Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Acetyl L-Carnitine - Dosage, Benefits & Side-effects Summary Acetyl L-Carnitine (ALCAR) is a powerful amino acid naturally produced by your body. You can also get ALCAR from animal foods. As vegans and people with certain genetic disorders cannot produce it in adequate amounts, it is a conditionally essential nutrient. It boosts your cognitive functions, mood, memory, and energy and protects against age-related changes. In addition to treating various mental health disorders, it also promotes your nerve functions.  Acetyl L-Carnitine- Dosage, Benefits & Side-effects ALCAR is the most effective form of L-carnitine as it is rapidly absorbed through the blood-brain-barrier. Here it provides fats to the powerhouse of your cells, which then converts it to a usable form of energy. Overall, Acetyl L-Carnitine is a nootropic that supports both body and mind. It is readily available without a prescription. Acetyl-L-carnitine is commonly used in various nootropics and is readily available without a prescription. It is gaining popularity among both body and brain-building enthusiasts. In 1952, benefits of Acetyl-L-carnitine were studied for the first time. It has been studied exclusively since then and found to be extremely beneficial for humans. What is Acetyl L-Carnitine? L-carnitine, named from the Latin word, flesh, was discovered in muscle tissue 100 years ago. It is a naturally occurring amino acid derivative.  Your body can make L-carnitine by using amino acids. You can also obtain it through animal diet. As vegans and people with certain genetic disorders are unable to obtain or produce sufficient L-carnitine, it is a conditionally essential nutrient. acetyl l carnitine L-carnitine aids in providing energy by transporting fatty acids into mitochondria. Mitochondria are the powerhouse of your cells. They break down these fats into energy-rich molecules that can be used by your cells. (1) Acetyl-L-carnitine is the most effective form of L-carnitine for your brain. It can cross the blood-brain-barrier and is thus a valuable source of energy for your brain cells. (2) In addition, it is a precursor of acetylcholine, which is a learning neurotransmitter, making it a valuable nootropic. Moreover, it improves your mood by promoting the release of serotonin and noradrenaline. Benefits of Acetyl L-Carnitine The main function of Acetyl L-Carnitine (ALCAR) is boosting the acetylcholine system. Acetylcholine is a neurotransmitter associated with memory and learning. The use of ALCAR thus improves the functioning of the brain, especially in those suffering from cognitive decline. Studies have shown that: • It enhances cognitive functions and reduces mental fatigue. (3) • ALCAR Promotes learning ability in those with Alzheimer’s disease. ‍(4) • It Boosts Mental energy and supports learning abilities. (5) • ALCAR improves the focus of kids with ADHD and adults with mental fatigue. (6) ALCAR is also an excellent anti-depressant. It promotes the release of serotonin and noradrenaline, boosting your mood. Various studies have confirmed that: • Those struggling with phobias, mood swings, anxiety, and sleep disturbances benefit from taking ALCAR. (7) Acetyl L-Carnitine rejuvenates and protects the cells from oxidative stress. It is thus used in treatment to recover and slow down the functional loss associated with neurological disorders. It is seen in various studies that: • The antioxidant property of ALCAR protects your brain from the harmful effects of alcohol. (8) • It reverses age-related changes in the brain. (9) Other benefits of Acetyl L-Carnitine are: • Triggers the burning of fat and thus supports weight loss • Improves sperm count and improves fertility in men • Promotes heart health and prevents heart failure • Reduces nerve pain • Reduces blood pressure and lowers insulin resistance How Does Acetyl L-Carnitine Affect the Human Brain? On consumption, this nootropic is taken up your bloodstream. As ALCAR can cross the blood-brain-barrier, it rapidly reaches the brain. Here it increases the level of acetylcholine, which improves memory and learning. It also reduces the risk of Parkinson’s and Alzheimer’s diseases. (10, 11) In addition, ALCAR also increases the levels of noradrenaline and serotonin in the brain that results in improving your mood. These neurotransmitters also play an important role in the functioning of your brain. (12) There is more to this nootropic. Acetyl L-Carnitine lowers the levels of damaged cells, energizes your cells, and prevents cellular oxidation. The damaged fat brain cells alter your energy and memory. The same happens with stress and anxiety. ALCAR protects your brain from this damage. (13,14) The major benefit of this nootropic comes from its property of maintaining the myelin sheath, which is a protective covering of the nerves. Damage to this sheath may impact vision, balance, hearing, and overall brain health. (15) Since ALCAR can be easily absorbed by your mitochondria, it acts as a source of instant brain energy. It is also seen to protect and strengthen your brain receptors, which helps in maintaining and forming new memory. How to Take Acetyl L-Carnitine & Dosage? It is soluble in water and can be taken on an empty stomach. Taking ALCAR in the morning boosts your brain functioning throughout the day. You can also take it in two or more divided doses. However, it is best to avoid taking it in the night as it may alter your sleep cycle.  Ideal dosage: The recommended dose in most of the studies is 1-3 mg of ALCAR. What Are The Potential Side-effects of Acetyl L-Carnitine? As your body naturally produces Acetyl-L-Carnitine, it is safe and well-tolerated. No major side-effects were observed in clinical studies. Milder side-effects were also rare and may include vomiting, nausea, and restlessness. If you face nausea, you can prevent it by taking this nootropic with meals. How Should You Stack Acetyl L-Carnitine? It is beneficial to compound Acetyl L-Carnitine with brain supplements that have similar properties to enhance brain health. Acetylcholine enhancers work well with ALCAR. Thus, nootropics from the Racetam family will complement its functioning. However, the major benefits of ACLAR come by compounding it with choline, chlorine, choline bitartrate, and choline citrate. But if you plan to go for stronger chlorine supplements, such as Alpha GPC and CDP chlorine, it’s a good idea to start with a smaller dose to prevent headaches. Some combinations include: • 500 mg ALCAR with 1 gram of Alpha GPC and 4 grams of Piracetam • 1.5 grams of Acetyl L-Carnitine, twice a day, with 300 mg of the ALA antioxidant and 2-3 grams of fish oil. Final Words! Acetyl L-Carnitine is a natural supplement with remarkable benefits for both the brain and body. It improves brain health, cognitive functions, productivity, and slows down the age-related changes in the brain. So, it boosts the overall functioning of the mind. This powerful brain booster works efficiently alone as well when compounded with other nootropics. It is safe, well-tolerated, and available without a prescription.  All in all, if you want to boost your cognitive abilities, improve overall health, and prevent aging, ALCAR may be a great option for you. Last Updated On: June 23rd, 2022 Your Thoughts? Leave a reply Finding Optimism
ESSENTIALAI-STEM
AEC What to look for in a BIM Sitework Consultant Whenever you are starting a new project, one of the first things to coordinate is the sitework. However, often this is one of the items that never gets incorporated into the BIM plan. So if you are considering bringing on board a consultant to help you model and coordinate the sitework here are some things you should consider:   Find a consultant with a background in the full sitework lifecycle There are a lot of BIM consultants available on the market today, but very few of them have experience or knowledge of civil and sitework.  Consultants that focus on this type of work have a background in civil planning, design, and construction and will add immense value to your team.  They will not just create a 3D model of your project but will consider key constructability and design factors while doing so. Since sitework can be one of the most critical elements of the project, proper planning, coordinating and reviewing designs is vital.  The best consultants come from an engineering background and will also understand how the work is put in place, allowing you to push information to the field and eliminating duplicate work. A truly valuable consultant will bring lots of experience and knowledge about sitework to the table. There is a big difference between Sitework and MEP Modeling There is a reason that plumbers do not typically install site drainage.  It is a different ball game. So if you are hiring a consultant to help you design, model and plan coordination of civil and sitework elements, you want to hire one that is familiar with that type of work.  Sitework requires completely different types of pipe, fittings, valves, and components that are not typical to MEP. Having the right tools to model this correctly will deliver a much better end-product. Many MEP consultants will try and convince you that it is just pipe, but the rules for sitework are much different, and since you are working underground you have additional considerations to keep in mind.  Also, a real sitework consultant will understand the installation and the most efficient way to deliver the information to the field. Understanding the end user of your sitework model Understanding who and how the end-user will utilize your sitework model is very important.  There is a lot of automation in the sitework trades including laser graders, machine controlled dozers, robotic total stations, and drones. These tools help keep sitework contractors efficient on large projects. Understanding the deliverables for the sitework contractor to use with these tools is critical. Also, sitework contractors work in tenths of a foot, not in fractions of an inch, which can make a big difference when creating final deliverables.  It is critical to making sure that all the work that goes into these models is trusted and put to good use. Understanding how the associated trades work is key to making useful deliverables. Picking the right tool for any job is important. When selecting a sitework BIM consultant, the same rules apply. Finding the most qualified team that can add the most value to the project will pay off in the long run.  
ESSENTIALAI-STEM
Page:I, Mary MacLane (1917).pdf/99 words, spruce but with indefinable vagabond faces: such as Whelk and Mauger and Frush and Gnurl and Yare and Hyaline. They are expressive but of a kind it's well to use with caution, the kind that may trip up thoughts that would make them their medium and lead to slips 'twixt cups and lips. So I dismiss them with a mental reservation of one or two to use if I fail to find right ones among the less mysterious. Then I turn to a tier that represents the virile middle-class in words, the lower-case words, the mob and riot words, the words for poets and anarchists and prophets: such as Adroit and Nightingale and Gallows and Gutter and Woman and Madrigal and Death. And I say, 'Without doubt here are my words.' But I use discretion. I know that tier of words to be of the nature of bombs, of strychnine, of a dynamic force resistible against all human and wordly substance. They also must be used cautiously and with a sparing hand. With caution one can handle a bomb, and sparingly one can eat strychnine, and one can control any dynamic force by studying its tendencies and keeping out of its direct road. It behooves one to heed those conditions in broaching the countermining counter-irritant words if one would avoid blowing oneself analytically broadcast. So I may have found the right sort of words and
WIKI
  Search Everything You Should Know About Spall and Frag Mitigation Body Armor Spall and Frag Mitigation Disclaimer for the radical anti-steel crew: I am probably going to rag on you a little today. It’s good for you to get ragged on from time to time, especially with how much you rag on us - but please hear me out: We have something that genuinely works; something that works efficiently and consistently for making steel body armor safe for everyday use. And no, it is not Rhino liner. “Steel Is For Targets” Oh, where to even begin. If you’ve spent even two minutes on body armor social media pages like ours, you’ve likely been treated to some entertaining comments, arguments, and insults directed towards steel armor. The most common I see: • “Steel is trash” • “Stop using targets for protection” • *Dies from spalling* The list goes on, and these are actually some of the more tame comments we see. The internet can be a ruthless place, and I might add, oftentimes an uneducated one. What’s funny to me is that nearly every profile avidly posting these comments has an identical layout: Their profile picture is some obscure meme or (presumably) them in a black ski mask, their cover photo is also them with a black ski or gas mask and an AK-47, or an upside-down American flag, and their bio says something about getting banned from social media for the fifth time this month. Nothing wrong with a little self-expression or distaste of authority, of course. But it sure entertains us to see how predictable the die-hard anti-steel gang and their “styles” are. What Are Frag And Spall? Are they the same thing? Technically speaking, no. To put it in simple terms: • Spalling refers to flakes or fragments of steel being broken off of the plate when the bullet makes contact with it. • Frag or fragmentation are pieces of the bullet itself being broken into smaller pieces. When people refer to “spalling” or “frag” online, they are generally referring to the same thing - any projectile being redirected away from the plate as a result of the plate being shot, which can of course be harmful to the person wearing the armor and others around him or her. You can see this happen when you shoot steel targets at the range. When your bullet makes contact with an object, Newton’s Laws of Motion require one of three things to happen: The bullet will pass through it, be “absorbed” per se, or deflected. When steel plates stop a bullet, most of the round is actually liquified, while pieces of its core usually break off into smaller fragments that are deflected into various directions. Are Concerns About Frag and Spall Valid? Looking at it objectively, we understand why someone would have concerns with steel body armor. We know that steel is in fact prone to causing bullet ricochet and/or fragmentation. You do not want any of that being redirected into a potentially hazardous direction - at a friend, at your throat, you get the idea. Doesn’t make for a good day. Though I reckon getting shot through the lungs makes for a much worse day. Oh yeah, I forgot the “you’d be better off wearing no body armor at all” comments I see all too often. You can’t make this stuff up. Okay, so trying to be objective warrants rational concerns here, right? Well, for most of the haters on our social media pages, that is where being “objective” ends. You see, they tend to have this view that ceramic body armor is a gift straight from God, perfected without fault. These individuals conveniently forget that both types of body armor require due diligence on behalf of the user in order to be consistently effective. If you drop ceramic armor onto a hard surface, for example, there is a very real chance you will compromise the armor’s integrity. That doesn’t sound like “perfection” to me. Armor Type Pros And Cons Steel Body Armor Plate A Steel Armor Plate Steel Armor Pros: • Requires next to no maintenance with an extraordinarily long lifespan (15-20 years) • Generally inexpensive and budget-friendly • Can withstand a higher number of rounds than ceramic armor before being compromised • Is easier to use discreetly due to its thinner profile Steel Armor Cons: • Can often be heavier than ceramic (though not as much as you’d think - companies like ours have worked to bring the weight of steel armor down dramatically in recent years) • Energy transfer - Bullets carry a lot of energy, and most of that energy will “pass-through” steel armor, which can result in blunt force trauma to the wearer. This can be mitigated by various means, such as high-quality trauma pads and special armor coatings. • Can cause bullets to fragment, endangering the wearer and those nearby if not properly mitigated - Valid, but preventable concern Ceramic Armor Pros: • Generally lightweight (though again, not as much as you may believe) • Energy transfer - Ceramic armor handles bullet energy much more efficiently on behalf of the wearer, meaning a bullet will be stopped and will not cause significant blunt force trauma - depending on the round, of course. Stopping a 30-06 is not going to feel good no matter how much armor you’re wearing • Tends to perform better against supersonic armor-piercing bullets Ceramic Armor Cons: • Usually quite thick and can impede mobility • Is compromised much more easily - Cannot handle multiple rounds in the same area • Generally much more expensive for quality armor • Requires more care and maintenance than steel (don’t want to be throwing it around) • Shorter shelf life, about 25% of steel’s (5-7 years at the most, usually) As I have said, I hope any objective individual can understand and appreciate both armor types and their pros and cons. I personally own and regularly use both. But with all these pros and cons, we at Predator asked ourselves a very important question. Can any of Steel Armor’s issues be fixed? YES! The answer is a resounding and absolute YES. Do not let anyone tell you otherwise. I was excited to write this part. I cannot understand how people believe purchasing steel armor is a guaranteed death sentence and that if you’re concerned about any of its potential risks, there are no ways to fix them whatsoever - A surprisingly helpless and non-adaptive mindset for someone purchasing body armor out of a desire to be prepared for the worst situations. But I digress. How can steel be made safe, while remaining affordable? There are several ways to do it. First and foremost, your plate carrier and equipment WILL provide real protection from fragmentation and spalling. This is done by retaining pieces of said fragmentation and spall within the carrier itself - just another reason to invest in a well-made plate carrier. It is not a full-proof method and is not recommended to be used exclusively, but it does aid significantly in protection. Think of it like the pull-out method, but for spalling and fragmentation. At Predator Armor, we utilize a unique multi-layer Kevlar lining that mitigates frag/spall, alleviating the concerns that many bring up. Having designed our products in-hand with former/active-duty service members, we have a thorough understanding of the usefulness of Kevlar in personal protection. Kevlar has a proven track record in the personal protection space. It is a product you can trust. This special lining adds minimal thickness and weight to your plates (I have never noticed the difference in thickness or weight when using them in the field), and it actually enhances the overall performance of the armor. The greatest part? It works just as well as you would expect. It is a common-sense solution to a common-sense problem. We have found that our Kevlar lining is able to consistently mitigate the risk of bullet fragmentation launching into dangerous directions at dangerous speeds. Our extensive tests found that the carrier was rarely (if ever) needed to aid in this mitigation - though realistically, you probably will not be using body armor without a carrier anyway, so it is always an added level of insurance (and personal assurance). Nevertheless, we performed extensive and thorough testing with and without carriers in order to ensure that the plate was capable of holding its own in terms of retaining bullet fragments. Needless to say, we were more than pleased with the results. We have solved the most commonly-cited concern by using steel body armor. Not to mention, that green cover sure looks badass. Exceptional Protection for Real Concerns We have said it before and we will say it again - We are in this business to save lives. We recognize the seriousness of the industry we have chosen to take part in, and the trust our customers place in us. We readily acknowledge that these are life-or-death purchases and that you want to ensure your life will be saved by the armor you’re entrusting us to provide you. We fully stand behind our Kevlar-lining as an appropriate means of making steel body armor safe for use as personal protective equipment in any and all conditions. We would not hesitate to use this armor in a live-combat situation, though we pray we never have to. What matters is that it is there; that it is available for the everyday patriot with a desire to protect themselves, their loved ones, and their God-given freedoms from any individual or group seeking to cause them harm. It is not your privilege to do so - it is your right 0 comments Recent Posts See All  
ESSENTIALAI-STEM
Chiropractor and Patient A Few Things You Should Be Aware About Chiropractor Downtown Salt Lake Mystified by hearing the name of chiropractors? You are not alone. Many people like you do not know the role of a chiropractor, what he or she does. A chiropractor Utah is a doctor taking care of joint, muscle, or bone pain. It is crucial to inform your regular physician if you are experiencing any pain. You must tell them if the pain is chronic or recent. Your regular physician will understand and rule out serious problems. However, chiropractors balance traditional medical care. Here are a few things you should know that the chiropractors do and don’t do: Chiropractors Never Prescribe Medication Chiropractors never prescribe medication is the first thing that makes you think out of the box. People take a pill, alter a few lifestyle habits. But with chiropractor Downtown Salt Lake, the situation is completely different. You get to take an alternative approach as it empowers patients to control their health. A chiropractor may prescribe: • Adjustments- It involves the realigning of joints gently and increasing the range of motion. • Soft-tissue therapy- It is to relieve spasm, relax tight muscles, and release tension surrounding the muscles. • Stretches and exercises- It helps in restoring, maintaining a range of motion, and mobility. • Joint taping/bracing- To support muscles or sprained joints to heal. • Referrals to experts- They guide on nutrition and diet so that there is the promotion of weight loss, and there is a reduction in inflammation. Generally, treatments are not hurtful, though you may experience a bit of soreness. It is the same as you feel about doing a workout. With time, your muscles start adjusting. Chiropractors Never Concentrate on Curing Only the Back and Neck A chiropractor Utah cures body pain, whether it is in the jaws or head, elbows or shoulders, hips or pelvis, wrists, knees, or ankles. A chiropractor can look at the root issue of the musculoskeletal system. They check the movement of joints and the surrounding muscles functioning. After the primary care, chiropractors assess your pain and also give complementary care relating to other problems. • Headaches- If a person is experiencing a lot of migraines and headaches due to jaw tension, it goes unaware. The patients do not know they are clenching their jaw while sleeping. A chiropractor helps in increasing blood flow by relieving the tension in the jaw muscle and thus help the patient from headaches. • Plantar Fasciitis– A painful foot complaint is not new, and the podiatrists recommend massage and orthotics as temporary relief. However, the chiropractors ensure the mobility of the foot joints and work upward to understand the root cause. The plantar fasciitis may be due to the way the patients are walking, and this causes lower back or knees problem. • Generalized Shoulder Pain: When there is shoulder pain, the chiropractor assesses the shoulder blade and the surrounding muscles.  Though the MRI does not detect any problem, a chiropractor Downtown Salt Lake may consider the ribs that hinder the shoulder movement. Chiropractors cure people of all ages. It is relying on the intensity, the patient, and the treatment force. The patients are taken for screening to ascertain if chiropractic care is suitable for such candidates. If the person is old and bones are softening or thinning, joint manipulation is impossible. In case, chiropractic care is risky in a patient; chiropractors give the right guidance. Chiropractors Concentrate on Prevention Chiropractic care aims to restore health in the long run and does not focus on giving temporary relief. A chiropractor takes note of a patient’s daily activities and movements, such as how they sleep, sit, stand, or walk. They speak to the patient about their food and their lifestyle. They take the decision to cure, relying on the issues that a patient is experiencing. Learning the positioning of your body while you are moving, standing, or working at your desk is important. The chiropractors understand all the details, the stretches in your routine, and then guide you to ensuring no future problems. Precisely, the chiropractors understand your every moment of action. They try to get to the root of your pain, ache, strain, and creak. If there is a problem involving your musculoskeletal system, there is a possibility that a chiropractor can suggest some alternative treatment methods.
ESSENTIALAI-STEM
Page:United States Statutes at Large Volume 48 Part 1.djvu/309 73d CONGRESS. SESS. I. CHS. 100, 101 . JUNE 16, 1933 . 283 For citizens' military training camps, $138 .60. For increa se of compen sation, Mili tary Es tablis hment, $2,87 0 .89. For Reserv e Offi cers' Traini ng Cor ps, $60. For pay, and so forth, of the Army, War with Spain, $41 .25. For Army tra nspor tatio n, $ 985 .32. For general appropriations, Quartermaster Corps, $988 .94. For supplies, services, and transportation, Quartermaster Corps, $7.48 . For replacing ordnance and ordnance stores, $1,990 .04. For arming, equipping, and training the National Guard, $46 .31. For pay of National Guard for armory drills, $127 .85. For mileage of the Army, $24. For Air Corps, Army, $136. 66 . For manufacture of arms, $4,658 .51. For construction and repair of hospitals, $24. For headstones for graves of soldiers, $4 .58. POST OFFICE DEPARTMENT-POSTAL SERVICB Post Office Depart. ment. (Out of the postal revenues) Postal Service . For city delivery carriers, $436 .16. For clerks, first- and second-class post offices, $140 .15. For compensation to postmasters, $261 .93. For indem nities, dome stic m ail, $ 239 .07. For indemnities, international snail, $28 .28. For miscella neous ite ms, first - and sec ond-class post off ices, $1, 300. For rent, light, and fuel, $276 .27. For separ ating mails, $170. 80 . For special delivery fees, $146 .38. For star route service, 33 cents. Total, audited claims, section 4, $184,419 .09, together with such additional sum due to increases in rates of exchange as may be necessary to pay claims in the foreign currency as specified in certain of the settlements of the General Accounting Office. SEC. 5. Section 8 of the Act entitled "An Act to provide for the n Reconstruction nceCorporation pupurr- purchase by the Reconstruction Finance Corporation of preferred chase of insurance com- stock and/or bonds and/or debentures of insurance companies " p ~rnte,pps'20, 99,121. approve d June 10, 1 933, i s here by ame nded to read as fol lows SEC. 8 . The seventh sentence of paragraph (6) of section 201 (a) Amount increased. of such Act, as amended, is hereby amend ed to read as follows " The aggregate of loans made under clause (a) shall not exceed $8,000,000, and the aggregate of loans made under clause (b) shall not exceed $12,080,000 ." SHORT TITLE Short title of Act. This Act may be cited as the " Fourth Deficiency Act, fiscal year 1933 ." Approved, June 16, 1933, 1 :20 p .m. [CHAPTER 101 .1 AN ACT Making June 16, 1933. g appropriations for the Executive Office and sundry independent execu- [H .R.5389.1 tive bure aus, boards, commissions, and offices , for the fi scal year en ding June [Public, No. 78 .1 30, 1934, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, That the following App ro pria tion ums are appropriated, out of any money in the Treasury not other- 1934 . wise appropriated, for the Executive Office and sundry independent
WIKI
Local variables are most often used with Assignment functions, which can assign expressions to local variables that are used in a complex equation. (For details, see Assignment Functions in Formula Functions Reference.) This technique can sometimes simplify building an equation and improve the efficiency of its evaluation. 3. Click the menu on the formula element browser and select Local Variables from the formula element browser menu. 4. Click New Local Variable. 2. Click the local variable name in the Local Variables list. It appears in the formula as a bold italic term. See Use Local Variables in a Formula, for an example of referencing local variables in a formula. 1. In the sample data folder that was installed when you installed JMP, open the Nonlinear Examples folder and then US Population.jmp. 2. Right-click the column name x-formula and select Formula. After completing a nonlinear fit or after using the Reset button in the nonlinear control panel, the parameter’s value is the most recent value computed by the nonlinear platform. 4. Click New Parameter. 5. 7. (Optional) To add several parameters (one for each level of a categorical variable, for example) at once, select Expand into categories, selecting column. Then select the column for which you want to expand the parameter. 8. 2. Click the parameter name in the Parameters list. The parameter appears in the formula as bold type.
ESSENTIALAI-STEM
The rate of total protein in the blood of women. Understand all the terms unsophisticated tests in human medicine is difficult.That is why in this article would like to tell, what is the rate of total protein in the blood of women, and what it could mean. What is it? In the beginning you need to deal with the main concepts that are used extensively in this article.So, what is a common blood protein?This is a key indicator of amino acid metabolism, which characterizes the concentration of the protein molecules in the plasma.If you talk very simple, these figures show how the human body is able to promptly and adequately respond to various contingencies (for example, malfunctioning of certain organs). components of total blood protein It is said that the total protein in the blood of women, however, like men, consists of the following components (which are studied during the biochemical analysis): 1. Albumin .It is the main component of the total protein mass of blood.Take part in the structure and used the structure of new cells.This low molecular weight proteins. 2. Globulins .Takes less than half the volume.It is important for the synthesis of antibodies and other immune proteins.This macromolecular proteins. 3. Fibrinogen .It takes a minimum (of the above) fraction of the total blood protein.This is a special high molecular weight protein that is responsible for blood clotting. Standards What is the rate of total protein in the blood of women?It should be said at the outset that these figures will vary depending on the age of women. 1. Girls first month the rate will be 48-73g / l.Indicators of the first year of life babies are almost the same. 2. Girls up to five years the rate of increase of protein and few will be 61-75 g / l. 3. teenage girls these figures are even higher: 58-76 g / l. The rate of total protein in the blood of adult women (18 years) - 65-85 g / l.If we talk about older women (retirement age), their performance drop of about 2 g / l. Men and women: the difference Is there any difference in terms of people of different sexes?The same to be the norm of the total protein in the blood of women and men?It is said that the doctors do not give different figures.Since the normal range very wide, you can use these numbers is equal for both sexes.But there is one "but".Speaking exclusively to the fair sex, the indicators they may have on average lower by about 10%.Why is this happening?Why is the rate of total protein in the blood to give a few drops?Everything is simple, blame hormones that are produced in women slightly more than men. Pregnancy and protein in the blood When it comes to girls, be sure to consider the period of carrying the baby and indicators of total protein at this time.It is said that during this period the figures may significantly decrease.Considered normal performance is not more than 30% below the general rate. Why is it can happen?The reasons here are the following: 1. amount of protein is reduced as a result of the increased volume of circulating plasma, when this fluid is retained in the space vessels. 2. Pregnant increased demand for plastic materials.It is required for the synthesis of sex hormones.It also is important to the endocrine glands. 3. should also say that the protein is mostly consumed for the growth and development of the unborn child. If we consider the total protein, the rules are the same in pregnant women as in other women: about 63-83 g / l.However, his insignificant decrease will not be considered pathological, if not the devil will deter below 50 g / l. Diagnostics How can I find out about the amount of total protein in the human body?This will require a special diagnostic method.Thus, the analysis needs to be called "blood biochemistry." Total protein (normal) - one of the indicators that are at the same time studied (a total of 11).Simple rules of delivery of this analysis: 1. For strictly on an empty stomach. Before analysis can not eat for 8 hours. 2. Before any analysis is not recommended even drink (maximum - half a cup of water). 3. Taking blood from a vein is made mainly on the arm above the elbow. figures above normal It often happens that the patient's total protein above normal.In this case we are talking about a problem that is called medical "hyperproteinemia."However, it can be both relative and absolute. When there is relative hyperproteinemia?In this case we are talking about reducing the water in the bloodstream.The reasons for this may be the following: 1. severe burns. 2. incessant profuse diarrhea. 3. Sweating. 4. chronic nephritis. 5. bowel obstruction. 6. Generalized peritonitis and others. What will be in this case, the total serum protein?The rate will be exceeded by about 25-30%. sure to tell about the absolute and hyperproteinemia.I found it, fortunately, extremely rare.Its causes may include the following diseases: 1. paraproteinemic hematological malignancies.In this case, it often comes to diseases such as Waldenstrom's disease, multiple myeloma. 2. chronic polyarthritis. 3. Cirrhosis. 4. Sarcoidosis. 5. Acute and chronic infections. 6. Hodgkin's disease, and others. What will be the total protein in this serum?The rate will be significantly exceeded.Indicators can achieve marks in the 120-160 g / l. Reducing protein in the blood Sometimes the patient is lower than normal, and total protein.In this case, again, to say that the problem can be either relative or absolute.The medical name for low protein in the body - "hypoproteinemia". relative decrease in protein.In this case, the amount of water in the bloodstream is increased and we are talking about these pathologies and conditions: 1. anuria, iecessation of urine. 2. water load on the body, which often occurs during dieting or fasting. 3. Oliguria, iedaily reduction of urine. 4. If the kidney function when administered drugs glucose. 5. If the body is increased hormone secretion hypothalamus, that is responsible for the water level in the body. It should be noted that in this case the rate of the total protein in the blood can vary by about 25-30%.All that is not included in this framework, the doctors called absolute hypoproteinemia.What exactly can cause this condition in women? 1. Prolonged starvation, malnutrition. 2. Inflammation of the gastrointestinal tract.This may be, for example, enteritis or enterocolitis. 3. in inflammatory processes in the liver significantly inhibited protein biosynthesis.In this case, talking about hepatitis, cirrhosis of the liver. 4. similar condition can occur in women with congenital disorders of protein synthesis.For example, it happens as a result of Wilson's disease or analbuminemii. 5. observed in patients, the body which accelerates the breakdown of protein.This is possible with various tumors, extensive burns or in the postoperative period. 6. Also dangerous is the increased protein loss, which can occur due to prolonged diarrhea, vomiting, bleeding, as well as diabetes.Sometimes 7. protein in the body can move in a so-called "third" space.This is possible due to diseases such as pleural effusion or ascites. It is said that any deviation from the parameters total protein standards is harmful to the human body and serves as a confirmation of a diagnosis.
ESSENTIALAI-STEM
Engineer’s Angle: Centrifuge fuel purifiers avert catastrophic engine damage Sep 23, 2019 by JD Anson Engineer’s Angle: by JD Anson There are two main ways dirt gets inside an engine. Each is bad. One is through the air intakes, hence the big filters before the turbos. The other is a little more sneaky: carried on to the boat like a virus through dirty fuel.  All fuel has some contaminants in it, but these are usually minimal in mainland Europe or North America, where standards and monitoring are high. When bunkering in less-civilized places, cleanliness in storage and transfer are frequently afterthoughts. Questionable fuel is sold regardless of quality. Some naïve sellers equate large yachts to commercial ships that can burn dirty heavy bunker fuel without issue. When a boat calls at a remote island, it is unlikely to return, thus the lower grade fuel will be pawned off to unsuspecting vessels. Passing this fuel through engines is a sure-fire way of causing major damage. Dirt clogs injection pumps and injectors. Water contamination can cause bent connecting rods and destroy bearings. Water comes into fuel by poor storage standards, but more frequently through cross-contamination. This is because fuel-hauling tanker trucks participate in something called switch loading. A truck could be hauling ethanol-based gasoline one day and diesel the next. Today’s Ultra Low Sulphur Diesel has a high affinity for water. When biofuels such as ethanol, even in small quantities, are mixed with ULSD, the reaction can cause accelerated corrosion of tanker tanks, as well as our onboard tanks.  The main cause of this corrosion is microbial growth. Microbes that proliferate in diesel fuel love areas where water and fuel meet. High-sulfur fuel was a natural biocide, keeping microbes in check. Since water is denser than fuel, the bottoms of the tanks are most affected. The microbes reproduce at an accelerated rate. These microbes and their byproducts then attack the metals. Over time, this can cause excessive pitting in the tanks, leading to expensive replating and unfortunate downtime. The bottom of the tank is where the fuel pickups are located. This means that the first liquid pulled from the tank will be the most water-laden. But this fact can be used to an advantage. While pulling this fuel directly into an engine would be catastrophic, the ability to strip the water first allows us to clean the fuel to a high degree if the boat is fitted with a fuel purifier. Many companies have designed various systems over the years.  A centrifuge purifier is a time-proven method of cleaning fuel. Anyone who has used one can attest to the amount of water that ends up in the catch sump, and the layers of sludge and microbes that get pinned to the spinning bowl sides at several thousands of RPMs. In personal experience, I spent 12 years on a yacht from the day it was launched. I never put a single gallon of fuel in the daytank that was not passed through the centrifuge. At each inspection, this tank was pristine with less than a cup of sludge from a tank that held well over a thousand gallons and had passed through a quarter of a million gallons in that time. When the boat was running, the purifier was running, either constantly polishing the same fuel or transferring fuel in from a holding tank.  I was fortunate that the throughput rate of the purifier in four hours matched almost exactly with the engine consumption over 12 hours at cruising speed. This meant that, if at the beginning of each watch the suction valves were switched from daytank to storage tank, by the end of a four-hour watch the daytank would be at 90% full. Then returning the suction to the daytank would allow the engines to use down to a 50% level in the daytank. This could go on for days. A bonus of the constant cleaning was that fuel filters would last for extended periods of time past what was normal before the vacuum gauges on the housings showed any restriction.  Of course, all that gook had to go somewhere, and that was into the purifier bowl. Disassembling the unit to the point of removing the bowl was usually sufficient to keep sludge in check. The discs would be dirty, but still clear and allowing flow. This allowed plenty of use until there was time to do a more thorough disassembly and cleaning. A purifier may be a large up-front expense, but can easily pay for itself in fewer filters used coupled with invaluable damage protection. JD Anson, who has more than 20 years of experience as a chief engineer on mega-yachts, is project manager at Fine Line Marine Electric (finelinemarineelectric.com) in Fort Lauderdale. Comments are welcome below. Topics: Related Articles Captain’s creativity protects engine investment Captain’s creativity protects engine investment By Capt. Rocka Romcke I don’t think any engineer would disagree that to maximize engine performance, we need to give it clean fuel, clean air and clean oil. Years Engineer’s Angle: It’s gettin’ hot in here; check your connections Engineer’s Angle: It’s gettin’ hot in here; check your connections Engineer’s Angle: by JD Anson Resistance is futile. Resistance is also dangerous when it comes to electrical connections. Some electrical resistance is by design and can be quite useful … Engineer’s Angle: Engineer key to safety on a yacht Engineer’s Angle: Engineer key to safety on a yacht Engineer’s Angle: by JD Anson Whether tied to the dock or a thousand miles from shore, the safety of boat and personnel are of paramount importance to the crew. Machinery Matters: Don’t let fuel FAME live forever Machinery Matters: Don’t let fuel FAME live forever Machinery Matters: by Larry Rumbol The words from the musical “Fame” could almost have been written as a biodiesel mantra: “Fame! We’re gonna live forever”. That’s a reality if … Engineer’s Angle: Don’t get screwed when using fasteners Engineer’s Angle: Don’t get screwed when using fasteners Engineer’s Angle: by JD Anson Time and again, cursing and screams can be heard up and down the dock from crew attempting to remove corroded fasteners. Voodoo dolls of Engineer’s Angle: Fuel for both yacht, tender attractive Engineer’s Angle: Fuel for both yacht, tender attractive Engineer’s Angle: JD Anson Whether taking the boss shopping in St. Tropez or dragging kids for miles on a banana in the Bahamas, tenders are indispensable to today’s yachting
ESSENTIALAI-STEM
Inside Philanthropy Inside Philanthropy is a news website about large philanthropic foundations and wealthy donors, created by David Callahan in 2013. The site issues its own set of awards, such as the Philanthropist of the Year award and the Boldest Philanthropic Vision award. The site has been noted for naming wealthy people who Inside Philanthropy considers as scoring relatively poorly on "relative generosity", or percentage of wealth that a person has given away, even if they still give out a comparatively large amount of money in absolute terms.
WIKI
Women in German The Coalition of Women in German, often known as WiG, is a professional organization for women engaged in the field of German studies. The organization was started in 1974. It publishes a newsletter and a yearbook, and has held an annual conference since 1976. History The organization has its roots in developments within the German and American women's movements and in growth of women's studies as an area of academic inquiry in the 1970s, developed during informal meetings of feminist Germanists at the annual conventions of the MLA and AATG. The first organizational steps were taken by volunteers from the University of Wisconsin who organized and distributed the organization's first newsletter. Early concerns of the organization were feminist critiques of teaching materials (German textbooks), feminist pedagogy, and feminist critiques of major authors' works. Textbook critique expanded to include issues of racism, classism, and heterosexism/homophobia in textbooks. The organization has been anti-hierarchical and driven by volunteers since its inception. However, in 1999, the decision was made to have a president, vice-president and steering committee. The group's name, "Women in German", is intended to be broadly inclusive. "Women" was preferred to "Feminists in German", in order to keep the organization open to all women, whether feminist or not. "German" was favored over "Germanistik", to ensure that the group remains open to the interests of Germanists not currently employed in academia and high school German teachers. Newsletter The first newsletter was prepared and distributed by a collective of students and professors at the University of Wisconsin in 1974. The newsletter was based at UW until 1981. During the early years, the newsletter included news about the women's movement in Germany. Now it primarily contains academic information, such as call for papers and conference announcements. Book reviews and bibliographies are also circulated as part of the newsletter. In fall 2003, the group began publishing the newsletter electronically, three times yearly. Back issues from 1975 up to last year's issues on WiG's website, which is listed below. Conference The organization has an annual conference for members that was first held in 1976, at Miami University in Oxford, Ohio. The first conference program was called "Feminism and German Studies: An Interdisciplinary Perspective." The original format of the conference involved unstructured discussion periods on two broad topics before and after a more traditional academic symposium, at which conference attendees presented papers. After 1977, the traditional symposium was abandoned in favor of "Arbeitsgruppen" [trans. "work groups"] to "encourage greater involvement on the part of all participants and to eliminate the typical split between 'active' papergivers and a 'passive' audience." The goal of collective work remains important, however the growing size of the conference has caused changes in the format. Since 1980, women German-language authors have been invited to each conference. Currently, the conference is a 3-day event consisting of panel talks. There is still some time allotted at every conference for open discussion. Two awards honoring scholarly achievement in German Studies are presented each year at the conference: the Dissertation Prize and the Best Article Prize. Women in German also promotes members' work annually by supporting stipends for graduate student travel, professional development, and faculty research. Yearbook The Women in German Yearbook was started in 1985 as a "response to the growing interest in Women's Studies in German literature and culture." It is a peer-reviewed academic journal that is published once yearly. Currently, it is published at the University of Nebraska Press. For many years, there has been discussion about replacing the Yearbook with or transforming it into a biannual or quarterly publication. This idea has not yet been realized, as it has been financially out of reach for the organization. The rising cost of the print publication and an increase in interest in electronic scholarship in recent years, has prompted the organization to consider transitioning to an online journal in place of the print Yearbook. Interorganizational alliances Women in German has been an "allied organization" of the MLA since 1976. The organization has held meetings or presentations at both the MLA and AATG conventions nearly every year since its inception. Women in German did not plan sessions at the AATG convention during years in which the convention was held in a state that had not ratified the ERA. Web presence Women in German has had a website since the mid-nineties. The site was initially created and hosted at the University of Massachusetts Amherst. Since 2002, the organization has had its own domain name and webspace. A group of members at the University of California, Berkeley set up a WIG-L listserv. The WiG newsletter, as mentioned above, has been electronic since 203.
WIKI
+1 vote in Programming Languages by (59.4k points) I am writing legends horizontally on a plot created using ggplot in R. How can I split the legends into two rows? 1 Answer +2 votes by (353k points) selected by   Best answer You can use the guides() function with color/fill as guide_legend() with parameter nrow=2. It will evenly split the legends into two rows. When you have used the fill parameter of ggplot for the legends, use the following code: guides(fill=guide_legend(nrow=2, byrow=TRUE)) When you have used the color parameter of ggplot for the legends, use the following code: guides(color=guide_legend(nrow=2, byrow=TRUE)) Related questions +3 votes 1 answer +3 votes 1 answer +1 vote 1 answer +1 vote 1 answer +5 votes 1 answer ...
