C. I like the example image but it kind of singles out the violin. Perhaps an image of a music score with multiple parts (although less interesting) would be more representative of 'composition' (for instruments, voice, orchestra, concertos, opera, etc.). Mikemorrell49 (talk) 15:11, 21 November 2017 (UTC)
* Support A, Weak support B What picture comes to mind when one thinks of classical music? That is a hardly subjective question and may explain why there is a dispute over this. Of course, we could put a picture of some instrumental ensemble playing. But, classical music is much more than ensemble music - and a symphony orchestra is hardly representative, of, for example, all other forms musical groups can take: quartets, choirs, .... Then, why not some instruments? Again, which ones do we put? People usually associate the piano, or (and) the violin with classical music - but we all know those two instruments (or any other combination) are, in addition to being off-topic (we are discussing music, not the instruments), not representative of the topic as a whole. Then, we come to composers. Is a long dead European male in a wig the first thing you think of when somebody says "classical music"? Hardly. But, it is also true that we usually associate some well known names with the genre (ex. the three "B"s - Bach, Brahms and Beethoven - often also the 2 Bs and Mozart instead of Brahms). Limiting the picture to such a small number is obviously not enough. However, by including a reasonable amount of them, from suitable periods, we can get a pretty satisfying picture. Is the removed version the best one? I'm not sure of that, but it does include notable names from the common-practice period - maybe including Palestrina and Schütz (for the renaissance period) and a few others would make it better, but in my mind it's clear that representing the genre with it's most notable representatives is the best way to do it. <IP_ADDRESS> (talk) 04:06, 10 November 2017 (UTC)
* A. There's nothing fatally wrong with it, and the article needs an image to prevent it from being a wall of dry text. Such a grouping of composers is never going to satisfy everyone, so I see no reason to attempt to satisfy everyone; it is sufficiently diverse in nationality and era. Softlavender (talk) 00:22, 11 November 2017 (UTC)
* C, and oppose all others, per discussion below. There should be something but not faces of men ;) --Gerda Arendt (talk) 12:56, 25 November 2017 (UTC)
* C, nothing against them being men, but A does make for a dull image which, (after you have played "how many can you recognise"), tells you more about the history of portraiture than about music. I endorse what someone says below that there is never going to be an informative, all-embracing perfect image, but a series of 'alive' ones capturing the activity of classical music making would be both more informative and visually interesting. Good luck choosing them! Pincrete (talk) 13:48, 29 December 2017 (UTC)
* A. We must define the starting standard and from there exact a consensus on C (or other). Please restore the image, if only for the sake of working purposes. A vital article lacking a lead image is terrible. (Later) None of us are getting any younger. I fully support a consensus. For now we have a relatively non-offensive placeholder. I hope this is fair. - Thrif (talk) 02:46, 30 January 2018 (UTC)
Discussion
* As I recall, this issue surfaced once before, two or three years ago. I imagine it must be in the Discussion Archive somewhere. There is no question about Option B, since it would only lead to an interminable discussion of who to include, and who not to include. (If anyone seriously wants to consider this possibility, my suggestion is to include all "classical" musicians—not only composers, but organists, singers, bassoonists, etc.) Option C potentially addresses this point: why should composers take priority over other figures? The article as it stands does seem to make the assumption that composers are inherently more important than, say, conductors, violists, impresarios, or ushers. While this does not seem unreasonable, perhaps it should be made more explicit, if a photo montage of composers is to be accepted. This leaves option D, which may in the end be the only thing that will satisfy all parties, but it would be a shame not to have some sort of image.—Jerome Kohl (talk) 03:58, 10 November 2017 (UTC)
* My Idea would be to use Option C and add there something like "The Dublin Philharmonic Orchestra". From my point of view a classical Orchestra is representing classical music. For sure it is not the only one, Opera or a Quartet is also representing classical music. But a Orchestra is somehow unique, with its instruments and the size. Could be also another Orchestra, not necessary "The Dublin Philharmonic Orchestra", its only and example. And yes: The discussion, which Orchestra to choose, could end up again in a edit war.
* To choose option D is not a good idea, the article is looking "dead". This would mean also, that Wikipedia community is not able to fix such a discussion / conflict. --GodeNehler (talk) 06:59, 10 November 2017 (UTC)
* I raised the issue briefly in 2016, in section above, still unarchived, but dropped the stick after reception of special pleading followed by a wall of silence. As I argued there, I strongly reject both options A and B, for the reasons stated by Jerome and majority of participants of this RfC, which explicitly deprecated galleries of people. I prefer option C, using a single image of a philharmonic orchestra, which in my opinion is most people's first association on "classical music"; barring that, we could use some montage of 4-5 characteristic ensembles, but I prefer a single iconic image. Even if we don't come to an agreement, I strongly prefer option D (no image) to A or B. No such user (talk) 12:44, 10 November 2017 (UTC)
* But, is it really special pleading? And, why should we base our decision making here on that discussion? Guidelines are results of informed discussion, but they are not set in stone and are only there as a help to achieve consistent decision making. Is using a picture of classical music composers (or, per the opinion of others, maybe performers and others as well) to represent the genre the same thing as using a picture to represent an ethnic group? Even if it is, the first purpose of an image is to improve the article, or in this case more specifically to present a representative image to the reader. As I argued above, a symphony orchestra is too restrictive, while a group of composers from multiple periods is much more interesting - it provides interesting articles to explore for the interested reader. I understand that it may be a complicated topic deciding which composers/performers should be included, but one who rejects the idea on the basis that it's too complicated is really acting in bad faith to oneself - I'm sure we can come up with a representative list (if you don't like the present one) that includes the best known composers (and performers) from at least the renaissance to the 20th century. <IP_ADDRESS> (talk) 00:12, 11 November 2017 (UTC)
* I agree that 'D' represents failure. Does the montage of (yes, all-male) composers add to the article? Yes it does, yet other options might add more. How about a photo of Yuja Wang playing the piano in a sort of fishnet microskirt? Or Jacqueline du Pre playing the cello, in her youthful, wild enthusiasm and rather gawky dress-sense? (Is Danny Wiki-friendly? He might have some pics...) Or well, just the usual photo of Beethoven growling from that score, which could be labelled something like "The most widely recognised classical composer". I think recognisability is important, which rules out something like a photo of the Voces8 vocal ensemble (not whether they are "known or not", but whether it's obvious from the photo what they are doing), but supports anything with an instrument. In this sense the suggestion of an orchestra does seem a good one: possibly the Youtube orchestra? Or is it impossible to have a montage of images: Beethoven, Du Pre, a string quartet, and La Scala? Imaginatorium (talk) 07:59, 10 November 2017 (UTC)
* I like the idea of a montage including performers and performing groups as well as composers. Arguably, the role of the composer is fundamental to classical music, but the previous montage of 20 dead European male composers hardly gave an idea of the breadth of the field. I don't know how we would ever agree on which images to include in the montage though. --Deskford (talk) 09:33, 10 November 2017 (UTC)
* OK, 19 dead European male composers and one dead American male composer – I forgot Gershwin was in there! --Deskford (talk) 09:34, 10 November 2017 (UTC)
* I propose some musical notation as a lead image, - these small faces of men are only good for those who recognize them, and there's nothing particularly classical nor musical about these faces. Bach comes to my mind, naturally, such as this one which doesn't have much text. --Gerda Arendt (talk) 12:53, 25 November 2017 (UTC)
On the scope of the article
* While we are at it, we might also consider whether the subject of the article isn't being misrepresented rather too broadly. If a symphony orchestra is truly representative of the "popular image" of the topic, is it reasonable to consider the 6th century as a starting point? It seems to me that the defining moment of the beginning of the concept of "classical" music has got to be some point when a conscious difference is made between this and "popular" or "folk" music. Perhaps this does actually go back as far as the sixth century but, if it does, why stop there? Is it not just as reasonable to include, say, the Epitaph of Seikilos and the Delphic Hymns under the rubric. After all, these have a far better claim to the title "Classical" than anything after the 3rd century. If the concept does not reasonably go back that far, then is it right to apply it to music of, say, the 14th century? What about the 16th? The section of this article on Renaissnce music already hints at the fact that the important distinction up to that time was between sacred and secular music, not between "classical" and ... what? "Unclassical"? Naturally, there is a valid distinction also between the way music was viewed in the time of its production, and the way it is viewed through the lens of history, but this whole "classical" terminology is not very well-founded, it seems to me, as it depends in the first instance on a widespread popular usage that is nothing like being consistent in application. Before we choose an image to represent a thing, we really need to decide whether that thing is adequately defined in the article meant to explain it to readers.—Jerome Kohl (talk) 01:01, 11 November 2017 (UTC)
* Agree that ancient music is beyond the scope of this article - unless we can come up with enough sourced information about European ancient music (which is hard, except maybe for ancient Greece). But, if we keep the scope of the article the the "popular idea of classical music", then we basically should just restrict ourselves to the common practice period - which I think we can agree is too strict. And this is not an article about the "popular image" of classical music. Is the medieval period too early? That is arguable - but we cannot limit ourselves simply to the c. p. period. <IP_ADDRESS> (talk) 01:29, 11 November 2017 (UTC)
* Certainly if we take the image of the symphony orchestra as somehow representative of what "classical music" is, beginning with the common-practice period sounds about right, and at the same time there is no reason to define "classical" music as coming to and end with the dissolution of the common practice, any more than symphony orchestras dried up and blew away in 1910. In this respect, the orchestra image does not seem such a bad idea.—Jerome Kohl (talk) 01:37, 11 November 2017 (UTC)
* Absolutely correct (if I ignore my objection about the symphony orchestra not being representative), except there's already an article (a bad one, but I still think we should have separates article about the period and classical music as in the performing tradition and what came before common practice) about the common practice period and this article should be larger in scope (we don't want to have two basically duplicate articles, right?) <IP_ADDRESS> (talk) 01:46, 11 November 2017 (UTC)
* If we regard the common-practice period as merely the beginning-point for "classical" music, and not its end-point, then I see no problem. I hate to throw cold water over our warm agreement on this point, but our opinion naturally requires a reliable source to back it up. It is significant that there is no article on "classical music" (in our sense) in the New Grove, the Harvard Dictionary, the Oxford Companion to Music, or the Oxford Dictionary of Music. The term "classical" there is restricted to what we call the "Classical Period". If I recall correctly (and I don't have the volume within reach), the MGG is more helpful in this regard, though still cautious about too broad a usage of the term. The core of the problem is that it is much easier to determine what agreement there might be within "the academy" than how "people generally" think. Here, we must fall back on more general dictionaries and, astonishingly, the OED is just as cautious as the specialist references, with plenty of illustrative quotations but, when it comes down to a definition, offers this as sense 9 of "classical": "Of music: of acknowledged excellence; of, relating to, or characteristic of a formal musical tradition, as distinguished from popular or folk music; spec. of or relating to formal European music of the late 18th and early 19th centuries, characterized by harmony, balance, and adherence to established compositional forms."
* Apart from the obvious conflation with "Classical Period", this of course devolves entirely on the word "formal", and cross-checking this in the OED reveals the definition to be hollow, since there are half-a-dozen possibly applicable senses, none of which make the required distinction from "popular or folk". In short, it is a case of "everybody knows what we mean, so we don't have to bother discussing it."—Jerome Kohl (talk) 02:07, 11 November 2017 (UTC)
* Newby here and just an observation. The list of of classical and art includes a link to this page with the title Western classical music. It is stated that Western classical music is simply called 'classical music' in the Engish language. I wonder whether this true of readers accessing English articles from outside Euope and the US (India for example).Just a thought.Mikemorrell49 (talk) 15:16, 21 November 2017 (UTC)
* For the purpose of this article, I think we can safely assume the most common usage is the European/North American one. As we were discussing earlier, the problem with the definition of "Western classical music" is that no reliable source gives a description for it - they instead use "classical music" more accurately for the specific period (roughly 1750 - early 19th century) within this tradition. As Jerome states above, for most of those established reliable sources, it's a case of "everybody knows what we mean, so we don't have to bother discussing it." - i.e. popular, not academic definition, and there is no reliable source despite this being a very real and common (and thus, worthy of being discussed) use of the term. So the current (rather warm) agreement we have reached is that this includes at the very least the whole of the common practice period (so, 1600 - roughly 1900) and (probably) the modern performing tradition. <IP_ADDRESS> (talk) 01:17, 24 November 2017 (UTC)
* I'd say most people mean Western CM when they say CM, as the primary topic. Perhaps a hatnote could explain that? --Gerda Arendt (talk) 12:53, 25 November 2017 (UTC)
* The hatnote's already there - the question of whether the given date for the beginning is accurate is what we've been discussing (indirectly): where does the "popular" definition of classical music start and what do sources say of it, if they say anything? <IP_ADDRESS> (talk) 13:38, 25 November 2017 (UTC)
* If the critical moment in history is when "popular" and "classical" music diverge, then it may be useful to consider the article Popular music. While it is evident that this divergence is not clearly agreed upon, there are at least a few suggested criteria in that article, which at one place cites a source giving the late-18th to early 19th century as a benchmark.—Jerome Kohl (talk) 23:23, 25 November 2017 (UTC)
* Nice, but that's not what I was saying - I was thinking of the fact, which we discussed above, that this article is mostly about the popular definition of classical music, in opposition to the academic definition (as you demonstrate by the lack of any adequate definition in sources). As for "popular" and, say, "learned" (for lack of a better term) music diverging, the dates seem about right - though there was a distinction between those two in the time of Bach (i.e. early-to-mid-18th): "in eighteenth-century German usage, Musicant denoted the ordinary music maker of the street-musician and beer-fiddler variety [and the use of this term by Johann Adolf Scheibe in 1737 angered Bach, who instead thought of himself as a musician-scholar]" (Wolff, The Learned Musician, 2001, Chapter 9, p. 305). <IP_ADDRESS> (talk) 03:08, 26 November 2017 (UTC)
* Well, if we are going to fall back on that sort of evidence, I think I recall a similar line in the late-9th-century Alia musica (or perhaps that was on the difference between "musicians" and "singers"). But a "music-scholar" is not exactly the same thing as a "classical musician", is it? I don't think it would be at all difficult to find reliable quotations from bona fide "classical musicians" today (never mind other varieties) distancing themselves from those repugnant "music-scholars".—Jerome Kohl (talk) 07:06, 26 November 2017 (UTC)
* What you're quoting is, I think, a poem by Guido of Arezzo: "Musicorum et cantorum magna est distantia [...]" (Wolff, ibid.) - who seems rather to be making a distinction between composers and performers (i.e. we can think of this as being, respectively, cantors and choir boys). And the term is not "music scholar" (i.e. musicologist, about whom you're probably right), but musician-scholar (i.e. a "learned" musician, as per the title of Wolff's book) - Wolff clearly states that "Bach would not have wanted to pit the musical performer and the musical scholar against each other as mutually exclusive species" (Wolff, ibid.). <IP_ADDRESS> (talk) 13:44, 26 November 2017 (UTC)
* And for people who don't have the book, here is the relevant page I have been quoting all this time. <IP_ADDRESS> (talk) 13:47, 26 November 2017 (UTC)
* Well, no, I wasn't thinking of anything nearly so recent in time. Perhaps it was not the Alia musica, but something else of approximately that date or earlier. If we try really hard, we may be able to come up with something similar from Martianus Capella or Aristoxenus. This doesn't get us any closer to a solution for out problem, however. The 18th century is a much more plausible watershed, though we find the same composers and repertory containing what might be classified as "learned" music on the one hand and "popular" music on the other. For example, Telemann was often inclined to including a fugue alongside galant dances in his sonatas, and Mozart did not hesitate to write serenades and small dances for entertainment purposes, alongside his concertos and symphonies. Indeed, it is a good question whether these concertos and symphonies were really intended to be reserved only for connoisseurs, and the tunes from his operas were probably whistled in the streets and played by mere Musikanten.—Jerome Kohl (talk) 01:26, 27 November 2017 (UTC)
* Well, Guido of Arezzo lived in the late 10th-11th century so your initial date wasn't too far off. If we start only in the 18th century, then we are excluding a good portion of Baroque music and all of the Renaissance (and the development of music throughout the Middle-Ages, including things such as apparition of notation, polyphony and tonality), missing out on composers such as Schütz, Monteverdi, Purcell and Palestrina. <IP_ADDRESS> (talk) 03:26, 27 November 2017 (UTC)
* Do you mean their popular, or their classical music?—Jerome Kohl (talk) 06:12, 27 November 2017 (UTC)
* Well, I don't think people today see much (if any) major differences between popular or "classical" music of 500 years ago - and at the time, they weren't "day and night" (as today): a number of obviously "learned" music from the time is based on popular songs, such as L'homme armé. In fact, even the distinction between sacred and secular music doesn't seem to have been as large as today - some lutheran hymns in fact took their melody from secular songs, such as O Haupt voll Blut und Wunden (which takes it's melody from a secular love song). And if we just ignore "popular vs classic" for a moment, we cannot deny that the Middle-Ages, as much as they are known (rightly) as the Dark-Ages, are still the origin of Western classical music (i.e. the topic of this article) and it would be illogical to speak of the history of Western classical music while skipping the whole medieval period and what follows, which eventually lead to the norms and practices of the common practice period - which we both agree is a crucial part of the topic. <IP_ADDRESS> (talk) 13:37, 27 November 2017 (UTC)
Option C
Here are some beautiful images I found in Commons that could look nice in the lead. The orchestra might be the most representative image of classical music, as others have said above. In the chamber music image you can feel the movement and the team work, which is cool. The close ups of hands playing classical instruments offer a more intimate alternative. Atón (talk) 21:50, 22 December 2017 (UTC)
* The first image might be the best of those you propose. The chamber music image, while it does have movement, is a tad too restrictive if we want to use it to represent classical music as a whole (since, although the string quartet is a well known form, we'd be neglecting all others...). The "Lute Player" focuses on an instrument which is barely played anymore, and shows it as too much of an individual effort, while we all know classical music is a team effort (in the very least of cases, between the composer, who writes some information on the score, and the performer who must decipher it). I like the last image, but it singles out the piano, which wasn't commonly used prior to the second half of the 18th century. The first image offers a great point of view, but it again singles out the string section (though, at least, it's somehow open-ended - you see the conductor at the far end - and because of that, you can imagine the rest of the orchestra without seeing it). <IP_ADDRESS> (talk) 15:15, 25 December 2017 (UTC)
* Why should there be an emphasis on instruments? In addition, orchestras, pianos, string quartets, and even lutes are used in many different kinds of music, not only so-called "classical".—Jerome Kohl (talk) 01:57, 26 December 2017 (UTC)
* The image is not a substitute for the article, it's just an accompaniment. Besides, since it's impossible to accurately represent all classical music in one image, the "perfect image" doesn't exist. The only option besides no image is a "good enough" image. That being said, my idea was to emphasize the playing—the movement, the hands, the relationship with the score, etc. That's why I prefer a close up more than a bird view of a whole ensemble. Do you have other photos in mind? What elements should the image show, in more concrete terms than "all classical music", to be good enough? Atón (talk) 07:49, 26 December 2017 (UTC)
* Personally, I think the montage of composers was a better option, even if the precise choice of individuals might be a matter of some contention. At least those composers could be regarded as representing "classical" music, unlike a photo of a piano, orchestra, accordion, or bagpipes. (You might just want to take a look at the photo credits for that shot of the piano, by the way.)—Jerome Kohl (talk) 17:31, 26 December 2017 (UTC)
* The intention of this thread was to explore the possibilities of option C. I apologize for being unclear. Besides instruments or musicians, others before have proposed some musical notation. Maybe there are other possibilities. Atón (talk) 23:42, 26 December 2017 (UTC)
* Sorry. As previously noted, I nevertheless see problems with this option generally.—Jerome Kohl (talk) 00:41, 27 December 2017 (UTC)
* Could we put together a montage of all four of these images (perhaps adding a couple of others)? The strength of the Pantheon of Dead White Men was that at least it portrayed a reasonable cross-section of the genre's defining composers; picking one single image of these four would be roughly akin to the (in retrospect hilarious) decision by the builders of Boston Symphony Hall to carve only Beethoven's name above the stage. Any accompanying header image should strive for a fair degree of representing all of what classical music has to offer. ☯.Zen Swashbuckler .☠ 21:52, 29 December 2017 (UTC)
* I take it that no one has taken up my suggestion, above, about checking the provenance of the piano photograph? If jazz is in fact a subset of "classical" music, then we need to do a major re-write here, as well as at the article "Jazz".—Jerome Kohl (talk) 23:31, 29 December 2017 (UTC)
Art music
It says in the beginning the classical music is "art music". Is it, really? I mean, maybe we generally consider it "art music" today, but I think that a lot of classical music was made more for functional purposes. I'm not an expert on this but of what I know the whole "art music" idea is more of a 19th century mode of thought. — Preceding unsigned comment added by Lonious (talk • contribs) 15:17, 22 March 2018 (UTC)
New image
User: Francis Schonken, what is your problem with the new image? And none of the stuff you said is true, the "current one" is not the result of the RFC above (seems like you are desparately trying to get the new image removed, given this and the fact that you could have easily reverted but instead chose to take out the picture from the article entirely, but whatever).ScepticismOfPopularisation (talk) 17:54, 19 June 2018 (UTC)
* And looking at the edit history, you acknowledged this as well, and added that picture yourself (taking it personally, eh?). This only further harms your position.ScepticismOfPopularisation (talk) 17:59, 19 June 2018 (UTC)
Synthesis
See WP:SYNTH for applicable guidance. There seems to be some synthesis going on in this article. For instance: the development of a notation system is (in the Hall/Neitz/Battani source) not described in the context of the topic of this article (classical music) but in the context Folk music (and is a sociological analysis). Similarly the Blanchard/Acree source (which seems rather a school textbook, not the most ideal source) does not refer to classical music on the cited page. --Francis Schonken (talk) 11:09, 20 June 2018 (UTC)
* See literally every book on classical music.ScepticismOfPopularisation (talk) 11:12, 20 June 2018 (UTC)
* Please supply full citation data ;-)—Jerome Kohl (talk) 18:16, 20 June 2018 (UTC)
Deleted sections
I've place several deleted sections of the article "classical music" here on the discussion page because they have numerous issues of relevance, clarity, and referencing that have been flagged. I don't think they belong in the article at this time because of these issues. They are here now so that any interested editors can see if there are any parts that might be restored to the article after any necessary improvements have been made. I'm of the opinion the info in these sections are not of sufficient value or relevance to be worth the effort of trying to get them back into the article.ChrisCarss Former<IP_ADDRESS> (talk) 10:00, 26 May 2019 (UTC)
Literalist view of the significance of the score
While there are differences between particular performances of a classical work, a piece of classical music is generally held to transcend any interpretation of it. The use of musical notation is an effective method for transmitting classical music, since the written music contains the technical instructions for performing the work.
The written score, however, does not usually contain explicit instructions as to how to interpret the piece in terms of production or performance, apart from directions for dynamics, tempo and expression (to a certain extent). This is left to the discretion of the performers, who are guided by their personal experience and musical education, their knowledge of the work's idiom, their personal artistic tastes, and the accumulated body of historic performance practices.
Criticism of the literalist view
All critics express the opinion that it is only from the mid-19th century, and especially in the 20th century, that the score began to hold such a high significance. Previously, improvisation (in preludes, cadenzas and ornaments), rhythmic flexibility (e.g., tempo rubato), improvisatory deviation from the score and oral tradition of playing was integral to the style. Classical musicians tend to use scores and the parts extracted from them to play music. Yet, even with notation providing the key elements of the music, there is considerable latitude in the performance of the works. Some of this latitude results from the inherent limitations of musical notation, though attempts to supplement traditional notation with signs and annotations indicating more subtle nuances tend to overwhelm and paralyse the performer.
Some quotes that highlight a criticism of overvaluing of the score: [...] clarity, undeviating rhythm, easy technique, 'musicianship'. I put the word musicianship in quotes, because as often as not, it is a false kind of musicianship—a musicianship that sees the tree and not the forest, that takes care of the detail but ignores the big picture; a musicianship that is tied to the printed note rather than to emotional meaning of a piece. The fact remains that there is a dreadful uniformity today and also an appalling lack of knowledge about the culture and performance traditions of the past." ("Music Schools Turning out Robots?" by Harold C. Schonberg)
* "... one of the most stubborn modern misconceptions concerning baroque music is that a metronomic regularity was intended" (Baroque Interpretation in Grove 5th edition by Robert Donington)
* "Too many teachers, conditioned to 20th century ideas, teach Bach and other Baroque music exactly the wrong way. This leads to what musicologist Sol Babitz calls 'sewing machine Bach'."
* "... tendency to look alike, sound alike and think alike. The conservatories are at fault and they have been at fault for many years now. Any sensitive musician going around the World has noted the same thing. The conservatories, from Moscow and Leningrad to Juilliard, Curtis and Indiana, are producing a standardized product.
Improvisation
Improvisation once played an important role in classical music. A remnant of this improvisatory tradition in classical music can be heard in the cadenza, a passage found mostly in concertos and solo works, designed to allow skilled performers to exhibit their virtuoso skills on the instrument. Traditionally this was improvised by the performer; however, it is often written for (or occasionally by) the performer beforehand. Improvisation is also an important aspect in authentic performances of operas of Baroque era and of bel canto (especially operas of Vincenzo Bellini), and is best exemplified by the da capo aria, a form by which famous singers typically perform variations of the thematic matter of the aria in the recapitulation section ('B section' / the 'da capo' part). An example is Beverly Sills' complex, albeit pre-written, variation of "Da tempeste il legno infranto" from Händel's Giulio Cesare.
Its written transmission, along with the veneration bestowed on certain classical works, has led to the expectation that performers will play a work in a way that realizes in detail the original intentions of the composer. During the 19th century the details that composers put in their scores generally increased. Yet the opposite trend—admiration of performers for new "interpretations" of the composer's work—can be seen, and it is not unknown for a composer to praise a performer for achieving a better realization of the original intent than the composer was able to imagine. Thus, classical performers often achieve high reputations for their musicianship, even if they do not compose themselves. Generally however, it is the composers who are remembered more than the performers.
The primacy of the composer's written score has also led, today, to a relatively minor role played by improvisation in classical music, in sharp contrast to the practice of musicians who lived during the medieval, renaissance, baroque and early romantic eras. Improvisation in classical music performance was common during both the Baroque and early romantic eras, yet lessened strongly during the second half of the 20th century. During the classical era, Mozart and Beethoven often improvised the cadenzas to their piano concertos (and thereby encouraged others to do so), but for violin concertos they provided written cadenzas for use by other soloists. In opera, the practice of singing strictly by the score, i.e. come scritto, was famously propagated by soprano Maria Callas, who called this practice 'straitjacketing' and implied that it allows the intention of the composer to be understood better, especially during studying the music for the first time.
Public domain
Since the range of production of classical music is from the 14th century to 21st century, most of this music (14th to early 20th century) belongs to the public domain, mainly sheet music and tablatures. Some projects like Musopen and Open Goldberg Variations were created to produce musical audio files of high quality and release them into the public domain, most of them are available at the Internet Archive website.
The Open Goldberg Variations project released a braille format into the public domain that can be used to produce paper or electronic scores, Braille e-books, for blind people.
Timeline
First, the timeline is a bit unwieldy. Is there any way we can trim some of the composers? I've never heard of Granados or Sweelinck, and I could see removing less important musicians, like Boccherini, Roussel, Gounod, Offenbach, Smetana, Saint-Saens, Bruch, Nielsen, de Falla, Enescu, Villa-Lobos, Orff, Tippett, Simpson, and Rautavaara. I know these things are subjective. Those are just the names that jump out at me when I read through the timeline.
Also, is there any reason we don't include Medieval composers? The article certainly discusses Medieval music. Squandermania (talk) 20:12, 14 August 2019 (UTC)
* On the one hand, you are asking to trim the list, and on the other, you suggest adding to it. To start with the question of Medieval composers, I suppose if the article regards them as "classical", then there probably should be some names, yes. Mercifully, we are not burdened with too many of them, by comparison with, say, the era from late March to early June of 1923 ;-)
* As to the question of trimming names, it will always be a problem of deciding who is more important. Since you have never heard of Sweelinck, I can safely conclude that you are not an organist; suggesting the removal of Gounod and Offenbach may indicate you are not much of an opera fan. Other editors will, I am sure, be ready with nominations for deletion that you would find unacceptable. Still, I agree that the list is cumbersome. This is offset by the fact that there are hyperlinks for the benefit of readers who may wonder why some unfamiliar names are included (I encourage you to follow the link to Sweelinck!). By all means let us discuss this.—Jerome Kohl (talk) 23:51, 14 August 2019 (UTC)
* I do recognize the irony of starting off by saying we should trim down the timeline and ending by saying we should add to it. But I do think we ought to add Medieval composers for consistency with the rest of the article. For the Medieval composers, the list given at the end of the section on the Medieval period seems perfectly reasonable (and short) to me.
* You are right that I am not an organist; that's probably why I've never heard of Sweelinck. I checked Burkholder/Grout/Palisca's A History of Western Music and Sweelick is mentioned a half dozen times, but not in any prominent way at all. I am an opera fan. I was surprised how many productions there are of Offenbach from https://www.operabase.com/statistics/en, but Gounod at least is certainly low on the list (his Faust gets a paragraph in AHoWM). Squandermania (talk) 01:16, 19 August 2019 (UTC)
* Mm. And yet Faust is generally ranked no. 4 of all-time great operas, after the ABC: Aida, La Bohème, and Carmen. So how do you justify dismissing Gounod from the list?—Jerome Kohl (talk) 05:33, 19 August 2019 (UTC)
* Basically, because he isn't prominent in AHoWM and he is only the 19th most played opera composer. Why do you say Faust is generally ranked no. 4? Squandermania (talk) 12:40, 19 August 2019 (UTC)
* Maybe I am out of date, but according to IHIS ("I Heard It Somewhere"), that used to be the case. What is no. 4 today?—Jerome Kohl (talk) 18:28, 19 August 2019 (UTC)
* Are you talking about best operas or most performed? This lists La traviata, Die Zauberflöte, Carmen, La bohème, and Tosca as the top 5 most performed. Squandermania (talk) 10:55, 20 August 2019 (UTC)
* Well, "best" is a difficult condition to prove, so I guess it would be safest to stick with "most performed". I wonder how Aida managed to escape from the ABC?—Jerome Kohl (talk) 17:24, 20 August 2019 (UTC)
So, just to get back to the trimming question. Do you think there would be a Wiki-uprising if I removed the composers I mentioned above? Should I keep Offenbach and Gounod? Are there any others you think should go? Squandermania (talk) 22:44, 20 August 2019 (UTC)
* I don't know the answer. Perhaps the best way of finding out is to remove them and see who objects. In the meantime, the list you cite suggests that Grigory Frid and Jake Heggie should probably be added to take their place.—Jerome Kohl (talk) 23:50, 20 August 2019 (UTC)
* Did I miss a link to the article/list/template that's being discussed here? -- Michael Bednarek (talk) 04:23, 21 August 2019 (UTC)
* Many of the composers mentioned above represent their national schools and therefore are important for the timeline; they cannot be omitted. —Cote d'Azur (talk) 09:31, 21 August 2019 (UTC)
* It is the timeline under here.
* Which composers do you mean in particular? I'm not sure that we need multiple composers from some nationalist schools or a Danish or Romanian composer at all. Squandermania (talk) 11:51, 21 August 2019 (UTC)
Is all Classical music Art music?
