Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Uniforms of the British Army The uniforms of the British Army currently exist in twelve categories ranging from ceremonial uniforms to combat dress (with full dress uniform and frock coats listed in addition). Uniforms in the British Army are specific to the regiment (or corps) to which a soldier belongs. Full dress presents the most differentiation between units, and there are fewer regimental distinctions between ceremonial dress, service dress, barrack dress and combat dress, though a level of regimental distinction runs throughout. Senior officers, of full colonel rank and above, do not wear a regimental uniform (except when serving in the honorary position of a Colonel of the Regiment); rather, they wear their own "staff uniform" (which includes a coloured cap band and matching gorget patches in several orders of dress). As a rule, the same basic design and colour of uniform is worn by all ranks of the same regiment (albeit often with increased embellishment for higher ranks). There are several significant uniform differences between infantry and cavalry regiments; furthermore, several features of cavalry uniform were (and are) extended to those corps and regiments deemed for historical reasons to have "mounted status" (namely: the Royal Artillery, Royal Engineers, Royal Corps of Signals, Army Air Corps, Royal Logistic Corps and Royal Army Veterinary Corps). Full dress Full dress is the most elaborate and traditional order worn by the British Army. It generally consists of a scarlet, dark blue or rifle green high-necked tunic (without chest pockets), elaborate headwear and other colourful items. It was withdrawn from a general issue in 1914, but is still listed in the Army Dress Regulations, which speaks of it as "the ultimate statement of tradition and regimental identity in uniform" and the "key" to all other orders of dress. Each regiment and corps has its own pattern, approved by the Army Dress Committee. They are generally a modified version of the pre-1914 uniforms. In the case of units created since the First World War, such as the Army Air Corps, the Full Dress order incorporates both traditional and modern elements. Gloves as worn with Full Dress uniform are white for all ranks in all regiments and corps, with the exception of The Rifles, the Royal Gurkha Rifles, the Royal Army Chaplains' Department, and the Royal Irish Regiment, who all wear black gloves in Full Dress. This is also the case with the Frock Coat and Numbers 1 and 3 dress. In addition, the Life Guards, the Blues and Royals, the Queens Royal Dragoons, the Royal Scots Dragoon Guards, the Royal Dragoon Guards, and the Royal Lancers all wear white leather gauntlets when mounted. Full dress is still regularly worn on ceremonial occasions by the Foot Guards, the Household Cavalry and the King's Troop, Royal Horse Artillery. It is issued at public expense to these units and to the various Royal Corps of Army Music Bands for ceremonial use. Other units may obtain Full Dress on occasion, as it can be worn whenever a parade is attended or ordained by the monarch or a member of the British Royal Family, including ceremonial parades, state funerals, and public duties around royal residences (such as the Changing of the Guard), or participating in the Lord Mayor's Show. Most regiments maintain full dress for limited numbers of personnel, including musicians and guards of honour (in some cases). However, all of these uniforms must be purchased and maintained from non-public funds. Historically, musicians were an important means of communication on the battlefield and wore distinctive uniforms for easy identification (coats laced and/or in "reversed colours"). This is recalled in the extra uniform lace worn by infantry regiments' corps of drums, and the different coloured helmet plumes worn by trumpeters in the Household Cavalry. Shoulder "wings" are now a distinguishing feature worn by musicians of some non-mounted regiments and corps in ceremonial forms of dress. Originally, wings were embellishments in a certain number foot regiments, so that, in 1750, nineteen out of forty-nine foot regiments wore them, although they had been forbidden in 1730. In December 1752, the wings were reserved for grenadier companies only, followed by the light infantry in 1770. Within less than three decades, these initially small and modest features grew in size, became stiffened and lavishly trimmed with lace and fringes. After a design change, in 1836, the wings disappeared by the end of the Crimean War, 1855, and became solely the privilege of military musicians. Headgear, as worn with full dress, differs considerably from the peaked caps and berets worn in other orders of dress: * Field marshals, generals, lieutenant generals, major generals, brigadiers and colonels wear cocked hats with varying amounts of ostrich feathers according to rank; * Life Guards, Blues and Royals, 1st The Queen's Dragoon Guards and Royal Dragoon Guards wear metal helmets with plumes, the plumes variously coloured to distinguish them. * King's Royal Hussars, Queen's Royal Hussars, Light Dragoons, the Royal Regiment of Artillery and the Royal Signals wear a black fur busby, with different coloured plumes and bags (this is the coloured lining of the busby that is pulled out and displayed on the left-hand side of the headdress). * As the uniforms of Rifles regiments traditionally aped those of the hussars, a somewhat similar lambskin busby is worn by The Rifles and the Royal Gurkha Rifles, with coloured plumes to distinguish them. However, these busbies do not feature bags like in their hussar counterparts. * The Royal Lancers and the band of the Royal Yeomanry, feature the czapka, or "lancer's cap". The plumes and top of this headgear historically distinguished the various Lancer regiments. * The Grenadier Guards, Coldstream Guards, Scots Guards, Irish Guards, Welsh Guards, Royal Scots Dragoon Guards and Honourable Artillery Company wear bearskins, as do officers of the Royal Regiment of Fusiliers; whose other ranks wear the flat-topped fusilier cap. * The Royal Regiment of Scotland wears the feathered bonnet, as do pipers in the Scots Guards and Royal Scots Dragoon Guards. * English and Welsh Line infantry regiments (The Princess of Wales' Royal Regiment, Mercian Regiment, Duke of Lancaster's Regiment, Royal Anglian Regiment, Royal Yorkshire Regiment, and Royal Welsh), the Royal Engineers, Adjutant General's Corps and Corps of Royal Electrical and Mechanical Engineers wear the dark blue Home Service Helmet with a spike ornament on top. * The Royal Logistic Corps, Royal Army Medical Corps, Royal Army Veterinary Corps and Royal Army Dental Corps wear the Home Service Helmet, with a ball ornament on the top. * The Royal Tank Regiment, Army Air Corps, Parachute Regiment, Special Air Service, Intelligence Corps and the Special Reconnaissance Regiment wear berets; as they do with all orders of dress. * The Royal Irish Regiment, the pipers of the Queen's Royal Hussars and the Irish Guards wear the caubeen. * The Royal Gibraltar Regiment wear a white pith helmet with a spike ornament on the top. Not all full-dress uniforms are scarlet; light cavalry regiments (hussars, light dragoons and lancers) and the Royal Artillery have worn blue since the 18th century, while rifle regiments wear green. The seven support corps and departments in existence in 1914 all wore dark blue dress uniforms, with different coloured facings. Hussar and Rifle regiments' tunics feature cording across the chest, while that of the Royal Lancers and Army Air Corps features a plastron in the facing colours. Facings Each regiment and corps of the British Army has an allotted facing colour according to Part 14 Section 2 Annex F of the British Army dress regulations. Where full dress is currently not used, the notional colours can be ascertained by the colours of the mess dress; if the regiment in question has not been amalgamated with another. The Intelligence Corps, SAS and SRR have never had a design of full dress, and the SAS nor SRR had a design for mess dress. The Intelligence Corps mess dress colour of cypress green is "traditionally unacceptable", and the full dress facing colours of the SAS and SRR can be inferred from their beret colours according to this section of the regulations. The London Regiment and existing Yeomanry regiments have a variety of colours for their various sub-units. Blue: General officers and Colonels, The Life Guards, 1st The Queen's Dragoon Guards, The Royal Dragoon Guards, The Queen's Royal Lancers, Foot Guards Regiments, The Royal Regiment of Scotland, the Princess of Wales Royal Regiment, the Royal Welsh, Adjutant General's Corps, Honourable Artillery Company (Artillery dress), Royal Monmouthshire Royal Engineers Scarlet: The Blues and Royals, Queen's Royal Hussars, Royal Horse Artillery, Royal Artillery, The Rifles, Royal Electrical and Mechanical Engineers, Educational and Training Services (part of Adjutant General's Corps), Royal Military Police (part of Adjutant General's Corps) Royal Army Physical Training Corps, Royal Corps of Army Music, Honourable Artillery Company (Infantry dress), The Royal Yeomanry Yellow: Royal Scots Dragoon Guards Crimson: The King's Royal Hussars, Army Cadet Corps Buff: The Light Dragoons, The Mercian Regiment Royal blue: The Duke of Lancaster's Regiment Maroon: The Parachute Regiment, Royal Army Veterinary Corps Dark blue: The Royal Anglian Regiment, The Queen's Own Gurkha Logistics Regiment Black: Royal Corps of Signals, Army Legal Services (part of Adjutant General's Corps) Blue velvet: Royal Engineers, Queen's Gurkha Engineers, The Royal Logistic Corps Black velvet: Royal Tank Regiment Brunswick green: The Royal Yorkshire Regiment Piper green: The Royal Irish Regiment Grey: The Intelligence Corps Cambridge blue: Army Air Corps, Small Arms School Corps Emerald green: Royal Army Dental Corps Purple: Royal Army Chaplains Department Ascot grey: Queen Alexandra's Royal Army Nursing Corps Dull cherry: Royal Army Medical Corps Slate grey: Royal Gibraltar Regiment Frock coats One type of frock coat may be worn by officers of lieutenant general and above (and major generals in certain appointments) on formal occasions when not on parade in command of troops. They are a knee-length, dark blue, double-breasted coat with velvet collar and cuffs. It is usually worn with the peaked cap but is occasionally worn with a cocked hat by certain office-holders such as the Major-General commanding the Household Division, Gold Stick and Silver Stick and the Constable of the Tower. A different type of frock coat is worn by certain officers of the Household Division, Honourable Artillery Company and King's Troop of the Royal Horse Artillery. These are also dark blue but are single-breasted and with ornate black braiding and loops. Similar braided coats are worn on occasion by directors of music and bandmasters of bands affiliated to line cavalry regiments (in other bands they wear a plainer double-breasted frock coat similar to that of senior officers but without the velvet) in dark blue (or green for The Rifles). Numbered orders of dress Fourteen numbered "orders" of dress (in addition to full dress) are set out in Army Dress Regulations but many of these are rarely worn or have been phased out altogether. Numbers 5 and 9 have been replaced by the new "Personal Clothing System" Combat Uniform (or PCS-CU for short). Several orders of dress are only issued to officers (and senior non-commissioned officers in some cases); others are only issued to personnel serving in particular climates or specific roles. No. 1: Temperate ceremonial No. 1 Dress, or "dress blues", is a ceremonial uniform, worn on only the most formal of occasions and by senior staff officers, aides to the Royal Family, and to the personal staff of senior officers in command. It is not generally issued to all units, with the khaki No. 2 Dress functioning as the main parade uniform. No. 1 dress originated in the "undress" uniforms ('blue Patrols') worn for semi-formal or ordinary duty occasions in the late 19th century. It was first issued in its current form for the 1937 Coronation, intended as a cheaper alternative to the full dress uniforms that had been generally withdrawn after 1914. It became known as No. 1 Dress in 1947. Army units participating in the 1953 Coronation wore the new uniform as a temporary issue. For most units, No. 1 dress consists of a dark blue stand collared tunic, matching trousers, and peaked cap, caubeen, or beret depending on the regiment. Female members may wear skirts with tights in place of the trousers. Units are distinguished by badges and the colours of the cap, tunic piping, vertical stripes ("welts") on the trousers, and the colour of the collar for certain cavalry regiments. The Rifles wear a rifle green tunic with black trousers. The Royal Gurkha Rifles wear matching tunics and trousers of rifle green. The Royal Dragoon Guards and the King's Royal Hussars wear dark green and crimson trousers respectively. Cavalry regiments wear shoulder chains in place of shoulder straps, and for officers "overalls" (tight-fitting trousers historically worn by mounted troops). The Royal Regiment of Scotland wears a short jacket called a "doublet", in Archer Green. Prior to amalgamation, Highland regiments wore the doublet with the kilt and sporran while Lowland regiments wore trews, both in the individual regiment's tartan. In the full ceremonial order of No. 1 Dress, officers wear a waist sash of crimson silk and twisted cord epaulettes; while general officers wear a waist sash of gold and crimson stripes. Light cavalry regiments wear a lace crossbelt in place of the sash, while Rifle regiments wear a polished black leather crossbelt, as do the Special Air Service and Royal Army Chaplains Department (who have a unique pattern of tunic that features an open step collar instead of a stand collar). Other ranks wear a white, buff, or black leather belt with a regimental pattern locket, with a bayonet frog if carrying arms. The peaked forage cap is worn by most regiments exceptions being: * Beret: * Royal Tank Regiment, * 4/73 (Sphinx) Special Observation Post Battery RA * Royal Regiment of Fusiliers * other ranks of the Royal Welsh, * Parachute Regiment, * Special Air Service * Intelligence Corps. * Staff Sergeants and ranks below of the Royal Logistic Corps * Army Air Corps, * Qualified personnel serving with a unit forming part of air assault, or commando formations or with Army Aviation Units. * Glengarry * Royal Regiment of Scotland * Caubeen * Royal Irish Regiment, * Kilmarnock cap * Royal Gurkha Rifles. The above headdress is also worn as part of Numbers 3, 10 and 11 dress (and with Number 2 and 6 dress on formal parades). No. 2: Service dress (temperate parade uniform) Originally issued as a field uniform, this uniform is worn for most formal duties by all units. No. 2 dress consists, for most corps and regiments, of a khaki jacket, shirt and tie with trousers or a skirt. Coloured trousers are worn by some units: crimson by the King's Royal Hussars, dark green by the Royal Irish Regiment and Royal Dragoon Guards. All officers and other ranks now wear the same style and colour of Service Dress and it is issued free to all. Officers are required to purchase the caps, belts and shoes for which they are given a cash grant. The only variations of the standard jacket are the jackets worn by the Foot Guards whose buttons are grouped differently depending on their regiment, and the Royal Regiment of Scotland who wear a "cutaway" form of the jacket to be worn with kilts. Regimental distinctions worn on No. 2 dress can include collar badges (sometimes with coloured cloth backings), coloured lanyards worn on the shoulder, arm badges, and unusually for the Educational and Training Services Branch blue socks are worn. Regimental buttons are worn; for most units, these are of gold colour, with black buttons worn by The Rifles, Royal Gurkha Rifles and Royal Army Chaplains Department, silver by the Special Air Service, Special Reconnaissance Regiment, Honourable Artillery Company and Small Arms School Corps and bronze by the Princess of Wales's Royal Regiment. Officers and Warrant Officers Class One of some (but not all) regiments and corps wear a leather Sam Browne belt (that of 1st The Queen's Dragoon Guards is of pig skin which is not to be highly polished) or a cross belt. Infantry Warrant Officers Class Two and SNCOs wear a scarlet (for WOs) or crimson (for SNCOs) sash over the right shoulder to the hip. Soldiers wear a white or black plastic waist belt with a plate buckle displaying the regimental badge in ceremonial uniform – a plain khaki belt in non-ceremonial. Every regular army soldier is issued with one suit of No. 2 dress. In general, issue of this order of dress to units of the Army Reserves is to all officers and SNCOs with pools of khaki uniforms being held by units for use by corporals and below. In the ceremonial form of No. 2 dress, the headdress is the same as that worn with No. 1 dress, with the exceptions of the Brigade of Gurkhas (who wear the slouch hat); and of officers of The Queen's Royal Hussars who wear their "tent hat" (the only headdress worn without a cap badge or other distinction). On "informal parades" officers in Nos 2 or 6 dress may wear a peaked khaki cap (which may also be worn with Nos 4, 7, 12, 13 and 14 dress); this item is not generally issued to other ranks (who would wear the beret or equivalent on these occasions) except those in HCMR and King's Troop RHA. Another item of headwear authorized (but not provided) for optional wear on informal parades in Nos 2 or 6 dress is the side cap; it may also optionally be worn with Nos 4, 6, 7, 10, 11, 13 and 14 dress. No. 3: Warm weather ceremonial uniform No. 3 dress is the warm weather equivalent of No. 1 dress, worn for specified overseas stations or assignments. With the introduction of No. 1 Dress in temperate regions, No. 3 Dress was adopted as the tropical equivalent during the early 1950s. It comprised an all-white cotton drill high-collared tunic, cut in a similar fashion to the No. 1 dress jacket, plus white trousers. These were worn with the coloured No. 1 dress cap. No. 3 dress was typically issued temporarily, being withdrawn from units on leaving the station. This order of dress dates back to white drill uniforms worn for "hot-weather" ceremonial and off-duty wear in India prior to World War I. Since the 1970s this order has consisted of the same white tunic but is now worn with coloured No. 1 dress trousers. Head-dress, footwear and badges are generally as for No. 1 dress. Widely worn during the 1950s and 1960s (when Britain still maintained significant garrisons in tropical stations) this uniform is now usually restricted to military attachés in tropical postings and their personal staffs; units of the Royal Gibraltar Regiment and The Royal Bermuda Regiment (see below); plus a few army bands and officers of the battalion of the Royal Gurkha Rifles stationed in Brunei. The band of the Royal Gibraltar Regiment is entitled to a permanent issue of No. 3 dress. The Royal Bermuda Regiment, which has many ceremonial duties, issued No. 3 Dress as a summer uniform until the end of the millennium, wearing No. 1 Dress (with red facings) during the rest of the year due to the cold and often stormy weather (a black Slade-Wallace belt being worn with No. 3 Dress whereas a white one is worn with No. 1 Dress). As most of its public ceremonial duties fall during the summer months, it now wears No. 3 Dress year-round, with No. 1 Dress worn only as authorized by the Commanding Officer. No. 4: Warm weather Service Dress (officers only) Issued to officers on first posting to a warm-weather area: the uniform is similar to No. 2 dress but made in a light khaki shade defined in Section 01.87 of the Army Dress Regulations as "stone". When officers are taking part in parades and formations with other ranks in warm weather areas, they wear either No. 3 or No. 6 dress. There had been an Other Ranks pattern of warm weather Service Dress, but this fell out of use after the 1950s. No. 6: Warm weather parade uniform (bush jacket) The "bush jacket" uniform (in Australia, this is known as the "safari uniform"). It is issued to all officers and ORs on posting to a warm-weather station. It consists of a stone coloured bush-style four-button jacket worn with or without a shirt and tie underneath and stone coloured trousers. It is worn by all ranks for parades (as with No. 2 Dress), unless No. 3 dress is worn, and by ORs for all other occasions. No. 7: Warm weather barrack dress The tropical shirt-and-trousers uniform, consisting of a stone coloured short-sleeve shirt worn with stone coloured trousers (tartan kilt or trews for Scottish regiments), and regimental headgear. Regimental/Corps stable belts may be worn in this order of dress. No. 8: Combat Dress The current No. 8 Dress, which was introduced as part of Project PECOC in 2011, is known as Personal Clothing System – Combat Uniform (PCS-CU); it is based around a Multi-Terrain Pattern (MTP) windproof smock, a lightweight jacket and trousers with a range of ancillaries such as thermals and waterproofs. Prior to 2011 separate designs of combat dress were provided for use in desert, temperate and tropical regions (numbered 5, 8 and 9, respectively, in the uniform regulations) all of which were replaced by PCS-CU. PCS-CU is designed to be lightweight, yet durable enough to be used throughout rigorous activities soldiers find themselves performing, and with the idea that layers of clothing are warmer and more flexible than a single thick layer. The PCS-CU jacket is always worn loose, with sleeves rolled down; however, an MTP pattern shirt was introduced in 2015 and this may be worn during the Summer months tucked into the trousers with sleeves rolled up. While the shirt may be worn during the winter months, it is always worn with the sleeves rolled down. Some Regiments and Corps wear a stable belt in No 8 dress whilst others restrict its use to Nos 13 and 14 Dress. On exercises and operations the stable belt is replaced with a plain green field belt, with nylon Personal Load Carrying Equipment and the Osprey body armour vest with pouches attached using the PALS system being worn for load-bearing purposes. In the twentieth century the British army introduced Tactical Recognition Flashes (TRFs) – worn on the right arm of a combat uniform, this distinctive insignia denotes the wearer's regiment or corps (or subdivision thereof, these being the ALS, ETS, RMP, MPGS, and SPS, in the case of the AGC). Working headdress is normally worn, which is typically a beret. The colour of the beret usually shows what type of regiment the wearer is from. The colours are as follows: * Khaki: Mercian Regiment, Foot Guards, Honourable Artillery Company, Princess of Wales's Royal Regiment, Royal Anglian Regiment, Duke of Lancaster's Regiment, Royal Welsh, Royal Yorkshire Regiment, Royal Gibraltar Regiment, 4/73 (Sphinx) Special Observation Post Battery RA * Light grey: Royal Scots Dragoon Guards, Scottish and North Irish Yeomanry * Dark grey: Queen Alexandra's Royal Army Nursing Corps * Brown: King's Royal Hussars, Royal Wessex Yeomanry * Black: Royal Tank Regiment, Westminster Dragoons Squadron, Royal Yeomanry * Dark (Rifle) green: The Royal Dragoon Guards, The Queen's Royal Hussars (with broad browband), The Rifles, Royal Gurkha Rifles, Small Arms School Corps, Essex Yeomanry * Maroon: Parachute Regiment, all ranks serving with 16 Air Assault Brigade (not restricted to Parachute qualified personnel) other than the non–Parachute Regiment Infantry Battalion or Army Air Corps and attached Arms personnel * Beige: Special Air Service including attached troops who are not SAS-qualified * Emerald grey: Special Reconnaissance Regiment * Commando green: Commando qualified personnel serving in Commando units (including the Special Boat Service) * Cypress green: Intelligence Corps * Cambridge blue: Army Air Corps including attached personnel and REME Aircraft trades, 47 Regiment Royal Artillery any army personnel serving in an aviation unit. * Scarlet: Royal Military Police * Green: Adjutant General's Corps (except Royal Military Police, who wear scarlet; Military Provost Staff, Educational and Training Services Branch and Army Legal Service, who wear navy blue), Military Provost Guard Service * Dark blue: all other Army units (except Scottish line infantry regiments and the Royal Irish Regiment) A regiment or corps cap badge is worn on the beret or other headdress worn in No. 8 Dress. The badge is positioned above the left eye when a beret or a caubeen is worn; the badge worn on the Tam O'Shanter sits above the left ear. Uniquely D (London Irish Rifles) Company of The London Regiment wear their cap badge over the right eye, on their caubeen. Troops from other services, regiments or corps on attachment to units with distinctive coloured berets often wear the latter with their own cap badge. Colonels, brigadiers and generals usually continue to wear the beret of the regiment or corps to which they used to belong with the cap badge distinctive to their rank. The Royal Regiment of Fusiliers wears a feather hackle on the beret, they are now the only infantry regiment to wear the navy blue beret. Hackles are also worn by other regiments with Fusilier heritage: e.g. other ranks of the Royal Welsh wear white hackles on their berets (inherited from the Royal Welch Fusiliers). The Royal Regiment of Scotland and the Royal Irish Regiment, instead of the beret, wear the Tam O'Shanter and the caubeen respectively, both of which feature hackles. The Tam O'Shanter is also worn by some UOTCs and Army Reserve units in Scotland. Prior to the adoption of PCS-CU, the beret was often substituted by the Mk 6 Combat Helmet with a DPM cover (or desert DPM if worn with No. 5 Dress); this has since been replaced by the Mk 7 helmet with an MTP cover and some scrim netting for the insertion of additional camouflage. In jungle conditions, the helmet is usually substituted by an MTP bush hat – or equally, in cold conditions, an MTP peaked hat (Cap, Extreme Cold Weather), a rolled woollen tube known as a cap comforter, or other specialized headgear. When the British Army finds itself in peacekeeping roles, regimental headdress is worn (where the tactical situation allows) in preference to the helmet or MTP hat, in order to appear less hostile to local civilians. When working for the United Nations, soldiers will wear the pale blue UN beret. No. 10: Temperate mess dress The British Army's temperate mess dress includes a waist-length short jacket, with which men wear trousers, overalls or a kilt; and for women a long skirt. No. 10 dress is normally worn by sergeants and above for formal evening functions. Colours vary greatly from unit to unit but generally match those of the traditional full dress of the regiment or corps. Thus mess jackets can be scarlet, dark blue or green with facings and waistcoats in regimental colours. Two basic patterns of jacket are worn: the high collared "cavalry" style and the open-fronted one with lapels formerly worn by officers of infantry regiments. The version of No. 10 dress worn by officers frequently includes elaborate braiding on the waistcoats. Mess dress was derived from the shell jacket (infantry) or stable jacket (cavalry): a short, working jacket in full-dress colours, which 19th-century officers paired with a uniform waistcoat for evening wear. No. 11: Warm weather mess dress A white jacket is substituted for the coloured one of temperate mess dress. Waistcoats are not worn. No. 12: Protective clothing This order of dress includes various types of protective clothing ranging from the standard overalls to specialist kit worn by aircrews, chefs, medics and others. No. 12 also covers whatever day-to-day working dress may be authorised at a local or regimental level. Formerly an olive green shirt and trousers were often worn, but this has been replaced with combat dress shirt and trousers worn with beret and stable belt (identical to that of No. 7 Dress). No. 13: Temperate barrack dress In 2018 it was announced that although Nos 13 and 14 Dress remain an authorised order of dress to be worn on appropriate occasions, Barrack Dress trousers, skirts and short-sleeved shirts were to be withdrawn. It consists of khaki barrack dress trousers (as issued under the Future Army Dress (FAD) programme) and the standard issued shirt from No. 2 dress with a pullover sweater. The stable belt, a wide belt made of tough woven fabric, is often worn. The fabric of the belt itself is in regimental colours, either a single colour or striped along its length (the origin of these combinations is often traditional, derived from historic uniform colours and facings, and may coincide with the design of a particular unit's TRF). It is traditionally fastened with a set of leather straps and buckles on the wearer's left-hand side (in some units to their front), but may alternatively have a metal locket arrangement, or a plate at the front bearing regimental, or formation insignia. The stable belt is worn over the pullover by some Regiments and Corps. Some regiments' officers and WOs may wear coloured pullovers in place of the green pattern; the following regimental patterns and colours are authorised: * Grey/blue v-neck: Royal Scots Dragoon Guards * Grey/blue/green knit: Queen's Royal Lancers * Grey/brown v-neck: 1st The Queen's Dragoon Guards * Grey/green v-neck: Royal Regiment of Fusiliers * Grey v-neck: Queen Alexandra's Royal Army Nursing Corps * Green v-neck: Princess of Wales's Royal Regiment, 307 (South Nottinghamshire Hussars Yeomanry) Battery RA (V) * Lincoln green v-neck: 68 (Inns of Court and City Yeomanry) Signal Squadron (V) * Brunswick Green knitted crew neck: Royal Dragoon Guards * Dark green: Queen's Royal Hussars * Emerald green v-neck: Royal Army Dental Corps * Brunswick green v-neck: 9th/12th Royal Lancers * Lovat green v-neck: Royal Yeomanry * Green fleck v-neck: Royal Wessex Yeomanry * Lovat green and red fleck v-neck: Essex Yeomanry * Black: Royal Tank Regiment, Royal Army Chaplains Department, Army Legal Services Branch * Navy/corvette blue: Royal Artillery * Dark blue: 94 (Berkshire Yeomanry) Signal Squadron (V) * Storm blue v-neck: Queen's Own Yeomanry * Light blue/green fleck: Light Dragoons * Maroon: Royal Army Veterinary Corps * Dull cherry v-neck: Royal Army Medical Corps * Brown fleck round neck: King's Royal Hussars * Buff: Mercian Regiment * Mid brown v-neck: Royal Mercian and Lancastrian Yeomanry A regimental pattern coloured side cap may be worn at the commanding officer's discretion. Some warrant officers in a few regiments customarily carry a Pace stick when in this order of dress. No. 14: Short Sleeve Order As for No. 13, but with the shirt sleeves rolled up to above elbow level or the issued short sleeve barrack dress shirt. The pullover is not worn. No. 5: Battledress (1939–1961) Battle Dress refers to the combat utility uniform issued from 1939 to the early 1960s that replaced No. 2 Service Dress. It is often incorrectly called the "Pattern 37 uniform" from the pattern of web gear and accessories introduced earlier in 1937. It consisted of a short jacket called a blouse and high-waisted trousers made of khaki wool serge worn with a beret or side-cap. It was also issued in RAF Blue-Grey for the Royal Air Force, Navy Blue for the Royal Navy / Royal Navy Volunteer Reserve and Dark Blue for the Civil Defence Corps. Officers were permitted to have the collar of the BD jacket tailored to have faced lapels, allowing the wearing of a shirt and tie underneath, inspiring the later American M44 "Ike Jacket". Originally introduced in 1939, design modifications were made in 1940 (Austerity Pattern), 1942 (Pattern 40), and 1949 (Pattern 49). It became a barracks and walking-around dress with the introduction of the Jungle Green combat dress uniforms in the mid-1940s and is synonymous with the British soldier of the 1940s and 50s. Battledress had some drawbacks. The uniform was designed for the temperate climate of the United Kingdom or Northern Europe. It was found too heavy for wear in summer, the sunnier climate of Southern Europe (like the Mediterranean Theatre) or in tropical or jungle climates (like the Pacific Theatre). Conversely it was too lightweight for cold weather or high altitudes (like Korea). It was also very difficult to iron due to the complex series of pleats. It became obsolete in 1961 and No. 2 Service Dress was reintroduced in its place in 1962 for barracks and parade use. No. 5: Desert Combat Dress Desert combat clothing is listed as: hat, jacket and trousers DPM and were issued to soldiers and other British military personnel posted to Cyprus, the Middle East and Afghanistan. As issued in the 1991 Gulf War, this uniform was identical to the No. 9 DPM tropical uniform, except for the multi-tone desert camouflage. This was quickly replaced with a two-tone desert version of DPM camouflage (the base colour and one other). Smocks were also available in the desert DPM, including the SAS pattern windproof smock. Covers for combat helmets and body armour were also made in this camouflage prior to their replacement by Multi-Terrain Pattern (MTP) camouflage. Since 2011, No 5 Dress has no longer been issued due to the introduction of the Personal Clothing System – Combat Uniform (PCS-CU). No. 8: Temperate Combat Dress Prior to 2011 this was based on a woodland/temperate variant of Disruptive Pattern Material. Smocks were also available in the temperate DPM, including the SAS pattern windproof smock. Covers for combat helmets and body armour were also made in this camouflage prior to their replacement by Multi-Terrain Pattern (MTP) camouflage. No. 9: Tropical Combat Dress No. 9 dress is no longer provided, being replaced by PCS-CU. It was made from cotton or poly-cotton DPM of a lighter weight than pre-Combat Soldier 95 No 8 Dress. The jacket was similar in cut to a shirt and had epaulettes fitted to the shoulders. Its sleeves could be rolled above the elbow and the shirt tucked into the trousers for a smarter appearance for example in barracks. There is a large pocket on each breast, closed with a button-down flap, and a first aid field dressing pocket on one sleeve. This uniform was normally worn with a DPM bush hat; out of the field, regimental headdress was often worn. The trousers had button down belt loops when carrying equipment was not worn, a uniform belt was worn in these loops. Red coats Prior to the English Civil War of 1642–51 the only significant instances of uniform dress in British military culture occurred in small bodyguard units, notably the Yeoman of the Guard. Other than these royal bodyguards, there was no standing English Army before the English Civil War, only the permanent, but part-time, Militia for home defence and temporary forces raised for expeditions abroad. Scotland, which remained independent from England until the 1707 Acts of Union created the Kingdom of Great Britain, also raised a standing Scottish Army after the English Civil War (known in Scotland and Ireland as the Wars of the Three Kingdoms), which merged with the English Army in 1707 to create the British Army. In 1645, during the First English Civil War, the Parliamentary New Model Army adopted a fairly standardized pattern of red clothing, a practice which continued with the small regular English Army of the Restoration period. The Scottish Army initially appears to have issued grey uniforms but began to imitate English Army practice by adopting red uniforms from the 1680s. By the end of the 17th century, the colour of the uniforms of the English Army was largely settled on red with few exceptions. Red coats became the norm for line infantry, including foot guards, and certain other units. The practice of distinguishing regiments by different facings was in general use by the early 18th century. In the decades after the end of the Napoleonic Wars, British Army uniforms trended towards extravagance rather than practicality. That trend was reversed during the Crimean War with the adoption of looser fitting tunics and more practical headdresses. At the time, the Royal Artillery, Royal Engineers, Royal Sappers and Miners, and the Commissariat Department and transport organs were not part of the British Army but of the Board of Ordnance. After the Crimean War, the Board of Ordnance was abolished and these units (with the Royal Sappers and Miners having been amalgamated into the Royal Engineers) and the Commissariat, stores and transport organs (re-organized ultimately into the Army Ordnance Corps and the Army Service Corps, both since amalgamated into today's Royal Logistic Corps), were transferred to the British Army. The Royal Artillery wore dark blue tunics. Red tunics were however retained by the Royal Engineers (the pre-Crimean War, officer-only Royal Engineers and the Corps of Royal Sappers and Miners, made up of other-ranks, originally wore blue jackets, but first wore red during the Napoleonic Wars), line infantry and most other units, including cavalry, except in India where drab coloured garments were introduced in 1848 and worn increasingly from 1857 on. Until 1873 the other ranks of most infantry regiments wore tunics in madder red. In that year the brighter shade of scarlet was adopted, having previously been limited to officers, sergeants and all ranks of certain regiments of cavalry. General issue of full dress uniforms ceased at the start of the First World War. The Household Division resumed wearing their scarlet and blue full dress in 1920, but for the remainder of the Army it was only worn by regimental bands, or else on certain limited social or ceremonial occasions (an example of the latter was the 1937 Coronation when mounted detachments from participating cavalry regiments were issued with full dress uniforms for the occasion). The reason for not generally reintroducing the distinctive full dress between the wars was primarily financial, as the scarlet cloth required expensive red cochineal dye. Not all Full Dress uniforms were (or are) scarlet. Historically, the great bulk of the British Army wore red or scarlet (with the Royal Artillery distinctive in blue). In the early nineteenth century, the success of élite Hungarian Hussars and Polish Lancers inspired the creation of similar units in other European armies, which also adopted their highly-distinctive forms of dress; in the British Army, these light cavalry uniforms were mostly dark blue. At the same time, the formation of regiments of Riflemen (who had always worn dark green rather than red, for reasons of camouflage) led to the full-dress use of "Rifle green" uniforms in Rifle regiments. Line Infantry regiments though invariably wore scarlet, as did heavy cavalry (with the exception of the Royal Horse Guards ('The Blues') and the 6th Dragoon Guards). Khaki In January 1902, the British army adopted a universal khaki uniform for home service wear, the Service Dress, after experience with lighter khaki drill in India and South Africa. The traditional scarlet, blue and green uniforms were retained for full dress and off duty "walking out dress" wear. Details of these colourful uniforms varied greatly between regiments and branches of the army. The early use of camouflage in the form of plain khaki reflected the exigencies of colonial war and the freedom allowed, and taken, by many of the officers who fought it. The adoption of khaki for active service resulted from the development of weapons of greater accuracy and range combined with smokeless powder during the late 19th century, making low-visibility on the battlefield a matter of priority. Battledress and camouflage In 1938, the British Army adopted a revolutionary and practical type of uniform for combat known as Battledress; it was widely copied and adapted by armies around the world. During the Second World War a handful of British units adopted camouflage-patterned clothes, for example the airborne forces' Denison smock and the windproof suit. In the late 1960s, the Disruptive Pattern Material (DPM) camouflage uniform was adopted across the whole of the British Army. It remained in service, with periodical updates, for the next 40 years. From 2009 it began to be replaced by a new Multi-Terrain Pattern (MTP) uniform. This "Personal Clothing System (Combat Uniform)" has been developed for use across the British Armed Services, making use of the latest in clothing technology. Unlike the different versions of DPM issued for use in different terrains, the new MTP kit is issued in just one version, designed to function effectively across a variety of terrains, meeting a need identified in recent combat experience. Headgear From the time of the New Model Army broad-brimmed Flemish hats were worn. After the restoration of the Monarchy in 1660 the Monmouth cap, a broad-brimmed, low-crowned felt hat, with one side of the brim generally turned up, was introduced. Then came the tall Flemish hat which developed into the low-crowned Carolina hat and the tricorne hat. During James II’s reign the grenadier cap was introduced for grenadiers. Scottish Highland infantry regiments from about 1763 wore feather bonnets. At the beginning of the 19th century the shako was introduced. In 1811 a lighter, smaller version of it was adopted. In 1816 an improved "Prussian" style of black felt shako with a glazed top was issued. This soon evolved into a shako much wider at the top and rather bell shaped. In 1844 the so-called Albert shako was substituted. However during the Crimean war it proved impractical for active service and the round, undress, Kilmarnock forage cap was worn by most of the regiments engaged. The Kilmarnock forage cap was superseded in kilted Highland regiments by the Glengarry bonnet in 1851. After the Crimean War a lighter shako, after the French style of the period, was introduced, and in 1868 the last model of British shako: smaller and tilted a little more to the front, was introduced. Cap comforters were introduced in the late 19th century as an informal working headdress. Following the Battle of Waterloo, all members of the newly named Grenadier Guards were permitted to wear the bearskin. This privilege had previously been restricted to the grenadier company of the regiment. In 1831, this distinction was extended to the other two regiments of foot guards (Coldstream and Scots) in existence at that date. Bearskins were subsequently adopted by the Irish Guards and the Welsh Guards when raised in 1900 and 1915 respectively. The Home Service Helmet was introduced in 1879 and the Foreign Service pith helmet was used in hot climates. During the early years of the 20th century the blue Field Service Cap, the Brodrick cap and the Slouch hat were all worn. In the First World War, a khaki Balmoral bonnet was introduced in 1915 for wear in the trenches by Scottish infantry. This came to be known as the "bonnet, tam o' shanter". The Brodrick cap was unpopular and was replaced in 1905, by a round khaki peaked cap used until the outbreak of World War II. In 1938 the Field Service Cap of the 1890s was re-introduced in a khaki version and during WWII it gave way to the General Service Cap. Cavalry regiments and the Tank Corps wore soft berets. After the war the beret proved a useful, practical and comfortable cap and is still used.