ESSENTIALAI-STEM
Obama grabs power on handling terror suspects - Washington Times Detainees can be held by FBI and tried in civilian courts The churls and their denial and grief Naming a secretary of state The party of Obama and its bitter reckoning Although President Obama has failed to fulfill two campaign promises related to the war on terror finding a quick exit strategy in Afghanistan and closing the Guantanamo Bay prison he managed to carve himself some wiggle room when it comes to handling terror suspects. Without the usual headline-grabbing clash so prevalent on terrorism-related issues during his first three years in office, Mr. Obama late last month quietly grabbed back from Congress the power to decide whether to allow al Qaeda suspects arrested on U.S. soil to be held by the FBI and tried in civilian courts rather than immediately handed over to the military. With little fanfare, Mr. Obama issued a presidential policy directive that swept away much of a law passed in December after months of furious debate that would have given the military the right to step in, question and indefinitely hold any al Qaeda suspects caught on U.S. soil. Under the presidential order, Attorney General Eric H. Holder Jr., after consulting the defense secretary and intelligence officials, would have the right to determine where all detainees arrested in the U.S. are held and tried, instead of the military. With the support of Sen. Carl Levin, Michigan Democrat and chairman of the Senate Armed Services Committee, lawmakers delayed the must-pass defense authorization bill for months over the issue, eventually passing a bill that aimed to give the military first crack at holding suspected al Qaeda terrorists caught in the U.S. But late in December, faced with a veto threat from President Obama and time running out on last year's legislative calendar, Mr. Levin, as well as Republican Sens. John McCain of Arizona and Lindsey Graham of South Carolina, rewrote the language to give the president the ability to interpret or waive key aspects of the law. Even though Obama administration officials still indicated deep reservations about the law, the president signed it. The presidential directive undid months of work by a bipartisan group of senior lawmakers on the House and Senate military committees, but there seemed to be little outrage or reaction from those who just two months ago spent hours railing about the issue on the Senate floor. Although we have not been able to fully examine all the details of these new regulations, they raise significant concerns that will require a hearing in the Senate Armed Services Committee, Mr. McCain, Mr. Graham and Sen. Kelly Ayotte, New Hampshire Republican, said in a joint statement. We are particularly concerned that some of these regulations may contradict the intent of the detainee provisions of the National Defense Authorization Act passed by Congress last year, they wrote. When asked about the issue, Mr. Graham said he didn't want to micromanage law enforcement officials on how to do their job and was most concerned about protecting the opportunity to glean intelligence from al Qaeda suspects, which he said is jeopardized when state and local law enforcement agents read them Miranda rights. Behind the scenes, those involved say they weren't surprised that Mr. Obama used a waiver they inserted into the bill to blow a gaping hole in its intent, noting that they were forced to add the waiver language in order to strike a deal with Democrats to win passage of the overarching bill. The objective of the legislation was to get the executive branch to take seriously military custody as a legitimate option if the suspects are al Qaeda and they are involved in planning an attack, a senior Senate aide explained. Rep. Adam Smith of Washington, the ranking Democrat on the House Armed Services Committee, and Sen. Mark Udall, Colorado Democrat, are trying to tie the hands of Mr. Obama's successors and have introduced a bill that would ensure any al Qaeda member captured in the U.S. would be tried in a federal court, not handed over to the military. Copyright 2016 The Washington Times, LLC. Click here for reprint permission. Click to Read More Click to Hide Terms of Use / Privacy Policy Be the first to know No thanks
NEWS-MULTISOURCE
Hang Tuah (film) Hang Tuah (English: The Legend Of Hang Tuah) is a 1956 Singaporean Malay-language historical drama film directed by Phani Majumdar. It is the first Malay film to be fully shot in Eastman colour film. It was released in Singapore by Shaw Organisation on 28 January 1956. The film was based on the legendary Admiral Hang Tuah of Malacca and his 4 sworn brothers; Hang Jebat, Hang Kasturi, Hang Lekir and Hang Lekiu. This film received the award for 'Best Musical Score' at the 3rd Asian Film Festival in Hong Kong in 1956 and an official screening at 7th Berlin International Film Festival in 1957, where it was nominated for the Golden Bear. Plot Tuah and four of his best friends, Jebat, Kasturi, Lekir and Lekiu, while still teenagers have shown their heroism beating the pirates at sea. And as adults, as proposed by Tuah, they went to Mount Ledang to study with Tok Guru Adi. As a student, Tuah met a native girl, Melor. In his meeting with Hang Tuah, Melor had shown a deep affection towards Hang Tuah and vice versa. After completing his studies and with sufficient knowledge, Tuah and his four friends return to Malacca and with a difficult parting done, Tuah promises to wait for Melor if she comes looking for him in Malacca later. In Malacca, the five friends save the life of the Bendahara Dato' Tun Perak from an angry mob when he was on his way for an audience with Sultan Mansur Shah - the ruler of Malacca. Following the courage shown in front of the eyes of the Tun Perak himself, Hang Tuah and his four comrades are appointed by the Sultan as warriors, garnering envy from some state dignitaries including Tun Ali. Shortly after the appointment, the Sultan of Malacca leaves for Majapahit to marry Raden Mas Ayu and he is accompanied by Hang Tuah and his friends. There, in a ceremony, their strength is challenged by a renowned warrior named Taming Sari. Having fought tooth and nail with Taming Sari, Hang Tuah demonstrated his expertise, proving his weapon can also beat Taming Sari's when Hang Tuah knew Taming Sari's strength lies in his weapon. With Taming Sari's death, his magic keris is presented to Hang Tuah which increases the latter's power and strength. After some time later, Sultan Mansur Shah expresses his disappointment in being unable to marry Tun Teja as she was engaged to Megat Panji Alam. And to redeem her for the Sultan, Hang Tuah secretly goes to Pahang with the aim of bringing Tun Teja back. As Hang Tuah leaves for Malacca, Melor comes in search of him. She runs into Tun Ali and Pateh Karma Wijaya. However, she is spared from their grasps by tricking them into thinking she is a handmaiden. In Pahang, with Hang Tuah ruse succeeding in courting Tun Tijah, she breaks off the marriage to Megat Panji Alam. But on the ship, Hang Tuah reveals the fact that he came to Pahang just to bring Tun Teja to Malacca to marry the Sultan. Tun Teja is disappointed yet accepts the situation while willing to forgo her love to Hang Tuah. Hang Tuah is caught between his loyalty to the Sultan and his love for Melor, since the latter has become a palace handmaiden and belongs to the Sultan. He finally agrees to meet Melor after persuaded by Dang Rani (on the command of Tun Ali and Pateh Karma Wijaya) This meeting consequently was witnessed by the Sultan, just as Tun Ali and Pateh Karma Wijaya had planned. The Sultan orders for the execution of Hang Tuah as being in close relations to a palace handmaiden is an act of treason according to palace laws. With Hang Tuah gone, his sacred Taming Sari kris is presented to the Sultan who then awards it to Hang Jebat, now assigned to take Tuah's place. However, Jebat considers the Sultan's punishment as unfair given that there is not enough proof to support claims of Tuah's wrongdoing. Thus, he vows to avenge his best friend. In a ceremony celebrating the birthday of Pateh Karma Wijaya, Melor decides to avenge Tuah's death by killing Pateh Karma Wijaya with a kerambit hidden in her hair bun during a dance performed for him. However, Melor is also killed by a spear thrown by a guard. Hang Jebat goes ahead with plans to avenge the death of Hang Tuah even with the opposition of Hang Kasturi, Hang Lekir and Hang Lekiu. He goes on a rampage in the Sultan's palace causing many casualties. Due to that, the Sultan of Malacca had to flee leaving the castle and settle in the home of Bendahara. Sultan of Melaka voices his anger and shame as not one of his ministers and admirals dared to stand up to Hang Jebat. The Sultan then expresses his regret on ordering the execution of Hang Tuah as he may be the only one able to match Jebat's skills in combat. Upon hearing this, Tun Perak exposes the secret that he did not kill Hang Tuah as ordered to him but instead kept Tuah hidden in a prison cell. Immediately, the sultan ordered Hang Tuah be brought to him to be pardoned. Hang Tuah was brought by the Bendahara for an audience with the Sultan. Hang Tuah requests the kris of Taming Sari be returned to him so he could kill Jebat with it. The sultan regretfully replies that the keris is in Jebat's hands. The Sultan offers his inheritance kris to Hang Tuah instead. Tuah humbly declines, telling the Sultan that with the heirloom kris he will not be able to hurt Jebat wielding the magical Taming Sari, much less kill him. Tuah then proceeds to the Sultan's palace where Jebat is resting. Standing in front of the palace, Tuah challenges Jebat to a fight much to the latter's surprise. Trying to persuade his best friend, Jebat swears that he is only doing this out of loyalty to Tuah and avenge the mistreatment given to him by the Sultan. But Tuah is not to be dissuaded and insists on killing Jebat. Reluctantly, Jebat allows his once good friend to come up to the palace and fight with him. As the fight goes on Tuah is unable to hurt Jebat with the Taming Sari in the latter's possession. Seeing how Tuah is so determined to kill him, Jebat willingly trades their kerises with Tuah and resumes their fight. This time, Hang Tuah is able to stab Hang Jebat who then dies in Tuah's arms. After this event, the Sultan awards Hang Tuah with the title of Laksamana. As the whole of Malacca celebrates Tuah's inauguration, Tuah sits at home saddened about both Melor and Jebat meeting their demise for avenging him while he is still alive. Hang Tuah then questions himself on whether he is right for his utmost loyalty to the Sultan or is Jebat right for standing up to an unjust Sultan. Cast * P. Ramlee as Hang Tuah * Ahmad Mahmud as Hang Jebat * Saadiah as Melor * Zaiton as Tun Teja * Haji Mahadi as Sultan Mansur Syah * Daeng Idris as Dato' Bendahara Tun Perak * Yusof Latiff as Tun Mat * Nordin Ahmad as Hang Kasturi * S. Shamsuddin as Hang Lekir * Aziz Sattar as Hang Lekiu * Hashim Nur as Adiputra * Siti Tanjung Perak as Dang Merduai * Mariani as Dang Rani * Saamah as Dang Ratna * Hashimah Yon as Javanese Dancer * Mustarjo as King Of Majapahit * Rahman Rahmat as Hang Tuah, during Childhood * S. Sudarmaji as Ketua Orang Jakun * Udo Omar as Tun Ali * Malik Sutan Muda as Taming Sari * Mustapha Maarof as Tun Zainal * S. Kadarisman as Pateh Karma Wijaya * Salleh Kamil as Orang Mengamuk 1 * A. Rahim as Orang Mengamuk 2 * Omar Suwita as Orang Mengamuk 3 * Ahmad C as Orang Mengamuk 4 * Nyak Osman * H. M. Busra * Mat Sentol as Pahang Palace Dancer Songs * Berkorban Apa Saja, performed by P. Ramlee * Joget Tari Lenggang Reception Hang Tuah was released in many countries outside of Malaya, and won awards in Hong Kong. In Malaya, Hang Tuah faced disapproval from Malay activists because of what they perceived as pro-colonial sentiments in the film. The plot’s emphasis on its hero’s “blind loyalty” was criticized, as was its Indian and non-Muslim director, Phani Majumdar. Hang Tuah was not seen as Malay enough, because of what were perceived as particularly Indian elements to the film – particularly its musical sequences. Famous quotes from the film * "Raja Adil Raja Disembah, Raja Zalim Raja Disanggah" ("A fair king is a ruler to be obeyed, a cruel king is a despot to be revolted") * "Takkan Melayu Hilang di Dunia" ("Never shall the Malay race vanish from the face of the Earth") - this quote would later become a famous rallying cry for Malay nationalism.
WIKI
-- Agrium Says Investors ‘Strongly Support’ Existing Structure Agrium Inc. (AGU) , the agricultural retailer and fertilizer producer, said some of its largest shareholders are in favor of retaining the company’s existing corporate structure. Agrium, based in Calgary, began talking in May with activist shareholder Jana Partners LLC about spinning off its network of farming supply stores and to make other changes that may add $50 of value a share. “Agrium has recently met with approximately 80 percent of its top 50 active shareholders,” Richard Downey, a spokesman for Agrium, said today in an e-mail. “Over 90 percent have indicated strong support for Agrium’s integrated strategy, with virtually no support for the proposed spin out of retail.” Jana, Agrium’s largest shareholder, is proposing a tax-free separation of retail operations from its wholesale fertilizer arm. It’s also asking the Canadian company’s management to boost capital returns, improve disclosure and reduce costs and working capital, Jana co-founder Barry Rosenstein said Oct. 1 in an investor presentation . Downey’s comments may suggest New York-based Jana doesn’t have sufficient support from Agrium’s institutional shareholders for a spinoff, John Hughes, a Toronto-based analyst at Desjardins Securities Inc., said today by telephone. “If the institutional asset base is in favor of keeping Agrium’s existing structure, it is much less likely that Jana can round up enough retail investors to get the spinoff done,” Hughes said. Jana questioned Downey’s figures. “Rather than putting out puffed up, unverifiable claims about shareholder support, Agrium should be making a case on the merits and explain why it consistently underperformed its peer-weighted average until we began publicly engaging with them and what it intends to do about it,” Rosenstein said in an e-mailed statement today. Agrium rose 1.1 percent to C$103.33 at the close in Toronto. The shares have gained 51 percent this year. To contact the reporter on this story: Christopher Donville in Vancouver at cjdonville@bloomberg.net To contact the editor responsible for this story: Simon Casey at scasey4@bloomberg.net
NEWS-MULTISOURCE
Wikipedia:Reference desk/Archives/Language/2008 August 8 = August 8 = mandarin aspiration Hi. In what regional variation of Mandarin is the aspiration strongly realised as /R/ or /X/ instead of /h/? eg /tʰuɕukwan/ --> /tXuɕukwan/ A native speaker of Chinese who is helping me learn sometimes speaks like this. I'm wondering how widespread is this pronunciation? Thanks - Ian —Preceding unsigned comment added by Duomillia (talk • contribs) 04:31, 8 August 2008 (UTC) * Does s/he speak this way when not teaching you? I'm just wondering if it's pedagogic exaggeration. kwami (talk) 17:54, 8 August 2008 (UTC) * Hm, in Korean is realized as quite often. I wonder if it's just the back vowel influencing the obstruent. --Kjoonlee 01:24, 9 August 2008 (UTC) * " in Korean is realized as "? So, the vowel completely disappears (or is realized as x:)? Wouldn't that be the obstruent influencing the back vowel?--ChokinBako (talk) 15:32, 11 August 2008 (UTC) * Well, the doesn't change into except before back vowels. The back vowel becomes devoiced. --Kjoonlee 02:46, 13 August 2008 (UTC) Sorry, I don't understand /tʰuɕukwan/ --> /tXuɕukwan/ and can't find any translation. What word or character relates to the example? DOR (HK) (talk) 01:21, 9 August 2008 (UTC) * I believe it's 図書館, 'tushuguan', 'library'. ChokinBako (talk) 16:36, 9 August 2008 (UTC) * That's Japanese (図 is a Kanji, not found in either simplified or traditional Chinese). In Chinese it's 图书馆/圖書館. --antilivedT 11:48, 10 August 2008 (UTC) * I knew it was Japanese. I just couldn't get my PC to let me type 圖書館. I was hoping someone would figure it out, as you did.--ChokinBako (talk) 16:44, 10 August 2008 (UTC) * I've heard it before, mostly from northern Chinese (Beijing area). It's a free variation phonological alternation. The sound you're hearing is an fricative release. It's actually a phonological feature in some languages - for example Lakhota. Steewi (talk) 12:14, 10 August 2008 (UTC) * The reason I didn't answer the OP's original question was because it sort of threw me a bit. I lived in Tianjin, near Beijing, and I heard it all the time, along with the so-called standard version, and at the time thought nothing of it, or at least that they were interchangeable. Is it different in other areas? ChokinBako (talk) 16:44, 10 August 2008 (UTC) * It's less heard as you go further south, but quite acceptable. It's also more prevalent in men than women. Steewi (talk) 04:04, 11 August 2008 (UTC) Biblical quotation Where does this saying come from Thank you:- What has God Wrought? Thank you Shirley Briggs —Preceding unsigned comment added by <IP_ADDRESS> (talk) 09:48, 8 August 2008 (UTC) * Numbers 23:23 (King James Version), and it's "What hath God wrought?" Deor (talk) 12:34, 8 August 2008 (UTC) * Quoting from the bible is one way to telegraph your message. OtherDave (talk) 14:35, 8 August 2008 (UTC) * And misquoting, even Morse-so. :-) StuRat (talk) 15:51, 8 August 2008 (UTC) * Dash it all, Stu. Dot is not nice! Express some reMorse. Wanderer57 (talk) 17:10, 8 August 2008 (UTC) How can we be sure that the original should be translated as "hath," rather than "has" ? DOR (HK) (talk) 01:22, 9 August 2008 (UTC) * I don't see the relevance of your question. The OP was seeking the origin of an English sentence—familiar from Marconi's Morse's use of it—not an elucidation of the original Hebrew, and Marconi Morse used the KJV version. (The heading of this section was my addition, since the OP had just appended the question to the section above.) You're quite welcome to use "has" if you want, but I'd advise replacing the obsolete participle of work as well. Deor (talk) 02:09, 9 August 2008 (UTC) * I agree with Deor; this use of "wrought" is ironic. OtherDave (talk) 11:52, 9 August 2008 (UTC) * (droll, very droll). But getting serious for a moment, are you fine fellows suggesting it would be "What God has worked"? That sounds rather odd to my antipodean ears. I'd more readily accept "What God has done", which involves replacing the verb altogether. -- JackofOz (talk) 22:05, 9 August 2008 (UTC) * The Authorized King James Version was published in 1611, and its eponym was King James I of England, who ruled in England from 1603 to 1625. His predecessor was Queen Elizabeth I of England, who reigned from 1558 to 1603, and he was contemporaneous with William Shakespeare, who lived from 1564 to 1616. Shakespeare's writings and the Authorized King James Version were produced during the period of Early Modern English, when some inflected forms of verbs differed from the forms used in 2008. * According to the Bible (Numbers chapters 22, 23, and 24), when the Israelites were about to enter the Promised Land, Balak king of Moab asked Balaam to curse them, but he blessed them instead and on more than one occasion. On one of those occasions, the question under discussion is what he said that people would ask concerning the loyal God of the faithful Israelites. * Twelve English versions of this verse are at Numbers 23:23 "For there is no omen against Jacob, Nor is there; and two Greek versions, nine Hebrew versions, and one Latin version are at Numbers 23:23 Greek, Hebrew, Latin. * The article "American Morse code" (under History) says the following: "The first public message 'What hath God wrought' was sent on May 24, 1844, by Morse in Washington to Alfred Vail at the B&O Railroad 'outer depot' (now the B&O railroad museum) in Baltimore, Maryland." * -- Wavelength (talk) 01:07, 10 August 2008 (UTC) * The message was actually "What hath God wrought?", as can be seen from this photo. Judging from http://bible.cc/numbers/23-23.htm, the phrase in the Bible is an exclamation rather than a question. --Bowlhover (talk) 05:49, 10 August 2008 (UTC) * Thank you for pointing that out; I overlooked the distinction. However, now I am puzzled by what looks like a colon at the end of the verse in Hebrew (http://biblos.com/numbers/23-23.htm), whereas the article on Hebrew punctuation seems to indicate that such a character is the equivalent of a period. * -- Wavelength (talk) 17:42, 10 August 2008 (UTC) Consensuality? Does the word "consensuality" exist? If not, could someone offer me a substitute in the following sentence: "When this is repeated by other sources, it gives an impression of consensuality." Thanks. Acceptable (talk) 19:52, 8 August 2008 (UTC) * A guess: consensus? Zain Ebrahim (talk) 20:49, 8 August 2008 (UTC) * an adjective for the giving of consent if you ask meMY♥IN chile 21:15, 8 August 2008 (UTC) * For the presciptionists, Merriam-Webster's Third International Dictionary Unabridged does not recognize consensuality as a valid word. As for an alternative, go with consensus as suggested by Zain Ebrahim, because etymologically, "consenual" is just the Latin consenus plus the English morpheme -al.--El aprendelenguas (talk) 22:56, 8 August 2008 (UTC) * I've used it as a word, without giving much thought to whether it 'exists' or not, but I don' think it's a commonly used word. When I've used it, it was referring to Myheartinchile's definition. Steewi (talk) 12:16, 10 August 2008 (UTC) what's this say? Faroese translation Friðarbogin[1] var fyrsta føroyska felagið, ið tókst við evnum viðvíkjandi samkyndum og tvíkyndum í Føroyum. Friðarbogin var settur á stovn 17. oktober 2003. Aðalendamálið hjá felagnum var at arbeiða fyri politiskari, mentanarligari og sosialari javnvág fyri sam- og tvíkynd í Føroyum. Upprunanavnið hjá felagnum var Ælabogin, men broyttist til Friðarbogin á fyrsta aðalfundinum hjá felagnum í januar 2004. Í november 2004 var Friðarbogin við til at stovna ANSO - sum er felagsskapurin hjá STT studentafeløgum í Norðurlondum. [2] [3] 22-27. august 2005 var fyrsta ráðstevnan hjá ANSO, Canaries in the Coal Mines, hildin í Tórshavn. Henda norðurlendska LGBT[4] ráðstevnan var fyriskipað av ANSO, Friðarboganum og felagnum Bogin. Ráðstevnan endaði við fyrstu skrúðgonguni fyri STT (sam-, tví- og transkynd) í Føroyum. Røðarar til ráðstevnuna vóru millum annað: Judith Halberstam (US) [5], Jens Rydström (SE) [6], David Megathlin (US) [7], Arthur Thiry (SE) [8], Britta Swenson (SE) og Don Kulic (SE)[9]. 17-19. august 2007 fekk Friðarbogin vitjan av ANSO, STT ráðstevnan (sam-, tví- og transkynd) var fyriskipað undir heitinum "Hevur kærleiki kyn?" Tað er Friðarbogin saman við ANSO, ið skipar fyri festivalinum. [rætta] Dagfestingar hjá Friðarboganum * 17. oktober 2003 : Friðarbogin stovnsettur * 22. august 2005 : ráðstevnan "Canaries in the Coal Mines" sett * 27. august 2005 : fyrsta skrúðgongan, Føroya Pride 2005 * 15. desember 2007 : §266b [10] * 17. august 2007 : ráðstevnan "Hevur kærleiki kyn?" sett * 18. august 2007 : næsta skrúðgongan, Føroya Pride 2007 * 2008 : Føroya Pride 2008 thanksMY♥IN chile 20:26, 8 August 2008 (UTC) * "Friðarbogin was the first Faroese association to deal with issues regarding homosexual and bisexual people in the Faroe Islands. Friðarbogin was established October 17, 2003. The main goal of the association was to work for political, educational and social equality for homosexual and bisexual people in the Faroe Islands. The original name of the association was Ælabogin [The Rainbow] but it was changed to Friðarbogin [The Peacebow] at the first general assembly of the association in January 2004." etc. etc. Do you really need the whole thing? Haukur (talk) 08:25, 9 August 2008 (UTC) Italian words for money: "denaro" or "soldi" Is any of them more likely to be used in certain situations than the other? --<IP_ADDRESS> (talk) 20:51, 8 August 2008 (UTC) * Hmm, for what it's worth, on Italian wikipedia denaro directs you to the Italian version of the English wikipedia's article on "money," and soldi to "currency." This Italian dictionary doesn't help, defining soldi as "money, wealth." FWIW I used a "Learn Italian while you drive" program (not saying it did any good), and in the tourism phrases it had me repeat, they always used soldi to mean "money" and never denaro--El aprendelenguas (talk) 22:46, 8 August 2008 (UTC) * I think denaro is not so used any more. It is the kind of word you would expect only from your grandmother. I don't remember ever hearing denaro while talking to young people. --Lgriot (talk) 02:32, 9 August 2008 (UTC) * Denaro and soldi both translate as money. Soldi is the common word used in general speech. Soldi is usually used in the plural (soldo - is only used in the sense of "spare me a dime" - reather than "give me your money"). Denaro usually used in the singular, is a more official word - used in finance etc. (The plural "denari" refers to the ancient Roman coinage, from which the word derives) Giano (talk) 08:33, 9 August 2008 (UTC) * PS: Before someone asks, "moneta" refers to coinage and bank notes (carta moneta) etc. Giano (talk) 08:48, 9 August 2008 (UTC) * OK, sorry, I obviously never had much to deal with official documents in Italy. Go with Giano's answer, not mine. --Lgriot (talk) 14:35, 9 August 2008 (UTC) * The Italian Wikipedia has an article titled "Denaro" (it:Denaro), which is the second result from my Google search for "denaro" in any language. It is linked bidirectionally with the English Wikipedia article "Money" (Money). A search for "soldi" on Italian Wikipedia is redirected to the article "Valuta" (it:Valuta), which is linked bidirectionally with the English Wikipedia article "Currency" (Currency). * My Google search for "denaro" in Italian reported 6,700,000 results, and my Google search for "soldi" in Italian reported 13,700,000 results. See also the Wiktionary article "money" (wikt:money), and the expandable lists of translations; and the Wikizionario article "denaro" (it:wikt:denaro). * There is a recent report (Saturday, 9 August, 2008) in Il Messaggero, I trasferimenti di denaro - Il Messaggero (Transfers of Money). * -- Wavelength (talk) 17:31, 9 August 2008 (UTC) * The origins of "denaro" and "soldi" are explained at Denarius and Solidus (coin) respectively. Historical information is also available from the Online Etymology Dictionary (Online Etymology Dictionary). * -- Wavelength (talk) 18:20, 9 August 2008 (UTC) * My Google search for "denaro soldi usage" led me to Denaro vs Moneta vs Soldi - WordReference Forums. * -- Wavelength (talk) 19:27, 9 August 2008 (UTC) "Lang may yir lum reek wi ither fowk's coal" Is the title correctly written for a traditional Scots-Gaelic phrase? I understand that it means something along the lines of "Long may your chimney smoke with other folk's coal" but when would it be used? (Is it congratulatory, a wish for happiness, or wealth, or stability?) What is the correct pronunciation? Thanks for any help you can provide. ៛ Bielle (talk) 22:13, 8 August 2008 (UTC) * It's not Gaelic, but Scots. I've never heard the full sentence you quote, only the first five words, and there isn't really a standard spelling for Scots (though Scots leid describes one), but it seems to be a reasonable way of writing the sentence. I've no idea when, if ever, it would seriously be used. --ColinFine (talk) 23:06, 8 August 2008 (UTC) * I too have only heard the first five words - it's sometimes used as a toast. At a guess (and I'd stress that it's a guess) I'd say it would be highly appropriate as a salutation when first-footing. Grutness...wha? 01:44, 9 August 2008 (UTC) * I'd assume that "wi ither fowk's coal" is a humorous expansion, implying that the addressee will be doubly blessed by not having to pay for the coal. (Not that the Scots have a reputation for tightfistedness!) Deor (talk) 01:56, 9 August 2008 (UTC) * I think all of the above is right on track. I've heard both versions. The first part is more commonly used in my experience. This may be clear already, but the point of "Lang may yir lum reek" is to wish someone a long and comfortable life. Wanderer57 (talk) 02:05, 9 August 2008 (UTC) * Thank you all. Someone wants to use it in a wedding toast where the groom is a long way from his Scottish home. I was checking to see if it was appropriate. We will stick with the short version as there is less ambiguity in the greeting. Your help is appreciated. ៛ Bielle (talk) 02:30, 9 August 2008 (UTC) * You might find a place to use this lesser-known poem by Burns: * Ithers seek they ken na what, * Features, carriage, and a' that; * Gie me love in her I court, * Love to love maks a' the sport. * Let love sparkle in her e'e; * Let her lo'e nae man but me; * That's the tocher-gude I prize, * There the luver's treasure lies. * OtherDave (talk) 12:00, 9 August 2008 (UTC) siberian/north russian what ever happened to the siberian/north russian wikipedia?MY♥IN chile 22:47, 8 August 2008 (UTC) * It was closed because it was determined, I believe by vote on meta wikimedia, that it was a propaganda tool and not a real language. Many of the words used in the language were simply made up by the authors of the wikipedia. Additionally, many of the translations were awful: something about prodigious use of the Russian word for "fuck" in translating Shakespeare works, and the sysops banning anyone who disagreed with their point of view. <IP_ADDRESS> (talk) 22:51, 8 August 2008 (UTC) Such matters are determined on http://meta.wikimedia.org/ ; I'm sure there are extensive discussions of the subject there... AnonMoos (talk) 23:05, 8 August 2008 (UTC) The Siberian Wikipedia was made up by a crank who invented a "Siberian dialect" of the Russian language. He recruited his classmates to the cause, and they opened a separate wikipedia where they had fun writing pages consisting of Russian swear-words. Can you imagine a separate wikipedia project for English profanities? It was hard to persuade any Russian speaker to take Wikipedia seriously as long as we had a curse-words wikipedia by our side. This shameful page in Wikimedia's history highlights the need to show more restraint when opening new wikipedias in obscure dialects which few people can realistically monitor. --Ghirla-трёп- 18:28, 10 August 2008 (UTC)
WIKI
If you are wondering what one-click rooting tool can root your device, your best bet is the KingRoot tool. Made out of China, the KingRoot team is always updating their files to include more rooting methods for more devices. We all know how popular flashing SuperSU is from a custom recovery image, and how well-known the CF-Auto-Root tool is for Samsung devices that is made by the same developer. But no one-click rooting tool comes close to matching how many devices it can root as KingRoot. The KingRoot tool can root most devices from Samsung, Huawei, Google, LG, and HTC mobile devices. Download KingRoot Android 5.0.1 APK For Windows PC Installation Download the KingRoot for Windows PC file from the KingRoot website that works for the Android 5.0.1 Lollipop software update and then come back and continues using this guide. To download the file, just click on the big blue button that says “Download” for Windows” on it. Sometimes when people click the blue button for downloading the file, it doesn’t work. If that happens to you during your time of visit, just click on the blue link that says “Click here to Restart the download” and it will begin downloading above the taskbar on the computer this time. (Note that the taskbar is always visible when you are using a version of the Windows 10 operating system but the file downloading above it is not. If you were to minimize the browser window, for example, then that might be the reason why you do not see the file. You need to keep the web browser open to be able to see the file downloading above the taskbar.) Wait for the downloaded file to show up as the KingRoot executable that you can click which happens after the download is complete and then click on the file, so the beginning of the KingRoot setup wizard opens up on the computer. The first thing you see from the setup wizard is the terms and conditions screen with a checkmark in the bottom box and a grayed out button at the bottom of the screen. That’s because you need to move the checkmark to the top box and then the grayed out button is available to click. So, move the checkmark to the top box and then click on the button that can be found on the left-hand side at the bottom of the screen. (The other button to the right of that button is for exiting the setup wizard. If you accidentally click that, then open the Downloads folder to find your file and then run the setup wizard once again and work your way back to this point.) Once you advance to the next step, you then get a box with a checkmark on it. That box is asking if you would like to have a KingRoot desktop icon created during the installation of the tool. If you don’t want to have a desktop icon created, then you need to deselect this box. After making your selection, click on the middle button that is available at the bottom of the screen. (The button to the left of center is for going back to the previous screen, and the button to the right is for exiting the setup wizard.)  Click on the middle button once again to advance to the following screen. The KingRoot tool is now being installed on the computer. It will only take a few moments for the progress bar featured in green to reach the other side of the computer’s display. Once that is complete, the screen automatically changes for you. You will see another checkmark inside a box from the next screen. That box is there to allow you to choose if you want the KingRoot tool to launch or not after you shut down the setup wizard. Click on the exit button at the bottom of the screen when you are ready to leave the setup wizard. Those of you who left the box checkmarked in the final screen will have the KingRoot tool automatically open up on the desktop. Everyone else needs to click on the KingRoot application that is on the desktop or inside the downloads folder. Once the KingRoot tool is open, it’s time to connect your Android device to the computer with the USB cable. Before making the connection, make sure that your device has the USB Debugging Mode turned on from the settings menu so that KingRoot can detect your device. Otherwise, the Android device is unable to get rooted with the tool when you try. With the device connected and in USB Debugging Mode, click on the big blue button that is available from the KingRoot tool’s user interface and then the rooting begins. The KingRoot Android 5.0.1 Lollipop for Windows PC installation file is now downloaded and installed on the computer. At first, it will try to find out if your device can be rooted with the tool or not. You just need to wait until it starts rooting or says it cannot be rooted. If your device is being rooted, just wait until you get a pass or success message on the screen and you can see a large green tick. That’s when you know that you can now unplug the Android device from the computer and the USB cable. Having the KingRoot tool installed on the Android device is all about what root applications can now be installed. There is no difference in the number of root apps that can run on your Android operating system after rooting it with KingRoot in comparison to using something else like flashing SuperSU from a custom recovery image like Team Win’s TWRP Recovery. Hundreds of root applications are being used every day and are critical to a person’s happiness when using the Android operating system. It’s not hard to find out why that is when you start using them. Lots of the root apps are not for fun but rather are more practical in nature and offer people something as close as it can be to being a need before crossing over into really being a need for a person. If there’s one common annoyance with rooting the Android operating system, it’s that you need to do lots of research and understand rooting very well before it becomes easy to deal with because Google is not doing anything to show off these root applications. The Google Play Store does host most of these root applications, but it does not showcase them or explain them. So, even though you download them from the same Google Play Store that you already know and use often, you need to know the names of the root apps before you can find them just because of the nature of how the Google Play Store works. If you are looking for a root applications and it is not available om the Google Play Store, it might be because Google chose to ban it because it crosses what thy thought would be something they were willing to promote. In those times, you can typically find them available from the XDA-Developers web forum. If you are one of those people who are relatively new to rooting the Android operating system, then you can read our article on what the best root applications for Android devices are and then find out the ones that you want to use. Our article also provides the download links to the root applications a lot of the time, so you don’t need to source them yourselves.
ESSENTIALAI-STEM
Tropical Storm Karen speeds up after soaking Puerto Rico and the Virgin Islands (CNN)Tropical Storm Karen drenched south-central Puerto Rico, causing a river to wash away a bridge and cutting off at least 15 families, the National Weather Service said. Even as Karen moves away from the US territory, it'll bring heavy rainfall, strong thunderstorms and flooding threats through Wednesday, forecasters said. "This could be enough to bring down trees, and the infrastructure for power is still weak after Maria, so I anticipate power outages," CNN meteorologist Michael Guy said. "Strong rip currents will also be a danger for the next few days." By Wednesday afternoon, the center of Karen was 330 miles north-northeast of San Juan. The storm weakened and had sustained winds up to 40 mph as it moved north at 14 mph. "On the forecast track, the center of Karen will continue to move farther away from Puerto Rico and the Virgin Islands today through Thursday," though rains over those places are expected to continue, the National Hurricane Center said. After leaving Puerto Rico, Karen is forecast to remain a tropical storm in the Atlantic for the next few days, not directly impacting land. Longer term, its direction and longevity is uncertain. By storm's end, Karen will generally have dropped up to 6 inches of rain in Puerto Rico, with some isolated areas getting up to 8 inches. "These rains may cause flash flooding and mudslides, especially in mountainous areas," the hurricane center said. The area of Coamo, where the bridge was destroyed, was inaccessible Tuesday night, said Gabriel Lojero, a meteorologist for the service in the capital of San Juan. Puerto Rico Gov. Wanda Vázquez Garced announced a price freeze order that covers gas, diesel and other essential products. "We emphasize to the citizens to prepare with caution and evaluate if they need to go to a shelter," she tweeted Monday. School is suspended Wednesday, Vázquez announced. Puerto Rico's Department of Education said on Monday that it's "taking the necessary measures" to guarantee security during the storm. CNN's Judson Jones, Nicole Chavez and Jason Hanna contributed to this report.
NEWS-MULTISOURCE
Talk:Pantops Mountain location in albemarle county, questionable citation The mountain is in Albemarle County, not the city of Charlottesville. This reference: was used to support the city location, but refers to a spring, not a mountain, and otherwise isn't super-clear that's what's being said. I removed it. Of course I'd love to have a real source for this, but, well,... Not sure the coord template parameters are exactly at the peak, but, they weren't wrong enough to change. -- B.S. Lawrence (talk) 17:01, 12 June 2014 (UTC)
WIKI
Heart Low Blood Pressure: Causes, Symptoms, and Treatment Options heart low blood pressure Low blood pressure, also known as hypotension, is a condition that occurs when the blood pressure in the arteries is lower than normal. Blood pressure is the force of blood against the walls of the arteries as the heart pumps it around the body. When blood pressure is too low, the heart, brain, and other vital organs may not receive enough blood and oxygen to function properly. There are several causes of low blood pressure, including heart problems, endocrine disorders, dehydration, and certain medications. Heart-related concerns are often a cause of low blood pressure. A heart attack, heart failure, heart valve disease, and an extremely low heart rate (bradycardia) can all cause blood pressure to drop. Additionally, some people may experience low blood pressure as a result of a sudden change in body position, such as standing up too quickly. Understanding low blood pressure is important for those who are at risk of developing this condition. Early diagnosis and treatment can help prevent complications and improve quality of life. Treatment and management of low blood pressure often involves lifestyle changes, such as increasing salt and fluid intake, wearing compression stockings, and avoiding triggers that can cause blood pressure to drop. In some cases, medication may be necessary to help regulate blood pressure. Key Takeaways • Low blood pressure occurs when the blood pressure in the arteries is lower than normal. • Heart-related concerns are often a cause of low blood pressure. • Treatment and management of low blood pressure often involves lifestyle changes and medication. Understanding Low Blood Pressure A heart with an arrow pointing downwards, surrounded by a blood pressure cuff and a low reading on a monitor Definition and Classification Low blood pressure, also known as hypotension, is a condition where the blood pressure reading is lower than normal. A blood pressure reading is considered low if it is less than 90/60 mmHg. The systolic pressure, which is the top number, represents the pressure in the arteries when the heart beats. The diastolic pressure, which is the bottom number, represents the pressure in the arteries when the heart is at rest between beats. There are different types of low blood pressure, including orthostatic hypotension, postural hypotension, and postprandial hypotension. Orthostatic hypotension is a sudden drop in blood pressure that occurs when a person stands up from a sitting or lying position. Postural hypotension is a type of orthostatic hypotension that occurs when a person stands up after sitting or lying down for a long period. Postprandial hypotension is a drop in blood pressure that occurs after eating. Causes of Low Blood Pressure There are several causes of low blood pressure, including dehydration, heart problems, endocrine problems, and neurological disorders. Some medications can also cause low blood pressure as a side effect. Dehydration can cause low blood pressure because it reduces the volume of blood in the body. Heart problems, such as heart failure, can cause low blood pressure because the heart is not pumping enough blood. Endocrine problems, such as thyroid disorders and Addison’s disease, can cause low blood pressure because they affect the hormones that regulate blood pressure. Neurological disorders, such as Parkinson’s disease and multiple system atrophy, can cause low blood pressure because they affect the nervous system. Symptoms and Diagnosis The symptoms of low blood pressure can vary depending on the cause and severity of the condition. Some common symptoms of low blood pressure include dizziness, lightheadedness, fainting, fatigue, blurred vision, nausea, and confusion. In severe cases, low blood pressure can cause shock, which is a life-threatening condition. Diagnosing low blood pressure involves measuring the blood pressure reading and identifying any underlying causes. A blood pressure reading is taken using a sphygmomanometer, which is a device that measures the pressure in the arteries. If a person has low blood pressure, the doctor may order additional tests, such as blood tests, electrocardiogram (ECG), or echocardiogram, to identify any underlying causes. It is important to note that low blood pressure can be a sign of an underlying health condition, especially when it drops suddenly or occurs with symptoms. If a person experiences symptoms of low blood pressure, they should seek medical attention. Disclaimer: The information provided in this section is for educational purposes only and is not intended to be a substitute for professional medical advice, diagnosis, or treatment. Always seek the advice of a qualified healthcare provider with any questions you may have regarding a medical condition. A heart monitor displays low blood pressure readings Heart Rate and Blood Pressure The heart rate and blood pressure are closely related to each other. When the heart rate is too slow, it can cause a drop in blood pressure, leading to hypotension. Bradycardia, which is an abnormally low heart rate, can cause the heart to pump less blood, which in turn can lead to low blood pressure. Arrhythmia, which is an irregular heartbeat, can also affect the heart rate and blood pressure. In some cases, it can cause the heart to beat too slowly, leading to hypotension. It is important to monitor the heart rate and blood pressure regularly to ensure that they are within healthy ranges. Heart Conditions Leading to Hypotension Several heart conditions can lead to hypotension. Heart valve disease can cause the valves in the heart to malfunction, leading to a decrease in cardiac output. This can result in a drop in blood pressure. Heart failure, which occurs when the heart is unable to pump enough blood to meet the body’s needs, can also cause hypotension. A heart attack can also lead to hypotension. During a heart attack, the blood flow to the heart is restricted, which can cause damage to the heart muscle. This can result in a decrease in cardiac output, leading to low blood pressure. It is important to seek medical attention if you experience any symptoms of hypotension, such as dizziness, lightheadedness, or fainting. Hypotension can be a sign of an underlying medical condition, and prompt treatment is essential to prevent complications. Disclaimer: The information provided in this section is for educational purposes only and should not be used as a substitute for professional medical advice. If you have any concerns about your heart health, please consult a qualified healthcare provider. Treatment and Management A doctor adjusts medication for low blood pressure Immediate Interventions Low blood pressure can be treated using a variety of immediate interventions. The most effective method is to increase blood volume by drinking fluids or receiving intravenous fluids. Compression stockings may also be used to increase blood pressure by reducing the pooling of blood in the legs and increasing venous return. If dehydration is the underlying cause of low blood pressure, rehydration is essential. In severe cases, medications such as vasopressors may be used to increase blood pressure. Long-Term Management Long-term management of low blood pressure involves treating the underlying cause. For example, if the low blood pressure is due to anemia, treatment with iron or folate supplements may be necessary. If the low blood pressure is due to heart failure, medications such as beta blockers or diuretics may be used to reduce fluid buildup and improve heart function. It is important to note that medications should only be used under the guidance of a healthcare professional. In addition to treating the underlying cause, lifestyle changes may also be necessary to manage low blood pressure. These may include increasing fluid and salt intake, avoiding standing for long periods of time, and avoiding sudden changes in position. Regular exercise can also help to improve blood pressure and overall cardiovascular health. It is important to seek medical attention if low blood pressure is causing symptoms such as dizziness, fainting, or chest pain. Low blood pressure can be a sign of an underlying medical condition, and prompt diagnosis and treatment are essential for optimal health outcomes. Disclaimer: The information provided in this article is for educational purposes only and is not intended to replace the advice of a healthcare professional. Always consult a qualified healthcare provider before making any changes to your healthcare regimen. Frequently Asked Questions A heart with a low blood pressure monitor, surrounded by question marks What actions should be taken when experiencing excessively low blood pressure? If you are experiencing excessively low blood pressure, it is important to take immediate action to prevent further complications. The first step is to sit or lie down and elevate your legs to increase blood flow to your brain and heart. You should also drink plenty of fluids and avoid standing up too quickly. If your symptoms persist or worsen, seek medical attention immediately. At what threshold does low blood pressure become perilous for females? Low blood pressure can be perilous for females when it drops below 90/60 mmHg. However, this threshold may vary depending on individual circumstances such as age, weight, and overall health. Which symptoms are indicative of low blood pressure in women? Symptoms of low blood pressure in women may include dizziness, lightheadedness, fainting, fatigue, nausea, blurred vision, and difficulty concentrating. These symptoms may be more pronounced when standing up or changing positions quickly. What are the common aetiologies of hypotension? The common aetiologies of hypotension include dehydration, heart problems, endocrine disorders, neurological conditions, and medication side effects. Other factors such as age, pregnancy, and genetics may also play a role. How does low blood pressure vary with different age groups? Low blood pressure can affect people of all ages, but it is more common in older adults. As people age, their blood vessels become less elastic, which can lead to lower blood pressure. In infants and children, low blood pressure may be a sign of an underlying health condition and should be evaluated by a healthcare professional. Under what circumstances does low blood pressure necessitate immediate medical attention? Low blood pressure may necessitate immediate medical attention if it is accompanied by chest pain, shortness of breath, confusion, rapid heartbeat, or loss of consciousness. In such cases, it is important to seek emergency medical care to prevent further complications. Note: This information is not intended to replace professional medical advice. If you have concerns about your blood pressure or any other health-related issues, please consult your healthcare provider. Leave a Comment Scroll to Top
ESSENTIALAI-STEM
A horse is the best friend you can have in your home. A horse is a partner in adventure and hunting. Whether you are a farmer or not, horses have a lot to offer. So where did horses originate? Horses are traced to plains of North America more than 60 million years ago. They are originally wild animals but over time, people in Ukraine began the domestication idea. The culture of owning horses spread to Kazakhstan and Southwest Russia and later influencing the wilds of North America. Horses are labeled as exotic species by federal administration in the North, there is a lot to be considered with respect to choices in society. The fact that they were first discovered in the region and associated with the wild, locals in the North are more associated with horses. They are more friendly and accommodating to horses. Domesticating horses began in Ukraine but quickly spread to this part of America. The wild idea gradually fade hence building of stables in almost every countryside home. It was then that farmers realized the importance of owning a horse. Managing a ranch was now easier for the merchants because of quick traversing of a horse. Why first domestication in Ukraine? Ukraine’s original economic activity was in farming and mining. Both of these activities require significant energy levels for a consistent time. While people were the main source of labor for most part of the first centuries, there was dire need for extra effort for consistency as it was crucial to the communities and country at large. The structure of a horse depicts its energy. The muscle on legs and rigidity not only demonstrate its ability to run fats but also handle heavy tasks. Of course, it was discovered in the wild. Attempts to catch it at first were futile because of the speed; even on surprise captures, the wild horses could easily escape because of the excess energy. Additionally, horses are of different colors. Structure of the tail and fur on the neck are distinguishing characteristics of the animal’s beauty. It was obviously a unique sight in the wild. While horses are sensitive to danger and that is why it is not advisable to walk behind them, they are hardly harmful. The beauty and potential benefit of a horse from its body structure and speed motivated the locals to go after them. It was not an easy task to capture the first horse but after several capture attempts, it worked. How did horses end up in coal mines? Mining was also a major economic activity in the early days. Coal in its raw form from the pits is indescribably heavy. Yes, people were working at the mines but the process took long because only few kilograms would come out in a day. After successfully domesticating a horse while feeding it on wild pasture, it was a time to test its strength as suspected before the hunting attempts. The horses were locked most of the time because of uncertainty. Ukrainian locals had an idea of the strength and would not let any horse out for several weeks. The mine was the first test, which was surprisingly easy. Engineers at coal mines were amazed by the discovery and power of horses in lifting tones of coals in minutes. Actually, this is the history of “horsepower” as a unit of measurement. The incredible performance at the coal mine triggered the engineers to measure the capability of horses with respect to weight against time. Lifting coal was probably the most difficult task at the time. This is how we ended up with horsepower as a unit of measurement that is in use to date. The domestication idea was uncertain and seemed weird until later when they realized the benefits and politeness of the animal. Horses revolutionized human’s lifestyle. How about the North? North America is renowned as the origin of horses but has nothing to do with domestication. However, the great discovery in Ukraine could not be contained for long. The news spread quickly to other nations including countries in North America who only new horses as wild animals. Today, most locals in the region own horses. What about Europe? Perception on this side of the world was different. To natives in Europe, there was more potential in a horse than domestic use. Owning a horse in the continent had significant value than any other property. In the UK, a horse was more of a locomotive; the power was perceived in terms of speed. A horse was the first car. Several tests were taken and it became an official unit of measurement. Even today, car speeds and power are define don basis of horsepower. How horses ended up in homes was by chance. No one was out with a specific mission of finding a horse. There was no history or idea of the power and speeds associated with these animals. The Ukraine risk to accommodate the attractive and seemingly fast animal was a great discovery that has changed the world to date. Owning a horse is still a prestigious idea in most parts of the world. It is no longer for work only; most people today use it for adventure and pride of ownership.
