Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
TREASURE ISLAND - Robert Louis Stevenson 1850-1894
Treasure Island is an adventure novel by
Scottish author Robert Louis
Stevenson, narrating a tale of "buccaneers and buried gold". First published as a book on May 23, 1883, it was originally serialized in the children's magazine Young Folks between 1881–82 under the title Treasure Island; or, the mutiny of the Hispaniola with Stevenson adopting the pseudonym Captain George North.
Jim Hawkins sitting in the apple-barrel, listening to the pirates
The novel is divided into 6 parts and 34 chapters: Jim Hawkins is the narrator of all except for chapters 16-18 which are narrated by Doctor Livesey.
Of the two pirates left aboard, only one is still alive: the coxswain, Israel Hands, who has murdered his comrade in a drunken brawl and been badly wounded in the process. Hands agrees to help Jim helm the ship to a safe beach in exchange for medical treatment and brandy, but once the ship is approaching the beach Hands tries to murder Jim. Jim escapes by climbing the rigging, and when Hands tries to skewer him with a thrown dagger, Jim reflexively shoots Hands dead. Having beached the Hispaniola securely, Jim returns to the stockade under cover of night and sneaks back inside. Because of the darkness, he does not realize until too late that the stockade is now occupied by the pirates, and he is captured. Silver, whose always-shaky command has become more tenuous than ever, seizes on Jim as a hostage, refusing his men's demands to kill him or torture him for information.
Silver's rivals in the pirate crew, led by George Merry, give Silver the Black Spot and move to depose him as captain. Silver answers his opponents eloquently, rebuking them for defacing a page from the Bible to create the Black Spot and revealing that he has obtained the treasure map from Dr. Livesey, thus restoring the crew's confidence. The following day, the pirates search for the treasure. They are shadowed by Ben Gunn, who makes ghostly sounds to dissuade them from continuing, but Silver forges ahead and locates where Flint's treasure is buried. The pirates discover that the cache has been rifled and the
treasure is gone.
One More Step, Mr. Hands by N. C. Wyeth, 1911, for
Treasure Island by Robert Louis Stevenson
pirates turn on Silver and Jim, but Ben Gunn, Dr. Livesey and Abraham Gray attack the pirates, killing two and dispersing the rest. Silver surrenders to Dr. Livesey, promising to return to his duty. They go to Ben Gunn's cave where Gunn has had the treasure hidden for some months. The treasure is divided amongst Trelawney and his loyal men, including Jim and Ben Gunn, and they return to England, leaving the surviving pirates marooned on the island. Silver escapes with the help of the fearful Ben Gunn and a small part of the treasure 3/400 guineas. Remembering Silver, Jim reflects that "I dare say he met his old Negress (wife), and perhaps still lives in comfort with her and Captain Flint (his parrot). It is to be hoped so, I suppose, for his chances of comfort in another world are very small."
Treasure Island contains numerous references to fictional past events, gradually revealed throughout, that shed light upon the events of the main
Alan: A sailor who does not mutiny. He is killed by the mutineers for his loyalty and his dying scream is heard by several.
Treasure Island 1911 book cover
Historical allusions - Real pirates and piracies
Five real-life pirates mentioned are William Kidd (active 1696-1699), Blackbeard (1716–1718), Edward England (1717–1720), Howell Davis (1718–1719), and Bartholomew Roberts (1718–1722). Kidd actually buried treasure on Gardiners Island, though the booty was recovered by authorities soon afterwards.
Allegedly Hands was taken ashore to be treated for his injury and was not at Blackbeard's last fight (the incident is depicted in Tim Powers' novel On Stranger Tides); this alone saved him from the gallows; supposedly he later became a beggar in England.
1689: A pirate whistles "Lillibullero" (1689).
Stevenson deliberately leaves the exact date of the novel obscure, Hawkins writing that he takes up his pen "in the year of grace 17--." However, some of the action can be connected with dates, although it is unclear if Stevenson had an exact chronology in mind. The first date is 1745, as established both by Dr. Livesey's service at Fontenoy and a date appearing in Billy Bones's log. Admiral Hawke is a household name, implying a date later than 1747, when Hawke gained fame at the Battle of Cape Finisterre and was promoted to Admiral, but prior to Hawke's death in 1781.
Treasure Island film poster, Charlton Heston and Christian Bale
Squire Trelawney may have been named for Edward Trelawney, Governor of Jamaica 1738-1752.
The Llandoger Trow in Bristol is claimed to be the inspiration for the Admiral Benbow, though the inn in the book is not in Bristol.
The Hole in the Wall, Bristol is claimed to be the Spyglass
Flint's death house
The Pirate's House in Savannah, Georgia is where Captain Flint is claimed to have spent his last
days, and his ghost is claimed to haunt the property
CHAPTER 1 - THE OLD BUCCANEER - The Old Sea-dog at the Admiral Benbow
I remember him as if it were yesterday, as he came plodding to the inn door, his sea-chest following behind him in a hand- barrow -- a tall, strong, heavy, nut-brown man, his tarry pigtail falling over the shoulder of his soiled blue coat, his hands ragged and scarred, with black, broken nails, and the sabre cut across one cheek, a dirty, livid white. I remember him looking round the cover and whistling to himself as he did so, and then breaking out in that old sea-song that he sang so often afterwards: "Fifteen men on the dead man's chest -- Yo-ho-ho, and a bottle of rum!"
In the high, old tottering voice that seemed to have been tuned and broken at the capstan bars. Then he rapped on the door with a bit of stick like a handspike that he carried, and when my father appeared, called roughly for a glass of rum. This, when it was brought to him, he drank slowly, like a connoisseur, lingering on the taste and still looking about him at the cliffs and up at our signboard.
"This is a handy cove," says he at length; "and a pleasant sittyated grog-shop. Much company, mate?" My father told him no, very little company, the more was the pity. "Well, then," said he, "this is the berth for me. Here you, matey," he cried to the man who trundled the barrow; "bring up alongside and help up my chest. I'll stay here a bit," he continued. "I'm a plain man; rum and bacon and eggs is what I want, and that head up there for to watch ships off. What you mought call me? You mought call me captain. Oh, I see what you're at -- there"; and he threw down three or four gold pieces on the threshold. "You can tell me when I've worked through that," says he, looking as fierce as a commander.
Treasure Island book cover illustration by Louis Rhead and Frank Schoonover
And indeed bad as his clothes were and coarsely as he spoke, he had none of the appearance of a man who sailed before the mast, but seemed like a mate or skipper accustomed to be obeyed or to strike. The man who came with the barrow told us the mail had set him down the morning before at the Royal George, that he had inquired what inns there were along the coast, and hearing ours well spoken of, I suppose, and described as lonely, had chosen it from the others for his place of residence. And that was all we could learn of our guest.
He was a very silent man by custom. All day he hung round the cove or upon the cliffs with a brass telescope; all evening he sat in a corner of the parlour next the fire and drank rum and water very strong. Mostly he would not speak when spoken to, only look up sudden and fierce and blow through his nose like a fog-horn; and we and the people who came about our house soon learned to let him be. Every day when he came back from his stroll he would ask if any seafaring men had gone by along the road. At first we thought it was the want of company of his own kind that made him ask this question, but at last we began to see he was desirous to avoid them. When a seaman did put up at the Admiral Benbow (as now and then some did, making by the coast road for Bristol) he would look in at him through the curtained door before he entered the parlour; and he was always sure to be as silent as a mouse when any such was present. For me, at least, there was no secret about the matter, for I was, in a way, a sharer in his alarms. He had taken me aside one day and promised me a silver fourpenny on the first of every month if I would only keep my "weather-eye open for a seafaring man with one leg" and let him know the moment he appeared. Often enough when the first of the month came round and I applied to him for my wage, he would only blow through his nose at me and stare me down, but before the week was out he was sure to think better of it, bring me my four-penny piece, and repeat his orders to look out for "the seafaring man with one leg."
How that personage haunted my dreams, I need scarcely tell you. On stormy nights, when the wind shook the four corners of the house and the surf roared along the cove and up the cliffs, I would see him in a thousand forms, and with a thousand diabolical expressions. Now the leg would be cut off at the knee, now at the hip; now he was a monstrous kind of a creature who had never had but the one leg, and that in the middle of his body. To see him leap and run and pursue me over hedge and ditch was the worst of nightmares. And altogether I paid pretty dear for my monthly fourpenny piece, in the shape of these abominable fancies.
But though I was so terrified by the idea of the seafaring man with one leg, I was far less afraid of the captain himself than anybody else who knew him. There were nights when he took a deal more rum and water than his head would carry; and then he would sometimes sit and sing his wicked, old, wild sea-songs, minding nobody; but sometimes he would call for glasses round and force all the trembling company to listen to his stories or bear a chorus to his singing. Often I have heard the house shaking with "Yo-ho-ho, and a bottle of rum," all the neighbours joining in for dear life, with the fear of death upon them, and each singing louder than the other to avoid remark. For in these fits he was the most overriding companion ever known; he would slap his hand on the table for silence all round; he would fly up in a passion of anger at a question, or sometimes because none was put, and so he judged the company was not following his story. Nor would he allow anyone to leave the inn till he had drunk himself sleepy and reeled off to bed.
His stories were what frightened people worst of all. Dreadful stories they were -- about hanging, and walking the plank, and storms at sea, and the Dry Tortugas, and wild deeds and places on the Spanish Main. By his own account he must have lived his life among some of the wickedest men that God ever allowed upon the sea, and the language in which he told these stories shocked our plain country people almost as much as the crimes that he described. My father was always saying the inn would be ruined, for people would soon cease coming there to be tyrannized over and put down, and sent shivering to their beds; but I really believe his presence did us good. People were frightened at the time, but on looking back they rather liked it; it was a fine excitement in a quiet country life, and there was even a party of the younger men who pretended to admire him, calling him a "true sea-dog" and a "real old salt" and such like names, and saying there was the sort of man that made England terrible at sea.
Treasure Island map of Hispaniola?
Pirate or Pyrates?
Today, the words "Pirate" or "Piracy" are spelled with an "I". In the Golden Age of Piracy, spelling was a haphazard kind of thing, and the word were often spelled with a "y". So there was a time when the word Pirate was spelled Pyrate, Pirate, Pyrat, or Pirat. I use pyrates, just for the whimsy and feel of it.
(from Greek θησαυρός - thēsauros,
meaning "treasure store", romanized as thesaurus) is a
concentration of riches, often one which is considered lost or forgotten
until being rediscovered. Some jurisdictions legally define what
constitutes treasure, such as in the British Treasure Act 1996.
Treasure Island - illustrated book cover
for hidden treasure is a common theme in legend and fiction; real-life
treasure hunters also exist, and can seek lost wealth for a living.
buried treasure is an important part of the popular beliefs surrounding
pirates. According to popular conception, pirates often buried their
stolen fortunes in remote places, intending to return for them later
(often with the use of treasure maps).
Map created by Robert Lewis Stevenson for Treasure Island
treasure map is a variation of a map to mark the location of buried
treasure, a lost mine, a valuable secret or a hidden location. More
common in fiction than in reality, "pirate treasure maps" are
often depicted in works of fiction as hand drawn and containing arcane
clues for the characters to follow. Regardless of the term's literary
use, anything that meets the criterion of a "map" that
describes the location of a "treasure" could appropriately be
called a "treasure map."
of the earliest known instances of a document listing buried treasure is
the copper scroll, which was recovered among the Dead Sea Scrolls near
Qumran in 1952. Believed to have been written between 50 and 100 AD, the
scroll contains a list of 63 locations with detailed directions pointing
to hidden treasures of gold and silver. The following is an English
translation of the opening lines of the Copper Scroll:
Treasure Island book illustration - jolly boat & Hispaniola schooner
buried pirate treasure is a favorite literary theme, there are very few
documented cases of pirates actually burying treasure, and no documented
cases of a historical pirate treasure map. One documented case of buried
treasure involved Francis Drake who buried Spanish gold and silver after
raiding the train at Nombre de Dios -- after Drake went to find his
ships, he returned six hours later and retrieved the loot and sailed for
England. Drake did not create a map. Another case in 1720 involved
British Captain Stratton of the Prince Eugene who, after supposedly
trading rum with pirates in the Caribbean, buried his gold
near the mouth of the Chesapeake Bay. One of his crew, Morgan Miles,
turned him in to the authorities, and it is assumed the loot was
recovered. In any case, Captain Stratton was not a pirate, and made no
Treasure maps in fiction
maps have taken on numerous permutations in literature and film, such as
the stereotypical tattered chart with an over-sized "X" (as in
"X marks the spot") to denote the treasure's location, first
made popular by Robert Louis Stevenson in Treasure Island (1883), a
cryptic puzzle (in Edgar Allan Poe's "The Gold-Bug" (1843)),
or a tattoo as seen in the video game The Space Adventure - Cobra: The
Legendary Bandit (1991) and the film Waterworld (1995).
Treasure maps in literature
The treasure map may serve several purposes as a plot device in works of fiction. Typically, it can be the motivation, causing the characters to begin a quest. It can be used to steer the plot (exposition), explaining in a concise way where the characters must go on their quest, or a map can be used to illustrate, at various points in the story, how far the quest has progressed.
Treasure maps in film
the 1985 film The Goonies, an old treasure map leads to the secret stash
of a legendary 17th century pirate, an almost exact imitation of
Stevenson's plot in Treasure Island. In the 2004 film National Treasure,
a treasure map becomes the source of the quest itself. In the 1994
comedy City Slickers 2: The Legend of Curly's Gold, a treasure map is
made by criminals who are analogous to modern day pirates. In the film
Waterworld, an extremely vague and cryptic treasure map has been
tattooed on the back of the child character Enola. This map leads the
characters to dry-land, which in the context of the film, is a treasure.
list here is not exhaustive, there are for example many lost mines; King
Solomon's is a good one.
Treasure Island 1990 film trailer
CHAPTER 2 - BLACK DOG DISAPPEARS
It was not very long after this that there occurred the first of the mysterious events that rid us at last of the captain, though not, as you will see, of his affairs. It was a bitter cold winter, with long, hard frosts and heavy gales; and it was plain from the first that my poor father was little likely to see the spring. He sank daily, and my mother and I had all the inn upon our hands; and were kept busy enough, without paying much regard to our unpleasant guest.
It was one January morning, very early—a pinching, frosty morning—the cove all grey with hoar-frost, the ripple lapping softly on the stones, the sun still low and only touching the hilltops and shining far to seaward. The captain had risen earlier than usual, and set out down the beach, his cutlass swinging under the broad skirts of the old blue coat, his brass telescope under his arm, his hat tilted back upon his head. I remember his breath hanging like smoke in his wake as he strode off, and the last sound I heard of him, as he turned the big rock, was a loud snort of indignation, as though his mind was still running upon Dr. Livesey.
Well, mother was up-stairs with father; and I was laying the breakfast-table against the captain's return, when the parlour door opened, and a man stepped in on whom I had never set my eyes before. He was a pale, tallowy creature, wanting two fingers of the left hand; and, though he wore a cutlass, he did not look much like a fighter. I had always my eye open for seafaring men, with one leg or two, and I remember this one puzzled me. He was not sailorly, and yet he had a smack of the sea about him too.
I asked him what was for his service, and he said he would take rum; but as I was going out of the room to fetch it he sat down upon a table, and motioned me to draw near. I paused where I was with my napkin in my hand.
"Come here, sonny," says he. "Come nearer here."
I took a step nearer.
"Is this here table for my mate, Bill?" he asked, with a kind of leer.
I told him I did not know his mate Bill; and this was for a person who stayed in our house, whom we called the captain.
"Well," said he, "my mate Bill would be called the captain, as like as not. He has a cut on one cheek, and a mighty pleasant way with him, particularly in drink, has my mate, Bill. We'll put it, for argument like, that your captain has a cut on one cheek—and we'll put it, if you like, that that cheek's the right one. Ah, well! I told you. Now, is my mate Bill in this here house?"
I told him he was out walking.
"Which way, sonny? Which way is he gone?"
And when I had pointed out the rock and told him how the captain was likely to return, and how soon, and answered a few other questions, "Ah," said he, "this'll be as good as drink to my mate Bill."
The expression of his face as he said these words was not at all pleasant, and I had my own reasons for thinking that the stranger was mistaken, even supposing he meant what he said. But it was no affair of mine, I thought; and, besides, it was difficult to know what to do. The stranger kept hanging about just inside the inn door, peering round the corner like a cat waiting for a mouse. Once I stepped out myself into the road, but he immediately called me back, and, as I did not obey quick enough for his fancy, a most horrible change came over his tallowy face, and he ordered me in, with an oath that made me jump. As soon as I was back again he returned to his former manner, half fawning, half sneering, patted me on the shoulder, told me I was a good boy, and he had taken quite a fancy to me. "I have a son of my own," said he, "as like you as two blocks, and he's all the pride of my 'art. But the great thing for boys is discipline, sonny—discipline. Now, if you had sailed along of Bill, you wouldn't have stood there to be spoke to twice—not you. That was never Bill's way, nor the way of sich as sailed with him. And here, sure enough, is my mate Bill, with a spy-glass under his arm, bless his old 'art, to be sure. You and me'll just go back into the parlour, sonny, and get behind the door, and we'll give Bill a little surprise—bless his 'art, I say again."
So saying, the stranger backed along with me into the parlour, and put me behind him in the corner, so that we were both hidden by the open door. I was very uneasy and alarmed, as you may fancy, and it rather added to my fears to observe that the stranger was certainly frightened himself. He cleared the hilt of his cutlass and loosened the blade in the sheath; and all the time we were waiting there he kept swallowing as if he felt what we used to call a lump in the throat.
At last in strode the captain, slammed the door behind him, without looking to the right or left, and marched straight across the room to where his breakfast awaited him.
"Bill," said the stranger, in a voice that I thought he had tried to make bold and big.
The captain spun round on his heel and fronted us; all the brown had gone out of his face, and even his nose was blue; he had the look of a man who sees a ghost, or the evil one, or something worse, if anything can be; and, upon my word, I felt sorry to see him, all in a moment, turn so old and sick.
"Come, Bill, you know me; you know an old shipmate, Bill, surely," said the stranger. The captain made a sort of gasp.
"Black Dog!" said he.
"And who else?" returned the other, getting more at his ease. "Black Dog as ever was, come for to see his old shipmate Billy, at the 'Admiral Benbow' inn. Ah, Bill, Bill, we have seen a sight of times, us two, since I lost them two talons," holding up his mutilated hand.
"Now, look here," said the captain; "you've run me down; here I am; well, then, speak up: what is it?"
"That's you, Bill," returned Black Dog, "you're in the right of it, Billy. I'll have a glass of rum from this dear child here, as I've took such a liking to; and we'll sit down, if you please, and talk square, like old shipmates."
When I returned with the rum, they were already seated on either side of the captain's breakfast table—Black Dog next to the door, and sitting sideways, so as to have one eye on his old shipmate, and one, as I thought, on his retreat.
He bade me go, and leave the door wide open. "None of your keyholes for me, sonny," he said; and I left them together, and retired into the bar.
For a long time, though I certainly did my best to listen, I could hear nothing but a low gabbling; but at last the voices began to grow higher, and I could pick up a word or two, mostly oaths, from the captain.
"No, no, no, no; and an end of it!" he cried once. And again, "If it comes to swinging, swing all, say I."
Then all of a sudden there was a tremendous explosion of oaths and other noises—the chair and table went over in a lump, a clash of steel followed, and then a cry of pain, and the next instant I saw Black Dog in full flight, and the captain hotly pursuing, both with drawn cutlasses, and the former streaming blood from the left shoulder. Just at the door, the captain aimed at the fugitive one last tremendous cut, which would certainly have split him to the chine had it not been intercepted by our big signboard of Admiral Benbow. You may see the notch on the lower side of the frame to this day.
That blow was the last of the battle. Once out upon the road, Black Dog, in spite of his wound, showed a wonderful clean pair of heels, and disappeared over the edge of the hill in half a minute. The captain, for his part, stood staring at the signboard like a bewildered man. Then he passed his hand over his eyes several times, and at last turned back into the house.
"Jim," says he, "rum;" and as he spoke, he reeled a little, and caught himself with one hand against the wall.
"Are you hurt?" cried I.
"Rum," he repeated. "I must get away from here. Rum! rum!"
I ran to fetch it; but I was quite unsteadied by all that had fallen out, and I broke one glass and fouled the tap, and while I was still getting in my own way, I heard a loud fall in the parlour, and running in, beheld the captain lying full length upon the floor. At the same instant my mother, alarmed by the cries and fighting, came running down-stairs to help me. Between us we raised his head. He was breathing very loud and hard; but his eyes were closed, and his face a horrible colour.
"Dear, deary me," cried my mother, "what a disgrace upon the house! And your poor father sick!"
In the meantime, we had no idea what to do to help the captain, nor any other thought but that he had got his death-hurt in the scuffle with the stranger. I got the rum, to be sure, and tried to put it down his throat; but his teeth were tightly shut, and his jaws as strong as iron. It was a happy relief for us when the door opened and Doctor Livesey came in, on his visit to my father.
"Oh, doctor," we cried, "what shall we do? Where is he wounded?"
"Wounded? A fiddle-stick's end!" said the doctor. "No more wounded than you or I. The man has had a stroke, as I warned him. Now, Mrs. Hawkins, just you run up-stairs to your husband, and tell him, if possible, nothing about it. For my part, I must do my best to save this fellow's trebly worthless life; and Jim, you get me a basin."
When I got back with the basin, the doctor had already ripped up the captain's sleeve, and exposed his great sinewy arm. It was tattooed in several places. "Here's luck," "A fair wind," and "Billy Bones his fancy," were very neatly and clearly executed on the forearm; and up near the shoulder there was a sketch of a gallows and a man hanging from it—done, as I thought, with great spirit.
"Prophetic," said the doctor, touching this picture with his finger. "And now, Master Billy Bones, if that be your name, we'll have a look at the colour of your blood. Jim," he said, "are you afraid of blood?"
"No, sir," said I.
"Well, then," said he, "you hold the basin;" and with that he took his lancet and opened a vein.
A great deal of blood was taken before the captain opened his eyes and looked mistily about him. First he recognised the doctor with an unmistakable frown; then his glance fell upon me, and he looked relieved. But suddenly his colour changed, and he tried to raise himself, crying:—
"Where's Black Dog?"
"There is no Black Dog here," said the doctor, "except what you have on your own back. You have been drinking rum; you have had a stroke, precisely as I told you; and I have just, very much against my own will, dragged you headforemost out of the grave. Now, Mr. Bones——"
"That's not my name," he interrupted.
"Much I care," returned the doctor. "It's the name of a buccaneer of my acquaintance; and I call you by it for the sake of shortness, and what I have to say to you is this: one glass of rum won't kill you, but if you take one you'll take another and another, and I stake my wig if you don't break off short, you'll die—do you understand that?—die, and go to your own place, like the man in the Bible. Come, now, make an effort. I'll help you to your bed for once."
Between us, with much trouble, we managed to hoist him up-stairs, and laid him on his bed, where his head fell back on the pillow, as if he were almost fainting.
"Now, mind you," said the doctor, "I clear my conscience—the name of rum for you is death."
And with that he went off to see my father, taking me with him by the arm.
"This is nothing," he said as soon as he had closed the door. "I have drawn blood enough to keep him quiet awhile; he should lie for a week where he is—that is the best thing for him and you; but another stroke would settle him."
This website is Copyright © 1999 & 2022 Max Energy Limited, an environmental educational charity. | FINEWEB-EDU |
Palliative Care
We hold the pen, but who writes the story?
References
Mrs. J, a physically frail but mentally sharp 75-year-old with known metastatic gastric cancer was admitted to the hospital 2 days ago with a small bowel obstruction. Despite appropriate conservative management, her symptoms are worsening. Her prior cancer treatment consisted of gastric resection with reconstruction and chemo and radiation therapy. The probability of identifying a treatable cause for her bowel obstruction during exploratory laparotomy is believed to be small.
Mr. S, a debilitated 58-year-old previously treated with primary chemotherapy and radiation for cancer at the base of his tongue, presents to your office with severe pain due to recurrent disease. The cancer is potentially resectable, but it will require an extensive resection necessitating complex free flap reconstruction in this previously irradiated field.
Is an operation indicated in either/both of these patients? The risk of causing harm with these operations may outweigh the potential benefits, so how do you decide?
Surgery residents have a lot to learn during their residency training. Not only must they gain a mastery of the pathophysiology of surgical disease, they must learn a multitude of operations while they hone their manual dexterity skills. And they must learn how to take care of a multitude of patients.
Dr. Nadine Semer
Dr. Nadine Semer
Less understood and explicitly taught is how to determine whether an operation is appropriate for this specific patient. Understanding the pathophysiology of the patient’s illness is not enough; it requires an ability to effectively communicate with the patient, to understand that person’s hopes and goals, and then honestly determine whether an operation is in fact indicated. It may sound like the antithesis of surgical training, but learning when not to operate is as important as learning when to do so.
Sometimes it’s easy. When the underlying condition is easily treatable by an operation and without it the previously healthy patient will likely die, operation is usually warranted and accepted. For the critically ill patient who will not survive transfer to the operating room and induction of anesthesia, an operation would be impossible.
As illustrated by the patients described at the beginning of this piece, the decision making can be a bit more complicated.
These are the type of patients the surgeon intuitively believes will not do well, but they are referred for an operation and what surgeons do, is ... operate. “To cut is to cure,” is the old adage, not “To cut is to care.”
These are some of the toughest decisions a surgeon can make and are the ones surgeons seem to remember. The enormous responsibility that accompanies the decision to take someone to the operating room and through a potentially difficult postoperative period can be burdensome for the surgeon and potentially fraught with suffering for all.
Understanding how to address goals of care with patients and families can make these decisions easier. Yet these communication skills are not necessarily emphasized during surgical training, and in fact, they are not the forte of many physicians in general, which has led to the growth of the specialty of palliative medicine. Palliative medicine specialists are trained experts in these communication techniques.
One of the cardinal goals of palliative medicine is to help patients and families think about and clarify their treatment goals. Asking questions about “code status” is not the same as exploring someone’s overall treatment goals. Goals can range from wanting to stay alive no matter in what condition to wanting to be kept comfortable at home surrounded by loved ones even if it means a potentially shorter lifespan. By having patients clarify their ultimate goals it may become apparent that a high-risk operation is not the best way to proceed. Perhaps aggressive pain management and arranging effective home support better meets the patient’s overall goals.
You don’t have to be a palliative medicine specialist to have these conversations with patients, but it does require specific communication skills, which can be taught.
For example, many clinicians start their patient encounters by giving a brief overview of the current situation or skip straight to discussions concerning the various treatment options. But are you sure you and your patient are really starting from the same place? You can’t assume that the patient/family truly understands the medical condition, no matter what may be implied in the medical record or the referring physician’s notes. And you can’t assume a patient wants an operation just because he or she shows up in your office.
A more effective way to start the conversation is to begin by asking patients what they understand about their conditions. This will ensure your subsequent discussion corrects any misinformation and better clarifies their understanding of the situation. Starting your encounter in this fashion is critical and can avoid misunderstandings that can lead to treatments the patients do not actually want, and mistrust should complications arise.
Pages
Next Article: | ESSENTIALAI-STEM |
setono/deployer-supervisor
Handle supervisor configs in your deployment
v1.2.0 2023-04-19 06:09 UTC
This package is auto-updated.
Last update: 2024-07-15 18:09:50 UTC
README
Latest Version Software License Build Status
Installation
composer require setono/deployer-supervisor
Usage
In your deploy.php file require the recipe:
<?php
namespace Deployer;
require_once 'recipe/setono_supervisor.php';
// ...
This will automatically hook into the default flow of Deployer.
Then create a config file in etc/supervisor (in your repository) like so:
;etc/supervisor/service1.conf
[program:service1]
command={{bin/php}} {{bin/console}} messenger:consume async
user={{http_user}}
autostart=true
autorestart=true
Notice that you can use Deployer's parameters within your config file!
Add delay before (re)starting a service
;etc/supervisor/service1.conf
[program:service1]
command=bash -c "sleep 10 && exec {{bin/php}} {{bin/console}} messenger:consume async"
user={{http_user}}
autostart=true
autorestart=true
startsecs=15
In this example we insert a delay of 10 seconds before running the actual command and we changed the startsecs to 15 (5 seconds more than the delay) so that supervisor doesn't count the process as running before after 15 seconds. | ESSENTIALAI-STEM |
Wikipedia:WikiProject Spam/LinkReports/tni.org
Reporting statistics of link tni.org; 20 records.
* tni.org resolves to <IP_ADDRESS> -.
* Link is not on the blacklist.
* Link would be caught by rule \btni\.org on the monitor list (Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)).
* Link would be caught by rule \btni\.org on the monitor list (Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)).
Reports COIToolBot reported 20 links.
* 18:55:37, Fri Mar 28, 2008 ca:user:<IP_ADDRESS> <-> tni.org (0%/0%/0% - Added link: www.tni.org/detail_page.phtml?&publish=y&int02=&pub_niv=&workgroup=&text06=&text03=&keywords=&lang=&text00=&text10=news_george-news&menu=13e (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - ca:Susan_George - diff - COIBot UserReport - ca:Special:Contributions/<IP_ADDRESS>.
* 18:35:29, Fri Mar 28, 2008 es:user:R_tre <-> tni.org (0%/0%/0% - Added link: www.tni.org/detail_page.phtml?act_id=16293 (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - es:Susan_George - diff - COIBot UserReport - es:Special:Contributions/R_tre.
* 11:06:19, Fri Mar 07, 2008 en:user:<IP_ADDRESS> <-> tni.org (0%/0%/0% - Added link: www.tni.org/detail_pub.phtml?know_id=79 (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Via_Campesina - diff - COIBot UserReport - en:Special:Contributions/<IP_ADDRESS>.
* 20:07:51, Wed Feb 27, 2008 en:user:Opinoso <-> tni.org (0%/0%/0% - Added link: www.tni.org/detail_page.phtml?text10=drugsconflict-docs_brazil&menu=11d/ (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Brazil - diff - COIBot UserReport - en:Special:Contributions/Opinoso.
* 09:12:28, Tue Feb 26, 2008 en:user:Dúnadan <-> tni.org (0%/0%/0% - Added link: www.tni.org/detail_page.phtml?text10=drugsconflict-docs_brazil&menu=11d/ (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Brazil - diff - COIBot UserReport - en:Special:Contributions/Dúnadan.
* 18:12:54, Fri Feb 22, 2008 es:user:Rosarinagazo <-> tni.org (0%/0%/0% - Added link: www.tni.org/archives/jelsma/viciouscircle-e.htm (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - es:Fusarium_oxysporum - diff - COIBot UserReport - es:Special:Contributions/Rosarinagazo.
* 18:12:51, Fri Feb 22, 2008 es:user:Rosarinagazo <-> tni.org (0%/0%/0% - Added link: www.tni.org/drugschembio-docs/biowarfare-e.htm (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - es:Fusarium_oxysporum - diff - COIBot UserReport - es:Special:Contributions/Rosarinagazo.
* 01:14:55, Thu Jan 31, 2008 en:user:Cagey_Millipede <-> tni.org (0%/0%/0% - Added link: www.tni.org/drugscoca-docs/coca.htm (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Cocaine - diff - COIBot UserReport - en:Special:Contributions/Cagey_Millipede.
* 03:50:43, Sun Jan 27, 2008 en:user:BorgQueen <-> tni.org (33.33%/0%/0% - Added link: www.tni.org/drugscoca-docs/coca.htm (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Illegal_drug_trade - diff - COIBot UserReport - en:Special:Contributions/BorgQueen. User is on global Whitelist: BorgQueen <-> * (Over 5000 edits on en wikipedia)
* 10:53:15, Wed Jan 23, 2008 en:user:<IP_ADDRESS> <-> tni.org (0%/0%/0% - Added link: www.tni.org/detail_page.phtml?&act_id=17839 (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Directive_on_the_Promotion_of_the_use_of_biofuels_and_other_renewable_fuels_for_transport - diff - COIBot UserReport - en:Special:Contributions/<IP_ADDRESS>.
* 21:49:18, Sun Jan 20, 2008 en:user:Mafia_Expert <-> tni.org (0%/0%/0% - Added link: www.tni.org/archives/tblick/aruba.htm (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Nicolo_Rizzuto - diff - COIBot UserReport - en:Special:Contributions/Mafia_Expert.
* 05:29:22, Thu Jan 10, 2008 en:user:D <-> tni.org (0%/0%/0% - Added link: www.tni.org/detail_pub.phtml?know_id=96 (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Public_services - diff - COIBot UserReport - en:Special:Contributions/D.
* 09:46:04, Sun Jan 06, 2008 en:user:Mafia_Expert <-> tni.org (0%/0%/0% - Added link: www.tni.org/archives/tblick/aruba.htm (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Antonio_Salamone - diff - COIBot UserReport - en:Special:Contributions/Mafia_Expert.
* 01:59:05, Fri Dec 28, 2007 es:user:Morini <-> tni.org (0%/0%/0% - Added link: www.tni.org/docs/200705111419584743.pdf (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - es:Fusarium - diff - COIBot UserReport - es:Special:Contributions/Morini.
* 15:13:47, Fri Dec 21, 2007 fr:user:Ahbon? <-> tni.org (0%/0%/0% - Added link: www.tni.org/pin-conf/conf12.pdf (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - fr:Paul_Schäfer - diff - COIBot UserReport - fr:Special:Contributions/Ahbon?.
* 14:48:12, Fri Dec 21, 2007 fr:user:Ahbon? <-> tni.org (0%/0%/0% - Added link: www.tni.org/pin-conf/conf12.pdf (Monitored rule: \btni\.org - reason for monitoring \btni\.org: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - fr:Manuel_Contreras - diff - COIBot UserReport - fr:Special:Contributions/Ahbon?.
* 20:44:07, Tue Oct 23, 2007 en:user:Bthomson100 <-> tni.org (0%/0%/0% - Monitored link<EMAIL_ADDRESS>- rule: \btni\.org - reason: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Fred_Halliday - diff - COIBot UserReport - en:Special:Contributions/Bthomson100.
* 10:33:47, Tue Oct 23, 2007 en:user:<IP_ADDRESS> <-> tni.org (0%/0%/0% - Monitored link www.tni.org/detail_page.phtml?&act_id=17287 - rule: \btni\.org - reason: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Reform_Treaty - diff - COIBot UserReport - en:Special:Contributions/<IP_ADDRESS>.
* 20:49:49, Mon Oct 22, 2007 en:user:<IP_ADDRESS> <-> tni.org (0%/0%/0% - Monitored link www.tni.org/index.phtml?&lang=en - rule: \btni\.org - reason: Automonitor: conflict of interest? (IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ; diff)) - en:Susan_George_(political_scientist) - diff - COIBot UserReport - en:Special:Contributions/<IP_ADDRESS>.
* 13:13:39, Wed Oct 10, 2007 en:user:<IP_ADDRESS> <-> tni.org (0%/0%/0% - IP user (<IP_ADDRESS>) in testrange <IP_ADDRESS>/24 (tni.org = <IP_ADDRESS>) ) - en:Biofuel - diff - COIBot UserReport - en:Special:Contributions/<IP_ADDRESS>.
Below a full report on all use of the link tni.org.
LinkWatcher records:
* 1) 2008-05-24 16:07:22: User Catgut (talk - contribs; 4017) to Hilary Wainwright (diff) - Link: www.tni.org/detail_page.phtml?page=archives_wainwright_revolution. * Links added in this diff: www.tni.org/detail_page.phtml?page=archives_wainwright_revolution (4017, 37, 2, 1) www.redpepper.org.uk (4017, 23, 1, 1) www.tni.org/detail_page.phtml?&text10=fellows_wainwright&menu=13b (4017, 37, 2, 1) www.archiveshub.ac.uk/news/02110101.html (4017, 32, 1, 1)
* 2) 2008-05-24 16:07:22: User Catgut (talk - contribs; 4017) to Hilary Wainwright (diff) - Link: www.tni.org/detail_page.phtml?&text10=fellows_wainwright&menu=13b. * Links added in this diff: www.tni.org/detail_page.phtml?page=archives_wainwright_revolution (4017, 37, 2, 1) www.redpepper.org.uk (4017, 23, 1, 1) www.tni.org/detail_page.phtml?&text10=fellows_wainwright&menu=13b (4017, 37, 2, 1) www.archiveshub.ac.uk/news/02110101.html (4017, 32, 1, 1)
* 3) 2008-05-23 09:59:13: User Hu12 (talk - contribs; 775) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?know_id=188.
* User is on global Whitelist: Hu12 <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-05-21 15:54:37: User ClueBot (talk - contribs; 578272) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?know_id=188.
* User is on global Whitelist: cluebot <-> * (Bots don't have a COI)
* 1) 2008-05-21 15:50:41: User Caltas (talk - contribs; 4412) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?know_id=188.
* User is on global Whitelist: Caltas <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-05-21 15:49:02: User Zzuuzz (talk - contribs; 1308) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?know_id=188.
* User is on global Whitelist: Zzuuzz <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-05-21 14:09:50: User PHLorenz (talk - contribs; 13) to Coca (diff) - Link: www.tni.org/reports/drugs/debate13.pdf. * Links added in this diff: www.ungassondrugs.org/images/stories/fernandez-en.pdf (13, 3, 3, 1) www.incb.org/pdf/annual-report/2007/en/annual-report-2007.pdf (13, 77, 6, 1) www.idpc.info/php-bin/documents/idpc_response2incb_annrpt07_en.pdf (13, 5, 1, 1) www.incb.org/pdf/annual-report/2007/en/annual-report-2007.pdf (13, 77, 6, 1) www.incb.org/pdf/e/ar/incb_report_1994_supplement_en_1.pdf (13, 77, 6, 1) www.incb.org/pdf/e/ar/incb_report_1994_supplement_en_3.pdf (13, 77, 6, 1) www.incb.org/pdf/annual-report/2007/en/annual-report-2007.pdf (13, 77, 6, 1) untreaty.un.org/english/bible/englishinternetbible/parti/chaptervi/treaty25.asp (13, 138, 1, 1) www.tni.org/reports/drugs/debate13.pdf (13, 37, 1, 1) www.unodc.org/unodc/en/data-and-analysis/bulletin/bulletin_1949-01-01_1_page006.html (13, 252, 1, 1) www.ungassondrugs.org/index.php?option=com_content&task=view&id=101&itemid=108 (13, 3, 3, 1) www.incb.org/pdf/e/conv/convention_1961_en.pdf (13, 77, 6, 1)
* 2) 2008-05-21 09:48:45: User Mafia Expert (talk - contribs; 304) to Coca (diff) - Link: www.tni.org/reports/drugs/debate13.pdf. * Links added in this diff: www.tni.org/reports/drugs/debate13.pdf (304, 37, 2, 1)
* 3) 2007-10-02 20:44:24: User es:Rafax (talk - contribs; 195) to es:Coca-Cola (diff) - Link: www.tni.org/reports/drugs/debate13s.pdf. * Links added in this diff: www.tni.org/reports/drugs/debate13s.pdf (195, 37, 1, 1)
* 4) 2008-04-17 16:16:05: User PeterSymonds (talk - contribs; 435) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?&know_id=202. * Links added in this diff: www.independent.co.uk/environment/biofuel-the-burning-question-808959.html (435, 1588, 1, 1) www.guardian.co.uk/environment/2008/feb/11/biofuels.energy (435, 9582, 4, 1) www.epa.gov/smartway/growandgo/documents/faq.htm#i_05 (435, 1380, 2, 1) freetheplant.net/ (435, 12, 1, 1) ngm.nationalgeographic.com/ngm/2007-10/biofuels/biofuels-p2.html (435, 111, 1, 1) news.yahoo.com/s/ap/20080417/ap_on_bi_ge/farm_scene_waste_as_fuel;_ylt=AkqcOw73x0nKfqJCs2.iF1Ss0NUE (435, 3134, 1, 1) www.waste-management-world-magazine (435, 9, 1, 1) www.grida.no/climate/ipcc_tar/wg1/248.htm (435, 625, 1, 1) www.epa.gov/nonco2/econ-inv/table.html (435, 1380, 2, 1) esa.un.org/un-energy/pdf/susdev.Biofuels.FAO.pdf (435, 225, 1, 1) www.biodiesel.de/ (435, 13, 1, 1) www.biodieselfillingstations.co.uk (435, 10, 1, 1) www.prleap.com/pr/80099/ (435, 29, 1, 1) www.wfs.org/futcontja07.htm (435, 31, 1, 1) www.butanol.com/ (435, 11, 1, 1) www.ft.com/cms/s/0/e780d216-5fd5-11dc-b0fe-0000779fd2ac.html (435, 1076, 1, 1) zfacts.com/p/436.html (435, 68, 1, 1) www.hydrogensolar.com/ (435, 10, 1, 1) www.greenfuelonline.com/ (435, 21, 1, 1) www.renewable-energy-world.com/articles/print_screen.cfm?ARTICLE_ID=308325 (435, 12, 1, 1) www.usda.gov/oce/forum/2007%20Speeches/PDF%20PPT/CSomerville.pdf (435, 90, 1, 1) www.washingtonpost.com/wp-dyn/content/article/2008/01/03/AR2008010303907.html (435, 9891, 2, 1) www.globeco.co.uk/Bio-diesel_news_0007.html (435, 8, 1, 1) www.friendsofethanol.com/facts.html (435, 8, 1, 1) www.energy-arizona.org/archive/200708280001_low_cost_algae_production_system_introduced.php (435, 8, 1, 1) www.ieabioenergy.com/IEABioenergy.aspx (435, 9, 1, 1) www.un.org/News/briefings/docs/2007/070302_Biofuels.doc.htm (435, 4126, 1, 1) news.bbc.co.uk/2/hi/europe/7186380.stm (435, 58172, 15, 1) www.checkbiotech.org/green_News_Biofuels.aspx?infoId=15225 (435, 11, 1, 1) www.sweden.gov.se/sb/d/2031/a/67096 (435, 84, 1, 1) news.bbc.co.uk/2/hi/science/nature/7187361.stm (435, 58172, 15, 1) royalsociety.org/document.asp?latest=1&id=7366 (435, 190, 1, 1) www.presidencia.gov.co/prensa_new/sne/2003/agosto/26/16262003.htm (435, 93, 1, 1) www.whitehouse.gov/news/releases/2007/12/20071219-6.html (435, 3095, 1, 1) www.economist.com/displaystory.cfm?story_id=10250420 (435, 2029, 2, 1) www.nytimes.com/2008/01/14/business/14gm.html?ei=5070&en=8461e0f658455111&ex=1200978000&adxnnl=1&emc=eta1&adxnnlx=1200428791-KwYo2SIqRNjzFuH/Aw1/3g (435, 17352, 3, 1) www.ethanolindia.net/ethanol_govt.html (435, 8, 1, 1) pdf.wri.org/page_forests_008_woodfuels.pdf (435, 12, 1, 1) www.alertnet.org/thenews/newsdesk/L26549810.htm (435, 551, 1, 1) www.nationalpost.com/opinion/columnists/story.html?id=428913 (435, 349, 1, 1) www.nnfcc.co.uk (435, 15, 1, 1) www.eprida.com/hydro/yahoo2004.htm (435, 14, 1, 1) www.georgiaitp.org/carbon (435, 13, 1, 1) www.atmos-chem-phys-discuss.net/7/11191/2007/acpd-7-11191-2007.html (435, 22, 1, 1) www.foxnews.com/story/0,2933,297681,00.html (435, 3606, 1, 1) www.nytimes.com/2008/02/08/science/earth/08wbiofuels.html?_r=1&oref=slogin (435, 17352, 3, 1) www.tni.org/detail_pub.phtml?&know_id=202 (435, 37, 2, 1) ies.jrc.ec.europa.eu/wtw.html (435, 22, 2, 1) news.bbc.co.uk/2/hi/in_depth/7284196.stm (435, 58172, 15, 1) www.bbc.co.uk/caribbean/news/story/2007/11/071101_oxfambiofuels.shtml (435, 14103, 7, 1) magma.nationalgeographic.com/ngm/2007-10/biofuels/biofuels-interactive.html (435, 139, 1, 1) www.economist.com/research/articlesBySubject/displaystory.cfm?subjectid=7216688&story_id=10252015 (435, 2029, 2, 1) www.oecd.org/dataoecd/52/25/36760950.pdf (435, 635, 1, 1) www.ars.usda.gov/main/site_main.htm?modecode=36021500 (435, 180, 1, 1) www.nytimes.com/2007/01/31/business/worldbusiness/31biofuel.html (435, 17352, 3, 1) www.journals.royalsoc.ac.uk/(xquef445kynlbt3pti5kdsr0)/app/home/contribution.asp?referrer=parent&backto=issue,3,14;journal,5,231;linkingpublicationresults,1:102022,1 (435, 315, 1, 1) www.geo.uni-bayreuth.de/bodenkunde/terra_preta/ (435, 14, 1, 1) climatechange.researchtoday.net/archive/4/1/759.htm (435, 10, 1, 1) www.ecoworld.com/blog/2007/06/04/corn-ethanol-water/ (435, 38, 2, 1) www.iht.com/articles/ap/2007/05/08/europe/EU-GEN-UN-Biofuels.php (435, 4116, 1, 1) www.mnp.nl/ipcc/ (435, 55, 1, 1) www.climnet.org/EUenergy/2006_EEB_BiofuelsStrategy.pdf (435, 29, 1, 1) www.socialfunds.com/news/article.cgi/2073.html (435, 22, 1, 1<EMAIL_ADDRESS>(435, 108, 1, 1) www.guardian.co.uk/climatechange2007/story/0,,2111985,00.html (435, 9582, 4, 1) www.downtoearth.org.in/full6.asp?foldername=20060715&filename=news&sec_id=49&sid=59 (435, 11, 1, 1) www.eubusiness.com/Energy/ceo-press.07-09-21 (435, 196, 1, 1) www.zerocarbonnow.org/ (435, 10, 1, 1) www.mpoc.org.za/modules.php?name=Content&pa=showpage&pid=2 (435, 9, 1, 1) cgse.epfl.ch/page65660-en.html (435, 18, 1, 1) news.bbc.co.uk/2/hi/science/nature/6636467.stm (435, 58172, 15, 1) www.tni.org/detail_pub.phtml?know_id=188 (435, 37, 2, 1) www.odi.org.uk/nrp/NRP107.pdf (435, 64, 1, 1) www.eere.energy.gov/afdc/pdfs/afpr_jul_07.pdf (435, 342, 1, 1) www.venturebeat.com/2006/11/05/why-cellulosic-ethanol-will-not-save-us/ (435, 48, 1, 1) journeytoforever.org/biofuel_library/Pimentel-Tadzek.pdf (435, 49, 1, 1) www.biodiesel.org/resources/reportsdatabase/reports/gen/19980501_gen-339.pdf (435, 69, 1, 1) www.ethanolrfa.org/objects/documents/79/aer-813.pdf (435, 39, 1, 1) www.empa.ch/plugin/template/empa/3/60542/---/l=2 (435, 10, 1, 1) www.opinionjournal.com/weekend/hottopic/?id=110008530 (435, 437, 1, 1) www.refuel.eu/fileadmin/refuel/user/docs/Final_report_-_Shift_Gear_to_Biofuels.pdf (435, 9, 1, 1) ies.jrc.ec.europa.eu/wtw.html (435, 22, 2, 1) www.biomassmagazine.com/article.jsp?article_id=1278 (435, 12, 1, 1) articles.moneycentral.msn.com/Investing/SuperModels/ShuckTheEthanolAndLetSolarShine.aspx (435, 43, 1, 1) www.ecoworld.com/blog/2006/06/15/solar-power-biofuel-vs-photovoltaics/ (435, 38, 2, 1) ltnet.lv-h.de/en/volltext/Lt20051/LT20051E_016_017.pdf (435, 7, 1, 1) www.ufop.de/publikationen_english.php (435, 12, 1, 1)
* 5) 2008-04-17 16:16:07: User PeterSymonds (talk - contribs; 435) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?know_id=188. * Links added in this diff: www.independent.co.uk/environment/biofuel-the-burning-question-808959.html (435, 1588, 1, 1) www.guardian.co.uk/environment/2008/feb/11/biofuels.energy (435, 9582, 4, 1) www.epa.gov/smartway/growandgo/documents/faq.htm#i_05 (435, 1380, 2, 1) freetheplant.net/ (435, 12, 1, 1) ngm.nationalgeographic.com/ngm/2007-10/biofuels/biofuels-p2.html (435, 111, 1, 1) news.yahoo.com/s/ap/20080417/ap_on_bi_ge/farm_scene_waste_as_fuel;_ylt=AkqcOw73x0nKfqJCs2.iF1Ss0NUE (435, 3134, 1, 1) www.waste-management-world-magazine (435, 9, 1, 1) www.grida.no/climate/ipcc_tar/wg1/248.htm (435, 625, 1, 1) www.epa.gov/nonco2/econ-inv/table.html (435, 1380, 2, 1) esa.un.org/un-energy/pdf/susdev.Biofuels.FAO.pdf (435, 225, 1, 1) www.biodiesel.de/ (435, 13, 1, 1) www.biodieselfillingstations.co.uk (435, 10, 1, 1) www.prleap.com/pr/80099/ (435, 29, 1, 1) www.wfs.org/futcontja07.htm (435, 31, 1, 1) www.butanol.com/ (435, 11, 1, 1) www.ft.com/cms/s/0/e780d216-5fd5-11dc-b0fe-0000779fd2ac.html (435, 1076, 1, 1) zfacts.com/p/436.html (435, 68, 1, 1) www.hydrogensolar.com/ (435, 10, 1, 1) www.greenfuelonline.com/ (435, 21, 1, 1) www.renewable-energy-world.com/articles/print_screen.cfm?ARTICLE_ID=308325 (435, 12, 1, 1) www.usda.gov/oce/forum/2007%20Speeches/PDF%20PPT/CSomerville.pdf (435, 90, 1, 1) www.washingtonpost.com/wp-dyn/content/article/2008/01/03/AR2008010303907.html (435, 9891, 2, 1) www.globeco.co.uk/Bio-diesel_news_0007.html (435, 8, 1, 1) www.friendsofethanol.com/facts.html (435, 8, 1, 1) www.energy-arizona.org/archive/200708280001_low_cost_algae_production_system_introduced.php (435, 8, 1, 1) www.ieabioenergy.com/IEABioenergy.aspx (435, 9, 1, 1) www.un.org/News/briefings/docs/2007/070302_Biofuels.doc.htm (435, 4126, 1, 1) news.bbc.co.uk/2/hi/europe/7186380.stm (435, 58172, 15, 1) www.checkbiotech.org/green_News_Biofuels.aspx?infoId=15225 (435, 11, 1, 1) www.sweden.gov.se/sb/d/2031/a/67096 (435, 84, 1, 1) news.bbc.co.uk/2/hi/science/nature/7187361.stm (435, 58172, 15, 1) royalsociety.org/document.asp?latest=1&id=7366 (435, 190, 1, 1) www.presidencia.gov.co/prensa_new/sne/2003/agosto/26/16262003.htm (435, 93, 1, 1) www.whitehouse.gov/news/releases/2007/12/20071219-6.html (435, 3095, 1, 1) www.economist.com/displaystory.cfm?story_id=10250420 (435, 2029, 2, 1) www.nytimes.com/2008/01/14/business/14gm.html?ei=5070&en=8461e0f658455111&ex=1200978000&adxnnl=1&emc=eta1&adxnnlx=1200428791-KwYo2SIqRNjzFuH/Aw1/3g (435, 17352, 3, 1) www.ethanolindia.net/ethanol_govt.html (435, 8, 1, 1) pdf.wri.org/page_forests_008_woodfuels.pdf (435, 12, 1, 1) www.alertnet.org/thenews/newsdesk/L26549810.htm (435, 551, 1, 1) www.nationalpost.com/opinion/columnists/story.html?id=428913 (435, 349, 1, 1) www.nnfcc.co.uk (435, 15, 1, 1) www.eprida.com/hydro/yahoo2004.htm (435, 14, 1, 1) www.georgiaitp.org/carbon (435, 13, 1, 1) www.atmos-chem-phys-discuss.net/7/11191/2007/acpd-7-11191-2007.html (435, 22, 1, 1) www.foxnews.com/story/0,2933,297681,00.html (435, 3606, 1, 1) www.nytimes.com/2008/02/08/science/earth/08wbiofuels.html?_r=1&oref=slogin (435, 17352, 3, 1) www.tni.org/detail_pub.phtml?&know_id=202 (435, 37, 2, 1) ies.jrc.ec.europa.eu/wtw.html (435, 22, 2, 1) news.bbc.co.uk/2/hi/in_depth/7284196.stm (435, 58172, 15, 1) www.bbc.co.uk/caribbean/news/story/2007/11/071101_oxfambiofuels.shtml (435, 14103, 7, 1) magma.nationalgeographic.com/ngm/2007-10/biofuels/biofuels-interactive.html (435, 139, 1, 1) www.economist.com/research/articlesBySubject/displaystory.cfm?subjectid=7216688&story_id=10252015 (435, 2029, 2, 1) www.oecd.org/dataoecd/52/25/36760950.pdf (435, 635, 1, 1) www.ars.usda.gov/main/site_main.htm?modecode=36021500 (435, 180, 1, 1) www.nytimes.com/2007/01/31/business/worldbusiness/31biofuel.html (435, 17352, 3, 1) www.journals.royalsoc.ac.uk/(xquef445kynlbt3pti5kdsr0)/app/home/contribution.asp?referrer=parent&backto=issue,3,14;journal,5,231;linkingpublicationresults,1:102022,1 (435, 315, 1, 1) www.geo.uni-bayreuth.de/bodenkunde/terra_preta/ (435, 14, 1, 1) climatechange.researchtoday.net/archive/4/1/759.htm (435, 10, 1, 1) www.ecoworld.com/blog/2007/06/04/corn-ethanol-water/ (435, 38, 2, 1) www.iht.com/articles/ap/2007/05/08/europe/EU-GEN-UN-Biofuels.php (435, 4116, 1, 1) www.mnp.nl/ipcc/ (435, 55, 1, 1) www.climnet.org/EUenergy/2006_EEB_BiofuelsStrategy.pdf (435, 29, 1, 1) www.socialfunds.com/news/article.cgi/2073.html (435, 22, 1, 1<EMAIL_ADDRESS>(435, 108, 1, 1) www.guardian.co.uk/climatechange2007/story/0,,2111985,00.html (435, 9582, 4, 1) www.downtoearth.org.in/full6.asp?foldername=20060715&filename=news&sec_id=49&sid=59 (435, 11, 1, 1) www.eubusiness.com/Energy/ceo-press.07-09-21 (435, 196, 1, 1) www.zerocarbonnow.org/ (435, 10, 1, 1) www.mpoc.org.za/modules.php?name=Content&pa=showpage&pid=2 (435, 9, 1, 1) cgse.epfl.ch/page65660-en.html (435, 18, 1, 1) news.bbc.co.uk/2/hi/science/nature/6636467.stm (435, 58172, 15, 1) www.tni.org/detail_pub.phtml?know_id=188 (435, 37, 2, 1) www.odi.org.uk/nrp/NRP107.pdf (435, 64, 1, 1) www.eere.energy.gov/afdc/pdfs/afpr_jul_07.pdf (435, 342, 1, 1) www.venturebeat.com/2006/11/05/why-cellulosic-ethanol-will-not-save-us/ (435, 48, 1, 1) journeytoforever.org/biofuel_library/Pimentel-Tadzek.pdf (435, 49, 1, 1) www.biodiesel.org/resources/reportsdatabase/reports/gen/19980501_gen-339.pdf (435, 69, 1, 1) www.ethanolrfa.org/objects/documents/79/aer-813.pdf (435, 39, 1, 1) www.empa.ch/plugin/template/empa/3/60542/---/l=2 (435, 10, 1, 1) www.opinionjournal.com/weekend/hottopic/?id=110008530 (435, 437, 1, 1) www.refuel.eu/fileadmin/refuel/user/docs/Final_report_-_Shift_Gear_to_Biofuels.pdf (435, 9, 1, 1) ies.jrc.ec.europa.eu/wtw.html (435, 22, 2, 1) www.biomassmagazine.com/article.jsp?article_id=1278 (435, 12, 1, 1) articles.moneycentral.msn.com/Investing/SuperModels/ShuckTheEthanolAndLetSolarShine.aspx (435, 43, 1, 1) www.ecoworld.com/blog/2006/06/15/solar-power-biofuel-vs-photovoltaics/ (435, 38, 2, 1) ltnet.lv-h.de/en/volltext/Lt20051/LT20051E_016_017.pdf (435, 7, 1, 1) www.ufop.de/publikationen_english.php (435, 12, 1, 1)
* 6) 2008-05-16 14:00:43: User ClueBot (talk - contribs; 578272) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?know_id=188.
* User is on global Whitelist: cluebot <-> * (Bots don't have a COI)
* 1) 2008-02-13 11:33:43: User Ossmann (talk - contribs; 1573) to Balochistan Liberation Army (diff) - Link<EMAIL_ADDRESS>* Links added in this diff: www. (1573, 20157, 23, 1) www.radiobalochi.org (1573, 1, 1, 1) www.balochvoice.com (1573, 2, 1, 1) www.bso-na.org (1573, 4, 1, 1) www.jamestown.org/terrorism/news/article.php?articleid=2370046 (1573, 318, 1, 1<EMAIL_ADDRESS>(1573, 37, 1, 1)
* 2) 2007-12-27 20:42:01: User es:Morini (talk - contribs; 6) to es:Fusarium (diff) - Link: www.tni.org/docs/200705111419584743.pdf. * Links added in this diff: ohioline.osu.edu/hyg-fact/3000/3122 (6, 93, 1, 1) www.doctorfungus.org/thefungi/fusarium.htm (6, 11, 1, 1) www.tni.org/docs/200705111419584743.pdf (6, 37, 1, 1) www.drugpolicy.org/docUploads/Mycoherbicide06.pdf (6, 78, 1, 1) www.who.int/docstore/bulletin/pdf/issue9/bu0024.pdf (6, 1877, 1, 1)
* 3) 2007-10-03 09:10:15: User es:Manuel Trujillo Berges (talk - contribs; 798) to es:Coca-Cola (diff) - Link: www.tni.org/reports/drugs/debate13s.pdf. * Links added in this diff: www.tni.org/reports/drugs/debate13s.pdf (798, 37, 1, 1)
* 4) 2008-01-20 16:48:37: User Mafia Expert (talk - contribs; 304) to Nicolo Rizzuto (diff) - Link: www.tni.org/archives/tblick/aruba.htm. * Links added in this diff: www.tni.org/archives/tblick/aruba.htm (304, 37, 2, 1)
* 5) 2008-04-13 22:04:36: User HalfShadow (talk - contribs; 3632) to Cocaine (diff) - Link: www.tni.org/drugscoca-docs/coca.htm.
* User is on global Whitelist: HalfShadow <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-05-10 08:33:28: User Jpgordon (talk - contribs; 259) to Cocaine (diff) - Link: www.tni.org/drugscoca-docs/coca.htm.
* User is on global Whitelist: Jpgordon <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-05-09 21:45:16: User JForget (talk - contribs; 4640) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?&know_id=202.