The beginning of the article states that "Classical music is art music...". However, I don't think all of it is. Art music which seems to refer to the repertoire performed from the "classical canon" does not typically include much of the music written in the classical tradition, but rather what is deemed by scholars to be the best from that tradition. And even then, some of the "less serious" or significant works by the major composers such as Beethoven aren't performed that much as well. The same could be said for a ton of works from that tradition which were composed for functional purposes, such as sacred music. So I want to confirm whether or not all classical music is considered Art Music, and if so, why. Lonious (talk) 03:45, 7 September 2019 (UTC)
* The term "art music" in the lead is wikilinked to a specific Wikipedia article which defines the term. It seems to include all classical music. If you disagree, it is up to you to proffer specific examples of classical music that are not "art music", and make a case for (and convince others here) why the specific examples you have chosen are not art music. Also, looking at your edit history, you seem to have been beating this drum for a year and a half. Please remember that talkpages are WP:NOTAFORUM. -- Softlavender (talk) 05:15, 7 September 2019 (UTC)
Koji Nakano (composer) -- needs some serious help
This article is an uncited wall-of-text mess. Any help would be appreciated, even if it's merely decimating the article. Softlavender (talk) 11:51, 21 August 2019 (UTC)
* It seeems the subject's article on the Japanese Wikipedia, jp:中野浩二, was deleted in 2011 for copyright reasons: jp:Wikipedia:削除依頼/中野浩二. The text of the article here is also very close to material at his website. WP:TNT? -- Michael Bednarek (talk) 12:11, 21 August 2019 (UTC)
* Thanks . I gave the article a massive trim and re-organized it and removed the promo bits. At least now it is not an embarrassment to Wikipedia. (Also, I realize now that I posted this message on the wrong page -- I meant to post on the Wikiproject.) Softlavender (talk) 22:10, 7 September 2019 (UTC)
Condensing sections
I might be beating a very battered horse but I believe the first four sections could be modified for conciseness and clarity. For example, the section on complexity could be rolled into the discussion of "highly sophisticated forms of instrumental music." The Performance section contains more repeated information on notation, and the Characteristics section repeats "complex pieces of solo instrumental work." The Timeline section also seems to duplicate the small template under the History section. I don't have concrete suggestions for replacements right now but I would like to start thinking about it. Any opinions are welcome. Where is the muffin (talk) 02:53, 11 November 2019 (UTC)
Beethoven
In the timeline, should Beethoven be listed as Classical or Romantic? I'd say Romantic, but let's discuss. Noahfgodard (talk) 00:00, 3 February 2020 (UTC)
* Definitely Classical, IMHO. The labels are basically there because they help better understand the composer, not because of self-identification or anything like that, and Beethoven is much more readily comprehended as Classical in style – paradoxically, more so middle and late Beethoven than early Beethoven. Already in his lifetime he was understood as part of the tradition of Haydn and Mozart, and his music makes a lot more sense when analysed that way (there is a reason why the famous book The Classical Style is subtitled "Haydn, Mozart, Beethoven"). A new era does not begin just because his works are of greater length and volume (Mozart's C major quintet and symphony and Haydn's oratorios would otherwise already be good candidates for Romanticism), but when we can point to a real change in musical grammar and style, and we don't see that significantly in Beethoven. Schubert is a harder case to periodise: you could make a case that he should be moved to the Classical period on the grounds of some of the latest instrumental works (e.g. the G major quartet, C major quintet, and C major symphony), but the songs definitely point to Romantic. Some authors treat him as Classical anyway, though. Double sharp (talk) 10:25, 9 February 2020 (UTC)
* This is the trouble with pigeonholes: They demand an either/or decision. Beethoven is commonly regarded as a transitional composer, whose early works (e.g., the Op. 18 String Quartets) are close in style to the Classical Masters (Haydn and Mozart), whereas his later works (from, say, the Eroica Symphony forward) fit more comfortably with the Romantic era. Ideally, the Timeline should have the option of a cross-fade of colour from the one representing the Classical Period to the one representing the Romantic Era, and a corresponding caption. There are of course other composers to which the same observation applies (Du Fay, for example, who is usually regarded as transitional between the Medieval and Renaissance eras, and Monteverdi, who is transitional from the Renaissance to the Baroque). It is a question of oversimplification, which can only realistically be solved by scrapping the Timeline entirely or, at least, removing the period designations from it.—Jerome Kohl (talk) 23:42, 9 February 2020 (UTC)
* For a sort of entry-level article, you can hardly avoid pigeonholing. Like it or not, it helps give a basic understanding. So I would argue that for transitional cases like Beethoven or Schubert, we should pick the classification that is the most useful. As Charles Rosen cogently argued back in 1971, Beethoven's music is almost always far more usefully analysed as Classical than Romantic; and if anything, it is the later works (from about op. 31 onwards) that are closer to Haydn and Mozart than the earlier ones. The earlier ones are far more like the early Romantic pieces of Hummel, Weber, and Schubert in their looser construction. Double sharp (talk) 20:43, 10 February 2020 (UTC)
Sexism and Racism in Classical Music
I am interested in adding the topic heading -sexsim and racism in classical music to the article. The topic will allow editors to contribute to this topic. Is this topic appropriate to add to this page? Or, is there a suggestion for a better page? Or, should there be two different heading? Or none? Maryphillips1952 (talk) 19:56, 23 September 2020 (UTC)
* Well, having a discussion of this topic in a Wikipedia article is reasonable, but a heading with the words "sexism" and "racism" will prove contentious, not to mention rather POV and unbalanced. I might mention Western canon, which covers a similar kind of topic. That same article has the section Western canon, which contains a paragraph discussing the (under)representation of women among composers of classical music, but that is by no means sufficient. I don't really have a strong opinion on where to place coverage of the topic, so I will wait for others to chime in. Toccata quarta (talk) 20:28, 23 September 2020 (UTC)
* which reliable sources do you propose to use for these contributions? --Francis Schonken (talk) 03:39, 24 September 2020 (UTC)
* Not sure I understand all the Wikipedia rules. What would constitute original research trigger if one writes an article with this point of view? A balanced and neutral tone may be tricky. I, agree, this topic warrants discussion and more experienced editors than myself to make final decisions and start entries. I recently read the following article - example of "sexism" . Maryphillips1952 (talk) 04:29, 24 September 2020 (UTC)
* Well, the key Wikipedia rules here are WP:NPV, WP:OR, WP:DUE and WP:RS. That is, an article should not present original research and editors' viewpoints, but report what so called "reliable sources" have to say and keep in mind the perspectives that other worthwhile (not WP:FRINGE) sources may offer. It should present these views with attribution and neutral wording (e.g. "Since the late 1980s, there has been growing debate about the exclusion of female composers from the classical canon and the construction of genius in musicological literature."). Toccata quarta (talk) 07:01, 24 September 2020 (UTC) | WIKI |
Running Isaac from standalone scripts seems to ignore persistence container cache
As the title describes, each time I restart a container and run the Isaac from standalone scripts, it ignores the persistent cache and takes ages to open it. This is not the case if I run Isaac with runheadless- bash scripts. Is there a setting I need to make to use the existing cache?
1 Like
I am facing the same issue for more than a year across different versions.
We’ve updated the docker run command for the latest Isaac Sim 2022.2.1 container. These mounts below should help get persistent cache on host:
-v ~/docker/isaac-sim/kit/cache/Kit:/isaac-sim/kit/cache/Kit:rw \
-v ~/docker/isaac-sim/cache/ov:/root/.cache/ov:rw \
-v ~/docker/isaac-sim/cache/pip:/root/.cache/pip:rw \
-v ~/docker/isaac-sim/cache/glcache:/root/.cache/nvidia/GLCache:rw \
-v ~/docker/isaac-sim/cache/computecache:/root/.nv/ComputeCache:rw \ | ESSENTIALAI-STEM |
Gavin Heath GILBERT, Appellant v. The STATE of Texas, Appellee
No. 06-18-00152-CR
Court of Appeals of Texas, Texarkana.
Date Submitted: February 12, 2019 Date Decided: April 3, 2019 Rehearing Denied April 23, 2019
Michael Mowla, Michael Mowla, PLLC, P.O. Box 868, Cedar Hill, TX 75106, for Appellant.
Matthew H. Harris, Assistant District Attorney, William W. Ramsay, Delta, Franklin, Hopkins County District Attorney, P.O. Box 882, Sulphur Springs, TX 75482, for Appellee.
Before Morriss, C.J., Burgess and Stevens, JJ.
Opinion by Justice Stevens
A Hopkins County jury rejected Gavin Heath Gilbert's claim that he acted in self-defense and convicted him of the murder of Tyrone Phelps. Based on the jury's verdict, Gilbert was assessed a punishment of fifty-five years' imprisonment. On appeal, Gilbert contends that there was legally insufficient evidence (1) to support his conviction for murder and (2) to support the jury's rejection of his claim of self-defense. Gilbert also contends that the trial court erred in (1) admitting evidence that improperly bolstered the testimony of one of the State's witnesses, (2) admitting a photograph of the victim in the hospital, (3) admitting a video recording of the victim's family during the punishment phase of the trial, (4) submitting a jury instruction on retreat, (5) failing to submit an instruction regarding the effect of self-defense on the lesser-included offense of manslaughter, and (6) failing to submit different manner and means of murder as separate charges. Since we find there is legally sufficient evidence to support Gilbert's conviction and the jury's rejection of his self-defense claim and we find no trial court error on his jury charge and preserved evidentiary complaints, we affirm the trial court's judgment.
I. The Evidence at Trial
A. The Testimony of Phelps' Friends
On the evening of December 17, 2017, Phelps and four of his friends, Larry, John, Jack, and Jim, took Larry's truck to purchase fourteen grams of marihuana from Gilbert. Larry, John, Jack, and Jim gave generally consistent testimony about the events leading up to, and following, the incident. They testified that, two days before the incident, Gilbert sold Larry and John an amount of marihuana that he represented to be fourteen grams, which turned out to be only nine grams. Consequently, Phelps and his friends decided to bring digital scales to the December 17 transaction to weigh the marihuana. They also decided that, if Gilbert shorted them again, they would drive off with the marihuana without paying for it.
Larry and his friends pulled up and parked on the side of the road in front of Gilbert's house and waited as Gilbert walked down from his house. Gilbert came to the driver's window and gave the marihuana to Larry, who weighed it on the scales. Instead of the fourteen grams agreed upon, the marihuana only weighed around nine grams. After informing Gilbert of the discrepancy, and a short verbal exchange, Larry hit the gas pedal and peeled out toward the road. Larry and his friends testified that no one had threatened Gilbert, yelled at him, pulled a weapon on him, or used the truck as a weapon during the incident.
At trial, the four young men all agreed that the truck sped up quickly, but several had differing memories regarding the initial movement of the truck. John thought the tires made a squealing sound. Larry testified that the truck spun out a bit and acknowledged that its back end slid to the left and could have hit Gilbert if he had not moved back. Jack acknowledged that the truck spun out, but did not think that it moved toward Gilbert.
The young men also testified that the truck then sped across the road. They heard Gilbert fire several gunshots, one after another. Then several bullets came through the back of the truck. Phelps screamed that he had been shot. They called 9-1-1 and were told to meet the ambulance at a fire station. On the way to the fire station, one of them threw the marihuana to the side of the road. When they got to the fire station, the young men quickly agreed to tell the police that they had been "free-styling" in the country and had passed close to someone, who then started shooting at them.
They first told this fabricated story to law enforcement because they were afraid and did not want to disclose the marihuana. But Larry told Lewis Tatum, the Hopkins County Sheriff, what really happened when he rode with Tatum to show him where the incident happened. Later on, the other young men also told law enforcement what really happened when confronted with the physical evidence.
The young men also testified that Larry had a deer rifle and a shotgun in his truck that night. The rifle was between the front seats with the barrel to the floor, and the shotgun was behind the back seat. The rifle may have been visible to Gilbert.
B. Mason Gilbert's Testimony
Mason Gilbert, Gilbert's cousin, testified that, on the evening of December 17, he was visiting Gilbert's brother at their grandmother's house. Gilbert walked outside without saying anything. About thirty minutes later, Mason went to look for Gilbert when he did not answer his cell phone. When Mason went outside, Gilbert called him and explained that he had been robbed. Later, Gilbert revealed that, when he walked outside, he was going to sell marihuana to Larry and carried a gun in his pocket. Gilbert explained that, when he got to Larry's truck, Larry was driving, and Jim was in the front seat. Mason told law enforcement that Gilbert told him the following:
[Gilbert] kept his hand on his gun the whole time because ...
....
.... [t]hey rob, you know. So he handed it to him. They put it on the scale, and then somebody in the back seat said, f[ ]k it, let's just go, let's go. And then the tires squealed.... [A]s soon as the tires squealed and he felt the truck going off, he came out. And probably about five -- probably about from here to there, he said he shot, like, four or five times and said he didn't know if he hit anyone.
Mason also affirmed that Gilbert never told him that anybody pulled a weapon on him, threatened him, hit him with a vehicle, or tried to run over him.
Around midnight, they learned through social media that Gilbert had killed someone. They then took Gilbert's Glock 9mm pistol into the woods and buried it, and Gilbert threw the live bullets into the trash pile. They also went two or three times to the site of the shooting to try to find the spent bullet casings, but could not find them. They then hid the Glock pistol's box in a drawer in a shed. Mason testified that Gilbert was very upset about the incident and that he stayed up with him until about 1:00 a.m. because he was worried about him. When law enforcement came the following day with a search warrant, Mason led them to the buried Glock pistol and its box. The officers also told him that they had located the spent casings.
After being confronted with a recording of a jail telephone call, Mason admitted that Gilbert had asked him not to testify. He also acknowledged that, when the SWAT team came to arrest Gilbert, Mason's father told Mason not to talk with the officers.
C. Law Enforcement Testimony
Sheriff Tatum testified that the young men had told law enforcement that they were driving down the road and drove past a person who shot through the back of the truck, striking one of them. He did not believe that account. Tatum testified that he struck up a conversation with Larry and asked him if he could show Tatum where the shooting had taken place. As they talked, Larry told him a different story. Larry also showed him where the shooting took place, and Tatum directed his investigators to the location. Tatum also testified about the details of Larry's statement and that the statement was consistent with the physical evidence found in the truck and at the scene.
Kenneth Dean, the jail administrator for the Hopkins County Sheriff's Department (HCSD), testified that Gilbert had no injuries when he was booked into jail the day after the shooting. Dean also identified the persons speaking on five recordings of telephone calls between Gilbert, his father, his mother, and Mason. On the recording from December 23, Gilbert said that one of his friends had told him that the charges against him would be dropped. The recording from January 20, 2018, showed that Gilbert learned for the first time that law enforcement had executed a search warrant on the property. Gilbert asked his mother repeatedly where they had looked and what had been found in the search. When his mother told him that law enforcement had talked to Mason, he quizzed her about where they talked to Mason and what he told them. When his father came to the phone and informed him that law enforcement found a 9mm pistol in the safe, Gilbert responded that he was not worried. On the recording from February 27, 2018, Gilbert urged Mason not to testify at his trial, no matter what the State offered him.
John Vance, a Texas Ranger with the Texas Department of Public Safety (DPS), was the lead investigator. He testified that four spent shell casings were found on the scene and that their locations showed that the shooter fired twice, retreated, and fired two more times. The locations of the spent shell casings revealed that the bullets were fired when the truck was crossing the road and travelling toward a mailbox on the other side of the road. Vance gave extensive testimony about his inspection of Larry's truck. The inspection showed that four bullets penetrated the truck and showed the trajectory of the bullets. One of the bullets was recovered from Phelps' left leg and another from his chest. Vance also testified that the physical evidence of the bullet trajectories showed that the shooter was directly behind the truck. Vance also explained that, after Mason led him to the back of the property near a trash pile, they recovered the Glock 9mm pistol from beneath an old recliner chair.
On cross-examination, Vance testified that he had interviewed Larry, John, Jack, and Jim twice. After his initial interviews of the young men, he learned from Tatum that there was new information. After interviewing the young men a second time, he characterized their first statements as lies.
Shea Shaw, a sergeant with the HCSD, was also involved in the investigation. On cross-examination, Shaw testified that, if someone was standing by a truck in a muddy location and the truck accelerated rapidly, it could place the person in danger. He also testified that it was possible that the truck could skid out and knock the person down.
Dennis Findley, a criminal investigator for the HCSD, testified that, during the execution of the search warrant on December 18, he recovered a Ruger 9mm pistol and 9mm ammunition from a gun safe in the main house on the property. He also testified that a Glock 9mm pistol was found on the property.
Corley Weatherford, chief investigator for the HCSD, took a statement from Mason. He testified that Mason told him that he and Gilbert knew that law enforcement would come, so they hid the gun and removed the live bullets from the gun, which they threw in the trash pile. Mason also said that they looked for the spent casings at the scene of the shooting so they could remove them. In addition, Mason told him that the young men took Gilbert's last bag of marihuana and that that was probably why Gilbert was so angry.
Nathan Tunnell is a firearms and tool marks examiner for the DPS Crime Laboratory in Tyler. He testified that the four recovered shell casings and the bullets recovered from Phelps' thigh and chest were all fired from the Glock 9mm pistol recovered from the Gilbert property.
Dr. Chester Gwin is a medical examiner for the Dallas County Medical Examiner's Office. He testified that Phelps had two gunshot wounds to his body. One bullet entered his left upper back, hit the aorta and the right side of his heart, and lodged in soft tissue, where it was recovered. Gwin testified that Phelps would only have had seconds to minutes to live from such a wound. The second bullet entered the front of Phelps' left thigh, where it was recovered.
D. Gilbert's Testimony
Testifying in his own defense, Gilbert said that he had turned seventeen years old about six weeks before the incident. He had lived with his grandmother, Kathy Temples, since he was four or five years old. Two days before the incident, he sold Larry fourteen grams of marihuana for $90.00. Two hours later, Larry texted him and said that he thought it was short. In response, Gilbert offered to sell him some better stuff.
On December 17, Larry texted and asked if he had any marihuana. Gilbert offered to sell him a half of an ounce, but no price was discussed. After Gilbert refused to come to town, Larry said he would come to his house. When Larry arrived, he texted Gilbert, who walked down to meet them. When he got to the truck, it was running, but no lights were on. Gilbert went to the driver's window, and Larry asked if he could weigh the marihuana. He gave the marihuana to Larry and leaned against the door. Gilbert saw Larry and a front seat passenger, but he could not see how many people were in the back seat.
Larry said the marihuana only weighed "nine something." Gilbert asked if Larry would give him $100.00, to which Larry responded, "[Y]es." Then someone in the truck said, "[J]ust take it." Larry punched the accelerator and took off. When the truck took off, it pushed Gilbert back a couple of steps. Gilbert said he was scared and just reacted and fired without aiming at anything. He claimed he did not know if he hit anything or how many times he fired his pistol. Gilbert testified that he heard the tires squeal, that it startled him a little, and that he felt he was in danger. He said he knew that Larry had guns in his truck, but he never saw one and nobody pointed one at him.
Once the truck got down the road, Gilbert ran to his house and met up with Mason. Gilbert told Mason that he had been robbed. They talked for a short while, then Gilbert went to his room. About two hours later, he saw posts on social media that someone had shot at Larry's truck and that there was a death. Accordingly, Gilbert knew it was about the incident, so he threw the gun in the woods and told Mason he needed to talk to him. A few hours later, law enforcement arrived and arrested Gilbert.
Gilbert said that he did not intend to shoot anybody and that he was not aiming at anything. Rather, he claimed he was just shooting out of reaction because he was scared. He did not know Phelps, but had seen him around. Until he saw the Facebook post, Gilbert did not realize he had hit anything. He said he was backing up as he was firing and only fired four shots. He was sorry for what happened.
On cross-examination, Gilbert admitted that he had lied to Vance when he denied that he met up with Larry and sold him marihuana. He admitted that the bag of marihuana taken by Larry was his last bag, but denied that it upset him. He acknowledged that he did not find out that law enforcement had searched his house until one month after he was arrested. Gilbert also admitted that, when he told his mother and father that there were no new charges, he believed that his gun had not been found and thought his plan had worked. He further admitted that he got upset when he found out Mason had talked with law enforcement. Gilbert then admitted that, when his father told him that only the Ruger 9mm pistol out of the safe had been found, he was not worried because he thought law enforcement had not found the gun he used to kill Phelps.
Gilbert acknowledged that he later discovered Mason had cooperated with law enforcement from his lawyer and that he was furious with Mason at the time. About a month later, he spoke with Mason and told him not to get on the stand no matter what they offered him. Gilbert admitted that, at the time, he thought he would not get convicted.
Gilbert testified that he had the pistol in his possession for about thirty days. He admitted getting it out of the drawer that evening and loading it. He identified the Glock 9mm pistol as the gun he used to kill Phelps. While admitting that he hit the truck with all the bullets he fired, he maintained that it was an accident. He acknowledged that, looking back at it now, he did not have good cause to fire at the truck. He admitted that he fired the bullets and that he caused the death of Phelps by shooting him with a firearm. He also admitted that he knowingly discharged the gun in the direction of the truck.
Gilbert also called his grandmother, Kathy Temples, as a witness. Temples testified that Gilbert had lived with her since he was three years old.
II. Legally Sufficient Evidence Supports Gilbert's Conviction
In his first and second issues, Gilbert complains that there is legally insufficient evidence to support (1) the jury's verdict that he committed murder and (2) the jury's implicit rejection of his claim of self-defense. We disagree.
A. Standard of Review
In evaluating legal sufficiency, we review all the evidence in the light most favorable to the trial court's judgment to determine whether any rational jury could have found the essential elements of the offense beyond a reasonable doubt. Brooks v. State , 323 S.W.3d 893, 912 (Tex. Crim. App. 2010) (plurality op.) (citing Jackson v. Virginia , 443 U.S. 307, 319, 99 S.Ct. 2781, 61 L.Ed.2d 560 (1979) ); Hartsfield v. State , 305 S.W.3d 859, 863 (Tex. App.-Texarkana 2010, pet. ref'd). Our rigorous review focuses on the quality of the evidence presented. Brooks , 323 S.W.3d at 917-18 (Cochran, J., concurring). We examine legal sufficiency under the direction of the Brooks opinion, while giving deference to the responsibility of the jury "to fairly resolve conflicts in testimony, to weigh the evidence, and to draw reasonable inferences from basic facts to ultimate facts." Hooper v. State , 214 S.W.3d 9, 13 (Tex. Crim. App. 2007) (citing Jackson , 443 U.S. at 318-19, 99 S.Ct. 2781 ); Clayton v. State , 235 S.W.3d 772, 778 (Tex. Crim. App. 2007). In drawing reasonable inferences, the jury "may use common sense and apply common knowledge, observation, and experience gained in the ordinary affairs of life." Duren v. State , 87 S.W.3d 719, 724 (Tex. App.-Texarkana 2002, pet. struck) (citing Manrique v. State , 994 S.W.2d 640, 649 (Tex. Crim. App. 1999) (Meyers, J., concurring) ). The jury is also the sole judge of the credibility of the witnesses and the weight to be given their testimony and may "believe all of a witness['] testimony, portions of it, or none of it." Thomas v. State , 444 S.W.3d 4, 10 (Tex. Crim. App. 2014). We give "almost complete deference to a jury's decision when that decision is based on an evaluation of credibility." Lancon v. State , 253 S.W.3d 699, 705 (Tex. Crim. App. 2008).
In our review, we consider "events occurring before, during and after the commission of the offense and may rely on actions of the defendant which show an understanding and common design to do the prohibited act." Hooper , 214 S.W.3d at 13 (quoting Cordova v. State , 698 S.W.2d 107, 111 (Tex. Crim. App. 1985) ). It is not required that each fact "point directly and independently to the guilt of the appellant, as long as the cumulative force of all the incriminating circumstances is sufficient to support the conviction." Id. Circumstantial evidence and direct evidence are equally probative in establishing the guilt of a defendant, and guilt can be established by circumstantial evidence alone. Ramsey v. State , 473 S.W.3d 805, 809 (Tex. Crim. App. 2015) ; Hooper , 214 S.W.3d at 13 (citing Guevara v. State , 152 S.W.3d 45, 49 (Tex. Crim. App. 2004) ). And we consider all the evidence admitted at trial, even improperly admitted evidence. Moff v. State , 131 S.W.3d 485, 489-90 (Tex. Crim. App. 2004).
B. Sufficient Evidence Supports the Murder Conviction
Under the Texas Penal Code, a person commits first-degree murder if he:
(1) intentionally or knowingly causes the death of an individual;
(2) intends to cause serious bodily injury and commits an act clearly dangerous to human life that causes the death of an individual; or
(3) commits or attempts to commit a felony, other than manslaughter, and in the course of and in furtherance of the commission or attempt, ... he commits or attempts to commit an act clearly dangerous to human life that causes the death of an individual.
TEX. PENAL CODE ANN. § 19.02(b).
These three methods of committing murder are not separate offenses, but alternative methods of committing the same offense. Smith v. State , 436 S.W.3d 353, 378 (Tex. App.-Houston [14th Dist] 2014, pet. ref'd) ; Lozano v. State , 359 S.W.3d 790, 821 (Tex. App.-Fort Worth 2012, pet. ref'd) ; see Aguirre v. State , 732 S.W.2d 320, 325-26 (Tex. Crim. App. [Panel Op.] 1982) (op. on reh'g) (holding that an indictment alleging theories of both intentional and knowing murder and felony murder did not allege different offenses, but only different ways of committing the same offense); accord Barfield v. State , 202 S.W.3d 912, 916 (Tex. App.-Texarkana 2006, pet. ref'd). The State's indictment alleged four alternate theories of how Gilbert murdered Phelps corresponding to the statutory manner and means of committing first-degree murder. The trial court charged the jury in the disjunctive, tracking the indictment, and the jury returned a general verdict. When a general verdict is returned and there is sufficient evidence to support a finding under any of the alleged theories submitted, we will uphold the verdict. Fuller v. State , 827 S.W.2d 919, 931 (Tex. Crim. App. 1992) (en banc); Aguirre , 732 S.W.2d at 326. We therefore need only determine whether there is sufficient evidence to support a guilty finding under one of the theories submitted to the jury.
Legal sufficiency of the evidence is measured by the elements of the offense as defined by a hypothetically correct jury charge. Malik v. State , 953 S.W.2d 234, 240 (Tex. Crim. App. 1997). The "hypothetically correct" jury charge is "one that accurately sets out the law, is authorized by the indictment, does not unnecessarily increase the State's burden of proof or unnecessarily restrict the State's theories of liability, and adequately describes the particular offense for which the defendant was tried." Id.
To obtain a guilty verdict under Section 19.02(b)(2), the State had to prove beyond a reasonable doubt that Gilbert (1) intended (2) to cause serious bodily injury and (3)(a) committed an act clearly dangerous to human life (b) that caused the death of Phelps. See TEX. PENAL CODE ANN. § 19.02(b)(2). Gilbert only challenges the sufficiency of the evidence showing he committed an act clearly dangerous to human life. This element requires a showing "that the act intended to cause serious bodily injury be objectively clearly dangerous to human life. " Lugo-Lugo v. State , 650 S.W.2d 72, 81 (Tex. Crim. App. 1983) (en banc).
The evidence here shows that Gilbert shot several times into a truck that he knew was occupied by at least three people. As the Texas Court of Criminal Appeals has stated, "[F]iring a gun in the direction of an individual is an act clearly dangerous to human life." Forest v. State , 989 S.W.2d 365, 368 (Tex. Crim. App. 1999) ; see Warren v. State , No. 02-17-00221-CR, 2018 WL 3764069, at *4 (Tex. App.-Fort Worth Aug. 9, 2018, pet. ref'd) (mem. op., not designated for publication) (shooting two shots into vehicle in road rage incident sufficient evidence under Section 19.02(b)(2) ). Likewise, a rational jury could find that shooting several times into the cab of a truck that the defendant knows is occupied by multiple people is clearly dangerous to human life.
Even so, Gilbert argues that he cannot be found guilty under Section 19.02(b)(2) when he is acting out of self-defense. Yet, none of the cases cited by Gilbert support this proposition. And by entering a verdict of guilty, the jury impliedly rejected his assertion that he was acting in self-defense. See Braughton v. State , No. PD-0907-17, 569 S.W.3d 592, 609, 2018 WL 6626621, at *12 (Tex. Crim. App. Dec. 19, 2018) ("A jury verdict of guilty is an implicit finding rejecting the defendant's self-defense theory.") (quoting Saxton v. State , 804 S.W.2d 910, 914 (Tex. Crim. App. 1991) ).
After viewing all the evidence in the light most favorable to the jury's verdict, we find that legally sufficient evidence supports Gilbert's conviction for murder.
C. Sufficient Evidence Supports the Rejection of Gilbert's Self-Defense Theory
In his second issue, Gilbert challenges the legal sufficiency of the evidence supporting the jury's implicit finding rejecting his self-defense theory. Gilbert argues that ample evidence showed that he reasonably believed that deadly force was necessary to protect himself from the truck occupants' use or attempted use of deadly force and their commission of aggravated robbery. He also argues that the State failed to meet its burden of persuasion to disprove self-defense. Thus, he argues, no rational jury would have found against his self-defense theory beyond a reasonable doubt. Again, we disagree.
1. Standard of Review
In evaluating a claim of insufficient evidence in the context of a self-defense issue, we apply the general sufficiency review principles set forth above, along with sufficiency review principles specific to self-defense. Id. When there is a claim of self-defense or defense of a third person to justify use of force or deadly force against another, "the defendant bears the burden to produce evidence supporting the defense, while the State bears the burden of persuasion to disprove the raised issues." Id. (citing Zuliani v. State , 97 S.W.3d 589, 594 (Tex. Crim. App. 2003) ; Saxton , 804 S.W.2d at 913-14 ). The defendant must produce "some evidence that would support a rational finding in his favor on the defensive issue." Id. (citing Krajcovic v. State , 393 S.W.3d 282, 286 (Tex. Crim. App. 2013) ). The State need not produce evidence. Instead, its burden of persuasion only requires "that the State prove its case beyond a reasonable doubt." Id. (quoting Zuliani , 97 S.W.3d at 594 (citing Saxton , 804 S.W.2d at 913 ) ). For that reason,
[i]n resolving the sufficiency of the evidence issue, we look not to whether the State presented evidence which refuted appellant's self-defense testimony, but rather we determine whether after viewing all the evidence in the light most favorable to the prosecution, any rational trier of fact would have found the essential elements of [the offense] beyond a reasonable doubt and also would have found against appellant on the self-defense issue beyond a reasonable doubt.
Id. (quoting Saxton , 804 S.W.2d at 914 ). And as with the general sufficiency principles, the trier of fact is the sole judge of the credibility of defensive evidence, and it is free to accept it or reject it. Id. (citing Saxton , 804 S.W.2d at 914 ). As a result, "[d]efensive evidence which is merely consistent with the physical evidence at the scene of the alleged offense will not render the State's evidence insufficient." Id. (citing Saxton , 804 S.W.2d at 914 ).
2. The Law of Self-Defense
The use of deadly force is a defense to prosecution for murder if the use of deadly force is justified. See TEX. PENAL CODE ANN. §§ 9.02, 9.31 -.32 (West 2011); Braughton , 569 S.W.3d at 605-06, 2018 WL 6626621, at *9. "[A] person is justified in using force against another when and to the degree the actor reasonably believes the force is immediately necessary to protect the actor against the other's use or attempted use of unlawful force." TEX. PENAL CODE ANN. § 9.31(a). And "[a] person is justified in using deadly force against another ... when and to the degree the actor reasonably believes the deadly force is immediately necessary ... to protect the actor against the other's use or attempted use of unlawful deadly force...." TEX. PENAL CODE ANN. § 9.32(a)(2)(A). "Reasonable belief" is defined as "a belief that would be held by an ordinary and prudent man in the same circumstances as the actor." TEX. PENAL CODE ANN. § 1.07(a)(42) (West Supp. 2018).
In some cases, the actor's belief that deadly force was immediately necessary is presumed to be reasonable. One of those circumstances is when (1) the actor "knew or had reason to believe that the person against whom the deadly force was used" was committing or attempting to commit certain enumerated offenses, (2) the actor did not provoke the other person, and (3) the actor was not engaged in criminal activity, other than a class C misdemeanor or a traffic violation. TEX. PENAL CODE ANN. § 9.32(b)(1). Here, it is undisputed that Gilbert was attempting to deliver marihuana, which is, at minimum, a class B misdemeanor. Therefore, the presumption that Gilbert's belief was reasonable does not apply.
In addition, an actor is not required to retreat before using deadly force if he "has a right to be present at the location where the deadly force is used, [he] has not provoked the person against whom deadly force is used, and [he] is not engaged in criminal activity at the time deadly force is used...." TEX. PENAL CODE ANN. § 9.32(c).
3. Analysis
We have already determined that legally sufficient evidence supports the jury's finding, beyond a reasonable doubt, that Gilbert committed murder. So we must now "determine whether[,] after viewing all the evidence in the light most favorable to the prosecution, any rational trier of fact.... also would have found against [Gilbert] on the self-defense issue beyond a reasonable doubt." Saxton v. State , 804 S.W.2d 910, 914 (Tex. Crim. App. 1991).
Gilbert testified that it startled him when Larry took off rapidly in the truck, that it pushed him back a few feet, and that he felt he was in danger. Other witnesses differed on whether the truck's back end may have veered a bit toward Gilbert, and several witnesses acknowledged that it was possible that the truck's action could have injured Gilbert. The physical evidence, however, showed an arcing path out of the grass that headed away from anyone who may have been standing at the driver's window. It also showed that the truck continued in a direction away from where Gilbert was first standing, with no indication that the truck ever turned in Gilbert's direction. The physical evidence and Gilbert's testimony also showed that he stepped back a few feet before shooting two shots, retreated again, and shot two more times, all while the truck was going in the opposite direction. Gilbert did not testify that he thought his use of deadly force was necessary to prevent Larry's use or attempted use of deadly force against him. Rather, Gilbert stated that he did not think the truck would return. On this evidence, a rational jury could reasonably find that an ordinary and prudent person in the same circumstance would not believe that deadly force was necessary to prevent the use of deadly force by Larry.
Gilbert also took steps to cover up his involvement in the shooting. First, he hid the gun and the unused ammunition and attempted to hide the spent shells. In addition, when initially interviewed by Vance, Gilbert denied having any involvement in the incident. A jury may consider a defendant's actions after the commission of the offense. See Clayton v. State , 235 S.W.3d 772, 780 (Tex. Crim. App. 2007). And during the time that he thought law enforcement had not recovered the murder weapon, Gilbert confidently expressed that he was not worried and that he believed the charges would be dropped. A rational jury considering Gilbert's attempted cover up, his confidence while he thought the cover up successful, and his denial of any involvement could draw a strong inference that the shooting was intentional, and not the result of self-defense. See id.