FINEWEB-EDU
Article Table of Contents Theme: Was this article helpful? 1  out of  1 found this helpful Try Vultr Today with $50 Free on Us! Want to contribute? You could earn up to $600 by adding new articles. How to Install Ackee Analytics on Ubuntu 20.04 Author: Humphrey Mpairwe Last Updated: Tue, Mar 1, 2022 Server Apps Ubuntu Ackee is a self-hosted analytics tool built on Node JS. It is a Google Analytics alternative, privacy-focused, and offers a minimal straightforward web interface for analyzing website traffic with helpful insights. This article will teach you how to install and set up Ackee Analytics on a Ubuntu 20.04 Server. Prerequisites Installation Install Yarn. $ sudo npm install –global yarn Check the installation. $ sudo yarn --version Then, clone the Ackee Analtyics Github Repository. $ git clone https://github.com/electerious/Ackee Switch to the new Ackee Directory. $ cd Ackee Setup a new .env file using your preferred text editor. $ nano .env Paste the following configurations: Replace example, password with your preferred username and a strong password. ACKEE_MONGODB=mongodb://localhost:27017/ackee ACKEE_USERNAME=Example ACKEE_PASSWORD=password Save and close the file. Now, install Ackee using yarn: $ sudo yarn install Setup Ackee Analytics as a system service Create a new Systemd service file. $ sudo nano /etc/systemd/system/ackee.service Paste the following configurations to the file: [Unit] Description=Ackee Analytics After=network.target [Service] Type=simple User=example WorkingDirectory=/home/example/Ackee ExecStart=yarn start [Install] WantedBy=multi-user.target Save and close the file. Enable the Ackee Analytics Service. $ sudo systemctl enable ackee.service Restart the Systemd daemon to load changes. $ sudo systemctl daemon-reload Start Ackee Analytics. $ sudo systemctl start ackee Setup Nginx as a reverse proxy Create a new Nginx configuration file. $ sudo nano /etc/nginx/sites-available/analytics.example.com Paste the following configurations: server { listen 80; listen [::]:80; server_name analytics.example.com; location / { proxy_pass http://localhost:3000; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; } } Save and close the file. Replace `analytics.example.com with your active domain name pointed to the server. Enable the configuration file by linking it to /sites-enabled with the following command: $ sudo ln -s /etc/nginx/sites-available/analytics.example.com /etc/nginx/sites-enabled/ Check the Nginx configuration for errors. $ sudo nginx -t Restart Nginx. $ sudo systemctl restart nginx Setup Ackee Analytics Using a web browser, visit your configured domain name. http://analytics.example.com Now, enter the administrator username and password you configured earlier in the .env file. Once successful, navigate to the Settings tab and click New domain to add a new website to track. Next, copy the tracking code, and paste it to your website’s <head> section to track all visitors with Ackee Analytics. The Ackee Analytics Interface Conclusion Congratulations, you have successfully installed Ackee Analytics on Ubuntu 20.04. You can add multiple domains to track within the application through the web interface. For further information on using Ackee Analytics, refer to the official documentation page. Want to contribute? You could earn up to $600 by adding new articles.
ESSENTIALAI-STEM
How does Your Brain Actually Work? Hello guys, welcome back on ScienceTechHub! Today we are learning about our brain. We all have brain but only some of us know that how it’s work. So, today we explore this thing. How Brain Tells You Where You Are? We all are park our vehicles at some complicated places but we all know at where our vehicles are parked. So, the question is how we remember our parking place?… In our brain there are one hundred billion neurons and they all are communicate with each other by sending little pulses or spikes of electricity via connections to each other. Different neurons collect different information in our brain and one of them is know at where our vehicle parked. So, it sends the information and we recognized at where our vehicle parked. So, this is the working of our neurons. How You Grow New Brain Cells? There is still some confusion about this question, as this is a fairly new field of research, but we can grow new brain cells as adults. This phenomenon is called as “Neuro Genesis”. We learned recently is that there is the unique structure of the adult brains where new neurons can be generated. And if we slice through the hippocampus and we zoom in, we actually see a newborn neuron in an adult brain. A survey said that “We as an adult produces 700 new neurons per day in the hippocampus but at the age of 50, we will have all exchanged the neurons we were born with in that structure with an adult born neuron”. A lower level of neurons causes depression. So, it is important and useful to exchange our neurons at the age of 50. Can Our Brain Control Neurogenesis? And the answer is yes, to prove that thing I have some questions for all of you…give the answer in two manners (1) It increases neurons and (2) It decreases Neurons. So, Let’s start…. • What about learning?  >  Answer is It increases neurons. • What about stress?  >  Answer is It decreases Neurons. • What about getting Older?  >  Answer is It decreases Neurons. • What about sleep deprivation  >  Answer is It increases neurons. So, by these above questions and answers you will get the answer that is “we can control our neurogenesis”. What Happens in Your Brain When You Pay Attention? Well this is not as easy as we think to pay attention, because our attention is pulled in so many different directions at a time, there are two ways you direct your attention. • Over AttentionIn that you move your eyes towards something in order to pay attention to it. • Covert AttentionIn that you pay attention to something, but without moving your eyes. Think up driving for a second, your direction of the eyes is in front of the road (Over Attention), but you constantly scanning the surrounding area (Covert Attention). It works on brain patterns, all of us have a brain pattern but all brain patterns are different from each other. By this brain pattern we pay attention on something. Leave a Comment Your email address will not be published. Required fields are marked * Join ScienceTechHub Community   Join our community to receive the latest news on science & technology and updates from our team. You can also understand science topics and "how new technology works?". And helping bloggers to make money from blogging.   You have Successfully joined our community!
ESSENTIALAI-STEM
About expressions You use expressions to concatenate attributes, manipulate strings, convert data types, and more. Expressions within attribute mappings let you modify attributes before they're stored in Okta or sent to apps. Expressions also help maintain data integrity and formats across apps. For example, you might want to use an email prefix as a username, bulk replace an email suffix, or populate attributes based on a combination of existing attributes, such as displayName = lastName, firstName. Okta supports a subset of the Spring Expression Language (SpEL) functions. See Okta Expression Language. While some functions work in other areas of the product (for example, string in custom username formats), not all do. Username overrides You can use the Okta Expression Language to create custom Okta application usernames. These are some examples of how this can be done: • Construct an Okta username by concatenating multiple imported attributes. • Create differently formatted usernames using conditionals. For example: • If attribute1 = A, then the username should end in acme.com. Otherwise, the username should end in acme-temp.com. • Results: either john.doe@acme.com, or john.doe@acme-temp.com. This is useful for distinguishing between different types of users (such as employees vs. contractors). • Construct app usernames from attributes in various sources. • Enforce a max length by truncating. The username override feature overrides previously selected Okta or app username formats. When you implement a username override, the previously selected username formats no longer apply. You can also use username override functionality with Selective Attribute Push to continuously update app usernames as user profile changes. For example, when the username changes in an app that uses an email address for the username format, Okta can automatically update the app username to the new email address. App username overrides To change the app username format, you select an option in the Application username format list on the app Sign On page. The username mapping displayed on the app Sign On page is the source of truth for the Okta to App flow. Changing when the app username is updated is also completed on the app Sign On page. For Active Directory (AD), LDAP and SAML Identify Provider apps, you use the Profile Editor to override username mappings.
ESSENTIALAI-STEM
Stovepipe Wells Airport Stovepipe Wells Airport is a public airport located one mile (1.6 km) west of Death Valley National Park, serving Inyo County, California, United States. The airport covers 10 acres (4.05 ha) and has one runway. In 2020, the park proposed closing the airport as part of a redevelopment of the Stovepipe Wells area.
WIKI
Plumbing Services Throughout the Inland Empire WE DO IT ALL FOR LESS! Feel at Ease with Plumlee's! Riverside Plumbing FAQs Answers to Your Pressing Plumbing Questions At Plumlee’s Plumbing Services, Inc., we understand that your plumbing concern may leave you with questions. We strive to help our clients understand their home’s plumbing system and learn how to properly care for their fixtures. Whatever problem you may be facing, rest assured that our team is prepared to tackle it and find an effective solution. We have compiled this helpful FAQ to address some of the questions we are frequently asked about plumbing systems and our plumbing services. If you do not see the answer to your question below, don’t hesitate to reach out to us! We serve Riverside and the Inland Empire. Call (951) 767-8818 today to learn more. • How can I tell if I have a leak? Leaks can be tricky to detect but there are a few telltale signs. You may have a leak if you notice abnormally warm floors, you hear the sound of water running, a spike in your water bill, a drop in water pressure, condensation around the home, buckling flooring, or cracks in your foundation. As soon as you suspect a leak, reach out to our team to request leak detection services at no cost to you. We offer this complimentary service to help you ensure that your pipes and plumbing system are safe. • Why does my drain get clogged? Clogs generally occur when people are not mindful of what they put down the drain. You should always avoid letting hair, large amounts of dirt, and certain foods from going down the drain. These can cause significant clogs in a short amount of time. Even products like soap, shampoo, and toothpaste can build up over time and cause a clog. Luckily, Plumlee’s Plumbing offers comprehensive drain cleaning services to help you remove clogs and return your drains to their pristine condition. • There’s a clog in my sewer line. Am I going to have to tear up my yard to fix it? Thanks to developments in technology and plumbing techniques, sewer line repairs don’t always require significant amounts of digging. With state-of-the-art video detection and trenchless repair methods, we can install fresh piping into your existing pipes without uncovering the entire sewer line. Consult with our team of Riverside plumbers to determine how your sewer line problem can be resolved. • What is a tankless water heater? Should I invest in one for my home? A tankless water heater is an alternative to a traditional tank unit. A tankless unit offers an unlimited supply of hot water because it heats water on demand rather than storing a supply in a bulky tank. You can choose to install a smaller water heater near a point of heavy use (such as a shower) or a larger unit that can service your whole house. Many homeowners are making the switch to tankless units because they last longer, are more energy efficient, and cost less to operate. • I think I can solve my plumbing problem myself – why should I hire a plumber? DIY plumbing repairs and installations can be risky. Without proper training and extensive experience, you may not fully solve the problem or install the fixture correctly. This could lead to even worse problems in the future. By hiring a licensed, bonded, and insured plumber, you are ensuring that your plumbing system is treated with the professional care it deserves! Request Your Free Estimate With Our Online Form • Please enter your name. • This isn't a valid phone number. • Please enter your email address. This isn't a valid email address. • Please make a selection. • Please enter a message.
ESSENTIALAI-STEM
What is "very low food security"? Household food security statistics published annually by ERS are based on responses to survey questions about conditions and behaviors that characterize households when they are having difficulty meeting basic food needs. In households classified as having “very low food security,” the food intake of household members was reduced and their normal eating patterns were disrupted at times during the year because the household lacked money and other resources for food. In 2012, the 7 million households with very low food security reported the following specific conditions (along with other conditions): 96 percent reported that they had cut the size of meals or skipped meals because there was not enough money for food, 95 percent reported that they had eaten less than they felt they should because there was not enough money for food, and 68 percent reported that they had been hungry but did not eat because they could not afford enough food. This chart is drawn from a chart that appears in Household Food Security in the United States in 2012, ERR-155. Download higher resolution chart (940 pixels by 730, 150 dpi)
FINEWEB-EDU
Have you ever wondered what the difference is between Sativa and Indica? • The Short Answer: Indica strains are better for relaxing and falling asleep, Hybrid strains are good for daytime pain relief and an overall sense of wellbeing. Sativa strains are good for uplifting mood and focus.  • Indica terpenes: Myrcene, Terpineol, and Linalool. If you see these terpenes listed first, they will deliver a relaxing experience. • Sativa terpenes: Limonene, Terpinolene, Pinene. If you see these terpenes listed first, they will deliver an uplifting effect.     • Entourage effect explained The theory is that all compounds in cannabis work together, and when taken in combination, they produce a better effect than when taken alone. The hemp plant contains more than 100 different compounds called cannabinoids and terpenes that can interact with your endocannabinoid system. Your endocannabinoid system works to keep your body in homeostasis, or balance. Its purposes range from neuroprotection to regulation of your immune system, impacting things like appetite, sleep, mood, and pain.  CBD & THC are the 2 most popular cannabinoids. Other cannabinoids like CBN, CBC, CBA, CBG, and THC and terpenes such as myrcene, pinene, limonene, and caryophyllene, are also naturally present in cannabis and play a supportive role. Research has shown that taking a precise, balanced formulation of these cannabinoids and terpenes is more effective than taking even the highest quality CBD or THC alone. This is due to an interaction between the cannabinoids and terpenes called “the entourage effect.” In the world of CBD products, this means that in order to experience optimal health benefits you will want to find full-spectrum CBD products. If you can’t take THC, look for broad-spectrum CBD products. CBD Isolate will not provide the same effects, as it contains only the CBD cannabinoid. This also means that you’ll want to buy from a trusted manufacturer who balances their products with a scientifically-based amount of cannabinoids, flavonoids, and terpenes. • Minor Cannabinoids: CBG – CBN – CBDa – THC D8/9 CBDa – All cannabinoids are bound by an acidic chain when they are grown on the plant, in order for us to feel the benefits, that “a” needs to be broken down by a process called decarboxylation. If you’ve ever tried to eat a raw bud, you’ll know from experience that nothing will happen to you (due to the intact acidic chain). Once decarboxylation occurs, the cannabinoid is ready to consume and take effect. The vast majority of reputable CBD companies will decarboxylate the cannabinoids in the extraction process so this is not something the consumer needs to worry about. Like CBD, CBG has been used to combat pain without having the intoxicating effect of cannabinoids like THC. CBG is the mother cannabinoid, in other words, all cannabinoids start as CBG before molecularly shifting to CBD, THC, and other cannabinoids. While the research on CBG is limited, studies do exist that suggest that it offers several benefits. CBG may be able to improve the following health conditions: Inflammatory bowel disease. CBG seems to reduce the inflammation associated with inflammatory bowel disease, according to a 2013 study conducted on mice. Glaucoma. Medical cannabis seems to effectively treat glaucoma, and CBG might be partly responsible for its efficacy. A study published in 2008 suggests that CBG might be effective in treating glaucoma because it reduces intra-ocular pressure. Bladder dysfunctions. Some cannabinoids seem to affect the contractions of the bladder. A 2015 study looked at how five different cannabinoids affect the bladder, and it concluded that CBG shows the most promise at treating bladder dysfunctions. Huntington’s disease. CBG might have neuro-protective properties, according to a 2015 study that looked at mice with a neurodegenerative condition called Huntington’s disease. The study concluded that CBG might show promise in treating other neurodegenerative conditions. Bacterial infections. A 2008 study suggests that CBG can kill bacteria, particularly methicillin-resistant Staphylococcus aureus (MRSA), which causes drug-resistant staph infections. These infections can be hard to treat and fairly dangerous. Cancer. A 2014 study looked at colon cancer in rats and concluded that CBG might reduce the growth of cancer cells and other tumors. Appetite loss. A 2016 study on rats suggested that CBG could stimulate the appetite. Appetite-stimulating chemicals could be used to help those with conditions such as HIV or cancer. CBG is known to provide a more uplifting effect compared to CBD. • CBN CBN can be understood as a weaker version of THC. When THC components found in the cannabis plant age, they break down. This leads to the formation of a less potent cannabinoid called CBN. It’s about 25% as effective as THC, which makes it a mild chemical. Unlike CBD, which is entirely non-psychoactive, CBN in larger doses can produce mild psychoactive reactions. CBN has been shown to have sedative properties that could relieve conditions like insomnia. However, more research is required. • Pain relief.  In a study of rats, CBN use showed relief in muscle and joint pain conditions like fibromyalgia. The study also noted that pain relief was better when CBD and CBN were used together. Neuroprotective properties. One 2005 study found that CBN could help delay the onset of amyotrophic lateral sclerosis (ALS), a disease that affects cells in the brain and the spinal cord. CBN was given in small amounts for a period of 12 weeks. However, more research is required in this area. • Delta 8 vs Delta 9 THC THC as the world knows it is scientifically known as Delta-9 THC. Found in traditional cannabis, this cannabinoid is intoxicating and mind-altering. It is sold to the public in states that have legalized recreational cannabis, and to medical patients in other states. Delta-8 THC is an isomer of Delta-9 THC that is produced from the hemp plant in the extraction process, making it federally legal. The effects are about half of traditional THC but it feels very similar. It is important to note that while it is federally legal via the 2018 farm bill, some states have made their own laws to restrict its sale. We recommend starting with 10mg if you are new to THC. • What are strains? Cannabis and hemp are incredibly unique, in fact, every single plant (that’s not a clone) will produce a slightly different effect. As you may know from trying cannabis or hemp in the past, every experience is a little different. Why is that? The answer lies within the active ingredients. Just like humans, each seed will produce a different genetic makeup, with traits derived from its lineage. In order to better understand strains, it is important to look back to the origin of cannabis. From human’s earliest records, you will find excerpts of how cannabis was used in different cultures. For example, in the great Hindu mountains cannabis was used as a sedative and pain reliever (Indica). However, near the equator in Panama, cannabis was used as a stimulant (Sativa). How can the same plant be used in such different capacities? When cannabis was born, it adapted to its environment and only the plants fit for the local conditions would survive. Since we know that cannabis has the potential to host an incredibly vast amount of terpenes, and certain terpenes grew in certain environments, we ascertained that these terpenes are the driving factor for how cannabis can be used in different ways. Fast forward thousands of years to today, cannabis has been taken from its homelands and hybridized in a million ways making it much harder to distinguish which strains will have which effects. Sativa and Indica used to describe the shape and effect of cannabis but since we’ve made so many crosses of the two, it is increasingly difficult to predict each plant’s effects, especially because each seed will have a slightly different molecular make-up, even if its the “same strain”. • Terpenes So if Indicas and Sativas have been hybridized, and each seed will grow a strain with different effects than the last, how do we know how to pick the right strain or product for our needs? Answer: terpene + Cannabinoid lab test. Understanding each cannabinoid and terpene and its effects is the only way to be sure you are getting exactly what you want. Once you learn what each cannabinoid and terpene does, you can look to the COA (certificate of analysis) and match your needs to the active ingredients in any product. Written by Daniel Veilleux 0 Comments 0 Comments Trackbacks/Pingbacks 1. When to take CBD - EmeraldLeaf - […] Strains, Terpenes, Cannabinoids, The Entourage Effect. […] 2. Which CBD is right for me? - EmeraldLeaf - […] What Strain is right for me? […] Leave a Reply EmeraldLeaf Newsletter Copyright © 2022 EmeraldLeaf Join the newsletter for 25% off your purchase! Subscribe to our weekly newsletter below for 25% off your first purchase, you will also receive the latest in CBD science and exclusive offers!
ESSENTIALAI-STEM
Page:The New International Encyclopædia 1st ed. v. 14.djvu/857 * OCEANIC DEPOSITS. 727 OCELOT. a rule the coarser materials occur in the sliallow marginal waters, while the tine sands and nuuls are found in the deeper portions, where they have been carried l)y the drifts and currents. In the free ocean the character of the bottom shows little variatiim over great areas. When the deptli is comparatively slifjht the deposits con- .sist of the shells of minute organisms tluit live at or near the surface, of volcanic dust, bones and teeth of tish, and chemical pri'cipitatcs. The most widespread and characteristic material in the tropical and temperate regions is globigerina ooze, an accumulation of the fossil calcareous casts of foraminifera. In the colder Avaters, such as those of the South Atlantic and the Southern Ocean, the principal organisms are of siliceous character, and their remains compose the diatom ooze that is so characteristic of those regions. When the floor lies at a depth of 2500 fathoms or niiu'e, only the most refractory materials can resist the solvent action of the water, and the deposits take the form of a red or brownish clay com]iosed of the insoluble portions of shells, mixed with meteoric and volcanic dust. These deposits cover great areas in the middle portion of the Atlantic and the northern part of the Pacific Ocean. See Ocbian ; Deep-Se.4. Explora- tion : Ooze, etc. OCEANIC FAUNA. See Deep-Se. Explo- RATiox ; iiuzE; Pelagic Animals. OCEANIDS {GkmKmvlikc, Okeanides). The thrcn- thou-and daughters of Oceanus and Tethys, nymphs of the sea. OCEAN LIFE. Ocean life embraces the great company of nuirine animals, which includes rep- resentatives of every phylum. It appears certain that life originated in the ocean (see Protozoa), and for a long period at the beginning of the living world remained there exclusively, develop- ing a wide variety and considerable advancement in organization before living beings obtained any footliold on din- land. Great numbers of low- forms remain in the oceans (see Pelagic Ani- jials; Ooze) in substantially the primitive form and condition, owing to the comparative immuta- liility of their environment. Some are very wide- ly distributed, others kept within narrow bounds liy inability to dwell except under accustomed conditions of temperature, pressure (according to depth), or within definite food-yielding areas. Great numbers are fixed and stationary in adult life. Hence zones and areas of distribution, both lateral and vertical, exist. (See DiSTRinuTiON of Animals.) That the land was populated jiri- marily from the sea is conceded bv all natural- ists; it is also true that many creatures once terrestrial have been relegated to a wholly ma- rine existence by force of circumstances acting I through long past ages, a conspicuous example Sea I'.xim.okation. O'CEANOGTRAPHY (from •'.•Kravdc, oUennos. ocean + -y/iaipiaj -grnphia, description, from ypaiptiv, (irnphcin, to write). The name given to the branch of geography which deals with the phenomena of the collected waters of the earth — the oceans and seas. The name has only recently come into general use. as a result of the great i>pansion in our knowledge concerning the ocean during the last thirty years. See Deep-Sea Exploration; Ocean; Geoorapht. OCE'ANtrS (Lat., from Gk. 'QKcnvdr,, Okea- 510.S). In classical mythology, the eldest of the Titans, son of Uramis and (ia'a, and father, by his sister Tethys, of the 3000 Oceanids, or ocean nymphs. In Homer Oceanus is the ever-flowing stream which surrounds the circular plain of the earth. From him come all streams and fountains, and even the sea. Ilesiod first giA'cs the accepted genealogy. He does not apjjcar in an- of the myths as a governing personality like Poseidon, but only as a spectator. In the I^ rum el he us liuuiul, .Eschylus introduces him as advising the captive to submit to Zeus. Representations in art are very rare before the Hellenistic period, when he is depicted, like the river gods, as a bearded man, often with horns, and is charac- terized by the steering oar, or the sea animals surrounding him. OCEL'LUS LUCATSrUS (Lat., from Gk.'0«f;t- Adf, Ohcllos). A Lucanian Greek and member of the Pythagorean School; perhaps of the fifth century B.C. Stobaeus, i. 13, has preserved a fragment of his work in Dorian dialect: and we hear of various philosophical writings w-hich have now been lost. The extant work On the Nature of the Universe (Ilcpl rf/q rov navro; <tijmuq) in the Ionic dialect, w-hich bears Ocel- lus's name, is certainly a work of the later Peripatetic School, and cannot be earlier than the first century B.C.; it may be still later, as it shows remarkable coincidences with the similar work of Xicolaus Dama-cenus. In four chapters the book handles the themes of the eternity of the cosmos, the distinction between the per- manent and the transitory, the divisions of the universe, the heavens, earth, and the human race, the nature of time, etc.. all being based on the writings of Aristotle. The work closes with a consideration of the relation of the propagation of humankind to certain cosmic and moral ques- tions. It is best edited in vol. i. of Mullach's Fragmcnia Philosopliornm (Ircecorum (Paris, 1800) ; English translation by Thomas Taylor (Lonilon, 1831). OCELOT, 6'se-lot (Mexican ocelotc). A beau- tiful wild cat {Fetis pnrdeilis) of tropical Amer- ica, from Louisiana to Brazil. It inhabits forests, is an agile tree-climber, and preys mainly on birds. It is from two feet six inches to three feet long, exclusive of the tail, which is from II to 15 inches, and nearly of uniform thickness. The ears are thin, .short, and jiointed. The muz- k^'^^k THE OCELOT. zle is rather elongated. The colors varv con- siderably, but tile griiiind tint is rich reddish gray or tawny, blending finely with the dark brnwii on the margins of the elongated spots, of which there are chains on the sides; the head, neck, and legs being also variously sjiotted or * of w-hieh is the group Cetacea (q.v.). See Deep-
WIKI
Will ocean acidification affect deep-water corals? ResearchBlogging.orgThe global ocean has already taken up half of the atmospheric carbon dioxide produced by humans over the last 200 years, so the ongoing effects of climate change are dampened. That’s right, you can thank the ocean for saving the planet so far. Without the ocean, what we would have? A place that looks a lot like Mars. Ocean chemistry is changing, though, ever so slightly. The global ocean pH is about 8.2, slightly basic, but pH is falling (~0.1) due to an increased concentration of hydrogen ions resulting from the chemical reaction of water molecules and carbon dioxide at the ocean surface. Ocean pH is expected to fall even more, between 0.3 and 0.4 by the year 2100, if we continue burning fossil fuels at current rates. Note the values are still basic, so the oceans are not really “turning to acid”, but the change in pH could have important consequences for ocean animals. Many ocean animals use calcium carbonate in their skeletons including corals, mollusks, and crustaceans. Single celled algae like the coccolithopores also have calcified plates. Will they adapt? During the Paleocene-Eocene thermal maximum many benthic calcifiers went extinct. A recent paper in Coral Reefs by Turley et al (2007) anticipates that many species will not escape the effects of climate change, and even the deep reef forming corals will be in jeopardy from increasing atmospheric CO2. This perspective piece calls attention to the problem, but no new data is provided. Instead there is a call for information exchange and collaboration between warm water coral scientists and cold water coral scientists. Few could dispute the value of this exchange. To be fair, caveats to the argument that pH is changing faster than corals can adapt might include the long fossil record of the Anthozoa, the phylogeny of the Cnidaria, the existence and survival of scleractinian forms below the carbonate compensation depth, and contrasting aquarium experiments that show these animals can be either 1) doomed to dissolution or 2) remarkably adaptable. What’s your guess? Tune in to Coral Week this April for five full days on deep-sea corals, and more on this controversy. Reference: Turley, CM, JM Roberts, JM Guinotte. 2007. Corals in deep-water: will the unseen hand of ocean acidification destroy cold-water ecosystems? Coral Reefs 26:445-448. doi 10.1007/s00338-007-0247-5 Dr. M (1749 Posts) Craig McClain is the Executive Director of the Lousiana University Marine Consortium. He has conducted deep-sea research for 20 years and published over 50 papers in the area. He has participated in and led dozens of oceanographic expeditions taken him to the Antarctic and the most remote regions of the Pacific and Atlantic. Craig’s research focuses on how energy drives the biology of marine invertebrates from individuals to ecosystems, specifically, seeking to uncover how organisms are adapted to different levels of carbon availability, i.e. food, and how this determines the kinds and number of species in different parts of the oceans. Craig’s research has been featured on National Public Radio, Discovery Channel, Fox News, National Geographic and ABC News. In addition to his scientific research, Craig also advocates the need for scientists to connect with the public and is the founder and chief editor of the acclaimed Deep-Sea News (http://deepseanews.com/), a popular ocean-themed blog that has won numerous awards. His writing has been featured in Cosmos, Science Illustrated, American Scientist, Wired, Mental Floss, and the Open Lab: The Best Science Writing on the Web. 6 comments on “Will ocean acidification affect deep-water corals? 1. I tend to think that corals are a lot more resilient than we give them credit for. Aquariums are certainly anecdotal evidence of this, as any coral I have ever kept (all fragged from other aquarium specimens, not directly wild collected) would have been dead within days of reaching my tanks if they needed such stringent conditions. Typical home aquariums can experience pH swings of more than .1 DAILY, and even experienced aquarists keep their more fragile corals at pH’s anywhere from 8.1 to 8.5. That being said, I think much more direct threats to corals are overfishing and invasive species, both of which we SHOULD be more than capable of dealing with but apparently refuse to do… With regards to ocean acidification, I think I remember learning that coccolithophores would be the first major group of organisms directly affected by it because they require the highest pH of the major calcifying organisms in the ocean. As the pH drops they die off first, but that means that a significant percentage of the calcification reactions in the ocean stop (or slow), which in turn means the acidification slows. So while it sucks to be a coccolithophore, they do serve as a first line of defense. Of course this could also cause a huge problem in terms of food chain dynamics, among other things, so it’s still a bad thing for more than just the coccolithophores… 2. Ok, I’ll expose my complete inability to remember specifics here, or to find the appropriate references with anything other than PubMed (I work in HIV research), but I remember seeing images of coccolithophores grown at lower pH that only a mother would be able to love. It wasn’t that they didn’t grow, but rather that they were unable to produce coccoliths appropriately. I saw these in a class I took on phytoplankton in late 2005/early 2006 and it was a recent paper at the time. I did find an abstract now about coccolithophore production decoupled from pH, which shows species are differentially affected by using different forms of carbon, but what caught my eye was one sentence where they said: “Despite the intracellular nature of coccolithophore calcification, previous experimental work confirmed that some (but not all) modern coccolithophores decrease calcification as pCO2 increases.” The abstract is at http://www.cosis.net/abstracts/EGU2008/08750/EGU2008-A-08750.pdf As a side note, how do you usually search for references? I have full access to pretty much everything at the university I work at, but I’m not a big fan of their library web site… 3. Never used PubMed, myself, though I come across it quite a bit. I like online databases like Web of Science, Cambridge Scientific Abstracts, Aquatic Fisheries and Sciences Abstracts, and ScienceDirect for my research, coupled with a more analog search of references in my favorite papers. 4. My question regarding the effects of acidification on corals, mussels, oysters, etc isn’t so much the effects on their skeletons/structures per se. While extreme changes could well have big effects, I think the more immediate problem will be food. If acidification effects the resource base these filter feeders are drawing on, then even if they have a mechanism of compensation, they may well not have the energy to compensate, nor will they even be deriving enough nutriment to generate these expensive structures. Comments are closed.
ESSENTIALAI-STEM
Last Updated: 2020-11-05 What you will build In this codelab, you are going to deploy an auto-scaling HPC cluster on Google Cloud that comes with the Slurm job scheduler. You will customize this system to deploy compute nodes with OpenFOAM® installed and then use this infrastructure to simulate compressible flow past a NACA0012 aerofoil. What you will learn What you will need Set IAM Policies In HPC, there are clear distinctions between system administrators and system users. System administrators generally have "root access" enabling them to manage and operate compute resources. System users are generally researchers, scientists, and application engineers that only need to leverage the resources to execute jobs. On Google Cloud Platform, the OS Login API provisions POSIX user information from GSuite, Cloud Identity, and Gmail accounts. Additionally, OS Login integrates with GCP's Identity and Access Management (IAM) system to determine if users should be allowed to escalate privileges on Linux systems. In this tutorial, we assume you are filling the system administrator and compute engine administrator roles. We will configure IAM policies to give you sufficient permissions to accomplish the following tasks To give yourself the necessary IAM roles to complete this tutorial 1. Navigate to IAM & Admin > IAM in the Products and Services menu. 2. Click "+Add" near the top of the page. 3. Type in your GSuite account, Cloud Identity Account, or Gmail account under "Members" 1. Add the following roles : Compute Admin, Compute OS Admin Login, and Service Account User 1. Click Save In this section, you will deploy the Fluid-Slurm-GCP solution, an auto-scaling HPC cluster with the Slurm job scheduler and software that supports computational fluid dynamics workflows, including Paraview. 1. Open https://console.cloud.google.com/marketplace/details/fluid-cluster-ops/cfd-gcp. 2. Click "Launch" 3. Give the deployment a name (e.g. openfoam-demo) and select the GCP zone where you want to deploy your cluster. 4. Leave the Controller and Login settings at their default settings. 5. In the Partition Configuration section, set the partition name to ‘openfoam', the Machine Type to `n1-standard-8`, and the Disk Size to 50 GB. 6. Click "Deploy" and wait for the cluster to be created. In this section of the codelab, you will configure the openfoam partition to use the openfoam-gcp image. Note that this image is provided as part of Fluid-Slurm-GCP and is licensed to you under the Fluid-Slurm-GCP EULA 1. Log in to your cluster controller instance using ssh 2. Go root. sudo su 1. Create a cluster-configuration file use the cluster-services CLI. cluster-services list all > config.yaml 1. Open config.yaml in a text editor and navigate to the partitions[0].machines[0] block. Insert an image definition for the machine block that points to projects/fluid-cluster-ops/global/images/openfoam-gcp . Your machine block should look similar to the example block below. machines: - disable_hyperthreading: false disk_size_gb: 50 disk_type: pd-standard external_ip: false gpu_count: 0 gpu_type: nvidia-tesla-p4 image: projects/fluid-cluster-ops/global/images/openfoam-gcp local_ssd_mount_directory: /scratch machine_type: n1-standard-8 max_node_count: 10 n_local_ssds: 0 name: openfoam preemptible_bursting: false static_node_count: 0 vpc_subnet: https://www.googleapis.com/compute/v1/projects/cloud-hpc-demo/regions/us-east4/subnetworks/default zone: us-east4-a 1. Save the config.yaml file and exit your text editor. 2. Use cluster-services to preview the changes to your openfoam partition. cluster-services update partitions --config=config.yaml --preview 1. Apply the changes. cluster-services update partitions --config=config.yaml In this section, we will access the cluster's login node to configure Slurm accounting, so that you can submit jobs using the Slurm job scheduler. 1. SSH into the cluster's login node 2. Go root sudo su 1. Append a sample slurm_accounts block to the end of the config.yaml file. cluster-services sample slurm_accounts >> config.yaml 1. Edit the cluster-configuration file so that you are allowed to submit to the openfoam partition. Make sure you remove the empty slurm_accounts: [] that is pre-populated in the cluster-configuration file. The example slurm_account configuration below will create a Slurm account called cfd with the user joe added to it. Users in this account will be allowed to submit jobs to the meshing, openfoam, and paraview partitions. slurm_accounts: - allowed_partitions: - meshing - openfoam - paraview name: cfd users: - joe 1. Preview the changes for updating the slurm_accounts. Verify that you have entered in the Slurm accounting information correctly. cluster-services update slurm_accounts --config=config.yaml --preview 1. Apply the changes. cluster-services update slurm_accounts --config=config.yaml 1. Exit from root. exit In this section, you will submit a Slurm batch job to run the NACA0012 tutorial included with OpenFOAM®. To help you with this, the Fluid-Slurm-GCP solution comes with an example Slurm batch script (/apps/share/openfoam.slurm). This example batch script can also be used as a starting point for other OpenFOAM® jobs on the cluster. 1. On the cluster login node, clone the fluid-slurm-gcp_custom-image-bakery repository and copy the example Slurm batch script to your home directory. git clone https://github.com/fluidnumerics/fluid-slurm-gcp_custom-image-bakery.git cp fluid-slurm-gcp_custom-image-bakery/examples/openfoam/openfoam.slurm ./ 1. Open the Slurm batch script in a text editor. Set the --account parameter to the Slurm account name that you set in step 5 from the previous section of this codelab. Save the file when you are done and exit the text editor. #SBATCH --account=cfd 1. Submit the batch job using sbatch. sbatch openfoam.slurm 1. Wait for the job to complete. When the job completes, you will have the aerofoilNACA0012 OpenFOAM® simulation case directory in your home directory. ls aerofoilNACA0012/ 0 1050 1200 1350 150 300 450 550 700 850 Allclean dynamicCode log.transformPoints processor1 processor4 processor7 100 1100 1250 1400 200 350 50 600 750 900 Allrun log.blockMesh postProcessing processor2 processor5 system 1000 1150 1300 1410 250 400 500 650 800 950 constant log.extrudeMesh processor0 processor3 processor6 In this codelab, you created an auto-scaling, cloud-native HPC cluster and ran a parallel OpenFOAM® simulation on Google Cloud Platform! Further reading Tell us your feedback
ESSENTIALAI-STEM
Chrysococcus elegans Chrysococcus elegans is a species of golden algae in the family Dinobryaceae. It is a freshwater species found in North America, specifically the Northwest Territories in Canada.
WIKI
Land 2 Air Chronicles II: Imitation Is Suicide Chapter 2 Land 2 Air Chronicles II: Imitation Is Suicide Chapter 2 is an EP by American singer-songwriter Kenna. It is the second of three EPs in the Land 2 Air Chronicles II series, released from September 2013 to December 2013.
WIKI
Health is wealth. Taking care of your body is the best investment you can make. Healthy living ensures that you can do well at work, at home and at play. Eating wholesome and nutritious food improves your health and also helps you perform at your peak and stay well for life. Here are some simple men’s daily health tips to help you eat right through your busy schedule: Eat to Perform Working demands constant and unwavering attention for 8 to 12 or more hours each day. To cope with the physical and mental demands for energy at work and have some more to spare for family and friends, surely one needs to eat wisely. Here are a few pointers to get you going: 1. Stay hydrated Sixty to sixty-five percent of your body is made of water. Water carries oxygen and nutrients to every cell in your body and carries away the wastes to be discharged. Water is the medium in which most of the chemical reactions which take place in our body occur and so, even mild dehydration affects your body's ability to work optimally. Water is found in the fluids we drink and also the food we eat. Drinking plain water is a great way to help meet your daily fluid needs. Keep a water bottle beside your table at work and carry one with you when you set out to exercise. You’ve probably asked this common health question before. “How much water should we drink every day?" As a rule of thumb, you should be drinking enough so that you urinate several times a day, and your urine is pale and odour-free. If your pee is dark-coloured and smells, you need to drink more. 2. Energise with regular meals and snacks Wake up to a healthy breakfast comprising of wholegrain to fuel your day, lean protein for greater satiety, fresh fruit for a vitamin, mineral and fibre boost and low-fat dairy products for a calcium top-up. Healthy breakfast menus include wholemeal cheese sandwich accompanied with a fruit yoghurt or multi-grain ready-to-eat cereal with raisins and low-fat milk. Take time out for lunch to refuel at mid-day. Whether you eat at your workplace cafeteria, hawker stalls or restaurants, make every effort to pick a healthier meal. Do not be intimidated by your colleagues who buy greasy, sodium-packed or sugar-laden popular food. If you do not have easy access to healthier choices, bring a packed lunch from home. In between meals, snack on small portions of nourishing food like fruit, cereal bars, mini sandwiches and low-fat yoghurt instead of junk food to keep your blood sugar within the range. This helps you concentrate and perform difficult mental tasks. After work, use your dinner meal to make up for nutrient shortfalls you have built up through the day. If you did indulge in a higher fat lunch, now focus on steamed and grilled food. If you are short of fresh fruits and vegetables, top up now. If you have to entertain, take your guests to a restaurant that serves healthier dishes (look under Themes> Health> Healthier Eateries). Order items tagged Healthier Choice on the menu to pick dishes that not only look good but are also better for you. Avoid skipping or delaying meals. Missing meals deprives you of your chance to include valuable nutrients in your diet. Delaying meals creates hunger. Once you are hungry, you cannot be logical about making healthier food choices. 3. Eat well-balanced meals Overeating can lead to unhealthy weight gain and expanding waist size. Use My Healthy Plate to guide the types and portions of food you put on your plate. This will help you consume all the nutrients you need in the right amount each day. Not all carbs are bad for you. wholegrain, such as brown rice, wholemeal bread and wholegrain cereals are nutritious choices and can replace refined carbs such as white rice and white bread. Select lean proteins to complement your meals and, add on plenty of fruit and vegetables. Limit fatty meat, poultry skin, full-fat dairy products, palm-based vegetable oils and hydrogenated plant oils like hard margarine, as well as products made with them, as they push up the bad cholesterol levels. Use unsaturated oils (e.g. canola, soy, corn, sunflower, peanut, and olive oils), nuts and seeds in small portions to provide essential fats in your diet. Try not to douse your food with salt or sauces. And, use just a little sugar or syrup to flavour your desserts and beverages. Instead, pep up your food choices with natural herbs and spices. Eat to Beat Stress Stress is a part of life; it can energise us or tire us out. Some respond to stress by eating more, while others, just stop eating. Both ends of the eating spectrum are not healthy. Pick up other ways to cope with stress for better mental health. Talk with a friend, go for a walk or pick up meditation. Optimal nourishment will help your body cope with the demands of a stressful life. So, eat a healthy and well-balanced diet all the time. More working adults now unwind after a hard day's work by socialising at the pub. Binging on the spirits to relieve stress will land you with a hefty hangover, among other health issues. At each sitting, limit alcohol intake to no more than two standard drinks. A standard drink is a can (330 ml) of beer, 1 glass (100 ml) of wine or 1 nip (30 ml) of spirits. Alcohol can also affect our sexual health, so we should always drink in moderation, or abstain from it altogether. Eat to Prevent Disease Men are living longer today than ever before. Healthy eating through life will not only let you live longer, but it will also go a long way to prevent or at least delay chronic lifestyle diseases such as hypertension, prostate cancer, diabetes, heart disease and stroke. A healthy diet combined with regular exercise (aim for at least 150 minutes of moderate physical activity every week) will also help aid weight loss. For those of us who are overweight, we are at higher risk of the above-mentioned chronic diseases, as many health conditions have been shown to be linked to obesity. Thus, it is important for us to maintain a healthy weight and watch our waist sizes if we want to live longer and live healthier. Here are three tried and tested health tips to lower your risk: 1. Eat a wide variety of different food, with My Healthy Plate as the foundation to guide the amount and types of food you eat. 2. Achieve and maintain a healthy body weight. 3. Have less fat (especially saturated and trans fats), cholesterol, salt, added sugars and alcohol in your diet. Remember These Daily Health Tips for Better Men’s Health • Hydrate your body and eat a well-balanced diet, spaced out through regular meals and snacks, to meet the physical and mental demands of your working day. • If you drink alcohol, limit intake to no more than two standard drinks each day. • Eat to prevent chronic lifestyle-related diseases now. Include wholegrain food, vegetables, fruit, beans and lentils; and limit fat (especially saturated and trans fats), cholesterol, salt, sugar and alcohol in your diet. Download the HealthHub app on Google Play or Apple Store to access more health and wellness advice at your fingertips.