* User is on global Whitelist: JForget <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-03-31 15:48:32: User EJF (talk - contribs; 2454) to Cocaine (diff) - Link: www.tni.org/drugscoca-docs/coca.htm. * Links added in this diff: www.tni.org/drugscoca-docs/coca.htm (2454, 37, 1, 1) designer-drugs.com/pte/<IP_ADDRESS>/dcd/chemistry/psychedelicchemistry/chapter8.html (2454, 8, 1, 1) jpet.aspetjournals.org/cgi/content/full/307/3/1179/FIG6 (2454, 104, 2, 1) www.nature.com/bjp/journal/v132/n2/abs/0703819a.html (2454, 2980, 1, 1) pubs.acs.org/cgi-bin/abstract.cgi/crtoec/2002/15/i12/abs/tx0255828.html (2454, 406, 1, 1) www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=Retrieve&db=pubmed&dopt=Abstract&list_uids=3940302&query_hl=3&itool=pubmed_docsum (2454, 9837, 40, 1) www.cesar.umd.edu/cesar/drugs/cocaine.asp#Terminology (2454, 15, 1, 1) www.erowid.org/chemicals/cocaine/cocaine_bits.shtml (2454, 647, 3, 1) www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=Retrieve&db=pubmed&dopt=Abstract&list_uids=15262059&query_hl=21 (2454, 9837, 40, 1) www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6T1J-47HC786-3&_user=10&_rdoc=1&_fmt=&_orig=search&_sort=d&view=c&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=7e1c493998220805b7ac470ed0f885ba (2454, 1393, 2, 1) jpet.aspetjournals.org/cgi/content/abstract/jpet.104.068841v1 (2454, 104, 2, 1) www.sciencedaily.com/releases/2003/05/030506073758.htm (2454, 1048, 1, 1) www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6T0N-4HNSG0W-1&_user=10&_rdoc=1&_fmt=&_orig=search&_sort=d&view=c&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=d3d5ddd8d48e14a1524d1682da5541bf (2454, 1393, 2, 1) apma-nc.com/PatientEducation/cocaine_overdose.htm (2454, 8, 1, 1) www.medscape.com/viewarticle/534737?rss (2454, 356, 2, 1) www.springerlink.com/index/XE0PYLRD1NYWMFBH.pdf (2454, 1653, 1, 1) www.merck.com/mmpe/sec15/ch198/ch198f.html (2454, 286, 1, 1) findarticles.com/p/articles/mi_m1272/is_n2581_v122/ai_14236195 (2454, 9095, 16, 1) books.google.com/books?id=ZMSNFtyjtEAC&pg=PA528&lpg=PA528&dq=neuroprotective+dat+cocaine&source=web&ots=C6XJ0wgk9Q&sig=-F4xn0sWbpKkyNXZ3HRtk7W734Q&hl=en (2454, 31152, 19, 1) www.mja.com.au/public/issues/177_05_020902/vas10632_fm.html (2454, 59, 1, 1) www.medscape.com/viewarticle/452724_7 (2454, 356, 2, 1) www.scienceblog.com/community/older/1999/A/199900322.html (2454, 59, 1, 1) cjasn.asnjournals.org/cgi/content/abstract/1/4/655 (2454, 22, 1, 1) ndt.oxfordjournals.org/cgi/content/full/15/3/299 (2454, 16, 1, 1) www.nlm.nih.gov/medlineplus/news/fullstory_47336.html (2454, 986, 1, 1) www.unodc.org/pdf/WDR_2006/wdr2006_chap4_cocaine.pdf (2454, 252, 3, 1) www.usdoj.gov/ndic/pubs11/18862/index.htm (2454, 722, 3, 1) edition.cnn.com/2008/WORLD/europe/02/28/corwall.cocaine/index.html (2454, 4110, 6, 1) edition.cnn.com/2008/CRIME/03/20/drug.subs/index.html (2454, 4110, 6, 1) economist.com/daily/chartgallery/displaystory.cfm?story_id=9414607 (2454, 2029, 2, 1) www.dod.mil/policy/sections/policy_offices/solic/cn/cocaine2.pdf (2454, 1274, 1, 1) www.unodc.org/pdf/WDR_2006/wdr2006_volume2.pdf (2454, 252, 3, 1) www.unodc.org/pdf/research/wdr07/WDR_2007.pdf (2454, 252, 3, 1) www.erowid.org/chemicals/cocaine/cocaine.shtml (2454, 647, 3, 1) www.faculty.ucr.edu/ (2454, 28, 1, 1) www.emcdda.europa.eu/?nnodeid=25482 (2454, 42, 1, 1) www.erowid.org/chemicals/cocaine/cocaine.shtml (2454, 647, 3, 1) parentingteens.about.com/cs/cocainecrack/l/blsldiccocaine.htm (2454, 34, 1, 1) sun.ars-grin.gov:8080/npgspub/xsql/duke/chemdisp.xsql?chemical=COCAINE (2454, 51, 2, 1) www.bbc.co.uk/dna/h2g2/A10832384 (2454, 14103, 22, 1) www.HarmReduction.org (2454, 12, 1, 1) www.DanceSafe.org (2454, 43, 1, 1) theprometheusinstitute.org/politics/freedom/46-freedom/122-She_Dont_Lie_The_Economics_Behind_Cocaine (2454, 62, 1, 1) www.thegooddrugsguide.com/cocaine/faq.htm (2454, 33, 1, 1)
* 2) 2008-04-08 19:19:04: User Edgar181 (talk - contribs; 791) to Cocaine (diff) - Link: tni.org/drugscoca-docs/coca.htm.
* User is on global Whitelist: Edgar181 <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-03-30 23:13:56: User Dycedarg (talk - contribs; 3806) to Cocaine (diff) - Link: www.tni.org/drugscoca-docs/coca.htm. * Links added in this diff: www.tni.org/drugscoca-docs/coca.htm (3806, 37, 1, 1) designer-drugs.com/pte/<IP_ADDRESS>/dcd/chemistry/psychedelicchemistry/chapter8.html (3806, 8, 1, 1) jpet.aspetjournals.org/cgi/content/full/307/3/1179/FIG6 (3806, 104, 2, 1) www.nature.com/bjp/journal/v132/n2/abs/0703819a.html (3806, 2980, 4, 1) pubs.acs.org/cgi-bin/abstract.cgi/crtoec/2002/15/i12/abs/tx0255828.html (3806, 406, 1, 1) www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=Retrieve&db=pubmed&dopt=Abstract&list_uids=3940302&query_hl=3&itool=pubmed_docsum (3806, 9837, 10, 1) www.cesar.umd.edu/cesar/drugs/cocaine.asp#Terminology (3806, 15, 1, 1) www.erowid.org/chemicals/cocaine/cocaine_bits.shtml (3806, 647, 3, 1) www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=Retrieve&db=pubmed&dopt=Abstract&list_uids=15262059&query_hl=21 (3806, 9837, 10, 1) www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6T1J-47HC786-3&_user=10&_rdoc=1&_fmt=&_orig=search&_sort=d&view=c&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=7e1c493998220805b7ac470ed0f885ba (3806, 1393, 2, 1) jpet.aspetjournals.org/cgi/content/abstract/jpet.104.068841v1 (3806, 104, 2, 1) www.sciencedaily.com/releases/2003/05/030506073758.htm (3806, 1048, 1, 1) www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6T0N-4HNSG0W-1&_user=10&_rdoc=1&_fmt=&_orig=search&_sort=d&view=c&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=d3d5ddd8d48e14a1524d1682da5541bf (3806, 1393, 2, 1) apma-nc.com/PatientEducation/cocaine_overdose.htm (3806, 8, 1, 1) www.medscape.com/viewarticle/534737?rss (3806, 356, 2, 1) www.springerlink.com/index/XE0PYLRD1NYWMFBH.pdf (3806, 1653, 5, 1) www.merck.com/mmpe/sec15/ch198/ch198f.html (3806, 286, 1, 1) findarticles.com/p/articles/mi_m1272/is_n2581_v122/ai_14236195 (3806, 9095, 11, 1) books.google.com/books?id=ZMSNFtyjtEAC&pg=PA528&lpg=PA528&dq=neuroprotective+dat+cocaine&source=web&ots=C6XJ0wgk9Q&sig=-F4xn0sWbpKkyNXZ3HRtk7W734Q&hl=en (3806, 31152, 34, 1) www.mja.com.au/public/issues/177_05_020902/vas10632_fm.html (3806, 59, 1, 1) www.medscape.com/viewarticle/452724_7 (3806, 356, 2, 1) www.scienceblog.com/community/older/1999/A/199900322.html (3806, 59, 1, 1) cjasn.asnjournals.org/cgi/content/abstract/1/4/655 (3806, 22, 1, 1) ndt.oxfordjournals.org/cgi/content/full/15/3/299 (3806, 16, 1, 1) www.nlm.nih.gov/medlineplus/news/fullstory_47336.html (3806, 986, 2, 1) www.unodc.org/pdf/WDR_2006/wdr2006_chap4_cocaine.pdf (3806, 252, 3, 1) www.usdoj.gov/ndic/pubs11/18862/index.htm (3806, 722, 4, 1) edition.cnn.com/2008/WORLD/europe/02/28/corwall.cocaine/index.html (3806, 4110, 4, 1) edition.cnn.com/2008/CRIME/03/20/drug.subs/index.html (3806, 4110, 4, 1) economist.com/daily/chartgallery/displaystory.cfm?story_id=9414607 (3806, 2029, 1, 1) www.dod.mil/policy/sections/policy_offices/solic/cn/cocaine2.pdf (3806, 1274, 1, 1) www.unodc.org/pdf/WDR_2006/wdr2006_volume2.pdf (3806, 252, 3, 1) www.unodc.org/pdf/research/wdr07/WDR_2007.pdf (3806, 252, 3, 1) www.erowid.org/chemicals/cocaine/cocaine.shtml (3806, 647, 3, 1) www.faculty.ucr.edu/ (3806, 28, 1, 1) www.emcdda.europa.eu/?nnodeid=25482 (3806, 42, 1, 1) www.erowid.org/chemicals/cocaine/cocaine.shtml (3806, 647, 3, 1) parentingteens.about.com/cs/cocainecrack/l/blsldiccocaine.htm (3806, 34, 1, 1) sun.ars-grin.gov:8080/npgspub/xsql/duke/chemdisp.xsql?chemical=COCAINE (3806, 51, 1, 1) www.bbc.co.uk/dna/h2g2/A10832384 (3806, 14103, 14, 1) www.HarmReduction.org (3806, 12, 1, 1) www.DanceSafe.org (3806, 43, 1, 1) theprometheusinstitute.org/politics/freedom/46-freedom/122-She_Dont_Lie_The_Economics_Behind_Cocaine (3806, 62, 1, 1) www.thegooddrugsguide.com/cocaine/faq.htm (3806, 33, 1, 1)
* 2) 2008-04-14 19:36:25: User fa:Cyrus abdi (talk - contribs; 569) to fa:سازÙ
ا٠تجارت Ø¬ÙØ§ÙÛ (diff) - Link: www.tni.org/wto/. * Links added in this diff: www.actionaid.org/708/wto_hong_kong_ministerial_2005.html (569, 1, 1, 1) www.aftinet.org.au (569, 1, 1, 1) www.bite-back.org (569, 1, 1, 1) www.focusweb.org/content/blogsection/3/36/ (569, 3, 1, 1) www.foei.org/trade/index.html (569, 27, 1, 1) www.gatt.org (569, 4, 1, 1) www.globalexchange.org (569, 56, 1, 1) www.globalisationinstitute.org/reports/cobden-paper/2005-and-beyond%3a-the-future-of-trade%2c-development-%26-international-institutions-20060207533/ (569, 4, 1, 1) www.globalmon.org.hk (569, 1, 1, 1) www.tradewatchoz.org (569, 1, 1, 1) www.tradeobservatory.org (569, 4, 2, 1) www.ictsd.org/ (569, 2, 1, 1) www.servicestrade.org/ (569, 1, 1, 1) www.namawatch.org (569, 1, 1, 1) www.ourworldisnotforsale.org (569, 2, 1, 1) www.maketradefair.org (569, 1, 1, 1) www.tradewatch.org (569, 1, 1, 1) www.targetwto.revolt.org (569, 1, 1, 1) www.tradeobservatory.org (569, 4, 2, 1) www.twnside.org.sg (569, 20, 1, 1) www.tni.org/wto/ (569, 37, 1, 1) www.wdm.org.uk/campaigns/trade/index.htm (569, 8, 1, 1) www.wtoaction.org (569, 1, 1, 1)
* 3) 2008-03-24 13:28:51: User ClueBot (talk - contribs; 578272) to Cocaine (diff) - Link: www.tni.org/drugscoca-docs/coca.htm.
* User is on global Whitelist: cluebot <-> * (Bots don't have a COI)
* 1) 2008-03-27 05:42:16: User ClueBot (talk - contribs; 578272) to Cocaine (diff) - Link: www.tni.org/drugscoca-docs/coca.htm.
* User is on global Whitelist: cluebot <-> * (Bots don't have a COI)
* 1) 2008-04-03 13:50:08: User ClueBot (talk - contribs; 578272) to Cocaine (diff) - Link: www.tni.org/drugscoca-docs/coca.htm.
* User is on global Whitelist: cluebot <-> * (Bots don't have a COI)
* 1) 2008-05-05 03:15:45: User DeadEyeArrow (talk - contribs; 7982) to Salvatore Greco "Ciaschiteddu" (diff) - Link: www.tni.org/archives/tblick/aruba.htm.
* User is on global Whitelist: DeadEyeArrow <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-04-09 22:13:16: User ClueBot (talk - contribs; 578272) to Cocaine (diff) - Link: tni.org/drugscoca-docs/coca.htm.
* User is on global Whitelist: cluebot <-> * (Bots don't have a COI)
* 1) 2008-05-02 15:18:43: User Cagey Millipede (talk - contribs; 24) to Cocaine (diff) - Link: www.tni.org/drugscoca-docs/coca.htm. * Links added in this diff: www.tni.org/drugscoca-docs/coca.htm (24, 37, 1, 1)
* 2) 2008-05-02 07:51:27: User Boud (talk - contribs; 57) to Horizontalidad (diff) - Link<EMAIL_ADDRESS>* Links added in this diff<EMAIL_ADDRESS>(57, 37, 1, 1)
* 3) 2008-05-02 04:53:37: User BorgQueen (talk - contribs; 370) to Illegal drug trade (diff) - Link: www.tni.org/drugscoca-docs/coca.htm.
* User is on global Whitelist: BorgQueen <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-05-01 17:26:24: User Betacommand (talk - contribs; 118) to Nicolo Rizzuto (diff) - Link: www.tni.org/archives/tblick/aruba.htm.
* User is on global Whitelist: betacommand <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-04-30 19:45:20: User CanadianLinuxUser (talk - contribs; 17012) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?know_id=188. * Links added in this diff: www.ufop.de/publikationen_english.php (17012, 12, 1, 1) ltnet.lv-h.de/en/volltext/lt20051/lt20051e_016_017.pdf (17012, 7, 1, 1) www.ecoworld.com/blog/2006/06/15/solar-power-biofuel-vs-photovoltaics/ (17012, 38, 2, 1) articles.moneycentral.msn.com/investing/supermodels/shucktheethanolandletsolarshine.aspx (17012, 43, 1, 1) www.biomassmagazine.com/article.jsp?article_id=1278 (17012, 12, 1, 1) ies.jrc.ec.europa.eu/wtw.html (17012, 22, 2, 1) www.refuel.eu/fileadmin/refuel/user/docs/final_report_-_shift_gear_to_biofuels.pdf (17012, 9, 1, 1) www.opinionjournal.com/weekend/hottopic/?id=110008530 (17012, 437, 3, 1) www.empa.ch/plugin/template/empa/3/60542/---/l=2 (17012, 10, 1, 1) www.ethanolrfa.org/objects/documents/79/aer-813.pdf (17012, 39, 7, 1) www.biodiesel.org/resources/reportsdatabase/reports/gen/19980501_gen-339.pdf (17012, 69, 11, 1) journeytoforever.org/biofuel_library/pimentel-tadzek.pdf (17012, 49, 3, 1) www.venturebeat.com/2006/11/05/why-cellulosic-ethanol-will-not-save-us/ (17012, 48, 1, 1) www.eere.energy.gov/afdc/pdfs/afpr_jul_07.pdf (17012, 342, 16, 1) www.odi.org.uk/nrp/nrp107.pdf (17012, 64, 1, 1) www.tni.org/detail_pub.phtml?know_id=188 (17012, 37, 1, 1) news.bbc.co.uk/2/hi/science/nature/6636467.stm (17012, 58172, 355, 1) cgse.epfl.ch/page65660-en.html (17012, 18, 2, 1) www.mpoc.org.za/modules.php?name=content&pa=showpage&pid=2 (17012, 9, 1, 1) cgse.epfl.ch/page65660.html (17012, 18, 2, 1) www.zerocarbonnow.org/ (17012, 10, 1, 1) www.eubusiness.com/energy/ceo-press.07-09-21 (17012, 196, 2, 1) www.downtoearth.org.in/full6.asp?foldername=20060715&filename=news&sec_id=49&sid=59 (17012, 11, 1, 1) www.guardian.co.uk/climatechange2007/story/0,,2111985,00.html (17012, 9582, 54, 1<EMAIL_ADDRESS>(17012, 108, 1, 1) www.socialfunds.com/news/article.cgi/2073.html (17012, 22, 2, 1) www.climnet.org/euenergy/2006_eeb_biofuelsstrategy.pdf (17012, 29, 1, 1) www.mnp.nl/ipcc/ (17012, 55, 1, 1) www.iht.com/articles/ap/2007/05/08/europe/eu-gen-un-biofuels.php (17012, 4116, 19, 1) www.ecoworld.com/blog/2007/06/04/corn-ethanol-water/ (17012, 38, 2, 1) climatechange.researchtoday.net/archive/4/1/759.htm (17012, 10, 1, 1) www.geo.uni-bayreuth.de/bodenkunde/terra_preta/ (17012, 14, 1, 1) www.journals.royalsoc.ac.uk/(xquef445kynlbt3pti5kdsr0)/app/home/contribution.asp?referrer=parent&backto=issue,3,14;journal,5,231;linkingpublicationresults,1:102022,1 (17012, 315, 1, 1) www.nytimes.com/2007/01/31/business/worldbusiness/31biofuel.html (17012, 17352, 88, 1) www.ars.usda.gov/main/site_main.htm?modecode=36021500 (17012, 180, 2, 1) www.canada.com/components/print.aspx?id=e08c8e19-4a95-491c-9386-d30afeab5cdf&sponsor= (17012, 1855, 10, 1) oilendgame.com/readthebook.html (17012, 10, 1, 1) www.worldchanging.com/archives/007885.html (17012, 55, 2, 1) www.nytimes.com/2008/02/08/science/earth/08wbiofuels.html?_r=1&oref=slogin (17012, 17352, 88, 1) www.foxnews.com/story/0,2933,297681,00.html (17012, 3610, 24, 1) www.atmos-chem-phys-discuss.net/7/11191/2007/acpd-7-11191-2007.html (17012, 22, 1, 1) ies.jrc.ec.europa.eu/wtw.html (17012, 22, 2, 1) www.georgiaitp.org/carbon (17012, 13, 1, 1) www.eprida.com/hydro/yahoo2004.htm (17012, 14, 1, 1) www.economist.com/research/articlesbysubject/displaystory.cfm?subjectid=7216688&story_id=10252015 (17012, 2029, 13, 1) magma.nationalgeographic.com/ngm/2007-10/biofuels/biofuels-interactive.html (17012, 139, 2, 1) www.bbc.co.uk/caribbean/news/story/2007/11/071101_oxfambiofuels.shtml (17012, 14103, 88, 1) www.climateark.org/shared/reader/welcome.aspx?linkid=95429 (17012, 19, 1, 1) www.canada.com/components/print.aspx?id=e08c8e19-4a95-491c-9386-d30afeab5cdf&sponsor= (17012, 1855, 10, 1) www.iea.org/textbase/papers/2007/so_contribution.pdf (17012, 188, 4, 1) www.time.com/time/magazine/article/0,9171,1725975,00.html (17012, 10124, 36, 1) www.nnfcc.co.uk (17012, 15, 1, 1) www.nationalpost.com/opinion/columnists/story.html?id=428913 (17012, 349, 1, 1) www.alertnet.org/thenews/newsdesk/l26549810.htm (17012, 551, 5, 1) pdf.wri.org/page_forests_008_woodfuels.pdf (17012, 12, 1, 1) www.ethanolindia.net/ethanol_govt.html (17012, 8, 1, 1) www.nytimes.com/2008/01/14/business/14gm.html?ei=5070&en=8461e0f658455111&ex=1200978000&adxnnl=1&emc=eta1&adxnnlx=1200428791-kwyo2siqrnjzfuh/aw1/3g (17012, 17352, 88, 1) www.economist.com/displaystory.cfm?story_id=10250420 (17012, 2029, 13, 1) www.whitehouse.gov/news/releases/2007/12/20071219-6.html (17012, 3095, 13, 1) www.presidencia.gov.co/prensa_new/sne/2003/agosto/26/16262003.htm (17012, 93, 1, 1) royalsociety.org/document.asp?latest=1&id=7366 (17012, 190, 1, 1) news.bbc.co.uk/2/hi/science/nature/7187361.stm (17012, 58177, 355, 1) www.sweden.gov.se/sb/d/2031/a/67096 (17012, 84, 1, 1) www.checkbiotech.org/green_news_biofuels.aspx?infoid=15225 (17012, 11, 1, 1) news.bbc.co.uk/2/hi/europe/7186380.stm (17012, 58177, 355, 1) www.un.org/news/briefings/docs/2007/070302_biofuels.doc.htm (17012, 4126, 20, 1) www.ieabioenergy.com/ieabioenergy.aspx (17012, 9, 1, 1) www.energy-arizona.org/archive/200708280001_low_cost_algae_production_system_introduced.php (17012, 8, 1, 1) www.friendsofethanol.com/facts.html (17012, 8, 1, 1) www.globeco.co.uk/bio-diesel_news_0007.html (17012, 8, 1, 1) www.washingtonpost.com/wp-dyn/content/article/2008/01/03/ar2008010303907.html (17012, 9891, 47, 1) www.usda.gov/oce/forum/2007%20speeches/pdf%20ppt/csomerville.pdf (17012, 90, 2, 1) www.renewable-energy-world.com/articles/print_screen.cfm?article_id=308325 (17012, 12, 1, 1) www.greenfuelonline.com/ (17012, 21, 2, 1) www.hydrogensolar.com/ (17012, 10, 1, 1) zfacts.com/p/436.html (17012, 68, 1, 1) www.ft.com/cms/s/0/e780d216-5fd5-11dc-b0fe-0000779fd2ac.html (17012, 1076, 8, 1) www.butanol.com/ (17012, 11, 1, 1) www.wfs.org/futcontja07.htm (17012, 31, 3, 1) www.prleap.com/pr/80099/ (17012, 29, 1, 1) www.biodieselfillingstations.co.uk (17012, 10, 1, 1) www.biodiesel.de/ (17012, 13, 1, 1) esa.un.org/un-energy/pdf/susdev.biofuels.fao.pdf (17012, 225, 4, 1) www.epa.gov/nonco2/econ-inv/table.html (17012, 1380, 25, 1) www.grida.no/climate/ipcc_tar/wg1/248.htm (17012, 625, 2, 1) www.waste-management-world-magazine (17012, 9, 1, 1) news.yahoo.com/s/ap/20080417/ap_on_bi_ge/farm_scene_waste_as_fuel;_ylt=akqcow73x0nkfqjcs2.if1ss0nue (17012, 3134, 17, 1) ngm.nationalgeographic.com/ngm/2007-10/biofuels/biofuels-p2.html (17012, 111, 1, 1) freetheplant.net/ (17012, 12, 1, 1) www.epa.gov/smartway/growandgo/documents/faq.htm#i_05 (17012, 1380, 25, 1)
* 2) 2008-04-30 19:44:20: User ClueBot (talk - contribs; 578313) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?know_id=188.
* User is on global Whitelist: cluebot <-> * (Bots don't have a COI)
* 1) 2008-04-30 06:59:28: User MER-C (talk - contribs; 8889) to Biofuel (diff) - Link: www.tni.org/detail_pub.phtml?know_id=188.
* User is on global Whitelist: MER-C <-> * (Over 5000 edits on en wikipedia)
* 1) 2008-04-29 18:25:51: User fr:Ahbon? (talk - contribs; 258) to fr:Manuel Contreras (diff) - Link: www.tni.org/pin-conf/conf12.pdf. * Links added in this diff: www.tni.org/pin-conf/conf12.pdf (258, 37, 2, 1)
* 2) 2008-04-29 18:25:48: User fr:Ahbon? (talk - contribs; 258) to fr:Paul Schäfer (diff) - Link: www.tni.org/pin-conf/conf12.pdf. * Links added in this diff: www.tni.org/pin-conf/conf12.pdf (258, 37, 2, 1) www.memoriaviva.com/Boletin/Boletin35.pdf (258, 26, 3, 1) | WIKI |
Sebastian B
Sebastian B. is a German actor mainly known for his starring role as "Arnold Richter" in Alexander Tuschinski's Trilogy of Rebellion, consisting of the films Menschenliebe, Break-Up and Timeless.
Filmography
* Timeless (2016)
* Break-Up (2014)
* Mutant Calculator (2011)
* Menschenliebe (2010) | WIKI |
Dukes (ward)
Dukes is a Metropolitan Borough of Sefton ward in the Southport Parliamentary constituency that covers the western part of the localities of Birkdale and Hillside in the town of Southport. The ward population taken at the 2011 census was 13,333.
Councillors
indicates seat up for re-election. indicates by-election. | WIKI |
M.P. Majra
M.P. Majra also known as MahmudPur Majra or Jahazgarh Majra is a village in the Jhajjar district of the Indian state of Haryana. It is part of the town of Beri tehsil. As per 2011 Census of India, the village had 822 households, with a total population of 4,090, of which 2,143 were males and 1,947 were females. Rohtak MP Pt. Arvind Kumar Sharma is the native of this village.
Transportation
M.P. Majra is situated on National Highway 334B or with easy road access to Rohtak, Bhiwani, Dadri, Gurgaon, Faridabad, Hisar, Sirsa, Palwal, Hanumangarh, Ganganagar, Delhi, Chandigarh, and Jaipur. The nearest Metro station on the Delhi metro Green Line is located in the Devilal Park in Bahadurgarh 35 kilometres away and Najafgarh metro 55 kilometres away.
Railways
The nearest railway station is Jhajjar Station at a distance of 8 km. Other major stations close to Beri are: Rohtak 36 km; Bhiwani 55 km; Rewari 50 km; and Delhi 60 km. | WIKI |
Page:United States Statutes at Large Volume 47 Part 1.djvu/1125
j 72d C ONGRESS. SESS. II. CH. 127 . FEBRUARY 27, 1933 . udic ial, and executi ve, whet her of t he Canal Zone, of the Uni ted States, of a State of the United States, or of a foreign country ; 2 . Public records, kept in the Canal Zone, of private writings. SEC. 1080. ALL OTHERS PRIVATE. -All other writings are private. PUBLIC WRITINGS "Private ." Public writings. 1101 SEC. 1082 . PUBLIC OFFICERS BOUND TO GIVE copias. -Every public gi Offi Officers boun d to officer having the custody of a public writing, which a citizen has a right to inspe ct, is bound to give him, on dem and, a certified copy of it, on payment of the legal fees therefor, and such copy is admis- sible as evidence in like cases and with like effect as the original Sbriting. SEC. 1083 . FOUR KINDS OF PUBLIC WRITINGS .-Public writings are divided into four classes. 1. Laws ; 2 . Judicial records ; 3 . Other official documents ; 4 . Public records, kept in the Canal Zone, of private writings. SEC. 1084. W RIT TEN LAW S DEFINED. -A written law is that which is promulgated in writing, and of which a record is in existence. SEC. 1085 . PUBLIC AND PRIVATE STATUTES DEFINED. -Statutes are public or private. A private statute is one which concerns only certain designated individuals, and affects only their private rights. All other statutes are public, in which are included statutes creating or affecting corporations. SEC. 1086 . UNwR rrrE N LAW DEFINED. -Unwritten law is the law not promulgated and recorded, as mentioned in section 1084, but which is, nevertheless, observed and administered in the courts of the United States. It has no certain repository, but is collected from the repor ts of the decisi ons of the court s, and the treat ises of learned men. SEC. 1087. BOO KS CO NTA INI NG L AWS PR ESU MED TO BE CORRECT .- Books printed or published under the authority of a state or foreign country, and purporting to contain the statutes, code, or other written law of such state or country, or proved to be commonly admitted in th e tribunals of s uch state or cou ntry as evidence of the written law thereof, are admissible in the Canal Zone as evidence of such law. SEC. 1088 . EVI DEN CE OF FOREIGN LAW .-A copy of the written law or other public writing of any state or country, attested by the certificate of the officer having charge of the original, under the public seal of the stat e or cou ntry, is admissi ble as e vidence of such law or writing. SEC. 1089. OTIIE It EVIDENCE OF LA WS OF STATES .-The oral testi- eS 7, testimo ny by mony of witnesses skilled therein is admissible as evidence of the unwritten law of a state or foreign country, as are also printed and pub lished b ooks of reports of decis ions of the cour ts of su ch state or country, or proved to be commonly admitted in such courts. Recit als in s tatu tes. SEC. 1090. RECITALS IN STATUTES, HOW FAR EVIDENCE .-Tlie recitals in a public statute are conclusive evidence of the facts recited for the purpose of carrying it into effect, but no further. The recitals in a private statute are conclusive evidence between parties who claim under its provisions, but no further. 'Judicial record "de- SEC . 1091 . JUDICIAL RECORD DEFINI„.D .-A judicial record is the fined . record or official entry of the proceedings in a court of justice, or of the official act of a judicial officer, in an action or special proceeding . Authe ntica tion of SEC . 1092 . RECORD, HOW AUTHENTICATED AS EVIDENCE .-A judicial record of the Canal Zone, or of the United States, may be proved Divisions. Definitions. "Written laws ." "Public and private statutes ." "Unwritten tow ." Books containing lass presumed correct Foreign laws, copies. | WIKI |
Teva Pharmaceutical Industries (TEVA) Announces the FDA Approval and U.S. Launch of Generic Saxenda
Teva Pharmaceutical Industries Limited (NYSE:TEVA) is one of the best strong buy growth stocks to buy now. On August 28, Teva Pharmaceutical Industries Limited (NYSE:TEVA) announced the FDA approval and U.S. launch of Generic Saxenda, the first-ever generic GLP-1 indicated for weight loss, targeting the rising demand for this category of therapies in the US market.
Management reported that the Liraglutide injection is indicated for “adults with obesity or overweight (excess weight) who also have weight-related medical problems, and pediatric patients (12-17 years) with a weight greater than 60 kg and obesity to help them lose weight and keep the weight off.”
Ernie Richardsen, SVP, Head of U.S. Commercial Generics at Teva Pharmaceutical Industries Limited (NYSE:TEVA), stated that this marks “the fifth first-to-market entry of a Teva generic this year and is an important addition to Teva’s diverse complex generics portfolio, demonstrating once again our proven ability to sustain a world-class Generics Powerhouse.”
Teva Pharmaceutical Industries Limited (NYSE:TEVA) develops, produces, and sells medicines. Its operations are divided into the US, Europe, and International Markets geographical segments. Each business segment covers the entire product portfolio in that region, including specialty, generics, and over-the-counter (OTC) products.
While we acknowledge the potential of TEVA as an investment, we believe certain AI stocks offer greater upside potential and carry less downside risk. If you’re looking for an extremely undervalued AI stock that also stands to benefit significantly from Trump-era tariffs and the onshoring trend, see our free report on the best short-term AI stock.
READ NEXT: 30 Stocks That Should Double in 3 Years and 11 Hidden AI Stocks to Buy Right Now.
Disclosure: None. This article is originally published at Insider Monkey. | NEWS-MULTISOURCE |
Talk:Anima (organization)
Updates/edits made
Stopped by the page and checked the websites & info. Noticed that the supposed youth website (anima2.dk) is exactly the same as the current one, seems to redirect there. So am cutting that part of the article.
Also the organization is describes as similar to PETA, but I think its work can stand on its own without having another organization in its definition.
I couldn't find a link to the organization's motto, but kept it in without the Danish wording, this being an English page. This is the text however if any one wants to see it: "Foreningen for alle dyrs rettigheder".
Canadianknowledgelover (talk) 04:04, 27 August 2014 (UTC) | WIKI |
Page:Works of John C. Calhoun, v1.djvu/160
Among the first, is that which springs from the idea of divided sovereignty; involving the perplexing question — how the people of the several States can be partly sovereign, and partly, not sovereign — sovereign as to the reserved — and not sovereign, as to the delegated powers? There is no difficulty in understanding how powers, appertaining to sovereignty, may be divided; and the exercise of one portion delegated to one set of agents, and another portion to another: or how sovereignty may be vested in one man, or in a few, or in many. But how sovereignty itself — the supreme power — can be divided — how the people of the several States can be partly sovereign, and partly not sovereign — partly supreme, and partly not supreme, it is impossible to conceive. Sovereignty is an entire thing — to divide, is — to destroy it.
But suppose this difficulty surmounted — another not less perplexing remains. If sovereignty be surrendered and transferred, in part or entirely, by the several States, it must be transferred to somebody; and the question is, to whom? Not, certainly, to the government — as has been thoughtlessly asserted by some; for that would subvert the fundamental principle of our system — that sovereignty resides in the people. But if not to the government, it must be transferred — if at all — to the people, regarded in the aggregate, as a nation. But this is opposed, not only by a force of reason which cannot be resisted, but by the preamble and tenth amended article of the constitution, as has just been shown. If then it be transferred neither to the one | WIKI |
Introduction and types of modified starch
Modified starch
Modified starch is a kind of modified starch. This kind of starch has some special physical and chemical properties, which can make the food have better performance in processing or eating when added to the food formula. As long as it is edible, its physiological function is the same as that of ordinary starch. Children can eat it.On the basis of the inherent characteristics of natural starch, in order to improve the performance of starch and expand its application range, physical, chemical or enzymatic treatment is used to introduce new functional groups on starch molecules or change the size of starch molecules and the properties of starch granules, thereby changing the natural characteristics of starch (such as gelatinization temperature, thermal viscosity and its stability, freeze-thaw stability, gel strength, film-forming property, transparency, etc.), Make it more suitable for the requirements of certain applications. This kind of starch, which has undergone secondary processing and has changed its properties, is collectively referred to as denatured starch.
Type of modified starch
The varieties and specifications of modified starch have reached more than 2000 The modified starch can be divided into physical modified starch, chemical modified starch, enzymatic modified starch and compound modified starch according to the treatment method. Physical modified starch includes: pre gelatinized starch, ultra-high frequency radiation treated starch, metal ion modified starch, smoked starch, etc; Chemical modified starch includes oxidized starch, esterified starch, etherified starch, cross-linked starch, grafted starch, etc; Enzymatic modified starch includes amylose, dextrin, resistant starch, etc; Compound modified starch refers to the modified starch obtained by two or more treatment methods, including oxidized cross-linked starch and cross-linked esterified starch. Among them, the modified starch produced by chemical methods has the largest variety and the widest use.
Back to blog | ESSENTIALAI-STEM |
Kawhi Leonard. Paul George. Same Court. Same Time.
on pro basketball The Clippers finally got their two stars together, and also an overtime win. LOS ANGELES — It rained in Los Angeles on Wednesday, one of those infrequent meteorological events that seem to transfix this city while paralyzing the traffic. At around the same time, the Clippers went through their morning shootaround ahead of their game against the Boston Celtics later that night. Shootarounds tend to be unremarkable, but this one was as odd and rare as the weather: Kawhi Leonard and Paul George were finally on the court together, partaking in an official workout for the first time as teammates. One of the Clippers’ marketing slogans this season is “We Over Me,” but they have seldom been whole. George missed the first 11 of games of the season while recovering from shoulder surgery, then Leonard was sidelined with a left knee contusion when George joined the starting lineup last week. On Wednesday, though, they overlapped: their first communal shootaround followed by their first game as superfriends. In some ways, it felt like the season was starting all over again. “I think I know what to expect,” Clippers Coach Doc Rivers said about an hour and a half before the game began, “but I don’t really know what to expect.” Rivers wound up getting a bit of everything: a bundle of turnovers, a late-game comeback and a glimpse of his team’s frightening potential. It was no surprise that the Clippers were uneven in their 107-104 overtime victory: Leonard had missed the previous three games, George is still working himself into playing shape and their teammates are coping with change. But the Celtics (11-3) took the court at Staples Center tied for the best record in the N.B.A.’s Eastern Conference, and the Clippers still emerged with a win. “We understand we’re going to have growing pains,” said George, who finished with 25 points, 8 assists and 5 rebounds. “We’re going to make mistakes. It’s not going to be pretty right now. But whatever the case may be, we’re going to find a way to win.” Leonard added 17 points and blocked the Celtics’ Kemba Walker at the buzzer to preserve the win, but what stood out most as Leonard and George seized the stage was the play of their supporting cast. Patrick Beverley had 14 points and 16 rebounds. Lou Williams scored 27 points off the bench. The Clippers (10-5) revealed their depth. “If we trust the pass, the ball will find the open guy,” Rivers said, “and the open guy will make the shot.” All that depth is a luxury as Leonard and George feel their way through this process. Rivers recalled meeting with his staff after the team’s morning shootaround and reflecting on how strange it all was: When was the last time another tandem had made such a highly anticipated debut without having spent any real time together on the practice court? “We couldn’t come up with one,” Rivers said. Of course, Leonard and George were not exactly strangers when they showed up for Wednesday’s game. In coordinating their relocation to Los Angeles over the summer, Leonard agreed to sign with the Clippers only after they had hashed out a deal to acquire George from the Oklahoma City Thunder. And they have been around each other for months. In the run-up to the season, they appeared together on billboards and in television commercials and in the wildest dreams of the franchise’s championship-starved fans. It was all a reflection of just how much was suddenly at stake for the Clippers, who mortgaged an enormous chunk of their long-term future to win now. It is worth remembering what was required of them to pry George loose from Oklahoma City: a package that included five future first-round draft picks and Shai Gilgeous-Alexander, one of their most promising young players. But the Clippers are living for the moment, and George was quick to provide evidence of his worth in his first three games with the team by averaging 29.3 points, 6.7 rebounds and 3.7 assists while shooting 56.3 percent from the field — all while Leonard nursed his knee injury. After going months without competitive basketball, George made his return look effortless. But Wednesday was different, a milestone for a franchise that has never been synonymous with success. Before the game, Rivers acknowledged that he was experiencing a smorgasbord of emotions: excitement and nervousness, but also curiosity to see how it would all look. He knew it would take time for Leonard and George to form chemistry and for the team as a whole to adjust to revamped rotations and roles. But come on: It was finally happening. Sure enough, on the Clippers’ opening possession, Leonard buried a 3-pointer. A few possessions later, he passed out of a trap to George, who made a 3-pointer of his own. It all seemed too good to be true — and it was, because the Clippers spent much of the rest of the game handling the ball as if it had been coated with cooking oil, finishing with 23 turnovers. “I just thought we were so sloppy in transition,” Rivers said. “We were trying to get the ball to guys instead of trying to score. I mean, there were times when we had direct-line drives, and instead we were looking cross court.” At the same time, it was clear how much trouble Leonard and George caused defenders when they were on the court together. They drew significant attention, clearing space for the teammates around them. Beverley and Williams were among those who took advantage. “I came off one pick-and-roll,” Beverley said, “and I was so open I didn’t know what to do.” For his part, George reminded everyone at his news conference that the Clippers are not merely some “two-headed monster.” But now, after a long wait, they are finally whole. | NEWS-MULTISOURCE |
3 Stocks to Brave Volatile Market with Revenue Strength - Analyst Blog
While the naysayers warn of a crash every time the market hiccups, it is evident that we are currently in one of the most powerful and resilient bull markets we've seen in a long time. Five years of cheap money, pumped-up stock prices and gradually rebuilding investor confidence have powered the market to reach some uncharted territories.
But how long can it last? Amid the melee between the bulls and the bears, a layman investor might get lost. Choosing stocks that promise earnings growth may not be enough to ensure returns if the much-dreaded crash finally hits. And even if one manages to find some stocks that have enough potential to hold ground, investing in most them might not be that lucrative as most of them no longer hold reasonable valuations.
Let's find some stocks using traditional indicators of stability and growth.
What Drives the Bottom Line?
Sales drive earnings, earnings drive the stock price. This time-honored adage still holds true as an investment idea reviewed in bare essentials.
Since the most recent recession hit six years ago, many companies have slashed costs and restructured operations to become leaner and more efficient. This has translated into improved profit margins, leading to earnings growth despite sedated sales growth.
But earnings advancements based on margin expansion can outpace sales growth for only so long. Over the long term, earnings growth typically trails along the lines of revenue growth.
Companies have been aggressively chasing growth in recent times, as evidenced by the spurt in mergers and acquisitions. Granted, the companies had huge amounts of cash reserves, and the credit markets were practically encouraging them to lever up. But the primary reason remained the relentless pursuit of top-line growth that has become harder and harder to come across in these tricky economic conditions.
Such behavior by the companies only serves to underline the importance of robust revenue growth as a key metric to select stocks.
What Drives Revenues?
Consumer spending is a direct determinant of business sales. With the GDP growing at an impressive rate of 4% in the second quarter, the economy seems to be gaining momentum after shrinking 2.1% in the previous quarter. The unemployment rate is steadily declining. And as hiring picks up, consumer demand will follow suit. Acceleration in wage growth could also boost consumer spending.
In fact, the country trade deficit for June shrank 7%, which could imply a modest upward revision to the already strong second-quarter GDP estimates. Most importantly, it prompts gutsy third-quarter GDP expectations.
As U.S. consumer spending accounts for over two-thirds of the economic output, GDP expansion augurs well for organic growth of the business community.
The Power of Industry Rank
Research indicates that about half the price performance of a stock can be attributed to the industry group that it belongs to. Using a sorting metric called Zacks Industry Rank, one can screen for stocks that belong to the top-performing industries. A top Zacks Industry Rank signifies that more stocks within that group are likely to have upward earnings estimate revisions, implying bullish outlook for the industry.
Historically too, we have found that the top 50% of Zacks-Ranked Industries outperform the bottom 50% by a factor of more than 2 to 1. So it's a good idea to leverage the Zacks Industry Rank to shortlist stocks.
Growth & Valuation Metrics
Apart from a strong track record of sales growth and a robust industry rank, one should look for companies with strong long-term growth expectations. This should help select companies with strong earnings potential driven by revenue growth.
We have shortlisted three stocks based on the above metrics and incorporating valuation multiples. All these stocks are trading at a discount to their respective peer group average forward P/E and P/S ratios.
Lithia Motors Inc. ( LAD )
Lithia Motors is a leading automobile retailer and automotive franchisee in the U.S., serving both urban and rural markets. With the auto market continuing to enjoy robust momentum, Lithia Motors is displaying healthy growth across its segments.
The auto dealer has been on an acquisition spree lately, acquiring/opening eight stores so far this year. The acquisitions of Vic Alfonso Cadillac, Braley & Graham Buick GMC and Access Ford Lincoln are expected to add $165 million annually to its revenues. The company is also set to acquire DCH Auto Group Inc., which will augment revenues by $2.3 billion approximately per annum.
The Retail/Wholesale Auto/Truck industry currently holds a Zacks Industry Rank of 34 out of 265 industries, placing it in the top 15% bracket.
Sales Growth in Previous Year = 20.8%
Long-Term Growth Consensus Estimate = 25%
P/E Ratio: 18.1; Peer Group P/E Ratio: 24.2
P/S Ratio: 0.5; Peer Group P/S Ratio: 1.0
Zacks Rank #1 (Strong Buy)
Constellation Brands Inc. ( STZ )
Constellation Brands is a leading international producer and marketer of beverage alcohol brands, boasting a formidable portfolio of popular labels across the wine, spirits and imported beer categories. The company is the largest multi-category alcohol supplier in the U.S. and the largest wine company in the world.
The company's top-line has benefited from the consolidation of the Crown Import business as well as robust demand for beer. Last year, the company acquired Grupo Modelo's U.S. beer business for a sum of $4.75 billion, boosting its sales by $2 billion in fiscal 2014.
Constellation's beer segment now represents about half of its total sales; and it grew a strong 10% last year, on the back of new product offerings, new points of distribution and effective marketing and advertising strategies.
The Alcoholic Beverages industry currently holds a Zacks Industry Rank of 34 out of 265 industries, placing it in the top 13% bracket.
Sales Growth in Previous Year = 72.6%
Long-Term Growth Consensus Estimate = 17.3%
P/E Ratio: 19.9; Peer Group P/E Ratio: 20.3
P/S Ratio: 3.0; Peer Group P/S Ratio: 13.7
Zacks Rank #2 (Buy)
Barrett Business Services Inc. ( BBSI )
Barrett Business Services, an outsourcing firm, provides business management solutions, combining human resource outsourcing and professional management consulting. With the company's brand gaining more recognition, its client penetration is reaching deeper, ranging from industries such as telecommunications and transportation & shipping to manufacturing and food processing.
The company's commendable sales growth in recent times was attributable to organic growth arising from existing client base as well as strong referral channels. Also, the company's client retention rate of over 90% indicates sustained revenue growth acceleration, going forward.
The outsourcing industry currently holds a Zacks Industry Rank of 96 out of 265 industries, placing it in the top 36% bracket.
Sales Growth in Previous Year = 32.3%
Long-Term Growth Consensus Estimate = 22.5%
P/E Ratio: 18.8; Peer Group P/E Ratio: 20.1
P/S Ratio: 0.7; Peer Group P/S Ratio: 2.8
Zacks Rank #1
Bottom Line
The crux remains that the top-line drives the bottom-line. A trend of bottom-line growth consistently outpacing top-line growth in most quarters has been a matter of concern throughout the recovery. Companies have jacked up earnings for years by slashing costs. However, going forward, it is clear that only companies with strong revenue growth prospects can retain their earnings momentum and augment shareholder wealth.
Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report
CONSTELLATN BRD (STZ): Free Stock Analysis Report
LITHIA MOTORS (LAD): Free Stock Analysis Report
BARRETT BUS SVS (BBSI): Free Stock Analysis Report
To read this article on Zacks.com click here.
Zacks Investment Research
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Prologueİzmit, Kocaeli, Turkey
Flavius Valerius Constantinus, as he was originally named, was born in the city of Naissus (today Niš, Serbia), part of the Dardania province of Moesia on 27 February, probably c. AD 272. His father was Flavius Constantius, who was born in Dacia Ripensis, and a native of the province of Moesia. Diocletian divided the Empire again in AD 293, appointing two caesars (junior emperors) to rule over further subdivisions of East and West. Each would be subordinate to their respective augustus (senior emperor) but would act with supreme authority in his assigned lands. This system would later be called the Tetrarchy. Constantine went to the court of Diocletian, where he lived as his father's heir presumptive. Constantine received a formal education at Diocletian's court, where he learned Latin literature, Greek, and philosophy. | FINEWEB-EDU |
Medical Pioneer, Social Reformer. Born in the German city of Kolberg (now the Polish city Kolobrzeg), he experienced life as a double minority. As a Jew living in a historically anti-Semitic country, and as a gay man and transvestite living at a time when homosexuality was still believed to be a form of mental illness, he knew the importance of being organized and having a voice, because otherwise such scapegoated minority groups stood a greater chance of being persecuted. Hirschfeld originally began his career as a physician, but was quickly drawn to the study of human sexuality. As a very early pioneer of the gay rights movement, he urged other gay people living in Germany to get organized and to be activists for their cause. In 1897, he founded the Scientific Humanitarian Committe, which was instrumental in the formation of the gay rights movement. Although he encouraged everyone, particularly high-profile people, to join his cause even if they were heterosexual, he felt that the movement couldn't go too far unless more gay people actively joined in the struggle instead of letting heterosexuals gain acceptance for them. Hirschfeld was a voracious writer, writing an untold amount of books, essays, pamphlets, and other matter of printed material on homosexuality, tranvestisism, sexuality, and fetishism. Among thes writings were the 23-volume 'Yearbook for the Sexual Intermediaries,' which was the very first magazine devoted to gay studies. In 1919 Hirschfeld founded the Institute for Sexual Science, through which he carried out massive research and case studies lending even more credence to his theory that one's sexual orientation was inborn. He felt that if people knew there was a scientific basis for homosexuality, they would be more likely to accept it instead of passing legislation against it. The Institute also was home to the Museum of Sex. Besides publishing his writing, Hirschfeld also got his message across by travelling across Europe to lecture. These speeches often were given to packed houses. He once estimated that he had spoken to over 30,000 people, and his reputation as a dynamic personal speaker and compassionate listener, counselor, and educator made him a very sought-after party guest. In 1919 he also acted in and co-wrote the film 'Anders als die Andem' ('Different from the Others'), which had a very clear agenda for the reform of gay rights laws. However, his reputation also made him reviled among the people who disagreed with his work, and attacks on him increased as the fascists began rising to power. Sometimes his meetings would be disrupted by young gangs of Nazis, who would open fire on the crowds and throw stink bombs at Hirschfeld. He was physically attacked twice in 1920 and 1921, and during the second attack he was beaten so severely the stormtroopers left him for dead in the street. However, he recovered and went right on conducting his research into human sexuality, advocating for the repel of Paragraph 175 (legislation that made male gay relationships a crime), and speaking to packed houses. He also helped to found the World League for Sexual Reform, which was the first world gay rights organization. By 1930 the League had over 130,000 members. Shortly after Hitler came to power, things became worse for Hirschfeld. While he was on an international tour for the League, his Institute became the Nazis' first target in their new campaign against "un-German" material. On May 3, 1933, a large crowd of students and stormtroopers, with a marching band in tow, stormed the building. All of the writing and research Hirschfeld had done over the last few decades, along with magazines, books, articles, and research done by other sexologists, were carried off to Opera Square, where they were burned in a huge bonfire. Knowing he wouldn't be welcomed if he returned to Germany, Hirschfeld went into exile in France. He eventually made his home in Nice, where he died two years after his life's work had been destroyed.
Bio by: Carrie-Anne
Li Shiu Tong | FINEWEB-EDU |
USS Power (DD-839)
USS Power (DD-839) was a Gearing-class destroyer of the United States Navy, the first Navy ship named for First Lieutenant John V. Power, USMC (1918–1944), who was posthumously awarded the Medal of Honor for heroism in the Battle of Kwajalein. This ship was involved in the Project SHAD tests off Newfoundland.
Construction and career
Power was laid down on 26 February 1945 by the Bath Iron Works, Bath, Maine; launched on 30 June 1945; sponsored by Mrs. George F. Power, mother of Lt. Power; and commissioned on 13 September 1945 at Boston.
Service in the United States Navy
After shakedown out of Guantanamo Bay, Cuba, Power sailed on 9 January 1946 on the first of many Mediterranean deployments. Returning to the east coast six months later, she remained in the western Atlantic and Caribbean until late in 1948 when she again sailed for Mediterranean waters, to patrol the coast of Palestine under the direction of the United Nations Mediation Board.
During early 1950, Power operated with units of the British Royal Navy and visited ports in Northern Europe, whence she steamed to the Mediterranean for another tour with the 6th Fleet. In the summer of 1952 Power completed a South American cruise, then returned to the east coast to resume her schedule of reservist and Midshipman training cruises, fleet and type exercises, and Mediterranean deployments.
On January 12, 1955, Power collided with USS Warrington during a night exercise near Puerto Rico.
In early 1956 during ASW exercises Power was involved in a collision with the destroyer USS Eaton (DD-510).
Lebanon Crisis
In 1958 Power faced the Lebanon crisis with the 6th Fleet; and participated in the first Project Mercury launches after her return to the east coast.
From November 1960 to January 1962 Power received a Fleet Rehabilitation and Modernization (FRAM I) overhaul, giving her the ASROC system and DASH capability. By September 1962 she was back in the Mediterranean.
During her 1963 overseas deployment Power served with the Middle East Force and at the end of the year, into 1964, operated off eastern Florida in connection with the Polaris program. Following another Mediterranean cruise and further east coast exercises in late 1965, she steamed in mid-Atlantic as a member of the recovery teams for Gemini 6 and 7.
Vietnam War
During 1966 and 1967, she again served with the 6th Fleet and the Middle East Force, but in August 1968 she transited the Panama Canal for a tour in the western Pacific. With the 7th Fleet from 26 September 1968, she served in the "Yankee Station" Surveillance Area and provided gunfire support and search and rescue (SAR) off South Vietnam. Power made a port call at Da Nang, South Vietnam on 13 November 1968. She arrived Mayport, Florida on 9 July 1969. Following a Med Deployment in 1973, Power was transferred to the Naval Reserve Fleet and homeport was moved to New York City at the NY State Maritime Academy pier (Fort Schuyler)
Power was decommissioned in September 1977, and sold to Taiwan in October.
Service in the Republic of China Navy
The ship served in the Republic of China Navy as ROCS Shen Yang (DD-923).
Her number was changed to DDG-923 after she underwent Wu-Chin III modernization program.
Sheng Yang 's decommissioning ceremony was held on 26 November 2005 in Keelung Harbor, in a ceremony hosted by Admiral Bon-Chi Chen, the commander-in-chief of the ROCN. Her official decommissioning was on 1 January 2006.
The ship, then Taiwan's last ex-Gearing-class destroyer, will possibly become a museum ship but unfortunately plans fell through and she was scrapped in November 2013. | WIKI |
From 6ae7a02104631a2234c475575ae15ca79bef14f9 Mon Sep 17 00:00:00 2001 From: Lars Knoll Date: Thu, 10 Sep 2020 20:39:49 +0200 Subject: Remove most compiler warnings about missing overrides Remove around 1000 compiler warnings about missing overrides in our auto tests. This significantly reduce the compiler warning noise in our auto tests, so that one can actually better see the real problems inbetween. Change-Id: Id0c04dba43fcaf55d8cd2b5c6697358857c31bf9 Reviewed-by: Volker Hilsheimer --- tests/auto/testlib/selftests/badxml/tst_badxml.cpp | 2 +- .../tst_benchlibeventcounter.cpp | 20 ++++++++++---------- .../benchliboptions/tst_benchliboptions.cpp | 20 ++++++++++---------- tests/auto/testlib/selftests/mouse/tst_mouse.cpp | 8 ++++---- 4 files changed, 25 insertions(+), 25 deletions(-) (limited to 'tests/auto/testlib/selftests') diff --git a/tests/auto/testlib/selftests/badxml/tst_badxml.cpp b/tests/auto/testlib/selftests/badxml/tst_badxml.cpp index bdf48a2f21..e3f650bd85 100644 --- a/tests/auto/testlib/selftests/badxml/tst_badxml.cpp +++ b/tests/auto/testlib/selftests/badxml/tst_badxml.cpp @@ -68,7 +68,7 @@ public: : className("tst_BadXml"), mo(0) {} ~tst_BadXmlSub() { free(mo); } - const QMetaObject* metaObject() const; + const QMetaObject* metaObject() const override; QByteArray className; private: diff --git a/tests/auto/testlib/selftests/benchlibeventcounter/tst_benchlibeventcounter.cpp b/tests/auto/testlib/selftests/benchlibeventcounter/tst_benchlibeventcounter.cpp index c9e3327411..224b720f5f 100644 --- a/tests/auto/testlib/selftests/benchlibeventcounter/tst_benchlibeventcounter.cpp +++ b/tests/auto/testlib/selftests/benchlibeventcounter/tst_benchlibeventcounter.cpp @@ -39,16 +39,16 @@ public: TestEventDispatcher(QObject* parent =0) : QAbstractEventDispatcher(parent) {} - void interrupt() {} - bool processEvents(QEventLoop::ProcessEventsFlags) { return false; } - void registerSocketNotifier(QSocketNotifier*) {} - void registerTimer(int,int,Qt::TimerType,QObject*) {} - QList registeredTimers(QObject*) const { return QList(); } - void unregisterSocketNotifier(QSocketNotifier*) {} - bool unregisterTimer(int) { return false; } - bool unregisterTimers(QObject*) { return false; } - int remainingTime(int) { return 0; } - void wakeUp() {} + void interrupt() override {} + bool processEvents(QEventLoop::ProcessEventsFlags) override { return false; } + void registerSocketNotifier(QSocketNotifier*) override {} + void registerTimer(int,int,Qt::TimerType,QObject*) override {} + QList registeredTimers(QObject*) const override { return QList(); } + void unregisterSocketNotifier(QSocketNotifier*) override {} + bool unregisterTimer(int) override { return false; } + bool unregisterTimers(QObject*) override { return false; } + int remainingTime(int) override { return 0; } + void wakeUp() override {} #ifdef Q_OS_WIN bool registerEventNotifier(QWinEventNotifier *) { return false; } diff --git a/tests/auto/testlib/selftests/benchliboptions/tst_benchliboptions.cpp b/tests/auto/testlib/selftests/benchliboptions/tst_benchliboptions.cpp index 689f92cc39..5d77df91a0 100644 --- a/tests/auto/testlib/selftests/benchliboptions/tst_benchliboptions.cpp +++ b/tests/auto/testlib/selftests/benchliboptions/tst_benchliboptions.cpp @@ -39,16 +39,16 @@ public: TestEventDispatcher(QObject* parent =0) : QAbstractEventDispatcher(parent) {} - void interrupt() {} - bool processEvents(QEventLoop::ProcessEventsFlags) { return false; } - void registerSocketNotifier(QSocketNotifier*) {} - void registerTimer(int,int,Qt::TimerType,QObject*) {} - QList registeredTimers(QObject*) const { return QList(); } - void unregisterSocketNotifier(QSocketNotifier*) {} - bool unregisterTimer(int) { return false; } - bool unregisterTimers(QObject*) { return false; } - int remainingTime(int) { return 0; } - void wakeUp() {} + void interrupt() override {} + bool processEvents(QEventLoop::ProcessEventsFlags) override { return false; } + void registerSocketNotifier(QSocketNotifier*) override {} + void registerTimer(int,int,Qt::TimerType,QObject*) override {} + QList registeredTimers(QObject*) const override { return QList(); } + void unregisterSocketNotifier(QSocketNotifier*) override {} + bool unregisterTimer(int) override { return false; } + bool unregisterTimers(QObject*) override { return false; } + int remainingTime(int) override { return 0; } + void wakeUp() override {} #ifdef Q_OS_WIN bool registerEventNotifier(QWinEventNotifier *) { return false; } diff --git a/tests/auto/testlib/selftests/mouse/tst_mouse.cpp b/tests/auto/testlib/selftests/mouse/tst_mouse.cpp index 43dda31daf..59dfc26043 100644 --- a/tests/auto/testlib/selftests/mouse/tst_mouse.cpp +++ b/tests/auto/testlib/selftests/mouse/tst_mouse.cpp @@ -61,25 +61,25 @@ public: ulong lastTimeStamp = 0; protected: - void mousePressEvent(QMouseEvent *e) + void mousePressEvent(QMouseEvent *e) override { pressCount++; processEvent(e); } - void mouseMoveEvent(QMouseEvent *e) + void mouseMoveEvent(QMouseEvent *e) override { moveCount++; stateInMouseMove = e->buttons(); processEvent(e); } - void mouseReleaseEvent(QMouseEvent *e) + void mouseReleaseEvent(QMouseEvent *e) override { processEvent(e); } - void mouseDoubleClickEvent(QMouseEvent *e) + void mouseDoubleClickEvent(QMouseEvent *e) override { doubleClickCount++; processEvent(e); -- cgit v1.2.1 | ESSENTIALAI-STEM |
Talk:Gothic 3
Untitled
I vote the 'Reaction' section is either totally re-written or removed completely; the use of language seems totally wrong for an informational article.
I don't really have enough interest nor knowledge of the game to justify me doing the work itself, but the entire section just really irks me.
- My mistake, 'Reception' section.
--
The Reception section was included based on the fact that one already existed for Gothic 2. It's intended as a stub (as is the entire Gothic 3 wiki) for reception and reviews of the game when it is released. If you could be more specific about the "use of language" being "totally wrong" perhaps we could understand just what it is about this section that "irks" you. As it is though, without a specific set of reasons, having a section removed because it "irks" you seems to be a trivial reason at best.
- Teshia
Coming from the same angle as the original poster, in that I have no real knowledge of the game, I assume that the complaints centre around the use of non-encyclopaedic language in the 'Reception' section. Phrases such as "a ton of awards" and saying that fans of Oblivion will "probably love" the game don't really belong in an encyclopaedia, something which is supposed to do away with opinion and convey knowledge in a clear and very definite way. -Aenimiac 21:29, 10 October 2006 (UTC)
Reception Section: Tone/NPOV
Not a terrible article, but as others have noted, the Reception section does not fit well with either the article or the nature of Wikipedia. Please consider a re-write, improving the tone of the Reception section, with an eye towards the following opinionated and unsourced statements:
''"yet well worth the reboot" "sporting a lush plotline that easily separates them from other RPGs".''
Please cite the following, and remove the opinion statement. The intent behind an article should be to put forth a citable, neutral point of view, which this does not do:
"Gothic games are also well known for being very adult oriented without crossing the line into being offensive. They have strong language and violence but it's never used with the intent to shock. Rather, it creates a gritty, realistic environment that helps the player suspend any disbelief."
"Also feeding pre-release interest is the success of The Elder Scrolls IV: Oblivion. While made by a separate studio, people can't seem to stop comparing the two franchises." According to who? What sources note that there is a connection, and which people are comparing the two? Also, please remove the "can't seem to stop" phrase.
"The success of Oblivion has raised questions about the possibility of a console port of Gothic 3. While it is a possibility, there are down sides to porting a title to console." Original research, or citable fact?
"Oblivion fans took issue with the console port, arguing that parts of the game were dumbed down or simplified because of a lack of programming time that was lost to the process of porting." This is probably true. Please cite a source, or at least offer some indication that this is not simply your opinion.