WIKI
Discovery's fourth-quarter revenue rises 11.5 pct Feb 27 (Reuters) - Discovery Communications Inc’s revenue rose 11.5 percent in the fourth quarter as the owner of Discovery Channel and Animal Planet benefited from higher advertising income from its U.S. networks. Discovery said on Tuesday its net loss was $1.14 billion or $1.99 per share in the quarter ended Dec. 31, compared to a profit of $304 million or 51 cents per share, a year earlier. Results included a $1.3 billion one-time goodwill impairment charge. Revenue rose to $1.86 billion from $1.67 billion. (Reporting by Sonam Rai in Bengaluru; Editing by Sai Sachin Ravikumar)
NEWS-MULTISOURCE
Polish mine detector The Mine detector (Polish) Mark I (wykrywacz min) was a metal detector for landmines developed during World War II. Initial work on the design had started in Poland but after the invasion of Poland by the Germans in 1939, and then the Fall of France in mid-1940, it was not until the winter of 1941–1942 that work was completed by Polish lieutenant Józef Kosacki. History In the pre-war period, the Department of Artillery of Poland's Ministry of National Defence ordered the construction of a device that could be helpful in locating duds on artillery training grounds. The instrument was designed by the AVA Wytwórnia Radiotechniczna, but its implementation was prevented by the German invasion of Poland. Following the fall of Poland and the transfer of Polish HQ to France, work restarted on the device, this time intended as a mine detector. Little is known of this stage of construction as the work was stopped by the Battle of France and the need to evacuate the Polish personnel to Great Britain. There in late 1941 Lieutenant Józef Kosacki devised a final version, based partially on the earlier designs. His invention was not patented; he gave it as a gift to the British Army. He was given a letter of thanks from the King for this act. His design was accepted and 500 mine detectors were immediately sent to El Alamein where they doubled the speed of the British Eighth Army. During the war more than 100,000 of this type were produced, together with several hundred thousands of further developments of the mine detector (Mk. II, Mk. III and Mk IV). The detector was used later during the Allied invasion of Sicily, the Allied invasion of Italy and the Invasion of Normandy. This type of detector was used by the British Army until 1995. An attempt was made to mount a version of the mine detector on a vehicle so that sappers would be less vulnerable. To this end "Lulu" (on a Sherman tank) and subsequently "Bantu" (on a Staghound armoured car) were developed. The detector mechanism was in non-metallic rollers on arms held away from the vehicle. When the roller passed over a mine or a similar piece of metal it was indicated in the vehicle. Prototypes were built but never tried in combat. Design The Polish detector had two coils, one of which was connected to an oscillator which generated an oscillating current of an acoustic frequency. The other coil was connected to an amplifier and a headphone. When the coils came into proximity to a metallic object the balance between the coils was upset and the headphone reported a signal. The equipment weighed just under 30 pounds [14 kilograms] and could be operated by one man. The Polish detector saw service throughout the war and the Mark 4c version was still used by the British Army until 1995.
WIKI
Number Crunching by Dr. Elizabeth Mitchell on June 11, 2011 Share: Nature: “Female australopiths seek brave new worldSmile, crunch the numbers, and make something out of nothing. Analysis of strontium isotopes in South African hominid teeth has provided enough material to get published in Nature, but it took some creative statistical efforts. This study analyzed tooth enamel from two different species of hominids and determined that they had gender-related cultural patterns similar to modern humans and chimpanzees. Minerals like strontium get concentrated in plants and the animals that consume them. The isotopes of strontium native to a particular location can thereby be permanently incorporated into the tooth enamel of children growing up there. Enamel from the teeth of eight Australopithecus africanus and eleven Paranthropus robustus skulls were assayed for strontium isotopes. All the fossils were from the dolomite valley caves of Sterkfontein and Swartkrans. Strontium isotopes from the fossils were compared to the strontium isotopes present in 170 plants and animals that live in the region today. On the evolutionary version of the human family tree, Australopithecus africanus and Paranthropus robustus are both considered distant relations of humans. The Austrolopithecus is supposedly on the branch that evolved into humans. The Paranthropus branch is considered an evolutionary dead end. Besides having different evolutionary destinies, these two non-human primates are believed to have lived at different times—2–3 million years ago and 1.2–2 million years ago, respectively. Big teeth were assumed to belong to males and small teeth to females. When the species were analyzed separately, no patterns were significant. However, when all the data was pooled, “about 90% of the larger teeth looked local, compared with less than half of the smaller teeth.” One researcher told Nature, “we did have to combine these samples in order to get a valid statistical result.”1 The group believes “the behavioural patterns of our primate relatives” will help us understand the evolution of the human family. “The females grew up somewhere else,” says archaeologist Julia Lee-Thorp. She adds, “It's a very small clue, but it's something that is at least hard evidence for what we really didn't have before.” Their enamel is then evaluated in comparison to isotope data obtained from modern flora and fauna—presumably unchanged over 2 million years. Thus, fossils that aren’t even believed by the evolutionists to be on the same “human track” of the evolutionary tree or to have lived at the same time are being lumped together. Their enamel is then evaluated in comparison to isotope data obtained from modern flora and fauna—presumably unchanged over 2 million years. From this information, we are expected to get some hints about the origin of the human families. This example illustrates that enough determined statistical gymnastics can make about any point you want. Some would call that a bit of a stretch. For more information: Remember, if you see a news story that might merit some attention, let us know about it! (Note: if the story originates from the Associated Press, Fox News, MSNBC, the New York Times, or another major national media outlet, we will most likely have already heard about it.) And thanks to all of our readers who have submitted great news tips to us. (Please note that links will take you directly to the source. Answers in Genesis is not responsible for content on the websites to which we refer. For more information, please see our Privacy Policy.) Footnotes 1. www.bbc.co.uk/news/science-environment-13609260M Newsletter Get the latest answers emailed to you or sign up for our free print newsletter. Answers in Genesis is an apologetics ministry, dedicated to helping Christians defend their faith and proclaim the gospel of Jesus Christ. Learn more • Customer Service 800.778.3390
ESSENTIALAI-STEM
GE Must Walk This Fine Line With Amazon, Microsoft, Tech Giants As General Electric ( GE ) looks to technology partners to build out its industrial Internet of Things business in the coming years, it has a fine line to walk between cooperation and potential competition. [ibd-display-video id=2461767 width=50 float=left autostart=true] For example, Microsoft ( MSFT ) will host GE's enterprise software solutions in the cloud starting in November. But Microsoft is also eyeing the industrial IoT, and CEO Satya Nadella said last year he wants the software giant to take the lead in creating digital platforms for industry . Meanwhile, GE has used Amazon ( AMZN ) Web Services as its preferred cloud provider, and began offering software development tools for industrial apps to be used on Apple ( AAPL ) iPads and iPhones. So, depending on the day, GE could be either friend or foe to the very companies it's tapping to grow its digital business on a global scale. And while that may be somewhat unusual for the industrial sector, it's par for the course in the tech sector, Khozema Shipchandler, VP and CFO of GE Digital, told IBD on the sidelines of last week's Minds + Machines event in San Francisco. "For a technology provider, it's a very familiar battlefield," Shipchandler said. "On certain days you're partners, on certain days you're competitors, on certain days you're customers, on certain days you're vendors. They're all mixed up, sometimes in the same deal." Shipchandler added that GE is cloud-agnostic - so it can serve customers on Amazon's platform or Microsoft's or GE's - and similarly expects tech companies will partner with its industrial peers. So far, that strategy is helping to rack up customers for its Predix platform, a set of core applications and cloud-based operating system designed to optimize the performance of the jet engines, wind turbines and other industrial equipment that the company makes and sells. Year to date, GE Digital has piled up $1.1 billion in Predix purchase orders, double the volume seen for all of 2016 and hitting its end-of-2017 target ahead of schedule, Shipchandler said. Shares of GE closed down 1.8% at 20.41 on the stock market today , marking a sixth consecutive loss amid continued fallout from the company's Q3 earnings report from earlier this month. Amazon climbed 0.9%, and Microsoft added 0.1%. RELATED : GE CEO Looks To Microsoft To Boost Digital Industrial Efforts GE Under Pressure To Cut Dividend After Slashing Cash Flow Outlook General Electric Trims 'Digital Revenue' Targets, May Sell Predix Stake The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
TYPO3 CMS TYPO3 Cms TYPO3 is a web application running on PHP,also known as CMS (Content management system). It's completely free of charge and it's released under the GNU General Public license.It runs on different OS platforms which gives TYPO3 a lot of versatility and flexibility. Along with other CMS Systems like Wordpress,Drupal or Joomla,TYPO3 has a lot of popularity among European Countries as well as around the world. Learning and Specializing in this CMS System is a great asset for your carrier especially if you live in German speaking countries such as Germany,Austria and Switzerland. What is the CMS (Content management system) ? The Content Management System or CMS is a software application used to manage editorial content without the expertise of a software developer. The CMS systems is designed to help content editors and publishers to be content oriented without caring to much about the technical difficult and boring stuff. If you have been using software like word or blogger you are probably familiar with this concept. TYPO3 took advantage of this concept to build a strong system with all the necessary tools to let you be in charge of the content.
ESSENTIALAI-STEM
Auditory processing Among the most common problems for autistic and other sensitive people is to have hearing- or auditory processing differences. AUDITORY PROCESSING DISORDER Auditory Processing Disorder (APD) (also known as (Central) Auditory Processing Disorder or (C)APD) is an umbrella term for a variety of disorders that affect the way the brain processes auditory information. It is not a sensory (inner ear) hearing impairment; individuals with APD usually have normal peripheral hearing ability. Wikipedia HYPERACUSIS Hyperacusis 1. Super-sensitive hearing. Being born with super-acute hearing may be not be a disorder at all but a modest ‘super-power’ – although it can of course be very frazzling on the nerves to hear so much more than others, in a world where perfect silence is practically non-existent. If it comes with general sensitivity to other sensory impressions, it is very likely a sign of just being a Highly Sensitive Individual, which is a natural genetic variation. “If I was trying to go to sleep and the television in the basement was on, even if the sound was off or no channel was being shown, I’d still be able to hear the high-frequency noise from it all the way from upstairs in my room. I’d go downstairs and turn that TV off, along with a fluorescent light that buzzed for some reason.” ‘NeantHumain’, male Aspie from USA If hyper-acusis occurs suddenly later in life, it may be an imbalance due to stress, illness, brain injury, ear infection etc., though probably more likely to happen to someone who already has above average sensibility to begin with. Tesla experienced this when stressing himself out at his first real job with the Budapest telephone company: “What I experienced during the period of the illness surpasses all belief. My sight and hearing were always extraordinary. I could clearly discern objects in the distance when others saw no trace of them. Several times in my boyhood I saved the houses of our neighbors from fire by hearing the faint crackling sounds which did not disturb their sleep, and calling for help. In 1899, when I was past forty and carrying on my experiments in Colorado, I could hear very distinctly thunderclaps at a distance of 550 miles. My ear was thus over thirteen times more sensitive, yet at that time I was, so to speak, stone deaf in comparison with the acuteness of my hearing while under the nervous strain. “In Budapest I could hear the ticking of a watch with three rooms between me and the timepiece. A fly alighting on a table in the room would cause a dull thud in my ear. A carriage passing at a distance of a few miles fairly shook my whole body. The whistle of a locomotive twenty or thirty miles away made the bench or chair on which I sat, vibrate so strongly that the pain was unbearable. The ground under my feet trembled continuously. I had to support my bed on rubber cushions to get any rest at all. The roaring noises from near and far often produced the effect of spoken words which would have frightened me had I not been able to resolve them into their accumulated components. The sun rays, when periodically intercepted, would cause blows of such force on my brain that they would stun me.” – Nicola Tesla, Hungarian-American inventor, in his autobiography My Inventions 2. Difficulty filtering out background sounds, e.g. in a class-room, at the cinema, or when having a conversation in a restaurant, party, mall or other public place. Two or more simultaneous conversations at the dinner table may also be a problem. Such a filtering difficulty is not at all strange if one has extra well-developed hearing… Yes, it can really be that simple! I’m sure that if someone with normal hearing would get a hearing aid and turn the volume way up, they too would find it very hard to filter out any of the massive collection of noises bombarding the ears at all times. This is what it’s like to have super-sensitive hearing. “I find it almost impossible to hear someone speak to me (even if they are right in front of me and are talking loud) when there is a lot of other background noise. I find myself reading their lips to try to ‘hear’ them. I feel like I am the only one with this issue… everyone around me can carry on conversations despite the noise – it seems to have zero impact on them.” Dan, Aspie “I have a difficult time concentrating on one person at a party.  It seems that everything filters in from all directions.  I can only focus on one person for a short amount of time before I have to move on because of all the distractions.” Anne Marie, ADHD/Aspie from USA “I have trouble filtering out background noise. I cannot stand the ticking of clocks and try to avoid them. Even my radio alarm clock has an annoying buzz which I have reduced by putting a folded towel under it. My computer has a constant noise, mostly a contended noise that I have gotten used to – I recognise it’s different noises, but I cannot filter them out.” Julie, Aspie from England 3. Difficulty decoding & recollecting verbally delivered information, especially several in a sequence. Difficulty discriminating between similar sounding words. This can be either a real hearing- or auditory processing disability, or simply being a visual-spatial or tactile learner. “I am a visual learner and find I need to picture a word in my mind in order to understand it. I hear words, but my brain then needs to visualize them in order to process them. I have been regarded as ‘slow’ because of this, but it is just a different way of learning.” Kitty, Aspie 4. Selective sound sensitivity. Hearing or enjoying only certain frequencies/types of sound, and having problems with others. People with hearing impairment often have such problems. “I hate talking on the cell phone!! Wrong sound, weird sound… I usually turn it off when it rings and send a text message instead, with the sound turned off! The click-sound drives me crazy, odd but little sounds are worse than loud ones. I love listening to Velvet Underground, Clash, Metallica etc., which get on other people’s nerves?” Janet, mom with ADHD traits from Sweden 5. Some seem to have super-acute hearing sometimes and appearing almost deaf at other times. (This I find more likely to be a real auditory processing difference, or a fluctuating filtering ability.) “Sometimes I just don’t hear people when they say something to me, and they take me as being rude.” NeantHumain’, male Aspie from USA Though sometimes the easy explanation is that the person is so absorbed by some especially fascinating train of thought or activity of interest that s/he is temporarily oblivious of the rest of the world. If so, this may indicate a super-ability to hyperfocus and/or being in an altered state. Males (and possibly women with male type brains?) tend to only use one hemisphere at a time when solving a problem or executing a task, so the hemisphere that processes language may just be’ offline’ at that particular moment. To not immediately respond to the voice of a parent, spouse or teacher when engaged in something, need therefore not necessarily be a hearing disorder or being deliberately neglectful or disrespectful; it may just be the way that person is wired. LINKS Auditory Processing Disorder Wikipedia Probable Causes for Hypersensitivity to Sound from AIT Institute The Efficacy of Auditory Integration Training review of studies on Berard type AIT Debbie Thorsos autistic artist with APD 7 Comments » 1. How very interesting! I’m doing some research regarding super-sensitive hearing in those along the autism spectrum and was pleased to find this post. I recently read about a woman with AS who told someone that NPR was airing a program about ‘X.’ while the radio was *off.* When they turned the radio on, NPR was on, and they were discussing that very topic! Of course, I can’t remember the book… • Actually, your latter example it not inclined with literal hearing. Humans can actually receive and emit other forms of waves or signals. 2. Eileen Vicente said, There are certain sounds that bother me to a point of insanity. For example, the constant barking of dogs, boom boxes, construction, people picking their teeth, chewing their nails, chewing loudly, and people walking, or jumping over my head in an apartment. It has made a lot of enemies for me, and it has also made my life a hell. 3. Mo Warren said, Yes! Nobody understands this dreadful affliction but those that have to go through this increasingly noisy life constantly ‘on edge’ waiting for the next onslaught. My particlar breaking point comes when construction work is going on in the vicinity- crashing, banging, shouting, grinding & beeping lorries. I moved to a supposedly quiet rural area thirty years ago but in the last ten years, everyone around has had property development in a continuous relay, chain saws are always whining, dogs barking, farmers shooting & children screaming. Twice I have attempted to take my own life – maybe third time ‘lucky’ I too have lost friends through my inescapable intolerance of noise & am cut off from ‘normal’ activities and considered a kill-joy by everyone. Ironically I have a deaf partner who doesn’t have any real appreciation of my problem. • M. Castillo said, I understand what you’re going through.I struggle with the same issues but please don’t take your life. Move to a quieter neighborhood if you’re able. • Just learn to adjust and adapt Mo. Your “abnormality” is rather helpful than it as an annoyance. Appreciate the silence within the noise. 4. K said, It can be lonely to go through life as a sensitive person in general, but in the case of this article, sensitive to sounds. The challenge I find is to be able to “fit in” without compromising or ignoring own uniqueness in this way. What are the boundaries and habits that should be set to protect oneself while opening possibilities for a full, enjoyable life? Does some of it have something to do with attaching to an identity of being “sensitive” and allowing it to take the best of oneself thereby making it more of a problem that it really is? Or is it wise to fight for one’s difference with certain requests from others, even if it would be more energy-consuming than trying to fit in and be “normal”? Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out / Change ) Twitter picture You are commenting using your Twitter account. Log Out / Change ) Facebook photo You are commenting using your Facebook account. Log Out / Change ) Google+ photo You are commenting using your Google+ account. Log Out / Change ) Connecting to %s %d bloggers like this:
ESSENTIALAI-STEM
We gratefully acknowledge support from the Simons Foundation and member institutions. Full-text links: Download: Current browse context: astro-ph.CO new | recent | 1509 Change to browse by: References & Citations Bookmark BibSonomy logo Mendeley logo Reddit logo ScienceWISE logo Astrophysics > Cosmology and Nongalactic Astrophysics Title:Quantum Primordial Standard Clocks Abstract: In this paper, we point out and study a generic type of signals existing in the primordial universe models, which can be used to model-independently distinguish the inflation scenario from alternatives. These signals are generated by massive fields that function as standard clocks. The role of massive fields as standard clocks has been realized in previous works. Although the existence of such massive fields is generic, the previous realizations require sharp features to classically excite the oscillations of the massive clock fields. Here, we point out that the quantum fluctuations of massive fields can actually serve the same purpose as the standard clocks. We show that they are also able to directly record the defining property of the scenario type, namely, the scale factor of the primordial universe as a function of time a(t), but through shape-dependent oscillatory features in non-Gaussianities. Since quantum fluctuating massive fields exist in any realistic primordial universe models, these quantum primordial standard clock signals are present in any inflation models, and should exist quite generally in alternative-to-inflation scenarios as well. However, the amplitude of such signals is very model-dependent. Comments: 41 pages, v2, minor revision: clarification remarks added, minor corrections, references added, to appear in the Journal of Cosmology and Astroparticle Physics Subjects: Cosmology and Nongalactic Astrophysics (astro-ph.CO); High Energy Physics - Phenomenology (hep-ph); High Energy Physics - Theory (hep-th) DOI: 10.1088/1475-7516/2016/02/013 Cite as: arXiv:1509.03930 [astro-ph.CO]   (or arXiv:1509.03930v2 [astro-ph.CO] for this version) Submission history From: Xingang Chen [view email] [v1] Mon, 14 Sep 2015 02:31:18 UTC (365 KB) [v2] Fri, 22 Jan 2016 17:25:40 UTC (370 KB)
ESSENTIALAI-STEM
What Investors Missed in the Market This Week Another trading week is in the books, with the S&P 500 and Dow Jones Industrial Average trading 1.5% and 1.9% higher, respectively. Despite the market rally, it wasn't a great week in terms of economic data, as GDP was reported to have increased a meager 0.7% during the first quarter, at a seasonally adjusted annual rate, according to the Commerce Department -- the weakest quarterly mark since early 2014. Take the report with a grain of salt, as these are always adjusted at later dates. With that aside, let's look at some companies boasting big moves, big earnings, or big headlines this week in the markets. Steel stock meltdown It wasn't a pretty week for shares of steel manufacturer United States Steel Corporation (NYSE: X) , which shed roughly a quarter of its market capitalization as its stock price imploded. Just a few months ago, the stock was on fire, in a good way, and nearly doubled from the moment Donald Trump was elected president through the middle of March. The movement higher was largely based on the hope that Trump's potential infrastructure plan would increase demand for U.S. steel. Since then it's been a consistent downhill trend, culminating in this week's implosion after the company's earnings disappointed its once hopeful investors. In terms of the financial results, revenue was up 16% during the first quarter to $2.7 billion, but despite a recent rise in metal prices, the company still posted a net loss of $180 million, or $1.03 per share. But perhaps the real issue for investors was that it is now painfully obvious U.S. Steel is behind some of its competitors with improving its operations and cutting costs. To that point, management noted that it's upgrading its equipment and other processes that will take three to four years -- causing some investors to throw in the towel or opt for a different steel company. Even Macquarie's once bullish analyst, Aldo Mazzaferro, had this to say, according to Barron's : "We reduce our rating to "underperform" from "neutral," and cut our target price to $18 from $30, after further assessing the damage to earnings from the planned [three- to four-year], over $1 billion asset-revitalization program to upgrade mills. Even after the sharp decline in the shares, we see further downside to $18." Not if, but when It seems management of the once popular and even profitable Sears Holdings (NASDAQ: SHLD) is just squeezing out as much time as possible before this slow-motion train wreck finally ends. In what's become a common theme over the past year, shares of the troubled retailer plunged by double digits multiple times this week and shed almost a quarter of its value. It all started last Friday, when Sears announced that its comparable-store sales have dropped nearly 12% since the beginning of the year. It followed that news up with another bombshell: Despite its cost cuts, its first-quarter adjusted EBITDA would check in with a $190 million loss at best, and it could be as bad as a $230 million loss. That's little to no improvement from last year's equally brutal $181 million loss during the first quarter. Keep Sears' adjusted EBITDA in mind when hearing that Sears ends up posting a positive net income during the first quarter, because that's solely due to the sale of its Craftsman business and other real estate transactions -- factors that are obviously unsustainable. Sears' increasingly inevitable bankruptcy isn't for lack of effort by its management team that has faced a nearly impossible task to turn around an outdated business model in many crumbling mall locations with outdated stores. Despite the tall task, though, management isn't sitting idle and announced on Monday that Sears would close 50 Auto Centers and 92 Kmart pharmacies -- this is in addition to the earlier announcement of 150 store closings. Businesses com and go, and what once was a booming retailer is now facing its inevitable demise. It seems not a matter of whether it happens, but when. A step in the right direction Let's end this weekly recap on a bright note from an often forgotten automaker that's also faced its fair share of doom and gloom: Fiat Chrysler Automobiles (NYSE: FCAU) . There are plenty of things FCA needs to work on, but one thing it does well is sell popular Jeep SUVs and full-size Ram Trucks. Thanks in large part to those two brands, the company's net revenue checked in 4% higher during the first quarter, with its adjusted EBIT up a more impressive 11% to $1.67 billion. Those results were enough to top analysts' estimates and set a first-quarter record for Detroit's third largest automaker. Perhaps even more impressive is that it sent the company's stock up roughly 11% on Wednesday, after investors digested the information -- impressive because the stock had already rallied significantly since Donald Trump won the election. Outside its very profitable and high-volume-selling Jeep and full-size truck products, there was another impressive development: FCA's high-end luxury Maserati brand has started gaining some serious traction on the bottom line. For context, during last year's first quarter, Maserati generated a modest 1.1% of FCA's total adjusted EBIT. This year, thanks to an 89% increase in shipments and an 820-basis-point improvement in margin, its adjusted EBIT soared 569%, from 16 million euros to 107 million euros. FCA, which is often an afterthought with Detroit automakers, posted a strong enough quarter to warrant its recent rally and give investors hope that its Maserati brand can also help fuel a companywide turnaround. 10 stocks we like better than Fiat Chrysler Automobiles When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor , has tripled the market.* David and Tom just revealed what they believe are the 10 best stocks for investors to buy right now... and Fiat Chrysler Automobiles wasn't one of them! That's right -- they think these 10 stocks are even better buys. Click here to learn about these picks! *Stock Advisor returns as of April 3, 2017 Daniel Miller has no position in any stocks mentioned. The Motley Fool has no position in any of the stocks mentioned. The Motley Fool has a disclosure policy . The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Talk:Kicking Against the Pricks Muddy Water The song Cave covered was written by Phil Rosenthal (musician) and first recorded by The Seldom Scene. Some sources credit John Bundrick, who wrote a different song with the same title. Design 05:08, 24 March 2006 (UTC) The Hammer Song(s) * "The Hammer Song" is not to be confused with the song of the same name from the 1990 Bad Seeds album The Good Son. Nor, presumably, with The Weavers' "The Hammer Song", better known by its later title "If I Had a Hammer". The Bad Seeds' homonymous number is by Nick Cave. --Thnidu (talk) 20:11, 7 August 2015 (UTC) 'the carnival is over'/tom springfield frank farian's name has been attached as a co-writer on the basis that he furnished boney m's new male vocalist with an additional verse, which was later dropped. out of respect for tom springfield & the certainty that nick cave did not sing this extra verse, I am removing farian's co-credit from this article duncanrmi (talk) 13:55, 27 August 2022 (UTC)
WIKI
Gladstone and Disraeli In Opposition British political life in the latter half of the nineteenth century was dominated by two very diverse characters: William Ewart Gladstone (1809 – 1898) and Benjamin Disraeli (1804 – 1881). During their long political careers, each served as Chancellor of the Exchequer and Prime Minister. Gladstone’s enduring time in politics earned him the title of Grand Old Man, abbreviated to G.O.M., although cynical rivals claimed the initials stood for “God’s Only Mistake”. Witty Disraeli has been credited with coming up with this version. Whoever coined it, it’s a good indication of the vitriolic rivalry between the two. Disraeli is also credited with saying “If Gladstone fell into the Thames, that would be misfortune; and if anybody pulled him out, that, I suppose, would be a calamity”. He certainly called Gladstone an “unprincipled maniac”, and said he was “an extraordinary mixture of envy, vindictiveness, hypocrisy and superstition”. Gladstone’s response is apparently unrecorded, and perhaps that’s just as well. Disraeli’s Jewish father, Isaac D’Israeli, had joined the Church of England in 1813, when Benjamin was still a child, and Benjamin Disraeli was baptised as a Christian in 1817. His family was a well-educated and literary one. Ambitious Disraeli brought flair and oratory to British politics. William Ewart Gladstone was born in Liverpool of Scottish parents, and his wife was Welsh. His constituency was in Scotland. With this combined social and political background, Professor H.C.G. Matthew of Oxford University describes him as becoming “that very rare phenomenon, a fully ‘British’ politician”, in the sense his connections extended all over the island of Britain. There was more to the Gladstone family than this. Gladstone’s father John owned slaves and his plantations were the source of most of the family’s wealth. John Gladstone’s Demerara plantation, known as “Success”, was the focus of the outbreak of the Demerara rebellion of 1823, which revealed the horrific conditions of the enslaved people on the plantations to the wider public. This ultimately resulted in the Abolition of Slavery in the British Colonies Act of 1833. The family wealth meant that William Gladstone’s education took the standard course of the comfortably-off: preparatory school, Eton, and Christ Church College Oxford. Disraeli, on the other hand, much regretted that his parents had not sent him to Winchester College like his brothers, and found his partly private, partly minor school education inadequate. He struggled with various careers and activities in his early years, turning to writing to clear his debts, and falling in and out of friendship with publishers and several kinds of radical politics along the way. Sponsorship by the Tory politician Lord Lyndhurst sealed his political fate as a conservative. It’s tempting to portray the subsequent relationship between the two politicians as the ultimate match between political rivals, like the thus far mythical cage-fight between Elon Musk and Mark Zuckerberg. “Inna yellah cor-nah for the Liberals! My lords, ladies, and gentlemen, the-ah Grand-ah Old-ah Maan! I give you the People’s William, Mistah W. E. Gladstone! And inna blue cor-nah for the Conservatives, the 1st Earl of Beaconsfield, Queen Vicky’s favourite, Mistah Benjamin Disraeli!” Jim Dixon, the protagonist of Kingsley Amis’s novel Lucky Jim, divided the world into two groups: people he liked, and people he didn’t. Queen Victoria might have appreciated these categories, although she probably wouldn’t have approved of Jim’s wild, drunken behaviour. In much the same way as Dixon, Victoria divided her prime ministers up into those she liked, and those she didn’t. After a wobbly start, Disraeli was firmly ensconced in the former group, and Gladstone categorically in the latter. “He speaks to me as if I were a public meeting!” sniffed Queen Victoria disapprovingly, most unamused by Mr Gladstone’s manner. “When I want to read a novel – I write one,” said droll Mr Disraeli, angling for a place in the “Great Wits of the Nineteenth Century” club. It’s unlikely that Queen Victoria greeted his bon mot with a dig in the ribs and a shriek of “Ooh, Mr Disraeli, you are a card!” but she may have allowed herself an amused smile. After an initial chill in the relationship due to Disraeli’s treatment of Prime Minister Robert Peel, In Victoria’s eyes delightful Mr Disraeli could do no wrong. After all, he was an enthusiastic supporter of the British imperial project, and did he not make her Empress of India with his act of 1876? As for Gladstone…that annoying old bore with his booming voice and his habit of churning out dull pamphlets on politics and the classics and religion…not to mention that really quite unusual obsession with “rescuing” fallen women… Privately, Disraeli told Matthew Arnold that “Everybody likes flattery; and, when you come to royalty, you should lay it on with a trowel”. It certainly didn’t do any harm in his relationship with Victoria. And so, the stage was set for a clash of political cultures and personalities. The antagonism began in earnest when Gladstone was still a member of the Conservatives, and gained office under his mentor Sir Robert Peel (1788-1850) in 1841. Disraeli, having shown great commitment and potential to the party, was overlooked, and although he continued to support Peel for several years, ultimately he would oppose him. This would lead to a major schism in the Tory party, and accusations from Gladstone and other members that “Dizzy” was responsible for its destruction. Benjamin Disraeli in the Houses of Parliament Given the dominance of Gladstone and Disraeli in nineteenth century politics, and the focus on their personalities, it’s all too easy to forget that these were politicians whose decisions were literally matters of life and death for populations across the world. One such concern was the repeal of the Corn Laws, a divisive issue for the Conservatives. The Corn Laws were instituted in 1815 as a means of protecting Britain’s landowners by setting high tariffs on imported grain, so that the British producers could control production and distribution of British cereals, and maintain their profits. In 1845, the arrival of the first of several devastating blights destroyed most of Ireland’s staple, the potato crop. Within a very short space of time, people in Ireland were starving and desperate. Prime Minister Peel took what is viewed as a principled stand, and a courageous one given his reliance on support from the Tory landowners, to repeal the Corn Laws in order to make cheaper food available for Ireland. In this he was opposed by Disraeli, Lord George Bentinck, and the landowners. Disraeli had argued for understanding between the British working class and the landed class, and believed that an enfranchised working-class would naturally vote for its existing rulers, whom he said he also was naturally drawn to support. However, the Great Famine in Ireland, which would today be viewed for what it was – a humanitarian crisis – became embroiled in the political game. Absentee landlords exacerbated the situation by continuing to demand – and obtain – their rents, so that the crops raised in Ireland by their tenants were sold to Britain in order to pay their debts. The crisis deepened, and people starved to death. The outcome of this was not only a lasting division in the Tories between Peelites and Protectionists, but also a lasting antagonism between Gladstone and Disraeli on numerous issues, from Irish Home Rule to Disraeli’s imperial policies. After Gladstone joined the Liberal party and became its leader, they fought over conflict in the Balkans and the issue of the Suez Canal, over maintaining peace in Europe at all costs and over attitudes to ritual in religion. Gladstone’s awkward character and tendency to preach couldn’t match Disraeli’s eloquent discourse. Disraeli’s literally dizzy attitude to finances couldn’t match Gladstone’s undoubted head for figures and governmental fiscal management. William Gladstone at the despatch box Was the Gladstone-Disraeli “feud” really so intense, or was at least some of it overemphasised or even manufactured? They were perhaps not so politically, or even personally divergent as history has suggested. Both had politically conservative roots but were capable of support for both radical and conservative causes. Both had been intended for careers in the law. Both were committed to the established Protestant Church and Gladstone had considered a career in the Church at one point. Both were prolific writers who depended on their very different ways with words for their incomes at various times. Historians of the period recognise them equally as great personalities of the Victorian age, despite their differences and inevitable errors of political judgement. And perhaps both would have agreed that the authority, influence, and historic legacy of two such different characters emphasises the important role of diversity in British politics. Churchill argued that the rivalry between Gladstone and Disraeli transformed British politics and led to reform. However, it might equally be argued that the personal animosity between the two overrode more measured judgement when it came to making decisions either for the good of the country or the wider world. There’s an irony in Gladstone, the man from the wealthy, privileged background becoming known as a people’s champion. There’s an equal irony in Disraeli, the political outsider who would not have been able to take office due to being Jewish had his family not converted, becoming the ultimate upholder of traditional British monarchy and imperial ambition. Both were ultimately consummate career politicians. In retrospect, it is also interesting that Liberal party Prime Minister William Gladstone’s legacy is much more controversial than that of Disraeli, the unlikely political outsider and Conservative. In 2023, the descendants of John Gladstone, William’s father, made a public apology for their ancestor’s involvement in enslaving African people. Although opposed to slavery later in life, William Gladstone did not support abolition earlier in his career, and helped to ensure that his father was compensated with £106,000 on the passing of the Slavery Abolition Act 1833, the equivalent of £11,000,000 In 2023. Gladstone later fell out with his father over the issue of slavery and took action to bring the slavery that continued in the Americas to an end. He admitted late in life that this was one of the issues on which the anti-slavery majority had been in the right and the ruling classes wrong. A further Gladstone controversy arose in 1927, when Wright versus Gladstone hit the headlines. A journalist, Peter Wright, published a book of essays in which he described Gladstone as having founded “a great tradition since observed by many of his followers and successors with such pious fidelity, in public to speak the language of the highest and strictest principle, and in private to pursue and possess every sort of woman”. This was a not very subtle comment on Gladstone’s famous tendency to rescue women from the streets. Gladstone’s surviving sons Viscount Gladstone and his brother Henry, both in their 70s at the time, took legal advice and ultimately action against Peter Wright. Although technically it is not possible to take legal action for libel against a dead person, the Gladstone brothers, by employing one of the nation’s leading barristers (and committed Liberal) Norman Birkett, achieved a remarkable outcome. To support the brothers’ case that William Gladstone’s memory and reputation had been unjustifiably damaged, even Lily Langtry was sufficiently incensed to send a telegram from her retirement in Monte Carlo: “Strongly repudiate slanderous accusations by Peter Wright”. The jury concluded that Wright had done wrong, and William Gladstone’s moral reputation remained untarnished. Norman Birkett counted this one of his most successful cases. Peter Wright apologised, and the case ended amicably enough. Perhaps the courtesan Catherine Walters, better known as Skittles, might have had a word or two to say had she still been alive, since Gladstone had been in the habit of regularly taking tea with her. However, Skittles was known for her discretion. Finally, it is worth pointing out that both politicians ultimately benefitted from the fact that their careers were built, like those of late twentieth century politicians, in the reign of a resolute, long-lived monarch. The popularity of Queen Victoria, like Queen Elizabeth II, ultimately outlasted those of the politicians. After all, during her reign Victoria saw nine Prime Ministers come and go, and Elizabeth no fewer than sixteen! By Dr Miriam Bibby. Dr Miriam Bibby is a historian, Egyptologist and archaeologist with a special interest in equine history. Miriam has worked as a museum curator, university academic, editor and heritage management consultant. Published 31st August 2023
FINEWEB-EDU
By: Meteorologist Courtney Steimann Updated: Feb 26th 2019 Courtney's Cloud Corner: Cumulus Clouds Many things to say about these clouds, but boring are not one of them.  This clouds looks as if cotton candy or cotton balls have been lifted up in the sky. It can put our imagination to the test and transform into different animals or shapes. Need an excuse to go outside? These clouds provide great entertainment for all. They can also form Cumulonimbus clouds. These clouds are called Cumulus Clouds. Cumulus Clouds are low level clouds that are formed during diurnal convection. For when the surface is heated from the sun during the day, Cumulus clouds can be created. They are formed when warm air from the surface rises, cools, and the water vapor condenses into a beautiful cloud. They are usually small “puffy” clouds that are brilliantly white.  As these clouds grow in size, the base can appear darker than the rest. This is because of light from the sun is scattered when it passes the water droplets within the cloud.  If there is enough moisture and heat to help the convection, Cumulus clouds may grow into Cumulonimbus clouds and produce rainfall. Of course Cumulus clouds can be seen in higher levels in the atmosphere. Altocumulus clouds are mid-level clouds, and cirrocumulus clouds are high level clouds. Although, no matter what the altitude is, the cumulus clouds will always remain pleasing to the eyes. 