ESSENTIALAI-STEM
User:Swanker This is page of Swanker. A internet nickname for the photographer Tom Swain. A website dedicated to his work is called Funky Photography and can be found at http://www.funky-photography.co.uk
WIKI
Carolyn Coleman Carolyn Coleman was a Republican politician from the U.S. state of Oklahoma. Coleman served as a legislator in the Oklahoma House of Representatives from 1990–2004, representing District 53. Some of the main issues Coleman took up during her time in the legislature include elementary reading, accountability for the spending of citizen's taxes, as well as protecting air and water quality. Biography Carolyn Coleman was born in southeast Oklahoma City in 1952, the youngest of three children. Coleman graduated from Crooked Oak High School in 1970. After graduation, Coleman attended college at Rose State College as well as Southwestern Bible College. Before serving in the House of Representatives, Coleman worked as an administrative assistant for an oil company. She also worked on several campaigns, including the campaign of Helen Cole. House of Representatives (1990–2004) In 1990, Coleman campaigned as a Republican candidate in a strongly Democratic district. Coleman won the vote and was sworn into office. In total, Coleman campaigned seven times as she served 14 years in the House. Some of the issues that Coleman focused on while in the legislature include reforming state education, cutting business taxes, protecting air and water quality, and creating harsher punishment for violent and repeat offenders of crime. Coleman is especially known for her work on elementary literacy and reading legislation along with Oklahoma senator Kathleen Wilcoxson. Committees * Education * Common education subcommittee * Health and mental health * Tourism and Recreation * Veteran Affairs Life after the House After serving in the House for 14 years, Coleman has been taking classes at Oklahoma State University Institute of Technology for fun as well as working part-time. * Service: Coleman has volunteered her time with several organizations and institutions. Coleman has served on the American Legislative Exchange Council, Southern Regional Education Board, and the Board of Directors for Community Literacy. She also served on the board of directors of the Crisis Pregnancy Center in Oklahoma City.
WIKI
• Yogeeta Paryani JAVA| Java program to calculate HCF of two numbers. In this blog we're going to calculate HCF of two no. using java. An H.C.F or Highest Common Factor, is the largest common factor of two or more values. For eg. Factors of 9 and 6 are- 9 - 1,3,9 6 - 1,2,3,6 The common factors are 1, 3 and the highest common factor is 3. IMPLEMENTATION: 1. Import Scanner library then create class, now under main class define two variables you want HCF for and also define variable i and hcf. import java.util.Scanner; class Hcf { public static void main(String args[]) { int n1,n2,i,hcf=0; 2. Now take the value of numbers from user. Scanner sc=new Scanner(System.in); System.out.print("Enter first no."); n1=sc.nextInt(); System.out.print("Enter Second no."); n2=sc.nextInt(); 3. Create a loop from 1 to maximum of numbers. for(i=1;i<=n1||i<=n2;i++) { 4. Check if both are completely divided by same loop number, if yes, store it if(n1%i==0&&n2%i==0) { hcf=i; } } 5. Display the stored number is HCF System.out.println("HCF of given two no. is="+hcf); } } OUTPUT: Enter first no.9 Enter Second no.6 HCF of given two no. is=3 Happy Coding! Follow us on Instagram @programmersdoor Join us on Telegram @programmersdoor Please write comments if you find any bug in the above code/algorithm, or find other ways to solve the same problem. Follow Programmers Door for more. #blog #JAVA #HCF #learn #coding #programming 26 views         Contact Us programmersdoor@gmail.com • LinkedIn • Facebook • Instagram ©2023 by Programmers Door
ESSENTIALAI-STEM
Wikipedia:Requests for checkuser/Case/Random-5000 ''The following discussion is preserved as an archive of a Request for checkuser. Please do not modify it .'' Random-5000 * Code letter: C Random-5000's edits are probably too old to check, but he seems to be the sockmaster, so I'm listing under this name. All accounts hit the same articles and match the same editing patterns in varied combinations. Editing patterns: Evidence of connection for each account (uses the above shortcuts): * Supporting evidence: * Vandalism at Ghost:, , , , , , , , , , and more * at Toilet, , , , , and more * at Micropholis spectabilis e. g., , , * they also hit userpages, e. g., , , , , , , * One of Random-5000's last edit was to create his userpage with "Ghosts eat toast halfway up the lamp post.", he also vandalized Ghost in the same way. * addition of toast-related nonsense = (t) * wank-related vandalism = (w) * adding "shitter" as a pseudonym for toilet = (s) * adding "I'm gona skin you alive." = (a) * Number8burp - (t) at ghost, (a) at Micropholis spectabilis * Joe5545 - (a) at Micropholis spectabilis; vandalized Gwernol's userpage for blocking him, probably with reference to User:Number8burp * <IP_ADDRESS> - (t) at ghost and (t) Toilet * <IP_ADDRESS> - (t) at ghost, vandalized toilet * Ghostseattoast - (t) at ghost, (w) at ghost, says he vandalizing for about 2 years [ * Ghostseattoast2 - (t) at ghost and userpages, , * Ghostseattoast3 - (t) at User:Gwernol * Ghostseattoast4 - (t) at ghost * Rant101 - (t) at ghost * Bob515Bob - (w) at ghost * 34dude9 - (t) at User talk:CambridgeBayWeather, vandalized ghost * Joe99joe - (t) at toilet, (w) at toilet * Endsplus - (s) at toilet * Bigburn4 - (s) at toilet, (w) at ghost * Saythatagain2 - (w) at User talk Gwernol, (w) at ghost * Meoryou88 - only edits are to vandalize ghost and toilet * Curveview - (w) at Micropholis spectabilis, (s) at toilet, vandalized ghost * Ghosttagger - (s) at toilet, vandalized ghost * Tradegoods - (w) at Micropholis spectabilis * Thebeansare - (t) at ghost and userpages I request to check if the above listed accounts belong to the same person, identify more sleeper accounts and if reasonable block the underlying range (probably <IP_ADDRESS>/16 per above IPs). --Oxymoron83 15:03, 17 April 2008 (UTC) * ✅ all, also * That rangeblock would not be appropriate at this time. Thatcher 11:24, 18 April 2008 (UTC) * blocked all the users listed. -- lucasbfr talk 20:42, 18 April 2008 (UTC) * That rangeblock would not be appropriate at this time. Thatcher 11:24, 18 April 2008 (UTC) * blocked all the users listed. -- lucasbfr talk 20:42, 18 April 2008 (UTC) * That rangeblock would not be appropriate at this time. Thatcher 11:24, 18 April 2008 (UTC) * blocked all the users listed. -- lucasbfr talk 20:42, 18 April 2008 (UTC) * That rangeblock would not be appropriate at this time. Thatcher 11:24, 18 April 2008 (UTC) * blocked all the users listed. -- lucasbfr talk 20:42, 18 April 2008 (UTC) * That rangeblock would not be appropriate at this time. Thatcher 11:24, 18 April 2008 (UTC) * blocked all the users listed. -- lucasbfr talk 20:42, 18 April 2008 (UTC) * blocked all the users listed. -- lucasbfr talk 20:42, 18 April 2008 (UTC) ''The above discussion is preserved as an archive of the Request for checkuser. Please do not modify it. Subsequent requests related to this user should be made above, in a new section.''
WIKI
Page:Pocket Manual of Rules of Order for Deliberative Assemblies (1876).djvu/25 § 4] withdraw it entirely; after it is stated he can do neither, without the consent of the assembly [see §§ 5, 17]. When the mover modifies his motion, the one who seconded it can withdraw his second. Exceptions: A call for the order of the day, a question of order (though not an appeal), or an objection to the consideration of the question [§§ 13, 14, 15], does not have to be seconded; and many questions of routine are not seconded or even made; the presiding officer merely announcing that, if no objection is made, such will be considered the action of the assembly. All Principal Motions [§ 6], Amendments and Instructions to Committees, should be in writing, if required by the presiding officer. Although a question is complicated, and capable of being made into several questions, no one member (unless there is a special rule allowing it) can insist upon its being divided; his resource is to move that the question be divided, specifying in his motion how it is to be divided. Any one else can move, as an amendment to this, to divide it differently. This Division of a Question is really an amendment [§ 23], and subject to the same
WIKI
Stretching Pros and Cons Toolbox Talk Use this toolbox talk to brief your crews on the importance of stretching and preventing injuries due to strenuous activities. Try in the App Stretching Pros and Cons Safety Talk Stretching is an important task for avoiding injuries. It is so easy to strain, sprain, or tear a muscle in your body when your body is not conditioned properly. The Bureau of Labor Statistics recorded 420,870 cases of muscle-related injuries in 2014. When people endure these types of injuries, it requires them to be off of work. Employees needing to miss work can make a construction project run beyond timelines. Ways To Avoid Strains and Sprains There are some safe work habits that you can use to avoid being injured. Lifting heavy items is one way to strain a muscle in your body. If you use the buddy system when lifting heavy objects, you can reduce the strain that you are putting on your body. Engineering controls need to be utilized to work as effectively and safely as you can. If your job involves manually lift heavy items, try implementing stretching routines beforehand. When your muscles are warmed up prior, you are less likely to sustain an injury. Benefits of Stretching Before Strenuous Activity You have always heard of stretching before a workout. But, do you stretch before work? The Mayo Clinic says there are benefits to stretching before beginning strenuous activities. If your job includes bending, straining and lifting some basic stretches before your day begins may help. A few of the benefits that you can see: • Improve your flexibility • Improves your posture • Improve your range of motion for joints • Decreases back pain • Increase muscle functioning • Reduce the chances of injuries due to job tasks • The Benefit Debate There is debating information on the true benefits of stretching before work. Some experts say it is a great idea, while others don’t see the true benefit of reduced injuries at work. It is more of a personal decision on whether it benefits you or not. If you choose to stretch before you begin your workday, it is definitely not going to cause any harm. There are just mixed reviews on whether it is going to help reduce work-related injuries. Whether you choose to stretch or not, you still need to take safety precautions to avoid getting hurt. How To Safely Stretch If you make the decision to stretch before work, you still need to do so safely. There are many instances of people pulling muscles during their stretching exercises. Dr. Nicholas DiNubile, an Orthopedic surgeon at the Hospital of the University of Pennsylvania in Philadelphia, does not advise you to put too much strain on cold muscles. You should begin with some aerobic exercises to get everything awake before you stretch. When you stretch, you should feel good. You should not experience pain. When stretching is painful, you are pushing your body too hard. Let off a little bit and work your way up. Advice From The National Academy Of Sports Medicine The proper way to stretch is to work your way into it. Your body becomes more flexible as you condition it. When you are stretching in the beginning, lean in until you feel the tension. That is the point that you want to stop so you do not injure yourself. Hold that position for about 30 seconds and release. If you injure yourself in the beginning, it is going to make it hard to continue. You are going to benefit the most if you take things slowly. If you are stretching for the prevention of an injury or to protect a previous injury, seek out your medical doctor’s advice. They can help to instruct you on the proper ways to perform these stretches. You Can Get Hurt Stretching When you are stretching, it is important to be aware of your limitations. You can stretch too much or too forcefully and injure yourself. There is sometimes a certain order in which stretching should happen. Especially, when you are performing different tasks. Stretches That You Can Try Work environments sometimes require strenuous activity that can lead to injuries. You can help to avoid these injuries with some stretches. It is your own personal decision if you feel they are beneficial to you. Some people will see results from stretching depending on how their body responds. Some beneficial stretches to try are: • Place your hands on your hips and twist at the hips right and left. • Stand tall and stretch arms above your head, hold for 15-30 seconds, and release. • Bend and touch your toes, hold each bend for a few seconds. • Shrug your shoulders up and down while inhaling and exhaling slowly. • Place hands on your hips and tilt side to side. • Relax your shoulders and roll them up and down. • All these stretches can be repeated a few times to get your body ready for your workday. It is important to listen to your body and not push it too far. You wouldn’t want to injure your body from trying to prevent an injury at work. Take Breaks Accordingly When you are lifting heavy items or performing strenuous activity, proper breaks are needed. If you perform tasks when you are getting overly tired or worn out, you are more likely to injure yourself. It can help if you take a 15-30 minute break to give your body a break. You can take that time to sit down for a minute. This is also a good time to perform a few stretches if you feel they help you. The same ones you used to start your day can be repeated as needed throughout the day. Safety Always Comes First You should always consider what the safest option is for you while working. If you feel that stretching before you begin is the right choice for you, then you should do it. It is important that everyone works in the safest manner that they can. You should always try to avoid injuries as much as possible. There are many pros and cons to the practice of stretching. It is more of a decision that you have to make for the health and wellbeing of your body. See how this toolbox talk works in the app • Choose from a pre-loaded library (or upload your own) • Schedule and assign topics for any project • Store digital attendance sheets in one place There’s an easier way to find and give toolbox talks—try it free for 15 days. Start Free Trial
ESSENTIALAI-STEM
Edward Larry DODSON, Plaintiff-Appellant, v. UNITED STATES GOVERNMENT, DEPARTMENT OF the ARMY, Defendant-Appellee. No. 92-1183. United States Court of Appeals, Federal Circuit. March 19, 1993. Rehearing Denied April 14, 1993. John D. Goldsmith, Trenam, Simmons, Kemker, Scharf, Barkin, Frye & O’Neill, Tampa, FL, argued for plaintiff-appellant. Donna C. Maizel, Atty., Commercial Litigation Branch, Dept, of Justice, Washington, DC, argued for defendant-appellee. With her on the brief were Stuart M. Ger-son, Asst. Atty. Gen., David M. Cohen, Director and James M. Kinsella, Asst. Director. Also on the brief were Lieutenant Colonel W. Gary Jewell and Captain Jill M. Grant, Dept, of the Army, Office of the Judge Advocate, Arlington, VA, of counsel. Before RICH, Circuit Judge, SMITH, Senior Circuit Judge, and ARCHER, Circuit Judge. ARCHER, Circuit Judge. Edward Larry Dodson appeals from the March 8, 1991 order of the United States District Court for the Middle District of Florida (No. 87-1436-Civ-T-10A) granting the United States’s motion for summary-judgment and denying Dodson’s motion for summary judgment. The order sustained the decision of the Army Board for Correction of Military Records (ABCMR), which held that Dodson’s discharge and bar from reenlistment was not the result of probable material error or injustice. We reverse and remand. I. The facts of this case though tortuous are not disputed. As of April 1982, Dodson was an E-6 Staff Sergeant in the United States Army, 25th Infantry Division, Hawaii. The Army inducted Dodson in 1965 and honorably discharged him two years later. Dodson enlisted in 1974. He was promoted to sergeant E-5 in 1976 and to staff sergeant E-6 one year thereafter. He reenlisted in February 1978, again in November 1980, and in 1981 he extended his enlistment for nine months, which established August 19, 1984 as his expiration of term of service date (ETS). Dodson served overseas in Vietnam from 1966 to 1967 and in Korea from 1978 to 1979. During his long period of service in the Army, Dodson received numerous awards and decorations. Pursuant to the Army’s Qualitative Management Program (QMP), Dodson received his eighth annual enlisted evaluation report (EER) for the period May 1981 to April 1982, scoring 124 (EER 124) out of a maximum 125, the average score being 121. The QMP is used by the Army to screen enlisted soldiers' Official Military Personnel Files (OMPFs) to “[selectively retain the best qualified soldiers” and “[djeny reenlistment to [those who are] nonprogres-sive and nonproductive.” Army Reg. 600-200, paras. 4-1, 4-2 (1982). Under the program the OMPFs of E-6 personnel, such as Dodson, are submitted to a regularly scheduled Promotion Selection Board. Army Reg. 600-200, para. 4-ll.a. “From the OMPF, the board will evaluate past performances and estimate the potential of each soldier to determine if continued service is warranted.” Army Reg. 600-200, para. 4-ll.b (emphasis added). , Sometime after receiving his EER, Dodson learned that a substitute rater mistakenly placed an EER 110 into Dodson’s OMPF. Dodson’s file, including the incorrect EER, was forwarded to the Promotion Selection Board for evaluation. When Dodson’s EER 124 was later discovered at the base, a personnel officer attempted to have the EER 110 returned and the EER 124 substituted, but was informed that Dodson had to appeal the EER to the EER Appeal Board, which Dodson did. On March 29, 1983, the Promotion Selection Board barred Dodson from reenlisting. In its letter of notification to Dodson, the board identified as the “basis” for the bar eight EERs, dating from Dodson’s first in December 1975 to his last, which was the erroneous one of April 1982, and a 1966 nonjudicial punishment for theft of two T-shirts. After the decision barring reenlistment, the EER Appeal Board in September 1983 ruled in Dodson’s favor, invalidating the EER 110 and deleting it from Dodson’s OMPF. The EER Appeal Board, however, did not complete Dodson’s file by including his correct EER 124. Dodson then attempted to appeal his reenlistment bar directly to the Army’s Military Personnel Center (MILPERCEN), which oversees the QMP. MILPERCEN returned Dodson’s appeal in November 1983 and directed him to submit it through his chain of command. Dodson asserts that when he attempted to appeal through his chain of command, his commanding officer gave him a direct order to wait until April 1984, when he was to return from an upcoming assignment in Korea. In April 1984, Dodson submitted an “individual” appeal pursuant to Army Regulation 600-200, para. 4-15.a, to the Army Reenlistment Appeals Board, accompanied by recommendations from his commanders and notice of the correct EER 124. While this appeal was pending, the Army transferred Dodson, on April 16, 1984, from Hawaii to .the 9th Infantry Division in Fort Lewis, Washington. Four days later, and before he left for Fort Lewis, Dodson’s battalion personnel officer executed a nine month extension of Dodson’s enlistment until May 19, 1985. On November 9, 1984, the Reenlistment Appeals Board disapproved Dodson’s appeal “based on [his] marginal performance of duty as reflected by his long history of below average enlisted evaluation reports, especially in [his] current grade.” After the Reenlistment Appeals Board disapproved Dodson’s individual appeal, he attempted to obtain a “commander” appeal to a Reenlistment Appeals Board pursuant to Army Regulation 600-200, para. 4-15.C. His then-current battalion commander in Fort Lewis told Dodson that because he did not know him, Dodson should appeal through his former Hawaii commander; accordingly, Dodson returned to Hawaii at his own expense to pursue a commander appeal. On December 3, 1984, Dodson’s former Hawaii battalion commander submitted a commander appeal to the Commander of the 25th Infantry Division, Hawaii, with the recommendations of three of Dodson’s former superiors. Dodson however was notified that pursuant to Army regulations the commander appeal must occur where the soldier was stationed at the time of the appeal. So, on December 7, 1984, the Commander of the 25th Infantry Division forwarded Dodson’s commander appeal to the Commander of the 9th Infantry Division for “review and action.” Also in December 1984, Dodson returned to Fort Lewis where he persuaded his battalion commander there to submit a commander appeal to the Commander of the 9th Infantry Division. These commander appeals, however, were discontinued by MILPER-CEN on December 19, 1984 and never acted upon. The Army honorably discharged Dodson on December 26, 1984, with a bar to reenlistment. Dodson again attempted to appeal the discharge and bar to MILPER-CEN, but Dodson’s appeal was rejected because he was no longer on active duty. MILPERCEN advised Dodson, that he should appeal to the Army Board for Correction of Military Records (ABCMR). On March 12,1985, Dodson applied to the ABCMR, requesting that it void his discharge, and retroactively restore him to active duty with an award of back pay. He asked in the alternative that his bar to reenlistment be lifted, that his EER 124 be inserted into his OMPF, and that he be allowed to seek reenlistment. Dodson asserted that his discharge was unjust and flawed by material error for several reasons. First, he contended that the Promotion Selection Board had considered an invalid EER in instituting the bar. Second, he asserted that the Army had assigned him to Fort Lewis during his bar appeal, thereby violating Army regulations as well as prejudicing his ability to adequately appeal. Third, he contended that while his commander appeals were pending the Army discharged him in violation of Army regulations. Finally, he argued that the Army discharged him before his extended ETS of May 19, 1985. The ABCMR denied Dodson’s application without hearing on February 26, 1986. In its Memorandum of Consideration, the ABCMR listed in the evidence of record the following EERs: PERIOD RATING 118 Sep 75 to Dec 75 102.5 Jan 76 to Nov 76 110 Dec 76 to Jun 77 121 Jul 77 to May 78 101.5 Jun 78 to Apr 79 116.5 May 79 to Apr 80 118 May 80 to Apr 81 Unrated, EER Appeal May 81 to Apr 82 120 May 82 to Apr 83 120 May 83 to Apr 84 The ABCMR had obtained two advisory opinions. One was from MILPERCEN which recommended that Dodson’s request for reenlistment be denied based on his poor history of performance, consistent with the decision of the Reenlistment Appeals Board’s decision in Dodson’s individual appeal. The second was from the Office of the Judge Advocate General (JAG) which “opined that [Dodson’s] bar to reenlistment was processed in accordance with applicable regulations, and that he was not denied any due process or other legal rights.” The JAG believed that the transfer to Fort Lewis during the pendency of the individual appeal did not violate Dodson’s rights because the Army regulation prohibiting such assignment was for the benefit of the Army, not the soldier, and therefore did not give soldiers any rights which could be violated. According to the JAG opinion, the transfer did not “substantially adversely” affect Dodson because the Reenlistment Appeals Board had before it the commander’s recommendations when it denied Dodson’s individual appeal. Lastly, the JAG stated that the Army did not violate any of Dodson’s rights by discharging him before the expiration of his extension because the extension was a “mistake” which “was, if anything, to [Dodson’s] benefit.” The ABCMR adopted the findings and conclusions of the JAG that none of Dodson’s rights had been violated. The ABCMR concluded that the “apparent administrative errors” made in processing Dodson’s appeals and in transferring him were not “fatal flaws of sufficient magnitude” to warrant corrective action. In doing so, it found that Dodson’s performance had improved late in his career and that his commanders had recommended him favorably, but that this was “simply too little-too late” in light of Dodson’s “overall performance and potential.” The ABCMR determined that the Promotion Selection Board’s reliance on the erroneous EER 110 did not provide a basis for corrective action because the board had cited seven other EERs and a nonjudicial punishment for theft. Finally, the ABCMR noted that the Reenlistment Appeals Board had reviewed Dodson’s record after removal of the erroneous EER 110. Thus, the ABCMR denied the application, concluding that Dodson had failed to submit sufficient evidence to demonstrate the existence of probable material error or injustice. On September 25, 1987, Dodson sued the United States in the United States District Court for the Middle District of Florida challenging the decision of the ABCMR and seeking, inter alia, reinstatement and back pay. The parties stipulated to have the matter decided by cross-motions for summary judgment. After the district court granted the Army’s motion, Dodson appealed, asking this court to (1) lift the bar to reenlistment; (2) reenlist him, with full credit for time that would have been served had he not been improperly discharged, until such time as an Army Reenlistment Appeals Board considers his commander appeal; (3) award him back pay; and (4) order that the correct EER 124 be placed in his OMPF. II. Because the district court sustained the decision of the ABCMR upon the parties’ cross-motions for summary judgment, we review the decision of the district court de novo, reapplying the standard for summary judgment. National Cable Television Ass’n v. American Cinema Editors, Inc., 937 F.2d 1572, 1576 (Fed.Cir.1991). “Summary judgment is appropriate where the movant has established that there is no genuine issue as to any material fact and that the movant is entitled to judgment as a matter of law.” Id.; see Fed.R.Civ.P. 56(c). Two premises of law guide the disposition of this case. First, no one has a right to enlist or reenlist in the armed forces, unless specially given one by statute or regulation. Maier v. Orr, 754 F.2d 973, 980 (Fed.Cir.1985); Austin v. United States, 206 Ct.Cl. 719, 723-24 (1975). The Secretary of the Army may prescribe regulations for the acceptance of reenlistments. See 10 U.S.C. §§ 505(d), 508(b) (1988) (emphasis added). Accordingly, the Secretary has prescribed Army regulations setting out the Qualitative Management Program (QMP) by which the Army determines whom it will reenlist. See Army Regs. 600-200, 601-280, 623-205, 635-200. Although the Secretary was not required to promulgate the QMP regulations, having done so he is bound to follow them. Harmon v. Brucker, 355 U.S. 579, 582-83, 78 S.Ct. 433, 435-36, 2 L.Ed.2d 503 (1958); Service v. Dulles, 354 U.S. 363, 388, 77 S.Ct. 1152, 1165, 1 L.Ed.2d 1403 (1957); Voge v. United States, 844 F.2d 776, 779 (Fed.Cir.1988); Henneberger v. United States, 403 F.2d 237, 242, 185 Ct.Cl. 614 (1968). The second premise is judges do not run the Army. Orloff v. Willoughby, 345 U.S. 83, 93, 73 S.Ct. 534, 540, 97 L.Ed. 842 (1953). Rather, “[t]he responsibility for setting up channels through which [personnel] grievances can be considered and fairly settled rests upon the Congress and upon the President of the United States and his subordinates.” Id. at 93-94, 73 S.Ct. at 540. Accordingly, Congress has empowered the Secretary of the Army, acting under procedures established by him and through a board of civilians, to “correct any military record of [the Army] when the Secretary considers it necessary to correct an error or remove an injustice,” 10 U.S.C. § 1552(a)(1) (Supp.1989), and to “pay ... compensation ... if, as a result of correcting a record under this section, the amount is found to be due the claimant on account of his ... service in the Army,” 10 U.S.C. § 1552(c) (1988). Acting under the Secretary, the Army Board for Correction of Military Records considers “all applications properly before it for the purpose of determining the existence of an error or an injustice.” 32 C.F.R. § 581.3(b)(2). The ABCMR reviews each application and the available military records “to determine whether to authorize a hearing, recommend that the records be corrected without a hearing, or to deny the application without a hearing.” Id. § 581.-3(c)(5)(i). The ABCMR may deny an application without hearing “if it determines that insufficient relevant evidence has been presented to demonstrate the existence of probable material error or injustice.” Id. § 581.3(c)(5)(h) (emphasis added). These statutes and regulations make clear that the civilian correction boards have a duty to determine whether there has been error or injustice and, if there has been, to grant thorough and fitting relief. Sanders v. United States, 594 F.2d 804, 812-13, 817, 219 Ct.Cl. 285 (1979) (en banc); Yee v. United States, 512 F.2d 1383, 1387-88, 206 Ct.Cl. 388 (1975). The boards for correction of military records may be reviewed for failure to correct plain legal error committed by the military. Arens v. United States, 969 F.2d 1034, 1037 (Fed.Cir.1992); Grieg v. United States, 640 F.2d 1261, 1266, 226 Ct.Cl. 258 (1981); Sanders, 594 F.2d at 813. Such legal error includes the military’s “violation of statute, or regulation, or published mandatory procedure, or unauthorized act.” Skinner v. United States, 594 F.2d 824, 830, 219 Ct.Cl. 322 (1979); see Arens, 969 F.2d at 1040; Voge, 844 F.2d at 779. But military administrators are presumed to act lawfully and in good faith like other public officers, and the military is entitled to substantial deference in the governance of its affairs. Arens, 969 F.2d at 1037. Hence, a soldier who has sought relief from a correction board is bound by its decision unless he can demonstrate by “cogent and clearly convincing evidence that the correction board acted arbitrarily, capriciously, contrary to law, or that its determination was unsupported by substantial evidence.” Id.; see Chappell v. Wallace, 462 U.S. 296, 303, 103 S.Ct. 2362, 2367, 76 L.Ed.2d 586 (1983); Heisig v. United States, 719 F.2d 1153, 1156 (Fed. Cir.1983); Sanders, 594 F.2d at 811; Skinner, 594 F.2d at 830. III. Overall Dodson argues that, through an incorrect record placed into his OMPF—an EER 110—followed by a “Kafka[e]sque nightmare of Catch 22s, Army bungling, and the Army repeatedly violating its own regulations,” the Army has erroneously barred him from reenlisting. Dodson argues first that the ABCMR erred under the QMP by not correcting his OMPF to include the EER 124. He further argues that because the erroneous EER caused the reenlistment bar, the ABCMR should have further lifted the bar, reenlisted him, and awarded him back pay. The Army argues that substantial evidence supports the decision of the ABCMR that Dodson had been barred without probable material error or injustice because of Dodson’s entire military history of below average performance. It contends that the Promotion Selection Board instituted the bar based on eight below average EERs, the erroneous EER being only one of them, that the Reenlistment Appeals Board did not rely on the EER 110 when it denied Dodson’s individual appeal and affirmed the decision of the Promotion Selection Board, and that the ABCMR reconsidered the bar with the advice of MILPERCEN, thereby curing any procedural irregularities. Essentially, the Army argues, as the ABCMR found, that Dodson’s evidence— one EER 124—is “simply too little-too late.” In this case, the Army has entirely bypassed the requirements of the QMP in barring Dodson. It is undisputed that “the individuals who had the legal responsibility [under the QMP] to rate [Dodson] and who were in a position to observe his performance on a daily basis,” Grieg, 640 F.2d at 1267, gave him an EER 124. The EER 110 is not simply an “unfair” rating. It is a fiction, and the EER Appeal Board necessarily found to this effect in ruling in Dodson’s favor. Under Army regulations, the Promotion Selection Board was required to render a decision from Dodson’s OMPF. The procedurally defective rating rendered defective the OMPF that was before the Promotion Selection Board, and the Board explicitly told Dodson that it based the bar to reenlistment in part on his EER 110. This was the unfortunate, fortuitous result of the Promotion Selection Board rendering its decision before the decision of the EER Appeal Board, and the absence of coordination between the two boards. Further, the Reenlistment Appeals Board considered Dodson’s appeal on an OMPF containing a third, admittedly erroneous EER—“Unrat-ed, EER Appeal”—and the ABCMR addressed only the irrelevant question whether that EER would have made a difference over the EER 110. The Army argues that, even if it did not fully comply with the QMP, Dodson is not entitled to relief because he has not shown that he was prejudiced, see Connor v. United States Civil Serv. Comm’n, 721 F.2d 1054, 1057 (6th Cir.1983), and because the review by the ABCMR (with the advice of MILPERCEN) cured any procedural irregularities. We do not agree. A soldier seeking correction of his records need not prove that, had his records been correct, the adverse personnel action would not have occurred. Sanders, 594 F.2d at 817; Skinner, 594 F.2d at 831. In other words, the test is not “but for.” To require otherwise is to place an impossible burden on the soldier because the selection decision is highly discretionary and subjective, the proceedings of selection boards are secret, and the records of board proceedings are generally unavailable to soldiers. Sanders, 594 F.2d at 815-16. The nature of these proceedings underscores the independence with which the military governs its personnel affairs. This court does not sit as a super-selection board making personnel decisions for the Army, Skinner, 594 F.2d at 829-30, and neither may the ABCMR, Sanders, 594 F.2d at 817; Sawyer v. United States, 930 F.2d 1577, 1581 (Fed.Cir.1991) (distinguishing Sanders). The ABCMR reviews selection decisions for error; it does not, contrary to the Army’s repeated assertion, make selection decisions on a de novo basis. Therefore, the ABCMR’s mere consideration of a defective personnel decision does not cure the defect. Nor will a post hoc advisory opinion given by a MILPERCEN administrator to the ABCMR cure an otherwise erroneous selection decision. The ABCMR may potentially “remedy” an error which it has found to have occurred in a selection decision by ordering a new selection board convened to make the decision de novo. See Doyle v. United States, 599 F.2d 984, 998, 220 Ct.Cl. 285 (1979). However, a simple advisory opinion by MILPERCEN does not “undertake the exhaustive reevaluation that a normal, regular selection board does.” See id., 599 F.2d at 1001. In the present case, no one disputes that Dodson attained an EER 124. Yet remarkably through all of Dodson’s appeals the EER 124 was never placed in his OMPF. Rather, the Reenlistment Appeals Board, the JAG and MILPERCEN in their advisory opinions to the ABCMR, and the ABCMR itself all considered Dodson’s case with an EER for the period in question, “Unrated, EER Appeal.” The most critical item in a soldier’s personnel file is his EER. “[I]f it is low or compares unfavorably with those of his peers, it is fatal to his chances of selection.” Skinner, 594 F.2d at 831 n. 4; Army Reg. 623-205, para. 1-4.a (1984) (The EER system “largely determines the senior enlisted leadership of the Army.”). Unexplained gaps in a personnel file also are highly prejudicial. Sanders, 594 F.2d at 819. Thus, we cannot agree with the Army that Dodson has suffered no prejudice as a result of the Army’s violation of the QMP, or that the prejudicial error has been cured. We are also convinced that the Army committed statutory and regulatory violations during the course of the administrative reviews of Dodson’s case. Dodson argues that he was separated during the pendency of his commander appeal in violation of Army Regulation 600-200, para. 4-15.e (1982), which provides: “Once MIL-PERCEN receives a Commander’s Appeal, the soldier will not be separated until action has been taken on the appeal.” The Army claims that no violation occurred because MILPERCEN had not physically received the appeal by December 26, 1984, when Dodson was discharged. The Army also argues that Army Regulation 600-200, para. 4-15.e, does not confer a right on the soldier, but rather it is an option available to commanders, which as such does not give rise to a requirement that the Army follow its own regulations. The Army cites Army Regulation 600-200, para. 4-15.c, in support, which provides: “If the commander elects, he may appeal the bar to reenlistment on the soldier’s behalf.” Further, the Army argues that even if the Army violated the regulation, it was harmless error because the commander appeal added nothing to Dodson’s individual appeal that was denied by the Reenlistment Appeals Board. Also, the Army argues, the ABCMR’s comprehensive review of Dodson’s appeal cured any procedural irregularities because the ABCMR has de novo review over personnel decisions. The Army’s arguments are without merit. First, the Army presented no evidence that MILPERCEN had not physically received the appeal in Washington, D.C. Rather, the record contains a memorandum recording a telephone conference of December 19, 1984, wherein MILPERCEN stated that it would not “retain to process Commander’s Appeal.” Second, although the commander may institute an appeal on the soldier’s behalf, the regulations plainly state in mandatory language that once such appeal is instituted, the soldier will not be separated while the appeal is pending. The Army’s unilateral discontinuance of the appeal and discharge of Dodson violated this regulation. The ABCMR’s review, which does not appear to be as “comprehensive” as the Army characterizes it, did not cure the regulatory violation. Finally, because Dodson’s individual appeal was tainted with error in that, among other things, it was based on an incomplete OMPF, it cannot substitute for the undecided commander appeal. Dodson argues that he was transferred pending his commander appeal in violation of Army Regulation 614-200, para. 2, which he argues prohibits reassigning sol-, diers who are barred from reenlistment until action has been taken on all appeals. Dodson asserts that the transfer prejudiced his ability to adequately pursue and monitor his commander appeal. Dodson had to return to Hawaii at his own expense because no one knew him at Fort Lewis. Having done this, Dodson’s appeal was forwarded back to Fort Lewis because that is where Dodson was stationed. The Army offered no response to Dodson’s claim that the Army violated Army Regulation 614-200, para. 2. We thus see no reason to disagree with Dodson. Plainly, legal procedural error under the QMP was pervasive at every stage of the Army’s decision to bar Dodson from reenlisting. We are convinced therefore that the ABCMR erred in failing to correct such procedural error. See Clackum v. United States, 296 F.2d 226, 229, 148 Ct.Cl. 404 (1960). “The integrity and objectivity of the rating system go to the very heart of the military establishment’s effectiveness, and all we do here is to preserve it as the statutes and authorized procedures contemplate and mandate.” Skinner, 594 F.2d at 830. Dodson also contends that the Army improperly discharged him on December 26, 1984, prior to his ETS of May 19, 1985, thereby violating 10 U.S.C. § 1169 (1982), which provides: “No regular enlisted member of an armed force may be discharged before his term of service expires, except— (1) as prescribed by the Secretary concerned; ... or (3) as otherwise provided by law.” See also Army Reg. 635-200 (1984). The Army does not argue that it properly discharged Dodson before his ETS. Rather, the Army says that the extension of Dodson’s ETS from August 19, 1984 to May 19,1985 was invalid because MILPER-CEN itself did not sign the extension document. Therefore, argues the Army, it did not discharge Dodson before his ETS at all. The Army’s position is not supportable. The Army has not cited to us any regulation which would require that MILPER-CEN execute Dodson’s extension document. In contrast, Army Regulation 600-200, para. 4-7.a, plainly states that “Commanders having custody of personnel records may allow soldiers to extend their enlistment.” The record before the ABCMR contained a notarized document purporting to extend Dodson’s enlistment period on April 20, 1984, signed and sworn to by a Sgt. Caspers of the 25th Infantry Division, Hawaii. In its advisory opinion, the JAG justified the discharge to the ABCMR saying that the extension was a “mistake,” not that it was invalid. Indeed, the “evidence of record” before the ABCMR included a nine-month extension granted on “20 Apr 84.” Therefore, the Army violated 10 U.S.C. § 1169 in discharging Dodson prior to his ETS. The ABCMR, making its own personnel decision as to Dodson’s “overall performance and potential” and relying on two conclusory advisory opinions, one from the very body alleged to have erred, found that Dodson had probably not suffered any material error. We cannot agree. Dodson’s “military career was ... ruined through no fault of his own, but because of ... bureaucratic bungling. This was a clear error ... to [Dodson] but the Correction Board refused to exercise its authority and mandate, under statute and regulation, to correct it.” Skinner, 594 F.2d at 828; 10 U.S.C. § 1552 (1988); 32 C.F.R. § 581.3. We hold that undisputed evidence clearly and convincingly demonstrates that Dodson has suffered legal error, and that the ABCMR acted contrary to law in finding otherwise. The evidence being undisputed, a further proceeding before the ABCMR is not necessary. Accordingly, the judgment of the district court is reversed. IV. Although judgment is for Dodson, his remedy is limited. Because no one has a right to enlist or reenlist in the armed forces unless specially granted one, an enlisted serviceman who has been improperly discharged is entitled to recover pay and allowances only to the date on which his term of enlistment would otherwise have expired had he not been so discharged. Maier, 754 F.2d at 983; Austin, 206 Ct.Cl. at 723; Clackum v. United States, 161 Ct.Cl. 34, 36 (1963). Further, we will not decide whether the Army would have exercised its discretion to reenlist Dodson, had legal error not occurred. That decision is properly for the Army, not the court. See Sargisson v. United States, 913 F.2d 918, 922 (Fed.Cir.1990). We can however remedy the legally defective process so as to put Dodson into the position that he would have been had the proper procedures been followed at the relevant times. Doyle, 599 F.2d at 996; see Neal v. Secretary of the Navy, 639 F.2d 1029, 1045 (3d Cir.1981). Therefore, we conclude that Dodson is entitled to back pay and allowances to May 19, 1985, the date of his proper ETS, and we remand to the district court for a proper determination as to this amount. In addition, we instruct the district court to order (1) that the correct EER 124 be placed into Dodson’s official military personnel file; and (2) that if Dodson seeks reenlistment, the bar to his reenlistment be lifted and his application for reenlistment be considered anew. REVERSED and REMANDED. .Among Dodson’s awards are the Vietnam Service Medal, the National Defense Service Medal, the Vietnam Campaign Medal, the Vietnam Cross of Gallantry Medal, the Army Good Conduct Medal, the Humanitarian Service Medal, two Non-Commissioned Officer Professional Development Ribbons, two Overseas Service Bars, and the Expert Qualification Badge. . The EER 124 document was again lost. However the Army does not dispute its existence. . Army Regulation 623-205 sets out the Enlisted Evaluation Reporting System. That regulation authorizes the EER Appeal Board to "[c]hange[ ] the soldier's official records, if appropriate.” See Army Reg. 623-205, para. 4-3.d(l) (1984). . No particular regulations for this requirement have been cited thus far. . MILPERCEN has authority over the QMP. MILPERCEN includes within it the various EER Appeal Boards, the Army Promotion Selection Boards, and the Army Reenlistment Appeal Boards. See generally Army Regs. 600-200, 601-280, 623-205, 635-200. . The boards may also be reviewed for failure to correct an alleged injustice where factual, rather than legal, error has been committed by the military and the error is so shocking to the conscience that boards' failure to correct it rises to the level of legal error. See Grieg, 640 F.2d at 1266; Sanders, 594 F.2d at 813. . The Army has vigorously disputed this case on the merits, without asserting that it raises any non-justiciable issues. Nevertheless, we emphasize that we are reviewing the procedural regularity of the bar to reenlistment, not the substance of the Army’s decision to bar Dodson from reenlisting, or the substance of a decision by the Army declining to accept Dodson’s reenlistment. See Sargisson v. United States, 913 F.2d 918, 922 (Fed.Cir.1990) (improper for court to rate soldiers according to their relative merit in order to decide whether Secretary complied with regulation); Voge v. United States, 844 F.2d 776, 780 (Fed.Cir.1988) (improper for court to decide whether a soldier is substantively deserving of additional compensation); Maier v. Orr, 754 F.2d 973, 984 (Fed.Cir.1985) (improper for court to decide whether a person is physically fit for service); Mindes v. Seaman, 453 F.2d 197, 201-02 (5th Cir.1971) (discussing the factors for the reviewability of internal military affairs); McDaniel, The Availability and Scope of Judicial Review of Discretionary Military Administrative Decisions, 108 Mil.L.Rev. 89, 113-35 (1985) (re-viewability depends on the "particular claim raised and the nature and breadth of discretion involved”). . Because we conclude that the ABCMR erred under 10 U.S.C. § 1552, we do not decide the constitutional question whether Dodson's rights under the Due Process Clause of the Fifth Amendment were violated. See Neal v. Secretary of the Navy, 639 F.2d 1029, 1041 n. 12 (3d Cir.1981). . This award is limited by the jurisdiction of the district court to $10,000. 28 U.S.C. § 1346(a)(2) (1988).
