Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Prelest
Prelest (from, itself from , ; , ), also known as spiritual delusion, spiritual deception, or spiritual illusion, is an Eastern Orthodox Christian term referring to a false spiritual state of holiness or a spiritual illness of believing oneself less sinful than one is.
Prelest should not be confused with mental illness, and is instead considered a spiritual illness that originates from vainglory, pride, and demonic suggestion. It is said to be cured by humility and the Holy Sacraments and under the guidance of the spiritual father. In a broad interpretation, everyone is considered to be in prelest, as everyone has some wrong thoughts and views, do not fully understand the meaning of life and the degree of their own sinfulness.
When used in a narrow sense, meaning that some particular person is in the state of prelest, it usually means that a person, initially being on the path of a pious Christian life, instead has become prideful and self-conceited about their own personal sanctity, believing themselves less sinful than they are. In Eastern Orthodox thought, the closer a person is to God, the more they see their imperfection, and all true saints considered themselves in the feeling of the heart the greatest sinners. The state opposite to prelest is spiritual sobriety.
Eastern Orthodox views
Ignatius Brianchaninov defines prelest as "a wounding of human nature by falsehood".
The most thorough explanation of prelest is found in the writings of St. Ignatius (Brianchaninov), who relentlessly kept the traditions of Holy Fathers. Some of these writings were incorporated into a book, On prelest. The book is dedicated solely to different forms of delusion (wrong ways of prayer, trusting dreams, excessive zeal, false humility etc.), which St. Ignatius explains on the basis of the words from Holy Fathers of the first centuries and provides information about different recent cases of delusion. In this book, St. Ignatius gives the following definition of prelest: it is "wounding of human nature with falsehood" or, in other words, "man's assimilation of falsehood which he accepts as truth".
Some modern ascetics such as elder Joseph the Hesychast, elder Paisios of the Holy Mountain, elder Daniel Katounakiotis also wrote about prelest.
The concept of prelest is very important in Orthodox spirituality and ascetics. From the Orthodox point of view, it is one of the main dangers for a Christian (especially monastic) starting to pray with the Jesus prayer, or even, as Elder John (Krestiankin) notes below, for any person joining Orthodoxy, especially in the first years after that event.
Identifying prelest in its particular manifestations is called discernment of spirits. The virtue of discrimination "is greater than any other virtue; and is the queen and crown of all the virtues". According to Orthodox Holy Fathers, it corresponds to a very high degree of spiritual age and requires "three renunciations" (Evagrius, St. John Cassian, St. John Climacus): separation from the world, inner fight with passions, acquisition of prayer and deep spiritual knowledge. True discrimination comes after a long previous experience of fighting with passions. The source of discrimination is in the action of Divine grace and the virtue of humility.
Professor N.E. Pestov in his book writes that in general, the safest spiritual path in relation to prelest is to live in obedience to an experienced and holy elder, or at least to live on the advice of others. The fastest way to fall into prelest is the opposite – to trust one's own thoughts and not to listen to any advice.
General prelest and prelest proper
According to Saint Ignatius Brianchaninov, "Spiritual deception is the state of all men without exception, and it has been made possible by the fall of our original parents. All of us are subject to spiritual deception. Awareness of this fact is the greatest protection against it. Likewise, the greatest spiritual deception of all is to consider oneself free from it".
Theophan, the Archbishop of Poltava, comments on this statement of St. Ignatius briefly by setting apart "general prelest" and prelest in its "proper sense" of the word. On the bases of all the above-mentioned he gives the following definition: "Briefly, the difference between 'general prelest' and prelest in the particular sense of the word can, on the basis of the above, be expressed thus. General prelest is forgetting and not noticing one's sinfulness. That which we call prelest proper is attributing to oneself righteousness when it does not actually exist. If a man thinks he is righteous, then his righteousness is not divine, but diabolical, foreign to the grace of God and to humility. One should recall the famous saying of Abba Poemen the Great: 'I prefer a man who sins and repents to one who does not sin and does not repent. The first has good thoughts, for he admits that he is sinful. But the second has false, soul-destroying thoughts, for he imagines himself to be righteous' (Bp. Ignatius, Patericon, 75)".
View from the outside
According to Orthodox Holy Fathers, it is possible to consider someone holy only when viewing from the outside. Considering oneself holy is a clear manifestation of prelest because the closer someone is to God, the more sinful they see themselves. St. Macarius the Great says: "if you see that someone is arrogant and proud of that he is a partaker of grace, then even if he created miracles and raised the dead, but if he does not recognize his soul as honourless and despised, and himself poor in spirit and vile, he is robbed by malice not knowing that for himself. Even if he creates miraculous signs, one should not believe him, because the sign of Christianity – for the ones who are well-versed before God, is to strive to hide it from people, and if he has all the king's treasures, to hide them and always say: "this is not my treasure, the other put it at my place, and I am a beggar, when the one who put it will want, he will take it away from me." If someone says: "I am rich, I'm quite enough of what I have acquired, and I don't need more of it," then this is not a Christian, but a vessel of delusion and of the devil. For the enjoyment of God is insatiable, and to what extent one tastes and communes is, in such a way becomes more greedy. Such people have an eagerness and uncontrollable love for God, the more they try to succeed and gain, the more they recognize themselves as poor, as they are meager in everything, and have not gained anything. They say: "I am not worthy that this sun illuminates me." This is a sign of Christianity, this is humility."
St. Ignatius (Brianchaninov) writes that "humility does not see itself humble. On the contrary, it sees in itself a lot of pride. It takes care to find all its branches; looking for them, it sees that there is still a lot to look for."
St. John Cassian writes that "a cleaner look notices more, a reproachful life gives rise to a great sorrow of self-reproach, the correction of morals and zeal for virtues multiply wailing and sighing. For no one can be satisfied with the degree of perfection in which he has succeeded, and the cleaner one will be in the spirit, the more he sees himself unclean, the more he finds reasons for humility. And the faster he strives for height, the more he sees that he has more where to strive."
St. Paisios of the Holy Mountain says that "a man who considers himself a saint and prays for others, considering them sinners, is disgusting to God".
St. Anthony (Putilov) of Optina writes in his diary that "I saw that only then I was in a true opinion of myself when I had a bad thought about myself; and when I had a good thought I was in delusion".
Kinds of prelest
Saint Gregory of Sinai also says about several forms of delusion:
* 1) Illusory visions and mental images and fantasies, caused by arrogance and self-conceit: "arrogance is followed by delusion, delusion by blasphemy, blasphemy by fear, fear by terror, and terror by a derangement of the natural state of the mind".
* 2) Diabolic influence – "it has its origin in self-indulgence, which in its turn results from so-called natural desire. Self-indulgence begets licentiousness in all its forms of indescribable impurity." This form includes visions and gift of prophecy that some people have, in fact originating from the demons of licentiousness.
* 3) Mental derangement – a result of the first two forms.
Prelest and insanity
According to St. Ignatius Brianchaninov, St. Gregory of Sinai, St. Symeon the New Theologian, Valaam Elder Schema-Abbot John (Alexeev) and other ascetics, the first kind of prelest (prayer with imagination) very often leads to insanity. The second kind (conceit) sometimes does not result in a mental disease, but the person cannot achieve salvation being in a state of one of the seven deadly sins – pride. St. Ignatius writes about it: "This kind of prelest – is terrible: it is equally fatal for the soul as the first one, but is less evident; it rarely ends in madness, suicide, but definitely corrupts both the mind and the heart."
False visions
According to the Holy Fathers, false visions are associated with pride. St. Ignatius Brianchaninov says that those people, who want to see visions, and whose mind is not renewed and recreated by the Holy Spirit, are filled with pride – that means, as writes St. Ignatius, that there is a connection between prelest of the first and the second kind (i.e. between "imagination" and "conceit"). Archimandrite Seraphim (Alexiev) says: "Where there is pride and at the same time one has a vision – it can not be from God, but by all means – from the evil one."
Romanian elder Cleopa Ilie specifies 7 ways of falling into delusion of false visions and dreams:
* 1) Pride;
* 2) Vainglory;
* 3) Weak and inexperienced mind;
* 4) Reckless zeal;
* 5) Disobedience;
* 6) Following own will and concealment of thoughts in confession;
* 7) Not knowing self and the Divine Scriptures.
Elder Cleopa also provides examples of different saints from the Patericon who rejected the visions because they considered themselves unworthy to see it and due to the danger of delusion. He also quotes arguments of different Holy Fathers saying that one should not easily accept visions even if they have all attributes of true ones – if the saints were fast to accept visions they would be deluded and would not have become saints.
Elder Joseph the Hesychast says, mentioning the examples from his life, that true visions are always preceded or followed by very intense suffering and sorrows and are given by God only as a consolation. Even if the vision is true, it is very difficult to withstand the fight with thoughts and not to get proud of the fact of the vision. Elder Joseph writes about pride after visions: "What happens after that? A person becomes the mock of the demons. They fool him with writings and visions, with dreams and revelations, with symbols and numbers, with oracles and a heap of superstitions."
Elder Paisios of the Holy Mountain tells such story about a woman who had one true vision. The Devil then suggested to her that she was chosen by God, which she believed; followed this, demons started to torment her with different visions and revelations. In the end, she had another true vision and was told to write to Elder Paisios so that he could help her. Out of all her visions, Elder Paisios says that only two were from God.
Elder Daniel Katounakiotis also writes about several such cases of long condition of prelest accompanied by visions. He writes in a letter about one hierodeacon by the name of Ierotheos who had many visions. Even though he confessed everything, none of the confessors understood that these visions were a delusion. Elder Sabbas then advised him to find out the truth. After that the delusion was revealed. However, in spite of the fact that the visions ceased after repeated exorcism, the injury to the soul of Ierotheos remained very serious and later he broke all monastic vows. Another case of prelest happened to a layman, Nicolaus. He was also subjected to a long and strong action of demons. Even though Elder Daniel convinced Nicolaus that all his visions were false, the traces of delusion were seen to the end of his life.
In the book "The Great Watch", in the notes of Elder Jerome (Solomentsov) from St. Panteleimon monastery on Mt. Athos, the life of hieroschemamonk Theophan is described. He had many visions, and for 15 years he confessed everything to the spiritual father. But then he became noticeably more concealed and proud. He began to think that the spiritual father does not lead such a high life as he does. Once, when he visited the confessor, he told him about some of his visions and then let it slip like this: "And I was not ordered to tell you about some visions." To this the confessor said, "I congratulate you on your prelest!" When he did talk about the two visions that he had concealed, it turned out that they were false. One of the key points was the question of freedom of mind during the vision - if the mind can control the vision, then it is not true (for example, St. Maximos Kavsokalyvites talks with St. Gregory about this). In the following life, father Theophan could not get out of the delusion, he left Athos, engaged in trade and died in torments.
St. Silouan the Athonite speaks about artificially invoking contemplations that “Divine contemplations are given to a person not when he is looking for them, and when looking for precisely them, but when the soul descends into the hell of repentance and really feels itself worse than any creature. Contemplations, as if "forcibly" reached by the mind, are not true but "imaginary"; and when this imaginary is taken for truth, then conditions are created in the human soul that impede the very possibility of the action of grace, that is, genuine contemplation".
Self-conceit
St. Ignatius (Brianchaninov) writes that "people infected with prelest of 'conceit' are very common. Anyone who does not have a contrite spirit, who recognizes any own merits and achievements, anyone not holding steadily the teaching of the Orthodox Church, but discussing about any dogma or tradition arbitrarily, at his discretion, or according to the heterodox teaching, is in this kind of prelest. The degree of deviation and persistence of deviation determines the degree of prelest".
There is an example when "conceit" may also result in a mental disease. Hieromartyr Bishop Arseny (Zhadanovsky) in his "Spiritual Diary" writes about one woman who was in this kind of delusion. She wanted to take Holy Communion every day. When she was forbidden to do so, she started to serve the Divine Liturgy herself at her home. "Her case, however, ended sadly. She lost her mind and she is currently in the mental hospital."
False gifts
Sometimes the demons can "help" a deluded person. This "help" can include either recommendations about certain things, even theological and very complicated, or can take the form of false spiritual gifts: false healing ability, false clairvoyance, false gift of prophecy, false unceasing prayer, false power over demons, false reading of thoughts, false dispassion.
An inexperienced person, not knowing enough about true Divine gifts, to whom and under which conditions they can be given, can easily accept such false gift as being Divine. Such false gift can be received either together with some evident external event like an appearance of false "Christ" sending the "gift", or can happen gradually and unnoticeably for the receiving person. Some people who received false gifts prematurely and due to conceit prayed to God asking to send them a gift and they did receive it, but from the demons. Others did not ask anything explicitly, but were already conceited and considered themselves worthy, i.e. were in the state of prelest of the second kind.
Metropolitan Anthony of Sourozh recalls that when he was young, he had an ability to read thoughts of other people. Once he asked God: "If this gift is not from You, dispel it". And this ability immediately disappeared. It is very difficult for a conceited person to decline such gift, to consider oneself unworthy of receiving it and ask God to take the gift away. If these false gifts are accepted by the deluded person, it can lead him/her into demon possession or suicide.
Passion of teaching
Apostle James warns against unauthorized teaching in his Epistle: "My brethren, be not many masters, knowing that we shall receive the greater condemnation" (James 3:1). If the desire of teaching in the particular person originates from the passions of vainglory and pride rather than from love and humility, it becomes a kind of prelest, being based on a false idea of personal dignity and ability to teach and that such teaching is pleasing to God. Archbishop Averky (Taushev) in his analysis of James 3:1 says that one should start teaching with the great caution and distrust to oneself.
Carelessness
Schema-archimandrite Abraham (Reidman) in his book of conversations with the monastics also thinks that carelessness is delusion and says that carelessness in some sense is opposite to pride, but even more dangerous. A very common manifestation of carelessness is the weakening of abstemiousness in food.
Causes of prelest
According to Saint Gregory of Sinai, there are 3 sources for prelest: "arrogance, the envy of demons, and the divine will that allows us to be tried and corrected. Arrogance arises from superficiality, demonic envy is provoked by our spiritual progress, and the need for correction is the consequence of our sinful way of life. The delusion arising solely from envy and self-conceit is swiftly healed, especially when we humble ourselves. On the other hand, the delusion allowed by God for our correction, when we are handed over to Satan because of our sinfulness, God often permits to continue until our death, if this is needed to efface our sins. Sometimes God hands over even the guiltless to the torment of demons for the sake of their salvation".
The most likely time to fall into prelest
Elder John Krestiankin in his word about spiritual guiding says that the most dangerous time in relation to prelest is the beginning of the spiritual life. "Upon entering the Church, winged with new sensations, the newly-born reaches with his consciousness straight for the Kingdom of Heaven, to the heights of mysteries that are hidden behind the impenetrable curtain of Divine revelation. At that moment the spiritual father and his spiritual child enter into a unified struggle with the dark powers, the latter of which are ready with their deceit to turn the new convert from the path of salvation. The enemy's deception will hunt after this person for the rest of his life, offering him its dangerous sweetness. This initial period is particularly dangerous, for this sweetness still resonates with the nature of the fleshly man, and finds sympathy and response deep within his soul. The spiritual father's strength in this struggle lies in prayer and love for his spiritual child's soul, which has come to desire its own salvation. The spiritual child's protection lies in his trust of the pastor, in the awareness of his own sinfulness, and mistrust of himself".
Expectation of grace
The very thought about forthcoming grace and receiving Divine gifts, expectation of grace is a clear manifestation of pride. St. Ignatius writes: "If there is an expectation of grace within you – beware, you are in a dangerous state! [...] Prelest exists already in self-conceit, in considering oneself worthy, in the very expectation of grace."
Schema-archimandrite Abraham (Reidman) reminisces about his youth, when he did not pray with the Jesus Prayer, did not know any experienced elders, and did not read the books of the Holy Fathers. He read for the first time the conversation of St. Seraphim of Sarov with Motovilov, but understood it in a primitive way and began to pray about acquisition of grace. As a result, he began to see visions from demons. Fortunately, later he came to his senses and realized that he was in delusion.
Healing
If the person saw any vision, he should tell it immediately to his spiritual father not concealing anything.
For example, it is written in Patericon of Mt. Athos about one monk who was living with his elder in a skete at Mt. Athos. Because of conceit, he gradually started to fulfill his own will, prayed more and more but without asking his elder about it. Then he was deluded by false visions, almost died and finally revealed everything to his elder. The elder sent him to a monastery and forbade to take Holy Communion for 3 years. The monk started to live there with many brethren, washed dishes and recovered.
Another story about healing through work therapy is told by Hieromartyr Archimandrite Kronid (Lyubimov). A novice by the name of Alexander from Holy Trinity St. Sergius Lavra arbitrary increased his prayer rule and started to see visions. When his condition was revealed, he was sent to another monastery and was given an obedience to clean the horse stalls in the stable yard. At first, he protested: "You appoint such a great ascetic to such a humiliating obedience", but then he agreed and all brethren started to pray about him. Alexander worked all day long and did not have time for his previous intensive prayer feats. Several years later Archimandrite Kronid met Alexander who was already tonsured a monk as Athanasius and, for his humble and good monastic life, was made hierodeacon. When asked whether he remembered what had happened to him, he replied: "I remember everything, but only now realize the full horror of my state of mind."
Archimandrite Ambrose (Yurasov) tells a story about a deluded woman who arbitrary increased her prayer rule to 1000 prostrations every day because of conceit. She was concealing it from her spiritual father. When the spiritual father revealed the delusion through her hidden anger and petulance, she no longer could execute even her initial smaller rule of prayer and prostrations, she could not fast at all and even could not read morning and evening prayers. Another case occurred with Archimandrite Parthenios, hegumen of St. Paul Monastery at Mount Athos. When he was young, he fell into negligence and stopped reading the monastic rule. This went on for a whole year. In the end, he suddenly cried out: "Mother of God, help me, I can not do anything. Make it so that I overcome this state!". And the state of negligence suddenly disappeared: he immediately made 400 prostrations.
E. Orthodox saints who suffered from prelest and recovered
Saint Iakovos worshiped a demon who appeared as Lord Jesus and who disappeared after Iakovos made the sign of the Cross.
Saint Nicetas of the Kiev Caves attempted an excessive feat of seclusion without sufficient experience. He was deluded by an "angel" who helped him and gave him a false gift of clairvoyance. When the Holy Fathers of the monastery unraveled the demon tricks and cast the "angel" away, St. Nicetas lost his supernatural abilities and even could not read at all. Later, following the way of humility, St. Nicetas became the Bishop of Novgorod and received the gift of miracleworking.
Saint Theodore and Basil of the Caves suffered heavily from the demon tricks. St. Theodore was deluded by a vision of "angel" and false appearance of a demon in the form of St. Basil and was listening to them. Later, St. Basil brought St. Theodore to reason and convinced that it was a delusion.
Saint Silouan the Athonite was in delusion 2 times as written in the book of elder Sofronii. Once St. Silouan accepted a vision and nobody, whom he asked about it, told him that this was a false vision. "But I was beguiled by vanity and began to see devils again. Then I knew that I had been deceived, and I made full disclosure to my confessor and asked him for his prayers; and because of his prayers I am now saved and ever beseech the Lord to grant me the spirit of humility."