After considering all of the evidence in a light most favorable to the prosecution, we find that a rational jury could reasonably find, beyond a reasonable doubt, against Gilbert's claim of self-defense. As a result, we find that legally sufficient evidence supports the jury's rejection of Gilbert's self-defense issue. We overrule Gilbert's second issue.
III. No Jury Charge Error
In his sixth, seventh, and eighth issues, Gilbert complains that the trial court erred by (1) submitting a jury instruction on retreat, (2) failing to submit an instruction regarding the effect of self-defense on the lesser-included offense of manslaughter, and (3) failing to submit different manner and means of murder as separate charges.
A. Standard of Review and the Law Applicable to the Case
A two-step process is employed in our review of alleged jury charge error. See Abdnor v. State , 871 S.W.2d 726, 731 (Tex. Crim. App. 1994). "Initially, we determine whether error occurred and then evaluate whether sufficient harm resulted from the error to require reversal." Wilson v. State , 391 S.W.3d 131, 138 (Tex. App.-Texarkana 2012, no pet.) (citing Abdnor , 871 S.W.2d at 731-32 ).
"[T]he jury is the exclusive judge of the facts, but it is bound to receive the law from the court and be governed thereby." TEX. CODE CRIM. PROC. ANN. art. 36.13 (West 2007). "A trial court must submit a charge setting forth the 'law applicable to the case.' " Lee v. State , 415 S.W.3d 915, 917 (Tex. App.-Texarkana 2013, pet. ref'd) (quoting TEX. CODE CRIM. PROC. ANN. art. 36.14 (West 2007) ). "The purpose of the jury charge ... is to inform the jury of the applicable law and guide them in its application. It is not the function of the charge merely to avoid misleading or confusing the jury: it is the function of the charge to lead and prevent confusion." Id. (quoting Delgado v. State , 235 S.W.3d 244, 249 (Tex. Crim. App. 2007) ).
The level of harm necessary to require reversal due to jury charge error depends on whether the appellant properly objected to the error. Abdnor , 871 S.W.2d at 732. Because Gilbert did not object to the charge, we will not reverse unless the record shows the error led to egregious harm, Ngo v. State , 175 S.W.3d 738, 743-44 (Tex. Crim. App. 2005) (citing Almanza v. State , 686 S.W.2d 157, 171 (Tex. Crim. App. 1984) (op. on reh'g) ), so that he did not receive a fair and impartial trial. See Almanza v. State , 686 S.W.2d 157, 171 (Tex. Crim. App. 1984) (op. on reh'g); Loun v. State , 273 S.W.3d 406, 416 (Tex. App.-Texarkana 2008, no pet.). "Jury-charge error is egregiously harmful if it affects the very basis of the case, deprives the defendant of a valuable right, or vitally affects a defensive theory." Stuhler v. State , 218 S.W.3d 706, 719 (Tex. Crim. App. 2007). We review "the entire jury charge, the state of the evidence, the argument of counsel, and any other relevant information in the record as a whole" to make our determination. Villarreal v. State , 205 S.W.3d 103, 106 (Tex. App.-Texarkana 2006, pet. dism'd, untimely filed) (citing Almanza , 686 S.W.2d at 171 ). Direct evidence of harm is not required to establish egregious harm. Hutch v. State , 922 S.W.2d 166, 171 (Tex. Crim. App. 1996).
A trial court has the duty to provide the jury with "a written charge distinctly setting forth the law applicable to the case." TEX. CODE CRIM. PROC. ANN. art. 36.14 (West 2007) ; Mendez v. State , 545 S.W.3d 548, 551-52 (Tex. Crim. App. 2018). Because "[a]n unrequested defensive issue is not the law applicable to the case," the trial court has no duty to instruct the jury on the issue. Taylor v. State , 332 S.W.3d 483, 487 (Tex. Crim. App. 2011) (citing Posey v. State , 966 S.W.2d 57, 62 (Tex. Crim. App. 1998) ). Yet, if the trial court instructs the jury sua sponte on a defensive issue, "that issue becomes 'law applicable to the case,' whether the defendant requested it or objected to its absence or not." Mendez , 545 S.W.3d at 552-53 (citing Barrera v. State , 982 S.W.2d 415, 416 (Tex. Crim. App. 1998) ). In such an instance, the trial court must give the charge correctly, and any error in the charge given is "subject to review under Almanza ." Id. at 553 (quoting Vega v. State , 394 S.W.3d 514, 516 (Tex. Crim. App. 2013) ).
B. The Trial Court Did Not Err By Giving an Instruction on Failure to Retreat
In its charge on self-defense, the trial court gave the following instruction, apparently sua sponte, pursuant to Section 9.32, subsections (c) and (d), of the Texas Penal Code :
Failure to Retreat
A person who has a right to be present at a location where the person uses deadly force against another is not required to retreat before using deadly force in self-defense if both-
1. the person with the right to be present did not provoke the person against whom the deadly force is used; and
2. the person is not engaged in criminal activity at the time the deadly force is used.
Therefore, in deciding whether the state has proved that the defendant did not reasonably believe his use of deadly force was necessary, you must not consider any failure of the defendant to retreat that might be shown by the evidence if you find both-
1. the defendant did not provoke [Phelps], the person against whom the defendant used deadly force; and
2. the defendant was not engaged in criminal activity at the time he used the deadly force.
If you do not find both 1 and 2, you may consider any failure of the defendant to retreat that might be shown by the evidence in deciding whether the defendant reasonably believed his use of deadly force was necessary.[ ]
Gilbert contends that the trial court erred in giving this instruction because it was undisputed at trial that Gilbert was engaged in criminal activity when he used deadly force. For that reason, he argues, Section 9.32 was not law applicable to the case, so the instruction was erroneous and was likely to confuse the jury so that it would conclude that he had a duty to retreat.
Gilbert does not contend that the trial court's instruction was an incorrect statement of the law as set forth in Section 9.32, subsections (c) and (d). As noted by the authors of the Texas Criminal Pattern Jury Charges, "One reasonable reading of [ Section 9.32, subsections (c) and (d),] is that if a trier of fact finds the defendant was required to retreat and did not do so, this is to be considered as bearing on whether the defendant reasonably believed the force the defendant used was necessary as required by the general rule of self-defense." Comm. on Pattern Jury Charges, State Bar of Tex., Texas Criminal Pattern Jury Charges: Criminal CPJC 31.5 (2018). Indeed, the Texas Court of Criminal Appeals has affirmatively stated that, "[w]hen [ Section 9.32, subsections (c) and (d),] do not apply, the failure to retreat may be considered in determining whether a defendant reasonably believed that his conduct was immediately necessary to defend himself or a third person." Morales v. State , 357 S.W.3d 1, 5 (Tex. Crim. App. 2011). On the other hand, the court indicated that a jury instruction on a general duty to retreat would be erroneous since it is not authorized by statute and would be a comment on the weight of the evidence. Id.
Here, the trial court's charge does not contain an instruction indicating that Gilbert had a duty to retreat. Rather, the trial court's instruction correctly instructed the jury under Section 9.32(c) about when a defendant is not required to retreat. It also correctly instructed the jury under Section 9.32(d) that, if it found that Gilbert met the conditions of subsection (c), then it must not consider evidence of Gilbert's failure to retreat. In accordance with Morales , and these sections, the trial court then instructed the jury that, if it found that Gilbert did not meet the conditions of subsection (c), then it may consider any evidence of Gilbert's failure to retreat when determining whether he reasonably believed that his use of deadly force was necessary. Gilbert admits that he did not meet the conditions of Section 9.32(c). Thus, this final instruction was a correct statement of "the law applicable to the case." To place this instruction in the proper context, it was also necessary to instruct the jury regarding Section 9.32, subsections (c) and (d).
We therefore find that the trial court did not err in giving the instruction on the failure to retreat. For that reason, we overrule Gilbert's sixth issue.
C. Gilbert's Complaint Regarding the Manslaughter Instruction is Moot
In his seventh point of error, Gilbert complains that the trial court erred in failing to distinctly apply the law of self-defense to the lesser-included offense of manslaughter and in failing to explain how Section 9.05 of the Texas Penal Code might apply to manslaughter. Since we previously found that there is sufficient evidence supporting Gilbert's conviction for murder, this issue is moot. We overrule Gilbert's seventh issue.
D. The Trial Court Did Not Err in its Instructions on Murder
In his eighth issue, Gilbert asserts that the trial court erred by submitting the State's alternative theories of murder as alternative means of committing a single offense. Although Gilbert acknowledges that the State's theories of how the murder of Phelps was committed correspond to the three methods of first-degree murder contained in Section 19.02(b), he argues that each of the three methods contain a different mens rea and are, therefore, three different offenses, which requires jury unanimity on one of the methods.
In addressing the requirement of jury unanimity in relation to an offense that may have multiple ways of being committed, the Texas Court of Criminal Appeals has stated:
Under the Texas Constitution and Code of Criminal Procedure, a Texas jury must reach a unanimous verdict. The jury must agree that the defendant committed one specific crime. That does not mean, however, that the jury must unanimously find that the defendant committed that crime in one specific way or even with one specific act. The Legislature has considerable discretion in defining crimes and the manner in which those crimes can be committed. That discretion is limited only by the Due Process Clause of the federal constitution and the Due Course of Law provision of the Texas Constitution.
In deciding what elements and facts a jury must unanimously agree on, courts implement the legislative intent behind the penal provision. Both Texas and federal courts have held that the jury must be unanimous in finding that the defendant committed a specific statutory crime. But it is the legislature, not the courts, that defines the forbidden act, the required culpability, and the particular result, if any.
Landrian v. State , 268 S.W.3d 532, 535-36 (Tex. Crim. App. 2008) (citations omitted) (footnotes omitted). Jury unanimity "means that each and every juror agrees that the defendant committed the same, single, specific criminal act." Ngo , 175 S.W.3d at 745.
As we have previously noted, the Legislature has provided that a person commits first degree murder if he:
(1) intentionally or knowingly causes the death of an individual;
(2) intends to cause serious bodily injury and commits an act clearly dangerous to human life that causes the death of an individual; or
(3) commits or attempts to commit a felony, other than manslaughter, and in the course of and in furtherance of the commission or attempt, ... he commits or attempts to commit an act clearly dangerous to human life that causes the death of an individual.
TEX. PENAL CODE ANN. § 19.02(b).
Although the conduct may be very different, these three methods of committing murder are not separate offenses, but rather alternative methods of committing the same offense. Smith , 436 S.W.3d at 378 ; Lozano , 359 S.W.3d at 821 ; see Aguirre , 732 S.W.2d at 325-26 (holding that an indictment alleging theories of both intentional and knowing murder and felony murder did not allege different offenses, but only different ways of committing the same offense); accord Barfield , 202 S.W.3d at 916. The State's indictment alleged four alternate theories of how Gilbert murdered Phelps, corresponding to the statutory manner and means of committing first-degree murder.
The trial court charged the jury in the disjunctive, tracking the indictment, and the jury returned a general verdict. In a case involving capital murder, the Texas Court of Criminal Appeals held that,
although the indictment may allege the differing methods of committing the offense in the conjunctive, it is proper for the jury to be charged in the disjunctive. It is appropriate where the alternate theories of committing the same offense are submitted to the jury in the disjunctive for the jury to return a general verdict if the evidence is sufficient to support a finding under any of the theories submitted.
Kitchens v. State , 823 S.W.2d 256, 258 (Tex. Crim. App. 1991) (citations omitted). In Aguirre , the court found that it was proper to charge the jury in the disjunctive in a murder case in which the state alleged alternative theories of intentional and knowing murder and felony murder, "[b]ecause appellant's indictment did not allege different offenses but only alleged different ways of committing the same offense." Aguirre , 732 S.W.2d at 326. Thus, in homicide cases, "different legal theories involving the same victim are simply alternate methods of committing the same offense." Huffman v. State , 267 S.W.3d 902, 905 (Tex. Crim. App. 2008). In such a case, the jury need not agree unanimously as to the manner and means by which the offense was committed. See Aguirre , 732 S.W.2d at 326.
That said, Gilbert argues that the jury had to be unanimous regarding his mental state as he aimed and fired the murder weapon, citing Ngo , 175 S.W.3d at 744. In Ngo , the victim's credit cards were stolen when her house was burglarized. A few weeks later, Ngo attempted to use the credit cards to purchase beer at a bar. Id. at 741. At trial, the jury was charged disjunctively, which allowed the jury to convict Ngo of credit card fraud by any one of three different acts, but the jurors were not required to be unanimous in their verdict as to any one act. Id. at 744-45. Since the indictment alleged three different acts that occurred at three different times, the Texas Court of Criminal Appeals held that the jury was required to be unanimous as to the same, single, specific criminal act. Id. at 745.
Ngo is distinguishable from this case. Here, there was one act-firing four shots toward an occupied vehicle-that occurred at one time and caused the death of Phelps. Thus, there was only one criminal act. But the mental state of Gilbert in firing into the vehicle could be described in a number of ways: (1) he could have intended to cause the death of Phelps (or another occupant of the vehicle); (2) he could have been aware that firing the shots into the vehicle was reasonably certain to cause the death of Phelps or another occupant; (3) he could have intended to cause one of the occupant's serious bodily injury and caused the death of Phelps; or (4) he could have committed deadly conduct and caused the death of Phelps. Under Section 19.02(b), each of these theories simply describe different ways of committing the same offense, or criminal act, since there was only one criminal act involving one victim. And in a case decided after Ngo , the Texas Court of Criminal Appeals reaffirmed, "With respect to homicide offenses-which focus on the death of an individual-'we have held that different legal theories involving the same victim are simply alternate methods of committing the same offense.' " Davis v. State , 313 S.W.3d 317, 342 (Tex. Crim. App. 2010) (quoting Huffman , 267 S.W.3d at 905 ). Thus, the jury charge may disjunctively allege alternative theories of murder found in Section 19.02, as long as there is only one victim, and the requirement of jury unanimity will be satisfied.
For that reason, we find that the trial court did not err by submitting the State's alternative theories of murder as alternative means of committing a single offense. We overrule Gilbert's eighth issue.
IV. No Error in Admitting Evidence
In his third, fourth, and fifth issues, Gilbert asserts that the trial court erred in (1) admitting evidence that improperly bolstered the testimony of one of the State's witnesses, (2) admitting a photograph of the victim in the hospital, and (3) admitting a video recording of the victim's family during the punishment phase of the trial.
A. Standard of Review
"We review a trial court's decision to admit or exclude evidence for an abuse of discretion." Flowers v. State , 438 S.W.3d 96, 103 (Tex. App.-Texarkana 2014, pet. ref'd) (citing Martinez v. State , 327 S.W.3d 727, 736 (Tex. Crim. App. 2010) ). "Abuse of discretion occurs only if the decision is 'so clearly wrong as to lie outside the zone within which reasonable people might disagree.' " Id. (quoting Taylor v. State , 268 S.W.3d 571, 579 (Tex. Crim. App. 2008) ;
Montgomery v. State , 810 S.W.2d 372, 391 (Tex. Crim. App. 1990) (op. on reh'g) ). "We may not substitute our own decision for that of the trial court." Id. (citing Moses v. State , 105 S.W.3d 622, 627 (Tex. Crim. App. 2003) ). "We will uphold an evidentiary ruling if it was correct on any theory of law applicable to the case." Id. (citing De La Paz v. State , 279 S.W.3d 336, 344 (Tex. Crim. App. 2009) ).
B. Gilbert Waived his Bolstering Complaint
During Sheriff Tatum's testimony, the State sought to have Tatum testify as to the details of Larry's second statement regarding the incident, to which Gilbert objected as hearsay. After a short voir dire, the trial court sustained the objection. After cross-examination, a hearing was held at the bench in which the State argued that Gilbert had opened the door to Tatum testifying about Larry's statement by its cross-examination, and the trial court allowed the State to solicit the testimony. On appeal, Gilbert complains that the trial court erred because the admission of the statement was improper bolstering of Larry's and the other young men's subsequent testimony and that it deprived him of his right to confront and cross-examine witnesses against him.
"If a defendant objects to the admission of evidence but the same evidence is subsequently introduced from another source without objection, the defendant waives his earlier objection." Bryant v. State , 282 S.W.3d 156, 165 (Tex. App.-Texarkana 2009, pet. ref'd) (quoting Massey v. State , 933 S.W.2d 141, 149 (Tex. Crim. App. 1996) ). After Tatum's testimony, Larry testified without objection that, after first telling Tatum a lie, he told him everything that happened, including the details about the shooting. Since "substantively equivalent testimony to which he had earlier objected was later admitted without objection," Gilbert waived this issue for our review. Id. at 166 (citing Massey , 933 S.W.2d at 149 ). We overrule Gilbert's third issue.
C. Gilbert Waived his Complaints Regarding the Victim's Photograph
In his fourth issue, Gilbert complains of the admission of a photograph of Phelps' body laying on a gurney while he was at the hospital. The photograph, State's Exhibit 180, was offered with a group of photographs taken at the hospital and marked State's Exhibits 175 through 181. Gilbert objected to Exhibit 180, asserting that it was prejudicial, inflammatory, irrelevant, and cumulative. On appeal, Gilbert complains that the State only wanted to admit the photograph in order to inflame the jury and that it was irrelevant. But an autopsy photograph of Phelps, which is almost identical to Exhibit 180, was introduced earlier in the trial. The rule is the same, whether substantially the same evidence is received without objection before or after the complained-of ruling. Leday v. State , 983 S.W.2d 713, 718 (Tex. Crim. App. 1998) ; see Valle v. State , 109 S.W.3d 500, 509 (Tex. Crim. App. 2003) ("To preserve error in admitting evidence, a party must make a proper objection and get a ruling on that objection.... An error in the admission of evidence is cured where the same evidence comes in elsewhere without objection."). Gilbert has therefore waived these complaints for our review. We overrule Gilbert's fourth issue.
D. No Error in Admitting Video Recording of the Family During Punishment
In his fifth issue, Gilbert complains of the admission, during the punishment phase, of a recording of Phelps' family at the hospital. The recording was offered as victim-impact evidence. Although Gilbert acknowledges that victim-impact evidence is admissible during the punishment phase, he argues that the recording has no bearing on his personal responsibility and moral culpability. See Hayden v. State , 296 S.W.3d 549, 552 (Tex. Crim. App. 2009) ("Victim ... impact evidence ... [is] admissible during the punishment phase if the fact[-]finder may rationally attribute the evidence to the accused's 'personal responsibility and moral culpability.' ") (quoting Salazar v. State , 90 S.W.3d 330, 335 (Tex. Crim. App. 2002) ).
Under Article 37.07 of the Texas Code of Criminal Procedure, any evidence that the trial court "deems relevant to sentencing" is admissible during the punishment phase of a trial. TEX. CODE CRIM. PROC. ANN. art. 37.07, § 3(a)(1) (West Supp. 2018); Sims v. State , 273 S.W.3d 291, 295 (Tex. Crim. App. 2008). If the evidence "will assist the fact[-]finder in deciding the appropriate sentence in a particular case," it is relevant to determining punishment. Sims , 273 S.W.3d at 295 (citing Mendiola v. State , 21 S.W.3d 282, 285 (Tex. Crim. App. 2000) ).
That said, even if punishment-phase evidence is deemed relevant, it is subject to analysis under Rule 403. Rodriguez v. State , 203 S.W.3d 837, 843 (Tex. Crim. App. 2006). When considering the admissibility of victim-impact evidence, the trial court must consider these factors: "(1) how probative is the evidence; (2) the potential of the evidence to impress the jury in some irrational, but nevertheless indelible way; (3) the time the proponent needs to develop the evidence; and (4) the proponent's need for the evidence." Salazar v. State , 90 S.W.3d 330, 336 (Tex. Crim. App. 2002). The trial court is presumed to have engaged in this analysis. Williams v. State , 958 S.W.2d 186, 195-96 (Tex. Crim. App. 1997).
We review the trial court's analysis under an abuse-of-discretion standard and will only overturn its ruling if it falls outside the "zone of reasonable disagreement." Rodriguez , 203 S.W.3d at 843 (quoting Robbins v. State , 88 S.W.3d 256, 260 (Tex. Crim. App. 2002) ). There is no bright-line test for deciding what evidence is and is not admissible as victim-impact evidence. Salazar , 90 S.W.3d at 336.
The Texas Court of Criminal Appeals has recognized that victim-impact evidence is relevant when it "has some bearing on the defendant's personal responsibility and moral culpability." Id. at 335 (citing Mosley v. State , 983 S.W.2d 249, 261-62 (Tex. Crim. App. 1998) ). The court explained this relevance:
As the Supreme Court stated in Payne v. Tennessee , such evidence is "designed to show ... each victim's 'uniqueness as an individual human being,' " and is a way to inform "the sentencing authority about the specific harm caused by the crime in question." [ 501 U.S. 808, 823, 825, 111 S.Ct. 2597, 115 L.Ed.2d 720 (1991) ]. Such evidence is of two distinct, but related, types: victim character evidence and victim impact evidence. The former is designed to give the jury "a quick glimpse of the life that the petitioner chose to extinguish, to remind the jury that the person whose life was taken was a unique human being." [ Id. at 830-31, 111 S.Ct. 2597 ]. The latter is designed to remind the jury that murder has foreseeable consequences to the community and the victim's survivors-family members and friends who also suffer harm from murderous conduct.
.... But both defendants and juries must also know that the homicide victim is not a faceless, fungible stranger. [Id. at 838, 111 S.Ct. 2597]. Every homicide victim is an individual, whose uniqueness the defendant did or should have considered, regardless of whether the murderer actually knew any specific details of the victim's life or characteristics. See id.
Salazar , 90 S.W.3d at 335 (footnote omitted) (citations omitted).
In this case, before admitting the video recording, the trial court reviewed it and noted that it was three minutes in length and showed the immediate impact on the family of learning of the victim's death. The recording confirms this analysis. The recording shows some of the family members crying and distraught and other members trying to comfort them, but nothing unusual that would impress the jury in an irrational or indelible way. In addition, the recording effectively showed the consequences to the victim's survivors, without the need to have each family member testify. We find that all four factors favored admissibility of the recording.
As a result, we cannot say that the trial court's decision was outside the zone of reasonable disagreement. Rodriguez , 203 S.W.3d at 843. For that reason, we find that the trial court did not err in admitting the recording. We overrule Gilbert's fifth point of error.
V. Conclusion
For the reasons stated, we affirm the trial court's judgment.
See Tex. Penal Code Ann. § 19.02(b) (West 2011).
We refer to all persons who were minors when the offense was committed by pseudonyms. See Tex. R. App. P. 9.10.
Aerial photographs show that Gilbert lived off a country road and that his house was set back several hundred feet from the road.
Photographs taken during the investigation show the locations of the spent shell casings in relation to the acceleration marks left in the grass and on the road by the truck's rear tires as it crossed the road.
Gwin testified that this bullet could have come from behind Phelps if his leg had been propped up on the car seat.
One-half ounce is the equivalent of fourteen grams.
The indictment alleged that, on or about December 17, 2017, Gilbert:
Paragraph 1: Did then and there intentionally or knowingly cause the death of an individual, namely, [Phelps], by shooting him with a firearm; or
Paragraph 2: Did then and there, with intent to cause serious bodily injury to an individual, namely, [Phelps], commit an act clearly dangerous to human life that caused the death of [Phelps], by shooting him with a firearm; or
Paragraph 3: Did then and there commit or attempt to commit a felony, to wit: Deadly Conduct, by knowingly discharging a firearm at or in the direction of one or more individuals, and in the course of or in furtherance of the commission or attempt to commit Deadly Conduct, the defendant committed or attempted to commit an act clearly dangerous to human life that caused the death of [Phelps], by discharging a firearm at or in the direction of one or more individual; or
Paragraph 4: Did then and there commit or attempt to commit a felony, to wit: Deadly Conduct, by knowingly discharging a firearm at or in the direction of a vehicle, and the defendant was reckless about whether the vehicle was occupied, and in the course of or in furtherance of the commission or attempt to commit Deadly Conduct, the defendant committed or attempted to commit an act clearly dangerous to human life that caused the death of [Phelps], by discharging a firearm at or in the direction of an occupied vehicle.
As explained in Kitchens v. State ,
[A]lthough the indictment may allege the differing methods of committing the offense in the conjunctive, it is proper for the jury to be charged in the disjunctive. It is appropriate where the alternate theories of committing the same offense are submitted to the jury in the disjunctive for the jury to return a general verdict if the evidence is sufficient to support a finding under any of the theories submitted.
Kitchens v. State , 823 S.W.2d 256, 258 (Tex. Crim. App. 1991) (citations omitted).
Although Gilbert does not challenge the sufficiency of the evidence supporting the jury's findings that he intended to cause serious bodily injury and that his actions caused the death of Phelps, we find that sufficient evidence supports those findings. Although Gilbert maintained that he fired out of a reaction and without aiming, the physical evidence and Gilbert's testimony showed that he backed up and fired two shots, then backed up again and fired two more shots into a truck that he knew was occupied by three or more people. The evidence also showed that each of the bullets Gilbert shot penetrated the truck and that at least three of the bullets penetrated the cab of the truck. By his own admission, one of the shots he fired caused the death of Phelps. That admission was confirmed by the physical evidence and the testimony of the medical examiner. Gilbert also testified that he purposefully took his loaded pistol to the transaction, "just in case," and that he attempted to hide the gun, its live ammunition, and the spent casings to impede the investigation by law enforcement. This evidence is sufficient to support the jury's findings that Gilbert intended to cause serious bodily injury to at least one of the occupants of the truck and that his shooting into the occupied truck caused the death of Phelps.
"Although unpublished cases have no precedential value, we may take guidance from them 'as an aid in developing reasoning that may be employed.' " Rhymes v. State , 536 S.W.3d 85, 99 n.9 (Tex. App.-Texarkana 2017, pet. ref'd) (quoting Carrillo v. State , 98 S.W.3d 789, 794 (Tex. App.-Amarillo 2003, pet. ref'd) ).
A person may also use deadly force "when and to the degree the actor reasonably believes the deadly force is immediately necessary ... to prevent the other's imminent commission of" certain enumerated offenses, including "robbery or aggravated robbery." Tex. Penal Code Ann. § 9.32(a)(2)(B). That said, the jury was not instructed regarding this aspect of self-defense, and Gilbert does not complain that this omission was charge error.
See Tex. Health & Safety Code Ann . § 481.120(b)(1) (West 2017).
The record is unclear on whether one of the parties requested this instruction, or the trial court included it on its own. Gilbert contends, and the State does not dispute, that the instruction was given by the trial court sua sponte.
Section 9.32, subsections (c) and (d), provide:
(c) A person who has a right to be present at the location where the deadly force is used, who has not provoked the person against whom the deadly force is used, and who is not engaged in criminal activity at the time the deadly force is used is not required to retreat before using deadly force as described by this section.
(d) For purposes of Subsection (a)(2), in determining whether an actor described by Subsection (c) reasonably believed that the use of deadly force was necessary, a finder of fact may not consider whether the actor failed to retreat.
Tex. Penal Code Ann. § 9.32(c), (d) (West 2011).
We note that this instruction follows the pattern jury charge on failure to retreat. See Comm. on Pattern Jury Charges, State Bar of Tex., Texas Criminal Pattern Jury Charges: Criminal CPJC 31.8 (2018).
Section 9.05 provides:
Even though an actor is justified under this chapter in threatening or using force or deadly force against another, if in doing so he also recklessly injures or kills an innocent third person, the justification afforded by this chapter is unavailable in a prosecution for the reckless injury or killing of the innocent third person.
Tex. Penal Code Ann. § 9.05 (West 2011).
In support of his argument, Gilbert cites to general statements of law contained in several cases involving lesser-included offenses. While those statements may apply when analyzing a jury charge concerning lesser-included offenses, they are generally inapplicable in this case.
That is, by stealing the credit card, by receiving the card knowing it was stolen, or by presenting a credit card with intent to obtain a benefit, knowing the use was without the effective consent of the owner. Ngo , 175 S.W.3d at 744.
Rule 403 provides that relevant evidence may be excluded "if its probative value is substantially outweighed by a danger of ... unfair prejudice, confusing the issues, misleading the jury, undue delay, or needlessly presenting cumulative evidence." Tex. R. Evid. 403.
Only one family member and one family friend testified during the punishment phase, both without objection.
| CASELAW |
Learning Disabilities: Reading in Ottawa
Learning Disabilities
How can NeurOptimal® help with Learning Disabilities?
Parents of and children with learning disabilities report that NeurOptimal® has helped to reduce frustration, irritability, anger, and anxiety, and improve mood, focus, and attention and problem-solving ability.
What are the most common Learning Disabilities?
Most learning disabilities fall into one of these categories:
Dyslexia – difficulty with words, reading and comprehending text
Dysgraphia – difficulty with writing. The can be due to a physical issue, difficulty with written expression due to having trouble organizing their thought coherently or having difficulty with basic sentence structure and grammar
Dyscalculia – difficulty with math ranging from an inability to order numbers correctly to limited strategies for problem-solving. Children could have difficulty completing basic math calculations, or they may have difficulty with concepts like time, measurement or estimation.
Processing Deficits – difficulty with processing sensory data, whether auditory or visual
ADHD – (see section specific to ADHD {insert link} the defining characteristics of ADHD are:
• An interest-based nervous system - difficulty focusing on things that aren’t of interest or motivating
• Emotional hyperarousal – more easily frustrated, upset or angry
• Rejection sensitivity – can be more sensitive to real or perceived feelings of being rejected, teased or criticized by important people in their life
Learning disabilities vary in terms of severity from mild to severe and children may struggle with more than one.
How can NeurOptimal® help?
Overall, NeurOptimal® can help to calm the central nervous system. As that happens, potential changes in learning could include improvements in:
• Executive Cognitive Functioning
• Flexible/Focused Attention
• Emotional & Behavioral Responses
• Ability to navigate Daily Transitions
• Brain's Processing/Decision/Speed
• Evaluation and Adaption Responses
• Ability to Independently Initiate Action
• Ability to Shift Focus from Trauma Response to Learning
• Strategic Planning/Prioritizing
• Problem Solving/Decision Making
• Organization and Time Management
• Working Memory
• Goal Setting and Motivation
If you would like to learn more about how NeurOptimal® and how it may assist your child, book a consultation | ESSENTIALAI-STEM |
Page:Gesenius' Hebrew Grammar (1910 Kautzsch-Cowley edition).djvu/318
such particles cannot stand by themselves, but are united, as prefixes, with the following word (§ 102), very much like the preformatives of the imperfect (§a–d).
The view that this shortening of whole words to single letters has actually taken place in the gradual course of linguistic development is rendered highly probable by the fact that similar abbreviations in later Hebrew and in Aramaic, i.e. as the development of the original Semitic speech progresses, become more and more striking and frequent. Thus the Biblical Aramaic becomes at a later period ; in modern Arabic, e.g. hallaq (now) is from halwaqt; lêš (why?) from li-ayyi-šaiĭn, &c. Cf. also the analogous cases mentioned above from the Western languages. Nevertheless, the use of the simplest particles is found already in the earliest periods of the Hebrew language, or, at any rate, in the earliest documents which have come down to us.
3. Less frequently particles are formed by composition; as for ? (τί μαθών; ) or quid cognitum?; (from and ) besides; (from, , ) from above, above.
More frequent is the combination of two words into one without contraction, e.g., , , ; cf. also the compounds of with demonstrative pronouns, as ; [R.V. how]. See the lexicon under.
On demonstrative adverbs cf. Brockelmann,, i. 323; on interrogative adverbs, ibid., i. 328; on adverbs in general, i. 492 ff.
1. The negative, and a few particles of place and time, as , are of obscure origin.
2. Forms of other parts of speech, which are used adverbially without further change, are—
(a) Substantives with prepositions, e.g. (with might) very; (prop. in separation, Fr. à part), with suffix ; ; cf. also (as one) together, and (originally in connexion with) near to, corresponding to, like, &c., cf. .
(b) Substantives in the accusative (the adverbial case of the Semites, ), cf. τὴν ἀρχήν, δωρεάν, e.g. (might) very, (cessation) no more, (the day) to-day (cf. ), to-morrow, (union) together. Several of these continued to be used, though rarely, as substantives, e.g., plur. and, circuit, as adverb | WIKI |
Joint Services Expedition to Elephant Island
The Joint Services Expedition to Elephant Island was a British scientific surveying and mountaineering expedition to Elephant Island in the South Shetland Islands of Antarctica. It took place from December 1970 to March 1971. Except for one civilian from the British Antarctic Survey, the 14 participants were serving members of the British Armed Forces under the leadership of Commander Malcolm Burley of the Royal Navy. The expedition was sponsored by the Joint Services Expedition Trust with the aim of climbing, exploring and carrying out a preliminary scientific survey of islands in the Elephant group for the Directorate of Overseas Surveys. The expedition was transported to and from the island by HMS Endurance. During the course of the expedition several mountains were climbed for the first time and numerous place-names were recommended for geographic features on the island. | WIKI |
Android App Development: The Need of The Changing World
The relevance of the Android apps has increased to a great extent. Previously, the apps that were prepared by this technology were used by only a handful of devices. Now, the usage has increased tremendously. The devices that are employing the Android platform are being used to a greater extent. Amongst most of the devices that are manufactured, the majority of them have selected Android as the platform. As the technology of Android is the most user-friendly one, it has the highest acceptance. The greater use of Android devices has led to the development of the Android applications. As per the global demands, many companies have developed their services for the creation of Android mobile app development India.