CASELAW
Page:Encyclopedia of Virginia Biography volume 4.djvu/72 48 VIRGINIA BIOGRAPHY Welsh and Margaret (Glendy) Darst, was born in Pulaski county. Virginia, Novem- ber lo, 1875, '^"f^ lived on his father's farm until he was thirteen years of age. The fol- lowing year, upon the death of his mother, he made his home in Salem, there complet- ing his preparatory education and for two years attending Roanoke College. For the two years following he was engaged in busi- ness in West Virginia and New Jersey, then returning to Roanoke College he completed the course he had begun four years before. In 1899 he entered the Virginia Seminary, and was graduated in divinity in the class of 1902, in June of that year becoming a dea- con of the Protestant Episcopal church. For one year he was connected with the parish of Fairmount, West Virginia, and in June, 1903, was ordained into the priesthood, being first assigned to Johns and Meade parish in Fauquier and Amherst counties. Rev. Darst in 1905 came to St. Mark's Church, of Richmond, and there remained for four years, in December, 1909, taking charge of St. Paul's Church, at Newport News, Vir- ginia. He returned to Richmond in 1914 as assistant to Rev. William Clark, D. D., rector of St. James' Church, and in ^lay, 1914, upon the death of Dr. Clark, succeeded him as rector. Additional duties and honors came to Rev. Darst in October of the same year (1914) in his elevation to the office of bishop, his diocese. Eastern Carolina, his investment as bishop occurring on October 8. That Rev. Darst will worthily uphold the dignity and honor of his high position and that his consecrated service will be hap- pily rewarded is the sentiment in the minds and hearts of his co-laborers in religious work. Laity and clergy have found him true to every trust, and he is lacking in none of the attributes that comprise the successful minister of the gospel, not the least of which is a life strict in rectitude beyond reproach. IJishop Darst is a member of the Pi Kappa Alpha fraternity, to which he was elected during his student years. His other fra- ternal associations are the Masonic order and the Knights of Pythias. He married, at "Araby." Fairfax county, Virginia, November 5, 1902, Florence New- ton Wise, born in Alexander, Virginia. De- cember 17, 1876, died January 12, 1914, daughter of George Wise, of "Araby," near Alexandria, Virginia, engaged in insurance business. George Wise married Ida, sister of Colonel William Smoot, of Alexander, Virginia. Children of Bishop Thomas Campbell and Florence Newton (Wise) Darst: George Wise, born July 16, 1904; Thomas Campbell Jr., born August 31, 1907; Meade Clark, born March 14. 1910. John Campbell Hagan. This branch of the Hagan family in America springs from the O'llagans of Ireland, the "O" being gen- erally omitted on this side of the Atlantic. TIk- family has been noted for prominence in ])usiness, law and literature, in both Ireland and the United States. The grand- father of John Campbell Hagan of Rich- mond, Virginia, was John Hagan, a farmer and landed proprietor, a man of education and resolute character, who was born, lived and died in Ireland. His wife, Ellen (Camp- bell) Hagan, was of bright intellectual qual- ities, a lover of the good, beautiful and true, inspiring in her children the same ambitious hopes that the limitation of her Irish home denied fruition. (II) John (2) Hagan, son of John (i) and Ellen ( Campbell) Hagan, was born in Clanoe, county Tyrone, Ireland, died at Richmond, Virginia, October 14, 1874. After coming to the United States and settling in Richmond, he engaged in mercantile life. He was a sol- dier in the Confederacy, serving in Company- .\. Tenth Virginia Battalion, enlisting as pri- vate and attaining the rank of sergeant. He was a Democrat in politics, and a member of the Roman Catholic church. He married Catherine Downey, born in Richmond, Vir- ginia, who survives him. Children : John Campbell ; John Felix, died in infancy ; Mary Catharine, died in infancy. (III) John Campbell Hagan, son of John (2) and Catherine (Downey) Plagan, was born in Richmond, Virginia, December 25, 1857, now an honored financier of his native city. He was educated in the Richmond l)rivate schools and at Georgetown Univer- sity, Washington, D. C, and began his busi- ness career in the freight department of the Richmond and Petersburg Railroad Com- ])any, continuing two years. He spent the next two years with the Chesapeake & Ohio Railroad at Charlottesville, then accepted an offer from a Massachusetts shoe manufac- turing concern and spent twelve years in their employ. He then returned to his native city, where he became financially interested with several manufacturing enterprises, but
WIKI
Charter of the Rights of the Family The Charter of the Rights of the Family ("The Charter", La carta in Italian) was "Presented by the Holy See to all persons, institutions and authorities concerned with the mission of the family in today's world" on October 22, 1983. Preamble A. The rights of persons, even though expressed as rights of the individual, have a fundamental social aspect which finds a vital expression in the family. B. The family is based on marriage, constituted in the freely contracted bond of matrimony and open to the gift of children. C. Marriage is a natural institution to which the mission of reproduction is entrusted. D. The family exists before the State or any other community and is a natural society with inalienable rights. Original Text Vatican.va "La carta"
WIKI
Notre Dame College (Staten Island) Notre Dame College was a small Catholic women's college located in the Grymes Hill area of Staten Island, New York. It opened in 1933 as an affiliate of Fordham University and merged with St. John's University in 1971. Notre Dame was located on the former estate of Herbert Gans. It opened with 13 students and graduated its first class in 1935. The alumnae association now has about 1,600 active members. The college's campus is now the Staten Island campus of St. John's. The Gans Family Estate The site of the college, now St. John's Staten Island campus, was originally purchased in the early 20th century by immigrant John Gans. He chose the Grymes Hill location for his family estate because it overlooked New York Harbor, where he operated a steamship company. The main house of the estate, a 30-room Georgian mansion, was completed in 1915 and became home to son Herbert Gans and his family. Founding In the early 1930s, Herbert Gans and his wife befriended Mother Saint Egbert, later known as Sister Helen Flynn, a Sister of the Congregation of Notre Dame. She had just been named the director of the newly established Staten Island extension of Fordham University which was housed at Notre Dame Academy (Staten Island), a private school down the road from the Gans estate. When the small college of 13 students received its own charter in 1933, the Gans family sold the family mansion to the new Notre Dame College, which became a Catholic undergraduate college for women. The home, renamed Flynn Hall after the college foundress, opened in 1934 and graduated its first class in 1935. In 1937, Lavelle Hall, an academic building, was added and named in honor of Monsignor Lavelle, the Vicar General of the Archdiocese of New York. A science building followed in 1945 named Mahoney Hall, after its principal benefactor. In 1955, the college doubled its property with the purchase of the Herbert Gans estate, which included several properties, the largest of which served as the college library. It was named Spellman Hall after Francis Spellman, then cardinal archbishop of the Archdiocese of New York, who contributed toward its reconstruction. The final purchase, an English Tudor home at the far end of the campus, was made in 1965. The Drury family, who had purchased the house from Hans Gans in 1945, sold the house and surrounding property to Notre Dame College. It was renamed Rosati Hall in honor of Bishop Joseph Rosati, C.M. 1789–1843. Consolidation Notre Dame College served the community as a premier women's college for over 30 years. During the late 1960s, when it became difficult for small colleges to survive, Terence Cooke, then Cardinal Archbishop of the Archdiocese of New York, asked the Vincentian Fathers of St. John's University, to integrate Notre Dame College, in order that Catholic higher education remain a vibrant presence in the Staten Island community and its environs. On January 27, 1971, the New York State Board of Regents approved the consolidation and the Staten Island Campus of St. John's University became a reality. Classes began in the fall of 1971, combining the original Notre Dame College with the Brooklyn campus of St. John's, offering undergraduate degrees in liberal arts, business and education. Closing Due to declining enrollment, St. John's announced that the Staten Island campus is scheduled to close in spring 2024.
WIKI
When a page on your website doesn't load, an error message shall be shown to the site visitor. Since there are different errors, there are different pages that'll show up, but what's common for all of them is that they are generic and almost certainly shall have absolutely nothing in common with the layout of your site, which could be irritating for any site visitor. This is the reason why web hosting service providers have introduced a feature referred to as Custom Error Pages. For a range of different errors, visitors will see your unique content, which can be informative or amusing, based on your taste, and that will match the layout of your Internet site, so the pages shall not look like they are not part of your website at all. You may use this option for numerous errors - 400 (Bad request), 401 (Unauthorized), 403 (Forbidden) and 404 (File not Found). Custom Error Pages in Shared Hosting The customized error pages function is offered with each shared hosting package that we offer and you shall be able to swap the generic pages with your own with no more than several mouse clicks from your Hepsia hosting CP. You will need to develop the actual files and to upload them to your account, and then to set them for a particular domain or subdomain through the Hosted Domains section of the Hepsia CP. You may do this for each site hosted inside the account independently, so that each set of customized pages will have the same design as the Internet site it is part of. If necessary, you can always go back to a default page from our system or to a default Apache server page. One other way to set custom made error pages is to create an .htaccess file in the domain/subdomain root folder and to include a few lines in it. If you never done this before, you may simply copy the required program code from our Help article about this. Custom Error Pages in Semi-dedicated Hosting Our Linux semi-dedicated hosting support customized error pages, so you will be able to employ this feature for every single domain or subdomain hosted inside your account. All it takes to do that is to navigate to the Hosted Domains section of the Hepsia Control Panel, to click the Edit button associated with the given domain/subdomain and to enter the link to the custom file. You are able to do this independently for each and every error type. You'll be able to switch back to a default error page anytime if necessary and the change will take effect instantly. Another way to achieve the same result is to put an .htaccess file inside the domain or subdomain folder of the Internet site which you would like to change and to enter a few lines of code within it. If you need to try this method, you could copy and paste the needed code from our Knowledge Base article on custom error pages, therefore you will not need any coding skills or previous experience.
ESSENTIALAI-STEM
BRIEF-Scholastic reports first quarter fiscal 2017 results Sept 22 (Reuters) - Scholastic Corp * Scholastic reports first quarter fiscal 2017 results * Reaffirms FY 2017 earnings per share view $1.60 to $1.70 from continuing operations excluding items * Q1 loss per share $1.15 from continuing operations excluding items * Sees FY 2017 revenue $1.7 billion to $1.8 billion * Q1 revenue rose 48 percent to $282.7 million * Q1 loss per share $1.15 from continuing operations * Says fiscal 2017 outlook affirmed Source text for Eikon: Further company coverage:
NEWS-MULTISOURCE
How JustAnswer Works: • Ask an Expert Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm. • Get a Professional Answer Via email, text message, or notification as you wait on our site. Ask follow up questions if you need to. • 100% Satisfaction Guarantee Rate the answer you receive. Ask Randall C Your Own Question Randall C Randall C, ASE Master Tech Category: Cadillac Satisfied Customers: 12789 Experience:  ASE Master Tech, 32 years exp,Cadillac 6 yrs 13677702 Type Your Cadillac Question Here... Randall C is online now A new question is answered every 9 seconds 2003 escalade: I program the home remote system This answer was rated: How do I program the home remote system on my 2003 escalade? I just bought it. Hello, below are the directions. If they do not work, you could have a conflict and then you have to make a phone call to # XXXXX for help Turn the ignition OFF while programming the GDO transmitter. Follow these steps to program up to 3 channels: 1. If you have previously programmed a transmitter, proceed to Step 2. Otherwise, hold down the 2 outside buttons on the GDO transmitter for approximately 20 seconds , until the light on the GDO transmitter begins to flash rapidly. Then release the buttons. This procedure erases any previous settings and initializes the memory for all 3 channels. 2. Decide which of the 3 channels you want to program to the transmitter you have. 3. Hold the end of the hand-held transmitter against the front surface of the GDO (less than 1 inch) so you can still see the light. 4. Using both hands, press the hand-held transmitter button and the desired button on the GDO transmitter. Continue to hold both buttons through Step 5. 5. Hold down the buttons on both transmitters until you see the light on the GDO transmitter flash slowly and then rapidly. The rapid flashing, which could take up to 90 seconds , indicates that the GDO transmitter has been programmed. Release the buttons on both transmitters when the light starts to flash rapidly. IMPORTANT: The GDO is compatible with most, but not all, types and brands of transmitters. If the GDO light does not flash rapidly after 90 seconds, there may be a compatibility conflict with the transmitter used to program the GDO. Call HomeLink(TM) at 1-800-355-3515 in order to address this problem. Randall C and 2 other Cadillac Specialists are ready to help you
ESSENTIALAI-STEM
Number Theory: Lecture 8 In which we prove the law of quadratic reciprocity and generalise the Legendre symbol. • Theorem 25 (Law of quadratic reciprocity): Let p and q be odd primes.  Then \genfrac{(}{)}{}{}{p}{q} = (-1)^{\frac{p-1}{2} \frac{q-1}{2}} \genfrac{(}{)}{}{}{q}{p}.  That is, if p \equiv q \equiv 3 \pmod{4} then \genfrac{(}{)}{}{}{p}{q} = - \genfrac{(}{)}{}{}{q}{p}, and if not then \genfrac{(}{)}{}{}{p}{q} = \genfrac{(}{)}{}{}{q}{p}.  We proved this using Gauss‘s lemma (which we saw in Lecture 7), interpreting the quantities that arise in that lemma as counting lattice points in certain regions of the plane. • Exercise: Let p and q be odd primes, and let a be an integer.  Show that if there is an integer k such that p = q + 4ak or p = -q + 4ak, then \genfrac{(}{)}{}{}{a}{p} = \genfrac{(}{)}{}{}{a}{q}. • Definition: Jacobi symbol \genfrac{(}{)}{}{}{a}{n} for an integer a and an odd natural number n.  We noted the important point that \genfrac{(}{)}{}{}{a}{n} = 1 does not mean that a is a quadratic residue modulo n.  (Find your own examples to be clear about this.) • Lemma 26: The Jacobi symbol is totally multiplicative: for any integers a, b and any odd natural number n, we have \genfrac{(}{)}{}{}{a}{n} \genfrac{(}{)}{}{}{b}{n} = \genfrac{(}{)}{}{}{ab}{n}.  We also have \genfrac{(}{)}{}{}{a}{mn} = \genfrac{(}{)}{}{}{a}{m} \genfrac{(}{)}{}{}{a}{n} for any integer a and odd natural numbers m and n.  The former follows from the definition of the Jacobi symbol and the multiplicative property of the Legendre symbol (which we saw in Lecture 6), and the latter from the definition of the Jacobi symbol. • Lemma 27: Let n be an odd natural number.  Then \genfrac{(}{)}{}{}{-1}{n} = (-1)^{(n-1)/2} and \genfrac{(}{)}{}{}{2}{n} = (-1)^{(n^2-1)/8}.  These are the direct analogues of Corollary 22 and Corollary 24, and follow from them. • Theorem 28 (Quadratic reciprocity for the Jacobi symbol): Let m and n be odd natural numbers.  Then \genfrac{(}{)}{}{}{m}{n} = (-1)^{\frac{m-1}{2} \frac{n-1}{2}} \genfrac{(}{)}{}{}{n}{m}.  Note that by stating it in this way we have a result that is true even if m and n are not coprime.  If you prefer to state it another way, then you may need to be more careful.  Please try to prove this for yourself before next time; I’ll start the next lecture with a proof. These results make it relatively straightforward to compute Legendre symbols and Jacobi symbols; try some examples for yourself to get a feel for the types of calculation involved. Further reading The exercise above is to deduce a result from the law of quadratic reciprocity.  I encourage you to try to prove the result directly from Gauss’s lemma, and then to deduce the law of quadratic reciprocity from the result.  This is the approach that Davenport (The Higher Arithmetic) describes, and that Gareth Taylor has summarised in these online notes.  Baker (A concise introduction to the theory of numbers) and Jones and Jones (Elementary Number Theory) both give the lattice-point proof of quadratic reciprocity that we saw in lectures. I see that there is also a CATAM project that invites you to explore some of the computational questions arising from the study of quadratic (and other polynomial) congruences — that would be a particularly interesting thing to investigate now that you’ve seen some of the theory. Preparation for Lecture 9 Next time, once we’ve proved quadratic reciprocity for the Jacobi symbol, we’ll move on to something slightly different: binary quadratic forms.  These are objects of the form ax^2 + bxy + cy^2, where the coefficients a, b and c are integers (and we think of x and y as integer variables).  We are going to be interested in questions to do with which numbers can be represented by such forms (that is, as x and y range over the integers, which values do we get from ax^2 + bxy + cy^2?).  Here are some questions that you could usefully try yourself before the lecture. • Which numbers are represented by the form 4x^2 + 12xy + 9y^2? • Which numbers are represented by the form x^2 + y^2?  (That is, which numbers can be written as a sum of two squares?) • What about other forms?  Try your own example(s). • When do two forms represent the same set of numbers?  For example, can you find any forms that give the same set of numbers as the form 4x^2 + 12xy + 9y^2, or the same set of the numbers as the form x^2 + y^2? • What is the link between binary quadratic forms ax^2 + bxy + cy^2 and 2 \times 2 integer matrices with determinant 1 (that is, elements of SL_2(\mathbb{Z}))? Advertisements Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out / Change ) Twitter picture You are commenting using your Twitter account. Log Out / Change ) Facebook photo You are commenting using your Facebook account. Log Out / Change ) Google+ photo You are commenting using your Google+ account. Log Out / Change ) Connecting to %s %d bloggers like this:
ESSENTIALAI-STEM
Information The topic you requested is included in another documentation set. For convenience, it's displayed below. Choose Switch to see the topic in its original location. General Tips for the SQL Workflow Toolbar This content is no longer actively maintained. It is provided as is, for anyone who may still be using these technologies, with no warranties or claims of accuracy with regard to the most recent product version or service release.   Richie Weldon Microsoft Corporation March 2001 Applies to:    Microsoft® Office XP Developer Summary: This article discusses several tips for making the Microsoft Office XP Developer Workflow Toolbar more effective for users. The workflow toolbar is an ActiveX control that integrates with data access pages. It displays the workflow events available to the user for each record in the workflow application. (6 printed pages) Contents Introduction Adding the Workflow Toolbar to Your Access Toolbox Changing the Background and Border Options Showing Only Actions Available to the User Minimizing the Number of Change Buttons Altering the Order in which Buttons Appear on the Workflow Toolbar Adding Script to Trap Workflow Toolbar Events Introduction This article focuses on enhancing the SQL Workflow Toolbar for Microsoft® Office XP Developer SQL Workflow Solutions. Hereafter the SQL Workflow Toolbar will be referred to as the workflow toolbar. It is assumed that you are familiar with Microsoft SQL Server management, Microsoft Access Data Access Pages, Microsoft Visual Basic® Scripting Language (VBScript), and Microsoft FrontPage® Web sites. In addition, you must have access to computers equipped with Microsoft SQL Server 2000 and Microsoft FrontPage Server Extensions. The recommended operating system is Microsoft Windows® 2000. Instructions are given with the following assumptions: • A standard SQL Workflow Solution was created using the Microsoft Office XP Development Environment. • You are working on a computer where Microsoft Access 2002 is installed. • You fully installed Microsoft Office XP Developer product. Adding the Workflow Toolbar to Your Access Toolbox If you create more than one data access page, you might want to add a button to the Access toolbox for the workflow toolbar. Doing so will enable you to access the workflow toolbar and place it on data access pages without having to scroll through all the available ActiveX elements. Assuming Microsoft Access 2002 is launched, you previously created a Data Access Page and an Access Data Project, and the Data Access Page is currently in design view, the following steps illustrate how to add a button for the workflow toolbar to the Access toolbox. Adding a button to the toolbox 1. Right-click any area of the Access toolbox, and select Customize from the context menu. 2. Select the Commands tab on the Customize dialog box. 3. Scroll to the bottom of the Categories list, and select ActiveX Controls. 4. Scroll through the Commands list, and select Microsoft Office Developer Workflow Toolbar. 5. Drag the selected item from the Commands list onto the Access toolbox. Now you have the option to leave the button as-is or customize it to resemble other buttons in the toolbox. Customizing the button will make it possible for you to replace the name of the ActiveX object with an icon. Note   If you closed the Customize dialog box, you will not see the appropriate context menu when you right-click the workflow toolbar button. Reopen the dialog box by right-clicking the toolbox and selecting Customize from the context menu. Customizing the newly added button 1. Right-click the newly added button. 2. Select Default Style if you want to display an icon instead of text for the button face. 3. Select Change Button Image to change the default icon for the button face. 4. Close the Customize window. Changing the Background and Border Options When the workflow toolbar is placed on a data access page, it appears flat because of the default options for both the background color and border color. Fortunately, both of these options are changeable, thus making it possible for the workflow toolbar to be better integrated with your data access page. Changing the background color 1. Make sure the Data Access Page is in Design view and contains the Workflow toolbar. 2. Right-click the Workflow toolbar, and select Element Properties from the Context menu. 3. On the Format tab, select the text entry box for BackgroundColor. When the BackgroundColor text box is selected, an ellipsis becomes available to the right of the field, making it possible to use the color-picking tool. 4. Click the ellipsis (...) to the right of the text entry box to view the color-picking tool. Select one of the predefined colors, or create your own. Alternatively, if you are familiar with RGB values, you can enter in the hexadecimal value. Do not forget to include the pound (#) sign if you enter in an RGB value. 5. Save your Data Access Page. To view the changes you made to the BackgroundColor for the workflow toolbar, you should load the Data Access Page in Internet Explorer or switch to page view mode by selecting View, then Page View, from the menu bar. When you are done previewing your page, you should switch back to design view. Changing the border options 1. Find the BorderStyle entry on the Format tab, and enter in the type of border you want to display. The default value is none, however any of the following values are acceptable: • Dotted • Dashed • Solid • Double • Groove • Ridge • Inset • Outset 2. Find the BorderColor entry. Here, you can either specify an RGB value or use the color-picker tool to choose the color you want. To launch the color-picker tool, click the ellipsis (...) to the right of the text box. 3. Find the BorderWidth entry. For this item, you should choose between medium, thin, and thick. Medium is the default value. In addition, you can specify a specific value, such as 12.75 px. An acceptable value is a floating-point number followed by one of the following units: cm, mm, in, pt, pc, or px. Showing Only Actions Available to the User If your workflow has many transitions, a large number of buttons will appear on the workflow toolbar when the data access page is loaded in Internet Explorer. Because the workflow toolbar displays all of the buttons in a linear fashion, the user will have to scroll horizontally across the page until they find the desired action. By setting the HideUnavailableActions property to True, you can diminish the number of buttons the user is presented with at each workflow state. Setting the HideUnavailableActions property 1. Make sure the Data Access Page is in Design view and contains the Workflow toolbar. 2. Select the All tab, and look for the HideUnavailableActions entry. 3. Change the value to True. Performing this task will display only those transitions that the user can access immediately for a particular record. The number of buttons displayed on the toolbar should decrease. Minimizing the Number of Change Buttons In addition to hiding unavailable actions, you also can reduce the number of buttons displayed on the workflow toolbar by renaming captions for transitions of similar actions. For example, you only need one button to make it possible for the user to edit data at each of the workflow states. Making use of a common Edit button Unlike the previous tasks, this task requires you to change items on your workflow. 1. Launch the MOD Development Environment, and open the SQL workflow solution. 2. Open your workflow process definition by double-clicking the workflow process in the Solution Explorer. 3. Locate all the transition-within shapes on the diagram surface. 4. Select each one individually, and change the caption value to say Edit. 5. Make sure you save the changes to the workflow diagram. If you do not save the changes, the workflow toolbar will not show the updated changes. 6. In Internet Explorer, refresh the Data Access Page. Now, you should have only one Edit button. This button can be used to change values of records at any state in your workflow. Altering the Order in which Buttons Appear on the Workflow Toolbar Now that you have one common button to make it possible for users to edit data, you probably want to reorder the buttons, so the edit button is more logically located. Placing the Edit button near the front should make it easy for user to access. Changing the order in which buttons are displayed 1. Load SQL Sever Enterprise Manager. 2. Expand the database node for your SQL Server. 3. Expand the node for your database. 4. Select the Tables item under the database node. 5. Right-click the table that ends with the string WorkflowActions. 6. In the <maintable>WorkflowActions table, locate the column for Position. In this column, you can add an integer value to specify the order for each action. The integer value with the lowest value will be displayed first, followed by the next lowest, and so on. You can leave some buttons in their default order by leaving their position values as NULL. These buttons will appear after the ordered buttons are displayed. Adding Script to Trap Workflow Toolbar Events It is possible to add script to trap certain events that are fired off from the workflow toolbar. This can help you display information to the user in a message box or automatically add values to fields on a data access page. The following steps explain how to add values to a field. Adding script to auto-populate a field 1. Load the Data Access Page in a text editor, such as Microsoft Script Editor. 2. Look for the script tag in the HTML source code. 3. Just above this script tag, place the following code: <script language=vbscript event=ClickAction for=ActiveXCtl0> if ActiveXCtl0.Event.Caption = "Record Date" szDescription.value = date end if </script> 4. Save the script by clicking the Save button. 5. Load the Data Access Page in Internet Explorer. There are numerous methods and events you can call based on the object model for the workflow toolbar and the data access page. In the previous example, szDescription is a field on the data access page. If you want to set focus to this field instead of assigning it a value, type in szDescription.focus on the line that says szDescription.value = date. Show:
ESSENTIALAI-STEM
Midday Update: Stocks Trend Higher as Focus Shifts To FOMC Wall Street's major market averages were cautiously higher at midday on Tuesday as investors dismissed President Trump's threats against North Korea and soft housing market data to focus on the likelihood that the Federal Reserve will not veer from its policy mandate of gradual rate hikes. As a result, the Dow Jones Industrial Average was trading higher for a sixth straight day, outpacing gains in the S&P 500 and Nasdaq Composite. New homes under construction fell by 0.8% in August to a seasonally-adjusted annual rate (SAAR) of 1.180 million from an upwardly revised SAAR of 1.190 million, but beating the estimated 1.173 million. Permits, however, were up 5.7% to a SAAR 1.300 million from an upward revised 1.230 million in July. Also, import and export prices were both higher by 0.6% last month, the strongest monthly gain in 14 months, better than expectations for a gain of 0.4% and 0.2%, respectively. European equities traded higher on Tuesday despite a slightly stronger euro as stocks were bolstered by upbeat economic data. In Germany, the ZEW index of economic sentiment jumped to 17.0 in September from 10.0 the month prior, while the corresponding EU index rose to 31.7 from 29.3 in August. Crude oil was down $0.19 to $49.72 per barrel. Natural gas was down $0.01 to $3.14 per 1 million BTU. Gold was up $1.70 to $1,312.50 an ounce, while silver was up $0.17 to $7.32 an ounce. Copper was up $0.0045 to $2.97 per pound. Among energy ETFs, the United States Oil Fund was down 0.49% to $10.12 with the United States Natural Gas Fund was down 0.43% to $6.93. Amongst precious-metal funds, the Market Vectors Gold Miners ETF was up 0.33% to 23.81 while SPDR Gold Shares were up 0.02% to $124.38. The iShares Silver Trust was up 0.31% to $16.32. Here's where the markets stand at mid-day: US MARKETS NYSE Composite Index was up 17.95 points (+0.15%) to 12,129.40 Dow Jones Industrial Index was up 37.48 points (+0.17%) to 22,368.83 S&P 500 was up 3.21 points (+0.13%) to 2,507.06 Nasdaq Composite Index was up 11.40 points (+0.18%) to 6,466.31 GLOBAL SENTIMENT FTSE 100 was up 21.97 points (+0.30%) to 7,275.25 DAX was up 2.40 points (+0.02%) to 12,561.79 CAC 40 was up 8.12 points (+0.16%) to 5,237.44 Nikkei 225 was up 298.88 points (+1.96%) to 20,299.38 Hang Seng Index was down 108.36 points (-0.38%) to 18,051.41 Shanghai China Composite Index was down 6.20 points (-0.18%) to 3,356.65 NYSE SECTOR INDICES NYSE Energy Sector Index was up 20.95 points (+0.20%) to 10,585.32 NYSE Financial Sector Index was up 35.27 points (+0.46%) to 7,677.01 NYSE Healthcare Sector Index was down 67.49 points (-0.48%) to 13,970.13 UPSIDE MOVERS (+) CAPR (+53.79%) Reports narrower than expected Q2 loss, missed on revenue (+) QDEL (+7.47%) Revises deal to acquire Alere assets (+) BOBE (+6.27%) Received acquisition offer from Post Holdings ( POST ) for $77 per share DOWNSIDE MOVERS (-) SNCR (-39.34%) Siris Capital no longer interested in acquisition (-) ALDX (-19.34%) Announced proposed offering of common stock (-) RAD (-10.44%) Obtained regulatory approval to sell 1,932 stores and related assets to Walgreens Boots Alliance ( WBA ) for $4.38 bln (-) SBGL (-7.56%) Issues $450 million convertible bond The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. Copyright (C) 2016 MTNewswires.com. All rights reserved. Unauthorized reproduction is strictly prohibited. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Ted Baker Chief, Ray Kelvin, Resigns Amid Harassment Claims LONDON — The founder and chief executive of the British fashion chain Ted Baker resigned on Monday after current and former employees accused him of inappropriate behavior. Employees said the executive, Ray Kelvin, would regularly try to massage people in the office, insist on long hugs with staff members and ask employees for sex, according to a petition that started circulating in December. The petition also said the company’s human resources department had ignored complaints about the behavior. “Harassment at Ted Baker is well documented but willfully ignored by those in charge,” the authors of the petition wrote. The petition called for the company to adopt procedures that would allow workers to report harassment to an independent, external organization. Mr. Kelvin denied the allegations, but agreed on Monday to resign immediately as chief executive and director of Ted Baker, the company said. He had taken a voluntary leave of absence in December. “As founder and C.E.O., we are grateful for his tireless energy and vision,” David Bernstein, the executive chairman, said in a statement. “However, in light of the allegations made against him, Ray has decided that it is in the best interests of the company for him to resign so that the business can move forward under new leadership.” Lindsay Page, a longtime executive who was named acting chief executive in December, will continue in that role, the company said. Shares in Ted Baker, which had sunk immediately after the allegations were made public in December, dropped after the news of Mr. Kelvin’s resignation but quickly recovered. They rose nearly 5 percent in Monday trading. “We are determined to learn lessons from what has happened and from what our employees have told us and to ensure that, while the many positive and unique aspects of Ted’s culture are maintained, appropriate changes are made,” Mr. Bernstein added. Mr. Kelvin named his business, one of Britain’s best known fashion brands, after a fictitious alter ego, and the “hug culture” that he fostered in his office was well known. When the allegations arose, company said: “Ray greets many people he meets with a hug — be it a shareholder, investor, supplier, partner, customer or colleague. Hugs have become part of Ted Baker’s culture, but are absolutely not insisted upon.” Mr. Kelvin was also known for trying to never show his face in public, and often appeared in photographs with an object held in front of his face. The accusations emerged just months after Philip Green, another wealthy British retail tycoon, came under the spotlight for using nondisclosure agreements to silence former employees who had accused him of sexual harassment and racist abuse. The allegations against Mr. Kelvin, and his leave of absence, added to problems facing the Ted Baker brand. Shares had been volatile after the company reported a drop in profit for the first half of 2018 and said the remainder of the year would be challenging. It issued another profit warning at the end of February. The company said Mr. Kelvin would not be receiving any salary or benefit payments related to his resignation. The company was founded in 1988 and has 544 stores around the world.
NEWS-MULTISOURCE
When it comes to CBD, there are many different ways to consume it. Two of the most popular methods are through CBD flower and CBD oil. Both have their own unique benefits, but which one is stronger? Let’s take a look at both CBD flower and CBD oil to see which one is the best for you. CBD Flower CBD flower is the buds of the hemp plant that contain high levels of CBD. The buds are usually ground up and then smoked through a pipe or joint, but they can also be vaporized. Best quality CBD flower provides a quick and effective way to experience the benefits of CBD. CBD flower is the unprocessed form of the hemp plant. It contains all of the plant’s cannabinoids, terpenes, and other phytochemicals. This makes it a full-spectrum product, meaning it has the potential to provide more ‘power’ than CBD isolate (i.e. CBD that has been isolated from all other plant compounds).  CBD flower can be smoked or vaped, making it a popular choice for people who want to experience the fast-acting effects of CBD. However, because it is not purified, smoking or vaping CBD flower may expose you to harmful toxins that are present in the plant Materia. CBD Oil CBD oil is made by extracting CBD from the hemp plant and then diluting it with a carrier oil like coconut oil or hemp seed oil. CBD oil is usually taken orally, but it can also be added to food or used topically. Because CBD oil takes longer to digest, it doesn’t provide as quick of an effect as CBD flower does. However, because it stays in your system longer, the effects of CBD oil scan last up to 8 hours.  Which One is Stronger?  In terms of potency, CBD flower and oil are about equal—it just depends on how you measure it. If you’re looking at cannabinoid content by weight, then yes, CBD oil is more potent because it’s more concentrated. However, if you’re looking at cannabinoid content by volume (i.e. how many cannabinoids are in each breathable puff of smoke), then smoked or vaped CBD flower is more potent because you’re inhaling more of it.  The effects of smoked or vaped CBD flower are also felt more quickly because it goes directly into your lungs and then bloodstream; whereas with oral consumption methods like capsules or drops under the tongue, the cannabinoids first have to pass through your digestive system before they reach your bloodstream. So while smoked or vaped CBD flower may not be more potent than CBD oil numerically speaking, it can provide quicker relief from symptoms like anxiety or pain.   Conclusion:  Both CBD flower and CBD oil have their own unique benefits. If you’re looking for a quick and effective way to experience the benefits of CBD, then go with CBD flower. If you’re looking for something that will last longer and provide more long-term benefits, then go with CBD oil. No matter which one you choose, you’re sure to experience the amazing benefits that CBD has to offer!
ESSENTIALAI-STEM
File:World-map(zoo act).png Summary Split of user:BabyNuke's excellent map, shows legality of zoo *acts* worldwide
WIKI
Pacers' Oladipo right at home in win over Nets Pacers’ Oladipo right at home in win over Nets INDIANAPOLIS — Victor Oladipo figures a high-tempo offense is perfect for the new-look Indiana Pacers. “We got stretch bigs and we got downhill guards,” the shooting guard said. “Playing fast is going to be to our benefit.” Oladipo scored 22 points to lead eight Pacers in double figures, helping Indiana to a 140-131 victory over the Brooklyn Nets on Wednesday night in the season opener for both teams. “We’ve just got to keep improving,” Oladipo said. “We all feel like we gave up a little too many points. But we can fix a lot of things and a lot of mistakes we made. We’re looking forward to improve. (The offense is) good for us, especially with the kind of guards we have.” It was the first time the Pacers scored 140-plus points since a 144-113 romp over the Denver Nuggets on Nov. 9, 2010. “I thought we completely broke down defensively,” Nets coach Kenny Atkinson said. “I wish I could sit here and say there was one area, but it was a multitude of things, starting with our transition defense and then rebounding, guarding your man, keeping your guy in front of you, we didn’t do any of those things.” Oladipo, a former Indiana University standout, was making his regular-season debut after coming to Indiana from the Oklahoma City Thunder with Domantas Sabonis in the Paul George trade. Sabonis scored 16 points. “If you saw the way we moved the ball in training camp and practice, you wouldn’t be surprised,” Oladipo said. “We just need to build on it, through the good times and the bad. It’s going to be a long year.” The Pacers’ Myles Turner had 21 points, 14 rebounds and four blocked shots. Thaddeus Young added 17 points and 11 rebounds. “We have good balance, and guys were sharing the ball,” Pacers coach Nate McMillan said. “When you’re putting up 102 attempts in a regulation game, you’re going to be able to score a lot of points.” D’Angelo Russell was high for Brooklyn with 30 points on 12-of-22 shooting. Trevor Booker came off the bench to add 20 points and 10 rebounds. Darren Collison, who scored 21 points, hit a driving layup with 59 seconds left to put the Pacers up 134-128. Turner made two free throws to push the lead to 136-128 with 55.1 seconds to go. Brooklyn’s Jeremy Lin, who scored 18 points, was hurt with 4:53 remaining and needed help to get off the court. He was taken to the locker room with an apparent right knee injury. “We just hope he’s OK,” Nets forward Caris LeVert said. “We don’t know a lot about the situation.” Oladipo did most of his damage in the first half by scoring 19 points as the Indiana led 65-63 at intermission. There were 10 lead changes and eight ties. Indiana expanded the lead to 106-98 after three quarters by shooting 68 percent from the field in the third quarter, making 10 straight shots at one point. The Nets had the edge at the free throw line in the third quarter, making 15 of 17 while Pacers were 4 of 5 from the foul line. The Nets shot 47.9 percent from the floor for the game and the Pacers hit 52 percent. The Pacers’ largest first-half lead was 57-48 with 4:16 left in the second quarter. The Nets erased that with 9-0 run to tie at 57 with 2:28 to go. Brooklyn committed 13 first-half turnovers, seven more than Indiana. For the game, the Nets had 20 turnovers and the Pacers 14. Russell was high for the Nets with 16 points in the first half. Russell scored eight points, including two 3-pointers, to give the Nets a 30-29 edge in a first quarter that saw five lead changes. Oladipo scored 12 in the opening quarter for the Pacers. NOTES: F Rondae Hollis-Jefferson, beginning his third season, is the longest tenured member of the Nets. ... The Nets lost their fifth consecutive season opener and fell for the fourth time in a row to the Pacers. ... The Pacers have 10 new players on their roster and the Nets have six. ... Pacers C Ike Anigbogu, the team’s second-round pick from UCLA, was listed as questionable with right knee rehabilitation and did not play. Pacers F T.J. Leaf, a first-round pick from UCLA, was scoreless in 10 minutes in his debut ... The teams’ next meeting is Dec. 17 in Brooklyn. ... Indiana holds a 101-72 all-time edge over the Nets. The 101 victories represent the Pacers’ highest win total against any NBA opponent.