"While RPGs aren't always big sellers compared to other genres, Oblivion did extremely well in sales and won a ton of awards, becoming the top selling game for the XBox 360. It is unlikely that Gothic 3 will be an Oblivion "killer" but it will almost certainly act as an excellent companion to Oblivion, easily bringing comparable value and gameplay. Fans of Oblivion will probably love Gothic 3 and hopefully this will create enough buzz in the English market to garner a future release of Gothic 4." This entire section is opinion, and does not seem to fit here. If you can re-write this to indicate that noted sources in the gaming industry are comparing Oblivion and Gothic 3, then perhaps something could be salvaged?
ellF 18:53, 11 October 2006 (UTC)
---
Much of this reception section has been deleted, so these are largely moot points now. Although the release date is October 13th, players have received the game from stores as early as the 10th, so it's officially out. As much of the above points concerning the tone largely center around opinion and hype, they have been deleted and replaced with the first review I could find and hopefully that section will be fleshed out in more detail as the more reviews become available. As a result, I've changed much of the tense to reflect a game that is released, rather than one in development. I've also removed the "future game" stub.
Teshia
---
Great, thank you -- this looks much better. I noticed a few other points that did not quite match the released state, and edited them to reflect the status of the game. I also dropped a few editorializing words, but I think this matches the work that you have already done to tighten the article as a whole up.
In general, the issues I have seen with this article were centered around tone and language. Your content is good, and the depth is excellent, but you probably want to avoid using adjectives to describe factual information when writing a Wikipedia article. These are seen as opinion words, and given the NPOV rules, are generally inappropriate. There are certainly exceptions, but minimizing your editorial will help keep people from excessively editing what you write. It is obvious that you are passionate about the game, which is great for the content, but try to reign in that enthusiasm and present a neutral point of view when discussing features. :)
Also, when signing a comment on a talk page, using four tildes in a row will auto-include a link to your userpage and the date of your edit, rather than just your name.
ellF 14:46, 12 October 2006 (UTC)
---
Thanks for the input and good advice. Your edits made it look much tighter all around - much improved. That tilde trick is awesome.
Teshia 18:39, 12 October 2006 (UTC)
---
Are things like cheats and codes really allowable on wikipedia? I thought those sections were more meant for game wikis because they deal with instructions on how to play the game, get through levels, controls, etc. - I erased a section on cheating once but another one popped up in its place. Am I wrong to have removed it in the first place?
Teshia 03:43, 21 October 2006 (UTC)
Image allignment
This site is a mess because of odd picture placement (on 1280x1024). There should also be only pictures with graphical settings maxed out and not some user's screenshots who don't come close to high-end PC specifications. --<IP_ADDRESS> 06:39, 4 November 2006 (UTC)
---
You'll have to clarify what you mean when you say "odd picture placement". I've viewed this wiki on 1280 and 1024 and it looks fine. This is a very similiar screenshot placement to other wikis, such as Half-Life 2 and many others. Also, there is no requirement that screenshots from users need to be captured at the highest possible resolution. In fact, in order to fall under a fair use license, lower resolution captures from fans are required, as the content of the image is under an original copyright.
Teshia 00:48, 5 November 2006 (UTC)
System Requirements...
Judging from reviews on Amazon.com and elsewhere, it seems that the single major factor for performance (for those who already have new and powerful systems) is a fast, top-of-the-line (RAID-controlled or otherwise) hard disk. Since much of the game runs off the hard drive after loading, this is understandable, however is not mentioned under any system requirements, and is still largely an unknown factor. Those with the hardware (not myself!) should look into it. Fionndruinne 19:50, 9 December 2006 (UTC)
My experience has certainly been that there are bugs, but not so many that the game is unplayable. The amount of bugs that interfere with gameplay dramatically decreases as you get better hardware - that's something I've seen for sure. A good video card (256 Mb), a good processor (P4 2600+) and a lot of RAM (1.5-2 Gb) should easily make this game more than playable. Certainly I had as many bugs playing this game as I did playing Oblivion, yet there are some people who strongly feel these two games are light years apart in quality/content. Strange, seeing as they both use some of the same technology to create very similar gameplay. A fast hard drive probably would help, but I found upgrading to a good video card and going from 512 Mb RAM to 1.5 Gb RAM (especially the RAM upgrade) really improved the performance dramatically. Teshia 05:23, 10 December 2006 (UTC)
The RAM requirements should be changed to 2GB, I've got this game recently and have all of the system specs for the game but my computer only had 1GB RAM and it struggled a lot. The next few days the pc started to have system failures and the services started to fail, all because of the RAM the game required, i recommend the actual RAM specs should be changed to 2GB RAM which I'm going to order soon online, and yes their was some bugs with the game, the screen even went blue and the graphics card failed completely. SKYNET X5000 (talk) 19:31, 8 December 2007 (UTC)
* My (German version) game manual says that recommended System RAM is 1.5GB. I changed that in the article. --Offliner (talk) 10:38, 4 January 2008 (UTC)
* I don't think we can change the memory requirement if it is not supported by a reputable source. It would violate the no original research and verifiability guidelines. Aroni125 (talk)
Criticism
Both criticisms are by the same person. If you googled "gothic 3" review, you should be able to find quotes from a different person. —The preceding unsigned comment was added by Hypersugarchild (talk • contribs) 18:31, 17 February 2007 (UTC).
Criticism
The criticism section needs references and refinement. While the facts are not necessarily untrue, they simply refer to personal opinions and forum posts on JoWood's forum. I don't want to just delete it, but the last line added to 'criticism' really needs a source. --Steppenfox 19:58, 18 June 2007 (UTC)
I corrected the nationality of the primary publisher JoWooD. It's not a German but an Austrian company. Istabraq 01:03, 21 June 2007 (UTC)
Story
Prologue section is the story of Gothic 1 and 2, it has nothing to do with Gothic 3. Since Gothic 1 and 2 articles cover it, this section must be removed.Sohail Mansorry (talk) 13:35, 20 May 2010 (UTC)
* So, are we going to remove it? If we leave it, we need to fix some things. There are some inconsistencies in the use of the present and the past form which don't sound very well when reading it. Shorkan (talk) 16:58, 10 December 2010 (UTC)
community patch
As there's talk about the game's bugs, the Community Patch could be mentioned. It's supposed to fix several bugs as well as make combat harder (latter it surely does). It's located at : http://www.g3cpt.eu/ Should I mention it? Hoemaco (talk) 15:02, 31 January 2011 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified one external link on Gothic 3. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added tag to http://press.jowood.com/html/News/news_details.php?id=898&title=NEWS&bereich=60
* Added archive https://web.archive.org/web/20110326103502/http://www.madvulture.de/wp/about to http://www.madvulture.de/wp/about
Cheers.— InternetArchiveBot (Report bug) 15:38, 21 October 2017 (UTC)
Source
* https://web.archive.org/web/20150530223250/https://www.gameswelt.de/gothic-3/news/platz-1-2-der-media-control-charts,84426
* https://web.archive.org/web/20070210035301/http://www.vandal.net/cgi-bin/verreportaje.pl?n=86&p= | WIKI |
Page:Scientific results HMS Challenger vol 18 part 1.djvu/1071
Rh Spines compressed, triangular, gradually tapering towards both ends; outer half a little longer, and much broader than the inner.
Dimensions.—Length of the shell 0.14, breadth 0.12; length of the spines 0.08, basal breadth 0.025.
Habitat.—Central Pacific, Station 274, surface.
Definition.— with forty parmal pores (two on each plate), without dimples and crests, but with numerous by-spines on the surface.
The genus Belonaspis differs from its ancestral genus Thoracaspis only in the possession of numerous superficial by-spines, and bears therefore to it the same relation as Diporaspis does to Dorataspis. The two latter differ from the two former in the spherical form of the central capsule and the enclosing shell, which here becomes ellipsoidal.
1. Belonaspis pandanus, n. sp.
Parmal pores elliptical, three or four times as large as the circular sutural pores. Each plate surrounded by five or six sutural pores (a single one on each side). Spines compressed, triangular; outer part half as long as the inner, and twice as long as the numerous, simple, bristle-shaped by-spines.
Dimensions.—Length of the ellipsoidal shell (or major axis) 0.12, breadth (or minor axis) 0.1; length of the spines 0.03, basal breadth 0.02.
Habitat.—South Pacific, Station 295, surface.
2. Belonaspis furcata, n. sp.
Parmal pores elliptical, twice as broad as the circular sutural pores. Each plate surrounded by five or six sutural pores (a single one on each side). Spines compressed, linear, very thin; outer part longer than the inner. By-spines very numerous, half as long as the radius, furcate, with divergent fork-branches.
Dimensions.—Length of the shell 0.1, breadth 0.08; length of the spines 0.12, breadth 0.003.
Habitat.—Indian Ocean (Cocos Islands), Rabbe, surface.
3. Belonaspis datura, n. sp. (Pl. 139, fig. 9).
Parmal pores elliptical, three or four times as large as the circular sutural pores. Each plate surrounded by ten or twelve sutural pores (two on each side). Spines triangular, two-edged, about | WIKI |
Page:Collier's New Encyclopedia v. 03.djvu/47
COAL for local supply. Of the central area three-fourths are in Illinois, less than one-sixth in Indiana, and about one-twelfth in western Kentucky. In the western field the most extensive mining operations have been carried on in Iowa and Missouri; its area is greater than that of any other one Coal field in the United States. The coals are of great variety; the best which has so far been mined is that of the Indian Territory. The Rocky Mountain Coal beds have have been found in the geological formations from the Carboniferous up to and including the Cretaceous, differing in this respect from those hitherto enumerated, which, with the exception of that in Virginia and North Carolina, are all confined to the Carboniferous. Coal has been mined in the Pacific States.
Coal Mining.—The cutting of a path through the harder rocks, as carried on by the ancient miners, was particularly laborious and unhealthy. Miners became subject to disorders of the lungs at an early age. Previous to the introduction of blasting, the implements used were wedges and hammers. Bit by bit pieces of rock were broken away, the operation being assisted by natural fissures in the rock and by the brittleness of the hard material. In this way the ancient miners cut coffin-shaped galleries 5 feet in height. At the present time the galleries or levels are usually 7½ feet high and 5 feet wide, thus affording facilities for traveling and for ventilation. Gunpowder was not applied to mining purposes until the beginning of the 17th century, and it made its way so slowly that it
was not largely employed until the 18th century. Of late years rock-drills driven by steam or by compressed air have come largely into use. The bore-hole, when finished, is then charged. The gunpowder is inclosed in a little bag of cloth dipped in pitch and provided with a fuse. The fullest benefit of modern explosives, such as dynamite, gun-cotton and yonite, can be obtained only by the use of strong detonators fired by electricity, by which it is impossible to place a number of bore-holes in such a manner that when fired simultaneously they shall help one another. Blasting powder is still used for removing coal and millions of tons are obtained by its aid. In order to obviate the danger of explosions in fiery collieries, many ingenious substitutes for blasting have been proposed. For example, a hole is bored and wedges inserted to force down the Coal which has previously been under-cut with the pick.
Various machines have been invented with a view of lessening the labor and expense of under-cutting coal seams. They work with compressed air or electricity, and have the cutters arranged on the periphery of a rotating disc, or on a traveling pitch chain. The coal, when broken down, is placed in cars and drawn to the bottom of the shaft and raised to the surface. The actual mode of working the coal varies greatly in every district. By the post-and-stall, or board-and-pillar, or (in Scotland) stoop-and-room, method the first stage of excavation is accomplished with the roof sustained by coal; in the long-wall method the whole of the coal is allowed | WIKI |
1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.
Performance : should we make our calculs in templates with xen:calc, or in PHP ?
Discussion in 'XenForo Development Discussions' started by allewreK, Nov 10, 2013.
1. allewreK
allewreK Active Member
Hello,
I need to make a lot of calcs, but I wanted to know what would be the faster way : doing that with xen:calc in templates, or doing the calcs with normal PHP operators in my model/controller ?
Best regards.
2. Chris D
Chris D XenForo Developer Staff Member
It's the same.
XenForo compiles templates containing various bits of xen: syntax and other stuff into a compiled and executable PHP script.
An example is if you create a template (let's call it test_1) with contents:
Code:
{xen:calc '1 + 1'}
That is saved in the xf_template table.
If you check xf_template_compiled table and find the test_1 template:
PHP:
$__output '';
$__output .= (1);
The template compiler has literally taken the xen syntax and converted it into the PHP equivalent:
(1 + 1)
So effectively whether you do the calc in the template or whether you use PHP functions it's the same.
allewreK and Brogan like this.
3. allewreK
allewreK Active Member
Thanks you very much Chris, I wanted to make sur it's the exact same :)
Share This Page | ESSENTIALAI-STEM |
How to Fix Failed to connect to a Windows service Windows 10/11 Error
Windows 10/11 PC depends on services that enable the software to communicate with the hardware. One non-working service is enough to have “failed to connect to a Windows service error message” on Windows 10. If your PC is having multiple service issues then it is not a complicated process to resolve the issue. We have listed all methods that are known to solve “Failed to connect to a Windows service Windows system event notification service” in Windows 10/11 PC.
1. Fix Corrupted Files
Microsoft added an inbuilt tool that allows the administrators to look for corrupted files or misplaced system files in the machine. We installed a copy of the software in the machine and the inbuilt tool detected a few corrupted files & fixed them instantly. In short, Microsoft inbuilt tool works and does come in handy to resolve corrupted system files.
Step 1: Press Windows Key + S and then lookup for CMD or Command Prompt as administrator.
Step 2: Now, copy & paste (sfc /scannow) and then hit enter to start the process.
How to Fix Failed to connect to a Windows service Windows 10/11 Error Fix Corrupted Files - 2
Step 3: You can monitor the scanning period from 0% – 100% and be patient, while the SFC Scan is working in the background.
Fix Corrupted Files - 3
Do not run programs in the background because the inbuilt tool is working behind the scenes.
Step 4: The Microsoft tool could not find violations, which is a good sign.
Fix Corrupted Files - 4
In case, if you have minor errors, then it will fix them immediately. However, we did have a situation, where SFC Scan could not resolve or fix the issue, and forced to install a fresh copy of Windows 10 on the machine.
2. Disable Fast Startup
The fast startup is an innovative method that allows Windows 10 to boot the system at a faster pace, but it can trigger “Failed to connect to a Windows service.” The fast boot sequence doesn’t give the services to launch smoothly, which leaves many services in a non-working state.
Step 1: Go to Control Panel and reach (Control Panel\Hardware and Sound\Power Options) location.
Step 2: Now, click on “Choose what the power buttons does” located at the left side panel.
Disable Fast Startup - 2
Step 3: Now, click on “Change settings that are currently unavailable” to continue.
Disable Fast Startup - 3
Step 4: Untick the “Turn on fast startup (recommended)” and then click on “Save Changes” to complete the process.
Disable Fast Startup - 4
The operating system running SSD doesn’t need this function as the Read / Write speeds are above 300MB per second. We have unselected the feature long back because the machine has M.2 SSD that offers 300MB per second speeds.
3. Reset Winsock
Step 1: Open Command Prompt as an administrator using the search bar.
Step 2: Copy & paste (netsh) and then hit enter.
Reset Winsock - 2
Step 3: Then copy & paste (winsock reset) and then hit enter.
Reset Winsock - 3
Step 4: Close the Command Prompt window and then restart the PC to finish it.
The “failed to connect to a Windows service” error should be resolved by now. Do not skip the restart part as it plays an important role in ending the previous session and clearing the path to the services.
4. Stop One Windows Service
Microsoft added “Windows Font Cache Service” that creates a temporary file called FontCache Dat file, which might be creating the issue. You have to delete the temporary file from the system, and it will resolve the issue instantly.
Step 1: Press Windows Key + S and then type “Services” and run as administrator.
Step 2: A new window will show on the screen with Windows services running, and you have to find “Windows Font Cache Service” among them.
Step 3: Click to select and then mouse-right click for more options and then choose “Properties” to continue.
Stop One Windows Service - 3
Step 4: Stop the service and start the service within a minute, and then click on “OK” to complete the process.
Stop One Windows Service - 4
Close the window, and your Windows PC will no longer suffer from the error.
5. Reinstall Windows 10
Windows 10 Setup
We have installed Windows OS at least 100+ times in one decade because of several reasons. Unfortunately, Microsoft is not able to solve several software-related errors in the upcoming build versions because of the wide range of hardware combinations. In case, if the problem is persisting then you can consider installing a fresh copy of Windows OS on the machine.
Bottom Line
Apply the solutions that we have suggested, and you won’t face the “failed to connect to a Windows service error message” error. You should update the Windows build version to the latest, and 20H2 is a stable version, while the 2004 build version is unstable. Let us know which solution worked for you in the comment section below.
You Might Also Like | ESSENTIALAI-STEM |
Patterns for Evolving Frameworks
By: D. Roberts, R. E. Johnson
Published in: PLoPD3
Pages: 471-486
Category: Frameworks
Summary: A common path that frameworks take.
Url: http://st-www.cs.uiuc.edu/users/droberts/evolve.html
Pattern: Three Examples
Pages: 472-474
To start designing a framework for a particular domain, develop three applications the framework should support.
Pattern: White-Box Frameworks
Pages: 474-476
You're using Three Examples and have started to build your second application. Some frameworks rely heavily on inheritance, others on polymorphic composition. Use inheritance. Build a white-box framework by generalizing from classes in individual applications. Don't worry if the applications don't share any concrete classes.
Pattern: Component Library
Pages: 476-477
You're using White-Box Frameworks and developing the second and subsequent examples. Similar objects must be implemented for each problem the framework solves. To avoid writing similar objects for each instantiation of the framework, start with a simple library of the obvious objects and add additional objects as you need them.
Pattern: Hot Spots
Pages: 478-479
You're using Component Library. As you develop applications based on your framework, you will see similar code. Pree calls these "Hot Spots" [Pree94]. To eliminate this common code, separate code that changes from code that remains stable. The changing code should be encapsulated in objects. Variation can then be achieved by composing the desired objects rather than creating subclasses and writing methods.
Pattern: Pluggable Objects
Pages: 479-480
You're using Component Library. Most of the subclasses you've written differ in trivial ways--for example, only one method is overridden. To avoid creating trivial subclasses when you use the framework, design adaptable subclasses to parameterize with messages to send, for example, indexes to access, blocks to evaluate, whatever distinguishes the subclasses.
Pattern: Fine-Grained Objects
Pages: 481-482
You're using Component Library, and refactoring components to make them more reusable. Continue dividing objects until you would produce objects that have no meaning in the problem domain.
Pattern: Black-Box Framework
Pages: 482-483
You're using Pluggable Objects, Hot Spots, and Fine-Grained Objects. Some frameworks rely heavily on inheritance, others on polymorphic composition. Use inheritance to organize your component library and composition to combine components in applications. When it isn't clear which is better, favor composition.
Pattern: Visual Builder
Pages: 483-485
You're using Black-Box Framework and can make an application by connecting objects. A single application comprises two parts: (1) the script that connects the objects of the framework and turns them on and (2) the behavior of the objects. The connection script is usually similar for each application, but the specific objects are different. To simplify the creation of these scripts, create a graphical program that lets you specify the objects in your application and how they are connected. The program should generate code for an application from these specifications.
Pattern: Language Tools
Pages: 485-486
You're using Visual Builder. The program creates complex composite objects. To inspect and debug these, create specialized inspecting and debugging tools. | ESSENTIALAI-STEM |
List of Argentine deputies, 2009–2011
This is list of members of the Argentine Chamber of Deputies from 10 December 2009 to 9 December 2011.
By political groups
* as of 9 December 2011 | WIKI |
Thorium processing
Thorium processing, preparation of the ore for use in various products.
Thorium (Th) is a dense (11.7 grams per cubic centimetre) silvery metal that is softer than steel. It has a high melting temperature of approximately 1,750 °C (3,180 °F). Below about 1,360 °C (2,480 °F), the metal exists in the face-centred cubic (fcc) crystalline form; at higher temperatures up to its melting point, it takes on the body-centred cubic (bcc) form. Finely divided thorium metal will burn in air, but the massive metal is stable in air at ordinary temperatures (although it will react with oxygen to form a surface tarnish after prolonged exposure). Because of its reactivity, it is extracted from minerals only with difficulty.
Almost all thorium found in nature is the isotope thorium-232 (several other isotopes exist in trace amounts or can be produced synthetically). This slightly radioactive material is not fissile itself, but it can be transformed in a nuclear reactor to the fissile uranium-233. Since thorium is present in the Earth’s crust in about three times the quantity of uranium, its fertile quality represents a virtually unlimited source of nuclear energy. In order for this theoretical value to be realized, however, the barriers of costly extraction and conversion techniques would have to be overcome.
History
The Swedish chemist Jöns Jacob Berzelius discovered thorium in 1828, successfully isolating the metal from the silicate mineral now known as thorite. The name thorium originates from Thor, the Germanic war god. After the development of the incandescent gas mantle by Carl Auer, Baron von Welsbach, in the 1880s, thorium came into extensive demand and use, but, when electric power became generally available after 1920, worldwide utilization of thorium gas mantles sharply declined.
In the early 1950s Spedding and his associates at the Ames (Iowa) Laboratory of the U.S. Atomic Energy Commission developed a practicable and efficient method for large-scale preparation of thorium metal. The Spedding procedure involves reduction of mixtures of zinc halides and thorium tetrafluoride with calcium metal.
Ores
The major commercial source of thorium is monazite, an anhydrous rare earth phosphate with the chemical formula (Ce,La,Nd,Th)PO4. Typically, 3 to 5 percent of the metal content of monazite is thorium (in the form of thorium dioxide, ThO2). Much of the world’s current demand for thorium metal and its compounds is satisfied by mining placers along India’s Malabar Coast, where wave action deposits monazite as a coarse yellow-to-brown sand on beaches. Other ores of thorium are the oxide mineral thorianite (ThO2) and the silicate mineral thorite (ThSiO4); these are not commercially mined.
Mining and concentrating
Monazite beach sands are readily mined with conventional placer mining equipment and procedures. The dredged monazite is admixed with a variety of other minerals, including silica, magnetite, ilmenite, zircon, and garnet. Concentration is accomplished by washing out lighter minerals in shaking tables and passing the resulting monazite fraction through a series of electromagnetic separators, which separate monazite from other minerals by virtue of their different magnetic permeabilities.
Extraction and refining
Acidic and alkaline digestion
Although monazite is very stable chemically, it is susceptible to attack by both strong mineral acids (e.g., sulfuric acid, H2SO4) and alkalies (e.g., sodium hydroxide, NaOH). In the acid treatment, finely ground monazite sand is digested at 155 to 230 °C (310 to 445 °F) with highly concentrated (93 percent) H2SO4. This converts both the phosphate and the metal content of the monazite to water-soluble species. The resulting solution is contacted with aqueous ammonia, first precipitating hydrated thorium phosphate as a gelatinous mass and then metathesizing the thorium phosphate to thorium hydroxide. Finally, the crude thorium hydroxide is dissolved in nitric acid to produce a thorium nitrate-containing feed solution suitable for final purification by solvent extraction (see below).
In alkaline digestion, finely ground monazite sand is carefully treated with a concentrated NaOH solution at 138 °C (280 °F) to produce a solid hydroxide product. Any one of several mineral acids is then used to dissolve this solid residue. For example, treatment with hydrochloric acid yields a solution of thorium and rare earth chlorides. Conventionally, thorium is partially separated from the rare earths by addition of NaOH to the acidic chloride solution. The crude thorium hydroxide precipitate is then dissolved in nitric acid for final purification by solvent extraction.
Solvent extraction
For the purification of thorium from residual rare earths and other contaminants present in nitric acid feed solutions, the crude thorium nitrate concentrate is usually contacted with a solution of tributyl phosphate diluted by a suitable hydrocarbon. The resulting organic extract, containing the thorium (and any uranium that may be present), is then contacted countercurrently with a small volume of nitric acid solution in order to remove contaminating rare earths and other metallic impurities to acceptable levels. Finally, the scrubbed tributyl phosphate solution is contacted with a dilute nitric acid solution; this removes, or strips, thorium from the organic solvent into the aqueous solution while retaining uranium (if present) in the organic phase. Thermal concentration of the purified thorium nitrate solution yields a product suitable for the fabrication of gas mantles (see below Chemical compounds). The nitrate can also be calcined to ThO2, which is incorporated into ceramic fuel elements for nuclear reactors or is converted to thorium metal.
Reduction to the metal
Powdered ThO2 can be fluorinated with gaseous hydrogen fluoride (HF), yielding thorium tetrafluoride (ThF4). The metal is obtained by the Spedding process, in which powdered ThF4 is mixed with finely divided calcium (Ca) and a zinc halide (either zinc chloride or zinc fluoride) and placed in a sealed, refractory-lined “bomb.” Upon heating to approximately 650 °C (1,200 °F), an exothermic reaction ensues that reduces the thorium and zinc to metal and produces a slag of calcium chloride or calcium fluoride:
Chemical equations.
After solidification, the zinc-thorium alloy product is heated above the boiling point of zinc (907 °C, or 1,665 °F) but below the melting temperature of thorium. This evaporates the zinc and leaves a highly purified thorium sponge, which is melted and cast into ingots.
Conversion to uranium-233
When bombarded by thermalized neutrons (usually released by the fission of uranium-235 in a nuclear reactor), thorium-232 is converted to thorium-233. This isotope decays to protactinium-233, which in turn decays to uranium-233:
Depiction of the steps taken in the transition of thorium-232 into uranium-233.
The fissile properties of uranium-233 can be utilized immediately or after recovery from the irradiated reactor fuel.
Uranium-233 can be recovered and purified from neutron-irradiated thorium reactor fuels through the thorium extraction, or Thorex, process, which employs tributyl phosphate extraction chemistry. Irradiated fuel, containing either thorium metal or oxide, is dissolved in nitric acid containing a small amount of fluoride ion. Uranium-233 and thorium are coextracted into a tributyl phosphate solution, which is then contacted with an aluminum nitrate solution to remove traces of accompanying fission products. Dilute nitric acid is used to preferentially remove thorium from the scrubbed organic phase. Uranium-233 remaining in the tributyl phosphate solvent is stripped into acidified water; the resulting strip solution is passed through an ion-exchange resin bed in order to concentrate and purify the uranium-233.
The metal and its alloys
Thorium is reported to alloy readily with many elements, including aluminum, beryllium, bismuth, boron, cobalt, copper, gold, iron, lead, magnesium, mercury, molybdenum, nickel, platinum, selenium, silver, sodium, tantalum, tungsten, and zinc. Some thorium is alloyed with magnesium metal to produce a material of increased high-temperature strength.
Chemical compounds
Thorium nitrate
Aqueous solutions of highly purified thorium nitrate, Th(NO3)4, are produced when thorium ores are processed (see above Extraction and refining). The nitrate is extensively used in the commercial production of gas mantles. Such mantles are made by impregnating cotton or synthetic fibres with a 25 to 50 percent solution of Th(NO3)4 containing 0.5 to 1 percent each of thorium sulfate and cerous nitrate. The impregnated fibres are treated with aqueous ammonia, producing thorium hydroxide, Th(OH)4, and this compound is calcined to produce ThO2. The latter substance, when heated, emits brilliant white light. The added cerous nitrate improves spectral emission properties, while the small amounts of thorium sulfate yield mantles with improved mechanical properties.
Thorium dioxide
The only other thorium compound of any industrial significance is ThO2, known as thoria. For nuclear applications, thoria is prepared by calcination of thoroughly purified Th(NO3)4. Thoria also finds some application as a refractory material in various high-temperature processes.
Wallace W. Schulz
Learn More in these related Britannica articles:
Edit Mode
Thorium processing
Tips For Editing
We welcome suggested improvements to any of our articles. You can make it easier for us to review and, hopefully, publish your contribution by keeping a few points in mind.
1. Encyclopædia Britannica articles are written in a neutral objective tone for a general audience.
2. You may find it helpful to search within the site to see how similar or related subjects are covered.
3. Any text you add should be original, not copied from other sources.
4. At the bottom of the article, feel free to list any sources that support your changes, so that we can fully understand their context. (Internet URLs are the best.)
Your contribution may be further edited by our staff, and its publication is subject to our final approval. Unfortunately, our editorial approach may not be able to accommodate all contributions.
Thank You for Your Contribution!
Our editors will review what you've submitted, and if it meets our criteria, we'll add it to the article.
Please note that our editors may make some formatting changes or correct spelling or grammatical errors, and may also contact you if any clarifications are needed.
Uh Oh
There was a problem with your submission. Please try again later.
Keep Exploring Britannica
Email this page
× | ESSENTIALAI-STEM |
2020 Western Storm season
The 2020 season saw Western Storm compete in the new 50 over Rachael Heyhoe Flint Trophy following reforms to the structure of women's domestic cricket in England. The side finished second in the South Group of the competition, winning 4 of their 6 games, failing to progress to the final.
After the ending of the Women's Cricket Super League in 2019, the ECB announced the beginning of a new "women's elite domestic structure". Eight teams were included in this new structure, with Western Storm being one of two teams that had their brand retained as a domestic regional hub. Due to the impact of the COVID-19 pandemic, only the Rachael Heyhoe Flint Trophy was able to take place. Western Storm were captained by Sophie Luff and coached by Mark O'Leary, and played all of their home matches at the County Ground, Bristol.
Squad
Western Storm confirmed their full 17-player squad for the season on 28 August 2020. Age given is at the start of Western Storm's first match of the season (29 August 2020).
South Group
Advanced to the Final. | WIKI |
Wikipedia:Miscellany for deletion/User:AlexTylersMail/Sandbox
__NOINDEX__
The result of the discussion was: speedy delete. WP:CSD applies here in the context of the user's clear WP:NOTHERE. Mz7 (talk) 23:52, 1 July 2018 (UTC)
User:AlexTylersMail/Sandbox
Probable hoax. See also User:AlexTylersMail/sandbox and User:AT125110/sandbox which are the same. Adam9007 (talk) 00:06, 1 July 2018 (UTC)
* Delete as created by blocked sockpuppet. Robert McClenon (talk) 03:50, 1 July 2018 (UTC)
* Delete per Rob. – Davey 2010 Talk 21:29, 1 July 2018 (UTC)
| WIKI |
iOS Question Best practice when "pausing" geofences?
Sandman
Expert
Licensed User
Longtime User
Let's say I have defined ten geofences in my app, and all is working fine.
Now the user wants to pause the detection for a period, lets say 24 hours. What is the best practice to "pause" the fences, and make sure they "activate" again in 24 hours?
I've managed to find two strategies, but I'm not really sure which is best. Plus I might have missed some other solution.
Alternative 1: Delete and schedule
- Delete the geofences
- Schedule a local notification for 24 hours ("The 24 hours has passed, press here to start the geofences again")
- When user taps notification, restore the geofences
Arguments FOR: Less battery use, simple for user to prolong the 24 hours (by not tapping notification)
Arguments AGAINST: User might not tap notification - so geofences might not get activated again
Alternative 2: Stay active but silent
- Keep the geofences and get events
- Don't act on them for 24 hours
Arguments FOR: Guaranteed to work again after 24 hours
Arguments AGAINST: More battery use (probably not a big issue)
Thoughts?
DonManfred
Expert
Licensed User
Longtime User
Arguments AGAINST: User might not tap notification - so geofences might not get activated again
use a service. Schedule it to run in 24 hours. when the service starts, restore the Geofences. No need for a notification. No need to run your app all the time.
Pros: nearly zero batteryuse as your app is doing nothing.
Note not to use the Starter Service for this. Use any other Service. Maybe a dummy one "RestoreGeoFences"....
With this additions i would use Plan A.
PD: Sorry, didn´t saw it is a B4i question but i guess it should work like this in B4i too ;-)
Upvote 0
Top | ESSENTIALAI-STEM |
Why Aren't You Rich?
Why Aren't You Rich?
Maybe you already are. Good for you. Most investors aren't. They're still waiting for the big pay off. The problem is that most of them don't understand that there are several ways to be rich. Here are three ways to get yours.
For most people it takes a long time to gather enough wealth to feel comfortable, a great way to define rich. It takes years of saving, investing, and sacrificing for future rewards. It's not easily done, but if done correctly, it will pay off.
Done correctly means: conservative investing, always taking the more solid investment over speculative ones. It means dividends as well as capital gains. It means diversity over many industries with holdings of only the strongest companies. It means owning stocks that have ever increasing earnings, no matter what the economy does. It means being patient, riding out the shocks that life brings, knowing that eventually there is a natural human instinct that wants a better life. That means improving one's home or car or wardrobe or boat or any other thing that makes an individual happy. When that spending occurs, businesses thrive, profits go up, stocks increase in value. Human nature is a powerful force.
So that's the prescription for people who want to be rich after several decades of investing. But it's not the only way to be rich. The next way is much more typical of young people who have more money than most or older people who have more money than most. Their secret is this: they took a large gamble and won.
By that I mean they focused on one investment and didn't waver. For Warrnet Buffett, one of his first and largest investments was Geico Insurance. He bought millions of shares and very little else. He didn't diversify his holdings. He simply did his homework, saw what a great bargain the stock was, how well managed the company was, and bought all the shares he could afford. He did the same thing with Washington Post. If you look at his portfolio of stocks now, it isn't all that large. With the billions he invests you would expect many hundreds of different stocks. But that isn't his way. He believes in finding great stocks (and there are few of those) and buying as much as he can, then being patient.
Or look at Donald Trump (well, don't look at him because that hair is a little too much). He's another example of extreme wealth provided by an intense focus. In his case it was real estate. Initially only New York real estate. Of course, he had a great start from his inheritance, but he built on it, leveraged it, and became more knowledgable about Manhattan than any other investor. He's not successful because he's lucky. He's been successful because he's focused, took a gamble and won. More examples: Bill Gates (MSFT), Larry Ellison (ORCL), T. Boone Pickens (oil and natural gas), the Walton family (father Sam focused on retailing), Larry Page (Goog), Sheldon Adelson (gaming), Michael Dell (Dell). Forbes lists 400 of them each year. Every one has been focused on a specialized investment.
Many investors have taken lots of gambles, and they're still poor. That's because they didn't do their homework well enough, or they weren't patient enough, or in the case of real estate, didn't add enough value to a property to warrant a higher price. For stock investors, that first mistake (not doing enough investigating) is the most common.
They hear a hot tip from a tv or radio head screaming about the newest, greatest, best ever company and immediately buy it, never look it up or analyze it. They simply buy something and hope. That's not the way to get rich. It's the way to get poor. Doing due diligence is required. It's what you don't know that will kill you in investing. If you don't understand your investments, you can't make the right decisions as to when to buy or when to sell.
That's two ways of being rich: the slow and the fast ways. The third way is maybe the best. It has to do with being grateful for what you have, every day, feeling the riches that we all share in the United States. It's a feeling you can have, no matter how much money you have or how much money you owe.
It doesn't mean you don't strive to have a better life, as you define it. In fact, getting rich doesn't mean you want things. It may mean you want more money to give to others, maybe one of the best feelings there is. It may mean you can help your relatives or best friend. Or it may mean you can finally buy a new car, or a good used one.
Whatever your goals, being rich makes it easier to attain them. And if you keep your goals well within your income level, you'll always feel rich. But if you want to short cut the process, hit the jackpot early, you have to take risks and be ready to reap the rewards or suffer the catastrophes. Or you can take it nice and slow, be grateful for what you have, and work hard for your goals. Then you can feel very, very rich indeed. Every day.
- Ted Allrich
October 5, 2010
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
How do you use GameShark codes on Android?
Entering and Activating Pokemon GameShark Codes for MyBoy Step 2: In your MyBoy menu, select “Cheats” and tap on “New Cheat”. Step 3: Tap on “Cheat name” and enter the desired name of your cheat. Just leave “Cheat type” empty and tap on “Cheat code”, enter the GameShark codes and finally tap on “OK”.
Do Android games have cheat codes?
Unfortunately, NO. Unlike old games, most Android games don’t have cheat codes.
How do I use cheats on ePSXE Android?
ePSXE Android: How To Use Cheats In PlayStation [PS1/PSX] Games
1. Tap Download. Wait till you see “Cheat Codes downloaded”.
2. Now again go to ‘Cheat code’ option and see the complete list here.
3. There is a checkbox in front of every cheat, put a check on it then tap ‘Apply’.
How do I enter cheat codes?
To enter Cheat Codes in The Sims 4, you must first open the Cheat Console by pressing “Ctrl + Shift + C” on your PC or Mac, while in game. This will bring up the cheat dialogue box where you can enter cheats. Don’t forget to press “Enter” after typing in a cheat.”
Do mobile games have cheats?
Mobile Game Hacks exist on all platforms (iOS, Android, Windows ect) is possible, but requires a rooted or jailbroken phone, which comes with risks. There are modded apps (mods), bots, scripts, hacks, memory editors, exploits and other ways of cheating.
Can you use GameShark codes on epsxe?
ePSXe supports GameShark cheat codes. You can download the cheat codes from our server with the Download button on cheatcode option during gameplay or create your own file. In the second case, you can load cheat codes in the emulator creating a file called “sdcard/epsxe/cheats/SXXX_XXX.
How can I enter codes in my GameShark?
Entering and Activating Pokemon GameShark Codes for MyBoy Select your best Gameshark code cheat, for FireRed you may choose from our Pokemon FireRed Gameshark codes In your MyBoy menu, select “Cheats” and tap on “New Cheat”. Tap on “Cheat name” and enter the desired name of your cheat.
How do you use GameShark codes?
and this article will contain some examples.
• Save the codes you want to use. . Copy and paste the codes into a document and label each code so that you know what each code does.
• Enter the cheats into your emulator. .
• Activate the cheat codes. .
• What are GameShark codes for Fire Emblem the Sacred Stones?
Fire Emblem: The Sacred Stones Gameshark Master Code. C79A4E9F B8570C09. DCFB3266 ACD91EED. Control Enemy Units: 0B09718C 311D9EB3. Enemy Phase repeats. Control Neutral Units: 586D63CB 87739569. Neutral Phase repeats. Play Phase Repeats: 5CE80970 841F28B9. Like the ‘Control’ codes above.
What is the GameShark code for Master Balls?
The Pokémon Emerald Master Ball cheat GameShark code still works and you can get your Emerald Master Ball with ease. The list of GameShark Pokémon Master Ball cheat codes below has been tested and still works very well. 8CEB681A. All you have to do is activate the code, go to the PokéMart, and then get a Master Ball for free. | ESSENTIALAI-STEM |
User:Gatroe/sandbox
ERGO (ERGO Insurance Group, ERGO Versicherungsgruppe) is one of the major insurance groups in Europe. Worldwide, ERGO is represented in more than 30 countries and concentrates on Europe and Asia. In Europe, ERGO claims to be no. 1 in the health and legal expenses insurance segments, and in its home market of Germany it is among the market leaders. 50 000 people work full-time for the Group, either as salaried employees or as self-employed sales representatives.
With premium income amounting to €19bn, ERGO offers different types of insurance and other services. 40 million customers – of which 20 million in Germany – currently buy the services provided by ERGO and its companies.
History
Legal expense insurance originates from the sports car endurance race, “24 Heures de Man” (24 hours of Le Mans), in the early 1920s. The event resulted in a number of accidents over the years with complicated legal disputes against the drivers and their insurers. In response, “Defence Automobile et Sportive” developed a unique product to cover accidents, theft and fire. This concept soon spread throughout Europe.
DAS became independent from its founder, changing its name to German Automobil Protection (Deutscher Automobil Schutz) and moved its head office to Munich after World War Two. In the 1950s, there was a demand for specialised advice and assistance due to the increase of accidents occurring from the influx of travellers visiting Europe who had different legal systems and language barriers. Other subsidiaries were soon set up in Austria, Spain, Italy, The Netherlands, Greece & Luxembourg. UK DAS Legal Expense Insurance was established in 1975 when the German D.A.S. company partnered with Phoenix Assurance (formerly Royal & Sun Alliance Company). DAS UK is now owned outright by D.A.S. Germany (/ D.A.S.) after purchasing the Sun Alliance Shareholding in 1989.
Structure
DAS head office is in Bristol with regional sales offices in London & Manchester. DAS has a dedicated claims office in Bedwas, South Wales that handles motor and high net worth business. DAS UK is part of a wider international group of DAS companies and is owned by D.A.S. Germany (/ D.A.S.). Ergo Insurance Group (ERGO Insurance Group) is the parent company of DAS Group. The majority shareholder in Ergo Insurance Group is Munich Re Group (Munich Re), one of the world’s largest re-insurer.
DAS UK is structured by a network of subsidiary companies, as there are:
DAS Ireland is a wholly owned subsidiary of DAS UK offering a product portfolio based on the UK proposition. Their head office is based in Dublin. DAS Canada is part of the DAS Group. The product suite offering includes drive, living, business and group protection. The head office is based in Toronto and their regional sales office is based in Vancouver. DAS Group purchased online legal services company, Everything Legal Limited (ELL) at the end of 2011. ELL, originally called Claims Financial handled claims against banks & lenders on behalf of those who were mis-sold payment protection. In 2010, they acquired legal advice website Law on the Web (www.lawontheweb.co.uk) from Solicitor, Martin Davis, along with over 100 microsites that deal with specific areas of the law. Features and services include a Find a Solicitor service, comprehensive directories and a collection of free legal documents. After being granted an alternative business structure (ABS), DAS acquired CW Law, a Bristol law firm and launched DAS Law in April 2013.
The move enabled the DAS Group to be a significant provider of legal services and legal protection insurer. The portfolio of products ranges from employment and personal injury claims to legal advice. The MD is Kathryn Mortimer, Head of Legal Services for the DAS UK Group. In 2014 they aim to expand functionalities and launch life service products in 2014.
Products
DAS is a specialist insurance and legal service company. DAS underwrites and sells legal expenses designed for individuals and families as well as small and large businesses. Policies underwritten by DAS are sold to insurance companies and brokers and are then sold onto the public.
Product structure is broken down into:
* Legal expense insurance: family, commercial legal protection, property let, group, marine, travel, and motor ULR & accident management.
* Assistance class insurance: home emergency, motor breakdown, licence assist and loss assist.
* Supporting assistance services: Helplines that include counselling, legal advice, tax advice, health and medical advice. Assistance services included. | WIKI |
US import prices rose 0.5% in April, vs 0.2% increase expected
U.S. import prices increased more than expected in April amid rising costs for petroleum products and a range of other goods, which could help boost domestic inflation. The Labor Department said on Wednesday that import prices jumped 0.5 percent last month after an upwardly revised 0.1 percent gain in March. Import prices have now increased for five straight months. Economists polled by Reuters had forecast import prices increasing 0.2 percent in April after a previously reported 0.2 percent drop in March. In the 12 months through April, import prices rose 4.1 percent, slowing from March's 4.3 percent increase. Import prices shot up 4.7 percent on a year-on-year basis in February, the biggest gain in five years. In April, prices for imported petroleum rebounded 1.6 percent after declining 0.4 percent in March. Import prices excluding petroleum gained 0.4 percent, the biggest increase since July 2016, after edging up 0.1 percent in the prior month. Import prices excluding petroleum have now increased for four straight months, in part reflecting an ebb in the U.S. dollar's rally. Import prices excluding petroleum rose 1.4 percent in the 12 months through April, the largest increase since March 2012. The steady rise in underlying import prices could over time put upward pressure on consumer inflation. Prices for imported capital goods nudged up 0.1 percent, rising for a third straight month. The cost of imported motor vehicles surged 0.5 percent, the biggest gain since April 2012. Prices for imported consumer goods prices excluding automobiles rose 0.1 percent, while the cost of imported food increased 0.3 percent. The report also showed export prices increased 0.2 percent in April after rising 0.1 percent in March. Export prices rose 3.0 percent year-on-year after increasing 3.4 percent in March. Prices for agricultural exports advanced 0.3 percent last month as a 37.9 percent jump in vegetable prices offset falling prices for soybeans, corn and wheat. | NEWS-MULTISOURCE |
Ounces to Kilograms Converter
Ounces to kilograms converter. 1 Kilogram is equal to 35.27396195 ounces.
conversion table ←→
oz 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 250 500 750 1000
kg 0.02834952 0.05669905 0.08504857 0.11339809 0.14174762 0.17009714 0.19844666 0.22679618 0.25514571 0.28349523 0.31184475 0.34019428 0.3685438 0.39689332 0.42524285 0.45359237 0.48194189 0.51029142 0.53864094 0.56699046 0.59533999 0.62368951 0.65203903 0.68038855 0.70873808 0.7370876 0.76543712 0.79378665 0.82213617 0.85048569 0.87883522 0.90718474 0.93553426 0.96388379 0.99223331 1.02058283 1.04893235 1.07728188 1.1056314 1.13398092 1.16233045 1.19067997 1.21902949 1.24737902 1.27572854 1.30407806 1.33242759 1.36077711 1.38912663 1.41747616 1.44582568 1.4741752 1.50252472 1.53087425 1.55922377 1.58757329 1.61592282 1.64427234 1.67262186 1.70097139 1.72932091 1.75767043 1.78601996 1.81436948 1.842719 1.87106852 1.89941805 1.92776757 1.95611709 1.98446662 2.01281614 2.04116566 2.06951519 2.09786471 2.12621423 2.15456376 2.18291328 2.2112628 2.23961232 2.26796185 2.29631137 2.32466089 2.35301042 2.38135994 2.40970946 2.43805899 2.46640851 2.49475803 2.52310756 2.55145708 2.5798066 2.60815613 2.63650565 2.66485517 2.69320469 2.72155422 2.74990374 2.77825326 2.80660279 2.83495231 7.08738078 14.17476155 21.26214233 28.3495231
Round:
Ounces:
Kilograms:
The ounces to kilograms converter is a simple tool to convert from ounces to kilograms. It works by taking the input value in ounces and applying the conversion factor of 0.0283495231 kilogram per ounce. The converter calculates the equivalent weight in kilograms and displays the result instantly.
Below, you will find information on how many kilograms are in an ounce and how to accurately convert ounces to kilograms and vice versa.
How to convert ounces to kilograms?
1 Ounce is equal to 0.0283495231 kilogram. To convert ounces to kilograms, multiply the ounce value by 0.0283495231 or divide by 35.27396195.
For example, to convert 8 ounces to kilograms, you can use the following formula:
kilogram = ounce / 35.27396195
divide 8 by 35.27396195:
kilogram = 8 / 35.27396195 = 0.227
Therefore, 8 ounces equal to 0.227 kilogram.
Using the simple formulas below, you can easily convert ounces to kilograms.
ounces to kilograms conversion formula:
kg = ounce * 0.0283495231
kg = ounce / 35.27396195
How to convert kilograms to ounces?
1 Kilogram is equal to 35.27396195 ounces. To convert kilograms to ounces, multiply the kilogram value by 35.27396195.
For example, to convert 2 kilograms to ounces, you can use the following formula:
ounce = kilogram * 35.27396195
multiply 2 by 35.27396195:
ounce = 2 * 35.27396195 = 70.548
Therefore, 2 kilograms equal to 70.548 ounces.
Using the simple formula below, you can easily convert kilograms to ounces.
kilograms to ounces conversion formula:
ounce = kg * 35.27396195
To convert kilograms to pounds and ounces, please visit kilograms to pounds and ounces.
What is an Ounce?
Ounce is an imperial and United States Customary measurement systems mass unit. 1 Ounce = 0.0283495231 Kilogram. The symbol is "oz".
What is a Kilogram?
Kilogram is a metric system mass unit. 1 Kilogram = 35.27396195 Ounces. The symbol is "kg".
You may also visit weight and mass conversion to convert all weight and mass units.
Below, you have the option to create your own customized ounces to kilograms conversion table to meet your specific needs. This feature allows you to set the starting value, choose the increments between each entry, and select the desired level of accuracy. By tailoring the ounces to kilograms table according to your preferences, you can generate precise and personalized conversion results.
Create Conversion Table
Click "Create Table". Enter a "Start" value (5, 100 etc). Select an "Increment" value (0.01, 5 etc) and select "Accuracy" to round the result. | ESSENTIALAI-STEM |
Huc-Mazelet Luquiens
Huc-Mazelet Luquiens (1881–1961) was an American printmaker, painter and art educator who was born June 30, 1881, in Massachusetts to Jules Luquiens a French-speaking Swiss and Emma Clark who was born in Ohio.
Life
He graduated from Yale University where he received training in art, earning both a bachelor of arts and master of fine arts degrees. At Yale, he served on the editorial board of and contributed illustrations to campus humor magazine The Yale Record. After Yale, he continued his studies in Paris at the École Nationale Supérieure des Beaux-Arts and at the Académie Julian. In New England, Luquiens focused his etchings on portraiture and architectural. In search of portrait commissions, he came to Hawaii in 1917 to visit his sister, who had married into the Judd family. The island landscapes proved irresistible, and Luquiens produced numerous studies. He is known for naming the Volcano School of Hawaiian painting the 'Little Hawaiian Renaissance'. After teaching at the Punahou School for some years, he was hired as the first teacher of art at the University of Hawaii where he is credited with the formation of the department and served as its chair from 1936 to 1945. Among the instructors who joined him were Ben Norris, Henry H. Rempel, Millard Sheets and Frederik Taubes. Norris calls Luquiens “the dean of Hawaiian artists of his generation and its professional leader in a very real way.” During his life, Luquiens was extremely active in community affairs concerning nature and art. He co-founded the organization, Honolulu Printmakers, which continues today. Huc-Mazelet Luquiens died in Honolulu in 1961.
Although best known for his small intaglio prints (such as Banyan - Study), he also painted in oils (such as Manoa Valley from Round Top). The Bishop Museum (Honolulu, Hawaii), the Butler Institute of American Art (Youngstown, Ohio), the Fine Arts Museums of San Francisco, the Hawaii State Art Museum, the Honolulu Museum of Art, the Isaacs Art Center (Waimea, Hawaii), the Nelson-Atkins Museum of Art (Kansas City, Missouri), the Hilo Art Museum (Hilo, Hawaii), the Isaacs Art Center (Waimea, Hawaii), and the Yale University Art Gallery are among the public collections holding prints by Huc-Mazelet Luquiens. | WIKI |
Return to Sender (song)
"Return to Sender" is a song recorded by American singer Elvis Presley and featured in the film Girls! Girls! Girls!. The song was written by Winfield Scott and Otis Blackwell to suit Presley's rock and roll musical style. The singer laments his relationship with a spiteful partner. Released on October 2, 1962, and published by Elvis Presley Music, the song became a commercial hit and received praise for its lyricism and melody.
The song peaked at number one on the UK Singles Chart, and was the UK Christmas number one in 1962. It was also the first Christmas number one in the Irish Singles Chart. In the United States, "Return to Sender" reached No. 2 on the American Billboard singles chart, kept out of the top spot by The Four Seasons' "Big Girls Don't Cry." However, the song reached No. 1 on the rival Cash Box and Music Vendor singles charts. "Return to Sender" also went to No. 5 on the R&B charts. The single was certified platinum by the RIAA for sales in excess of one million units in the US.
Background and recording
Songwriter Otis Blackwell had already written several of Presley’s biggest hits, including "Don't Be Cruel" (1956) and "All Shook Up" (1957). Winfield Scott was a frequent collaborator with Blackwell, and writer of the hit song “Tweedle Dee” (1954). So it was logical for Freddy Bienstock, vice president of the record company Hill & Range, to turn to Blackwell and Scott to write songs for Presley's films, and for the Presley vehicle Girls! Girls! Girls! (1962) specifically. Following the # 5 pop hit of Presley's pop ballad "She's Not You" (1962), the record company wanted him to return to the rock and roll genre without alienating fans who enjoyed his crooning.
Scripts for Presley films would note places where a song was to be inserted into the film as well as suggested titles and genres for the songs. While other songwriters would adhere to those notes, Blackwell and Scott would not, because they were used to the creative freedom of the rhythm and blues field. They decided to write a great song without any concern about whether fitted into the film's storyline. After penning a track about fishing, entitled "Coming in Loaded", as well as other material they disliked, the two gave up on writing other songs until they found inspiration in a returned piece of mail. A demo that they had sent to a record company was returned to them with the words "Return to sender! No such person! No such zone!" stamped onto it. Blackwell and Scott decided to use those phrases as lyrics in a song about a failing relationship between "a spiteful woman and a heartbroken man".
Within only nine months of its release, it was the use of the word "zone" that became an anachronism when the USPOD or United States Post Office Department (the forerunner of the United States Postal Service) replaced all zones in 1963 with the nationwide rollout of ZIP Codes, thus making the song seem dated before its time, although 60 plus years later it is less of a footnote and an accepted part of the song, assumed to be used for rhyming purposes.
Recording and composition
On March 27, 1962, Presley was handed the task of recording all thirteen songs on the Girls! Girls! Girls! soundtrack. He was unenthusiastic about the material and went through the recording process at a quickened pace. The Jordanaires, Dudley Brooks, D. J. Fontana, and Scotty Moore were in the studio, and other instrumentation on the album was provided by Boots Randolph on saxophone, Ray Siegel on bass guitar, Barney Kessel and Tiny Timbrell on guitar, and Hal Blaine and Bernie Mattinson on specialty drums. When he began singing "Return to Sender," Presley became more energetic. He found the song easy to perform and recorded it in just two takes, modelling his vocal stylings on Blackwell's. While watching Presley perform the track, Moore and Fontana felt that the "old magic" of the singer's earlier work had returned.
"Return to Sender" is a pop and rock and roll song with a length of two minutes and nine seconds, and an up-tempo, "gently rock[ing]" beat. Per Presley's decision, the lead instrument of the song's chorus is Randolph's saxophone rather than a guitar, which was more characteristic of Presley's music. According to Ace Collins in Untold Gold: The Stories Behind Elvis's #1 Hits, the track "recaptured the happy enthusiasm and unbridled joy" of the rock and roll music of the mid-1950s. The song is about a heartbroken man whose mail to his lover is always returned unopened. Collins also noted a contrast between the song's joyful instrumentation and its lyrics, which are those of a "woeful ballad".
Critical reception
NME said that "Return to Sender" and another song penned by Blackwell, Jerry Lee Lewis' "Great Balls of Fire" (1957), stand as "some of the most enduring classics in the rock and roll canon". In his book Untold Gold: The Stories Behind Elvis's #1 Hits, Ace Collins claims that while Blackwell wrote hits like Lewis' "Breathless" (1958) and "Fever" by Peggy Lee (1958), and influenced artists like Presley and Stevie Wonder, "it is doubtful that he ever wrote anything quite as innovative as 'Return to Sender'." Thomas Ward of AllMusic praised the song's lyrics, production, and melody, as well as Presley's vocal performance. Ward concluded his review by saying that "Although 'Return To Sender' is not a huge artistic triumph, it's a great pop song that still sounds good to modern audiences".
Legacy
Gerri Granger later recorded an answer song: "Don't Want Your Letters". The song was arranged and conducted by Bert Keyes, and was released on the single Big Top 45–3128.
"Return to Sender" came back into vogue in 1993 when the U.S. Postal Service issued a commemorative postage stamp honoring Presley on what would have been his 58th birthday. Fans mailed envelopes franked with first-day issues of this stamp to fictitious addresses so that they would receive their letters back, marked with the words "return to sender".
The phrase "Return to Sender" was engraved on the coffin of Freddie Starr, a comedian and Elvis impersonator. | WIKI |
Page:A record of European armour and arms through seven centuries (Volume 1).djvu/39
without intermission. The progress and perfecting of various forms of armour and weapons had also on more than one occasion a considerable influence on the fate of peoples and the making of history. The longbow of the English in the Hundred Years' War, and the pikes and two-handed swords of the Swiss in their struggles with Austria and Burgundy are examples of the influence of weapons on historical events, and, in recent times, the rifled cannon of Napoleon in the Italian campaign of 1859 and the needle gun of the Prussians in the Danish one in 1864, are considered to have aided in deciding the fortunes of those wars.
Arms were not only the serious business of the Middle Ages, but also its sport. Men prepared themselves for the strenuous labours of war by jousts, tournaments, and courteous combats of various kinds. The training needed for the use of the heavy armour and weapons then in vogue was a very arduous matter. Men trained for it in the Middle Ages as we now train for a boat race, a football match, or any other form of athletics. If a man's career was to be that of arms, he began this training as a child, and it was continued without interruption until it was perfected. Juan Quijada de Reayo, in a very rare little book, written apparently in the first years of the XVIth century and addressed to his son, says that it is necessary to begin the training of a man-at-arms as a child is taught to read by learning the A B C. We are now astonished when we read that a young esquire could vault over his horse in the complete armour of the XIVth century, but there is no valid reason for doubting the statement.
We learn also from various treatises on the subject, that the relative merits of different forms of armour and weapons must have been a fertile source of conversation and discussion in mediaeval times, when men's lives in war so greatly depended on them. The old chroniclers frequently refer to the perfection of arms made in one place or another, and amusing questions of warlike armament are sometimes the theme of the novels then in vogue.
Franco Sachetti, writing in the second half of the XIVth century, tells how a certain knight of the great Florentine banking house of the Bardi, being appointed Podestà of Padua, had to supply himself with the armour and equipment needful for him to enter on his office with due solemnity. Now he was an exceedingly little man, not expert in horsemanship, nor used to warlike exercises. Lacking a crest for his helmet, he consulted his friends what he should choose for it. They, putting their heads together said, "he is very stumpy and unimposing looking and we cannot give him height as the women do by putting it under his feet, so let us add to his stature by putting it on the top of his head." They therefore went out and found him a very tall crest representing a demi-bear rampant, with its claws raised, and beneath a motto | WIKI |
Polish response to ECJ ruling is in the right direction: EU executive
BRUSSELS (Reuters) - The European Commission said it took note of Poland’s response to the verdict by the European Court of Justice that suspends changes Poland’s ruling euro-skeptic parties made to the Supreme Court law, saying the response was in the right direction. Poland’s President Andrzej Duda signed on Monday a revamped version of the Supreme Court law that complies with EU demands. But Commission spokeswoman Mina Andreeva noted that the new law signed by Duda had not yet been published in Poland’s official journal, which meant it was not in force yet. “The Commission also takes note that the Polish authority’s proposal to amend the supreme court law has now been signed by the President yesterday but we note that the law still has to be published,” Andreeva said. “We are satisfied that change is happening and going in the right direction. We will now analyze these changes and it is also in this view that first vice President Timmermans will update the college (of commissioners) tomorrow at their weekly meeting,” she told a regular news briefing. The euroskeptic and nationalist PiS initially pushed through a range of new powers after coming to power in 2015 that rights groups and EU officials said threatened the rule of law and increased the government’s control over Polish courts. PiS has argued the changes were to improve the efficiency of the courts and rid the country of a residue of Communism. Reporting By Jan Strupczewski and Charlotte Steenackers | NEWS-MULTISOURCE |
Page:Maid Marian - Peacock (1822).djvu/55
have felt desirous that she should have been the bride of an outlaw."
"Who said, sir," cried the baron, "that we were desirous of any such thing? But truly, sir, if I had a mind to the devil for a son-in-law, I would fain see the man that should venture to interfere."
"That would I," said the friar, "for I have undertaken to make her renounce the devil."
"She shall not renounce the devil," said the baron, "unless I please. You are very ready with your undertakings. Will you undertake to make her renounce the earl, who, I believe, is the devil incarnate? Will you undertake that?"
"Will I undertake," said the friar, "to make Trent run westward, or to make flame burn downward, or to make a tree grow with its head in the earth and its root in the air?" | WIKI |
Helvering v. Canfield Thorsen
The Attorney General andMr. H. Brian Holland, of Philadelphia, Pa., for Commissioner of Internal Revenue.
Mr. Edwin H. Cassels, of Chicago, Ill., for Charles J. Canfield and William R. Thorsen.
Mr. Chief Justice HUGHES delivered the opinion of the Court. | WIKI |
Like HowStuffWorks on Facebook!
The Basics of C Programming
Tech | Programming
A Linked Stack Example
A good example of dynamic data structures is a simple stack library, one that uses a dynamic list and includes functions to init, clear, push, and pop. The library's header file looks like this:
/* Stack Library - This library offers the
minimal stack operations for a
stack of integers (easily changeable) */
typedef int stack_data;
extern void stack_init();
/* Initializes this library.
Call first before calling anything. */
extern void stack_clear();
/* Clears the stack of all entries. */
extern int stack_empty();
/* Returns 1 if the stack is empty, 0 otherwise. */
extern void stack_push(stack_data d);
/* Pushes the value d onto the stack. */
extern stack_data stack_pop();
/* Returns the top element of the stack,
and removes that element.
Returns garbage if the stack is empty. */
The library's code file follows:
#include "stack.h"
#include <stdio.h>
/* Stack Library - This library offers the
minimal stack operations for a stack of integers */
struct stack_rec
{
stack_data data;
struct stack_rec *next;
};
struct stack_rec *top=NULL;
void stack_init()
/* Initializes this library.