The term "prelest" in the liturgical texts of the Eastern Orthodox Church
The notion of prelest is used in some of the liturgical texts of the Eastern Orthodox Church.
In the Great Canon of St. Andrew of Crete: "I lie naked and ashamed, for the beauty of the tree, which I saw in the middle of the garden, deceived me" (Monday, Ode 2); "O God, Trinity yet One, save us from delusion, temptations and misfortune!" (Monday, Ode 3); "But you, my hopeless soul, have rather imitated Esau, surrendering to the crafty evil the beauty you inherited from God. In two ways, works and wisdom, have you been deceived and now is the time for you to change your ways" (Tuesday, Ode 4).
In the Holy Anaphora of the Liturgy of St. Basil the Great: "and was led astray by the deception of the serpent", "Releasing us from the delusions of idolatry".
Prelest and Jesus prayer
Many Orthodox Holy Fathers and modern ascetics wrote about the dangers of wrong practice of the Jesus prayer and prayer in general: Saint Symeon the New Theologian, Saint Ignatius Brianchaninov, Saint Theophan the Recluse, Saint Ambrosius of Optina, Saint Macarius of Optina, elder Joseph the Hesychast, Valaam elder John (Alexeev) and others.
Professor of the Moscow Theological Academy A.I. Osipov analyzes the teaching on the prayer by St. Ignatius (Brianchaninov) and points out that the prayer should have three properties: attention, reverence, repentance. Also humility should be the basis of the prayer as St. Ignatius says: "Today I read the declaration of St. Sisoes the Great, which I always particularly liked. A monk said to him: 'I am in constant memory of God'. St. Sisoes responded to him: 'That is not great; it will be great when you consider yourself to be worse than any creature.' St. Sisoes continues: constant memory of God is a very elevated activity!! However, this height is very dangerous, when the ladder to it is not founded on the solid rock of humility" (Holy Fathers use the words "memory of God" as a synonym for the Jesus prayer).
Also, Metropolitan Ierotheos (Vlachos) in the book A Night in the Desert of the Holy Mountain speaks of the following errors in the prayer:
* The idea that grace and vision of the Uncreated Light can be gained quickly. In reality, for most people it takes years. Therefore, a person may become disappointed if he does not quickly acquire it;
* Great importance is attributed to psychotechnical methods (paying attention to inhalation-exhalation, heartbeat, etc.), while they do not act magically, but are only auxiliary means of reducing distraction;
* Jumps, skipping stages during the development of the prayer. Some go directly to noetic prayer or want to connect the nous and the heart right away through breathing, skipping oral prayer.
* Disappointment if there are no tears. Or vice versa, a person told someone about his tears and they disappeared because of that;
* A strong desire to see the Uncreated Light – then demons can demonstrate for the ascetic their own "uncreated light". The very thought that "I am worthy to see the Uncreated Light" is a dangerous state;
* Violation of obedience – the thought not to ask the director originates from the enemy.
Three ways of attention and prayer
St. Symeon the New Theologian, St. Theophan the Recluse, St. Silouan the Athonite say that there are three ways of prayer:
* 1) prayer with imagination,
* 2) prayer with attention in the mind,
* 3) union of the mind with the heart.
Magicism and "automatic" view of prayer
One of the kinds of false attitude to prayer originates from a widespread view on God, prayer, and spiritual life, implying that God can be "forced" to execute the petition that is asked in the prayer, i.e. as if the prayer acts "by itself", solely by pronouncing the words, with no regard to the spiritual condition of the person who prays.
This "automatic" view can apply to any relationship with God, to any action of Divine grace including the prayer and Sacraments. Orthodox theologian Fr. Valery Dukhanin writes that such view has nothing to do with Orthodox faith and rather belongs to magic: "The main property of magic – correct ritual. That is a drastic difference with the Sacraments of the Church, which cannot help without man’s personal relation to God".
Unconditional action of prayer assumes that free will does exist neither in man nor in God and that God can do something harmful and with no regard to the inner determination of all involved persons. St. Hilarion of Optina writes that though we should pray about each other, the view on prayer that every petition is necessarily executed originates from pride and leads to delusion.
The Valaam elder schema-hegumen John (Alekseev) writes about Jesus prayer: "Why do we read the Jesus Prayer? So that, constantly remembering the Lord and repenting of sins come to spiritual peace, inner silence and love for our neighbor and righteousness, then we live in God, who is love. But there are people who look at this prayer as a kind of magic that will give them reading of minds, insight, the gift of miracles and healings, etc. This approach to prayer is extremely sinful. Those who act so are deceived by demons who give them some kind of power to destroy them altogether, forever".
Professor A.I. Osipov writes that "an awareness of magic is deeply present in our 'old man'. For very many people, Orthodoxy consists in placing candles, 'venerating', donating something, leaving prayer requests, ordering Liturgies, molebens and pannikhidas, joining in the cross processions, visiting holy shrines, confessing and receiving Communion. The most important part of salvation, life according the commandments and repentance, remains undone. However, without spiritual transformation (in Greek, the word for repentance is μετάνοια [metanoia], which means to change one’s way of thinking), all of these external activities are at the least useless, and at the worst harmful, for they can cause one to feel self-righteous and raise his self-opinion over “sinners.”"
Also some holy fathers wrote about such "automatic" attitude to the Sacraments (i.e. without faith and willingness to fight with passions): St. John Chrysostom, St. Mark the Ascetic, St. Cyril of Jerusalem. Such false "automatic" attitude to the action of Holy Sacraments is named by A.I. Osipov as one of the reasons of degeneration of Christian faith and backsliding into paganism.
Delusions of Antichrist
Apostles Paul and John say in their epistles that Antichrist will come right before the end of times (2 Thess. 2, 1 John 2:18). His coming will be accompanied by false miracles and signs. Father Nikita Grigoriev in his book "Faith and delusion" writes about Antichrist that "in appearance, he will be kind, gentle, patient and merciful. He will attract everyone by his “love” and will amaze everyone with his “miracles” but this “love” will be false just as the “miracles” will likewise be false. Moreover, this “love” will not be salvific for the people, but destructive because it will not call people to genuine repentance, to take up one’s Cross, to spiritual rebirth through the Holy Spirit in the Church of Christ. No, the anti-Christ’s love will condone human passions. From the very beginning, in Paradise, when man fell, he did not want to hear about his sin; he did not wish to repent and be forgiven. He wanted to remain in his sin and justify it. The anti-Christ will not rebuke passions and call people to genuine contrition of heart in order to forgive and heal them, but on the contrary will justify them just as they are. It will make people feel good about themselves as they are."
E. Orthodox views on the lives of certain E. Orthodox elders and saints
Professor of the Moscow Theological Academy A.I. Osipov in his lecture course on “Basic Theology” speaks in one of the lectures (as well as in the textbook for this course and some other public lectures) about false way of prayer and false spirituality. He says that some books containing errors appeared recently.
E. Orthodox views on the lives of certain Catholic saints
St. Ignatius provides examples of visions and other mystical experiences of St. Francis of Assisi, St. Ignatius of Loyola, Thomas à Kempis and compares them with experience of Orthodox saints of the first centuries. Professor A.I. Osipov analyzes teachings on this subject by St. Ignatius and points at a significant difference in Orthodox and Roman Catholic view on spirituality, repentance and humility. He writes in a book which is a textbook for the Basic theology course in the Moscow Theological Academy that there are many phrases attributed to St. Francis that reveal his true degree of humility: Saint Francis's very life's goal, ("I have labored and want to labor … because this brings honor," "I want to suffer for others and redeem the sins of others"), shows his fall which he himself does not see; it shows his own sins. At the end of his life, he said, "I am not aware of any sin I have committed which I have not redeemed through confession and repentance. This quote is from the book "The Search for Truth of the Path of Reason" by A.I. Osipov, who takes this phrase from the book "Light Invisible" by Mitrofan Lodyzhensky, whose passage is read in full as: "Although Francis, as we know from his biography, also worked hard on himself, although he often spoke out about the need for humility and gave the Franciscan brothers useful teachings in this regard, he himself in his whole life has far from developing a profound Seraphim's humility with which we met from the biography of the Russian saint. Francis’s humility found only sporadic impulses, albeit very strong, impulses not relieved of exaggeration and even, one might say, theatricality. This humility of Francis did not become inseparable from him a property of his nature. Very different moods often broke into Francis’s nature. So, from the biography of Francis, we learn about such speeches of Francis to his students:’I am not aware for myself of any sin that I couldn’t atone for by confession and repentance. For the Lord, by his mercy, gave me the gift to clearly recognize in prayer in what I was pleasing to or not pleasing to him.’ These words, of course, are far from real humility. Rather, they resemble the speech of that self-righteous man (Pharisee), who, according to the parable of the Great Teacher, stood in the temple in front of the tax collector, crying out in deep humility to God: ‘God, be merciful to me a sinner.’ These words of Francis, said in his mind that he had atoned for his sins and was pleasing to God, do not at all correspond to what the ascetics of the Philokalia require from a humble person, whom Seraphim of Sarov followed. So, Isaac the Syrian says: ‘The true righteous always think in themselves that they are unworthy of God. And that they are true righteous, this is derived from the fact that they acknowledge themselves as a wretched and unworthy of God and profess this secretly and explicitly and are enlightened to this by the Holy Spirit, so as not to be left without proper care and cooperation, while they are in this life". For the phrase in this passage "I am not aware...", Mitrofan Lodyzhensky quotes Vladimir Guerrier’s "Francis. Apostle of poverty and love", 1908, P. 124, in Russian, who, in turn, does not quote any sources when writing this phrase. He only says in the preface of the book that many sources about Francis appeared in the past decade. His dying words were, 'I have fulfilled what I should have fulfilled.' " By comparison, we shall cite the last moments of Saint Sisoes the Great (fifth century): Surrounded by the brothers at the moment of his death, he was as if talking with invisible beings. The brothers asked him, "Father, tell us, with whom are you speaking?" He answered, "With angels who have come to take me; but I am begging them to leave me for a short time, in order to repent." The brothers knew that Sisoes was perfect in the virtues, and protested, "You have no need to repent, Father." Sisoes answered, "Truly, I do not know if I have even begun to repent." Sisoes' deep understanding of his own imperfection is the main outstanding trait of all true saints and is the most important sign that their revelations were true.
The words of St. Francis "I have fulfilled what I should have fulfilled" in this quote (taken from the referenced book of Prof. A.I. Osipov in English), were taken by A.I. Osipov from another book in Russian, which in turn took it from another book. For comparison, the life of St. Francis by St. Bonaventure contains it in the following from: "I have done what was mine to do" (P. 150). The interpretation of such words and relation to humility is explained, in particular, in the book by Mitrofan Lodyzhensky "Light Invisible" adapted in the shorter article by Father George Macris.
Father George Macris writes that "in his farewell address to the Franciscans, St. Francis said: “Now God is calling me, and I forgive all my brethren, both those present and those absent, their offenses and their errors and remit their sins as far as it is in my power.” These words reveal that on his death bed, Francis felt himself to be powerful enough to remit sins like the Pope. It is known that the remission of sins outside the Sacrament of Penance and the Eucharist in the Roman Church was a prerogative of papal power. Francis’ assumption of this prerogative could only have been with the assurance of his own sanctity".
Prof. A.I. Osipov also says that there are 3 main manifestations of delusions of Catholic mystics:
* compassion of Christ that reaches its ultimate degree (e.g. St. Francis Assisi);
* matrimony with God, flirting with God, romance with God etc. (e.g. St. Teresa of Ávila);
* dreaminess of imagination (e.g. St. Ignatius Loyola).
Russian philosopher A.F. Losev (1893-1988) analyzes Western spirituality and in particular, visions of St. Angela of Foligno: "That is not a prayer and conversation with God. These are very strong hallucinations on the basis of hysteria i.e. prelest". "Orthodox prayer dwells in the upper part of the heart, not below. Through prayer and ascetic experience it has been learned in the East that nurturing the prayer in some other place in the body is always the result of a delusional state. Catholic erotomania is connected, apparently, with violent excitement and fever at the bottom of the heart".
Another Russian philosopher M.V. Lodyzhenskii (1852-1917) compares Orthodox and Roman Catholic mystics and points at the differences in humility between St. Seraphim of Sarov and St. Francis of Assisi.
New-martyr Mihail Novoselov (1864-1938) compares the teaching of St. Ignatius (Brianchaninov), St. Theophan the Recluse, writings of M.V. Lodyzhenskii and the writings of Roman Catholic mystics.
Prof. A.I. Osipov says that deviations in the Roman Catholic Church started from such things that are rather subtle and not easy to understand for everyone, even for the person who knows the basics of the spiritual life. A.I. Osipov gives an example of his personal misunderstanding. He speaks in one of his lectures about the time when he studied in the Moscow Theological Seminary in 1950-60s. He knew about the book "Imitation of Jesus Christ" by Thomas à Kempis – in Ignatius Brianchaninov’s writings, there is a case when a landlord saw his daughter with this book, took it out of her hand and said: "Stop playing in romances with God." And A.I. Osipov took and read the book and did not see anything bad: "Why do they criticize it? It is true, we must imitate Jesus Christ." When he looked into this book again after a long time – he saw prelest everywhere: rapture, exaltation, false love. A.I. Osipov adds: "I did not understand, imagine that! I did not see. The people who just knew it and felt it – they understood. They saw where the falseness is."
Another Orthodox theologian Andrey Kuraev compares several times in his books the Eastern and the Western mystical practices. He says that often religious paths are compared by means of formal dogmatic differences – but that is not the most important part. In his opinion, the most important difference between Orthodoxy and Catholicism is the practice of meditative prayer. He writes that "Western spiritual authorities strongly recommend that way of spiritual practice, which the spiritual teachers of the East categorically prohibit (plus, since the time of the unity of the Church). The Eastern tradition allows, though with the utmost caution, the acceptance of an image in the mind - but in no case during prayer. 'How to imagine the Lord? Sitting on the throne or crucified?' - St. Theophan the Recluse answers the question. 'When you contemplate on the Divine, then you can imagine the Lord, if necessary. But you shouldn't keep any images during prayer.' 'If you allow images, then there is a danger - to start praying to a dream'. Not images, but meanings are made the subject of consideration here. 'Imagine the truth and pray about it, or rotate it in your mind during prayer, and compose prayers from it. The moment will come when this truth will enter the heart and embrace the whole being of the soul, nourishing and cheering it up'. <…>This intellectual meditation of Orthodoxy is closer to the Jewish origins of Christianity <…> Too emotional Catholic meditation leads to the fact that the area of the religious itself is invaded by human emotions awakened by it, which have no place in religion (at least – in not transformed form)". | WIKI |
Customizing SQL Functions in PostgreSQL: Exploring Various Approaches
Enterprise PostgreSQL Solutions
Comments are off
Customizing SQL Functions in PostgreSQL: Exploring Various Approaches
1. Overview
PostgreSQL is a great open-source database management system that offers users a lot of options to meet their unique requirements. One of the strengths of PostgreSQL is its flexibility in creating customized SQL functions. In this blog post, We’ll use the example of a basic function called get_sum to demonstrate various approaches.
2. build a SQL function in different ways
First of all, let’s assume you want to build a SQL function to calcualte the sum of two integers.
2.1 using SQL
For straightforward SQL functions like get_sum, the simplest way is to use SQL directly. Here’s how:
postgres=# CREATE OR REPLACE FUNCTION sql_get_sum(a integer, b integer) RETURNS integer AS $$
SELECT a + b;
$$ LANGUAGE SQL;
CREATE FUNCTION
postgres=# SELECT sql_get_sum(1, 1);
get_sum
---------
2
(1 row)
2.2 using PL/pgSQL
The PL/pgSQL language provides more advanced features. You can create the get_sum function like this:
postgres=# CREATE OR REPLACE FUNCTION pgsql_get_sum(INT, INT) RETURNS INT LANGUAGE PLPGSQL
as $$
BEGIN
return $1 + $2;
END
$$;
CREATE FUNCTION
postgres=# SELECT pgsql_get_sum(1, 1);
pgsql_get_sum
---------------
2
(1 row)
2.3 using PL/Tcl
If you want to use languages like PL/Tcl, PL/Perl, or PL/Python, you’ll need to compile them first.
./configure --with-tcl --with-perl --with-python && make -j && make install
Here’s how to set up PL/Tcl and create the get_sum function:
postgres=# CREATE EXTENSION pltcl;
CREATE EXTENSION
postgres=# CREATE OR REPLACE FUNCTION tcl_get_sum(INT, INT) RETURNS INT AS '
return [expr $1 + $2]
' LANGUAGE pltcl;
CREATE FUNCTION
postgres=# SELECT tcl_get_sum(1, 1);
tcl_get_sum
-------------
2
(1 row)
2.4 using PL/Perl
Similar to PL/Tcl, you’ll need to enable the PL/Perl extension and then create the function:
postgres=# CREATE EXTENSION plperl;
CREATE EXTENSION
postgres=# CREATE OR REPLACE FUNCTION perl_get_sum(int, int) RETURNS INTEGER AS $$
return $_[0] + $_[1];
$$ LANGUAGE plperl;
CREATE FUNCTION
postgres=# SELECT perl_get_sum(1, 1);
perl_get_sum
--------------
2
(1 row)
2.5 using PL/Python
Enable the PL/Python extension before creating the function:
postgres=# CREATE EXTENSION plpython3u;
CREATE EXTENSION
postgres=# CREATE OR REPLACE FUNCTION python_get_sum(x INT, y INT) RETURNS INT AS $$
z = x + y
return z
$$ LANGUAGE plpython3u;
CREATE FUNCTION
postgres=# SELECT python_get_sum(1, 1);
python_get_sum
----------------
2
(1 row)
2.6 using SQL system function
For immediate availability or more complex functions, you can integrate your SQL function into PostgreSQL’s system functions. Here’s how:
First, Determine an unused OID:
$ src/include/catalog/unused_oids
... ...
6107 - 6109
6122 - 6149
6208 - 6223
6273 - 9999
... ...
With this information above, you can pick any unsed OID (of course you need to consider how to manage this OID for your product to align with future Postgres releases). In the example below, I pick up 6273 for demo purpose.
Second, modify src/include/catalog/pg_proc.dat with below information added to the SQL system function definition array.
{ oid => '6273', descr => 'get the sum of two integers',
proname => 'sys_get_sum', proisstrict => 'f', prorettype => 'int8',
proargtypes => 'int4 int4', prosrc => 'sys_get_sum' },
Third, modify the corresponding C file, src/backend/utils/adt/numeric.c to add below implementation to the very bottom.