NEWS-MULTISOURCE
node package manager update-immutable update-immutable Description This is a mostly-compatible re-implementation of react's update function. update() implements a mini-language that describes modifications to a data-structure consisting of nested objects and arrays. The updates can be applied to a data-structure without modifying it. Instead, a new data-structure is returned that has had the updates applied. The two structures share as much as possible. Only the intermediate structures that needed to be modified are shallow-copied prior to modification. Everything else is preserved and is therefore shared between the two structures. In react this is useful for implementing an efficient shouldComponentUpdate(), for example by sub-classing React.PureComponent. For more details, see this page on optimizing react performance. However, this module is independent of react, and is also suitable for passing updates between clients and servers so that a consistent data-structure can be maintained on both ends of a connection without transferring the entire structure on every modification. When used for both react component state updates and server-client communication, systems can be designed where server-side events directly cause modification of react components. Usage (ES6) import update from 'update-immutable'; let orig = { a: 1 }; let next = update(orig, { b: { $set: 2 } }); ## next: { a: 1, b: 2 } ## orig: { a: 1 } Usage (ES5) var update = require("update-immutable").default; var orig = { a: 1 }; var next = update(orig, { b: { $set: 2 } }); ## next: { a: 1, b: 2 } ## orig: { a: 1 } Features The following new features/bugfixes have been implemented: • Simple recursive implementation without dependencies The original version depends on react. • Implements $unset The react team refuses to merge this functionality. $unset is important for several use-cases, for example removing an item from a collection so that it will no longer be present when you iterate over that collection. $unset only works for objects, not arrays. Array elements can be deleted with $splice. • $unshift doesn't reverse The react version of $unshift unshifts each element in a loop, thereby reversing the portion of the list provided in the update. This version fixes that bug and makes it work like perl's unshift. • Supports autovivification Autovivification allows you to modify a nested data structure even if the nesting data-structures don't yet exist. They will be created so as to satisfy the update. This simplifies many use-cases, for example you don't need to maintain an initial-state skeleton. See below for more details. Autovivification In the original update implementation, if you try to set a value in a nested structure where one of the intermediate keys doesn't exist, an error will be thrown: > update({}, {a: {b: {c: {$set: true}}}}) TypeError: Cannot read property 'b' of undefined However, in this module it will autovivify the nested structures into existence so as to satisfy the update: > update({}, {a: {b: {c: {$set: true}}}}) { a: { b: { c: true } } } Nested autovivification will only create objects however, because the update language unfortunately doesn't distinguish between object access and array access. So if creating a nested array with autovivification is not supported: > update({}, {a: {0: {c: {$set: true}}}}) { a: { '0': { c: true } } } So don't do that. But note that autovivifying an array into existence with a push (for example) works fine since it's obvious you mean for that key to contain an array: > update({}, {a: {b: {c: {$push: [1,2,3]}}}}) { a: { b: { c: [1, 2, 3] } } } Incompatibilities This module is mostly compatible with the react version except for the following: • Doesn't implement $apply This module is primarily intended for transferring incremental updates between browsers and server-side web apps. For this use case, $apply does not work since functions cannot be serialised. If there is interest we may eventually implement $apply (pull requests welcome). • $unshift behaviour As described above, when passing multiple items in a single $unshift update, the order of the items is preserved, unlike react which reverses the list. Server-side There is a companion perl module Update::Immutable that implements functionality identical to this module. This lets you process updates in the same way on both the server and the client (provided your server is implemented in perl that is). See-also Please add any bug reports or feature requests to the update-immutable repo on github. As mentioned, this is a re-implementation of react's update function which is now deprecated (but currently still available as an add-on). There is another re-implementation called immutability-helper. It allows you to define custom commands, although currently it doesn't provide autovivification or $unset. For certain use-cases, immutable.js may be better than using update(), although this does not work for transferring updates between clients and servers (without creating another update protocol on top). Perl companion module: Update::Immutable Copyright (C) 2016-2017 Doug Hoyte 2-clause BSD license
ESSENTIALAI-STEM
Taforalt Taforalt, or Grotte des Pigeons, is a cave in the province of Berkane, Aït Iznasen region, Morocco, possibly the oldest cemetery in North Africa. It contained at least 34 Iberomaurusian adolescent and adult human skeletons, as well as younger ones, from the Upper Palaeolithic between 15,100 and 14,000 calendar years ago. There is archaeological evidence for Iberomaurusian occupation at the site between 23,200 and 12,600 calendar years ago, as well as evidence for Aterian occupation as old as 85,000 years. Site description La Grotte des Pigeons is a cave in eastern Morocco near the village of Taforalt. Human occupation and natural processes in the cave have produced a 10 m thick sequence of archaeological layers dating between at least 85,000 and 10,000 years ago. These occupation layers include pre-Mousterian, Aterian, and Iberomaurusian lithic industries, plus an unusual non-Levallois industry between the Aterian and the Iberomaurusian dating to c. 24,500 cal BP. These industries date from the Middle Stone Age and the Later Stone Age. Excavations of the Iberomaurusian layers dating from 15,100 to 14,000 years ago have recovered dozens of burials with some showing evidence of postmortem processing. Some show potential rituals with burials containing animal remains including horns, mandibles, a hoof, and a tooth. The deep and highly stratified cave floor has yielded hearths, lithics, and shell beads, among a variety of artefacts of varying ages. The dryness of the cave has contributed to the notable level of preservation found among the remains and artefacts. Geography The site is located around steep hills, rocky mountains, and the natural vegetation of the thermo-Mediterranean biozone including Tetraclinis articulate and Pinus halenpensis. The area itself is located in the Eastern part of Morocco near the community of Taforalt (Tafoughalt) at (34°48′38″ N, 2°24′30″ W). The large mouth of the cave opens to the northeast and has an area > 400 m2. Today the site lies around 40 km from the Mediterranean coast and at an altitude of 720 m above sea level. Culture The earliest layers of human habitation in the cave, dating from 85,000 to 82,000 years ago, contain evidence of a pre-Mousterian industry where no evidence of the Levallois lithic technology is apparent. The following (newer) layers contain side scrapers, small radial Levallois cores, and thin, bifacially worked foliate points typical of the Aterian technological industries. These Aterian layers were dated to come from approximately 32,000 to >40,000 years ago, though other research has found a non-Levallois industry continuing at the site until 25,000 years ago. By about 21,000 years ago, the Iberomaurusian industry marked by microlithic backed bladelets became the dominant archaeological material, which has been found at the site. These Iberomaurusian layers contain microlithics, ostrich egg shells, potentially ritualized primary and secondary burials, and a notable increase in land snail remains indicating a shift in dietary practices. Excavation history The cave was discovered in 1908 and was excavated in 1944–1947, 1950–1955, 1969–1977, and 2003–2018. Much of the field records from the early excavations have been lost. In 1951, Roche's team discovered human remains associated with the Iberomaurusian. The Roche excavation encountered 10 metres of archaeological deposits with the Iberomaurusian occupying the top 2 to 3 m. This same stratification has been encountered in the subsequent excavations in other parts of the cave. Because of the dozens of skeletons located by Roche in the 1950s and the burials located during the Bouzouggar, Barton, and Humphrey excavations taking place since 2003, Grotte des Pigeons represents what is likely the earliest and most extensively used known prehistoric cemetery in North Africa. Stratigraphy The stratigraphy in Grotte des Pigeons, going as deep as 10 m as in the case of Roche's excavations, differs slightly throughout the cave but follows a simple pattern based on their colour: the Grey Series overlies the Yellow Series. The Yellow series goes from the beginning of the occupation of the cave about 85,000 years ago to c. 15,000 cal BP. The overlying Grey Series dates from c. 15,000 to 12,500 cal BP ago, and hence accumulated rapidly in some 2500 years. The Grey Series, associated with the later Iberomaurusian, is characterized by extensive hearths and charcoal deposits (hence its colour), along with all of the site's burials. The Yellow Series is associated with the earlier Iberomaurusian, as well as with Levallois artefacts of the Aterian industry. The increased density of artefacts and evidence of food production in the Grey Series is seen as a sign of year-round occupation at the site whereas the Yellow Series is seen as evidence of seasonal habitation with occasional periods without humans. There is a theorized 2,000 year gap of habitation between 18,000 and 20,000 uncal BP with this sterile layer being noted in Sector 8 of Barton's excavations, though other excavations near the mouth of the cave challenge this finding. Dating With 67 radiocarbon dates, Taforalt is the most extensively dated site of the North African Later Stone Age. Starting in the 1960s, it has been dated with both conventional and AMS radiocarbon dating, OSL, TL, and U-series. Looking at all dates recovered from excavations, the habitation dates in this cave stretch from 12,500 cal BP ago to 85,000 years ago with a shift to sedentary habitation about 15,000 cal BP. The local environmental data helps establish the seasonality of the site as much of the modern vegetation was utilized by the prehistoric population and follows a set seasonal process of food production. The presence of plant remains that would have been harvested in spring indicate that the cave or nearby environs were inhabited during that season. Proxies for environmental conditions during the phases of cave occupation are available from both wood charcoal and small mammal evidence. A feature of considerable interest in the charcoal record concerns the fluctuating presence of cedar in the C–F sequence. Cedrus currently grows in Morocco only from ≈1,300–2,600 m in the Rif, the Middle Atlas, and Eastern High Atlas, and its presence throughout the Taforalt record highlights a significant vegetation shift since the Holocene. In particular, the vegetation excavated by Barton in Group E is dominated by the presence of Cedrus atlantica and deciduous Quercus, with the latter declining at the expense of Cedrus. This is consistent with environmental cooling and drying that comes with a change to a montane climate. This climatic shift coincides with the dates recovered from Group E and validates the dates recovered there. Artefacts The lithic collections recovered from the excavations at Grotte des Pigeons reflect a wide range of technologies and include unretouched and retouched flakes and bladelets, single and opposed platform bladelet cores, river cobbles, microburins, La Mouillah points, backed bladelets, Ouchtata bladelets, obtuse-ended backed bladelets, side scrapers, large bifacial tools, shell beads associated with bifacial foliates and tanged tools associated with the Aterian culture, and potential rock palettes. Faunal remains Animal remains found at the site largely appear to be food waste though excavations in the 1950s and 2000s, 2010s have revealed burials associated with antelope horns, bovine horns, and at least one horse tooth. The more sedentary Grey Series phase includes a substantial amount of land Mollusca remains in conjunction with hearths indicating extensive land snail collection and cooking. The earliest layers from approximately 80,000 years ago contain shell beads of the N. gibbosulus however analysis of these shells indicate that they were collected along the Mediterranean shore after they had been dead. Ash lenses from the Aterian levels around 80,000 BP contain large Otala punctate indicating small scale exploitation of land snails prior to the Grey Series. Floral remains The vegetation species found inside the cave provide an idea what the environment was like during periods of human habitation with the charred remains of Holm oak (Quercus ilex L.) acorns, Maritime pine (Pinus pinaster Aiton) pine nuts, Juniper (Juniperus phoenicea L.), Terebinth pistachio (Pistacia terebinthus L.), and wild oat (Avena sp.) being recovered after likely being collected and processed by the previous inhabitants. Human remains Sector 10, excavated by Humphrey, and the burial deposits excavated by Roche in the 1950s, form a contiguous and spatially demarcated collective burial area with dozens of closely spaced burials. The presence of both articulated and disarticulated bones indicates extensive use and reuse of the burial area with evidence of secondary burial and selective bone removal being practiced, often disturbing or truncating earlier burials. Some burials were covered by large stones preventing future disturbances by burials. The Roche excavations originally estimated that they had recovered the remains of approximately 180 individuals, but subsequent research adjusted this estimate to between 35 and 40 individuals. These remains were not directly dated by Roche but based on the stratigraphy they were from a greater depth, and therefore greater age, than those in Sector 10. The recent excavations taking place in Sector 10 have recovered thirteen partially articulated skeletons along with a sample of disarticulated bones. Seven bone samples from Sector 10 yielded age estimates between approximately 15,077 and 13,892 years ago, corresponding to the base of the Grey Series deposits seen in Sector 8 excavations. Burials situated toward the front of the cave and those higher within the deposits are likely to be progressively younger, and hence contemporary with higher levels in the Grey Series deposits recorded in Sector 8. A range of funerary practices is apparent based on the grave excavations that have taken place. Some remains appear to have been primary inhumations while others appear to have sustained secondary inhumation after removal for potentially ritual practices. Evidence of deliberate post-mortem modification include cut marks that are not indicative of cannibalism and extensive ochre colouring with one grave, Grave XII, containing Individual 1 with both cut marks and ochre colouring present on the majority of the nearly intact skeleton. Roche's excavations in the 1950s yielded a single mandible from the Aterian levels. A 2003 analysis of masticatory and non-masticatory dental modifications among the remains recovered in the 1950s reflected a very high rate (90%) of avulsion of the upper central incisors which subsequently led to increased usage of the proximal teeth. Ritual tooth removal is known elsewhere in this region at other points in prehistory and history and likely took place during the entrance to adulthood. The food processing tasks of the teeth are reflected in the heavy chipping, perhaps indicative of a gritty diet involving bone and shell. Half of the surviving teeth (51.2%) exhibited carious lesions while archaeological hunter-gatherers are expected to range between 0% – 14.3% and agriculturalists range between 2.2% - 48.1%. These numbers are likely a result of the acorns and pine nuts which would have been collected and processed, resulting in fermentable carbohydrates. The women in the population do not reflect the same proximal tooth wear as their upper central incisors were typically not removed. A 2000 analysis of non-metric dental traits indicated genetic continuity from the terminal Pleistocene onward in the Iberomaurusian and Capsian areas. Based on dentition, Joel D. Irish found a relationship between the Iberomaurusians, particularly those from Taforalt, and later Maghreb and other North African samples. Thus, some measure of long-term population continuity in the Maghreb and surrounding region is supported, whereas greater North African population heterogeneity during the Late Pleistocene is implied with strong differences with Jebel Sahaba, but similarities between Taforalt and Afalou. In 1999, Colin Groves & Alan Thorne in studying three Northern African samples from the Pleistocene/Holocene, Taforalt was described as "Caucasoid" and resembled late Pleistocene Europeans, while Afalou was Intermediate. In contrast, the Sudanese remains from Jebel Sahaba included was described as "Negroid". Occupation site utility The inhabitants of Grotte des Pigeons were hunter-gatherers equipped with the knowledge of harvesting plants and animals as the archaeological context suggests some of the burials contained evidence of baskets and grind stones which were used for food preparation. Some of the foods harvested from their local environment included acorns, pine nuts, and land molluscs. The site exhibits evidence that the people that lived in this area used the cave year round by the Grey Series while staying there seasonally during the Yellow Series. The perforated marine shells present from the 85,000 – 82,000 year old level at Grotte des Pigeons and other sites in the nearby Maghreb dated from that period reflect an exchange network that likely existed in order to provide shells to communities 40 km from the coast (Taforalt) and further. While the meaning behind the beads cannot be discerned, the presence of an apparently widespread exchange network to facilitate their transport as well as their being worked for apparent ornamentation indicate some significance behind them. World Heritage status This site was added to the UNESCO World Heritage Tentative List on 1 July 1995, in the Cultural category under the name "Grotte de Taforalt". Ancient DNA In 2018, van de Loosdrecht et al. performed the first aDNA tests on the ancient Taforalt individuals, directly dated to between 15,100 and 13,900 cal BP. The Taforalt samples are the oldest human DNA samples from Africa yet recovered. DNA analysis was performed on seven individuals: six males and one female. Only five of the individuals, including four of the males, with higher coverage genomes were used in the nuclear DNA analysis. Nuclear DNA analysis reveals that the Taforalt individuals were all closely related to each other, showing evidence of a population bottleneck event in their past." Loosdrecht found the Taforalt to be composed of three major components: a Holocene West-Eurasian/Levantine component, a Hadza hunter-gatherer component from Tanzania, and a West African component. According to Loosdrecht, the West-Eurasian component shows the relative closest genetic affinity for ancient Epipaleolithic Natufian individuals, with slightly greater affinity for the Natufians than later Neolithic Levantines. A two-way admixture scenario using Holocene Levantines and modern West African samples as reference populations inferred that the Taforalt individuals bore 63.5% Levantine-related and 36.5% Sub-Saharan African-related ancestries, with no evidence for additional gene flow from the Epigravettian culture of Upper Paleolithic Europe. The Taforalt individuals also show evidence of limited Neanderthal ancestry. When compared against modern populations, the Taforalt individuals form a distinct cluster and do not cluster genetically with any modern population; however, they were found to cluster between Middle Easterners or modern North Africans and West/East Africans. The Taforalt individuals also exhibited higher levels of indigenous African ("Sub-Saharan African") ancestry than do modern North Africans. The Sub-Saharan African DNA in Taforalt individuals has the closest affinity, most of all, to that of modern West Africans (e.g. Yoruba, or Mende). In addition to having similarity with the remnant of a more basal Sub-Saharan African lineage (e.g., a basal West African lineage shared between Yoruba and Mende peoples), the Sub-Saharan African DNA in the Taforalt individuals of the Iberomaurusian culture may be best represented by modern West Africans. Aizpurua-Iraola, Julen et al. (2023) would state that none of the present-day (Hadza/East/West) or ancient Holocene African groups were found to be a suitable proxy population for the source of this component. A 2018 DNA analysis shows that the Taforalt individuals belonged to the mtDNA haplogroups U6a and M1b, as well as to the Y-DNA haplogroup E1b1b1a1 (M78), which is closely related to the E1b1b1b (M123) sublineage that has been observed in skeletal remains belonging to the Epipaleolithic Natufian and Pre-Pottery Neolithic cultures of the Levant, possibly suggesting geneflow. According to Loosdrecht, since the Natufian samples, which are chronologically younger than the Taforalt samples by several thousands of years, were inferred to lack substantial African ancestry, the researchers also hypothesized that a Maghreb center of evolution for the Natufian-related ancestry could only be plausible if the admixture that was inferred for the Taforalt individuals either occurred after the population ancestral to the Natufians had moved into the Levant or if that admixture event was a locally confined phenomenon at Taforalt. Iosif Lazaridis et al. (2018), as summarized by Rosa Fregel (2021), contested the conclusion of Loosdrecht (2018) and argued instead that the Iberomaurusian population of Upper Paleolithic North Africa, represented by the Taforalt sample, can be better modeled as an admixture between a Dzudzuana-like [West-Eurasian] component and an "Ancient North African" component, "that may represent an even earlier split than the Basal Eurasians." Iosif Lazaridis et al. (2018) also argued that an Iberomaurusian/Taforalt-like population contributed to the genetic composition of Natufians "and not the other way around", and that this Iberomaurusian/Taforalt lineage also contributed around 13% ancestry to modern West Africans "rather than Taforalt having ancestry from an unknown Sub-Saharan African source". Fregel (2021) summarized: "More evidence will be needed to determine the specific origin of the North African Upper Paleolithic populations." Phenotypic analysis was performed on four of the Taforalt individuals with higher genomic coverage. The Taforalt individuals tested did not carry either of the derived SLC24A5 alleles associated with lighter skin color, the derived OCA2 allele associated with blue eye color, or the derived MCM6 allele associated with lactase persistence. However, they were found to carry the ancestral SLC24A4 allele associated with dark eye color, suggesting that the West-Eurasian migrant group may not have evolved light skin yet.
WIKI
Green Family in Virginia| Compiled by Richard R. Wilt William III of England William III (Dutch: Willem; 4 November 1650 – 8 March 1702), also widely known as William of Orange, was sovereign Prince of Orange from birth, Stadtholder of Holland, Zeeland, Utrecht, Gelderland and Overijssel in the Dutch Republic from 1672 and King of England, Ireland and Scotland from 1689 until his death in 1702. As King of Scotland, he is known as William II. He is sometimes informally known in Northern Ireland and Scotland as "King Billy". William inherited the principality of Orange from his father, William II, who died a week before William's birth. His mother, Mary, was the daughter of King Charles I of England. In 1677, he married his fifteen-year-old first cousin, Mary, the daughter of his maternal uncle James, Duke of York. A Protestant, William participated in several wars against the powerful Catholic king of France, Louis XIV, in coalition with Protestant and Catholic powers in Europe. Many Protestants heralded him as a champion of their faith. In 1685, his Catholic father-in-law, James, Duke of York, became king of England, Ireland and Scotland. James's reign was unpopular with the Protestant majority in Britain. William, supported by a group of influential British political and religious leaders, invaded England in what became known as the "Glorious Revolution". On 5 November 1688, he landed at the southern English port of Brixham. James was deposed and William and Mary became joint sovereigns in his place. They reigned together until her death on 28 December 1694, after which William ruled as sole monarch. William's reputation as a staunch Protestant enabled him to take power in Britain when many were fearful of a revival of Catholicism under James. William's victory at the Battle of the Boyne in 1690 is still commemorated by loyalists in Northern Ireland and Scotland. His reign in Britain marked the beginning of the transition from the personal rule of the Stuarts to the more Parliament-centred rule of the House of Hanover. Ref: Holdridge Ozro Collins, of Los Angeles, CA Robert Green, who emigrated to Virginia in 1712, was the son of William Green and Eleanor Duff, of England. Lewis Green Sr. It is stated by Dr. Philip slaughter, at page 138 of his History of St. Mark's Parish, that William Green was an officer in the body guard of William III, Prince of Orange, and this is claimed in the family archives and records of many of his descendants in America. A Roster of that troop, however, shows his name under the title “Yeoman”. William, his social position was that of a gentleman. He was a cadet of the family of Green's Norton in Northampton, and descended from the same ancestor as Sir Thomas Green the father of Matilda or Maud who married Sir Thomas Parr, and become the mother of Katherine Parr the sixth wife of Henry VIII. Eleanor Duff, wife of William Green, belonged to the Scotch family of Mc Duff, and their son Robert always maintained intimate relations with his mother's people. Born in 1695, when only seventeen years old, he went to Virginia with his uncle, Sir William Duff, and they settled at first upon the James river. “In 1732, in conjunction with his uncle, Joist Hite and Robert McKay, he received a patent for 120,000 acres of land in the valley of Virginia, perhaps the earliest patent granted west of the Blue Ridge, and was on of the most active factors in the colonization and settlement of that beautiful region.” Sir William returned to Scotland, leaving Robert in charge of their joint estate, and dying without children he devised his large interests in Virginia to his nephew. Robert married a Scotch lady named Eleanor Dunn. He lived for a time in King George county, but he made his permanent home in what was then Orange county, at a place which is near Brandy Station, now Culpeper county. Here “he reared seven stalwart sons, all over six feet high, and all having red heads and beards, as become their mixed Welsh and Scotch blood.” The family was known as the :”Red Greens of Culpeper,” from their fiery heads, and to distinguish them from other families of the same name with different characteristics. Robert Green was on of the most public spirited citizens of his county, and the leader in all good works of his Neighborhood. In 1736 he was a member of Orange county of Virginia House of Burgesses, and he was a captain of the Orange county militia. In 1731 he became a vestryman of St. Mark's Parish, from which time down to the present, there has been a continuous succession of vestrymen in his family. His possessions were among the largest of the early Virginia grants, lying principally in Prince William, Augusta, Orange, Westmoreland and King George counties, which he devised to his widow Eleanor, and his sons. His children and grand-children intermarried with the families of Washington, Lee, Willis,Barbour, Lewis, Henry, Price, Bayly, Marshall and others of colonial distinction. The commencement of the troubles with England found his descendants strong in their loyalty to their native Colony, on the rolls of the Continental Army, and the rosters of the Virginia troops, contain the names of many of the sons and grandsons of Robert Green, who served during the War of the Revolution, all with bravery and patriotism, and many with distinction, and in high rank. Lewis Green, Sr. was born in 1724 in Prince George Co, VA, believed to be the son of Robert and Eleanor (Dunn) Green. Robert came to America when he was 17 years old with his uncle, Sir William Duff of Scotland. They settled on the James River. In 1732 Robert received a patent for 120,000 acres along with his uncle and Joist Hite and Robert McKay. His uncle returned to Scotland, leaving Robert Green in charge of their joint venture. The uncle died without children and Robert inherited his uncles interest in Virginia. His possessions were among the largest of early Virginia grants. They were primarily in Prince William, Augusta, Orange, Westmoreland and King George counties. His children lived in Culpeper Co. and later KY. Robert married Eleanor Dunn, a Scot lady. They were the parents of seven sons, six of whom were over 6 feet tall having red hair and beards. The family was know as the "Red Greens" to distinguish them from other families of the same name with different characteristics. Lewis was shorter with a darker completion like his mother. The following from the Gate Hearld, Gate City, Virginia (article written regarding James Green) “Robert Green landed in 1712, directly from England. He and his wife Eleanor had 7 children. He landed in Culpepper County, VA. in 1712. On authority of Prof. A. J. Wolfe, Big Stone Gap, James Green, Sr. ,Robert Green's grandson, was a close relative of Nathaniel Green, the son of John Green, Sr., Robert and John were brothers, who gave Cornwallis his greatest lesson of the Revolutionary War. Nathaniel was a General. His Descendants settled in New Hampshire.” Although I have no verified proof on Lewis being the son of Robert and Eleanor Green, it is accepted by many Green Family researchers. Lewis J. GREEN Sr. was born about 1724 in , Prince George County, Virginia. He died in Oct 1784 in Blue Spring Rd., Near Glasgow, Kentucky (then Virginia). He was a Private who served under Captain Robert McKenzie in Tennessee and Kentucky. He was stationed at Fort Nashboro in Nashville,Tennessee. He served in the French and Indian War He enlisted in Capt Robert McKenzie's Co from Dinwiddie Co., VA at age 30 at the rank of Private in the French and Indian War and also served in the Rev War in VA. He was a vestryman in the church at Kilgore Station (Church of England? ) and was very brown in complexion. Lewis owned 41 acres of land adjacent to Porter's Fort in March of 1774. A story about Lewis Green, Sr. told by Daniel Boone about a Bear Attack which occurred near the Clinch River. Lewis married Elizabeth LAUDERDALE daughter of William LAUDERDALE about 1750 in , Culpepper County, Virginia. Elizabeth was born about 1730 in , Augusta County, Virginia. She died about 1805. Lauderdales are descended from James Maitland Lauderdale, the Emigrant, who settled in Pennsylvania around 1714. He is thought to have moved from southwest Scotland, where the Lauderdale name is known in the 18th century, to Northern Ireland and thence to North America. See History of the Lauderdales in America Heritage, 1998, by Clint Lauderdale. We don't know from whom James Lauderdale, the Emigrant was descended, and he made no claims to be descended from the Earls of Lauderdale. Equally, he was firm in his assertion that he was a Maitland by origin, and this is the tradition which he handed down to his children and grandchildren and which was formally recorded by James Shelby Lauderdale in 1880. This refers to a meeting between his uncle Sam, and Dr David Lauderdale who met in 1830, and discovered that they shared a common family tradition. Another Lauderdale from New York was met in 1880 in St Louis with a similar tale. Lauderdale as a family name, not connected with the title, first appears in the Scottish parish records in Galloway in the early 18th century with the birth of Jean Lauderdale in 1737, the daughter of James Lauderdale at Beith, Ayr. Maitlands have lived in or been connected with Galloway since 1360, and our understanding of James the Emigrant is that he came from that part of Scotland, so the combination of geography, name and his family tradition makes it almost certain that he was a Maitland by origin, and as such, related by blood to the Earls of Lauderdale, but not descended from them. Elizabeth, who appears in the records of Washington County in 1797 as “old and infirm” and gave power of attorney to “my son-in-law Moses Foley.” She died about 1803, intestate. Appraisal of here estate was presented to the court by Zachariah Green. Lewis and Elizabeth had the following children: W. John, b. 1750, Lewis Jr b. 1751, Elizabeth, Nancy, Massey, Jesse, Thomas, Sara Jane, Zachaniah, and Jamima. VA Surveys and Deeds Page 120 - Jesse Green...350 ac...Commissioners Certificate...on the north side of the upper north fork of Clinch River and along the foot of the Stony Mountain...Beginning crossing a valley, at the foot of the Stony Mountain...April 23, 1783 - Jesse Green, assignee of James Hill, assignee of Honeyman, assignee of James Kenedy...400 ac...on the north side of Clinch River includes improvements, actual settlement made in 1776...August 24, 1781 James GREEN Sr., Thomas GREEN was born in 1759 in , , Virginia, Zachariah GREEN, Sarah GREEN, Nancy Susannah GREEN, Jemima GREEN was born about 1770. Jemima married Benjamin NICHOLSON. To continue this narrative I will follow my linage in the Green Family. This individual is my great great great great grandfather: 1750 - 1849 In my research I have found John listed as W. John Green and John W. Green. I have no proof of either of these differences in his name. John was the oldest son of Lewis Green Sr. He served in the Revolution, he enlisted January or February 1776, from Goochland Co., Virginia. His Regiment was the Ninth Virginia of continental Service and his captain was S. Woodson. He was in the battles of Brandywine and White House and was discharged in 14 Dec 1777. John married Susannah Lawrance, the daughter of Henry and Elizabeth Stanley Lawrance. They had 10 children as follows: Edward R. b. 1785 married to Susan Martin Malinda b. 1786 married to William Chittum, my great great great grandmother Lewis b. 1787 Thomas b. 1797 married to Mary Polly Cheatham (Chittum) Margaret b. 1789 married to Lawrence Anderson Betsy (Elizabeth) b. 1790 married to Stephen Grubb Chittum Henry b. 1792 married to Sarah A. White Sabra (Savara) b. 1793 married to Zachariah R. Chittum William b. 1796 married to Rebecca There were several members of the Green family married into the Chittum family, another prominent family in Goochland County and Rockbridge County, VA. My lineage continues through the second child of John and Susannah Lawrance Green, Malinda who married William Chittum the son of John and Nancy Sly Chittum. Malinda and William were married in Rockbridge County, VA on March 2, 1813. To this marriage I have records of only two children, Polly Ann b. 1818 who married James Moro Robinson, and Hezekiah. b. 1821 and married Rebecca Clark Hughes. Click on Picture to follow the marriage and life for James and Polly Ann while living in Rockbridge County, VA including trial of James for attempted murder of his brother-in-law, Hezekiah Chittum. After James was aquitted of all charges and being completely bankrupt by his lawyers, he moved with most of his children to Upshur County, WV and lived there as a very poor tennant farmer and cobbler until his death in 1883. James and Polly had the following children: John C. Robinson born October 20, 1835 Jason A. Robinson born 1838 Susan Robinson born 1839 James Monroe Robinson born 1840 Malinda Robinson born January 22, 1842 married Elam Dooley Andrew Robinson born 1844 William S. Robinson born April 4, 1845 married Nancy R. Bardon Alfred Graham Robinson born April 8, 1847 married Jane Rittenhouse Hezekiah Robinson born 1849 Mary P. Robinson born 1851 Thomas F. Robinson born March 24, 1853 married Martha J. Grubb Charles Wesley Robinson born February 15, 1859 married Harriet B. Miller (my great grandmother) married Minter B. Miller) Dorcas J. Robinson born 1861 Lewis H. Robinson born 1862 Ida B. Robinson born 1866 As far as a paper trail my lineage continues through other surnames, but the name of Green stops here. Of course, there is DNA relationships but I have not made an indebt paper search. If you wish to read more about my lineage you are invited to follow the links listed here: Go to Main Page
FINEWEB-EDU
What is maintenance C for Mercedes? What is maintenance C for Mercedes? Mercedes-Benz Service C is a Mercedes-Benz service interval that’s recommended at around 36,000 miles. Similar to other recommended Mercedes-Benz service intervals, Mercedes-Benz Service C ensures that your vehicle is running as it should. What does the C service consist of? Enjoy Quick, Routine Mercedes-Benz Maintenance Schedule an appointment for Mercedes-Benz Service C at Mercedes-Benz of Chicago, and your vehicle will receive the following: Windshield wiper blade replacement. Fluid level checks & corrections. Mercedes-Benz Synthetic Motor Oil Replacement^ What is service a on Mercedes C-Class? Service A involves: Replacing the vehicle’s oil filter and Mercedes-Benz motor oil. Checking all fluid levels and correcting them as recommended by the factory. Checking and correcting tire pressure. How much does Service C cost for Mercedes? At Mercedes-Benz of Henderson, the cost of Mercedes-Benz Service C starts at $249.95, although this is the base price, so we recommend you speak with a service expert at our dealership in order to get a more exact price quote for your specific vehicle. What is service D in a Mercedes-Benz? A service D on a Mercedes Benz includes the replacement of oil, change of oil filter, as well as replacement of brake fluid. Mercedes Benz cars require regular maintenance service to keep them running perfectly like most other vehicles. What is a service D on a Mercedes-Benz? Is Mercedes Benz C Class expensive to maintain? Mercedes-Benz C-Class Maintenance Costs A Mercedes-Benz C-Class will cost about $10,734 for maintenance and repairs during its first 10 years of service. This beats the industry average for luxury sedan models by $1,227. There is also a 31.57% chance that a C-Class will require a major repair during that time. What does C mean on Mercedes dashboard? Comfort C stands for Comfort. When the C mode is selected the following happens: Automatic transmission starts in second gear when you take off. This helps in icy or snow conditions. You will notice the car shift to the higher gear at lower RPM. What is service D on a 2006 Mercedes-Benz? Can I service my Mercedes myself? You are permitted to take your car any place you would like to have it serviced and repaired. The Mercedes dealer would like you to believe that your local European repair facility doesn’t have the tools, correct diagnostic equipment, or skills to work on your vehicle. What is the difference between Mercedes A and B service? Service B Intervals: How Do They Differ? The biggest difference between Mercedes-Benz Service A and Mercedes-Benz Service B is the required time interval for each. Service A is required after 10,000 miles or 1 year, while Service B is required when you reach 20,000 miles or 2 years. What does the A with an arrow around it mean in a Mercedes-Benz? ECO button Depending on your vehicle model there will be an ECO button on the center console or a button under the ignition button that is labeled with an “A” surrounded by a clockwise arrow. Click that button and your vehicle won’t use the ECO Start/Stop system for the duration of your drive. Does sport mode make your car faster? The sports mode will employ more power to the car enabling it to accelerate quicker and give the driver more responsive performance than what the comfort modes would provide.
ESSENTIALAI-STEM
F.D.A. Says Food From Cloned Animals Is Safe Food and Drug Administration tentatively concludes that milk and meat from some cloned farm animals are safe to eat; finding could make United States first country to allow products from cloned livestock to be sold in grocery stores, but technology is still too expensive to be used widely anytime soon; FDA's draft policy, which must still be formally approved, touches off immediate storm of criticism from consumer groups, who argue that science backing FDA's decision is shaky and that consumer surveys show most people are opposed to cloning animals, let alone eating them; some meat and diary companies also worry about consumer reaction; opponents hope to bring Congressional pressure to bear to derail policy before it becomes final or at least to require that such foods be labeled so consumers can choose to avoid them; FDA's finding comes more than six years after agency first decided to study matter; FDA's chief of veterinary medicine Stephen F Sundlof says that by law agency could consider only scientific issues, not consumer demand or ethics of cloning; photo (M)
NEWS-MULTISOURCE
Article Text other Versions PDF Radiation doses from global fallout and cancer incidence among reindeer herders and Sami in Northern Finland 1. Päivi Kurttio1, 2. Eero Pukkala2,3, 3. Taina Ilus1, 4. Tua Rahola1, 5. Anssi Auvinen1,3 1. 1STUK-Radiation and Nuclear Safety Authority, Research and Environmental Surveillance, Helsinki, Finland 2. 2Finnish Cancer Registry, Institute for Statistical and Epidemiological Cancer Research, Helsinki, Finland 3. 3University of Tampere, School of Public Health, Tampere, Finland 1. Correspondence to Dr Päivi Kurttio, STUK- Radiation and Nuclear Safety Authority, Research and Environmental Surveillance, Laippatie 4, FI-00881 Helsinki, Finland; paivi.kurttio{at}stuk.fi Abstract Objectives People in the Arctic regions are one of the most heavily exposed population from the global fallout from atmospheric atomic bomb testing of the 1950s and 1960s due to their diet rich in reindeer meat in which radionuclides accumulate. We estimated the effect of the radioactive fallout and ethnicity on the cancer incidence in Northern Finland. Methods A cohort of the Arctic population in Finland (n=34 653) was identified through the Population Register Centre with grouping by reindeer herding status, ethnicity and radiation exposure. Annual average radiation doses, based on 137Cs whole-body measurements, were assigned by birth year, gender and reindeer herder status. Incident cancer cases of a priori selected cancer types in the study cohort during 1971–2005 were identified from the Finnish Cancer Registry. Results A total of 2630 cancer cases were observed versus 3073 expected on the basis of incidence rates in Northern Finland (standardised incidence ratio (SIR) was 0.86 with 95% CI of 0.82 to 0.89). For the indigenous Sami people SIR was even lower, 0.60 (95% CI 0.50 to 0.71). None of the cancer sites was significantly associated with the lifetime cumulative radiation dose. The SIR for the combined group of radiation-related cancer sites increased with the cumulative radiation dose received before 15 years of age (p=0.004). Conclusion Despite the low overall cancer incidence in the Arctic population and ethnic Sami people in Finland and lack of association between the lifetime cumulative radiation exposure from global radioactive fallout and cancer incidence, we found some indication of an increased cancer risk associated with radiation exposure received during childhood. Potential underestimation and misclassification of the radiation dose may affect the results and the findings should be interpreted with caution. • Neoplasms • radiation effects • Finland, nuclear weapons • arctic regions • epidemiology • public health • cancer • ionising radiation • radiation Statistics from Altmetric.com Footnotes • Competing interests None. • Provenance and peer review Not commissioned; externally peer reviewed. Request Permissions If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways.