Call before calling anything else. */
{
top=NULL;
}
void stack_clear()
/* Clears the stack of all entries. */
{
stack_data x;
while (!stack_empty())
x=stack_pop();
}
int stack_empty()
/* Returns 1 if the stack is empty, 0 otherwise. */
{
if (top==NULL)
return(1);
else
return(0);
}
void stack_push(stack_data d)
/* Pushes the value d onto the stack. */
{
struct stack_rec *temp;
temp=
(struct stack_rec *)malloc(sizeof(struct stack_rec));
temp->data=d;
temp->next=top;
top=temp;
}
stack_data stack_pop()
/* Returns the top element of the stack,
and removes that element.
Returns garbage if the stack is empty. */
{
struct stack_rec *temp;
stack_data d=0;
if (top!=NULL)
{
d=top->data;
temp=top;
top=top->next;
free(temp);
}
return(d);
}
Note how this library practices information hiding: Someone who can see only the header file cannot tell if the stack is implemented with arrays, pointers, files, or in some other way. Note also that C uses NULL. NULL is defined in stdio.h, so you will almost always have to include stdio.h when you use pointers. NULL is the same as zero.
C Errors to Avoid
• Forgetting to include parentheses when you reference a record, as in (*p).i above
• Failing to dispose of any block you allocate - For example, you should not say top=NULL in the stack function, because that action orphans blocks that need to be disposed.
• Forgetting to include stdio.h with any pointer operations so that you have access to NULL.
Other Things to Try
Add a dup, a count, and an add function to the stack library to duplicate the top element of the stack, return a count of the number of elements in the stack, and add the top two elements in the stack.
More to Explore | ESSENTIALAI-STEM |
Vestfjorden (Svalbard)
Vestfjorden (West Fjord) is the inner, western branch of Wijdefjorden, between Andrée Land and the northern part of Dickson Land in Spitsbergen, Svalbard in Arctic Norway. It is 12 km long and 5 km wide at the inlet between Kapp Petermann, Ræstadholmen and Krosspynten. Continues on land as Vestfjorddalen to the south and later southwest. Silty rivers comes from Landingsdalen, Yggbreen and Angelbreen on the west, as well as Vestfjorddalen in the south, giving the fjord a reddish look in contrast to the green colour of Wijdefjorden.
* Norwegian Polar Institute Place Names of Svalbard Database | WIKI |
User:Star the wolf/sandbox
Star is a content creator on YouTube and tiktok. he is known most for making funny videos. the link to his tiktok is as follows, @vincentpark200 | WIKI |
Online resize of virtual disks attached to replicating virtual machines
Online resize of virtual disks attached to replicating virtual machines
• Comments 2
• Likes
In Windows Server 2012 R2, Hyper-V added the ability to resize the virtual disks attached to a running virtual machine without having to shutdown the virtual machine. In this blog post we will talk about how this feature works with Hyper-V Replica, the benefits of this capability, and how to make the most of it.
Works better with Hyper-V Replica
There is an obvious benefit in having the ability to resize a virtual disk while the VM is running – there is no need for downtime of the VM workload. There is however a subtle nuance and very key benefit for virtual machines that have also been enabled for replication – there is no need to resync the VM after modifying the disk, and definitely no need to delete and re-enable replication!
There is some history to this that needs explaining. Starting with Windows Server 2012, Hyper-V Replica provided a way to track the changes that a guest OS was making on the disks attached to the VM – and then replicated these changes to provide DR. However the tracking and replication was applicable only to running VMs. This meant that when a VM was switched off, Hyper-V Replica had no way to track and replicate any changes that might be done to the virtual disks outside of the guest. To guarantee that the replica VM was always in sync with the primary, Hyper-V Replica put the virtual machine into “Resynchronization Required” state if it suspected that the primary virtual disks had been modified offline.
So in Windows Server 2012, the immediate consequence of resizing your disk offline is also that the VM will go into resync when started up again. Resyncing the VM could get very expensive in terms of IOPS consumption and you would lose any additional recovery points that were already created.
Naturally, we made sure that it all went away in the Windows Server 2012 R2 release - no workload downtime, no resync, no loss of additional recovery points!
Making it happen – workflows for replicating VMs
The resize of the virtual disks need to be done on each site separately, and resizing the primary site virtual disks doesn’t automatically resize the replica site virtual disks. Here is the suggested workflow for making this happen:
1. On the primary site, select the virtual disk that needs to be resized and use the Edit disk wizard to increase/decrease the size of the disk. You can also use the Resize-VHD PowerShell commandlet. At this point, replication isn’t really impacted and continues uninterrupted. This is because the newly created space shows up as “Unallocated”. That is, it has not been formatted and presented to the guest workload to use, and so there are no writes to that region that need to be tracked and replicated.
2. On the replica site, select the corresponding virtual disk and resize it using the Edit disk wizard or the Resize-VHD PowerShell commandlet. Not resizing the replica site virtual disk can cause replication errors in the future – and we will cover that in greater detail.
3. Use Disk Management or an equivalent tool in the guest VM to consume this unallocated space.
Voila! That’s it. Nothing extraordinary required for replicating VMs. Sounds too good to be true? Well, it is :). In fact, you can automate steps 1 and 2 using some nifty PowerShell scripting.
param (
[string]$vmname = $(throw "-VMName is required"),
[string]$vhdpath = $(throw "-VHDPath is required"),
[long]$size = $(throw "-Size is required")
)
#Resize the disk on the primary site
Resize-VHD -Path $vhdpath -SizeBytes $size -Verbose
$replinfo = Get-VMReplication -VMName $vmname
$replicaserver = $replinfo.CurrentReplicaServerName
$id = $replinfo.Id
$vhdname = $vhdpath.Substring($vhdpath.LastIndexOf("\"))
#Find the VM on the replica site, find the right disk, and resize it
Invoke-Command -ComputerName $replicaserver -Verbose -ScriptBlock {
$vhds = Get-VHD -VMId $Using:id
foreach( $disk in $vhds ) {
if($disk.Path.contains($Using:vhdname)) {
Resize-VHD -Path $disk.Path -SizeBytes $Using:size -Verbose
}
}
}
Handling error scenarios
If the resized virtual disk on the primary is consumed before the replica has been resized, then you can expect the replica site to throw up errors. This is because the changes on the primary site cannot be applied correctly on the replica site. Fortunately, the error message is friendly enough to put you on the right track to fixing it: An out-of-bounds write was encountered on the Replica virtual machine. The primary server VHD might have been resized. Ensure that the disk sizes of the Primary and Replica virtual machines are the same.”
image
The fix is just as simple:
1. Resize the virtual disk on the Replica site (as was meant to be done).
2. Resume replication on the VM from the Primary site – it will replicate and apply pending logs, without triggering resynchronization.
A similar situation will be encountered if the VM is put into resync after the resize operation. The resync operation will not proceed as the two disks have different sizes. Ensuring that the Replica disk is resized appropriately and resuming replication will be sufficient for resynchronization to continue.
Nuances during failover
If you keep additional recovery points for your replicating VM, there are some key points to be noted:
1. Expanding a virtual disk that is replicating will have no impact on failover. However, the size of the disk will not be reduced if you fail over to an older point that was created before the expand operation.
2. Shrinking a virtual disk that is replicating will have an impact on failover. Attempting to fail over to an older point that was created before the shrink operation will result in an error.
This behavior is seen because failing over to an older point only changes the content on the disk – and not the disk itself. Irrespective, in all cases, failing over to the latest point is not impacted by the resize operations.
Hope this post has been useful! We welcome you to share your experience and feedback with us.
Your comment has been posted. Close
Thank you, your comment requires moderation so it may take a while to appear. Close
Leave a Comment
• I have a 2012 R2 HA setup but the Edit disk is greyout while the VM is replicated. I have to break replication to be able to resize the VHDx. | ESSENTIALAI-STEM |
Standard Acupuncture Nomenclature, Second Edition. A Brief Explanation of 361 Classical Acupuncture Point Names and their Multilingual Comparative List
(1993; 1 page)
Resumen
Meets the pressing need for a uniform, standardized nomenclature for acupuncture. In its second edition, the nomenclature has been extensively revised following a number of consultations with experts representing all the major traditions of acupuncture.
The nomenclature covers the 361 classical acupuncture points organized according to the fourteen meridians. Each entry gives the standardized name of the point in its three elements: an alphanumeric code derived from the English language translation of the meridian name, the Chinese phonetic alphabet (Pinyin) name, and the Han (Chinese) character. The original form of the writing is shown first, followed by a simplified form of the character. Each entry also provides a brief comment on the point, explaining the meaning of the Han character and the significance of the point's location. Use of the nomenclature is facilitated by the inclusion of two indexes. The first lists the equivalent names and code names of the acupuncture points as used in English, French, Japanese, Korean and Vietnamese. The second lists the Han characters for the 361 points.
El Portal de Información - Medicamentos Esenciales y Productos de Salud de la OMS fue diseñado y es mantenido por la ONG Human Info. Última actualización: le 17 diciembre 2015 | ESSENTIALAI-STEM |
Lampronia humilis
Lampronia humilis is a moth of the family Prodoxidae. In North America it is found in the coastal areas of British Columbia south to northern California.
The wingspan is 10–14 mm. The forewings and hindwings are unicolorous grayish brown. | WIKI |
SAG
Don't be greedy. Share!Share on FacebookShare on Google+Tweet about this on TwitterEmail this to someone
SAG is the amount your fork compresses under your body weight (don’t forget to include your riding gear), also referred to as Rider Weight. Since this is a Downhill specific fork, measure SAG by mounting your bike with your riding gear on, standing up and in the ready position. The ready position is basically, knees and elbows slightly bent, bars weighted but body weight on your feet. Do not sit on the saddle while measuring SAG. Every rider has a different riding weight and ready position based on rider height and style.
1. Before adding air to the fork make sure that both high speed and low seed compression is turned all the way counter clockwise and release all the air out of the fork.
2. Set the correct amount of rotations to the OTT knob based on your weight. Refer to the OTT Guide or basetune to find the recommended setting for OTT.
3. Add the recommended air pressure to the fork based on your weight. Refer to the basetune to find the recommended air pressure setting.
For detailed instructions on measuring and setting up sage check out this video and step by step instructions.
• Why do you need SAG?
Sag is how far your suspension compresses when you sit on your bike. Sag is set to insure that the suspension works in its most effective range and to keep a good weight balance, front to rear. It can also determine if you have the proper spring rate. Proper sag is essential because it allows the suspension fork to absorb holes and bumps without making the fork too soft or hard.
• What happens if you have too much SAG?
The quality of the ride will suffer. Too much sag may result in the suspension diving and bottoming out too easily. If you have too much sag, increase spring rate or increase preload on the spring
• What happens if you have too little SAG?
The quality of the ride will suffer. The suspension will feel harsh on small bumps, traction will be reduced and you may not be able to use all available suspension travel. | ESSENTIALAI-STEM |
Wikipedia talk:WikiProject World Rally/Archive 2
WRC non-manufacturing entries (until 2010)
When I checked some of the Wiki pages for some WRC seasons like 2004 or 2005, I've noticed that some entries that were not registered as eligible for points in the manufactures championship are listed as such. Should I move them to the Major entries not registered as manufacturers or create a new list for Manufacturer entries that weren't nominated for pointscoring in the manufacturer standings? Ivaneurope (talk) 09:36, 2 March 2016 (UTC)
* I think those articles need that improvement. We should keep as a template the current table. If you do it, remember that there where some seasons where manufacturers entered more than two entries, but only their best two counted toward the points. MNSZ (talk) 00:45, 8 March 2016 (UTC)
* I tested a new template that I wanted to distinguish the non-scoring manufacturer entries from the privateers. I've consulted with Hakulin about it and the feedback was that it's too confusing. I'll post my idea here so I could read your oppinion. (The prototype was first tested on the 2004 season) Ivaneurope (talk) 20:51, 8 March 2016 (UTC)
* I don't see the need to distinguish the non-scoring manufacturers entries from the privateers ones, as neither are able to score manufacturers points. The difference is on the "team" name, as we've been using on the last years. This is ok as you present it, but I would not use a different table for privateers entries, but combined it with the non-scoring manufacturers for a "Major entries ineligible to score manufacturer points" table. MNSZ (talk) 03:08, 9 March 2016 (UTC)
* OK, however the current template that is used (The 2012-present) can't be used well for some older seasons. For example - Škoda used in 2003 both the Octavia and Fabia. Some privateer entries have used different cars and/or models like the two generations of Ford Focus (and the yearly incarnations). I've seen an alternate template, which is used in the ERC seasons, so I plan to use it for the pre-2011 seasons. Ivaneurope (talk) 09:08, 9 March 2016 (UTC)
* EDIT: I think this template of yours shall work. Ivaneurope (talk) 09:11, 9 March 2016 (UTC)
New layout for pre-2011 WRC season
Earlier in this talk page I've mentioned the issue I have with the pre-2011 WRC entry lists. After days of thinking of new layout that will distinguish some entries, entered by manufacturer WRC team, that were ineligible for scoring points. I present the provisional layout based on the 2005 WRC (not complete) for review as I've asked other member of this WP and his oppinion was that this may confuse some (for example here Skoda Motorsport is presented in both tables). What do you think? Ivaneurope (talk) 22:14, 12 March 2016 (UTC)
* I think it looks ok this way. MNSZ (talk) 22:59, 13 March 2016 (UTC)
* OK, now the thing is that I have some issue with the arrangement non-scoring entries - until 2006 the private entries didn't had a fixed car number like now some non-scoring entries have (like for example Bertelli always uses number 37). Should I add car numbers to the entries, or keep them the way they are in the template? If the second choice is more convenient IMO the the driver arrangement alphabeticaly looks messed and maybe I'll change the arrangement according to these criteria:
* 1. Where was the first round they entered
* 2. The number of races entered
* 3. By letter
Ivaneurope (talk) 08:17, 14 March 2016 (UTC)
* I think that you should not add the numbers to the entries. Without that, I think the best way to arrange the table, is still in alphabetical order, by Manufacturer -> Team/Entry -> Driver. MNSZ (talk) 00:02, 20 March 2016 (UTC)
New look for 2016 calendar and summary tables.
Hi Everyone!! I'm looking for opinions on a new look for the 2016 pages. Prisonermonkeys make some changes that I think improves the pages (and, as he said, it looks more alike to other motorsport seasons' pages), but I think we can keep improving it. You can comment in here. MNSZ (talk) 23:45, 13 March 2016 (UTC)
China Rally 2016
The 2016 China Rally which is a WRC round will be in Beijing and the rally is different from the China Rally that was run in 1999. Is there a need to create a new page for the China Rally, Beijing? Ivaneurope (talk) 20:34, 27 March 2016 (UTC)
I don't think it's necessary, as it is normal for a rally to change it base, but still being recognized as the same rally. I don't see this as being a case of San Remo/Sardegna as in those cases, the name of the event changes. MNSZ (talk) 03:51, 29 March 2016 (UTC)
Support Category's Revamp
Hi There!
I know that what I will propose will sound like much, but I see that articles like the 2012 World Rally Championship is overwhelmed by tables because of the supports championships, and no prose that states how those championships went. Only Tables. So I would propose to take the same treatment as the article from 2013 onward and separated all the supports championships in their own articles. I worked in an navigation box to describe was we would have at the end:
Besides on how much work seems to be, do you think it will help the reader to have all the championships and cups separated? MNSZ (talk) 16:20, 25 January 2017 (UTC)
* @ — you know my position on this, but so that anyone reading this can follow along, the short version is yes. There are, however, a few tweaks that I would make here and there:
* Firstly, I think we need to distinguish between "championships" and "cups" (or, to use my preferred term, "competitions"). A championship is any season-long tournament at the end of which a formal title is awarded; Sébastien Ogier, for example, is the 2016 World Drivers' Champion. Furthermore, "championship" is a category applied by the FIA once one of these season-long tournaments fulfils certain criteria. For example, a few years ago, V8 Supercars became known as "International V8 Supercars"—but they could not simply take the "International" prefix because it sounded good; to get it, they had to apply to the FIA and meet certain conditions first (for example, no races in Europe). Therefore, the FIA is the only body that can decide what is and what is not a championship, and we should structure articles accordingly.
* Meanwhile, we also have "competitions". These are events that run alongside the championships but are scored separately and are not recognised by the FIA as outright championships. They include the WRC Trophy, 2-Litre Cup, R-GT Cup, Ladies' WRC and so on. In order to score points in these, crews must nominate for them separately. I feel that these should be separate to championships because all crews entered in a competition are eligible to score points in the championship by default, but not all crews entered in a championship are eligible to score points in the competition by default (I hope that's not too confusing). Separating them out does require some duplication of content across articles, but we already do that to some extent.
* This is where we run into a bit of a paradox: a competition is a formally-structured tournament run alongside the championship. Therefore, they should not be included as part of the championship article because they are not part of the championship. However, there are questions about questions about the long-term sustainability of individual articles; only one competition has lasted longer than six years before being discontinued. With this in mind, I would propose a meta article for the season (which I have previously referred to as a "top-level article"). It is a place to cover everything which happens as a part of the season which is not a part of the championship(s). So, for 2017, we would have a 2017 in World Rallying article (the name could be changed), which would contain a brief overview of and links to 2017 World Rally Championship, the WRC-2, WRC-3 and J-WRC articles. But it would also contain specific details for the WRC Trophy and R-GT Cup as they are the competitions run alongside the championship. Prisonermonkeys (talk) 05:11, 12 February 2017 (UTC)
* What if instead of doing a "yearly" article, we invert that idea and do "Competitions" article. In this case, for example, we would do an article for the WRC Trophy, or the Lady's cup, which will contain all of the seasons/competitions that run under that name, and we put a link to those articles in the main WRC season report.
* It would look something like this:
* Also tagging and to have a bigger range of opinions. MNSZ (talk) 00:39, 13 February 2017 (UTC)
* @ — Having one article that covers every running of a particular competition could work as well. It happens for some minor championships, like Formula 4, although I think that it's not the preferred method. Prisonermonkeys (talk) 01:48, 13 February 2017 (UTC)
* IMO It's fine the way it is, but this proposal seems to be good. I'd change numerous things - I'd remove the "previous" section and merge it with their current forms. Example: for WRC-2 it would be S-WRC/WRC-2. Trouble is that until 2013 SWRC, PWRC and JWRC were win single article with the main WRC page. Ivaneurope (talk) 07:19, 13 February 2017 (UTC)
* "Example: for WRC-2 it would be S-WRC/WRC-2"
* The problem with that is the WRC-2 and S-WRC were run to different regulations. The WRC-2 is for Group R cars, while S-WRC was for Super 2000 cars. Super 2000s were initially re-homologated under Group R, but no new Super 2000s are being re-homologated. WRC-2 and S-WRC are completely different championships, and so we can't simply compress them together because it's convenient for us. Prisonermonkeys (talk) 09:53, 13 February 2017 (UTC)
* Should I start separating the articles for the Championship and leave the Cups for further discussion/analysis? MNSZ (talk) 15:47, 30 March 2017 (UTC)
User template/WP template, update pic
I think Template:User WikiProject World Rally needs a newer picture. Subaru is history. Does anyone know a good one? Pelmeen10 (talk) 06:28, 27 March 2017 (UTC)
* Also Template:WikiProject World Rally? Pelmeen10 (talk) 06:33, 27 March 2017 (UTC)
Support categories, part 2
A recent discussion at 2017 World Rally Championship has been focusing on what to do with the WRC Trophy. It has been decided that this should be considered in a broader context of support categories that are not full championships in their own right. The history of rallying has contained several of these competitions, such as the 2-Litre Cup, WRC Academy, Drive DMACK Trophy, and the Super 1600 Cup among others. These have been handled fairly inconsistently in the past, and the lack of readily-available information and sources makes it difficult to cover them comprehensively. The discussion has been moved here to try and decide the best way to handle them. As I see it, there are three options:
* 1) Delete the content outright. Many of these competitions only have the raw data of results tables to substantiate them, and so their ability to satisfy notability guidelines is questionable at best.
* 2) Create season-specific articles, such as "2017 WRC Trophy", "2018 WRC Trophy", "2019 WRC Trophy" and so on and so forth. As pointed out, the data alone does not really satisfy notability guidelines, so creating these articles would require detailed research to bring them up to the standard.
* 3) Create an overview article. These would take the form of one article that houses all content related to the subject. So, an article called "FIA 2-Litre Cup" would cover details of the competition.
There is a fourth possibility that will no doubt be mentioned - to keep the content where it is. As far as I am concerned, that is not an option. The consensus at 2017 World Rally Championship clearly says that all content like the WRC Trophy, WRC Academy et al should be treated the same way. More to the point, it is quite separate to the main championship; the World Rally Championship titles were (and will be) awarded regardless of what happened in these support categories, so the main championship article is an inappropriate place for them to go.
I think option #3 is the best way forward. It allows us to cover the subject with the content that we have, introduces consistency across all of the competitions, and doesn't require a focus on results tables. All it would really require is expository text with links to the relevant championship articles, plus a summary table of the winners for all years that the competition was run. For example, it would look something like this:
* {| class="wikitable" style="font-size: 85%;"
! Year ! Winning driver ! Winning co-driver ! Winning entrant ! Winning car ! 2019 ! 2018 ! 2017 Option #3 is the neatest, tidiest way to address the subject comprehensively without the article running afoul of Wikipedia policies.
* 🇺🇸 Max Power
* 🇺🇸 Handsome B. Wonderful
* 🇺🇸 Homer Simpson Racing
* Powell Homer
* 🇺🇸 Phillip J. Fry
* 🇲🇽 Bender B. Rodriguez
* 🇺🇸 Planet Express WRC
* Planet Express Ship
* 🇺🇸 Bruce Wayne
* 🇺🇸 Dick Grayson
* 🇺🇸 Wayne Enterprises Racing
* Batmobile
* }
* }
-- PM, posting from public computer
* I agree with option three, having in account that we are talking about the Trophies/Cups and not the World Championship which, as I think, they meet the enough notability to have their own article (it would be our mission as editors to have them as much as neat as possible). I leave the "table of content" that I think would be the visible exposition to understand the difference:
* Nevertheless, I would not talk about the format per se until we decide which option will be carried out. MNSZ (talk) 20:46, 13 April 2017 (UTC)
* @ — I'll leave the exact format of that template to you. Those templates don't show on mobile devices, so I don't have much to do with them. That said, after taking a quick look on the full site, I think it could be neater.
* I think the more important issue is what to actually do with the content; the template is a secondary consideration at best. The content is what we need to focus on because it doesn't matter what the template looks like if we don't have an article to put it in. Prisonermonkeys (talk) 06:44, 14 April 2017 (UTC)
* The fourth possibility is certainly an option. If that's what people prefer. It's not up to you to set the conditions of the outcome. Anyway, thinking about this there might even be a fifth possibility. Have one overview article for all the support categories together instead of one for each. Given how little importance some of them have and how short-lived some were, I think that would be a much more efficient way to present the content to our readers.Tvx1 14:05, 14 April 2017 (UTC)
* That was what I say, we should first know what to do, and then get into the format. The template I posted it only so editors who gives their opinion would know which articles are we referring to.
* I would not go with this option, as there are really large competitions that could use a little more of explaining, etc (Like the production cup, which has been run for 12 years, and had a second incarnation recently inside of the WRC-2 category). And if you put all of this in the same place as the S-1600 Cup (which had only 1 season), it will be a really unbalanced. As a reader and a editor I'm still going for Option 3. (My reader part prefers Option 2, but as an editor, I know it will be difficult to develop).
* Whether or not it's balanced is entirely up to us. If we go with option five we should then make sure every competition gets the amount of coverage its due. We can provide the balance. The problem with option 3 is that we are still bound by the guidelines as to what can have a standalone article and what not. I'm not convinced every support championship that has ever been held has enough notability to merit a standalone article. Alternatively we could go for a compromise between options 3 and 5:Start from one article for all the support championships and create separate for those few championships which are notable enough and link to them from the overview article.Tvx1 20:46, 14 April 2017 (UTC)
I'm fine with that. I'm really fine with any solution that removes them from articles that they're only tangentially related to. Prisonermonkeys (talk) 00:16, 15 April 2017 (UTC)
* That's a good option. A lo of articles do that (games franchises for example, have a description of every game, but those with notability also have a link to their own article. Also in movies, etc). Sorry for not signing my previous comment. MNSZ (talk) 13:01, 15 April 2017 (UTC)
* I like it, @ likes it and @ likes it. We can leave the discussion open for a while in case anyone else wants to contribute, but if there is no more input to be had, I see no reason why we should not act on this as soon as possible. Prisonermonkeys (talk) 01:28, 17 April 2017 (UTC)
* Agree. Someone have an idea of how should be looking? at least the general article. I would say we should work on that, and then see which Cup/Trophy should be also extended in their own article. MNSZ (talk) 23:07, 19 April 2017 (UTC)
* @ — I wouldn't worry too much about that. Personally, I'd just start editing. I've often found that the best articles write themselves, for want of a better term. I imagine that the article would have one section for each category, with prose outlining the specific details and a summary table showing the overall winners for each year. But at this point, anything more would be over-thinking it. As for the name, I would probably call it Support categories in the World Rally Championship. Prisonermonkeys (talk) 02:56, 20 April 2017 (UTC)
I'm ready to move on this, but I would like to hear from @ before I do. If he doesn't respond in the next, say, two days, then I think it's quite reasonable to assume he has no objections and to go ahead and create the article. Prisonermonkeys (talk) 11:51, 22 April 2017 (UTC)
* @ — how does this sound as a draft for the article?
* ''Since its inaugural season in 1973, the World Rally Championship has been supported by a series of additional categories. These categories, created and endorsed by the Federation International de l'Automobile (FIA)—the governing body of motorsport—were created to encourage participation from entries in classes that would otherwise be ineligible to score points in the World Championship or its primary feeder series, the World Rally Championship-2 and World Rally Championship-3. Over time, these support categories were created and changed in line with trends within the sport itself and motorsport as a whole.
* And an example of a sub-section:
* ''The WRC Trophy was first created in 2017 as a response to widespread technical changes in the World Rally Car category. These changes, which made the 2017 generation of World Rally Cars significantly faster than their predecessors meant that World Rally Cars built between 2011 and 2016 would be unable to directly compete with the newer models. Conversely, World Rally Cars built before 2017 would be faster than the Group R5 cars competing in the World Rally Championship-2. With further changes to the sporting regulations restricting the ability of privateer teams to enter 2017-specification World Rally Cars, the WRC Trophy was created to encourage privateer entries and enable older-model World Rally Cars to continue competing without threatening the position of the World Rally Championship-2 as the sport's premier feeder category. Under the WRC Trophy regulations, crews are eligible to enter up to seven rounds of the World Rally Championship, with their best six results counting towards their final points tally. WRC Trophy entrants are still eligible to score World Rally Championship points separately to the WRC Trophy.
* It's not perfect, but I figure it's a good start. Prisonermonkeys (talk) 06:11, 24 April 2017 (UTC)
* The Subsection looks ok to me. After the "general" paragraph, we should include another one with a little history, and one paragraph about the defunction.
* A little example of What I mean (Using the DDFT):
(General Paragraph) The DDFT was created after M-Sport loosed his sponsorship for the WRC Academy. It was an effort between M-Sport and DMACK to create a first-step like championship for young drivers, and they apply their own scoring system that embraced every stage driven, to make sure that drivers will run at their best in every stage...
(History of the competition) The First Season, run in 2014, was competed over 5 European rallies, and saw a total of 12 Entries. Estonian Sander Parn won 3 of the 5 event, and claimed the championship....
(Closing paragraph) The Trophy was dissolved when M-SPORT reclaimed the sponsorship to run the now-named JWRC. Thus the majority of the of the structure of the DDFT was used in the current Junior WRC....
* Obviously needs better development, but it's an example of what should have every sub-section (besides the previously mentioned by you table of past winners).
* On the other hand, the first paragraph of the article, I would avoid talking about the WRC-2 and WRC-3, as we will be talking too about the Production Cup, which was run until 2001 when there where no support championship, and so on. And also, they are able to score points in the WRC. Just it's unlikely that they will win it. So I would leave it simply as a way to encourage different kind of drivers in differents regulated-car to enter the world championship, by adding a Cup or Trophy.
* Also, about the name of the article, as I understand, we will not be talking about the support categories, but about the Cups that ARE NOT a championship/category. I'm not in my most creative day, but I would named "Support Cups in the World Rally Championship" or "Cups within the World Rally Championship". MNSZ (talk) 22:38, 24 April 2017 (UTC)
* @ — we cannot call it the article "Support Cups in the World Rally Championship" because nowhere is the term "cups" used to refer to them. "Categories" works better because each competition is built for a category of car. Anyway, the time has come to start editing the article. We can start with World Rally Championship support categories and go from there. Prisonermonkeys (talk) 02:26, 25 April 2017 (UTC)
RFC on sports notability
An RFC has recently been started regarding a potential change to the notability guidelines for sportspeople. Please join in the conversation. Thank you. Primefac (talk) 23:09, 5 May 2017 (UTC)
Removing statistics from previos WRC season articles
So recently statistics at 2010 and 2011 season articles were removed. They were actually updated after each rally back in 2010 and 2011. Do you have any opinions? Are they good summary or unnecessary? --Pelmeen10 (talk) 14:46, 30 August 2017 (UTC)
* good summary --Kasper2006 (talk) 11:35, 22 January 2018 (UTC)
Scottish, Welsh or British?
I've noticed some user changing the nationality on Nicky Grist to British, which, whilst true is rather vague. Colin McRae's nationality is explicitly listed as Scottish, and other articles on notable British people list their specific nationality, e.g. Charlotte Church who hails from the same country as Grist. Furthermore, McRae and Grist use their respective national flags as most of us may have observed. Any thoughts on this? Blake Gripling (talk) 04:58, 22 December 2017 (UTC)
* Elfyn Evans has both (Welsh and British) mentioned. Maybe that's the solution, even though I'd prefer Welsh (and Scottish). --Pelmeen10 (talk) 21:50, 22 December 2017 (UTC)
* Evans appears to have competed under the British flag, and so did McRae and Grist at some point. Though Nicky did co-drove under the Welsh flag during his stint at Ford alongside Colin. Blake Gripling (talk) 22:44, 22 December 2017 (UTC)
* McRae's nationality is listed as Scottish, because a rogue IP changed it and nobody really cared, despite of the note. I already reverted it to its original state. – Sabbatino (talk) 07:23, 23 December 2017 (UTC)
* Any consensus on this? If the driver or co-driver is clearly competing under a particular nationality, should that be taken into account or would the catch-all "British" designation be more appropriate? Blake Gripling (talk) 09:45, 23 December 2017 (UTC)
* It all goes down to FIA. It lists McRae and Evans as British drivers in its archives. For example, here and here. The same situation applies to people like David Coulthard, Paul di Resta, Eddie Irvine or any other Scottish/Welsh/Northern Irish/English driver. Furthermore, neither Scotland or Wales are sovereign states and they do not have their own citizenships, which just makes it nationalistic when someone lists McRae or any other driver as Scottish. – Sabbatino (talk) 10:12, 23 December 2017 (UTC)
* Fine with me then. Blake Gripling (talk) 12:40, 23 December 2017 (UTC)
* They all compete as British and they should be listed as such. That's what their passports say/said. The FIA uses passport nationalities in their World Championships. Their wins were/are greeted by the weaving of the Union Jack annd the playing of "God Save the Queen" and not "The Flower of Scotland" or "Mae Hen Wlad Fhy Nadhau". They were always listed as British here, but sometimes a nationalist passes by and changes. That should be reverted.Tvx1 16:41, 29 December 2017 (UTC)
Page move proposal
A proposal to move some WRC articles has been made here. Any additional opinion is welcome.Tvx1 16:48, 29 December 2017 (UTC)
Classification tables in rally reports
The "classification" section in individual rally reports contain two tables: one for rally results and one for power stage points. Recently they have been subject to data creep—crews who scored power stage points are being included in the rally result table on the grounds that they scored points despite there being a separate table for power stage points, which are awarded independently of rally results. The two-table format is best, with the results table limited to those who scored points for the rally, with power stage points addressed separately. Prisonermonkeys (talk) 22:32, 9 May 2018 (UTC)
* So you want to remove Power Stage point scorers from "rally results" table like this. We have always included them: 2017 Rally Sweden, 2016 Wales Rally GB, 2015 Rallye Deutschland etc, so nothing recent about that. A proper summary table includes every point scored, includind JWRC points for stage wins. And once again, Power Stage is part of the rally event, not a competition held outside the event. A rally result=points for place in final classification+Power Stage points. You can score a maximum of 30 points from an event. --Pelmeen10 (talk) 08:42, 10 May 2018 (UTC)
* That makes the power stage table completely redundant. You can't gave it both ways and given that power stage points are scored separately to points for the rally, the logical conclusion is to separate them. Prisonermonkeys (talk) 10:21, 10 May 2018 (UTC)
* It does not make Power Stage table redundant. PS table includes times. I think just before the "rally results" table, there should be a sentence explaining what does it include. "stage points are scored separately to points for the rally" - Again, Power Stage (like any other special stage) is part of the rally. --Pelmeen10 (talk) 11:51, 10 May 2018 (UTC)
* The stage times don't add much. We just had a whole discussion on the 2018 article about times in the summary table. It's not as if the power stage is a standardised route. Prisonermonkeys (talk) 20:26, 10 May 2018 (UTC)
* Cmon, time is important in rallying. Power Stage points are distributed in relation to their time. --Pelmeen10 (talk) 06:14, 11 May 2018 (UTC)
* No, power stage points are given to the five fastest drivers, whatever their time is.
* The point I am trying to make here is that there are two tables for a reason. It's not like Formula 2 where the driver who sets fastest lap gets a bonus point provided they finish in the top ten. Crews score power stage points independently of their rally results. Therefore, there should be two tables: one for the points scored in the rally and one for power stage points. That makes the inclusion of power stage points in the rally results table redundant. Prisonermonkeys (talk) 08:26, 11 May 2018 (UTC)
* Power Stage points are part of the rally results (as Power Stage is part of the rally), it's not an independent contest. Yes there are 2 different point distributions: for top10 overall finishers and for top5 PS finishers (in order to score PS points you also have to finish the rally - you have to have a finishing time). But together they make a rally result. There is no table named "top10 finishers", it's "rally results". That's why they include every point scorer. There is a tooltip which explains how exactly were they distributed.
* "No, power stage points are given to the five fastest drivers, whatever their time is." - It's not "whatever their time is", we include time, because that's how the "fastest" drivers are found out. How can anybody be fastest without time measurement? So don't even start talking about Power Stage times being pointless...
* Now, why we put PS point scorers and top10 finishers to the same table? So we could also compare PS top5 finishers to the other drivers. In my opinion, every driver who scores points are notable, including their overall time and time loss. And the most important is to find out how many points in total each driver scored from the event. It's not like we're wasting limited space - what about listing every finisher or all stage times to the table? --Pelmeen10 (talk) 10:23, 11 May 2018 (UTC)
First of all, mobile and tablet users cannot see Tooltips. For someone unfamiliar with the sport, there is no clear explanation why Loeb scores 4 points in 13th place whereas the driver in 10th scores just 1. We shouldn't be disqualifying one group of readers from understanding a key part of the article.
Secondly, I have repeatedly made the argument that any crew that scores points should be considered notable enough for inclusion in the team and driver tables in championship articles. I don't see why they should be notable enough for one article but not another. Prisonermonkeys (talk) 13:16, 11 May 2018 (UTC)
* I see you have changed the table:
* {|class="wikitable" width=85% style="font-size: 85%;"
! colspan="2" | Position ! rowspan="2" | No. ! rowspan="2" | Driver ! rowspan="2" | Co-driver ! rowspan="2" | Entrant ! rowspan="2" | Car ! rowspan="2" | Time ! rowspan="2" | Difference ! colspan="2" | Points ! Event ! Class ! Event ! Stage
* }
* What is that "Event"? Points from the event already include Power Stage points. Power Stage is not held outside the event. --Pelmeen10 (talk) 17:06, 11 May 2018 (UTC)
* What is that "Event"? Points from the event already include Power Stage points. Power Stage is not held outside the event. --Pelmeen10 (talk) 17:06, 11 May 2018 (UTC)
* Why is this so difficult for you to understand? You get points for your finishing position in the rally and points for your finishing position on the power stage and they are awarded separately. You don't need to score points for a top ten finish to get power stage points and you don't need to score power stage points to get points for a top ten finish. They're all part of the one event but because they are awarded for separate things we need to show how they were scored separately. Prisonermonkeys (talk) 22:45, 11 May 2018 (UTC)
* Then you need to find a better name for the column than "Event". Also, how are the JWRC points for stage wins fitted into that table? --Pelmeen10 (talk) 15:17, 12 May 2018 (UTC)
* I do have a better solution: limiting the classification table to the top ten points-scoring positions. Power stage points and JWRC stage points can be addressed in separate tables because as I keep saying—and which you seems to be going out of your way to ignore—those points are awarded separately. Prisonermonkeys (talk) 23:47, 12 May 2018 (UTC)
Request for comment on results tables
Should the "rally results" table in rally report articles (such as this one) include all points scored in an event and all entries that scored points or should separate tables be used? Prisonermonkeys (talk) 04:31, 21 May 2018 (UTC)
* Comment — I believe that separate tables should be used because three different points-scoring systems are used. All categories (WRC, WRC-2, WRC-3 and J-WRC) use the same basic points scoring system where the top ten finishers score a pre-determined number of points (25 for first, 18 for second, 15 for third and so on). However, additional points are awarded to the five fastest crews on the Power Stage, the final stage of the rally. There is no additional requirements for this—crews do not need to finish in the top ten to receive the points. The J-WRC has an additional system where crews score an extra point for every stage they win. As with Power Stage points, there is no additional requirement to receive these points. The current system in the article groups all of this together with a Tooltip (which is not visible on mobile or tablet devices) and a very limited explanation of how the point score was calculated. I believe the best way forward is three tables: one for the top ten, one for the Power Stage (which already exists) and one for extra J-WRC points. Prisonermonkeys (talk) 04:43, 21 May 2018 (UTC)
* I removed the Rfc tag, because current tables are less confusing than before you started this rfc. current vs before. --Pelmeen10 (talk) 06:29, 11 June 2018 (UTC)
* You cannot remove the RfC tags because it suits you. You need to let it run the full 30 days before it is closed.
* Furthermore, you haven't addressed all of the issues—namely the question of whether the rally results table should show all points scorers or just the top ten in each class. Prisonermonkeys (talk) 12:29, 15 June 2018 (UTC)
* Comment — I agree with the separate tables suggestion. We can reduce these tables to just top ten finishers, but keeping current format — No Tooltip. Just as @ said, it is confusing. Also, it is not visible on mobile or tablet devices. — Unnamelessness (talk) 14:26, 15 June 2018 (UTC)
* Comment. Please show an example of seperate tables. If you think it would be better and more clear, then show your new solution at some sandbox. --Pelmeen10 (talk) 13:37, 16 June 2018 (UTC)
* Comment: they're already in every single rally report article. Every article has a table showing the rally results and a table showing the power stage results. All I am proposing is that because the points are awarded separately, it should be addressed in separate tables. As I keep pointing out—and as you seem to consistently ignore—rally points and power stage points are not mutually inclusive; you can score power stage points with or without scoring points for finishing in the top ten. Therefore, the rally results table should only focus on the top ten finishers and the power stage table should focus on the crews that scored points on the power stage. Prisonermonkeys (talk) 12:17, 19 June 2018 (UTC)
* Oppose the change - as I already expressed here, all the points scored are "rally results". Why current table is good - every points scorer's final classification position and time is shown (it's notable). +You can easily see how many points each driver scored in total from the event. --Pelmeen10 (talk) 13:25, 19 June 2018 (UTC)
* Comment: except that once again you refuse to even acknowledge that power stage points are scored independently of the points for the top ten. You can come last in the rally and still score five power stage points. Prisonermonkeys (talk) 02:16, 20 June 2018 (UTC)
* Comment: Yes, and in that case with current tables we can see that the power stage winner came last. But with seperate tables we would have no idea what overall time or position the PS winner had. --Pelmeen10 (talk) 09:28, 20 June 2018 (UTC)
* Comment: which tells me that you're relying too much om the tables to convey information. Tables should complement prose, not replace it. If the last-placed driver wins the power stage, the reader should already know about it from reading the written report by the time they get to the tables. If they're only finding out about it for the first time from the tables, then the article is poorly written. The purpose of the results table should be to show who scored points for finishing in the top ten, and the power stage table shows who scored points for the power stage. Combining them does nothing except create a redundant table and a sloppy alternative to giving the full results. Prisonermonkeys (talk) 11:42, 20 June 2018 (UTC)
* Then some information gets lost. People who score points from Power Stage (or JWRC stage wins), are notable (their time[loss] and overall position - takes just a few extra rows sometimes). Why would you include this in the text and exclude from the tables? The table includes information that is not necessary to write and we have not written it before - times, timeloss and positions for non top10 PS point scorers. 1 table to summarize every point scorer seems the best solution. Do you also think that 2018_World_Rally_Championship table should not include Power Stage points? --Pelmeen10 (talk) 12:24, 27 June 2018 (UTC)
* @ — just to be clear, do you support removing the power stage points from the results table and limiting the results table to the top ten finishers in each category? Your previous comment suggests that you do, but they also appear to agree with Pelmeen10, who opposes their removal. Prisonermonkeys (talk) 01:29, 27 June 2018 (UTC)
* Yes — I support removing the power stage points from the results table and limiting the results table to the top ten finishers in each category. — Unnamelessness (talk) 09:41, 27 June 2018 (UTC)
* Then it can't be called "results table", but "final positions" or "event standings" or something like that. Result is much more than top10 finishers, "Power Stage winning driver gets a better result from a rally than 8th overall placed finisher". I wonder if @, @, @, @, @, @, @ or @ has an opinion here? --Pelmeen10 (talk) 12:24, 27 June 2018 (UTC)
* Why not simply call it "Rally Top 10", or is that too informal? Then there is no way round to expand it. The table does not have to necessarily have to be named "results table" in my opinion, since it is located in the result section of each report, which also covers the variety of results such as stage winners and so on, and the Top 10 is a result itself. WRC-2 and WRC-3 does not supply any bonus points at all? Then there is no need for a row for that in the final standings in those classes any way. I am going to go with Yes — remove the power stage points in the "top 10" and keep them as seperate tables the classes eligeble for bonus points. Kovpastish (talk) 20:53, 27 June 2018 (UTC)
I see no reason to stop calling it a results table. After all, even with the top ten and the power stage points, we're still only showing a selection of the overall results—those who placed in the three (or four) primary categories. Do we want to expand the results table to show the full rally results? I certainly want to for 2018 Wales Rally GB because I'm pushing to make that a good (and maybe even a featured) article. I know it means including a lot of extra rows, but it's worth noting that there is a precedent here: the 24 Hours of Le Mans articles include all sixty entries in qualifying and race results. Perhaps we can limit the entry list to notable entrants and show the full results later in the article.
Even if we do include the full results, I'm still in favour of keeping power stage points out of it. Prisonermonkeys (talk) 03:45, 28 June 2018 (UTC)
* Comment — I would oppose to the change. I know that a table should be a companion to the prose, but readers of Sports always look for a table first. And keeping this in mind, the current version gives you all the information you need in one spot. MNSZ (talk) 09:39, 28 June 2018 (UTC)
* Comment: we're not just writing articles for sports fans. We're writing for everyone. And there isn't a massive difference between keeping everything in one table and splitting them because one appears right under the other. Prisonermonkeys (talk) 10:09, 28 June 2018 (UTC)
* Comment: What about using the footnotes we use for the championship page on the final results table? Like this 1 2 3 4 5 – Indicates position on Power Stage. And then use a redirect to the Power Stage results further down the report for more information to the user? Kovpastish (talk) 14:32, 28 June 2018 (UTC)
* Comment: that's not really necessary. The power stage table is right under the rally results table. Prisonermonkeys (talk) 20:16, 28 June 2018 (UTC)
Infobox WRC driver (Podiums)
Does the number of podiums in each article reflect only 2nd and 3rd places or is it including wins also? --Pelmeen10 (talk) 16:15, 18 August 2018 (UTC)
* Wins too are podium finishes so they are included. Prolog (talk) 22:32, 20 August 2018 (UTC)
Complete WRC results without Power Stage points?
Why don't we include Power Stage points or positions in driver articles? We should also include JWRC stage winning points. Also stage winning points for ERC stats. It basically means copy-paste from each season's article.
I think this is the best solution for ERC drivers: (example Kajetan Kajetanowicz)
The easiest solution for WRC drivers would be position and PS position with undefined (example Sebastien Ogier)
What do you think, or any better suggestions? --Pelmeen10 (talk) 15:49, 22 August 2018 (UTC)
* No objection to this idea. — Unnamelessness (talk) 23:39, 16 September 2018 (UTC)
Infoboxes
I suggest a change to most infobox templates. 'Last race' should be changed to 'Most recent race'. Not all drives are retired or deceased. Roger 8 Roger (talk) 09:54, 25 August 2018 (UTC)
* Disagree. Calendar decides the order of rally. — Unnamelessness (talk) 23:40, 16 September 2018 (UTC)
* you can remove that race and/or change it to "| updated = 17.09.2018" (or whatever date). --Pelmeen10 (talk) 11:08, 17 September 2018 (UTC)
Rally results table
ONLY top ten finshers in the table, THX. For the crews who finish out of top ten but score points in the PS, we can find out in the PS table. — Unnamelessness (talk) 10:44, 17 September 2018 (UTC)
* Currently we include every WRC/WRC2/WRC3 entry, penalty and retirement. How is it logical that wrc crew finishing outside top10 is not notable in the "rally results"? IMO at least all factory car's final position/time/timeloss etc should be included. We even have "Other major entries" in the entry list, but nothing about their result. The current table is not enough.
* It's not really clear why we include only top10 in the "rally results"- the headline in this case is very misleading. With this logic we should only include top10 entries, top10 penalties and top10 retirements? We currently list top10 overall/wrc2/wrc3/jwrc, but even ewrc-results.com has another "M" - for manufacturer crews, see example. --Pelmeen10 (talk) 10:06, 17 September 2018 (UTC)
* So it's only logical to at least add:
* {|class="wikitable" width=85% style="font-size: 85%;"
! 12 ! 12 ! 15 ! 15 ! 16 ! 16 ! 23 ! 23
* style="background-color:#EAECF0; text-align:center" colspan="11" | Other notable finishers
* style="background-color:#EAECF0; text-align:center" colspan="11" | Other notable finishers
* align="center"| 2
* 🇬🇧 Elfyn Evans
* 🇬🇧 Daniel Barritt
* 🇬🇧 M-Sport Ford WRT
* Ford Fiesta WRC
* align="center" | 4:21:33.5
* +22:09.0
* align="center" | 0
* align="center" | 1
* align="center"| 12
* Khalid Al-Qassimi
* 🇬🇧 Chris Patterson
* 🇫🇷 Citroën Total Abu Dhabi WRT
* Citroën C3 WRC
* align="center" | 4:35:20.6
* +35:56.1
* align="center" | 0
* align="center" | 0
* align="center"| 5
* 🇧🇪 Thierry Neuville
* 🇧🇪 Nicolas Gilsoul
* 🇰🇷 Hyundai Shell Mobis WRT
* Hyundai i20 Coupe WRC
* align="center" | 4:38:11.0
* +38:46.5
* align="center" | 0
* align="center" | 5
* align="center"| 10
* 🇳🇴 Mads Østberg
* 🇳🇴 Torstein Eriksen
* 🇫🇷 Citroën Total Abu Dhabi WRT
* Citroën C3 WRC
* align="center" | 4:54:00.6
* +54:36.1
* align="center" | 0
* align="center" | 0
* }
* --Pelmeen10 (talk) 10:25, 17 September 2018 (UTC)
* Agree with your opionion that the crew finishes out of top ten are notable. So, I am planning to design another table which covers other notable finshers so that all the classified finishers can be find out in those two tables. — Unnamelessness (talk) 12:18, 17 September 2018 (UTC)
* What about using 1 column for overall finishers? --Pelmeen10 (talk) 13:56, 17 September 2018 (UTC)
* {|class="wikitable" width=85% style="font-size: 85%;"
! colspan="2" | Position ! rowspan="2" | No. ! rowspan="2" | Driver ! rowspan="2" | Co-driver ! rowspan="2" | Entrant ! rowspan="2" | Car ! rowspan="2" | Time ! rowspan="2" | Difference ! colspan="2" | Points ! Event ! Class ! Class ! Stage ! colspan=2| 1 ! colspan=2| 2 ! colspan=2|3 ! colspan=2|4 ! colspan=2|5 ! colspan=2|6 ! colspan=2|7 ! colspan=2|8 !colspan=2|9 ! colspan=2|10
* style="background-color:#EAECF0; text-align:center" colspan="11" | Overall classification
* style="background-color:#EAECF0; text-align:center" colspan="11" | Overall classification
* align="center" | 8
* 🇪🇪 Ott Tänak
* 🇪🇪 Martin Järveoja
* 🇯🇵 Toyota Gazoo Racing WRT
* Toyota Yaris WRC
* align="center" | 3:59:24.5
* 0.0
* align="center" | 25
* align="center" | 3
* align="center"| 7
* 🇫🇮 Jari-Matti Latvala
* 🇫🇮 Miikka Anttila
* 🇯🇵 Toyota Gazoo Racing WRT
* Toyota Yaris WRC
* align="center" | 3:59:46.8
* +22.3
* align="center" | 18
* align="center" | 2
* align="center"| 6
* 🇳🇿 Hayden Paddon
* 🇬🇧 Sebastian Marshall
* 🇰🇷 Hyundai Shell Mobis WRT
* Hyundai i20 Coupe WRC
* align="center" | 4:01:10.8
* +1:46.3
* align="center" | 15
* align="center" | 0
* align="center"| 3
* 🇫🇮 Teemu Suninen
* 🇫🇮 Mikko Markkula
* 🇬🇧 M-Sport Ford WRT
* Ford Fiesta WRC
* align="center" | 4:03:35.4
* +4:10.9
* align="center" | 12
* align="center" | 0
* align="center"| 4
* 🇳🇴 Andreas Mikkelsen
* 🇳🇴 Anders Jæger-Synnevaag
* 🇰🇷 Hyundai Shell Mobis WRT
* Hyundai i20 Coupe WRC
* align="center" | 4:06:36.2
* +7:11.7
* align="center" | 10
* align="center" | 0
* align="center"| 81
* 🇳🇴 Henning Solberg
* 🇦🇹 Ilka Minor-Petrasko
* 🇳🇴 Henning Solberg
* Škoda Fabia R5
* align="center" | 4:13:05.1
* +13:40.6
* align="center" | 8
* align="center" | 0
* align="center"| 32
* 🇨🇿 Jan Kopecký
* 🇨🇿 Pavel Dresler
* 🇨🇿 Škoda Motorsport II
* Škoda Fabia R5
* align="center" | 4:17:49.7
* +18:25.2
* align="center" | 6
* align="center" | 0
* align="center"| 37
* 🇷🇴 Simone Tempestini
* 🇷🇴 Sergio Itu
* 🇷🇴 Simone Tempestini
* Citroën C3 R5
* align="center" | 4:19:01.6
* +19:37.1
* align="center" | 4
* align="center" | 0
* align="center"| 39
* 🇬🇧 Chris Ingram
* 🇬🇧 Ross Whittock
* 🇹🇷 Toksport WRT
* Škoda Fabia R5
* align="center" | 4:19:45.8
* +20:21.3
* align="center" | 2
* align="center" | 0
* align="center"| 1
* 🇫🇷 Sébastien Ogier
* 🇫🇷 Julien Ingrassia
* 🇬🇧 M-Sport Ford WRT
* Ford Fiesta WRC
* align="center" | 4:20:15.7
* +20:51.2
* align="center" | 1
* align="center" | 4
* }
* I actually liked 1 table version more. --Pelmeen10 (talk) 14:00, 17 September 2018 (UTC)
* Using one table version has a major problem. If there are two or three catagories which have crews out of top ten on the list, how could we distinguish the difference? To the rally winner or to the class leader? Than what's time we compared to? I would rather remove the "difference" column rather than entangle in which to fill. In that case, we have to design a new one. The best example is Finland.
* So, I designed this one:
* {|class="wikitable" width=85% style="font-size: 85%;"
! colspan="2" | Position ! rowspan="2" | No. ! rowspan="2" | Driver ! rowspan="2" | Co-driver ! rowspan="2" | Entrant ! rowspan="2" | Car ! rowspan="2" | Class ! rowspan="2" | Time ! Points ! Event ! Class ! Stage
* }
* — Unnamelessness (talk) 14:41, 17 September 2018 (UTC)
* Actually the column title Difference should answer your question. In the 2 table version it's possible to add both, but I see no reason to add the column "Points" when non of the crews received points. --Pelmeen10 (talk) 15:02, 17 September 2018 (UTC)
Ok, then it will become a very interesting situation. e.g. (Finland) Look at those differences, they are not monotonous increasing as the first table, which would puzzle some readers.
Speaking of the column "Points", my opinion is that for page consistency, this column should be either remove in all pages or keep in all pages instead of selecting which pages should have. — Unnamelessness (talk) 23:17, 17 September 2018 (UTC)
New Wikitable Design
It has been serval months since we started to use the new special stages wikitable, which includes drivers' and co-drivers' names in it. I noticed that there's a lot of space on the right side of the table. Why don't we make full use of the space? Like:
First, it saved the length of the wikitable.
Second, it is much easier and clearer to display the joint lead, like:
--Unnamelessness (talk) 05:39, 16 November 2018 (UTC)
* Yes, if you think my version is not suitable. Current one is not good, and 1 cell version is much better than it was in the beginning (seperate cell for co-driver). Pelmeen10 (talk) 19:02, 16 November 2018 (UTC)
* "First, it saved the length of the wikitable."
* But it's causing the table to be unnecessarily wide. You need the nowraps to make the table readable. The problem is that it's forcing the table to be very wide—wider than the default for most browsers. The browsers automatically resize to accomodate the widest object on the screen, which forces the rest of the article to appear smaller. It's possible for individual users to fix their display settings, but it's unreasonable to expect everyone to do it independently. Whatever the benefits of using the mdashes, it's causing major accessibility issues. <IP_ADDRESS> (talk) 05:50, 18 November 2018 (UTC)
* My laptop doesn't have that issue. If you are worried about the width, then we use the nowraps to fix the issue. --Unnamelessness (talk) 07:08, 18 November 2018 (UTC)
* My laptop doesn't have that issue. If you are worried about the width, then we use the nowraps to fix the issue. --Unnamelessness (talk) 07:08, 18 November 2018 (UTC)
* I don't have that problem either. What to you mean "accessibility issues"? Same problem (width) with separate columns. With co-drivers it's either unnecessarily wide or unnecessarily long.Pelmeen10 (talk) 08:15, 18 November 2018 (UTC)
* "My laptop doesn't have that issue."
* "I don't have that problem either."
* That doesn't mean anything. Your resolution settings work fine, but that doesn't mean that everyone has the same experience.
* "What to you mean 'accessibility issues'?"
* I mean that people cannot read the article easily because the screen automatically scales the article to fit the widest object—the table. Everything else is reduced in size as a result.
* "With co-drivers it's either unnecessarily wide or unnecessarily long."
* But a long table doesn't have the issues of a wide table. <IP_ADDRESS> (talk) 08:24, 18 November 2018 (UTC)
* But a long table doesn't have the issues of a wide table. <IP_ADDRESS> (talk) 08:24, 18 November 2018 (UTC)
So, to solve the potential issue, my advice is to use the nowraps. --Unnamelessness (talk) 08:39, 18 November 2018 (UTC)
* And I think the issue of a long table is unclear to display the joint stage win/lead. --Unnamelessness (talk) 08:44, 18 November 2018 (UTC)
* "So, to solve the potential issue"
* It'a not a "potential" issue. It's an issue, full stop. Just because you don't see it, that doesn't mean it's not there. Moreover, we have the means to fix it for everyone with the markup.
* "my advice is to use the nowraps."
* The nowraps force everything into one row. We use them for tablet and mobile readers where tables that are wider than the screen (because the screens are so small) are unavoidable. <IP_ADDRESS> (talk) 11:01, 18 November 2018 (UTC)
* "It's an issue, full stop."
* The nowraps can solve the issue you mentioned before.
* "The browsers automatically resize to accomodate the widest object on the screen, which forces the rest of the article to appear smaller."
* Everything is forced into one row, then it is readable. Issue fixed. Why revert it back? --Unnamelessness (talk) 11:25, 18 November 2018 (UTC)
* Everything is forced into one row, then it is readable. Issue fixed. Why revert it back? --Unnamelessness (talk) 11:25, 18 November 2018 (UTC)
Besides all the arguing over small things - the final results table no more includes points scored. Readers can no longer find out the most important thing of an event. Why the heck do we even have (so long) articles? Pelmeen10 (talk) 08:48, 18 November 2018 (UTC)
* Too messy is the reason that the table does not include the points. I think we probrably need another new wikitable to list the crews that manage to score points. --Unnamelessness (talk) 08:54, 18 November 2018 (UTC)
* Basically everything else is less important compared to points scorers. Messy or not messy, currently (let's take 2018 Rally de España) there's no indication crews even scored any points - especially lower classes like wrc2. Pelmeen10 (talk) 09:14, 18 November 2018 (UTC)
* Now I design one at 2018 Rally Australia. --Unnamelessness (talk) 10:03, 18 November 2018 (UTC)
* Another table is the last thing we need. And might I remind you, @ that we're in this situation because you insisted on having a redundant column in the table. <IP_ADDRESS> (talk) 11:03, 18 November 2018 (UTC)
@ @ I have to say, I genuinely feel depressed sometimes. You spent an hour in designing a new table, then another editor straightly remove it just because he/she disagree with the idea. Seriously, have you two guys try to do something constructive at rally pages? Like updating statistics or writing a rally summary? The only exception is Rally GB probrably. The whole feeling you two give me is just demanding. I have to say this is impossible to get consensus. --Unnamelessness (talk) 11:52, 18 November 2018 (UTC)
@<IP_ADDRESS>, we are in this situation because you decided from Wales Rally GB, that we should include all registered crews and their overall time. Then you decided that including point is messy. Jeez, what is the actual point of these articles? We should start from the most important things and then consider adding other stuff, not the other way around. Why can't we go back to the style we used until 2018 Rally Turkey? Btw too long articles make it unfocused, can we think about some content being auto-collapsed? Pelmeen10 (talk) 21:21, 18 November 2018 (UTC)
* @ I have already made three rally pages and genuinely think the full entry list is not very necessary since most of the infomation is not so important. I would also say go back to the style used until 2018 Rally Turkey.
* Then we will face the question about limiting the crews to top ten finshers or not, and I think the newly-designed table (e.g. 2018 Rally Australia) would be a better solution.
* Speaking of the question that should stage results table include co-drivers or not, I would go on with Yes. As <IP_ADDRESS> (PrisonerMonkeys) mentioned at Talk:2018 Wales Rally GB:
* "A crew is made up of a driver and co-driver. Both should be recognised."
* And I'd prefer a wide version with the noraps.
* So, summarize for 2019 rally pages: just WRC/WRC-2/WRC-3/J-WRC entries, rally result wikitable (top ten finishers), Power stage result table, J-WRC extra points result table (use it in J-WRC rounds), points scorers table, stage result table (wide), penalty table and retirement table.
* I am wondering the opinion of yours, in fact, the opinion of every editors participated in the project. --Unnamelessness (talk) 13:52, 19 November 2018 (UTC)
* I agree with listing only those crews that take part in those championships (wrc3 is history though). And then we shouldn't include any other un-notable crews in retirements/penalties either. But, every crew we mention in the entry list, we have to include their overall result. Wait, what tables are you suggesting for results (different from Rally Turkey page)? Top10 and point scorers both? Pelmeen10 (talk) 17:16, 19 November 2018 (UTC)
* Yep, WRC-3 is history, my bad. So, just WRC/WRC-2 (Pro)/J-WRC entries. And how do we difine "notable" in retirement/penalty table. I think they should include WRC/WRC-2 (Pro)/J-WRC crews.
* Regarding the results, top 10 and point scorers both, yep, because the WRC crews who score the Power stage points but not finish in the top ten and J-WRC crews who achieve stage wins but retire will not list in the top ten table. So, I think we need point scorers table to list all the crews who score points. --Unnamelessness (talk) 23:56, 19 November 2018 (UTC)
Ford
There is an ongoing dispute on the page World Rally Championship about 2017's manufacturer champion. My prospective is to use "🇬🇧 M-Sport", because
a) In 2017, Ford did not contest the championship.
b) The manufacturer champion of 2017 is M-Sport, which is a British team.
c) Ford competed from 1973–1985 with a U.S. racing license, and has competed since 1986 with a British racing licence.