Datum sys_get_sum(PG_FUNCTION_ARGS)
{
int64 a = 0, b = 0;
if (PG_ARGISNULL(0) || PG_ARGISNULL(1))
{
elog(ERROR, "two integers are reuquired as the input.");
PG_RETURN_NULL();
}
a = PG_GETARG_INT32(0);
b = PG_GETARG_INT32(1);
PG_RETURN_INT64(a + b);
}
Last, compile, install, and restart postgres server, and then you should be able to use sys_get_sum SQL function like below immediately.
postgres=# SELECT sys_get_sum(1, 1);
sys_get_sum
-------------
2
(1 row)
2.7 using an extension
Add a SQL function to Postgres SQL system function may require some extra maintence effort especially when you need merge your logic to later Postgres releases. Building a dedicated extension can make the maintence much easier. Here is the simple process to build your own get_sum extension.
first, create a folder named get_sum under contrib/, then add a file get_sum.c with below content.
#include "postgres.h"
#include "fmgr.h"
PG_MODULE_MAGIC;
PG_FUNCTION_INFO_V1(get_sum);
Datum
get_sum(PG_FUNCTION_ARGS)
{
bool isnull, isnull2;
int a = 0, b = 0, sum = 0;
isnull = PG_ARGISNULL(0);
isnull2 = PG_ARGISNULL(1);
if (isnull || isnull2)
ereport( ERROR,
( errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
errmsg("the input must be two integers")));
a = PG_GETARG_INT32(0);
b = PG_GETARG_INT32(1);
sum = a + b;
PG_RETURN_INT32(sum);
}
second, add a control file, get_sum.control, with below content
# get_sum postgresql extension
comment = 'extension for a sum of two integers'
default_version = '1.0'
module_pathname = '$libdir/get_sum'
relocatable = true
third, add a version control file, get_sum--1.0.sql with below content,
--complain if script is sourced in psql, rather than via CREATE EXTENSION
\echo Use "CREATE EXTENSION get_sum" to load this file. \quit
CREATE OR REPLACE FUNCTION get_sum(int, int) RETURNS int
AS '$libdir/get_sum'
LANGUAGE C IMMUTABLE STRICT;
forth, add a file Makefile with below content
MODULES = get_sum
EXTENSION = get_sum
DATA = get_sum--1.0.sql
ifdef USE_PGXS
PG_CONFIG = pg_config
PGXS := $(shell $(PG_CONFIG) --pgxs)
include $(PGXS)
else
subdir = contrib/get_sum
top_builddir = ../..
include $(top_builddir)/src/Makefile.global
include $(top_srcdir)/contrib/contrib-global.mk
endif
Finally, make and make install within get_sum folder, and then you can verify the get_sum extension like below.
postgres=# CREATE EXTENSION get_sum;
CREATE EXTENSION
postgres=# SELECT get_sum(1, 1);
get_sum
---------
2
(1 row)
3. Summary
In this blog post, we’ve explored seven different approaches to customizing SQL functions in PostgreSQL and I hope it can help you when you when want to build your own SQL functions. | ESSENTIALAI-STEM |
Drimia elata
Drimia elata ("Satin squill") is a species of flowering plant in the family Asparagaceae, subfamily Scilloideae. It is widely distributed in eastern and southern Africa.
Description
Drimia elata is a perennial, growing from a bulb with reddish scales, and reaching a maximum height of 100 cm. The leaves are long (circa 25 cm) slender (1–2 cm), linear to narrowly lanceolate, sometimes wavy with minute hairs especially along the margins.
The inflorescence appears between December and April (southern hemisphere), after the leaves are already dry. It is borne on a scape up to 1.2 m tall, and takes the form of a thin, dense, terminal raceme.
The individual flowers are grey-white to purple-brown. They have recurved tepal lobes, and dark blueish purple anthers. The flowers are pedicellate, subtended by a bract with a small and distinctive spur near its base. The trilocular, oblong fruit capsule contains the small ovate seeds.
Taxonomy
Drimia elata was described by Nikolaus Joseph von Jacquin in a work published in 1797. The species was subsequently included in the fourth edition of Species Plantarum, published in 1799, authored by Carl Ludwig Willdenow. It is the type species of the genus Drimia. The specific epithet elata means "tall".
Distribution and habitat
Drimia elata is found in east and southern Africa: Sudan, Kenya, Tanzania, Uganda, Angola, Malawi, Mozambique, Zambia, Zimbabwe, Botswana, Eswatini and South Africa. In Zimbabwe, it is noted as occurring in rocky grassland. In South Africa, where it occurs from Namaqualand to Cape Town and across the southern Cape, it is recorded as growing on sandy to clay-rich soils, in Renosterveld and Succulent Karoo vegetation. | WIKI |
Vricon
Vricon was an American geospatial-intelligence data and software provider. It was a joint venture between Saab and DigitalGlobe and was headquartered in McLean, Virginia.
Vricon's three-dimensional visualization uses stereophotogrammetry with hundreds of images, typically from commercial satellite imagery. Vricon used automated 3D image processing algorithms to produce 3D data for government and commercial clients.
On July 1, 2020, Vricon was acquired by Maxar Technologies for approximately US$140 million. | WIKI |
Bead (woodworking)
A bead is a woodworking decorative treatment applied to various elements of wooden furniture, boxes and other items.
A bead is typically a rounded shape cut into a square edge to soften the edge and provide some protection against splitting. Beads can be simple round shapes, or more complex patterns.
A bead may be created with an electric router, a special moulding handplane or a scratch stock. Beads are usually cut directly into the edge of the item to which the bead is being applied. However, beads applied across the grain are usually cut into a separate piece, which is then fixed in position.
A bead is also an important design element in wood turning, a ring-shape or convex curve incised into a piece by the use of a chisel or skew.
Types of beads
* Angle bead, a projecting wood moulding at the corner of a plastered wall
* Corner bead is similar, but is usually fully embedded in plaster or drywall, and usually plastic or metal
* Nosing bead, the rounded projection of a stair tread over the riser below
* Parting bead, or parting strip, the feature that separates two sashes in a sash window | WIKI |
2G spectrum case
The 2G spectrum case was a political controversy in which politicians and private officials of the United Progressive Alliance (UPA) coalition government India were allegedly involved in selling or allotting 122 2G spectrum licenses on conditions that provided an advantage to specific telecom operators.
Quotes
* Swami is prime ministerial material because of his integrity and honesty in the manner that he has pursued the 2G Spectrum scam.
* Uma Bharti, Subramanium Swamy prime minister material, says Uma Bharti (November 2011)
Just a Mercenary? Notes from My Life and Career.
* Just a Mercenary? Notes from My Life and Career. Duvvuri Subbarao. Penguin.
* In 2007, the Department of Telecom (DoT) under the ministerial charge of A. Raja of the DMK, a partner in the UPA coalition, determined that there was a case for licensing more 2G operators in each of the twenty-three telecom circles in the country in order to encourage competition in the sector.
* The department consulted TRAI (Telecom Regulatory Authority of India), and TRAI, in turn, endorsed the need to increase the number of operators and recommended that fresh licensees should be given spectrum at the same price at which incumbent operators had gotten it, which was the price set in an auction in 2001. The absence of a level playing field, TRAI argued, would disadvantage fresh entrants and defeat the goal of deepening telecom services.
* The 2001 cabinet decision stipulated that all future pricing of spectrum would be decided jointly by DoT and the Ministry of Finance. When the issue came to the finance ministry for opinion, I took the view that it would be inappropriate to sell spectrum in 2007–08 at a price set in 2001 and that we must rediscover the price through a fresh auction.
* My opinion was informed by the experience in India and around the world during the intervening years that spectrum was a scarcer commodity than originally believed. It was only appropriate that the government should garner a part of that scarcity premium by rediscovering the price through a fresh auction.
* The DoT wrote back to say that they saw no reason to revisit the pricing issue and that they preferred to go along with the TRAI recommendation. For sure, there was some logic to the DoT position. If the objective was to deepen telecom penetration, it made sense to keep the price of spectrum low; competition among operators would then ensure that the lower price was passed on to customers.
* Even as this disagreement on pricing remained unresolved, the DoT went ahead and invited applications for licences in September 2007 and awarded 120 licences to forty-six companies on 10 January 2008. Although these licences were given away at the 2001 price, the licence agreement contained a clause that the price could be increased later to accommodate the possibility of the finance ministry’s view prevailing.
* The whole licencing process turned out to be controversial and contentious. There were allegations of arbitrarily advancing the cut-off date for receipt of applications, abrupt announcement of the successful applicants, tampering with the first come, first served principle and allowing a very narrow window for payment of the licence fee to favour some parties. This licensing part was an issue in which I was neither involved nor had any locus standi.
* In July 2008, some six months after the licences were issued, the two ministers, Finance Minister Chidambaram and Telecom Minister Raja, reached an agreement that this round of 2G spectrum would be given at the 2001 price while all future spectrum, including 3G, which was then on the anvil, would be auctioned. Both ministers presented this agreed package to the prime minister at a meeting where I was present. I recorded that decision in the file.
* In the months after the issue of licences, stray reports began appearing that spectrum had been given away at a throwaway price. These reports gained momentum when two of the licensees were able to sell equity to foreign investors at a huge premium, suggesting that the true value of spectrum was much higher than what was reflected in the 2001 price.
* Very soon the trickle of allegations of corruption turned into a flood. That the government had ignored the advice of its own finance secretary added fuel to the fire. There was a furore in the parliament. The decision was attacked in the Public Accounts Committee (PAC), the Central Vigilance Commission (CVC) ordered a CBI investigation, the Comptroller and Auditor General (CAG) decided to take up a special performance audit and a public interest litigation was filed in the Supreme Court.
* This meant that the 2G issue was simultaneously the subject of a CBI investigation, a PAC inquiry, a CAG special audit and a Supreme Court probe. And subsequently, it would be the subject matter of a Joint Parliamentary Committee (JPC) inquiry as well.
* The CAG report, signed off by Vinod Rai, incidentally my IAS batchmate, was tabled in the parliament in November 2010. Its most important conclusion was that the government had incurred a ‘presumptive loss’ of Rs 1.76 trillion by selling spectrum at below market price. This huge number, as much as 3.6 per cent of GDP, was explosive and turned the 2G issue into a full-blown scam.
* The locus standi of the CAG to take up a special audit is unquestionable. However, the CAG’s decision to go into the question of a ‘presumptive loss’ to the government and its methodology of quantifying that loss are questionable on several grounds.
* The CAG estimated the ‘presumptive loss’ by calculating the difference between the revenue actually generated and the revenue that would have been generated under four different hypothetical prices for spectrum. The assumptions underlying the estimates of these hypothetical prices are contestable. Moreover, in burrowing deeply into just the pricing issue, the CAG did not reckon with the significant recurring revenue the government would earn via larger spectrum charges consequent on the expansion of telecom.
* Finally, the CAG did not take into account the substantial equity and efficiency gains that would accrue to the economy via deeper telecom penetration.
* The reality is that it’s difficult to quantify the costs and benefits of decisions like this without making heroic assumptions. Arguably, it’s possible to come out with a study that would, in fact, show ‘presumptive gains’ to the government — that the overall benefits to the government far exceed the costs it incurred — by making assumptions that would be no less robust than those underlying the CAG findings.
* More important than the estimate of presumptive loss, questionable as it was, was the CAG’s locus standi in questioning the right of the government to decide to sell spectrum at below market price. If a democratically elected government decided to forgo revenue in order to serve a larger public good of deepening telecom penetration, was it open to the CAG to substitute his own judgement for the government’s? | WIKI |
Does water get inside car door?
Car doors are designed with drains that allow the water to drip harmlessly onto the road as you drive, but if these drains become clogged, rain and snowmelt can collect inside the doors and eventually leak into the interior. To fix this problem, you’ll want to make sure to keep your door drains free of road debris.
What happens if water gets inside your car?
If water enters the engine it can lead to bad things. If there’s water in your engine, it leads to compression issues because there’s no place for the water to go. … If water enters your engine it can end up rusting parts out like your differential and then you’re not going anywhere.
Can water damage ruin a car?
Water damage can take weeks or months to affect a car. The moisture can short the car’s electrical system and compromise safety features such as air bags and anti-lock brakes. Flood-damaged cars also present another, less obvious, concern: health issues.
Why can I hear water in my car door?
The most common cause is a clogged drain trapping water in the heating and cooling system. The water, formed by condensation, usually empties onto the ground. But a clogged drain can cause it to back up, leading to the sloshing sound and even dampness on the passenger-side floor.
IT IS INTERESTING: How do you revive a dead car battery?
Are you supposed to drain car doors?
Because water can get past window seals and inside the doors when it rains or when you wash your car, and the water is supposed to exit through drain holes at the bottom. …
Where are car door drains located?
The most common location for drain holes is at the bottom of the doors. Since rainwater can seep in past the door seal, the drain holes ensure that water will not collect under the seal and go unnoticed. Vehicles often incorporate drain holes in other areas as well.
Why is the floor of my car wet?
Causes of a Wet Passenger Side Floor Mat #1: Bad Heater Core
Hot coolant flows from the engine, where heat is absorbed, and taken to the car’s heater core when you turn on the heater. The heater core is like a small radiator. … If you smell antifreeze leaking into the car, a bad heater core is almost certainly to blame.
How can you tell if a car has water damage?
How to Spot a Flood-Damaged Car
1. Unusual odors inside the car. Musty or moldy odors inside the car are a sign of mildew buildup from prolonged exposure to water. …
2. Discolored carpeting. …
3. Exterior signs of water buildup. …
4. Rust and flaking on the undercarriage. …
5. Dirt buildup in unusual areas.
Can a car be fixed after water damage?
A flooded vehicle can be repaired by an experienced mechanic, not you! … The bulk of these vehicles will be repaired, regrettably, and the way to do it is not exactly rocket science. This is basically what you should do with the engine. Check the oil dipstick to see if there is any water contamination.
IT IS INTERESTING: Question: What oil should I use for a 4 stroke engine? | ESSENTIALAI-STEM |
[Rd] Running ./tools/rsync-recommended through a proxy
Douglas Bates dmbates at gmail.com
Tue Jun 28 23:02:09 CEST 2005
My computers at my office will no longer be able to connect directly
to web sites etc. I will be going through a proxy server. The
particular server is running squid on port 3128.
I have managed to configure web browsers, ssh, apt, svn and a whole
lot of other tools to use the proxy server but I haven't been able to
configure rsync. My usual method of updating my copy of the R-devel
sources is via
cd my_R_devel_sources
svn up
./tools/rsync-recommended
cd my_R_build_directory
...
Can anyone offer suggestions on how to get rsync-recommended to work
through a proxy? I have set
export RSYNC_PROXY="machine.name:3128"
which I understand from the documentation is the magic environment
variable (I don't give the name of the server explicitly because it is
an open proxy). However, I still get
bates at bates4:/usr/src/r-devel$ ./tools/rsync-recommended
bad response from proxy - HTTP/1.0 403 Forbidden
rsync: failed to connect to machine.name: Success (0)
rsync error: error in socket IO (code 10) at clientserver.c(94)
*** rsync failed to update Recommended files ***
Creating links
Is it likely that the proxy server is not passing connections to port 873?
More information about the R-devel mailing list | ESSENTIALAI-STEM |
X-linked
Also found in: Dictionary, Thesaurus, Wikipedia.
X-linked
[eks´lingkt]
transmitted by genes on the X chromosome; see also X-linked gene.
The probabilities of male relatives being affected and female relatives being carriers of an X-linked recessive disorder. All the daughters of an affected male are obligate carriers. From Mueller and Young, 2001.
X-linked
(linkt),
Pertaining to genes borne on the X chromosome. Avoid confusing this word with sex-linked.
X-linked
(eks´linkt) transmitted by genes on the X chromosome; sex-linked.
X-linked
(ĕks′lĭngkt′)
adj.
Of, relating to, or characterized by genes located on the X chromosome.
X-linked
[eks′ lingkt]
pertaining to genes or to the characteristics or conditions they transmit that are carried on the X chromosome. Compare Y-linked. See also sex-linked disorder. X linkage, n.
X-linked
Sex linked Genetics adjective Referring to a mode of transmission in which a trait or gene is linked to the X chromosome and generally expressed only in males. See Gene, Mutation, Sex chromosome.
X-link·ed
(lingkt)
Pertaining to genes borne on the X chromosome. Commonly but erroneously used synonymously with sex-linked, which would also comprise Y-linked traits.
X-linked
Pertaining to genes, or to the effect of genes, situated on the X CHROMOSOME. X-linked disorders are those caused by mutated genes on the X chromosome. They include AGAMMAGLOBULINAEMIA, ALBINISM, ALPORT SYNDROME, Charcot-Marie-Tooth peroneal muscular atrophy, COLOUR BLINDNESS, DIABETES INSIPIDUS, ectodermal dysplasia, glucose-6-phosphate dehydrogenase deficiency, FABRY DISEASE, glycogen storage disease VIII, gonadal dysgenesis, HAEMOPHILIA A, one form of HYDROCEPHALUS, HYPOPHOSPHATAEMIA, ICHTHYOSIS, TURNER'S SYNDROME, one form of mental retardation, Becker and Duchesse MUSCULAR DYSTROPHY, one form of RETINITIS PIGMENTOSA and the TESTICULAR FEMINIZATION SYNDROME.
X-linked
Located on the X chromosome, one of the sex chromosomes. X-linked genes follow a characteristic pattern of inheritance from one generation to the next.
X-link·ed
(lingkt)
Pertaining to genes borne on the X chromosome.
X-linked
traits transmitted by genes on the X chromosome; sex-linked; the categories are X-linked dominant, X-linked recessive.
X-linked agammaglobinemia
see Bruton's agammaglobulinemia.
X-linked trait
sex-linked, e.g. coat color in cats, hemophilia.
References in periodicals archive ?
However, based on pedigree analysis, X-linked recessive inheritance is most likely, which is similar to the recent report of clustering in a family.
As described earlier, with reference to genotype on a single locus, there are twenty five different parent unions possible in nuclear pedigrees, six for each of autosomal dominant, autosomal recessive, X-linked dominant, X-linked recessive (6+6+6+6 = 24) and one for Y-linked inheritance pattern.
X-linked juvenile retinoschisis: clinical diagnosis, genetic analysis, and molecular mechanisms.
818_819insGGGCT mutation had an X-linked family history.
Clinical and mutational features of X-linked agammaglobulinemia in Mexico.
A recurrent missense mutation in the KAL gene in patients with X-linked kallmann's syndrome.
This suggests that the mutation was inherited from the mother and not the father The sequencing of UBQLN2-S3401 in this case indicated the presence of an X-linked ALS/FTD with incomplete penetrance in this family (Figure l).
G6PD deficiency is an X-linked congenital enzymopathy4 being present in more than 400 million people worldwide which increases the vulnerability of erythrocytes to oxidative stress.
In 2011, a 19-year-old white man from Ohio, USA, who had X-linked CGD was examined for right neck swelling and tenderness (2 weeks' duration), a yellow ulcerated lesion on the right side of the hard palate, and an enlarged right tonsil with copious exudate.
X-linked AHC is caused predominantly by point mutations in the NR0B1 (DAX1) gene; however it can also result from its partial or complete deletion.