ESSENTIALAI-STEM
Page:United States Statutes at Large Volume 110 Part 4.djvu/767 PUBLIC LAW 104-208—SEPT. 30, 1996 110 STAT. 3009 -604 time of the initial presentation of the stowaway for inspection or at the time the stowaway is determined to have a credible fear of persecution. " (B) NONAPPLICATION. —Subparagraph (A) shall not apply if— "(i) the alien is a crewmember; "(ii) the alien has an immigrant visa; "(iii) the alien has a nonimmigrant visa or other documentation authorizing the alien to apply for temporary admission to the United States and applies for admission not later than 120 days after the date the visa or documentation was issued; "(iv) the alien has a reentry permit and applies for admission not later than 120 days after the date of the alien's last inspection and admission; "(v)(I) the alien has a nonimmigrant visa or other documentation authorizing the alien to apply for temporary admission to the United States or a reentry permit; "(II) the alien applies for admission more than 120 days after the date the visa or documentation was issued or after the date of the last inspection and admission under the reentry permit; and "(III) the owner of the vessel or aircraft satisfies the Attorney General that the existence of the condition relating to inadmissibility could not have been discovered by exercising reasonable care before the alien boarded the vessel or aircraft; or "(vi) the individual claims to be a national of the United States and has a United States passport. " (d) REQUIREMENTS OF PERSONS PROVIDING TRANSPORTATION.— "(1) REMOVAL AT TIME OF ARRIVAL.—An owner, agent, master, commanding officer, person in charge, purser, or consignee of a vessel or aircraft bringing an alien (except an alien crewmember) to the United States shall— "(A) receive an alien back on the vessel or aircraft or another vessel or aircraft owned or operated by the same interests if the alien is ordered removed under this part; and "(B) take the alien to the foreign country to which the alien is ordered removed. "(2) ALIEN STOWAWAYS. —An owner, agent, master, commanding officer, charterer, or consignee of a vessel or aircraft arriving in the United States with an alien stowaway— "(A) shall detain the alien on board the vessel or aircraft, or at such place as the Attorney General shall designate, until completion of the inspection of the alien by an immigration officer; "(B) may not permit the stowaway to land in the United States, except pursuant to regulations of the Attorney General temporarily— "(i) for medical treatment, "(ii) for detention of the stowaway by the Attorney General, or "(iii) for departure or removal of the stowaway; and �
WIKI
User:Emperorucon Francis Uche Nwachukwu is a Nigerian businessman, entrepreneur and an industrialist, the Founder & Chairman of the Ucon Group, an indigenous conglomerate with diverse interest in Oil & Gas, Industrialisation, Real Estate, Agriculture and Petrochemical. Born: 27 May, Enugu Occupation: Founder of Ucon Group Nationality: Nigerian Education: Lagos State University Spouse: Chioma Nwachukwu
WIKI
Talk:History of Wikipedia Add comma In the Timeline section under 2014, it says "On 8 June 15 June," missing a comma. Someone with edit access, please fix that grammar mistake to "On 8 June, 15 June,". Thank you! <IP_ADDRESS> (talk) 17:51, 9 July 2024 (UTC) * ✅. Thanks for pointing out the error. Deor (talk) 21:18, 9 July 2024 (UTC)
WIKI
List of Austin neighborhoods The following is a list of neighborhoods in Austin, Texas. Austin generally runs north-south and is bisected by the Colorado River. Central Austin Central Austin includes the city's Downtown and central neighborhoods. The area is north of the Colorado River and is enclosed by Interstate 35 to the east, approximately 51st Street/North Loop/Hancock Drive to the north, and Mopac Expressway (SL 1) to the west. * Bryker Woods * Clarksville Historic District * Caswell Heights * Downtown Austin * Eastwoods * Hancock * Heritage * Hyde Park Historic District * Judge's Hill * Lower Waller Creek * North University * Oakmont Heights * Old Enfield * Old Pecan Street * Old West Austin * Original Austin * Original West University * Pemberton Heights * Rosedale * Ridgelea * Ridgetop * Shoal Crest * Shadow Lawn Historic District * West Downtown North Austin North Austin is defined as a neighborhoods north of Central Austin (51st Street/North Loop/Hancock Drive). North Central * Allandale * Balcones Woods * Barrington Oaks * Battle Bend Springs * Brentwood * Crestview * Estates of Brentwood * Hancock * Highland * North Burnet * North Campus * North Lamar * North Loop * North Shoal Creek * Saint John * Wooten Northeast North of 51st Street, east of Interstate 35. * Windsor Hills * Windsor Park Northwest North of Hancock Drive, west of Mopac Expressway. * Canyon Creek * Great Hills/Arboretum * Northwest Hills Far North North of Parmer Lane. * Copperfield * Wells Branch * Scofield Farms East Austin East Austin is defined as areas east of Interstate 35 north of the river. * Central East Austin * East Cesar Chavez * East Congress * East End * French Place * Govalle * Holly * Mueller West Austin West Austin occupies a much smaller area due to the bend of the Colorado River. The area is bounded by Mopac Expressway (SL 1) to the east, the Colorado River to the south and west, and Northland Drive (RM 2222) to the north. * Far West * Tarrytown * West Congress * West End * West Line Historic District South Austin South Austin generally includes any area south of the Colorado River. South Central South Central Austin is boxed by Mopac Expressway to the west, the Colorado River to the north, Interstate 35 to the east, and Ben White Boulevard to the south. * Barton Creek * Barton Hills * Bouldin Creek * Dawson * Galindo * South Congress * South Lamar * South River City * Spyglass-Barton's Bluffs * Travis Heights * Zilker Southeast Central/Riverside Southeastern Austin between the Colorado River and Ben White Boulevard is generally called the Riverside area. * East Riverside-Oltorf * Montopolis * Pleasant Valley Southeast Neighborhoods east of Menchaca Road and south of Ben White Boulevard. * Dove Springs * Onion Creek * South Manchaca * Southeast Austin * Southpark Meadows Southwest Neighborhoods west of Menchaca Road and south of Ben White Boulevard and Capital of Texas Highway. * Cherry Creek * Circle C Ranch * Oak Hill * Far South Austin/Slaughter-Manchaca * Kincheonville * The Ridge at Lantana * Maple Run * Sendera * Shady Hollow * Sunset Valley (incorporated city) * Tanglewood Forest * Travis Country * Westgate * Woodstone Village * Allandale * Balcones Woods * Barrington Oaks * Battle Bend Springs * Barton Creek * Barton Hills * Blackland * Bouldin Creek * Brentwood * Bryker Woods * Canyon Creek * Cat Mountain * Central East Austin * Cherrywood * Chestnut * Clarksville Historic District * Copperfield * Coronado Hills * Crestview * Dawson * Dove Springs * Delwood * East Cesar Chavez * East Congress * East End * East Riverside-Oltorf * Estates of Brentwood * Far South Austin/Slaughter-Manchaca * Far West * Franklin Park * French Place * Galindo * Garrison Park * Georgian Acres * Govalle * Gracy Woods * Great Hills/Arboretum * Hancock * Harris Branch * Heritage Hills * Highland * Holly * Hyde Park Historic District * Johnston Terrace * Lamplight Village * Laurel Oaks * Montopolis * The Mountain * Mueller * North Burnet * North Campus * North Lamar * North Loop * North Shoal Creek * Northwest Hills * Northwood * Oak Hill * Old West Austin Historic District * Onion Creek * Oriens Park * Pecan Springs-Springdale * Pemberton Heights * Pleasant Valley * The Ridge at Lantana * River Oaks * Rosedale * Rosewood * Saint John * Scofield * Scofield Farms and Ridge * Seabrook * Shadow Lawn Historic District * Shady Hollow * Sixth Street Historic District * Skyview * South Congress * South Lamar * South Manchaca * South River City * Southeast Austin * Spyglass-Barton's Bluffs * Steiner Ranch * Swedish Hill Historic District * Sweetbriar * Tarrytown * Travis Country * University Hills * Wells Branch * West Campus * West Congress * West End * West Line Historic District * Westgate * Wilshire Wood * Windsor Hills * Windsor Park * Wooten * Zilker
WIKI
blob: 9c4ce6332e26d7ebc09182802ea23098c787b70d [file] [log] [blame] /* GStreamer * * appsink-src.c: example for using appsink and appsrc. * * Copyright (C) 2008 Wim Taymans <wim.taymans@gmail.com> * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Library General Public * License as published by the Free Software Foundation; either * version 2 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Library General Public License for more details. * * You should have received a copy of the GNU Library General Public * License along with this library; if not, write to the * Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, * Boston, MA 02110-1301, USA. */ #include <gst/gst.h> #include <string.h> #include <gst/app/gstappsrc.h> #include <gst/app/gstappsink.h> /* these are the caps we are going to pass through the appsink and appsrc */ const gchar *audio_caps = "audio/x-raw,format=S16LE,channels=1,rate=8000, layout=interleaved"; typedef struct { GMainLoop *loop; GstElement *source; GstElement *sink; } ProgramData; /* called when the appsink notifies us that there is a new buffer ready for * processing */ static GstFlowReturn on_new_sample_from_sink (GstElement * elt, ProgramData * data) { GstSample *sample; GstBuffer *app_buffer, *buffer; GstElement *source; GstFlowReturn ret; /* get the sample from appsink */ sample = gst_app_sink_pull_sample (GST_APP_SINK (elt)); buffer = gst_sample_get_buffer (sample); /* make a copy */ app_buffer = gst_buffer_copy (buffer); /* we don't need the appsink sample anymore */ gst_sample_unref (sample); /* get source an push new buffer */ source = gst_bin_get_by_name (GST_BIN (data->sink), "testsource"); ret = gst_app_src_push_buffer (GST_APP_SRC (source), app_buffer); gst_object_unref (source); return ret; } /* called when we get a GstMessage from the source pipeline when we get EOS, we * notify the appsrc of it. */ static gboolean on_source_message (GstBus * bus, GstMessage * message, ProgramData * data) { GstElement *source; switch (GST_MESSAGE_TYPE (message)) { case GST_MESSAGE_EOS: g_print ("The source got dry\n"); source = gst_bin_get_by_name (GST_BIN (data->sink), "testsource"); gst_app_src_end_of_stream (GST_APP_SRC (source)); gst_object_unref (source); break; case GST_MESSAGE_ERROR: g_print ("Received error\n"); g_main_loop_quit (data->loop); break; default: break; } return TRUE; } /* called when we get a GstMessage from the sink pipeline when we get EOS, we * exit the mainloop and this testapp. */ static gboolean on_sink_message (GstBus * bus, GstMessage * message, ProgramData * data) { /* nil */ switch (GST_MESSAGE_TYPE (message)) { case GST_MESSAGE_EOS: g_print ("Finished playback\n"); g_main_loop_quit (data->loop); break; case GST_MESSAGE_ERROR: g_print ("Received error\n"); g_main_loop_quit (data->loop); break; default: break; } return TRUE; } int main (int argc, char *argv[]) { gchar *filename = NULL; ProgramData *data = NULL; gchar *string = NULL; GstBus *bus = NULL; GstElement *testsink = NULL; GstElement *testsource = NULL; gst_init (&argc, &argv); if (argc == 2) filename = g_strdup (argv[1]); else filename = g_strdup ("/usr/share/sounds/ekiga/ring.wav"); if (!g_file_test (filename, G_FILE_TEST_EXISTS)) { g_print ("File %s does not exist\n", filename); g_free (filename); return -1; } data = g_new0 (ProgramData, 1); data->loop = g_main_loop_new (NULL, FALSE); /* setting up source pipeline, we read from a file and convert to our desired * caps. */ string = g_strdup_printf ("filesrc location=\"%s\" ! wavparse ! audioconvert ! audioresample ! appsink caps=\"%s\" name=testsink", filename, audio_caps); g_free (filename); data->source = gst_parse_launch (string, NULL); g_free (string); if (data->source == NULL) { g_print ("Bad source\n"); g_main_loop_unref (data->loop); g_free (data); return -1; } /* to be notified of messages from this pipeline, mostly EOS */ bus = gst_element_get_bus (data->source); gst_bus_add_watch (bus, (GstBusFunc) on_source_message, data); gst_object_unref (bus); /* we use appsink in push mode, it sends us a signal when data is available * and we pull out the data in the signal callback. We want the appsink to * push as fast as it can, hence the sync=false */ testsink = gst_bin_get_by_name (GST_BIN (data->source), "testsink"); g_object_set (G_OBJECT (testsink), "emit-signals", TRUE, "sync", FALSE, NULL); g_signal_connect (testsink, "new-sample", G_CALLBACK (on_new_sample_from_sink), data); gst_object_unref (testsink); /* setting up sink pipeline, we push audio data into this pipeline that will * then play it back using the default audio sink. We have no blocking * behaviour on the src which means that we will push the entire file into * memory. */ string = g_strdup_printf ("appsrc name=testsource caps=\"%s\" ! autoaudiosink", audio_caps); data->sink = gst_parse_launch (string, NULL); g_free (string); if (data->sink == NULL) { g_print ("Bad sink\n"); gst_object_unref (data->source); g_main_loop_unref (data->loop); g_free (data); return -1; } testsource = gst_bin_get_by_name (GST_BIN (data->sink), "testsource"); /* configure for time-based format */ g_object_set (testsource, "format", GST_FORMAT_TIME, NULL); /* uncomment the next line to block when appsrc has buffered enough */ /* g_object_set (testsource, "block", TRUE, NULL); */ gst_object_unref (testsource); bus = gst_element_get_bus (data->sink); gst_bus_add_watch (bus, (GstBusFunc) on_sink_message, data); gst_object_unref (bus); /* launching things */ gst_element_set_state (data->sink, GST_STATE_PLAYING); gst_element_set_state (data->source, GST_STATE_PLAYING); /* let's run !, this loop will quit when the sink pipeline goes EOS or when an * error occurs in the source or sink pipelines. */ g_print ("Let's run!\n"); g_main_loop_run (data->loop); g_print ("Going out\n"); gst_element_set_state (data->source, GST_STATE_NULL); gst_element_set_state (data->sink, GST_STATE_NULL); gst_object_unref (data->source); gst_object_unref (data->sink); g_main_loop_unref (data->loop); g_free (data); return 0; }
ESSENTIALAI-STEM
Knight v. Paxton/Opinion of the Court This suit was brought by James W. Paxton, the complainant below, in the circuit court of the United States for the Northern district of Illinois, to obtain a decree that so much of certain described real property, situated in Chicago, as was of the value of $1,000, be set off to the defendants for their homestead, and that the possession of the residue be delivered to him; or, if the premises could not be divided, that the possession of the whole be delivered to him on his paying into court, for the use of the defendants, the sum of $1,000. The facts, as set forth in the bill, are in substance as follows: On the thirteenth of February, 1872, James M. Marshall, of Chicago, being indebted to the complainant in the sum of $10,000, executed and delivered to one Francis Bradley his bond of that date, in the penal sum of $20,000, conditioned to pay the amount of that indebtedness on the thirteenth of February, 1877, with semi-annual interest; and also 10 coupon notes, each for $450, payable to the order of the said Francis Bradley. The bond and coupon notes were on the same day assigned to the complainant, and Marshall and his wife at once executed a deed of the real property mentioned to one Lyman Baird, in trust for the security of the principal and interest of the bond and the coupon notes, and subject to a condition of defeasance on their payment according to their terms, and the performance of the covenants mentioned therein. This deed purported to be acknowledged by Marshall and his wife, and was, on the following day, recorded i the recorder's office of the county. Default having been made in the payment of the principal sum, the trustee, Baird, at the request of the complainant, and by virtue of the power contained in the trust deed, on the eighth of March, 1879, sold the premises, and the title and equity of redemption of the grantors therein, for the sum of $10,000, to the complainant, he being the highest bidder therefor. A deed thereof was executed to him by the trustee. Immediately afterwards he demanded possession of the premises from Marshall and his wife, who were, when the trust deed was executed, in the occupation of the premises as a residence. But they refused to surrender them, and about a year afterwards set up that Susan Marshall, the wife, had never acknowledged the deed of trust, and by reason of this fact her homestead right in the premises had never been released. The bill alleged that this was the first knowledge the complainant ever had of any such claim, and that he always believed the trust deed was properly acknowledged by both Marshall and his wife, and that thereby they had released all their right in the premises under the homestead laws of Illinois. The bill also alleged that the value of the premises was greatly in excess of the value of the homestead rights therein, and that the complainant was entitled to the possession of so much thereof as might not be set off to the defendants for a homestead, or, in case the premises were incapable of division, he was entitled to the whole of them on payment into court of the sum of $1,000 for the use of the defendants, which payment he offered to make. The bill concluded with a prayer for a decree in accordance with these averments, as stated above, and for such other and further relief as the nature of the case might require. Soon after the bill was filed, James M. Marshall died, and his widow filed a separate answer, setting up four defenses: First, that the premises in question were conveyed on the twenty-first of November, 1860, by James M. Marshall, prior to her marriage with him, and in consideration thereof, to his brother, Thomas E. Marshall, in trust, as an antenuptial settlement, and therefore she was incapable of executing the trust deed of February 13, 1872; second, that at the time this latter deed was signed she was confined to her bed by sickness, and by reason thereof, and the effect of narcotics prescribed by her physician to relieve her pain, she had not sufficient mental capacity to read and understand it; third, that when she signed it her husband falsely stated to her that it related to other property, which was situated in a different part of the city of Chicago; and, fourth, that after the bond secured by that deed became due, the time for payment was extended by the complainant in consideration of a rate of interest greater than that originally stipulated. Of these objections, the first is the only one which requires consideration by this court. The other three are not sustained by the evidence in the case. That which bears upon them is vague and conflicting, seldom engendering a doubt, and never producing conviction. The deed of trust constituting the antenuptial settlement was executed by James M. Marshall to his brother, Thomas E. Marshall, in trust for the appellant, Susan C. Larmon, whom he was about to marry, for her life, and in case of her death, leaving any child or children of the intended marriage, for such child or children, and in case she died without child or children, then for Susan C. Marshall and Ophelia K. Larmon, for life, with remainder to James M. Marshall and his heirs. On the eighteenth of May, 1867, Thomas E. Marshall, the trustee named in the deed of marriage settlement, and the said Susan C. Marshall and Ophelia K. Larmon, conveyed the premises to the wife for the purpose, as stated in the deed, of determining the trust, and vesting in her absolutely all rights, legal or equitable, which they might have under the deed of marriage § ttlement. James M. Marshall, the husband, witnessed this deed, and at the time there were no children born to her. This deed was properly acknowledged by all the grantors, and recorded soon afterwards in the recorder's office of the county. In it all parties then living, interested in the property, or who could by any possibility become interested, united, except James M. Marshall, the husband, who was a witness to its execution. Whether there could afterwards be any restraint upon her alienation of the fee of the property by reason of the subsequent birth of a child or children of the marriage, it is unnecessary to decide. There was none upon the alienation of the life-estate when the trust deed, in the nature of a mortgage, was executed to the complainant in February, 1872. Was she bound by that deed, assuming, as found by the court, that she never acknowledged its execution before the officer whose certificate of acknowledgment it bore? This question, we think, is answered by the statutes of Illinois. Previous to March 27, 1869, an acknowledgement by a married woman before a qualified officer was essential to the valid execution of her conveyance of real property. But on that date and act was passed, the first section of which is as follows: 'Any feme covert being above the age of eighteen years, joining with her husband in the execution of any deed, mortgage, conveyance, power of attorney, or other writing of or relating to the sale, conveyance, or other disposition of lands or real estate as aforesaid, shall be bound and concluded by the same, in respect to her right, title, claim, interest, or dower in such estate, as if she were sole and of full age, as aforesaid; and the acknowledgment or proof of such deed, mortgage, conveyance, power of attorney, or other writing may be the same as if she were sole.' After the passage of this act the execution of a conveyance of real property by a married woman joining with her husband was sufficiently authenticated by her signature. It would seem that her acknowledgment of its execution before an officer authorized to take acknowledgments was only required to render it admissible as evidence without further proof, or to release her homestead right in the property. For its validity as a transfer of the grantor's interest, except as to the homestead rights therein, the acknowledgment was unnecessary. In Hogan v. Hogan, 89 Ill. 428, the supreme court of Illinois had occasion to speak both of the statute contained in the revision of 1845, and of that of 1869. Of the statute in the revision of 1845 it said: 'Under said statute it was only in the precise mode prescribed thereby,-by the husband joining in the execution of the deed, and by a certificate showing an acknowledgment in substantial compliance with the statutory requirements,-that the wife could convey her real estate. It was the acknowledgment of the feme covert which was the operative act to pass the title, and not the delivery of the deed.' And of the statute of 1869 it said: 'This latter statutory enactment worked a marked change in the laws. Thereafter the acknowledgment ceased to be the effective means to work the transfer of title. The certificate of her acknowledgment might thenceforth have been the same as that required in the case of a feme sole; and without any acknowledgment whatever, proof of her execution of a conveyance might have been made as at common law. So, also, from that time forth, her contract in writing, made jointly with her husband, for the disposition of her lands, became binding upon her, and might have been enforced in a court of chancery, and she compelled to a specific performance of the same. One only distinction between her condition and that of an unmarried woman, in reference to the alienation or disposition of real property, was still retained. The law still required, before she could convey or make any valid contract for the disposition of her lands, her husband should join with her in the deed r other writing.' See, also, Bradshaw v. Atkins, 110 Ill. 329; Edwards v. Schoeneman, 104 Ill. 278. It follows that, by the trust deed of 1872, in the nature of a mortgage, to the complainant, in which her husband united, her estate in the mortgaged premises passed as completely as if she had been a feme sole, subject to any homestead right therein which they possessed under the laws of Illinois. An act of the state, passed in 1851, provided for exemption from levy and forced sale, under judicial process or order, for debts contracted after its date, of the lot of ground and buildings thereon, occupied as a residence and owned by the debtor, being a householder and having a family, to the value of $1,000. And the amendatory act of 1857 provided that no release or waiver of such exemption should be valid unless the same should be in writing, subscribed by the holder and his wife, if he had one, 'and acknowledged in the same manner as conveyances of real property are required to be acknowledged;' the act declaring that its object was 'to require, in all cases, the signature and acknowledgment of the wife as conditions to the alienation of the homestead.' An act passed in 1871 provided that in the enforcement of a lien upon premises including the homestead, if the homestead right was not waived or released in the manner required, the court might set off the homestead, and decree the sale of the balance of the premises; or, if the value thereof exceeded the exemption, and they could not be divided, might order the sale of the whole and the payment of the amount of the exemption to the party entitled. 1 Starr & C. Ann. St. Ill. c. 52. The payment by the holder of the lien, seeking its enforcement by sale of the premises, of the amount of the homestead exemption would, of course, obviate the necessity of the sale in the case mentioned, where the property was incapable of division, and authorize a decree for the delivery of the entire property to the party otherwise entitled to it. The master, to whom it was referred to ascertain whether the premises could be divided so as to set off to the widow a portion equivalent to the sum of $1,000, having reported that they could not be divided, the complainant was entitled to the possession of the whole premises upon paying the required amount into court for her benefit. The decree of the circuit court is, therefore affirmed.
WIKI
/* SPDX-License-Identifier: GPL-2.0 */ /* Copyright (C) 2014-2019 B.A.T.M.A.N. contributors: * * Linus Lüssing */ #ifndef _NET_BATMAN_ADV_MULTICAST_H_ #define _NET_BATMAN_ADV_MULTICAST_H_ #include "main.h" #include <linux/netlink.h> #include <linux/seq_file.h> #include <linux/skbuff.h> /** * enum batadv_forw_mode - the way a packet should be forwarded as */ enum batadv_forw_mode { /** * @BATADV_FORW_ALL: forward the packet to all nodes (currently via * classic flooding) */ BATADV_FORW_ALL, /** * @BATADV_FORW_SOME: forward the packet to some nodes (currently via * a multicast-to-unicast conversion and the BATMAN unicast routing * protocol) */ BATADV_FORW_SOME, /** * @BATADV_FORW_SINGLE: forward the packet to a single node (currently * via the BATMAN unicast routing protocol) */ BATADV_FORW_SINGLE, /** @BATADV_FORW_NONE: don't forward, drop it */ BATADV_FORW_NONE, }; #ifdef CONFIG_BATMAN_ADV_MCAST enum batadv_forw_mode batadv_mcast_forw_mode(struct batadv_priv *bat_priv, struct sk_buff *skb, struct batadv_orig_node **mcast_single_orig); int batadv_mcast_forw_send(struct batadv_priv *bat_priv, struct sk_buff *skb, unsigned short vid); void batadv_mcast_init(struct batadv_priv *bat_priv); int batadv_mcast_flags_seq_print_text(struct seq_file *seq, void *offset); int batadv_mcast_mesh_info_put(struct sk_buff *msg, struct batadv_priv *bat_priv); int batadv_mcast_flags_dump(struct sk_buff *msg, struct netlink_callback *cb); void batadv_mcast_free(struct batadv_priv *bat_priv); void batadv_mcast_purge_orig(struct batadv_orig_node *orig_node); #else static inline enum batadv_forw_mode batadv_mcast_forw_mode(struct batadv_priv *bat_priv, struct sk_buff *skb, struct batadv_orig_node **mcast_single_orig) { return BATADV_FORW_ALL; } static inline int batadv_mcast_forw_send(struct batadv_priv *bat_priv, struct sk_buff *skb, unsigned short vid) { kfree_skb(skb); return NET_XMIT_DROP; } static inline int batadv_mcast_init(struct batadv_priv *bat_priv) { return 0; } static inline int batadv_mcast_mesh_info_put(struct sk_buff *msg, struct batadv_priv *bat_priv) { return 0; } static inline int batadv_mcast_flags_dump(struct sk_buff *msg, struct netlink_callback *cb) { return -EOPNOTSUPP; } static inline void batadv_mcast_free(struct batadv_priv *bat_priv) { } static inline void batadv_mcast_purge_orig(struct batadv_orig_node *orig_node) { } #endif /* CONFIG_BATMAN_ADV_MCAST */ #endif /* _NET_BATMAN_ADV_MULTICAST_H_ */
ESSENTIALAI-STEM
Talk:Convention of Mat Proposed merge with Mark Gjini Not notable beyond the Convention of Mat Vinegarymass911 (talk) 08:14, 20 July 2018 (UTC) * Thanks for your review. I am working on both Mark Gjini and Tom Plezha articles, and they are known for more than just their participation in the Convention of Mat. The sources I placed at Mark Gjini article when I created it two days ago and today give more insight on him. I added some content on his service to the Republic of Venice and plan to add more (his service in Ferrara etc), time permitting. Cheers, Ktrimi991 (talk) 10:49, 20 July 2018 (UTC)
WIKI
Page:The Art of Helping People Out of Trouble (1924).pdf/177 view that will be found to be more strongly developed in some persons than in others. Is it not true that there is a vast variation in the amount of effort which different people draw from us? As between two men, equally friendly, equally interested in us, we will be more careful to present accomplishment to one than to the other, more punctilious in the keeping of appointments, more precise in the making of statements, more effective in every way. The reason for this is that we feel that the one expects more of us than does the other. The same fact holds good of our attitude toward those whom we are helping out of trouble. We can make our assistance stimulating or we can make it enervating in proportion as we look for strength or invite weakness. There is nothing more difficult in the art of helping than this, for one must maintain a nice balance between doing everything and doing nothing, varying the weight of responsibility according to the strength of the individual who is being helped. This calls for the most intimate knowledge of the person in difficulty, and even then, one is frequently at a loss to know how much or how little of achievement should be expected of him. Perhaps the simplest illustration of this is pro-
WIKI
jQuery UI Widgets Forums Plugins Validator, Drag & Drop, Sortable Custom Validator keeps showing previous message This topic contains 2 replies, has 2 voices, and was last updated by  Tony Soprano 9 years, 1 month ago. Viewing 3 posts - 1 through 3 (of 3 total) • Author • Tony Soprano Participant Dear community I’m having a problem with a custom validator, in which different stuff is validated and a different message is displayed for every failed validation. Here’s a sample code (everything is in the same rule): if(result1){ $(‘#startForm’).jqxValidator(‘rules’)[4].message = “Message1”; return false; } if(result2){ $(‘#startForm’).jqxValidator(‘rules’)[4].message = “Message2”; return false; } My problem is: When Message1 is displayed in a previous validation, then the message still shows “Message1” even though the code inside result2-block is called. But in javascript debugger I can see, that jqxValidator(‘rules’)[4].message is correctly set to “Message2”. Do I need to update the display of the validator or something similar? Thank you for a hint, Best regards Tony Dimitar Participant Hello Tony, The best way to achieve your requirement is to apply two different rules to the same input. That way, different error messages will be displayed on different conditions. Please take a look at the jqxValidator online examples for a demonstration. Best Regards, Dimitar jQWidgets team http://www.jqwidgets.com/ Tony Soprano Participant Thanks Dimitar, your solution helped me. I created now a separate rule for each validation. Also, the problem because it didn’t work was because in some cases I forgot to return true for succesfull validation. Best Regards Tony Viewing 3 posts - 1 through 3 (of 3 total) You must be logged in to reply to this topic.
ESSENTIALAI-STEM
Page:Rocky Mountain life.djvu/21 ==CHAPTER I.== Objects of a proposed excursion. Primary plans and movements. A Digression. Rendezvous for Oregon emigrants and Santa Fe traders. Sensations on a first visit to the border Prairies. Frontier Indians. MY purpose in visiting the Rocky Mountains, and countries adjacent, having hitherto proved a fruitful source of inquiry to the many persons I meet, when aware of my having devoted three years to travel in those remote regions, and I am so plied with almost numberless other questions, I know of no better way to dispose of them satisfactorily, than by doing what I had thought of at the outset, to wit: writing a book. But, says one, more books have been already written upon subjects of a kindred nature, than will ever find readers. True, indeed; yet I must venture one more; and this much I promise at the start: it shall be different, in most respects, from all that have preceded it; and if I fail to produce an agreeable variety of adventures, interwoven with a large fund of valuable information, then I shall not have accomplished my purpose. Yet, why did I go? —what was my object? Let me explain: Dame Nature bestowed upon me lavishly that innate curiosity, and fondness for things strange and new, of which every one is more or less possessed. Phrenologists would declare my organ of Inquisitiveness to be largely developed; and, certain it is, I have a great liking to tread upon unfrequented ground, and mingle among scenes at once novel and romantic. Love of adventure, then, was the great prompter, while an enfeebled state of health sensibly admonished me to seek in other parts that invigorating air and climate denied by the diseased atmosphere of a populous country. I also wished to acquaint myself with the geography of those comparatively unexplored regions, —their geological character, curiosities, resources, and natural advantages, together with their real condition, present inhabitants, inducements to emigrants, and most favorable localities for settlements, to enable me to speak from personal knowledge upon subjects so interesting to the public wind, at the present time, as are the above. Here, then, were
WIKI
User:Kaoru~enwiki About Me I was born on November 18, 1985, in Devon, England and am currently attending Imperial College London. Hobbies Ellegarden Machinae Supremacy Linkin Park Asian Kung-Fu Generation Lostprophets Spitalfield Neon Genesis Evangelion Prince of Tennis Serial Experiments Lain Cowboy Bebop Full Metal Alchemist Bleach The Belgariad The Mallorean The Gap Cycle The Ender Saga The Hitchhiker's Guide To The Galaxy * Music * Anime * Books Geek Code (Wikipedia: Geek Code) GCS d-- s+:+ a20 C++++ UL>++++$ P++>++++ L++>+++ E W++ N o? K->+ w+(---) O?> M V?> PS PE Y+ PGP- t+ 5 X+ R>+++ tv(+) b++>++++ DI D>++ G>+++ e>++ h+ r%>+++ y-
WIKI
TU-Automotive Detroit 2015: Opportunities in vehicle connectivity Utilizing the potential of connected systems to benefit companies, individuals, and society 2015/06/26 Summary TU-Automotive Detroit exhibition floor TU-Automotive Detroit exhibition floor  The 2015 TU-Automotive Detroit exhibition was held from June 3 through June 4, 2015, in Novi, Michigan, U.S. Over 3,000 people attended the two-day exhibition, which featured three main focus areas in its exhibition area and discussion sessions: telematics, mobility, and autonomous vehicles. Despite the introduction of mobility and autonomous themes for the first time in this year's exhibition, much of the exhibition floor area and sessions still emphasized telematics and connectivity, often with multiple presentations on the topic running concurrently.  This report focuses on the opportunities and their associated considerations that the connected vehicle provides to businesses, customers, and society. Examples of such opportunities include the following:   • Performing diagnostics and identifying vehicle failures, which can then inform drivers to return to a dealership for repairs, thus providing a revenue stream for a dealership   • Providing information on road conditions to the cloud, which then transmits the information to other vehicles and to regional traffic authorities   • Reducing traffic congestion by providing parking occupancy information for on-street parking  This report is the second of three reports which focuses on the discussion sessions presented at TU-Automotive Detroit. The first report provided an overview of ideas and concepts related to autonomous vehicles. A third report will be released in the future discussing issues on improving infotainment systems and services. Related Reports: TU-Automotive Detroit 2015: Impact of autonomous vehicle development Social considerations and necessity of driver involvement in automated technologies Revenue streams in telematics technologies Session: Monetizing the Connected Car Company Speaker Title Hyundai Michael Deitz Senior Group Manager, Connected Car and Owner Marketing Group 1 Automotive Wade Hubbard Vice President, Fixed Operations AT&T Cameron Coursey Vice President, Product Development for IoT Solutions Strategy Analytics Roger Lanctot Associate Director, Global Automotive Practice  In the session titled "Monetizing the Connected Car", panelists not only discussed how telematics in vehicles presented opportunities for revenue across the vehicle supply chain, but also how telematics fits within the framework of vehicle sales and services. Michael Dietz said that while telematics technologies can help sell vehicles, it should not be presented as an independent selling point. Customers need to be informed, specifically by dealers, of how telematics can cost-effectively solve their problems so they can see the technology's benefits. Additionally, the connected vehicle can serve as a way to reinforce trust with the customer by providing diagnostic information directly from the car itself in case there is a problem. Statistics of percentage profit derived from service and aftersales Statistics of percentage profit derived from service and aftersales Source: NADA, Strategy Analytics  Offering a different perspective, Wade Hubbard presented the idea that telematics has more importance in the ownership lifecycle compared to its ability to appeal to a purchaser. The connected car has the capacity to help perform sophisticated diagnostics and analysis to find vehicle failures. In terms of revenue, Wade Hubbard pointed out that it is more difficult for dealerships to make money through new car sales. In 2014, 11 percent of Group 1's revenue came from parts and services, while approximately 40 percent of their profit came from parts and services. Telematics can play a role in bringing customers back to dealerships for repairs and service.  Cameron Coursey provided a vision of the future in which telematics would be present in every vehicle, similar to how Europe has mandated that every vehicle has e-call capabilities. Thus, user appeal shifts to the capabilities of the telematics services that are provided, as opposed to the presence of such services. Differentiation between services will then play a larger role in new vehicle sales. The ability to upgrade vehicle telematics over time without the need for additional purchases can serve as one way for an OEM to differentiate itself from its competitors.  In regards to how telematics services should be offered, the panelists concurred that customers tend not to favor subscription-based business models. Roger Lanctot suggested that a possible business model would be to include a baseline level of service on all vehicles, with the ability for customers to purchase additional features. Despite this, Wade Hubbard mentioned feedback from customers who simply want a vehicle's center stack to emulate the features already provided on their smartphone, rather than utilize any new technology.   Car connectivity as a method to connect to customers Session: Networked Society and the Connected Car Cloud Company Speaker Title Ericsson Magnus Lundgren Head of Connected Vehicle Cloud  In the session called "Networked Society and the Connected Car Cloud", Magnus Lundgren mentioned that Ericsson's focus is about the connected customer more than the connected car. He made a point stating that a customer might not necessarily be the person who purchases the vehicle, but rather someone who just uses the vehicle, given the availability of car sharing services. Magnus Lundgren referenced an article in the Wall Street Journal which stated that service companies would have the most to gain from connected technologies. One of the reasons why Volvo's partnership with Ericsson has been successful is that the company has focused on a future featuring the connected customer. Visualization of Ericsson Cloud deployment model Visualization of Ericsson Cloud deployment model Source: Ericsson Visualization of communications Visualization of communications between vehicles and the cloud regarding road conditions and other events Source: Ericsson  Other factors for the success that Volvo Cars and Ericsson has experienced include Volvo's design philosophy of removing the complexity of connecting the customer to the vehicle to the cloud. This allows rapid implementation and delivery of features and applications into the cloud. Another reason for the success was the decision to have a global deployment of the Connected Vehicle Cloud. The global deployment allowed for standardized solutions to work across multiple regions. Finally, the partnership allowed each company to focus on their core competencies. Ericsson has the capability to develop cloud and customer service backends, while Volvo focuses on the human machine interface.  Magnus Lundgren presented a number of use cases which focused on a connected vehicle in a networked society. Vehicles could connect to dealerships to send and receive information on scheduled maintenance visits. While on the road, cars could send information about icy roads to the cloud, which can then inform other drivers about specific danger spots. This information, along with data about accidents and traffic patterns, could be sent to regional road authorities for additional analysis.  One example of a connected safety system features the use of a device within a bicycle helmet which interacts with a smartphone to connect to the cloud. The cloud then sends location information about the bicyclist to a connected car, and warns both parties in case of an imminent collision. Another use case is called "Roam Delivery", which has delivery services bringing goods to a customer's vehicle instead of their home. The vehicle transmits its location over the cloud, while the courier receives a one-time use digital key to access the vehicle.   How vehicle connectivity provides additional value to the customer Session: How the Connected Customer will Change the Automotive Industry Company Speaker Title Volvo Klas Bendrik Senior Vice President & Group Chief Information Officer Examples of companies Examples of companies whose success is based on connecting customers to their services Source: Volvo  The session titled "How the Connected Customer will Change the Automotive Industry" started with Klas Bendrik framing an interesting phenomenon surrounding specific companies. He noted that the largest "service companies", such as Uber, Facebook, Airbnb, and Alibaba, did not actively own any service-related assets such as cars, media content, real estate, or inventory. The key to those companies' operations is their ability to connect customers to services that they demand. As such, they serve as examples of companies that can fully utilize the customers' expectations of being constantly connected, both today and in the future. Klas Bendrik presented the point that if the automotive industry doesn't capitalize on the opportunity presented by connected technologies, then another industry or company will.  Vehicle connectivity opens up new opportunities for companies to provide the customer with additional value. Klas Bendrik gave examples of connected technologies benefiting the customer such as the Volvo XC90's ability to receive over the air updates. The XC90 also features an emergency call system in case of an accident. Other connected features include the ability to remotely control the vehicle's heating and cooling features and remotely start the car's engine. Connected technologies also assist in the advancement of other systems, as Volvo is preparing a pilot program in Gothenburg in 2017 for the testing of autonomous vehicle technology, which will have cloud connectivity to access traffic information.   Using connectivity technologies to develop solutions to traffic congestion Session: Are We There Yet? Driving Intelligence in the Connected Car Company Speaker Title Inrix Bryan Mistele CEO  In describing the current state of the connected car, Bryan Mistele noted that the capability of the connected vehicle to provide navigation and traffic information has significantly improved in recent years. Byran Mistele used the session titled "Are We There Yet? Driving Intelligence in the Connected Car" to show how Inrix is looking to use connected technologies to solve the problem of traffic congestion. Approximately 30% of urban traffic congestion is caused by people looking for parking areas. Additionally, a study by Frost & Sullivan shows that drivers on average spend 55 hours a year looking for parking, which costs consumers and economies approximately USD 600 million in time and fuel.  Bryan Mistele pointed out that the connected vehicle is only one part of the system needed solve this problem. While connected vehicles provide a solution for the individual to the traffic congestion problem in that drivers can make better decisions to avoid traffic, the problem of optimizing traffic for a city is left unsolved. In order for this to happen, cities would have to make both appropriate investment decisions and improve its standing connected infrastructure. Inrix utilizes both information provided by connected vehicles and city systems in its On-Street Parking service. Sample screenshot of Inrix On-Street Parking service Sample screenshot of Inrix On-Street Parking service used with BMW's iPark feature Source: Inrix  The On-Street Parking service uses information from a range of data sources such as parking transactions, real-time traffic probes, smart meter transactions, parking sensors, and vehicle navigation data to develop a parking occupancy model. The service provides parking availability data which is updated hourly, as well as pricing and any restrictions or policies for a given area. The service also works with Inrix's off-street parking to provide parking locations if on-street parking is unavailable. Inrix formed a partnership with BMW to provide its On-Street Parking service in BMW models using ConnectedDrive. <Automotive Industry Portal MarkLines>
ESSENTIALAI-STEM
How does rain affect an ecosystem? The ecological effects of acid rain are most clearly seen in aquatic environments, such as streams, lakes, and marshes where it can be harmful to fish and other wildlife. As it flows through the soil, acidic rain water can leach aluminum from soil clay particles and then flow into streams and lakes. Why is rain important to the ecosystem? Precipitation supplies the water that terrestrial organisms need — either directly in the form of rain that falls on soil where plants grow, or indirectly in the form of lakes, streams and ponds where animals can drink. What would happen to this ecosystem if the amount of rain increased? High water levels can lessen aquatic plant growth, which also reduces aquatic habitat. “High flows bring with it sediment and nutrients,” Benson said. … “Riparian areas can be more heavily eroded during intense or increased rains,” the Aquatic Ecosystems Shifting Climate report says. Why is rain important for plants? Rain helps wash off dust and any other dirt or debris that may be on your leaves. If you have house plants with delicate leaves, be careful they aren’t outside in a rare downpour. Rainwater dissolves the salts and other minerals in your the tap water, which remain in the soil of your plants. THIS IS IMPORTANT:  What are some examples of abiotic factors in the ocean? What are some effects of rain? The potential impacts of heavy precipitation include crop damage, soil erosion, and an increase in flood risk due to heavy rains (see the River Flooding indicator)—which in turn can lead to injuries, drownings, and other flooding-related effects on health. How does rainfall affect plants and animals? While rain clearly affects food supply, it also can affect foraging behavior, reproductive and population growth rates, and competitive interactions in subtle ways that might be difficult for researchers to trace back to any particular source. How does heavy rain affect animals? Most terrestrial animals do seek shelter. … Rain seems to annoy most species, however, even aquatic animals. During torrential downpours, animals such as frogs, turtles and fish may retreat to lower levels of lakes and ponds, with some seeking added shelter under things like fallen rocks or driftwood. What changes are seen in the environment after the rain? The overall temperature of the environment decreases a lot after the rainfall. Here,the latent heat and evaporation are the reasons for the environmental cooling. After,the rainfall the cloudy sky becomes clearer and sometimes rainbow also appears in the sky. What happens to plants during rain? Plants look greener after it rains since air is 78 percent nitrogen and nitrogen, above all other elements, is what makes plants green. Some of this element, in its nitrate and ammonium forms, comes down in the rain and is immediately taken in by plants through roots and leaves. What are the benefits of rain water? Rainwater has the same pH as distilled water, so it helps to neutralize our blood pH levels and promotes stomach functions. Rainwater is known to be very beneficial for healthy skin and hair. The alkaline pH in rainwater helps to maintain the skin’s natural elasticity and moisture, while also supporting healthy hair. THIS IS IMPORTANT:  Question: How much US steel is recycled? Why does rain water make grass greener? While the Earth’s atmosphere is approximately 78% nitrogen, grass is unable to absorb the nitrogen in the air. That’s where Mother Nature comes in to help. When it rains, the rain forces the nitrogen to the ground. Microorganisms then take over, converting the nitrogen in the soil and makes grass green.
ESSENTIALAI-STEM
Talk:Claire Bennet "Immunity to pain" under powers section i removed this once, to which someone replaced. so i put forward this, that is NOT a result of her powers, she could still feel pain. her "immunity" is due to Sylar poking around in her head. there is a point of this in the "Villains" section Dar-zero (talk) 20:23, 7 October 2008 (UTC) * Can you cite where you got that piece of information? I'll admit, framing it as an expansion of her powers is out of line, but if you can't prove the other that's just as much out-of-line. Padillah (talk) 12:28, 8 October 2008 (UTC) * The ability to feel pain. "Series writers Joe Pokaski and Aron Coleite would only comment that she "feels pain, but not the way most of us do."[2] Claire, describing her response to pain to West, says "I feel pain; I just get over it quickly." See. "Powers and Abilites" paragraph two "Claire Bennet" wikipedia page * Sylars intervention. ok granted, i have no physical proof, other than what is stated in show, claire makes repeated remarks at revenge against him, that she no longer feels human since the incident and of course, she lost the ability of feeling pain moments after sylar cut her open Dar-zero (talk) 10:23, 10 October 2008 (UTC) * And, while I apreciae the attempt (I want the dumb thing out of the powers section too), what you've just described is "speculation" and we can't use it. We can remove it completely because there is no proof that it is a power either, but to go any further we're just gonna have to wait. Something will come up, especially on a show this big. Padillah (talk) 12:19, 10 October 2008 (UTC) * Nope, we shouldn't remove it in it's current incarnation. It's under "Powers and Abilities" and it's simply stated that she can't feel pain, not that this is a new power of hers. We can take it out of the info box however. Padillah (talk) 12:22, 10 October 2008 (UTC) Technically, after Sylar poked around in her brain, I remember her saying in one episode that "pain is the only thing that made me feel normal", or something like that. It should be re-added as "Immunity to pain as a result of" so and so, according to me. Winxrocker (talk) 12:50, 5 August 2010 (UTC) Editing/cleaning up article This article seems way too long. Though I'm loathe to do it myself, as I'm not an expert on the show, but it seems that the entire article should be re-done. It doesn't seem that such extremely detailed reiteration of the the plot is needed on Wilipedia. silvertron —Preceding undated comment added 19:02, February 2, 2009 (UTC). This article definitely needs less details, and reception header I noticed that this article is WAY too long, far too many details for a plot synopsis, is should be a single paragraph per season at the most. Also, I noticed that there's no header for reception on the character, which I think would be a good idea, since, in my opinion, she is what is currently what is ruining the show, with terrible acting, dialougue, everything. I'm sure a lot of reviewers have differing opinions on her, so there should be at least some info on reception. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 00:31, 18 March 2009 (UTC) Expansion based on secondary sources In case someone would like to further improve the article, specifically the analysis section, the deletion discussion has brought up several more soures thanks to :, ,. Also, I did not have full access to The Handbook of Gender, Sex, and Media; especially pp. 168-170 might have more relevant info. Daranios (talk) 08:09, 2 March 2022 (UTC) Plot section Where did it go? The article on her son has one. It doesn't need to be an episode by episode summary, but a rough summary of her journey would be nice. Nakonana (talk) 00:16, 6 July 2024 (UTC)
WIKI
Carson: ‘We’re in a different ball game’ | TheHill Ben CarsonBenjamin (Ben) Solomon CarsonCarson's affordable housing idea drawing undue flak Overnight Energy: Trump EPA looks to change air pollution permit process | GOP senators propose easing Obama water rule | Green group sues EPA over lead dust rules Green group sues EPA over lead dust rules it says are too lax MORE in an interview Sunday defended his 2016 Republican presidential campaign following the resignations of key aides, saying, “We’re in a different ball game.” “Well, first of all, whenever you have something that is not working the way you want it to, you have a few choices. You can double down on it; you can ignore it; or you can analyze it and make appropriate changes,” the retired neurosurgeon said on ABC’s “This Week.” “You know, we have had very good people. They’ve had very good ideas, and no one predicted that we would even be in the hunt. And, you know, a novice in this area with no background, no campaign, no funding mechanism. So it really is quite spectacular, what we were able to do,” he added. “But the fact of the matter is now we’re in a different ball game, and we need the ability to execute and not just to have good ideas.” Carson said his campaign “didn’t really have” the personnel to “execute a plan,” adding that he was going to make some “substantial changes.” “[Campaign Manager Barry] Bennett decided that he could not live with those changes, and that’s OK,” Carson said. “Doesn’t diminish anything that he’s done. I think he’s done a fantastic job.” Carson also said Armstrong Williams, a key confidant, made some “bad judgments.” “There’s no question about it. But, you know, he’s a friend. I think he’s a valuable individual. But we can’t have people working at cross purposes, and that’s one of the things that has to be fixed and is being fixed and is fixed, in fact, at this point.” Read more from The Hill: Top Carson staffers resign View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Page:Joseph Story, Commentaries on the Constitution of the United States (1st ed, 1833, vol III).djvu/514 506 § 1639. It is observable, that the language is, that "the judicial power shall extend to all cases in law and equity," arising under the constitution, laws, and treaties of the United States. What is to be understood by "cases in law and equity," in this clause? Plainly, cases at the common law, as contradistinguished from cases in equity, according to the known distinction in the jurisprudence of England, which our ancestors brought with them upon their emigration, and with which all the American states were familiarly acquainted. Here, then, at least, the constitution of the United States appeals to, and adopts, the common law to the extent of making it a rule in the pursuit of remedial justice in the courts of the Union. If the remedy must be in law, or in equity, according to the course of proceedings at the common law, in cases arising under the constitution, laws, and treaties, of the United States, it would seem irresistibly
WIKI
Trump administration weighs new family-separation effort at border - The Washington Post The White House is actively considering plans that could again separate parents and children at the U.S.-Mexico border, hoping to reverse soaring numbers of families attempting to cross illegally into the United States, according to several administration officials with direct knowledge of the effort. One option under consideration is for the government to detain asylum-seeking families together for up to 20 days, then give parents a choice stay in family detention with their child for months or years as their immigration case proceeds, or allow children to be taken to a government shelter so other relatives or guardians can seek custody. That option called binary choice is one of several under consideration amid the president's frustration over border security. Trump has been unable to fulfill key promises to build a border wall and end what he calls catch and release, a process that began under past administrations in which most detained families are quickly freed to await immigration hearings. The number of migrant family members arrested and charged with illegally crossing the border jumped 38 percent in August and is now at a record level, according to Department of Homeland Security officials. Senior administration officials say they are not planning to revive the chaotic forced separations carried out by the Trump administration in May and June that spawned an enormous political backlash and led to a court order to reunite families. But they feel compelled to do something, and officials say senior White House adviser Stephen Miller is advocating for tougher measures because he believes the springtime separations worked as an effective deterrent to illegal crossings. At least 2,500 children were taken from their parents over a period of six weeks. Crossings by families declined slightly in May, June and July before surging again in August. September numbers are expected to be even higher. While some inside the White House and DHS are concerned about the optics and political blowback of renewed separations, Miller and others are determined to act, according to officials briefed on the deliberations. There have been several high-level meetings in the White House in recent weeks about the issue. The binary choice option is seen as one that could be tried out fairly quickly. Career law enforcement professionals in the U.S. government are working to analyze and evaluate options that would protect the American people, prevent the horrific actions of child smuggling, and stop drug cartels from pouring into our communities, deputy White House press secretary Hogan Gidley said in an emailed statement. Any effort to expand family detentions and resume separations would face multiple logistical and legal hurdles. It would require overcoming the communication and data management failures that plagued the first effort, when Border Patrol agents, Immigration and Customs Enforcement officials and Department of Health and Human Services caseworkers struggled to keep track of separated parents and children. The Trump administration believes it is on solid legal ground, according to two officials, in part because U.S. District Judge Dana M. Sabraw, who ordered the government to reunite separated families in June, approved the binary-choice approach in one of his rulings. But a Congressional Research Service report last month said practical and legal barriers remain to using that approach in the future and said releasing families together in the United States is the only clearly viable option under current law. Administration officials said the CRS report cited earlier legal rulings. But the American Civil Liberties Union, which launched the separations lawsuit, disputed that interpretation and said it would oppose any attempt at expanded family detentions or separations. The government need not, and legally may not, indiscriminately detain families who present no flight risk or danger, ACLU attorney Lee Gelernt said in an email. It is deeply troubling that this Administration continues to look for ways to cause harm to small children. Another hurdle is that the government does not have detention space for a large number of additional families. ICE has three family residential centers with a combined capacity of roughly 3,000 parents and children. With more than four times that many arriving each month, it is unclear where the government would hold all the parents who would opt to remain with their children. But Trump said in his June 20 executive order halting family separations that the administration's policy is to keep parents and children together, including by detaining them. In recent weeks, federal officials have taken steps to expand their ability to do that. In addition to considering binary choice and other options, officials have proposed new rules that would allow them to withdraw from a 1997 federal court agreement that bars ICE from keeping children in custody for more than 20 days. The rules would give ICE greater flexibility to expand family detention centers and potentially hold parents and children longer, though lawyers say this would be likely to end up in court. Officials have also imposed production quotas on immigration judges and are searching for more ways to speed up the calendar in its courts to adjudicate cases more quickly. Federal officials arguing for the tougher measures say the rising number of family crossings is a sign of asylum fraud. DHS Secretary Kirstjen Nielsen has blasted smugglers for charging migrants thousands of dollars to ferry them into the United States, knowing that legal loopholes will force the administration to release them pending a court hearing. Federal officials say released families are rarely deported. Advocates for immigrants counter that asylum seekers are fleeing violence and acute poverty, mainly in Central America, and deserve to have a full hearing before an immigration judge. There is currently a crisis at our southern border, DHS spokeswoman Katie Waldman said in a statement, adding, DHS will continue to enforce the law humanely, and will continue to examine a range of options to secure our nation's borders. In southern Arizona, so many families have crossed in the past 10 days that the government has been releasing them en masse to shelters and charities. A lack of available bus tickets has stranded hundreds of parents and children in Tucson, where they sleep on Red Cross cots in a church gymnasium. At a Senate hearing Wednesday, Sen. John Kyl (R-Ariz.) told Nielsen that migrants were flooding into the community and that authorities there had no ability to do anything about it. Nielsen said lawmakers needs to give DHS more latitude to hold families with children in detention until their cases can be fully adjudicated a process that can take months or years because of huge court backlogs. DHS officials have seen the biggest increase this year in families arriving from Guatemala, where smugglers called coyotes tell migrants they can avoid detention and deportation by bringing a child, according to some community leaders in that country. On Friday, Nielsen called for a regional effort to combat smuggling and violence in the region and to heighten our penalties for traffickers. I think there's more that we can do to hold them responsible, particularly those who traffic in children, she said in a speech in Washington at the second Conference on Prosperity and Security in Central America. More than 90,000 adults with children were caught at the southwest border in the first 11 months of fiscal 2018. The previous high for a single year was 77,600 in 2016. Read more: Watchdog: Trump's family-separation effort was flawed from the start U.S. border chief finds no easy fix to migration 'crisis' on visit to Central America 'Deleted' families: What went wrong with Trump's family separation effort
NEWS-MULTISOURCE
Page:Folk-lore - A Quarterly Review. Volume 15, 1904.djvu/325 The European Sky -god. 301 impiously claimed to love each other more fondly than Zeus and Hera. Again, Agamemnon king of Mycense was called Zeus in Laconia."^^ So was Amphiaraiis son of Oicles at Oropus.^^ So was Trophonius son of Erginus at Lebadea/^'^ where Zeus also bore the significant title, Bao-iX,ei;9, " the King." ^^^ According to Panodorus, Zeus reigned as a king in Egypt for twenty years ; according to Manetho, for eighty.--^^ The tale that Zeus visited Alcmena in the form of Amphitryon perhaps had a similar found- ation-^'' ; and this may have been the case with several other " Liebesverbindungen " of Zeus.^'^'^ Conversely, the re- lations of Ixion to Hera,-^'^ of Tantalus to Dione,-^^ &c., point in the same direction. Even in historical times it was no unheard of thing for a man to be regarded as a god. Empedocles in the fifth century B.C. addresses his fellow-townsmen of Agrigentum thus ^^° : " Friends .... all hail ! Lo, as an im- mortal god, no longer a mortal, I make my way honoured of ^' Lye. Alex., 1 124, Zivq 'ETrapTiaTiuc al/xiXoig ic\r]9i](Tsrai, 1369 f., TrpuiroQ fiiv i'j^ei Z)]v\ T] tv Tpefwinv lapov. ^^ C. MuUer, Fragmenta historicorum Grcccorum, ii., 531, E. A. Wallis Budge, Hist, of Egypt, i., 165. ^^ Class. Rev., xvii., 409. Just as Heracles was the seed of Zeus, but Iphicles of Amphitryon, so in another myth Dardanus and lasius were the sons of Electra, "sed Dardanus de love, lasius de Corytho procreatus est" (Serv. in Verg. Aen., 3. 167). ^^ On these see Overbeck, Kimstmythologie Zeus, i., 398 ff. -'^ Class. Rev., xvii., 420. =5^ nyg. fab., 9, 82, 83. -*" Emped. frag., 112 Diels, w (p'iKoi .... ;(a(p£r' * tyw ^' I'/uv Qeoq dfl^pOTOQ, OVKSTl OvrjTOQ K.T.X.