Per c), 2006 & 2007 are British as well. — Unnamelessness (talk) 03:58, 16 December 2018 (UTC) | WIKI |
User:Erik Delarosa/sandbox
{hatnote|nickjr (TV channel) redirects here, for the former baby nick. block in the Usa, see Nick Jr. Classics}}
{{Infobox television channel it got mlp dora bob the builder and Classic Nick Jr shows on baby nick The Flumps]] (2004-2010)'' Peg + Cat ''(2013-2014)' Go Diego Go! (2005-2014)* boohbah (2003-2005)'' --- it's the best place for cartoons {{clear}}
* name = baby nick
* logofile =
* logosize =
* launch = {{Start date|2014|2|2}} {{small|(as Noggin)}} {{Start date|2009|9|28}} {{small|(relaunch: as Nick Jr.)}}
* old closed date nickjr = March 2014
* My Little Pony: Friendship Is Magic (2010-2016)
* Bagpuss (2004-2010)
* Ooh, Aah & You (2007-2011)
* the hive (2010-2012)
* Paddington Bear (2004-2010)
* Sítio do Picapau Amarelo (animated series) (2012-2014)
* Bob The Builder ''(2008)
* The Adventures of Portland Bill (2008-2010)
* Rainbow (2004-2010)
* Dora the Explorer (2000-2014)
* Thomas the Tank Engine and Friends (2009-2010)
* The Flumps (2004-2010)
* King Rollo (2005-2010)
* Ivor the Engine (2004-2010)
* Mr Benn (2004-2010)
* Bod (2004-2010)
* Camberwick Green (2004-2010)
* Trumpton (2004-2010)
* Chigley (2004-2010)
* Parsley the Lion (2004-2010)
* Littlest Pet Shop (2012 TV series) (2012-2014)
* My Little Pony: Equestria Girls (2013-2014)
* Teletubbies ( 1997-2001)
* max and ruby ''(2002-2013)'*
* angelina Ballerina: The Next Steps (2009-2014)
* blue's Clues ( 1996-2006)
* Blue's Room ''(2004-2007)'*
* Plaza Sésamo ''(1972-2014)'*
* ''Wild Animal Baby Explorers2010-2014
* Dora and Friends: Into the City! ''(2004-2007)'*
* Cartoonito
* Tooncast
* List of international Cartoon Network channels | WIKI |
.bash_profile and handy scripts
2 Comments
Just a copy of my .bash_profile in case I ever forget it.
Misc unix commands
> du -sh *
.bash_profile
export PATH=$PATH:~/scripts
export JAVA_HOME=/Library/Java/Home
alias nutshell='cd /Users/jrasmusson/Developer/agilenutshell'
alias reduce='sips --resampleWidth 200 a.png --out b.png'
alias ios='cd /Users/jrasmusson/Developer/iosbyexample'
alias gs='git status'
alias test='bundle exec rspec spec'
My scripts directory:
ci.sh easy git checkin
#!/bin/bash
echo "Checking in..."
git add .
if [ -z "$1" ]
then
git commit -a -m "cleanup"
else
git commit -a -m "$1"
fi
git push
echo "Done!"
reset.sh resets my git repository
!/bin/bash
echo &amp;quot;Reseting git repository&amp;quot;
git reset --hard HEAD^
git clean -f
git merge origin/master
chmod 711 ci.sh reset.sh
Something that handles ssh
#!/bin/sh
echo "ssh mount..."
ssh -t -t root@192.168.1.107 <<EOF
mount -o remount,rw /system
exit
EOF
echo "copying..."
scp libspotify.so root@192.168.1.107:/system/chrome/plugins/libspotify.so
echo "ssh chmod"
ssh root@192.168.1.107 <<EOF
chmod 0744 /system/chrome/plugins/libspotify.so
reboot
exit
EOF
How to drop, create, populate, and reset your rails database
Leave a comment
Getting frustrated with all the commands I needed to type I created the following scripts and tools to simplify destroying and recreating my rails database.
Step 1: Create an ‘all’ task.
lib/tasks/db.rake
namespace :db do
task :all => [:environment, :drop, :create, :migrate, :populate] do
end
end
The basic commands for recreating and populating your database from the command line often require some variation of:
Rebuild db
$ rake db:drop
$ rake db:create
$ rake db:migrate
$ rake db:fixtures:load RAILS_ENV=test
$ rake db:test:prepare
This rake task does most of this for us. To get data into the database I create a second task shown above ‘populate’.
Step 2: Create a populate task.
require 'faker'
namespace :db do
desc "Fill database with sample data"
task :populate => :environment do
puts "----------------"
puts "RAILS_ENV is #{RAILS_ENV}"
puts "----------------"
puts "----------------"
puts "--- populate ---"
puts "----------------"
make_cities
make_users
make_categories
make_listings
end
end
def make_cities
puts "----------------"
puts "--- cities ---"
puts "----------------"
City.create!(:name => "Calgary")
City.create!(:name => "San Francisco")
end
def make_users
puts "----------------"
puts "---- users ----"
puts "----------------"
admin = User.create!(:name => "aaa",
:email => "aaa@aaa.com",
:password => "foobar",
:city_id => 1)
admin.toggle!(:admin)
2.times do |n|
name = Faker::Name.name
email = "example-#{n+1}@railstutorial.org"
password = "password"
User.create!(:name => name,
:email => email,
:password => password,
:city_id => 1)
end
end
This task uses the fake gem to create and load test data into which ever environment we pass in via ‘RAILS_ENV’. It won’t work by itself yet, but we can now run this using our ‘all’ task by going:
> rake db.all
> rake db.all RAILS_ENV=test
Step 3: Put it together in a bash script
db.sh
#!/bin/bash
echo "Reseting database"
rake db:all
rake db:all RAILS_ENV=test
Now when ever I would to scrap and start all over, I rollback my git repository, and rebuild my db.
Voila. Clean slate and I can what ever it was I was trying to do again.
Simple bash script to reset your git repository
1 Comment
Here’s a simple script I use whenever I screw up (often) and need to reset my git local git repository to a clean slate.
reset.sh
#!/bin/bash
echo "Reseting git repository"
git reset --hard HEAD^
git clean -f
git merge origin/master
Simple bash script for checking into git
Leave a comment
Having gotten tired of typing the same commands over and over again I created a simple script to conveniently check into my git repositories.
ci.sh
!/bin/bash
echo "Checking in..."
git add .
if [ -z "$1" ]
then
git commit -a -m "cleanup"
else
git commit -a -m "$1"
fi
git push
echo "Done!"
How to create a UNIX bash script on a mac
7 Comments
The ability to create and make your own custom bash scripts is on of the biggest advantages to working off a unix based operating system (like the mac).
You can take just about any mundane, or complicated task, and easily automated it by learning how to create your own bash scripts.
In this post I am going to show you how to create a bash script called:
findtext.sh
(which recursively search all files for text containing xxx (very handy)) and call it from anywhere on your computer.
Setup your environment
Go to your home directory:
$ cd ~
and make a directory called scripts (this is where you will store your scripts):
$ mkdir scripts
Then if you don’t have one already, create a .bash_profile file (in your root directory) and add the following line:
export PATH=$PATH:~/scripts
This puts the directory you just created into the unix $PATH variable which lets you call your scripts from anywhere on your machine.
To register this new path you may need to go:
$ source .bash_profile
You can then check your new path by typing:
$ echo $PATH
/opt/local/bin:...:/usr/local/bin:/usr/X11/bin:/Users/jr/scripts
If all is well you should see your new directory in the output.
OK. We are now ready to create your script.
Create your script
To create your script go back to that scripts directory your just created and using your favorite text editor create a file called ‘findtext.sh’
#!/bin/bash
echo "Searching for text:" $1
find . -type f -exec grep -il $1 {} \;
And give yourself permission to execute it using the following command:
$ chmod 711 findtext.sh
That’s it! At this point you are basically done.
You should now be able to run this script from anywhere on your box.
To test it out, navigate to some directory containing a lot of files and text and search for something.
Here is the output I get when I search my rails app for ‘README’
$ findtext.sh README
Searching for text: README
./testApp/doc/README_FOR_APP
./testApp/generate/doc/README_FOR_APP
./testApp/generate/README
Add your aliases
You can also add aliases to your .bash_profile to help make your life easier.
alias dev='cd /Users/jr/Documents/dev/rails'
Now I can type ‘dev’ and instant be taken to my development directory.
For more information on bash and scripting click here.
%d bloggers like this: | ESSENTIALAI-STEM |
George Haddock (politician)
George Bahr Haddock (1863 – 22 March 1930) was a British Conservative Party politician who served as the Member of Parliament (MP) for North Lonsdale from 1906 to 1918.
Career
He won the seat at the 1906 general election, defeating by a narrow majority of 2.2% the sitting MP Richard Cavendish, who had been elected as a Liberal Unionist but had joined the Liberal party in 1904.
Haddock was re-elected in January 1910, when his slim majority of 69 votes over the Liberal Joseph Bliss was the subject of an election petition. Bliss's campaign team had asked for recount after the vote was declared, but were told that the ballot boxes had already been sealed and sent by train to London. They lodged a petition, which claimed that invalid votes for Haddock had been allowed while valid votes for Bliss had been disallowed. The court allowed a recount, and Haddock's majority was increased to 169 votes (2.0%).
He was re-elected in December 1910 by an even slimmer majority of 74 votes (1.0%) over Bliss, and held the seat until the North Lonsdale constituency was abolished at the 1918 general election. | WIKI |
Chick-fil-A has double McDonald's sales despite closing Sunday
Chick-fil-A restaurants generate more than double the revenue of McDonald's restaurants, according to a new analysis by Goldman Sachs citing Technomic data. The Atlanta-based chain has grown rapidly over the last decade and now ranks as the fifth largest fast-food company in the US in terms of market share, up from the No. 23 spot in 2005, according to the report."Steer clear from those in the fray of Chick-fil-A," analysts said. Companies most at risk from the Chick-fil-A threat include Popeyes, Jack in the Box, Wendy's, and KFC, analysts said. Chick-fil-A is seemingly unstoppable. The Atlanta-based chain has grown rapidly over the last decade and now ranks as the fifth largest fast-food company in the US in terms of market share, up from the No. 23 spot in 2005, Goldman Sachs analysts wrote in a research note citing data from Technomic.And despite being closed on Sundays, Chick-fil-A restaurants generate more than double the revenue of McDonald's restaurants, according to the data. "Our brand survey shows that Chick-fil-A has had the most brand momentum across [fast-food restaurants] — supporting the most increase in total revenue (in dollar terms) in the US," Goldman analysts wrote.Read more: Chick-fil-A likely loses out on more than $1 billion in sales every year by closing on Sundays — and it's a brilliant business strategyLooking ahead, Chick-fil-A's "rapid rise" is showing no signs of slowing, according to the note."Steer clear from those in the fray of Chick-fil-A," analysts said. "Our 2,000 consumer brand survey suggests they will continue to take share and grow."Companies most at risk from the Chick-fil-A threat include Popeyes, Jack-in-the-Box, Wendy's, and KFC, analysts said. Chick-fil-A generated more than $10 billion in sales last year, up from $2 billion in 2005, as the company has expanded into new markets in the Northeast and Midwest.The company's total number of locations grew by nearly 8% last year, on top of 7% growth the previous year, according to Technomic data cited by Goldman Sachs. By comparison, Chick-fil-A rival KFC closed more than 1% of its locations in the US. | NEWS-MULTISOURCE |
Asked by: Mattie Leris
technology and computing operating systems
How can I install TeamViewer in Ubuntu?
29
How to install TeamViewer on Ubuntu
1. Open the teamviewer_13. x. yyyy_amd64.
2. Click on the Install button. The Authenticate dialog boxwill open.
3. Enter the administrative password.
4. Click on the Authenticate button. TeamViewer will beinstalled.
5. TeamViewer is installed on your Ubuntusystem and can be started from the menu.
In this way, how do I start TeamViewer in Ubuntu?
Installation of TeamViewer Through Ubuntu CommandLine
1. Step 1: Download and add TeamViewer repository key. Open theTerminal either through the system Dash or the Ctrl+Alt+Tshortcut.
2. Step 2: Add the TeamViewer repository.
3. Step 3: Install TeamViewer through the apt command.
4. Step 4: Launch TeamViewer.
Additionally, how do I connect to remote desktop in Ubuntu? 4 Connecting From An UbuntuClient Open "Search your computer" and type in "remmina":Click on the Remmina Remote Desktop Client icon to start theapplication. Select 'VNC' as protocol and enter the IP address orhostname of the desktop PC that you like to connectto.
People also ask, does TeamViewer work on Linux?
Though TeamViewer is a proprietary software, itis available free of charge for non-commercial use andoffers almost everything the paid version has to offer. Startingwith TeamViewer 13, it has a native Linux client for64 bit systems.
Is TeamViewer safe?
However, TeamViewer said that "neither wasTeamViewer hacked nor is there a security hole,TeamViewer is safe to use and has proper securitymeasures in place. Our evidence points to careless use as the causeof the reported issue, a few extra steps will prevent potentialabuse."
Related Question Answers
Fiz Mcginty
Professional
How do I install a deb file?
So if you have a .deb file:
1. You can install it using: sudo dpkg -i /path/to/deb/file sudoapt-get install -f.
2. You can install it using sudo apt install ./name.deb (or sudoapt install /path/to/package/name.deb ).
3. Install gdebi and open your .deb file using it (Right-click-> Open with).
Abdessamad Durango
Professional
Is TeamViewer free?
TeamViewer and the freemium model
From the very beginning, TeamViewer has beenavailable to everyone completely free of charge forpersonal, non-commercial use.
Giuliana Zinevich
Explainer
How do I use TeamViewer?
Start TeamViewer.
1. Click the Remote Control tab. Ask your partner to start theTeamViewer full version or TeamViewer QuickSupport (see.
2. Click the Remote control option button. Click the Connect topartner button.
3. → The TeamViewer Authentication dialog box will open.Enter the password of the remote computer.
4. Click Log On.
Rayner Mullers
Explainer
How do I install TeamViewer?
Steps
1. Open a web browser.
2. Visit the TeamViewer website.
3. Click the Download TeamViewer button.
4. Click the downloaded installer.
5. Click the Basic installation option.
6. Click Personal / Non-commercial use.
7. Click Finish.
8. Click Next in the TeamViewer window that appears afterinstallation.
Irineo Badikoff
Pundit
What is TeamViewer used for?
TeamViewer (TeamViewer 6) is a popularpiece of software used for Internet-based remote access andsupport. TeamViewer software can connect to any PC orserver, so you can remote control your partner's PC as if you weresitting right in front of it.
Jc Posselt
Pundit
How do you update TeamViewer?
Download the latest TeamViewer full version, to getauto updates and to use Remote Update.
How to enable the auto update for TeamViewer
1. Open the TeamViewer full version.
2. Click Extras | Options.
3. Click Advanced.
4. Choose which updates you would like to install under Installnew versions automatically.
Zahari Homeriki
Pundit
How do I download TeamViewer on Linux?
To install TeamViewer on your Ubuntusystem, follow these steps: Download the TeamViewerDEB package fromhttps://www.teamviewer.com/en/download/linux/.Open the teamviewer_13.x.yyyy_amd64.deb file with a double click.The TeamViewer installation package will open in theUbuntu Software Center.
Nube Escriche
Pundit
Can I install two versions of TeamViewer?
Re: How to use multiple versions ofTeamViewer
Therefor you can just have yourTeamViewer 11 on your device and connect both to theTeamViewer 10 and TeamViewer 11 versions.Otherwise, you can download the normal TeamViewer 11full version and the TeamViewer Portable forTeamViewer 10.
Sebastiana Queyrel
Pundit
How do I install TeamViewer from terminal?
Installing TeamViewer on Ubuntu
1. Download TeamViewer. Open your terminal either by using theCtrl+Alt+T keyboard shortcut or by clicking on the terminalicon.
2. Install TeamViewer. Install the TeamViewer .deb package byissuing the following command as a user with sudo privileges:
Matthias Israel
Teacher
How do I install a RPM file?
Use RPM in Linux to install software
1. Log in as root , or use the su command to change to the rootuser at the workstation on which you want to install thesoftware.
2. Download the package you wish to install.
3. To install the package, enter the following command at theprompt: rpm -i DeathStar0_42b.rpm.
Natasha Pecanço
Teacher
How do I find my Ubuntu version?
1. Checking Your Ubuntu Version From theTerminal
1. Step 1: Open the terminal.
2. Step 2: Enter the lsb_release -a command.
3. Step 1: Open “System Settings” from the desktopmain menu in Unity.
4. Step 2: Click on the “Details” icon under“System.”
5. Step 3: See version information.
Soufia Wittpfenning
Teacher
How do I use remote desktop in Linux?
Go to the Linux computer you use to remotelyaccess the Windows PC and launch Remmina. Enter the IP addressof your Windows computer and hit the Enter key. (How do I locate myIP address in Linux and Windows 10?) When prompted, enteryour username and password and click OK.
Natisha Vishwamber
Teacher
Does Ubuntu have Remote Desktop?
Connecting From Ubuntu/Linux
Ubuntu, and most Linux distributions, comes withan excellent VNC-compatible remote desktop viewer bydefault. You can find this program by clicking Search and enteringremote. The first result, Remmina Remote DesktopClient is the tool you need.
Mel Sandfuhr
Reviewer
What does putty stand for?
PuTTY is a terminal emulator application whichcan act as a client for the SSH, Telnet, rlogin, and raw TCPcomputing protocols. The word "PuTTY" has no meaning, though'tty' is sometimes used to refer to the Unix terminals, as anacronym for 'teletype'.
Quirze Camafreita
Reviewer
How can I access my computer from anywhere?
If You're Connecting from Inside Your Network
1. On the computer you want to access remotely, click the Startmenu and search for "allow remote access". Choose the "Allow RemoteAccess to This Computer" option.
2. On your remote computer, go to the Start button and search for"Remote Desktop".
3. Click "Connect."
Arjun Heuze
Reviewer
How do I connect to remote desktop?
To allow remote connections on the computer you want toconnect to
1. Open System by clicking the Start button. , right-clickingComputer, and then clicking Properties.
2. Click Remote settings.
3. Click Select Users.
4. In the Remote Desktop Users dialog box, click Add.
5. In the Select Users or Groups dialog box, do thefollowing:
Valdirene Harchev
Reviewer
How do I install XRDP on Ubuntu?
Installation
1. With Ubuntu 18.04 first install xrdp: sudo apt-get -y installxrdp.
2. Next, one may adjust the configuration file: sudo nano/etc/xrdp/xrdp.ini.
3. Set encryption level to high: encrypt_level=high.
4. Next, allow just RDP through the local firewall: sudo ufw allow3389/tcp.
Anisio Reitter
Supporter
What is meant by Ubuntu Software?
Ubuntu is an open-source operating system (OS)based on the Debian GNU/Linux distribution. Ubuntu isprimarily designed to be used on personal computers, although aserver editions does also exist. Ubuntu is an African wordthat literally means "humanity to others."
Cesarino Saifulov
Supporter
What is Remmina Ubuntu?
remmina.org. Remmina is a remote desktopclient for POSIX-based computer operating systems. It supports theRemote Desktop Protocol (RDP), VNC, NX, XDMCP, SPICE and SSHprotocols. Remmina is in the package repositories for Debianversions 6 (Squeeze) and later and for Ubuntu versions since10.04 (Lucid Lynx). | ESSENTIALAI-STEM |
Juan Ramón Sánchez (actor)
Juan Ramón Sánchez Guinot (1957 – April 10, 2008) was a Spanish actor, singer, sculptor and painter who played Chema the baker in the Spanish Sesame Street co-production Barrio Sésamo.
Biography
During the mid-1970s, Sánchez performed in a music group, Red de San Luis.
Sánchez began his career on the TV series El señor Villanueva y su gente, before becoming one of the most beloved human stars of Barrio Sésamo in the 1980s.
While acting in Barrio Sésamo, Sánchez also appeared in a small role as a male nurse in Pedro Almodóvar's 1986 movie Matador. Sánchez has also appeared as a guest actor on the Spanish TV series Farmacia de guardia and Los ladrones van a la oficina.
Alongside with his wife Vivares and other actors from the series (such as José Riesgo), Sánchez appeared in a stage version of Barrio Sésamo during the late 1980s, touring through Spain.
More recently, Sánchez performed on stage and met with some success as a painter. He nevertheless admitted that people still called him "Chema".
His last television performance was on Gala Infantil 2006, in a "¿Como están ustedes?" ("How are you?") segment. With Espinete, Don Pimpón, and Ana, he sang the Barrio Sésamo theme "Todos los del barrio" for the last time.
Personal life
Sánchez was married to Chelo Vivares, the actress who performed the full-bodied Muppet Espinete on Barrio Sésamo. They married before the beginning of their work together in 1983.
Death
Sánchez died as a result of lung cancer in Madrid on April 10, 2008. He was 51 years old. | WIKI |
How does a doctor find out if I have a urinary tract infection (UTI)?
To find out if you have a UTI, your doctor will need to test a clean sample of your urine. The doctor or nurse will give you a clean plastic cup and a special wipe. Wash your hands before opening the cup. When you open the cup, don't touch the inside of the lid or inside of the cup. Put the cup in easy reach. Separate the labia, the outer lips of the vagina, with one hand. With your other hand, clean the genital area with the wipe. Wipe from front to back. Do not touch or wipe the anus. While still holding the labia open, pass a little bit of urine into the toilet. Then, catch the rest in the cup. This is called a "clean-catch" sample. Let the rest of the urine fall into the toilet.
If you are prone to UTIs, your doctor may want to take pictures of your urinary tract with an x-ray or ultrasound. These pictures can show swelling, stones, or blockage. Your doctor also may want to look inside your bladder using a cystoscope (SISS-tuh-skohp). It is a small tube that's put into the urethra to see inside of the urethra and bladder.
This answer is based on source information from the National Women's Health Information Center
Kevin W. Windom, MD
OBGYN (Obstetrics & Gynecology)
The most common way to test for urinary tract infections is by a urine culture. This is when the urine is sent to a lab to see if any bacteria grow in the culture medium. In addition, your physician can run a urinalysis to look for traces of bacteria or leukocytes (white blood cells in the urine). | ESSENTIALAI-STEM |
pg_send_query_params
(PHP 5 >= 5.1.0, PHP 7, PHP 8)
pg_send_query_paramsSubmits a command and separate parameters to the server without waiting for the result(s)
Description
pg_send_query_params(PgSql\Connection $connection, string $query, array $params): int|bool
Submits a command and separate parameters to the server without waiting for the result(s).
This is equivalent to pg_send_query() except that query parameters can be specified separately from the query string. The function's parameters are handled identically to pg_query_params(). Like pg_query_params(), it will not work on pre-7.4 PostgreSQL connections, and it allows only one command in the query string.
Parameters
connection
An PgSql\Connection instance.
query
The parameterized SQL statement. Must contain only a single statement. (multiple statements separated by semi-colons are not allowed.) If any parameters are used, they are referred to as $1, $2, etc.
params
An array of parameter values to substitute for the $1, $2, etc. placeholders in the original prepared query string. The number of elements in the array must match the number of placeholders.
Return Values
Returns true on success, false or 0 on failure. Use pg_get_result() to determine the query result.
Changelog
Version Description
8.1.0 The connection parameter expects an PgSql\Connection instance now; previously, a resource was expected.
Examples
Example #1 Using pg_send_query_params()
<?php
$dbconn
= pg_connect("dbname=publisher") or die("Could not connect");
// Using parameters. Note that it is not necessary to quote or escape
// the parameter.
pg_send_query_params($dbconn, 'select count(*) from authors where city = $1', array('Perth'));
// Compare against basic pg_send_query usage
$str = pg_escape_string('Perth');
pg_send_query($dbconn, "select count(*) from authors where city = '{$str}'");
?>
See Also
add a note
User Contributed Notes
There are no user contributed notes for this page.
To Top | ESSENTIALAI-STEM |
Babies recognize their parents by sight, sound, and smell. They learn to associate these cues with the people who care for them the most. This process starts during pregnancy and continues after birth.
By six months old, most babies can pick out their mother or father from a crowd of strangers.
Most babies recognize their parents by the time they are six months old. They may not be able to tell you who their mom and dad are, but they will definitely know when they see them. This is because babies learn through facial recognition.
So, if you want your baby to recognize you, make sure you spend plenty of time looking at them and letting them look at you.
Do Babies Know Who Their Parents Are?
It is a common belief that babies know who their parents are. This idea is based on the fact that babies are born with a natural sense of attachment and love for their parents. However, there is no scientific evidence to support this claim.
There is also no evidence to suggest that babies have any sort of innate knowledge about their parents. The only way for a baby to know who its parents are is through experience and learning.
What Age Do Babies Recognize Mom And Dad?
Most babies recognize their mother’s voice and face by the time they are 3 months old. They also begin to show a preference for their mother over other people at this age. By 6 months, most babies can also recognize their father’s voice and face.
Can a 2 Month Old Recognize Mom?
It is common for a 2-month old baby to recognize their mother. This is because they have been spending time with her since they were born and have developed a strong bond. The baby will usually respond to their mother’s voice and smell, and may even turn their head towards her when she enters the room.
If you are wondering whether your 2-month old recognizes you, try talking to them in a soft voice or offer them a favorite toy. You may also want to hold them close and see if they calm down when you are holding them.
Can Babies Tell Who Their Dad Is?
It’s a common question that many new parents ask themselves – can babies tell who their dad is? The answer, according to experts, is a resounding yes! From the moment they are born, babies have the ability to distinguish between different voices and faces, and this includes their father’s.
So how do they do it? Well, research has shown that newborns prefer the sound of their father’s voice over any other, even if they don’t yet know who he is. This preference exists from birth and continues to grow as the baby gets older.
Additionally, babies will often turn their heads towards their father’s voice when he speaks, showing that they recognise him. When it comes to faces, studies have shown that newborns can discriminate between different ones, including those of their parents. In fact, when presented with photographs of both parents’ faces side by side, most babies will stare longer at the image of their dad.
This indicates that they are trying to take in all the details of his face so that they can remember it later on. So there you have it – proof that babies really do know who their daddy is!
How Babies Recognize Faces
When Do Babies Recognize Their Mom
When Do Babies Recognize Their Mom?
Most babies will recognize their mom within the first few days or weeks of life. This is because they have spent so much time in close proximity to her during pregnancy and delivery.
However, there are some babies who take a little longer to develop this bond. If you’re wondering when your baby will start to recognize you, here are a few things to keep in mind. Your baby’s sense of smell is one of the strongest cues for recognition.
From birth, your baby has been able to smell you and become familiar with your scent. This is why it’s so important for new moms to spend plenty of time holding and cuddling their baby. The more time you spend skin-to-skin, the stronger that bond will be.
Another cue that babies use for recognition is facial features. Studies have shown that newborns are drawn to faces that resemble their own. So if you have similar features to your baby, they’re more likely to recognize you as their mother.
Finally, voice is another important factor inrecognition .Babies become familiar with the sound of their mother’s voice during pregnancy and continue to associate it with comfort and security after they’re born . Hearing your voice regularly will help your baby feel safe and loved , even when they can’t see you .
So don’t worry if your baby doesn’t seem like they know who you are right away . They’ll catch on soon enough !
According to a new study, babies as young as six months old can recognize their parents’ faces. The study, conducted by researchers at the University of Washington, found that infants use specific cues, such as the shape of the eyes and nose, to distinguish between familiar and unfamiliar faces.
This is the first time that researchers have been able to show that infants this young can discriminate between faces.
Previous studies had suggested that babies might be able to tell apart their parents’ faces from other adults’ faces by around nine months old. But this new study shows that babies may actually be able to do this much earlier. So why is it important for babies to be able to recognize their parents’ faces?
Well, it helps them form attachments with their caregivers. It also allows them to differentiate between people who are safe and people who are not. This ability becomes even more important as they get older and start interacting with more people outside of their immediate family.
So if you’re a parent, don’t worry if your baby doesn’t seem to recognize you right away. They probably will before you know it! | FINEWEB-EDU |
Keys of the kingdom
The keys of the kingdom is a Christian concept of eternal church authority. Christians believe it was established in the 1st century AD, initially through Saint Peter then through the rest of the 12 Apostles. The latter, continuing with the early Church Fathers, would eventually comprise the early church and its doctrine. It is this authority, having been given the keys, that subsequent doctrinal points have been built upon.
The authority can be traced to one passage in the New Testament, where Jesus mentions them first in response to St. Peter answering a question and secondly in speaking to a group of disciples. In these two instances, the concept of authority follows having been given the "keys of the kingdom of heaven" and regards loosing and binding things on earth, and thus having loosened and bound the same in heaven (Matthew 16:19, Matthew 18:18). A third authority regarding sin is seen without mentioning "keys" in John 20:23.
Not all adherents to the faith in the risen Jesus Christ follow the further doctrinal concepts of sole authority held in any particular church, organization, or individual today. One view is that the keys were used for a specific purpose and at a set time; namely at the Day of Pentecost—the baptism of the Holy Spirit. There is much debate regarding the further doctrinal base the church's leadership established in the early centuries.
Many subsequent Restorationist denominations and religious groups today, including the Church of Jesus Christ of Latter-day Saints (LDS Church) and The Family International, believe they also hold this authority. In the LDS Church, the concept is strongly tied to the priesthood keys held by the President of the Church and the Quorum of the Twelve Apostles.
Passage in context
As found in the Gospel of Matthew, chapter 16, within the context of verses 13-20:
"13 When Jesus came to the region of Caesarea Philippi, he asked his disciples, “Who do people say the Son of Man is?”
14 They replied, “Some say John the Baptist; others say Elijah; and still others, Jeremiah or one of the prophets.”
15 “But what about you?” he asked. “Who do you say I am?”
16 Simon Peter answered, “You are the Messiah, the Son of the living God.”
17 Jesus replied, “Blessed are you, Simon son of Jonah, for this was not revealed to you by flesh and blood, but by my Father in heaven. 18 And I tell you that you are Peter, and on this rock I will build my church, and the gates of Hades will not overcome it. 19 I will give you the keys of the kingdom of heaven; whatever you bind on earth will be bound in heaven, and whatever you loose on earth will be loosed in heaven.” 20 Then he ordered his disciples not to tell anyone that he was the Messiah."
- Matthew 16: 13-20 (NIV)
In this passage, the word "you" is singular in the original Greek, despite the other apostles being present. A mirroring passage, which does not mention the keys, is also found later in chapter 18, within the context of verses 18-20:
"18“Truly I tell you, whatever you bind on earth will be bound in heaven, and whatever you loose on earth will be loosed in heaven.
19“Again, truly I tell you that if two of you on earth agree about anything they ask for, it will be done for them by my Father in heaven. 20For where two or three gather in my name, there am I with them.”"
- Matthew 18: 18-20 (NIV)
Here, the plural "you" is used.
Day of Pentecost and message
On the day of Pentecost, Peter, in the presence of the other 11 disciples, speaks a message to the Jews from all over the known world, metaphorically using the keys to open the kingdom, inviting hearers in, building the church. Up until this point it was only Jesus who spoke / preached to the disciples. Here we see Peter act on the commission given to him by Christ in Matthew 16;
"14 Then Peter stood up with the Eleven, raised his voice and addressed the crowd: “Fellow Jews and all of you who live in Jerusalem, let me explain this to you; listen carefully to what I say."
- Acts 2: 14 (NIV)
Afterwards, Peter speaks a message explaining the completion of several prophecies, concluding with;
"36 “Therefore let all Israel be assured of this: God has made this Jesus, whom you crucified, both Lord and Messiah.”
37 When the people heard this, they were cut to the heart and said to Peter and the other apostles, “Brothers, what shall we do?”
38 Peter replied, “Repent and be baptized, every one of you, in the name of Jesus Christ for the forgiveness of your sins. And you will receive the gift of the Holy Spirit.
39 The promise is for you and your children and for all who are far off—for all whom the Lord our God will call.
40 With many other words he warned them; and he pleaded with them, “Save yourselves from this corrupt generation.
41 Those who accepted his message were baptized, and about three thousand were added to their number that day."
- Acts 2: 36-41 (NIV) | WIKI |
ATR
Also found in: Financial, Acronyms, Encyclopedia, Wikipedia.
ATR
A gene on chromosome 3q22-q24 that encodes a protein belonging to the PI3/PI4-kinase family, which is closely related to ATM, the protein kinase encoded by the gene mutated in ataxia telangiectasia. ATR is similar to the cell cycle checkpoint gene required for cell cycle arrest and DNA damage repair in response to DNA damage; it phosphorylates checkpoint kinase CHK1 and checkpoint proteins RAD17 and RAD9, as well as tumour suppressor protein BRCA1.
Molecular pathology
ATR mutations cause Seckel syndrome.
ATR
Achilles tendon reflex, see Ankle reflex.
References in periodicals archive ?
Patrick de Castelbajac, CEO, ATR, said, ATR and Bangkok Airways have a very productive and long-term relationship.
Lilian Brayle, ATR Senior Vice President, Product Support & Services said, This new agreement will be highly beneficial to all ATR operators.
It is anticipated that the first ATR 42-600 would enter into service this November.
ATR President Bob Cox said: "We are very excited to commence trading at this time.
The ATR 42-600 have considerably more cocktail and other enhancements, including higher efficiency and a lower fuel burn compared to the ATR 42-500s.
This deal brings the total number of ATR 72-600s in the carrier s fleet to nine.
By using our voice application system, InfoTalker, based on NTT Lab and ATR CHATR technologies, and the Nuance(R) voice application system, we believe we can provide the most advanced man-machine interface.
At the Farnborough Airshow, the turboprop aircraft manufacturer ATR this morning announced that it has taken firm orders for 144 aircraft (119 ATR 72-600 and 25 ATR 42-600), with options for 112 additional aircraft, since the beginning of the year.
Since 1987, ATR has been committed to developing, manufacturing and marketing cost effective, flexible and managed access network systems.
Bangkok Airways declared that it has inked a deal with the European turboprop aircraft manufacturer ATR for the buyout of three ATR 72-600s, worth approx. | ESSENTIALAI-STEM |
Reply settings for Office 365 Groups
New Contributor
Hello,
I have gone through the forum and google, but I have not found an answer to my question. I hope you don't mind sharing a post here.
Background: User1 (Guest account/outside of the organization) and User2 (inside) are members of the Group1 (Office 365 Group). User3 is outside of the organization, it's NOT a guest user nor Group1 member. The Group1 is enabled with the subscription setting (e-mail sent from anyone to Group1@organization will end up in Group Conversation, User1 mailbox, User2 mailbox).
I would like to achieve the scenario where: User3 sends an email to Group1@organization. User1 (undefined e-mail client) hits "reply" and answers not only to User3, but rather to Group1@organization instead.
I have successfully used feature like that with G-Suite (https://help.lsit.ucsb.edu/hc/en-us/articles/115000974551-Change-Reply-Settings-to-Group-Messages).
How to configure something like that with Office 365 ?
Thanks in advance,
Regards,
Tomasz
6 Replies
There's a ReplyAll button in the Group's compose interface, and it should actually be the default action. Doesn't that work for you? Or am I missing something?
Hi Vasil,
Great thanks for the answer.
In the presented scenario:
Only one user uses Outlook and Office 365.
The other user is in the group but has no access to it. He gets only what is being forwaded to him.
Sender, so third user can actually be anyone.
Now, for example there is no “Reply all” button in Gmail app, and even if there was I would like not to tell all the potential users (in the real scenario) to use it.
The test I did before replying to this thread was with a Gmail account, and it works just fine. You do have a ReplyAll button in the web client, now if the app you are using is missing this basic functionality perhaps you should switch to using a different app. FWIW, the behavior will be the same for any other DG-type of recipient, this is nothing specific to O365 Groups.
Hi Vasil,
Thank you for the answer, the provided workaround may be one of the options. On the other hand, it does not address the actual issue I came here with:
Is it possible to set the O365 Group so each e-mail passing through it, has a property "Reply to" set to the group and not to the person who sent the e-mail ? How ?
[Goal: To achieve the functionality provided by G-Suite where e-mails send to Group1@Organization not only are sent to all subscribers e-mailboxes but also has the "Reply to" property set to Group1]
Thanks again and Best Regards,
Tomasz
That would require functionality similar to address rewriting, which is not available in O365.
In fact, you can do that Reply-To rewriting - but not in the group settings alone, you do have to use Exchange mail flow rule for that:
• Conditions: the recipient is [group e-mail]
• Action: Set header value: set header Reply-To value to [group e-mail]
• Rule mode: Enforce | ESSENTIALAI-STEM |
Wikipedia:Articles for deletion/Mark's Bistro
The result was Speedy delete G11 by Jimfbleak. (non-admin closure) NinjaRobotPirate (talk) 23:04, 1 July 2016 (UTC)
Mark's Bistro
* – ( View AfD View log Stats )
No Reliable Sources for this restaurant, does not appear to meet WP:CORP PGWG (talk) 17:24, 27 June 2016 (UTC)
* Move to Draftspace and tag as low potential per Wikipedia_talk:Drafts. Plausibly notable and we shouldn't drive content creators away. WikiCreativeJuicer (talk) —Preceding undated comment added 18:11, 27 June 2016 (UTC)
* WikiCreativeJuicer has been blocked as a sockpuppet. -- Red rose64 (talk) 21:01, 27 June 2016 (UTC)
* Delete, no indication of notability, borderline G11. Draftspace is not meant as a dungheap. Huon (talk) 18:51, 27 June 2016 (UTC)
* Being frequented by non-notable people is not a claim of notability for a restaurant. No reliable source coverage is present here at all. And Huon is correct that draftspace is not a permanent holding tank that confers a permanent exemption from the article ever having to be ready for prime time — nothing here suggests that notability (which is conditional on sourceability) is even remotely "plausible". And for added bonus, the "tagging drafts" section that WikiCreativeJuicer linked to above is just an unresolved one-week-old proposal for how to deal with draftspace content — the templates listed there don't even exist to be used in the purpose proposed for them. A process that doesn't even exist yet cannot already be an alternative to the processes we do have. Delete. Bearcat (talk) 01:43, 28 June 2016 (UTC)
* Delete I can't even find evidence online that the place exists. The whole thing smells of a prank to me. AtHomeIn神戸 (talk) 01:10, 29 June 2016 (UTC)
* Note: This debate has been included in the list of Australia-related deletion discussions. Grahame (talk) 03:50, 29 June 2016 (UTC)
* Note: This debate has been included in the list of Food and drink-related deletion discussions. NewYorkActuary (talk) 05:02, 29 June 2016 (UTC)
* Delete Agreed. I can't find any evidence that the place exists as a Sydney restaurant. (There seems to be a place of that name in the U.S., in Omaha, Nebraska, but without a connection here.) Looks like a case of WP:MADEUP. Geoff | Who, me? 22:40, 29 June 2016 (UTC)
| WIKI |
Thoughts on Changing Response Content Type
Question:
Hi
I´m using IIS 5 with ASP NET 2.0. I´ve develop an isapi application. the response content type its text/hml it´s posible chaged to text/xml
thanks
Answer:
In general, the handler which generates the response should own its Content-Type because it should be the only entity that knows the true “type of content” that is generated.
Thus, I recommend that you change the ISAPI application to have the right logic to output the right Content-Type.
If you cannot change the ISAPI application to send the right Content-Type, then you need to put this logic elsewhere:
• ISAPI Filter – If you just want to change the Content-Type response header, then you can write a SF_NOTIFY_SEND_RESPONSE filter to modify that response header (assuming the response is logical). If you want to change response entity, then that is much harder because it requires buffering of response in SF_NOTIFY_SEND_RAW_DATA to perform the necessary modifications. This also turns off various caches and destroy static file performance for resources like text/xml or text/html.
• ASP.Net can only change the output of static file or ASP.Net pages serviced by ASP.Net. In particular, ASP.Net cannot change the output of an ISAPI application.
I do not know WHY you want to do this, but what you want to do does not appear to be architecturally sound.
//David
Comments (0) | ESSENTIALAI-STEM |
Beocenter 9000
20th May 2016
No signs of life were present in this Beocenter with even the red standby light out when power was applied. The supply 5V to the microprocessor section was low at 4.3V with a large amount of ripple present so the voltage at the output of the bridge rectifier 62D7 was checked and found to be around 4.5V instead of the correct 13V. Since there was no overheating apparent 62C17 (10,000uF) was suspected of being open circuit but upon inspection it was discovered that the soldering around this component’s centre pin was cracked. Resoldering this point brought the set back to life with no further attention required. [Beocenter 9000, Beocenter 9500, Beocenter 8000, Beocenter 8500]
Beocenter 2200
20th May 2016
The fault with this set was that FM radio reception was marred by heavy pops, crackles and clicks and was in mono only, AM reception and all other functions being normal. The voltage at 2TP7 (pin 6 of the FM IF amplifier and detector IC 2IC2, LA1235) was low at 0.6V instead of the correct 6.1V, although the voltage at pin 3 of the stereo decoder IC 2IC3 (LA3390) was correct at 4.5V. Disconnecting pin 6 of 2IC2 saw the voltage at the pin of the chip return to normal so leakage in 2C65 and 2C68 was suspected, however the actual cause of the trouble was the trap coil 2L12. The set will function with this coil removed if the input and output connections are shorted together, however in this case a replacement from a scrap set was fitted. This restored correct functioning to the radio section. [Beocenter 2200, Beocenter 2100, Beocenter 4000]
Beovision MX 7000
28th January 2016
The picture on this set was shifted downwards so that the top of the screen was blank and the bottom of the frame invisible. In addition, trapezium distortion was evident, making scrolling credits look like the introduction to a science fiction film! The geometry adjustments in the service menu all had the correct effect but lacked the range to correct the picture. The +10V and -10V supplies to the frame output chip 4IC4 (TDA8172) were correct, as was the 12V supply to the deflection processor. A replacement for 4IC4 was tried but it made no difference. The chassis was tested in another set to confirm that the scan coils were not defective. The real cause was 4R144 (2M7 in some sets, 2M15 in others) which was open circuit, although it measured normally until it was disconnected. This resistor is pert of a bias network which allows the complete vertical deflection circuit to be DC coupled, therefore making possible a shift function in the service menu. [Beovision MX 7000]
Master Control Panel 5000
28th January 2016
If the unit functions erratically or the battery life is short the first thing to check is the voltage across 12R149 (100k). 10 seconds after pressing a key the voltage should be zero, if it isn’t the panel won’t switch off properly. Should a voltage be present, the most likely cause is leakage in the keyboard, this can be localised by checking the voltages across R102 > R118 (10k, even numbers only). Readings other than zero at any of these points show which column the leakage is in. Carefully removing the protective film and the contact plates should allow sufficient access for the area to be cleaned to remove the fault. [Master Control Panel 5000]
Beolit 800
28th January 2016
In this series of sets it is common to find leakage between the track of the bass control and the body, which can affect the operation of the surrounding circuit. Common symptoms are an abrupt change in sound as the control is turned, distortion, lack of volume and intermittent crackling noises. Dismantling and cleaning the control normally effects a cure. The Beolit 700 (note – the old sort!), 611T and 611K use the same type of control and can be affected in the same way. [Beolit 800]
Beovision MX 3500
15th February 2015
This set worked normally except that it couldn’t be switched completely off, pressing stand by only muted the sound and picture, a dull grey glow still being visible on the screen with the tube heaters on and the EHT still present. When first connected to the mains supply the set showed a narrow white line across the screen but gave a normal picture when the <TV> key of the Beolink 1000 was pressed.
With these sets the power supply circuit is switched between normal and stand by operation by the presence or absence of the ‘power fail’ signal at 4P79 and 4P81. This is processed by 4TR35 (BC548B) and voltage checks showed the correct change in voltage was occurring at the emitter of this transistor. 4TR6 (BC548B) also had a changing voltage at its collector, although it was only 9V instead of the correct 19V when stand by was selected. This brought suspicion on 4R87 (680k) and 4D27 (19V zener) but both measured normally. MOSFET transistor 4IC5 (IRF624) was therefore suspect and removing it resulted in the correct voltage change across 4D27. Replacing 4IC5 cleared the fault, slight leakage between the gate and source terminals was suspected although none could be measured. [Beovision MX 3500]
Beovision LX 5500
15th February 2015
If the set shows no sign of life, not even the red stand by indicator, check 10TR8 (BU508AF) which may be short circuit. If this is the case it is worth replacing 10C9 (220uf 16V) as well and checking the surrounding area for corrosion. Permanently joining pins 3 and 5 of 10P30 (the scan coil connector) will also help to prevent future failures of 10TR8. This applies to all the Unity 1 chassis sets, e.g. Beovision MX 3500 and MX 5500, Beovision LX 4500, Beovision LS 4500 and LS 5500. [Beovision LX 5500]
Beovision 601
28th May 2014
This set showed a picture of diminished width which was marred by a single bar of picture distortion which seemed to affect the horizontal scan most greatly. The 180V “B” supply was low at around 155V and even though the “B+ JUST” control 1R100 had an effect on the voltage it could not raise it to the correct level. The 240V “C” supply was also low at around 155V and it was then discovered that there was no voltage across 1C61. 1R98 and 1D5 were suspected but it was 1C61 that proved to be the cause of the trouble, it was open circuit and a replacement restored the correct voltages and resulted in a full sized and undistorted picture. A similar circuit is used in models 600 and 1600 but with different component reference numbers in some cases. [Beovision 600, Beovision 601, Beovision 1600]
Beogram 4000
28th May 2014
Although this turntable appeared to be running at the correct speed the strobe indicator suggested that a large error was present. The fault was due to the indicator mirror being incorrectly positioned so that it was showing the 60Hz rings instead of the 50 Hz ones, for 50 Hz operation the mirror assembly should be moved out to the position furthest from the turntable hub on the adjustable slide. [Beogram 4000]
Beomaster 6000 4channel
23rd May 2014
The fault with this set was that only Tape 4 could be selected, all other modes resulted in an instant return to standby. Even in Tape 4 mode there was no sound, although all the volume and tone control functions operated normally. Assuming that all the supplies are present the voltage across 8R11 (100R) is a good place to start when problems are encountered in this area but it proved to be correct at just under 3V. The muting line should normally be at -5V but was found to be at nearly +10V – this explained the absence of sound. The source of the unwanted positive voltage was 8TR26 but the transistor itself was not faulty; instead 8C12 (47uF 63V) turned out to be leaky and this prevented 8TR26 from turning off fully after the initial reset pulse had been formed. Replacing this capacitor cured all the symptoms. [Beomaster 6000 4channel] | ESSENTIALAI-STEM |
Pristimantis gaigei
Pristimantis gaigei, also known as the Fort Randolph robber frog or Gaige's rain frog, is a species of frog in the family Strabomantidae. It is found in the Atlantic drainage lowlands from extreme south-eastern Costa Rica to eastern Panama and to central Colombia; it is widely distributed in Colombia west of the Cordillera Oriental. Its natural habitat is primary humid lowland forest, but it also occurs in secondary forest. It is a nocturnal species found under surface debris and in leaf-litter.
Pristimantis gaigei is named after Helen Beulah Thompson Gaige, an American herpetologist.
Description
The maximum snout–vent length attained by males is about 30 mm and that of females about 43 mm. The species is considered a mimic of poison dart frogs (Dendrobatidae): it has a pair of red, orange, or golden dorsolateral stripes, resembling toxic species Phyllobates aurotaenia and Phyllobates lugubris; some populations of Pristimantis gaigei are sympatric with these species.
Reproduction
This species has axillary amplexus. No male advertisement call has been recorded and the species is presumed to have none. Clutch size in captivity has varied from 22 to 37 eggs measuring about 5 mm in diameter each. Egg clutches were typically buried in the substrate or laid under cover. Hatching takes place after 28–39 days. Development is direct, and the newly hatched froglets were about 5 mm in length. | WIKI |
A Diet to Prevent Osteoporosis
· January 22, 2015
Osteoporosis is a condition that happens when the bone loses consistency and thickness, which makes it vulnerable to fractures and injuries. All bones can be affected by this condition, which is why it is very important to take the necessary precautionary measures to prevent this.
Doctors agree that women are more prone to suffering from Osteoporosis because their bones are thinner and have less density, as well as the hormonal changes they undergo during menopause, which cause a reduction in bone density.
The diet to prevent Osteoporosis should contain:
Calcium
orange-juice
If you want to treat or prevent Osteoporosis, the most important nutrient is calcium. We know that bones are mostly composed of it, but this mineral is also vital for other bodily functions like muscle movement, nerve function, and immune system activation.
If your diet is not healthy or balanced, your body may use your bones as an energy reserve. This is not a serious problem when it’s been a day that you couldn’t eat healthy and then you go back to your good habits. In this case, you just need to eat a little bit more calcium in order to substitute what has been taken out from your bones. However, if your diet is very poor, this substitution will not happen and although your body may continue taking calcium from your bones, you will suffer from Osteoporosis and its consequences at some time.
At age 30, your bones will be at their most strongest and dense. That is why it is important for children and adults to consume the necessary amount of calcium. Once women reach menopause, their bone density reduces due to the hormonal changes that occur during this stage. This will facilitate Osteoporosis and calcium consumption will become vital.
It’s best to consume between 1000 and 1200 mg of calcium a day. Although there is a large variety of dietary supplements that give you this amount, it is important to choose natural food. If you are taking a supplement, you should make sure it does not exceed 2500 mg because excessive consumption can cause kidney stones and difficulty in absorbing minerals.
Foods rich in calcium are canned sardines, eggs, dried figs, oranges, garbanzo beans, clams, carrots, pine nuts, onions, tofu enriched with calcium, low fat milk, etc.
Vitamin D
Although calcium is necessary, it is useless for fighting Osteoporosis without vitamin D. Vitamin D facilitates the distribution of calcium to the parts of the body that need it, including your bones. The lack of vitamin D in adults causes your body to get the calcium it needs from your bones without replacing it. All of that facilitates the onset of Osteoporosis.
The amount of vitamin D that we recommend you consume daily is 800 IU. The best foods to find this nutrient in are salmon, sardines, fortified milk, soy milk, fortified yogurt, egg yolks, and mushrooms.
Magnesium
magnesium1
Magnesium has many functions in your body. One of them is facilitating calcium absorption. Some scientific studies have shown that proper consumption of magnesium increases bone density and reduces the onset of Osteoporosis and fractures. It is common for dietary supplements that contain calcium and vitamin D to also have magnesium. Although this facilitates its consumption, it causes stomach problems.
You don’t need to take dietary supplements. Just add a few of these foods to your daily diet: pumpkin seeds, spinach, amaranth, sunflower seeds, almonds, white potatoes, beans, peanuts, peanut butter, whole wheat bread, and sesame seeds.
Potassium
Potassium facilitates bone formation, improves calcium balance, increases mineral density in the bones, and reduces bone reduction caused by metabolic acids. In a study done on 3000 premenopausal and postmenopausal women, it showed that those who still menstruated and increased their consumption of potassium, they also increased bone mineral density by 8%.
Although scientists said that this effect was also modified by the natural properties of fruits and vegetables, it is clear that potassium is an ally for Osteoporosis.
Foods rich in potassium are white potatoes, yogurt, soy, fish, sweet potatoes, avocado, bananas, lettuce, spinach, melon, pumpkin, milk, carrots, lentils, peaches, papaya, pistachios, soy milk, watermelon, tomatoes, mushrooms, raisins, peanuts, almonds, oranges, broccoli, sunflower seeds, etc.
Vitamin K
Broccoli
Vitamin K is essential in the formation of osteocalcin, a protein that is only found in bones. They have found that people who have a high consumption of vitamin K have less chances of fractures and Osteoporosis. It is important to consume plenty of vitamin K. Before you use any dietary supplements, you should see a doctor.
Foods that give you vitamin K are spiniach, kale, chard, cabbage, endives, mustard, lettuce, broccoli, parsley, Brussel sprouts, watercress, asparagus, etc.
Protein
Most people think that protein increases the risk of Osteoporosis because the more protein you eat, the more calcium is discarded in the urine. Scientists have done studies that have shown that excess protein is the problem, not the protein itself.
The truth is that protein is a key element in bone strength. This nutrient is present in foods that must be eaten in order to have strong bones: meat, fish, eggs, beans, lentils, soy, and walnuts. You should make sure to eat foods that are high in fat are not consumed very often or smaller quantities: milk, cheese, and yogurt.
The diet to prevent Osteoporosis must not be restrictive or too different than what you are used to. As you can see, a well-balanced diet can give you the necessary minerals and nutrients in order to keep your bones healthy. | ESSENTIALAI-STEM |
Itchy feet can be bothersome, especially if the itchiness is chronic or accompanied by other symptoms. Many different conditions can cause itchy feet.
While occasional itchiness can be nothing to worry about, extremely itchy feet or an itch that does not get better over time may require treatment.
Underlying causes of itchy feet can include:
According to the National Institute of Neurological Disorders and Stroke, peripheral neuropathy is damage to the peripheral nervous system, which extends throughout the body.
Nerve damage can cause sensations, such as itchiness, numbness, and pain, in several parts of the body, including the feet.
Person putting lotion on their foot to relieve itchy dry skinShare on Pinterest
Creams and lotions can relieve itchy, dry skin.
Dry skin can sometimes cause itching. Risk factors for dry skin include:
• age
• living in a dry climate
• regular exposure to water, for example, due to the frequent hand-washing required in health and service industries
• swimming in chlorinated water
If a person has dry skin on their feet, they may itch. Applying creams, lotions, or oils can help.
If regular moisturizers do not work, a pharmacist can recommend effective over-the-counter (OTC) products.
Psoriasis is a skin condition that results in sore, scaly red skin. It can affect almost any part of the body, including the feet. Psoriasis can be extremely itchy and painful.
It occurs when a person's immune system starts attacking healthy skin cells. This speeds up the production of these cells, producing a rash.
Treatments usually include creams and lotions that may contain tar, salicylic acid, corticosteroids, or a combination.
Eczema, also known as atopic dermatitis, is a condition usually characterized by very dry, itchy skin. It can appear on many areas of the body, including the feet.
According to the National Institute of Allergy and Infectious Diseases, it is not clear what causes eczema, although a combination of environmental and genetic factors seem to be involved.
Dyshidrotic eczema is a type that often appears on the sides and soles of the feet. It causes small, deep, extremely itchy blisters. Females are twice as likely to develop this form of eczema.
People can treat itchiness that results from mild dyshidrotic eczema by soaking their feet in cold water or applying cold, damp compresses to the area.
If the eczema is more severe, a doctor can prescribe creams or recommend OTC solutions.
Share on Pinterest
Fungi can grow inside sports shoes, causing athlete's foot.
Athlete's foot is a fungal skin disease that usually develops between the toes, although it can also affect other parts of the feet.
Athlete's foot can cause an itching and burning sensation on the infected area.
Fungi thrive in warm, moist, and dark conditions, such as inside sports shoes. An overgrowth of these fungi can cause athlete's foot.
Antifungal medication, which comes as pills or lotions, is usually very effective at treating athlete's foot.
Skin allergies can cause itchiness. They may result from particular skin conditions, such as eczema or psoriasis or from contact with a substance such as latex or pollen.
Taking antihistamines can help manage the symptoms of an allergic reaction. These medications come as pills or creams.
A hookworm is a type of parasite that lives in human intestines. People can get hookworms by walking barefoot in areas where the larvae are present. Hookworm infections are relatively rare in places with sufficient hygienic practices.
According to the Centers for Disease Control and Prevention (CDC), a person may experience itchiness in the spot where the hookworm larvae entered their body.
Doctors can treat hookworm infections with drugs that target the parasites.
Scabies occurs when very small mites burrow into a person's skin and lay eggs, causing a very itchy rash.
The condition is contagious and travels through skin-to-skin contact. It can occur anywhere on the body, including on the feet.
Applying a prescription medication directly to the skin can usually treat scabies.
Diabetes is a long-term condition that affects insulin resistance and how the body changes food into energy. It can mean that a person's blood sugar levels are too high, which can have serious health consequences.
Diabetes can cause diabetic neuropathy, which can lead to tingling, itchiness, and numbness, especially in the feet.
Poor circulation due to diabetes can also cause itchiness. Also, having diabetes may increase a person's risk of bacterial and fungal infections.
Even after they have healed, severe burns can cause lasting damage and itching.
According to research from 2013, more than 90 percent of participants reported itching in the aftermath of a burn. For over 40 percent of participants, itching persisted in the long term.
Share on Pinterest
A person who experiences chronic itchiness should speak to a doctor.
The medical term for itchiness is pruritus. The causes can be put into four categories:
• cutaneous, which is an itch that results from a problem in or on the skin
• systemic, which is itchiness due to a generalized issue throughout the body
• neuropathic, which is an itch that comes from the nerves or nervous system
• psychogenic, which means that the itching results from a psychological issue
However, an article in the journal Clinical Reviews in Allergy & Immunology notes that there is rarely a singular cause of a person's itching. Itchiness can result from a complex mix of factors.
Tips for treating itchy skin at home include:
• applying cold, wet cloths or ice packs to the itchy area
• making an oatmeal bath by grinding 1 cup of oatmeal into a powder and adding it to warm bath water
• regularly using moisturizers
• trying topical anesthetics that contain pramoxine
• applying menthol or calamine to the affected area, which can provide a cooling sensation
A person should try to avoid scratching, which can often make an itch worse, rather than better. Scratching also increases the likelihood of infection.
Occasionally itchy feet are a common occurrence. However, if a person has chronically itchy feet, or if the itch comes with other symptoms, they should see a doctor for a thorough checkup.
Many OTC and home remedies can help relieve itchiness in the feet. If the itch continues or gets worse, speak to a doctor. | ESSENTIALAI-STEM |
Obama gets update on Libya
President Obama, in Brazil as part of a Latin America trip, received an update on Libya this morning from his national security team. Obama offered his thanks and admiration to members of the U.S. armed forces, said the White House in a statement. The statement: This morning, President Obama had a secure conference call beginning at 9:20 a.m. local time with National Security Advisor Tom Donilon, Secretary of State Hillary Clinton, Secretary of Defense Bob Gates, AFRICOM Commander General Carter Ham, and Deputy National Security Advisor Denis McDonough. President Obama received a briefing from General Ham on U.S. military operations in Libya, as part of the international effort to enforce U.N. Security Council Resolution 1973. The President also discussed the ongoing military and diplomatic consultations taking place on the situation in Libya. The President offered his thanks and admiration to General Ham and asked that he communicate that to all of the men and women of the U.S. Armed Forces who are carrying out this operation. David's journalism career spans three decades, including coverage of five presidential elections, the Oklahoma City bombing, the 2000 Florida presidential recount and the 9/11 terrorist attacks. He has covered the White House for USA TODAY since 2005. His interests include history, politics, books, movies and college football -- not necessarily in that order. More about David Follow the Oval on Twitter: @The Oval, @djusatoday. Also contributing to the Oval: Richard Wolf @richardjwolf; Aamer Madhani @AamerISmad Subscribe to The Oval via RSS Sign up for The Oval e-mail alerts Delivered by FeedBurner | NEWS-MULTISOURCE |
Willapa Bay
Willapa Bay is a bay located on the southwest Pacific coast of Washington state in the United States. The Long Beach Peninsula separates Willapa Bay from the greater expanse of the Pacific Ocean. With over 120 sqmi of surface area Willapa Bay is the second-largest riverine estuary on the Pacific coast of the continental United States. Early settlers called the bay Shoalwater Bay and this name is found on old maps and charts of the region.
Willapa Bay is fairly shallow: more than half of its surface area lies in the intertidal zone, and half of the volume of water inside it enters and leaves with every tide. The bay is an estuary formed when the Long Beach Peninsula, a long sand spit from the Columbia River to the south, partially enclosed the estuaries of several smaller rivers. It is a ria, which formed after the rise in sea level at the end of the last ice age flooded several small river valleys. The North River, Willapa River, and Naselle River provide most of the freshwater input into the bay. Other rivers that empty into Willapa Bay include the Bone River, Niawiakum River, Palix River, Cedar River and Bear River, among others.
The bay is bordered by several smaller towns and unincorporated communities such as Raymond and South Bend, both on the Willapa River; Oysterville, Nahcotta, Bay Center and Tokeland are on the bay itself. The bay is entirely located within Pacific County, Washington and is home to a local oyster and seafood processing industry: approximately 9% of all oysters in the U.S. are grown there.
Willapa Bay is known for its biodiversity and much of it, including the entirety of Long Island, has been set aside as part of the Willapa National Wildlife Refuge. The oyster beds help the ecosystem by providing habitats and filtering water, improving the quality of the water. The bay's ecology was threatened in the 1990s by the rapid spreading of Atlantic cordgrass (Spartina alterniflora), a non-native species of grass introduced possibly to help preserve wetlands and marsh areas, and possibly simply by accident as packing material in crates of oysters from the East Coast. The State of Washington has been spraying an herbicide thought not to threaten other species since about 2005, and the Spartina threat is much reduced. | WIKI |
Eupatorium resinosum
Eupatorium resinosum, the pine barren thoroughwort, is a rare North American plant species in the family Asteraceae.