Information can be obtained at the right time
Android applications are being developed for many devices such as the smartphones and the tablets. There are also certain wearable devices that demand the use of this technology. These devices come in very handy as the different types of applications can be used. You will be able to get different types of information ready at your fingertips with the help of these applications. These can be sought immediately as per real time basis. This has led to the high popularity of these apps. If you are operating any business, you will soon find people asking you whether you have an app or not.
Has become a must for any business
If you are running a business of any type, you need to launch an application of yours. This is the best way of getting customers. People are just mad at using attractive applications. You will have to get hold of a digital agency which can create the application as per your needs. It should be able to incorporate the personalized features. A properly developed Android application has the power of turning the tides for your business. This is the best way to tap customers in the online mode. Most of the people are no more interested in visiting the retail stores. The same activities scan be done by sitting at your place. You can also get the earnings in real-time basis.
Do some researches before creating an app
Before jumping into application creation, you need to do some background work. Try to figure out the target audience. Keep their likings in mind while the application gets designed. In case it does not appeal to them, the entire effort becomes futile. Give weight on the application quality. You must ensure that the user finds it easy and interesting to use the app.
Create your app from an expert agency
There are many digital agencies which offer an array of digital marketing services. Try to engage an agency which is specialized in the creation of the Android apps. It should also have the knowledge of providing other digital services. In the case of diverse requirements, you will not have to run for a different agency. Your agency selection is crucial for the success of the app. Do not avail the services of a company that offers the services at throwaway rates. They may give you an app without the punch factor that will just not solve your purpose.
The App will be your strongest branding tool
Android apps have become a common feature in the business scenario. A properly designed app can act as a great branding tool for your company. You should incorporate the theme and the house colors to imprint the brand identity. Once the app gets popular, you will find people start downloading your app upon purchase of a new device. The app will effect a growth in your business if designed with finesse.
How can you prevent yourself from common data analysis errors
Data analysis is not a simple task for any one, not even for the professionals. It is a rigorous process from first to last and it contains severe risk at all levels for the user and for the developers. Since you are in the industry for long, on your business or job, you know the facts very well. However, here is the chance to improve your professional eligibility and quality of delivery you provide through the mean of data analytics with r course. while you go through the course, you will learn all the common things that can be done in order to make the data analysis of yours refined and of best quality. Here are some of the common errors that you often face and where you need the application of r course.
Storing the data
The first area of consideration is in the data storage. Data has to be stored in the particular format that is suitable for your analysis. Once you store that in some other structure, it becomes very much difficult to revise the same and restructure it. In such cases, you will have to note down the algorithm of the machine too, since that is the particular thing that can change the errors in sense. If the algorithm you are maintaining is according to the machine requirement, chances of loosing the data always remains feeble.
Maintaining flow chart
Here is the second mistake that you often commit. You start dealing with the data, as soon as you find them and then after certain point of time, feel the need of a flow chart for the operation. However, during that time, the shuffling of data, that was not expected has already been in action. Hence, the right activity is to take a few minutes time, before you start working on the data. Work on the flow chart that will be effective for the analysis and then standardize the data in the flow chart format – now start working on the data. It is eased to a great extent.
Fixing wrong constants
This is where you need to be effective in multiple areas – statistics, experience in data handling and of course in algorithm of machine. If you are weak in any of the three sections, you can face mistake. Cases are special when you are not experienced, but smart enough to handle the algorithm and statistics. In such cases, you will have to be extra bit careful, but if that is opposite, then mistake is almost certain. In such cases, try to focus on the algorithm part, since you cannot develop your statistical skills by means of practice. R Technology is ready to give you the best idea of the algorithms. Hence learn the same and be an expert.
You can give yourself a better exposure to the entire thing while going through the data analytics with r course in sanjose. Now, your task will be to go for the course and open up the scopes before, you in your job.
Use the advanced technology to protect yourself from injurious radiations
The world is obsessed with cell phones. With the entry of smartphones, this obsession has only increased by the time. We can’t imagine our lives without mobile phones now. Though this technology is a boon to mankind, it also exposes the humans to some grave health hazards, mostly due to the radiations emitted by them. With the number of mobile users, this hazard has multiplied tremendously.
The harmful effects of radiations
From their antennas, cell phones radiate radiofrequency electromagnetic waves, a type of non-ionizing radiation. These radiations affect the human body as our body is not completely able to process it. Children are very susceptible to these radiations because they are still in the developing stage. Overuse of mobiles causes some of the ailments like-
• Brain cancer- though not confirmed, but still researches suggest cell phone radiation as a possible brain tumour causing agent.
• Insomnia
• Dizziness
• Headache
• Increased stress conditions
• Weak immune system
The apt way to avoid these complaints is to remove cell phone radiation. Minimising the radiations can be through many ways like using phone always when it has a good signal, using headsets, not using it in elevators, etc. Also using the devices like that protects the radiations can be used. These devices are very effective and give much better protection than other ways of radiation control.
What are cell phone radiation protectors?
These are just simple devices that are added to the mobile phones or any other electronic devices to give protection. These are scientifically proven to neutralize the adverse outcomes of the electromagnetic radiation through its advanced techniques of a microprocessor and a resonating antenna. When the harmful radiations falls on the antenna, the microprocessor generates alternating minimum and maximum waves, which counterbalances it and prevents body’s exposure to it. A large field protector can be used for protecting the complete house. | ESSENTIALAI-STEM |
Page:The Cyclopedia of India (Specimen Issue).pdf/155
THE CYCLOPEDIA 0i" lNDlA.
With the progress of Hinduism, the principle oi caste division as a method oi social organization became more rigid. birth became the supreme
“WWW test. and the multiplication of "'.."'m" m pruiasions resulted in a multi-
‘ tion oi castes. the members 0! each hein sternly prohibited from changing either the one or t c other. But this pernicious system Was the growth of lutnre times: at present caste was a new principle and as yet hardly an evil principle. What marked the Epic Age was simply a division of the people into a lew main groups according to their precailing occupations. The same mild class division existed in most of the kingdoms of medizeval Europe. " In the Epic Period the body of the epic (except the priests and soldiers) still form one united iii-3321::th and had not been disunited into miserably divi communities as at the present day. The body of the people were still entitled to religious knowledge and learning, and to perform religious rites for themselves. just like Brahmans and Kshatri- a.“ And even intcflnarriage hotween Brahmans,
ttiyas and Vaisyas was allowed under certain restrictions. However much. therefore. we may deplore the commencement ol the caste system. we should never forget that the worst results 0! that s tern. the priestly monopon 0/ learning. the (lamina in t body a] the profile. and Me absolidr social so ration sarong castes. were unknown in india until the uranik times." ilnch interesting Information hearing on this matter may be gleaned from the literature 01 the period. Thus the White Yajur Veda enumerates a number of fusions lolloWed by the hody oi the people. Vntsyas and Sudrns; but as yet these prolessions did not [arm distinct castes. and the members at each were not separated from each otherhyrigid caste-haulers. The up .rclasses. tests and warriors. entoyed some specin caste prlmleges. such as exemption from taxation. but they were not yet separated [mm the min a: the Sets-:5: body; of their [helllow ItIitizens by I‘m", m an usnrmounta e We of caste 2: m superiority. Brahmans. Kshntri 'as. and Vaisytts ate and drank toget er. tntermarried. and received the same religious instruc- tion. all possessed the right of sacrifice and all alike wore the \‘ajnopavrta or sacred thread. which came into use during the Epic Period. A passage in one ol the Brahmanas shows that persons born in one caste or community might enter into another. Another shows that men not born Brahmans might become Brahmans by their re tation and their learning. And although the Satin oes not seem to have been admitted to sac. rifice, yet in one of the Upanishads we find a Brahman imparting knowledge to a Sudrn, accepting presents from him, and takmg his daughter to wife. Such a tolerant ' tion of caste privileges Would haVe beenahsoluteg impossible a few centuries later. when the hereditary principle had once become inexorable.
n: m1 we, so. Socially. the chief difierence between the Vedic and
theEpic Periorhis thegreater refinement and culture which characterise: the latter. The rough warrior
settlers of the Punjab had changed into the cultured citieens of pruperous kingdoms. m&;: The royal courts were thriving cen- tres of learning and the kings them- selvns its patrons. Such a king as analta encouraged public discussions on religion an 'fihilmophy. and gathered round him the wise men oi the ne' hbouro lug kingdoms. The reign of law and order had a; executive and judicial officers maintained order and administered the law. Walled towns were springing u on all sides, and wealth was rapidly increasing. “ he wealth of rich men consisted in gold and silver; and jewels. in cars. horses. cows, mules and slaves, in houses and fertile fields, and even in elephants." Gold. silver and other metals were in constant use.
What. however. is at the greatest interest in a study of early Hindu civilization. is social organization and the points in which the men of ancient time differed lrom their descendants of late centuries. The chief social feature of this age is of cause the rise at caste, a subject of such importance that it has claim- ed a special section for itself. Hardly a less interesting
subject is the position at women.
"$233"? Here the customs oi the Epic Period show but slight cha from those which marked the Vedic Age. The a ute seclusion at women was still unknmm. The Brah— manas contain many showing the high esteem in which women were still eld. They were consider ed as the intellectual companions oi their husbands. as their helpers in the journev of lite and the partners of their religious duties. They moved lreely in society. frequented public festivities and sights inherited and [unstained property. and often distin islted them- selves in science and in learning. T position of Woman in these early times does not compare badly with that of her sisters in early Greece and Rome. and it was not until the tell ’on of the tiindus he- came dehasod in term. unti their society lost its freedom and elasticity in Puranik and Hohatltmedau times. that the position of women was degrnded to a lower level. Conlormahly with the high esteem in which Women were held. marriage was not regarded from such a otteaided point oi view as it afterwards came to be, child marriage was unknown. women in the upper classes at least had some share in the choice of husbands. and widow temarriage had the distinct sanction ol the sacred books.
When speaking ol the social constitution of the \‘edic Age. we remarked upon the prevalence of flesh-
nah mm rating. This custom still continu.
" ed in the 1-: 'c Period. when animal
land. along with various lti of grains. formed the
staple diet of the In view oi the claims 01
modern vegetarianism it would be interesting. al-
though of course fruitless. to enquire whether man
for man the Hindus of today are physically as strong as their flesh~eating ancestors.
We conclude. this section with a striking ‘ctnrc, given by Dutt. in his “ Civilization in Ancient dia." ol life such as it was lived by the citizen of Hastinapura or Avodhya three thousand years ago. The account is of course based upon contemporary literature. “The towns Were surrounded by walls, | WIKI |
Looking for an even more impactful way to feel the benefits of exercise? Do so while listening to uplifting music. Research findings indicate that music listening positively impacts the psycho-biological stress system, helps activate the parasympathetic nervous system, improves recovery time, and has benefits for hormonal balance and brain functioning overall. (4)
Research suggests the negative effects of stress on the body seem to be exaggerated in people who are inactive, a phenomenon called”stress-induced/exercise deficient” phenotype. Because we react to stress by experiencing changes in our neuro-endocrine systems, regular exercise is protective because it regulates various metabolic and psychological processes in the body, including reinforcing our natural circadian rhythms, sleep/wake cycles, moods and blood sugar levels.
For our ancestors, stress was a survival skill during brief, life threatening situations. Once the danger passed, their stress levels lowered. However, in today’s world, we are constantly bombarded by stressors, such as work deadlines, traffic, and family obligations. We rarely get a break long enough to relax and relieve the stress. The over-activation of our stress hormones have been linked to high blood pressure, heart attacks, lower immunity, depression, anxiety, and more.
Gamma waves are the most recently discovered brainwave, a discovery made possible by digital EEG technology. Gamma is associated with the integration of information from different areas of the brain, and having a good memory is associated with having a certain baseline of 40 hertz gamma activity. Low gamma activity is associated with learning disabilities and poor memory.
Start by kneading the muscles at the back of your neck and shoulders. Make a loose fist and drum swiftly up and down the sides and back of your neck. Next, use your thumbs to work tiny circles around the base of your skull. Slowly massage the rest of your scalp with your fingertips. Then tap your fingers against your scalp, moving from the front to the back and then over the sides.
Aletheia Luna is an influential psychospiritual writer whose work has changed the lives of thousands of people worldwide. After escaping the religious sect she was raised in, Luna experienced a profound existential crisis that led to her spiritual awakening. As a spiritual counselor, diviner, and author, Luna's mission is to help others become conscious of their entrapment and find joy, empowerment, and liberation in any circumstance. [Read More]
How does acupuncture work? Acupuncture is an alternative therapy that involves inserting thin needles into targeted areas of the body. Some believe that this balances a person’s vital energy, while others point to a neurological effect. Acupuncture may relieve pain and a range of other symptoms. Here, learn about uses, risks, and what to expect. Read now
The information on this website has not been evaluated by the Food & Drug Administration or any other medical body. We do not aim to diagnose, treat, cure or prevent any illness or disease. Information is shared for educational purposes only. You must consult your doctor before acting on any content on this website, especially if you are pregnant, nursing, taking medication or have a medical condition.
The brain is composed of millions of specialized cells called neurons. Neurons send signals to other neurons using electro-chemical messengers called neuro-transmitters that attach to receiving sites located on the neurons themselves. There is a space between the end of the neuron and the receptor called the synaptic gap. As neuro-transmitter chemicals move across this gap, a small electrical charge is created.
Many of our common symptom-soothing formulas are designed to take effect within 5-10 minutes if used properly. To get these fast-acting results, we recommend 3-4 droppers full, or 6-8 pumps, per use to start. If you are not yet feeling the full effect within the first 5 minutes, repeat the original serving. You can do this up to 4 servings back to back. Note that some of our formulas are tonics and are meant to work over longer periods of time.
“Stress and sleepless nights are closely linked,” Buenaver says. “If you’re in pain, tend to worry, or are coping with a difficult situation in your life, you may have more stress hormones than usual circulating in your body. A poor night’s sleep adds even more. And those hormones may never be fully broken down. It’s like running an engine in fifth gear all the time.”
With almost 100 years of research validating the effectiveness of brainwave entrainment, it’s no wonder why it’s used by thousands of people all over the world. What does the future entail in this exciting field? With the adoption of smartphones, virtual and augmented reality, and advancements in technology reducing the cost of EEG and other forms of biofeedback devices, the entrainment possibilities are endless.
Isochronic tones have only been proven to have an effect while you are listening to them, that’s why you won’t find me claiming anywhere that there are potentially positive long-term effects. Once the tones stop, your brainwaves are no longer being stimulated by the sound and so they stop being in sync with the tone frequency. For you to think you are still feeling the effects after all this time and from such a short time listening to them, I think it may be linked to anxiety. I know that some people who are new to this type of thing can build up a strong feeling of anxiety, after worrying about the potential effects brought on by fear of the unknown. I suspect the problem may be psychological with you worrying about the potential effects and keep repeating the experience from memory in your head. When you keep going over the same thing in your head like that and worrying about it, it’s easy to then spot other potential side-effects like how your nostrils and body temp is feeling, then making links back to that experience and labelling that as the reason. I think the best way to overcome this is to realise that the side-effects you are mentioning are completely unrelated, so there is nothing to worry about. These tracks are literally listened to for millions of hours a month on YouTube across loads of channels. If the effects lasted for a long time people would just listen for 5 minutes and come back in a couple of weeks. But people keep coming back to listen because that’s the only way to feel the benefit and effects…while you are listening to them. If you are unable to stop thinking and worrying about this on our own, I recommend that you speak to your doctor about it or a specialist in dealing with anxiety issues. I hope that helps.
Many people experienced in using alpha brainwave entrainment report that the state of mind associated with alpha waves is a time when they feel most consciously connected to their subconscious mind. The intense experience of hypnagogic sleep, reported by some people as a feeling of being awake and asleep at the same time, is also associated with alpha brainwaves.
Wouldn’t it be a blessing if you could find a way to move through each day with a greater sense of peace and harmony, with heightened creativity and intuition, with a sharper intellect and a more positive outlook? For many people today, the deep, effortless meditation that brainwave entrainment provides is the key to a more fulfilling, peaceful and successful life.
Your brain cells reset their sodium & potassium ratios when the brain is in Theta state. The sodium & potassium levels are involved in osmosis which is the chemical process that transports chemicals into and out of your brain cells. After an extended period in the Beta state the ratio between potassium and sodium is out of balance. This the main cause of what is known as "mental fatigue". A brief period in Theta (about 5 - 15min) can restore the ratio to normal resulting in mental refreshment.
Brain waves are electrical activity patterns caused by the neurons of the brain communicating with each other. Brain waves can be detected using sensitive medical equipment such as an electroencephalogram (EEG) monitor. Brain waves provide an indication of the mental state of an individual. In other words, the appearance of brain waves is directly connected to what a person is doing, thinking or feeling. The different Brain states are: Gamma, Beta, Alpha, Theta, Delta. You have your own unique brain wave patterns that function habitually. Some of these brain wave habits are useful, and others need some fine-tuning. When your brain is functioning efficiently, your brain waves are “in sync” with your activity, but stress or lack of sleep can interfere with this natural harmonious relationship. To restore this harmony, at Gaia Meditation, we have developed a wide range of free audio programs, including meditation music, relaxation music, sleep music and plenty other Sound Healing programs.
Uses of audio with embedded binaural beats that are mixed with music or various pink or background sound are diverse. They range from relaxation, meditation, stress reduction, pain management, improved sleep quality, decrease in sleep requirements, super learning, enhanced creativity and intuition, remote viewing, telepathy, and out-of-body experience and lucid dreaming. Audio embedded with binaural beats is often combined with various meditation techniques, as well as positive affirmations and visualization.
These sounds in these musical tracks are presented through monaural beats, binaural beats, isochronic tones, or a mixture involving combinations of all three of these modalities, described in detail below. Choose alpha brainwave tracks for calming anxiety and relaxing body and mind, and choose theta tracks for help in getting to sleep and for bringing hidden feelings to the surface. Some people also report out-of-body type experiences when in theta brainwave states.
I have seen 1.5Hz being linked to HGH, but also 4 or 5 other frequencies as well, so it’s difficult to know what may work if any. I haven’t seen any research relating to HGH and brainwave entrainment. It’s widely believed that 40Hz is the limit for achieving a brainwave entrainment effect, which is also where many believe the gamma frequency range begins. Once you get over 40Hz into gamma your brainwave activity isn’t likely to stay in sync with it. So from a brainwave entrainment perspective, I recommend high beta frequencies for increasing energy during workouts.
Gaia Meditation Delta programs are specifically designed to: improve sleep and healing process. Effects happen at a very deep subconscious level, ideal for powerful reprogramming. If you’re in lack of sleep because you’re a busy business man or because you have insomnia etc., a few hours of our Delta waves programs will trick your brain into thinking it had all the restorative sleep it needs.
The exact technique that will be right for you is something you have to discover for yourself though. There is no universal way to pinpoint which technique is best for you with 100% accuracy. You may need to try out several until you find the one that really resonates with you. One way is to do a bit of research on a variety of techniques. Usually you will find one or more of them seem to “draw” you to them. Pick one of those techniques as your starting point.
As strange as it may sound, vocal toning is a special technique that reduces the stress hormones adrenaline and cortisol. Try sneaking off to a quiet place to spend a few minutes toning before a meeting with your boss and see how much more relaxed and focused you feel. It works by exercising the tiny muscles of the inner ear that help you detect the higher frequencies of human speech that impart emotion and tell you what someone is really trying to say. Not only will you feel more relaxed in that meeting, you’ll also be better able to understand what he’s trying to communicate.
Hi Rona, thanks for your compliments on my videos and the music I use, I’m pleased you’ve found them helpful. Regarding the pulse-like sound you’ve been hearing, I’ve never had anyone report something similar to that before. I also haven’t heard anyone on brainwave entrainment forums mention it. That is very unusual and because I’ve never come across it before, I’m afraid I don’t know what would cause that.
Delta brainwaves are slow, loud brainwaves (low frequency and deeply penetrating, like a drum beat). They are generated in deepest meditation and dreamless sleep. Delta waves suspend external awareness and are the source of empathy. Healing and regeneration are stimulated in this state, and that is why deep restorative sleep is so essential to the healing process.
Neural oscillations are rhythmic or repetitive electrochemical activity in the brain and central nervous system. Such oscillations can be characterized by their frequency, amplitude and phase. Neural tissue can generate oscillatory activity driven by mechanisms within individual neurons, as well as by interactions between them. They may also adjust frequency to synchronize with the periodic vibration of external acoustic or visual stimuli.[3]
× | ESSENTIALAI-STEM |
.renew doesn't work properly
Versions to reproduce this bug:
pod 'Auth0', '~> 1.9.0'
pod 'Lock', '~> 2.4.0'
I’m having some troubles trying to get a new access token from a refresh token.
I’m using a native app with swift 4.
LoginController looks like
func checkAccessToken() {
SessionManager.shared.refreshToken { error in
DispatchQueue.main.async {
guard error == nil else {
print("Failed to renew credentials: \(String(describing: error))")
return self.showLock()
}
SessionManager.shared.retrieveProfile { error in
DispatchQueue.main.async {
guard error == nil else {
print("Failed to retrieve profile: \(String(describing: error))")
return self.showLock()
}
self.performSegue(withIdentifier: "HomeView", sender: nil)
}
}
}
}
}
SessionManager looks like:
func refreshToken(_ callback: @escaping (Error?) -> ()) {
guard let refreshToken = self.keychain.string(forKey: self.keyRefresh) else {
return callback(SessionManagerError.noRefreshToken)
}
Auth0
.authentication()
.renew(withRefreshToken: refreshToken)
.start { result in
switch (result) {
case .success(let credentials):
self.storeTokens(credentials.accessToken)
callback(nil)
case .failure(let error):
self.logout()
callback(error)
}
}
}
and retrieveProfile:
func retrieveProfile(_ callback: @escaping (Error?) -> ()) {
guard let accessToken = self.keychain.string(forKey: self.keyAccessToken) else {
return callback(SessionManagerError.noAccessToken)
}
Auth0
.authentication()
.userInfo(token: accessToken)
.start { result in
switch(result) {
case .success(let profile):
self.profile = profile
callback(nil)
case .failure(let error):
callback(error)
}
}
}
The refreshToken returns true. So, in theory, access token is new.
Then I’m trying to retrieve profile again with the new access token and the result of RetrieveProfile is an error with:
Failed to retrieve profile: Optional({"sub":"****","email":"*****@gmail.com","email_verified":true})
Status Code is 0
Hey there @mggadaleta1,
As it has been more than a few months since this topic was opened and there has been no reply or further information provided from the community as to the existence of the issue we would like to check if you are still facing the described challenge?
We are more than happy to assist in any way! If the issue is still out there please let us know so we can create a new thread for better visibility, otherwise we’ll close this one in week’s time.
Thank you!
This topic was automatically closed 6 days after the last reply. New replies are no longer allowed. | ESSENTIALAI-STEM |
Talk:Unilalianism
Necessary Page?
Even by emergent art standards, this page seems short on information and long on prospective, not actual, importance. Worrypower (talk) 22:25, 19 December 2019 (UTC)
* tbh This article is not describing anything about the art movement, just vague description that would fit better in a dictionary and not an encyclopedia Thas Tayapongsak (talk) 14:50, 24 October 2020 (UTC)
* Seems like this is really just a promo page for a series of art shows. I tried searching the web for Unilalianism and the vast majority of the results lead indirectly back to this article. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 03:49, 18 December 2020 (UTC)
"invocation of shamanism"
What's the source for calling it shamanism? I didn't find that term used in any of the written references. Schazjmd (talk) 19:22, 3 July 2019 (UTC)
Regarding the link to the movement's supposed founder
The "Carter Wilson" the article hyperlinks to refers to a Colorado-based author of mystery and investigative novels. A quick internet and youtube search of Unilalia gives results of a different man named Carter Wilson (who bares no resemblance to the author) singing at these Unilalia events on the west coast ranging from Seattle to Oakland. These videos merit triple digit views at the most and seem to be of a local rap/hip-hop style musical event? I Suggest a change in this hyperlink and potential removal of this page for its low significance and importance? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:36, 8 June 2022 (UTC) | WIKI |
sopimuskierros
Noun
* 1) contracting round process of closing a number of related contracts within a relatively short period of time | WIKI |
Page transitions don't feel like they block on the network
Page transitions don't feel like they block on the network
Updated
Appears in: PWA audits
Quick page transitions are key to how users perceive the performance of your Progressive Web App (PWA). Transitions should feel snappy, even on a slow network.
Recommendations
To find slow page transitions, navigate your web app using a simulated slow network. To do that in Chrome:
1. Press Control+Shift+J (or Command+Option+J on Mac) to open DevTools.
2. Click the Network tab.
3. In the Throttling drop-down list, select Slow 3G.
Every time you tap a link or button in the app, check that the page responds immediately in one of two ways:
• The page transitions immediately to the next screen and shows a loading screen while waiting for content from the network.
• The page shows a loading indicator while the app waits for a response from the network.
If you're working on a client-rendered single-page app, transition the user to the next page immediately and show a skeleton screen. Make sure to immediately show any content that's already available, such as the page title or thumbnail, while the rest of the content loads.
In the Lighthouse report UI the full PWA badge is given when you pass all of the audits in all of the PWA subcategories (Fast and reliable, Installable, and PWA optimized).
Resources
Last updated: Improve article | ESSENTIALAI-STEM |
Heather Graham Pozzessere
Heather Graham Pozzessere (born March 15, 1953) is an American writer, who writes primarily romance novels. She also writes under her maiden name Heather Graham as well as the pen name Shannon Drake. She has written over 150 novels and novellas, has been published in approximately 25 languages, and has had over 75 million copies printed.
Biography
Born Heather Graham on March 15, 1953, she grew up in Miami-Dade County, Florida. She married Dennis Pozzessere shortly after her high school graduation. After high school, she went on and earned a degree in theater arts from the University of South Florida. She spent several years after that working in dinner theater, singing backup vocals, and bartending. After the birth of her third child, Pozzessere decided she could not afford to go to work anymore. She chose to stay at home, and, to fill her time, began to write horror stories and romances. After two years, in 1982, she sold her first novel, When Next We Love.
She has written more than 100 novels and novellas. Her books have been published in over 20 languages.
Romance Writers of America presented her with the 2003 Lifetime Achievement Award. She is a member of Mystery Writers of America, International Thriller Writers, and the Horror Writers Association (of which she is a former Vice President), and has received the Thriller Writer's Silver Bullet for charitable enterprises.
Pozzessere is a founder of the Florida chapter of the Romance Writers of America, and since 1999 has hosted the annual Romantic Times Vampire Ball for charity. In 2006, she hosted the first Writers for New Orleans on Labor Day, with workshops and a dinner theater event to benefit the city and the libraries. Labor Day of 2007 made it an annual event. She is the founder of the Slushpile players and Slushpile band.
In November 2016, it was announced that Pozzessere would co-author Chad Michael Murray in writing his second novel, titled American Drifter, released in November 2017.
Family
She and her husband have five children.
Stand-alone novels
* When Next We Love (1983)
* Tender Taming (1983)
* A Season for Love (1983)
* Quiet Walks the Tiger (1983)
* Night, Sea and Stars (1983)
* Hours to Cherish (1984)
* Tender Deception (1984)
* Red Midnight (1984)
* Arabian Nights (1984)
* Serena's Magic (1984)
* Hold Close the Memory (1985)
* A Circumstantial Affair (1986)
* Dante's Daughter (1986)
* Handful of Dreams (1986)
* The Maverick and the Lady (1986)
* Eden's Spell (1986)
* Liar's Moon (1987)
* Siren from the Sea (1987)
* Every Time I Love You (1988)
* The Devil's Mistress (1991)
* Spirit of the Season (1993)
* Renegades (1995)
* A Magical Christmas (1996)
* Queen of Hearts (1997)
* The Last Cavalier (1998)
* Tempestuous Eden (1999)
* Night of the Blackbird (2001)
* A Matter of Circumstance (2001)
* A Season of Miracles (2001; a.k.a. Miracle)
* In the Dark (2004)
* Suspicious (2005)
* Kiss Of Darkness (2006)
* The Island (2006)
* Blood Red (2007)
* The Last Noel (2007)
* Nightwalker (2009)
* Dust to Dust (2009)
* There Be Dragons (2009)
* Home in Time for Christmas (2009)
* The Killing Edge (2010)
* American Drifter (with Chad Michael Murray) (2017)
* "The Ghost of You" (novella) (2018)
* Undercover Connection (2018)
* Tangled Threat (2019)
* Witness to Death (2020)
* Danger in Numbers (March 23, 2021)
Donna Miro and Lorna Doria Series
* 1) Sensuous Angel (1985)
* 2) An Angel's Share (1985)
MacAuliffe Vikings Trilogy
* 1) Golden Surrender (1987)
* 2) The Viking's Woman (1993)
* 3) Lord of the Wolves (1993)
Camerons Saga
* 1) Sweet Savage Eden (1989)
* 2) A Pirate's Pleasure (1989)
* 3) Love Not a Rebel (1989)
* 4) One Wore Blue (1991)
* 5) And One Wore Gray (1992)
* 6) And One Rode West (1992)
Camerons Saga: North American Woman Trilogy
* 1) Sweet Savage Eden (1989)
* 2) A Pirate's Pleasure (1989)
* 3) Love Not a Rebel (1989)
Camerons Saga: Civil War Trilogy
* 1) One Wore Blue (1991)
* 2) And One Wore Gray (1992)
* 3) And One Rode West (1992)
Old Florida's MacKenzies Series
* 1) Runaway (1994)
* 2) Captive (1996)
* 3) Rebel (1997)
* 4) Surrender (1998)
* 5) Glory (1999)
* 6) Triumph (2000)
Suspense Series
* 1) Drop Dead Gorgeous (1998)
* 2) Tall, Dark, and Deadly (1999)
* 3) Long, Lean and Lethal (2000)
* 4) Dying to Have Her (2001)
* 5) Hurricane Bay (2002)
* 6) Picture Me Dead (2003)
* 7) Dead on the Dance Floor (2004)
* 8) The Presence (2004)
* 9) Killing Kelly (2005)
Suspense Series: Soap Opera
* 1) Long, Lean and Lethal (2000)
* 2) Dying to Have Her (2001)
* 3) Killing Kelly (2005)
Suspense Series: The O'Casey Brothers
* 1) Dead on the Dance Floor (2004)
* 2) Killing Kelly (2005)
Harrison Investigation Series
* 1) Haunted (2003)
* 2) The Presence (2004)
* 3) Ghost Walk (2005)
* 4) The Vision (2006)
* 5) The Seance (2007)
* 6) The Dead Room (2007)
* 7) The Death Dealer (2008)
* 8) Unhallowed Ground (2009)
* 9) Nightwalker (2009)
* 10) The Killing Edge (2010)
The Flynn Brothers Trilogy
* 1) Deadly Night (2008)
* 2) Deadly Harvest (2008)
* 3) Deadly Gift (2008)
Prophecy Series
* 1) Dust to Dust (2009)
Vampire Hunters Series
* 1) Night of the Wolves (2009)
* 2) Night of the Vampires (2010)
* 3) Bride of the Night (2011)
The Bone Island Series
* 1) Ghost Memories (2010)
* 2) Ghost Shadow (2010)
* 3) Ghost Night (2010)
* 4) Ghost Moon (2010)
Krewe of Hunters
* 1) Phantom Evil (2011)
* 2) Heart of Evil (2011)
* 3) Sacred Evil (2011)
* 4) The Evil Inside (2011)
* 5) The Unseen (2012)
* 6) The Unholy (2012)
* 7) The Unspoken (2012)
* 8) The Uninvited (2012)
* 9) The Night is Watching (2013)
* 10) The Night is Alive (2013)
* 11) The Night is Forever (2013)
* 12) "Crimson Twilight" (novella) (2014)
* 13) The Cursed (2014)
* 14) The Hexed (2014)
* 15) The Betrayed (2014)
* 16) "When Irish Eyes are Haunting" (novella) (2015)
* 17) The Silenced (2015)
* 18) The Forgotten (2015)
* 19) "All Hallows Eve" (novella) (2015)
* 20) The Hidden (2015)
* 21) Haunted Destiny (2016)
* 22) Deadly Fate (2016)
* 23) Darkest Journey (2016)
* 24) Dying Breath (2017)
* 25) Dark Rites (2017)
* 26) Doomed Legacy (2017)
* 27) "Hallow Be the Haunt" (novella) (2017)
* 28) Wicked Deeds (2017)
* 29) Fade to Black (2018)
* 30) Pale as Death (2018)
* 31) Echoes of Evil (2018)
* 32) "Haunted Be the Holidays" (novella) (2018)
* 33) "Christmas, The Krewe and a Large White Rabbit" (novella) (2018)
* 34) The Summoning (2019)
* 35) The Seekers (2019)
* 36) The Stalking (2019)
* 37) "Blood Night" (novella) (2019)
* 38) "Horror-Ween" (novella) (2019)
* 39) "The Best Christmas Ever" (novella) (2019)
* 40) Seeing Darkness (2020)
* 41) Deadly Touch (2020)
* 42) "The Dead Heat of Summer" (novella) (2020)
* 43) Dreaming Death (2020)
* 44) "A Most Unusual Case" (novella) (2020)
* 45) The Unforgiven (2021)
* 46) The Forbidden (2021)
* 47) The Unknown (2021)
Cafferty & Quinn
* 1) Let the Dead Sleep (2013)
* 2) Waking the Dead (2014)
* 3) "Infernal Night: Michael Quinn vs. Repairman Jack" (novella; with F. Paul Wilson) (2014)
* 4) The Dead Play On (2015)
* 5) "Blood on the Bayou" (novella) (2016)
* 6) "Toys in the Attic" (novella) (2017)
* 7) "Big Easy Evil" (novella) (2017)
* 8) Bitter Reckoning (2018)
New York Confidential
* 1) Flawless (2016)
* 2) A Perfect Obsession (2017)
* 3) A Dangerous Game (2018)
* 4) A Lethal Legacy (2019)
* 5) The Final Deception (2020)
Finnegan Connection
* 1) Law and Disorder (2017)
* 2) Shadows in the Night (2017)
* 3) Out of the Darkness (2018)
The Rising
* 1) The Rising (with Jon Land) (2017)
* 2) Blood Moon (with Jon Land) (2022)
Non-fiction
* Some Wore Blue & Some Wore Gray (2013)
* Why I Love New Orleans (2014)
Collections
* The Best of Heather Graham: Tender Taming / When Next We Love (1990)
* The Best of Heather Graham: A Season for Love / Quiet Walks the Tiger (1991)
* Untamed Maverick Hearts (1993)
* Tender Taming / When Next We Love (1994)
* Three Complete Novels: Sweet Savage Eden / A Pirate's Pleasure / Love Not a Rebel (1994)
* A Season for Love and Quiet Walks the Tiger (1994)
Omnibus in collaboration
* All in the Family: West Virginia/Betrayed By Love (1987; with Diana Palmer)
* Love's Legacy (1996; with Madeline Baker, Mary Balogh, Elaine Barbieri, Lori Copeland, Cassie Edwards, Catherine Hart, Virginia Henley, Penelope Neri, Diana Palmer and Janelle Taylor)
* Lovers Dark and Dangerous (1996; with Helen R. Myers and Anne Stuart)
* Daughters Of Destiny (2001; with Merline Lovelace and Patricia Potter)
* Lonesome Rider/The Heart's Desire (2001; with Gayle Wilson)
* Home and Family: All in the Family/Tell Me a Story/Saturday's Child/Wedding of the Year/Seize the Fire (2001; with Elda Minger and Dallas Schulze)
* Reckless Hearts (2001; with Miranda Jarrett)
* Beautiful Stranger: The Last Cavalier/Mystery Child (2001; with Carla Cassidy)
* Lucia in Love/Lion on the Prowl (2001; with Kasey Michaels)
* With a Southern Touch (2002; with Jennifer Blake and Diana Palmer)
* On the Edge (2003; with Carla Neggers and Sharon Sala)
* Forbidden Stranger (2003; with Julia Justiss)
* The Ultimate Treasure (2003; with Merline Lovelace and Ann Major)
* Snowy Nights (2003; with Annette Broadrick, Lindsay McKenna and Marilyn Pappano)
* Forces of Nature (2004; with Beverly Barton)
* In the Dark/Get Blondie - Intimate (2004; with Carla Cassidy)
* I'd Kill for That (2004; with Rita Mae Brown, Jennifer Crusie, Linda Fairstein, Lisa Gardner, Kay Hooper, Katherine Neville, Anne Perry, Kathy Reichs, Julie Smith and Tina Wainscott)
* Warrior without Rules/Suspicious (2005; with Nancy Gideon)
* A Bride by Christmas (2008; with Jo Beverley and Candace Camp)
* More Than Words Volume 5 (2009; with Stephanie Bond, Candace Camp, Brenda Jackson and Tara Taylor Quinn)
* Holiday with a Vampire 4 (2012, with Susan Krinard, Theresa Myers and Linda Thomas-Sundstrom)
* The Gatekeeper
As Heather Graham Pozzessere
Some re-edited as Heather Graham.