WIKI
Wikipedia:Articles for deletion/Kurt Tibbetts The result of the debate was keep. --Pablo D. Flores (Talk) 14:19, 4 January 2006 (UTC) Kurt Tibbetts Not encyclopedic KSnortum 05:02, 30 December 2005 (UTC) I stand corrected.--KSnortum 07:09, 31 December 2005 (UTC) * Strong Keep. Appears to be a prominent politician from the Cayman islands. The Cia World factbook lists Kurt Tibbetts as head of government: Leader of Government Business Kurt TIBBETTS (since 18 May 2005) http://www.cia.gov/library/publications/the-world-factbook/geos/cj.html. Also shows up prominently in Google searches. No Guru 05:14, 30 December 2005 (UTC) * Keep per No Guru. Snurks T C 07:00, 30 December 2005 (UTC) * Keep notable and verifiable. -- MisterHand 07:27, 30 December 2005 (UTC) * Keep, I reworded it a bit to make it clearer that he is the head of the country. -- Kjkolb 07:52, 30 December 2005 (UTC) * Keep -= SGBailey 10:29, 30 December 2005 (UTC) * Keep, head of government. Punkmorten 21:07, 30 December 2005 (UTC)
WIKI
Sri Lanka's bourse launches small business listing amid faltering economy COLOMBO, July 5 (Reuters) - Sri Lanka’s stock exchange on Thursday began listing small and medium sized businesses in a move to grant access to cheaper finance that could help boost a struggling economy. Sri Lanka’s economy grew 3.3 percent in 2017, the slowest pace since a recession in 2001. Government officials have forecast growth of around 4.5 percent this year, less than the central bank’s forecast of 5 percent. Small and medium businesses account for 52 percent of the country’s $87 billion economy and most of them are struggling to continue their ventures in the face of higher borrowing costs, with financial institutions reluctant to lend because of past non-performing loans. Colombo Stock Exchange launched the new listing for small businesses which have a minimum stated capital of 25 million rupees ($157,332), far less than 500 million rupees of capital required to list in the main board. Rajeeva Bandaranaike, the CEO of the bourse, said the new initiative has made listing easier for small businesses. Prashan Fernando, CEO at Acuity Stockbrokers said the move will help small businesses access lower cost financing compared to the current borrowing cost of between 16-22 percent from banks and finance companies. The main stock index has been on a downward trend due to tight monetary and fiscal policies, lower economic growth, and political uncertainty. The index has fallen around 4 percent so far this year with sluggish trading conditions. $1 = 158.9000 Sri Lankan rupees Reporting by Shihar Aneez; Editing by Kirsten Donovan
NEWS-MULTISOURCE
Martin Lücker Martin Lücker (born 11 October 1953) is a German classical organist, and professor at the Hochschule für Musik und Darstellende Kunst Frankfurt am Main. Career Born in Preußisch Oldendorf, Lücker studied organ in Hannover and in Vienna with Anton Heiller, and conducting in Detmold with Martin Stephani. He first worked there at the Landestheater Detmold as repetiteur, then as assistant of the choir director at the Oper Frankfurt. From 1983, he has been organist of the main Protestant church of Frankfurt, the Katharinenkirche. He has been professor of Künstlerisches Orgelspiel und Methodik/Didaktik des Orgelunterrichtes (concert organ playing and didactic of teaching organ playing) at the Hochschule für Musik und Darstellende Kunst Frankfurt am Main from 1998. From August 2011 to 2016, he was also the conductor of the Figuralchor Frankfurt. At the Katharinenkirche, he established two regular concert series. In "30 Minuten Orgelmusik" (30 minutes of organ music“, he plays every Monday and Thursday at 4:30 pm a free concert of 30 minutes, playing the 3000th concert in 2013. In "Musik in Sankt Katharinen" (Music in Saint Catharine's), he offers two organ concerts a months, played by himself and guests, and choral music with the Kantorei St. Katharinen. In 2012, he played a concert at the historic Stumm organ of the Rheingauer Dom with a program that Albert Schweitzer had performed in Frankfurt in 1928 on a similar instrument that was destroyed. He celebrated his 30th anniversary at the Katharinenkirche with a concert. Selected recordings * Johann Sebastian Bach, Leipziger Spätwerke. Hänssler CD 92.100 * Johann Sebastian Bach, Eine Weimarer Tonleiter. Hänssler CD 92.091 * Das Frankfurter Orgelbuch, Sieben zeitgenössische Orgelstücke, Melisma MELI 7114-2 * Works by Bach, Vivaldi, Stanley and others with Reinhold Friedrich (trumpet) and Hartmut Friedrich (trombone). Capriccio 10483
WIKI
गांधीगिरी Etymology From, originating from 🇨🇬. The word was in the movie (2006). Noun * 1) The practice of the ideals of, including nonviolence, satyagraha, and honesty.
WIKI
User:JonathanLi3230/sandbox Zheng Shu Zheng Shu is a well-known doctor in the city of Hangzhou, Zhejiang China. She has dedicated her life to stop Cancer
WIKI
Adipokine Adipokines are the hormones which are secreted by adipose tissues. These are the cell signaling proteins also called cytokines. The first ever adipokine that was discovered was leptin in 1994. Till date, more than hundreds of adipokines have been discovered. Adipokines function as classic circulating hormones to communicate with other organs including brain, liver, muscle, the immune system, and adipose tissue itself. The dysregulation of adipokines has been implicated in obesity, type 2 diabetes, and cardiovascular disease. Proinflammatory molecules produced by adipose tissue have been implicated as active participants in the development of insulin resistance and the increased risk of cardiovascular disease associated with obesity. In contrast, reduced leptin levels might predispose to increased susceptibility to infection caused by reduced T-cell responses in malnourished individuals. adipokines are also involved in the regulation of inflammatory responses. Related Journals of Adipokine Journal of Clinical Lipidology, Advances in Planar Lipid Bilayers and Liposomes, Chemistry and Physics of Lipids, Lipid Insights. High Impact List of Articles
ESSENTIALAI-STEM
User:RustyDOTtysonATgmailDOTcom/sandbox RustyDOTtysonATgmailDOTcom is a new creation of Rusty Tyson as he begins to use Wikipedia to research a partiular topic of long-standing interest to him on January 2, 2016.
WIKI
User:Grandmajoanne/test I have been researching the medieval knights and ladies of Europe for about 20 years. I have hundreds, if not thousands of families in my file. I would like to find a way to share the information, but my file is much to long to share one item at a time. I know I have lots of information you don't and would like to help, if I can find a way Joanne Cordell THIS IS MY OWN RESEARCH I just recently read Wikipedia's article on Aethelred, Lord of Mercia. He was married 1st to Eadburga (his aunt) daughter of Wigmund, King of Mercia & Aelflaed. Her grandfather was Cenwulf, King of Mercia & Elfleda. She was born about 835. Married about 850. I believe she was repudiated about 882, but never remarried. She died about 895. Aethelred and Edburga had several children before he married King Alfred's daughter Aethelflaed. His oldest daughter married King, Alfred, the Great Children Sigehelm of Kent Born abt 850. Married Alfred, the Great and about 899 she married Sigehelm of Kent-his minister Born abt 852 Died 902 Battle of Holme Born abt 854 Born about 856 Kent, Lord of Meopham, Cooling, etc. & King Edward Born about 860 Her husband was killed by King Edward, who married her next.? His 2nd wife Aethelflaed, daughter of King Alfred, the Great and his oldest daughter Elswitha wasn't born until about 868? I think her daughter was born about 890. Aethelflaed was about 40 years younger than her husband. After his death, she led her own armies, along with with brother King Edward, the Elder. She died 918 * 1) 1 Aelhswith/Ealswitha & Alfred, the Great, King of England & * 1) 2 Aethelwulf FitzEthelred & Wulfryth * 1) 3 Aethelhelm/Eahlhelm, Earl of Wiltshire & Aethelgyth/Wulfthryth * 1) 4 Aethelwold/Alwaldus/Oswald, King of York??? * 1) 5 Aelflaed/Wynflaed & Sigelhelm/Sigillin, Earl of
WIKI
migraine and stroke Migraine and Stroke Stroke and migraine share certain symptoms, which may lead someone with a migraine to fear they are having a stroke. A migraine is a type of headache, caused by spasms of the arteries leading into the head and  stroke is the interruption of blood to the brain, which kills the cells in the immediate area and affected those in the surrounding areas. The most common type of stroke is the ischaemic stroke, which is caused by an embolism (clot or debris) blocking a blood vessel in the brain. A migraine doesn’t cause brain damage, either in the short or long term. A stroke results in brain damage that varies from mild to disabling. In severe cases, a stroke can cause coma or death. Migraine with aura has been consistently associated with increased risk of ischemic stroke. Most studies suggest that this association is particularly strong for younger women Migraine aura often causes visual disturbances, such as   1)flashing lights, 2)zigzagging lines or 3)partial loss of vision. Other symptoms may include 4)numbness, 5)tingling, 6)speech difficulties and 7)muscle weakness on one side of the body. These disturbing symptoms usually disappear within an hour. but in case of stroke ,  similar symptoms are caused by an interruption of blood flow to the brain. Migraine aura is thought to be caused by over-activity of the brain cells. The gradual onset of migraine aura is due to the slow spreading of hyperactive nerve activity across the brain surface. Stroke and migraine aura can have similar symptoms mainly depends upon the area of brain affected, the symptoms of stroke may include: •  There is Problem in vision, such as vision loss • Numbness and tingling of the face, sometimes on one side only • Speech disturbances are common • Muscle weakness, sometimes on one side of the bodyoccur                                       Many times, transient ischaemic attack is mistaken for a migraine. A transient ischaemic attack (TIA) is a minor stroke and a warning that a severe stroke may follow. The symptoms of a TIA are identical to those of a full stroke, but disappear within 24 hours. TIAs can appear hours, days, weeks or months before a full stroke.  TIAs need emergency treatment. It seems that TIAs are caused by tiny blockages to blood vessels. These blockages cause temporary symptoms before they dissolve. Migraine aura and TIAs share similar symptoms, such as speech disturbances, weakness and problems with vision. Since the symptoms of TIAs go away within hours, the person may mistakenly believe they suffered from migraine. The broad differences between a migraine and a TIA include: • Visual disturbances – in TIA, the only disturbance is vision loss, whereas visual disturbance in migraine includes flashing lights and zigzagging lines as well. • Speed of attack – in TIA, the symptoms occur suddenly. In migraine, symptoms spread slowly over a few minutes. • Age of onset – migraine tends to first occur when an individual is young, whereas stroke is more common in older people. Article publié pour la première fois le 13/10/2011 Related Posts: • No Related Posts
ESSENTIALAI-STEM
Las Caritas Las Caritas ("The faces") is a collection of Indian inscriptions in a rock formation looking out over Lake Enriquillo in the Dominican Republic. The place is also called the Trono de Enriquillo ("Enriquillo's throne") because it is said the Taíno leader Enriquillo used to camp here during his rebellion.
WIKI
Biden admin confident of U.S. oil production boost by year's end By Timothy Gardner WASHINGTON, March 22 (Reuters) - The U.S. energy secretary said on Tuesday the Biden administration believes producers will boost U.S. oil supply by the end of the year, two weeks after she urged them to raise output quickly in the wake of the Russian invasion of Ukraine. Energy Secretary Jennifer Granholm said at the CERAWeek energy conference in Houston this month that any oil and gas company that can increase supply should do so quickly after President Joe Biden banned U.S. imports of Russian oil. Russia, one of the world's top petroleum producers, accounts for about 8% of U.S. imports of liquid fuels. Last year, the United States imported about 672,000 barrels per day of Russian crude oil and refined fuels. The administration is confident that "there will be a significant increase in supply by the end of this year, and we're hopeful that they live up to that" Granholm said referring to oil producers in a conference call with reporters. She said public and private talks at the Houston conference focused on ramping up supply, but suggested that higher oil production could take time. "You can't just flip the switch and have them come on overnight," Granholm told reporters about oil rigs. Even though the U.S. oil rig count has climbed for a record 18 months in a row, the increases have small and oil production was still far from pre-pandemic record levels as many companies focus more on returning money to investors rather than boosting output. RIG/U U.S. crude production slipped for a second year in a row to 11.2 million bpd in 2021 from a record 12.3 million bpd in 2019. Output is expected to recover to 12 million bpd in 2022 and 13 million bpd in 2023, according to the Energy Information Administration, the independent statistics branch of the Energy Department, forecast in March. Oil companies such as Chesapeake EnergyCHK.Oand Occidental Petroleum OXY.N have said that shortages of equipment, supplies and labor could limit growth in the short term. (Reporting by Timothy Gardner Editing by Marguerita Choy) ((timothy.gardner@thomsonreuters.com; +1 202 380-8348 (Twitter @timogard); Reuters Messaging: timothy.gardner.thomsonreuters.com@reuters.net)) The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Page:Eekhoud - The New Carthage.djvu/186 158 shopkeepers by tickling their interests. Without his assistance they might as well have declared themselves beaten in advance. Not at all scrupulous as to the means that he employed, his agents multiplied trips to saloons and visits from house to house. They had been instructed to see the thwarted shopkeepers and to promise them capital or customers. To the more stubborn they went as far as to give half of a banknote, the other half to be delivered to them on the night of the count, if the director of the Southern Cross won. Other employes in his imposing campaign organization, as complicated and as numerous as a ministry, prepared marked ballots for voters of whom they were suspicious; still others were busy compiling statistics of his chances, in dividing the voters in "good," "bad" and "doubtful" classes. The forecasts gave at least a thousand votes in majority to Béjard. He continued, however, to buy as many as he could, spending the party's money freely, drawing even upon his private resources. He would have ruined himself in order to win. His assistants worked upon the imagination of the peasants of the district, orthodox people like the nobility, and superstitious besides. Ignorant of history, these rural folk took the name of gueux in its literal sense. The least landholder, having been confirmed in his terrors by the talks of old folk on winter evenings, saw his holdings already pillaged, given over to the torch, and himself trampled down as by the Cossacks, and by anticipation, the soles of his feet began to burn. He would not vote for foot-broilers and incendiaries. In the villages Béjard's heelers gossiped quite naturally about Bergmans and his people, venting
WIKI
pyats validate Helper command, offering subcommands that focuses on validating various pyATS related input files, formats, and content. Usage: pyats validate <subcommand> [options] Subcommands: datafile validate your YAML-based datafile syntax jinja2_config validate genie config file jinja2 rendering testbed validate your testbed file yaml syntax General Options: -h, --help Show help -v, --verbose Give more output, additive up to 3 times. -q, --quiet Give less output, additive up to 3 times, corresponding to WARNING, ERROR, and CRITICAL logging levels pyats validate testbed This subcommand validates the content of your Testbed File. It gives developers an opportunity to check if the file is written following valid YAML syntax, and adheres to the Topology Schema. Usage: pyats validate testbed [file] [options] Description: Validates the provided testbed YAML file for syntax and content completeness. Testbed Options: [file] Testbed YAML file to validate --connect Test each device's connections --no-lint Do not lint the testbed YAML file Options [file] the input testbed yaml file. Can be a file path or a URL to a YAML file --connect best-effort attempt to connect to each testbed device using device.connect(). Consider this as a rudimentary method of ensuring your devices’s connection block is well defined/formed. --no-lint skips the linting of your testbed YAML file for syntax errors and warnings. Example # Example # ------- # # validating a testbed input file bash$ pyats validate testbed N7K-EZ-HW-7-SSR.yaml Loading testbed file: N7K-EZ-HW-7-SSR.yaml -------------------------------------------------------------------------------- Testbed Name: N7K-EZ-HW-7-SSR Testbed Devices: . |-- P1 [router/nxos] | `-- Ethernet3/9 ----------> link-1 `-- PE1 [router/nxos] `-- Ethernet3/9 ----------> link-1 Warning Messages ---------------- - Device 'P1' missing 'platform' definition - Device 'PE1' missing 'platform' definition pyats validate datafile This subcommand validates the content any pyATS YAML datafile, including Datafile Inputs. It understands the various YAML datafile syntaxes introduced as part of pyATS’s extended YAML loader, and gives developers an opportunity to check: 1. what the expanded data looks like 2. if correct YAML syntax is followed Returns the loaded, validated datafile, with extends: block expanded. Usage: pyats validate datafile [file] [options] Description: Validates the provided YAML datafile for syntax and content completeness. Note: This command also understands the pyATS datafile 'extends:' syntax, and returns the complete, full data content with extensions fulfilled. Datafile Options: [file] Datafile to validate --schema Schema to validate datafile structure --json Output in JSON format --no-lint Do not lint the YAML datafile General Options: -h, --help Show help -v, --verbose Give more output, additive up to 3 times. -q, --quiet Give less output, additive up to 3 times, corresponding to WARNING, ERROR, and CRITICAL logging levels Options [file] the input datafile. Can be a file path or a URL to a YAML file --schema Python module.object to the schema to validate the provided datafile against --json return output in JSON format instead of YAML. (cannot be used when --schema is provided) --no-lint skips the linting of your datafile file for syntax errors and warnings. Example # Example # ------- # # validating an AEtest datafile bash$ pyats validate datafile $VIRTUAL_ENV/examples/comprehensive/data/base_datafile.yaml Loading datafile: examples/comprehensive/data/base_datafile.yaml -------------------------------------------------------------------------------- parameters: parameter_A: datafile value A parameter_B: datafile value B testcases: ExampleTestcase: uid: ExampleTestcaseDatafileID description: 'block of text describing what this testcase does ' groups: - group_A - group_B - group_C - group_D parameters: local_A: datafile value A local_B: datafile value B data_A: attribute data A data_B: attribute data B LoopedTestcase: groups: [] TestcaseWithSteps: uid: TestcaseWithStepsDatafileID YAML Lint Messages ------------------ 5:75 error trailing spaces (trailing-spaces) 19:42 error trailing spaces (trailing-spaces) 53:1 error trailing spaces (trailing-spaces) 72:41 error no new line character at the end of file (new-line-at-end-of-file) # Example # ------- # # validating an AEtest datafile against schema # (eg, datafile schema is available as: # from pyats.aetest.datafile.schema import datafile_schema) bash$ pyats validate datafile examples/comprehensive/data/base_datafile.yaml --schema pyats.aetest.datafile.schema.datafile_schema Loading datafile: examples/comprehensive/data/base_datafile.yaml -------------------------------------------------------------------------------- {'parameters': {'parameter_A': 'datafile value A', 'parameter_B': 'datafile value B'}, 'testcases': {'ExampleTestcase': {'data_A': 'attribute data A', 'data_B': 'attribute data B', 'description': 'block of text describing ' 'what this testcase does\n', 'groups': ['group_A', 'group_B', 'group_C', 'group_D'], 'parameters': {'local_A': 'datafile value A', 'local_B': 'datafile value ' 'B'}, 'uid': 'ExampleTestcaseDatafileID'}, 'LoopedTestcase': {'groups': []}, 'TestcaseWithSteps': {'uid': 'TestcaseWithStepsDatafileID'}}} YAML Lint Messages ------------------ 5:75 error trailing spaces (trailing-spaces) 19:42 error trailing spaces (trailing-spaces) 53:1 error trailing spaces (trailing-spaces) 72:41 error no new line character at the end of file (new-line-at-end-of-file) Tip use -q to quiet pretty information such as “—-” sections and headers. pyats validate jinja2_config This subcommand validates the content of your Genie configuration datafile. It gives developers an opportunity to check if the file is written following valid YAML syntax and what the Jinja2 rendered output configuration looks like. Usage: pyats validate jinja2_config [file] [options] Description: Validates the provided genie config file for jinja2 rendering. Jinja2_config Options: [file] Genie config datafile to validate --testbed-file TESTBED Testbed file (required) --devices DEVICES [DEVICES ...] Devices to render configs for (optional) --sequence SEQUENCE [SEQUENCE ...] Sequence(s) to render (optional) General Options: -h, --help Show help -v, --verbose Give more output, additive up to 3 times. -q, --quiet Give less output, additive up to 3 times, corresponding to WARNING, ERROR, and CRITICAL logging levels Options [file] The Genie configuration datafile. Can be a file path or a URL to a YAML file --devices Device names to render the configuration for. Only configurations for these devices will be used to render configurations. --sequence Sequence(s) to render the configuration for. Only the sequences specified will be rendered. Example $ pyats validate jinja2_config data/config_datafile.yaml --testbed-file data/testbed.yaml --sequence 1 Device R1 sequence 1: interface Loopback0 no shutdown ip address 1.1.1.1 255.255.255.255 Device R2 sequence 1: interface Loopback0 no shutdown ip address 2.2.2.2 255.255.255.255
ESSENTIALAI-STEM
Thursday, September 18, 2003 Iterators I've become fascinated by iterators, those small bits of code which turn out an object one at a time. For example, Python has generator comprehensions while Java has iterators and C++ likewise. Presently I'm adding to my list of Java iterator adaptors, objects which wrap an underlying iterator to produce one with modified behavior. Two excellent examples are FilterIterator which wraps a ListIterator [1] and produces only elements matching a criteria, and ReverseIterator which also wraps a ListIterator to produce the underlying elements in reverse order. I also coded ListIterator versions of each which are bidirectional. I still have a lot of work, however. C++'s STL is still way ahead of Java's collection classes. I am thinking of putting my work up on SourceForge or some other similar place (perhaps something more Java-specific) under the GPL but have let laziness get the better of me so far. Laziness, Impatience, Hubris [pdf]. What could be better? [1] FilterIterator wraps a ListIterator rather than an Iterator for a good reason. To properly filter, one needs lookahead which implies the ability to back up the underlying iterator if lookahead failed, hence one needs a reversible iterator with previous(). FilterIterator doesn't just produce the right output, it makes the underlying Iterator behave as if it contained only the filtered elements. Post a Comment
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Russsian claims about Warsaw Uprising 1794 The result of the debate was DELETE, as 70% of all votes are for deletion, and POV forks are against Wikipedia policy. J I P | Talk 07:39, 4 April 2006 (UTC) Russsian claims about Warsaw Uprising 1794 This article is just a copy and paste of the Warsaw Uprising (1794) article. User:Molobo disliked its sourced expansion and tried to blank it. When blanking was reverted he pasted the entire content into the new title creating a duplicate article Irpen 02:43, 29 March 2006 (UTC) * Delete. I am a nominator. --Irpen 02:43, 29 March 2006 (UTC) * Keep. The author tries to put information from non-objective source as objective article. The source is from Imperial Russia regarding Polish uprising against its occupation. Imperial Russia was known for fabricating and being source of many antipolish fabrications. Because I didn't want to delete this(no blanking) I moved it to a proper article that would deal with claim. This information btw doesn't describe Warsaw Uprising but is simply a example of Russian propaganda aimed against Poles and their attempt to win freedom from Russia --Molobo 02:51, 29 March 2006 (UTC) * Delete per fork. Plus wrong spelling for title of page as is (three s in Russian).--Jersey Devil 03:12, 29 March 2006 (UTC) * Delete Work out your differences on the original article, don't create a new one for clarification. Let a user know if you need some mediation. TKE 03:16, 29 March 2006 (UTC) * Delete as an apparent textbook example of a POV fork. --Hyperbole 03:25, 29 March 2006 (UTC) * Delete this is pointless * Delete per all the others, but at the same time instruct Irpen to try to reach NPOV from time to time. // Halibutt 04:01, 29 March 2006 (UTC) * Delete all POV forks against concensus.--MONGO 04:44, 29 March 2006 (UTC) * Merge with Warsaw Uprising (1794), then delete (no need for a redirect with such a strange name, I think). POV forks must die.--Piotr Konieczny aka Prokonsul Piotrus Talk 05:31, 29 March 2006 (UTC) * Delete per above. Love the spelling. 23skidoo 06:34, 29 March 2006 (UTC) * Delete Molobo's opus, as all his previous efforts has been. --Ghirla -трёп- 06:48, 29 March 2006 (UTC) * I agree with deletion as Halibutt has taken to correcting the article from info coming from Tsarist propaganda book.--Molobo 08:26, 29 March 2006 (UTC) * Stab POV fork in face. In case you didn't get it, that meant delete. &rArr; SWAT Jester [[Image:Flag_of_Iceland.svg|18px|]] Ready Aim Fire! 08:29, 29 March 2006 (UTC) * Merge as above. Important details for the main article, pointless fork. ProhibitOnions 10:02, 29 March 2006 (UTC) * Delete POV fork. --Ter e nce Ong 11:23, 29 March 2006 (UTC) * Delete POV fork. Don't put the onus on anyone else to merge. If the person who added the details wants them in the main article they should go back to the main article and negotiate with the other contributors to it. Bhoeble 12:49, 29 March 2006 (UTC) * Delete and fantasize about seeing an Uncylopedia AfD with "fork" in the title... Dei zio 17:06, 29 March 2006 (UTC) * Merge as above, then delete. Ak47K * Uncertain can I be bribed to vote for one side or the other? Dr. Dan 05:21, 30 March 2006 (UTC) * Delete per above. --Khoikhoi 19:24, 31 March 2006 (UTC) * Merge back, POV forks are bad karma. Stifle 23:49, 31 March 2006 (UTC)
WIKI
Paid Notice: Deaths KLEM, JOHN F. KLEM--John F., age 87, of Little Silver, NJ on March 17, 2004. Former President Editors Press Service NYC. Husband of the late Leontine (nee Painton) Klem. Father of John P. Klem, Jeanne Shanley, Lisa Klem Wilson, and Leontine Klem. Grandfather of six. Brother of Joseph and James Klem, and Frances Feely. Visitation Friday, 5-8PM, at the Thompson Memorial Home, 310 Broad St., Red Bank, NJ. Mass of Christian Burial Saturday, 10AM, from Holy Cross RC Church, Ward Ave., Rumson, NJ. Private cremation to follow. In lieu of flowers, donations to VNA, 141 Bodman Pl., Red Bank, NJ 07701.
NEWS-MULTISOURCE
Quake Jolts Armies, Too MOHAMMED NASIR, a taxi driver from the Pakistani side of Kashmir, soothed his wounded little girl and cursed the soldiers who brought her to a modern, humming military hospital in this Pakistani garrison city. What did the Pakistani Army do for his village in Kashmir, crushed and crippled by last Saturday's earthquake? ''Almost nothing,'' he spat. Yes, they airdropped packets of milk and a few packets of rice, but those disintegrated during the descent, he recalled. Yes, they airlifted his daughter, 6 years old and with a broken leg, but they abandoned the vast majority of the wounded to curse their fate at home. ''We were brought in a small helicopter that carried four,'' Mr. Nasir said bitterly. ''The rest were left.''
NEWS-MULTISOURCE
The Healthy Grocery Shopping Game Approach your next food shopping trip like a game and score big nutritionally. Learn the healthy grocery shopping game from STACK expert Jim Carpentier. Grocery Shopping Build muscle for your sport with a simple formula: strength training + sleep + proper nutrition = success.   If you're like most athletes, you probably have the first two elements of that equation down cold. Hit the weight room? Heck, you practically live there. Sleep? Eight hours every night. (See Build Muscle: Get a Good Night's Sleep.) But nutrition? That's the tricky part. See, choosing the right foods—and eating them consistently—can be tough, because although coaches can tell you what to do on the field, or teach you how to get stronger in the gym, only you can control what foods go into your body. You are the head coach of your diet. Call the right plays and you'll fuel your cells with disease-fighting, energy-boosting nutrients that support muscle growth. Botch the call and you'll hinder muscle recovery; and when your muscles can't recover, they can't grow bigger and stronger. Making matters worse, your grocery store is a minefield of misinformation. Plenty of foods labeled "healthy" are anything but. So when you go shopping, how can you tell which foods are "in-bounds" (good) and which one are "out-of-bounds" (bad)? Thankfully, there's an answer—and it's simpler than you think. Broadly speaking, you want to shop the perimeter of the grocery store. The areas around the edges of most supermarkets tend to be home to healthy foods like fresh produce, meats and other natural items that pack more nutrition per calorie. The middle aisles tend to house all of that heavily processed junk you're better off avoiding. But to simplify the process even more, we've developed a four-step game plan—for a four-quarter game—that you can use to quickly track down all the foods you need and avoid the ones you don't. If you're serious about maximizing muscle gains, here's your winning strategy. Ready? Let's play ball! (Saving dough? Check out our Grocery List for Eating Healthy on a Budget.) Finding the "In-Bounds" Foods First Quarter: Head to the produce section. Stock up on fresh fruits, veggies, nuts and seeds. All are packed with vitamins, minerals, antioxidants and anti-inflammatory compounds that can help improve recovery after workouts and reduce muscle soreness. But farm-fresh foods aren't just helpful after your gym session. Consuming fruit with protein an hour before hitting the weight room will provide you with a natural source of energizing carbohydrates. Second Quarter: Go hunting. Protein is essential for muscle growth. Some of the best sources of this mighty nutrient are lean cuts of red meat like beef, pork or lamb. Poultry options like chicken and turkey or freshly caught fish also provide high-quality protein in low-calorie packages. Third Quarter: Head to the dairy aisle. Besides meats and poultry, dairy items like eggs, cheese, yogurt and milk are all excellent sources of protein. And they come with an added bonus: most dairy products are high in calcium, which supports bone health. Oh, and if you want a fast recovery drink to help you bounce back from your next gym session, don't forget to grab chocolate milk. Its blend of protein and carbs replenishes glycogen stores and rebuilds muscle tissue. Fourth Quarter: Head inside for grains. OK, by this point in the game, your cart is getting full and your will to shop is draining fast. But don't give up. Head into the aisles, but don't get distracted by those highly-processed snack foods. Instead, chase down arginine-rich oatmeal, brown rice and other whole grains that are sources of quality carbohydrates. Snag a few cans or packages of protein-rich beans while you're there. Now, you're ready to make one last drive for the goal line—or rather, the checkout line. Overtime: As you're making a beeline to the cashier, finish strong by purchasing a case of bottled water. Water keeps you hydrated, helps transport the carbohydrates and proteins you eat to the muscles that need them, and assists in clearing your body of free radicals and waste. (Read Hydration Facts Athletes Need to Know.) Avoiding the "Out-of-Bounds" Foods Like in any good game against a strong opponent, there may be setbacks in your search for the right muscle foods. So try to steer clear of fouls and penalties: sugary processed cereals, cookies, cake, candy, chips, crackers, soda and "fruit drinks" (buy only fruit juices with "100% pure juice" on the label). Finally, dietary infractions don't just happen in carb-heavy foods. Protein sources like lunchmeat, hot dogs and sausages should also be avoided. These tend to pack a lot of sodium, nitrates, fat or other processed junk that you just don't need. Photo Credit: Getty Images // Thinkstock Topics: PROTEIN | NUTRITION | FOODS | HEALTH | RECOVERY | CARBOHYDRATES | FRUIT | RECOVER | SLEEP
ESSENTIALAI-STEM
Page:The Annual Register 1758.djvu/349 MISCELLANEOUS ESSAYS. S2S nillies people to try the foffile uni- corn firft upon a dog, before it is made ufe of in medicine, becaufe he ihinks it is fometimes of a poi- fonous nature; which however is never obferved in any found in or near Hartz forell. From Mr. Grojfe s -<jc;age to the Eajl Indies'. Account cf a 'very rsmarkchh IJland near Bombay zn the Eafc Indies, OVer-againft the caftleof Bom- bay, about thediftance of five miles, lies the very fmall, but fa- mous, ifland of Elephanta. Itcan at moll be bat about three miles in compafs, and confills of almoll all hill: at the foot of which, as you land, you fee, juft above the fhore, en your right, an elephant, coarfe- ]y cut out in ftone, of the natural bignefs, and at fouie iirtle diltance not impoffible to be taken for a real elephant, from the ilonc being naturally of the colour of that bead. It fiands on a platform of itones of the fame colour. On the back of this elephant was placed {landing, ano'.her young one, ap- pearing to have been all of the fame ftone, but has been long broken down. Of the meaning, or hiftory cf this lm?.ge, there is no tradition old enoaoh to give any account. Returning then to tlje foot of the hill, ycu afcend an eafy flant, which about half way up the hill brings you to the opcniog or portal of a large cavern hewn out of a folid rock, into a magniiicent; temple : for fuch furcJy it may be termed, confidering the immenfe workmanfhip of fuch an excava- tion ; and feems to me a f;:r race bold attempt, than that of the py- ramids of Egypt. There is a fair entrance into this fubterraneous temple, which is an oblong fquare, in length about 80 or 90 feet, by 40 broad. The roof is nothing but the rock cut flat at top, and ia which I could not difcern any thing that did not fhow it to be all of one piece. It is about ten feet high, and fupported towards the middJ*", at equi-diftancefrom the fides, and from one another, with two regu- lar rows of pillars of a fingular or- der. They are very maffivc, Ihort in proportion to their thicknefs, and their capital bears fome refem- blance to a round cufliion, preffed by the fuper-incurabent moontaia with v,-hich they are alfo of one piece. At the farther end of this temple are three gigantic figures, the f;jce of one of them is at leaft five feet in length, and of a pro- portionable breadth. But thefe re- prefentatjoas have no reference or conncdlion, either to any knowa hiftory, or the mythology of the Gentoos. They had continued ia a tolerable flate of prefervatioa and wholenefs, confidering the re- motenefs of their antiquity, until the arrival of the Portuguefe, who made themfelves mafters of the place, and in the blind fury of their bigotry, not fuiFering any idols bat their own, they mull have beea at even fome pains 10 maim and deface them, as they now remain, confidering the hardnefs of the ftcne. It is faid they even brought field-pieces to the demolition of images, which fo greatly defer ved to be fpared for the unequalled curio- fity of them. Of this Queen Ca« therine of Portugal v/as, it feems, fo feniible, that (he could not con- ceive that any traveller would re- turn from that ilde of India, with- out
WIKI
Talk:mettere via RFD discussion: July 2021–May 2024 Borderline SOP in Italian with senses 2, 3, 5, or 6 of (I think these senses also hold for the Italian ). We have the English, but that has a number of other senses that render it non-SOP. Imetsia (talk) 16:28, 20 July 2021 (UTC) * Is this really SOP? Any thoughts? &mdash; Fytcha〈 T | L | C 〉 22:47, 11 February 2022 (UTC) * I would also encourage people to look at some of my other RFD nominations, some of which have gone on for months without sufficient comments by others to either keep or delete. Imetsia (talk) 22:54, 11 February 2022 (UTC) * "set aside" and "put aside" have several meanings, which meaning does "mettere via" correspond to? Benwing2 (talk) 02:38, 12 February 2022 (UTC) * I'd say the meaning is the one expressed by the first sense of, that is “to put (something) in its usual storage place; to place out of the way, clean up”. — GianWiki (talk) 08:42, 12 February 2022 (UTC) * Definitely not SOP. See, eg, . Surely idiomatic in the sense "to save up" (a more colloquial form for "mettere da parte"). The sense mentioned by Gianwiki is not completely literal, as well, since "mettere via" could also be interpreted as "to throw away" (but the expression is never used in this sense). Popop (talk) 20:35, 2 January 2024 (UTC) * RFD-kept by no consensus. Imetsia (talk (more ) ) 23:16, 17 May 2024 (UTC)
WIKI
Trump “animals” comment: some deported immigrants are “not people” President Donald Trump referred to some people deported from the United States as “animals” during a roundtable discussion about California’s “sanctuary” law on Wednesday. After a California sheriff commented that her county is unable to notify ICE when an MS-13 gang member is in jail for a minor crime, Trump launched into a riff about “people trying to come in” and being deported who are “not people. They’re animals.” It’s the latest in a series of statements stretching over Trump’s entire national political career that carelessly conflate immigration, criminality, and violence. From the official White House transcript: SHERIFF (Margaret) MIMS (Fresno County, CA): Now ICE is the only law enforcement agency that cannot use our databases to find the bad guys. They cannot come in and talk to people in our jail, unless they reach a certain threshold. They can’t do all kinds of things that other law enforcement agencies can do. And it’s really put us in a very bad position. THE PRESIDENT: It’s a disgrace. Okay? It’s a disgrace. SHERIFF MIMS: It’s a disgrace. THE PRESIDENT: And we’re suing on that, and we’re working hard, and I think it will all come together, because people want it to come together. It’s so ridiculous. The concept that we’re even talking about is ridiculous. We’ll take care of it, Margaret. We’ll win. SHERIFF MIMS: Thank you. There could be an MS-13 member I know about — if they don’t reach a certain threshold, I cannot tell ICE about it. THE PRESIDENT: We have people coming into the country, or trying to come in — and we’re stopping a lot of them — but we’re taking people out of the country. You wouldn’t believe how bad these people are. These aren’t people. These are animals. And we’re taking them out of the country at a level and at a rate that’s never happened before. And because of the weak laws, they come in fast, we get them, we release them, we get them again, we bring them out. It’s crazy. It’s not clear whom the president was referring to — whether he was simply picking up on Sheriff Mims’s reference to MS-13 gang members or referring to deportees more broadly. But he didn’t exactly bend over backward to specify that not all immigrants deported by this administration are “animals.” Trump has used the term “animals” to refer to members of MS-13 before. In a July 2017 speech to law enforcement officers on Long Island, he said: “Few communities have suffered worse at the hand of these MS-13 thugs than the people of Long Island. They have transformed peaceful parks and beautiful quiet neighborhoods into bloodstained killing fields. They are animals.” In February, at the Conservative Political Action Conference, he said, “These are animals. They cut people. They cut them. They cut them up in little pieces, and they want them to suffer. And we take them into our country.” On Thursday, press secretary Sarah Huckabee Sanders endorsed this interpretation of Trump’s remarks, saying that “I don’t think the term the president used was strong enough...it took an animal to stab a man 100 times and decapitate him and cut his heart out,” referring to a particularly gruesome murder committed by MS-13 gang members. But in context, murderers and other serious criminals weren’t the people Trump was being asked about. Sheriff Mims was specifically complaining that California state law prevents the county from notifying ICE about MS-13 gang members who have not been charged or convicted of serious crimes. The law in question allows county officials to notify ICE of a prisoner’s release date if the prisoner has been convicted of any felony within the last 15 years, or of certain misdemeanors within the last 5 years, or if the prisoner has been charged with a serious or violent crime and a magistrate has found probable cause. It allows county officials to transfer prisoners to ICE custody in any of those circumstances, or if a judge has signed a warrant or found probable cause that the prisoner has violated criminal immigration law. Maybe the president didn’t understand Sheriff Mims’ comment and doesn’t understand the law that his administration convened the roundtable to complain about. Maybe he just heard the word “MS-13” and automatically launched into a riff he’s riffed before. Because the president spoke in scattered generalities, he didn’t make it clear exactly which humans he considers unhuman — something he could have taken pains to specify. No matter how Trump is portraying his policy, his administration is not focusing on deporting people who have committed particularly heinous crimes, gang members, or people with criminal records. From Trump’s inauguration to the end of 2017, ICE arrested 45,436 immigrants without criminal records. To be sure, ICE arrests of immigrants with criminal records ticked up slightly from the last year of the Obama administration (in which immigration enforcement was subdued compared to previous years) to the Trump administration. But arrests of immigrants without criminal records have also spiked. During President Obama’s last year, about 16 percent of ICE arrests were of noncriminal immigrants; each month since July 2017, between 32 and 40 percent of arrestees have been noncriminals. The Trump administration is still deporting fewer noncriminal immigrants than the Obama administration did circa 2011, and the proportion of deportees who are noncriminals is usually smaller than the proportion of arrestees who are. But the Trump administration is aiming to not just ramp back up to the deportation peak of Obama’s first term but surpass it, and that’s going to require arresting and deporting a lot of immigrants without criminal records. If Trump understands his own administration’s policy, he’s never acknowledged it in public. He sticks to the same rhetorical move every time: refer to some specific criminals, call them horrible people and animals, say that their evil justifies his immigration policy, and allow the conflation of all immigrants and all Latinos with criminals and animals to remain subtext. This is who Donald Trump has been for his entire political career. The worst-case scenarios about his dehumanizing rhetoric — that they would foment large-scale mob violence or vigilantism against Latinos in the United States — have not been realized. But neither have any hopes that Trump, as president, might ever weigh his words with any care at all, especially when encouraging Americans to see human beings as less than human.
NEWS-MULTISOURCE