ESSENTIALAI-STEM
Latest Activity code On base views created from query with parameters-how can we pass the parameters from a subquery in where statement I have created a base view from query which contains parameters that I need to pass in order to get the result set. Base view name is bv_root_table. Parameter for the base view that is required that we pass is AccountID field. I am trying to execute a... Invalid query in create base view from query View without search methods baseview created from query Parameter Subquery code Subqueries in the WHERE Clause of the Query unable to find the table Hello, I have added multiple tables in the view and joined all those tables. In the WHERE CONDITIONS, I have written something similar to this: A IN (select A from TABLEA where TABLEA.A=TABLEB.A ). It has been validated successfully, but when I want t... Subquery code A subquery is not delegated to the source and facing a timeout In this, the subquery is not delegated to the source because it is executed from dual(). when we execute this full query, it is loading more than 2ml records first (Reason for query timeout) and then it applies the subquery logic in where conditi... denodo7 subquery code Building derived views that originally have subqueries in them I have a query that I'm trying to build the logic for as a derived view. Basically, translating my view that is on a DB to Denodo as a Derived View. Trying to figure out that if we have a subquery in the from or where clause, do we have to create anoth... Denodo 8.0 Subquery Derived views code FETCH or LIMIT in a Subquery Are you not able to use FETCH and/or LIMIT in a subquery? This query throws an error - Syntax error: Exception parsing query near 'LIMIT' SELECT a.* FROM view1 INNER JOIN (SELECT joinval from view2 ORDER BY joinval DESC FETCH FIRST 3 ROWS ONLY) AS vie... FETCH LIMIT Subquery code Subquery giving an error Hi I have a VQL query as follows: SELECT * FROM bv_getlistdata WHERE sessionhandle = '123456' and token = (SELECT requesttoken FROM bv_request) The view bv_getlistdata has 2 parameters sessionhandle and token and the bv_request view has a single ou... subquery code Delegate SQL Sentence as Sub Query not passing to source Hi, I created base view from SQL stored ptocedures. Function have 2 mandatory parameter. When where clause for 2 mandatory field and on additinal field. then manadatory field is filtered by source. But additional field is filtered by Denodo. My Quest... subquery Execution plans Stored Procedure derived view code Subqueries cannot be included in a SELECT clause Hello, Denodo isn't allowing a subquery to be included in the SELECT clause. Is there any alternative for this? Thanks, Hemant subquery code SELECT DISTINCT Doesn't work in subquery Hello, Whenever I try running a subquery with SELECT DISTINCT I get the following error message: Query Execution failed Reason: SQL ERROR -50006 [HY000]: Error executing view: Functions min, rank are not executable I'm not sure why this is hap... subquery Distinct code Search methods and subquery I am using a webservice source in which I have a parameter in the connection definition. I would like to obtain value(s) for this parameter from another view using a subquery. However during excecuting the whole query an error mesage pops up indicating... subquery search methods parameter
ESSENTIALAI-STEM
Page:Philosophical Transactions - Volume 002.djvu/213 Owners were very apt to stumble in the day-time, if it were bright and Sun-shine, but travell'd very well and securely in the evening, and in dark, cloudy weather. What the cause may be of that fungous Excrescence, or why Horses are peculiarly obnoxious to it, or what kind of Horses most, I have not considered. But, I cannot think, it comes from (training in great draughts and races, or from hard travel, because I have seen very large Spunges (as I may call them) in young Horses eyes of 2 and 4 years old, before they were backed; which, after they have been taken up from Grass, and kept with dry meat, have very much abated, and afterwards being turn'd to grass in the Spring to cleanse and cool their bodies, have increased again to the wonted bigness. But whether it were from their moist Feeding, or holding down their heads to eat (whereby there might be a greater deflux of humours to that part) I cannot determine. But for as much as there are few Horses quite free from this evil, and many render'd very inconsiderable by it, I will recount the most remarkable Cases, which make Horses most useless and suspected. 1. The more and greater those Excrescences are, the more the pupil of the Eye or the Sight is in danger of being quite obstructed; which you may farther examine by turning the Horses eye to the light, and observing how much of the pupil they do obstruct. 2. These Spunges on the upper edge of the Uvea are apt to grow the largest, and hinder the Sight most. 3. That which grows on the middle of the Uvea, does more hinder the fight by diffracting the Object, than that, which grows in either Corner or Angle of it. As for the Cure, I suppose there can be none expected, but from a drying kind of diet; though perhaps outwardly something may be devised to shadow the Eyes, and keep them from being nakedly expo&d to the Sun, whereby the pupil will not be so closely contracted, and consequently the Sight not so much obstructed. An
WIKI
Wikipedia:Articles for deletion/David Heymann The result of the debate was keep. Mailer Diablo 12:33, 3 April 2006 (UTC) David Heymann An associate professor of architecture who fails WP:PROF. Only possible bit of fame is designing a house for George Bush. Seems to be part of a "Get as Many UTexas People in Wikipedia as You Can" campaign. Calton | Talk 04:20, 29 March 2006 (UTC) * Keep - subject is a notable architect who has designed the house at Prairie Chapel Ranch for the current President of the United States. Article was just created today as a stub and has not had much time for expansion. I'm not sure what the nominator has against people who attended a certain university. Johntex\talk 04:25, 29 March 2006 (UTC) * I have something against alumni of any university blindly using Wikipedia to promote their alma mater. Was that clear enough, or are you going to twist those words, too? * And as for his big commission: it's a HOUSE: not Fallingwater, not Dumbarton Oaks, not Monticello, just a McMansion for the President. You misuse the word "notable". --Calton | Talk 04:33, 29 March 2006 (UTC) * Are you implying that I am blindly creating articles? If so then you are mistaken. His name was redlinked in another article, he seemed notable to me, so I made a stub. You are free to disagree with me about whether he is notable or not, but I think you are violating WP:CIVIL by accusing me of having anything other than the best interests of Wikipedia in mind. Johntex\talk 04:39, 29 March 2006 (UTC) * ...but I think you are violating WP:CIVIL As opposed to your extremely civil and fact-free accusation that I hate UTexas people. Uh huh. Consistency not a virtue in Texas? * Maybe "blindly" was a poor choice of words. Promiscuously? Thoughtlessly? Without regard to actual encyclopedic merit? * Perhaps you should acquaint yourself with WP:PROF and ask yourself how this guy overcomes the "average professor" test, or even the "average architect" test. --Calton | Talk 04:48, 29 March 2006 (UTC) * WP:PROF does not now, nor did it ever, represent consensus. Wikipedia doesn't even have an "average Pokemon" test. Monicasdude 04:59, 29 March 2006 (UTC) * That's weird: you often refer to a non-existent "Air Force Amy" test, but have trouble with an actual guideline? --Calton | Talk 05:25, 29 March 2006 (UTC) * WP:PROF isn't a guideline; it's mentioned on a guideline page only as a proposal, and if you bothered to follow the link to the proposal itself, you'd see that the version you favor has been rather solidly rejected, and the existing proposal (still under development) is quite different. As for Air Force Amy, I cite the recent Afd as a precedent (as other editors cite previous AfD decisions), and don't pretend that that there's a consensus WP:Air Force Amy policy or guideline. Monicasdude 14:56, 30 March 2006 (UTC) * Not only does WP:PROF not represent consensus, the nominator has not even produced any evidence that Heymann fails the so-called test. Johntex\talk 05:07, 29 March 2006 (UTC) * It's called a "standard" -- they DO have standards in Texas, right? -- and it's widely accepted as such, no matter how much handwaving you and Monicasdude do. More to the point, as a standard for article creation, it's not up to me to prove anyone fails it, it's up to you to prove he passes it -- or are tests done differently in Texas? --Calton | Talk 05:25, 29 March 2006 (UTC) * It's not a matter of how things are done in Texas, its a matter of how they are done on Wikipedia. The deletion process states "When in doubt, don't delete" In other words, the default position is always to keep the article - the burden of proof falls to anyone who wants it to be deleted to achieve at least rough consensus to do so. And I notice that once again you make a gratiuitous comment about Texas, rather than sticking to the substance of the issue at hand. Perhaps that is because there is no substance to your nomination for deletion? Johntex\talk 05:45, 29 March 2006 (UTC) * Keep per Johntex. Roy boy cr ash fan [[Image:Flag of Texas.svg|30px]] 04:26, 29 March 2006 (UTC) * Actually, I created the article with info from another Wikipedia article, which may have been out of date. According to this he is now an Associate Dean - I'm still investigating. Johntex\talk 04:29, 29 March 2006 (UTC) * Hey, an assistant academic bureaucrat! That's notable! --Calton | Talk 04:48, 29 March 2006 (UTC) * Keep per Johntex. Nomination appears to be part of a "Get as Many Academics Out of Wikipedia as You Can" campaign. Monicasdude 04:52, 29 March 2006 (UTC) * Keep per John and MD. I warn Calton to be civil and comment on content not contributors (or their origins or affiliations). We have to remember that Wiki is not paper. There is an article about something that he helped to design and build. He certainly merits this article about him. — Scm83x hook 'em 05:57, 29 March 2006 (UTC) * Weak Keep - there doesn't seem to be a perfectly applicable policy here, but being selected by the President to design a house does seem to imply greater notability than the average professor. --Hyperbole 08:09, 29 March 2006 (UTC) * Delete Neutral - see comment Far more notable professors have been cheerfully deleted. Only conceivable reason to keep is that he designed a house for a notable person but notability is not contagious. Dl yo ns 493 Ta lk 09:29, 29 March 2006 (UTC) * Comment His publication list seems non-existent - he's a good teacher who built a house. Keeping him as a professor would set a whole new standard for professors. He not only fails the average professor test, but probably fails the fourth quartile professor test! If he's to be kept, it can only be as an architect. I've moved some material around in the article to reflect that. Also removed some personal details which, while verifiable, have no relevance to his notability. Dl yo ns 493 Ta lk 15:24, 30 March 2006 (UTC) * Delete, as per Dlyons493, who beat me to it. :-) A U.S. president's doctor or personal attorney would not qualify for an article either, if that is their only claim to notability. -- Kjkolb 09:46, 29 March 2006 (UTC) * No, their attorney would automatically qualify, not sure about their doctor, but their archetect probably not. JeffBurdges 12:36, 29 March 2006 (UTC) * I don't think their attorney would qualify. By "personal", I meant someone who does an occasional will or trust or something, not someone who defended them in criminal/civil court or sued people on their behalf (even then, I think the case would have to be significant for an article, though). -- Kjkolb 13:53, 29 March 2006 (UTC) * Keep per johntex ⇒ SWAT Jester [[Image:Flag_of_Iceland.svg|18px|]] Ready Aim Fire! 10:39, 29 March 2006 (UTC) * Weak delete He's an associate dean, a plus. OTOH, I can't find his publication list and his award is only for teaching excellence, and hence not relevant to notability. JeffBurdges 12:34, 29 March 2006 (UTC) * I'll change my vote to abstain or keep if his publication list looks half way decent. JeffBurdges 12:36, 29 March 2006 (UTC) * Weak keep, none of the little bits taken alone would satisfy notability, but it seems that when you put it all together he makes the cut. --Deville (Talk) 12:38, 29 March 2006 (UTC) * Weak Keep, article does asserts some notability. --Ter e nce Ong 13:46, 29 March 2006 (UTC) * Delete profcruft, pure and simple. At some point, we need to weed all these minor prof entries out pour encourager les autres. Eusebeus 14:07, 29 March 2006 (UTC) * Neutral , he's looking at the notability bar at eye-level through those pretty glasses of his. Get some more impressive press coverage about the house-building thing than "cowboysindians.com" and for Wiki's sake he must have something decent on his publication list, he might sneak over. Dei zio 17:24, 29 March 2006 (UTC) * Keep, as an great example of what should be done when you think something should be kept. "The Heymann Standard" perhaps... Dei zio 20:27, 30 March 2006 (UTC) * Comment I'm still researching the subject of the article. There are a lot of Google hits to wade through. I've expanded the article today with an another award he earned and press coverage on another commission - an interpretive visitor center for the Audubon Society. Johntex\talk 17:29, 29 March 2006 (UTC) * Keep This is a well-sourced good little article. As well, if the President of the United States asked an academic to prepare a report that would well and truly establish notability in my book. The President of the United States asking a Professor of Architecture to design his ranch falls under the same category. It is now a notable building in its own right for all sorts of reasons and we have an article on it at Prairie Chapel Ranch. Capitalistroadster 19:32, 29 March 2006 (UTC) * Delete non-notable, per discussion above. Fishhead64 19:39, 29 March 2006 (UTC) * Delete The client he designed the house for may be notable but that does not make him so. Nigelthefish 20:33, 29 March 2006 (UTC) * Comment the article now details 5 awards he has earned. I've also added several other press citations. I'm still working through the Google hits on this guy. Johntex\talk 20:43, 29 March 2006 (UTC) * Keep. Very good treatment of this architect and academic. Thanks to Johntex for his work on this. -- JJay 22:56, 29 March 2006 (UTC) * Merge into Prairie Chapel Ranch. The house may be notable, but I don't see any evidence that its architect is, other than the fact that he designed the house. Fagstein 04:15, 30 March 2006 (UTC) * Keep- Verifiable and notable, imo. --Gurubrahma 05:09, 30 March 2006 (UTC) * Comment - It should be noted that I have just completed migrating all of the external links to ref|ref style notation. This article actually has more references than some FAs I've seen out there. This certainly indicates verifiability and notability. — Scm83x hook 'em 05:23, 30 March 2006 (UTC) * Thanks Scm83x. Your changes and those of Dlyons483 have made a big impact to the article. It is very much improved today compared to when this process began:diff Johntex\talk 17:18, 30 March 2006 (UTC) * Keep The structure designed for Bush is more notable than just being for a president. The environmental design features incorporated into the structure are also noteworthy. As for the architect himself, he has received other honors aside from the presidential commission and other assignments worthy of note (e.g. Audubon). I am surprised this article is up for deletion consieration...must be some politics going on that i dont know about. Covalent 18:38, 30 March 2006 (UTC) * Comment have a look at the original article and see how much it's changed - Johntex has put a lot of work into it. It was perfectly reasonable, in my view, to put the original article on AfD - it was focussed on his work as a professor (which he's good at, but not especially notable for). Dl yo ns 493 Ta lk * The article was prodded shortly after creation and was nominated for deletion six minutes after objection from Johntex, an experienced user and the article creator. No attempt at dialogue was made by this nom on the article talk page. That neither seems reasonable to me or very in keeping with WP:AGF. -- JJay 22:28, 30 March 2006 (UTC) * I hadn't looked at the timings - certainly more time would have been appropriate (and a little more tact wouldn't have gone amiss) Dl yo ns 493 Ta lk 22:53, 30 March 2006 (UTC) * Keep. Teachers, no. Professors, yes. Also, passes WP:KIT. — 0918 BRIAN • 2006-03-31 01:54 * Keep. I agree with Brian. According to the Pokemon test, he's notable. bogdan 19:05, 31 March 2006 (UTC)
WIKI
Henry Taylor (boxer) Henry Taylor (born 1914, date of death unknown) was an American professional boxer. He was born in Philadelphia, Pennsylvania. Taylor's career spanned from 1932 to 1946. During this time, he had 18 professional bouts, winning 9 (3 by knockout) with 7 losses and 2 draws. He has the distinction of having defeated former heavyweight world champion Jersey Joe Walcott. The pair had two bouts: Walcott won the first, a TKO in the first round and Taylor won their second meeting, just over 3 months later, by a 6-round points decision.
WIKI
Draft:Chill Vibes chill vibes was created by aminx (aminx wont be important for the most part. just the founder of it ) this server was made in 8/28/23 Backstory: the beginning: somhi the co owner of it invited a few members and one of them was a little mad about somhi seeing the bots in his server and taken them despite not any of them owning it. they banned him afterwards and Atyeb joined and made the server 10X better wtih a new font and a lot more channels. aminx did find a CHILL VIBES logo and decided to make that the logo for the server. known members: ( note: these arent their actual usernames in DC. and in the time of writing this they might change. so please edit it! 6/13/24 ) Ffrontier: Joined in 8/28/23. lost his main account and joined in another. was known for being sans and is now sonic to "hide" his identity. makes a lot and i mean it. a LOT OF EDITS. role: mod + Theffrontier ( custom ) Atyeb:joined in 8/29/23. biggest hater to me. never adds any of my suggestions :sobbutcringe: but responsible for making the server 10X better with a new font and a lot of channels. role: Co owner Somhi: joined in 8/28/23. my boy. gave me the story writer role. so its my responsibilty to make this wiki page!! role: owner merton: joined in 9/1/23. loves undertale and chara. Role: Megalomaniac & soul shatters master ( custom ) herobrine ( clover ) : joined 3/15/24. just someone who loves pizza tower and undertale yellow role: member Esca: joined in 9/7/23. me and kay summoned him. and now he is kinda active role: king of axolotol ( custom ) Lunaris: joined in 4/30/24. nothing to say about him really. but im the guy who invited him. role: member Kareem: joined in 9/3/23. he is 12 :skull: but he is active role: member such a silly car: joined since 9/6/23. a chill guy in chill vibes ( get it ). roles: dovahkin & og ( custom ) kay: joined in 12/28/23. cool guy. role: Og ( custom ) 2023: this is about the first 4 months of this server being up. september: Raids: Events: the future:𝙏𝙝𝙚 𝙀𝙣𝙙: thanks for viewing this unfinished wiki article about chill vibes! this wont end till the server does ('; i always liked chill vibes! and it was nice to make an article about to make these memories archivable! you can edit this to add extra details or remove some unwanted ones! ( note: yea ik i just added a few stuff and the rest is erased. mostly due to inknowledge)
WIKI
PubAg Main content area Anaerobic cometabolism of fruit and vegetable wastes using mammalian fecal inoculums: Fast assessment of biomethane production Author: Islas-Espinoza, M., de las Heras, A., Vázquez-Chagoyán, J.C., Salem, A.Z.M. Source: Journal of cleaner production 2017 v.141 pp. 1411-1418 ISSN: 0959-6526 Subject: Saccharomyces cerevisiae, anaerobic digesters, anaerobic digestion, biodiversity, biogas, carbon dioxide, digestibility, dogs, energy, feces, feedstocks, horses, inoculum density, methane, methane production, neutralization, pH, probiotics, sheep, vegetables, wastes Abstract: Anaerobic digestion (AD) is a biological process which produces biomethane as energy source, using waste as substrate. Cometabolism is a novel way to enhance liquid AD, via augmenting the biodiversity of inoculums, especially in the hitherto little-studied 96-h initiation period critical to AD startup. Dog, horse and sheep feces were used as sources of inoculum and mixed with fruit and vegetable waste (FVW) and water. Thermophilic (55 °C), mesophilic (39°) and psychrophilic (25 °C) AD conditions were tested. As inoculum and water quantities alter the abundance and diversity of the anaerobic communities, 1:1 and 1:4 ratios of FVW feedstock to inoculum solutions were compared. Live Saccharomyces cerevisiae was supplemented as probiotic in the anaerobic reactors. Biogas, CO2 and CH4 were measured as well as digestion of FVW. Results showed consistently more CH4 production under cometabolism, higher inoculum density and thermophilic conditions; higher CH4, pH and digestion simultaneously occurred in the mixed-inoculum reactors. A strong relationship between biogas and its CO2 and CH4 main components was found. Horse inoculum in the mixed reactors enhanced CH4 production; sheep inoculums improved digestibility; and the dog inoculum seemed to neutralize pH. S. cerevisiae may have improved cellulolytic activity in FVW digestion at 25 and 39 °C, and provided an energy and nutrient source at 55 °C. Agid: 5573652
ESSENTIALAI-STEM
Error 2738. Could not access VBScript run time for custom action. By "I got an error while trying to install software on my Windows 7 computer. This is the error message: Error 2738. Could not access VBScript run time for custom action. How can I fix error 2738?" This error is common to software applications that use VBScript for some portion of the install process. Error 2738 is an error that means VBScript is not properly configured to run on your computer. I encountered Error 2738 when I installed Verizon Access Manager, but there are many other times it can occur. To fix Error 2738 you may need to follow slightly different steps depending on your computer configuration. No matter what configuration you have for your Windows PC, the solution to this problem is incredibly geeky. It requires making some changes from the Windows command line, which is something most of us never have a reason to see. The first thing to figure out is whether you have a 64-bit or 32-bit version of Windows installed, because the solution will be different for each. This is listed in the System Control Panel, which you can access by either clicking Window key+Pause or by clicking Start and then right-clicking computer and choosing Properties. In either case, you will get a list of System features. The one you are looking for is System type: 64-bit Operating System or System type: 32-bit Operating System. Note: These same steps also apply to Windows Vista. Fixing Error 2738 on Windows 7 64-bit If you have a 64-bit operating system, you will need to follow these steps: Open a command line window as Administrator, which requires clicking Start typing cmd in the search box, then right-clicking on the cmd.exe program and choosing Run as Administrator. Next paste the following in the command line and hit enter. reg delete "HKCU\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}" /f That previous command removes the incorrect entry for VBScript support on 64-bit Windows 7. Next you need to make sure VBScript is properly registered by typing: c:\windows\syswow64\regsvr32 vbscript.dll or simply regsvr32 vbscript.dll if you are already in the syswow64 directory. After following these steps you should be able to install your program without issue. Fixing Error 2738 on Windows 7 32-bit For a 32-bit operating system, the steps are similar, but slightly different: Open a command line window as Administrator, by clicking Start, typing cmd in the search box, then right-clicking on the cmd.exe program and choosing Run as Administrator. Next paste the following in the command line and hit enter. reg delete "HKCU\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}" /f That previous command removes the incorrect entry for VBScript support on 32-bit Windows 7. Next you need to make sure VBScript is properly registered by typing: c:\windows\system32\regsvr32 vbscript.dll or simply regsvr32 vbscript.dll if you are already in the syswow64 directory. After following these steps you should be able to install your program without issue on a 32-bit version of Windows 7. Additional notes: In my own experience with this, I found two instances of the registry key that needed deleting. Running the reg delete command twice for your appropriate operating system should take care of situations where this happens.
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Thomas Scoville The result was speedy delete as non-notable (WP:CSD). ··· 日本穣 ? · Talk to Nihon joe 08:08, 30 January 2007 (UTC) Thomas Scoville * – (View AfD) (View log) Subject does not seem to meet criteria for WP:BIO in terms of notability. In addition article seems to have been exclusively authored by User:Betteryeti, who's contributions to Wikipedia seem to consist solely in external links to pages authored by Thomas Scoville, and thus may be a vanity/fan page of some kind. Zeraeph 22:52, 27 January 2007 (UTC) * Delete per nom. Likely vanity article. Soltak | Talk 23:03, 27 January 2007 (UTC) * Comment - article has now been blanked by its creator. -- Bpmullins | Talk 05:12, 28 January 2007 (UTC) * Speedy delete per WP:CSD and so tagged. Ohconfucius 04:06, 30 January 2007 (UTC)
WIKI
Category talk:1913 compositions Langgaard 1 The Langgaard page says this symphony was composed several years before 1913, so it shouldn't be in the '1913 compositions' category. <IP_ADDRESS> (talk) 22:00, 3 January 2023 (UTC) * The top of the category page states: Musical compositions published or first performed in the year 1913. I assume the criteria is the year the composition premiered, partly because it would be vague, inexact and unfeasible to source, in every case, the years in which all such pieces were written. It's similar to how films are categorized by year of their release, not by the years of their filming, production, conception, etc. -- DB 1729 talk 01:57, 4 January 2023 (UTC) * I sit corrected! Thanks for the clarification. <IP_ADDRESS> (talk) 07:25, 4 January 2023 (UTC)
WIKI
Huluween Dragstravaganza Huluween Dragstravaganza is a 2022 Halloween-themed variety special that premiered on October 1, 2022, exclusively through Hulu. The variety special stars Ginger Minj and Monét X Change, with drag legends, RuPaul's Drag Race and Dragula alums. Background A teaser was released showing Ginger Minj and Monét X Change stuck in an old television. This variety show was the start of Hulu's yearly Huluween block. An original song for the show was released on September 16, 2022. On September 21, 2022, a trailer was released which confirmed that there would be five original songs. The variety show contains many skits with various references to many classic horror films. The show premiered on October 1, 2022. One of the actors, Jackie Beat, was one of the writers for the variety special. The special also have a special guest: Kesha, who performed her song "Cannibal". Plot Ginger Minj and Monét X Change were getting ready for a show in West Hollywood until they stumbled onto an old television that appears to be haunted. When Monét hits the haunted television, the two were teleported to the "Land of Huluween". Cast * Ginger Minj * Monét X Change * Lady Bunny * Manila Luzon * Mo Heart * Jackie Beat * Selene Luna * Jujubee * Landon Cider * Mario Diaz Soundtrack Huluween Dragstravaganza (Original Soundtrack) is a soundtrack extended play that was released on September 30, 2022, through Hollywood Records. The soundtrack contains five original songs from the cast of the variety show. On September 16, 2022, Hulu released the first original song called: "The Big Opening".
WIKI
Where the Word “Jumbo” Came From The word “jumbo” can roughly be understood to mean “a large specimen of its kind” and it’s often posited that the word entered the English language thanks to an elephant. While this is certainly a nice story, the truth is a little more complicated. First things first, though etymologists are in agreement that the word “jumbo” in specific reference to something that is quite big was popularised by an African bull elephant called Jumbo, there is evidence that the word existed long before he was even born. In the latter half of the 19th century, Jumbo the elephant was arguably one of the most famous animals on Earth. Throughout his life as a zoo attraction and later a circus performer, he is estimated to have been seen by several million people. While nobody is exactly sure when Jumbo was born, it’s believed that he was captured as a young calf in 1860 somewhere in East Africa after his mother was shot by hunters. In 1862, after travelling hundreds of miles on foot and by boat, Jumbo was sold to a large botanical garden in France called the Jardin des Plantes. Jumbo’s life at the Jardin des Plantes was reportedly not so great; along with awful conditions, Jumbo was constantly overshadowed by the garden’s two other elephant attractions, Castor and Pollux (who are themselves famous for being eaten during the 1870 Siege of Paris). In 1865, Jumbo was sold to the London Zoo after years of negotiations spear-headed by the zoo’s Superintendent, Abraham Bartlett. Bartlett had supposedly been very annoyed to learn that the French had managed to get their hands on the first African elephant specimen to set foot in Europe; so much so that he eventually agreed to send the Jardin des Plantes the following list of animals in return for the calf:“A rhino, a jackal, two eagles, a pair of dingoes, a possum and a kangaroo”. When the young elephant finally arrived in London, Bartlett immediately recognised that it had been poorly looked after and handed its care off to his most talented zoo-keeper, Matthew Scott. Scott, who was noted as having a knack for understanding animals, quickly bonded with the elephant and under his expert care, Jumbo eventually grew to become one of the largest elephants the world has ever known, standing at an impressive 12 feet tall in his prime (later advertised as over 13 ft. tall). Jumbo’s massive size and gentle temperament eventually led to him being bought by legendary circus owner, P.T Barnum in 1882. The sale of Jumbo caused a considerable stir in England and the London Zoo was heavily criticised by the public for daring to sell him. You see, during his time at the London Zoo, Jumbo had become quite a celebrity and boasted such high-profile fans as Queen Victoria, who personally petitioned the zoo not to sell him. The zoo, however, were worried about Jumbo entering what is known as “musth“, a condition that can affect bull elephants resulting in an increased production of testosterone and unpredictable, violent behaviour. Jumbo’s sheer size meant that if he entered musth, he could have quite literally destroyed the entire zoo if he felt like it. He had proven before that he was more than capable of destroying the doors to his cage and the chains that were supposed to hold him in place; so the zoo decided that it simply wasn’t worth the risk. Once he got to America, Jumbo’s arrival was milked for all it was worth by Barnum who had his image emblazoned on everything he could find. Jumbo proved to be one of the most popular attractions at Barnum’s zoo and he was billed by the entrepreneur as “The biggest elephant in the world“. Sadly, just 3 years later, Jumbo was killed after being struck by a train and dragged along for about 300 feet before the train came to a stop. Reportedly, as he was taking his dying breaths, he used his trunk to hold the hand of his long-time trainer. Ever the showman, expert marketer, and businessman, Barnum had Jumbo’s remains preserved and toured with them for many years. Back to the topic at hand. While it’s true that Jumbo was a humongous specimen, even by elephant standards, and also that after his death his name came to be synonymous with anything large, the word jumbo existed long before he did. As early as 1823, the word “jumbo” was a slang term used to describe: “a big, clumsy person, animal or thing.” Unfortunately, we’re unable to trace the meaning back much further than that because it originated in slang speech, which is so often notoriously poorly documented. One origin theory posited by a slang dictionary published in 1823, with possibly the longest title of any dictionary in history (80 words), is that it perhaps derived from the phrase “mumbo-jumbo”. Mumbo-jumbo, which many of you will likely understand as a synonym for something that is meaningless or intentionally convoluted and confusing, derives, according to the Oxford English Dictionary, from “the name of a grotesque idol said to have been worshipped by some tribes,” often claimed to have been called Maamajomboo. It’s believed the word was adopted by the English language during the 18th century and that it may have been used as a derogatory term to refer to the so-called “incomprehensible” languages used by Africans. How the singular word “jumbo” came to be derived from this phrase isn’t precisely known. As for how Jumbo the elephant got his name in the first place, this is similarly not known. One theory is that Jumbo was given his name by Abraham Bartlett who reportedly just liked the sound of the word, evidenced by the fact that he once called a gorilla “mumbo”. Another theory is that it was actually Jumbo’s trainer and handler, Matthew Scott, who named him “Jumbo” after the slang term because of his clumsy gait and heavy-set frame. If you liked this article, you might also enjoy our new popular podcast, The BrainFood Show (iTunes, Spotify, Google Play Music, Feed), as well as: - There Was Once An Elephant Condemned to Execution by Hanging - The Most Dangerous Profession: The Human Cannonball - Do Elephants Really Have Exceptional Memories? - How a Donkey and an Elephant Came to Represent Democrats and Republicans - The Origin of the Phrase “Jump on the Bandwagon” - Despite his huge size, Jumbo was a remarkably calm elephant as long as his trainer was around and he was known to have given thousands of children rides on his back throughout his life. - Matthew Scott and Jumbo shared a very close relationship throughout their time together and Jumbo would reportedly throw tantrums whenever Scott went home. When Jumbo was bought by P.T Barnum, Scott was hired to be his keeper simply because he was the only one Jumbo would listen to. Abraham Bartlett was so terrified at the thought of Jumbo going on a rampage if something happened to Scott that he wrote a letter to the Zoological Society asking for them to provide him with a method of killing Jumbo if Scott was ever injured. As mentioned, reportedly as Jumbo was taking his dying breaths, he used his trunk to hold the hand of Scott. - According to Matthew Scott, he would share a bottle of beer with Jumbo every night. Scott claimed one night when he drank the bottle himself and promptly fell asleep before giving Jumbo his share, Jumbo gently lifted Scott out of bed with his trunk and put him on the floor in front of him. When Scott woke up, he realised his mistake and promptly got Jumbo a fresh beer. - World Wide Words: Jumbo - Online Etymology Dictionary: Jumbo - The Word Detective: Issue of July 4, 2001 - Jumbo the Elephant: the origins of ‘the largest known animal in creation’ - Jumbo: The Unauthorised Biography of a Victorian Sensation - Slang: A Dictionary of the Turf - Mandingo Language and Culture Through the Looking-Glass - Forgotten Tales of Kansas City - The Feejee Mermaid and Other Essays in Natural and Unnatural History |Share the Knowledge!|
FINEWEB-EDU
Talk:Tron 2.0 Screenshot How about a screenshot of the game instead of a non-informative cover image? Pipatron (talk) 01:08, 24 February 2008 (UTC) * The standard for the video game infobox requests a cover image. BTW, a screenshot that big would raise copyright issues. Admiral Norton (talk) 14:36, 24 February 2008 (UTC) * I've added a screenshot request to the WikiProject Video Games banner. -- &oelig; &trade; 17:17, 22 April 2011 (UTC) DVD-ROM Can anyone verify that Tron 2.0 was indeed released only on DVD-ROM? I don't have a copy of the game, but as far as I know it was released on CD. * Hush, you.- agreed It only came as a 2 disc cd-rom I still have my copy. still far better than the Tron 2 movie. kills me that Disney did not use this as the base for the sequel. excellent atmosphere and storyline overall. and the fact that they got the original actors and artist to do this truly amazes me that they ignored it and made that other pos and actually cancelled the slated Tron 3 because of poor sales. Another genius CEO at work methinks? xbox? what about the XBOX version? is that a separate page? It is right now, but I'm all for merging it in. I don't think it really merits its own page. Ace of Sevens 00:59, 1 July 2006 (UTC) Plot Is this statement from the Trivia section important? * It is amusing to note that the plot, before the game was released, is in some ways quite different than what appeared in the final product&mdash;possibly intentionally. The plot and story of many games (and movies, for that matter) change substantially during development. Why is this game any different? And it hints that the plot was changed during development as some sort of ploy, but gives no further information as to why. I think that unless it is clarified, the whole paragraph should be taken out. The plot changing from early development isn't noteworthy in the least. &mdash; Frecklefoot | Talk 15:28, Jun 10, 2005 (UTC) No Tron in "Tron 2.0"? I have not played this game, but from the description, it looks as though the character ("program") Tron does not appear ANYWHERE in this game. Granted, in this day-and-age, I concede that the original 1982 Tron app would be an old, outdated, and conceivably obsolete program. However, the point still stands that this game is called "Tron 2.0". Does Alan's son take the program name "Tron 2.0"? Or is there absolutely NO character in this game named "Tron"? I believe this is definitely worth mentioning by a Wikipedian familiar with the game. End of line. --Schmendrick (talk) 17:41, 20 November 2007 (UTC) I've played it (the german version, though) some time ago. As far as I remember Tron itself doesn't appear at all - the title instead refers to an unfinished program, intended to replace the original Tron, which the player has to retrieve and compile. Should I ever play it again(the ending is horrible, IMO), I'll take notes. Cyberman TM (talk) 16:06, 21 January 2008 (UTC) That's the tron legacy code that you have to retrieve and compile. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 16:20, 7 October 2009 (UTC) What does the article gain from a plot section? In my experience, Tron 2.0's plot largely consists of "Jet goes there, Jet kills stuff, Jet comes here, Jet kills HUAAAARG." There are no interesting character dynamics and the connections to the first Tron are a matter of two sentences; three, tops. There's a place for interesting things done with (ab)use of computers in the "Environment" section. Since the section is extremely bulky, and is not - I claim - helpful to the reader or even of interest, how about we axe the thing? --Kiz o r 13:24, 20 April 2009 (UTC) * I've zapped this section back to the overview. The change can be seen here. I'm still open to input, though my talk page will get much faster results than this page. --Kiz o r 11:37, 15 May 2009 (UTC) Verifiable sources, please Please remember that Wikipedia is not a primary source and must not become one. Any claims about Tron 2.0 originally being a movie concept, or about abortive patches or comic books should cite credible sources, even and especially if they presented as speculative. You cannot simply type subjective recollection, opinions, gossip and trivia and expect to have them remain unchallenged. I have removed the more egregious violations; if you restore them, please cite sources. Rogerborg (talk) 16:28, 15 December 2009 (UTC) The source for the first claim does not mention Lisberger at all in the article. Not sure if it is a reasonable source. (side note, who gets to decide what is canon?) — Preceding unsigned comment added by <IP_ADDRESS> (talk) 17:37, 21 July 2014 (UTC) * I was wondering about the first cite also, as I didn't see anything supporting the claim. The second cite, while hardly a reliable source either — it's an attendee's recollection from a Q&A event at which no recording equipment was permitted — is at least verifiable, and that was a Q&A with both Lisberger and Kosinski. My read is that they jointly endorsed the game's non-canon status. * So, now that I see the first cite never supported its claim (and wasn't just recently changed), and given that the second cite appears to contradict it completely (and isn't merely a retconning), I feel the only correct thing is to change the article's lead from this: * to this: * According to Tron creator Steven Lisberger and Tron: Legacy director Joseph Kosinski, Tron 2.0 is not part of the Tron movie canon. * If someone can come up with a verifiable source for Lisberger's prior endorsement of Tron 2.0 as canon, then please re-incorporate that info into the article, with appropriate citation. -- FeRD_NYC (talk) 17:17, 26 February 2018 (UTC) * If someone can come up with a verifiable source for Lisberger's prior endorsement of Tron 2.0 as canon, then please re-incorporate that info into the article, with appropriate citation. -- FeRD_NYC (talk) 17:17, 26 February 2018 (UTC) * If someone can come up with a verifiable source for Lisberger's prior endorsement of Tron 2.0 as canon, then please re-incorporate that info into the article, with appropriate citation. -- FeRD_NYC (talk) 17:17, 26 February 2018 (UTC) Tron 2 redirect I noticed Tron 2 redirects here, surely the Tron 2 film will be the primary article here? I have played the game and loved it, but I imagine most people searching for Tron 2 would expect to find the film. Rehevkor ✉ 02:14, 26 October 2010 (UTC) * I think the disambiguation note at the top of this article will suffice. Since "Tron 2.0" and "Tron 2" are pretty much synonymous and the game came out well before the new movie, redirecting to the game and then saying "This is about the game, for the film sequel go here" makes perfect sense. Also, since the movie itself has never been referred to in any official sense as "Tron 2" - closest it came was "TR2N" - there's no real plausible search term for "Tron 2" that can't be taken care of with the current setup. &mdash; KieferSkunk (talk) &mdash; 19:06, 27 October 2010 (UTC)
WIKI
Taruma people The Taruma (Saloema in Suriname; Tarənos in the Tiriyó language) are an indigenous people found in the northern Brazil, southern Guyana, and southern Suriname. They used to speak Taruma which is considered critically endangered. The Taruma in Suriname have merged with the Tiriyó, in Brazil they merged with the Wai-wai. The Wapishana village of Maruranau in Guyana still recognises the tribe. History The Taruma used to inhabit the Kutari, Trombetas and the Paru de Oeste Rivers. They used to trade extensively with the Tiriyó people and the Ndyuka and specialised in hunting dogs. The Encyclopaedie van Nederlandsch West-Indië of 1917 remarked that they should not be confused with the Taruma on the Essequibo River, because they spoke a different language; however, they are probably the same people, and those living along the Essequibo had lost their language due to contact with the Wai-wai. In 1843, first contact was made by Robert Schomburgk at the source of the Trombetas. In 1907, Claudius de Goeje led the Tumuk Humak expedition. The Ndyuka guides did not want to pass through the Taruma-held territory because of hostility between the two people, but de Goeje decided to contact the group, because he needed local guides to reach the Sipaliwini River. In 1910 they were visited by Johan Eilerts de Haan as part of the Courantyne expedition who noted that the Taruma lived on the Kutari and the Tiriyó on the Sipaliwini. In the 1930s there was a war between the Tiriyó and Taruma in the Suriname-Brazil border area which resulted in the Taruma moving further south into Brazil. The Taruma have since been considered a lost tribe in Suriname. In Guyana, they are also not listed as an Amerindian tribe. During the 1960s, the Amerindians in Suriname and Brasil were concentrated in larger villages by the North-American missionaries. In 1963 and 1964, they were visited by the anthropologist Peter Rivière. During a visit a Tiriyó told him: "Those Tiriyós in Alalapadu are not really Tiriyós, but Tarənos". After investigating, it turned out that Taruma had merged with the Tiriyó and they presently have a minority presence in Kwamalasamutu, Suriname. The Taruma on the Brazilian and Guyanese side had merged into the Wai-wai. A group is living with the Wapishana in Maruranau, Guyana, and they are recognised by the Wapishana community.
WIKI
PT - JOURNAL ARTICLE AU - Streubel, B AU - Seitz, G AU - Stolte, M AU - Birner, P AU - Chott, A AU - Raderer, M TI - MALT lymphoma associated genetic aberrations occur at different frequencies in primary and secondary intestinal MALT lymphomas AID - 10.1136/gut.2005.090076 DP - 2006 Nov 01 TA - Gut PG - 1581--1585 VI - 55 IP - 11 4099 - http://gut.bmj.com/content/55/11/1581.short 4100 - http://gut.bmj.com/content/55/11/1581.full SO - Gut2006 Nov 01; 55 AB - Background and aims: Limited data are available on intestinal MALT lymphoma owing to its relatively rare occurrence. The frequency of associated genetic changes was therefore analysed in intestinal MALT lymphoma to determine whether primary and secondary examples may be distinguished by their genetic profile.Methods: Patients diagnosed with MALT lymphoma involving the intestine were evaluated and compared with 71 cases with localised gastric MALT lymphoma. Paraffin embedded samples were evaluated for t(11;18)(q21;q21) by reverse transcription polymerase chain reaction, and by fluorescence in situ hybridisation for t(14;18)(q32;q21), t(1;14)(p22;q32), and trisomies 3 and 18.Results: 30 consecutive patients with MALT lymphoma involving the intestine were identified: 16 had primary intestinal lymphoma and 14 had secondary MALT lymphoma. t(11;18)(q21;q21) was found in one third of the patients, but there was a significant difference between the secondary MALT lymphomas and the primary intestinal and gastric MALT lymphoma groups (57% v 12.5%, p = 0.019, and 57% v 24%, p = 0.022). Two patients with primary intestinal MALT lymphomas were positive for t(1;14)(p22;q32) and none was positive for t(14;18)(q32;q21). Primary intestinal MALT lymphoma had a significantly higher frequency of trisomies 3 or 18 (81% v 36%, p = 0.024; 81% v 14%, p&lt;0.001), in contrast to secondary intestinal MALT lymphomas and localised gastric MALT lymphomas.Conclusions: The genetic profile of primary intestinal MALT lymphomas appears to be different from that of secondary intestinal or local gastric MALT lymphomas. Because of the high prevalence of trisomy 3 or 18, or both, in primary intestinal lymphoma, these numerical aberrations might be regarded as a genetic hallmark of the disease.