Stand-alone novels
* Night Moves (1985)
* Double Entendre (1986)
* The Di Medici Bride (1986)
* The Game of Love (1986)
* King of the Castle (1987)
* A Circumstantial Affair (1986; a.k.a. A Matter of Circumstance)
* All in the Family (1987)
* Lucia in Love (1988)
* Strangers in Paradise (1988)
* This Rough Magic (1988)
* Home for Christmas (1989)
* A Perilous Eden (1990)
* Forever My Love (1990)
* Wedding Bell Blues (1990)
* Forbidden Fire (1991)
* Snowfire (1991)
* The Christmas Bride (1991)
* Hatfield and McCoy (1991)
* Mistress of Magic (1995)
* Between Roc and a Hard Place (1993)
* Last Cavalier (1993)
* Lonesome Rider (1993)
* The Trouble with Andrew (1993)
* Wilde imaginings (1993)
* Slow Burn (1994)
* An Angel's Touch (1995)
* Eyes of Fire (1995)
* For All of Her Life (1995; re-issued as Up In Flames (February 27, 2018))
* Seize the Wind (1995)
* Down in New Orleans (1996)
* If Looks Could Kill (1997)
* Never Sleep with Strangers (1998)
* Night Heat (2001)
Angel Hawk Series
* 1) Bride of the Tiger (1987)
* 2) Angel of Mercy (1988)
* 3) Borrowed Angel (1989)
* Night Heat: Bride of the Tiger/Angel of Mercy/ Borrowed Angel (2001)
Slater's Summer Fires Series
* 1) Dark Stranger (1993)
* 2) Rides a Hero (1989)
* 3) Apache Summer (1989)
* Summer Fires: Dark Stranger, Rides a Hero and Apache Summer (1998)
Omnibus in collaboration
* Brave Hearts (1994; with Kathleen Eagle and Diana Palmer)
* Destined for Love (1998; with Annette Broadrick and Kathleen Korbel)
* Forever Mine (1998; with Elizabeth Lowell and Nora Roberts)
* Summer Sensations (1998; with Linda Howard and Linda Lael Miller)
* Always and Forever (1998) (with Linda Howard and Linda Lael Miller)
* Legacies of Love Collection: Legacy, No Stranger and Wedding Bell Blues (1999; with Stella Cameron and Jayne Ann Krentz)
Stand-alone novels
* Tomorrow the Glory (1985)
* Blue Heaven, Black Night (1986)
* Ondine (1988)
* Lie Down in Roses (1988)
* Emerald Embrace (1991)
* And I Will Love You Forever (1991)
* Gifts of Love (1991)
* Damsel in Distress (1992)
* Bride of the Wind (1992)
* Vanquish the Night (1992)
* Lovers and Demons (1993)
* One Little Miracle (1993)
* Branded Hearts (1995)
* The King's Pleasure (1998)
* The Pirate Bride (2008)
Fire Series
* 1) Princess of Fire (1989)
* 2) Knight of Fire (1993)
No Other Series
* 1) No Other Man (1995)
* 2) No Other Woman (1996)
* 3) No Other Love (1997)
Vampires Series
* 1) Beneath a Blood Red Moon (1999)
* 2) When Darkness Falls (2000)
* 3) Deep Midnight (2001)
* 4) Realm of Shadows (2002)
* 5) The Awakening (2003)
* 6) Dead by Dusk (2005)
* 7) Kiss Of Darkness (2006)
* 8) Blood Red (2007)
Graham Family Series
* 1) Come the Morning (1999)
* 2) Conquer the Night (2000)
* 3) Seize the Dawn (2001)
* 4) Knight Triumphant (2002)
* 5) The Lion in Glory (2003)
* 6) When We Touch (2004)
* 7) The Queen's Lady (2007)
Victorian Fairy Tale Series
* 1) Wicked (2005)
* 2) Reckless (2005)
* 3) Beguiled (2006)
Omnibus in collaboration
* Haunting Love Stories (1991; with Betina Krahn, Linda Lael Miller and Christina Skye)
* Christmas Love Stories (1991; with Diane Wicker Davis, Kay Hooper and Lisa Kleypas)
* Night Magic (1993; with Rebecca Brandewyne, Jill Gregory and Becky Lee Weyrich)
* Under the Mistletoe (1993; with Judith E French, Sara Orwig and Rebecca Paisley) | WIKI |
User:Ivywonder/Adam Jakowenko
Adam Jakowenko (born September 9, 1979) is an American businessman, jazz musician, technophile and athlete. He is currently acting as the Director of Business and Clinical Applications at PPSDRC.
Early Life
Jakowenko was born and raised in Syracuse, New York, the son of an accountant and teacher, and has one brother. After graduating from Solvay High School in 1997 and later Cornell University. with 2 degrees in Biology and Psychology, then a Masters in Health Administration, Jakowenko moved to San Diego. He chronicled this move in his blog. and attributes his decision to work in San Diego to having been raised in Syracuse, which he considers "the post-industrial wasteland of America"
Career
An accomplished musician and drummer, Jakowenko spent ages 10-21 competing in various musical competitions. He was a 4 time All-County, 2-time All State, and 1-time All-East Jazz competition winner, being selected as the best drummer in a 13 state region of the Northeast United States region. He has performed with the Syracuse Symphony Orchestra, Baltimore Symphony Orchestra, and with Jazz musicians such as Clark Terry and Wynton Marsalis
He has spent the last 5 years with Planned Parenthood of San Diego and Riverside Counties, working in Practice Management and most recently directing the Business and Clinical Application division through a full scale implementation of Electronic Medical Records across 19 locations.
Although not considered professional, he has received notable acclaim as a freestyle snowboarder, experimenting with new tricks and finding the hardest part to be "coming up with a name for them!" He has competed in K1 Kart racing, placing 5th in the 2008-2009 finals. .
Currently member of Cornell Entrepreneur Network. . Jakowenko also serves on the Cornell's Alumni Admissions Ambassador Network. ., interviewing candidates and guiding young aspiring students through their academic career in the Ivy League.
In his spare time he works on analyzing technology and mobile communication trends, digital music/video, and DRM issues relating to american consumers. | WIKI |
User:M Qnda/Some Kind of Heaven (Hurts song)
"Some Kind Of Heaven" is a song by English synthpop duo Hurts from their upcoming third album Surrender. | WIKI |
Corvex Management Among Others Entered Into Stock Purchase Agreement Of Energen
May 21 (Reuters) - Energen Corp:
* CORVEX MANAGEMENT SAYS CORVEX, AMONG OTHERS & HIGH RIVER LIMITED, AMONG OTHERS ENTERED INTO STOCK PURCHASE AGREEMENT OF ENERGEN STOCK - SEC FILING
* CORVEX MANAGEMENT SAYS PURSUANT TO AGREEMENT ICAHN GROUP AGREED TO BUY 2 MILLION ENERGEN SHARES AT $64.84 PER SHARE FROM CORVEX PARTIES
* CORVEX MANAGEMENT SAYS CORVEX PARTIES & ICAHN GROUP ALSO ENTERED INTO STOCK OPTION AGREEMENT IN RELATION TO ENERGEN STOCK
* CORVEX MANAGEMENT SAYS FOLLOWING OPTION DEAL, CORVEX PARTIES GRANTED ICAHN GROUP OPTION TO BUY ADDITIONAL 2 MILLION ENERGEN SHARES AT $67.37/SHARE
* CORVEX MANAGEMENT SAYS FOLLOWING OPTION DEAL, ICAHN GROUP MAY EXERCISE OPTION AT ANY TIME THROUGH NOV 18
* CORVEX MANAGEMENT REPORTS 8.7 PERCENT STAKE IN ENERGEN CORP AS OF MAY 20 Source text: bit.ly/2x1SM8u | NEWS-MULTISOURCE |
DNN Custom Forms by OnyakTech
OnyakTech Custom Forms DNN Module
by OnyakTech
Custom Forms Filters Plugin
Form Value Filters are plug-ins that provide the ability to apply different data conversions and formatting during specific stages of your forms lifecycle (Load, Save, Data Storage, Email Rendering, etc). Each stage has a canvas that contains it's own copy of the data that is populated from the "Master Form Canvas" and the data (Form Values) are passed through the filters you enable below before executing the actions for the stage. This allows you to do format data differently during each stage of your forms lifecycle.
When a controls value is set (from the database, querystring, etc) you can use this to replace the value. This is the same as the REPLACEVALUE token you can use in your Form. The difference between the REPLACEVALUE token and this option is that you can use both upper and lower case characters with this option and at different stages of the form submission. Example: EMP=Employee;STD=Student; TIP: This is a great plugin to use when you want to have a drop down control that may have "Support", "Sales" and you want the users selection converted to an email address for the value selected before saving the form or sending emails. Simply add the following: Support=support@yourcompany.com;Sales=sales@yourcompanye.com; | ESSENTIALAI-STEM |
Big Red Machine (album)
Big Red Machine is the debut studio album by American musicians Aaron Dessner and Justin Vernon as Big Red Machine. Dessner is most famous for being a founding member, instrumentalist, songwriter, and producer for The National, and Vernon for being the founding member and frontman of Bon Iver. The majority of the album was recorded in Dessner's shed studio in the Hudson Valley.
Musicians
* Aaron Dessner - drum machine, synthesizer, acoustic guitar, electric guitar, piano, mellotron, bass, songwriting, production
* Justin Vernon - vocals, electric guitar, bass, synthesizer, baritone guitar, songwriting, production
* Brad Cook - production, bass, omnichord, synthesizer
Additional musicians
* Jonathan Low - engineering
* JT Bates - drums (all tracks)
* Bryce Dessner - orchestration (6-8), electric guitar (7)
* Bryan Devendorf - drum machine (2-3, 6-7)
* Phoebe Bridgers - additional vocals (3)
* Kate Stables - additional vocals (5, 8-9)
* Richard Reed Parry - additional vocals (2, 5, 9)
* Lisa Hannigan - additional vocals (1, 3, 5, 8-10)
* Andrew Broder - additional vocals (3)
* Camilla Staveley-Taylor - additional vocals (3, 6)
* Emily Staveley-Taylor - additional vocals (3, 5, 8-10)
* Jessica Staveley-Taylor - additional vocals (3, 5, 8-10)
* Zoe Randell - additional vocals (8-10)
* Steve Hassett - additional vocals (8-10) | WIKI |
Article Text
PDF
PP-008 Survival of Escherichia coli in monocytic cells in Crohn's disease: evidence of reduced killing capacity
1. B N Hudspith,
2. K Blackie,
3. N B Rayment,
4. T Elliott,
5. J Brostoff,
6. J Hermon-Taylor,
7. J D Sanderson
1. Nutrional Sciences Division, King's College London, London, UK
Abstract
Introduction Whist the exact cause of Crohn's disease (CD) remains unclear, an innate defect in the handling of intracellular bacteria appears to be involved. Evidence for this comes from 1. genome wide association studies implicating a role for genes involved in bacteria-immune cell interactions including NOD-2 and the autophagy related genes, ATG16L1 and IRGM, 2. an observed defect in phagocyte recruitment and 3. the consistent demonstration of viable E coli within lamina propria macrophages in CD. It is not known if this latter observation is due to increased uptake of E coli or a failure to achieve effective phagolysosomal killing of bacteria once within the cell.
Methods To examine phagocytosis and oxidative burst activity of phagocytic cells in peripheral blood of 16 healthy individuals and 16 patients with CD. Phagocytic activity was assessed by the number of cells taking up fluorescently tagged E coli (Phagotest) and the potential role of defective reactive oxygen radical (ROR) production involved in bacterial killing (Bursttest). This is measured by the conversion of non-fluorescent dihydrorhodamine 123 to the fluorescent rhodamine 123 by ROR's. The leucocytes were challenged with three strains of E coli, a heat killed sample, a laboratory strain (K12) and a strain isolated from a patient with CD. Results were obtained using florescent markers measured by flow cytometery.
Results Using the phagotest, to measure the uptake of bacteria no difference was seen between CD and controls and did not vary according to strain of E coli used. However, although the number of monocytes expressing ROR's was similar in both groups, their was a significantly level of ROR's produced in cells from CD compared to controls when viable bacteria were used (E coli K12: control 98.5±7.4 vs CD 68.1±13.2, p=0.04, and the CD isolate: control cells 101.1±7.4 vs CD 59.2±12.2, p=0.010). No difference was seen in the granulocytes between CD and controls for either phagocytosis or ROR's.
Conclusion The ability of monocytes from CD patients to engulf E coli appears to be normal. However, there is good evidence of an impaired capacity to kill these bacteria as measured by reduced levels of ROR's. These results points to either an inability to complete the process of phagolysosome formation or defects in the enzyme pathways involved in formation of reactive oxygen products that are induced by phagocytosis and support the concept of impaired innate immunity in CD.
Statistics from Altmetric.com
Request permissions
If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways. | ESSENTIALAI-STEM |
Talk:LokiTorrent
Theories
didn't loki run off with the cash? i remember reading an expose around the time of the shutdown <IP_ADDRESS> 03:39, 20 November 2006 (UTC)
* Unless any credible sources can be quoted, this can't be assumed, as it's a pretty harsh accusation. Also, it's already mentioned in the article as one of the theories. noroom 20:31, 23 January 2007 (UTC)
* Even if he *DID* run off with the money, good luck to him!
* 1) He's been running the site for ages, giving of his time and money...although he of course earns money from advertising, it's not going to be a huge sum
* 2) When the time came and he needed help from the *users* of the site, only (yes I said *ONLY*) $40k cash was donated. How long do you think $40k is going to last if he tried to take on the MPAA legally? He'd be banged up quicker than Gary Glitter in a PC World repair department if he even *tried*! People should think about the full picture before accusing and belittling the guy. Stuff like this should stay here in the talk section and not leak into the actual article...I'm adding this to give those article editors something to think about :-) SmUX 17:32, 29 April 2007 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified one external link on LokiTorrent. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20060813232342/http://www.boingboing.net/2005/02/10/mpaa_shuts_down_loki.html to http://www.boingboing.net/2005/02/10/mpaa_shuts_down_loki.html
Cheers.— InternetArchiveBot (Report bug) 09:07, 5 January 2018 (UTC) | WIKI |
Monte Generoso Observatory
The Monte Generoso Observatory (Osservatorio del Monte Generoso) used to be located atop Monte Generoso in the canton of Ticino, Switzerland. As of season 2021 it has been moved to the Park im Grünen in Bern, also supported by the Migros Culture Percentage.
Monte Generoso | WIKI |
S17 (St. Gallen S-Bahn)
The S17 is a railway service of the St. Gallen S-Bahn that provides hourly service between Sargans and Rapperswil, in the cantons of St. Gallen and Glarus. Südostbahn (SOB), a private company primarily owned by the federal government and the canton of St. Gallen, operates the service.
On its journey, the S17 passes three disused railway stations: Bollingen, Weesen and Mols.
Operations
The S17 operates hourly between Sargans and Rapperswil, using the Ziegelbrücke–Sargans and Rapperswil–Ziegelbrücke railway lines. The S6 also operates between Rapperswil and Ziegelbrücke, combining with the S17 for half-hourly service, with calls at every station. Between Uznach and Rapperswil, the S17 and S6 are additionally supported by the S4 and IR Voralpen-Express, both of which do not call at intermediate stations.
The three hours long Alpstein round trip (until December 2023 offered by the former S4 circle line), is still possible by combining the S4 and S17 services. At Sargans, the S17 continues as the S4 in direction of travel (and the S4 continues as S17 in the other direction), so that no change of trains is required; however, passengers do need to change trains either at Uznach or Rapperswil for the complete round trip.
Route
Rapperswil – Uznach – Ziegelbrücke – Sargans
* Sargans
* Mels
* Flums
* Walenstadt
* Unterterzen
* Murg
* Mühlehorn
* Ziegelbrücke
* Schänis
* Benken
* Uznach
* Schmerikon
* Blumenau
* Rapperswil
History
Prior to the 10 December 2023 timetable change, service over the Ziegelbrücke–Sargans railway line was provided by the S4, which operated in a bidirectional circular fashion. The expansion to dual track between Uznach and Schmerikon (constructed between 2021 and 2023) on the Rapperswil–Ziegelbrücke railway line permitted expanded service between Rapperswil and Uznach. The S4 was rerouted to run between Sargans and Rapperswil via St. Gallen, while Sargans to Rapperswil via Ziegelbrücke became the new S17. | WIKI |
• July 23, 2024
CBD Cream for Pain Relief: What You Need to Know
As a reliable solution for managing various types of pain, CBD cream has gained popularity in recent years. People suffering from chronic pain, inflammation, sore muscles, and joint stiffness are turning to CBD cream as a natural alternative to traditional pain relief medications. But what exactly is CBD cream, and how does it work to alleviate pain? In this comprehensive guide, we will explore everything you need to know about CBD cream for pain relief.
Understanding CBD Cream
CBD, short for cannabidiol, is a natural compound found in the cannabis plant. Unlike its counterpart THC, CBD does not produce any psychoactive effects, making it a safe and non-intoxicating option for pain relief. CBD cream is a topical product infused with CBD oil that can be applied directly to the skin. When absorbed, CBD interacts with the body’s endocannabinoid system, helping to reduce inflammation and pain signals.
How Does CBD Cream Work for Pain Relief?
When CBD cream is applied to the skin, the CBD interacts with the endocannabinoid receptors in the skin, muscles, and nerves. This interaction can help to reduce inflammation, soothe sore muscles, and alleviate pain. Additionally, CBD cream can also help to improve blood circulation in the affected area, promoting faster healing and recovery.
Benefits of Using CBD Cream for Pain Relief
CBD cream offers a range of benefits for individuals seeking natural pain relief. Some of the key benefits of using CBD cream include:
1. Non-Intoxicating: Unlike THC, CBD does not produce any psychoactive effects, making it safe for daily use.
2. Targeted Relief: CBD cream can be applied directly to the affected area, providing targeted relief for localized pain and inflammation.
3. Anti-Inflammatory Properties: CBD has been shown to have powerful anti-inflammatory properties, making it effective in reducing swelling and pain.
4. Long-Lasting Relief: CBD cream can provide long-lasting pain relief, allowing individuals to go about their daily activities without constant discomfort.
How to Choose the Right CBD Cream
When selecting a CBD cream for pain relief, it is essential to consider the following factors:
1. CBD Concentration: Look for a CBD cream with a higher concentration of CBD for more potent pain relief.
2. Additional Ingredients: Some CBD creams may include additional ingredients like menthol or essential oils for enhanced pain-relieving effects.
3. Third-Party Testing: Choose a CBD cream that has been third-party tested for quality and potency to ensure its effectiveness.
4. User Reviews: Reading user reviews can help you gauge the effectiveness of a CBD cream before making a purchase.
Common Questions About CBD Cream for Pain Relief
1. Can CBD Cream Help with Chronic Pain? Yes, CBD cream has been shown to be effective in managing chronic pain conditions such as arthritis and fibromyalgia.
2. Is CBD Cream Safe to Use? Yes, CBD cream is generally considered safe for most individuals. However, it is essential to consult with a healthcare professional before using CBD cream, especially if you have any underlying medical conditions or are taking medications.
3. How Often Should I Apply CBD Cream? The frequency of applying CBD cream can vary depending on the severity of pain. It is recommended to follow the manufacturer’s instructions for optimal results.
In conclusion, CBD cream offers a natural and effective solution for managing pain and inflammation. With its anti-inflammatory properties and targeted relief, CBD cream can be a valuable addition to your pain management routine. When choosing a CBD cream, consider factors such as CBD concentration, additional ingredients, third-party testing, and user reviews to ensure you select the right product for your needs. Whether you are dealing with sore muscles, joint stiffness, or chronic pain, CBD cream can provide the relief you need to live your life to the fullest.
Leave a Reply
Your email address will not be published. Required fields are marked * | ESSENTIALAI-STEM |
Can't "Start Editing Macros" then "Stop Editing Macros" in a single macro?
I have a macro that needs to have "Editing Macros" to be true, i.e. "View->Start Editing Macros". So I check to see if the "Start Editing Macros" menu item is present, and if it is, "click" it.
Works great.
Then I do something, then I want to change it back to no longer be editing macros.
Start Editing Macros then Stop Editing Macros.kmmacros (5.2 KB)
But when I try to execute the "Select Menu Item" action to "click" on "Stop Editing Macros", it says it can't find the menu item.
I know the menu action itself works, because I can run it by itself and it works.
But for some reason, I can't "start" and then "stop" editing macros within a single macro.
Anyone got any ideas?
Hey Dan,
It works fine.
The problem is that your pause is too short.
It's not just a matter of changing editor state. Toggling writes the Keyboard Maestro plist file, and that takes around a second.
If you manually toggle with a macro and try to run it quickly more than once it will fail.
In this one I'm not checking for state, since I already know what it is – I'm just toggling it.
Menu → Edit-Macro-Toggle.kmmacros (2.3 KB)
Try running that a couple of times real quick.
-Chris
2 Likes
I have this question and don't know where to ask it — there are a number of posts where the issue of starting/stopping editing in the KM editor came up.
My KM editor is always in editing mode. Why would you want it not to be?
I agree completely.
Hey Mitchell,
To keep accidents from happening?; :smile:
But I do that by keeping my test macro selected when I'm not working on something.
I too rarely ever leave editing mode.
-Chris | ESSENTIALAI-STEM |
Talk:Abraham Lincoln
Most Oates citations fail verification
The brief of this is that most of the Oates 1974 references seem like they're not supported by the book listed in the Bibliography and what my preliminary explorations were into what the proper citations might be.
I was able to find a (probably) different version of Responses of the Presidents to Charges of Misconduct available in the Internet Archive, with the Lincoln section between pages 97 and 107. Further, I found that the scope of the text was limited to just actions taken while president based on p. xxviii.
Most of the citations don't seem supported like they could ever be supported in text by this Oates book, since they are things that happened before Lincoln became President. The only one that seemed related was citation 207 which is largely supported by pages 99–101 of the archive copy, though I don't see anything about a telegraph.
I kinda wonder whether these citations are from some other Stephen B. Oates book and just cited as Oates 1974 instead? I did notice in this diff that both, were introduced, replacing ref names that referred to , but the other Oates sfns that were introduced in this change were originally named either or , so I don't know what their deal is.
is what those two citations used to refer to, but I don't know whether this is the right version of the book, nor how to cite it (it's odd that it was referred to as Oates1994 even though the google book is from 2009 and it was originally published in 1977). I do know that it's available on the archive though it has a different ISBN.
Anyways, that leaves 5 Oates citations that I can't explain, namely 83, 89, 119, 130, and 152 as of this revision. GrapesRock (talk) 18:45, 27 June 2024 (UTC) | WIKI |
Page:CooperBull1(6).djvu/5
BULLETIN OF THE COOPER ORNITHOLOGICAL CLUB. IO 5 tree to exanfine a nest of the Arizona Woodpecker which contained young, and while up the tree he noticed a likely-looking cavity in another limb of the same tree, so he chopped it open and found it contained a nest of the Olivaeeous Flycatcher with a single egg and shells of others--evidently a de- serted nest. The nest did not differ materially from two others which I am about to describe. While walking down a canon one day late in May, through SOlne thick timber, an Olivaee- ous Flycatcher, presumably a female bird, flew past me and I noticed some- thing in its mouth as it flew by. The mate followed shortly after and both birds lit on a dead oak stump not fifty feet away. I was well hidden and stood pereetly still. The birds seemed to be rather nervous and sat there for some time when the one with the build- ink material entered a deserted wood- peeker's excavation about six inches below where it had been sitting. Sat- isfied that the birds were only building I left the locality and returned again on the 4th of June expecting a fine set of four or five eggs, but to my disap- pointment the birds were not in sight BUFF-BREASTED Very few facts, if any, have been published regarding the breeding habits of this rare little flycatcher. The birds are even less numerous than the Sul- phur-betlied Flycatchers, their range within the United States being about the same. I first met with the birds in I896 during that eventful trip made from Los Angeles by wagon, a distance of about 7co miles, the party consisting of W. B. Judson, H. G. Rising, H.S. Swarth and myself. t. re expected to meet this flycatcher shortly after our arrival in the Huachucas and kept a sharp lookout for them all the time, but were for sometime disappointed, until finally one afternoon I was taking a stroll up the canon above the camp when I spied a small flycatcher sitting on a dead twig in the top of an oak tree on the hillside. The bird was new to me and I at once tcok it forKranted that this was the Buff-breasted Flycatch- er. I stood behind a tree watching the bird until the light grew dim and I was and when 17 looked into the nest 17 found it deserted. The two eggs which it contained were almost entirely hidden by the disarranged nesting material. Needless to say 17 took the two eggs with the nest and was glad to get them. The nest was composed ahnost entirely of rabbit's fur with a few tail and wing feathers of jays sticking upright around the outer edge. The nest was ten in- ehes below the entrance to the cavity and fifteen feet from the ground; eleva- tion about 6,500 feet. The eggs very much resemble those of the Ash-throat- ed Flycatcher but are much smaller and the markings are finer. Mr. F. C. Wil- lard of Galesburg, II1., examined a nest of this species on the same date, it be- ing placed in a natural cavity in the trunk of a sycamore tree forty feet up. This nest contained four fresh eggs but unfortunately two of the eggs were broken while chopping into the cavity. The nests did not differ from the last and the eggs from the two nests are scarcely distinguishable. Counting the egg of this species taken by my friend in '98, there are only five eggs now in existence of the Olivaeeous Flycatcher. FLYCATCHER. obliged to make my way back to camp as 17 had to pass through a narrow and very rocky gorge known as "The Box," -not a very safe place to wander around in after dark. When I reached camp that evening I reported what I had seen and all were much interested so on the following morning June 5, I896, all four of us made our way to the place where I had seen the flycatcher, but the bird was not in sight and we were about to make our departure when I spied a nest in a pine tree just above our heads. I at first thought this was the flycatcher's nest so I soon had my climbers on and was up to the first limb where I stop- ped to rest and while doing so my eyes fell on another nest in the same tree- and not far from the one I had seen from the ground. The last nest looked more promising and as I sat there look- ing at it I noticed a very small tail sticking just over the edge of the nest. It did not take me long to climb up | WIKI |
How to Predict Your Teenage Daughter's Height
By Jill Kokemuller
A doctor can tell you if your daughter's height is outside normal range.
A doctor can tell you if your daughter's height is outside normal range.
There is no truly accurate way to predict the adult height of a child. Height is determined by many factors. The genetic contributions of the parents form the starting point for potential height of a child. But a short parent may have two "short" genes, or a "short" and a "tall" gene, for example, and you don't know which one was passed to the child. Beyond that, health factors like prolonged illness or poor nutrition can affect growth. There is a way to take an educated guess about how tall your daughter will be when she reaches her full height, however.
Measure the height of the mother and the height of the father in inches using a measuring tape. Convert feet to inches by multiplying by 12. For example, a height of 5 feet 4 inches is 64 inches.
Add the two heights together. Subtract 5 inches from the total. For example, the mother's height of 64 inches plus the father's height of 72 inches is 136 inches. Subtracting 5 inches makes 131 inches.
Divide the number by two, and convert back to feet and inches by dividing by 12. For example, 131 inches divided by 2 is 65.5 inches. Converted to feet and inches, this is 5 feet 5.5 inches. Assuming good health, your daughter's height should fall within 4 inches of this predicted height.
Tip
Another method of predicting your daughter's adult height is to double her height at age 2. If your daughter is consistently in the same percentile range on growth charts, you can follow that percentage to determine her height at age 18. Most girls grow only an additional 2 inches after their first period.
About the Author
Jill Kokemuller has been writing since 2010, with work published in the "Daily Gate City." She spent six years working in a private boarding school, where her focus was English, algebra and geometry. Kokemuller is an authorized substitute teacher and holds a Bachelor of Arts in English from the University of Iowa. | ESSENTIALAI-STEM |
2014 Addis Ababa Master Plan
The 2014 Addis Ababa Master Plan was a controversial plan to expand the boundaries of Ethiopian capital, Addis Ababa, by 1.1 million hectares into the Oromia Special Zone in April 2014. The plan was met with protests, particularly in the Oromia Region, with critics saying it would violate the 1995 Constitution.
Background
The Oromia Special Zone Surrounding Finfinne was established in 2008 from parts of several zones in Oromia surrounding Addis Ababa. In 2011, Addis Ababa and the Oromia Special Zone established a joint project on common urban development issues, led by Kuma Demeksa.