Eupatorium resinosum is native to the eastern coastal states of the United States, though with a discontinuous distribution. Some populations grow in the Carolinas, others in New Jersey. It formerly grew in New York and Delaware, but is now apparently extirpated there. There are no reports of the species in Maryland or Virginia in between.
Eupatorium resinosum has stems up to 100 cm (40 inches) tall and produce short rhizomes. The inflorescences are composed of a large number of tiny white flower heads with 7-11 disc florets but no ray florets. This species typically grows in moist areas, areas with acidic soils, and pine barrens. It is pollinated by insects and is self-incompatible. It is rare, with only dozens of populations known, and has been extirpated from several states due to habitat destruction. | WIKI |
User:Donvesto/sandbox
Michael Vest
Michael has an arm like a rocket, a mind like a scientist and a cock like a python | WIKI |
Internalnet
An internalnet is a computer network composed of devices inside and on the human body. Such a system could be used to link nanochondria, bionic implants, wearable computers, and other devices. | WIKI |
Baiju Bawra (film)
Baiju Bawra (lit. 'Crazy Baiju') is a 1952 Hindi musical romantic drama film directed by Vijay Bhatt. Produced by Prakash Pictures, with story by Ramchandra Thakur and dialogues by Zia Sarhadi, Baiju Bawra was a musical "megahit" which had a mighty 100-week run in the theatres. Bhatt's decision to make a film based on classical music was met with scepticism by the Indian film industry due to its "lack of mass appeal", but the film and music turned out be an "overwhelming success".
The film's music director was Naushad, who had become popular giving folk-based music in films such as Rattan, Anmol Ghadi, Shahjehan (1946) and Deedar (1951). With Bhatt's Baiju Bawra, Naushad introduced a classical component in Hindi film songs. The soundtrack was based on classical ragas, such as Puriya Dhanashree, Todi, Malkauns, Darbari and Desi. The lyricist was Shakeel Badayuni, a Naushad discovery. For Baiju Bawra, Badayuni had to forgo Urdu, and write lyrics in pure Hindi, with songs such as the bhajan "Man Tadpat Hari Darshan Ko Aaj" becoming popular.
The film starred Bharat Bhushan as Baiju, with Meena Kumari playing his love interest Gauri. Meena made her acting debut in Bhatt's Leatherface (1939) as a six-year-old. Surendra portrayed Tansen, one of the Navratnas in Akbar's court. Kuldip Kaur played the role of the dacoit queen Roopmati. The rest of the cast included Bipin Gupta, Manmohan Krishna, B. V. Vyas and Baby Tabassum.
The film merges the legend of Baiju Bawra with the historic setting of Mughal Emperor Akbar's court in India. Baiju (Bhushan) is the son of a musician who also grows up to be a musician. He comes to believe that Tansen, the famed musician at the court of Akbar, is responsible for his father's death. The movie then follows Baiju's attempt to avenge his father's death by challenging Tansen to a musical duel.
Even though there were many changes in the storyline from the original life of Baiju Bawra, the film was both a commercial and critical success and catapulted both its lead actors into stardom. Meena Kumari became the first-ever Filmfare Best Actress Award winner in 1954, the first of four Best Actress trophies she won in her career. The film's music director, Naushad, also received the inaugural Filmfare Best Music Director Award for the song "Tu Ganga Ki Mauj"; this was Naushad's first and only Filmfare Award win. It was ranked #13 in the list of 20 greatest Indian films by BFI in 2002.
Plot
Tansen is known to be the greatest classical vocalist ever to have existed in India, and was one of the nine jewels (Navaratnas) of Emperor Akbar's court. Nobody could sing in the city unless he or she could sing better than Tansen. If this was not the case, he or she was executed. Baiju Bawra is the story of an unknown singer, Baiju, who is on a mission to defeat Tansen in a musical duel to avenge the death of his father.
When Baiju is still a child, Tansen's sentry tries to stop Baiju's father from singing, and in the ensuing scuffle, his father dies. Before dying, he extracts a promise from his son to take revenge against Tansen. Baiju gets shelter from a village priest and while growing up, falls in love with Gauri, the daughter of a boatman. He continues his musical education on his own, but gets so enamoured by Gauri's love that he forgets the promise made to his father.
Later, a group of dacoits raid Baiju's village. With his song, Baiju persuades them against looting the village, but the female leader of the dacoits falls in love with him and asks him to follow them to their fort as a condition for their sparing the village. Baiju leaves with her, leaving the wailing Gauri behind. In the fort, the dacoit leader, who is actually a princess living in exile, tells Baiju how her father's fiefdom had been usurped and she was seeking revenge because the village too previously belonged to her father. The word "revenge" brings all of Baiju's memories back; he leaves the fort greatly agitated, and the princess does not try to stop him.
Baiju sneaks into the Mughal palace, where Tansen is singing. He is dumbstruck by the way Tansen sings, and the sword that was supposed to cut the maestro's throat fell on the tanpura, saddening Tansen. He said he could only be killed by music, and the pain that accompanies it. "Dip your notes in melancholy and I'll die on my own," he said. Baiju accordingly leaves the palace to learn "real" music.
Baiju remembers that when his father was killed, he was taking Baiju to Swami Haridas. He goes to see the Swami himself and asks for his guidance, informing him of his plan to take revenge against Tansen. Haridas tells Baiju that one must be in love to be a true musician, and thus Baiju must rid himself of all the hatred in his heart, but still gives him a veena and accepts him as his disciple. Baiju again starts his musical training, spending all his time in a Shiva temple, but his vengeful feelings never leave him. Nonetheless, he still reveres his guru, Haridas. After learning that his teacher had fallen seriously ill and was unable to walk, Baiju sings a song that so thrills Haridas that the master gets out of his bed and starts to walk.
Gauri, meanwhile, is so distraught over Baiju's departure that she is about to swallow poison. At that point, the princess who had taken Baiju from the village comes to her and tells her that she knows of Baiju's whereabouts. Gauri meets Baiju and tries to convince him to return to the village so they can be married; Baiju, however, refuses, as he feels he must take revenge against Tansen. At this point, Haridas arrives, and Baiju goes to receive him, once again leaving a crying Gauri behind. Haridas tells Baiju that to be a true singer, he has to feel real pain. Hearing this, Gauri decides to make a venomous snake bite her, thinking that her death would bring enough grief to Baiju that he would defeat Tansen. Baiju sees Gauri's lifeless body and goes mad, with the princess' attempts to get through to him being futile. Baiju instead goes to the Shiva temple and sings a heart-wrenching song condemning the God who had consigned him to his fate; even the idol of Lord Shiva sheds tears at Baiju's grief.
In his delirious state, Baiju reaches Tansen's city, singing the whole way. The residents fear for his life and call him bawra (insane), hence the title of the movie. Baiju is caught and imprisoned, but the princess frees him. However, both of them are caught by Mughal soldiers when escaping, leaving a musical duel with Tansen as the only way to save his life.
Emperor Akbar himself witnesses the competition. For a long time, both the singers prove to be equally good. Then Akbar suggests that whoever could melt a marble slab with his singing would win the duel. Baiju manages to do so and wins the competition, saving his own life and finally avenging his father's death. Tansen accepts his defeat graciously, and is in fact happy that there is someone better than him. Baiju persuades Akbar to spare Tansen's life, to return the princess' land to her, and to allow music in the streets.
After winning the musical duel, Baiju departs from the court. Emperor Akbar is unhappy to see him go and asks Tansen to sing to produce a storm and floods to make him stay. Tansen sings raga Megh and the river Yamuna floods. (This scene was cut from the final film.)
Meanwhile, Gauri is alive but her father is deeply upset. The entire village makes fun of Gauri's and Baiju's love affair. Her father warns her that either Baiju should be found, or Gauri should marry a village moneylender, and in case she refuses, he would commit suicide. Gauri, unwilling to divulge Baiju's whereabouts, agrees to marry the money-lender.
Discovering that she is still alive, Baiju goes to meet Gauri. On the other side of a swollen Yamuna River, Baiju is stuck. The boatmen refuse to take him to the other side. Despite not knowing how to swim, Baiju pushes the boat into the raging waters and starts rowing it. He starts singing and Gauri hears it. She starts running towards the bank. When she sees Baiju struggling with the boat, she jumps into the water to rescue Baiju. The boat topples over and after a lot of struggle Gauri manages to reach him. He urges her to go back and leave him, but Gauri replies that they had promised to be together in life and in death, and she would be content in dying with him. They both drown as the film comes to an end.
Cast
* Bharat Bhushan as Baiju
* Meena Kumari as Gauri
* Kuldip Kaur as Roopmati
* Bipin Gupta as Akbar
* Manmohan Krishna as Shankaranand
* B. M. Vyas as Mohan
* Mishra as Narpat
* Radha Kishan as Ghasitkhan
* Kesari as Ganjoo
* Ratan Kumar as Young Baiju
* Baby Tabassum as Young Gauri
* Rai Mohan as Swami Haridas
* Bhagwanji as Baiju's Father
* Nadir as Hathi Singh
* Ramesh as Suhil Khan
* Krishna Kumari as Vasanti (not to be confused with the 1930s actress of the same name nor the south Indian actress T. Krishna Kumari) She was born as Rajinder Kaur in Rawalpindi, Punjab state (now part of Pakistan) on October 3, 1934
* Surendra as Tansen
* Sitaram, Tikaram, Athavale
Story and location
Vijay Bhatt had earlier made religious classics such as Bharat Milap (1942) and Ram Rajya (1943), with Ram Rajya being the only film Mahatma Gandhi watched. Bhatt's interest in literature and music compelled him to make a film about Tansen and the folk-legend singer Baiju Bawra as the main focus. A revenge theme was brought in with a love story and some comic interludes. Emphasis was also laid on the Guru-shishya tradition concentrating on the bond between Baiju and his Guru Swami Haridas, who was also Tansen's Guru.
Bhatt's decision to make a film based on Indian classical music was met with scepticism by the film industry due to its "lack of mass appeal", with his friends referring to him as "Viju Bawra" (Viju Crazy/Insane). Vijay Bhatt was the first to use two "classical giants on a common platform for path-breaking duets" twice. Ustad Amir Khan with Pandit D. V. Paluskar in Baiju Bawra and shehnai maestro Ustad Bismillah Khan and the innovative sitar player Abdul Halim Jaffer Khan in Goonj Uthi Shehnai.
The film was shot at Prakash Pictures studio at Andheri East in Bombay. According to Ayaz, nobody working on the sets "felt that they were working on a film that would become a milestone". The song sequence of "Tu Ganga ki Mauj" was shot at a river in Dahisar, near Bombay. The film took a year for completion.
Casting
The original choice for the cast were Dilip Kumar as Baiju and Nargis as Gauri. Bhatt's option for Bharat Bhushan and Meena Kumari in the main roles was a matter of financial deliberation and continuity of dates required for the shooting.
Meena Kumari, earlier called Mahjabeen Bano, started her acting career at the age of four in Vijay Bhatt's film Leatherface (1939). Her name was changed by Bhatt to Baby Meena in 1940. She acted in several films as a child star including Bhatt's Ek Hi Bhool (1940). Meena Kumari's first adult role was in Bachchon Ka Khel (Child's Play) (1946) directed by Raja Nene. Filmindia in the June 1946 issue, commented on her appearance "Meena Kumari, up till recently a 'baby,' now plays the charming heroine of the story". Several socials, mythologicals and fantasy films followed. In 1952, Meena Kumari "shot into stardom" following the release of Baiju Bawra. Kumari became the inaugural best actress winner at Filmfare Award for the film. The category for Best Actress was introduced by the Filmfare Awards Committee for the first time that year. Bharat Bhushan began his career in Kidar Sharma's film Chitralekha (1941) made in Calcutta. After some supporting roles, he was cast in Sohag Raat (1948) opposite Geeta Bali and Begum Para, and in Devendra Goel's Aankhen (1950). His career as a tragic hero ran parallel with that of Dilip Kumar in the 1950s, but he lacked the "intensity and charisma" of Kumar. However, his "mellow looks matched by a soft voice" had the compassion required to depict sympathetic roles, with his specialty being a "sensitive, suffering poet-musician" in several hit musicals such as Baiju Bawra, Mirza Ghalib (1954), Basant Bahar (1956), Barsaat Ki Raat (1960) and Sangeet Samrat Tansen (1962). Signed by Bhatt for Baiju Bawra, his "unruly mop and simple demeanour" established him as a star and "crystallised Bhushan's image as an actor of 'note'". The pathos required of his role was acclaimed by critics as well as audiences, as were the singing sequences of classical raga-based songs in Mohammad Rafi's voice. Bhatt and Bhushan worked again the following year in Shri Chaitanya Mahaprabhu (1953), for which Bhushan received the Filmfare Best Actor Award.
Surendra, a popular leading actor of the 1930s and 1940s, turned to character roles in the 50s. The character of Tansen in Baiju Bawra was a career-reviving role for him. One of the "greatest" highlights of the film was the music-singing competition (jugalbandi) between the court musician Tansen and Baiju. Surendra had sung his own songs in his early career, however, he had to lip-sync to Ustad Amir Khan for the song "Ghanana Ghanana Kar Barso Re" in raga Malhar, while the song sequence between Tansen and Baiju had Ustad Amir Khan and D. V. Paluskar providing playback singing for them. He played the role of Tansen in three films, Baiju Bawra, Rani Roopmati (1957) and Mughal-E-Azam (1960).
Kuldip Kaur was known for her negative characters and cited as Indian cinema's "most polished vamps". Starting her career with a Punjabi film Chaman (1948), she went on to portray female villain roles in several films. Her role as the "strong dacoit queen" who lures Baiju away from his village made a "major impact" and was critically acclaimed.
Music
Naushad had come into prominence following his fourth film Station Master (1942), a Bhatt film production. The box office success of Station Master helped Naushad showcase his talent and become popular. Naushad at this time was under contract to A. R. Kardar, who had allowed him to score music for other companies.
Bhatt brought in Naushad to give music for Baiju Bawra because of his expertise in classical music. The two worked together along with Bhatt's older brother Shankar for six months. Shankar was "opposed" to the idea of a Hindi film filled with ragas as he feared it would drive the audiences away. But Naushad and Bhatt were adamant to change "public taste" in film music and in Naushad's words "it worked". Naushad's use of classical music in Baiju Bawra helped it become one of the top ten films of the 1950s and is "remembered mostly for its music". The bandish in raga Desi between Amir Khan and D. V. Paluskar, and Khan's "Tori Jai Jai Kar" in raga Puriya Dhanashree constituted the highlights of the film. However, the solos by Mohammed Rafi "Man Tadpat Hari Darshan Ko Aaj" in raga Malkauns, "O Duniya Ke Rakhwale" in raga Darbari, "Tu Ganga Ki Mauj" in raga Bhairavi and "Insaan Bano" in raga Todi are cited as "real treasures". His composition in the film is cited as the first use of the classical medium by Naushad, but he had based a large number of his songs on Indian rāgas. In Shahjehan (1946) he had composed three classical based tunes for K. L. Saigal. He did the same in Mela 1948 and Deedar 1951.
Soundtrack
The plot centered around music, so it was a necessity that the movie's soundtrack be outstanding. Renowned Bollywood music director Naushad and lyricist Shakeel Badayuni created memorable songs for the movie, with all but one being based on Hindustani classical melodies (ragas). Noted playback singers Mohammad Rafi, Lata Mangeshkar, and Shamshad Begum, and renowned classical vocalists Amir Khan and D. V. Paluskar lent their voices to the score.
Amir Khan was a consultant for the music. The result was a critically acclaimed movie soundtrack. Famous songs from the movie include "O Duniya Ke Rakhwale" (based on Raga Darbari), "Tu Ganga Ki Mauj" (based on Raga Bhairavi), "Mohe Bhool Gaye Sanwariya" (based on Raga Bhairav with traces of Raga Kalingda), "Man Tarpat Hari Darshan Ko Aaj" (based on Raga Malkauns), "Aaj Gaawat Man Mero" (Raga Desi), and Jhoole Mein Pawan Ki Aayi Bahar (based on Raga Pilu). Naushad won the Filmfare Award for Best Music Director, his first and only win.
The film also established Mohammad Rafi as a top playback singer in Hindi films. The songs Rafi sang for the film, including "Man Tarpat Hari Darshan Ko Aaj" and "O Duniya Ke Rakhwale", went on to become smash hits.
Remake
A remake of the film tentatively titled Baiju-The Gypsy was announced on November 2010. As per the details, it was to be written, directed and produced by American-Indian writer Krishna Shah and big names like Aamir Khan and A. R. Rahman were to come together in this film but eventually, the film was shelved.
Narendra Hirawat of NH Studioz held the rights of the film's negative. It has been more than 60 years since Baiju Bawra was released and the rights have now lapsed.
In February 2019, it was reported that filmmaker Sanjay Leela Bhansali is planning a remake of this film. It will star Ranveer Singh, Alia Bhatt and Nayanthara in the lead. The shooting of this film was speculated to commence from mid-2023. However, the film shooting is now on hold. | WIKI |
Talk:Merced City School District
Boundaries
WhisperToMe (talk) 22:54, 11 March 2012 (UTC)
* Elem: http://www.mcsd.k12.ca.us/files/mcsdtrans/Elementary%20School.jpg - http://www.webcitation.org/665urFr3S
* Mid: http://www.mcsd.k12.ca.us/files/mcsdtrans/Middle%20School.jpg - http://www.webcitation.org/665usiRJS
New elementary boundaries: http://mcsd-ca.schoolloop.com/file/1332657279277/8017372054795293002.pdf - http://www.webcitation.org/6ameZtORD WhisperToMe (talk) 20:00, 14 August 2015 (UTC)
* Lo Res: http://mcsd-ca.schoolloop.com/file/1332657279277/3843966139871633293.jpg - http://www.webcitation.org/6amecL53s
* Letter in English: http://mcsd-ca.schoolloop.com/file/1332657279277/2543453747129067821.pdf - http://www.webcitation.org/6ameY9VZU
* Letter in Spanish: http://mcsd-ca.schoolloop.com/file/1332657279277/444562923393068816.pdf - http://www.webcitation.org/6ameUGUKP
* Letter in Hmong: http://mcsd-ca.schoolloop.com/file/1332657279277/6645843300074026886.pdf - http://www.webcitation.org/6ameW87Is
External links modified (January 2018)
Hello fellow Wikipedians,
I have just modified one external link on Merced City School District. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20100718080010/http://www.mercedsunstar.com/2010/05/12/1419103/parents-want-english-learners.html to http://www.mercedsunstar.com/2010/05/12/1419103/parents-want-english-learners.html
Cheers.— InternetArchiveBot (Report bug) 00:05, 26 January 2018 (UTC) | WIKI |
Election goes trick-or-treating: 2016 costumes get spooky | TheHill
Halloween revelers are taking advantage of a wild and frighteningly unpredictable election year to put a political spin on their costumes this year. While the 2016 campaign offers seemingly endless options for some spooky get-ups, here are some of ITK’s favorite politics-themed Halloween costumes. Forget “Text from Hillary,” how about texts from Baby Hillary? Happy Halloween from Hill! #hrc2016 #imwithher #hillaryclinton #hillary2016 #babiesforhillary @hillaryclinton A photo posted by Erika (@winkieb27) on Oct 31, 2016 at 5:49am PDT Happy Halloween from Hill! #hrc2016 #imwithher #hillaryclinton #hillary2016 #babiesforhillary @hillaryclinton A photo posted by Erika (@winkieb27) on Oct 31, 2016 at 5:49am PDT If you’re not “with her,” a Baby Donald TrumpDonald John TrumpTrump pushes back on recent polling data, says internal numbers are 'strongest we've had so far' Illinois state lawmaker apologizes for photos depicting mock assassination of Trump Scaramucci assembling team of former Cabinet members to speak out against Trump MORE might make tricycles great again on this scary holiday:PIC: Baby #Trump at a #Halloween party in Heber Springs #ARNews pic.twitter.com/kcbNricpeG— Austin Kellerman (@AustinKellerman) October 30, 2016
PIC: Baby #Trump at a #Halloween party in Heber Springs #ARNews pic.twitter.com/kcbNricpeG Hounds “Howlry Clinton” and “Tim Kainine” are attempting to bark up some pun-filled support for the Democratic presidential and VP nominees this Halloween:
Happy Howloween from Howlry Clinton and Tim Kainine! #clintonkaine2016 #halloween #halloweencostume #halloweenhumor #election2016 #dogsforhillary #imwithher #hillaryclinton #timkaine #vote #dontboovote #wisewomenforclinton #wisewmn4clinton #repost @solluna1111 A photo posted by Wise Women For Clinton (@wisewmn4clinton) on Oct 30, 2016 at 7:39pm PDT Happy Howloween from Howlry Clinton and Tim Kainine! #clintonkaine2016 #halloween #halloweencostume #halloweenhumor #election2016 #dogsforhillary #imwithher #hillaryclinton #timkaine #vote #dontboovote #wisewomenforclinton #wisewmn4clinton #repost @solluna1111 A photo posted by Wise Women For Clinton (@wisewmn4clinton) on Oct 30, 2016 at 7:39pm PDT One boy’s costume depicting GOP White House hopeful Donald Trump’s infamous ‘do is a cut above the rest:Wichita boy’s ‘Trump hair’ Halloween costume is quite the buzz https://t.co/gAtZdOAyVj pic.twitter.com/PXYLxW7zd3— kansasdotcom (@kansasdotcom) October 30, 2016
Wichita boy’s ‘Trump hair’ Halloween costume is quite the buzz https://t.co/gAtZdOAyVj pic.twitter.com/PXYLxW7zd3 Care for “Clinton’s private email servers,” madam? Halloween costumes. "Hillary's Private Email Servers" #emailservers #halloween2016 #hewniverse #americanflagglasses A photo posted by HEWN SHOWROOM (@hewnsf) on Oct 30, 2016 at 11:02am PDT Halloween costumes. "Hillary's Private Email Servers" #emailservers #halloween2016 #hewniverse #americanflagglasses A photo posted by HEWN SHOWROOM (@hewnsf) on Oct 30, 2016 at 11:02am PDT There’s also this helium and Democratic National Convention-inspired look:The real political power couple of 2016 - @billclinton and his balloons. #halloweencostume pic.twitter.com/uuoqP4w4D6— Chris J. Davis (@chrisjdavistn) October 29, 2016
The real political power couple of 2016 - @billclinton and his balloons. #halloweencostume pic.twitter.com/uuoqP4w4D6 But for undecided voters, the costume choice is clear: Hillary Trump / Donald Clinton / Donary Trunton #ImWithHer #MakeAmericaGreatAgain #DonaldTrump #HillaryClinton A photo posted by @hekalb on Oct 31, 2016 at 7:25am PDT Hillary Trump / Donald Clinton / Donary Trunton #ImWithHer #MakeAmericaGreatAgain #DonaldTrump #HillaryClinton A photo posted by @hekalb on Oct 31, 2016 at 7:25am PDT View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
Complex Regional Pain Syndrome (CRPS) is a chronic condition, also known as Reflex Sympathetic Dystrophy. Symptoms include an unexplained feeling of pain and discomfort that most commonly affects an arm, leg, hand or foot, usually after an injury. CRPS often begins in the hand or foot and then spreads to affect the entire limb. CRPS is also characterized by changes in skin color, temperature or swelling in the affected area. It is believed to be caused by damage to, or malfunction of, the peripheral and central nervous systems. The central nervous system is composed of the brain and spinal cord; the peripheral nervous system involves nerve signaling from the brain and spinal cord to the rest of the body.
Enjoy Your Life Again
At Summit Spine & Joint Centers, we don’t treat pain—we treat patients. Contact us online or call us today at (770) 250-4020 to receive a treatment as unique as you are. We have 20 pain centers conveniently located in the Atlanta metro area.
OTHER conditionS | ESSENTIALAI-STEM |
How Artificial Intelligence Is Edging Its Way Into Our Lives
In Phoenix, cars are self-navigating the streets. In many homes, people are barking commands at tiny machines, with the machines responding. On our smartphones, apps can now recognize faces in photos and translate from one language to another. Artificial intelligence is here — and it’s bringing new possibilities, while also raising questions. Do these gadgets and services really behave as advertised? How will they evolve in the years ahead? How quickly will they overhaul the way we live and change the way we do business? The Times is exploring these matters this week at our annual New Work Summit, featuring technology executives, A.I. researchers, investors and others. Here are some of the key moments coming out of the conference, plus a rundown of some of our recent A.I. stories. — Cade Metz A month after the Chinese electronics giant Huawei suffered a big setback in its quest to sell its high-end smartphones to Americans, the company’s chief for consumer devices, Richard Yu, said he was still optimistic about Huawei’s prospects in the United States. “We have won global consumers’ trust, in over 170 countries,” Mr. Yu said at the New Work Summit. “We very strictly protect consumers’ privacy.” Huawei is the world’s third-largest seller of smartphones and one of the planet’s biggest suppliers of telecommunications equipment. But it has struggled for years to break into the United States. A 2012 congressional report said that Huawei’s network gear could be used by Beijing to spy on Americans, effectively cutting the company off from big buyers in the United States. In January, after lawmakers reiterated those concerns in a letter to the Federal Communications Commission, AT&T and Verizon walked away from deals to sell Huawei’s latest phones. At the conference on Tuesday, Mr. Yu said that Huawei had no ties to the Chinese government. “We are a globalized company, just headquartered in China,” he said. “We are not part of any government. We have to be a company that is independent from every country.” Huawei would not be able to do business in so many places around the world without that independence, he said. “If we do something for one government, we will lose the trust of all governments.” — Raymond Zhong Mike Schroepfer, Facebook’s chief technology officer, offered a glimpse of how the social network is applying artificial intelligence to ward off bad actors and keep its platform free of toxicity. Calling the fight against rules violators a “cat and mouse game,” Mr. Schroepfer said at the New Work Summit on Tuesday that Facebook’s A.I. efforts had succeeded at certain types of content moderation, such as image classifier algorithms that find and automatically remove nude photos and videos. Now on Facebook, he said, “the vast majority of nudity and pornography reporting is automatic.” But what about using A.I. to curb the spread of fake news? Facebook’s director of artificial intelligence, Yann LeCun, said in 2016 that machine learning algorithms would one day be able to weed out false news on Facebook. But the company has since added thousands of human content moderators and struck partnerships with human fact-checking organizations. Mr. Schroepfer implied Facebook has learned that A.I. alone would not do the trick, given the sophistication of bad actors who find ways around the platform’s filters. Mr. Schroepfer also said that human judgment would be required in certain situations, like a comment (“nice jacket”) that could be either an earnest compliment or a sarcastic insult, depending on the context. And when it comes to some of Facebook’s thornier problems, like trying to enforce consistent hate speech policies, human intervention may always be necessary. “Whenever you are debating what your policy is, you’re unlikely to build an A.I. that works well for that,” he said. — Kevin Roose Michael Kratsios, a deputy chief technology officer at the White House, said at the New Work Summit on Tuesday that regulators should get out of the way of advances in emerging technologies. He cited progress toward a repeal of some regulations on commercial drones, such as rules prohibiting them from flying at night. “For us, it’s key to get ahead of those regulatory hurdles,” said Mr. Kratsios, who previously worked as chief of staff to Peter Thiel, the libertarian venture capitalist. These regulations, he said, are “putting us at a disadvantage.” Unlike some experts who believe China is poised to dominate the A.I. age, Mr. Kratsios said he wasn’t worried about overseas competition. The United States, he said, has a “30-year head start” in A.I. development. And despite the White House’s reputation for chaos and tumult, he maintained that it was “a great place to work.” — Kevin Roose Marc Benioff, the chief executive of Salesforce, blasted companies like Facebook on Tuesday for addicting children to their products and renewed his calls for more government regulation of the tech industry. Mr. Benioff compared a new Facebook Messenger product for children to candy cigarettes, which he used to pretend to smoke as a boy. “What do you think they were trying to get us to do with those?” Mr. Benioff asked onstage at the New Work Summit. “I don’t think this is any different now. They’re focused on the addictive nature of these user interfaces. At some point, we have to say, ‘Hold on.’” Silicon Valley is nearing the point where moral lines will have to be drawn by the government since the industry is not regulating itself and does not seem to be guided by a “strong hand of ethics,” he said. There is a “crisis of trust,” he added, that will become a “tidal wave” among American consumers who are growing wary of tech giants. “I’m trying to protect our industry,” said Mr. Benioff, whose company sells access to business software over the internet. “If companies aren’t able to regulate themselves, they should have external regulations.” One of the solutions he suggested was to move decision-making away from algorithms and back toward humans. He cited Facebook’s decision to disband its trending news curation team as an example. “Facebook had a team promoting, sorting and focusing stories, 100 curators that they removed and put an algorithm in their place, and that started the downward spiral that they’re in today,” Mr. Benioff said. He also spoke about the recent ban on kegs of beer at Salesforce offices after he recently stumbled across one while visiting a company he had acquired. “I view alcohol as a drug,” he said. “The keg is not there anymore — well, actually who knows, but I hope it’s not. I took a photo of the keg and put it on our social network and said, ‘This is not who we are.’” — Nellie Bowles Fei-Fei Li, a chief scientist at Google and a Stanford professor, has called on technologists to take a more “human centered” approach to the creation of artificial intelligence. On Tuesday at the New Work Summit, Ms. Li said that researchers must work to ensure that A.I. embodied human qualities and that it would ultimately operate alongside humans, not replace them. “I often tell my students not to be misled by the name ‘artificial intelligence’ — there is nothing artificial about it,” she said. “A.I. is made by humans, intended to behave by humans and, ultimately, to impact humans lives and human society.” At Stanford, Ms. Li was instrumental in the recent rise of “computer vision” systems that can recognize people and objects entirely on their own. At Google, she is working to package and sell these and other systems as cloud computing services, delivering the latest A.I. technology to a wide range of businesses. But she said that as Google and other internet giants pushed these techniques forward, academia and the government must help ensure that A.I. evolved into something that enhanced our humanity, created as many jobs as it replaced and operated in safe and predictable ways. In particular, Ms. Li said, academic institutions can help ensure that computer scientists work alongside social scientists in building this new breed of technology. “A.I. has outgrown its origin in computer science,” she said. Ultimately, said Ms. Li, who was born in China, A.I. reflects the people who build it more than other technologies do. For that reason and others, she said, A.I. researchers must work in a way that spans not only many industries but many cultures as well. “I really believe there are no borders for science,” she said. — Cade Metz Tuesday’s first speaker at the New Work Summit was Kai-Fu Lee, who used to lead Google in China and knows a thing or two about American tech giants in China. His prognosis about whether companies like Facebook will ever be able to crack the world’s largest internet market? “The American products are simply uncompetitive in the China market,” said Mr. Lee, who is now chief executive of Sinovation Ventures, a venture capital firm focused on Chinese technology. Even if internet titans from the United States could operate in China, he said, the local competition means they would have a hard time thriving. “Messenger is a much worse product than WeChat,” he said, referring to Facebook’s messaging app and Tencent’s ubiquitous app for chatting, social networking, making payments and other tasks. “Amazon in China is substantially worse than Taobao, JD and Tmall,” he said, referring to three leading Chinese e-commerce sites. And, he said, “Apple Pay is much narrower and much harder to use than WeChat or Alipay.” Mr. Lee sees other issues that augur against a big Facebook or Google renaissance in China. Multinational companies tend not to hire local managers to lead their China operations. “They’re not concerned about winning in the local market,” he said. Also, young Chinese these days would rather work for national champions like Alibaba or Tencent. Pitted against Chinese start-ups and big companies, where the hours tend to be long and the work culture cutthroat, the leading lights of American tech would get “get eaten for lunch.” — Raymond Zhong Last year, the Chinese government unveiled a plan to become the world leader in artificial intelligence by 2030, vowing to create a domestic industry worth $150 billion. This manifesto read like a challenge to the United States, and in many ways it echoed policies laid down by the Obama administration in 2016. But as China pushes ahead in this area, many experts are concerned that the Trump administration is not doing enough to keep the United States ahead in the future. Although the big United States internet giants are leading the A.I. race, these experts believe the country as a whole could fall behind if does not do more to nurture research inside universities and government labs. — Cade Metz John Krafcik, chief executive of the self-driving car company Waymo, took the stage at the New Work Summit on Monday night and spoke out for the first time since his company reached a settlement last week with Uber in a lawsuit over trade secrets that riveted Silicon Valley. “We were really happy with the outcome that we engineered,” Mr. Krafcik said. “We spent a lot of time in that case talking about the hardware, but the extra benefit we got from that suit was the ability to understand and ensure that Uber wasn’t using any of our software.” He called the software Waymo’s “secret sauce.” Waymo and Uber spent only four days at trial last week before settling, with Uber agreeing to provide Waymo 0.34 percent of its stock, worth about $245 million. The dispute between the companies started in 2016 when Uber bought Otto, a start-up founded by Anthony Levandowski, an early member of Google’s self-driving car program. Waymo, which was spun out of Google, accused Mr. Levandowski of stealing technology before leaving and accused Uber of using the misappropriated knowledge. “This was a really special case with a really special set of circumstances,” Mr. Krafcik said. “For us, this was always about, and really just about, the fact that we needed to ensure Uber wasn’t using our trade secrets.” He added that he did not foresee Waymo suing other former employees. Mr. Krafcik also discussed how Waymo was looking to start a ride-hailing service, which it is testing in Phoenix with thousands of driverless Pacifica minivans. “We have a plan to move from city to city,” he said. “We’re not going to be launching with a 25 mile-per-hour product. We’re talking about a full-speed service that will serve a very large geographic area with essentially unlimited pickup and drop-off points.” — Nellie Bowles Jeff Wilke, Amazon’s chief executive of its consumer business, which includes its e-commerce operations, doesn’t often make public appearances. But on Monday night, he joined the New Work Summit to discuss the internet retailer’s move into artificial intelligence. His key message: A.I. is everywhere, but that doesn’t mean it will take our jobs. “If you look at the evolution of technology over the course of decades, tech doesn’t eliminate work; it changes work,” Mr. Wilke said. He said that over the last five years, since Amazon bought a robot maker called Kiva Systems, it had built 100,000 of the robots — and also hired 300,000 people. “We still need human judgment,” he said. Amazon has also embedded A.I. throughout the company, he added, with technologists working together with people who run businesses. The company is using machine learning and deep learnings, which are different flavors of A.I., to upgrade internal algorithms, he said. As to how Amazon might use A.I. at Whole Foods, the grocery store chain that it said it would acquire last year, Mr. Wilke said little. When asked whether Amazon would integrate its cashier-less and A.I.-driven convenience store concept, called Amazon Go, with Whole Foods, he said, “I don’t foresee the format of Whole Foods changing very much.” — Pui-Wing Tam As A.I. technology barrels ahead in Silicon Valley, it’s also starting to pick up steam as a political issue in Washington. Over the weekend, I wrote about Andrew Yang, a former tech executive who has decided to run for president in 2020 as a Democrat on a “beware the robots” platform. He thinks that with innovations like self-driving cars and grocery stores without cashiers just around the corner, we’re about to move into a frightening new era of mass unemployment and social unrest. So he’s proposing a universal basic income plan called the “Freedom Dividend,” which would give every American adult $1,000 a month to guarantee them a minimum standard of living while they retrain themselves for new kinds of work. Mr. Yang’s campaign is a long shot, and there are significant hurdles to making universal basic income politically feasible. But the conversation about automation’s social and economic consequences is long overdue. Even if he doesn’t win the election, Mr. Yang may have hit on the next big political wedge issue. — Kevin Roose In modern artificial intelligence, data rules. A.I. software is only as smart as the data used to train it, as Steve Lohr recently wrote, and that means that some of the biases in the real world can seep into A.I. If there are many more white men than black women in the system, for example, it will be worse at identifying the black women. That appears to be the case with some popular commercial facial recognition software. Joy Buolamwini, a researcher at the M.I.T. Media Lab, found that the software can now tell if a white man in a photograph is male or female 99 percent of the time. But for darker skinned women, it is wrong nearly 35 percent of the time. — Joseph Plambeck | NEWS-MULTISOURCE |
‘Too Late to Die Young’ Review: Big Changes, Quietly Observed
Dominga Sotomayor’s new film is set among artists vacationing in Chile in 1990. When you purchase a ticket for an independently reviewed film through our site, we earn an affiliate commission. “Too Late to Die Young,” Dominga Sotomayor’s haunting third feature, could be classified as a summer vacation coming-of-age story. Since it takes place in Chile, summer coincides with New Year’s Eve, when the movie’s big, climactic party takes place. The setting is highly specific. The year drawing to a close is 1990, when the dictatorship of Augusto Pinochet came to an end. Though nobody on screen talks about politics, the sense of exhaustion and tentative optimism that hovers over their actions might have something to do with the state of their country. Or maybe not. Sotomayor approaches her characters and their problems with subtlety and tact, and is more interested in reading their glances and gestures than in putting words in their mouths. In any case, her attention is focused on the daily routines at a makeshift vacation colony in the foothills of the Andes, where a group of artistically inclined adults and their children and pets have come to escape the stresses of city life. The younger children ride bikes, splash around in the swimming hole and nap in the sun. Their teenage siblings smoke, strum guitars and flirt. The grown-ups gossip, cook, drink wine and discuss work that needs to be done. There are intimations of trouble: a break-in at one of the cabins; disputes over water; concerns about fire and relations with the locals; marital tensions. But most of what happens has a ritualistic feel, and the still, dusty air wraps the story in nostalgia. A romantic triangle takes shape involving Sofia (Demian Hernández), who is 16. Lucas (Antar Machado), who is her age, is clearly in love with her, but she’s more interested in Ignacio (Matías Oviedo), an older guy with a motorbike. Sofia’s parents are separated, and she is impatient for adulthood. When her father tells her to put out a cigarette, she says: “I’m a smoker. End of discussion.” A younger girl, Clara (Magdalena Tótoro), searches for a lost dog, whose disappearance is both a plot device and something of a metaphor. The families are set in their ways, but at the same time relations among them seem fragile and fungible. Their world looks stable and also as if it might collapse at any moment. “Too Late to Die Young” is above all an achievement in mood and implication. Sotomayor has a way of structuring scenes and composing images that makes everything perfectly clear but not obvious. Motives and actions are mysterious and relationships are ambiguous not because she wants to mystify anyone or anything, but because she’s a realist. By the end of the film, you know its world intimately, without necessarily understanding it any better than the people you’ve been observing. Too Late to Die Young Not rated. In Spanish, with English subtitles. Running time: 1 hour 50 minutes. When you purchase a ticket for an independently reviewed film through our site, we earn an affiliate commission. | NEWS-MULTISOURCE |
Use cloud development to achieve a resource navigation small program, to achieve the function is very simple: all users can view and recommend resources, recommended resources related information will be displayed in the way of a list.
The main purpose is to help you quickly understand the small program development process and cloud development technology, learn a more efficient way of small program development.
Technology selection
First choose small program development technology. The process of developing a applet is similar to that of developing a website, in that you write front-end (interface interaction) and back-end (request processing logic) code.
The front end
As for the front end, I choose to use Taro framework + Taro UI development. Taro is a cross-end development framework based on React, which supports writing a set of code and automatically generating WeChat applet, H5, APP and other applications. In addition, the framework provides function encapsulation for many complex functions, which can greatly improve development efficiency. Taro UI is based on Taro UI library and provides many off-the-shelf components, such as image uploads, selectors, etc., to meet common development needs.
The back-end
The backend is simple. The traditional way is to use the backend development framework provided by programming languages, such as Java’s SpringBoot, PHP’s Laravel, Python’s Django, etc., but often need to build their own servers, databases, logs, monitoring, operation and maintenance, etc. For only the front end or want to quickly develop small program students, it is a nightmare!
So I choose a more efficient and convenient way, Tencent small program cloud development!
What is cloud development?
Small program cloud development is a professional small program development service jointly launched by WeChat team and Tencent cloud, which helps people to quickly develop small programs, games, official website, etc., and get through the open ability of WeChat native.
What are the advantages of cloud development?
1. Developers do not need to build back-end servers, but only need to use various capabilities provided by the platform (such as cloud database, cloud storage, audio and video, AI, etc.) to quickly develop businesses.
1. Secure and easy access: no need to manage certificates, signatures, secret keys, directly call WeChat API. Reuse WeChat private protocol and link to ensure business security.
2. Multi-end reuse: support environment sharing, a backend environment can develop multiple small programs, public accounts, web pages, etc., convenient reuse of business code and data.
3. Unlimited development languages and frameworks: Developers can develop code in any language and framework, build it as a container, and quickly host it to the cloud.
4. Billing by volume, lower cost, support automatic expansion capacity
5. Extensibility: Support for one-click deployment of static websites and cloud CMS management of data content
Among them, what attracts me most is the efficiency and convenience of cloud development. There is no need to build a server, build a database, or deal with the complex logic of connecting with WeChat. Instead, I just need to focus on the implementation of the functions themselves.
For example, query data, a few lines of code to do!
Application development
The following is to develop the small program, including the initial project construction, front-end page development, access to the cloud development and other steps.
Project structures,
First, refer to the Quick Start section of the Taro framework’s official documentation to install the Taro command-line tool and initialize a small application.
Note that during initialization you will be asked to select a template. In this case, select Cloud Development. Taro will automatically generate sample code containing Cloud Development with the following directory structure:
The front-end development
In total, we need to create two pages, resource list page and recommended resource page. The components we need to use are list, form, input field, button, image upload, and so on.
Taro UI supports all of the above components. Follow the official documentation access of Taro UI, copy the component code into the page and modify it, and you can quickly develop these two pages.
The sample code for the resource list page is as follows:
<View className='list'> <! > < atList > {resourcesView} </ atList > <! OnClick ={() => navTo(xx)}> < value='add'/> </AtFab> </View>
To view the page, open the WeChat developer tool:
After the page development is completed, we set up the back-end service so that users can insert and read data through the interface.
Access to cloud development
Different from building back-end services, using cloud development will be simpler and faster, directly click cloud development in WeChat developer tools, open the environment, each user can enjoy a certain number of free environment!
In the cloud development interface, resources such as cloud database, cloud storage and cloud function can be monitored and managed.
We can create a resource table in the cloud database to read and write resource data. The cloud development console supports visual database management, such as records, indexes, data permissions, etc., which is very convenient!
Each environment has a unique ID to distinguish it, and you can introduce the cloud development SDK at the front end and pass in the environment ID to initialize it.
init > >
Taro.cloud.init({// environment id env: 'xx',})
Then, you can directly call in the front end of the cloud development provided by the operation of the database interface, such as insert data, query data, do not have to develop their own background!
For example, insert data:
const db = Taro.cloud.database(); Db.collection ('resource').add({data}).then(res => {// return res; }). Catch (err => {// fail console.error(err); });
When recommending resources, we need to let users upload pictures. Previously, we needed to find a place to store them by ourselves. Now we can directly call cloud storage in the front end with a few lines of code:
Const res = await taro.cloud. UploadFile ({cloudPath: 'Upload to Cloud'), filePath: 'Upload to Cloud' PictureUrl,}) // Get picture ID, can be downloaded or directly show picture = res.fileid;
You can manage files, configure permissions, cache, and more in the cloud storage from the Cloud Development Console:
If the default interface provided by cloud development cannot meet the needs, you can write your own background interface and deploy it to Tencent cloud as a cloud function. Then you can request it in the front end, similar to developing your own back end.
For example, if you deploy a login function, you can get the unique ID of the user in the applet. In the console, you can also see the call log of the function, administrative permissions and so on.
Implement no login call
Once you have followed the above process, you will be able to recommend and present resources in the WeChat developer tool. But if you put this little program online and share it with other users, there will be access issues and all functions will be disabled!
This is because in order to ensure the security of resources and flexibly control the authority of resource invocation, cloud development has formulated security rules, and non-logged users are not allowed to access them by default.
If we share a small program in Moments and have to ask our friends to log in to see the list of resources, then the user experience will be too bad, so now we will implement a no-login call.
Small program cloud development takes into account a variety of scenarios and therefore provides the Unlogged mode.
In the unlogged mode, there is no login state of the user, and the application scenarios are as follows:
1. Single page mode: small program/game sharing to Moments is opened
1. Web Unlogged Mode: In a Web environment where there is no login
This mode is off by default. You need to manually enable unlogged access for the cloud environment in “Cloud Console – Settings – Permission Settings”.
Once unlogged mode is enabled, client (front end) permissions must be controlled using security rules, i.e. access to cloud functions, databases, and file stores must pass through security rules.
Therefore, in addition to enabling unlogged access outside the cloud in the console, security rules must be selected and configured in the permission Settings for the cloud database, cloud storage, and cloud functions.
Security rules have their own syntax. Take a cloud database as an example, select a custom security rule to see the original rule:
read, write, doc, auth Expressions for the < span > true < / span > allow access, namely the current logged-in user must is the founder of this data to be read and write.
If you want to allow all users to read and write to all resources, you can simply set the expression value to true:
Modify the security rules of cloud storage. The original rules are as follows:
resource = true = true = true resource = true = true
login allows all users to access, while other functions allow only logged users to access: login allows all users to access;
The security rules are very flexible and can be used reasonably to increase the security of resources and escort the application security while meeting the demand of resource invocation.
Finally, through this article, we understand the development process of small program, as well as the usage of small program cloud development, the way of no-logon resource invocation. Thinking is more important than code, and I strongly recommend that you give cloud development a try to feel efficient and make your own application easily!
Product introduction
Cloud development (TCB) is the cloud native integrated development environment and tool platform provided by Tencent Cloud. It provides developers with high availability, automatic elastic expansion of back-end cloud services, including computing, storage, hosting and other serverless capabilities, which can be used for integrated cloud development of a variety of end-end applications (small programs, Official account, Web application, Flutter client, etc.), which helps developers to build and manage back-end services and cloud resources in a unified way, avoiding tedious server construction, operation and maintenance in the application development process, and allowing developers to focus on the implementation of business logic with lower development threshold and higher efficiency. Open cloud development: https://console.cloud.tencent.com/tcb?tdl_anchor=techsite product documentation: https://cloud.tencent.com/product/tcb?from=12763 technical documentation: https://cloudbase.net?from=10004 technology exchange and Q group: 601134960 Latest news pay attention to WeChat public account [Tencent Yunyun Development] | ESSENTIALAI-STEM |
How you can combat sundamage
How you can combat sundamage the primary
Regardless of the natural risks of exposing the skin we have to unfiltered Ultra violet radiation, a lot of us still ask for the allure of the tanned complexion. Regrettably, this preferred look comes at a price, as the likelihood of developing dangerous skin cancers, lesions, hyperpigmentation, melasma, along with other the weather is elevated tremendously when the skin we have is exposed to prolonged exposure to the sun. You should observe that tanning salons aren’t any different, because they harness exactly the same ultraviolet radiation that’s released through the sun.
Sun-damage is an extremely real and pervasive threat. Each year within the U . s . States, more installments of cancer of the skin are diagnosed than every case of breast, prostate, lung, and colon cancers combined. And, unlike a number of other cancers, the primary reason for cancer of the skin is entirely recognizable and simply prevented using the proper safeguards. If cancer of the skin wasn’t bad enough, there are many other risks connected with exposure to the sun none as prevalent or difficult as the look of excess and uneven pigmentation, wrinkles, and wrinkles.
The Harmful Results of Ultraviolet Radiation onto the skin
When the majority of us consider along side it results of exposure to the sun, we have a tendency to consider sunburns. They’re painful and embarrassing and frequently lead to dry, itchy, and flaky skin. However, sunburns are just temporary. The actual threat lies deep beneath our outer layer of skin, surfacing because of many years of abuse.
Melasma, hyperpigmentation, and skin wrinkling are caused once the sun’s dangerous Ultra violet sun rays penetrate deep into skin tissue and start to mutate healthy skin cells. Within the situation of melasma and hyperpigmentation, these mutations lead to patches of brown, uneven, and frequently scaly regions of discoloration. The greater exposure to the sun a part of the skin receives, the greater its chances for developing this undesirable pigmentation, and also the more apparent the outcomes is going to be. And, as ultraviolet radiation starts to ruin our pigment, additionally, it starts to deteriorate natural bovine collagen levels. Bovine collagen is really a protein accountable for maintaining the dwelling and firmness of healthy skin. When it’s inhibited, your skin becomes poor, loose, and wrinkled.
Thankfully, the side effects of exposure to the sun don’t have to be permanent, with medicine options, can start to become reversed to show a softer, smoother, more vibrant, and healthier complexion.
Presenting Intense Pulsed Light
Intense Pulsed Light (IPL) uses specialized wave length energy to focus on brown skin spots. Because these regions of discolored skin are energized through the light released in the IPL device, they’re destroyed not to mention absorbed through the body. This enables in order to obtain new, healthy skin cells. It makes sense a well-balanced, even complexion free from melasma and hyperpigmentation.
Additionally to aiding in skin tones brought on by sun-damage, IPL also promotes bovine collagen production, which reduces the look of wrinkles and fine lines and helps to create an all natural tightening and overall skin rejuvenation.
At Skin care Consultants, we make use of the latest in photo-facial technology to provide you with optimal results. Our Marietta and Covington offices make use of the Palomar StarLux500, which enables us to supply simple, affordable look after the most generally requested aesthetic treatments. The process involves less risk, because it minimizes your skin’s exposure, and it is much more comfortable than traditional photo-rejuvenation.
Our Buckhead office uses the Palomar Icon Aesthetic System, the next-gen of platform technology. Additionally, it includes the only real Food and drug administration-removed melanin readers. This technique provides fast treatments with excellent outcomes along with a comfortable patient experience. It’s ideal for treating wrinkles, scars, stretchmarks, blue veins, and much more.
Our Buckhead and Marietta offices also employ the MaxG Enhanced Light Handpiece, that provides superior vessel and pigment clearance. It really works to shut bigger, much deeper facial vessels, providing you with an appropriate, no lower-time strategy to a refreshed and rejuvenated appearance.
Resourse: http://dermatologyconsultants.org/how-to-combat-sun-damage/
5 Natural Ways To Combat Winter Sun Damage | ESSENTIALAI-STEM |
What is Frame Relay Subinterfaces? Explained with Example
By | 9th November 2015
How To Configure Frame Relay Subinterfaces.
In Frame Relay network connection, a physical interface can be divided into multiple virtual interfaces; this is referred to as subinterfaces.
A subinterface is simply a logical interface that is directly linked with a physical interface. Therefore, a Frame Relay subinterface can be configured for each of the PVCs coming into a physical serial interface.
Using a Frame Relay point-to-point sub-interface option was created to avoid split horizon issues. In split horizon routing environments, routing updates received on one subinterface can be sent out another subinterface. In a subinterface configuration, each VC can be configured as a point-to-point connection. This allows each subinterface to act similarly to a leased line. Using a Frame Relay point-to-point subinterface, each pair of the point-to-point routers is on its own subnet.
Frame Relay subinterfaces can be configured in either point-to-point or multipoint mode:
i. Frame Relay point-to-point
A single point-to-point subinterface establishes one PVC connection to another physical interface or subinterface on a remote router placing them in their own subnet and each point-to-point subinterface has a single DLCI. In a point-to-point environment, each subinterface is acting like a point-to-point interface. Typically, there is a separate subnet for each point-to-point VC. Therefore, routing update traffic is not subject to the split horizon rule.
ii. Multi-point.
A single multipoint subinterface establishes multiple PVC links to multiple physical interfaces or subinterfaces on remote routers and are all in the same subnet. The subinterface acts like an NBMA Frame Relay interface, so routing update traffic is subject to the split horizon rule. normally, all multipoint VCs belongs to the same subnet.
Example Topology:
In the topology below, router R1 has two point-to-point subinterfaces.
1. The s0/0.0.102 subinterface connects to R2, and the
2. The s0/0/0.103 subinterface connects to R3.
Each subinterface is on a different unique subnet.
frame relay sub
How to Configure Frame Relay Subinterface on Cisco router
R1 to R2
R1(config)#interface se0/0/0
R1(config-if)#encapsulation frame-relay
R1(config-if)#no shutdown
R1(config)#interface se0/0/0.102 point-to-point
R1(config-if)#ip address 10.2.1.1 255.255.255.252
R1(config-subif)#frame-relay interface-dlci 102
R1(config-subif)#end
R1(config-if)#exit
R1 to R3
R1(config)#interface se0/0/0
R1(config-if)#encapsulation frame-relay
R1(config-if)#no shutdown
R1(config)#interface se0/0/0.103 point-to-point
R1(config-if)#ip address 10.2.1.5 255.255.255.252
R1(config-subif)#frame-relay interface-dlci 103
R1(config-subif)#end
Step to configure Frame Relay subinterfaces on a physical interface:
Step 1. Remove any network layer address (IP) assigned to the physical interface. If the physical interface has an address, frames are not received by the local subinterfaces.
Step 2. Configure Frame Relay encapsulation on the physical interface using the encapsulation frame-relay command.
Step 3. For each of the defined PVCs, create a logical subinterface. Specify the port number, followed by a period (.) and the subinterface number. To make troubleshooting easier, it is suggested that the subinterface number matches the DLCI number.
Step 4. Configure an IP address for the interface and set the bandwidth.
Step 5. Configure the local DLCI on the subinterface using the frame-relay interface-dlci command.
Frame Relay address mapping
How Frame Relay works
How to Configure Frame Relay on Cisco Router
Troubleshooting Frame Relay configuration
Host Standby Router Redundancy Protocol (HSRP)
Virtual Router Redundancy Protocol (VRRP)
Gateway Load Balancing Protocol (GLBP)
Spanning Tree Protocol (STP)
VLAN Trunking Protocol (VTP)
Leave a Reply
Your email address will not be published. Required fields are marked * | ESSENTIALAI-STEM |
637 A.2d 944
ABRAHAM SCHLUSSEL, PLAINTIFF-APPELLANT/CROSS-RESPONDENT, v. EMMANUEL ROTH CO., K/N/A ERC LIQUIDATING CORP., A NEW JERSEY CORPORATION, DEFENDANT, AND NOVTEX CORPORATION, A NEW YORK CORPORATION, DEFENDANT-RESPONDENT/CROSS-APPELLANT, AND DANIEL BIRD, JOHN CARPENTER AND CARL FUNKE, DEFENDANTS-RESPONDENTS.
Superior Court of New Jersey Appellate Division
Argued December 13, 1993
Decided February 7, 1994.
Before Judges PETRELLA, CONLEY and VILLANUEVA.
David O. Marcus argued the cause for appellant-cross-respondent {Shapiro & Shapiro, attorneys; Mr. Marcus and Robert P. Shapiro, on the brief).
Charles A. Strenk argued the cause for respondents-cross-appellants Bird & Novtex Corporation {Kieman & Strenk, attorneys; Mr. Strenk, on the brief).
Eugenie F. Tendrich argued the cause for respondents Carpenter and Funke (Rabner., Allcom & Meislik, attorneys; Mr. Tend-rich, on the brief)-
The opinion of the court was delivered by
CONLEY, J.A.D.
Plaintiff landlord appeals the dismissal of his claim under the Uniform Commercial Code Bulk Transfer Act, N.J.S.A. 12A:6-101 to 6-111, for rental payments not due and owing at the time of transfer of the assets of his tenant, defendant Emmanuel Roth Co. (Roth), to defendant Novtex Corporation (Novtex). The claim was rejected by the trial judge on the basis that plaintiff was not a creditor within the meaning of the act as to future rents at the time of transfer. Plaintiff also appeals a judgment entered in his favor for a renter’s lien pursuant to N.J.S.A. 2A:44-165 to—167 in the amount of rent that was due as of the date of transfer reduced by the amount of Roth’s security deposit. Finally, plaintiff appeals a no cause jury verdict on his claims against defendant Daniel Bird, president of Novtex, and defendants John Carpenter and Carl Funke, shareholders of Roth, for their alleged fraudulent misrepresentations that Novtex would assume the lease and alleged concealment of the removal of Roth’s assets and business from the premises. Novtex cross-appeals from the renter’s lien judgment. We affirm the dismissal of the bulk transfer act and fraud claims and modify the rentor’s lien judgment to remove the security deposit reduction.
In October 1980, plaintiff and Roth executed a five-year lease for a portion of plaintiffs industrial building in Carlstadt. In October 1985, the lease was modified and extended to October 1995. As modified, the lease provided for an annual lease rent of $76,483.00 payable in monthly installments of $6,373.58, with a rent adjustment every two and one-half years. In addition, the lease provided for payments of a percentage of certain expenses, including taxes, insurance and maintenance of common areas. The monthly rent was due the first of the month, but if not paid by the fifteenth of each month, a late charge would be assessed.
Pursuant to Article 15 of the lease, a default in payment of its rental obligations under the lease would occur if Roth failed to make such payments upon ten days written notice by plaintiff. Upon such default, plaintiff could terminate the lease upon five days notice, enter and repossess the premises. If so terminated, the lease established damages as either “[a] sum which represents any excess of (i) the aggregate of the rent, impositions and additional rent for the balance of the term if the Lease was not so terminated, over (ii) the net rental value of the demised premises at the effective date of such termination, both discounted at the rate of four percent (4%) per annum” or, at plaintiffs option, “[sjums equal to the rent, impositions and additional rent, when the same would have been payable if not for such termination, less any net rents received by Landlord, from any reletting, after deducting all costs incurred in connection with such termination and reletting....”
Roth produced and distributed narrow fabric and trimmings at the premises. In December 1986, Carpenter and Funke purchased all of Roth’s stock, and continued to operate the business. They received loans from Chemical Bank to finance this acquisition and Chemical Bank obtained a security interest in Roth’s assets, which was perfected in 1987. By September 1988, the company was in financial trouble. One of the rent checks to plaintiff had bounced and, in Carpenter’s words, the business was borrowing from Peter to pay Paul. Carpenter and Funke did not want to file for bankruptcy, and their alternatives were either finding a partner to allow them to continue to run the business or identifying a purchaser for the business.
In October 1988, Carpenter and Funke advised plaintiff by letter that they were seeking his help in marketing their premises. Plaintiff promoted the availability of the space to the brokerage community and Roth advertised it in the newspaper. Roth also showed the space to potential lessees.
During that time, Novtex emerged as a potential buyer for Roth. On November 9, 1988, Carpenter, Funke and Novtex entered into an agreement for purchase of assets. Pursuant to that agreement, Novtex assumed responsibility for all of Roth’s orders, including back orders and future orders, and for its inventory. It also assumed leases for five automobiles, for Xerox, telex and postage equipment, and for the telephone system. Nov-tex did not assume the lease with plaintiff.
Also during this November 1988 time period, Bird, Funke and Carpenter met with plaintiffs son, Marc Schlussel. Most of the evidence presented to the jury on the fraud counts focused on whether Bird did or did not state at this meeting that, if and when the Novtex purchase was consummated, Novtex would assume Roth’s lease and operate the business from Carlstadt.
The respective versions of events are as follows. Marc Schlus-sel contended that Bird never informed him during the meeting that the acquisition was an asset purchase only; Schlussel believed that the business would continue just as it had when Carpenter and BMnke had taken over. However, Schlussel never asserted that Bird made an express representation that Novtex would assume the lease. Schlussel stated only that Bird had assured him that rent arrearages would be paid.
In contrast, Bird was emphatic that he explained to Schlussel that Novtex was completing an asset purchase of Roth, would move Roth’s equipment to Massachusetts, and had no interest in plaintiffs lease. Carpenter similarly recalled that Bird had always referred to the Roth acquisition as an asset purchase. He elaborated that the purpose of the November meeting was to assure Schlussel that, despite the bounced checks, the rent would be brought up to date.
Indeed plaintiff acknowledged that he knew that Novtex would move the company to Massachusetts at some point, but denied that Bird told him the move would occur before February 1989. A December 30, 1988 letter from plaintiff, however, to Carpenter and Funke reiterated the parties’ arrangement for advertising the space and plainly reflected plaintiffs awareness of Roth’s desire to terminate the lease “as quickly as possible.” In that letter, plaintiff asked only that “should your plans change and you no longer desire to terminate the existing lease as quickly as possible. please contact landlord immediately.”
As of November, Roth was behind on the October and November rents and taxes. On November 18, 1988, plaintiff sent Roth a notice advising that it was “in default in payment” for a total of $15,289.00—including the October and November rent payments, fourth quarter real estate taxes and late fees. The notice concluded that if the default was not cured in full within ten days plaintiff would exercise all rights legally available. With monies advanced by Novtex, these arrearages were paid, in addition to the December rent. As of the end of December, plaintiff had received from Roth, advanced by Novtex, $22,133.00, representing rental payments for October and November, late fees and fourth quarter real estate taxes, in addition to December’s rent.