Bazex-Dupre-Christol (BDC) syndrome is an X-linked dominant multiple basal cell carcinoma (BCC) syndrome, clinically characterized by follicular atrophoderma, multiple milia, hypotrichosis and multiple basal cell carcinomas. | ESSENTIALAI-STEM |
Friends and strangers walking on graphs
Friends and strangers walking on graphs
-
Colin Defant and Noah Kravitz, Princeton University
Let X and Y be simple graphs on n vertices. Identify the vertices of Y with n people, any two of whom are either friends or strangers (according to the edges and non-edges in Y), and imagine that these people are standing one at each vertex of X. At each point in time, two friends standing at adjacent vertices of X may swap places, but two strangers may not. The friends-and-strangers graph FS(X,Y) has as its vertex set the collection of all configurations of people standing on the vertices of X, where two configurations are adjacent when they are related via a single swap of this form. It is natural to study the connected components of FS(X,Y), which correspond to the equivalence classes of mutually-reachable configurations. This framework provides a common generalization for the famous 15-puzzle, transposition Cayley graphs of symmetric groups, and earlier work of Stanley and Wilson.
We will explicitly describe the connected components of FS(X,Y) in the special cases where X is a path or a cycle; the results for the latter are closely related to toric partial orders. We will also obtain bounds on the minimum degrees of X and Y that guarantee FS(X,Y) being connected. In a different direction, we will show that if X and Y are n-vertex random graphs with edge probability p, then the threshold probability for the connectedness of FS(X,Y) is p=n^{-1/2+o(1)}. We will conclude with several open problems and avenues for future research.
This talk is partly based on joint work with Noga Alon. | ESSENTIALAI-STEM |
User:Balbahsa/sandbox
Sources University Architecture https://books.google.com/books?id=bOpHAwAAQBAJ&pg=PA74&lpg=PA74&dq=lecture+halls+design+to+limit+protests&source=bl&ots=141IMx4yMr&sig=f3oWNTosP1aHx8O1JPYE3Rpuddw&hl=en&sa=X&ved=0ahUKEwii0u-nv4TbAhUCiqwKHc21BDkQ6AEIUTAJ#v=onepage&q=lecture%20halls%20design%20to%20limit%20protests&f=false This book takes the side of an institution, mentioning how even though protests can create change, they should be limited, and the university must be designed to contain protests, and to police campus routes. Riot Architecture https://bakerartist.org/sites/default/files/migration/essay_riot-architecture.pdf The architecture of cities changed after the 1960s
Drafted Section:
In response to the Civil Rights Movement of the 1960’s and the protests that followed in opposition to the Vietnam War, institutions all over the nation of the United States including the University of California San Diego began changing their growing architecture in response to the protests, in an effort to contain the masses. Signs of defense within these institutions included the placement of concrete walls, narrow stairways, and narrow hallways. These structural implementations were put in place to physically hinder the successful demonstrations of students and faculty, and limit their engagement in political action opposing political situations they deemed unjust.
The topics that I am leaning towards for this Wiki project revolve around institutionalized discrimination and racism. These concepts are extremely prevalent with lasting effects, yet are never addressed adequately.
https://en.wikipedia.org/wiki/Discrimination_in_education
This article that I found lightly touches upon discrimination in the United States (even though it is the largest section). In addition to elaborating concepts in the section for the United States, it would be a good idea to contribute to the global discussion, and the issue of discrimination in education on the global level.
Another concept that we have discussed in class that I think is an extremely important idea to focus on is the racist history of UCSD, since it is automatically applies to us as students of the university. I also think that it is crucial to recognize and be aware of the oppressive history on the Native American land we stroll through every day, as well as the more recent racist events that have taken place. I also think it would be crucial to address and call out the presence of white supremacist groups on campus. -There is no prior existing wikipedia article that addresses this topic, and starting one would be amazing!
A third concept that would make an excellent topic, is anti-blackness within communities of color. It is necessary to address this topic to allow growth within these communities. In this article, it would be crucial to talk about the effects of colonialism on communities of color, and how this in turn shaped the way these people think. It would also be important to discuss methods by which people could "decolonize" their brains, by citing sources that focus on multiculturalism and the unwinding of these thought processes. | WIKI |
[Dbix-class] Re: BUG? Unable to resolve relationship
Adam Sjøgren adsj at novozymes.com
Tue Dec 15 19:22:03 GMT 2009
On Tue, 15 Dec 2009 11:10:20 +0100, Peter wrote:
> Implementors usually suck at writing wholesome documentation. Could
> you be so kind to submit a patch against [1]. You will have both a
> better idea where to put the text so a user will find it, and also how
> to word such text so it makes sense to a novice.
I don't know about that, but I do know that your explanation here made
it much clearer to me what 'might_have' does.
(Had it been called 'might_have_one', then the name would have triggered
the same enlightenment on my part, but I was probably just being dense
thinking 'might_have_some'.)
Here is a patch against trunk (it might be out of style to have such a
clarifying note in the middle of the reference documentation, but as I
(re-)read the 'has_many' and 'might_have' sections, it would have helped
me grasp the difference):
Add a note to 'might_have' to clarify the difference from 'has_many'
---
lib/DBIx/Class/Relationship.pm | 4 ++++
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/lib/DBIx/Class/Relationship.pm b/lib/DBIx/Class/Relationship.pm
index 3351391..2727397 100644
--- a/lib/DBIx/Class/Relationship.pm
+++ b/lib/DBIx/Class/Relationship.pm
@@ -371,6 +371,10 @@ resolve the join, unless C<$their_fk_column> specifies the foreign key
column in C<$related_class> or C<cond> specifies a reference to a join
condition hash.
+This differs from C<has_many> in that a C<might_have> relationship
+returns undef or exactly one row, while has_many returns a resultset
+(which can match no, one, or more rows.)
+
=over
=item accessor_name
--
1.6.3.3
--
Adam Sjøgren
adsj at novozymes.com
More information about the DBIx-Class mailing list | ESSENTIALAI-STEM |
Davis v. United States (1994)
Davis v. United States, 512 U.S. 452 (1994), was a United States Supreme Court case in which the Court established that the right to counsel can only be legally asserted by an "unambiguous or unequivocal request for counsel."
Legal scholars have criticized this case stating that the "bright line" rule established under Edwards v. Arizona is preferable. This rule states that when a suspect invokes the right to have counsel present during questioning, interrogation cannot continue until counsel is present or until the suspect wishes to initiate further discussion.
Background
A bloodstain on one of the pool cues in the recreation hall led Naval Investigative Service (NIS) agents to Robert L. Davis. During questioning, Davis said, “Maybe I should talk to a lawyer.” When asked by the interviewers to clarify his ambiguous request, Davis responded that he did not want counsel. After his conviction of murder, Davis tried to appeal, claiming that his right to counsel was declined. However, his conviction was affirmed when his request for counsel was reviewed and deemed ambiguous, and it was concluded that the NIS indeed clarified his intentions before continuing with questioning.
Opinion of the Court
According to the court, the interrogators opted for the clarification method to determine if Davis's request for counsel was ambiguous or not. When Davis said “Maybe I should talk to a lawyer”, the interrogators replied by saying that they would not violate his rights. They made it clear that if he wanted a lawyer, they would stop the interrogation. When the interrogators asked for clarification, Davis answered that he was not asking for a lawyer. Therefore, the interrogators did not believe his request for counsel was ambiguous since Davis announced he was not requesting counsel in the first place.
Nevertheless, Justice O’Connor decided otherwise. She declared that the threshold of clarity approach was legally required for this case. Thus, the Supreme Court ruled that an ambiguous and unclear request for counsel, such as David's “Maybe I should talk to a lawyer”, does not establish the right. The reasoning was that the defendant's rights under Edwards were not sufficiently requested with his utterance. The request for a lawyer must be clear and unambiguous. Justice O’Connor understood that fear, intimidation, and lack of linguistic and interrogation knowledge may affect the way the defendant requests a lawyer. However, she held that the Miranda Rights should be enough for the defendants to understand their right for counsel, which led to the decision that Davis's request was ambiguous.
Related Cases
Davis’ case is not independent in legislative history. Many cases have dealt with ambiguous requests for counsel. Among these include Smith v. Illinois. Smith was arrested, understood his Miranda rights, and when asked if he wanted a lawyer, Smith responded yes. However, his request for counsel was deemed ambiguous because he continued to answer questions during the investigation before a lawyer was present, thus terminating his request. In the following case, State v. Demesme, defendant Warren Demesme's request for counsel was declined when he asked “why don’t you just give me a lawyer, dawg?” Under review, his statement was deemed ambiguous (the phrase was written as "a lawyer dog" in various court documents). In another case, People v. Krueger, Michael Krueuger claims investigators continued to question him after his request to counsel, thus violating his Miranda rights. His request “Maybe I ought to have an attorney,” was deemed ambiguous. | WIKI |
Christmas Fireside Stories: Norwegian Folk & Fairy Tales/The Three Billy Goats who went up into the Hills to get Fat
| WIKI |
fgl_report_configurePDFDevice
Configure the PDF output.
Syntax
fgl_report_configurePDFDevice(
fontDirectory STRING,
antialiasFonts BOOLEAN,
antialiasShapes BOOLEAN,
monochrome BOOLEAN,
fromPage INTEGER,
toPage INTEGER)
1. fontDirectory - Absolute path to the directory containing the font files. This new font directory is added to the list of standard font directories for your platform.
Tip: To specify the directories to search for PDF fonts, use the fontinfopdf command.
2. antialiasFonts - Configures whether fonts should be rendered using antialiasing. The default value is FALSE.
Note: To specify a BOOLEAN value, enter TRUE or FALSE without quotation marks.
3. antialiasShapes - Configures whether shapes should be rendered using antialiasing. The default value is FALSE.
4. monochrome - Configures whether color values should be converted to monochrome output. The default value is FALSE.
5. fromPage - Selects the lower bound of the range of pages to include in the PDF document. The default value is 1.
6. toPage - Selects the upper bound of the range of pages to include in the PDF document. By default all pages are included.
Usage
Function to configure the PDF output.
This function is applicable when PDF output has been selected by a call to the function fgl_report_selectDevice. All arguments to this function are optional; pass a value of NULL if you don't want to set a value. If the PDF document should be written to a file, the general function fgl_report_setOutputFileName and fgl_report_selectPreview are available for this purpose.
Example
#Set font directory
IF fgl_report_loadCurrentSettings(reportname) THEN
CALL fgl_report_configurePDFDevice("C:\Fonts\ForPDF",NULL,NULL,NULL,NULL,NULL)
CALL fgl_report_selectDevice("PDF")
LET HANDLER = fgl_report_commitCurrentSettings()
ELSE
EXIT PROGRAM
END IF | ESSENTIALAI-STEM |
Template talk:User-multi/Archive 1
Master template?
Assuming this catches on, how's about reimplementing whatever user link templates remain after the current clearout so that they call this? I assume that was what it was designed for, but just wanted to check. Even better, that allows for trivial substitution in future should even more of the current forks be found surplus to requirements. Chris Cunningham (user:thumperward) - talk 10:17, 26 September 2011 (UTC)
* Yep, I would assume we would do that. — Martin (MSGJ · talk) 17:28, 27 September 2011 (UTC)
Nice template
Nice work creating this template! Strangely I made a remark to User:Frietjes that we should have a template like this, not knowing you had already created one. — Martin (MSGJ · talk) 17:35, 27 September 2011 (UTC)
No substitution please
I've removed the substitutable code from this template. Apart from making the wikicode extremely messy, there is absolutely no need to substitute templates like this. The only templates which should be substituted are user talk messages. — Martin (MSGJ · talk) 17:30, 27 September 2011 (UTC)
* The wikicode is not really especially messy. Although I see your point: I don't see a reason why substitution should be necessary. My line of thinking here is, "why not?" — This, that, and the other (talk) 10:05, 29 September 2011 (UTC)
* I can answer the "why not?" but I will also, in turn, ask "why???". Substituting a template onto a page unnecessarily puts several kB of code on the page instead of a clean template call. This makes the wikicode harder to read which may turn off new editors from trying to edit a page. Another reason is that after substitution, it will be set in stone and will not benefit from future improvements and fixes to the template. So now I'll ask why you want the template to be substitutable when you agree there is no benefit to subsituting it. In my mind we should be actively discouraging people from substituting templates unnecessarily. Cheers — Martin (MSGJ · talk) 13:10, 29 September 2011 (UTC)
* Okay I've removed the subst stuff again. — Martin (MSGJ · talk) 16:22, 2 October 2011 (UTC)
PS After your changes, there is an error in the display of the template (see Template:User-SecurePoll). — Martin (MSGJ · talk) 13:11, 29 September 2011 (UTC)
* It looks fine to me. What problem are you seeing? — This, that, and the other (talk) 00:02, 30 September 2011 (UTC)
* User:Frietjes did something to that template which has fixed it. However the default example user was added automatically in my version and that's not happening now. — Martin (MSGJ · talk) 08:40, 30 September 2011 (UTC)
* It's the "if empty" logic. The logic for is different from . I really don't care either way, but they behave differently. Frietjes (talk) 15:13, 30 September 2011 (UTC)
* If we are going to use this as a meta-template, we should probably ease off on the parser functions. — This, that, and the other (talk) 01:27, 1 October 2011 (UTC)
* I don't really mind either. I did it that way because it's slightly easier not to have to pass the default Example from every template that uses this one. — Martin (MSGJ · talk) 16:23, 2 October 2011 (UTC)
Deployment
I've made a start converting the usern templates over. Perhaps others could add to this list when they are ready to deploy? — Martin (MSGJ · talk) 16:39, 2 October 2011 (UTC)
* Template:User0 ✅
* Template:User2 ✅
* Template:User3 ✅
* Template:User4 ✅
* Template:User-SecurePoll ✅
* Template:User23 ✅
* Template:Bureaucrat ✅
From Template talk:User-multi/core
I redirected the core template's talk page to here. This material was present:
I would like to add in this:
" — This, that, and the other (talk) 03:06, 4 October 2011 (UTC)
Display on template page
I was experimenting with a template parameter to provide a slightly different display on the template page. However it didn't work too well as Frietjes discovered because it was doing it on all the examples on the documentation as well. So perhaps a better approach would be to call {{User-multi /template ... which would then call a subtemplate /template on the template page. Then we could display This is an approach I've used before on other meta-templates, e.g. Template:Asbox/templatepage and it has worked well.
* an information box drawing attention to this meta-template.
* example usage using our old friend User:Example (and we could then get rid of this from all the other code)
* automatically produced custom documentation
Do people think this is a good idea or not worth it? — Martin (MSGJ · talk) 16:46, 2 October 2011 (UTC)
* This is all now fully implemented. Adding the parameter {{para|doc|yes}} to the template call, produces automatic documentation. (Be sure to remove duplicate stuff on the /doc page at the same time.) — Martin (MSGJ · talk) 21:24, 8 October 2011 (UTC)
user parameter
It seems that all these templates use the parameter User, with an uppercase U. So it seems to make sense that we should do the same on this template. For now, I will ensure that either case is recognised by this template. — Martin (MSGJ · talk) 21:28, 8 October 2011 (UTC)
Displaying a different username
Some users sign their posts with a slightly username (or at least a somewhat different appearance). For instance, on this page there's User:MSGJ or "Martin" as the user apparently prefers to sign posts (MSGJ is also listed). I propose a label parameter that would allow a label to be put in. Now, I don't normally sign my posts as Bart, but I'll use myself as an example here. The first two lines of the template are currently: :User: {{#if:{$undefined$} Example: Banaticus or Banaticus
They should be changed to the following: {{#if:|| }} {{#if:{$undefined$} Example: Bart or Bart Noting in passing that the extra spaces I added to the closing braces at the end of the word User in the second line " User}}} }}} }}]] " don't have any effect, they just make the template more readable (and prevent the server from accidentally closing the #if too soon by making the first six closing braces explicit parameter braces, or a set of three).
If the actual username is still desired, perhaps instead the label should be shown in a set of parentheses like this: {{{User}}}}}}| {{#if:{{{label|}}}|{{{user|{{{User}}} }}} ({{{label}}})|{{{user|{{{User}}} }}} }} {{#if:{$undefined$} Example: Banaticus (Bart) or Banaticus (Bart)
So, what do you all think? Banaticus (talk) 19:35, 10 February 2012 (UTC)
* Hopefully this template is not being used to generate signatures since templates aren't allowed in signatures. Is there a particular situation where this would be necessary? Frietjes (talk) 22:01, 10 February 2012 (UTC)
* Yes, potentially everywhere it's used, since some people are better known by their apparent username, rather than their actual username. For instance, a mild example would be User:Libertarianrule who signs his posts as "Libertarians Will Rule". Then there are those pages where a table of these templates is used to provide easy "view user pages", "view user talk page", "view contributions" links, and the users aren't used to their Wikipedia usernames and prefer using their real life names, such as the Wikipedia Education Program when pages for those classes are created on Wikipedia. I know I've seen other usernames like this in the past, where the apparent username didn't quite match up with the actual username (where the name that people most associate with an account is not the actual name of that account), but I don't recall any others off the top of my head. I know it does exist, though, and some provision should be made for it. Banaticus (talk) 02:42, 13 February 2012 (UTC)
New subtemplate: RFA
See Template talk:Admin#. To merge into seems sensible to me; but to do this, needs to provide all the functionality presently given by. The only item that is missing from is a link to the admin's RFA nom page, which also seems useful to me. Since is built around, which doesn't presently have that function, it would require either a mod to to add one function, or a new subtemplate here (I'm not really sure why we have two different systems for obtaining the same links). This new function or subtemplate could potentially need two parameters: the username of the admin, and the name of the nom page because several admins don't pass at the first attempt. We don't presently have an equivalent parameter for such use. -- Red rose64 (talk) 16:28, 26 February 2013 (UTC)
* The /core page is not used now; that was an earlier form of this template. Could the correct RfA page be obtained in most cases by using a sequence of ifexist tests? — Martin (MSGJ · talk) 21:19, 26 February 2013 (UTC)
* It wouldn't work in all cases; although most candidates use the name "[username] 2", I have seen variations such as "[username] 2nd", "[username] (2nd)", etc. It might be useful to put in a link to, but even that would not necessarily find the right page if the admin in question has changed their username. Still, doing it this way might be better than nothing. — Mr. Stradivarius on tour ♪ talk ♪ 06:59, 27 February 2013 (UTC)
* I created the sysop template back in 2007 during my early days on Wikipedia, but I am proposing the change now since checking for tranclusions show that it's not being used as much I had hoped. I've voted on may RFAs over the course of my editing career and I hope this will make it helpful for those who would like to find out how the editor in question became a sysop.