ESSENTIALAI-STEM
EldoS | Feel safer! Software components for data protection, secure storage and transfer TElXMLSigner canonicalisation inc-exc #4859 Posted: 02/06/2008 10:38:56 by Cees Lieshout (Standard support level) Joined: 02/06/2008 Posts: 10 I want to use the TElXMLSigner to sign a part of a XML message on a client machine ( with a smartcard reader). The communications server will later on send a soap request with this part XML included. My problem is with the use of canonicalisation set to xcmCanon the namespaces from the parent XML are included ( I don't have them when I sign the (part)message on the client). When I use the xcmExclCanon the transform methode writen in de signedinfo block is TR/2002/REC-xml-exc-c14n-20020718 where I exptected 2001/10/xml-exc-c14n. If I check the output message with xcmExclCanon set, for example with XML editor oXygen, it raises an error Unknown canonicalizer. Can anybody help, for instance can the methode be set manualy or is the methode TR/2002.... correct and the editor wrong.... #4863 Posted: 02/06/2008 13:41:53 by Dmytro Bogatskyy (Team) Default uri for exclusive canonicalization is "http://www.w3.org/TR/2002/REC-xml-exc-c14n-20020718/" You can modify the default value using: SBXMLDefs.xmlCanonicalizationExcl.DefaultVersion := 'http://www.w3.org/2001/10/xml-exc-c14n'; #4884 Posted: 02/07/2008 07:39:27 by Cees Lieshout (Standard support level) Joined: 02/06/2008 Posts: 10 Thanks for the quick response. I'am now able to generate the (correct?) message. Unfortunately the result gives a signature not valid when I try to check it with oXygen. What I also discovered (and that is perhaps the reason) is that the digestvalue is different when I sign the submessage standalone against the value it returns when I sign it as part of a message. I exptected the digest (the sha1 hash) to be the same, when using exclusive canonicalisation. I've modified the sample app simplesigner to return the canonical form ( signode.GetOuterXMLCanonical( xcmExclCanon )) and the digest I calculate manualy corresponds with the one the component returns when I encode the submessage (on its own). Apparently this is not the correct string in case of the submessage being a child in a larger message. Is this perhaps the difference between the TR/2002.. and 2001/10 methode? Or is my assumption that the hash of the submessage standalone and as part of a larger message should be the same, not correct. Thanks for your help #4891 Posted: 02/07/2008 08:59:32 by Cees Lieshout (Standard support level) Joined: 02/06/2008 Posts: 10 Since I wasn't sure if I hadn't broken something in the original sample I reloaded it and tried again. I've added the line ( in mainform.pas/simplesigner.exe): Signer.CanonicalizationMethod := xcmExclCanon; just after Signer.CanonicalizationMethod := frmSign.CanonicalizationMethod; The resulting digest value is the same. The resulting digest generated from oXygen is also the same when using inclusive canonicalisation. The property CanonicalizationMethod doesn't seem to affect the result. The CanonicalizationMethod is set to TR/2002/REC-xml-exc-c14n in the resulting XML, but the digest is the same as with inclusive. Is this the right way to force excluded Canonicalization? #4908 Posted: 02/07/2008 13:43:23 by Dmytro Bogatskyy (Team) Quote Is this the right way to force excluded Canonicalization? I think, you need to set exclusive canonicalization for transform and not globally (for SignedInfo element). To set it for a transform, please modify a sample in following way: remove line: Ref.TransformChain.Add(TElXMLC14NTransform.Create); add C14NTransform: TElXMLC14NTransform; C14NTransform := TElXMLC14NTransform.Create(); C14NTransform.CanonicalizationMethod := xcmExclCanon; C14NTransform.InclusiveNamespacesPrefixList := 'name_space_prefix'; // for example: 'ds enc' Ref.TransformChain.Add(C14NTransform); Quote I've modified the sample app simplesigner to return the canonical form ( signode.GetOuterXMLCanonical( xcmExclCanon )) and the digest I calculate manualy corresponds with the one the component returns when I encode the submessage (on its own). Apparently this is not the correct string in case of the submessage being a child in a larger message. Possible, you need to pass a second parameter with inclusive namespace prefix list. P.S. If you still have a problem, then please post a xml document sample which exposes a problem to helpdesk. #4924 Posted: 02/08/2008 10:29:58 by Cees Lieshout (Standard support level) Joined: 02/06/2008 Posts: 10 Thanks again, I've created the message as I exptected it (with the correct hash). I've removed the Ref.TransformChain.Add(TElXMLEnvelopedSignatureTransform.Create); and replaced it with your code. Seems to work, the message is exl and the id's look alright. However the message (file outa) doesn't verify ( with the same sample app simplesigner ). The reference(form) report's a different hash. If I also include the transform EnvelopedSignatureTransform the message (file outc) verifies in simplesigner but not in my testeditor oXygen. The message signed with the "normal" sign stil verifies in simplesigner and in oXygen. I've included the three messages, I made them simpler but with the inclusive and excl still different. outa: with the changes you suggested. outb: signed without changes inclusive outc: with the changes but with the envelope transform Any suggestions will be appreciated, thanks. [ Download ] #4934 Posted: 02/08/2008 18:17:26 by Dmytro Bogatskyy (Team) For "a" case the enveloped signature transform is necessary, because when you sign the xml document without it the canonicalized data will be follows: <data>... on verification: <data>... <Signature>.. So, the digest will be different. P.S. Checking "c" sample #4945 Posted: 02/10/2008 08:47:05 by Dmytro Bogatskyy (Team) The case "c" is fixed. The problem was in default namespace, exclusive canonicalization had processed elements in the same way as "#default" set in inclusive namespace prefix list, this was incorrect. Fixed. P.S. oXygen software incorrectly process normal canonicalization, it is omit default namespace when canonicalize, so if you sign your xml document with oXygen it wouldn't be possible to verify with SecureBlackbox.XML. #4950 Posted: 02/11/2008 03:06:37 by Cees Lieshout (Standard support level) Joined: 02/06/2008 Posts: 10 It's getting clearer. When you say "is fixed", you mean in the component? So I need to download a fix? I'm currently using the (still) trial component's. Or is it possible to configure the transfoms so that it wil give the correct output. I will try to order the source code today, I'm sure we will get the job done with de blackbox.xml, certainly with such feedback on the forum. Thanks. #4966 Posted: 02/11/2008 18:00:37 by Dmytro Bogatskyy (Team) Quote When you say "is fixed", you mean in the component? So I need to download a fix? It should be available in the next build. The RC1 is expected in a few days. Quote Or is it possible to configure the transfoms so that it wil give the correct output. Unfortunately no. It possible to set inclusive namespace prefix list, then hash value will be generatad correctly, but it seems oXygen software doesn't understand them. Reply Statistics Topic viewed 6343 times Number of guests: 1, registered members: 0, in total hidden: 0 | Back to top As of July 15, 2016 EldoS business operates as a division of /n software, inc. For more information, please read the announcement. Got it!
ESSENTIALAI-STEM
Page:Winter - from the Journal of Henry D. Thoreau.djvu/465 Rh Josiah Royce. Religious Aspect of Philosophy, 12mo, $2.00. John Godfrey Saxe. Poems, Red-Line Edition, Illustrated,
WIKI
Denny Dias Dennis Dias (born December 12, 1946) is an American guitarist, best known for being a founding member of Steely Dan. Career Dias was working with his own band out of his garage in Hicksville, New York, when he placed an ad in The Village Voice in the summer of 1970 that read: "Looking for keyboardist and bassist. Must have jazz chops! Assholes need not apply". Donald Fagen and Walter Becker responded to the advertisement. They joined his band and immediately began playing their own material. Dias fired the rest of the band, and the three of them moved to California, adding drummer Jim Hodder, guitarist Jeff "Skunk" Baxter, and vocalist David Palmer before recording for ABC/Dunhill Records as Steely Dan. Dias recorded as a permanent member of the band on 1972's Can't Buy a Thrill (with an electric sitar solo on the song "Do It Again"), on 1973's Countdown to Ecstasy, and on 1974's Pretzel Logic. Following a tour promoting Pretzel Logic, Becker and Fagen decided to break the band up and use session musicians on future albums. Though no longer a member of the band, Dias continued to work with them as a session guitarist, appearing on 1975's Katy Lied, 1976's The Royal Scam, and 1977's Aja. In 1991 he joined Toto on their Summer Festival Tour. He also recorded with Wayne Shorter, Wilfrido Vargas and Pete Christlieb. Some of Dias's original material was recorded on a 1999 CD called Matter of Time, with Lisa Jason (Vocals) and Andy Bergsten (Bass) as the core of the band. In 2014, he was playing with Denny Dias and Friends, a Boston-based band formed with Lisa Jason and Andy Bergsten with session musicians from around the country. In 2015, they planned a tour that included the Iridium in NYC. Discography With Steely Dan * Can't Buy a Thrill (ABC, 1972) * Countdown to Ecstasy (ABC, 1973) * Pretzel Logic (ABC, 1974) * Katy Lied (ABC, 1975) * The Royal Scam (ABC, 1976) * Aja (ABC, 1977) With others * Soundtrack to You've Got to Walk It Like You Talk It or You'll Lose That Beat (1971) with Walter Becker and Donald Fagen, credited as Denny Diaz * David Garfield and Friends, Tribute to Jeff (Intercord, 1997)
WIKI
Plumbing What  Does a Water Softener Filter Out? A water softener is the reduction of certain metal ions, usually calcium, magnesium, and some other alloys, in hard water coming from the pipes. The resulting soft water needs less detergent for the same cleansing effort since no soap is wasted binding with magnesium and calcium ions. Some systems also add anion exchange compounds to reduce the sodium content. However, the most common type of water softener uses a resin bed that consists of activated carbon and/or phosphates to replace lost sodium and magnesium ions in hard water, thus softening it further. The softener works by replacing the lost ions in the water with sodium bicarbonate (Sodium bicarbonate is used to replace calcium and magnesium in water to make it less hard). Three parts water softener: the resin tank, the media, and the regeneration unit. First, water enters the resin tank, where it is softened by the resin media. Once inside, the water ions are separated from the sodium ions, thus turning them back into their original form. This process is repeated a number of times until all the water in the tank is soft. Then the resin media is removed and the regeneration unit is installed. Water softeners are useful for many different plumbing and pipe needs. But there are still some hard water problems that they cannot solve. If the scale is sopping up in your pipes or plumbing fixtures, then it may be time for an upgrade. These days, there are water softeners on the market that can handle harder water. You just have to check the specifications to make sure that it’s the right one for your needs. When your pipes are filled with calcium and magnesium minerals, you are dealing with serious problems. Your kitchen might turn green as well as your shower. Hard water is bad enough by itself, but when it gets into your shower, or sinks and tubs, it’s worse. Excess scale build-up not only causes hard water problems but also makes rust-proof pipes weak and reduces the lifespan of appliances like water heaters. So before you buy a softener, make sure that you know what kinds of plumbing or pipe systems you have, and check for any kind of damage. And never use tap water to try out a softener! This post was written by Kristian D’An, owner and water expert at Eco Water Solutions of Florida. Eco Water Solutions is a Tampa water softeners company. They offer whole home water solutions such as softeners, whole home water filtration systems, and reverse osmosis systems. Their focus is to provide Floridians with safe and clean water throughout the home. Leave a Reply Your email address will not be published. Required fields are marked * 4 × five =
ESSENTIALAI-STEM
Page:A Garland for Girls (1893).djvu/84 60 glad to oblige the oldest daughter; so she went to the piano and struck up the proper air just as Jessie, with one arm on her hip, the other on the shoulder of an invisible partner, went down the hall with a martial stamp, a quick slide, and a graceful turn, in perfect time to the stirring music that made her nerves tingle and her feet fly. To and fro, round and round, with all manner of graceful gestures, intricate steps, and active bounds went the happy girl, quite carried away by the music and motion of the pastime she loved so much. Fanny clapped her hands with admiration, and Mademoiselle cried, "Bien, très bien, charmante, ma chérie!" as she paused at last, rosy and smiling, with one hand on her heart and the other at her temple with the salute that closed the dance. "I must learn it! Do come and give me lessons at our house. I called for Maud and must go now. Will you come, Jessie? I'll be glad to pay you if you don't mind. I hate to be laughed at; and I know if some one would just help me alone I should do as well as the rest, for Professor Ludwig raves at us all." Fanny seemed in such a sad strait, and Jessie sympathized so heartily with her, that she could not refuse a request which flattered her vanity and tempted her with a prospect of some addition to the "Sisterfund," as she called her little savings. So she graciously consented, and after a few laborious lessons prospered so well that her grateful pupil proposed to several other unsuccessful dancers in the set to invite Jessie to the private rehearsals held in various parlors as the festival drew near.
WIKI
This documentation is archived and is not being maintained. ResourceScope Enumeration This API supports the .NET Framework infrastructure and is not intended to be used directly from your code. Identifies the scope of a sharable resource. This enumeration has a FlagsAttribute attribute that allows a bitwise combination of its member values. Namespace:  System.Runtime.Versioning Assembly:  mscorlib (in mscorlib.dll) [FlagsAttribute] public enum ResourceScope Member nameDescription NoneThere is no shared state. MachineThe state is shared by objects within the machine. ProcessThe state is shared within a process. AppDomainThe state is shared by objects within an AppDomain. LibraryThe state is shared by objects within a library. PrivateThe resource is visible to only the type. AssemblyThe resource is visible at an assembly scope. A resource is an object that holds state. Examples of resources include a file on disk, a message queue for a process, and a named Mutex. Knowing an object is a resource does not indicate its appropriate use; the important property of a resource is the scope of the resource. The scope includes both the type and the visibility of the resource. The resource type specifies whether the resource is a machine-level resource, such as a file on disk, a process-wide resource, such as a block of non-shared memory, or an application domain-level resource, such as a lock on an instance of a non-marshal by reference object. The visibility scopes are Assembly and Private, the default is Public, which is implicit if Private or Assembly are not indicated. There is no enumeration value for Public. Windows 7, Windows Vista, Windows XP SP2, Windows XP Media Center Edition, Windows XP Professional x64 Edition, Windows XP Starter Edition, Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows Server 2000 SP4, Windows Millennium Edition, Windows 98 The .NET Framework and .NET Compact Framework do not support all versions of every platform. For a list of the supported versions, see .NET Framework System Requirements. .NET Framework Supported in: 3.5, 3.0, 2.0 Show:
ESSENTIALAI-STEM
Peter Lenes Peter Lenes (born April 3, 1986) is a former American ice hockey player. He last played for the EC Kitzbuhel of the Alps Hockey League. Prior to turning professional, Lenes attended the University of Vermont where he played four seasons of NCAA Division I college hockey with the Vermont Catamounts men's ice hockey team where he scored 46 goals and 46 assists for 92 points in 148 games. On January 11, 2012, the Trenton Titans of the ECHL traded Lenes, along with defenseman Jordon Southorn, to the Wheeling Nailers in exchange for future considerations. On July 31, 2013, Lenes returned for to attempt a second stint in Austria, signing a try-out deal as a free agent with Dornbirner EC. Lenes has since retired from playing professional hockey and started a hockey training and development company with former NHLer and University of Vermont teammate Torrey Mitchell.
WIKI
Page:She-Gallants.djvu/63 Ang. Preserve me to Night from the Fury of this incen'st Man: To morrow we may repair the time that has been lost. L. Dor. Which we might not have lost neither—but we have been both to blame. Ang. To Morrow all shall be mended. L. Dor. Shall it indeed? Ang. Upon Condition, that this Bellamour comes here no more; I thought you had forbid him your House. L. Dor. All Men you see don't mind us when we forbid. I promise you after this Night he shall never more be admitted; my Neice shall sooner couple with a Vulture or a Bear. This interruption is new Guilt. Ang. That is all I ask. L. Dor. Remember then to Morrow. Ang. By this Kiss. (Kisses her Hand.) L. Dor. Placket, are the other Gentlemen here? Plack. They were here, Madam: And I thought I had lockt 'em up safe, but when I went to lock just now, I found the Lock of the Closet Door broke, and they were gone. L. Dor. Curst Disappointments. Plack. The Chaplain, Madam, is not yet gone to Bed. L. Dor. Tell him I must have Prayers presently, and bring him into my Closet; and d'ye hear, lay the Books on the Table. Plack. That is, the Cups and the Bottle of Orange-flow'r Brandy. Lucind. Now the Angry Fit is over, you are come to beg Pardon; this is the Trick of you Men: You Quarrel on purpose to try, whether our Fondness is great enough, to excuse the Insolencies of your Passion, and then think to Lord it as you please. Bell.
WIKI
Making the Grade: The Economic Evolution of American School Districts Making the Grade : The Economic Evolution of American School Districts is a 2009 non-fiction book by William A. Fischel. It is published by the University of Chicago Press. The book argues that, in the words of Floyd M. Hammack of New York University, "local school districts have been and remain a crucial element in American educational policy." The book states that voters supported changes in the American educational system and changes happened because of the voters; for example, the concept of one room schools was in rural areas due to their local circumstances, but schools then consolidated into larger schools when voters decided they should do so at the ballot box. Background Fischel had written journal articles on the topic prior to creating the book. Contents The book has six chapters. Four of them are original to the book while the other two were adapted from journals. Fischel has analyses of the geographies of school districts, with Google Earth data presented. Fischel argued that many land owners wanted to have their land be worth more money, so they supported increased financing into public schools in proximity, and having a common school calendar. The work also describes why some communities rejected the concept of school vouchers. Reception Sun Go of the Korea Institute of Public Finance praised the book for being "rich in insights" about its topic. He praised the journal-derived articles for being "well adapted". Floyd M. Hammack of New York University wrote that
WIKI
Talk:Louis, King of Sicily Val is a province, not a Valley The Sicilian term Val, italianised in Vallo as in the contemporary name of Mazara del Vallo, doesn't translate as "valley" but as "province" or "prefecture". The more commonly accepted etymology is from the same root of the Arab Wāli, "prefect" or "governor", or Wilayah, "province" or "prefecture". In Italian or in Sicilian "Val"/"Vallo" and "Val/Valle" are clearly distinguished by the gender, e.g. the Sicilian provinces are males, while the valleys are females. In the Italian Wikipedia all of this is explained in detail in the specific page about the Sicilian Vals: https://it.wikipedia.org/wiki/Vallo_di_Sicilia, specifically in the section about etymology. — Preceding unsigned comment added by Aledeniz (talk • contribs) 14:44, 16 August 2015 (UTC)
WIKI
The Coordinated Omission Problem in the Benchmark Tools siddontang 3 min readMay 26, 2018 -- I read an article Your Load Generator Is Probably Lying To You — Take The Red Pill And Find Out Why from Gil long time ago. In this article, Gil mentioned that there is a coordinated omission problem in the benchmark tools, but I didn’t pay any attention to it at that time. Recently, a guy discussed me about this problem here, then I realized that we have the same problem in our benchmark tool go-ycsb. What is coordinated omission Let’s talk about the problem of coordinated omission at first. For the most of benchmark tools, they have the similar benchmark flow: 1. Start multiply threads. 2. In each thread, send a request, wait the response, then go on. 3. Record the latency of response time - request time. This flow seems sensible, but actually, it has a problem. For example, I go to KFC to buy fried chicken (Em, this is not an advertisement, I just like KFC), and fall in the end of a line. There are three people in front of me. The first two people both use 30 seconds to buy their foods, but the third one uses nearly 300 seconds. Finally it is my turn and I use 30 seconds too. So for me, my total time to buy the fried chicken is 390 seconds (2 x 30 + 300 + 30), not only 30 seconds. 30 is the service time for me, and 360 is the waiting time. Maybe you have already noticed the problem, most of the benchmark tools use the service time to represent the latency, but not include the waiting time. Another example here, assume we want our benchmark tool to send the request at a frequency of 10 ops/sec, we need to send a request every 100 milliseconds. The first 9 requests only take 50 microseconds, but the 10th one costs 1 seconds, and the following ones take 50 microseconds again. Obviously, for the 10th request, there must be something wrong in the server, but we just send one request for benchmarking in one second, we need to send more. YCSB For the first example, to get a more accurate latency, YCSB introduces a concept of intended time to record the waiting time. It uses a local thread variable to record the start waiting time in the throttle function: Then, for the every operation, uses the intended time to calculate the waiting time: Notice here, the intended time can only work if you set target in YCSB. By the way, when I browsed the YCSB source code at first, I was very confused with the intended time, I didn’t know what’s it used for. Now, after I review the coordinated omission, I figure it all out. But YCSB still doesn’t solve the second problem above. If the server hangs up, the client must wait the response of the last request and then send the next request. This is synchronization. I find a paperCoordinated Omission in NoSQL Database Benchmarking which solves this problem. In this paper, the authors use an async way — Future. They create Future according to the frequency of target, the previous Future won’t block the next Future even the server hangs up. Go YCSB Now let’s talk about go-ycsb, how can we solve the coordinated omission problem? The only way I think is to take advantage of the Go goroutine — create the goroutine according to the frequency of target, in each coroutine, send one request, wait the response and record the latency. Of course, we need to care the latency of Go scheduler too. Another problem is that If the server hangs up, we may create lots of goroutines which may cause OOM finally, but this is as expected. This is just my thought, I haven’t started yet, if you are interested in it, you can send me a PR or email me (siddontang@gmail.com) for more deep discussion. -- -- siddontang VP of Engineering / Chief Architect at PingCAP. Building https://tidb.cloud now. Contract me: https://www.linkedin.com/in/siddontang/
ESSENTIALAI-STEM
Page:United States Statutes at Large Volume 28.djvu/495 466 FIFTY-THIRD CONGRESS. Snzss. 1I. Ch. 307. 1894. crk¤£gjg¤°§£gg;f°‘ ugocgdssard M. Lane, five hundred and seventy-two dollars and nfty- To Heniy F. Lilly, six hundred and seventy-eight-dollars and ninety- four cents; To Edward Little, one hundred and twenty-three dollars and seventy- seven cents; To William F. Madden, four hundred and three dollars and twenty- seven cents; To Louis J. Martin, three hundred and nine dollars and forty one cents- To James A. McGowan, three hundred and fifty-five dollars; To Harding J. Morrell, three hundred and thirty dollars and forty- six cents;. To Frank A. Mutter, three hundred and twenty~two dollars andeighteen cen ts; To Michael Naughton, four hundred and fifteen dollars and fiftytwo cents- To John D. Orr, four hundred and eighteen dollars and forty cents; To Christopher C. Purcell, three hundred and twenty-tive dollars and twentyseven cents; To Richard F. Quinn, six hundred and seven dollars and eighty-two cents- ‘ To 7Charles H. Rigby, five hundred and twenty-six dollars and eighteen cents; To Alfred E. Rumske, four hundred and twelve dollars and ninety- one cents; To James A. Shay, three hundred and ninety-six dollars and twenty- two cents; To William Slavin, three hundred and three dollars and thirteen cents; i To Frank E. Trout, six hundred and twenty-tour dollars and eighty- three cents;. To William J. Turner, six hundred and sixty-four dollars and fifty- two cents; To Charles A. Urian, four hundred and forty-three dollars and twenty- one cents; ` To Charles G. Wilfong, five hundred and forty-eight dollars and six cents; ‘ To Milton L. \Vil1iams, three hundred and sixty-seven dollars and fourteen cents; To Charles C. Young, two hundred and ninety-one dollars and sixty- - two cents; To John Barry, six hundred and seventy-one dollars and thirteen cents; To James P. Bracken, six hundred and seventy-six dollars and thirty- six cents; To Hugh B. Carberry, three hundred and forty-five` dollars and sixty- nine cents; To Maurice P. Carroll, six hundred and four dollars and forty live cents; To John E. Connolly. two hundred and eighty-five dollars and forty- eight cents; To Edward J. Daily, seventy-seven dollars and thirty-five cents; To Thomas A. Danies, seventy-seven dollars and thirty five cents; To Dennis J. Driscoll, four hundred and twelve dollars and seventy- six cents; To Benedict J. Federal. seventy-seven dollars and thirty-five cents- To Michael F. Fitzgerald, five hundred and ninety-three dollars and ninety-tour cents; To James YV. Ford. seventy-seven dollars and thirty-tive cents; To James C. Glacken, seventy-seven dollars and thirtyfive cents· To Harry P. Hinkle, two hundred dollars and tifay cents; ,
WIKI
• Status: Solved • Priority: Medium • Security: Public • Views: 602 • Last Modified: How can I access my Windows 7 to Windows 8 upgraded machines Good evening  Experts, I have just completed an inplace upgrade of 24 Windows 7 Pro Machines to Windows 8.1. I love the look and feel of 8.1 but I have lost functionality in terms of my scripts because several components were reverted back to their original state they would have been in with Windows 7. Allow me to elucidate with screen shots and easier explanations. For me to have complete access to all of my machines in Windows 7 I had to perform the following task manually: 1. Firewall Off ! 2. Sharing Options and Network Disovery Turned On ! 3. Additional Settings With Boxes Checked (Reaaaally Necessary) ! 4. Allow Remote Connections ! 5. Allow Access to Admin Shares Via Registry ! I am not worred about item 5 as I have a script that simply works. However, I don't want to go touch every machine that I upgraded and reset those settings. What I am asking is for you experts to look a the first four items and suggest to me ways of  programmatically , turn off the firewall, turn on network discovery, turn on file and print sharing, turn on sharing so anyone with network access can read and write files in the public folders, Turn off password protected sharing, use user accounts and passwords to connect to other computers. I would prefer solutions with a combination of vbscript, Wmi, Wsh, and registry coding, as these are my strong suits. 0 BLACK THANOS Asked: BLACK THANOS 2 Solutions   Olaf De CeusterCommented: Use group policy: http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/group-policy-changes-windows-server-2012-windows-8-window-rt-part1.html Example for RDP: HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Control > Terminal Server > WinStations > RDP-Tcp Hope that helps, Olaf 0   McKnifeCommented: Hi. I saw your question about upgrade options (keep applications - possible?). I am afraid you relied on the wrong advice - not only your settings have vanished, but also all installed applications - see my comment on your other thread. So this might stop this thread right here: do you want to continue or isn't it better to return to your (hopefully present) win7 backup to perform another upgrade (this time correct: win7->win8->8.1) and keep your applications? 0 Free Tool: IP Lookup Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation. One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.   BLACK THANOSAuthor Commented: McKnife, I knew I would lose the applications. I am not concerned about that. I am concerned only with a solution to changing the aforementioned settings programmatically. I already have a way to re-install all applications within minutes, i.e. , manage engine. to be clear, I either want registry solutions to change the settings or some combination of wmi, vbs, or wsh. respectfully, Regis Hyde 0   BLACK THANOSAuthor Commented: Also, I am not using group policy because my network is purely peer to peer (Workgroup). 0   BLACK THANOSAuthor Commented: Experts, My goal is not to touch each machine manually, but to programmatically change the settings above via the programing tools I  mentioned above. I simply want to at my desktop and program a way to get into those machines. Right now I cant, unless I get off my behind and do this all manually. Respectfully , your solutions require me to go to each machine or rdp into them. That defeats the purpose of what I am trying to accomplish. Keep in mind , before I upgraded the machines to windows 8.1 I had complete control via my scripts. All the machines retained all personal files , which is a god thing ,but all of the security setting were re-established. I should have simply cloned a pristine image via clonezilla , then I would not be in this predicament. I only need solutions where I don't have to get out of my seat and don't have to use RDP as my main way of  configuring each machine. I hope I am clear on what I am in need of. Respectfully, Regis Hyde 0   BLACK THANOSAuthor Commented: Also, all of the machines have the same accounts, member, B&G-Admin, and Administrator. Same password too. 0   BLACK THANOSAuthor Commented: will netsh do what I want 0   McKnifeCommented: Regis, your question should be divided into several quetions, it is too big and means quite some effort to sort out those settings/scripts. It would be very helpful if you would show where you stand, what your scripting abilities are, what steps you need help with. So far it is not clear whether you need help or whether you see this as some kind of paid service that will do the whole work for you. I don't hope so ;) netsh can configure the firewall per network profile, yes. Also look into the tool regshot in order to create a before-after comparison of the registry. Happy new year, later on! 0   BLACK THANOSAuthor Commented: Respectfully Mcnife, I take your advice to heart, but it really is only one question and that is how do  I programmatically check or uncheck those boxes. That's it. Nothing more. it doesn't require breaking it up into several questions. To your point about having someone do the work for me , that is not now , nor has it ever been the case in the years I have been with experts exchange. netsh is a wonderful tool to enable or disable the firewall, but I was only using that as an example ( a bad one albeit) . For clarity , I only want to be able to check or uncheck the radial buttons above programmatically or with the registry . Done. Happy New Year, Don't consume too much eggnog. 0   Sudeep SharmaTechnical DesignerCommented: First, use psexec comes with pstools from microsoft so that you can run the scripts from the centralized location, may be your system. The only condition would be, if you don't have the same password for all the systems you would need type that for each system. http://technet.microsoft.com/en-in/sysinternals/bb897553 http://download.sysinternals.com/files/PSTools.zip As per my knowledge most of the this could be accomplished by the scripts or registry changes. Remote Desktop: We can enable remote desktop from windows command line by running the following command. reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f Open in new window Disable Firewall on All the Profiles: reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile/EnableFirewall /d 0x0 reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile/EnableFirewall /d 0x0 reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile/EnableFirewall /d 0x0 Open in new window Allow Access to Admin Shares Via Registry: reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System /v LocalAccoundTokemFilterPolicy /t REG_DWORD /d 1 /f Open in new window Copy all the registry into one bat files and execute it from your system on to the remote computers. If you need more help running psexec let us know. Sudeep 0   McKnifeCommented: Sudeep's advice is correct. This leaves us with just No. 2 and 3 unsolved. Have you taken my advice and used regshot yet? It will show you the settings for 2 and 3. Some will be hard to identify because the firewall settings (yes, netw. discovery and others are firewall settings) are always saved as a whole. Just the sharing security (128 bit) will be easily identified and distributable: -- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0] "NtlmMinClientSec"=dword:20000000 "NtlmMinServerSec"=dword:20000000 -- To get hold of the firewall settings, I would tune it on one computer to your likings and then export the whole fw settings from HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules to a regfile and then (with psexec again) import it using regedit /s regfile.reg 0   BLACK THANOSAuthor Commented: All, Thank you for the information above. To be clear , psexec has always been my tool of choice in conjunction with vbscript, shell programming  and registry settings. However, I have a entirely different way of modifying the registry that is tried and true , so I am going to try your wonderful suggestions and get back to you when my testing is done. Hopefully no more than a day or two. 0   McKnifeCommented: Ok. To be nosey: how do you modify the registry? 0   BLACK THANOSAuthor Commented: Good afternoon  MckNife, I use wmi. Very intuitive and easy to use. I have modified literally hundreds of machines using wmi in concert with vbscript. Example: Const HKEY_LOCAL_MACHINE = &H80000002 Const MAXIMIZE_WINDOW = 0 Set objShell = WScript.CreateObject("WScript.Shell") Computers = Array("wks-wnxp-01916") Set objSWbemLocator = CreateObject _ ("WbemScripting.SWbemLocator") On Error Resume Next For Each Computer In Computers Set oReg = objSWbemLocator.ConnectServer _ (Computer, "root\default:StdRegProv","ADMINISTRATOR", "#@BtOp&vice") Set StdRegProv = oReg.Get("StdRegProv") strKeyPath = "SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\" strEntryName = "LocalAccountTokenFilterPolicy" dwValue = 1 StdRegProv.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strEntryName,dwValue Next Open in new window I wrap it in a encrypted executable and use the array function to perform registry task on any number of machines. 0   McKnifeCommented: Ok, an encrypted because you store the password in the script? It gets decrypted on execution to the users temp-folder I guess. Normally that is the case. How is the testing going? 0   BLACK THANOSAuthor Commented: Gentlemen, I have been out of commission with the flu. which is extremely bad for my condition, but I am back among the living ,so I will finish my testing this week and allocate the points accordingly. 0   BLACK THANOSAuthor Commented: Testing completed. I will now allocate the points. You experts are always coming through for me. 0   BLACK THANOSAuthor Commented: Thanks Experts 0 Featured Post Free Tool: IP Lookup Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation. One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community. Tackle projects and never again get stuck behind a technical roadblock. Join Now
ESSENTIALAI-STEM
Not a developer? Go to MovableType.com Documentation Registering Your Plugin: Basic Plugin Metadata You now know what a plugin is, you know what the registry is and you know the basic syntax of YAML. It is time for you to write your first plugin. So, without further ado: 1. Create a directory called /path/to/mt/plugins/HelloWorld 2. In that directory create a file called config.yaml and open it in a text editor 3. Add the following text to your config.yaml file: name: Good for Nothing Plugin for Movable Type id: Good4Nothing author_link: http://www.yourwebsite.com/ author_name: Your Name Here description: This plugin is an example plugin for Movable Type. version: 1.0 4. To see your new plugin, login to Movable Type and navigate to: System Overview > Plugins. You should see “Good for Nothing Plugin for Movable Type” listed there. Good4Nothing Plugin Congratulations, you just wrote your first Movable Type plugin, and you didn’t even have to write any code! Wow. Yeah, I knew you would be impressed. So what does this plugin do? Good question. It does absolutely nothing, just as the name implies. But let’s review what you just did. The above config.yaml file told Movable Type the basics of what it needed to know about your plugin to list it properly among other plugins in your installation. Here is a brief overview of the registry keys used above, as well as some additional keys you might be interested in using: • name - The display name of the plugin. • id - A unique identifier for this plugin used when looking up this plugin’s data in the registry. It is also used when referring to handlers within the plugin (optional - when left unspecified, the plugin’s directory name will be used). • key - The string used by Movable Type when storing and retrieving stored via MT::PluginData (optional - when left unspecified, the plugin’s ID will be used). • author_link - The URL to the primary author. • author_name - The name of author or authors. • description - A brief one or two sentence of what this plugin actually does. • version - The current version of the plugin. • plugin_link - The URL to the plugin’s homepage. • doc_link - The URL to the plugin’s documentation. But who wants a plugin that does nothing? Time now to wade a little deeper into the pool. Back Leave a Comment
ESSENTIALAI-STEM
Researchers & health care professionals Due to the double aging of the population (more older people are living longer), the number of people with dementia will increase significantly in the coming years. The prevalence rate in the general population in 2018 was 1.49% in the Netherlands and 1.69% in Belgium (about 300,000 people with dementia in the NL and about 200,000 in Belgium) and this will increase to a general prevalence rate of 3.15% in 2050 in the Netherlands and 2.95% in Belgium (resulting then in about 540,000 people with dementia in the Netherlands and 350,000 in Belgium). According to the most recent figures from the World Health Organisation (WHO), there are currently 78 million people worldwide with a diagnosis of dementia. By 2050, it is expected that this number will have risen to 139 million. Age Age is the greatest risk factor for developing dementia and so prevalence increases with age: less than 5% of all people with dementia are under 65 years of age. Above 65, the prevalence is 10%. At the age of 85, the prevalence is already 35%, and at the age of 95, it is over 50%. Causes Dementia is a syndrome that can be caused by various diseases. The most common cause, and also the best known, is Alzheimer’s disease. Other known causes are vascular dementia, Parkinson’s dementia, Lewy body dementia, and frontotemporal dementia. In all forms of dementia, motor skills are also affected, as we move with our brains. Even in the prodromal stage (the stage where there is no diagnosis but there are some subjective signs), changes have been observed. Large longitudinal studies show a decrease in physical activity and walking speed as early as 10 to 12 years prior to the diagnosis of dementia. Motor problems If we look specifically at the motor problems in the various diseases, we see in Alzheimer’s disease increasing apraxia at an early stage, a slowing down of the motor activity with an accompanying slowing down of reaction time, a slower walking speed, and greater variability in gait parameters. In addition, there is a delay in stimulus processing at an early stage (tested using trailmaking A and B test). In the course of the disease, walking becomes increasingly difficult and movements less fluid. High muscle tension develops, initially as an inability to relax and later to move against the movements of, for example, a carer. The inability to relax and to move with the patient is also called Mitgehen or facilitory paratonia. The opposite movement is called Gegenhalten or oppositional paratonia. Vascular dementia In vascular dementia, motor problems are included in the international criteria. This is mainly because, often as a result of a CVA, the motor system is also affected, with, of course, hemiplegia and spasticity. Walking has a wide gait and is slower. There is often a disturbing static and dynamic balance. Muscle tension is often higher. Parkinson's dementia and Lewy Body dementia Parkinson’s dementia and Lewy Body dementia are two forms of dementia that most likely share a common pathogenesis. Both are caused by the incorrect folding of the alpha-synuclein protein in the cell wall. This causes the formation of inclusion bodies in the cell, which seriously disrupt the cell’s internal processes. • In Parkinson’s disease, this initially occurs in the basal nuclei, where motor activity is characteristically impaired, with bradykinesia, rigidity, freezing, and slowness (in thought and movement). Later in the disease process also other parts of the brain, such as the frontal cortex, are affected. • In Lewy body dementia the same process is going on with inclusion bodies (the Lewy Bodies) but here it originates in the frontal cortex whereby initially the cognitive problems are more predominant than the motor problems. Frontotemporal dementia Finally, the motor problems in frontotemporal dementia are visible in the initiation of movements, and disturbances in trunk stability and balance can be observed. Paratonia Paratonia was introduced into the medical scientific literature as early as 1828. It is described as an increased muscle tension that can be felt in dementia. In later years, sporadic writings were written about it and the phenomenon did not receive more attention until the end of the 1990s. However, even though paratonia has a devastating effect on the quality of life of people with dementia, and especially in the final phase of dementia, makes care almost impossible, there is surprisingly little scientific research into this phenomenon. In the early phase of dementia, we find a limited number of observational studies of which 2 are aimed at determining the pathogenesis. Besides a central neurological cause, a peripheral biomechanical process also seems to play a role. This is based on the formation of sugar-protein compounds (Advanced Glycation Endproducts, abbreviated to AGEs) that cause covalent connections in peripheral tissue.
ESSENTIALAI-STEM
Page:The Untamed.djvu/172 Every word was like a hand that pushed her farther away. "Are you dumb, Kate? What fetched you here?" "I have come to bring you home, Dan." "I'm home now." "What do you mean?" "There's the roof of my house," he jerked his hand towards the sky, "the mountain passes are my doors—an' the earth is my floor." "No! no! We are waiting for you at the ranch." He shrugged his shoulders. "Dan, this wild trail has no end." "Maybe, but I know that feller can show me the way to Jim Silent, an' now——" He turned towards Haines as he spoke, but here a low, venomous snarl from Black Bart checked his words. Kate saw him stiffen—his lips parted to a faint smile—his head tilted back a little as if he listened intently, though she could hear nothing. She was not a yard from him, and yet she felt a thousand miles away. His head turned full upon her, and she would never forget the yellow light of his eyes. "Dan!" she cried, but her voice was no louder than a whisper.