The closing between Roth and Novtex occurred on January 13, 1989. As of that date, the January rent had not been paid and late fees for December’s rent as well as maintenance fees had also not been paid. On January 11, 1989, plaintiff sent Roth notice of the total amount owed ($10,622.00). This notice was not received by Roth, however, until January 17 and pursuant to the lease, a default by Roth would not have occurred until January 22, 1989.
The total consideration paid by Novtex for the assets of Roth purchased by Novtex was $401,840.00. That amount consisted of (1) $170,000.00 paid to Chemical Bank on its secured loan (2) $151,775.00 in accounts payable of Roth which were expressly assumed and paid by Novtex, and (3) $80,065.00 in loan advances by Novtex to Roth between November 1988 and January 13,1989, including the $22,133.00 paid to plaintiff. Additionally, at the closing of the transaction between Roth and Novtex it was determined that the total indebtedness of Roth to Chemical was $206,-657.00. In order to pay Chemical’s secured loan, Carpenter and Punke personally borrowed from Novtex $36,657.00 which was paid by Novtex to Chemical Bank to make up the deficiency. After the closing and prior to payment of Roth’s accounts payable, Novtex sent a letter to each creditor to verify the accuracy of the information as to the amounts owed by Roth. It has never been disputed that all of the proceeds of the sale were paid by Novtex entirely to Roth’s various creditors.
By the end of January 1989, Novtex moved all of Roth’s equipment to its facility in Massachusetts. Roth paid no other rent to plaintiff. By written notice dated January 22, 1989 and effective January 26, 1989, plaintiff terminated the lease for nonpayment of the January rent, December late charges and maintenance expenses. The premises were rented to a new tenant in January 1990, but for less rent.
Pursuant to the liquidated damages provision of the lease, plaintiff calculated his damages as (1) $85,556.00 unpaid base rent for 1989 plus interest of $83,422.00, (2) expenses as a result of the termination and reletting in the amount of $50,636.00 plus interest of $36,655.00, and (3) rental shortfall (the difference in the Roth rent and the new lease) of $137,285.00. No party has ever disputed these amounts and a judgment for $393,554.00 was entered against Roth.
I.
Contending that he was a creditor of Roth at the time of the transfer of its assets, plaintiff claims he was entitled to notice of the transfer and to share in the proceeds that were distributed by Novtex to Roth’s other creditors. He argues that Novtex, as a transferee of all of Roth’s assets, is responsible for what would have been his share of the proceeds which he contends is $99,-930.00 or 63.4% of that amount of the proceeds that was distributed to Roth’s unsecured creditors.
As we have said, the trial judge disagreed, a conclusion with which we are in agreement. But an understanding of our agreement requires a fairly extensive review of the critical provisions of the Uniform Commercial Code Bulk Transfer Act and the many cases decided thereunder as well as cases decided under pre-code acts. Because the act is a uniform act adopted in most states, and because there is a dearth of cases in New Jersey on the critical issue with which we are concerned, we have found it necessary to consider other states’ cases.
Before we commence this task, however, we think it somewhat pertinent to make several observations: 1) aside from plaintiffs renter’s lien claim, with which we deal later, and his bulk transfer act claim, plaintiff has no basis to recover any part of Roth’s lease obligations from Novtex, for it is plain Novtex did not assume any liability for the lease, and 2) by virtue of the jury’s rejection of plaintiffs claim of fraudulent misrepresentations, we assume, to the extent it is at all critical, that Novtex’s version of what transpired at the November 1988 meeting was accepted by the jury and that at that meeting Novtex told plaintiff that it was purchasing Roth’s assets and that it was going to relocate the business to its facility in Massachusetts. Novtex made it clear it was not going to assume Roth’s lease and was going to move from the premises as soon after the closing as possible, but “no later than February.” Plaintiff thus knew at least two months before the transfer occurred, that Roth would vacate the leased premises by the end of January 1989.
Bulk sales legislation was originally enacted around the turn of the century in response to a fraud perceived to be common: a merchant would acquire his stock in trade in credit, then sell his entire inventory and abscond with the proceeds, leaving creditors unpaid. See Prefatory Note to U.C.C. Revised Article 6 (Bulk Sales), 2C U.L.A. 6 (1991). Creditors had little recourse because the transfer of the goods to an innocent buyer immunized them from the reach of the seller’s creditors and, even if the merchant could be found, in personam jurisdiction over him might not have been readily available. Ibid. When the American Law Institute adopted a proposed Uniform Commercial Code in 1950’s, it observed that the central purpose of the various states’ pre-code bulk sales laws was to protect against two forms of commercial fraud:
(a) The merchant, owing debts, who sells out his stock in trade to a friend for less than it is worth, pays his creditors less than he owes them, and hopes to come back into the business through the back door some time in the future.
(b) The merchant, owing debts, who sells out his stock in trade to any one for any price, pockets the proceeds, and disappears leaving his creditors unpaid.
[Uniform Commercial Code Comment 2 on N.J.S.A. 12A:6-101].
Enacted in New Jersey in 1961, the Code “represents a substantial improvement over existing law in its comprehensive treatment of the rights and duties of all parties and the clarity of its draftsmanship.” Introductory commentary to New Jersey Uniform Commercial Code-Bulk Transfers Act, N.J.S.A. 12A:6-101 to -111. In order to effectuate such protection, N.J.S.A. 12A:6-104(l)(a) provides that a bulk transfer is ineffective against a “creditor” of the transferor unless the transferee requires the transferor to furnish a list “of his existing creditors” and § 104(2) requires that the list “contain the names and business addresses of all creditors of the transferor, with the amounts when known, and also the names of all persons who are known to the transferor to assert claims against him even though such claims are disputed.” N.J.S.A 12A:6-104(3) imposes responsibility for completeness and accuracy of the list upon the transferor only, unless the transferee “is shown to have had knowledge” of any errors or omissions. See also N.J.S.A. 12A:6-105 requiring notice of the date of transfer. Pursuant to N.J.S.A. 12A:6-106, the transferee is responsible for applying the proceeds of the sale to the creditors of the transferor. If the proceeds are not enough to pay all creditors, distribution must be made pro rata, except that secured creditors are entitled to priority. N.J.S.A. 12A:6-106(3). An ineffective transfer is voidable at the option of the creditor of the transferor. Sbar’s Inc. v. N.J. Art & Craft Distributors, Inc., 205 N.J.Super. 516, 517-18, 501 A.2d 560 (App.Div.1985) (remedy of the creditor is to execute upon the goods transferred or, if they are not in the transferee’s possession, to seek personal liability against the transferee to the extent of the value of the goods).
Plaintiff contends here that he was a creditor of Roth for the purposes of the protections afforded by the Act. N.J.S.A. 12A:6-109(1) defines creditors to encompass those persons “holding claims based on transactions or events occurring before the bulk transfer.” An earlier A.L.I. draft of this section expansively encompassed claims “whether they arise from tort or contract, or are liquidated or unliquidated, or are secured or unsecured, or are contingent or fixed, or are presently due or not.” See Uniform Commercial Code, § 7-711 (A.L.I. Draft, 1949). We take note of the New Jersey Study Comment No. 1 to N.J.S.A 12A:6-109 which says the adopted definition does not “seem to limit in any way the definition of the earlier draft” and the Uniform Commercial Code Comment to this section that “[t]he claims referred to of course include unliquidated claims.” We do not express the same confidence.
It is accepted that only persons with claims at the time of the sale or transfer are included, and not persons who extend credit or whose claims come into existence after the sale or transfer. And generally, persons having liquidated claims at the time of sale or transfer are creditors entitled to protection even though their claims may not be due or payable at the time of sale. See e.g., Waterman v. Perrotta, 144 Colo. 117, 119, 355 P.2d 313, 315 (1960) (holder of a promissory note for loan made before transfer was a creditor even though debt was not then due); accord Himmelstein v. Bach, 261 A.D. 57, 24 N.Y.S.2d 696 (1941) (pre-code case distinguishing claim on a note, though payment not due at time of transfer, from contingent liability, observing that the note obligation was fixed and determined in all respects as of the date of transfer). Further, the fact that a claim may not, as of the date of transfer, have been reduced to judgment, does not preclude bulk sales laws protection. Thus, N.J.S.A. 12A:6-104(2) requires the transferor to include in the list of creditors persons known to assert a claim even though the claim may be disputed. See Royal Indem. Co. v. Ginsberg, 157 Misc. 507, 284 N.Y.S. 551 (N.Y.Mun.Ct.1935) (insurer with a claim for earned premiums not reduced to judgment before transfer, nonetheless a creditor entitled to pre-code bulk transfer law protection under New York law). But see Jay v. United Defense Industries, Inc., 162 Ill.App.3d 1071, 1078, 114 Ill.Dec. 279, 284, 516 N.E.2d 434, 439 (1987) (under Arizona Bulk Transfer Act, plaintiff who had a tort claim against the transferor prior to the transfer, but before filing suit and obtaining judgment, was not a creditor entitled to protection under the Act).
There is, however, little consistent treatment of what are characterized as unliquidated or contingent claims. On the one hand, the United States District Court of New York, applying New York law, has held that creditors within the meaning of the uniform code bulk transfer act include anyone having a legal right to damages growing out of contract or tort, whether liquidated or unliquidated, contingent or fixed, due or not, or secured or unsecured. Chemical Bank v. Society Brand Industries, Inc., 624 F.Supp. 979, 981 (S.D.N.Y.1985) (bank which had asserted a tort claim for conversion arising from a security interest in transferor’s assets prior to transfer was a creditor entitled to protection of the act); see Alderman & Dole, 2 A Transactional Guide to the Uniform Commercial Code, § 5.30-10, p. 784 (1983) (“the term ‘creditor’ includes all creditors who have claims in tort or in contract, liquidated or unliquidated, secured or unsecured, contingent or fixed, matured or unmatured.”). Accord Stone’s Pharmacy, Inc. v. Pharmacy Accounting Management, Inc., 812 F.2d 1063, 1065-66 (8th Cir.1987), cert. denied sub nom., Foxmeyer Corp. v. Stone’s Pharmacy, Inc., 493 U.S. 1043, 110 S.Ct. 837, 107 L.Ed.2d 832 (1990) citing Fischer v. Rio Tire Co., 65 S.W.2d 751, 756 (Tex.Com.App.1933) (dictionary definition of creditor is one who has a right to require fulfillment of an obligation or contract; term is not restricted to any particular class of creditors, but includes all persons who were creditors of the seller at the time of the sale, although their claims had not been reduced to judgment, or were not due, and although they were not creditors for merchandise but merely general creditors of the seller in other transactions).
On the other hand, the United States District Court of Pennsylvania, applying Pennsylvania law, has concluded that creditor within the meaning of the uniform code bulk transfer act “refers to persons holding liquidated claims rather than to assertions of potential liability for breach of contract.” Aluminum Shapes, Inc. v. K-A-Liquidating Co., 290 F.Supp. 356, 358 (W.D.Pa.1968) (plaintiff contracted with transferor to supply all of its aluminum extrusion materials for a year, transferor attempted to cancel contract during term of the contract as a result of which plaintiff filed breach of contract suit; although transfer occurred without notice to seller and at a time transferor was aware of the claim, but just prior to filing of the suit, seller was not a creditor within the meaning of the code). Accord King v. Adams Toyota Inc., 722 F.Supp. 1379, 1380 (M.D.La.1989) (Code applies only to liquidated claims and thus plaintiff who had a potential claim for medical expenses against transferor prior to transfer but not yet “certain what and how much is due,” was not a creditor within the meaning of the code). Cf. Brown v. Superior Pontiac-GMC, Inc., 352 So.2d 576, 577 (Fla.Dist.Ct.App.1977) (“[t]he obvious purpose of the bulk transfer statutes is to protect ordinary trade creditors who have a right to expect that their bills will be paid from the assets of an ongoing business. Though the applicable definition of creditor is broad, we do not believe that the legislature intended to include a dissenting stockholder within the protection afforded by bulk transfer statutes.”). See e.g. pre-code cases, Griffin v. Allis-Chalmers Mfg. Co., 65 N.D. 379, 259 N.W. 89 (1934) (prior to transfer plaintiff purchased defective tractor from transferor who at the time of transfer had not repaired it, however plaintiffs claim for breach of contract had not yet been filed or adjudicated and thus the claim was viewed as of the date of transfer as unliquidated and contingent and plaintiff was found not to be a creditor entitled to the protection of the pre-code act); accord Hart v. Evans, 330 Ill.App. 385, 71 N.E.2d 546 (1947) (plaintiffs action for fraudulent misrepresentation in connection with sale of a tractor was pending at time of transfer, but judgment thereon not obtained until after—claim was viewed as unliquidated, uncertain and continent and thus plaintiff not a creditor under the precode act). See generally, Annotation, Character or Class of Creditors Within the Contemplation of the Bulk Sales Law, 85 A.L.R.2d 1211 (1962), §§ 3-8; Annotation, Character or Class of Creditors Within Contemplation of Bulk Sales Law, 84 A.L.R. 1406, §§ II-V. See also Annotation, Bulk Transfers: Construction and Effect of UCC Article 6, Dealing With Transfer in Bulk, 47 A.L.R.3d 1114 § 6 (1973).
We focus here upon plaintiffs claim for rental obligations under the lease subsequent to termination. Both code and pre-code cases dealing with whether a landlord is a creditor within the meaning of bulk sales acts for such a claim are few and not in accord. In each case, the particular result is based upon how the claim for future rents is characterized and, in some instances, based upon an expansive view of the type of creditors covered by the act.
In B & H Auto Supply Inc., v. Andrews, 417 S.W.2d 341 (Tex.Ct.Civ.App.1967), for example, B & H was a tenant of Andrews-Dillingham Properties Inc. on a long term lease. With several years still remaining on the lease, B & H transferred all of its assets to a third party. The lease was paid as of the date of the transfer, but was not assumed by the transferee. No further rental payments were made and the landlord was not notified of the transfer. The court concluded that the landlord was a creditor within the meaning of the Texas bulk sales act for the unpaid rents and thus entitled to its protections. In doing so, the court rejected B & H’s claim that the unpaid rental payments were “contingent, not fixed and certain,” and did so relying upon the general notion that a person holding a fixed but unmatured debt, such as a noteholder, is a creditor within the meaning of the act.
In considering a person with a claim for future rent similar to a noteholder, the court in B & H relied upon Ratliff v. Davis, 133 Colo. 315, 294 P.2d 1109 (1956), where lessors were considered creditors for future rents. But there, the particular lease at issue created at its commencement a hen upon the property for the full amount of the entire rent. The corut in Ratliff characterized this hen as creating a contractual relationship that was “something more than that of landlord—tenant[.]” 133 Colo. at 318, 294 P.2d at 1110-1111. Accord Wright v. Haley, 208 Ind. 46, 49, 194 N.E. 637, 638 (1935) (“[t]he lessee’s obhgation to pay the installments for the full term is no different than the obhgation to pay partial payments for merchandise delivered, and accepted, and in possession. It is no different than the obhgation to pay for merchandise sold, to be paid for at a future date, which has not arrived, or to pay a promissory note given for merchandise, or for money, which has not matured.”). Cf. McDowell v. Chambers, 525 So.2d 343 (La.Ct.App.1988) (lessor was a creditor entitled to protection of bulk transfer act for an amount that included rents due after transfer based upon a characterization of rents as fixed and owing as of date of transfer because rent had not been paid for several months prior thereto—thus “[t]he lessor at that time [time of transfer] was a creditor____” 525 So.2d at 347); Empire Radio Co. v. Bates, 56 R.I. 116, 183 A. 882 (1936) (lessor on a long term lease and who was not notified of transfer of ah of tenants assets on February 1, 1932, was creditor for purposes of the February 1932 rent where the lease provided that monthly rents were due oil the first day of the month, and, thus, claim for such rent had accrued as of that day).
On the other hand, in Trust Co. of Chicago v. Fargeson, 340 Ill.App. 344, 92 N.E.2d 211 (1950), the Illinois Court held that a lessor under a lease which provided for fixed gross rent payable in monthly installments, was not a creditor within the meaning of the Illinois pre-code bulk sales act for installments of rent not due at the time of sale of the lessee’s assets. There, the lease period was from August 1947 to July 31,1949 with a total sum of rent payable in monthly installments. On February 16,1948, the lessor sold his entire business. As of that date, the rent was current. The assets were removed from the premises two days after the sale. The assets were thereafter resold and the lessor sought resort to the proceeds for all rents due after date of sale. Drawing upon an analysis of the historical basis for bulk sales acts, as well as how future rent is considered in other areas, the Illinois court concluded the lessor was not a creditor within the meaning of the bulk sales act for future rent claims. For instance, although noting that the Bankruptcy Act had subsequently been amended to permit a lessor to establish a claim for future rent up to one year, see 11 U.S.C. § 101, (4)(A); 11 U.S.C. § 502(b), the court considered the following description of future rent in the context of a bankruptcy proceeding:
A contract of lease is peculiar- in its nature, and differs in many respects from other contracts. Rent, as such, is an incident to, and grows out of, the use and occupancy, and is the consideration therefor. Unaecrued rent cannot be said, therefore, to be a fixed liability then absolutely owing, payable in the future, or, indeed, a ‘debt’ of any kind, as that word seems to be used in the act. It is only an unmatured obligation to pay in the future a consideration for future enjoyment and occupancy. This cannot be said to be, properly speaking, a present debt, demand, or claim at all, as these words are apparently used in the foregoing provisions, due regard being had to the context, and cannot come within either the clause as to fixed liability then owing or a debt founded on contract.
[Trust Co., 340 Ill.App. at 349, 92 N.E.2d at 214 (quoting In re Arnstein et al., 101 F. 706, 707 (S.D.N.Y.1899))].
The court also noted that under general landlord and tenant law in Illinois, a covenant to pay rent does not create a debt until the date stipulated for payment. 340 Ill.App. at 349, 92 N.E.2d at 214. And in distinguishing the landlord’s reliance upon Wright v. Haley, supra, and the landlord’s reliance upon cases concerning claims based upon promissory notes not yet due, the court said:
The authorities on which plaintiff relies rest on the reasoning that as by precedent, a note payable in the future, or goods sold on installments are within the Bulk Sales Act, therefore, a lease providing for a gross amount of rental payable in future installments is likewise within that act. But, as we have pointed out, rent is in a different class, both historically and in any classification made with a realistic regard for the objectives and purposes of the Act In a recent book, “An Introduction to Legal Reasoning,” by Professor Edward H. Levi (University of Chicago Press, 1949), the fallacies and constructive values of reasoning by precedent are brilliantly revealed and illustrated. He says: “The problem for the law [in applying precedent] is: When will it be just to treat different eases as though they were the same? A working legal system must * * * be willing to pick out key similarities and to reason from them to the justice of applying a common classification.” With what group of precedents shall we identify claims for future rent? It is true that in its provisions for payment, this lease is similar to any money obligation payable in installments. However, the vital difference to be considered in the interpretation of the Bulk Sales Act is that whereas a merchant creditor parts until his goods and a money creditor parts with his money, a lessor does not, in any comparable sense, part with his property. Moreover, the lessor is by statute given preferential and speedy remedies to repossess and. obtain payment. The injustice of applying an interpretation which would include lessors has been pointed out in the cases cited. In the instant case, for example, to interpret the Act to include the lessor would be to give it a claim for rent which would continue for a period of more than a year following the sale. Business leases frequently run five, ten and twenty years. No creditors could be paid until some adjustment had been made of lessors’ claims. The extent to which the operation of this Act could be seriously hampered by the inclusion of such claims is obvious.
[340 Ill.App. at 351-352, 92 N.E.2d at 215 (emphasis added)].
Cf. Apex Leasing Co. v. Litke, 173 A.D. 323, 159 N.Y.S. 707, 709 (1916), aff'd, 225 N.Y. 625, 121 N.E. 853 (1918). See also Modern Truck Renting Service Corp. v. Admiration Coat, Apron & Towel Supply Co. Inc., 107 N.Y.S.2d 253 (1951), aff'd 279 A.D. 754, 109 N.Y.S.2d 180 (1951) (long term lease on trucks not breached by lessee until after sale of its business and thus as of date of sale lessor was not a creditor under pre-code bulk sales law as to such rents).
Although there are no cases in New Jersey directly on point, we think Silco Automatic Vending Co., Inc. v. Howells, 105 N.J.Super. 511, 253 A.2d 480 (App.Div.1969), reflects a view of claims for future rents more in line with Tmst Co., supra. There, plaintiff had entered into an exclusive long term lease with defendant Al’s Cozy for the leasing of space by Al’s in its tavern for plaintiffs machines. The lease provided monthly rental payments. Al’s sold the business to a third party who required removal of the machines. Plaintiffs contention that it was creditor under the bulk transfer act for its breach of contract claim was rejected by trial court primarily on the basis that the sale of the tavern business was not a bulk sale within the meaning of the act. In affirming that ruling, we also observed that plaintiffs claims for lost rent as a result of failure of the purchaser to assume the lease and provide space for the machines, was a claim based upon “events occurring after the transfer” and thus plaintiff was not a creditor within the meaning of the act. 105 N.J.Super. at 513, 253 A.2d 480. Here, the landlord’s claim for lost future rent as a result of Novtex’ failure to assume the lease and removal of the assets from the premises, can be similarly characterized as a claim based upon events that occurred after the sale.
Furthermore, in considering what type of claims were contemplated by the Legislature to entitle a “creditor” to protection, we note the act requires the seller to prepare a list of creditors “with the amounts when known” and the names of persons known to assert claims even though they may be disputed. But, contrariwise, the broad definition originally proposed, which would have included contingent or potential claims, was rejected. In this respect, the Legislature knows how to define “creditors” expansively. See N.J.S.A 25:2-21 (for the purposes of the Uniform Fraudulent Conveyance Act, creditor is a person having any claim defined as “a right to payment, whether or not the right is reduced to judgment, liquidated, unliquidated, fixed, contingent, matured, unmatured, disputed, undisputed, legal, equitable, secured or unsecured.”).
We are inclined to agree with the view that a claim for future rents is beyond the scope of the bulk transfer act. The rationale expressed in Trust Co., albeit of some age, is, nonetheless, still entitled to considerable weight and is a rationale that has not been expressly altered by the definition of creditors under the U.C.C. Under that definition, to be a creditor one must have a “claim” as of the date of transfer. While the U.C.C. expressly includes “disputed” claims and thus clearly rejects those cases that suggest the need for a claim to be fixed and/or reduced to judgment, there is no indication the intent was to jettison the preexisting view that persons having claims that are contingent and become concrete upon the happening of subsequent events or circumstances, are not creditors within the meaning of the protections afforded the various bulk transfer acts. And we think Silco reflects a similar view.
Finally, we observe that New Jersey courts have consistently considered future rents as a contingent liabilities. Bloch v. Bell Furniture Co., 111 N.J.Eq. 551, 557, 162 A. 414 (E. & A.1932). See Van Straaten & Havey, Inc. v. Foremost Silk Hosiery Mills, Inc., 126 N.J.Eq. 518, 520, 10 A.2d 292 (N.J.Ch.1940), aff'd, 127 N.J.Eq. 53, 11 A.2d 233 (E. & A.1940) (describing future rent as contingent liability and disallowing claim for future rent in corporate insolvency proceeding because, in case of termination of tenancy, the landlord may lease the premises to someone else and thereby decrease or destroy the liability), and Finger v. Kemp, 112 N.J.Eq. 14, 16, 163 A. 153 (N.J.Ch.1932) (dismissing landlord’s complaint to set aside his tenant’s conveyances: partnership was solvent at time of transfer, rent was not past due, and the liability under the lease was contingent; remoteness of debt made it difficult to infer a motive to defraud creditors). Cf. Hartwell v. Hartwell Co., Inc., 167 N.J.Super. 91, 96-97, 400 A.2d 529 (Ch.Div.1979).
Even assuming plaintiff is a creditor entitled to the protection of the bulk transfer act, Novtex paid out the entire proceeds of the sale to other persons and companies who indisputably were “creditors” of Roth. It did under circumstances which indicate that the precise amounts of the claims were verified and the amounts paid were in good faith. Additionally, as evidenced by the jury verdict, Novtex had advised plaintiff several months prior to the sale that it was not assuming the lease and that it would remove Roth’s assets by no later than the end of February. Other than the promise to ensure that the November and December rents would be brought current, plaintiff plainly was on notice that no further rents would be forthcoming. Not once is there any indication that prior to the sale any of the parties, including plaintiff, even contemplated the plaintiff could be a creditor within the meaning of the act for the purposes of its protections.
N.J.S.A. 12A:6-109(2) provides:
Against the aggregate obligation imposed by the provisions of this Chapter concerning the application of the proceeds (12A:6-106 and subsection (3)(c) of 6-108) the transferee or auctioneer is entitled to credit for sums paid to particular creditors of the transferor, not exceeding the sums believed in good faith at the lime of the payment to be properly payable to such creditors.
On its face, this section gives to Novtex a dollar for dollar credit of all amounts paid to other creditors “not exceeding the sums believed in good faith” to be due. Although plaintiff argues that this credit protects a transferee who pays out proceeds of a sale only against a claim by another creditor that the particular amount paid was more than it should have been, there is nothing in the language of the statute to support such a restrictive interpretation and counsel cites to us no supporting cases. Moreover, we have previously stated to the contrary. Sbars, Inc. v. N.J. Art & Craft Distributors, 205 N.J.Super. 516, 518, 501 A.2d 560 (App.Div.1985) (“[defendant [bulk sales purchaser] is to be credited with all payments heretofore made to creditors____”). Although we so held there in the context of payments made through the bankruptcy court, the statute does not limit the credit based upon who makes the payments or where the payments are made, but rather focuses upon to whom the payments are made and the good faith thereof. See also Hawkland, Uniform Commercial Codes Services, § 6-109:02, p. 129-130; Anderson, 7 Uniform Commercial Code, (3d ed. 1985), U.C.C. § 6-109, p. 438.
II.
We next deal with plaintiffs appeal from the reduction of his renter’s lien pursuant to N.J.S.A. 2A:44AL65 by the amount of the security deposit and Novtex’s cross-appeal from any judgment entered under the statute. It is undisputed that as of the date of removal of Roth’s equipment from the premises, the amount of unpaid rent and other charges was $10,622.00. Novtex claims, however, that the act does not impose liability upon a subsequent purchaser, but that the sole remedy a landlord possesses is sale of the tenant’s property.
N.J.S.A. 2A:44-166 provides:
A rentor shall be entitled to a lien on machinery and other chattels to the extent of the rentee’s interest therein for the amount of unpaid rent, from the date the rent is unpaid.
Such lien hereby created shall have priority and be paramount to any title, lien, interest, mortgage, judgment or other encumbrance created or acquired after machinery or other chattels are placed in the premises. Such priority shall extend only to the amount of unpaid rent for not more than 6 months.
N.J.S.A 2A:144-167 authorizes the rentor to sell the machinery or other chattels at public auction. It does not, however, require such sale or any other action be taken by the landlord to perfect the lien; rather, the lien is inchoate and attaches from the date the rent becomes due and remains unpaid. In re Holly Knitwear, Inc., 140 N.J.Super. 375, 382, 356 A.2d 405 (App.Div.1976). Indeed “[i]t is not actually a lien at all, but rather a statutory right to preference in payment over other creditors.” Hartwell v. Hartwell Co., Inc., 167 N.J.Super. 91, 97, 400 A.2d 529 (Ch.Div.1979).
We reject Novtex’s argument that responsibility for the lien cannot be imposed upon it. The statute expressly impresses the lien upon the tenant’s property “from the date the rent is unpaid” and “paramount to any title ... interest created or acquired____” Here, at the date of the transfer, it is undisputed Roth owed plaintiff $10,622.00. As of that date, its assets were impressed with a lien equal to that amount and Novtex took those assets subject to that lien. See Blanos v. Eastwood Realty Co., 116 N.J.L. 1, 3-4, 181 A. 144 (E. & A.1935) (sheriffs sale purchase of tenant’s equipment subject to landlord’s statutory lien).
Moreover, we agree with plaintiff that the trial court should not have deducted the security deposit from the amount of the lien. Pursuant to the lease, plaintiff “may use, apply or retain the whole or any part of the security” to either cure a default or reimburse for damages or expenses incurred as a result of the default, including expenses incurred in reletting. Here, it is uncontroverted that plaintiff applied the deposit against costs incurred to repair Roth’s space and prepare it for the new tenant. It could not, thus, be credited a second time against plaintiffs lien.
III.
Plaintiffs final claim is that the jury charge on damages was erroneous thus requiring a new trial. The jury did not reach the issue of damages, having rejected plaintiffs claim of fraudulent misrepresentation. Any error in the charge on damages is moot.
TV.
We, thus, affirm the dismissal of the bulk transfer act claim and the dismissal of the fraudulent misrepresentation claim. We modify the judgment pursuant to the Renter’s Lien Act to impose a lien in the amount of $10,622.00 upon Novtex and, as modified, affirm that judgment. We remand for the entry of an amended judgment consistent with this opinion.
The fraud counts were tried by a jury. The parties agreed to a nonjury disposition of the bulk transfer act and renter's lien counts.
As of the date of transfer Roth owed plaintiff $10,622 (January's rent, late fees for December and maintenance charges) and could be considered a creditor entitled to a judgment against Novtex under the Bulk Sales Act for that amount. Our modification, however, of the judgment entered pursuant to the rentor's lien act, gives plaintifl a judgment against Novtex for that amount and thus renders moot the application of the Act vis-a-vis the then due rent and other charges. Although plaintiff contends that had he received notice he would have considered Roth in anticipatory breach of the lease triggering the acceleration clause rendering future rents due as of the date of transfer, (cf. Seitz v. Mark-O-Lite Sign Contractors, Inc., 210 N.J.Super. 646, 654, 510 A.2d 319 (App.Div.1986)), we view that claim as too speculative, particularly given the fact that plaintiff did not exercise the acceleration clause at any time during October, November and January when he was plainly aware of Roth's financial difficulties and plans to terminate the lease.
See Oldden v. Tonto Realty Corp., 143 F.2d 916, 918-920 (2nd Cir.1944) discussing the rationale under prior bankruptcy law for treating landlords differently from other creditors ("[i]n truth, the landlord is not in the same position as other general creditors, and there is no very compelling reason why he should be treated on a par with them. For, after all, he has been compensated up until the date of the bankruptcy petition, he regains his original assets upon bankruptcy, and the unexpired term in no way really benefits the assets of the bankrupt's estate.” 143 F.2d at 920).
In Apex, under pre-code bulk sales law the claim for future rents was viewed as a "contingent" claim not entitled to protection under the N.Y. Bulk Sales Act. This view of contingent liabilities as not entitled to protection was distinguished in Chemical Bank v. Society Brand Industries, Inc., supra, 624 F.Supp. at 981, on the basis that the Uniform Commercial Code was intended to broaden the category of creditors to include such liabilities, a view we are not entirely in accord with.
As a result of this conclusion, we need not address Novtex’s alternative contention that the transfer is exempt from the act pursuant to N.J.S.A. 12A:6-103(3) as a transfer "in settlement or realization of a lien or other security interest.” Were we to reach the issue, we would be inclined to reject it since only a portion of the proceeds from the transfer were for the satisfaction of a lien or other security interest.” See Starman v. John Wolfe, Inc., 490 S.W.2d 377, 382-83 (Mo.Ct.App.1973); River Cty. Prods. Inc. v. AEJ, Inc., 774 S.W.2d 452, 454 (Ky.Ct.App.1989).
| CASELAW |
The Reynolds Pamphlet (song)
"The Reynolds Pamphlet" is the fourteenth song from Act 2 of the musical Hamilton, based on the life of Alexander Hamilton, which premiered on Broadway in 2015. Lin-Manuel Miranda wrote both the music and lyrics to the song.
Synopsis
The song refers to a 95-page document written by Alexander Hamilton, former Secretary of the Treasury, to defend his name in the wake of a sex scandal. Hamilton does so to protect himself from a major political threat, as Thomas Jefferson, James Madison and Aaron Burr are made aware by Hamilton of his adulterous actions after they accused him of speculation and misappropriation of Treasury funds. He then publishes the document to the public, proving that he did not abuse his Cabinet position for financial gain, but had been instead victim of blackmail by James Reynolds for his one-year affair with Reynolds's wife Maria Reynolds. Jefferson celebrates the news, as Hamilton's career has been sullied, which is a boon for the Democratic-Republican Party. The document causes Angelica Schuyler to return from London to support her sister, Hamilton's wife Eliza. Hamilton turns to Angelica for support, but she angrily rebukes him. The song concludes with all of the characters expressing sympathy for Eliza.
Historical differences
Although the musical Hamilton is based on true events, Miranda does use some dramatic license in retelling the story. In the case of the song "The Reynolds Pamphlet" the main differences are:
* Jefferson, Madison and Burr did not approach Hamilton about his affair, it was James Monroe, Frederick Muhlenberg and Abraham Venable in December 1792 when Hamilton was Treasury Secretary of the first Washington administration. They confronted him on the possible charge of speculation based on the accusations of both James and Maria Reynolds. Hamilton proved he was innocent of public wrongdoing by producing the letters by both Reynoldses proving his payments were related to blackmail over his one-year adulterous affair with Maria. Monroe was a close friend of Jefferson's and shared copies of the Reynoldses' letters with him. Burr may have been aware of Hamilton's affair with Maria Reynolds since he assisted her in divorcing from James in 1793 (when Maria's affair with Hamilton was already long ended) but never mentioned anything in this respect. In the early Summer of 1797, journalist James Callender broke the story of Hamilton's alleged speculation and infidelity. Hamilton blamed Monroe, and the altercation nearly ended in a duel. With nothing left to do, on August 25, 1797 Hamilton published the Reynolds pamphlet.
* Angelica's return from London precedes the Reynolds Pamphlet. After twelve years living in Britain, Angelica and husband John Barker Church returned to New York in May 1797, whereas the documents related to the scandal were first published by Callender that summer, with Hamilton announcing the Pamphlet in late July, and subsequent publication in August.
Analysis
The song refers to the pamphlet penned by Alexander Hamilton in July 1797 (whose original title was Observations on Certain Documents), and the beginning of the song consists of Hamilton's opponents quoting from the document. The song further stands out from many others in the musical courtesy of its use of auto-tune, leading critics to consider it the most modern song on the album.
It also incorporates musical cues that point towards earlier songs in the musical, including "Satisfied".
Critical reception
The Young Folks considered the song to be the 34th best in the musical, while a community post on BuzzFeed ranked the song 20th.
Huffington Post remarked that "the mash-up of previous tunes works well" and complimented the use of auto-tune.
In popular culture
During his monologue while hosting Saturday Night Live, Lin-Manuel Miranda referenced the song.
Miranda also discussed the song and the eponymous document on an episode of Drunk History.
In the show, King George III comes on stage and mocks Hamilton with the Burr, Jefferson, Madison, and the ensemble. This since has become a popular meme with many gifs of it appearing online. | WIKI |
Talk:United States v. Karo
Untitled
http://en.wikipedia.org/wiki/Karo_v._United_States ? Ronabop (talk) 03:59, 6 March 2010 (UTC) | WIKI |
How Surveillance Could Save Lives Amid a Public Health Crisis
For each new transmission of coronavirus, imagine the “tick tick tick” of a stopwatch. At least 2 million adults in the US could require hospitalization over the course of the pandemic, the Centers for Disease Control and Prevention estimates; that’s more than double the nation’s supply of hospital beds. Curfews and social distancing will hopefully help mete out the number of infections slowly—because 2 million patients over 18 months will be more manageable than 2 million over six months. Yet all such predictions are essentially guesswork at this point. Leaders are looking for guidance on when to close schools or order residents to shelter in place, and whether the measures they’ve already taken are working. Early research on coronavirus suggests that isolating people soon after they become symptomatic plays the “largest role in determining whether an outbreak [is] controllable.” Officials have a powerful potential surveillance tool unavailable in past epidemics: smartphones. Government officials are anxious to tap the information from phones to help monitor and blunt the pandemic. White House officials are asking tech companies for more insight into our social networks and travel patterns. Facebook created a disease mapping tool that tracks the spread of disease by aggregating user travel patterns. Such efforts clash with people’s expectations of privacy. Now, there's a compelling reason to collect and share the data; surveillance may save lives. But it will be difficult to draw boundaries around what data is collected, who gets to use it, and how long the collection will continue. Read all of our coronavirus coverage here. One concern: Data collected for one purpose can later be used for another. Privacy experts say transparency is crucial if typically private information is harnessed for public health. Data used to fight Covid-19 could be reused for something else down the road. “What's really important is for the government to be really clear in articulating what specific public health goals it's seeking to accomplish,” said Kelsey Finch, senior counsel at the Future of Privacy Forum, an industry-backed group focused on tech policy. “And how it's limiting the collection of personal data to what's necessary to achieve those very specific goals, and then making sure that there are appropriate privacy safeguards put in place before data starts to change hands.” Even anonymized, aggregate data can inform health efforts. Consider a scenario where city officials close bars and restaurants for a weekend, hoping to reduce the number of new coronavirus infections. But instead, infections increase. Some may be the result of exposures days earlier, but tracking where people went over the weekend could reveal new transmission hot spots. Some lawyers and academics have suggested that public health officials tap the geofencing capability of phones, to learn who may have been near people infected with the virus. Police have relied on geofencing in investigations, using broad warrants to request information on every smartphone near a crime scene. Last May, police requested location data from every “Google account that is associated with a device” within 150 meters of a bank robbery. In theory, Google could notify users whose phones were recently near an infected person. Google didn’t respond to a request for comment. There’s already legal debate over whether such actions would overstep the Fourth Amendment’s restrictions on the government’s ability to search private property. Evan Selinger, a privacy expert and philosophy professor at the Rochester Institute of Technology, says partnerships between tech companies and government agencies could create a "Covid-19 response infrastructure" that incentivizes companies to "find creative ways to benefit from mission creep.” Some privacy scholars question whether enhanced surveillance in the name of fighting disease can be dialed back once the danger has passed. “I'm not sure that we should be making longer-term judgments, in an emergency situation, about what the right balance is right now,” said Jennifer Daskal, faculty director of the Tech, Law, and Security program at American University and a former national security official in the Department of Justice. “That often doesn't work out so well.” Pointing back to 9/11, when Congress granted immense surveillance powers to the federal government, Daskal said decisions made during emergency situations tend to lead to overreach. Another thing to remember: There were no iPhones on 9/11. Technology has progressed rapidly since then, and in some cases, has outpaced the laws meant to govern it. “One of the lessons I hope we learned from 9/11 is that new powers in an emergency situation” should come with preset expirations, she added. The rapid spread of the disease has prompted even some traditional defenders of personal privacy to acknowledge the potential benefits of digital tracking. “Public policy must reflect a balance between collective good and civil liberties in order to protect the health and safety of our society from communicable disease outbreaks,” the Electronic Frontier Foundation wrote in a blog post earlier this month. But, the group continued, any data collection “must be scientifically justified and … proportionate to the need.” Balancing privacy and the need to quickly isolate patients is only becoming more complex as companies which individually target and identify individuals are also volunteering their technology. The controversial facial recognition startup Clearview AI says it is in talks with public officials to use its software to identify anyone in contact with people who are infected. The weapons detection company Athena Security claims its AI-enabled cameras can detect the coronavirus by spotting fevers. One potentially powerful tool for public health officials is contact tracing—identifying the people that an infected person has been around. This reveals potential outbreak hot spots, offers some idea of where the virus may spread next, and importantly, warns officials who to contact next and potentially isolate if they become symptomatic. Earlier this month, the CDC issued a temporary rule requiring airlines to share data on passengers traveling from overseas on request, including addresses, phone numbers, and email. “Contact tracing is giving you an idea about how many people are being infected, along with a control strategy to stop those people that you've tracked from infecting” others, said Cameron Browne, a mathematical biologist at the University of Louisiana studying the virus’s spread in China. “You need to know where these clusters of cases are coming from and how strong the transmission is going forward. So it is both a control and a surveillance.” In epidemiology, a “control” is a means of intervention used to stop the spread of a disease. It also, necessarily, involves controlling people. Investigators in China and Singapore, for example, interviewed patients, then reviewed their credit card receipts, personal diaries, and calendars to trace where they'd traveled and with whom they had contact. In the US, however, that prospect unsettles some. “I'd love to give the federal government all the latitude that they deserve, but the reality is that [we've seen] abuse after abuse after abuse,” said Jake Williams, a cybersecurity expert and former member of the NSA’s hacking unit. “When you start adding in identifiers and email addresses, [physical] addresses, [and] other flights you’ve been on, you start to see patterns of behavior. Now, suddenly we're in a little bit different territory.” Police databases generally include only those suspected or convicted of a crime. But a disease surveillance database could include lots of people who did nothing other than sit next to an infected person on a flight. It’s deeply troubling, but could become a necessity in urgent times. “The problem is, I don't actually believe that that’s where the use of the data ends,” Williams said. “I would challenge you to find any government surveillance program, for that matter, that hasn't suffered a large number of abuses.” At a certain point, however, contact tracing becomes unviable. There can be too many contacts to follow and the path from one infected person to another becomes too muddled. More than 18,000 people in the US have tested positive. Officials in Los Angeles instructed doctors on Friday not to test symptomatic patients if the results wouldn’t change the treatment. WIRED is providing unlimited free access to stories about the coronavirus pandemic. Sign up for our Coronavirus Update to get the latest in your inbox. | NEWS-MULTISOURCE |
Indian statistics undermined by political interference, academics say
MUMBAI/NEW DELHI (Reuters) - More than 100 economists and social scientists have alleged that the Indian government is interfering with the country’s statistics-gathering agencies, putting their work “under a cloud”. A statement signed by 108 academics from India and other countries, released late on Thursday, comes weeks before an election in which the government led by Prime Minister Narendra Modi is seeking a second term. Modi’s Bharatiya Janata Party (BJP) has faced criticism from opposition parties for suppressing the release of jobs data and for having allegedly manipulated economic growth figures to show the economy having performed better under previous governments. The acting chairman and another member of the body that reviewed the jobs data resigned in January, alleging interference by other state agencies. The statement from the academics said economic statistics are vital for policy-making and it is imperative that agencies associated with their collection and dissemination are not subject to political interference and enjoy total credibility. Indian statistics and the institutions associated with them have “come under a cloud for being influenced and indeed even controlled by political considerations,” it added. The statement criticized NITI Aayog - a government think-tank - for picking what growth data sets to use last year, noting the body had “hitherto no expertise in statistical data collection.” Amitabh Kant, the CEO of the NITI Aayog, denied the criticism. “There is no question of interference” in the handling of the jobs data, he said. Rohit Azad, a professor at the Jawaharlal Nehru University in New Delhi who signed the statement, said data should be “taken in an academic spirit” and not be taken as an attack. “Whichever way the elections go, the assertions from the academic side should continue that you can’t mess with statistics,” he said. “If the data doesn’t show your government working, you don’t suppress it.” Reporting by Swati Bhat and Manoj Kumar; Editing by Richard Borsuk | NEWS-MULTISOURCE |
COMMONWEALTH v. Jose MARTINEZ.
Commonwealth v. Stephanie Green.
SJC-12479 SJC-12480
Supreme Judicial Court of Massachusetts, Middlesex..
Argued September 7, 2018 Decided October 30, 2018
Benjamin H. Keehn, Boston, Committee for Public Counsel Services (Nancy J. Caplan, Roxbury & Eric Brandt, Committee for Public Counsel Services, also present) for the defendants.
Jessica Langsam & Robert E. Toone, Assistant District Attorneys, for the Commonwealth.
Sarah M. Joss, Special Assistant Attorney General, for Massachusetts Probation Service.
Luke Ryan, Northampton, Daniel N. Marx, & William W. Fick, for Stacy Foster & others, amici curiae, submitted a brief.
Present: Gants, C.J., Lenk, Gaziano, Lowy, Budd, Cypher, & Kafker, JJ.
GANTS, C.J.
In Nelson v. Colorado, --- U.S. ----, 137 S.Ct. 1249, 1252, 197 L.Ed.2d 611 (2017), the United States Supreme Court held that "[w]hen a criminal conviction is invalidated by a reviewing court and no retrial will occur," the State is required under the due process clause of the Fourteenth Amendment to the United States Constitution "to refund fees, court costs, and restitution exacted from the defendant upon, and as a consequence of, the conviction." There can be no doubt that, because of this controlling authority, Massachusetts courts are required to order the refund of fees, court costs, and restitution paid by a defendant as a consequence of a later invalidated conviction. These two cases, however, present ten reported questions regarding the scope and application of the due process obligations established in the Nelson decision. We have reformulated the reported questions into three broader questions to provide guidance to trial courts and litigants regarding the repayment of probation fees, victim-witness assessments, restitution, fines, forfeitures, and court costs after a conviction has been invalidated.
Background. 1. Jose Martinez. In 2010, Jose Martinez pleaded guilty in District Court to three counts of possession of a controlled substance with intent to distribute and one count of unlicensed operation of a motor vehicle. On the three drug convictions, Martinez received concurrent sentences of one year in a house of correction, suspended, with two years of probation supervision. On one of his drug convictions, Martinez was also ordered to pay $1,000 in restitution to the Haverhill police department, a monthly fee of sixty-five dollars, as required under G. L. c. 276, § 87A, for those placed on supervised probation, and a victim-witness assessment of ninety dollars, as required under G. L. c. 258B, § 8, for those convicted of a felony. On his conviction for unlicensed operation of a motor vehicle, Martinez was ordered to pay a fine of one hundred dollars. After being sentenced on his drug convictions, Martinez paid a total of $2,650: $1,000 in restitution, $1,560 in monthly probation supervision fees, and a victim-witness assessment of ninety dollars.
On April 19, 2017, Martinez's drug convictions were vacated and dismissed with prejudice pursuant to the single justice's order arising from our decision in Bridgeman v. District Attorney for Suffolk Dist., 476 Mass. 298, 67 N.E.3d 673 (2017) ( Bridgeman II ), because the convictions were tainted by the misconduct of Annie Dookhan, a chemist who was employed by the William A. Hinton State Laboratory Institute when the drugs seized from Martinez were examined by that laboratory. Martinez's misdemeanor conviction of unlicensed operation of a motor vehicle was not dismissed.
After being informed that his drug convictions had been dismissed with prejudice, Martinez filed a motion for the return of his probation supervision fees, victim-witness assessment, and restitution payment. The judge, without ruling on the motion, reported the matter and seven questions of law to the Appeals Court pursuant to Mass. R. Crim. P. 34. We allowed the defendant's motion for direct appellate review.
2. Stephanie Green. On October 8, 2008, Stephanie Green was sentenced in District Court on two drug-related counts arising from a complaint that had been filed after a search warrant had been executed at her residence on August 9, 2007. Green was placed on supervised probation for two years on each count, to be served concurrently. On one of these counts, Green was assessed a probation fee of sixty-five dollars per month and a victim-witness assessment of fifty dollars. The judge at sentencing also allowed the Commonwealth's motion for the forfeiture of $1,411.63 seized from Green's home during the search.
That same day, before the same judge, Green was sentenced on four other drug-related counts arising from a complaint that had been filed after a search warrant had been executed at Green's hotel room on September 14, 2007. On counts one and two, Green was sentenced to one year in a house of correction, suspended for two years, with two years of supervised probation.
She also was ordered to pay fines totaling $4,000 and surfines totaling $1,000. On count one, Green was further ordered to pay a victim-witness assessment of fifty dollars. On count four, she was placed on probation for two years. On count seven, she was sentenced to a term of thirty days in a house of correction, to be served on weekends.
On April 19, 2017, Green's convictions were vacated and dismissed with prejudice pursuant to the single justice's order arising from Bridgeman II. Green then moved for a refund of the $8,071.63 she had paid after being sentenced on the drug convictions arising from the two complaints: $1,411.63 in forfeited cash, $1,560 in probation fees, one hundred dollars in victim-witness assessments, and $5,000 in fines and surfines. The judge, without ruling on the motion, reported the matter and three questions of law to the Appeals Court pursuant to Mass. R. Crim. P. 34. We transferred the case to this court on our own motion, and now consider the reported questions in conjunction with those reported in Martinez's case.
For the sake of providing clear and simple guidance to trial courts and litigants regarding the scope and application of the due process obligation announced in Nelson, we have exercised our authority to reformulate the reported questions into three more general questions. See Commonwealth v. Eldred, 480 Mass. 90, 93-94, 101 N.E.3d 911 (2018) (reformulating reported question to make it answerable on existing record); Tedford v. Massachusetts Hous. Fin. Agency, 390 Mass. 688, 692-693, 459 N.E.2d 780 (1984) (summarizing reported questions). See also McStowe v. Bornstein, 377 Mass. 804, 805 n.2, 388 N.E.2d 674 (1979) ("[r]eported questions need not be answered ... except to the extent that it is necessary to do so in resolving the basic issue"). The questions are:
1. What is the scope of the due process obligation to refund money paid by a defendant "upon, and as a consequence of" a conviction that has been invalidated? Nelson, 137 S.Ct. at 1252.
2. What is the procedure to be used to determine a defendant's entitlement to a refund and the amount to be refunded, and who bears the burden of proof?
3. Where a judge determines that a defendant is entitled to a refund, how will payment of the refund be accomplished?
Discussion. Before we address these questions, it is important to understand the context and reasoning of the Supreme Court's opinion in Nelson. There, two defendants were convicted of various crimes and ordered to pay court costs and fees, which went to two funds -- a "victim compensation fund" and a "victims and witnesses assistance and law enforcement fund." Nelson, 137 S.Ct. at 1253 nn.1, 2. In addition, the defendants were ordered to pay restitution to the victims of their crimes. Id. at 1253. See People v. Madden, 364 P.3d 866, 867-868 (Colo. 2015) ; People v. Nelson, 362 P.3d 1070, 1073 (Colo. 2015). All counts of their convictions were later invalidated. Nelson, supra at 1258.
The defendants then moved for the return of the court costs, fees, and restitution they had paid. Id. at 1253. The Supreme Court of Colorado held that such a refund could be ordered only with statutory authority, and that the exclusive process for exonerated defendants to seek such a refund was through the Compensation for Certain Exonerated Persons act, a Colorado law allowing defendants whose convictions had been invalidated to receive a refund of fines, penalties, costs, and restitution only after they proved their innocence by clear and convincing evidence in a separate civil proceeding. Nelson, 137 S.Ct. at 1254.
The United States Supreme Court reversed the judgment, holding that a scheme whereby "a defendant must prove [his or] her innocence by clear and convincing evidence to obtain the refund of costs, fees, and restitution paid pursuant to an invalid conviction ... does not comport with due process." Id. at 1255. The Supreme Court evaluated the defendants' due process claims under the balancing test established in Mathews v. Eldridge, 424 U.S. 319, 335, 96 S.Ct. 893, 47 L.Ed.2d 18 (1976), which requires courts to weigh (1) the private interests affected; (2) the risk that the procedures used will result in erroneous deprivation of those interests; and (3) the governmental interests. Nelson, 137 S.Ct. at 1255. The Supreme Court held that all three factors weighed "decisively" in favor of the defendants. Id.
As to the first factor in the balancing test, the Court stated that there was an "obvious interest" in a refund of money paid as a consequence of convictions that were no longer valid. Id. An overturned conviction restores the presumption of innocence, the Court said, erasing any State claim to funds paid in the form of costs, fees, or restitution. Id. at 1255-56.
As to the second factor, the Court declared that the act's requirement that defendants prove their innocence by clear and convincing evidence created a risk of erroneous deprivation of the defendants' interest in a refund of their money. Id. at 1256. Once the presumption of innocence is restored, "defendants should not be saddled with any proof burden." Id.
As to the third factor, the Court stated that Colorado had "zero claim of right" to money paid solely as a consequence of subsequently invalidated convictions. Id. at 1257.
Under the Court's holding in Nelson, id. at 1252, the State is obligated under the due process clause of the Fourteenth Amendment to refund monies where three elements are satisfied: (1) the monies were "exacted from the defendant" upon conviction and as a consequence of the conviction; (2) the amounts "exacted" were actually paid by the defendant; and (3) the conviction has been "invalidated by a reviewing court and no retrial will occur." We understand that this third element is met where, for example, the conviction was vacated, whether by an appellate court or a trial court, and the indictment or count was subsequently dismissed with prejudice or nol prossed by the prosecutor, or was retried and resulted in an acquittal. In addition, "[t]o comport with due process, a State may not impose anything more than minimal procedures on the refund of exactions dependent upon a conviction subsequently invalidated." Id. at 1258. Because the refund obligation is constitutional, it applies even where there is no statutory authority for the refund of fines, fees, court costs, or restitution to a defendant whose conviction was invalidated. Cf. Commonwealth v. Martin, 476 Mass. 72, 79, 63 N.E.3d 1107 (2016). The overriding principle is that where a defendant has been ordered to make a payment because of a conviction, the invalidation of that conviction erases the State's claim to that payment, and any amount paid must be restored to the defendant as a matter of due process. Although the Supreme Court speaks only of a "conviction," we understand a "conviction" in light of this due process principle to include continuances without a finding and juvenile adjudications. Cf. Committee for Pub. Counsel Servs. v. Attorney Gen., 480 Mass. 700, 734-735 (2018) (defining class of "Farak defendants" to include defendants who pleaded guilty to drug charge, admitted to sufficient facts to warrant finding of guilty on drug charge, or were found guilty of drug charge at trial); Bridgeman II, 476 Mass. at 306, 67 N.E.3d 673 (providing comparable definition for "relevant Dookhan defendants").
We now address each of the reformulated reported questions.
1. What is the scope of the due process obligation to refund money paid by a defendant "upon, and as a consequence of" a conviction that has been invalidated? a. Probation fees. Where a judge sentences a defendant to probation on a single conviction, monthly probation fees ordered under G. L. c. 276, § 87A, are paid by the defendant as a direct consequence of that conviction. Therefore, any amount paid by the defendant is "taken from [him or] her solely on the basis of a conviction," Nelson, 137 S.Ct. at 1257, and must be returned in full once the conviction is invalidated and it is determined that the case will not or cannot be retried. Id. at 1252.
Where a judge, however, sentences a defendant to a concurrent term of probation on multiple convictions, the probation fees must be refunded to the defendant only where they were paid solely because of an invalidated conviction. Where the defendant was sentenced to a concurrent term of probation on a conviction that remains valid, due process does not require that the probation fees paid during that concurrent term be refunded, because the obligation to pay monthly probation fees associated with a valid conviction is unaffected by the subsequent invalidation of a different conviction. For example, if a defendant were convicted of a drug count and a firearms count and sentenced to two years of supervised probation on the drug count and one year of supervised probation on the firearms count, to be served concurrently, subsequent invalidation of the drug conviction would have no impact on the defendant's obligation to pay probation fees in the first year on the firearms conviction. Because the defendant is entitled to a refund of only those fees paid as a direct consequence of the invalidated drug conviction, he or she would receive a refund of probation fees paid during the second but not the first year of probation. Due process requires the refund of fees paid for an invalidated conviction, but it does not require that a defendant be placed in a better position because of an invalidated conviction than the defendant would have been in had he or she been sentenced on only the surviving convictions.
Here, all of the counts for which both defendants were sentenced to probation have been invalidated. As a result, all paid probation fees must be refunded because they were paid solely as a consequence of those invalidated convictions.
b. Victim-witness assessments. As with probation fees, where a defendant is sentenced on a single conviction, the victim-witness assessment ordered under G. L. c. 258B, § 8, is exacted from the defendant solely as a consequence of that conviction. Any amount paid must therefore be returned where the conviction is invalidated and it is determined that the case will not or cannot be retried. But where a defendant is sentenced on multiple indictments or counts of a complaint, due process does not require the refund of a victim-witness assessment imposed on an invalidated conviction where a surviving conviction also would have required the imposition of a victim-witness assessment under G. L. c. 258B, § 8.
As applied here, all of Green's convictions have been invalidated, so she is entitled to a refund of the victim-witness assessments paid as a consequence of those convictions.
In contrast, Martinez's drug convictions were invalidated, but his conviction of unlicensed operation of a motor vehicle was not.
Had Martinez been convicted of only the latter, a misdemeanor, the judge would have been required to impose a victim-witness assessment of fifty dollars. See G. L. c. 258B, § 8. Presumably, this assessment was not ordered at sentencing only because the defendant had already been ordered to pay a victim-witness assessment of ninety dollars on one of his felony drug convictions. Martinez is therefore entitled to a refund in the amount of forty dollars, the difference between the amount he paid (ninety dollars) and the amount he would have paid if not for the invalidated felony convictions (fifty dollars). A full refund of the ninety dollars would place the defendant in a better position than he would have been in had he originally been convicted of only the surviving count.
c. Restitution. Due process requires the refund of restitution paid as a consequence of an invalidated conviction, see Nelson, 137 S.Ct. at 1252, but the refund of restitution poses two complex issues that generally do not arise with the refund of fees.
First, fees are generally paid solely as a consequence of a conviction and present no opportunity to obtain a civil judgment for their award. But restitution may be ordered as a special condition of probation in a criminal sentence, see Commonwealth v. Henry, 475 Mass. 117, 120, 55 N.E.3d 943 (2016), or obtained by the victim through an execution on a separate civil judgment, see id. at 122 n.5, 55 N.E.3d 943 ; Mass. R. Civ. P. 69, 365 Mass. 836 (1974).
The Supreme Court noted in Nelson, 137 S.Ct. at 1253 n.3, that "[u]nder Colorado law, a restitution order tied to a criminal conviction is rendered as a separate civil judgment," and that, "[i]f the conviction is reversed, any restitution order dependent on that conviction is simultaneously vacated." See People v. Scearce, 87 P.3d 228, 234-235 (Colo. App. 2003). In contrast, under Massachusetts law, there is no statutory authority that permits a restitution order issued by a judge in a criminal case to be enforced through a separate civil judgment; a victim seeking a civil judgment against the defendant must initiate a separate civil action for restitution damages. See Henry, 475 Mass. at 121, 123, 55 N.E.3d 943 (restitution may be ordered in criminal case only as condition of probation, and probation is not "a civil program or sanction" [citation omitted] ); id. at 122 n.5, 55 N.E.3d 943 (victims may collect on civil judgments for restitution through civil executions). See also G. L. c. 258B, § 3 (u ). And, once a victim obtains such a civil judgment, the invalidation of the criminal conviction does not automatically result in the civil judgment being vacated. Instead, a defendant seeking to vacate a civil judgment in light of an invalidated criminal conviction must move separately for relief from that judgment under Mass. R. Civ. P. 60 (b), 365 Mass. 828 (1974), which allows for relief in circumstances where "a prior judgment upon which [an order] is based has been reversed or otherwise vacated."
Where a defendant moves for such relief, the motion judge must determine whether the civil judgment can stand despite the invalidation of the criminal conviction. In contrast with a criminal conviction, which requires proof beyond a reasonable doubt, a civil judgment requires proof only by a preponderance of the evidence, see Baker v. Parsons, 434 Mass. 543, 554 n.18, 750 N.E.2d 953 (2001), and that proof may be obtained through evidence separate and apart from the fact of conviction. In fact, under Massachusetts law, a civil judgment may be obtained through collateral estoppel (also known as issue preclusion) based on a criminal conviction only where the defendant has been found guilty at trial; admissions made by a defendant during a guilty plea colloquy do not trigger collateral estoppel, although they may be admitted in evidence in the civil case. Aetna Cas. & Sur. Co. v. Niziolek, 395 Mass. 737, 742, 748-750, 481 N.E.2d 1356 (1985). See also Metropolitan Prop. & Cas. Ins. Co. v. Morrison, 460 Mass. 352, 364, 951 N.E.2d 662 (2011) (where "a criminal conviction follows a guilty plea, the plea may be offered as evidence of a defendant's guilt in subsequent civil litigation but it is not given preclusive effect.").
In Nelson, 137 S.Ct. at 1252, 1253 n.3, the Supreme Court held that the defendants were entitled to a refund of restitution that had been the subject of civil judgments associated with criminal convictions. Under Colorado law, the Court said, such civil judgments are "simultaneously vacated" when the underlying convictions are reversed. Id. at 1253 n.3. Because Martinez's restitution order was not tied to a civil judgment, we need not address here whether due process requires the refund of restitution related to an invalidated conviction where there is a surviving civil judgment. Moreover, the issue has been rendered moot by the refund of his restitution payment.