* One of my other templates I created ipsock did get used (and protected). So I am hoping this one becomes useful to sysops as well. –BuickCenturyDriver 09:58, 27 February 2013 (UTC)
A link to the nomination page would be useful. But it would be a hassle to have to type in this parameter every time the template is used. So I propose that this information could be held centrally somewhere. For users whose successful RfA is not of the form Requests for adminship/USERNAME, a subtemplate somewhere would hold the title of the correct page. This would be quite a lot of work though and perhaps not worthwhile. — Martin (MSGJ · talk) 11:43, 27 February 2013 (UTC)
* We could get most of the work done automatically if we wrote a script to cross-check Special:ListUsers/sysop with Category:Successful requests for adminship - even more so if we checked for the usual permutations of 2, 2nd, (2nd), etc. The rest of the work could be done by hand and probably wouldn't be too much of a chore. I'm a bit more concerned about keeping the list up-to-date, as that would probably require a bot to keep track of sysopings and de-sysopings. Scripts and bots aren't my forte, though, so this is just a suggestion. — Mr. Stradivarius on tour ♪ talk ♪ 02:49, 1 March 2013 (UTC)
* I've added the subtemplate Template:User-multi/rfa using the Special:PrefixIndex method I described above. I have nothing against upgrading this to a more elegant solution in the future, however. — Mr. Stradivarius ♪ talk ♪ 09:24, 2 March 2013 (UTC)
* PrefixIndex seems to be the way to go for now. better than a simple search, but still returns a list of RfAs. the only caveat is when a user changes names, but at least it should still return the most recent. Frietjes (talk) 16:42, 2 March 2013 (UTC)
New sub template:Edit counter
I was messing around with some user templates and wanted to add a link to the user edit counter. I created the following sub-template page which does exactly that:
* https://en.wikipedia.org/wiki/Template:User-multi/editct
Could you please add this to https://en.wikipedia.org/wiki/Template:User-multi so that editct shows up as a new parameter? — Preceding unsigned comment added by Little green rosetta (talk • contribs)
* Hi there. Your new template is working fine, for example produces . You might like to add this to the documentation? — Martin (MSGJ · talk) 16:45, 1 April 2013 (UTC)
Lua
Thanks to the hard work of User:Mr. Stradivarius, this template has been switched to Lua, so the interesting stuff now occurs at Module:UserLinks. It's a bit sad, in a way... I was quite happy about this little implementation that I started a couple of years ago and that was extended and improved by MSGJ. But I suppose the new implementation is for the better. — This, that and the other (talk) 11:56, 17 June 2013 (UTC)
* I have to admit that the old version was pretty elegant. I actually used the code as the main model when writing find sources multi. But there is just so much more you can do with Lua, and it's so much faster - it would be a shame not to port all the meta-templates over to it, really. By the way, if anyone has any bug reports or feature requests for Module:UserLinks, please let me know and I'll see what I can do. — Mr. Stradivarius ♪ talk ♪ 08:57, 18 June 2013 (UTC)
Uploads
Can we add a code for a link to a contributors uploads?
Currently I am using usernameexpand and would like to merge what that template does back into a more widely used one. Sfan00 IMG (talk) 15:44, 20 June 2013 (UTC)
* Yes, this should do it. Could an admin please make the required modification to Module:UserLinks, whose talk page redirects here? — This, that and the other (talk) 07:26, 21 June 2013 (UTC)
* Yes check.svg Done. Thanks for the fix. I also fixed the API link for other projects while I was at it. — Mr. Stradivarius ♪ talk ♪ 10:48, 21 June 2013 (UTC)
User name vs Display name.
In response to a TfD on Usernameexpand it was stated that user-multi isn't yet a drop in replacement, because it can't do 'display' names, vs usersnames. It would be appreciated if this could be looked in to. Sfan00 IMG (talk) 08:55, 22 June 2013 (UTC)
Request for duplication of this at Commons
Anyone care to transwiki so there is a copy at Commons? Sfan00 IMG (talk) 09:03, 3 July 2013 (UTC)
Update to Module:UserLinks for edit summaries
Important to responding admin: The module talk page was redirected here and this isn't a request to update the Template:User-multi but a request to update Module:UserLinks . Please ignore the links on the boiler-plate edit protected template.
This sandbox edit replaces "edit summaries" (code es) links. Here is diff. Testcase was implemented in sandbox for Template:User-multi diff here. The result of having the user-multi template sandbox use the userlinks module sandbox gave left/right comparisons of the existing testcases located here. Anything with and 'es' code has old on the left, proposed on the right. Example, go to and check the link for "edit summaries" and it will have the existing version (tparis) on the left and the proposed "Module:UserLinks" sandbox version on the right. I didn't have to update the testcase to do this, but I did it by updating the User-multi/sandbox. This appears to be the intent in the testcase page and I didn't want to remove a bunch of testcases. Let me know if this is not clear. --DHeyward (talk) 01:55, 2 December 2013 (UTC)
* Yes check.svg Done. Thanks for the fix! To specify a page other than the immediate talk subject page, you can just add it as a positional parameter to the edit protected template. This also updates all the links to the page, so it's handy for checking the sandbox and the test cases page. And you have the right idea about the test cases - I wrote them with this kind of scenario in mind, so hopefully it saved you a bit of work. :) — Mr. Stradivarius ♪ talk ♪ 02:14, 2 December 2013 (UTC)
* Yes, it did save time once I figured it out and didn't have to write a module implementation as part of the testcase (I pinged you since you had all the test cases and it seemed what you wanted and I wanted to make sure). I was going to just write the function in the module area but that would have been a few sandboxes and riskier than using the full implementation as it appears in WP. The only thing that didn't make sense was Template:User-multi/sandbox didn't point to the Module:UserLinks/sandbox space originally. I made that change and left it so the template sandbox uses the module sandbox. If there's a reason not to do that, let me know but I couldn't think of a good reason that it shouldn't. I figured a sandbox edit shouldn't break anything. --DHeyward (talk) 02:53, 2 December 2013 (UTC)
* Yes, you were also right to point the template sandbox to Module:UserLinks/sandbox rather than Module:UserLinks. The reason I hadn't done that before is because I was writing the module from scratch; I was testing the module against the old wikicode template, rather than testing the module sandbox against the module. — Mr. Stradivarius ♪ talk ♪ 04:02, 2 December 2013 (UTC)
* Good! I get it and didn't break it. --DHeyward (talk) 04:17, 4 December 2013 (UTC)
Interesting feature: to update the documentation, I had to edit and save without changes to transclude the proper linkfor the 'es' code. I'm not sure where that edit showed up but it fixed. It doesn't seem to be in my edit history so maybe it is a cache issue. --DHeyward (talk) 04:50, 4 December 2013 (UTC)
* Yep, that's a null edit, which will update the links table of that page. That can't be done just by purging. If you don't do a null edit, you have to wait for the job queue to update the page instead. — Mr. Stradivarius ♪ talk ♪ 05:09, 4 December 2013 (UTC)
* The "no credit edit?" Hard to reach the minimum with those. --DHeyward (talk) 06:20, 4 December 2013 (UTC)
Unblock support
Unblock includes quite a few user links which are missing from this module/template. Any objections to adding them, so this module can be deployed into the unblock template? John Vandenberg (chat) 10:59, 20 January 2014 (UTC)
* We should add them, yes. I'd prefer that we do that at the same time as rewriting the module so that we can upgrade everything in one go. (See my comment in the section below.) — Mr. Stradivarius ♪ talk ♪ 13:41, 21 January 2014 (UTC)
PageLinks
I liked so much I copied it for and Page-multi. I havent copied all the complexity, as it was my first Lua coding and I wanted to get it working easily. Ideally, UserLinks extends PageLinks, and the two shouldnt have conflicting linktype codes. John Vandenberg (chat) 12:24, 21 January 2014 (UTC)
* Ah, actually you chose quite a bad module to base your first Lua module on - I've been meaning to rework this one to limit the use of globally-scoped variables, and to make the calculation of the link data more efficient. At the moment it's looking quite spaghettified, and I've been feeling a little embarrassed about it. (Although I suppose it does do the job.) Seeing as it does much the same thing as PageLinks, it would probably be a good idea to split their shared functionality out into a new module so that we aren't duplicating code. Perhaps Module:Link list or something similar. I shall have a think about that. — Mr. Stradivarius ♪ talk ♪ 13:33, 21 January 2014 (UTC)
* Feel free to write PageLinks the way it should be written; I'll watch and learn ;-). My next trick was going to be rewrite PageLinks to extend Module:Page, return it's object with additional hooks added to it. PageLinks should be the base 'class' for all of these, as modules like UserLinks provide more contextual semantics and additional options, but every User is a Page. John Vandenberg (chat) 14:38, 21 January 2014 (UTC)
Protected edit request on 26 March 2014
as requested at Template talk:User2, change local function makeCountLink return '[//tools.wmflabs.org/xtools/pcount/index.php?name=' .. u.usernameHtml .. '&lang=' .. u.toolLang .. '&wiki=' .. u.projectLong .. ' count]' end to local function makeCountLink return '[//tools.wmflabs.org/supercount/index.php?user=' .. u.usernameHtml .. '&project=' .. u.toolLang .. '.' .. u.projectLong .. ' count]' end
Frietjes (talk) 16:23, 26 March 2014 (UTC)
* note, an updated version is in Module:UserLinks/sandbox2, with a demonstration, here
* count link in vs.
* Frietjes (talk) 16:28, 26 March 2014 (UTC)
* Yes check.svg Done. Thanks for the fix! — Mr. Stradivarius ♪ talk ♪ 02:31, 27 March 2014 (UTC)
Span tags
Hello. I am coming from SIGCLEAN and a related TfD, in which we are trying to find a way to substitute a signature after the fact. We're testing variants of User that are more subst-friendly, and may eventually merge one into that template. Since this is a signature, WP:SIGLEN may have some weight in the matter, and there are some span tags being generated from this template that signatures don't usually use. The sandbox for toolbar now has an option to remove the span providing the plainlinks class. That option could be passed through here from User, which does not need that class. If anyone has any comments regarding this possible change, please reply.
Also, we were wondering about the function of the span enclosing the output of this template. It does not seem to apply any styling or have any attributes. (It seems to have been used to apply an id in the past, as other templates did. That was removed in Special:Diff/484515210, but the span tag was left. Originally, there was no span tag.) It doesn't take up much room, and I am not very concerned about it, but thought I'd ask.
Thank you. —PC-XT+ 07:54, 30 March 2014 (UTC)
* I've actually been meaning to rewrite this module for a while, as the code is quite spaghettified. This is a good excuse to finally do it, so I will try and work up some code in the next day or so and report my progress back here. Just passing through the parameter to Module:Toolbar and removing the span tags wouldn't be difficult, but it would probably be better if we applied all the changes to the main module at once. — Mr. Stradivarius ♪ talk ♪ 12:37, 30 March 2014 (UTC)
* Thanks! It does make sense to do it all at once. <span style="font-family: monospace, monospace;">—PC-XT+ 22:00, 30 March 2014 (UTC)
* It's all up live now - all that remains to do is to update the documentation, and convert the other user templates to use safesubst. — <span style="color: #194D00; font-family: Palatino, Times, serif">Mr. Stradivarius ♪ talk ♪ 09:05, 5 April 2014 (UTC)
* It looks great! Thank you for doing all of that, it was a big job! <span style="font-family: monospace, monospace;">—PC-XT+ 07:59, 6 April 2014 (UTC)
Protected edit request on 4 June 2014
Please replace: with so that we can save five characters when this template is used in section headers (which ends up in edit summaries). — {{U|Technical 13}} (e • t • c) 15:29, 4 June 2014 (UTC)
* Yes check.svg Done — <span style="color: #194D00; font-family: Palatino, Times, serif">Mr. Stradivarius ♪ talk ♪ 06:26, 6 June 2014 (UTC)
Feature request
Please can we have a whois link, for use with IP addresses? It would allow me to convert quite a few templates to use this module. — Martin (MSGJ · talk) 11:04, 11 July 2014 (UTC)
https://www.robtex.com/ip/.html#whois has been suggested on Template talk:IPvandal. — Martin (MSGJ · talk) 11:07, 11 July 2014 (UTC)
Another candidates to be added: — Martin (MSGJ · talk) 11:21, 11 July 2014 (UTC)
* https://www.robtex.com/rbls/.html
* Now added with the link code "whois". — <span style="color: #194D00; font-family: Palatino, Times, serif">Mr. Stradivarius ♪ talk ♪ 12:32, 11 July 2014 (UTC)
* Also, what's the rbls link? Give me a link code, a display value, and a short description and I'll add it for you. — <span style="color: #194D00; font-family: Palatino, Times, serif">Mr. Stradivarius ♪ talk ♪ 12:37, 11 July 2014 (UTC)
Thank you.
* RBL - not really sure what it stands for but Template:IPvandal has the link.
* And Template:Proxyip6 has a "Tor" link - but it's not currently working. — Martin (MSGJ · talk) 13:55, 11 July 2014 (UTC)
* Aha, I see it stands for "realtime blacklist". I've added that one as well, with the code "rbl". — <span style="color: #194D00; font-family: Palatino, Times, serif">Mr. Stradivarius ♪ talk ♪ 14:03, 11 July 2014 (UTC)
A few more please: — Martin (MSGJ · talk) 09:27, 17 July 2014 (UTC)
* info Not working properly
* [http:/// http]
* RDNS
* trace Not working
* I've added the two working ones. — <span style="color: #194D00; font-family: Palatino, Times, serif">Mr. Stradivarius ♪ talk ♪ 10:04, 17 July 2014 (UTC)
bh wiki
As of a couple days ago, bh worked in the template. Now it gives an error. It appears to be a valid Wiki, so I'm not sure why it has been removed (or where to turn to find the edit that removed it). Thanks, ThaddeusB (talk) 14:57, 15 May 2015 (UTC)
* See Village pump (technical)/Archive 137, Wikipedia talk:AutoWikiBrowser/Bugs, T91240 and T99059. -- Red rose64 (talk) 16:12, 15 May 2015 (UTC)
* Thanks. --ThaddeusB (talk) 17:27, 15 May 2015 (UTC)
AfC review history code requested
Could a code linking to the user's AfC review history also be added? The tool is here. — Insertcleverphrasehere (or here) 00:26, 27 December 2017 (UTC)
sysop-show
I just wrote Special:Diff/645550026 to wrap "deleted contributions" and "block user" links in sysop-show, since they're completely useless to non-admins. It looks rather hacky because the naïve way of doing it results in extra dots showing up for non-admins. Do you have any comments on it before it goes live? Jackmcbarn (talk) 03:30, 4 February 2015 (UTC)
* it seems that "deleted contributions" and "block user" are not hidden to non-sysops. Was this useful functionality removed at some stage? — Martin (MSGJ · talk) 20:02, 8 September 2020 (UTC)
* I checked using WikiBlame, and it seems it was never added to the main module at all. This makes sense, as Jackmcbarn has never edited the main module. While I'm five and a half years late in replying, it does sound like a good feature that we should implement. — <span style="color: #194D00; font-family: Palatino, Times, serif">Mr. Stradivarius ♪ talk ♪ 15:15, 9 September 2020 (UTC)
* Ah yes I see Jack's edit was to the sandbox. Well this would be good if you can implement. It arose as a request by on Template talk:IPvandal. — Martin (MSGJ · talk) 08:59, 10 September 2020 (UTC)
* Well I read this as a very very slow consensus for a common-sense change. I'd implement it myself, but am not confident enough in my Lua knowledge. Can you take a look? -- Tamzin (she/they) | o toki tawa mi. 12:14, 7 July 2021 (UTC)
* looking at it I'm not sure if people would be happy if this change was made, given there's like four participants here vs hundreds who use this template. Technically this should not be too hard though. Elli (talk | contribs) 15:11, 7 July 2021 (UTC)
* Is it controversial? Basically every template that links to sysop-only features wraps them in . I noticed this because at AIV, IPVandal uses this template but Vandal doesn't (for whatever reason), and thus I see the "block", etc., links on with the CSS highlighting I have for content, but see them unadorned for . In my opinion this is just bringing this template in line with most others, and four (now five) editors commenting is enough; but if you want to leave this open for further discussion (maybe cross-post somewhere), I defer to you. -- Tamzin (she/they) | o toki tawa mi. 15:19, 7 July 2021 (UTC)
No-ping option?
Thoughts on a way to use the template without a ping to the user? 🐶 EpicPupper (he/him | talk) 05:15, 15 January 2022 (UTC)
Template-protected edit request on 5 November 2022
Add preventing a wikilink to the user, using an external link.<span id="Qwerfjkl:1667689293794:Template_talkFTTCLNUser-multi" class="FTTCmt">— Qwerfjkl talk 23:01, 5 November 2022 (UTC)
* Ummm... @Qwerfjkl did you test your changes in the sandbox? I added no ping functionality to the sandbox version of this template. Wait did we do the exact same thing? 🤣 Aasim - Herrscher of Wikis ❄️ 22:05, 9 November 2022 (UTC)
* Red information icon with gradient background.svg Not done for now: Please sort out the desired implementation. Izno (talk) 07:37, 10 November 2022 (UTC)
Template-protected edit request on 9 November 2022
Please implement my changes in the sandbox.
Rationale: it adds the ability to not ping a user in a user link, important for stuff like AIV reporting where pinging would only feed the trolls. Aasim - Herrscher of Wikis ❄️ 22:03, 9 November 2022 (UTC)
* Per above. Please sort out implementation. --Izno (talk) 07:38, 10 November 2022 (UTC)
* @Izno What do you mean? Is there more work that needs to be done on the sandbox? Aasim - Herrscher of Wikis ❄️ 16:04, 10 November 2022 (UTC)
* @Awesome Aasim, noping doesn't seem to work - <span id="Qwerfjkl:1668098593633:Template_talkFTTCLNUser-multi" class="FTTCmt">— Qwerfjkl talk 16:43, 10 November 2022 (UTC)
* See this in the testcases: Aasim - Herrscher of Wikis ❄️ 16:54, 10 November 2022 (UTC)
* Also see if this generates a ping for you: Aasim - Herrscher of Wikis ❄️ 16:57, 10 November 2022 (UTC)
* @Awesome Aasim, oops, I forgot the /sandbox. Nevermind.<span id="Qwerfjkl:1668099858566:Template_talkFTTCLNUser-multi" class="FTTCmt"> — Qwerfjkl talk 17:04, 10 November 2022 (UTC)
* No, the fact there were apparently two different editors with two different implementations at around the same time. If ya'll agree about what you want, feel free to enable one of the tpers. Izno (talk) 20:01, 10 November 2022 (UTC)
* @Izno, I'm sorry, that was a misunderstanding by @Awesome Aasim - I made no implementation.<span id="Qwerfjkl:1668113542651:Template_talkFTTCLNUser-multi" class="FTTCmt"> — Qwerfjkl talk 20:52, 10 November 2022 (UTC)
* Since there appears to be no conflict with my edit I will turn on my edit request. We are only human so misunderstandings happen. Aasim - Herrscher of Wikis ❄️ 21:44, 10 November 2022 (UTC)
* ✅. P.I. Ellsworth  , ed. put'r there 16:48, 11 November 2022 (UTC)
Nuke
I've implemented Special:Nuke for Vandal in the sandbox. If noone objects to this I intend on taking this live in a couple days. --Trialpears (talk) 19:00, 10 January 2023 (UTC)
* It was a long week but this is now ✅. --Trialpears (talk) 03:14, 14 February 2023 (UTC) | WIKI |
Singapore
Geography
Singapore contains the main island and some smaller islands. Singapore is an island south of the Malay Peninsula. The nearest oceans are the Pacific and Indian Oceans. The country is of total area, 719.1 sq km (277.6 sq mi).