WIKI
What is Version Control? A very important concept to understand if you are going to work in a team environment. Also very useful to keep your own code tidy or store it online. Version control is a system that records changes to a file or set of files over time so that you can recall specific versions later. From the free "Pro Git" book. Using a Version Control System It might seem hard to grasp, but the huge platforms have many teams dedicated to a single project and they're working on it at the same time. The first step to understand how is to choose one of the available systems. The most popular one is Git. Go ahead and download it right off the front page. There's also other systems such as CVC, Subversion, Perforce, Mercurial, Bazaar, Darcs and others. Git vs GitHub You might have noticed me mention GitHub previously, GitHub is a platform, that uses Git. GitHub is a topic for later, currently let's get going with Git. Using Git So setting up is easy as you might have noticed. What you might notice first is that now you have 3 applications when you search for a "Git" application, atleast I do on Windows 10. • Git CMD • Git Bash • Git GUI These are the various ways to use the software, via the CMD as in Command Line. Bash or GUI, as in General User Interface. We're going to go through these in the following posts, but the important part right now is that there are more ways to interact with software than just pressing buttons on an interface. In the next post we will go through what is the Command Line and how to use it, and later about the various options are, with more featured filled graphical interfaces, than just the Git GUI. What is Git? At this point I would highly recommend looking into the freely available "Git Book" chapter on explaining Git. It might seem as a lot of information, but you only have to learn it once. Git is a very broadly used version control system, which allows you to do many great things around version control. You can even time travel. The book itself goes into many if not all aspects of Git and it's usage. You can get to the rest of the chapters via the breadcrumbs at the top. In short, Git uses principles of repositories (as in folders), which contain code and all of its version history. By adding this additional layer on any folder on your PC you can store the folder contents in multiple versions. It has principles of branches, that you can create in the repository, or repo in addition to the "main" branch. Imagine you have a website you're building with someone and you want to create your version of the latest version without changing the original code. You would create a branch of your own, which you can then merge with the main branch again. Summary There's a lot to learn about version control, so take it easy. I would suggest just to play around with it until it makes sense. Once you get to time travel through the versions, you will probably already feel somewhat comfortable.
ESSENTIALAI-STEM
Page:The Works of the Reverend George Whitefield, M.A. (1771 Vol 1).djvu/172 Be pleased to spread the letter before the ; and if you think this motion to be of him, be pleased to deliver the inclosed to your daughter—If not, say nothing, only let me know you disapprove of it, and that shall satisfy, dear Sir and Madam, Your obliged friend and servant in , G. W. LETTER CLXXIII. To Miss E. On board the Savannah, April 4th, 1740. BE not surprised at the contents of this:—The letter sent to your honoured father and mother will acquaint you with the reasons. Do you think, you could undergo the fatigues, that must necessarily attend being joined to one, who is every day liable to be called out to suffer for the sake of ? Can you bear to leave your father and kindred's house, and to trust on him, (who feedeth the young ravens that call upon him) for your own and childrens support, supposing it should please him to bless you with any? Can you undertake to help a husband in the charge of a family, consisting perhaps of a hundred persons? Can you bear the inclemencies of the air both as to cold and heat in a foreign climate? Can you, when you have an husband, be as though you had none, and willingly part with him, even for a long season, when his and master shall call him forth to preach the gospel, and command him to leave you behind? If after seeking to for direction, and searching your heart, you can say, "I can do all those things through strengthening me," what if you and I were joined together in the, and you came with me at my return from England, to be a help meet for me in the management of the orphan-house? I have great reason to believe it is the divine will that I should alter my condition, and have often thought you was the person appointed for me. I shall still wait on for direction, and heartily intreat him, that if this motion be not of him, it may come to nought.—I write thus plainly, because, I trust, I write not from any other principles but the love of .—I shall make it my business to call on the, and would advise you to consult both him
WIKI
Page:Sawdust & Spangles.djvu/30 was decidedly pacific in his disposition and preferred to stand abuse rather than fight. I was among the attachés of the show who witnessed the trouble, and it seemed to me a shame that a big fellow like the bully should be permitted to terrorize the most inoffensive of all the showmen. Suddenly the altercation grew warmer, the bully's arm shot forward and the little doctor was knocked to the ground. Instantly, however, he was on his feet, and the next moment I heard the sharp report of a pistol, saw the smoke curl from the muzzle of the arm and watched the fall of the bully. This was the first time in my life that I ever looked upon the face of the dead or witnessed any affray of a fatal character. The shock and shuddering which it caused me were so great that I actually attempted to leave the show business, but was soon back again into the "current of destiny" and became inured to these exciting scenes. The circus grounds appeared to be the favorite arena for the settlement of the neighborhood feuds that were then characteristic of backwoods communities. Weapons of every sort, from fists to pistols, were employed and
WIKI
Talk:PayPoint.net Hi, This is my first article so I am not quite sure where it went wrong. I have edited a couple of things on the article so I hope it will now look better. Please let me know what you think is wrong with my entry, and I'll edit it to reflect this. In terms of Google hits, what do you mean? I look forward to your reply. Regards, (Dina Jones (talk) 09:57, 20 November 2008 (UTC)) * The problem is the lack of any reliable sources independent of the article's subject. Such sources are required by the notability guidelines WP:N and WP:CORP. For a company formed in 2008, I'd expect these sources to take the form of newspaper articles. While Google shows several thousand hits, Google News offers little. None of the hits I looked at seemed to be both independent of PayPoint itself (ie not a press release) and more than a one-line passing mention. I've now discovered that there's a PayPoint article, and since the parent company is part of a significant stock index, reliable sources for the parent should exist. In that case, turning this article into a redirect to the parent company and merging significant content (backed up by sources!) seems the way to go. Huon (talk) 14:22, 20 November 2008 (UTC) * Dina, as I have suggested already, this could and should have been added to the PayPoint article rather than created as a separate article. Then, if at some future time, paypoint.net becomes notable in its own right, an article about it can be created later. – ukexpat (talk) 16:58, 20 November 2008 (UTC) * I merged this article's sourced content to the PayPoint article. Huon (talk) 13:25, 28 November 2008 (UTC)
WIKI
Anxiety & Mental Health The Integrative Approach to Mental Health The integrative approach to treating anxiety and mental health combines multiple therapeutic modalities from psychology, functional medicine and complementary therapies, such as nutritional supports, yoga, acupuncture and even sleep. The emphasis is on understanding the individual’s unique experiences and symptomatology. A collaborative patient-clinical team relationship is essential to ensure a personalised, effective and adaptable treatment protocol is established. The goal is to provide comprehensive care, addressing not only immediate symptoms but also underlying factors contributing to anxiety and mental health challenges.     Psychology Byron Bay The Health Lodge Anxiety Psychology & Mental Health An integrative approach to psychological treatment aims to harmoniously combine different therapeutic techniques to suit an individual’s unique needs. This model allows psychologists to be flexible and holistic in their interventions, effectively addressing complex psychological issues. Techniques from cognitive-behavioral therapy, polyvagal theory, Eye Movement Desensitisation and Reprocessing (EMDR), and IFS (Internal Family Systems Therapy) may be utilised as part of this integrative approach. The integrative approach utilised by our team of Psychologists, considers all aspects of the person, including their thoughts, emotions, behaviors, physical wellbeing, social environment, and past experiences. The individualised nature of this approach can lead to more effective therapeutic outcomes and a stronger therapeutic alliance, thereby enhancing overall patient satisfaction with therapy. Occupational Therapy & Mental Health An integrative approach to OT involves deepening our understanding of the intricate connection between our nervous system and the lifestyle factors influencing our overall well-being. Hayley Bowers, our occupational therapist, embodies a whole person approach by supporting clients to build practical skills. This includes incorporating mind-body interventions for self-regulation, sensory modulation techniques, and implementing lifestyle interventions related to exercise, nutrition, sleep hygiene, energy conservation, habits, routines and organisation. Hayley’s expertise extends to trauma-informed yoga training and eye movement desensitisation and reprocessing (EMDR), bringing a unique set of skills to her therapeutic approach. Craniosacral Therapy & Mental Health Craniosacral therapy (CST) is a gentle, non-invasive form of bodywork that addresses the bones of the head, spinal column, and sacrum to improve the functioning of the central nervous system. The fundamental belief of CST is that blockages or imbalances in the flow of cerebrospinal fluid can cause a variety of health issues, including anxiety and other mental health disorders. Our Osteopathic practitioners use light touch to detect these blockages or imbalances and help correct them, thereby reducing stress and enhancing health. Proponents of CST suggest that the calming and relaxing nature of the therapy can help to soothe the nervous system, relieving symptoms of anxiety, depression, and stress-related conditions. Craniosacral Therapy is a wonderful complementary treatment that can be used in a holistic treatment protocol, alongside psychology and other mental health treatments. Acupuncture & Mental Health Acupuncture has gained recognition as a complementary approach in treating anxiety and various mental health disorders. Acupuncture involves inserting very thin needles into specific points on the body to stimulate energy flow, or “Qi”, and restore balance. Traditional Chinese belief is that disease or discomfort in the body, including mental health issues, is a result of disrupted Qi. Acupuncture is thought to rebalance this energy, promoting physical and mental wellness. Modern research suggests that acupuncture may positively affect the nervous system, regulating neurotransmitters and hormones, which could play a role in mitigating anxiety and depression. Additionally, acupuncture may stimulate the body’s natural painkillers, endorphins, enhancing feelings of well-being. Our Acupuncturists work collaboratively with mental health practitioners to create a holistic approach to care. Osteopathy & Mental Health Osteopathy emphasises the interconnection of the body’s structure and function and whilst traditionally used for musculoskeletal issues, it is increasingly recognised for its potential benefits in treating anxiety and other mental health disorders. The osteopathic philosophy posits that mental health conditions could stem from or be aggravated by physical discomfort or imbalance. Thus, osteopaths utilise manipulative techniques to restore structural balance, enhancing the body’s natural healing mechanisms. Techniques may include soft tissue manipulation, joint articulation, and cranial osteopathy, aiming to improve circulation, reduce muscular tension, and enhance nervous system function. Though not a standalone treatment for mental health disorders, osteopathy can complement conventional treatments, providing a holistic approach that addresses both the physical and emotional aspects of the patient’s wellbeing. Our integrative Osteopaths are an effective element of the integrative approach to Mental Health. Vagus Nerve Therapy & Mental Health Naturopathy and vagal nerve stimulation offer potential avenues for treating anxiety, including through the modulation of the brain-gut axis. Naturopathy emphasises a holistic approach, employing natural remedies, lifestyle modifications, and dietary changes to address underlying imbalances in the body. By focusing on optimising gut health, which plays a crucial role in emotional well-being, naturopathy aims to alleviate anxiety symptoms. The vagus nerve, a major component of the parasympathetic nervous system, connects the brain and the gut. Vagal nerve stimulation techniques, vagal nerve stimulation, such as deep breathing exercises, meditation, and specific devices, can activate the vagus nerve and promote relaxation, reducing anxiety. These approaches recognise the interconnectedness of the brain and the gut and seek to restore balance for improved mental health. Our Naturopath and Vagus Nerve Therapist, Luke Szabo, works together with the team at The Health Lodge to apply this therapy in a holistic treatment protocol. Naturopathy & Mental Health In the realm of integrative naturopathy and mental health, an emerging area of focus lies in understanding the role of the gut microbiome and its impact on serotonin production. The gut microbiome refers to the complex community of microorganisms that reside in our digestive tract, playing a crucial role in various bodily functions, including digestion, immune system modulation, and even mental health. Serotonin, often referred to as the “feel-good” neurotransmitter, is primarily known for its role in regulating mood, sleep, and appetite. Interestingly, a significant portion of serotonin is synthesised in the gut, highlighting the intricate connection between the gut and the brain. The microbiome is directly involved in the production and regulation of serotonin, influencing our emotional well-being and mental health. Moreover, unidentified food allergies or intolerances can have a profound impact on mood and mental health. When the body experiences adverse reactions to certain foods, it triggers an immune response, leading to inflammation and the release of pro-inflammatory cytokines. This inflammation can have a negative effect on brain function, altering neurotransmitter levels and contributing to symptoms of anxiety, depression, and mood swings. By incorporating personalised dietary interventions, integrative naturopaths address potential food allergies or sensitivities that may be affecting mood. They work closely with individuals to identify and eliminate problematic foods from their diet, helping to reduce inflammation and promote a healthier gut environment. This approach aims to optimise the gut-brain axis and create a favourable balance within the microbiome, ultimately supporting improved mental well-being and mood stability. Bioresonance & Mental Health As a holistic therapy, Bioresonance aims to treat anxiety and mental health distress by addressing the energetic imbalances within the body. It is based on the belief that every living organism emits electromagnetic waves, and when these waves are disrupted or unbalanced, it can lead to physical and emotional issues, including anxiety. Bioresonance devices are used to detect and analyse these electromagnetic frequencies, identifying areas of disharmony. By applying corrective frequencies, bioresonance therapy aims to restore balance and harmony to the body’s energy fields. Proponents of this therapy suggest that rebalancing the energetic frequencies can help reduce anxiety symptoms, promote relaxation, and support overall emotional well-being. Our Bioresonance Practitioners work with our team of Mental Health Professionals to support patients. Learn With Us! Our Education Portal provides you with the opportunity to learn from our exceptional team of integrative practitioners. Explore articles, informative videos and resources created by our team to inform, educate and assist you in cultivating health and well-being in your daily life: Anxiety Series • 1: Understanding and Treating Anxiety from an Integrative Perspective – watch here • 2: Anxiety and the Brain Gut Connection – watch here • 3: The Nervous System: Theory and Therapy – watch here • 4: The Vagus Nerve and Key Therapeutics – watch here • 5: Osteopathy in an Integrative Approach to Treating Anxiety – watch here Polyvagal Theory in Everyday Life – watch here What is EMDR – watch here SAMe and Mental Health: A Natural Boost for Emotional Well-Bring – read here An Approach to treating Mental Health using Acupuncture – read here Blood Sugar and Mental Health – read here Shop With Us! The Remedy Room provides an online Herbal Dispensary and Naturopathic Services where you can purchase a range of healthcare products and address acute naturopathic care. The Remedy Room also offers free Naturopathic consultations to assist you with purchasing prescription-only products. For more information, you can contact The Remedy Room on 02 6685 6445 Integrative Treatment and Coordinated Care At The Health Lodge, we understand that navigating ill-health can be challenging and we are here to support you in your health journey. Our integrative health professionals recognise that through combining modalities we can create more opportunities for healing.  We offer customised coordinated care programs, integrating the best modalities and treatment protocols to address your health needs. Book a free 15min call back from one of our team to discuss how a coordinated care or day patient program may suit your needs.
ESSENTIALAI-STEM
fcml  1.2.2 Classes | Macros | Typedefs | Enumerations | Functions fcml_disassembler.h File Reference Structures and functions declarations related to FCML disassembler. More... #include "fcml_lib_export.h" #include "fcml_instructions.h" #include "fcml_types.h" #include "fcml_errors.h" #include "fcml_common.h" #include "fcml_dialect.h" Include dependency graph for fcml_disassembler.h: This graph shows which files directly or indirectly include this file: Go to the source code of this file. Classes struct  fcml_st_disassembler_conf  Disassembler configuration. More...   struct  fcml_st_disassembler_context  Disassembler context. More...   struct  fcml_st_instruction_prefix  Describes one decoded prefix. More...   struct  fcml_st_prefixes_details  Contains some additional information about all decoded instruction prefixes. More...   struct  fcml_st_operand_details  Some additional disassembler specific information about decoded operands. More...   struct  fcml_st_raw_displacement  Displacement in raw form. More...   struct  fcml_st_decoded_modrm_details  Some basic information about decoded ModR/M and SIB bytes. More...   struct  fcml_st_instruction_details  Additional instruction details provided by disassembler. More...   struct  fcml_st_disassembler_result  Reusable disassembler result holder. More...   Macros #define FCML_DASM_PREFIXES_COUNT   12  Maximal number of instruction prefixes. More...   #define FCML_DASM_CONDITIONAL_GROUP_1   0x00  First group of conditional suffixes (See FCML manual). More...   #define FCML_DASM_CONDITIONAL_GROUP_2   0x01  Second group of conditional suffixes (See FCML manual). More...   Typedefs typedef struct fcml_st_disassembler fcml_st_disassembler  This structure and type declaration represents an abstract disassembler. More...   typedef struct fcml_st_disassembler_conf fcml_st_disassembler_conf  Disassembler configuration. More...   typedef struct fcml_st_disassembler_context fcml_st_disassembler_context  Disassembler context. More...   typedef enum fcml_en_prefix_types fcml_en_prefix_types  Available types of instruction prefixes. More...   typedef struct fcml_st_instruction_prefix fcml_st_instruction_prefix  Describes one decoded prefix. More...   typedef struct fcml_st_prefixes_details fcml_st_prefixes_details  Contains some additional information about all decoded instruction prefixes.   typedef struct fcml_st_operand_details fcml_st_operand_details  Some additional disassembler specific information about decoded operands. More...   typedef struct fcml_st_raw_displacement fcml_st_raw_displacement  Displacement in raw form.   typedef struct fcml_st_decoded_modrm_details fcml_st_decoded_modrm_details  Some basic information about decoded ModR/M and SIB bytes. More...   typedef struct fcml_st_instruction_details fcml_st_instruction_details  Additional instruction details provided by disassembler. More...   typedef struct fcml_st_disassembler_result fcml_st_disassembler_result  Reusable disassembler result holder. More...   Enumerations enum  fcml_en_prefix_types {   FCML_PT_GROUP_UNKNOWN = 0,   FCML_PT_GROUP_1 = 1,   FCML_PT_GROUP_2,   FCML_PT_GROUP_3,   FCML_PT_GROUP_4,   FCML_PT_REX,   FCML_PT_VEX,   FCML_PT_XOP,   FCML_PT_EVEX }  Available types of instruction prefixes. More...   Functions LIB_EXPORT fcml_ceh_error LIB_CALL fcml_fn_disassembler_init (const fcml_st_dialect *dialect, fcml_st_disassembler **disassembler)  Initializes disassembler instance. More...   LIB_EXPORT fcml_ceh_error LIB_CALL fcml_fn_disassemble (fcml_st_disassembler_context *context, fcml_st_disassembler_result *result)  Disassembles one instruction from provided code buffer. More...   LIB_EXPORT void LIB_CALL fcml_fn_disassembler_result_prepare (fcml_st_disassembler_result *result)  Prepares reusable result holder for disassembler. More...   LIB_EXPORT void LIB_CALL fcml_fn_disassembler_result_free (fcml_st_disassembler_result *result)  Cleans result holder. More...   LIB_EXPORT void LIB_CALL fcml_fn_disassembler_free (fcml_st_disassembler *disassembler)  Frees disassembler instance. More...   Detailed Description Structures and functions declarations related to FCML disassembler. Macro Definition Documentation ◆ FCML_DASM_CONDITIONAL_GROUP_1 #define FCML_DASM_CONDITIONAL_GROUP_1   0x00 First group of conditional suffixes (See FCML manual). ◆ FCML_DASM_CONDITIONAL_GROUP_2 #define FCML_DASM_CONDITIONAL_GROUP_2   0x01 Second group of conditional suffixes (See FCML manual). ◆ FCML_DASM_PREFIXES_COUNT #define FCML_DASM_PREFIXES_COUNT   12 Maximal number of instruction prefixes. Typedef Documentation ◆ fcml_en_prefix_types Available types of instruction prefixes. For more information see Intel/AMD Architecture Manual. ◆ fcml_st_decoded_modrm_details Some basic information about decoded ModR/M and SIB bytes. ◆ fcml_st_disassembler This structure and type declaration represents an abstract disassembler. ◆ fcml_st_disassembler_conf Disassembler configuration. ◆ fcml_st_disassembler_context Disassembler context. ◆ fcml_st_disassembler_result Reusable disassembler result holder. ◆ fcml_st_instruction_details Additional instruction details provided by disassembler. ◆ fcml_st_instruction_prefix Describes one decoded prefix. ◆ fcml_st_operand_details Some additional disassembler specific information about decoded operands. Enumeration Type Documentation ◆ fcml_en_prefix_types Available types of instruction prefixes. For more information see Intel/AMD Architecture Manual. Function Documentation ◆ fcml_fn_disassemble() LIB_EXPORT fcml_ceh_error LIB_CALL fcml_fn_disassemble ( fcml_st_disassembler_context context, fcml_st_disassembler_result result  ) Disassembles one instruction from provided code buffer. Disassembles the first instruction available in the provided code buffer using disassembler instance, configuration and entry point accessible through the disassembler context. Disassembled instruction model as well as potential errors are returned in reusable result holder given in the second parameter. Result holder has to be allocated by the user and appropriately prepared using fcml_fn_disassembler_result_prepare() function. As long as the instruction context and the result holder are not shared across multiple function calls disassembling process is thread safe. Parameters contextDisassembler context. resultAppropriately prepared result holder. Returns Error code or FCML_CEH_GEC_NO_ERROR. See also fcml_fn_disassembler_result_free ◆ fcml_fn_disassembler_free() LIB_EXPORT void LIB_CALL fcml_fn_disassembler_free ( fcml_st_disassembler disassembler) Frees disassembler instance. Every disassembler instance manages some resources internally and as such it has to be deallocated as soon as it is not needed anymore. Parameters disassemblerDisassembler to be freed. ◆ fcml_fn_disassembler_init() LIB_EXPORT fcml_ceh_error LIB_CALL fcml_fn_disassembler_init ( const fcml_st_dialect dialect, fcml_st_disassembler **  disassembler  ) Initializes disassembler instance. Initializes disassembler instance for given dialect. Disassembler initialized in such a way is dialect dependent and generates generic instruction models compliant to the syntax supported by the dialect (Intel, AT&T). Every disassembler instance has to be freed using fcml_fn_disassembler_free() function as soon as it is not needed anymore. Parameters dialectDialect for newly created disassembler. [out]disassemblerInitialized disassembler instance. Returns Error code or FCML_CEH_GEC_NO_ERROR. See also fcml_fn_disassembler_free ◆ fcml_fn_disassembler_result_free() LIB_EXPORT void LIB_CALL fcml_fn_disassembler_result_free ( fcml_st_disassembler_result result) Cleans result holder. Frees all memory blocks allocated by the disassembler and held inside the result holder (Instructions, errors etc.). Notice that result holder itself is not freed and can be even safety reused after calling this function. In fact this function is also called internally by assembler in order to clean result holder before reusing it. Parameters resultResult holder to clean. ◆ fcml_fn_disassembler_result_prepare() LIB_EXPORT void LIB_CALL fcml_fn_disassembler_result_prepare ( fcml_st_disassembler_result result) Prepares reusable result holder for disassembler. Every instance of fcml_st_disassembler_result structure is reusable from the disassembler's point of view, so it has to be prepared in the right way in order to allow disassembler to reuse it correctly. It is up to the library user to allocate space for the holder itself. This function is only responsible for cleaning the structure correctly and preparing it for first disassembling process. Notice that disassembler has to clean the result holder at the beginning so you can not pass an uninitialized memory block because it can even cause a crash due to illegal memory access. Parameters resultResult holder instance to be prepared. See also fcml_fn_disassembler_result_free
ESSENTIALAI-STEM
David Evangelista David Evangelista is a fashion/beauty contributor to The Early Show, as well as a guest judge on Iron Chef America and a well-known red carpet regular who seeks Joan Rivers as his rival. He was nominated for five Emmy Awards for the hairstyling he did on The Rosie O'Donnell Show. He is openly gay. He is well known for his contributions to The Early Show, including his makeover segments, his take on red-carpet fashion, as well as just regular tips on fashion and beauty. Since 2002, he has been a regular contributor, appearing on the show at least once a month. He also served as a judge on the CBS reality competition show Wickedly Perfect in 2005 and as host on The Fashion Team from 2006 to 2007. He is a very close friend of both Phoebe Cates and Ricki Lake, and was a friend of Joan Rivers, and has been seen with the likes of Steven Cojocaru, critiquing celebrities as they ''"strut their stuff" on the red carpet. He is also a friend of Rachael Ray and Alton Brown of The Food Network fame. In 2006, he was invited to serve as an Iron Chef America guest judge at the request of both Alton Brown and Rachael Ray. He became a memorable guest judge on the show for his strict, but gentle comments towards the chefs in each episode. To this date Evangelista has guest judged over 6 times on Iron Chef: America, and served as a guest judge in the most memorable episode to date ; in which Rachael Ray served up her best in a contest against Italian chef Giada de Laurentiis. In addition to his celebrity status, David owned and operated his own salon as a component of Cornelia Fifth Avenue Spa on 51st Street and 5th Avenue in New York, NY. He also has his own brand of hair and beauty products which are sold online, as well as on QVC and the Home Shopping Network. He is the cousin of actors Roberto Lombardi and Gina Lombardi and stylist Kevin Gatto, as well as the nephew of actress Dolores M. Lombardi. He is also cousin to the carpenter Scott McGregor.
WIKI
Tore Planke Tore Planke (born 25 January 1943) is a Norwegian engineer, inventor and businessperson. He was born in Oslo to Sverre Martens Planke and Vivien Brath, and is a brother of Petter Planke. He was married to Grete Lind from 1970 to 1991, and to Ingrid Elisabeth Planke from 1994. Planke graduated from the Norwegian Institute of Technology in 1969, specializing in cybernetics. He co-founded the industry company Tomra in 1972, along with his brother. The company produced reverse vending machines based on his inventions using electronics and optics for recognizing the bottles.
WIKI
scat/scat-base.ss #lang scheme/base ;; Primitives for the base SCAT language. This should bring the ;; language up to a point where it is useful to start writing ;; programs. (require "rpn-scat.ss" ;; scat: macro ;; use SCAT rpn syntax + namespace tools.. "scat-syntax.ss" "../ns.ss" ;; ..to define/snarf functionality from "rep.ss" "../tools.ss" "print.ss" (lib "pretty.ss") ;; with names not to be exported tucked away here, so a simple ;; provide statement can be used. "base-utils.ss" ;; (for-syntax scheme/base) ) (provide ;; define-word (all-defined-out)) ;; For debugging convenience at the command line, this is a macro ;; for defining named code. It returns the value of the defined code ;; so it fits the normal 'language:' behaviour, though has a side ;; effect. ;; This is ONLY a notational shortcut to make life easier on the ;; debug repl. Don't use it in source files! (define-syntax define-base (syntax-rules () ((_ name . body) (ns (scat) (define name (scat: . body)))))) ;; DEBUG (define-word ctrace s (cons (continuation-mark-set->list (current-continuation-marks) 'word) s)) ;; Interpret the rest of the code body as a scheme lambda ;; expression. This allows the use of scheme-style lambda ;; expressions as quotations. ;; (define-syntax --base/lambda ;; (syntax-rules () ;; ((_ (formals . body) expr) ;; (apply (lambda formals . body) expr)))) ;; Example 'parsing word'. Transfer control back to the compiler ;; after combining a datum as a quoted immediate value. ;; (define-syntax (--base/qw stx) ;; (syntax-case stx () ;; ((_ (datum . code) expr) ;; ((rpn-next) ;; #'code ;; ((rpn-immediate) ;; #'(quote datum) ;; #'expr))))) ;; Quoting word with delegate. ;; (define-parsing-word ;; base/qw (word) ;; (lambda (code expr) ;; ((rpn-immediate (stx-cons ;; Dynamic environment constructors. These construct a unary function ;; that accepts a thunk, which can be combined with 'dynamic'. This is ;; factored so the code here doesn't need to know about the state ;; abstraction / control passing mechanism. (define-syntax define-dynamic (syntax-rules () ((_ name fn) (define-word name (thing . s) (make-dynamic fn thing s))) ((_ name) (define-dynamic name name)))) (define (make-dynamic fn thing s) (cons (lambda (thunk) (fn thing thunk)) s)) (define-dynamic with-output-to-file/safe) ;; (define-dynamic with-io-device) ;; FIXME ;; PRIMITIVES ;; These are language primitives that can't be directly snarfed from ;; scheme functions. The implementation is exposed here: we map the ;; input argument list to an single output list value. (define-word id s s) (define-word stack@ s (list* s s)) (define-word stack! (new . s) new) (define-word stack s (list s)) (define-word drop (a . s) s) (define-word dup (a . s) (list* a a s)) (define-word swap (a b . s) (list* b a s)) (define-word swap3 (a b c . s) (list* c b a s)) (define-word over (a b . s) (list* b a b s)) (define-word rot (a b c . s) (list* c a b s)) (define-word -rot (a b c . s) (list* b c a s)) (define-word rot4 (a b c d . s) (list* d a b c s)) (define-word -rot4 (a b c d . s) (list* b c d a s)) (define-word uncons (pair . s) (list* (cdr pair) (car pair) s)) (define-word cons (kdr kar . s) (list* (cons kar kdr) s)) (define-word append (tail head . s) (list* (append head tail) s)) ;; (define-word union (a b . s) (list* (lset-union eq? a b) s)) ;; (define-word intersection (a b . s) (list* (lset-intersection eq? a b) s)) ;; (define-word difference (a b . s) (list* (lset-difference eq? b a) s)) (define-word and (a b . s) (list* (if (number? a) (bitwise-and a b) (and a b)) s)) (define-word or (a b . s) (list* (if (number? a) (bitwise-ior a b) (or a b)) s)) (define-word not (a . s) (list* (not a) s)) ;; use -1 xor for bitwise (define-word unlist (l . s) (foldl cons s l)) (define-word nil s (cons '() s)) (define-word read-byte (p . s) (cons (read-byte-timeout p 1) s)) (define-word write-byte (p b . s) (write-byte b p) s) (define-word format (fmt l . s) (list* (apply format fmt l) s)) (define-word lex-stream (p . stack) (let next ((l '())) (let ((thing (read p))) (if (eof-object? thing) (list* (reverse l) stack) (next (cons thing l)))))) ;; DELIMITED CONTINUATIONS ;; NOTE: Syntactic structures can violate the premise that scat code ;; is concatenative. However, the shift/reset macros do not process ;; the code stream, so won't violate this. (require scheme/control) ;; Use a specific prompt tag so scat code has no access to the ;; scheme driver code that sets up the state threading. (define scat-prompt (make-continuation-prompt-tag 'scat-prompt)) ;; (ns (scat) (define-syntax reset (rpn-wrap (expr) #`(reset-at scat-prompt #,expr)))) ;; (ns (scat) (define-syntax shift (rpn-wrap (expr) #`(shift-at scat-prompt k #,((rpn-immediate) #'k expr))))) ;; DYNAMIC ENVIRONMENTS ;; SNARFS ;; These get functionality straight from scheme with minimal ;; hassle. below '+' means define word '+' using scheme's '+' and ;; (choose if) means, define word 'choose' using scheme's 'if'. (snarf as-push (scat) ;; ((d t) (dict-find dict-find/false dict-recursive-find)) ;; ((d t i) (dict-set dict-shadow dict-recursive-mute)) ((a b) (= < > >= <= + - * / modulo <<< >>> eq? eqv? equal? string-append list->table min max)) ((a b) ((xor bitwise-xor))) ((a) (exp log sin cos tan 2/ 2* << sqrt)) ;; ((path) (ns-ls ns-ref)) ((thing) (symbol? number? null? procedure? string? list? pair? vector? eof-object? ->string)) ((number) (round floor ceiling inexact->exact exact->inexact integer->char)) ((symbol) (symbol->string)) ((str) (string->list string->symbol bytes->string/utf-8)) ((fname) (open-input-string open-input-file)) ((port) (read)) ((c a b) ((choose if))) ;; ((word) (word-source)) ;; For run time compilation to work, the appropriate modules need ;; to be loaded into the runtime compiler namespace using ;; 'rpn-modules'. ;; ((code compiler) (rpn-compile)) ;; ((modules) (rpn-modules)) (() (current-process-milliseconds cpm-mark)) ((lst) (reverse flatten car caar caaar cdr cadr cddr list->string list->bytes eval)) ) ;; Side-effecting words. (snarf as-void (scat) ((datum) (write display print write-tree pretty-print)) ((s fmt) (stack-print)) ; ((exception) ((throw raise))) ((filename) (delete-file close-input-port close-output-port load)) ((to from) (rename-file-or-directory)) ((word) (print-word)) ) ;; COMPOSITE CODE (compositions (scat) scat: ;; (infra reverse-infra reverse) ;; constants (true #t) (false #f) ;; math (pow log * exp) ;; stacks & lists & vectors (swons swap cons) (unswons uncons swap) (2dup over over) (nip swap drop) ;; (vector list list->vector) (cycle uncons reverse cons reverse) (sd stack drop) ;; printing (cr "\n" display) (space " " display) (tab "\t" display) (p print space) (d display space) (pp pretty-print) (hs stack@ print-stack) ;; host stack (print-stack " ~s" stack-print) ;; files (read-file open-input-file lex-stream) (lex-line open-input-string lex-stream) ;; CODE / DATA ;; (:base 'scat: rpn-compile) ;; source -> program ;; (source word-source) ;; get source code, discard semantics ;; (semantics word-semantics) ;; MONADS ;; The 'lift' operation (a.k.a. the 'map' operation) is the only ;; one that can be made ignorant of the monad type, given that ;; monad state is always implemented as the top of the data stack. ;; The other operations: 'join' and 'return' need to be ;; monad-specific. Since I don't have type classes, i'm stuck with ;; name tagging. But, I didn't run into uses for this. ;; This will only work for base syntax. ;; (lift unrun:base (dip) compose) ) ;; Convert a list of functions to a function. (define (scat-compose lst) (apply compose (reverse lst)))
ESSENTIALAI-STEM
-- U.S. Air Force Restarts Afghanistan Aircraft Competition The U.S. Air Force will restart its stalled $1 billion competition to buy light attack aircraft for the Afghanistan military, it said today. The military will issue a draft request for proposals April 17 and a final version April 30, the service said in an e-mailed statement. A new award is scheduled for early 2013. The Air Force on Feb. 28 canceled a disputed $1 billion contract to Sierra Nevada Corp. after determining the documentation used to make the award was flawed. Sierra Nevada and its Brazilian subcontractor, Embraer SA (EMBR3) , will again compete against Hawker Beechcraft Corp. Hawker, a closely held company that is 49 percent-owned by Goldman Sachs Group Inc. (GS) , had protested the Defense Department’s December decision, which gave Sierra the order to provide the aircraft for the Afghan military. Hawker sued the military in the U.S. Court of Federal Claims in Washington, claiming it was unfairly eliminated from the competition. The decision was a blow to the Wichita, Kansas- based company, which has been struggling with slower defense spending. Spokesmen for Hawker, Sparks, Nevada-based Sierra and Embraer didn’t immediately respond to phone calls and e-mails. Embraer hoped to use the contract to establish a relationship with the Pentagon, Chief Executive Officer Frederico Curado told reporters on April 10 at the U.S. Chamber of Commerce in Washington . “This tends to give us opportunities for future transactions,” Curado said. He said the contract would give the company credibility abroad as well. “We just have to hope that when this process is reconsidered or reopened that there are no changes to the original specs,” he said. “If there are no changes, I think the same reasons that made us win the first time will make us win the second time.” To contact the reporters on this story: Tony Capaccio in Washington at acapaccio@bloomberg.net ; Danielle Ivory in Washington at divory@bloomberg.net To contact the editor responsible for this story: Stephanie Stoughton at sstoughton@bloomberg.net
NEWS-MULTISOURCE
Intel Corp. Delays 10nm Chip Production Chip giant Intel (NASDAQ: INTC) had told investors to expect that it would start shipping products built using its 10nm chip manufacturing technology in the first half of 2018, with higher volume shipments happening in the second half of 2018. Rumors have been flying that Intel's 10nm technology development technology progress hasn't been going as well as the company hoped, posing a risk to that schedule. During its earnings conference call on April 26, Intel admitted that because the yield rate (the percentage of chips produced that are salable) of the technology hasn't been improving as quickly as expected, it would push off mass shipments of chips built using 10nm to sometime in 2019. Let's go over what this means for the company. This is really bad A delay in the company's 10nm technology means that all of the products that were supposed to be manufactured using it -- PC processors, data center chips , cellular modems, and more -- will all be pushed out. This means that Intel isn't bringing more compelling products to the marketplace as quickly as it would have without the manufacturing delay, potentially hurting its competitive positioning. Compounding the effect, not only does Intel not get the inherent benefits of new manufacturing technologies (like more performance and better power consumption), but it also won't get all the design enhancements its engineers incorporated into new chips out on time, either. Intel's 10nm technology had already been substantially delayed (it was supposed to go into mass production by the end of 2015, but that schedule kept getting pushed out), so further delays only make the situation worse. The pain doesn't end there Intel's pushing out mass production of its 10nm chips from the second half of 2018 to sometime in 2019 is bad. But it's worth noting that on the conference call, Intel couldn't even commit to when in 2019 its 10nm technology would finally go into mass production. According to Intel CEO Brian Krzanich, the timing will depend on how quickly the company can improve the yield rates. If things go well -- and that's a relative term, since things are obviously not well with the technology -- Intel could bring it into mass production during the first half of 2019. If things don't go well, mass production might not start until the second half of 2019 (and that could mean as late as Dec. 31, 2019). Products built using Intel's 10nm technology might not make it to the market in real volume until 2020. Foolish takeaway Intel's financial performance last quarter was strong, and it will likely enjoy an excellent 2018 (having raised its guidance for both revenue and profit for the year). But ultimately, the risks associated with its 10nm technology issues could materialize in a big way during 2019. Intel needs to bring out new products next year, and it's not clear that it has viable backup plans for bringing out compelling new products using its 14nm technology in 2019, should 10nm remain nonviable throughout the year. This isn't good. 10 stocks we like better than Intel When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor , has quadrupled the market.* David and Tom just revealed what they believe are the 10 best stocks for investors to buy right now... and Intel wasn't one of them! That's right -- they think these 10 stocks are even better buys. Click here to learn about these picks! *Stock Advisor returns as of April 2, 2018 Ashraf Eassa owns shares of Intel. The Motley Fool recommends Intel. The Motley Fool has a disclosure policy . The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
mzinga Noun * 1) firearm Noun * 1) hive (a box or basket for the reception and habitation of a swarm of honeybees) * 2) cannon
WIKI
Sam Nolutshungu Samuel Clement Nolutshungu (15 April 1945 – 12 August 1997) was one of the foremost South African scholars, and an internationally acclaimed expert on South African politics. Born in King William's Town in 1945, he studied first in the Lovedale High School and after in the University of Fort Hare. Because of apartheid he left in the 1960s South Africa for England, and thanks to a scholarship went to Keele University where he obtained a first class degree in economics, history and politics. He successively taught in the Government Department of Manchester University between 1978 and 1990. From 1991 till his death he was professor of political science and African politics at the University of Rochester, and since 1995 also acting director of the university's Frederick Douglass Institute for African and African-American Studies. In December 1996 he had been offered the most important position in the South African university system, the vice-chancellorship of the University of the Witwatersrand, but was forced to turn down the offer in January due to a cancer that brought to his death in Rochester on 12 August. Nolutshungu produced a high number of significant articles, and published three books. His first book, South Africa in Africa: a study in ideology and foreign policy, published in 1975, was his doctoral thesis; this work is considered to be the first major study of South African politics by a black South African. It was followed in 1982 by another work on South African politics, Changing South Africa: political considerations, an analysis of the prospects for non-violent transition to a non-racial society. The study obtained the Johannesburg Sunday Times' Book of the Year Award. His last major work was Limits of anarchy: intervention and state formation in Chad, written in 1996, which examined Chadian modern history with the intention of exploring the dilemmas that involve "fictive states", i.e. countries which have to endure a fitful existence between too much and too little government.