The Ethiopian government, at the time led by the TPLF, met with other stakeholders in Adama in June 2013. They voiced their support for the project, claiming it was in Ethiopia's interest. The plan to expand the capital was done to accommodate the increasing demand for residential and commercial properties, because of a growing middle-class in Ethiopia. The integration of Addis Ababa and the Oromia Special Zone would violate the 1995 Constitution (which demarcated the capital from Oromia), and so it needed to be bypassed. By April 2014, the government was prepared to implement the Master Plan (which would seize surrounding town without consulting affected communities). This triggered protests from university students in Oromia, which were repressed by the government.
Protests
The proposed expansion of the boundaries of Addis Ababa ignited the 2014–2016 Oromo protests beginning on 25 April 2014; to which the government responded by shooting at and beating peaceful protesters. More widespread strikes and street protests resumed on 12 November 2015; largely led by students in Ginchi (located 80 km southwest of Addis Ababa and encircled by the Oromia region). Protests spread throughout 400 different locales across 17 zones of the Oromia region, and according to Amnesty International 800 of these protestors were killed.
On 12 January 2016, after two months of protests, the Oromo Democratic Party said that the plan was “fully terminated” after extensive meetings with government officials who rejected it. | WIKI |
French soldier shoots knife-wielding man in Lyon
LYON, France (Reuters) - A French soldier opened fire on Sunday at a man clad in a North African-style robe who was threatening military personnel with a knife in Lyon, police and the public prosecutor said. The assailant was wounded in the leg in front of the Desgenettes military hospital in the eastern French city. Lyon’s public prosecutor Nicolas Jacquet said an investigation was underway into “attempted voluntary homicide on persons with a public service mission”. The man, in a long djellaba robe and carrying a knife, was spotted around 1300 GMT on the hospital grounds but refused to stop when asked to by a military patrol. “After a summons, a soldier used his weapon, once,” the prosecutor told reporters. The man was taken to the Edouard Herriot hospital in Lyon, but not in a life-threatening condition. Home to Europe’s largest Muslim community, French security forces are on alert after a series of attacks by Islamist militants and sympathizers in recent years. Reporting by Catherine Lagrange, additional reporting by Emmanuel Jarry in Paris; Writing by Dominique Vidalon; Editing by Andrew Cawthorne | NEWS-MULTISOURCE |
Wikipedia:Reference desk/Archives/Science/2021 December 7
= December 7 =
Nuclear Winter vs. Climate Change
Could a purposefully-created nuclear winter viably be created in order to offset the warming effects of climate change? Would it work in dampening the effects of global warming going forward, or cause more problems than it's worth? Tyrone Madera (talk) 01:23, 7 December 2021 (UTC)
* It would cause way more problems than it is worth. --OuroborosCobra (talk) 02:23, 7 December 2021 (UTC)
* So, even if undesirable, it could theoretically be done, say to offset global temperatures after they've risen drastically? I read that it would cause something equivalent to the Little Ice Age, but that is with current global climactic conditions. If the earth heats by 3.3 °C to 5.7 °C, would a nuclear winter just bring temperatures back down to what they are now, or would it still be a "winter" of sorts? Tyrone Madera (talk) 03:28, 7 December 2021 (UTC)
* Whether it would have that effect or not is not really all that important given that we would all die of radiation poisoning and other long-term radiation exposure effects. Hence why I linked you to nuclear fallout. The cure would be far, faaaaaar worse than the disease, assuming it would even have the desired cooling effect at all. It's not worth really spending CPU hours on a climate model of this when, even if it had the cooling effect, we'd all die. --OuroborosCobra (talk) 03:32, 7 December 2021 (UTC)
* Fair enough. This was more out of interest in the effects on climate than on humans or ecology.
* For example, if a massive volcanic eruption brought down temperatures in the future, would that be offset by elevated climate temperatures due to global warming to make them more like temperatures now, or would it be the same as if that eruption had happened now because it would block so much solar radiation that the greenhouse effect would be negligible?
* I don't know. Do you get where I'm coming from? I am not legitimately proposing that we deliberately irradiate ourselves back into the stone age. Tyrone Madera (talk) 03:43, 7 December 2021 (UTC)
* Conventional means can be used to produce firestorms in a sufficient number to set of the effect; see . The amount of greenhouse gases emitted by these firestorms, whether ignited by nuclear bombs or otherwise, will have a countereffect and may in the end make a dire situation worse; see . --Lambiam 08:45, 7 December 2021 (UTC)
* Ah, that makes sense. Nuclear winter caused by nuclear devices was the only form I was familiar with, so it's good to know that it can be done through conventional means. I didn't know if Nuclear summer was a guaranteed thing or not, so that's nice to know as well. Thank you for your help!
* Would the massive volcanic eruption take on similar effects? Best, Tyrone Madera (talk) 17:20, 7 December 2021 (UTC)
* There are ways of doing this that don't involve nuclear bombs, this is known as Stratospheric aerosol injection. The youtube channel Kurzgesagt had an interesting episode ("Geoengineering") about this that I can recommend. El sjaako (talk) 10:36, 7 December 2021 (UTC)
* The article Milankovitch cycles is well worth reading. The idea is that ice ages occur in predictable ways and that the Earth is well past the peak of the Holocene interglacial. Hence we might well be worrying about global cooling if we weren't worrying about global warming! Mike Turnbull (talk) 11:29, 7 December 2021 (UTC)
* If those snowy Elizabethan-Victorian winters didn't do it then then nothing could till half a thousand centuries AD. Hudson Bay, Canada has to avoid melting completely for a year (maybe more if hotter summer(s) happen soon enough after) for an ice cap to start covering North North America in a feedback loop. Sagittarian Milky Way (talk) 16:43, 7 December 2021 (UTC)
* Like, a glacial feedback loop? How would it loop? Tyrone Madera (talk) 17:10, 7 December 2021 (UTC)
* Hudson Bay melts completely for a few months a year on average. Around 100,000BC the melting seasons stopped obliterating the ice completely so the ice accumulation seasons started having head starts. Sagittarian Milky Way (talk) 17:47, 7 December 2021 (UTC)
* Ah, that's a neat tidbit of information that I was unaware of. The more you know :) Tyrone Madera (talk) 18:49, 7 December 2021 (UTC)
* Ice caps and sheets grow by positive feedback mechanisms. One of these is that ice has a high albedo, reflecting more sunlight back into space, that in the absence of ice would be instead absorbed by the land and water. --<IP_ADDRESS> (talk) 08:10, 10 December 2021 (UTC)
* Thanks for pointing this out to me! I was not aware of the article on Milankovitch cycles, so I'm grateful that you've brought it to my attention. Tyrone Madera (talk) 17:12, 7 December 2021 (UTC)
* That's super cool! For those interested, here is the video mentioned: Geoengineering: A Horrible Idea We Might Have to Do. I'll be sure to give both the video and the article a look. Tyrone Madera (talk) 17:15, 7 December 2021 (UTC)
Mask effectiveness vs Covid
Hi. Have any reliable scientists/journals etc published data on effectiveness of masks on preventing transfer of Covid, either focused on protecting the wearer or protecting those the wearer mixes with?
Particularly keen to see information about the kind of home-made cloth masks people tend to wear, rather than 'proper' PPE.
Thanks --Dweller (talk) Old fashioned is the new thing! 10:15, 7 December 2021 (UTC)
* There's quite a lot of reliable WP:MEDRS-compliant information at COVID-19 masks. Mike Turnbull (talk) 11:32, 7 December 2021 (UTC)
* Thanks. Is there anything on cloth masks? --Dweller (talk) Old fashioned is the new thing! 11:58, 7 December 2021 (UTC)
* Literally the first section of the article. -- Jayron 32 12:05, 7 December 2021 (UTC)
* That section has a vague part sentence of text on effectiveness. The effectiveness section (which is really good) doesn't seem to relate to cloth masks. --Dweller (talk) Old fashioned is the new thing! 13:07, 7 December 2021 (UTC)
* The article I linked points out that there is a more detailed account at Cloth face mask. Enjoy! Mike Turnbull (talk) 13:10, 7 December 2021 (UTC)
* You could also try a search on Google Scholar like this.
* Evaluation of Cloth Masks and Modified Procedure Masks as Personal Protective Equipment for the Public During the COVID-19 Pandemic is about the newest I could see at a quick glance. Alansplodge (talk) 16:49, 7 December 2021 (UTC)
Thanks all --Dweller (talk) Old fashioned is the new thing! 18:04, 7 December 2021 (UTC)
* Check out the very recently published Kansas study comparing case and death rates in counties with and without mask mandates. The health commissioner was forced out because of the report. Imagine Reason (talk) 02:00, 13 December 2021 (UTC)
Suggest Wikipedians good in writing lead definitions
Greetings,
I am looking for suggestions for (not retired/ still active) Wikipedians in writing comprehensive and good Wikipedia article lead definitions (from available multiple definitions) for articles related to Sciences and Humanities (preferable at least five from each segment, and expecting users names suggestions other than one's own :))
Thanks
 Bookku, 'Encyclopedias = expanding information & knowledge' (talk) 16:18, 7 December 2021 (UTC) | WIKI |
Talk:Low Carbon Fuel Standard
Untitled
This subject is incorrectly redirected to emission standards, as this is a California mandate based on the Global Warming Solutions Act of 2006, and administered by CARB. I can work on the specific subject, but I would like to hear other opinions first.--Mariordo (talk) 03:13, 22 April 2009 (UTC)
* By the way, in the California literature it is written as "low-carbon fuel standard". Any comments or suggestions regarding the correct spelling.--Mariordo (talk) 04:06, 23 April 2009 (UTC)
* Done!--Mariordo (talk) 03:18, 24 April 2009 (UTC) | WIKI |
Albert Pujols Joins the 3,000-Hit Club
SEATTLE — The Los Angeles Angels slugger Albert Pujols got his 3,000th hit, reaching the mark with a broken-bat single on Friday night against the Seattle Mariners and becoming the 32nd player in major league history to join the exclusive club. Pujols dumped the single into shallow right field in the fifth inning against Mike Leake. It came on Pujols’s sixth attempt after getting to 2,999 a day earlier. Pujols received a standing ovation from the crowd at Safeco Field and was given the baseball and first base as a memento. His teammates all greeted him on the field before action resumed. The Angels won, 5-0, and Pujols collected hit No. 3,001 in the ninth inning with a two-run single. “I was really excited, but at the same time you still have a game you need to play and you still need to focus to win that game,” Pujols said. “That’s what I told those guys. Let’s go win that game so it can taste a little better with a win.” Pujols, 38, nearly got the mark in the first inning, but his hard liner was right at shortstop Jean Segura. Pujols walked on a 3-2 pitch leading off the fourth inning after fouling off four two-strike pitches. Pujols joined Hank Aaron, Willie Mays and Alex Rodriguez as the only major leaguers to have 3,000 hits and 600 homers. He’s the first player to reach the mark since Adrian Beltre did it last year against Baltimore. “I’m aware of the legacy and the people that I tie and am on the same page right now,” Pujols said. “But at the end of the day it’s about winning a championship. Nothing would be more special than in September and October and playing in the playoffs and bringing a championship back to the city of Anaheim.” Pujols reached the precipice of the milestone earlier in the week in Anaheim, getting two hits against Baltimore on Wednesday night — including his 620th career homer — before getting No. 2,999 on a second-inning double on Thursday night. He then came to the plate three times with the chance to hit the mark in front of his standing home crowd. But Pujols couldn’t quite do it, eventually flying out to right and deflating his eager home fans in the eighth inning of the Angels’ 12-3 win. “Trust me, I wanted to do it last night,” he said. “But it didn’t happen last night. It just happened tonight.” Ichiro Suzuki reached 3,000 hits in 2016 and also accomplished it on the road. He was in the Seattle clubhouse on Friday night when Pujols joined the club. “More than the actual 3,000th hit, I remember the week prior,” Suzuki said through an interpreter before Friday’s game. “We were home for the whole week. I just had pinch-hitting opportunities. Every night was a pinch-hitting opportunity and that was really difficult. I was able to start on the last day of the road trip and getting it then.” Pujols became the second Dominican player to reach 3,000 hits by joining Beltre. With Suzuki stepping away this week for the remainder of the 2018 season, Beltre is the only active player with more hits than Pujols. And it may be a while before another player joins the club. The next closest player to 3,000 is Miguel Cabrera, who is more than 300 hits away. After Cabrera is Robinson Cano, nearly 600 hits away. Few sluggers in baseball history have been more versatile than Pujols, who joins Aaron as the only players with 600 doubles and 600 homers among their 3,000 hits. He is seventh on baseball’s career homers list after hitting his 600th last season. Pujols, who was raised in Santo Domingo before moving to New York and Missouri as a teenager, is the sixth foreign-born player to get 3,000 hits along with Suzuki, Rod Carew and Rafael Palmeiro. A three-time National League most valuable player with the St. Louis Cardinals, Pujols joined the Angels in 2012. Carew and Pujols are the only players to record their 3,000th hit with the Angels. Pujols is in the seventh season of the lavish 10-year, $240 million contract that persuaded him to leave the Cardinals, with whom he won two World Series, earned nine All-Star selections and established himself as one of the greatest hitters of his generation. Pujols has been chosen for just one All-Star team and has yet to win a playoff game in Anaheim during his first six seasons in partnership with the two-time American League M.V.P. Mike Trout, but these Angels are off to an encouraging 19-12 start. While he has slowed on the basepaths during the Anaheim chapter of his career, this season also has been rejuvenating for Pujols, who is playing first base regularly after several years primarily serving as a designated hitter. The two-way Japanese sensation Shohei Ohtani’s arrival as the Angels’ primary D.H. has put Pujols in the field, where he remains a capable defender. An earlier version of this article erroneously included Roberto Clemente among the list of foreign-born players to get 3,000 hits. Clemente, who was born in Puerto Rico, was not “foreign-born.” | NEWS-MULTISOURCE |
Raspberry Pi Cases
0
Wow, got four different kinds and it is a little frustrating as they don't have *any* installation instructions at all, so here's a guide:
1. MCM Electronics Clear Pi Case. This allows a camera, an expansion board, so is "double" height, but I can't find installation instructions anywhere. It appears to be made by Adafruit, but not clear. Anyway, inserting the board is a "no screws required" operation, you have to peel off the plastic protective around it. The case just snaps closed, so you have to take the top and bottom off. Then you distort the case, by putting in the RCA video side first. Then gently push and hope the HDMI connector goes through without cracking the case. The Raspberry Pi camera has no apparent mount, so I just pushed in it in there. There four little rubber feet and you push into the bottom. Also the case, doesn't allow you to put in a "double" thickness" low form factor SD card adapter which is to wide, a little file and this would work. So you can't use the really small ModMyPi SD holder, but you can use the slightly larger Adafruit one.
2. Elson Designs Pice. This is a rock solid aluminum case (the case cost 2x the computer!). Again, no instructions, but there is an instruction guide (pdf). The main thing is to make sure to insert the camera first and make sure it work because the camera cable itself is very delicate. So first install the cable, then check to make sure it works. Boot the pi and run, "raspistill -o foo.jpg" and see if you get an image. Then install the camera, remove the shippping plastic from the lense, insert the O-ring, then snake the cable. This thing really wants a round USB cable that is right handed. There is a rubber-O also for that exit. It's a nice product. Make sure not to lose the thermal conductors and then carefully put on top.
3. eBay Raspbeery Pi Stack. Not sure the exact name, but was $15 from China. A nice build system. No instructions, but pretty easy to figure out. You first take the short brass screws and put them in the center diagonal holes. The put the Raspberry Pi (has to be Model B with the screw holes in it). Then screw it in. Insert the camera. Put the heatsinks on the power supply, cpu and the io chip. The camera just kind of hangs out, so need to figure out a mount. Then put in the taller brass posts and there are brass ends you put in the bottom as the "feet". Put a stack in and repeat as needed. The last layer is a clear piece. Put this in and there are longer aluminum screws. Very compact and completely extensible.
Related Posts | ESSENTIALAI-STEM |
Asterolasia rivularis
Asterolasia rivularis is a small, upright shrub, with narrow leaves and yellow flowers. It has a restricted distribution in New South Wales.
Description
Asterolasia rivularis is a small shrub to 1.5 m high with young branches covered in brown to grey star-shaped, short matted hairs. The leaves may be narrowly oblong, narrow-oblong to wedge shaped and tapering at the base, 1-2.5 cm long, 2-3 mm wide. The leaf upper surface has occasional star-shaped hairs, underside brownish star-shaped to short matted hairs, margins slightly rolled under and narrowing to a short petiole. The flowers are either borne from leaf axils or at the end of branches in small clusters of 1-3, yellow petals about 6 mm long, upper surface with rusty star-shaped to short matted hairs. The pedicels are up to 3 mm long when in flower. Flowering occurs in early spring.
Taxonomy
The species was first formally described by Paul G. Wilson in 1998 and the description was published in the journal Nuytsia.
Distribution and habitat
Asterolasia rivularis has a restricted distribution, it is found growing along streams near Buxton. | WIKI |
Meghan McCain says she's still awaiting public apology for comments about father | TheHill
Meghan McCain says she's still waiting for the public apology from the White House aide who joked about her father’s brain cancer. Sen. John McCainJohn Sidney McCain3 real problems Republicans need to address to win in 2020 Fighter pilot vs. astronaut match-up in Arizona could determine control of Senate The Hill's Morning Report — Recession fears climb and markets dive — now what? MORE’s (R-Ariz.) daughter told ABC News on Sunday that White House staffer Kelly Sadler has not yet followed through on her reported promise to publicly apologize. The Hill reported Thursday that Sadler had brushed off the senator’s opposition to President TrumpDonald John TrumpTrump pushes back on recent polling data, says internal numbers are 'strongest we've had so far' Illinois state lawmaker apologizes for photos depicting mock assassination of Trump Scaramucci assembling team of former Cabinet members to speak out against Trump MORE’s nominee for CIA director, Gina Haspel, by saying “It doesn’t matter, he’s dying anyway.” John McCain, 81, is currently in Arizona battling an aggressive form of brain cancer. Meghan McCain, who is a co-host on “The View,” said Sadler called her and her family on Thursday to apologize. "When I had a conversation with Kelly, I asked her to publicly apologize and she said she would," Meghan McCain said. "I have not spoken to her since and I assume that it will never come." Meghan McCain suggested on Friday that Sadler should be fired. "I don't understand what kind of environment you're working in when that would be acceptable and then you could come to work the next day and still have a job," Meghan McCain said. "And that's all I have to say about it." White House press secretary Sarah Huckabee Sanders refused to address the issue during a press briefing on Friday, saying it was a staff matter. “I'm not going to validate a leak, one way or another, out of an internal staff meeting," Sanders said during her Friday press briefing as reporters peppered her with questions. Sanders declined to confirm or deny reports about a public apology from the White House during the briefing. The Hill reached out to the White House on Sunday for a response to Meghan McCain’s request. Sanders reportedly scolded her staff on Friday after Sadler’s remark was leaked to the media. “I am sure this conversation is going to leak, too. And that’s just disgusting,” she said according to a report by Axios on Saturday. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
South Carolina Highway 310
South Carolina Highway 310 (SC 310) is an 8.500 mi long state highway in the southeastern part of the U.S. state of South Carolina. The highway travels in a south-north orientation from Holly Hill north to Vance, and then northwest to its northern terminus, completely within Orangeburg County.
Route description
SC 310 begins at an intersection with US 176/SC 453 Truck in Holly Hill. The highway heads north concurrently with SC 453 Truck to a roundabout with SC 45, north of the city. Here, the truck route follows SC 45, while SC 310 continues to the north. It enters the city of Vance, where it intersects SC 210. After leaving Vance, SC 310 heads northwest and meets its northern terminus, an intersection with SC 6, just northwest of the city.
SC 310 is not part of the National Highway System, a system of roadways important to the nation's economy, defense, and mobility. | WIKI |
One unified atomic mass unit is approximately the mass of one nucleon (either a single proton or neutron) and is numerically equivalent to 1 g/mol. For more information contact us at info@libretexts.org or check out our status page at https://status.libretexts.org. \end{align*}\]. The mass number is the approximate mass of the isotope. Therefore, the effective nuclear charge towards the outermost electrons increases, drawing the outermost electrons closer. \[\mathrm{average\: mass}=\sum_{i}(\mathrm{fractional\: abundance\times isotopic\: mass})_i\]. Services, Working Scholars® Bringing Tuition-Free College to the Community. The difference is a measure of the nuclear binding energy which holds the nucleus together. Video \(\PageIndex{5}\): A preview of some of the uses we will have for moles in upcoming units. The information contained in this website is for general information purposes only. These numbers are either in atomic mass units (amu), or in grams per mole of atoms. While atomic mass and molar mass are numerically equivalent, keep in mind that they are vastly different in terms of scale, as represented by the vast difference in the magnitudes of their respective units (amu versus g). Calculate the average mass of a Mg atom. (The average mass of a terrestrial neon atom is 20.1796 amu. Example \(\PageIndex{7}\): Deriving Moles from Grams for a Compound. Use this simulator to make mixtures of the main isotopes of the first 18 elements, gain experience with average atomic mass, and check naturally occurring isotope ratios. Total number of protons in the nucleus is called the atomic number of the atom and is given the symbol Z. (The fraction that is 35Cl + the fraction that is 37Cl must add up to 1, so the fraction of 37Cl must equal 1.00 − the fraction of 35Cl.). An atomic mass unit (symbolized AMU or amu) is defined as precisely 1/12 the mass of an atom of carbon-12. In imprecise terms, one AMU is the average of the proton rest mass and the neutron rest mass. Since its initial use during the development of modern atomic theory, MS has evolved to become a powerful tool for chemical analysis in a wide range of applications. The average atomic mass for boron is calculated to be: \[\begin{align*} For 12C the atomic mass is exactly 12u, since the atomic mass unit is defined from it. Therefore the space in an atom (between electrons and an atomic nucleus) is not empty, but it is filled by a probability density function of electrons (usually known as  âelectron cloudâ). This means that 1 MOLE of hydrogen atoms will weigh 1.008 grams. The molar amount of Ar is provided and must be used to derive the corresponding mass in grams. Analysis of these neurons from mice subjected to various drug therapies shows significant changes in the average number of dopamine molecules contained in individual vesicles, increasing or decreasing by up to three-fold, depending on the specific drug used. The number of entities composing a mole has been experimentally determined to be \(6.02214179 \times 10^{23}\), a fundamental constant named Avogadro’s number (NA) or the Avogadro constant in honor of Italian scientist Amedeo Avogadro. Textbook content produced by OpenStax College is licensed under a Creative Commons Attribution License 4.0 license. In the periodic table, the elements are listed in order of increasing atomic number Z. The average mass of chlorine is the fraction that is 35Cl times the mass of 35Cl plus the fraction that is 37Cl times the mass of 37Cl. - Definition & Examples, Types of Radioactive Decay and Their Effect on the Nucleus, S-Block Elements on the Periodic Table: Properties & Overview, UExcel Anatomy & Physiology: Study Guide & Test Prep, Praxis Middle School Science (5440): Practice & Study Guide, MTTC Chemistry (018): Practice & Study Guide, TExMaT Master Science Teacher 4-8 (091): Study Guide & Test Prep, Human Anatomy & Physiology: Help and Review, Holt Physical Science: Online Textbook Help, Praxis Chemistry (5245): Practice & Study Guide, Biological and Biomedical Isotopes are atoms of the same element that have different mass numbers, which is the number of protons and neutrons in the atom. \mathrm{35.453\: amu} &=(x\times 34.96885\: \ce{amu})+[(1.00-x)\times 36.96590\: \ce{amu}]\\ It has an estimated density of 40.7 x 103 kg/m3. This constant is properly reported with an explicit unit of “per mole,” a conveniently rounded version being \(6.022 \times 10^{23}/\ce{mol}\). Today, we possess sophisticated instruments that allow the direct measurement of these defining microscopic traits; however, the same traits were originally derived from the measurement of macroscopic properties (the masses and volumes of bulk quantities of matter) using relatively simple tools (balances and volumetric glassware). Missed the LibreFest? Per the amu definition, a single 12C atom weighs 12 amu (its atomic mass is 12 amu). Anyone can be able to come here, learn the basics of materials science, material properties and to compare these properties. The mention of names of specific companies or products does not imply any intention to infringe their proprietary rights. A packet of an artificial sweetener contains 40.0 mg of saccharin (C7H5NO3S), which has the structural formula: Given that saccharin has a molar mass of 183.18 g/mol, how many saccharin molecules are in a 40.0-mg (0.0400-g) sample of saccharin? Example \(\PageIndex{3}\): Deriving Moles from Grams for an Element. Therefore, the atomic mass of hydrogen-1 will be approximately 1 amu, while hydrogen-2 will have an approximate mass of 2 amu. How many Au atoms are in this quantity of gold? Likewise, if we know the number of moles of a substance, we can derive the number of atoms or molecules and calculate the substance’s mass. It is an intensive property, which is mathematically defined as mass divided by volume: The atom consist of a small but massive nucleus surrounded by a cloud of rapidly moving electrons. An atom is neutral when it contains equal numbers of electrons and protons. The given mass of K (4.7 g) is a bit more than one-tenth the molar mass (39.10 g), so a reasonable “ballpark” estimate of the number of moles would be slightly greater than 0.1 mol. The configuration of these electrons follows from the principles of quantum mechanics. Mass spectrometry (MS) is widely used in chemistry, forensics, medicine, environmental science, and many other fields to analyze and help identify the substances in a sample of material. However, because a hydrogen peroxide molecule contains two oxygen atoms, as opposed to the water molecule, which has only one, the two substances exhibit very different properties. Its monatomic form (H) is the most abundant chemical substance in the Universe, constituting roughly 75% of all baryonic mass. How many hydrogen atoms? Carrying out the two-step computation yields: \[\mathrm{5.00\:\cancel{g}\:Cu\left(\dfrac{\cancel{mol}\:Cu}{63.55\:\cancel{g}}\right)\left(\dfrac{6.022\times10^{23}\:atoms}{\cancel{mol}}\right)=4.74\times10^{22}\:atoms\: of\: copper}\]. According to the Einstein relationship (E=mc2), this binding energy is proportional to this mass difference and it is known as the mass defect. Coming to the point why isn't weight of hydrogen atom (in a.m.u) not equal to that of a proton? In a typical mass spectrometer (Figure \(\PageIndex{5}\)), the sample is vaporized and exposed to a high-energy electron beam that causes the sample’s atoms (or molecules) to become electrically charged, typically by losing one or more electrons. Watch the recordings here on Youtube! Figure \(\PageIndex{2}\): Analysis of zirconium in a mass spectrometer produces a mass spectrum with peaks showing the different isotopes of Zr. The molar mass of an element (or compound) is the mass in grams of 1 mole of that substance, a property expressed in units of grams per mole (g/mol) (Figure \(\PageIndex{3}\)). The mass number is the approximate mass of the isotope. Atomic mass of Hydrogen is 1.0079 u.. The molar amount of a substance may be calculated by dividing its mass (g) by its molar mass (g/mol): The factor-label method supports this mathematical approach since the unit “g” cancels and the answer has units of “mol:”, \[ \mathrm{4.7\; \cancel{g} K \left ( \dfrac{mol\; K}{39.10\;\cancel{g}}\right)=0.12\;mol\; K} \nonumber\]. See also: Densest Materials of the Earth. But this âhugeâ space is occupied primarily by electrons, because the nucleus occupies only about 1721Ã10â45 m3 of space. Vitamin C is a covalent compound with the molecular formula C6H8O6. Figure \(\PageIndex{4}\): Each sample contains \(6.022 \times 10^{23}\) molecules or formula units—1.00 mol of the compound or element.  The density of Hassium results from its high atomic weight and from the significant decrease in ionic radii of the elements in the lanthanide series, known as lanthanide and actinide contraction. &=\mathrm{(18.36+0.099+1.69)\:amu}\\ Naturally occurring chlorine consists of 35Cl (mass 34.96885 amu) and 37Cl (mass 36.96590 amu), with an average mass of 35.453 amu. Atomic Number â Does it conserve in a nuclear reaction? One of these amino acids is glycine, which has the molecular formula C2H5O2N. These cations then pass through a (variable) electric or magnetic field that deflects each cation’s path to an extent that depends on both its mass and charge (similar to how the path of a large steel ball bearing rolling past a magnet is deflected to a lesser extent that that of a small steel BB). | ESSENTIALAI-STEM |
Potomac River basin reservoir projects
The Potomac River basin reservoir projects were U.S. Army Corps of Engineers programs that sought to regulate the flow of the Potomac River to control flooding, to assure a reliable water supply for Washington, D.C., and to provide recreational opportunities. Beginning in 1921 the Corps studied a variety of proposals for an ambitious program of dam construction on the Potomac and its tributaries, which proposed as many as sixteen major dam and reservoir projects. The most ambitious proposals would have created a nearly continuous chain of reservoirs from tidewater to Cumberland, Maryland. The 1938 program was focused on flood control, on the heels of a major flood in 1936. The reformulated 1963 program focused on water supply and quality, mitigating upstream pollution from sewage and coal mine waste.
While several projects came to fruition in one form or another, most were never pursued or were abandoned after significant public opposition. Savage River was the only project from the 1938 program to be built. The largest project was Seneca Dam on the Potomac just above Washington, D.C.. Seneca was abandoned in 1969 after the creation of Chesapeake and Ohio Canal National Historical Park, which preserved much of the area Seneca Dam would have flooded. The Verona and Sixes Bridge projects survived into the 1970s. Only the Bloomington project was built approximately as originally proposed, creating Jennings Randolph Reservoir.
In 1968 the landmark study The Nation's River was published by the Department of the Interior, examining strategies for the appropriate use and clean-up of the Potomac. It disputed the strategy of dilution and noted that flood control projects could not be economically justified on their own. The report documented absent or inadequate wastewater treatment, discharge from combined sanitary and stormwater sewers, and agricultural runoff. This document became the basis for Potomac study, development and management. The widespread implementation of pollution controls as a result of the Clean Water Act reduced upstream pollution. Water conservation measures meant that water use did not follow the trend expected by the Corps of Engineers, and reservoirs were not required to meet demand.
Early Potomac development
The river's potential for transportation and hydropower was explored from the beginning of the United States, with George Washington's Potomac Company one of the first consortia to try to exploit the Potomac's route through the Blue Ridge and Allegheny Mountains. The failure of the Potomac Company led to the formation of the Chesapeake and Ohio Canal in 1825 to use the river's route to build a still-water canal to Cumberland. Starting in 1799 the Potomac and Shenandoah rivers were used to power the federal arsenal at Harpers Ferry. A variety of industries grew up in the area, powered by river waters.
The earliest proposals for exploitation of hydropower on the Potomac were made in the 1880s. By the 1920s the U.S. Army Corps of Engineers reviewed the possibilities for hydroelectric power at Great Falls. Power generation capacity was planned at 105 MW and total cost was projected at $18,616,000 in 1921.
1938 Corps of Engineers program
As a result of the catastrophic flood of 1936, Congress mandated a study by the Corps of Engineers on flood control on the Potomac. The Corps report published in 1938 proposed a series of dams on the main stem of the Potomac and on several tributaries. The reservoirs were to start at tidewater at Chain Bridge.
Proposed dams on the Potomac included (unbuilt projects in italics):
* Chain Bridge: planned dam to impound the river beginning at tidewater, backing up to Bear Island. Built on a reduced scale in 1959 as Little Falls Dam, about 3 mi above tidewater. The built version is 14 ft high and functions as a weir to impound water at the Washington Aqueduct intake.
* Bear Island: proposed to create a reservoir extending from the top of the Chain Bridge pool at Bear Island to the base of Great Falls, never built
* Riverbend: proposed at the sharp bend of the Potomac immediately above Great Falls. The 119 ft dam would have created a reservoir extending nearly to Harpers Ferry. Superseded by the Seneca Dam proposal farther upriver, also never built.
* Harpers Ferry: Proposed in the vicinity of Sandy Hook and Weverton, the reservoir would have flooded the lower part of Harpers Ferry with a pool extending past Shepherdstown. It was never built.
* Rocky Marsh: Proposed for a site near Scrabble, never built. The site would have been near the Chesapeake and Ohio Canal's Dam No. 4., which survives.
* Pinesburg Proposed for a site near Pinesburg, never built. The site would have been near the historical and present-day Dam No. 5.
* Orleans: Proposed for a site near Little Orleans, never built.
The Shenandoah would have been dammed at two places:
* Millville: The existing small power generation dam at Millville would have been replaced with a much larger structure. Never built. The original 2.84 MW generating station continues to operate.
* Brocks Gap: Like the Riverbend/Seneca Dam project, the Brocks Gap project survived into the 1960s, when it was defeated by local opposition.
Other reservoirs would have included:
* Edes Fort on the Cacapon River. Never built.
* Springfield on the South Branch of the Potomac. Never built.
* Royal Glen on the South Branch, proposed again in 1963. Never built.
* Patterson Creek Never built.
* Keyser on the North Branch of the Potomac. Never built.
With the intervention of World War II none of these projects were pursued, but they were revived in 1945 as a basis for further study.