Second, in contrast with fees, which in Massachusetts are paid to the Commonwealth, see G. L. c. 29A, § 3, restitution is paid to the victims of crimes, who are often individuals or private entities. The Supreme Court in Nelson, 137 S.Ct. at 1252, concluded that the State is obliged to refund restitution exacted from the defendant as a consequence of his or her invalidated conviction. But the Court also appeared to assume that the restitution was paid to the State, and not to a private victim. See id. at 1255 (defendants "have an obvious interest in regaining the money they paid to Colorado"); id. at 1256 ("Colorado may not retain funds taken from [the defendants] solely because of their now-invalidated convictions"); id. at 1257 (defendants "seek restoration of funds they paid to the State"). This assumption might have been unwarranted because in Colorado, where "the obligation to pay restitution is included in the defendant's sentence, restitution results in a final civil judgment against the defendant in favor of the State and the victim." Id. at 1262 (Alito, J., concurring in the judgment), citing Colo. Rev. Stat. § 18-1.3-603(4)(a)(I) (2016). In fact, the restitution paid by both Nelson defendants was used to pay for mental health therapy and counselling for the victim children. See Madden, 364 P.3d at 867-68 (defendant was ordered to pay $910 in restitution to victim and actually paid $757.75, which went to counselling services); Nelson, 362 P.3d at 1071 & n.1 (defendant was ordered to pay $7,845 to victims as restitution and actually paid $414.60).
Because the restitution here was paid to the Haverhill police department and has been repaid, we need not decide whether Nelson requires the Commonwealth to refund restitution paid by a defendant as a consequence of an invalidated conviction where the restitution was paid not to the Commonwealth, but to a private victim. We certainly expect the Commonwealth and any other governmental entity to refund restitution paid to it as a consequence of a conviction where the conviction is later invalidated. But we recognize that it is another matter to order the Commonwealth to repay a defendant for restitution that the Commonwealth never received because that restitution was paid to a private victim. We also recognize the challenges involved if a court were to order private victims to repay restitution that had perhaps been received by them years earlier. A victim is not a party to a criminal proceeding and, if faced with the prospect of having to repay restitution, might wish to initiate a civil proceeding against the defendant to obtain a civil judgment for that restitution amount. Does a judge postpone the order of refund to give the victim a reasonable opportunity to pursue that remedy?
And what happens if the victim no longer has the ability to repay the restitution amount, or is financially able but unwilling to repay? We need not address these issues because they are not presented in these cases, but it may not be long before we confront a case that demands their resolution.
d. Fines. Green seeks a refund of the $5,000 in fines and surfines paid as part of her sentence on two invalidated drug convictions. Although the refund of fines was not at issue in Nelson, Green claims that she is entitled to a refund under the due process principles established in Nelson because her drug convictions have been invalidated and the fines were exacted from her upon and as a consequence of those convictions. We agree that there is no reason to exclude fines and surfines from the category of payments that must be refunded to a defendant as a matter of due process where the defendant was ordered to pay those fines and surfines solely as a consequence of a subsequently invalidated conviction. See Commonwealth v. Accime, 476 Mass. 469, 477 & n.13, 68 N.E.3d 1153 (2017) (where conviction is vacated, "defendant may be entitled to a refund of any fine he may have paid"). Green is therefore entitled to a refund of fines and surfines totaling $5,000.
e. Forfeiture. Green also seeks a refund of $1,411.63, the amount of money seized from her home during the execution of the search warrant and ordered forfeited at her plea hearing. Although forfeiture was not at issue in Nelson and was not mentioned in the opinion, Green claims that she is entitled to a refund of the forfeited funds under the due process principles established in Nelson.
We conclude that Green is not entitled to return of the forfeited funds because forfeiture, even where ordered at a plea hearing, "is outside the scope of the criminal matter and constitutes a civil proceeding." Commonwealth v. Brown, 426 Mass. 475, 480, 688 N.E.2d 1356 (1998). The forfeiture of property is authorized by G. L. c. 94C, § 47, which sets forth two methods by which forfeiture proceedings may be initiated by the Commonwealth: either by petition in the nature of a proceeding in rem filed in the Superior Court under § 47 (d ), or by motion filed in a related criminal proceeding under § 47 (b ). See Brown, supra. Regardless of which type of proceeding is chosen by the Commonwealth, the burden of proof remains the same: "the [C]ommonwealth shall have the burden of proving to the court the existence of probable cause to institute the [forfeiture] action, and [the] claimant shall then have the burden of proving that the property is not forfeitable." Id. at 477 & n.3, 688 N.E.2d 1356, quoting G. L. c. 94C, § 47 (d ).
Here, the Commonwealth sought the forfeiture of the $1,411.63 seized from Green's home under § 47 (b ) by a motion in the criminal proceeding. Under such circumstances, probable cause for the forfeiture may be shown from the same facts the prosecutor presented as the factual basis for the defendant's guilty plea. See id. at 477-478, 688 N.E.2d 1356. The Commonwealth satisfies its initial burden, and thus shifts the burden of proof to the defendant, by showing that "the Commonwealth had reliable information in its possession that established probable cause" to believe that "the property at issue derived from illegal narcotics or facilitated a violation of the controlled substances laws." Commonwealth v. One 2004 Audi Sedan Auto., 456 Mass. 34, 38-39, 921 N.E.2d 85 (2010). The Commonwealth may make this showing of nexus even where it lacks a sufficient factual basis to support a finding of guilt, or where a defendant is found not guilty at trial, or where the Commonwealth later dismisses or nol prosses the criminal complaint or indictment. See Commonwealth v. Fourteen Thousand Two Hundred Dollars, 421 Mass. 1, 9, 653 N.E.2d 153 (1995) ; Commonwealth v. One 1986 Volkswagen GTI Auto., 417 Mass. 369, 370 n.2, 630 N.E.2d 270 (1994).
Green contends that the forfeiture order, for all practical purposes, was a consequence of the invalidated drug convictions and should therefore be invalidated along with the convictions. But the motion for forfeiture of Green's money under § 47 (b ), as a matter of law, initiated a separate civil proceeding that was adjudicated at the same time as the criminal proceeding. See Brown, 426 Mass. at 480, 688 N.E.2d 1356. The finding of probable cause of nexus that sufficed to order forfeiture in the civil proceeding did not depend on the finding in the criminal proceeding of sufficient evidence to warrant a finding of guilt on the plea. See Fourteen Thousand Two Hundred Dollars, 421 Mass. at 9, 653 N.E.2d 153. The forfeiture judgment therefore was not solely a consequence of the invalidated drug convictions, and need not be vacated because of their invalidation. To be sure, the reasons for invalidating a conviction potentially may warrant relief from the civil judgment of forfeiture, but that issue must be separately litigated in the civil forfeiture proceeding through a motion for relief from judgment under Mass. R. Civ. P. 60 (b). A defendant is not entitled to such relief solely because the criminal convictions that were related to the forfeiture were invalidated. Green, therefore, is not entitled as a matter of due process to a refund of the $1,411.63 taken in forfeiture solely because her drug convictions were invalidated.
f. Court costs. Although court costs were not imposed in these cases, we address the issue because their refund is specifically required under Nelson, 137 S.Ct. at 1252. In Massachusetts, "[c]osts shall not be imposed by a justice as a penalty for a crime." G. L. c. 280, § 6. Because Nelson, 137 S.Ct. at 1252, requires the refund of only those costs exacted from the defendant "upon, and as a consequence of, the conviction," and because § 6 prohibits court costs from being ordered as a consequence of conviction, the due process obligation set forth in the Nelson decision should not affect court costs assessed in Massachusetts. The due process obligation to refund would apply to court costs only where, in apparent violation of § 6, a defendant was ordered to pay court costs as a consequence of a conviction that was later invalidated.
We recognize that the exactions discussed above are not the only ones that can issue as the result of a conviction. See, e.g., G. L. c. 90, § 24 (assessments and fees in cases of operating motor vehicle while under influence); G. L. c. 258B, § 8 (domestic violence prevention assessments); G. L. c. 280, § 6B (drug analysis fees). Because questions regarding other fines and fees are not presented in these two cases and were not at issue in Nelson, we do not address them here.
2. What is the procedure to be used to determine a defendant's entitlement to a refund and the amount to be refunded, and who bears the burden of proof? Whether a defendant has been ordered to pay fees, court costs, restitution, or fines as a consequence of an invalidated conviction is a question whose answer should be found in the case docket. But it is often difficult and potentially time-consuming to determine whether those exactions have actually been paid by the defendant -- that information might not be in the docket, especially in older cases, and might require review of the case file or the probation file. It might be similarly challenging to determine whether a defendant with an invalidated conviction has surviving convictions that require the court to reassign money paid to those convictions rather than to refund it. Therefore, the allocation of the burdens of production and proof matters a great deal in determining whether defendants whose convictions have been invalidated will be able to successfully establish their entitlement to a refund of amounts paid.
The Supreme Court in Nelson, 137 S.Ct. at 1258, held that "[t]o comport with due process, a State may not impose anything more than minimal procedures on the refund of exactions dependent upon a conviction subsequently invalidated." Although the Court clearly stated that requiring a defendant to prove his or her innocence to obtain a refund violates due process, id. at 1256, the Court did not provide any further guidance as to what was meant by "no more than minimal procedures." Id. at 1258.
We now outline the procedure to be followed in cases where the defendant applies for a refund of monies paid as a direct consequence of a conviction that has been invalidated. We set forth this procedural guidance under the due process protections implicit in art. 12 of the Massachusetts Declaration of Rights. We are confident that the procedural guidance we provide satisfies the due process clause of the Fourteenth Amendment, but we rely on art. 12 to ensure that this process is followed in Massachusetts courts even if the Supreme Court were to declare that procedures that place greater demands or obligations on defendants seeking refunds are acceptable under the Fourteenth Amendment.
First, a defendant seeking a refund must file a motion for refund in the court where he or she was convicted and mail to or otherwise serve this motion on the office that prosecuted the conviction, that is, the office of the Attorney General or the district attorney's office. The motion may be filed by the defendant or by defense counsel. If the defendant is filing the motion pro se but was represented by an attorney in the underlying criminal case, a copy of the motion should be sent to the defense attorney. The defendant must swear or attest that the information provided in support of the motion is true, based on personal knowledge or information and belief. This may be accomplished by submitting a verified motion, that is, a motion where the information contained within is sworn or attested, or by submitting with the motion an affidavit in the form of a sworn or attested statement, letter, or application. This verified motion or accompanying affidavit must clearly state (1) that the defendant's conviction is no longer valid and is not subject to retrial; (2) that the requested refund consists of fines, fees, costs, or restitution assessed solely as a result of the invalidated conviction; (3) the amount of the requested refund; and (4) that the defendant has paid the requested amount.
The sworn or attested application alone is sufficient to satisfy the defendant's burden of production. But, if possible, the defendant should identify any docket entries reflecting his or her payment of monies, and supplement his or her application with any other existing evidence (e.g., receipts or payment documents) that the defendant reasonably can locate that tend to support the refund claim.
Once the defendant has met his or her burden of production, the burden of proof shifts to the Commonwealth. At this point, the Commonwealth may rebut the defendant's claims by producing evidence that the defendant is not entitled to a refund or is entitled to a refund in an amount that differs from what he or she requested. The Commonwealth, like the defendant, may present evidence in the form of docket entries, receipts, and anything else relevant to determine whether the defendant actually paid the amount claimed.
We place the burden of proof on the Commonwealth rather than the defendant because doing so comports most closely with the spirit of the Supreme Court's admonition to impose nothing "more than minimal procedures on the refund of exactions" arising from invalidated convictions. Nelson, 137 S.Ct. at 1258. The defendants who file such motions will often be representing themselves, at least initially, and their invalidated convictions may be many years old, as with Martinez and Green. Although criminal files are public records and defendants may gain access to them, they are more easily accessible to prosecutors who are in the court house of conviction every day. Prosecutors also will generally be better able than defendants to understand docket notations that, especially in older cases, often are handwritten and too often are something less than a model of clarity. Moreover, records of payment may sometimes be found in places other than the court file, such as in probation files or clerk's office files. Prosecutors are better positioned than defendants to know where to find these records and to obtain the cooperation needed to search them.
Where the refund or its amount is disputed, the court shall consider the evidence offered by both parties and determine whether the Commonwealth has met its burden to show, by a preponderance of the evidence, that the defendant is not entitled to the refund amount requested in his or her motion. The court, in its discretion, may conduct an evidentiary hearing to resolve such disputes. If the court finds that a refund in any amount is proper, it shall issue a refund order pursuant to the procedure described infra.
3. Where a judge determines that a defendant is entitled to a refund, how will payment of the refund be accomplished? Under G. L. c. 258B, § 8, where a conviction or delinquency adjudication is "overturned on appeal," the victim-witness assessment paid by the defendant or juvenile "shall be refunded by the court" by deducting the funds "from the assessments transmitted to the state treasurer." Green contends that this protocol should govern not only the refund of victim-witness assessments in cases where the conviction or adjudication is overturned on appeal, but the refund of all fines, fees, and court costs required as a matter of due process. This protocol is certainly consistent with the Supreme Court's holding in Nelson, but there are practical problems with adopting it beyond the statutory mandate.
Fines, fees, victim-witness assessments, and court costs are collected by the trial court or the probation service but are not retained by them. All such funds are paid to the Commonwealth and, with some exceptions, are deposited into the general fund. See G. L. c. 29A, § 3 ("All fees, fines, forfeitures, penalties and any other receipts or income of any kind paid to or received by any of the courts ... shall be paid into the general fund of the [C]ommonwealth except as otherwise specifically provided by law.").
General Laws c. 258B, § 8, provides that all victim-witness "assessments ... shall be transmitted monthly to the state treasurer." However, the probation service reports that this transfer of funds now happens daily. Therefore, the ability of the courts to refund fines, fees, and court costs by deducting funds "from the assessments transmitted to the state treasurer" is quite limited.
But the basic elements of this protocol still apply. It continues to be the responsibility of the courts to order the refund of fines, fees, and court costs where due process so requires. And the source of payment for such refunds continues to be the Commonwealth, generally its general fund. We will not attempt to specify the means by which such payment is accomplished; it suffices to say that the court must order the refund and the Commonwealth must timely comply with that order by providing the defendant or juvenile with the money to which he or she is entitled.
The refund of restitution, however, requires a different protocol because restitution payments are made to the victim of the defendant's crimes, not to the Commonwealth. In contrast with refunds of fines, fees, victim-witness assessments, and court costs, where the Commonwealth is returning funds to which it is no longer entitled, the Commonwealth was never entitled to payments issued as restitution to private victims. Where the Commonwealth, or any other governmental entity, was itself the victim of a crime and received restitution, a judge may order the Commonwealth or the governmental entity to refund the amount paid, and we expect that order to be honored. But we do not address how a court may accomplish the refund of restitution paid to a private person or entity. We will await an appeal of a case where restitution was paid to a private victim as a consequence of an invalidated conviction to decide that difficult issue.
4. The exercise of our superintendence authority. The recognition in Nelson of a constitutional due process obligation to refund fees, court costs, and restitution paid as a consequence of an invalidated conviction comes at a challenging time for the Commonwealth. Drug convictions in more than 21,000 cases have been invalidated as a result of the misconduct of Annie Dookhan at the Hinton laboratory, and drug convictions in thousands of other cases have been invalidated as a result of the misconduct of Sonja Farak at the Amherst laboratory, with even more to be invalidated as a result of our opinion in Committee for Pub. Counsel Servs. v. Attorney Gen., 480 Mass. 700, 729, 735 (2018).
The procedure we establish here for the refund of fines and fees in individual cases is practicable in ordinary times, but we recognize that it would quickly prove impracticable if a sizeable percentage of the defendants whose convictions have been invalidated because of Dookhan and Farak's misconduct were to seek the refunds they are due. If that were to happen, the amount of time and effort required from judges, clerks, probation officers, prosecutors, and defense counsel to adjudicate each individual defendant's entitlement to a refund, and the amount of such a refund, would pose so substantial a collective burden that it would threaten the administration of criminal justice in our courts.
In Bridgeman II, 476 Mass. at 300, 67 N.E.3d 673, we exercised our superintendence authority under G. L. c. 211, § 3, to fashion a remedy for the resolution of thousands of drug cases affected by Dookhan's misconduct through a "new protocol for case-by-case adjudication" that occurred in three phases and was implemented by the single justice in the form of a declaratory judgment. In Committee for Pub. Counsel Servs. v. Attorney Gen., 480 Mass. at 705, 735, we fashioned a more global remedy under our superintendence authority to resolve thousands of drug cases affected by Farak's misconduct and by the subsequent prosecutorial misconduct of two attorneys in the office of the Attorney General: we vacated the drug convictions of the so-called Farak defendants and dismissed the drug charges against them with prejudice.
We have given careful consideration to whether we need to exercise our superintendence authority to craft another global remedy addressing the many thousands of " Nelson" refund motions that may be brought by the so-called Dookhan and Farak defendants. The parties at oral argument, however, have asked us to refrain from doing so pending the anticipated settlement of a putative class action brought in the United States District Court for the District of Massachusetts that seeks, among other things, the refund of fines, fees, court costs, and restitution paid as a result of invalidated drug convictions by the putative class of Dookhan and Farak defendants. Foster vs. Commonwealth of Mass., U.S. Dist. Ct., Civ. No. 18-10354-IT (D. Mass., filed Feb. 23, 2018, amended Sept. 6, 2018).
We will defer, for now, to allow time for a global remedy to be crafted and for a settlement to be reached by the parties to that litigation. But we might not be able to defer for long because we recognize the possibility that the issuance of this opinion may unleash a flood of "Nelson" motions for the refund of monies paid by Dookhan and Farak defendants. Such an influx of motions might so burden our criminal courts as to imperil the "proper and efficient administration" of justice. See G. L. c. 211, § 3. We therefore direct the Attorney General and the Committee for Public Counsel Services, no later than six months after the issuance of the opinion in this case, to report in writing to the single justice responsible for the implementation of the protocols established in Bridgeman II and Committee for Pub. Counsel Servs. v. Attorney Gen. regarding the status of the putative class action litigation. Nothing bars this court from exercising our superintendence authority before that date if deemed necessary to preserve the fair administration of justice.
Conclusion. We remand the cases to the reporting courts for proceedings consistent with this opinion.
So ordered.
We acknowledge the amicus briefs submitted by Stacy Foster, Jamie Kimball, Jonathan Riley, Nicole Westcott, and a proposed class of all others similarly situated.
The record does not reflect the basis for the order of restitution. Generally, judges may order defendants to pay restitution only to the victims of their crimes and only to reimburse them for "economic losses caused by the defendant's conduct and documented by the victim." Commonwealth v. Henry, 475 Mass. 117, 120, 55 N.E.3d 943 (2016), quoting Commonwealth v. McIntyre, 436 Mass. 829, 834, 767 N.E.2d 578 (2002). See also G. L. c. 258B, § 3 (o ) (victims have right "to request that restitution be an element of the final disposition of a case").
The monthly fee for those placed on supervised probation is comprised of two components: a "probation supervision fee" in the amount of sixty dollars per month and a "victim services surcharge" in the amount of five dollars per month. See G. L. c. 276, § 87A. For the sake of convenience, we treat these two components as a single monthly probation fee of sixty-five dollars.
Martinez also was ordered to forfeit any monies found on his person at the time of his arrest, but the record does not reflect the amount of any such monies and Martinez has not sought their refund.
The reported questions are:
(1) "Does the refund language in G. L. c. 258B, § 8 apply to convictions vacated pursuant to the global Dookhan order? If the statute does apply, what is the showing a defendant must make to be entitled to a refund of a victim witness fee imposed pursuant to G. L. c. 258B, § 8, and, if a defendant makes such a showing, from what source should this payment be refunded?"
(2) "If G. L. c. 258B, § 8 does not apply in these circumstances, is refund of a victim witness fee required pursuant to Nelson v. Colorado, --- U.S. ----, 137 S.Ct. 1249, 197 L.Ed.2d 611 (2017) ? If Nelson does require refunding victim witness fees, what is the showing a defendant must make to be entitled to a refund of such fees, and from what source should this payment be refunded?"
(3) "If a refund is required either pursuant to the statute or pursuant to Nelson, can the court limit the refund to $40 by redistributing $50 of the victim witness fee to the surviving judgment on the misdemeanor offense of unlicensed operation in violation of G. L. c. 90, § 10 ? G. L. c. 258B, § 8 ($90 victim witness assessment for felonies; $50 victim witness assessment for misdemeanors); Commonwealth v. Zawatsky, 41 Mass. App. Ct. 392, 401, 670 N.E.2d 969 (1996) (remanding to discretion of trial judge whether $600 of victim witness assessment lost in connection with the vacated civil rights counts should be distributed among the surviving judgments of conviction)."
(4) "Does Nelson... require refunding payments assessed pursuant to G. L. c. 276, § 87A ? If so, what is the showing a defendant must make to be entitled to a refund of such payments, and from what source should this payment be refunded?"
(5) "What verification is needed to determine the amount to be refunded?"
(6) "Does Nelson... require refunding restitution? If so, what is the showing a defendant must make to be entitled to a refund of this payment, and from what source should restitution payments be refunded?"
(7) "What verification is needed to determine the amount to be refunded?"
We note that the judge ordered Green to pay a victim-witness assessment of fifty dollars on the count in the complaint charging possession of a class B substance with intent to distribute, in violation of G. L. c. 94C, § 32A (a ), but a different judge ordered Martinez to pay a victim-witness assessment of ninety dollars on a count charging possession of a class A substance with intent to distribute, in violation of G. L. c. 94C, § 32 (a ). Both are felonies within the jurisdiction of the District Court, see G. L. c. 218, § 26, although a defendant whose case is adjudicated in District Court may not be sentenced to State prison. See G. L. c. 218, § 27. Under G. L. c. 258B, § 8, where a defendant is convicted of a felony, a judge "shall impose an assessment of no less than $90"; where a defendant is convicted of a misdemeanor, a judge "shall impose an assessment of $50." We do not address the differences in these cases in the application of G. L. c. 258B, § 8.
On December 3, 2008, the Commonwealth commenced a civil action in Superior Court seeking forfeiture of the items seized in the execution of the hotel room search warrant: $8,214 in cash, three cellular telephones, and a laptop computer. Judgment issued on July 22, 2009, ordering the forfeiture of these items to the Commonwealth. Green has not sought the return of these items.
The judge was aware that questions had earlier been reported in Martinez's case, and supplemented those questions with reported questions addressing additional issues raised in Green's case "as to the procedure to be followed for return of punitive fines imposed and what, if any, obligation the Commonwealth has to return money ordered forfeited." The reported questions are:
(1) "Who is the proper party to be named in a defendant's motion to return money assessments that are dependent on a conviction that was subsequently invalidated? Is designation of the proper party dependent on the type of monetary assessment sought to be refunded? In what [c]ourt should such a motion be filed, and what, if any, entities other than the District Attorney's office should receive notice of such a motion?"
(2) "What is the showing a defendant must make to be entitled to a refund of punitive fines imposed upon a conviction that has subsequently been invalidated, and from what source should punitive fines be refunded?"
(3) "Does Nelson... require refunding money that was ordered forfeited by the criminal court pursuant to G. L. c. 94C, § 47 (b ), where the conviction in the related criminal proceeding is subsequently invalidated and no retrial will occur? If so, what is the showing a defendant must make to be entitled to a refund of such forfeited moneys, and from what source would such a refund be paid?"
One defendant's conviction was reversed on appeal for trial error, and she was acquitted of all charges on retrial. Nelson, 137 S.Ct. at 1253. The other defendant's conviction on one count was reversed on appeal, and his conviction on the other count was vacated on collateral review. Id. The State chose not to appeal or to retry the case. Id.
A criminal conviction requires proof beyond a reasonable doubt, but restitution may be awarded as a condition of probation where the victim's economic loss is proved by a preponderance of the evidence. McIntyre, 436 Mass. at 834, 767 N.E.2d 578.
As noted earlier, see note 7, supra, the Commonwealth obtained the forfeiture of the monies, cellular telephones, and laptop computer seized from Green's hotel room through a proceeding in rem filed in the Superior Court under § 47 (d ), and Green does not seek the refund of that forfeited property.
General Laws c. 280, § 6, also provides:
"A justice may, as a condition of the dismissal or placing on file of a complaint or indictment, or as a term of probation, order the defendant to pay the reasonable and actual expenses of the prosecution. A justice may impose reasonable costs as a result of a default by a criminal defendant that was intentional or negligent and without good cause."
We urge the Trial Court to prepare a simple, plain language "Motion for Refund after Invalidated Conviction" form that would simplify the process of applying for a refund by defendants who may not have the benefit of counsel when they file such an application.
See, e.g., G. L. c. 258B, § 8 (domestic violence prevention assessment deposited into fund for domestic and sexual violence prevention and victim assistance); G. L. c. 90, § 24 (1) (a )(1) (operating motor vehicle while under influence victim assessment given in part to trust fund for victims of drunk driving; operating motor vehicle while under influence head injury assessment deposited in part into trust fund for head injury treatment services).
| CASELAW |
Page:Emanuel Swedenborg, Scientist and Mystic.djvu/354
OHAN CHRISTIAN CUNO (born in Berlin) also kept a diary—of four thousand folio pages, bound in four volumes in morocco. Otherwise the manuscript would scarcely have been sold to a dealer in second-hand books and eventually found its way to a learned Brussels librarian in the middle of the nineteenth century.1 Cuno's life, though it had vivid ups and downs, since he began as a soldier and ended as a merchant and banker, would not have concerned very many people except that late in 1768 he met Emanuel Swedenborg and put that in his diary too.
Cuno was interested in theology and he had read Conjugial Love, which caused in him "an irresistible curiosity to make the acquaintance of the author." He confessed that the title of the book made him think the author was insane, as did the claims of the latter to have been in the other world, but "occasionally I found him uttering such thoughtful things, as I had never before heard from academical desks and pulpits, and which never before had entered my thoughts." Therefore he looked for the author and decided to give an account in his diary "of the most singular saint who has ever lived, Mr. Emanuel Swedenborg."
Cuno did not rush to know Swedenborg, however, before he had inquired "most particularly" about his character from the Swedish merchants in Amsterdam, especially from the highly respected Joachim Wretman, with whom Swedenborg dined nearly every Sunday. As the result was most favorable to Swedenborg, Cuno called on him, having first met him in a French bookshop in Amsterdam. In Swedenborg's two comfortable rooms, Cuno almost at once asked him if he had no valet to wait on him in his old age and to accompany him on his travels. "He answered that he needed no one to look after him, because his angel was ever with him . . ."
Cuno comments, "If another man had uttered these words he would have made me laugh; but I never thought of laughing when this venerable man, eighty-one years old, told me this; he looked | WIKI |
Page:United States Statutes at Large Volume 122.djvu/4032
12 2 STA T .40 0 9PUBLIC LA W 110 –36 0 —O CT. 8, 2008 LEGIS L AT I V E H IST ORY— H . R. 50 5 7: HO U SE RE P ORTS: No . 1 10 – 757 (C o m m.o ntheJudic i ary) . CONGRESSIONAL RECOR D, Vo l .15 4 ( 2 00 8 ): July 14, con s idered and p assed House. Sept. 25, considered and passed Senate, amended. Sept. 27, House concurred in Senate amendment. SEC.4 .SE XUAL ASSAUL TFOR E N S I C EXA MG RANTS. Section304( c ) o f t h e DNA Se xual A s sault J ustice Act of 2 004 (42 U. S. C . 1 413 6 a(c)) is a m en d ed by st r i k in g‘ ‘200 5 through 200 9’ ’ and inserting ‘‘2009 through 2014’’. A p pro v ed O ctober 8, 2008.
� | WIKI |
1980–81 Liga Bet
The 1980–81 Liga Bet season saw Hapoel Migdal HaEmek, Beitar Haifa, Hapoel Azor and Hapoel Yeruham win their regional divisions and promoted to Liga Alef.
At the bottom, Hapoel Kfar Kama, Beitar Kiryat Shmona (from North A division), Hapoel Kiryat Yam, Beitar Binyamina (from North B division), Maccabi Ramla, Beitar Herzliya (from South A division), Maccabi Shikun HaMizrah and Beitar Ashdod (from South B division) were all automatically relegated to Liga Gimel. | WIKI |
Sometimes, to whip your body into shape, you have to get a little nutty. While nuts are high in fat, it’s that very fat that makes them such powerful weapons in the war against a ballooning belly. In fact, a study published in Diabetes Care revealed that study participants who consumed a diet rich in monounsaturated fats, like those in nuts, over a 28-day period gained less belly fat than their saturated fat-consuming counterparts while improving their insulin sensitivity.
Toning your abs when trying to lose belly fat is crucial as well. To make a traditional plank routine more challenging, add in side planks. Roll onto your left forearm and stack your right foot on top of your left. Hold this position for 60 seconds, then switch sides. Having only two points of contact rather than four works your core harder and challenges your obliques as well.
We don’t always eat simply to satisfy hunger. All too often, we turn to food when we’re stressed or anxious, which can wreck any diet and pack on the pounds. Do you eat when you’re worried, bored, or lonely? Do you snack in front of the TV at the end of a stressful day? Recognizing your emotional eating triggers can make all the difference in your weight-loss efforts. If you eat when you’re:
Sleep at least 7 hours a night. Eliminate all sources of light from your bedroom. Get to bed at least 8 hours before you expect to wake up, and spend the last hour before that relaxing with the lights turned down. When you sleep better, you’ll have more energy, and thus move more and burn more calories. Your body will regulate it’s appetite better. Your hormonal profile will improve, allowing you to build more muscle and burn more fat, independent of diet and exercise.
In what is perhaps the biggest buzzkill of all time, sex doesn’t quite count as cardio or burn a significant amount of calories: Women burn about 3.6 per minute. "It’s still a good idea," Dr. Seltzer says, citing the activity’s other benefits, like increasing the output of the neurotransmitters serotonin and dopamine, which naturally reduce food cravings.
Sleep at least 7 hours a night. Eliminate all sources of light from your bedroom. Get to bed at least 8 hours before you expect to wake up, and spend the last hour before that relaxing with the lights turned down. When you sleep better, you’ll have more energy, and thus move more and burn more calories. Your body will regulate it’s appetite better. Your hormonal profile will improve, allowing you to build more muscle and burn more fat, independent of diet and exercise.
"If your diet consists of lots of sports drinks, sugar-sweetened drinks like fizzy pop and flavoured waters, or sugary foods like chocolate and cakes, it will make losing weight harder. While whole fruits and vegetables are undoubtedly good for you, they can also sometimes cause weight gain if you eat too much, as they have high levels of natural sugars in them. Low-fat food options might have high amounts of added sugar in there too, so make sure to check the food label.
× | ESSENTIALAI-STEM |
This intriguing drone concept drops packages straight into your hands
Technology research company Cambridge Consultants has unveiled a drone delivery concept called DelivAir that delivers a package directly into someone’s hands, using coded patterns sent via a phone’s LED flash to identify the recipient. The company says this type of delivery is ideal for items that are needed instantly or critically like a first aid kit to a hiker, emergency relief packages to disaster areas, or for delivering medical supplies like an EpiPen. Delivering a package is a two-stage process: first, the DelivAir drone uses GPS to locate a person via their smartphone. Then, it switches to optical tracking and a 3D-imaging and ranging system to locate and authenticate the person receiving the package when they come into view. Once the drone reaches the delivery area, the recipient points their mobile phone’s flash at the drone, which blinks the coded pattern. The drone hovers at a safe distance above the flashing LED, verifies the code, then lowers the package down on a stabilizing winch. The drone then returns to base. “This system is as about as close as we’ll get to instantaneous matter transportation in our lifetimes,” said Henry Fletcher, a senior engineer with Cambridge Consultants. “Pinpoint-accurate delivery to any smartphone may improve the feasibility of life saving applications for drones.” In response to questions put forward by The Verge, a spokeswoman for the company said that everything shown in the video — from the point of placing an order on the smart phone to returning the drone to base is automated. “The system can technically carry out everything we’ve shown in the video, but there is a current legislative restriction in the UK where a drone may not fly over built up areas and must remain 50m from people at all times,” she said. “Because of that restriction, the delivery shown to a person in town has been mocked up, but delivery to a hand in a rural area is today viable.” The concept is certainly compelling despite these restrictions and it’s a glimpse of at least one possible future for package delivery. Update October 4th, 9:26AM ET: Added more comments from Cambridge Consultants. | NEWS-MULTISOURCE |
Page:Lindigo.djvu/130
130 "More charges, Griffin? surely getting hold of that bull is of far more value than the price of a horse. If that is the only charge you have to bring against the best stockman on the place, I shall take no further notice of it."
Griffin seemed quite crest-fallen at this rebuke, and replied maliciously:—"But you must remember, sir, that he is always giving me impudent answers, and is constantly disobeying my orders."
Charlie, who was listening to these trifling charges, could no longer bear to hear his old servant abused, replied provokingly:—"It appears to me, Mr. Griffin that you have already a good supply of impudence without giving you any more." This well-timed and merited cut sent Mr. Wilson into a fit of laughter on looking at Griffin's abashed countenance, as he muttered some unintelligible curses at the swell whom he had no doubt was a J.P.
Donald, who did not recognise Charlie, was ordered by Mr Wilson to lead the two horses to a small yard a short distance off. Charlie, thinking this was a good opportunity to make himself known without the spectators cognizance, followed Donald on the plea of getting a parcel off the saddle.
The happiness which the innocent convict experienced on meeting with Charlie, and the fact of his having his free pardon, was great.
Charlie then told Donald of the charges Griffin had brought against him, when he exultingly exclaimed—"Ah! the villianvillain [sic], won't I serve him out now.
It was agreed between them to return to the yard at once, and for the present to keep the recognition and the free pardon secret.
On their return Griffin was ineffectually endeavouring to draft the cattle, which proceeding was constantly interrupted by the attacks of the bull before-mentioned, which sent him in hot haste up the rails at every charge. On seeing Donald, Griffin roared out with his usual oath commanding the former to jump in and help to draft, which was done with a smile.
After once more compelling Griffin to seek refuge on | WIKI |
Page:The invasion of the Crimea vol. 1.djvu/441
APPENDIX. 399 why Lord Aberdeen did not, however, insist on its adoptioD is thus stated by him in writing to Mr Gladstone (October 20):— ' Reasonable as it was, I have not thought it prudent to ' adhere to it. I found that Palmerston and Lord John ' were both determined to resist it to the utmost extremity ; ' and I had to consider how far I should bo justified in ' creating a breach on such grounds ; for the practical question at issue would have been, whether we should ' impose on the Turks the necessity of making no alteration ' whatever in a Note which was to be signed by them and ' delivered in their name. To those who did not know all ' that had passed, such a condition would have appeared ' harsh and unjust ; and I felt that it could not properly be ' made the ground of such an irreconcilable difference in the • Cabinet.' Lord Clarendon wrote to you that the declaration was abandoned, and you replied, October 22: 'Your note has ' given me great satisfaction. I understand from it that a ' power of modification is to be left to Rescind Pasha.' Loth at the time, and ever after, until his death, Lord Aberdeen's impression certainly was that the views taken by you of the differences between the Porte and Russia made it impossible for you conscientiously to support him in his efforts for peace ; and that had it been otherwise, war might have been avoided. I find that, just previously to its commencement (Feb. 28, 1854), he expressed this feeling to you in the following terms. After stating his entire concurrence with you on the Reform question, he says :— ' I wish that I could feel as much at ease on the subject ' of the unhappy war in which we are about to be engaged. 1 The abstract justice of the cause, although indisputable, is ' but a poor consolation for the inevitable calamities of all ' war, or for a decision which I am not without fear may | WIKI |
Harlem River (album)
Harlem River is the debut studio album by American indie rock musician Kevin Morby, released on November 26, 2013, by Woodsist Records. In 2017, the song "Harlem River" was featured in a Volvo advertisement and in 2018 for a Target Australia commercial.
Personnel
* Musicians
* Kevin Morby – vocals, guitar
* Justin Sullivan – drums, percussion
* Dan Iead – guitar (track 2), slide guitar (8)
* Will Canzoneri – bass (5), guitar and organ (3), glockenspiel (7),
* Tim Presley – bass (1), harmonica (6)
* Additional musicians
* Cate Le Bon – guest vocals on "Slow Train"
* Production and artwork
* Rob Barbato – producer, engineer, bass (2, 3), chord organ (4), backing vocals (7), guitar (1, 6)
* Drew Fisher – engineer
* John Greenham – mastering
* Huw Evans – layout
* Joyce George – cover photography | WIKI |
In 2015, The Hebrew University of Israel published a study that documented the potency of single-molecule CBD extract versus the potency of whole-plant CBD-rich extract. It found that extract taken from whole plant CBD-rich cannabis is therapeutically superior to single-molecule extract. The scientists behind this study noticed that science had been utilizing pure, single-molecule CBD, which resulted in a bell-shaped dose-response curve. This means that CBD’s efficacy plummets at very high and very low doses.
Dosage is important, because CBD can have side effects—the most common are tiredness, diarrhea, and changes in appetite and weight—so it’s best not to take more than you need. As CBD becomes more prevalent, says J. Michael Bostwick, M.D., a psychiatrist at Mayo Clinic in Rochester, MN, “I’m reasonably certain new kinds of side effects will emerge.”
Some medications are changed and broken down by the liver. Cannabidiol might decrease how quickly the liver breaks down some medications. In theory, using cannabidiol along with some medications that are broken down by the liver might increase the effects and side effects of some medications. Before using cannabidiol, talk to your healthcare provider if you take any medications that are changed by the liver.
Hi Cheryl, for legal reason we can’t make any type of medical claims, saying that our product will cure or treat any type of medical diagnosis, such as (depression). Our CBD oil is great for assisting with pain, inflammation, stress, anxiety and sleep. To help with taste we do offer peppermint flavor. We will be offering more flavors in the near future. Some who take the oil like to mix it with orange juice or use orange juice as a chaser.
Chronic pain: The body’s ECS plays a role in alleviating and managing pain, so CBD oil can work as a supplement for individuals with medical conditions that cause chronic pain, such as arthritis and multiple sclerosis. CBD oil also increases levels of adenosine in the brain; adenosine is a neurotransmitter that aids cardiovascular function and eases painful inflammation.
Thank you. I am 81 and started the CBD drops night and morning. I sleep better and no longer suffer the excruciating pain from diverticulitis. I saw somewhere that for my asthma I need the THC so got some (totally illegal here in South Africa). I think it is helping. The diagnosis of COPD was made some years ago and as a health psychologist I do all I can to remain healthy for my 97th birthday!! (Both my grandmother and greatgrandmother did so I believe I will too).
Been using product for a few days now ,I'm about one my 6th dose. I noticed today my hand from nerve damage has not dropped anything or felt numb,or even trembled. Even axienty has been managable. However I'm taking 250mgs.I boosted it up to 500mgs.3 or 4 times daily ,of 250mgs. It seems to have best effect atleast today.It's cold and rainy which,is better than snow ,is my most hightened pain days.Today 4/24/18. Has been a God send! 1 pain and axienty day free ...Makes me a believer! I stand by this products effectiveness. Hope my review helps another soul,that lives with same aliments.
Insomnia: The anxiety-alleviating and sleep-prolonging qualities of CBD oil make it a good option for many people with insomnia. Those who experience insomnia due to pain or discomfort may also find that using CBD oil alleviates their physical symptoms to a noticeable extent. CBD oil may also promote daytime wakefulness when taken in small amounts; people with insomnia can use it as a pick-me-up if they feel excessively tired due to lack of restful sleep.
– CBD Oil with THC; This kind of oil isn’t legitimate in all states and has an unexpected impact in comparison to unadulterated CBD oil. Numerous individuals take marijuana for THC, which aids them to fight distinctive restorative conditions. They trust that when the two are joined, they give a better experience that surpasses each other’s useful properties. Note that THC can counter the advantages of CBD and in this way, perfect dosing is fundamental.
To name just a few: Animal research and small-scale human studies have pointed to CBD's anti-anxiety and anti-inflammatory properties, NPR reports. A study is underway to see how CBD helps patients with PTSD and alcohol use disorder, and another is exploring how CBD might help curb drug cravings in people with opioid addiction. Cannabinoids like CBD may also be effective at treating cancer-related side effects, according to the National Institutes of Health.
Wondering where to buy cannabis oil? Look for a reputable company that sells its products legally (according to your specific state laws) with full transparency and accountability. It’s very important to make sure any cannabis oil you purchase has been tested by accredited laboratories to ensure that is is free of pesticides, residual solvents (from the extraction process), bacteria, fungus, foreign matter and heavy metals.
Hi Sandy, for legal reason we can’t make any type of medical claims, saying that our product will cure or treat any type of medical diagnosis, such as (arthritis). Our CBD oil is great for assisting with pain, inflammation, stress, anxiety and sleep. Depending on the amount of pain or inflammation you will need to pick a strength according. If you are on a scale of 5 to 7 then 3x strength is the best. You can take more or less depending on what you feel as needed.
CBD has antibacterial properties that fight against harmful bacteria such as MRSA (methicillin-resistant Staphylococcus aureus – an increasingly occurring resistant type of Staphylococcus due to the widespread use of antibiotics since the 1960s). In addition, CBD has anti-epileptic, anxiolytic, anti-inflammatory and anticonvulsant effect, and acts as an antioxidant and relieves nausea.
This does nothing for me. I have been taking between 4 and 8 Aleeve a day for back pain related to kyphosis and hoped this would help me cut down on those medications. This is hemp oil, not CBD oil. After trying this and receiving no results I switched to CBD oil from a well reviewed company and the CBD oil is helping. I now take the CBD oil twice a day and have noticeable results. I have cut my regular pain meds to one or two a day.
When used in combination with delta-9-tetrahydrocannabinol as the product Sativex, cannabidiol was given a standard marketing authorization (ie. a Notice of Compliance (NOC)) by Health Canada for the following indications: 1) as adjunctive treatment for symptomatic relief of spasticity in adult patients with multiple sclerosis (MS) who have not responded adequately to other therapy and who demonstrate meaningful improvement during an initial trial of therapy [15];
CBD has also been shown to have neuroprotective properties in cell cultures as well as in animal models of several neurodegenerative diseases, including Alzheimer’s,xii,xiii,xiv stroke,xv glutamate toxicity,xvi multiple sclerosis (MS),xvii Parkinson’s disease,xviii and neurodegeneration caused by alcohol abuse.xix Nabiximols (trade name Sativex), which contains THC and CBD in roughly equal proportions, has been approved throughout most of Europe and in a number of other countries for the treatment of spasticity associated with MS. It has not been approved in the United States, but clinical trials are ongoing, and two recent studies reported that nabiximols reduced the severity of spasticity in MS patients.xx,xxi There have been limited clinical trials to assess the potential efficacy of CBD for the other indications highlighted; however, a recent small double-blind trial in patients with Parkinson’s disease found the CBD improved quality-of-life scores.xxii
Check Dr. Stephen Porges’ work, as well as Stanley Rosenburg. Both treat trauma and the vagus nerve’s role in bodily symptoms, which cause a lot of the symptoms you mention, as well as other people here. Some of Stanley Rosenburg’s simple exercises along with Stephen Porges’ work, can realign the vagus nerve and when done regularly have a cumulative effect. Basically, most symptoms, even seizures can be caused by misalignments and/or contracted muscles, (even the tiniest muscle in the human body, the stapedius muscle when chronically contracted can cause havoc on body) all under the umbrella of the vagus nerve (polyvagal nervous system). This is very well researched and is cutting edge treatment without the use of drugs of any kind. Some of Porges’ treatments use music, believe it or not, specially designed headsets with bone conduction. But please research, there are therapists trained in this field and in meantime, you can self-apply Stanley Rosenburg’s Basic Exercise, as well as others, first and you will see drastic results.
Based on reviews, smoking or vaporizing CBD vape oil seems to have less effects when compared to other methods of administering CBD, such as tinctures, capsules and sprays. On the flip side, others argue that smoking or vaporizing has less drawbacks than taking CBD orally, since ingesting CBD orally could result in inconsistent absorption and a delayed effect.
No, hemp oil is not the same as cannabis oil. All-natural hemp oil is obtained by cold pressing of hemp seeds whereas cannabis oil is obtained by separating the resins from cannabis flowers. Their uses and chemical composition are quite different. Cannabis oil is much higher in THC (tetrahydrocannabinol) content, which has certain effects, whereas hemp oil tends to be higher in CBD (cannabidiol) levels.
THC is the primary psychoactive compound in marijuana and it is what people are searching for when they want a product that gives them a "high." Unlike THC, CBD isn't known to cause psychoactive effects, and is therefore attractive to those who want to avoid the high but who believe there are other benefits of CBD, said Sara Ward, a pharmacologist at Temple University in Philadelphia. [Healing Herb? Marijuana Could Treat These 5 Conditions]
There is currently one FDA-approved prescription CBD product, called Epidiolex, for the treatment of seizures associated with two rare and severe forms of epilepsy, Lennox-Gastaut syndrome and Dravet syndrome. There is also an oral spray called Sativex, which is a combination of THC and CBD used to treat pain related to multiple sclerosis, but it is not approved in the United States.
"It's important to know that the research in this area is in its infancy, partly because we haven't really understood much about CBD until relatively recently," said Marcel Bonn-Miller, an adjunct assistant professor at the University of Pennsylvania Perelman School of Medicine. He pointed out that the classification of marijuana as a Schedule 1 drug by the DEA makes it difficult to get material to use in laboratory studies. Schedule 1 drugs have a high potential for abuse, according to the DEA, and are illegal under federal law.
Carbon dioxide is passed through the plant material at a very specific temperature and pressure. Carbon dioxide, which is normally a gas at (or above) room temperature, can be pressurized until it becomes so dense that it takes on some of the properties of a liquid while still maintaining the fluid dynamics of a gas. In this state, CO2 is known as a supercritical fluid.
I first encountered CBD while on sabbatical a few years back. As I drove up the Oregon Coast Highway, it was hard to miss all the cannabis shops along the Pacific. I stopped in one, perused the menu, and selected two marijuana specials — Nine-Pound Hammer and Trainwreck — and some CBD gummy bears. The cannabis was, well, as advertised, and the CBD candy, as far as I could tell, was a fruit-flavored placebo.
One of the most popular and well-known uses of pure cannabis essential oil is to get relief from stress and anxiety, according to a report published in the Journal of Cannabis Therapeutics. The natural compounds found in this oil, including the famed THC, which is what gives cannabis the distinction of a drug in many countries, are very good for releasing pleasure hormones and relaxing the mind. It also helps in reducing stress and inducing a sense of calmness and relaxation.
The patient continued to use cannabis oil for 65 days. The family changed strains of the oil repeatedly, and some were more effective in increasing appetite and alleviating pain than others. The author of the case report suggests that cannabis oil needs to be explored further because there is potential that cannabinoids might show selectivity when attacking cancer cells, thereby reducing the widespread cytotoxic effects of conventional chemotherapeutic agents. Sadly, the young girl with ALL passed away due to gastrointestinal bleeding and a bowel perforation.
There have been a number of studies investigating the conceivable part of CBD oil in vanquishing pain of all proportions, be it menstrual cramps or pain of a chronic magnitude. The Journal of Experimental medicine speaks about the utilization of CBD oil for suppressing neuropathic pain in rodents. In spite of the fact that such studies are yet to be replicated with human beings, CBD oil is a good tolerance-builder, an agent that enhances the physique’s ability to cope with and be resilient to pain.
One classic use is in soaps. Hemp oil is also used in paints and lubricants, and as a body care product. It may be rubbed directly onto the skin to treat cracked, dry skin, or it can be blended into body oils, body creams, and other personal care products. Some people also use it as a dietary supplement, taking advantage of the high concentrations of essential fatty acids in unrefined hemp oil and using the oil as a dressing or garnish to improve nutrition.
× | ESSENTIALAI-STEM |
Compiler should warn on moves of mutable copy variables
Here is a code I think should not be accepted without warnings by the compiler:
let mut i = 0;
let mut f = move || {
i += 1;
i
};
println!("{}", f());
println!("{}", i);
I've discussed this quite a lot and some people agree with me and some say "but you said move, its behavior is absolutely expected". Well in reality it it more something like this:
fn main() {
let mut i = 0;
let rc = std::rc::Rc::new(10);
let mut f = {
let rc = rc.clone();
move || {
i += *rc;
i
}
};
println!("{}", f());
println!("{}", i);
}
Now the thing is that you have move required to make Rc work, but you actually captured i by value unintentionally. Note that I'm only talking about mut bindings that get mutated within closure - immutable copies being moved are absolutely fine. So this being said, I think it's a really rare case when you want to do this, because original code can be always rewritten into:
fn main() {
let i = 0;
let f = move || {
let i = i + 1; // we want to have a personal mutable copy
i
};
println!("{}", f());
println!("{}", i);
}
or
fn main() {
let mut i = 0;
{
let i = &mut i; // you want to have a reference that you mutate in the closure
let f = move || {
*i += 1;
i
};
println!("{}", f());
}
println!("{}", i);
}
But the original code makes a copy which can be easily missed and then mutates it. This remind me of a similar situation in C# where get property creates a new copy every time you call it and if you're trying to modify it it generates an error, because it's well expected to be a mistake:
class Program {
struct Foo {
public int x;
}
class Bar {
public Foo Foo { get; }
}
static void Main() {
var bar = new Bar();
bar.Foo.x += 1;
// error CS1612: Cannot modify the return value of 'Bar.Foo' because it is not a variable
}
}
I think that compiler should ask for an explicit let in case if this move was intentional or to create a reference/smart pointer/... in case if it was supposed to modify a shared location. In its current state it looks like a pitfall.
I wanted to end with more realistic example of what I was doing something along these:
#[tokio::main(flavor = "current_thread")]
async fn main() {
let mut i = 0;
let n = 5;
let futures = (0..n).map(|_| async move {
// some dozens of lines of code here
i += 1;
println!("Done {} out of {}", i, n);
});
for f in futures {
f.await;
}
}
The thing is that counter didn't exist in the fist place - it was just bunch of futures with their own work. So I added a counter - and while it stroke me a little bit "why does it compile? Don't I need some kind of syncronization" I immediately thought "well I'm running on a current-thread executor, so it figured out I don't need syncronization and regular reference is enough, since compiler is happy then it most definitely should be valid". And it's easy to imagine I was very wrong about that. I agree that I was tired and probably should have looked better, but in the end I really think that compiler should warn about such issues, C# compiler does just this in a very similar situation. I think this is the best approach and doesn't harm anyone - rust always has been about explicitness so I think this is a great place to apply it.
Hope this all makes sense.
7 Likes
I want to note that your “I want a personal copy” rewrite is incorrect because the mutation doesn’t persist across multiple calls, as it would for the original move case. But you can still do a rewrite similar to your explicit &mut case, so it doesn’t rule out a lint here entirely. I appreciate that you took the time to write out the “how do you address this warning” part.
I’d suggest a small tweak to the rule: warn if a moved Copy binding is both mutated after capture (either inside or outside the closure) as well as being referenced again outside the closure. If there’s no further mutation or no further reference from multiple places, there’s no possibility of misinterpretation.
2 Likes
Yes, to be absolutely more precise let binding should be marked as mutable to make it mutable accross the closure, I just thought it would distract a little bit from the core concept as I already felt like I'm failing at delivering the idea. But you're absolutely right, thank for the edit and suggestion.
3 Likes
What if the closure is supposed to be short lived though? Like the one passed to unwrap_or_else. In that case the variable could still be mutated after the closure is created, but there is still no possibility of misinterpretation.
So I would add to the requirements that the closure should still be alive while the copy variable is mutated again or, if the closure is the one that mutates the variable, that the variable is referenced outside the closure after it is called.
1 Like
Hm, it’s not possible to tell if a closure passed by value is still alive after the call completes, though. Maybe that means this isn’t feasible. Never mind, lifetimes do provide enough information for this, short of transmutation.
There are cases when behaviour described in OP post is desirable.
For example, this code (which ensures that iterator values are unique):
my_it
.filter({
let mut prev_values = HashSet::new();
move |&val| {
prev_values.insert (val)
}
})
Yes, this code is fine, we have to big differences here:
1. HashSet is not a Copy type
2. Therefore this code doesn't create shallow copies and modifies them - lambda modifies a single instance of the binding and therefore everything works as expected. This is a bit artificial example but it shows the problem:
#[derive(Debug, Clone, Copy)]
struct HashSet<T>([Option<T>; 10]);
impl<T: Eq + Copy> HashSet<T> {
fn new() -> Self {
HashSet([None; 10])
}
fn insert(mut self, val: T) -> bool {
let val = Some(val);
if self.0.contains(&val) {
return false;
}
for i in 0..self.0.len() {
if self.0[i].is_none() {
self.0[i] = val;
return true;
}
}
panic!("HashSet is full")
}
}
fn main() {
let my_it = vec![1, 1, 1, 2, 2, 3].into_iter();
let x = my_it
.filter({
let mut prev_values = HashSet::new();
move |&val| {
prev_values.insert (val)
}
});
for i in x {
println!("{}", i);
}
}
Okay, abother example then:
My_iter
.inspect({
let mut idx = 0;
move |val|{
println!("val at idx {idx} is {val}");
idx += 1;
}
})
Perhaps, we should warn only if we have usages of mutable variable outside of lambda?
I think that this was the idea :slight_smile: :
2 Likes | ESSENTIALAI-STEM |
Trump: I was just 'counterpunching' with photo of Cruz's wife | TheHill
.@realDonaldTrump: That re-tweet was just a counter-punch to what Cruz did to my wifehttps://t.co/y1PdYi72tv Donald TrumpDonald John TrumpPossible GOP challenger says Trump doesn't doesn't deserve reelection, but would vote for him over Democrat O'Rourke: Trump driving global, U.S. economy into recession Manchin: Trump has 'golden opportunity' on gun reforms MORE on Monday continued to defend an unflattering photo he shared on Twitter last week of GOP presidential rival Ted CruzRafael (Ted) Edward CruzTrump moves forward with F-16 sale to Taiwan opposed by China The Hill's Campaign Report: Battle for Senate begins to take shape O'Rourke says he will not 'in any scenario' run for Senate MORE's wife, saying it was an example of "counterpunching." "Frankly, all I’m doing is counterpunching what he did,” Trump said on “Fox and Friends,” continuing to claim that there are links between Cruz and the anti-Trump super-PAC behind an earlier ad featuring his wife Melania posing nude from a 2000 British GQ photoshoot. "@Don_Vito_08: "A picture is worth a thousand words" @realDonaldTrump #LyingTed #NeverCruz @MELANIATRUMP pic.twitter.com/5bvVEwMVF8" "He sent the photo out, as sure as you're sitting there. He knew about it. Somebody even said he's the one that bought the copyrights from GQ. Now we'll find out who bought the copyrights from GQ. But he knew about it at a minimum," Trump said. "Let's not be naive, folks." Cruz has repeatedly denied any connection to Make America Awesome, the anti-Trump super-PAC behind the Melania ad, and Trump has not offered evidence connecting the two. Super-PACs are barred from directly coordinating with a campaign. Meanwhile, Trump on Monday also sought to deflect charges from Cruz that the businessman and his "henchmen" were behind a tabloid article in the National Enquirer last week alleging extramarital affairs. "I had nothing to do with the National Enquirer. I knew nothing about it. I just saw it yesterday for the first time," Trump insisted on Fox. Trump then pivoted to push a Daily Beast story from last week suggesting that allies of former Republican presidential candidate Marco RubioMarco Antonio RubioTrump moves forward with F-16 sale to Taiwan opposed by China The Hill's Morning Report — Trump and the new Israel-'squad' controversy Trump crosses new line with Omar, Tlaib, Israel move MORE peddled the rumors, with Trump calling it "a pretty conclusive story." This report was updated at 8:24 a.m. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
Autonomía digital y tecnológica
Código e ideas para una internet distribuida
Linkoteca. hardware
Whole house music and multi-room systems are very popular in homes and living spaces of all shapes and sizes. There are many ways to send music throughout a home, including wired and/or wireless connections that enable control from anywhere. You can use an existing receiver as the center hub, or you can install a completely dedicated whole house music system. The amount of effort involved can range from adding a speaker switch to a receiver, do-it-yourself wired/wireless networking, or something more sophisticated that would require professional installation. However, there are pros and cons to the different methods available.
An SSD does functionally everything a hard drive does, but data is instead stored on interconnected flash-memory chips that retain the data even when there’s no power present. These flash chips are of a different type than the kind used in USB thumb drives, and are typically faster and more reliable.
The PC hard drive form factor standardized at 5.25 inches in the early 1980s, with the now-familiar 3.5-inch desktop-class and 2.5-inch notebook-class drives coming soon thereafter. The internal cable interface has changed from serial to IDE (now frequently called Parallel ATA, or PATA) to SCSI to Serial ATA (SATA)
An SSD-equipped PC will boot in less than a minute, and often in just seconds. A hard drive requires time to speed up to operating specs, and it will continue to be slower than an SSD during normal use.
Because of their rotary recording surfaces, hard drives work best with larger files that are laid down in contiguous blocks. That way, the drive head can start and end its read in one continuous motion. When hard drives start to fill up, bits of large files end up scattered around the disk platter, causing the drive to suffer from what’s called fragmentation. While read/write algorithms have improved to the point that the effect is minimized, hard drives can still become fragmented to the point of affecting performance. SSDs can’t, however, because the lack of a physical read head means data can be stored anywhere without penalty. Thus, SSDs are inherently faster.
An SSD has no moving parts, so it is more likely to keep your data safe in the event you drop your laptop bag or your system gets shaken while it’s operating.
SSDs make no noise at all; they’re non-mechanical.
An SSD doesn’t have to expend electricity spinning up a platter from a standstill. Consequently, none of the energy consumed by the SSD is wasted as friction or noise, rendering them more efficient.
While it is true that SSDs wear out over time (each cell in a flash-memory bank can be written to and erased a limited number of times), thanks to TRIM command technology that dynamically optimizes these read/write cycles, you’re more likely to discard the system for obsolescence (after six years or so) before you start running into read/write errors with an SSD. | ESSENTIALAI-STEM |
Rapping, painting and lion-hugging. Here’s a look back at what happened in the arts in the past year.
In the Moment: Photographs From 2016
There is no easy way to sum up the rich smorgasbord that was culture in 2016. But — to stay with a culinary metaphor — this sampling of our arts photography offers a taste. These images take us behind the scenes to watch the Nigerian artist Laolu Senbanjo use the actress Danielle Brooks as his canvas. They make us privy to private moments, like those of a photo-averse Howard Stern in his studio; of Metropolitan Opera musicians taking a backstage poker break; of Taylor Mac applying makeup in front of his dressing room mirror. And they bring us closer to celebrities like Julia Louis-Dreyfus, Judith Light and Tony Bennett. | NEWS-MULTISOURCE |
Talk:List of programs broadcast by Spike
Untitled
Hope this follows quality standards. This list kept getting deleted from the Spike TV article, though I believe it is important to have a list of this nature available, since there are several shows that were originally first shown on this network that are now no longer on television at all, including several animated series, and some imports. -Nobuyuki 06:14, 18 July 2006 (UTC)
Voyager?
Googleing "Voyager" on spiketv.com doesn't return any hits. Is this a problem with my Google skills, or should Voyager be removed from the list? Golwengaud 19:22, 8 August 2006 (UTC)
Rockin Bowl
Where is it? It was definitely on TNN (formerly Spike TV). It used to be on Friday nights with Monster Jam, and Rollerjam. It was like all sports night. http://www.bsu.edu/news/article/0,1370,1110--,00.html —Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:12, 21 November 2007 (UTC)
1,000 Ways To Die
i don't see it listed here on the Spike TV programing but there's a show called 1,000 ways to die. can we have that added to the list.--Boutitbenza 69 9 (talk) 01:25, 23 May 2008 (UTC)
Separate sections
Original programming should be separated from syndicated shows. I'm not gonna do it, but you should! Nova Prime (talk) 10:14, 9 March 2009 (UTC)
* Ditto. Baywatch - clearly not a Nashville Network original programme, has been dumped into a large, unreferenced list alongside Blue Mountain State, a show deserves greater visibility on this page due to its status as a Spike TV original. Same issue with the Spike TV infobox. Rayman60 (talk) 17:43, 10 March 2016 (UTC)
knockout sportsworld
why isn't knockout sportsworld listed--<IP_ADDRESS> (talk) 05:24, 15 July 2010 (UTC)
Urban Tarzan
Is there any reason why Urban Tarzan is not listed, and is there any reason why there is no page for Urban Tarzan? <IP_ADDRESS> (talk) 00:53, 28 May 2013 (UTC)
* I created a page for Urban Tarzan, but it will probably need some tidying up. allixpeeke (talk) 19:37, 16 June 2013 (UTC)
* Said page was removed; thus, if someone wants to give it another go, be my guest. allixpeeke (talk) 18:49, 2 August 2013 (UTC)
The Shannara Chronicles
The tv show The Shannara Chronicles is listed as part of "Reality/non-scripted programs" of the channel, though it is a scripted tv show. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 13:00, 27 November 2017 (UTC) | WIKI |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.