History
Chinese and Indians migrated to the island from 2500 B.C. - 1500 B.C. The British grew interest in the country due to its spices brought from the migrators and the trading post of Singapore was founded by Sir Stamford Raffles in 1819. Singapore attained full internal self-government in 1959, and Lee Kuan Yew, a well educated poltician, took the helm as prime minister. On Sept. 16, 1963, Singapore joined Malaysia, Sabah (North Borneo), and Sarawak in the Federation of Malaysia. It resigned and became an independent country in 1965 as Lee Kuan Yew as the prime minister and Yusof bin Ishak as the first president of Singapore.
Under Lee's control, the country became a safe, clean and successful country. But in 1994, Micheal P. Fay, a teen from the United States traveled to Singapore and vandalized many cars. He got four canings, four months in jail and a fine of 3,500 Singapore dollars. Lee Kuan Yew became Senior Minister after Goh Chok Tong became prime minister. The current Prime Minister is Lee Hsien Loong, Lee Kuan Yew's son. The current president is Halimah Yacob. | WIKI |
Talk:MS Kungsholm (1928)
Wartime history
This ship, as John Ericsson, had an extensive wartime history as a major troop ship operating under the War Shipping Administration. The ship was one being considered by Navy for conversion to an escort carrier ("AVG-5: (no USN service). This ship was the Swedish liner Kungsholm (1928), which became the U.S. War Shipping Administration troop transport John Ericsson in 1942") and was briefly allocated to Department of State as a ship for returning Axis diplomatic personnel at the start of the war. She then made a number of notable voyages as a troop transport, once being pressed into service to transport elements of the 101st Airborne when the designated transport suffered a casualty. Palmeira (talk) 04:26, 17 August 2013 (UTC) | WIKI |
What it's like to take Addyi, the first drug for women with low libido
In 2015, the Food and Drug Administration approved the first drug for low libido in women, called Addyi. Two women told Insider how it's changed their lives for the better. In June, the FDA approved another drug for low libido in women, an injectable medication called Vyleesi. It's now available. Some health experts say pharmaceutical options for women with hyposexual desire disorder are long overdue, and others are concerned that they're merely Band-Aids for relationships problems. Here's what to know about both drugs, which work via similar mechanisms and mostly differ in terms of their delivery a daily pill versus an in-the-moment injection. Visit INSIDER's homepage for more.When Kara became disinterested in sex with her husband, she knew their relationship wasn't the problem. "My husband and I are the best of friends, and are as close as anybody could strive for in a committed relationship," said Kara, a 42-year-old who asked that her last name be kept anonymous because she was discussing an intimate issue. She talked to her OB/GYN, who started her on estrogen and gave suggestions about scheduling time to be intimate. "But nothing was working," Kara told Insider. Through internet research, Kara learned about Addyi, the first drug approved by the FDA to treat women with low libido. She asked her doctor about it, but came up short again. The closest physician who could prescribe it was 278 miles away.Kara made the trip about two years ago. She's glad she did."Addyi changed my life," she said, noting she saw a difference within three weeks."My drive went from nonexistent to twice a week, initiated by me. Within three months, I was back on top with my drive," she said. Her only side effect was dizziness if she got up in the middle of the night, but that issue eventually went away.Addyi is no longer the only drug available for women with low libidoApproved in 2015, Addyi comes in pill form and has to be taken daily to be effective. It has been referred to in the media as "the little pink pill" or "female viagra," although that comparison isn't medically accurate.But now Addyi isn't the only drug available for treating sexual desire problems in premenopausal women. In June, the FDA approved Vyleesi, an injectable drug for low libido that a woman takes 45 minutes before sex, Insider previously reported. On August 27, Vyleesi became available to patients, according to a press release. "It is a coup for women that the FDA is recognizing chronically low libido as an important health issue," Dr. Leah Millheiser, director of the female sexual medicine program at Stanford Health Care in California, told Everyday Health. But the introduction of another medication for a complicated problem isn't without criticism. Rachel Wright, a relationship therapist and cofounder of the Wright Wellness Center, previously told Insider the concept may be nothing more than a Band-Aid for bigger relationship-related problems that take a lot of work, not a pill or injection, to deal with effectively."If somebody can take a pill versus doing that hard work of therapy or talking about what's going on, people will do that," she said. "This feels a little like a slippery slope, especially if someone is in an unhealthy relationship and responding to that by not being interested in sex."Read more: The FDA approved what's being called 'Viagra for women,' but an expert says it could be a Band-Aid for unhealthy relationships
Both Addyi and Vyleesi treat hypoactive sexual desire disorder In order for a woman to be prescribed Addyi or Vyleesi, a doctor has to diagnose her with hypoactive sexual desire disorder, urologist Dr. Michael Ingber told Insider. The disorder affects an estimated 1 in 10 women, according to The Society for Women's Health Research, and is defined by feelings of distress because a woman's sex drive isn't as high as it used to be.According to Ingber, "distress" is an important part of the equation, and if a woman isn't bothered by her decreased libido, she doesn't have hypoactive sexual desire disorder. As Wright put it, "it's very subjective compared to other diagnoses, like a panic attack."While doctors can still prescribe the drugs for non-distressed women, they may not be covered by insurance since it would be considered off label, Ingber said.Hypoactive sexual desire disorder shouldn't be confused with an inability to be physically aroused, which is characterized by a lack of blood flow to the vagina and is targeted by Viagra. (While the drug is mostly prescribed to men, research suggests it can help women too.)In contrast, Addyi and Vyleesi treat desire issues, which comes before arousal, Ingber said.Desire, he said, "is the mental aspect of wanting to have sex, so Addyi works in the brain like an antidepressant." Specifically, it works on serotonin receptors, which release the hormone serotonin to create feelings of pleasure. Vyleesi works similarly, though on a different brain receptor. Both drugs have shown to be effective, though not dramatically, in clinical trials. Compared to women on a placebo, about 10% more women on Addyi reported improvements in sexual desire, sexual events, or distress. For women in trials on Vyleesi, about 8% more reported improvements in sexual desire than patients taking a placebo.
Taking a daily pill to boost desire doesn't mean you'll always be turned on It's a common misconception that because Addyi is taken daily, women on it will be in the mood for sex all the time, Ingber said. Dina, another woman who's used the drug, told Insider she believed Addyi would dramatically heighten her sex drive, but it didn't have quite have that effect."It does give me better orgasms – easier and stronger," said Dina, 45, who asked her last name be kept private because she was discussing something so personal. "Prior to Addyi, my husband would want sex and I never wanted it. Now I don't initiate it often, but I don't mind. I don't say 'no' often."It's now been over a year since she started using the drug, and she continues to use it to this day. "I feel like Addyi saved my marriage," she said.Since Vyleesi was only recently made available with a prescription, it remains to be seen how women in the real world will find it affects their desire and orgasms.
Addyi's potentially dangerous interaction with alcohol has kept some women awayWhen Addyi was first released, it came with a warning label indicating users couldn't consume alcohol while taking the daily pill because doing so could lead to low blood pressure and fainting. As a result, many women interested in Addyi decided it wasn't for them, Ingber said. But Addyi has since undergone clinical trials and researchers learned that women who use it can drink moderately without side effects, and as a result, the FDA granted Sprout Pharmaceuticals, Addyi's maker, approval to change the labeling on the drug.Sprout is now in the process of updating those labels to say "women should discontinue drinking alcohol at least two hours before taking Addyi at bedtime or to skip the Addyi dose that evening. Women should not consume alcohol at least until the morning after taking Addyi at bedtime," according to an April 11 press release from the FDA."No longer are women stuck choosing between treatment and a glass of wine," Sprout Pharmaceuticals CEO Cindy Eckhert said in a press release. "Outside of the day we broke through with the first approval in this category, this represents the biggest shift toward greater access for women in need." For Kara, abstaining from alcohol was never an issue, since she and her husband didn't drink anyway. And women like Dina have been drinking all along without a problem. "I take Addyi every night regardless of how many I had to drink," she said, although she typically only drinks one glass. Read more: I used to have sex every day with my partner, but now our sex life has fizzled. Is something wrong with our relationship? There are no warnings about interactions between alcohol and Vyleesi, so women can drink while using the injectable drug.Still, there are other potential side effects of both drugs to keep in mind, including nausea, vomiting, dizziness, and a blood pressure increase, though most of Ingber's patients haven't had any trouble on Addyi, which needs to be taken at bedtime.
The potential for these drugs may be limited by cost For women whose insurance covers Addyi, the cost is $25 a month with the first two months free, according to Addyi's website. Women paying out of pocket will spend $99 a month, also with the first two months free.Vyleesi is $99 with insurance for a six to eight week supply, and the first order is free, according to the Vyleesi website. It's not clear what people will pay without insurance.About six months ago, Kara learned that her pharmacy — which had been charging her $25 per month — could no longer fill her Addyi prescription. "They just said we absolutely cannot get it anymore," Kara said.The shop suggested an online pharmacy that could ship the drug to her house for $100 every month. In the end, Kara decided the cost was too much to balance along with supporting her family and saving for a down payment on a home. "I hope that more research is done for women with libido problems, as it is a major component of who we are," Kara said. "My husband and I keep an open line of communication about this problem and I am thankful for his support, but we are both frustrated." Editor's note: This story was updated on September 10 to clarify details of Addyi's labeling changes. The benefits of sex in your 20s, 30s, 40s, and beyond4 ways you could increase your chances of having an orgasm6 dangerous vagina myths you should stop believing now
Featured Digital Health Articles:
- Telehealth Industry: Benefits, Services & Examples
- Value-Based Care Model: Pay-for-Performance Healthcare
- Senior Care & Assisted Living Market Trends
- Smart Medical Devices: Wearable Tech in Healthcare
- AI in Healthcare
- Remote Patient Monitoring Industry: Devices & Market Trends
Read the original article on INSIDER. Copyright 2019.
Follow INSIDER on Facebook.
Follow INSIDER on Twitter. | NEWS-MULTISOURCE |
Page:United States Statutes at Large Volume 124.djvu/711
124 STAT. 685 PUBLIC LAW 111–148—MAR. 23, 2010 (2) in subsection (d)(3)— (A) in subparagraph (B), by striking ‘‘and’’ at the end; (B) in subparagraph (C), by striking the period at the end and inserting ‘‘; and’’; and (C) by adding at the end the following new subpara- graph: ‘‘(D) the hospital meets the requirements described in subsection (i)(1) not later than 18 months after the date of the enactment of this subparagraph.’’; and (3) by adding at the end the following new subsection: ‘‘(i) REQUIREMENTS FOR HOSPITALS TO QUALIFY FOR RURAL PROVIDER AND HOSPITAL EXCEPTION TO OWNERSHIP OR INVESTMENT PROHIBITION.— ‘‘(1) REQUIREMENTS DESCRIBED.—For purposes of subsection (d)(3)(D), the requirements described in this paragraph for a hospital are as follows: ‘‘(A) PROVIDER AGREEMENT.—The hospital had— ‘‘(i) physician ownership or investment on Feb- ruary 1, 2010; and ‘‘(ii) a provider agreement under section 1866 in effect on such date. ‘‘(B) LIMITATION ON EXPANSION OF FACILITY CAPACITY.— Except as provided in paragraph (3), the number of oper- ating rooms, procedure rooms, and beds for which the hos- pital is licensed at any time on or after the date of the enactment of this subsection is no greater than the number of operating rooms, procedure rooms, and beds for which the hospital is licensed as of such date. ‘‘(C) PREVENTING CONFLICTS OF INTEREST.— ‘‘(i) The hospital submits to the Secretary an annual report containing a detailed description of— ‘‘(I) the identity of each physician owner or investor and any other owners or investors of the hospital; and ‘‘(II) the nature and extent of all ownership and investment interests in the hospital. ‘‘(ii) The hospital has procedures in place to require that any referring physician owner or investor discloses to the patient being referred, by a time that permits the patient to make a meaningful decision regarding the receipt of care, as determined by the Secretary— ‘‘(I) the ownership or investment interest, as applicable, of such referring physician in the hos- pital; and ‘‘(II) if applicable, any such ownership or investment interest of the treating physician. ‘‘(iii) The hospital does not condition any physician ownership or investment interests either directly or indirectly on the physician owner or investor making or influencing referrals to the hospital or otherwise generating business for the hospital. ‘‘(iv) The hospital discloses the fact that the hos- pital is partially owned or invested in by physicians— ‘‘(I) on any public website for the hospital; and ‘‘(II) in any public advertising for the hospital. ‘‘(D) ENSURING BONA FIDE INVESTMENT.— Reports. Deadline. | WIKI |
manpagez: man pages & more
man zic(8)
Home | html | info | man
zic(8) BSD System Manager's Manual zic(8)
NAME
zic -- timezone compiler
SYNOPSIS
zic [--version] [-Dsv] [-d directory] [-g group] [-L leapsecondfilename]
[-l localtime] [-m mode] [-p posixrules] [-u user] [-y command]
[filename ...]
DESCRIPTION
The zic utility reads text from the file(s) named on the command line and
creates the time conversion information files specified in this input.
If a filename is -, the standard input is read.
The following options are available:
--version
Output version information and exit.
-D Do not automatically create directories. If the input file(s)
specify an output file in a directory which does not already
exist, the default behavior is to attempt to create the direc-
tory. If -D is specified, zic will instead error out immedi-
ately.
-d directory
Create time conversion information files in the named directory
rather than in the standard directory named below.
-g group
After creating each output file, change its group ownership to
the specified group (which can be either a name or a numeric
group ID).
-L leapsecondfilename
Read leap second information from the file with the given name.
If this option is not used, no leap second information appears in
output files.
-l timezone
Use the given time zone as local time. The zic utility will act
as if the input contained a link line of the form
Link timezone localtime
(Note that this action has no effect on FreeBSD, since the local
time zone is specified in /etc/localtime and not
/usr/share/zoneinfo/localtime.)
-m mode
After creating each output file, change its access mode to mode.
Both numeric and alphabetic modes are accepted (see chmod(1)).
-p timezone
Use the given time zone's rules when handling POSIX-format time
zone environment variables. The zic utility will act as if the
input contained a link line of the form
Link timezone posixrules
-u user
After creating each output file, change its owner to user (which
can be either a name or a numeric user ID).
-v Complain if a year that appears in a data file is outside the
range of years representable by time(3) values.
-s Limit time values stored in output files to values that are the
same whether they are taken to be signed or unsigned. You can
use this option to generate SVVS-compatible files.
-y command
Use the given command rather than yearistype when checking year
types (see below).
Input lines are made up of fields. Fields are separated from one another
by any number of white space characters. Leading and trailing white
space on input lines is ignored. An unquoted sharp character (#) in the
input introduces a comment which extends to the end of the line the sharp
character appears on. White space characters and sharp characters may be
enclosed in double quotes (") if they are to be used as part of a field.
Any line that is blank (after comment stripping) is ignored. Non-blank
lines are expected to be of one of three types: rule lines, zone lines,
and link lines.
A rule line has the form:
Rule NAME FROM TO TYPE IN ON AT SAVE LETTER/S
For example:
Rule US 1967 1973 - Apr lastSun 2:00 1:00 D
The fields that make up a rule line are:
NAME Give the (arbitrary) name of the set of rules this rule
is part of.
FROM Give the first year in which the rule applies. Any inte-
ger year can be supplied; the Gregorian calendar is
assumed. The word minimum (or an abbreviation) means the
minimum year representable as an integer. The word
maximum (or an abbreviation) means the maximum year rep-
resentable as an integer. Rules can describe times that
are not representable as time values, with the unrepre-
sentable times ignored; this allows rules to be portable
among hosts with differing time value types.
TO Give the final year in which the rule applies. In addi-
tion to minimum and maximum (as above), the word only (or
an abbreviation) may be used to repeat the value of the
FROM field.
TYPE Give the type of year in which the rule applies. If TYPE
is - then the rule applies in all years between FROM and
TO inclusive. If TYPE is something else, then zic exe-
cutes the command yearistype year type to check the type
of a year: an exit status of zero is taken to mean that
the year is of the given type; an exit status of one is
taken to mean that the year is not of the given type.
IN Name the month in which the rule takes effect. Month
names may be abbreviated.
ON Give the day on which the rule takes effect. Recognized
forms include:
5 the fifth of the month
lastSun the last Sunday in the month
lastMon the last Monday in the month
Sun>=8 first Sunday on or after the eighth
Sun<=25 last Sunday on or before the 25th
Names of days of the week may be abbreviated or spelled
out in full. Note that there must be no spaces within
the ON field.
AT Give the time of day at which the rule takes effect.
Recognized forms include:
2 time in hours
2:00 time in hours and minutes
15:00 24-hour format time (for times after noon)
1:28:14 time in hours, minutes, and seconds
where hour 0 is midnight at the start of the day, and
hour 24 is midnight at the end of the day. Any of these
forms may be followed by the letter `w' if the given time
is local ``wall clock'' time, `s' if the given time is
local ``standard'' time, or `u' (or `g' or `z') if the
given time is universal time; in the absence of an indi-
cator, wall clock time is assumed.
SAVE Give the amount of time to be added to local standard
time when the rule is in effect. This field has the same
format as the AT field (although, of course, the `w' and
`s' suffixes are not used).
LETTER/S Give the ``variable part'' (for example, the ``S'' or
``D'' in ``EST'' or ``EDT'') of time zone abbreviations
to be used when this rule is in effect. If this field is
-, the variable part is null.
A zone line has the form:
Zone NAME GMTOFF RULES/SAVE FORMAT [UNTIL]
For example:
Zone Australia/Adelaide 9:30 Aus CST 1971 Oct 31 2:00
The fields that make up a zone line are:
NAME The name of the time zone. This is the name used in creating the
time conversion information file for the zone.
GMTOFF The amount of time to add to UTC to get standard time in this
zone. This field has the same format as the AT and SAVE fields
of rule lines; begin the field with a minus sign if time must be
subtracted from UTC.
RULES/SAVE
The name of the rule(s) that apply in the time zone or, alter-
nately, an amount of time to add to local standard time. If this
field is - then standard time always applies in the time zone.
FORMAT The format for time zone abbreviations in this time zone. The
pair of characters %s is used to show where the ``variable part''
of the time zone abbreviation goes. Alternately, a slash (/)
separates standard and daylight abbreviations.
UNTIL The time at which the UTC offset or the rule(s) change for a
location. It is specified as a year, a month, a day, and a time
of day. If this is specified, the time zone information is gen-
erated from the given UTC offset and rule change until the time
specified. The month, day, and time of day have the same format
as the IN, ON, and AT columns of a rule; trailing columns can be
omitted, and default to the earliest possible value for the miss-
ing columns.
The next line must be a ``continuation'' line; this has the same
form as a zone line except that the string ``Zone'' and the name
are omitted, as the continuation line will place information
starting at the time specified as the UNTIL field in the previous
line in the file used by the previous line. Continuation lines
may contain an UNTIL field, just as zone lines do, indicating
that the next line is a further continuation.
A link line has the form
Link LINK-FROM LINK-TO
For example:
Link Europe/Istanbul Asia/Istanbul
The LINK-FROM field should appear as the NAME field in some zone line;
the LINK-TO field is used as an alternate name for that zone.