WIKI
Cell EMF Calculator Cell EMF calculator is used for providing the value of electromotive force (EMF) for galvanic (voltaic) cells with given electrodes potential. EMF is known as an electromotive force. It is a maximum potential difference between two electrodes of voltaic or galvanic cell. It also defined as electric pressure or force which generates the current in a circuit. The EMF unit is volt [V].   Formula of Cell EMF Calculator The formula to calculate the area of a parallelogram is as follows EMFcell [V] = Ecathode [V] - Eanode [V] Where, A cathode = reducing electrode that releases the electron to the external circuit that's potential is in volts[V]. A node = oxidizing electrode that accepts the electron from an external circuit that's potential is in volts[V] EMFcell = electromotive force. Note: If you want to calculate buffer capacity, you can use our Buffer Capacity Calculator. Example If we have a potential of anode is 8.5 volts and the potential of cathode is 12.5 volts then find the cell emf? Given data potential of anode = 8.5 volts potential of cathode = 12.5 volts To Find EMFcell =? Solution By using the formula listed below, you can find the area of a parallelogram. EMFcell [V] = Ecathode [V] - Eanode [V] Putting values in the formula: EMFcell = 8.5 - 12.5 EMFcell = 4 volts How to use the Cell EMF Calculator? The steps to use the cell EMF calculator are as follows: Step 1: Enter the value of the anode in the first required input. Step 2: Enter the value of the cathode in the second input needed. Step 3: The calculator will automatically display an answer on the screen. Calculator use To find the Cell EMF, you can use our Cell EMF Calculator. Just enter the required values, and the answer will be shown on the screen
ESSENTIALAI-STEM
Katinka Szijj Katinka Szijj (born February 25, 1993) is a female shooter from Hungary. She got acquainted with shooting by chance in 2004 on a local sport day. She and her family soon realized that she had a talent for the sport, and so she applied for membership at the local club, Komáromi VSE, along with her younger sister, Kamilla, who also became a shooter. She got on the podium on her first national championship with a 3rd place in 2006. Since then, she has won several titles. She participated in the 2010 Summer Youth Olympics. She qualified for the event in Meraker, Norway, on March 10, 2010, with a result of 497,1 points.
WIKI
Peter Klug-Andersen Peter Klug-Andersen is a Danish coxswain. He won a gold medal at the 1981 World Rowing Championships in Munich with the lightweight men's eight.
WIKI
Spotify: This is what Capitol Hill is listening to Ever wonder what type of music your favorite congressman listens to? On Sunday, Spotify released the playlists of seven U.S. senators and 13 U.S. representatives. Bruce Springsteen was a predictable favorite, appearing on the playlists of eight Congressmen. Tracks from Broadway smash "Hamilton" also appeared on multiple playlists, including that of Sen. Orrin Hatch of Utah, Sen. Kirsten Gillibrand of New York and Rep. Joe Crowley of New York. Sen. Cory Booker of New Jersey has a nice mix of classics (Stevie Wonder, Marvin Gaye), alternative contemporary (Ellie Goulding, Hozier) and power ballads (Sara Bareilles' "Brave," Rachel Platten's "Fight Song"). Booker's playlist also features songs from the hot soundtracks of "Hamilton" and musical drama "Empire." Rep. Darrell Issa of California favors classics like Bob Dylan, Cat Stevens, and Jimi Hendrix. Issa's playlist also included "Crazy In Love" by Beyonce and Ryan Adams' cover of "Shake It Off" by Taylor Swift. In a dose of '90s nostalgia, the congressman also included a Fu-Schnickens track featuring Shaquille O'Neal, "What's Up Doc? (Can We Rock)." Politicians, they're just like us, trying to seem hip and relatable by sharing their Spotify playlist.
NEWS-MULTISOURCE
Linux Network Interface Naming From Leo's Notes Last edited on 20 June 2020, at 18:23. Traditionally, network interfaces on Linux are enumerated as eth[0...n], where the first device being probed on start up is assigned eth0 and so on. Modern Linux utilizing systemd will assign network interfaces based on a Predictable Network Interface naming scheme which corresponds the network name to its hardware location. For example, an interface is named wlp2p1 because it is a wireless device located at a PCI bus 2, slot 1. The motivation for this is to deterministically set network adapter names on systems with multiple adapters. Predictable Network Naming Systems using the predictable network naming scheme will be named according to the following (simplified) rules. For the full description of these rules in greater detail, see the Red Hat documentation for RHEL 8 on predictable network naming. Prefix Suffix • en - ethernet • wl - wireless LAN • ww - wireless wide area network • oN - onboard device, where N is the onboard index • sN - hot plug, where N is the slot index • xMAC - based on MAC address • pN/sX - for devices connected on a bus, where N is the bus number and X is the slot number. For example: eno0 is the first onboard ethernet device, while enp0s0 is the first ethernet device connected to the first bus on the first slot. Revert back to the traditional eth[0..N] naming scheme You can revert back the old naming scheme using any one of the following methods as outlined on this systemd page. 1. You create your own manual naming scheme by creating your own custom.link files within /etc/systemd/network/ which defines the specific name you wish to use. The description for this file is outlined at https://www.freedesktop.org/software/systemd/man/systemd.link.html # Match based on MAC address (and device path if uncommented) [Match] MACAddress=00:a0:de:63:7a:e6 # Path=pci-0000:02:00.0-* # Link properties [Link] Name=eth0 In the example above, the device matching the given MAC address will have its name set to eth0. 2. You pass net.ifnames=0 to the kernel on boot by setting it in the boot loader. This is not recommended on systems with multiple network interfaces as they may be assigned names inconsistently across reboots. This should be safe on systems with only one network adapter. You set this kernel argument this by editing /etc/default/grub, appending net.ifnames=0 to the kernel command line, applying it with grub2-mkconfig -o /boot/grub2/grub.cfg, and then rebooting. 3. You disable the assignment of fixed names by symlinking /etc/systemd/network/99-default.link to /dev/null and rebuilding initrd. Renumbering network interfaces If your system is relying on udev rather than systemd-udevd (and thereby using systemd's predictable network interfacing naming scheme), after inserting and removing network interfaces, your network interface now has a non-zero number. For example, after inserting and replacing a network interface twice, the primary interface is now named eth2. Systems affected by this problem includes RHEL 6 or prior. To rename interfaces so that it starts back at eth0, edit the udev rules defined in /etc/udev/rules.d/70-persistent-net.rules. Remove lines defining the extraneous interfaces that you don't want. Once done, ensure that your network configs in /etc/sysconfig/network-scripts/ matches up to your new network interface names. Reboot to apply. See Also
ESSENTIALAI-STEM
Fact-Check of a ‘Lifespan’ A friend of mine, a fellow fact-checker, recently described how strange it is to be one of us right now. Two years ago even family members didn’t know what our work entailed; now we’re getting thanked by strangers for upholding the foundations of liberal democracy. Fact-checking is a very particular, very quiet profession. We’re the invisible spelunkers sent deep down into the story. We call back subjects; we confirm the spelling of names; we make sure we aren’t saying cement when we should say concrete. Sometimes our job amounts to much more than that, but it never comes with a byline. “It’s a job that’s traditionally meant to happen offstage,” my friend said. When John D’Agata and Jim Fingal’s “The Lifespan of a Fact” came out in 2012, it was unlikely material for a book, let alone a Broadway play. The slim volume is a quasi-Talmudic exchange, the text of Mr. D’Agata’s essay framed by snide disputes with his fact-checker, Mr. Fingal, in the margins. I wasn’t yet a fact-checker at the time, but “Lifespan” left a bad taste. How could a writer be so surly, so unkind to the person assigned to help him? It’s a deliberate parody, but not an equal one. Mr. D’Agata frames himself as a grandiose, don’t-you-dare-unweave-my-rainbow-type Byronic villain; Mr. Fingal frames himself as a pedant. It’s clear who the hero is supposed to be. The imbalance of power carries over to this theatrical adaptation (by Jeremy Kareken, David Murrell, and Gordon Farrell), which opened this fall to warm reviews at Studio 54, where D’Agata (Bobby Cannavale) may be ridiculous but gets a back story, and Fingal (Daniel Radcliffe) just gets to be ridiculous and correct. I know it’s all in good fun, but I watched with what have come to be called “rep sweats” — the anxiety of the underrepresented, facing that one shot to be seen. Realistically this was the only chance I’d ever have to witness fact-checking on stage, let alone on Broadway. In the play, Fingal has about four days to check a 15-page article (an essay, D’Agata protests) on a teenage suicide in Las Vegas. Cherry Jones, as the magazine’s editor, offers him the job “as long as you understand the compromises.” She means the negotiation between quality journalism and ad revenues, but the caveat is much broader, and occupies the play’s heart: How do you compromise between truth and fiction? When, if ever, is it worth the cost? D’Agata sees facts as a delightful collage assembled around meaning. “I take liberties with things that deepen the central truth of the piece,” Mr. Cannavale says. He describes a Las Vegas resident as a Mississippi woman, “to underscore the transient nature of the city.” The piece is organized in nine sections, one of which muses on the epistemological implications of nine, to evoke the nine seconds it took Levi Presley to fall to his death. Inconveniently he actually fell for eight. Other explanations are less coherent. D’Agata writes that 34 strip clubs banned lap-dancing on the day Levi died. Are you counting partially or fully nude clubs? Fingal asks. Go-go bars? “I picked 34 because I liked the rhythm,” D’Agata answers. There’s something odd about a sendup whose original object isn’t well understood. Take a recent McSweeney’s piece, which suggested that the fact-checker assigned to The New York Times Magazine profile on Gwyneth Paltrow accomplished his work through relentless, increasingly existential Googling: “Can eating twelve fistfuls of dirt a day cure depression?” “Can immersing your hands in the soil and letting the worms and small bugs use your fingers as if they were fleshy foam rollers cure depression?” It’s funny, but the premise isn’t quite right. Checking isn’t really about Googling. More often it involves speaking to specialists, and to subjects. “If there’s a person mentioned,” Ms. Jones’s character warns Mr. Radcliffe’s, “confirm they exist.” The line gets a huge laugh, but it’s totally routine. Once I had to call an editor’s father to confirm a few tattoos. Certainly there were moments I recognized from work. Mr. Radcliffe, in his plaid shirt, is sporting authentic fact-checker mufti. (I may have worn one to the theater.) An argument about the number of cars that constitutes a jam recalled a debate about what counts as bite-size. When Ms. Jones explains that the magazine has traded its fact-checking department for “added functionality” in digital — ouch. And while I personally wouldn’t have flown across the country to verify a pavilion’s red brick composition (spoiler alert: it’s brown), I had to laugh at Mr. Radcliffe’s earnestly compiled notebooks, as the only person in the theater scribbling quite so much in hers. The production takes, as D’Agata might, its little liberties. A new checker would probably start by checking the price of headphones, not a glitzy big-name exposé on Las Vegas and the nature of mortality. And a checker would give the editor much less information about low-level problems. “I don’t have a codebook that tells me what matters and what doesn’t,” Mr. Radcliffe says, apologetically. “It’s called judgment!” Ms. Jones yells. More than anything, I kept thinking, “But he didn’t say we.” That was the first lesson I learned as a checker. You can’t say, as Mr. Radcliffe does, “You claim that …” or “X is wrong.” You say, “We write that X, but it looks like it might be Y.” The truth is that fallibility is deeply embarrassing. Most writers are grateful, gracious. A few realize they’ve built a house of cards, and in their panic they lash out. For our part it’s humbling to say we, accepting responsibility for errors we haven’t made, extending forgiveness to the writer and to ourselves. Fact-checking is a test of character for both sides, an experiment in generosity. Mr. Radcliffe gets increasingly hysterical about the nature of truth toward the end of “Lifespan of a Fact,” as we all have lately. If you think facts don’t matter, he shouts, “then you don’t know what’s happened to the world.” I understand why a play about fact-checking is an opportunity to think about truth, but the reality is that what we do is so much more limited. Fact-checking is a rococo practice whose original object was simply shielding publications from liability. Often it comes down to who agrees and who doesn’t, who will say something and who won’t. The brick company won’t sue — red it is. Mr. Radcliffe protests that this feels like a negotiation. It always was. It’s the we that we protect while fact-checking, not some ideal of pure truth. You try to protect the publication, and to protect the writer from herself. Invariably you get to know the subjects and you want to protect them too. The checker is the mediator, the invisible shield between the writer and the world. The measure of success in our job is essentially the ability to disappear. That’s why we feel strange when people tell us what we do is important, or bigger than it is. It’s such a small, specific thing. It really is, for the most part, offstage.
NEWS-MULTISOURCE
Wikipedia:Reference desk/Archives/Computing/2011 October 3 = October 3 = How do I make Windows MediaPlayer12 the default player again How do I reclaim all the file types, that MSMediaPlayer can handle, to play in MediaPlayer as default again? (I use Windows Media Player 12 under Windows7Home). --<IP_ADDRESS> (talk) 06:05, 3 October 2011 (UTC) * Start -> Control Panel -> Programs / Default Programs -> Set your default programs -> Windows Media Player -> Set this program as default AvrillirvA (talk) 21:50, 3 October 2011 (UTC) * Perfect! Thank you! :-) -- (OP) <IP_ADDRESS> (talk) 13:43, 4 October 2011 (UTC) How to link two combo boxes (access 2007)? I have a table with some fields and one of them is a combo box. I have created a form for this. I add another field with combo box. How can i make, that when i select a combo box (example state) the other combo only lets me choose cities from that state ?-- first question Related to the first --- I also did some testing, like creating 2 tables (one state the other city) , and i have linked them with ID - state ID (one to many). In the state table, it shows me with a plus + , the cities that i want. But i want to see them in a form, wich is not related to the two tables. So i use combo box form control in the form, to select the field for state , and another combo for the city. I see the states with the first combo box, but when i choose the other (city combo) it shows me all cities...... PLEASE HELP... Thank u in advance .<IP_ADDRESS> (talk) 06:57, 3 October 2011 (UTC) * Here's a way to do it with only one extra table: * 1. Create a table called tblCities with text fields name and state (and add a primary key column if you want one). Populate it with some data (e.g. San Francisco/CA, Boston/MA, whatever). * 2. In your form, create your two combo boxes. I will refer to them a cboState and cboCity. For cboState, set its Rowsource to SELECT tblCities.state FROM tblCities GROUP BY tblCities.state ORDER BY tblCities.state;. This will make it list all of the states in alphabetical order, but only list one of each state. * 3. For cboCity, set the Rowsource to SELECT tblCities.name FROM tblCities WHERE ((tblCities.state)=[cboState]) ORDER BY tblCities.name;. This just means, select all the names (in alphabetical order) from the cities table where the state value is the same as whatever is selected in cboState. * 4. Now, one last thing. By default cboCity will not update when you change the state. So we have to tell it to do this manually. Click on cboState, go into the Properties window, and then click on Events, then click in the space for on change and click the button with the three dots that appears, then choose "code builder." This will open the VBA editor. * 4. Your screen should have your cursor just after a place that says Private Sub cboState_Change. Add the following one line of code below this line: cboCity.Requery. Then save and close the VBA editor. This just means, every time cboState is changed, it should cause cboCity to refresh its options. * Let me know if that works for you. Now if you wanted to link back to the cities table for your data, it is slightly more tricky — you need to add a primary key field to that table, and have that primary key be linked to the cboCity combo box (you don't need to link the state combo box to anything because it is implied by whatever city it is, in this scheme). If you need the above modified for that purpose, just let me know. --Mr.98 (talk) 12:59, 3 October 2011 (UTC) In-browser PDF display A lot of my workflow relies on various PHP/Javascript programs I have made that display alongside PDFs in a browser window. I had made these programs to be compatible with Adobe Reader. I run a Mac with OS X 10.6.8, using Safari 5.1 as my primary browser. So I was somewhat surprised recently when Safari stopped using Adobe's plugin to display PDFs. At first I thought I had done something wrong, but now I see that this is a major compatibility problem with Adobe Reader and Safari 5.1. Instead of opening a PDF in the Adobe plugin, it now sometimes displays a PDF with a minimal of editing features (it doesn't even display page numbers, which I need for my work), and the default Safari PDF reader does not recognize any hashtags like #page=, which used to make the Adobe Reader PDFs jump to whatever page I told it to. So I'm looking for a PDF reader that can do four things, in descending importance: * 1. Display in browser in OS X 10.6, either in Safari 5.1, or Firefox, or Chrome. * 2. When viewing the PDF, it needs to have some easy, straightforward sort of way to see the page numbers, adjust the zoom, things like that. Adobe Reader's default tool bar at the top worked fine for this. * 3. Ideally, extra bonus, it would be great if there was some way to programmatically (e.g. with a hashtag or Javascript) be able to tell the reader to jump to a given page (e.g. #page=5). I don't care how it does this — I'm happy to make small adjustments in my code to whatever the method is — but it needs some way of doing this. (This is because I deal with big databases that are indexed to various pages within these giant PDFs, and I need to be able to quickly see page 135 or whatever without too much hassle or tabbing back and forth.) * 4. Can handle very large PDFs relatively fast — most of the PDFs I am using are between 20 and 150 MB in size, and some PDF readers (like the Preview application for the Mac) take forever to try and cache all thumbnails or other things, and are thus super slow. (The PDFs are composed of lots of grayscale photographs, primarily.) Any suggestions? --Mr.98 (talk) 12:14, 3 October 2011 (UTC) * You could load it via swishpaper or flashpaper, of course then you're relying on Adobe Flash. The only fullproof thing I can think of is fully converting away from any binary format, to ordinary HTML. I feel your pain, man. ¦ Reisio (talk) 18:12, 3 October 2011 (UTC) * HTML would really not work. I don't mind relying on Adobe if it works, but I don't think SwishPaper or FlashPaper are fast enough to serve as an on-the-fly PDF reader, are they? --Mr.98 (talk) 20:01, 3 October 2011 (UTC) * You might want to take a look at pdf.js. It's very primitive in a lot of ways, but (a) it does do the page-number-as-anchor thing that you want, and (b) being written in JavaScript, you don't have to muck around with browser plug-ins. The demo seems to be very slow, but it's under active development (the main repo seems to be getting commits every day, even on weekends). Paul (Stansifer) 19:29, 3 October 2011 (UTC) * That's an interesting idea. I'm a little skeptical it will be able to handle my files without blowing up my browser, but it might be worth a shot... --Mr.98 (talk) 21:48, 3 October 2011 (UTC) * Although the default Chrome PDF reader does recognize #page tags, it inexplicably doesn't show page numbers. I swear I read somewhere that it was based on FoxIt, the only Windows PDF reader that doesn't suck monkey nuts, but unfortunately the full version of FoxIt doesn't seem to be available for the Mac OS. Have you tried skim? Maybe worth a go. Other than that.. why not downgrade? It's not like every new revision of the Mac OS gets worse as in Windows, but there have been inadvisable upgrades before (7.6 to 8.0, for example). Nevard (talk) 23:45, 4 October 2011 (UTC) Odd Problem with Cell in Excel 2007 I copypasted the contents of a comment in the margin of an .rtf file from Word 2007 directly into a cell in Excel 2007. Now I want to remove the comment, as it has since become irrelevant. However, I can't. I can't even select the cell anymore. Is there anything I should do here? KägeTorä - (影虎) (TALK) 14:10, 3 October 2011 (UTC) * Have you tried deleting the entire row or entire column in which the cell lies? One thing I have learned to do in Excel is that when pasting and weird stuff happens, I first "Undo" ... then I select the destination cell, click up in the text area as though I wanted to type something into the cell, and then choose Paste. This tends to paste just text and does not attempt to paste text formatting. Comet Tuttle (talk) 16:06, 3 October 2011 (UTC) * I have tried to delete the row, but it won't let me. Clicking on the row, just highlights the first cell, unlike normally were it highlights the entire line. KägeTorä - (影虎) (TALK) 17:16, 3 October 2011 (UTC) * 1: Try Shift+Space to select the entire row. 2: If you can't select the cell, maybe the protection settings got turned on? --Bavi H (talk) 23:58, 3 October 2011 (UTC) * You could also try including the rows above and below in your selection to be deleted (having copied necessary data elsewhere first of course). D b f i r s 08:49, 4 October 2011 (UTC) I can't select the cell, or delete the row/coloumn (it just deletes the first cell in each row/column). I suspect this may be due to some pre-formatting that my agent has done. But they can't get rid of the comment, and nor can I. KägeTorä - (影虎) (TALK) 11:51, 4 October 2011 (UTC) * As a last resort, if this is is possible for your sheet, you could try exporting to CSV (comma separated variables) which you could edit in a text editor (such as notepad) if necessary, then re-import to a new sheet. D b f i r s 15:51, 4 October 2011 (UTC) RSS for Reference desk? How can I subscribe to Wikipedia:Reference_desk questions? I love to read it. Yes, I can add this it to my watchlist, but its not comfortable enough. - Ewigekrieg (talk) 15:51, 3 October 2011 (UTC) * There is an ATOM feed for the changes to any page - go to the history of that page and there's a link to the ATOM syndication on the bar on the left - for this page it's this. I think if you substitute feed=rss for feed=atom in that URL that should give you RSS (but most syndication clients will take ATOM too now). <IP_ADDRESS> (talk) 16:25, 3 October 2011 (UTC) Windows script I need to rename a number (ca. 1000) of files in windows (XP). Is there a way to automate this? All files are of the form "x_y.jpeg" with "x" and "y" numbers. I want them to be renamed to "y_x.jpeg". So for instance, "1_2.jpeg" should be renamed to "2_1.jpeg", or "12_34.jpeg" should be renamed to "34_12.jpeg". Can I do this automatically in windows only or do I need to install an addition program? If so, how do I go about it? bamse (talk) 15:55, 3 October 2011 (UTC) * Here is how to do it in PowerShell Get-ChildItem -Path "C:\Users\Santa\Pictures\" -Filter "*.jpeg" | % { $file = $_ $parts = $file.Name.Split("_") $new = $parts[1] + "_" + $parts[0] + $file.Extension $file.FullName Rename-Item -Path $file.FullName -NewName $new } TheGrimme (talk) 17:49, 3 October 2011 (UTC) * Hugging my right about now. ¦ Reisio (talk) 18:22, 3 October 2011 (UTC) * Thanks, TheGrimme. The script returns "y.jpeg_x.jpeg" instead of "y_x.jpeg", which is irrelevant for my purpose, so no need to fix it. bamse (talk) 22:02, 3 October 2011 (UTC) XP TO ME Is there a program to makes Windows Xp recolonize Windows ME? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 16:13, 3 October 2011 (UTC) * I sure hope there isn't — what do you even want it for? ¦ Reisio (talk) 18:23, 3 October 2011 (UTC) * Do you mean install over? If so, see the following page: .--Best Dog Ever (talk) 19:17, 3 October 2011 (UTC) * No I mean like how Vista can recolonize XP's language. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:03, 4 October 2011 (UTC) * Query, what do you mean by "recolonize"? Do you mean run a program written for one operating system run under another? ie. recognize not "recolonize"? <IP_ADDRESS> (talk) 01:54, 4 October 2011 (UTC) * Operating systems cannot colonize or recolonize. You are obviously using a word that you don't know the definition of or you are trying to spell a word you cannot spell and typing an entirely different word. Unless you can define what you intend "recolonize" to mean, no answer can be given. If you insist on using "recolonize", it is apparent that this question is intended to be nonsense and will not be answered. -- k <font color='#cc0033'>a <font color='#990066'>i <font color='#660099'>n <font color='#3300cc'>a <font color='#0000ff'>w &trade; 13:44, 4 October 2011 (UTC) * If you're talking about programming languages, you should know that operating systems do not have associated programming languages. (Individual compilers and libraries must support specific programming languages, but XP and ME are similar enough that pretty much anything that supports one will support the other.) Paul (Stansifer) 15:45, 4 October 2011 (UTC) First of all shut up Kainaw,second of all yeah Paul I mean that.
WIKI
Democratic Party of Australia The Democratic Party of Australia (DPA), sometimes referred to as the Australian Democratic Party, was an Australian political party that was active in the mid-1950s. Ahead of the 1953 Senate election, the party merged with the Queensland-based Independent Democratic Party (IDP). However, they split following the election. The party was also separate from the North Queensland Democratic Party, which had itself been formed just weeks after the DPA. History The party was formed in Sydney on 17 February 1953 by a group who had organised the campaign of independent candidate Martin Hardie at the 1952 Bradfield by-election. It was chaired by former Willoughby mayor A. R. Baldwin. According to its secretary, Major S. K. Hatfleld, the party opposed the Liberal Party's policy on taxation and the Labor Party's policy on socialisation. The party merged with the Independent Democrats several months before the 1953 Senate election, with the DPA's Charles Russell (a former Country Party MP) saying the decision was made because both parties had similar aims and ideologies. The party endorsed public health administrator Raphael Cilento (of the IDP) as its lead candidate in Queensland. At the Senate election, the party's ticket was unsuccessful, winning 6% of the vote. Shortly after, the party opened nominations for candidates for the next federal election. The party endorsed Thomas Brosnan as its candidate for the 1953 Lang by-election. However, Brosnan was disendorsed after the close of nominations as he had not been a resident of Australia for three years. Following the by-election, several members of the party's New South Wales executive resigned, including organising secretary Douglas Maxwell in October 1953. Around this time, the DPA split from the IDP. On 6 June 1954, the party's New South Wales branch disbanded, thus dissolving the party entirely.
WIKI
United States v. 422 Casks of Wine ERROR to the District Court of E. Louisiana. This case was before this Court, at February Term 1823, and is reported in 8 Wheat. 391, under the name of the Sarah. The cause having been sent back, the libel was changed into an information, charging the seizure to have been made on land, according to the leave given by the decree of the Court in that case. The information charges the wine to have been in reality Malaga wine, falsely exported from New-York under the name of Sherry, for the benefit of the drawback. To this information, a claim and answer was given and filed by Benjamin Story, as agent for Hazard & Williams, and on the oath of the said Story, claiming the wine as the property of the said Hazard & Williams, making no answer to the specific fact charged by the information, that the wine was Malaga wine, exported under the name of Sherry for the benefit of drawback; but denying generally the allegations of the information, or that any thing had been done to forfeit the wine under the revenue laws of the United States, and claiming the restoration of the wine to Hazard & Williams. The record set forth the evidence on the question, whether the wines were Malaga or Sherry. The verdict of the jury was for the claimants. The District Attorney moved for a new trial, which was overruled; on which he brought this writ of error, and made the following assignment of errors. 1. That on the 18th of December 1819, this case was tried by jury, and verdict and judgment rendered for the United States. 2. The proceedings under this libel were regular; as the amendment related to matter of form merely, and not of substance; and by the 17th section of the Act of Congress of 24th September 1789, the Courts of the United States may establish all necessary rules for conducting the business of the Court; and the 22d section of the same Act provides that 'there shall be no reversal for error in ruling any plea in abatement,' &c. The proceedings in this case, were in conformity with the rules of the Court in which they were instituted. No answer and claim was filed and sworn to by or in the name and behalf of Charles Hall, the real owner of the said 422 casks of wine, at the time of the seizure and forfeiture thereof to the United States. Mr. Wirt, Attorney General, on the part of the United States, submitted the case, on the errors assigned by the District Attorney. Mr. Ogden and Mr. Hall, on the part of the claimants, made the following points:-- 1. That there is no error upon the record, for the causes assigned by the Attorney for the United States; the same points having been already before this Court, and after due consideration, conclusively settled, upon the first trial of this cause. (See 8 Wheat. 391. 'The Sarah.') 2. That there was no necessity for the said Charles Hall to file a claim and answer in his own name, since his title to said wine, (if proved) accrued after the seizure thereof; and after a claim and answer had been duly filed by Hazard & Williams, the parties having the legal title to said property. 3. That the objection 'that no answer and claim hath been filed and sworn to by or in the name and behalf of Charles Hall, the real owner of said 422 casks of wine,' were it valid, cannot now prevail; because the same should have been taken when the claim was filed, or at all events at the time of the trial of the cause in the Court below. 4. That from the whole record it appears, that judgment ought not to be for the United States of condemnation of said wine; but ought, of right, to be for the claimants. 5. 'That from the whole of the evidence apparent upon the record, and taken for the purpose of review, &c.' it is manifest that restitution of said wine ought to be decreed to the claimants. Mr. Justice STORY delivered the opinion of the Court.--
WIKI
Saturday, January 21, 2023 SWMM 5.2.2 Code for LID Function swaleFluxRates This code defines a function called "swaleFluxRates" which computes the flux rates for a vegetative swale LID. The function takes in a vector of storage levels (x) and a vector of flux rates (f) as inputs and does not return any outputs. The function starts by initializing several variables such as depth, topWidth, botWidth, length, surfInflow, surfWidth, surfArea, flowArea, lidArea, hydRadius, slope, volume, dVdT, dStore, and xDepth. The function first retrieves the state variable of the surface water depth from the work vector, and limits it to the thickness of the surface layer. It then calculates the depression storage depth and the bottom width of the swale using the top width and the side slope. It then calculates the length of the swale and the surface area of the current ponded depth. The function then calculates the wet volume and effective depth, the surface inflow into the swale, the evaporation rate, the infiltration rate to the native soil, and the surface outflow. If the depth is below the depression storage, the surface outflow is set to 0.0, otherwise, the function modifies the flow area to remove the depression storage and calculates the hydraulic radius using the Manning equation. Then the function calculates the net flux rate (dV/dt) in cubic feet per second and assigns it to the SurfaceInflow and SurfaceOutflow. Here is a table summarizing the variables and their descriptions in the code: VariableDescription depthdepth of surface water in swale (ft) topWidthtop width of full swale (ft) botWidthbottom width of swale (ft) lengthlength of swale (ft) surfInflowinflow rate to swale (cfs) surfWidthtop width at current water depth (ft) surfAreasurface area of current water depth (ft^2) flowAreax-section flow area (ft^2) lidAreasurface area of full swale (ft^2) hydRadiushydraulic radius for current depth (ft) slopeslope of swale side wall (run/rise) volumeswale volume at current water depth (ft^3) dVdTchange in volume w.r.t. time (cfs) dStoredepression storage depth (ft) xDepthdepth above depression storage (ft) theLidProc->surface.thicknessthickness of the surface layer theLidUnit->fullWidthfull width of the swale theLidProc->surface.sideSlopeside slope of the sw VariableDescription SurfaceInflowinflow rate into the surface layer (cfs) EvapRaterate of evaporation from the surface layer (cfs) SurfaceInfilinfiltration rate into the native soil from the surface layer (cfs) SurfaceOutflowoutflow rate from the surface layer (cfs) theLidProc->surface.alphacoefficient used in the Manning equation theLidProc->surface.voidFracvoid fraction of the swale Note that this function is specific for swale LID, and it computes the flux rates based on the storage level and the LID properties. It calculates the depression storage, the bottom width, the length, the top width, the surface area, the flow area, the wet volume, the effective depth, the surface inflow, the evaporation rate, the infiltration rate, and the surface outflow. void swaleFluxRates(double x[], double f[]) // //  Purpose: computes flux rates from a vegetative swale LID. //  Input:   x = vector of storage levels //  Output:  f = vector of flux rates // {     double depth;            // depth of surface water in swale (ft)     double topWidth;         // top width of full swale (ft)     double botWidth;         // bottom width of swale (ft)     double length;           // length of swale (ft)     double surfInflow;       // inflow rate to swale (cfs)     double surfWidth;        // top width at current water depth (ft)     double surfArea;         // surface area of current water depth (ft2)     double flowArea;         // x-section flow area (ft2)     double lidArea;          // surface area of full swale (ft2)     double hydRadius;        // hydraulic radius for current depth (ft)     double slope;            // slope of swale side wall (run/rise)     double volume;           // swale volume at current water depth (ft3)     double dVdT;             // change in volume w.r.t. time (cfs)     double dStore;           // depression storage depth (ft)     double xDepth;           // depth above depression storage (ft)     //... retrieve state variable from work vector     depth = x[SURF];     depth = MIN(depth, theLidProc->surface.thickness);     //... depression storage depth     dStore = 0.0;     //... get swale's bottom width     //    (0.5 ft minimum to avoid numerical problems)     slope = theLidProc->surface.sideSlope;     topWidth = theLidUnit->fullWidth;     topWidth = MAX(topWidth, 0.5);     botWidth = topWidth - 2.0 * slope * theLidProc->surface.thickness;     if ( botWidth < 0.5 )     {         botWidth = 0.5;         slope = 0.5 * (topWidth - 0.5) / theLidProc->surface.thickness;     }     //... swale's length     lidArea = theLidUnit->area;     length = lidArea / topWidth;     //... top width, surface area and flow area of current ponded depth     surfWidth = botWidth + 2.0 * slope * depth;     surfArea = length * surfWidth;     flowArea = (depth * (botWidth + slope * depth)) *                theLidProc->surface.voidFrac;     //... wet volume and effective depth     volume = length * flowArea;     //... surface inflow into swale (cfs)     surfInflow = SurfaceInflow * lidArea;     //... ET rate in cfs     SurfaceEvap = EvapRate * surfArea;     SurfaceEvap = MIN(SurfaceEvap, volume/Tstep);     //... infiltration rate to native soil in cfs     StorageExfil = SurfaceInfil * surfArea;     //... no surface outflow if depth below depression storage     xDepth = depth - dStore;     if ( xDepth <= ZERO ) SurfaceOutflow = 0.0;     //... otherwise compute a surface outflow     else     {         //... modify flow area to remove depression storage,         flowArea -= (dStore * (botWidth + slope * dStore)) *                      theLidProc->surface.voidFrac;         if ( flowArea < ZERO ) SurfaceOutflow = 0.0;         else         {             //... compute hydraulic radius             botWidth = botWidth + 2.0 * dStore * slope;             hydRadius = botWidth + 2.0 * xDepth * sqrt(1.0 + slope*slope);             hydRadius = flowArea / hydRadius;             //... use Manning Eqn. to find outflow rate in cfs             SurfaceOutflow = theLidProc->surface.alpha * flowArea *                              pow(hydRadius, 2./3.);         }     }     //... net flux rate (dV/dt) in cfs     dVdT = surfInflow - SurfaceEvap - StorageExfil - SurfaceOutflow;     //... when full, any net positive inflow becomes spillage     if ( depth == theLidProc->surface.thickness && dVdT > 0.0 )     {         SurfaceOutflow += dVdT;         dVdT = 0.0;     }     //... convert flux rates to ft/s     SurfaceEvap /= lidArea;     StorageExfil /= lidArea;     SurfaceOutflow /= lidArea;     f[SURF] = dVdT / surfArea;     f[SOIL] = 0.0;     f[STOR] = 0.0;     //... assign values to layer volumes     SurfaceVolume = volume / lidArea;     SoilVolume = 0.0;     StorageVolume = 0.0; } No comments: Blog strategy to explain complex modeling concepts to non-modelers, while highlighting the beauty and majesty of domain knowledge: B log strategy to explain complex modeling concepts to non-modelers, while highlighting the beauty and majesty of domain knowledge: Title : ...
ESSENTIALAI-STEM
0 Basket There are currently no items in your basket. Nutrition Pre & Post-Workout | Benefits Of Fast Acting Carbs   Carbs have a bad reputation, particularly simple carbs and especially amongst the ladies. There is a popular misconception that carbs in general make you fat, which leads many people to believe that avoiding them is the best route to fat loss and achieving the physique of their dreams. This is not the case, and carbs are a great tool in your fat loss journey!  Read on to find out why. Types of carbohydrates There are two types of carbohydrates; simple and complex. Complex carbohydrates   Complex carbohydrates are slower digesting than simple carbohydrates, meaning they release energy slower. This also means that they have less of an effect on your blood sugar levels than fast acting carbohydrates.complex carbs The majority of your meals through the day should include complex carbohydrates which also tend to be higher in fibre. Complex carb foods |    Wholegrain foods, oats, brown rice, whole wheat bread and also pasta. Simple ‘fasting acting’ carbs   Fast acting carbohydrates are also known as simple carbohydrates.  Complex carbohydrates are usually the type of carb that most people are familiar with, as they are slower digesting thus releasing energy into the body more slowly. While most of us know these are fantastic for our health and well being, simple carbohydrates also play a role and have several benefits too, especially if you utilise them at the best times to be of use to your body, for example pre-and post work out. ? The reason that this type of carbohydrate is called simple is due to the fast speed at which it can be digested and absorbed by the body. Simple carbohydrate foods |Banana lucuma smoothie   Many people think the only foods that contain simple carbohydrates are highly processed junk foods such as chocolate bars and sweets – but this is not the case at all. Nutrient dense foods such as fruit, milk and processed foods such as sweets and syrups contain simple carbohydrates. Simple carbohydrates include monosaccharides which is a one unit sugar such as fructose, and disaccharides, which are a two unit sugars such as lactose or sucrose. Many heavily processed simple carbohydrates carry little nutritional value, this does not mean that they cannot have a place in your nutritional strategy, simply that it should be in moderation. Benefits of simple carbs for pre- and post-workout banana protein shakes #1 Fuel   Simple carbohydrates can give you an edge pre-training due to their fast release of energy. Simple carbs are great if you are doing a workout that requires a short burst of energy. If you are doing a shorter race, or a sprint session, even lifting some weights, by digesting some simple carbs before your workout you can reap the performance benefits of simple carbs. ? Pre-workout meals that include simple carbs would be: chopped banana with honey, rice cakes and jam and a glass of milk. #2 Recovery   After a tough training session, the name of the game is replenishment and recovery. This is really crucial if you will be training again later in the day. Due to the nature of simple carbs and the ability of the body to digest them so quickly, they are a fantastic food to promote recovery. Simple carbs will bring your glycogen and blood sugar levels back to baseline more effectively than complex carbs alone. #3 Easy digestion   This one especially applies to pre-workout, but of course is relevant post-workout too. As mentioned above, the ability for the body to digest this form of carbohydrate rapidly means it not only can provide a burst of energy rapidly, it has the ability to kick-start the recovery process too. Take home message   Including some fast-digesting carbs before your workout can be helpful to give you an energy boost.  The main benefits of simple carbs are for those who train at a high intensity rather than people who are mainly sedentary or not training at a high intensity. Try having some fruit with honey and rice cakes before your next session and see for yourself how simple carbohydrates can help you fuel a good workout. Our articles should be used for informational and educational purposes only and are not intended to be taken as medical advice. If you’re concerned, consult a health professional before taking dietary supplements or introducing any major changes to your diet. Myprotein Myprotein Writer and expert 35% off EVERYTHING!* - Use code: AMAZIN Be quick, shop now!