* Savage River was the only project of the 1938 program to be built as envisioned. The 184 ft rockfill dam was completed in 1952.
Potomac River Basin Report
In 1958 the Corps again was directed by Congress to study dams, this time to improve water quality in addition to flood control. Upstream sewage discharge and the effects of coal mine drainage on the Potomac headwaters caused the new focus, in which the assured flow of reservoirs would combine to dilute pollution to an acceptable level for drinking water treatment. A further interest was the creation of recreational opportunities on the new lakes. The new study was published in 1963 as the Potomac River Basin Report. The new plan involved 16 major reservoir projects and 418 small headwater reservoirs. The plan also recommended the use of more effective wastewater treatment strategies. The cost of the entire program was estimated at $498 million in 1963 dollars.
The major projects included (unbuilt projects in italics):
* Seneca above Great Falls on the Potomac. The Seneca proposal was a modification of the Riverbend project, moved about 4.5 mi upstream. The only one of the 1963 reservoirs proposed for the main stem of the Potomac, it was considered the most potentially useful project, estimated to provide for 50 years of growth in the Washington area. The project was abandoned in the face of extensive opposition in 1969. The 87 ft dam was to impound a 38700 acre, 1193000 acre feet reservoir, at a cost-benefit ratio of 1.6.
* Bloomington on the North Branch of the Potomac. The report proposed a 287 ft concrete gravity dam with a gated overflow spillway. The reservoir was to be 1300 acre, impounding 137000 acre feet. The project was completed in 1981 as Jennings Randolph Lake with a rolled earth and rockfill dam, 296 ft high. The reservoir area is 952 acre. The cost-benefit ratio for the project was projected at 1.7.
* Royal Glen on the South Branch of the Potomac was to provide flood control protection to flood-prone Petersburg, West Virginia, as well as water quality improvement and recreation. The project envisioned a 218 ft concrete gravity dam, 700 ft wide, and a 5680 ft wide earthfill dike. The dam was to have a gated overflow spillway in the concrete section. The reservoir was projected at 3480 acre, holding 338000 acre feet. The reservoir was projected to inundate fertile bottomland farms, a stocked trout fishery and whitewater canoeing waters. The reservoir would have inundated the entrance to Smoke Hole Caverns. Despite the damage to existing recreation, the reservoir was projected to increase recreational usage. Cost-benefit ratio was projected at 1.4 without considering recreation. Most of the reservoir would have been within the boundaries of Monongahela National Forest, in an area being considered by the National Park Service for inclusion in Spruce Knob–Seneca Rocks National Recreation Area. The project received extensive opposition and was not supported by the state of West Virginia.
* Chambersburg was to have been located about 2 mi west of Marion, Pennsylvania, south of Chambersburg on Conococheague Creek. The project envisioned a 79 ft high concrete gravity dam section in an earth dike, 2730 ft long. The spillway was to be a gated overflow in the concrete section, with a piped sluice section for low flows. The project would have required the construction of an interceptor sewer to divert upstream effluent around the reservoir, returning it to the Conococheague below the dam. The reservoir was to have covered 1570 acre, storing 42800 acre feet. 75 families were to be displaced, and 500 acre of farmland were to have been inundated, along with 900 acre of pasture. The displacement was justified by property enhancement to adjoining lands. The cost-benefit ratio was set at 1.9 (1.7 without recreation), for an overall cost in 1963 of $12,406,000.
* Staunton, later Verona was proposed on the Middle River of the South Fork of the Shenandoah. The project site was to have been 4.6 mi east of Verona, Virginia, about 9 mi from Staunton. The majority of the dam was to be earthfill, with a 97 ft high concrete gravity overflow section impounding a 4750 acre 143000 acre feet reservoir. Impact on farming was judged to be "relatively severe," with 64 farms, 19 part-time farms and 22 residences affected by the impoundment. 50 families would have had to be relocated. An interceptor sewer was needed to divert effluent from Staunton and Verona to a point below the dam where flow was judged to be sufficient to handle the effluent. The cost-benefit ratio was set at 2.3, at a project cost of $24,086,000 in 1963 dollars. The Verona project survived longer than most of the 1963 proposals and was authorized to proceed under the Water Resources Development Act of 1974. A 1966 referendum in Augusta County favored the project. Later the project encountered intense opposition from surrounding landowners and was opposed by Virginia Governor John N. Dalton. Although the proposal survived into the 1970s funding was blocked by Congress in 1977.
* Sixes Bridge (or Six Bridge as originally proposed) was planned for the upper Monocacy River in northern Frederick County, Maryland. The 73 ft high dam was to impound a 4650 acre reservoir of 103000 acre feet. An earthfill dam totaling 2240 ft in length was proposed with a center concrete gravity overflow section. The 12 mi reservoir was to extend about 3 mi into Pennsylvania. The project narrative describes the area as one of the most productive farming areas in the Potomac Basin, with project impact described as "rather severe." 70 families were to be displaced. The National Park Service endorsed the project for its recreational potential. Cost in 1963 dollars was $14,374,000. The cost-benefit ratio was projected at 1.3 without recreation and 1.6 including recreation. The project was de-authorized in 1981 by Public Law 97-128.
* West Branch on the West Branch of Conococheague Creek was to be a 95 ft earthfill dam on the west branch of Conococheague Creek, about 11 mi north of Mercersburg, Pennsylvania. The reservoir as planned at 2500 acre with a capacity of 77500 acre feet. The reservoir would have flooded the town of Metal, displacing 70 families. The proposed project also created difficulties for the local school district's ability to repay a bond debt. Although the proposal acknowledged the project's limited contribution to water resources, it still computed a cost ratio of 1.6 without recreation and 1.8 including recreation.
* Brocks Gap was proposed for the North Fork of the Shenandoah River just upstream from Cootes Store across Brocks Gap in Little North Mountain. The earthfill dam was to be 147 ft high with a 3870 acre reservoir of 187200 acre feet. The reservoir would flooded the village of Fulks Run. Cost in 1963 dollars was set at $16,437,000. The benefit-to-cost ratio was set at 2.6. The project encountered intense local opposition as well as from Virginia Senator Harry F. Byrd and was withdrawn in 1967.
* Winchester, was proposed as an 80 ft earthfill dam on Opequon Creek near Winchester, Virginia. It was to have a 2350 acre reservoir with a capacity of 77000 acre feet.15 farms and 35 families would have been displaced. An interceptor sewer was required to divert sewage from Winchester around the reservoir. Cost was estimated at $10,979,000 in 1963 dollars, with a cost-benefit ration set at 1.4 without recreation, and 1.7 with recreation.
* Licking Creek was proposed at the Maryland-Pennsylvania border on Licking Creek, about 19 mi west-northwest of Hagerstown, Maryland. The earthfill dam was to be 148 ft high. The reservoir was to cover 2200 acre with a capacity of 120500 acre feet. Normal-flow water releases were to be regulated by an intake tower that would allow selection of temperature and oxygenation depending on the level selected. 35 families were expected to be displaced. The cost-benefit ratio was estimated at 1.2 without recreation and 1.8 with recreation, at a 1963 cost of $11,301,000.
* Mount Storm on the Stony River. The project was to be built just west of Mount Storm, West Virginia, below Mount Storm Lake, completed in 1965, which was privately constructed to provide cooling water for the Mount Storm Power Station. A 154 ft earthfill dam was proposed with an overflow spillway and outlet works for future power development in the east abutment. The project would have impounded 43500 acre feet in a 770 acre pool. Although the project is described in the 1963 report as essential to maintain the quality of the Stony River, the report makes no mention of the much larger Mount Storm Lake, under construction immediately upstream. No residents or businesses would have been displaced, though coal mining in the immediate area of the reservoir would have been curtailed.1963 project cost was estimated at $9,762,000. Cost-benefit ratio was projected to be 1.8.
* Town Creek near Oldtown, Maryland on Town Creek. A 127 ft earthfill dam was proposed to impound a 2190 acre reservoir with a capacity of 96800 acre feet at a cost of $9,762,000, the same cost as the Mount Storm project. An outlet/diversion tunnel was to run under the dam, fed by an intake tower. An overflow spillway would have been built in a dike to the west of the dam, discharging across a meander. The project was expected to inundate farmland and woodland. 70 families, a church, a store and a garage would have been displaced. The cost-benefit ration was termed "marginal" at 1.07.
* North Mountain was proposed for Back Creek (Potomac River) in West Virginia near Glengary. The 11 mi reservoir was projected to extend 2 mi into Virginia, covering 5370 acre with 195000 acre feet of storage. The large lake was expected to provide significant recreation opportunities. The dam was proposed as an earthfill structure, 99 ft high, with a broad overflow spillway in the east abutment. The outlet was planned as a tower that could release water from varying depths to control temperature and oxygen content. 55 families, two schools and two cemeteries were to be relocated, with 4300 acre of farmland inundated. The cost-benefit ratio was projected to be 1.6.
* Savage II was planned on the Savage River above the earlier Savage River Reservoir. The 213 ft dam was to impound 50000 acre feet in a 580 acre lake. Ten families would have been displaced and bout 300 acre of farmland would have been inundated. Cost-benefit ration was calculated at 1.7, largely on the basis of the potential project's prospects for "excellent fishing." The earthfill dam was to have an overflow spillway at the west abutment, with an adjoining outlet tunnel fed by an intake tower.
* Back Creek on Back Creek in Pennsylvania was planned to improve water quality on Conococheague Creek. A 68 ft concrete gravity dam was proposed, with a 1990 acre reservoir retaining 46900 acre feet. Cost was estimated at $7,329,000 in 1963 dollars, with a cost-benefit ratio of 2.2, or 1.7 if recreation was not considered. The project was opposed by local interests. 40 families would have been displaced and 1500 acre of farmland would have been affected.
* Tonoloway Creek was planned for Tonoloway Creek near Hancock, Maryland. The earthfill dam was to be 127 ft high with a reservoir extending 7 mi into Pennsylvania. The reservoir was to extend over 2260 acre with 88000 acre feet of storage. 20 families were expected to be displaced. 1963 costs were expected to be $13,816,000 and the cost-benefit ratio was calculated to be 1.3.
Of all of these projects, only Bloomington was constructed. | WIKI |
Word + Quiz: totem
Word of the day This word has appeared in 54 articles on NYTimes.com in the past year. 1. emblem consisting of an object such as an animal or plant; serves as the symbol of a family or clan (especially among American Indians) 2. something that stands as an emblem or an honored symbol 3. a clan or family identified by their kinship to a common totemic object _________ The word totem has appeared in 54 articles on NYTimes.com in the past year, including on Jan. 26 in “Japan’s Skateboarders Roll, Warily, Out of the Shadows” by John Branch: Over the decades, like so many other anti-authority movements, skateboarding leaked into the mainstream. Skateboards — a mode of transportation, an instrument of art, a totem of defiance — now glide across American sidewalks, plazas and streets. These days, skateboarding style, fashion and culture have morphed into beacons for masses looking for calculated rebelliousness. _________ The Word of the Day and the quiz question have been provided by Vocabulary.com. Learn more and see usage examples across a range of subjects in the Vocabulary.com Dictionary. See every Word of the Day in this column. | NEWS-MULTISOURCE |
Page:Siam and Laos, as seen by our American missionaries (1884).pdf/54
terior. Chinese merchants here waylay the elephant-trains from Battabong and Laos, exchanging salt and Chinese or European wares for horns, hides, silk, oil and cardamoms. Mines near Kabin are said to furnish the most ductile gold in the world.
Leaving our boats, elephants and a buffalo-cart are engaged. We step from the veranda of the hut perched on poles to the elephant's head and into the howdah. The driver sits astride his neck, guiding when needful with an iron-pointed staff. A military road from Kabin leads to the borders of Cochin-China. Sesupon, the first Cambodian town, on the frontier of provinces wrested by Siam from Cambodia a century ago, is first reached. Some of the people, including the Siamese governor and officials, speak both languages.
It is possibly harvest-time; in the fields the reapers are among their crops. Some of the plains are covered with tall grass ten feet high. There are perhaps burnt patches or a spark has just started a fire, and the flames, swept on by the wind, are roaring, crackling and sending up dense columns of smoke in their wake. As we pass under the overarching branches of trees in the forest our elephant keeps an eye the while ahead, and when some lower limb would strike the howdah he halts, raises his trunk and breaks it off. We toil up and over the watershed and | WIKI |
Rudolph LEE, Jr., Petitioner, v. Andrew J. WINSTON, et al., Respondents.
Civ. A. No. 82-0672-R.
United States District Court, E.D. Virginia, Richmond Division.
Oct. 15, 1982.
Supplemental Opinion Nov. 12, 1982.
Donald R. Curry, Stacy F. Garrett, III, Richmond, Va., for respondents.
Joseph R. Winston, John W. Moore, III, Richmond, Va., for petitioner.
MEMORANDUM
MERHIGE, District Judge.
This matter came on for hearing on the instant Petition for Writ of Habeas Corpus and petitioner’s application for a temporary restraining order, preliminary injunction, and permanent injunction on October 14, 1982. For the reasons set forth below, the application will be denied and the petition dismissed. This Memorandum embodies the Court’s findings of fact and conclusions of law.
Since petitioner is in custody in Richmond City Jail pending trial, the Court does not have jurisdiction pursuant to 28 U.S.C. § 2254, as petitioner asserts; that section provides jurisdiction only if the petitioner is in custody pursuant to a judgment of a state court. However, because the petitioner contends that he is in custody in violation of the Constitution, the Court does have jurisdiction over this claim pursuant to 28 U.S.C. § 2241(c)(3). The Court has jurisdiction over petitioner’s claim under 42 U.S.C. § 1983 pursuant to 28 U.S.C. § 1343(3).
I. Factual Background
The facts as they appear from petitioner’s pleadings and the transcript of the proceedings in the Virginia trial court may be briefly summarized as follows:
Petitioner has been charged with malicious wounding, attempted robbery, and use of a firearm in the alleged commission of these two felonies. On July 21, 1982, the Commonwealth’s Attorney for the City of Richmond filed a Motion to Compel Evidence, seeking to recover a bullet lodged in petitioner’s left chest. The Circuit Court conducted an evidentiary hearing on the motion beginning on July 22, 1982 and continuing on August 2, 11, and 25, 1982. At the conclusion of such hearing, the court entered its findings from the bench, concluding essentially that petitioner had been given a full opportunity to present his claim, the Commonwealth had demonstrated need for the bullet as evidence and could not obtain the same evidence from another source, and removal of the bullet would involve only a minor surgical procedure with virtually no threat of permanent injury to petitioner. (Tr. 109-111). Accordingly, the Circuit Court granted the Commonwealth’s Motion to Compel Evidence, but stayed enforcement of the order to allow petitioner to undertake appropriate appellate review of the matter. Subsequently, on October 13, 1982, the Supreme Court of Virginia denied petitioner’s Petition for Writ of Habeas Corpus and/or Writ of Prohibition. Thereafter, petitioner brought the instant Petition for Writ of Habeas Corpus.
II. Issues Presented
Petitioner asserts that the Circuit Court’s order sustaining the Motion to Compel Evidence deprives him of rights, privileges, and immunities secured by the fourth and 14th amendments to the U.S. Constitution. For his habeas corpus claim, petitioner alleges that the order will require additional custody in that he will have to be in custody and restrained by the respondent Sheriff or his agents for the bullet to be surgically removed in a hospital. For his § 1983 claim, petitioner alleges that the conduct complained of was and will be engaged in under color of state law.
As noted supra, the Court held a hearing on October 14, 1982 after notice to respondents. Respondents were present and took part in the hearing; the Court accepted into evidence the transcript and other documentary evidence of the proceedings in the Circuit Court and the Virginia Supreme Court. Accordingly, the petitioner need not satisfy the conditions of Rule 65(b), Fed.R. Civ.P. for an ex parte application for a temporary restraining order, see Baines v. City of Danville, 337 F.2d 579 (4th Cir.1964), affirmed on rehearing 357 F.2d 756 (4th Cir.) aff’d mem., 384 U.S. 890, 86 S.Ct. 1915, 16 L.Ed.2d 996 (1966) (per curiam). When such a hearing is conducted, the procedure for considering an application for a temporary restraining order is essentially the same as that on an application for a preliminary injunction, and the distinction between the two forms disappears. See Dilworth v. Riner, 343 F.2d 226 (5th Cir.1965); 11 C. Wright & A. Miller, Federal Practice and Procedure § 2951, at 449-500 & nn. 81-83 (1973). Were the Court to grant a preliminary injunction to petitioner, respondents might well be deprived of due process, given the brief notice they received. See Bailey v. Transportation-Communication Employees Union, 45 F.R.D. 444 (N.D.Miss.1968). However, even applying the less stringent standard for a preliminary injunction, the Court concludes that petitioner is not entitled to the relief sought.
The standard for a preliminary injunction in the Fourth Circuit is the balance-of-hardship test, whereby the district court’s decision must be
based upon a flexible interplay of the four factors to be considered: (1) the likelihood of irreparable harm to the plaintiff without the temporary injunction; (2) the likelihood of harm to the defendant with the injunction; (3) plaintiff’s likelihood of success on the merits; and (4) the public interest.
Telvest, Inc. v. Bradshaw, 618 F.2d 1029, 1032 (4th Cir.1980); see Maryland Undercoating Co. v. Payne, 603 F.2d 477 (4th Cir.1979); Blackwelder Furniture Co. v. Seilig Manufacturing Co., 550 F.2d 189 (4th Cir.1977).
“A future injury of uncertain date and incalculable magnitude is irreparable harm.” Phillips v. Crown Central Petroleum Corp., 602 F.2d 616, 630 (4th Cir.1979), cert. denied, 444 U.S. 1074, 100 S.Ct. 1021, 62 L.Ed.2d 756 (1980). In the instant case, petitioner faces a future injury of relatively certain date. The magnitude of the physical injury is also fairly certain — it is expected to be slight — as the Court’s discussion infra reveals. The magnitude of the injury to petitioner’s dignity from the proposed intrusion into his privacy is not, however, so certain. In sum, the Court concludes that petitioner faces a nominal risk of irreparable physical harm, see infra, and a not insubstantial risk of irreparable harm to his dignity.
The anticipated harm to the respondents is that they will be deprived of potential evidence at the time of trial on petitioner’s criminal charges. The likelihood of such harm is conditioned on several factors now uncertain to varying degrees: whether the object in petitioner’s shoulder is a bullet; if so, whether the bullet will be identifiable when removed; if so, whether the evidence will be useful at trial. It is also uncertain whether the delay occasioned by an injunction would cause an otherwise identifiable bullet to deteriorate to the point of being unidentifiable due to the corrosive effect of body fluids. (Tr. 52-57). In sum, the Court finds the likelihood of harm to the respondents resulting from an injunction to be uncertain, but not negligible.
The Court will reserve discussion of petitioner’s likelihood of success on the merits and consider the element of the public interest. At the risk of stating the axiomatic, the public interest is that justice be done— particularly in petitioner’s criminal trial. Recovering and identifying the bullet could serve to exonerate the petitioner. If the bullet amounts to useful evidence for either side, it serves the public interest in justice, since the finder of fact presumably can better reach a just result if given more useful information. On the other hand, nearly 200 years of American jurisprudence under the Bill of Rights support the principle that protecting the rights guaranteed therein amounts to justice. In sum, the Court cannot conclude that the public interest in justice would be better served by either the granting or the denial of the injunction.
Similarly, consideration of the likelihood of irreparable harm to the petitioner without the injunction and the likelihood of harm to the respondents with the injunction does not yield a clear indication of the balance of the hardships. Accordingly, the “flexible interplay” of the factors depends heavily on plaintiff’s likelihood of success on the merits.
III. Stone v. Powell
Before reaching the merits of petitioner’s claim that the proposed surgery will violate his fourth amendment rights, the Court must address respondents’ contention that Stone v. Powell, 428 U.S. 465, 96 S.Ct. 3037, 49 L.Ed.2d 1067 (1976), precludes the Court from reaching the merits. That case, of course, limits the substantive scope of federal habeas corpus review, holding that when a state prisoner asserts that the state trial court failed to exclude evidence that the prisoner alleges came from an unconstitutional search or seizure, the federal court is only to inquire into whether the state had provided the prisoner an opportunity for a full and fair litigation of his or her claim. Id. at 481-82, 96 S.Ct. at 3046.
Both the holding and the rationale of Stone v. Powell are very closely tied to the practice and principles surrounding the exclusionary rule. On both occasions when the Court explicitly framed the question presented, it did so in terms of the introduction or exclusion of allegedly tainted evidence at trial. See id. at 469, 489, 96 S.Ct. at 3040, 3050. The holding was expressed in the same terms. See id. at 481, 96 S.Ct. at 3046 (“[W]e conclude, in light of the nature and purpose of the Fourth Amendment exclusionary rule ... ”); id. at 481-82, 494-95, 96 S.Ct. at 3046, 3052.
In Part III of the opinion, id. at 482-89, 96 S.Ct. at 3046 — 50, the Court traced the history and rationale of the exclusionary rule. “The primary justification for the exclusionary rule then is the deterrence of police conduct that violates Fourth Amendment rights.” Id. at 486, 96 S.Ct. at 3048. The Court concluded that this purpose would not be substantially furthered by federal habeas corpus review of state court convictions, since the connection between the police misconduct and the eventual result would be so attenuated. Id. at 493, 96 S.Ct. at 3051.
By contrast, the instant petition affords the Court the opportunity to offer guidance to law enforcement officials before they undertake the proposed search. Rather than deciding ex post whether evidence should have been excluded as illegally obtained, the Court can decide ex ante whether obtaining the evidence would be illegal. To borrow the terminology of punishment theory, the exclusionary rule promises at best general deterrence: the theory is that law enforcement officials will be deterred from making illegal searches in other cases because of the result that followed in a particular case. By contrast, in the instant case, the Court can, if necessary, provide special deterrence, as well as general deterrence: it can deter the very search in question, as well as guide future searches. Accordingly, the Court will proceed to the merits of petitioner’s fourth amendment claim; respondents’ assertion is rejected.
IV. Fourth Amendment Analysis — Proper Standard
The petitioner rests his claim of deprivation of fourth amendment rights on Sehmerber v. California, 384 U.S. 757, 86 S.Ct. 1826, 16 L.Ed.2d 908 (1966). In that case, the Supreme Court approved the taking of blood from the defendant without his consent so that his blood alcohol content could be determined. However, the Court stressed that they “reach this judgment only on the facts of the present record. The integrity of an individual’s person is a cherished value of our society. That we hold today that the Constitution does not forbid the State minor intrusions into an individual’s body under stringently limited conditions in no way indicates that it permits more substantial intrusions, or intrusions under other conditions.” Id. at 772, 86 S.Ct. at 1836 (emphasis added). Thus, this Court must determine whether the proposed intrusion would be minor and the proper limiting conditions met.
The Court notes at the outset that the instant case presents a most troubling fact situation. The proposed intrusion takes the form of an incision of about 1.5 centimeters in length to remove an object approximately 0.5 centimeters beneath the skin. (Tr. 64-65). In sheer physical terms, this procedure obviously involves a greater intrusion than that required for the taking of a blood sample in Sehmerber. As explained infra, the Court concludes that the particular facts before the Court do not constitute an impermissibly great intrusion under the terms of Sehmerber. However, the Court stresses that the instant situation appears to represent essentially the limit in the degree and kind of intrusion constitutionally permissible.
Before proceeding to the Sehmerber analysis, the Court notes that in United States v. Crowder, 543 F.2d 312 (D.C.Cir.1976) (en banc), cert. denied, 429 U.S. 1062, 97 S.Ct. 788, 50 L.Ed.2d 779 (1977), apparently the only federal case applying Sehmerber analysis to a surgical procedure, the court approved a removal of a bullet under conditions very similar to those in the instant case. Petitioner contends that the Crowder court did not correctly apply Sehmerber; he derives from Sehmerber a four-part test to determine whether an intrusion is unreasonable. The test petitioner proposes represents essentially the most generous (to petitioner) possible reasonable reading of what Sehmerber requires. In the interest of giving full consideration to petitioner’s claim, the Court will assume, without deciding, that petitioner correctly characterizes the significance of Sehmerber and that Crowder is not controlling.
V. Fourth Amendment Analysis-Applying Sehmerber
As petitioner reads Sehmerber, 384 U.S. at 770-72, 86 S.Ct. at 1835-36, a court that is deciding whether an intrusion is unreasonable is to examine whether: (1) there was a need for the evidence; (2) there was a clear indication the evidence would be found; (3) the procedure was a minor one with “virtually no risk, trauma, or pain;” and (4) the procedure was reasonably carried out in a hospital environment by medical personnel.
To apply the test, the Court must examine the facts on the record. The medical testimony in the Circuit Court indicated that the proposed surgery would be performed under local anesthetic. The doctor who testified characterized the procedure as “minor surgery.” As noted supra, the incision would be 1.5 cm in length and deep enough to remove an object 0.5 cm beneath the surface of the skin. The object is now far from the nerves and arteries, so the chances of harming such structures by the surgery are “almost zero,” according to the doctor. He testified that the chance of harming the patient by the procedure was perhaps one in 10,000 or one in 100,000; however, the danger in leaving the bullet, “if it doesn’t produce any pain or other problem,” is probably zero. Thus, the doctor concluded that it was more dangerous to the patient to remove the bullet than to leave it. (Tr. 15-25, 63-71).
Petitioner challenges the first element of the test on the ground that the Commonwealth claims to have an eyewitness (the victim) who will positively identify the petitioner. Thus, petitioner contends that the specific evidence is not needed. Respondents assert that the evidence is necessary to rebut petitioner’s claim that the bullet came from a different gun. The Court concludes that the respondents have established a need for the specific evidence. Petitioner does not suggest that there must be a compelling need, and the Court cannot say that there is not any need for it, that it would be merely cumulative.
- Petitioner also challenges the “need” element more generally, asserting that the proposed procedure is much more rare than the blood sampling approved as a routine procedure in Schmerber, and that blood alcohol determinations are more necessary to prosecuting drunk driving violations than ballistics determinations are to other types of prosecutions. There is no evidence before the Court to support such assertions. The Circuit Court specifically found the “need” element satisfied, both specifically and generally. (Tr. 112-13). It seems at least equally plausible as not that when the procedure is as relatively simple as the one proposed, the routine practice is to undergo the surgery, even if that is slightly more risky than leaving an object embedded under the skin. Similarly, there is no apparent reason to doubt the general usefulness of ballistics information, whether or not the bullet involved was ever lodged in a human body.
As to the second element, there is apparently no doubt that a foreign object is lodged in petitioner’s shoulder, and there is substantial evidence that the object is probably a bullet. The only real question is whether the bullet will amount to evidence. Given the possibility that the bullet will be unidentifiable, it is not certain that evidence will be found. But the Court is satisfied that there is a “clear indication” that evidence will be found, beyond a “mere chance,” Schmerber, 384 U.S. at 770, 86 S.Ct. at 1835. As the Circuit Court noted (Tr. 112), petitioner apparently does not seriously challenge either this factor or the fourth, that the procedure would be performed in a hospital.
The element petitioner challenges most strongly, and the .one of greatest concern to the Court, is the third: whether the procedure involves “virtually no risk, trauma, or pain,” Schmerber, 384 U.S. at 771, 86 S.Ct. at 1836. The Circuit Court also explicitly found this element satisfied (Tr. 110, 112), and this Court concludes likewise. As noted supra, the doctor did testify that the risk was greater than the risk involved in leaving the bullet, though he also qualified his assessment of the latter risk by saying “if [the bullet] doesn’t produce any pain or other problem.” But he estimated the risk of the procedure as perhaps one in 10,000 or one in 100,000. “Virtually no risk” does not mean “absolutely no risk.” While the Court declines to attempt to establish any specific guidelines as to what quantity of risk constitutes “virtually” none, it does find that the uncontroverted evidence in the instant case establishes that the proposed procedure can be carried out with virtually no risk to the petitioner.
The Court concludes that the precise facts before it do not establish an unreasonable intrusion into petitioner’s privacy under the terms of Schmerber. Accordingly, the Court concludes that petitioner is not likely to prevail on the merits of his claim that his fourth amendment rights would be violated by the proposed surgery. This conclusion applies to both the habeas corpus claim and the § 1983 claim.
VI. Setting of Bond
At the hearing of August 2, 1982, the Commonwealth’s Attorney moved to increase petitioner’s bond from $10,000 to $50,000. The Circuit Court raised the bond to $30,000 and declined to reverse itself at the hearing of August 25, 1982. Petitioner asserts that in raising the bond, the Circuit Court considered only the possibility that petitioner would destroy the evidence, which petitioner says is not a permissible basis for setting bond under Va.Code § 19.-2-121.
The Petition and accompanying Memorandum do not make clear whether petitioner raises this claim as a means for establishing his custody for purposes of his habeas corpus claim or as a separate deprivation of constitutional rights. If his purpose is the former, the Court need not consider the contention, as the Court has accepted for purposes of the habeas corpus claim petitioner’s assertion that he would be in the custody of the Sheriff or his agents at the time of the surgery.
If petitioner’s purpose is the latter, his claim is unsupported by the record. At the August 25 hearing, the Circuit Court clearly indicated that it was taking into account the factors related to insuring the presence of the accused, as Va.Code § 19.2-121 directs. The Circuit Court also gave petitioner full opportunity to put on evidence as to such factors. (Tr. 104-06,113-22). Whether or not the Circuit Court erred in raising the bond on August 2, it has now given full consideration to the appropriate factors for setting bond. Petitioner has not demonstrated that his current confinement violates the Constitution.
VIL . Conclusion
The Court concludes that petitioner has not justified the imposition of a preliminary injunction in light of the four factors enunciated in Telvest, Inc. v. Bradshaw, supra. In the instant case, the critical factor is the likelihood of prevailing on the merits. The Court is satisfied that the likelihood that petitioner will so prevail is too slight to cause the interaction of the four factors to be resolved in his favor.
An appropriate order will enter.
SUPPLEMENTAL OPINION
By order of October 15, 1982, the Court dismissed petitioner’s petition for a writ of habeas corpus and denied his application for an injunction that would have prohibited the respondents from causing the surgical removal of an object, believed to be a bullet, from petitioner’s chest. The factual background of this matter is set out in the Court’s memorandum of October 15.
On October 21, 1982, the petitioner received a hearing in the Circuit Court of the City of Richmond, Virginia, Division I (“state court”) on his claim that circumstances had changed such that the state court should rescind its order allowing the surgical procedure. The state court denied petitioner’s motion to revoke or rescind the order.
Petitioner immediately sought review in the Supreme Court of Virginia and, on the same day, filed a “Motion for a New Trial” in this Court. The matter in this Court came on for hearing before the Honorable D. Dortch Warriner on October 21 and 22, 1982. Upon the advice of counsel that a transcript of the state court proceedings was not then available, and upon the assurances of counsel for respondents that the surgical procedure would not be implemented pending the production of such transcript, the Court declined to issue the requested restraining order, concluding that the agreement of the parties obviated the need therefor.
During the time in which the transcript was being prepared, the petitioner filed a motion to redesignate his “Motion for a New Trial” as a “Motion to Reopen the Petition and to Alter or Amend the Judgment.” The Court subsequently ordered the petition reinstated on the docket. As stated in the Court’s memorandum of October 15, the Court has jurisdiction over this matter pursuant to 28 U.S.C. §§ 1343(3), 2241(c)(3).
After the parties submitted a copy of the state court transcript, the matter again came on for hearing in this Court on November 1. By that time, the Supreme Court of Virginia had denied petitioner’s motion for reconsideration. At the November 1 hearing, this Court found that the state court transcript from the October 21 hearing was devoid of factual findings.
The Court then entered a temporary restraining order against the surgical procedure in order to afford the parties an opportunity to submit such additional evidence as either side deemed appropriate. On November 10, evidence, encompassing medical records, x-ray prints, and testimony of a surgeon, was taken. At that hearing, all parties agreed that the matter was submitted on the merits for purposes of considering the application for a permanent injunction. This memorandum embodies the Court’s findings of fact and conclusions of law supplemental to or, where appropriate, in lieu of those set forth in its October 15 memorandum.
I. Motion to Dismiss Parties
Respondents the Attorney General of Virginia, Gerald L. Baliles, and the Circuit Court of the City of Richmond, Virginia, Division I, have moved the Court for an order dismissing them as parties to this action. In support of their motion, these respondents state, “This Court has ruled that the above-styled ease is being considered solely as a petition for a writ of habeas corpus”; therefore, inasmuch as these respondents are not “custodians” of petitioner against whom the writ will issue, they contend they are not proper respondents to a petition for a writ of habeas corpus. The fundamental deficiency in respondents’ argument in this regard is the fact that petitioner’s alleged cause of action under 42 U.S.C. § 1983 remains pending before this Court, and respondents are proper parties defendant to that claim. Judge Warriner, in noting the petitioner might be barred by res judicata in his § 1983 action from relitigating certain issues, did not dismiss the § 1983 claim; rather, Judge Warriner indicated he was viewing the matter which came on for hearing before him as a petition for a writ of habeas corpus. Judge Warriner stated he was pursuing this approach because the equitable powers of the Court upon a writ of habeas corpus were sufficiently broad to afford petitioner the immediate relief requested, if justified. There was, consequently, no cause to consider the possible res judicata effects of the state court findings at the time the issue was raised. Accordingly, respondents’ motion will be denied.