Except for continuation lines, lines may appear in any order in the
input.
Lines in the file that describes leap seconds have the following form:
Leap YEAR MONTH DAY HH:MM:SS CORR R/S
For example:
Leap 1974 Dec 31 23:59:60 + S
The YEAR, MONTH, DAY, and HH:MM:SS fields tell when the leap second hap-
pened. The CORR field should be ``+'' if a second was added or ``-'' if
a second was skipped. The R/S field should be (an abbreviation of)
``Stationary'' if the leap second time given by the other fields should
be interpreted as UTC or (an abbreviation of) ``Rolling'' if the leap
second time given by the other fields should be interpreted as local wall
clock time.
NOTE
For areas with more than two types of local time, you may need to use
local standard time in the AT field of the earliest transition time's
rule to ensure that the earliest transition time recorded in the compiled
file is correct.
FILES
/usr/share/zoneinfo standard directory used for created files
SEE ALSO
ctime(3), tzfile(5), zdump(8)
BSD June 20, 2004 BSD
Mac OS X 10.8 - Generated Wed Sep 5 05:15:22 CDT 2012
© manpagez.com 2000-2019
Individual documents may contain additional copyright information. | ESSENTIALAI-STEM |
Sixteen (2013 British film)
SIXTEEN is the debut feature from award-winning director Rob Brown starring Roger Nsengiyumva, Rosie Day, Rachael Stirling, Fady Elsayed, Sam Spruell, and Deon Williams. Sixteen was first premiered at the 2013 BFI London Film Festival. It was nominated for The Sutherland Award for Best Debut Feature, and director Rob Brown was nominated for Best British Newcomer. | WIKI |
توجه: محتویات این صفحه به صورت خودکار پردازش شده و مقالههای نویسندگانی با تشابه اسمی، همگی در بخش یکسان نمایش داده میشوند.
۱Prediction of Aerodynamic Coefficients of a Plunging Airfoil Using Neural Networks
نویسنده(ها): ، ،
اطلاعات انتشار: هفتمین همایش انجمن هوافضای ایران، سال
تعداد صفحات: ۶
Neural networks were used to minimize the amount of data required to predict the aerodynamic coefficients of an airfoil oscillating in plunging motion. For this purpose, series of experimental tests have been conducted on a section of a 660kw wind turbine blade. Two MLP (multi layer perceptron) and GRNN (general regression neural network) were trained using experimental data of the airfoil at various conditions. Results showed that with using only 50% of the acquired data, the trained neural networks were able to predict accurate results with minimal errors when compared with the corresponding measured values. Moreover, these methods can predict the aerodynamic coefficients of the plunging airfoil at different oscillation frequencies, amplitudes, and incidence angles. Therefore with employing this trained networks, the aerodynamic coefficients are predicted accurately with minimum experimental data; hence reducing the cost of tests while achieving acceptable accuracy.<\div>
۲Effects of sulfite waste fibers incorporating silica nano–particles on mechanical and microstructural properties of cementitious composite
اطلاعات انتشار: دومین کنفرانس بین المللی کامپوزیت، سال
تعداد صفحات: ۶
Natural fibers are one of the most appropriate alternatives for designation and production of structural panels due to low final production cost. However a principal point is the strength loss caused by usage of these fibers in the matrix of cement based composites. Hence, a simple and cheap method should be applied to develop the properties of these fibers. Therefore, in this study by application of sulfite waste (along with waste management in the wood and paper industries) and usage of low–dosage silica nanoparticles (in order to enhance the interfacial transition zone of the cement–fiber paste), production of cement based sheets reinforced with natural fibers and silica nano–particles are investigated. Alongside, flexural strength and microstructure of sheets are examined by calculating the Modulus of Rupture (MOR) and Modulus of Elasticity (MOE), and applying the Scanning Electron Microscopy (SEM), respectively. Results show that mechanical performance and microstructure of cement based composites containing waste natural fibers and silica nano–particles can be improved<\div>
۳Experimental Investigation of the Leading–edge Roughness on the Crossflow Instability of a Swept Wing
نویسنده(ها): ، ،
اطلاعات انتشار: دهمین همایش انجمن هوافضای ایران، سال
تعداد صفحات: ۶
An Experimental investigation is conducted to evaluate surface pressure distribution over a semi span swept wing with sweep angle of 33 degrees. The wing section has a laminar flow airfoil similar to that of NACA 6–series airfoils. The tests were conducted at speeds ranging from 50 to 70m\s with and without surface roughness. The differences between pressure distributions on three sections of the wing were are analyzed and the Experimental results showed that addition of surface roughness does not influence the pressure distribution significantly. The spectral analyses were then performed to realize the instability frequencies at each chordwise section<\div>
۴Linear and Nonlinear PSE for Stability Analysis of the Boundary Layer over an Airfoil
نویسنده(ها): ، ، ،
اطلاعات انتشار: دهمین همایش انجمن هوافضای ایران، سال
تعداد صفحات: ۸
An accurate PSE code has been developed to study the stability of incompressible boundary layer over the surface of an arbitrary airfoil. The primitive variable form of the PSE are derived in the body–fitted natural coordinate system and solved by a highly accurate finite–difference method. In the present study, both effects of the basic flow nonparallelism and nonlinear mode interaction are taken into account. Comparisons show good agreement between the results of the present study and those of pervious investigators. To investigate the stability of the boundary layer over an airfoil, the linear propagation of the TS waves and the nonlinear three–dimensional subharmonic instability are analysis for the NACA 0012 airfoil. The nonlinear analysis gives the skin friction rise in the transition region.<\div>
۵Spectral Analysis of Vortex Growth and Breakdown over a Delta Wing
نویسنده(ها): ، ،
اطلاعات انتشار: دهمین همایش انجمن هوافضای ایران، سال
تعداد صفحات: ۶
A series of subsonic wind tunnel tests was carried out on a coplanar wing–canard configuration at an angle of attack range from 10 to 30 degrees. In this experiment, a 60° swept canard was placed in front of a 60° swept main delta wing. The results of surface pressure distribution show that the presence of canard, delays the vortex formation and growth on the wing to some higher angles of attack comparing to the canard–off case. Due to the downwash of the canard, the wing operates at lower effective angles of attack and therefore, the vortex breakdown is delayed. Spectral Analysis is also applied to the time histories of the unsteady wing surface pressure distribution. The power spectrum Results show the existence of narrow, dominant frequency band containing the majority of the fluctuation energy.<\div>
نمایش نتایج ۱ تا ۵ از میان ۵ نتیجه | ESSENTIALAI-STEM |
List of Prisoner characters – prison staff
This is a list of characters in the Australian television series Prisoner, that includes the "prison staff", the series was produced by (the) Reg Grundy Organisation and ran on Network Ten from 1979 until 1986 and was known internationally as Prisoner: Cell Block H in the United States and Britain, and Caged Women in Canada. Listed in order of appearance:
Characters
* Erica Davidson (née Marne) (Patsy King – episodes 1–454), the prison's governor. Davidson was a former barrister (her father and brother were both judges) with political connections and notable events during her Governorship were the arrival of her niece on drug charges, her doomed romance with corrupt businessman Andrew Reynolds, and her kidnap at the request of inmate Andrea Hennessey. A few months after her resignation she returned - working for the department itself - and was highly instrumental in investigating and eventually stopping the first cold regime of temporary governor, Joan Ferguson. In episode 491, we hear Erica has resigned from the department to pursue a career in Canberra.
* Vera Bennett - "Vinegar Tits" (Fiona Spence - episodes 1–224), First seen chasing after Sally Lee down the corridor with Meg Jackson. The acid-tongued senior prison officer aged and embittered beyond her years by caring for her demanding invalid mother. She believed that Erica's and Meg's progressive methods were wrong, and that the prisoners needed discipline and authority. Her stern attitude earned her the nickname "Vinegar Tits". Despite their differences, Vera counted Meg as perhaps her only friend. Although she was rude and harsh, she was not cold like her successor Joan Ferguson. She left after a failed romance with officer Terry Harrison to become Governor of Barnhurst prison, and she was referred to in later years - it is clear that she made an excellent job as Governor of Barnhurst, as she still holds this position in the final year of the series. (She is mentioned after The Fire and Riot at Barnhurst, which marks the end of an era; Bea Smith's death)
* Meg Jackson (née Coppin, Morris) (Elspeth Ballantyne - episodes 1–692), born as Margaret Coppin, is one of the prison's senior officers. Born in a prison herself, Jackson was often sympathetic to inmate needs, hoping to rehabilitate the prisoners, though she was no pushover. Despite their vast differences in prison ideology, she and Vera Bennett were friends. The departures of inmates Bea Smith in September 1983 and Lizzie Birdsworth in February 1984 left Meg as the show's only remaining original cast member. Meg continued until the end of the series, making her the only original character to last the entire run. Meg had a heated rivalry with cold guard Joan "The Freak" Ferguson, which stemmed from Meg's stint in Wentworth as a prisoner: Meg's brief stint inside for contempt of court had confirmed her suspicions about The Freak's coldness. Meg had many failed romances. Meg was also friendly with fellow guards Colleen Powell, Joyce Barry and Dennis Cruickshank - to whom she became engaged. With exceptions, Meg became deputy governor after Colleen left Wentworth until the end of the series, having originally turned down the post when offered in order to save her marriage. In the final season, Meg was joined by her son, Officer Marty Jackson, who shared his mother's compassion towards the prisoners. Meg also enjoyed a close relationship with aged inmate, Ettie Parslow (Lois Ramsay) after it was discovered that the old dear had nursed her when she was a prison baby. Meg's first husband was killed by Chrissie Latham in a riot and she later married and divorced Bob Morris, the father of an inmate. And Meg was also a prisoner herself in Episode 309. In Episode 522, when it is revealed that prisoner Ettie Parslow nursed Meg as a baby at Barnhurst where Meg was born, Meg's birth name is revealed to be Margaret Coppin.
* Dr. Greg Miller (Barry Quin - episodes 1–110), handsome young prison doctor who had had a relationship with inmate Karen Travers years before she was imprisoned at Wentworth, and finds himself reunited with her when she arrives as a new prisoner in the first episode. During Karen's two-year sentence (less than one year screen time!), the pair become closer, and more distant, at various points. He goes on to have a brief romantic relationship with Meg Jackson, until they eventually agree to just remain close friends. Although his patience is sometimes tested by the prisoners' various escapades (especially by Lizzie often using her heart complaint to steal surgical alcohol or similar such capers), Greg is popular with the prisoners, many of whom treat him as a confidant. Later in the 1979 season, Greg leaves Wentworth to open up his own practice, but with no doctor serving Wentworth and the women near rioting point as a result, he agrees to return there to work on a part-time basis (though, storyline-wise, seems to spend all of his time there and very little at his surgery). When Karen is released near the end of the 1979 season, and ends up running the Halfway House for ex-prisoners, the pair rekindle their romantic relationship, and Greg finally asks Karen to marry him. However, Pat O'Connell's escaped convict son David mistakenly blames Greg for tipping the police off about him going to visit his mother, and plans to shoot Greg; but mistakenly shoots Karen instead. With Karen narrowly escaping death, the pair plan to leave for Queensland, for Karen to recover and Greg to open a new practice there. Greg's last regular appearance comes in episode 86 when he leaves his job at Wentworth; he returns briefly in episodes 107–110 to give evidence at Pat's appeal, during which we hear that Karen and himself have finally married.
* Anne Yates (Kirsty Child - episodes 1-29), a cold officer who does favours for the prisoners in exchange for cash. Is forced to resign after being caught selling contraceptives to Marilyn Mason. A while later, she strikes up a friendship with a lonely Vera on the outside, after a (supposedly) chance meeting in a bar. She subsequently introduces Vera to George Lucas, who turns out to be an underworld kingpin, and whom Vera becomes romantically involved with. When Vera finds that Anne is involved with illegal activities, she breaks off contact, but finds it hard to leave Lucas. When Anne is admitted to Wentworth as a prisoner in on drug charges, she tries to use her influence over Vera to ensure an easy stay. Despised by the other prisoners, both due to her being a former officer, and especially by Bea, who hates drug pushers, she hides from them in a laundry dryer, and dies of suffocation after Vera slams the door shut not realising Yates was hiding inside. Vera later realises that she was the cause of Yates's suffocation, but keeps it to herself. Yates is the officer that can be seen in the end credits sequence doing lock up in the first three episodes.
* Bill Jackson (Don Barker - episodes 2–4), Social Worker who was married to Officer Meg Jackson. Chrissie Latham stabs him with a pair of scissors that only electrician Eddie Cook saw. the women forced him to tell him and it is much to Meg's disgust when the woman use scissors for Chrissie to confess. a few episodes later Franky mentions his death and Doreen replies "oh that wasn't nice. Mr Jackson was a nice man" which proves like his wife he wasn't a push over
* Jean Vernon (Christine Amor - episodes 14–56), a young, idealistic social worker appointed welfare officer at Wentworth. Although well-meaning, she often lets her trust in prisoners get the better of her, putting her in several awkward situations. Notable for driving a white Volkswagen Beetle. The character arrives in episode 14, and gets off to a bad start with Meg, as Jean is effectively taking the place of Meg's murdered husband Bill. However, the pair soon strike up a better relationship, and by episode 20 Jean has moved in with Meg. Jean disappears around episode 33, with mention of how she has taken another position elsewhere; however, the character suddenly reappears in episode 47, working back at Wentworth will no explanation given. During this second stint, Jean (moving back in with Meg) convinces Meg to let Nolene Burke's wayward daughter Leanne move in with them, to try and set her on the straight and narrow; despite Leanne's troublesome behaviour, Jean continually convinces Meg to give her "one more chance". When Leanne is finally arrested for being part of a hold up in episode 56, Jean is then seen moving out of Meg's apartment once again and is gone from the series for good. She's mentioned again in Episode 85 when new social worker Paul Reid comes in to replace her. She's brought up again in Episode 120 when Leanne Burke arrives at Wentworth with a charge of petty larceny and in Episode 124 during a discussion between Paul Reid and Nolene Burke who discuss charity offered to Nolene's mother she refuses to take. When Paul Reid explains to Nolene that he's only trying to help her after Nolene tells him how her family doesn't take charity from anyone, Nolene feels they cause nothing but trouble as she despises Jean for helping Leanne she feels led up to her death at the end of Episode 121 after she's taken to Wentworth.
* Paddy Maguire (Jean Cain - episodes 15–149), Older member of staff who had minor speaking roles in first two series.
* Joyce Edith Barry (later Pringle) (Joy Westmore - episodes 29-692), usually friendly, competent but occasionally a little dim-witted officer who eventually marries the prison chef Mervin Pringle (Ernie Bourne). Possibly best remembered for her kidnap at the hands of Lou Kelly, the brutal bashing at the hands of femme fatale Eve Wilder and her comic moments including her tap dancing classes and her ineptitude. Lou threatened and attacked Joyce whilst she was serving a brief stint as acting governor. She was one of the guards who was trapped in the Rec. room during the infamous Ballinger siege, where she tried to hold things together, but after it was over, she fell apart. Despite her occasional lapses of ineptitude and the fact that she felt ineffective, she cared a lot about the prisoners, although at times she could be firm. She was seen at her best in ep.498 when she was briefly acting Governor during Ann Reynold's kidnapping, standing up to Joan Ferguson with courage and receiving the full support of officer Len Murphy.
* Matthew James "Jim" Fletcher - "Fletch the Letch" (Gerard Maguire - episodes 40-256), the prison's male deputy governor, a stern but generally fair, authoritarian army man who had a tendency to fall in love with some of his more attractive charges, which ensured his nickname - "Fletch the Letch" (given to him by Bea on his very first day!) - stuck. He has been traumatised by killing an unarmed nine-year-old girl in Viet-Nam (a fact he only reveals to the doctor) and the women take advantage of his resulting haemophobia, until he overcomes it. He later resigned to become Governor of Beechmont. He separates from his wife and begins an affair with a remand prisoner who he helped attain bail, but when his wife and two sons come to visit him at a motel where he is living - his enemies (ex soldier Geoff Butler and the husband of one of his girlfriend - brought together by their common hate against Jim Fletcher) plot to kill him by placing a bomb package outside his room. However, one of Fletcher's children opens the bomb-package intended for him, which results in his entire family being killed, but Jim survives without physical damages. Note: When he is in court in episode 150, Jim's full name is given as Matthew James Fletcher; he does not use 'Matthew' commonly, instead going by his middle name.
* Colleen Powell - "PoFace" (Judith McGrath - episodes 48-456), a senior prison officer who rose to prominence after Vera Bennett's departure and was deputy governor for much of Ann Reynolds' administration. Initially making recurring appearances, she was depicted as firm but fair officer, but following the departure of Vera Bennett in 1981, she became a very arrogant and sarcastic officer and militant Union steward, making her unpopular with the inmates and causing some tension among her colleagues, for instance treating inmate Alison Paige dreadfully for simply pushing her and later warring with Meg Morris over the position of deputy governor. Following the arrival of nice, young prisoner Susie Driscoll (Jacqui Gordon) followed by the arrival of much nastier and cold officer Joan Ferguson, Colleen gradually loosened up and reverted to her firm but fair routine. She also eased her relationships with the rest of her colleagues, particularly Meg with whom she became a good friend. However, Colleen's dry, sarcastic sense of humour remained which led the inmates to nickname her "Po-Face." Colleen was left devastated when her husband Patrick and children Jennifer and Robert were killed by a car bomb intended for Rick Manning. This was the last straw for Colleen and she decided she wanted rid of Wentworth forever, so she resigned. Her position of deputy governor was taken over by Meg Morris. On her last day, Judy, Pixie, Myra, Cass and Bobbie give her a memorable goodbye and good luck in the laundry where Pixie gives her a peck on the cheek. In her last memorable scene, she looks back smiling at Wentworth one last time before stepping forward to face a new life.
* Paul Reid (George Mallaby - episodes 85–130), a liberal social worker, who arrives to replace Jean Vernon in episode 85. Initially Paul is rather aloof and very set in his ways, but this soon gives away to a more easy going and likeable persona. He is notable for smoking a pipe in early appearances. A single parent after his wife died, he also has problems at home due to his generally well-meaning but wayward son Tony (John Higginson), who drops out of university and gets in with a group of dope-smoking drop-outs. Their supplier is Sharon Gilmore, who once inside, tries to blackmail Paul over his son, but Paul quickly puts an end to her efforts. Tony is given a good behaviour bond but this is revoked when he gets into a pub brawl trying to protect one of his pregnant friends from the group of drop-outs and is given a sentence to work on a prison farm. In his job at Wentworth, Paul is generally well respected by the women, but won't be taken for a fool. He is particularly key in championing Bea Smith, whom he believes can do much better if given a fair chance. Paul also becomes good friends with Meg, and, amongst other things, helps her in the case over Gail Summers and her abused children. Tony returns in episode 128 and, with a more mature attitude, starts seeking employment, but Paul suddenly vanishes from the series in episode 130, in the middle of both Tony's storyline, and that of Gail. In episode 132, we hear of his abruptly leaving for Adelaide to run a garage with Tony. Note: George Mallaby was forced to abruptly leave the series due to ill health, forcing several of his storylines, which were mid-course, to hastily be reworked and resolved. Mallaby had already written episodes for the series, and continued to do so after his on-screen departure.