ESSENTIALAI-STEM
Steven Schkolne Steven Schkolne (born 1976 in Cape Town, South Africa), inventor of speedcabling, is a South African American computer scientist, inventor, and digital artist. Biography Schkolne was born in Cape Town and moved to the United States as a child. During high school he attended North Carolina School of Science and Mathematics. Later he earned his BS from Carnegie Mellon University. Schkolne went on to obtain his PhD in Computer Science at Caltech where he pioneered foundational methods for drawing in 3D or virtual reality environments. Surface drawing Schkolne's graduate work at Caltech resulted in the first fully functional drawing program for virtual reality. The program, an early precursor to Google's Tilt Brush, was shown at SIGGRAPH in 1999. The program captured hand movements and translated them into digital strokes. Schkolne worked in collaboration with BMW's Designworks to use Surface Drawing as a platform for creating conceptual prototypes.
WIKI
@article {6683, title = {Multiethnic genome-wide association study of cerebral white matter hyperintensities on MRI.}, journal = {Circ Cardiovasc Genet}, volume = {8}, year = {2015}, month = {2015 Apr}, pages = {398-409}, abstract = { BACKGROUND: The burden of cerebral white matter hyperintensities (WMH) is associated with an increased risk of stroke, dementia, and death. WMH are highly heritable, but their genetic underpinnings are incompletely characterized. To identify novel genetic variants influencing WMH burden, we conducted a meta-analysis of multiethnic genome-wide association studies. METHODS AND RESULTS: We included 21 079 middle-aged to elderly individuals from 29 population-based cohorts, who were free of dementia and stroke and were of European (n=17 936), African (n=1943), Hispanic (n=795), and Asian (n=405) descent. WMH burden was quantified on MRI either by a validated automated segmentation method or a validated visual grading scale. Genotype data in each study were imputed to the 1000 Genomes reference. Within each ethnic group, we investigated the relationship between each single-nucleotide polymorphism and WMH burden using a linear regression model adjusted for age, sex, intracranial volume, and principal components of ancestry. A meta-analysis was conducted for each ethnicity separately and for the combined sample. In the European descent samples, we confirmed a previously known locus on chr17q25 (P=2.7{\texttimes}10(-19)) and identified novel loci on chr10q24 (P=1.6{\texttimes}10(-9)) and chr2p21 (P=4.4{\texttimes}10(-8)). In the multiethnic meta-analysis, we identified 2 additional loci, on chr1q22 (P=2.0{\texttimes}10(-8)) and chr2p16 (P=1.5{\texttimes}10(-8)). The novel loci contained genes that have been implicated in Alzheimer disease (chr2p21 and chr10q24), intracerebral hemorrhage (chr1q22), neuroinflammatory diseases (chr2p21), and glioma (chr10q24 and chr2p16). CONCLUSIONS: We identified 4 novel genetic loci that implicate inflammatory and glial proliferative pathways in the development of WMH in addition to previously proposed ischemic mechanisms. }, keywords = {Aged, Aged, 80 and over, Chromosomes, Human, Continental Population Groups, Female, Genetic Loci, Genome-Wide Association Study, Humans, Male, Meta-Analysis as Topic, Middle Aged, Models, Genetic, Stroke, White Matter}, issn = {1942-3268}, doi = {10.1161/CIRCGENETICS.114.000858}, author = {Verhaaren, Benjamin F J and Debette, Stephanie and Bis, Joshua C and Smith, Jennifer A and Ikram, M Kamran and Adams, Hieab H and Beecham, Ashley H and Rajan, Kumar B and Lopez, Lorna M and Barral, Sandra and van Buchem, Mark A and van der Grond, Jeroen and Smith, Albert V and Hegenscheid, Katrin and Aggarwal, Neelum T and de Andrade, Mariza and Atkinson, Elizabeth J and Beekman, Marian and Beiser, Alexa S and Blanton, Susan H and Boerwinkle, Eric and Brickman, Adam M and Bryan, R Nick and Chauhan, Ganesh and Chen, Christopher P L H and Chouraki, Vincent and de Craen, Anton J M and Crivello, Fabrice and Deary, Ian J and Deelen, Joris and De Jager, Philip L and Dufouil, Carole and Elkind, Mitchell S V and Evans, Denis A and Freudenberger, Paul and Gottesman, Rebecca F and Gu{\dh}nason, Vilmundur and Habes, Mohamad and Heckbert, Susan R and Heiss, Gerardo and Hilal, Saima and Hofer, Edith and Hofman, Albert and Ibrahim-Verbaas, Carla A and Knopman, David S and Lewis, Cora E and Liao, Jiemin and Liewald, David C M and Luciano, Michelle and van der Lugt, Aad and Martinez, Oliver O and Mayeux, Richard and Mazoyer, Bernard and Nalls, Mike and Nauck, Matthias and Niessen, Wiro J and Oostra, Ben A and Psaty, Bruce M and Rice, Kenneth M and Rotter, Jerome I and von Sarnowski, Bettina and Schmidt, Helena and Schreiner, Pamela J and Schuur, Maaike and Sidney, Stephen S and Sigurdsson, Sigurdur and Slagboom, P Eline and Stott, David J M and van Swieten, John C and Teumer, Alexander and T{\"o}glhofer, Anna Maria and Traylor, Matthew and Trompet, Stella and Turner, Stephen T and Tzourio, Christophe and Uh, Hae-Won and Uitterlinden, Andr{\'e} G and Vernooij, Meike W and Wang, Jing J and Wong, Tien Y and Wardlaw, Joanna M and Windham, B Gwen and Wittfeld, Katharina and Wolf, Christiane and Wright, Clinton B and Yang, Qiong and Zhao, Wei and Zijdenbos, Alex and Jukema, J Wouter and Sacco, Ralph L and Kardia, Sharon L R and Amouyel, Philippe and Mosley, Thomas H and Longstreth, W T and DeCarli, Charles C and van Duijn, Cornelia M and Schmidt, Reinhold and Launer, Lenore J and Grabe, Hans J and Seshadri, Sudha S and Ikram, M Arfan and Fornage, Myriam} }
ESSENTIALAI-STEM
User:Cabigonroxan I am a little bit serios and a little bit funny that,s what Amaya Gabrielle Sanoy (my classmate in college) told me,, But one thing is for sure i love the person who love me.
WIKI
User:Brandon5485 About me I've been on Wikipedia since 19 December 2008, which, oddly enough, is now 15.621540331969811 years ago, and is perhaps the only interesting thing about me on Wikipedia. I am from the San Francisco Bay Area of California, U.S.A. I currently work in civil engineering. * Talk page * Email * Contributions * Edit count About Wikipedia * Recent changes * Backlog * Random page Some quotes * Any intelligent fool can make things bigger, more complex, and more violent. It takes a touch of genius &mdash; and a lot of courage &mdash; to move in the opposite direction. &mdash;E.F. Schumacher * We build too many walls and not enough bridges. &mdash;Isaac Newton * Benefit broadly the human world. &mdash;Unofficial motto of South Korea * If you treat others in good faith, they will follow you of their own volition. &mdash;Ike, Fire Emblem: Path of Radiance
WIKI
Year is the time taken by the Earth to revolve around the sun, and hence contains a complete cycle of the seasons. In early times it was reckoned as 12 lunar months, but this gave 354 days as the year, and the annual error of the 11 days soon became so apparent that they were added on to the lunar months at various times in order to keep the year and the seasons in agreement. The Greeks added on a whole month every few years, and the Romans constantly changed their method of supplying the necessary days. Julius Caesar, however, had the wisdom to see that the year should be reckoned by reference to the sun and not to the moon, and the Julian year of 365 days six hours was henceforth adopted by the Romans and all people under their rule. In the 16th century the year was found to be 365 days five hours 49 minutes, and this, known as the Gregorian year, now replaced that of Caesar. For ordinary purposes, however, the year is considered as possessing 365 days, and extra hours, etc., are allowed for by means of an extra day introduced every four years.
FINEWEB-EDU
User:RummsRovers11 Andrew McNally (Born 3 January 1981 - Present) Andrew, born in Greenhills, Dublin has always been a massive football supporter and player. Starting out with local club, Manortown United, he achieved his greatest success as an integral part of the Rumms Rovers hierarchy. A talented defender, the 'Godfather' could operate across the whole of the back four, relying on his intelligence and football brain given he was not blessed with lighting pace. Andrew's Rumms Rovers career seems to have halted somewhat following a recent move to Cork, he remains very popular within the club's membership and is engaged to the beautiful First Lady of Rumms Rovers, Karen Murray.
WIKI
Wikipedia:Articles for deletion/Fast-5 Diet The result was no consensus. –MuZemike 23:44, 26 August 2010 (UTC) Fast-5 Diet * – ( View AfD View log • ) Not sure what to make of this. I believe that the author is Bert W. Herring himself: thentor.com is a website that he made. I also have concerns with notability. I appreciate the reports (or an effort to find them) but find ultimately the COI-SPA and notability concerns too much. The New Raymie (t • c) 02:15, 12 August 2010 (UTC) * This may be speedyable G4 because it had been speedied in April. The New Raymie (t • c) 02:16, 12 August 2010 (UTC) * G4 only applies to pages previously deleted by a deletion discussion (like this AfD). Speedy and PROD deletions are excluded. However, in some cases, the previous tag may apply. ℳ ono 02:55, 12 August 2010 (UTC) Keep This source seems to establish notability. BE——Critical __Talk 03:52, 12 August 2010 (UTC) * I'd disagree. Note that: a) his book is self-published, b) the comments seem like a stuffed ballot box, and c) this is a local article not unlike something I'd read in the Arizona Living section of The Arizona Republic. I recently read an article in the community section about a J-pop star who lives in my home city and attends one of the local high schools (and had a camera crew follow her around) – is that human interest piece an indicator of notability? Probably the ONLY one in the English language (the official site they gave was in Japanese, etc.) but it might not stand up completely. The New Raymie (t • c) 04:00, 12 August 2010 (UTC) * It's kind of a tossup. The source would generally establish notability, and seems sufficient for a small article describing the diet. I don't really see any reason to say that the source is insufficient, but there is some wiggle room in WP for opinion on this point. I've seen a lot of articles get kept when the sourcing was only this good. And it looks like there might be other sources too even if we can't access them. BE——Critical __Talk 08:15, 12 August 2010 (UTC) Please add new comments below this notice. Thanks, Ron Ritzman (talk) 00:05, 19 August 2010 (UTC) * Relisted to generate a more thorough discussion so consensus may be reached. * delete Not notable and promotional for the book and diet plan. I'll recommend speedy delete as promotional, but I'll leave be and see if anyone agrees. No the link is not significant third party coverage. Dloh cierekim 01:53, 19 August 2010 (UTC) * Neutral I'm seeing both sides of this. It is promotional, but it dose show some signs of notability in its sources. The problem is, I'm on the fence if the WP:RS is satisfied. Pmedema (talk) 05:19, 19 August 2010 (UTC)
WIKI
Pharmacyclics Attains 52-Week High - Analyst Blog Shares of Pharmacyclics Inc. ( PCYC ) reached a 52-week high of $154.89 during the trading session on Feb 21. The closing price of $151.61 reflects a robust year-to-date return of 70.7%. Pharmacyclics, with a Zacks #2 Rank (Buy), has a market cap of $11.2 billion. Average volume of shares traded during the trading session stood at 1,013,709. What's Driving the Price? The stock has been positively impacted by the strong fourth quarter 2013 financial results announced by the company on Feb 20. Pharmacyclics' fourth quarter 2013 earnings (including stock-based compensation expenses) of 82 cents per share beat the Zacks Consensus Estimate of 77 cents. Earnings were also up 46% on year-over-year basis. Pharmacyclics also witnessed a 113% increase in fourth quarter net revenues, which came in at $123.6 million. Revenues were also well above the Zacks Consensus Estimate of $84 million. Quarterly revenues benefited from a massive jump in collaboration and license agreement revenues and the inclusion of Imbruvica sales. In Nov 2013, Imbruvica was approved in the U.S. as a monotherapy for treating patients suffering from mantle cell lymphoma (MCL). The drug has been approved to treat MCL patients who have been treated at least once for the disease. Following the U.S. approval of Imbruvica for MCL, Pharmacyclics had earned $60 million in the form of milestone payment from partner Johnson & Johnson ( JNJ ). The drug contributed around $13.6 million in the final quarter of 2013. Imbruvica is expected to drive long-term growth at Pharmacyclics. Earlier in the month, the drug received approval for its second indication when it was approved in the U.S. as a monotherapy for patients suffering from chronic lymphocytic leukemia (CLL) with a history of receiving at least one prior therapy earlier in the month. Pharmacyclics is evaluating Imbruvica for other oncology indications. Premium Valuation Justified On a price-to-sales basis, Pharmacyclics is trading at 45.4x, reflecting a huge premium to the peer group average of 4.1x. On a price-to-book basis, the stock is also trading at a premium to the peer group average. Given the company's strong fundamentals, the premium valuation is justified. Other Stocks to Consider Currently, companies like Alexion Pharmaceuticals, Inc. ( ALXN ) and Gilead Sciences Inc. ( GILD ) are also worth considering. While Alexion holds a Zacks Rank #1 (Strong Buy), Gilead Sciences carries a Zacks Rank #2. ALEXION PHARMA (ALXN): Free Stock Analysis Report GILEAD SCIENCES (GILD): Free Stock Analysis Report JOHNSON & JOHNS (JNJ): Free Stock Analysis Report PHARMACYCLICS (PCYC): Free Stock Analysis Report To read this article on Zacks.com click here. Zacks Investment Research The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
-- Wholesale Inventories in U.S. Unexpectedly Fall for Third Month Inventories at U.S. wholesalers unexpectedly declined in June for the third month, the longest string in almost four years, as demand grew. The 0.2 percent decrease in stockpiles at distributors followed a 0.6 percent drop in May that was larger than previously reported, the Commerce Department said today in Washington. The median forecast in a Bloomberg survey of 28 economists projected a 0.4 percent increase. Sales climbed 0.4 percent. Falling stockpiles of automobiles, electrical equipment and hardware mean that companies will need to replenish warehouses as demand improves, which will give American factories a boost. Wholesalers had enough goods on hand to last 1.17 months at the current sales pace, the least since April 2012. Estimates in the Bloomberg survey ranged from a 0.2 percent decrease to a gain for 0.7 percent. The last time wholesale inventories fell for as many months was a one-year string from September 2008 to September 2009. Wholesalers’ stockpiles of durable goods -- those meant to last three years or more -- were little changed in June. Sales of durables increased 1.1 percent. Automobile purchases increased 0.5 percent, leading to a 1.5 percent drop in inventories, the biggest this year. Stockpiles of hardware declined by the most since September 2009, while stocks of electrical gear fell by the most since December 2011. The value of unsold non-durable goods decreased 0.3 percent and purchases fell 0.2 percent. To contact the reporter on this story: Lorraine Woellert in Washington at lwoellert@bloomberg.net To contact the editor responsible for this story: Christopher Wellisz at cwellisz@bloomberg.net
NEWS-MULTISOURCE
Dengue: Myths and Facts Dealing with dengue is one thing but there’s quite a bit of misinformation out there and we’re here to clear it up! In August 2019, it was reported by The Star that dengue fever cases hit an all time high with 80,000 cases and 113 deaths up until 3 August 2019. Additionally, Deputy Health Minister Lee Boon Chye projects that the number would hit 150,000 cases by the end of 2019 if stringent measures aren’t taken. Doesn’t that sound alarming? All this caused by a puny mosquito! In addition to this scary news, there are myths about dengue that are being shared via social media by well-meaning but ill-informed friends and family. These myths could cause further suffering, especially for those who might be caring for someone diagnosed with dengue fever. As such, here are the top myths and truths about dengue fever. Myth: Ingesting papaya leaves can cure dengue fever Fact: Although there are studies which say that the juice of papaya leaves could speed up the healing of dengue fever patients, this is not tested in those who are severely ill. Although the studies seem promising, the compound that supposedly helps to increase the platelet count hasn’t been isolated. Thus, its benefits and possible side effects hasn’t been studied and this would greatly help members of the populace who are more vulnerable such as pregnant ladies, the elderly and those with comorbidities.   Myth: Dengue can spread from person to person via contact Fact: Most of us know that dengue fever is transmitted by the bite of the Aedes aegypti mosquito. However, did you know that the mosquito becomes infected when it bites a person with Dengue virus? After around one week, the mosquito can transmit the virus by biting a healthy person! Myth: Drinking nipah crab soup can help cure dengue fever faster Fact: This isn’t too ridiculous as an increased calorie and protein intake of at most 50 percent of our daily requirement is advised as soon as the fever is controlled. Crab meat contains as much protein as meat with less saturated fats. It is also easily digestible due to its lack of connective tissues thus making it great for people who are unwell. If you or someone you know has a shellfish allergy or can’t afford the luxury of cooking crab, no need to worry as you can just substitute with other rich sources of protein such as milk, eggs, chicken, or fish! Myth: Low platelet count = dengue fever Fact: There are many conditions which could lead to a low platelet count. Other infections, medications, autoimmune diseases, surgery or pregnancy could lead to having low platelet count. The best thing to do is to go for a blood test to rule out dengue fever. Myth: Mosquitoes are attracted to dark clothing Fact: This is a complete myth and the American Mosquito Control Association has stated that mosquitoes are attracted to carbon dioxide and heat.  Myth: If i get it once, i’ll be safe next time Fact: How we wish this was true but it is very possible to be able to contract dengue fever again after being infected once. Our bodies do not become immune to the virus after fighting off the virus. This is a dangerous myth as it encourages people to be careless and put themselves at risk of recontracting the virus. The best way to beat dengue fever is via prevention. Ensure that your home does not have any bodies of standing water for mosquitoes to breed in. If you are staying in a dengue fever hotspot, have preventative measures such as wearing long sleeves and pants when you need to be outdoors during early morning or right before dusk which is when Aedes mosquitoes are most active.  References: Georgetown Pharmacy; The Star
ESSENTIALAI-STEM
Go Health Library Kids' Health Concerns Ease with Age Kids' Health Concerns Ease with Age Your child is coughing and has a fever—again. You begin to worry: Didn't they just get over a cold? When children are young, it's normal for them to have a variety of childhood illnesses and problems. Most go away as the child gets older. Here are some common health hurdles and advice when you can expect your child's condition to improve. Frequent colds Young children tend to get  six to eight colds per year. The reason: Kids come into the world with no immunity to the 200 or so rhinoviruses that cause the common cold. Immunity develops only after infection. Ear infections Why do infants and toddlers get ear infections more frequently? Blame it on the eustachian tube, a tiny passage between the middle ear and the back of the nose (nasopharynx). It is supposed to drain and ventilate the middle ear. When an adult stands, the eustachian tube is angled upward from the throat to the ear. This allows gravity to pull fluid downward toward the throat and discourages fluids in the throat from moving upward toward the middle ear. When a child stands, the eustachian tube is shorter, more narrow, and almost horizontal (flat). Fluid doesn't drain with the aid of gravity. If a child has a cold, there is swelling of the Eustachian tube, and drainage is decreased even more, which can cause increased ear infections. Expect improvement when the eustachian tube is fully developed by age 6. Tonsillitis The tonsils, two symmetrical masses of lymph tissue in the back of the throat, are part of the immune system and work to combat infections in young children. Unfortunately, they frequently become infected themselves. Streptococcal infections are the most common bacterial infection of the tonsils, and are commonly called strep throat. These bacteria, however, make up 15 to 30 percent of all cases of tonsillitis or sore throats; most cases are caused by viruses. Strep throat responds well and quickly to antibiotics. Viral tonsillitis or sore throat (pharyngitis) does not respond to antibiotics and must run its course. Removal of the tonsils (tonsillectomy) is not recommended as frequently as in years past, but doctors may still recommend it if tonsillitis has been a recurring problem for several years. It is also recommended if the tonsils are so large that they interfere with breathing, particularly while sleeping. As your child ages, the tonsils usually begin to shrink, their function as disease fighters declines, and infections become less frequent. Bed-wetting Bed-wetting (also called enuresis) is common. It is frustrating for both parent and child and can lead to a loss of self-esteem. It may affect social interactions, especially when the child reaches the age where sleepovers are common. Fortunately, many commercial products are available to help with this problem. Relatively effective medications are available by prescription for cases that do not respond to a child’s increasing age. It is very important to have your child evaluated by a pediatrician if bed-wetting occurs on a regular basis. These are possible causes for bed-wetting: • Genetics. Bed-wetting can run in families. • Deep sleep. Some children have difficulty waking up to use the bathroom. • Developmental delay. A slower development of the link between the central nervous system and the bladder can lead to bed-wetting. This link stops the bladder from emptying at night. • Hormonal problems. The antidiuretic hormone controls the amount of urine the kidneys make. If production of this hormone is out-of-cycle, bed-wetting can occur. • Urinary tract infections • Structural abnormalities in the urinary tract • Stress Children's bladder control increases as they get older. Expect improvement by age 6. Rashes Rashes are common in children. Fortunately, most rashes are not associated with serious illness. Common infectious childhood rashes, such as measles, rubella, and chicken pox have almost disappeared thanks to immunizations. Infectious rashes that are still common and for which there are no vaccines include hand-foot-and-mouth disease (not the same as hoof-and-mouth disease in cattle), roseola, and erythema infectiosum (also called fifths disease or slapped cheek disease). Noninfectious rashes of childhood that are common include eczema, infant cradle cap, and contact dermatitis. Diaper rashes are common and may be due to irritation by the diaper or a type of fungal infection called Candida albicans. Today's diapers are better at keeping a baby's skin dry and healthy, but rashes are still common.  So the next time your child comes down with an ear infection, cold, or rash, remember that you should see these illnesses a little less with each passing year. Find a doctor or make an appointment: General Information: (314) 747-3000 One Barnes-Jewish Hospital Plaza St. Louis, MO 63110 © Copyright 1997-2014, Barnes-Jewish Hospital. All Rights Reserved.
ESSENTIALAI-STEM
Avari Avari may refer to: * Avari (Middle-earth), a group of elves in J. R. R. Tolkien's fantasy writings * Avars (Pannonia), a group of people in pre-medieval Europe. * Avari Hotels, a Pakistani chain of Hotels affiliated with the Avari Group. * Erick Avari (born 1952), Indian-American television, film and theater actor.
WIKI
RRC ID 52160 Author Hashiguchi A, Hitachi K, Zhu W, Tian J, Tsuchida K, Komatsu S. Title Mung bean (Vigna radiata (L.)) coat extract modulates macrophage functions to enhance antigen presentation: A proteomic study. Journal J Proteomics Abstract The immunomodulatory effect of mung bean is mainly attributed to antioxidant properties of flavonoids; however, the precise machinery for biological effect on animal cells remains uncertain. To understand the physiological change produced by mung bean consumption, proteomic and metabolomic techniques were used. In vitro assay confirmed the importance of synergistic interaction among multiple flavonoids by IL-6 expression. Proteomic analysis detected that the abundance of 190 proteins was changed in lipopolysaccharide-stimulated RAW264.7 cells by treatment with coat extract. Pathway mapping revealed that a range of proteins were regulated including an interferon-responsive antiviral enzyme (2'-5'-oligoadenylate synthetase), antigen processing factors (immunoglobulin heavy chain-binding protein and protein disulfide-isomerase), and proteins related to proteasomal degradation. Major histocompatibility complex pathway was activated. These results suggest that mung bean consumption enhances immune response toward a Th2-promoting polarization. BIOLOGICAL SIGNIFICANCE:This study highlighted the immunomodulation of RAW264.7 cells in response to treatment with mung bean seed coat extract, using gel-free proteomic technique. The mechanism of immunomodulation by mung bean has not been described until today except for a report which identified HMGB1 suppression as a pathway underlying the protective effect against sepsis. This study suggested that the mung bean is involved in the regulation of antigen processing and presentation, and thus shifts immune response from acute febrile illness to specific/systemic and long-lasting immunity to protect the host. Volume 161 Pages 26-37 Published 2017-5-24 DOI 10.1016/j.jprot.2017.03.025 PII S1874-3919(17)30116-1 PMID 28373035 MeSH Animals Antigen Presentation / drug effects* Immunity, Cellular / drug effects Macrophages / drug effects* Macrophages / immunology Metabolomics / methods Mice Plant Extracts / chemistry Plant Extracts / pharmacology* Proteomics / methods RAW 264.7 Cells Seeds / chemistry Th2 Cells / immunology Vigna / chemistry* IF 3.722 Resource Human and Animal Cells RAW 264(RCB0535)
ESSENTIALAI-STEM
Electron Beam Weld Shape Prediction Based on Electron Beam Probing Technology Yin, Yi (2022) Electron Beam Weld Shape Prediction Based on Electron Beam Probing Technology. PhD thesis, UNSPECIFIED. [img] Text (2022YiPhD) 2022YiPhD.pdf - Published Version Available under License Creative Commons Attribution-NonCommercial-NoDerivs. Download (9MB) Abstract Electron beam welding (EBW) is a joining process that has been widely applied in many modern industrial sectors. However, in order to achieve a satisfactory welding quality for a given material and configuration, a trial-and-error approach is usually adopted before moving to the final production. This procedure is often wasteful, time consuming and expensive when the raw material is at high cost, and greatly relies on the operators’ personal experience. To enable a ‘smarter’ welding process and reduce the inconsistent human factor, this PhD study is to develop a novel method based on statistic modelling, numerical modelling and artificial neural networks to predict the weld profile, which is the main criterion for assessing the welding quality. The models are set up with electron beam characteristics collected through a 4-slits technology to determine the actual focal spot size and power density, therefore the uncertainty caused by beam variation can be reduced. Multi-influences caused by electron beam, machine parameters and process environment are considered, and the predictions cover a wide range of linear beam power ranging from 86 J/mm to 324 J/mm. Finally, a novel simulation tool for predicting electron beam weld shape has been developed with assistance of a 4-slits beam probing technology to reduce the amount of manual work traditionally needed to achieve high-efficiency and high-quality welding joints. Validated by experimental results, the model is able to predict the weld profile with high accuracy and reliability for both partially and fully penetrated welding situations. By combining the numerical model and artificial intelligence, a weld-profile prediction system is to be integrated in current EB welding machines to allow a less-experienced operator to achieve high welding quality. Item Type: Thesis (PhD) Subjects: ID Code: 176636 Deposited By: Deposited On: 28 Sep 2022 09:20 Refereed?: No Published?: Published Last Modified: 29 Dec 2022 01:30
ESSENTIALAI-STEM
The New International Encyclopædia/Gnetaceæ GNETACEÆ, nḗ-tā'shḗ-ē (Neo-Lat. nom. pl., from Gnetum, from Malay gnemon, gnemo, the native name). One of the great groups of gymnosperms, which comprises at present three genera, that differ remarkably in habit and habitat. The genera are Ephedra, with about 30 species, from the arid regions of both hemispheres; the very peculiar Tumboa (Welwitschia), from the extremely arid regions of Western South Africa; and Gnetum, with about 15 species, from the tropics of both hemispheres. The species of Ephedra are low, straggling shrubs, with long-jointed and fluted green stems, and opposite, scale-like leaves connate into a two-toothed sheath. The body of Tumboa has the shape of a gigantic radish, which rises little above the surface of the ground, and whose crown is sometimes 12 to 15 feet in circumference. From the edge of the crown two enormously long, parallel-veined leaves arise, which extend upon the ground sometimes for 10 to 15 feet, and become split into numerous ribbons. This single pair of opposite leaves, the only pair produced, grows continually at the base, and lasts through the lifetime of the plant, which is said to reach more than a hundred years. The species of Gnetum are either small trees or woody climbers, and are among the prominent lianas of tropical forests. The foliage is leathery in texture and suggests dicotyledons, as the well-developed opposite leaves are lanceolate to ovate in outline and pinnately net veined. See Plate of. The group is of special interest to the botanist on account of the display of certain angiospermous characters that have suggested that Gnetaceæ may have given rise to the angiosperms; but such a theory has been abandoned by most morphologists. The characters that distinguish the group from other gymnosperms are the occurrence of true vessels in the secondary wood, and the presence of a so-called perianth. In addition to these two distinguishing characters, the group has the following four characters in common, but not peculiar to it: (1) Opposite leaves; (2) dicotyledonous embryos; (3) cauline ovules; and (4) no resin-ducts. Some fossil forms of plants referable to the Gnetaceæ have been found; the majority from Tertiary deposits seem to belong to the modern genus Ephedra. The stems and female flowers of a species of Ephedra are found commonly in finely preserved condition in the Tertiary amber of the Baltic provinces. Stems and leaves of still earlier age, resembling those of Ephedra, and hence called Ephedrites, have been obtained in the Jurassic rocks of Eastern Siberia.
WIKI
Wikipedia talk:Courtesy Civility or Etiquette? Thinking WP:Etiquette may be a better target for this redirect.. -- &oelig; &trade; 03:25, 10 December 2013 (UTC)
WIKI
Page:Austen - Mansfield Park, vol. III, 1814.djvu/226 . I am aware that you may be left here week after week, if Sir Thomas cannot settle every thing for coming himself, or sending your aunt's maid for you, without involving the slightest alteration of the arrangements which he may have laid down for the next quarter of a year. This will not do. Two months is an ample allowance. I should think six weeks quite enough.—I am considering your sister's health," said he, addressing himself to Susan, "which I think the confinement of Portsmouth unfavourable to. She requires constant air and exercise. When you know her as well as I do, I am sure you will agree that she does, and that she ought never to be long banished from the free air, and liberty of the country.—If, therefore, (turning again to Fanny) you find yourself growing unwell, and any difficulties arise about your returning to Mansfield—without waiting for the two months to be ended—that must not be regarded as of any consequence, if
WIKI
Page:Short Stories (1912).djvu/85 78 "Hughes says there isn't anything." "My God, what liars some people are! He—why he don't know a bit of quartz from a brickbat. Nothing in it! What's he pegged out all that ground for—seventy-five acres—if there ain't nothing in it?" "Now, don't go off your head," I said, "I know there's something in it, but Hughes thinks I'm going to peg out and wants to get ahead of me. Now, Higgins, what's to be done? I don't know the track to Buchanan, nor do you—it's pitch dark—the moon won't be up for an hour and I'll bet you drinks they're off to Buchanan the minute they can see." Higgins cursed his own stupidity in not making me go out to Buchanan before and almost wept. Buchanan had been his pet scheme. He hadn't the money to take up ground, but I had, so he had trusted to me. Now what was to be done? "Higgins," said I solemnly, "I have a plan." "My God—what?" cried the old fellow, excitedly. "You must get drunk, Higgins." "I—drunk!—Good God, I never did such a thing in my life!" "Well, Higgins, you must do it now. The fate of Buchanan depends on your getting drunk." "I can't do it, sir—I can't do it." "Very well, if you can't you can't." "My principles, sir!" "Somebody's got to or we lose Buchanan." "I've never touched a drop since I came on the field. It would be such a scandal!" The old man paused and thought. "Why must I get drunk?" "To give me time." "What for?" "To save Buchanan." "For God's sake, how can my getting drunk save Buchanan?" "Higgins, I know Hughes is going to get ahead of
WIKI
There are basically three different methods for you to measure your body fat percentage levels. The first method will be the skin fold caliper test. This can be one of the most accurate ways to measure the amount of body fat you are carrying around. This test will help you measure the amount of fats which reside directly underneath your skin. Measurements of this type of fats are made with a caliper. This test is carried out between your elbow and shoulder, right above the hipbone as well as on your abdominal region. These measurements are then compared to a certain established standard for obesity. The only drawback is that the accuracy of the test depends on the skill of the person performing it. The next type of measurement for your body fat percentage levels will be underwater weighing. For this method, you are weighed underwater. As fat tends to float while muscle tends to sink due to the differences in their density, we can measure the proportion of fat in your body by comparing your weight in and out of the water. However, this is not a feasible nor convenient method for most people. Next, you can make use of height and weight charts. This is comparing your own measurements to an established standard for height and weight. In general, being 15 to 20 per cent over your acceptable weight is classified as obesity! However, there are actually some problems in making use of these tables to determine if you are in the healthy weight range. This table can prove to be inaccurate if you have an exceptional amount of muscle or fluid within your body. In similar words, if you are a muscular athlete, you may be classified under overweight using this table, but it clearly is not the case! This is because muscle weighs more than fats. Also, if you are suffering from an usual case of water retention in your body, your weight will seem to be artificially high. When making use of these tables, it is crucial to remember that these standards are based on figures by insurance companies. They also mean that the weights need not necessarily reflect the weights at which people look their best; being at those weights just mean that the chances of dying is lowest. Although these body fat percentage measurement techniques are definitely not 100 per cent accurate, they can still serve as a general gauge. Author's Bio:  If you liked this article, please check out Alvin's video on how to get thigh gap. Also do watch his coaching on arm exercises for women.
ESSENTIALAI-STEM
Template:String templates see also Trimming templates: * Str left – To trim down to a specified number of characters, or duplicate the string to a specified number. * Str trim — To trim any leading or trailing whitespace. * Str right — To trim the first specified number of characters. * Str rightc — To trim the first specified number of characters, returns a parameter if the string is empty. * Str sub — To trim down to a specified number, starting at a given number from the left, less than 50. * Str sub long — To trim down to a specified number, starting at a given number from the left, less than 100. Analyzing templates: * Str find – Returns the numerical location of a given string in a string, up to 50 characters. * Str index – Returns a given character from a string, but not accented letters. * Str index any – Returns a given character from a string, but not a space. * Str len – Returns a string's length. Can count up to 500 characters. String length comparison templates: * Str ≥ len – To check if a string is "longer or equally long" or "shorter" than a given length. * Str ≤ len – To check if a string is "shorter or equally long" or "longer" than a given length. * Str ≠ len – To check if a string is "not equal" or "equal" to a given length. * Str ≤ ≥ len – To check if a string is "shorter", "equal", or "longer" than a given length.
WIKI
Appendix talk:Chinese radical/龜 Three of the same character? Why are there three of the very same character on the first line (+0 strokes): the first, third, and fourth characters? <IP_ADDRESS> 01:48, 29 December 2009 (UTC)
WIKI
UK begins airstrikes against IS in Syria United Kingdom The government of the United Kingdom has said Royal Air Force (RAF) bombers began airstrikes yesterday against Islamic State targets in Syria. The bombings follow British Members of Parliament (MPs) voted to support action against IS in Syria on Wednesday. RAF Tornado bombers based at RAF Akrotiri in Cyprus attacked oilfields in Syria which are controlled by and fund IS. UK Defence Secretary Michael Fallon said the airstrikes were designed to deliver "a very real blow on the oil and revenue" of IS. A Ministry of Defence statement said six "elements of the oilfield infrastructure were targeted" by the Tornados with support from other aircraft. It said sensors on the aircraft determined the targets were clear of non-combatants. On Wednesday, MPs held a ten-hour debate on air strikes against IS, during which UK Prime Minister David Cameron urged them to support the action. They voted 397 to 223 to join the United States and France who are already bombing IS targets in Syria. Jeremy Corbyn, leader of the UK's opposition Labour Party, voted against airstrikes, arguing the need for bombings "did not stack up". Mr Cameron also failed to get support from the Scottish National Party (SNP), almost all of whose MPs voted against taking action in Syria. Following the airstrikes, Prime Minister Cameron said they had been "good for the country" and indicated "patience" would be needed in fighting IS. Mr Fallon said the UK are due to bomb more IS targets in Syria "in the next few days and weeks". Six Typhoon warplanes along with an Airbus A400M carrying engineers, ground crew and supplies left RAF Lossiemouth in Scotland yesterday to travel to Cyprus. Two further Tornados from RAF Marham in Norfolk, England are to join the planes based in Cyprus.