II. Abstention
Respondents urge this Court to abstain “from intervening in a pending state criminal prosecution.” In support of this suggestion, respondents rely on the decision of the United States Supreme Court in Younger v. Harris, 401 U.S. 37, 91 S.Ct. 746, 27 L.Ed.2d 669 (1971), and contend the instant matter does not fall within an exception to the Younger doctrine.
As an initial matter, the Court notes the anti-injunction statute, 28 U.S.C. § 2283, expressly provides, in part, “[a] court of the United States may not grant an injunction to stay proceedings in a state court except as expressly authorized by Act of Congress.” In Younger, the Supreme Court reserved the question whether actions brought under 42 U.S.C. § 1983 fall within the “expressly authorized” exception to the anti-injunction statute. 401 U.S. at 54, 91 S.Ct. at 755. In the subsequent Term of the Court, however, the Court squarely addressed the issue and concluded § 1983 presents an express exception to the proscription of § 2283. See Mitchum v. Foster, 407 U.S. 225, 242-43, 92 S.Ct. 2151, 2162, 32 L.Ed.2d 705 (1972). Accordingly, the anti-injunction statute does not operate in this § 1983 action to bar this Court from restraining the respondents’ alleged prospective violation of petitioner’s constitutional rights in the state court criminal proceeding. Similarly, it has long been established that a federal court may stay a state court criminal proceeding for any matter involved in a federal habeas corpus proceeding, see, e.g., Ex parte Royall, 117 U.S. 241, 248-49, 6 S.Ct. 734, 738, 29 L.Ed. 868 (1886); 28 U.S.C. § 2251; therefore, § 2283 provides no impediment to this Court’s authority to grant the relief requested even insofar as this matter proceeds as a petition for a writ of habeas corpus under 28 U.S.C. § 2241.
The anti-injunction statute being inapplicable to bar consideration of the instant matter, the question becomes whether the principles articulated in Younger counsel against this Court’s passing on the issues raised. Younger dealt with the decision of a three-judge court to restrain a state prosecution under what the three-judge court found to be an impermissibly vague and overbroad state statute. In the cause sub judice, petitioner has not requested that this Court restrain his prosecution in the state court. Nor would the relief sought, if granted, prevent the state from going forward with that criminal proceeding. The precise question addressed in Younger is, therefore, not presented on the facts of this case. To the extent Younger may be read as speaking to the broader issue of federal court intervention of any kind in pending state court criminal proceedings, however, and the Younger opinion may fairly be so read, the Court has examined the Younger rationale in determining whether abstention is required in this case.
Younger represents a reaffirmation of the national policy forbidding federal courts to stay or enjoin pending state court proceedings except under special circumstances. 401 U.S. at 41, 91 S.Ct. at 749. The “special circumstances” alluded to must take the form of threatened great and immediate irreparable injury. Id. at 46, 91 S.Ct. at 751. The Court pointed out, however, the cost, anxiety, and inconvenience of having to defend against a single criminal prosecution cannot, by themselves, form the basis for this type of great and immediate irreparable injury. “Instead, the threat to the plaintiff’s federally protected rights must be one that cannot be eliminated by his defense against a single criminal prosecution.” Id.
Having reviewed the limited factual record before the Court, it is apparent the special circumstances which render Younger abstention inappropriate are present in the case at bar. As the threatened harm involves involuntary surgery on petitioner’s person, it may easily be seen the prospective harm is “great.” Similarly, the Commonwealth having unswervingly indicated its intention to proceed with such surgery, the immediacy of the threatened injury is apparent. The state court considered the matter and entered an order empowering the Commonwealth to remove the bullet from plaintiff involuntarily. At the November 1 hearing in this Court, the Commonwealth felt it could not agree to refrain from implementing the surgical procedure in the period before this Court’s evidentiary hearing, thus necessitating the Court’s temporary restraining order. It is thus beyond dispute the threatened harm is impending and immediate.
Equally clear is that the threat to petitioner’s fourth amendment right to be secure in his person from an unreasonable search and seizure can in no way be eliminated by his defense of the charges in the state court action. Indeed, it is apparent the threatened harm will ripen into actual injury should this Court fail to intervene. The factual distinctions between the Younger case and the instant matter perhaps best illustrate why petitioner’s defense of the criminal charges will be unavailing to eliminate the threatened harm.
In Younger, after state criminal proceedings had been commenced against them, the appellees had been granted declaratory and injunctive relief by a three-judge federal court which declared a state statute facially void for vagueness and overbreadth and restrained the State of California from prosecuting the appellees thereunder. The Supreme Court reversed, finding the threatened injury to appellee Harris to be only “ ‘that incidental to every criminal proceeding brought lawfully and in good faith,’ ” and the same to be insufficient to justify federal intrusion into a pending state court criminal proceeding. 401 U.S. at 49, 91 S.Ct. at 753 (quoting Douglas v. City of Jeannette, 319 U.S. 157, 164, 63 5. Ct. 877, 881, 87 L.Ed. 1324 (1943)). Underlying the Court’s conclusion in this regard was the availability of the state forum for the raising of Harris’s constitutional claims. Notions of comity, that is, a proper respect for state functions, were said by the Court to fare best if the states and their institutions were left free to perform their separate functions in their separate ways. 401 U.S. at 44, 91 S.Ct. at 750. In Younger, appellee Harris was free to raise the facial invalidity of the statute in question as a defense to the state criminal charges. If unsuccessful in the trial court, Harris could raise the issue on direct appeal in the state system and possibly in the United States Supreme Court. If denied relief on direct appeal, Harris had the option of asserting his constitutional claims in a collateral attack on his conviction. Thus, the threatened harm, namely, conviction under an assertedly unconstitutional statute, could be eliminated by Harris’s defense of the criminal charges in the state courts, and thus the special circumstances warranting or justifying federal intervention were not present.
In contrast to the Younger case, the instant petitioner’s defense of the state criminal charges cannot eliminate the threat of the asserted violation of his fourth amendment rights. As the Commonwealth has indicated its intention to proceed with the surgery, and the courts of Virginia have placed their imprimatur on the procedure, this Court’s failure to act will undeniably result in the involuntary removal of the bullet from petitioner’s body. Accordingly, the prospective constitutional abridgment complained of here will take place and be complete and irreversible prior to the criminal trial. Moreover, unlike the situation in Younger, petitioner here will have no opportunity to vindicate the claimed abridgment by way of his defense of the criminal charges at trial. Petitioner is not here attempting to suppress evidence illegally obtained; rather, he seeks an injunction preventing an allegedly impermissible physical intrusion by the Commonwealth into his body. Were the bullet removed from his body but later suppressed as evidence by the trial court, it nevertheless could not be said that the harm to petitioner had been eliminated by his defense to a single criminal prosecution, as required by Younger, for the threatened harm will have ripened into actuality at the moment petitioner is involuntarily subjected to the surgical procedure.
In summary then, because the threatened harm to petitioner is irreparable, great, and immediate, and cannot be eliminated by his defense against the criminal charges in the state court, the Court concludes abstention under the Younger doctrine is neither required nor appropriate.
III. Dismissal of Claim
Insofar as this matter proceeds as a petition for a writ of habeas corpus, defendants contend this Court lacks subject matter jurisdiction because plaintiff is not cur-rently “in custody” as that term is used in 28 U.S.C. § 2241. Although the Court acknowledges the instant matter presents a somewhat novel view of the custody requirement, the Court concludes the broad interpretation given that term by the United States Supreme Court warrants the conclusion that this petitioner is “in custody.” See Hensley v. Municipal Court, San Jose-Milpitas Judicial District, 411 U.S. 345, 93 S.Ct. 1571, 36 L.Ed.2d 294 (1973). In Hensley, the Court concluded a petitioner who was free on his own recognizance pending execution of sentence was nonetheless “in custody” within the meaning of 28 U.S.C. § 2254(a). Of particular importance to the case at bar, the Court stated:
Plainly, we would badly serve the purposes and the history of the writ to hold that under these circumstances the petitioner’s failure to spend even 10 minutes in jail is enough to deprive the District Court of power to hear his constitutional claim.
411 U.S. at 352-53, 93 S.Ct. at 1575. Similarly, it would be absurd for this Court to require petitioner to be strapped momentarily to the surgeon’s table before considering his petition. To the extent the “custody” in question may be viewed as future custody, the matter is addressed by Rule 2(b) of the Rules Governing § 2254 Cases and the notes accompanying it. Specifically, the Advisory Committee stated in part in a note accompanying Rule 2:
(5) The applicant is in custody, although not physically restrained, and is attacking a state action which will result in his future custody rather than the government action out of which his present custody arises.
It cannot be disputed that the custody complained of here will be carried out under the auspices of the Commonwealth. In other words, it is clearly the action of the state which will subject petitioner to custody in the operating room. Accordingly, whether the restraint on petitioner is viewed as present custody under Hensley or future custody of the type referred to in Rule 2(b), the Court concludes petitioner is “in custody” for purposes of 28 U.S.C. § 2241. Further, petitioner having exhausted all state remedies available to him, the Court concludes it has subject matter jurisdiction over the instant petition.
While the Court is satisfied that its conclusion as to the custody question is correct, the Court recognizes that the question is a close one. However, the Court is also satisfied that the instant action can proceed in precisely the same manner in its form as a civil rights action pursuant to 42 U.S.C. § 1983. The only impediment respondents have suggested to treating this matter as a § 1983 action is the principle of collateral estoppel set forth in Allen v. McCurry, 449 U.S. 90, 101 S.Ct. 411, 66 L.Ed.2d 308 (1980).
Even supposing the state court made adequate findings and conclusions for purposes of collateral estoppel, Allen v. McCurry does not indicate that this Court should give collateral estoppel effect to the state court determinations here. “[0]ne general limitation the Court has repeatedly recognized is that the concept of collateral estoppel cannot apply when the party against whom the earlier decision is asserted did not have a ‘full and fair opportunity’ to litigate that issue in the earlier case.” Id. at 95, 101 S.Ct. at 415. The Court has already determined that petitioner did not receive a full and fair opportunity to litigate this matter in the state court, see note 2 supra; accordingly, no collateral estoppel effect attaches to such determinations as the state court made.
Thus, the Court concludes that respondents have not raised grounds justifying dismissal of this matter either as a habeas corpus action or as a § 1983 claim.
IV. Change of Circumstance
The evidence before the Court indicates petitioner’s physical condition probably has not changed since October 15, 1982, i.e., the bullet apparently has not moved. The changed circumstance petitioner relies on is that more is now known about his physical condition than before, i.e., the bullet is now known to be in a different location from that previously supposed. In preparation for surgery, the hospital staff took some 10 or 12 x-rays of petitioner’s chest. The uncontroverted evidence is that those x-rays indicate the bullet is lodged at least 2.5 to 3 centimeters below the surface of the skin. The previous estimate that the bullet was located about 0.5 centimeters below the skin was based only on clinical examination in the form of palpating, or manually manipulating, a hard mass assumed to be the bullet; the surgeon who testified at the state court hearing on October 21 indicated he now believes that hard mass to be scar tissue.
The uncontroverted evidence shows, and the Court finds, that the bullet is apparently lodged in muscle tissue; excising it would require an incision of approximately 5 centimeters; the surgeon designated to perform the procedure would require that petitioner be placed under general anesthesia for the operation; an anesthesiologist would administer a sedative to relax the patient, then sodium pentothal, a barbiturate, to put the patient to sleep, then a gaseous mixture of oxygen and nitrous oxide; and the risks involved in the procedure are greater than those associated with the procedure previously contemplated.
The Court concludes that this set of circumstances is materially different from the former one where: (1) the bullet was thought to be lodged just beneath the skin; (2) excising it would have required an incision of approximately 1.5 centimeters; and (3) the procedure would have been performed under local anesthesia. The sources of increased risk attending the procedure currently contemplated are many: penetrating the muscle layer and separating the muscle fibers increases the danger of damaging nerves, blood vessels, and other tissues such as that surrounding the pleural cavity; the longer and deeper incision carries with it an increased danger of infection; administering general anesthesia requires preliminary testing that carries risks of its own, and general anesthesia itself carries enough risks, such as of depressed respiration, that the anesthesiologist attends the surgery and constantly monitors vital signs, whereas local anesthetic can be administered entirely by the surgeon. The Court must examine the legal significance of the circumstances now before it.
V. Fourth Amendment Claim
In the October 15 memorandum, the Court applied a test the petitioner had derived from Schmerber v. California, 384 U.S. 757, 86 S.Ct. 1826, 16 L.Ed.2d 908 (1966), to decide whether, even under the interpretation most generous to the petitioner, the proposed intrusion was unreasonable in terms of the fourth amendment. This Court’s reading of Schmerber, however, is that the four factors petitioner identified in the opinion were not set forth as a test. Rather, the Schmerber Court was merely identifying elements of the situation before it that supported the conclusion that the intrusion in that case was constitutionally permissible.
Fourth amendment questions are peculiarly fact-specific, so it is not surprising to find that a court’s decision rests on the particular facts before it. Yet the lower courts must carefully examine the Supreme Court’s decisions and derive all available guidance from them. Sometimes the lower courts derive tests and doctrines from the Supreme Court’s observations as to the facts of a specific case. To date, however, apparently no federal court has extrapolated such a test from Schmerber. Indeed, the only federal case applying Schmerber to a surgical procedure, United States v. Crowder, 543 F.2d 312 (D.C.Cir.1976) (en banc), cert. denied, 429 U.S. 1062, 97 S.Ct. 788, 50 L.Ed.2d 779 (1977), mentioned none of petitioner’s asserted four factors, though it did examine some elements related to them, and this Court declines to enunciate a “Schmerber doctrine” based on the Supreme Court’s analysis of particular facts.
The Court will, however, apply the explicit holding of Schmerber:
That we hold today that the Constitution does not forbid the State minor intrusions into an individual’s body under stringently limited circumstances in no way indicates that it permits more substantial intrusions, or intrusions under other conditions.
384 U.S. at 772, 86 S.Ct. at 1836. And while the Court does not find a litmus test in the Supreme Court’s observations as to the facts before it, the Court does find some guidance as to the kinds of factors considered relevant to a determination of whether an intrusion is “minor” and performed “under stringently limited circumstances.”
In the October 15 memorandum, this Court characterized the set of facts then before it as representing “essentially the limit in the degree and kind of intrusion constitutionally permissible.” The current set of facts exceeds that limit. Without repeating in detail the nature of the proposed procedure and the associated risks, the Court simply observes that the totality of the factors involved constitutes a physical intrusion that is significantly greater than that previously contemplated, and the risks previously involved have increased in magnitude even as new risks are being added. While the evidence did not adequately quantify at least some of those risks, the Court is satisfied that, taken together, they far exceed the level of “virtually no risk.” Id. at 771, 86 S.Ct. at 1836. The Court concludes that an incision 5 cm long and 2.5 cm deep under general anesthesia to permit probing into and past muscle tissue simply cannot be characterized as a minor intrusion. Whether or not a surgeon would characterize the procedure as “minor surgery” is of no moment; there is no reason to suppose that the definition of a medical term of art should coincide with the parameters of a constitutional standard.
Schmerber essentially addresses only the extent and nature of physical intrusion, since that was basically all that was involved in the blood test there. However, the reasonableness of an intrusion turns also on the degree and manner of its interference with a person’s privacy and dignity. In Rochin v. California, 342 U.S. 165, 72 S.Ct. 205, 96 L.Ed. 183 (1952), the Court made no reference to physical pain or risk in evaluating the constitutionality of the intrusion involved in pumping the petitioner’s stomach to obtain the evidence lodged there. The Court simply said, “This is conduct that shocks the conscience.” Id. at 172, 72 S.Ct. at 209.
The Court does not here identify any single element of the proposed procedure as the linchpin to the Court’s determination of the reasonableness of the intrusion, but the fact that general anesthetic is involved is very important to the Court’s conclusion that the procedures shock the conscience. The Court is appalled at the prospect of government authorities rendering a person unconscious, cutting him open, and probing around inside his body for evidence which might, or indeed might not, aid them in convicting him of a crime. It cannot be said that such a procedure involves “virtually no ... trauma.” Schmerber, 384 U.S. at 771, 86 S.Ct. at 1836.
The procedure contemplated here goes far beyond the prick of a needle in Schmerber, the slight intrusion in Crowder, and the minor procedure originally supposed to be required in this matter. The Commonwealth proposes to forcibly subdue petitioner by injection, make a substantial incision into his body, retract muscle tissue in an attempt to locate the subject bullet, and if successful in locating it, extract it from his body. All of this is to be done where the procedure is concededly not medically necessary for the preservation of petitioner’s life and health. Considering the scope of the intrusion, the risks involved, and the affront to petitioner’s dignity, the Court concludes the procedure contemplated is more akin to the impermissible activity in Rochin than to the minor intrusion in Schmerber. In short, “These are methods too close to the rack and the screw to permit of constitutional differentiation.” Rochin v. California, 342 U.S. at 172, 72 S.Ct. at 209.
Considering together the type and extent of physical intrusion and the type and extent of intrusion on petitioner’s privacy and dignity, the Court is satisfied that the proposed surgical procedure constitutes an unreasonable search within the meaning of the fourth amendment.
VI. Conclusion
The Court concludes that this action and all parties to it are properly before the Court. The Court further concludes that the proposed surgical procedure would constitute an unreasonable search in violation of petitioner’s fourth amendment rights. Accordingly, the Court will permanently enjoin the procedure. While the parties have not raised the question, the Court concludes that the petition does not state a claim against respondents Gerald L. Baliles and the Circuit Court of the City of Richmond, Virginia, Division Ip accordingly, they will be dismissed.
An appropriate order will issue.
. In the early morning hours of July 18, 1982, Ralph E. Watkinson was locking the door of his business, the Lombardy Market, when he observed a man (“the assailant”) approaching him with a gun in his hand. As the assailant approached Watkinson, the latter drew his own pistol. When the assailant yelled at Watkinson to “freeze,” Watkinson fired two shots. The assailant returned the fire, striking Watkinson once in each leg. Thereafter, the assailant fled into a nearby alley. Watkinson was transported by ambulance to the Medical College of Virginia.
Shortly after the police arrived at the scene of the shooting, another police car responded to the area and the police officers in this latter car found the petitioner, Rudolph Lee, Jr., approximately eight blocks from the scene of the shooting with a gunshot wound in the left chest area. Petitioner was also transported by ambulance to the Medical College of Virginia.
. Indictments in these matters were returned by a grand jury of the Circuit Court of the City of Richmond, Division I, on September 7, 1982 (Case Nos. F-82-1417 to 1420).
. Petitioner finds the Crowder application faulty because: the Crowder court looked for only probable cause for the search, whereas Sehmerber required “a clear indication that in fact such evidence exists,” 384 U.S. at 770, 86 S.Ct. at 1835; the Crowder court failed to consider the need for the evidence, as Sehmerber did, id. at 770-71, 86 S.Ct. at 1835-36; and to determine whether the operation was minor, the Crowder court looked at the risk of permanent injury, whereas the Sehmerber court looked to see that there was “virtually no risk, trauma, or pain,” id. at 771, 86 S.Ct. at 1836.
. Accordingly, the Court need not consider respondents’ contention that Alien v. McCurry, 449 U.S. 90, 101 S.Ct. 411, 66 L.Ed.2d 308 (1980), bars this Court’s consideration of the merits of petitioner’s § 1983 claim.
. Much of what appears in the transcript may be based on hearsay testimony; however, the operative facts bearing on the question before this Court do not appear to be based on hearsay. Accordingly, the Court has no occasion to consider the possibly hearsay nature of certain background facts as set forth in this footnote.
To the extent that this action arises under 42 U.S.C. § 1983, as well as being a petition for a writ of habeas corpus, petitioner might better be styled “plaintiff.” However, in the interests of simplicity and consistency, the Court will refer to him as “petitioner,” even in regard to matters relevant only to his § 1983 claim.
. In a habeas corpus proceeding under 28 U.S.C. § 2254(d), factual determinations by a state court are “presumed to be correct,” and this Court could not disregard such determinations without explaining its basis for overcoming the presumption of correctness. Sumner v. Mata, 449 U.S. 539, 101 S.Ct. 764, 66 L.Ed.2d 722 (1981). However, the Court has found that the state court made no such factual determinations. The only finding of the court that appears in the record is stated as follows: “that there is no material change in circumstances that would require this Court to change Judge Lumpkin’s previous order” (Tr. 86); “that there are no particular changes in circumstances” (Tr. 87); “that there have been no material changes to warrant revoking or rescinding this Court’s Order of August 25, 1982.-
” These conclusions were additionally memorialized in the state court’s order of October 21, 1982 (Respondents Ex.l). The Court has found that these statements constitute a conclusion of law rather than a finding of fact.
Even if that conclusion is taken to be a factual determination for purposes of § 2254(d), the Court concludes that “such factual determination is not fairly supported by the record,” 28 U.S.C. § 2254(d)(8), so that the presumption of correctness is overcome. As appears from the Court’s discussion infra, the Court concludes that the circumstances now before the Court justify imposition of the injunction requested, whereas the Court concluded on the circumstances previously presented, i.e., the circumstances on which Judge Lumpkin based the August 25 order to perform the surgical procedure, that the injunction should not issue. A fortiori, the Court considers the difference in circumstances material.
Under § 2254(d)(2), the presumption of correctness is overcome also if “the factfinding procedure employed by the state court was not adequate to afford a full and fair hearing.” Upon examination of the state court transcript and the affidavit of petitioner’s counsel, filed October 21, 1982, the Court concludes that the procedures followed in the state court were conducted with such haste that the petitioner did not have a full and fair opportunity to litigate his claim there. At the October 21 hearing, petitioner’s counsel protested that he had had only two days in which to prepare for the hearing, and in that short time he had been unable to interview all the witnesses, review all the medical records, research the medical and legal issues involved, and obtain the services of an expert anesthesiologist who could help prepare cross-examination of the hospital’s anesthesiologist and could testify on petitioner’s behalf. When the court took a midday recess, the court asked petitioner’s counsel if he had any further evidence to put on. Petitioner’s counsel represented that he would like to call an independent anesthesiologist who had had a chance to review the records and perform a “consult,” but he could not have one available at two o’clock, when the court intended to continue. (Tr. 68-69). The court responded: “Well, we will hear him at two o’clock if you have him; otherwise we’ll hear your argument.” (Tr. 70). After the recess, petitioner’s counsel made a proffer concerning an anesthesiologist he had contacted, but who was in surgery at two o’clock; he also noted his unsuccessful efforts to reach another anesthesiologist. (Tr. 70-71).
The record does not indicate any exigent circumstances leading the state court to curtail its inquiry; the Court must assume that the normal press of judicial business urged the state court to move the matter along expeditiously. While the Court appreciates and shares the concern that judicial proceedings must not be needlessly prolonged, the Court concludes that in this instance petitioner did not have a fair opportunity to prepare for the October 21 hearing. The Court has been impressed with the diligence, not to mention the legal skill, exhibited by petitioner’s counsel, and the Court is satisfied that he did all that he could do or that a court could expect him to do during the two days he had in which to prepare for the October 21 hearing. He simply did not have adequate time to do his own preparation work, and it is not surprising that on such short notice he could not locate an expert anesthesiologist for whom the hearing date was available. Thus, “the factfinding procedure ... was not adequate to afford a full and fair hearing” for purposes of 28 U.S.C. § 2254(d).
This conclusion also undermines respondents’ contention that Stone v. Powell, 428 U.S. 465, 96 S.Ct. 3037, 49 L.Ed.2d 1067 (1976), prohibits the Court from reaching the merits of this matter. As the Court’s October 15 memorandum explained, neither the holding nor the rationale of Stone v. Powell applies to the instant matter because this matter does not involve the exclusion or admission of evidence allegedly resulting from an unconstitutional search or seizure. But additionally, Stone v. Powell only precludes federal habeas corpus consideration of the merits “where the state has provided an opportunity for full and fair litigation of a Fourth Amendment claim.” Id. at 494, 96 S.Ct. at 3046. Petitioner received no such opportunity in the state court.
. It is apparent the Court could not have concluded the § 1983 action was barred by res judicata since the state court findings were not before the Court for consideration at the time of the hearing.
. In Mitchum v. Foster, supra, the Court noted:
[W]e do not question or qualify in any way the principles of equity, comity, and federalism that must restrain a federal court when asked to enjoin a state court proceeding. These principles, in the context of state criminal prosecutions, were canvassed at length last Term in Younger v. Harris, 401 U.S. 37 [91 S.Ct. 746, 27 L.Ed.2d 669], and its companion cases. They are principles that have been emphasized by this Court many times in the past.
407 U.S. at 243, 92 S.Ct. at 2162 (citations omitted).
. See Younger, 401 U.S. at 43, 46, 91 S.Ct. at 750, 751.
. It would appear doubtful the state court would entertain a motion to suppress based on an impermissible search in view of the possible res judicata/collateral estoppel effects of its prior determinations.
. The Court is aware of no distinction between the meaning of “in custody” under § 2254(a) on the one hand and § 2241 on the other.
. Although the language of Rule 2(b) and the accompanying Advisory Committee note clearly contemplates petitions attacking future custody generally, it might be argued the Committee had in mind the context where a current prisoner who faces future additional confinement on a different conviction seeks to collaterally attack that conviction. If the Committee would limit the procedure to that context, then the Committee’s remarks do not support the Court’s conclusion that the instant petitioner satisfies the “in custody” requirement. Of course, the Committee may have had that context in mind, if indeed it did, only because that context is the most common one in which the issue of attacking future custody arises, and not out of an intent to limit the procedure to that context.
Resort to the approach of the Supreme Court in Hensley provides a sounder basis for examining the custody question. It cannot seriously be contended that a meaningful distinction exists between the custody in which petitioner . now finds himself and the unique custody to which he will be subjected in the operating room. The surgical procedure will be conducted at the behest and under the authority of the Commonwealth, and will, therefore, be but part and parcel of the Commonwealth’s current custody of petitioner. This being so, the Court comprehends no purpose to be served by constructing a metaphysical distinction between these “custodies” where, in reality, none exists.
. The findings of fact embodied in this section are derived entirely from the transcript of the state court proceedings of October 21. The Court finds the additional evidence submitted by the parties to be either cumulative or, in the case of the x-ray prints, incomprehensible. Thus, the Court’s conclusion that the facts are materially different from those previously presented is based entirely on the state court record; in determining that the state court conclusion that there were no materially different circumstances was “not fairly supported by the record,” see note 2 supra, the Court is looking at the same body of evidence.
. See Part IV, supra, at 9-10.
| CASELAW |
Most frequent questions
• Which Quooker products carry a label? Energy label
Quooker COMBI tanks are products that deliver hot water as well as boiling water. To achieve this, they are connected to the water supply and also to a heat generator. Because the COMBI tanks comply with these requirements, they come into the category ‘boilers’ and it is mandatory to label them.
PRO-VAQ tanks only supply boiling water. The EU has not drafted an energy label directive for boiling water tanks and so we cannot provide Quooker PRO-VAQ tanks with a label.
• Why does the Quooker COMBI carry an A label? Energy label
In order to verify the calculations conducted, a practical test is conducted on the energy efficiency of the Quooker COMBI tanks. The report with the detailed results from this test, conducted in accordance with the standard ‘NEN-EN 50440 Efficiency of domestic electrical storage water heaters and testing methods’ can be requested from Quooker.
Quooker COMBI tanks are products that delivery hot water as well as boiling water. Because the COMBI tanks comply with these requirements, they fall into the category "boilers" and it is mandatory to label them.
The energy label an appliance carries depends on its energy efficiency. Due to the energy loss in the generation of energy in power stations in 2015, an electrical appliance can achieve a maximum energy efficient of 40%. The energy loss (non-beneficial use of the energy) that an appliance suffers, in Quooker’s case the standby power consumption, reduces this efficiency still further. Because a Quooker is fitted with high-vacuum insulation cladding, the energy loss is only 10 watts. Due to this, the total energy efficiency for the Quooker tanks is 36% and this results in an A label for the Quooker COMBI tank in the XXS category. | ESSENTIALAI-STEM |
Page:Frost - A Boy's Will, 1915.djvu/15
Rh
* and to know definitely what he thinks about the soul;
Rh
* about love;
Rh
* about fellowship;
Rh
* about death;
Rh
* about art (his own);
Rh
* about science.
PART III Rh
* It is time to make an end of speaking.
Rh
* It is the autumnal mood with a difference.
Rh
* He sees days slipping from him that were the best for what they were.
Rh
* There are things that can never be the same.
Rh | WIKI |
Valles de Benavente
Valles de Benavente is a Spanish geographical indication for wines referred to legally as Vino de Calidad con Indicación Geográfica. This is one step below the mainstream Denominación de Origen quality wines and one step above the less stringent Vino de la Tierra table wines on the quality ladder.
It is located in the north of the province of Zamora, Castile and León region, Spain.
History
Grape cultivation was probably introduced by the ancient Romans.
Climate
The climate in this area is continental (long, hot dry summers and cold winters). Rainfall between 350 mm/yr and 500 mm/yr.
Grape Varieties
Recommended
* Red varieties: Tempranillo, Prieto Picudo and Mencía
* White varieties: Verdejo and Malvasía
Authorized:
* Red varieties: Garnacha and Cabernet Sauvignon
The maximum allowable yields are as follows:
* Red varieties: 7000 kg/ha
* White varieties: 9000 kg/ha | WIKI |
Wetenschappelijke publicatie
On the sea-surface drag and heat/mass transfer at strong winds
V. Kudryavtsev, V. Makin, S. Zilitinkevich
A simplified model for the sea surface momentum and enthalpy transfer coefficients are
suggested. The main impact of droplets on the boundary-layer dynamics arises from the effect of
the ‘spray force’ on the momentum balance of the air–spray mixture. The efficiency of the
impact of spray via the ‘stratification effect’ is significantly weaker. The ‘spray force’ effect
originates from the action of the vortex force on the marine atmospheric boundary layer (ABL)
dynamics; this force results from the interaction of the ‘rain of spray’ with the wind shear. This
effect leads to the acceleration of the airflow and the suppression of turbulence in the
atmospheric boundary layer above the spray generation layer. It is shown that the drag
coefficient CD10 levels off at a wind speed of around 30 m/s and further decreases with
increasing the wind speed as approximately 2 U10 − ∝ . Action of the spray force results also in
increase of the turbulent mixing coefficient in the spray generation layer. As a consequence, the
vertical gradients of the “scalar” quantities (air temperature and humidity) in this layer are
reduced with respect to the reference (no spray effect) gradients and are increased in the entire
ABL above this layer. This in turn leads to the enhancement of the bulk transfer coefficient both
for the sensible and latent heat. Both, suppression of the drag coefficient,CD10 , and increase of
the enthalpy transfer coefficient,CE10 , result in rapid rise of the 10 10 / C C E D ratio above the
critical value of 10 10 / 0.75 C C E D = at 10 U > 40 m/s. Thus suggested model predicts that energy gain from enthalpy exceeds that lost from drag, providing the necessary conditions for tropical storms development.
Bibliografische gegevens
V. Kudryavtsev, V. Makin, S. Zilitinkevich. On the sea-surface drag and heat/mass transfer at strong winds
KNMI number: WR-12-02, Year: 2012, Pages: 21
Download volledige publicatie
download PDF (270 KB)
Niet gevonden wat u zocht? Zoek meer wetenschappelijke publicaties | ESSENTIALAI-STEM |
User:Egrhodes/What computer game invented by Alexi Pajtnov celebrated its 25th anniversary in June 2009
What computer game invented by Alexi Pajtnov celebrated its 25th anniversary in June 2009 | WIKI |
Page:Side talks with girls (1895).djvu/229
Rh. A good prescription for slight indigestion is the drinking, just before breakfast, of a glass of tepid water, in which a teaspoonful of ordinary table-salt has been dissolved. Then, of course, among your medicines will be—and, by–the-by, it is rather odd to count it a medicine—a rubber bag which will hold plenty of hot water, and which is used to warm your feet, or to draw away the pain from any part of your body which can be soothed by this heat. If you have a slight inclination to rheumatism, keep two small flannel bags filled with coarse salt, and when the pain first comes heat these by putting them in the oven, and then lay them where the pain is worst. As they give a very dry heat they are to be preferred to that which comes from the hot-water bag for either rheumatism or neuralgia. In a small bottle is myrrh, for you will use a few drops of this in the water with which you rinse your mouth, making it taste well and smell sweet. I do not believe in dosing one's self, but there are some simple teas that are good to take, and which every girl should know about, so that she may be permitted to doctor herself for ordinary ailments. Very often the best medicine is a day of rest. I do not mean an idle day; I mean one when one deliberately goes to bed, if possible sleeping most of the time, but at least not talking, and certainly, as far as possible, not thinking about one's worries. | WIKI |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.