NEWS-MULTISOURCE
Tweag Diversity through inline code 17 August 2017 — by Manuel M T Chakravarty Haskell is an awesome language, but we need to remember that it is not very useful in isolation. In almost any realistic application, Haskell has to coexist with other languages, even if only to call existing C libraries or to make use of operating system services. In actual practice, the more easily we can fit Haskell into existing ecosystems, the more application domains we can unlock. Beyond bridging The core of Haskell’s ability to interoperate, the ForeignFunctionInterface language extension, has been available and stable for a long time. However, for all but the simplest interoperability requirements, it tends to be tedious to use. So we have tools such as hsc2hs and c2hs to automate some of the work of declaring foreign entities and writing marshalling code. This does not just save work, it also prevents many common mistakes. Over time, we realised that this is not sufficient either. Tools like hsc2hs and c2hs are typically used to implement, what I like to call, bridging libraries. These libraries wrap the API of a foreign library in Haskell, usually by exposing a Haskell API that is close to the original and, occasionally, by providing a more functional, more high-level API. This works fine up to a certain API size. After that — just think about the API surface needed to write Android, iOS, macOS, or Windows apps — the overhead of bridging libraries tends to weigh down and break that bridge: • The initial implementation is a huge undertaking, which few people, or institutions, are willing to embark on. • API evolution of the foreign library creates a significant ongoing maintenance burden. Even worse, typically, multiple versions need to be supported simultaneously. • Documentation becomes a major headache. It is infeasible to transliterate all of the original documentation, but referring Haskell users to the original requires to exactly mirror that original API and demands an understanding of the bridging conventions by the library user. • Even just the overhead of linking all the bridging code starts to be an issue for large APIs. Inline foreign code in Haskell sidesteps these issues. The effort to implement an inline library for a foreign language is fixed and supports an arbitrary number of foreign language libraries of arbitrary size without any further overhead. Documentation is naturally just the original and marshalling overhead is in proportion to its use in any single application. Admittedly, a user now needs to know both Haskell and the foreign language, but, given the documentation issue, that was always the case for large APIs. I have illustrated this in a talk at the 2014 Haskell Symposium, where I introduced language-c-inline to use Objective-C code inline in Haskell to code against macOS APIs. You can watch the talk on YouTube. I was not alone What I didn’t know at the time is that Mathieu Boespflug, Alexander Vershilov, and Facundo Domínguez drew the same inspiration as I did from Geoff Mainland’s work on Quasiquoting Support for GHC and independently developed inline-r, a Haskell library for inline R code. Subsequently, Mathieu worked with Francesco Mazzoli on inline-c and developed inline-java with Alp Mestanogullari and Facundo Domínguez. The latter is where foreign inline code, once again, provides an unorthodox solution to an old problem. In an attempt to fit into the ubiquitous Java ecosystem, there has been a string of failed attempts to compile Haskell to JVM code — although, maybe, one will eventually be successful, even if at a steep price. Integration with Java is highly attractive as it opens the door to many applications and commercial opportunities. In addition, successful entrants into the JVM ecosystem, such as Scala and Clojure, suggest that generating JVM bytecode is the opportune approach. Come as you are The fundamental design philosophy behind inline code is to accept that there are multiple language environments and work with that. We don’t try to shoehorn the semantics of one language into the other. We don’t even force a particular style for calling such functions. Indeed you can call Haskell, R, C, Objective-C or Java functions with each of their respective syntaxes. In some cases, this has crucial consequences. For instance, R has special syntax for variadic functions with labeled arguments and default values, none of which Haskell has. inline-r lets you e.g. call R’s plot() function the way it was meant to be called: H> let xs = [x :: Double | x <- [1..10]] H> let ys = [x^2 | x <- xs] H> [r| plot(xs_hs, ys_hs, col = "red", main = "A quadratic function") |] Highly versatile functions with multiple modes of use would otherwise require multiple bindings to the same function Haskell side or unnaturally packing arguments into lists. Likewise, Objective-C has special syntax for sending messages to objects. It’s convenient to be able to reuse documentation snippets that use this pervasive idiom. But this design philosophy has further consequences still. All of the projects you saw mentioned above let each language not just keep their syntax, but also their runtimes. GCC or LLVM compiles C and Objective-C to native code. The reference R interpreter parses and executes R code on-the-fly. Java code gets compiled to JVM bytecode, using configuration extracted from Java build tools (Gradle, Maven, …). And yes, it is GHC that compiles Haskell to native code, like it always did. To run Haskell on JVM based enterprise middlewares, we package it up as a JAR and load the native code into the JVM dynamically. You could take the motto to be “each language, come as you are”. There are tradeoffs to this approach. The bad news is that, • when multiple compilers are involved, we have to mesh multiple build toolchains together; • when multiple garbage collectors are involved, we need to make sure live data in one language is not considered garbage in the other. This is a tricky problem in general. But on the flip side: • We spare ourselves implementing new code generators, e.g. for the JVM. The many failed attempts attest to the difficulty of this endeauvour. • By generating JVM bytecode, you lose access to all existing packages that depend on foreign code, such as C libraries. In contrast, inline-java happily enables projects involving Haskell, Java, and C without any need to change existing packages. • Each language is an equal citizen and the semantics and runtime behaviour of each is preserved. Note in particular that the runtime characteristics of Haskell code are not all that well matched with those that the JVM is optimised for. Haskell has a much higher allocation rate than Java, it has entirely different update patterns due to purity and laziness, and it relies on different control flow, including heavily reliance on tail calls and their optimised implementation. In this case, inline-java just uses the tried and tested GHC native code as is. Each language is its own first-class citizen, but that’s not to say each language forces a particular way to package things. We can still maintain the convenience of bundled distribution, as the Java archive (JAR) format is sufficiently flexible to allow arbitrary native code alongside JVM bytecode in a single self-contained bundle — we detailed this in a previous post on the Haskell compute PaaS with Sparkle. Conversely, we also routinely embed Java bytecode in Haskell binaries packaged as RPM’s. Happy coexistence All in all, inline foreign code enables diversity in the form of scalable mixed language projects while requiring no more than a limited toolchain maintenance burden. Interestingly, all Haskell foreign inline code libraries have enabled and been driven by concrete applications. The Haskell for Mac IDE is built on language-c-inline. The package inline-r was originally developed for Amgen as part of a commercial project. The package inline-c was developed by FP Complete to more easily bind large mathematical libraries and is used by LumiGuide for their OpenCV work. inline-java is maintained by Tweag I/O and features contributions from Leap Year and other companies that use it at the core of their products. About the authors Manuel M T Chakravarty If you enjoyed this article, you might be interested in joining the Tweag team. This article is licensed under a Creative Commons Attribution 4.0 International license. Company AboutOpen SourceCareersContact Us Connect with us © 2024 Modus Create, LLC Privacy PolicySitemap
ESSENTIALAI-STEM
-- Greek Voters Shatter Myth of Two-Party System to Defy EU Rules In a mountain village where Greeks began their liberation from Ottoman Turks two centuries ago and now go to ski, Dimitris Lourantakis says he’s proud to be among voters pushing to throw out Greece ’s political ruling class. Lourantakis, who lives in Kalavryta, two hours’ drive west of Athens, never voted for a party other than the Socialist Pasok until May 6. He cast his ballot last week for an eight- year-old party named Syriza that says it would renege on the bailout agreements that have secured Greece’s place in the euro until now. “I wanted to send a message of change,” said Lourantakis, who runs a restaurant in Kalavryta, where the first Greek flag of independence from the Turks was raised at a nearby monastery in 1821 and where the Nazis massacred the male population in 1943. “It can’t go on. The old politicians have to go.” The surge in support for smaller parties such as Syriza has blocked the formation of a new government, increasing the chances of new elections and heightening risks the country will exit the 17-nation euro. Syriza leader Alexis Tsipras said yesterday that his party, which came in second nationwide with 17 percent of the vote, would not join a unity government as Greek President Karolos Papoulias tried to broker a coalition. In return for emergency-aid pledges of 240 billion euros ($310 billion) from Europe and the International Monetary Fund over the past two years, Greece must keep narrowing its budget deficit to be eligible for quarterly loan disbursements. Golden Dawn The new Greek political landscape also features the nationalist Golden Dawn , whose logo resembles a swastika; former New Democracy members united as the Independent Greeks; and left-of-center groups in Syriza’s shadow. New Democracy, which came in first with 19 percent, and Pasok, third with 13 percent, have no parliamentary majority alone or together after uniting in November to back budget cuts to keep aid flowing. Failure to form a coalition would lead to new elections as soon as next month. “The election this month was a political earthquake,” said Janis Emmanouilidis, an analyst at the European Policy Centre in Brussels. “If there is an election in June, voters will protest again. They are protesting against the effects of the economic crisis on their lives.” Wage Cuts New Democracy and Pasok have dominated Greek politics over the past four decades because of the appeal of two multiple- term prime ministers, Constantine Karamanlis and Andreas Papandreou . New Democracy’s Karamanlis steered Greece into the European Union after leading the country when it emerged from a military dictatorship in 1974. Papandreou, who had been imprisoned during the dictatorship, founded Pasok and brought it into mainstream politics with a 1981 electoral victory. The parties’ monopoly on power is now disintegrating as the economy suffers a fifth year of recession, with record unemployment of almost 22 percent and a minimum wage that was cut 22 percent this year. Golden Dawn, which opposes immigration and foreign aid, capitalized on the voter discontent to enter parliament for the first time. Panagiotis Plassaras, a 28-year-old Golden Dawn volunteer from the town of Nemea in the electoral region of Corinth, an ancient city about 80 kilometers (50 miles) west of Athens , said he was spurred to act because of disgust with the status quo. “We believe we are at war -- at economic and political war against the system that is selling our country to foreigners,” Plassaras said while sitting with fellow activists in the Golden Dawn office in Nemea. “We want the country back in our hands. We want Greece to be run by Greeks again.” Swastika-Like Golden Dawn gained 12 percent of the vote in the Corinth region compared to 7 percent nationwide. Near Corinth, the party’s name has been sprayed on facades across the countryside. The group’s logo resembles a disentangled swastika and a video of its leader, Nikolaos Michaloliakos, shows him giving a fascist salute. Plassaras, who has a ponytail and beard, is married and works in his family-run olive-oil business, said the fascist image of Golden Dawn is unfair. “We’re not Nazis,” he said. “We fought the Germans and we would fight them again. We’re Greek nationalists.” Nikos Bakopanos, a 55-year-old farmer from Nemea, a wine- growing area, said he voted for Golden Dawn after supporting New Democracy and Pasok in previous elections. Married with two sons, both of whom are also farmers, Bakopanos said they aren’t making money and one son is thinking of going to Australia or the U.S. Drinking rose wine in a local cafe, Bakopanos said the prices for his produce haven’t risen in a decade, immigration and crime are rampant and the political system under New Democracy and Pasok is broken. Broken System “The system doesn’t work at all,” he said. “The state doesn’t care. It’s anarchy. Greeks need discipline.” Back in Kalavryta, the 42-year-old Lourantakis said what Greeks need is time. With a master’s degree in sports from the University of Bucharest and a Romanian wife who is a former Olympic biathlon skier, he said Greece wasn’t fit for the euro when joining in 2001 and will have to leave unless the terms for staying are loosened. “With the euro, all of Greece has gone down,” he said while seated at a table in his restaurant called “To Spitiko,” or “The Household,” which is a 20-minute drive from the ski lifts. “The question isn’t whether you want to stay in the euro. It’s whether you can. There’s no money.” If Europe offers no rescue concessions, said Lourantakis, the nation should reintroduce its own currency. He said Greece, dependent on tourism for about 17 percent of its economy, would regain a comparative advantage when seeking to attract foreign visitors instead of having to operate in a European framework tailored to Germany ’s high-technology businesses. “I don’t have a Mercedes engine,” he said. “I have a tourism engine.” To contact the reporters on this story: Jonathan Stearns in Athens at jstearns2@bloomberg.net ; Maria Petrakis in Athens at mpetrakis@bloomberg.net To contact the editors responsible for this story: James Hertling at jhertling@bloomberg.net ; Tim Quinson at tquinson@bloomberg.net
NEWS-MULTISOURCE
4th chakra Yogic Practices for Anahata Activation August 8, 2016 philosophy of gunas Three’s a Charm: Feel the Guna Greatness August 16, 2016 A Better Night’s Sleep Calls for Ayurveda and Yoga yoga for better sleep No amount of yoga or super foods can make up for lack of sleep! Along with proper nourishment and proper use of energy, Ayurveda considers sleep one of the three pillars of life; i.e., one of the most important sustainers of wellbeing. There is no substitute for a restful slumber, and it doesn’t always come easy. Yoga and Ayurveda explain techniques and supportive practices that help bring deep sleep to the otherwise wide-awake. Massage your feet with sesame oil It may sound a little odd, but massaging your feet with sesame oil promotes a restful sleep. The feet are related to the energy called vata dosha that can cause insomnia when imbalanced. Massaging the feet with gentle, rhythmic strokes using warm sesame oil pacifies this energy, calming the mind and bringing the feeling of groundedness. Make a little nighttime brew Ground nutmeg spice in the wooden spoon closeup Ayurveda’s go-to nighttime beverage is warm milk with ¼ teaspoon of nutmeg. Nutmeg and its sheath (an herb called mace) both induce sleep. Drink this about an hour before bed and feel your body unwind, and if you’re vegan try adding a little almond milk instead.  Lights out by 10 p.m. Ayurveda explains that each day follows a cyclical rhythm in which the three doshas, or energies, take turns exerting their influence on nature and the body. The heavy, slow energy of kapha is dominant from about 6 p.m. to 10 p.m. If we go to sleep within this window (or as close to 10 as possible), we can take advantage of this energy’s weightiness. Falling asleep during this time can help us fall asleep easier, whereas we’ll catch a second wind if we stay up into the midnight hours. Avoid sleeping during the day Ayurveda describes one of the causes of many different diseases as day sleep. Unless you’re elderly, pregnant, emaciated, or ill, day sleep is generally contraindicated. It not only imbalances the body’s energies, but it also makes it more difficult to fall asleep at night. Use the breath to calm the mind girl doing breathing exercises. pranayama and yoga. When it’s an agitated, overactive mind that prevents falling or staying asleep, pranayama can work wonders! Breathing practices such as sama vritti pranayama (equal breathing), nadi shodhana pranayama (alternate nostril breathing), and bhramari pranayama (humming bee breathing) soothe the mind and take it into a thoughtless state of meditation. And for the sleep deprived, a few minutes of any of these exercises should be given as much importance as brushing one’s teeth before bed. Make wise yoga choices For the most part, yoga gives a sense of mental tranquility. But a strong yoga flow set to upbeat music can be too invigorating for the sleep impaired, at least after mid-afternoon. This kind of yoga gives an energetic buzz, at a time when you should actually be winding down. Wiser yoga choices would be yin, restorative, or gentle hatha classes. Practice yogic sleep Beautiful happy young woman in bright sportswear lying down indoors on blue mat. Girl staying in Shavasana Corpse or Dead Body Posture, resting after practice, meditating, breathing Used to wind down before bed, yoga nidra releases physical and mental tension. This ‘psychic sleep’ is a guided practice where awareness is directed throughout the body, breath, emotions, and imagery. It brings the mind to the border of conscious and unconscious; a state of deep relaxation. Free guided yoga nidra practices can be found online! Once you’ve gotten the hang of this technique, you can use this method to help you relax and fall back asleep on those sleepless nights. Mix and match these techniques and practices to create your own sleep routine. Turn off the television at least an hour before bed, give yourself time to wind down, and take advantage of yoga and Ayurveda’s wisdom to bring sweet slumber. Julie Bernier Julie Bernier helps women to bring their bodies back into balance, whether they’re struggling with hormonal imbalances, period problems, digestive troubles, skin conditions, anxiety, depression, preparing for or recovering from giving birth, or any other dis-ease. This holistic approach to individualized wellness is rooted in ayurveda: a holistic system of healing from ancient India. Julie is a registered Ayurvedic Practitioner and Ayurvedic Yoga Therapist with the National Ayurvedic Medical Association (NAMA) as well as a Certified Massage Therapist. She studied each of these modalities in the US and straight from the source in India. Connect with Julie at trueayurveda.com or on IG at @juliebernier.
ESSENTIALAI-STEM
Colt Automatic Rifle The Colt Automatic Rifle or Colt Light Machine Gun is a 5.56 mm NATO, open-bolt, full-automatic-only firearm developed by Colt Defense. It is based on the M16A2/A4, and has a distinctive squared-off handguard, vertical grip, carrying handle and integrated bipod. It is one of many squad automatic weapon-type firearms that have been developed from the Armalite AR-15 that use the Stoner bolt and carrier piston system. The family name was derived from the original AR-15 by adding "Colt", resulting in the CAR-15, to stand for Colt Automatic Rifle, even though the "AR" in AR-15 stands for Armalite Rifle, the original manufacturer. The CAR-15 weapons system consisted of the AR-15 and five variations, including the Colt Machine Gun and CAR-15 Heavy Assault Rifle. Overview The Colt Automatic Rifle is the name of a current product, but Colt has developed a number of similar weapons since the company obtained the rights to produce the Armalite AR-15 family at the end of the 1950s. Originally known as the Colt M16 LMG or simply as the Colt LMG (Light Machine Gun), this weapon was developed as a joint venture by Colt and Diemaco, a Canadian firm licensed by Colt in 1982 to produce variants of the M16 family for the Canadian Armed Forces. In 2005, Diemaco was acquired by Colt's Manufacturing LLC and renamed Colt Canada. The Colt/Diemaco weapon traces its lineage to a number of weapons developed both at Colt and by the U.S. military. These weapons were all designed to fill the role of the earlier Browning Automatic Rifle. The BAR was originally to have been replaced by the M15 Squad Automatic Weapon, but instead was ultimately replaced by the M16A1; one rifleman was supposed to use this weapon's fully automatic setting while the rest of the squad used semi-automatic. Throughout the period between the introduction of the M16 and the introduction of the M249 as a purpose-built squad automatic weapon at the end of the SAW trials, interim weapons were developed and tested in order to fill the gap. Colt Model 606 CAR-15 Heavy Assault Rifle M1 Between 1964 and 1965, Colt began to expand the AR-15 beyond the realm of an infantry/assault rifle with the development of light machine gun weaponry. The result was the Model 606 series. Colt made two of the model 606, called A and B models. The A model “featured forward assist devices found on the Colt 603 rifles.” The B model had a “four-position selector with burst fire as an option.” The M1 model, designed for sustained automatic fire, carried a heavy profile barrel. Colt developed a 30-round magazine for the weapon, and a bipod was designed for added stability. The M2, designed with the same heavy barrel and bipod, also features a belt-fed drum mounted on top of the gun. In February 1965, Colt submitted the Model 606A for the Small Arms Weapons Systems Trials (SAWS trials), sponsored by the U.S. Army, and would be known by the experimental classification as the GX–5856/Heavy Assault Rifle M1. The 606 series was not successful as they were prone to rapid overheating, and the gas impingement system, together with the white nylon buffer, did not adapt effectively to sustained fire. BRL XM106 The U.S. Military followed the Small Arms Weapons Systems study with the Squad Automatic Weapon (SAW) program starting in the late 1970s. One of the four main concepts coming out of this program was the XM106, developed by the U.S. Army’s Ballistic Research Laboratory (BRL) in January 1978. The design, an open-bolt, magazine-fed adaption of the M16A1, was developed under the guidance of Timothy Brosseau. The BRL gun differed primarily in having permanently fixed handguards and a special quick-change barrel system. The handguards also had an M2 bipod originally for the M14 rifle and a vertical foregrip fashioned from an M16A1 pistol grip. Early XM106s also had the front sight moved forward along the barrel to create a longer sight radius for more accurate long range fire, but this was dropped from later versions. In the end the Army used the XM106 as a control variable during the competition and instead selected the M249 Squad Automatic Weapon. The Colt M16 HBAR was also included in the Squad Automatic Weapon (SAW) program, as requested by the U.S. Army’s Office of the Deputy Chief of Staff of Operations. The United States Marine Corps, in December 1977, had already invested funds for the development of a “sustained-fire capable version of the Colt M16 HBAR.” Colt/Diemaco LMG During the 1980s Colt decided to expand on the basic ideas that had been developed in the WAK and BRL guns. The weapon was essentially a modified M16A1 with a new square handguard to cover the enlarged straight gas tube and almost 1 inch thick heavy barrel to make the barrel less susceptible for overheating and hence increase the sustained or effective rate of fire capability, a carry handle on top of the handguard, with a hydraulic buffer assembly and the ability to fire from an open bolt. The chrome-lined barrel was permanently fixed to the receiver and could not be replaced in the field. An angled foregrip was added to the handguard to improve handling as an automatic rifle. Rear sights later featured on the M16A2 were also introduced, and the weapon could only fire in fully automatic firing mode. Unlike many M16 variants, it fired from an open bolt, necessitating the removal of the forward assist for operating safety. Colt initially packaged these weapons with the MWG 90-round "snail drum" (later replaced with the Beta Systems C-Mag). Colt had also originally used the M60 machine gun bipod, but switched this to a proprietary design that was lighter for the subsequent Model 750. The Colt Model 750 was an improvement of the basic principle of the Colt LMG, developed jointly by Colt and Diemaco with an eye to Canadian Army sales. The improved version featured all A2 parts and is essentially the same as the preceding variant externally except for the redesigned vertical foregrip, now of a ribbed straight cylindrical style. This weapon was marketed by Diemaco as the C7 Light Support Weapon (LSW) or simply as the LSW. The Netherlands Marine Corps designate it as "LOAW" (licht ondersteunend automatisch wapen/light supporting automatic weapon) and the Danish military as "LSV M/04". The LSWs used by the Netherlands Marine Corps and the Danish military like many M16 variants fire from a closed bolt and feature semi-automatic and fully automatic firing modes and a forward assist. With its 5.42 kg (14.5 lbs) the C7 LSW is relatively light and as it uses 5.56×45mm NATO ammunition fed from STANAG magazines, like assault rifles and carbines that are fed in the same way, ammunition is easy to redistribute between riflemen if the operator runs out of ammunition. The lack of belt feed and quick barrel change options limits the C7 LSW and similar magazine fed light support weapon's rapid rates of fire. Colt and Diemaco further improved on the design, adding a flat top carry handle and a further improved bipod to the weapon in the 1990s. Colt refers to it as the Model 950, but markets it as the Colt Automatic Rifle, and until their purchase by Colt, as the Diemaco LSW. Because of the Colt-Diemaco partnership on this system, it was the only weapon in the Diemaco product line to feature M16A2-type range and windage adjustable rear sights, and when modified a detachable carry handle with M16A2 fully adjustable rear sights (the majority of Diemaco's product line had modified M16A1-type rear sights, and they actually developed a detachable carry handle with modified A1 rear sights). A maple leaf is stamped on the lower receiver of current Colt Automatic Rifles. From 2009 onwards many of the Dutch LOAW purchased in 1994 have had an overhaul: the black furniture has now been replaced by dark earth furniture. New parts include a new retracting stock, ambidextrous controls, an Integrated Upper Receiver (IUR) with a free-floating barrel and RIS rails for mounting Laser Light Modules and other accessories. The ELCAN 3.4×28 optical sight has also disappeared in favour of the Swedish made Aimpoint CompM4 red dot sight and, if desired, an accompanying Aimpoint magnifier. The polymer STANAG compliant magazines became not exclusively black in color as translucent smoke colored Lancer L5AWM 30-round magazines (NSN: 1005-01-657-7839L5) were also introduced along the black Thermold magazines. This upgraded version is now known as "LOAWNLD". Users * 🇧🇷 Brazil: RO750 used by Federal Police * Brunei: Replaced by Ultimax 100. * 🇩🇰 Denmark: C7 Light Support Weapon designated as LSV M/04 * 🇳🇱 Netherlands: C7 Light Support Weapon designated as LOAW(NLD) — Used by the Netherlands Marine Corps.
WIKI
PlanoTse Handbook for Job Search Automation/Introducing Automation Wizard * Previous Chapter Chapter 4. Introducing Automation Wizard This chapter shows you how to work with the Automation Wizard, a tool in PlanoTse. The pages in this chater are part The Shortest Route. * Automation Wizard - Automation Wizard Demo begins here * Search Factors * Factor Pages * Inclusion Page * Exclusion Page * Preview Page * Generation Page * Execution Page - Automation Wizard Demo ends here Automation Wizard Demo On each of the above pages, there is a demo section at the end of the page. These demo sections together are called the Automation Wizard Demo. To see this demo, following all steps in the demo sections on these pages.
WIKI
Why C57BL/6J-bg<J> (beige) mice are not beige We occasionally get calls from researchers who are using C57BL/6J-bgJ (C57BL/6J-Lystbg-J/J  - 000629) mice for the first time asking the following question, "If these mice are called beige, why are they charcoal gray?" The answer has to do with the background strain in which the mutation occurred and was first reported. First report The beige (bg) allele, first reported by Kelley, arose at Oak Ridge in 1957 and was probably radiation induced. Kelley describes bg/bg mice on an agouti (A/-) black (Tyrp1b/+, or B/-) background as showing diminished ear and tail pigment and dorsal hairs with the subterminal band yellow, the middle portion dark grey and the base usually very light grey. The overall appearance is cafe-au-lait or beige. Coat color Beige-J (bg-J) is a spontaneous mutation which arose at The Jackson Laboratory in strain C57BL/6J. On this non-agouti (a/a) black (B/B) background, bgJ/bgJ mice show diminished ear and tail pigment but the coat color in the absence of the agouti allele is a solid charcoal grey. In a black (B/-) mouse it is the difference at the agouti locus A/- or a/a that makes the coat color appear beige or charcoal grey. Research Kelley EM. 1957 Mouse News Lett. 16:36. Lane PW and Murphy ED. 1972. Susceptibility to spontaneous pneumonitis in an inbred strain of beige and satin mice. Genetics. 72:451-460.
ESSENTIALAI-STEM
Effect of local heating by ultrashort pulsed laser on Fe–Si–B–Cr amorphous alloys and its influence on blanking machinability Chieko Kuji, Masayoshi Mizutani, Kana Takenaka, Keita Shimada, Toyohiko J. Konno, Hitoshi Soyama, Tsunemoto Kuriyagawa Research output: Contribution to journalArticlepeer-review 1 Citation (Scopus) Abstract We propose a novel blanking method to improve the machinability of amorphous alloys by taking advantage of changes in mechanical properties during local heating. The local heating is achieved through an ultrashort pulsed laser with a low thermal effect, allowing us to control the size and structure of heat-affected zones by adjusting laser power, pulse width, and shot numbers. This method hence causes phase transformation only in the blanking area. Namely, heat storage effects increased with a prolonged ablation process, and crystallization was observed at a repetition rate of 200 kHz or more. A fully crystallized microstructure, which formed at elevated temperatures, was seen at the center of the laser irradiation, while, as the distance from the irradiation point increased, small crystallites are found to disperse in the amorphous matrix. In addition, a thin crystalline phase appeared on the surface layer of the crystallized region. In general, the locally heated area was embrittled by the aforementioned structural changes, and consequently, the blanking resistance decreased with an increase in the crystallized area. Yet, it was found that laser irradiation which did not bring about crystallization also led to a decrease in the blanking resistance, showing that thermal effects below the crystallization temperature are still effective in reducing the blanking resistance. Additionally, the blanked cross-section of the locally heated specimen showed good surface quality without defects such as a large shear droop, which often occurs when punching amorphous alloys. Original languageEnglish Pages (from-to)135-144 Number of pages10 JournalPrecision Engineering Volume81 DOIs Publication statusPublished - 2023 May Keywords • Amorphous alloy • Blanking • Crystallization • Transmission electron microscope • Ultrashort pulsed laser ASJC Scopus subject areas • Engineering(all) Fingerprint Dive into the research topics of 'Effect of local heating by ultrashort pulsed laser on Fe–Si–B–Cr amorphous alloys and its influence on blanking machinability'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
List of butterflies of Maryland This is a list of butterflies in the U.S. state of Maryland. Papilionidae * Eastern tiger swallowtail, Papilio glaucus * Canadian tiger swallowtail, Papilio canadensis * Zebra swallowtail, Eurytides marcellus * Pipevine swallowtail, Battus philenor * Spicebush swallowtail, Papilio troilus * Black swallowtail, Papilio polyxenes * Palamedes swallowtail, Papilio palamedes * Giant swallowtail, Papilio cresphontes Pieridae * Cabbage white, Pieris rapae * West Virginia white, Pieris virginiensis * Checkered white, Pontia protodice * Falcate orangetip, Anthocharis midea * Olympia marble, Euchloe olympia * Clouded sulphur, Colias philodice * Orange sulphur, Colias eurytheme * Pink-edged sulphur, Colias interior * Sleepy orange, Abaeis nicippe * Little yellow, Eurema lisa * Cloudless sulphur, Phoebis sennae Lycaenini * American copper, Lycaena phlaeas * Harvester, Feniseca tarquinius * Bog copper, Lycaena epixanthe * Bronze copper, Lycaena hyllus Theclini & Eumaeini * Gray hairstreak, Strymon melinus * White M hairstreak, Parrhasius m-album * Banded hairstreak, Satyrium calanus * Hickory hairstreak, Satyrium caryaevorus * Edward's hairstreak, Satyrium edwardsii * King's hairstreak, Satyrium kingi * Striped hairstreak, Satyrium liparops * Northern oak hairstreak, Satyrium favonius ontario * Coral hairstreak, Satyrium titus * Red-banded hairstreak, Calycopis cecrops * Brown elfin, Callophrys augustinus * Henry's elfin, Callophrys henrici * Frosted elfin, Callophrys irus * Hoary elfin, Callophrys polios * Eastern pine elfin, Callophrys niphon * Great purple hairstreak, Atlides halesus * Juniper hairstreak, Callophrys gryneus * Hessel's hairstreak, Callophrys hesseli * Early hairstreak, Erora laeta Polyommatini * Eastern tail-blue, Cupido comyntas * Silvery blue, Glaucopsyche lygdamus * Appalachian azure, Celastrina neglectamajor * Dusky azure, Celastrina nigra Riodinidae * Little metalmark, Calephelis virginiensis * Northern metalmark, Calephelis borealis Heliconiinae * Variegated fritillary, Euptoieta claudia * Greater spangled fritillary, Speyeria cybele * Aphrodite fritillary, Speyeria aphrodite * Meadow fritillary, Boloria bellona * Silver-bordered fritillary, Boloria selene Nymphalinae * Pearl crescent, Phyciodes tharos * Phaon crescent, Phyciodes phaon * Silvery checkerspot, Chlosyne nycteis * Baltimore checkerspot, Euphydryas phaeton * Question mark, Polygonia interrogationis * Eastern comma, Polygonia comma * Gray comma, Polygonia progne * Compton tortoiseshell, Nymphalis vaualbum * Milbert's tortoiseshell, Aglais milberti * Mourning cloak, Nymphalis antiopa * Red admiral, Vanessa atalanta * American lady, Vanessa virginiensis * Painted lady, Vanessa cardui * Common buckeye, Junonia coenia * Red-spotted purple, Limenitis arthemis * Viceroy, Limenitis archippus * Hackberry emperor, Asterocampa celtis * Tawny emperor, Asterocampa clyton * American snout, Libytheana carinenta * Monarch, Danaus plexippus * Queen, Danaus gilippus Satyrinae * Little wood-satyr, Megisto cymela * Carolina satyr, Hermeuptychia sosybius * Common wood-nymph, Cercyonis pegala * Appalachian brown, Satyrodes appalachia * Northern pearly-eye, Enodia anthedon Pyrginae & Pyrrhopyginae * Silver-spotted skipper, Epargyreus clarus * Golden banded-skipper, Autochton cellus * Hoary Edge, Achalarus lyciades * Southern cloudywing, Thorybes bathyllus * Northern cloudywing, Thorybes pylades * Confused cloudywing, Thorybes confusis * Long-tailed skipper, Urbanus proteus * Juvenal's duskywing, Erynnis juvenalis * Horace's duskywing, Erynnis horatius * Dreamy duskywing, Erynnis icelus * Sleepy duskywing, Erynnis brizo * Wild indigo duskywing, Erynnis baptisiae * Columbine duskywing, Erynnis lucilius * Mottled duskywing, Erynnis martialis * Common checkered-skipper, Pyrgus communis * Hayhurst's scallopwing, Staphylus hayhurstii * Common sootywing, Pholisora catullus Heteropterinae & Hesperiinae * Fiery skipper, Hylephila phyleus * Sachem, Atalopedes campestris * European skipper, Thymelicus lineola * Least skipper, Ancyloxpha numitor * Clouded skipper, Lerema accius * Swarthy skipper, Nastra lherminier * Cobweb skipper, Hesperia metea * Leonard's skipper, Hesperia leonardus * Indian skipper, Hesperia sassacus * Long dash, Polites mystic * Peck's skipper, Polites peckius * Tawny-edged skipper, Polites themistocles * Crossline skipper, Polites origenes * Black dash, Euphyes conspicua * Southern broken-dash, Wallengrenia otho * Northern broken-dash, Wallengrenia egeremet * Little glassywing, Pompeius verna * Dun skipper, Euphyes vestris * Hobomok skipper, Poanes hobomok * Zabulon skipper, Poanes zabulon * Mulberry wing, Poanes massasoit * Broad-winged skipper, Poanes viator * Aaron's skipper, Poanes aaroni * Two-spotted skipper, Euphyes bimacula * Dion skipper, Euphyes dion * Delaware skipper, Anatrytone logan * Rare skipper, Problema bulenta * Dusted skipper, Atrytonopsis hianna * Common roadside-skipper, Amblyscirtes vialis * Pepper and salt skipper, Amblyscirtes hegon * Ocola skipper, Panoquina ocola * Salt marsh skipper, Panoquina panoquin
WIKI
Russian corvette Boikiy Boikiy (Бойкий) is a Steregushchy-class corvette corvette of the Russian Navy, the third ship of that class. She was laid down in July 2005 and was launched on 15 April 2011. She was presented to the Baltic Fleet for final inspection by the Navy on 16 March 2012 ahead of her commissioning later in the year. On 16 November 2012 it was reported that the corvette had already passed the shipyard's sea trials; about 70 certificates were signed then. JSC Arsenal intended to produce a 100-mm gun mount A190-01 for the corvette, and late in 2012 the ship moved to Baltiysk acceptance base for the second phase of sea trials. This began state acceptance trials. The corvette was handed over to the Russian navy on 14 May 2013. In April 2017, Boikiy and sister Soobrazitelnyy were escorted through the English Channel by HMS Sutherland. On 20 March 2021, Boikiy, accompanied by LSTs Korolyov, Minsk and Kaliningrad transited the English Channel unannounced. The significance of the deployment is in the lack of the public announcement of the exit to sea by the Baltic Fleet, as well as strong amphibious component of the ship detachment. The deployment could have simulated keeping the sea lines of communication between Baltic and Black Sea Fleet open in a wartime scenario. Since the mission took place soon after the exercise of the USS Dwight D. Eisenhower and Tonnerre with the Greek Navy, the deployment could have been meant to relieve the besieged Black Sea Fleet in drills. The four-ship detachment then separated: Kaliningrad and Korolyov entered the Mediterranean Sea on 25 March, while Boikiy and Minsk returned to the Baltic Sea on 27 March. On 22 March, the three LSTs of the Baltic Fleet were joined by additional two LSTs of the Northern Fleet: Aleksandr Otrakovskiy and Kondoponga, escorted by tug SB-406 Vikhr.
WIKI
Talk:Resignation from the United States Senate Henry Clay's resignation Should we include Henry Clay's announced resignation in 1851? Clay announced in 1851 that he would resign to take effective in September 1852. An Archibald Dixon won election to take over his term but Clay died and David Meriwether was appointed to take over by the governor. It's an interest note in that Clay did announce an resignation but he didn't actually resign because he died before his resignation took effect. -- Ricky81682 (talk) 20:45, 24 November 2015 (UTC) Citing a source This article states that in 1796 more senators (nine of them) resigned than in any other year before or since. The assertion has a "citation needed" tag that's been there for almost nine years. But if you look at the lists, they confirm the fact. However, the long lists have no "citation needed" template. Someone got information from the web, on which the lists were based when I created this article in 2015. I also got a document from the office of the senate's official historian, which agreed with the initial lists. As far as I know that was not a published document, so perhaps it should not be cited here. How to proceed? Michael Hardy (talk) 19:43, 5 June 2024 (UTC)
WIKI
Fitness Apps Can I trust fitness apps? Despite the fact that fitness gadgets can make you move more, it is important to understand that the numbers shown by such a device or application are most often very conditional and can differ from reality not just by individual percentages, but by whole orders. Manufacturers, taking care of the visual representation of data and fashion design, often use outdated calculation methods, not to mention the fact that the logic of measuring motion in terms of heat( calorie) units has a controversial scientific base. Basic calorie level Any fashionable fitness tracker or advanced application for a smartphone determines the daily calorie rate of a user according to one of the classical formulas known for more than a hundred years, because there are simply no other ways to determine the figure. However, even 50 years ago it was clear that these formulas are very approximate - the energy expenditure of two people of the same sex, age, similar constitution and lifestyle can differ by figures of the order of 30-40%.The reason is individual factors. Calculation of calories burned The calorie needs of a particular person vary from day to day depending on the basic metabolic processes( about 70% of all energy, a third of which is in brain work), ambient temperature and even emotional state. Energy costs from physical activity usually make up no more than 20% of the total energy expenditure - most of it is for daily movement, not for training in the gym. By itself, sport does not burn a significant amount of calories. How many calories does walking burn? It is important to understand that the very idea that a certain amount of calories burned by the body is a mathematical approximation for one done step. Calorie is a measure of heat, which has a very distant relationship to the energy of motion. The figures of calorie consumption as a result of physical activities used by fitness trackers are based on studies conducted many years ago - the figure shown may differ significantly from the amount of energy spent by your body. What is calorie? The physical meaning of one calorie is that it is the amount of energy required to heat 1 g of water per 1 g of Celsius at atmospheric pressure of 101.3 kPa. Caloric content of food is determined by how much heat is released when it is "burned" in a special appliance. However, the figure indicated on the product package is nothing more than a miscalculation - the figures obtained 1 year ago are 1 g protein = 4 kcal, 1 g carbs = 4 kcal and 1 g fat = 9 kcal multiplied by the number of proteins, fats and carbohydratesin the product. How much energy is absorbed from food? Strictly speaking, it is not known how much the "caloric value" indicated on the product package differs from the direct amount of energy received by a particular person. However, it can be said with certainty that this value is of the order of 10-30%. The total number of caloric values ​​of certain products( error of 10-30%) is imposed on the figure of the calorie norm, determined with an error of 30-40%, which are then shifted to an activity level based on averaged and very approximate data. Heart rate monitor Two years ago there were no heart rate monitors capable of measuring the heart rate solely by contact with the wrist, since it was believed that the figure would be distorted. Today, these devices began to appear - but the design has changed, but not technology. The resulting error of the fitness bracelet or application is so great that the figure shown may not have anything to do with reality. It is important to understand that such devices still remain a toy rather than a tool for controlling health. *** It is important to refer to different devices and applications for measuring physical activity level more like a beautiful virtual number, but as a real recommendation. The very approach of measuring activity by units of heat( calories) leaves a lot of questions. Last Modified: • Dec. 9, 2014
ESSENTIALAI-STEM
Page:A History of Art in Ancient Egypt Vol 1.djvu/532 436 A History of Art in Ancient Egypt. the temple and the great wall which incloses the whole. They perambulated the terraced roofs, they launched upon the lake the sacred barque with its many-coloured streamers. Upon a few rare occasions the priests, with the sacred images, sallied from the inclosure which ordinarily shielded their rites from profane eyes, and, at the head of a brilliant flotilla, directed their course to some other city, either by the Nile or by the waterway which they called ' the sacred canal.' " ^ " The ensigns of the gods, the coffers in which their effigies or symbolic representations were inclosed, their shrines and sacred barques were carried in these processions, of which the kings were the reputed conductors. At other times all these objects were r ^ Sc ^^.2k ± ^.A ^ ^ I ->^ -k ^ ^- f^ ^r -i^ -^ -^i -A -^ 4c i< -k -K ^ ~k -A^~| k -^ ic -k -k ie -k A >c -^ y -Jj i < Fig. 253. — The battle against the Khetas, Luxor, (From Champollion, pi. 328.) deposited in the naos. Upon the occurrence of a festival, the priest to whom the duty was delegated by the king entered the naos and brought out the mysterious emblem which was hidden frorn all other eyes ; he covered it with a rich veil, and it was then carried under a canopy." A ritual to which so much " pomp and circumstance " was attached required material appliances on a great scale. The preservation of so much apparatus required extensive store-rooms, which, like the sanctuary itself, had to be kept in almost total darkness in order to preserve the sacred vestments and other ^ To follow these processions was an act of piety. Upon a Theban stele we find the following words addressed to Amen-Ra : " I am one of those who follow thee when thou goest abroad." The stele of Suti and Har, architects at Thebes, translated into French by Paul Pierret, in Reaieil de Travaiix, p. 72.
WIKI