* Jock Stewart (Tommy Dysart - episodes 114–258), a sinister, vicious officer who bullies the women. Murdered Sharon Gilmour sparking a long running storyline where Judy Bryant strives for revenge. He later tries to attack Judy 'again' but he falls down a flight of stairs and is paralysed.
* Agnes Forster (Lois Ramsay - episodes 135–140), an aged and rather "eccentric", erratic social worker brought in to replace Paul Reid, who seems more interested in her cat Butchie (which she brings in with her each day) and drinking tea than actually doing any work. She spends little time at the prison and shows little interest in the prisoners and their cases. This soon irks both the staff and prisoners, as she forgets or loses important information, leading to several upsets over arrangements she is supposed to make for inmates, such as losing a letter that would have allowed Lizzie Birdsworth to visit her ailing granddaughter about to go in for an important operation. Vera is against social workers anyway, but even the easy going Meg finds her patience tested by Agnes's erratic work practice. The only one who begins to bond with her is Jim Fletcher, after she tells him of some of the successful cases she worked on when she was in her prime. But as the women start to veto Agnes, Erica tries to convince Ted Douglas to replace her; Douglas tries to change her mind, telling her that Agnes only has a few months left before retiring. Things finally come to a head over the handling of raped Doreen, with Agnes's disgust and interfering that Doreen wants to abort the baby setting off a chain of events that sees Doreen trying to commit suicide. As Erica is about to convince the department to replace Agnes, Agnes - bemused by the claims about her poor work, feeling that the officers have been teaming up against her - resigns.
* Mrs O'Reagan (Christine Calcutt - episodes 135–469), the much put-upon cook at Wentworth. After she is scalded with hot fat by Dot (469), she retires from the series, to be replaced by Ray Proctor.
* Stuart Gillespie (Wynn Roberts - episodes 160–168), a stern departmental overseer who comes to inspect the running of the prison and its security measures, following a number of incidents and escape attempts. His officious attitude and the harsh regimes he introduces antagonise both inmates, and most of the staff. It is his aggressive attitude that is one of the main reasons a bunch of the prisoners make an escape attempt through long-forgotten tunnels running from the prison garden. The escaped Judy makes a videotaped televised statement citing Gillespie as the main reason behind the escape, but is frustrated that his actual name is censored on the broadcast. Governor Davidson too is unhappy with Gillespie's work ethics, and the many complaints she receives about his regimes from her officers (bar Vera), and complains to the department. The women come up with a plot to force Gillespie's resignation - they deliberately let him overhear the planning of a letter by Lizzie, including some trumped up claims, about Gillespie, to the Ombudsman. Gillespie intercepts the letter and opens it, breaking the law, just as Ted Douglas arrives from the department and catches him doing so, forcing Gillespie to resign.
* Sid Humphries (Edward Hepple - episodes 169–226), an elderly man who works as a part-time handyman at Wentworth and develops a romantic attachment with inmate Lizzie Birdsworth, but later dies.
* David Andrews (Serge Lazareff - episodes 171-194 (seen in opening recap of 195)), an idealistic young prison teacher, who has previous been working with troubled youths, who Erica arranges to come to the prison to run classes to try to improve the women's education and give them a better chance on the outside when they are released. Initially he turns to Vera for advice as to handle the women, until he realises that hers might not be the best way to treat the prisoners. Vera also develops a quiet crush on David, and invites him to dinner, but quickly calls it off when she learns that he has a girlfriend. The classes initially meet with a lukewarm reception, with Bea and many of the women feeling that he is preaching to them, but Doreen develops a crush on David, and makes an advance on him just as Officer Fletcher enters the room. Erica eventually agrees that the wrongdoing was on Doreen's part, and the classes continue; Erica herself joins in, to learn pottery, until a clay fight breaks out between the women, ruining Erica's work and sending her storming out. David is also key in picking up on Georgie Baxter's hearing problems, which have held her back all of her life; after Georgie's ears are operated on, he begins trying to teach her to read and write. However, the women have several run-ins with David, including when he puts in a recommendation for Georgie to not yet be released (so that he have time to better educate her), leading to an often frosty working relationship between the prisoners and David and several times boycott the education scheme. However, at other times, David acts as a liaison between the woman and the officers, and later on in his stint at the prison becomes an unofficial confidant of Bea's regarding prison regulations. But when David tries to arrange for Bea to be the first prisoner to learn how to prepare braille books for the blind, the necessity of extra officers to stand guard on the proposed new work scheme annoys Vera, who in turn goes to Colleen Powell, who complains to the Union about the extra work. After Powell overhears David quietly advise Bea that the woman have the right to go on strike in the laundry, she insists that he is a security risk working in the prison, forcing David to resign. Despite a sometimes frosty working relationship, Bea and Lizzie are sorry to see him go, believing by the end that his intentions were to help the prisoners.
* Sally Dean (Debra Lawrance - episodes 184–186), a young trainee officer who is lacking confidence and unsure how to conduct herself around the prisoners. Despite words of advice from other officers to find her own way of dealing with the woman, Sally continually listens to Vera's harsh treatment of the prisoners, with Vera adoring the new felt sense of authority and influence over a younger officer. But Sally's attitude quickly gets the women's back up. When Sally overhears a plan for the illiterate Georgie Baxter to memorise a page of a book to try and prove she can read in order to help her release, she exposes it, antagonising the women even further. In retaliation, the women trick her into overhearing a false conversation about drugs being hidden inside some pottery works made in David Andrews' classroom, leading her to enter the room and smash all of the works apart. Erica is furious at the behaviour, but gives Sally another chance, again insisting that Sally must find her own suited way of dealing with the women. But further run-ins with the women over her mock strict attitude to make Sally realise that she is not suited to the job, and hands in her resignation. A parting word from Judy, who is mopping a corridor, tells her that the women would have treated her fairly if only she had shown them a little dignity.
* Terry Harrison (Brian Hannan – episodes 199–223), a male officer and old friend of Jim Fletcher's who is transferred to Wentworth and becomes romantically involved with Vera Bennett. He is also the past ex-husband of prisoner Kathy Hall who arrives at Wentworth in episode 213 along with Dinah Walford. When she receives harmful threats and is bashed, he confronts Kathy about who would have attacked her. He finds out about Dinah who was already out on parole in episode 215 to which the harsh threats on Kathy have ironically stopped. In episode 216, Harrison confronts Walford after looking for her on the street who denies knowing anything about the attack. After visiting her male friend, a pimp, he is later beaten up by more of his friends. As it later turns out, Dinah was responsible for the threats and the attack on Kathy to keep her silent about illegal business going on in a pawn shop she went to one night and witnessed involving Dinah and her friends. Going to the pawn shop to look for answers for Kathy, he threatens the manager who calls in a guy named Harry Bailey who arrives at Vera's apartment with a gun after she comes home and attacks her, looking for Terry. Terry arrives only to be caught in the matter, saved in time by Jim Fletcher who arrives and knocks Bailey unconscious from behind. Involving himself in trouble, this puts an effect on him and Vera's planned marriage to which Vera throws him out of her apartment. He later creates a set up to have Kathy killed on the day of her release from Wentworth as revenge for their troubled relationship, to which she is immediately in a hit-and-run right outside the building in episode 220. In episode 223, Dinah and some of her gangster friends kidnap Terry to have him work for them or else they'll harm Vera. While trying to work out his relationship with Vera, he informs her on Kathy's death which leads to her telling Inspector Grace, who knew Harrison was behind it all along. To her surprise, Grace decides not to do anything as he has other plans for Harrison. He is seen talking to Grace outside the prison by one of Dinah's friends who look at the conversation the wrong way. Like Kathy, he too is killed in a hit-and-run as he is shot from behind by a road just outside Wentworth while trying to reconcile with Vera once more.
* Janet Conway (Kate Sheil - episodes 232–274), a newly trained officer who had previously spent time in Wentworth as a remand prisoner twelve years before. She dates Jim Fletcher, but begins obsessively stalking him after he ends the relationship. She later leaves the prison with new love Ian Mahoney.
* Steve Faulkner (Wayne Jarratt - episodes 245–316), handsome male officer, who had an affair with prisoner Sandy Edwards after being caught inside the prison during a riot. Often seen by the women as a 'good sort' as he often takes any chance to stand up for all signs of injustice. His attempt to bring about the downfall of Joan Ferguson leads to his resignation.
* Ian Mahoney (Peter Curtin - episodes 257–274), brought in to help the inmates with a printing press project. After a brief flirtation with Meg, he becomes romantically involved with Janet Conway and they both eventually leave Wentworth to become married.
* Joan "The Freak" Ferguson (Maggie Kirkpatrick - episodes 287–692), a sinister and cold lesbian prison officer known to the prisoners as "the Freak". Infamous for the body searches she carried out using her trademark black leather gloves. She was pitched as the most coldest, evil and most villainous guard at Wentworth, contrasted sharply by her arch-rival in senior guard, Meg Morris (Jackson). Meg saw Joan as she always had thought she was, when Meg was herself a prisoner. Ferguson also had an ongoing rivalry with ex prison governor Erica Davidson. Joan spent two long stints as Acting Governor - both times she implemented a severe regime that alienated herself from both prisoners and officers alike. Joan became a major character and further episodes began to focus on her personal life such as her relationship with her father, a runaway boy she attempted to adopt and even a failed romance. It was as a villainous prison guard however that "the Freak" was most appreciated, and the majority of her time in the show involved unsuccessful attempts to kill, expose or fire her. She also had a tendency to antagonize her fellow guards, such as when she and Meg battled for the post of deputy governor, which Meg won. In a similar vein she antagonized Meg's predecessor as deputy, Colleen Powell, and a further memorable scene involved being soundly slapped in the face by fellow guard Joyce Barry after she insulted her fiancé, Mervin Pringle. Ferguson's private life contrasted with her sinister nature while on the job and she seemed to have a heart for children and dogs outside the prison and in addition, she cared deeply for her father. Still, her coldness inside the prison never wavered, such as when one prisoner had a baby and Joan sarcastically and provocatively commented to other prisoners, "sweet little thing isn't it ... be a shame if someone had an accident near it with boiling water". Joan was arrested in the last episode in a sting organised by dying inmate Rita Connors as she attempted to retrieve a hidden stash of illicit cash she'd gained wind of in the prison. It was all a set up. The final scene of the series was Joan's transfer to a prison in Western Australia.
* Neil Murray (Adrian Wright - episodes 305–321), a male nurse who takes over medical duties at Wentworth and develops an uncaring attachment to inmate Chrissie Latham. He is shown to have dislikes towards prostitutes like Joan Ferguson. During Murray's time there, two prisoners, Penny Seymour and Tina Gibson (both prostitutes) who are released from Wentworth, are both found dead in an alley on separate nights. The culprit behind the attacks are shown to be a person wearing black gloves. The culprit seemingly appear to be Ferguson at first due to black gloves she has and can be seen wearing. Murray however turns out to be responsible for the murders when Steve Faulkner finds a black glove in his office. After finding out by Meg that Chrissie was a prostitute, Murray arranges her escape by sending her to hospital for tests in episode 315, but he then kidnaps her and she realizes she has got out of her depth. He is later wounded by the police and sent to Woodridge prison where Chrissie has to confront him again when the women go there for the charity concert rehearsals. When he attacks Chrissie once more there, he is declared insane and shipped off to a mental hospital.
* Barry Simmons (Ken James - episodes 337–338), the first new social worker of Wentworth succeeding Agnes Foster after nearly 200 episodes. He is good friends with Meg Morris and is shown to be polite towards the women. When the women lose buy up privileges, Simmons sneaks in a packet of cigarettes to prisoner Paddy Lawson. When Lawson gets caught with them by Joan Ferguson, Ferguson immediately suspects Simmons had slipped them in that day since he was the only visitor. Meg Morris responsible for not giving him a body search which leads to her temporary resignation. Simmons received the shortest stint from any social worker character on the show. By episode 339 the character is written out and his absence is referred to by Erica Davidson who states that he "wasn't working out" as she had hoped.
* John Maxwell (Lachlan McDonald - episodes 356–357), a young prison teacher, who Erica arranges to work at Wentworth to help prisoner Dianne Henley who cannot read. This is the first time in over 150 episodes that there has been a teacher at Wentworth since the departure of David Andrews. Like Andrews, Maxwell's purpose is to try to improve the women's education and give them a better chance on the outside when they are released. He is seen working with other women as well. Unlike Andrews however, Maxwell's stay at Wentworth is extremely brief and did not expand into a much longer storyline.
* Ann "Reyno" Reynolds (Gerda Nicolson - episodes 364–692), who replaced Erica Davidson as governor of the prison. A former social worker, she was a progressive governor, who believed in rehabilitation. She had a rival in Joan Ferguson, who was acting governor in her absence, and she instituted two severe regimes, which angered both prisoners and staff, one of which was stopped by Ann's predecessor, Erica Davidson. Ann suffered breast cancer during her run as governor, failed romances with the eremite Wally Wallace and bickie Dan Moulton and kidnap and persecution at the hands of an angry relative of an ex-prisoner that led to the famous Episode 500 cliffhanger.
* Dr. Scott Collins (Tim Elston - episodes 383–418), a new handsome prison doctor who is secretly in love with prisoner Petra Roberts. During his last appearances at Wentworth he had his suspicions about cold officer David Bridges.
* David Bridges (David Waters - episodes 408–417), a male officer who is sensitive to the women's problems to the point that he begins to systemically "set them free" with the prisoners assuming that he is helping them to escape. His intentions are rather more sinister, as the elderly Lizzie Birdsworth discovers in an end-of-season cliffhanger episode... Cass later beheads him. It turns out that Bridges isn't David's last name, but the name of his first victim.
* Rick Manning (Andy Anderson - episodes 421–458), a tough male officer who had previously been in the police force. Eddie Stevens' gang hunted him down and attempted to kill him and wound up killing the family of Rick's colleague Colleen Powell in the process. He later fell in love with the young Rachel Milsom but the relationship ended after Rachel was imprisoned for running down the man who killed her father. He left Wentworth to work as a juvenile crime counsellor.
* Stanley "Stan The Man" Dobson (Brian James - episodes 425–513), an elderly prison officer who worked at Wentworth before his retirement. Bobbie would always refer to him as "Stan the Man". Stan later returned to Wentworth as a general handyman, but shortly afterwards suffered a heart attack, after his recovery Stan and his wife Edie apply for prisoner Bobbie Mitchell to come and live with them and visit Wentworth to speak to Ann before the parole hearing.
* Jonathan Edmonds (Bryan Marshall - episodes 448–455), a psychologist granted permission to conduct research at Wentworth, whose activities take a sinister turn when they involve experiments in mind control through hypnosis.
* Dennis Cruickshank - "The Yorkshire Pud" (Nigel Bradshaw - episodes 457–560), a Yorkshireman who had worked in borstals in England before arriving at Wentworth as an officer, falling in love with fellow officer Heather Rodgers. He was suspended for breaking a strike and returned to England with his wife, leaving Rodgers, but later came back to Wentworth and became engaged to Meg Morris. He was tracked down by prisoner Frank Burke, and shot, leaving him paralysed. He left Meg and left the series shortly after. He was mentioned a couple of times after his departure. Last mentioned in 590 where Meg mentions he doesn't write as much any more.
* Heather Rodgers (Victoria Nicholls - episodes 461–484), a well-meaning but naive "rookie" officer straight out of training school and a former school friend of prisoner Marlene Warren. She had a brief romance with officer Dennis Cruickshank but it fizzled out after Dennis' suspension for breaking a strike. She was also involved in an attempt to expose Joan Ferguson and get her dismissed which initially succeeded until the strike was called. Shortly after, she was sacked by Ann Reynolds and left the prison after another scheme she took part in to expose Ferguson completely backfired. She is mentioned again when Dennis returns, saying that her mother doesn't even know where she is.
* Raymond "Auntie Ray" Proctor (Alex Menglet - episodes 471–506), succeeded Mrs. O'Reagan as the prison's cook/chef and was one of the few openly gay, male characters. He was not seen after episode 506 but was referred to through to episode 521 when it was revealed he had been sacked.
* Patricia "Pat" Slattery (Dorothy Cutts - episodes 473–690), sarcastic recurring officer. She is accused of fixing the books at Wentworth and is suspended from duty, however Ann Reynolds realises the scam had been going on for years before Pat started. She is re-instated when it is realised the true culprit was 'Head Of The Department', Geoffrey Chaucer.
* Phil Cleary (Steve Kuhn - episodes 475–498), an American social worker who is introduced during prison strike, and knows prisoner Bobbie Mitchell. He also tries to have a relationship with Meg Morris who rejects him. He is shot by Brian Lowe, the boyfriend of prisoner Phyllis Hunt in revenge towards Ann Reynolds he feels is the blame for her bashing and causing her brain damage. After his death, Meg feels remorse about it and wish she could have worked something out with Phil.
* Leonard Edwin/Edward/Arthur "Len" Murphy - "Chuckles" (Maurie Fields - episodes 493–511), a former officer at Woodridge men's prison, Len was a sinister, homophobic, murderous male counterpart to "The Freak". He told Judy Bryant to her face that she was "a filthy detestable lesbian animal". The women were first warned about him by Stan Dobson who had worked with him at Woodridge. Carried out the multiple rapes of Lou Kelly. His evil nature caused Joan Ferguson, Judy Bryant and Myra Desmond to unusually work together and set Len up for the rape of Pixie Mason. Their set up was successful and Len is last seen when Joan is visiting Len in an overnight jail cell.
* Mervin John "Merv The Perv" Pringle (Ernie Bourne - episodes 523–691), prison cook well liked by the women. Fell in love with and married officer Joyce Barry.
* Pippa Reynolds (Christine Harris - episodes 540–604), Governor Ann Reynolds' spirited, fashion-conscious daughter who teaches an art class at Wentworth and starts a tempestuous relationship with lawyer Ben Fulbright.
* Terri Malone (Margot Knight - episodes 540–576), bisexual young officer who temporarily became Joan Ferguson's live-in lover.
* Geoffrey Chaucer (Roy Bauldwin - episodes 558–568), Head Of The department who attempts to falsely accuse Officer Pat Slattery of 'fixing the books' at Wentworth. Ann Reynolds realises the scam had been going on for many years before Pat started. When Ann confronts Mr. Chaucer as the real culprit, he threatens to plant evidence against her.
* Dr. Steve Ryan (Peter Hayes - episodes 592–628), a well-meaning doctor who secretly conducts research at Wentworth posing as a general handyman and subsequently falls in love with young Julie Egbert.
* Bob Moran (Peter Adams - episodes 595–620), a tough Vietnam veteran who is Acting Governor during one of the most violent periods in the series. including the great riot of 600. He resigned during his period as an officer.
* Marty Jackson (Michael Winchester - episodes 625–692), the son of Meg Jackson, who had followed his mother into the prison officers' profession and shared her compassionate attitude towards the women, although, like his mother, he wasn't a pushover either. (Note: The character of Marty Jackson had appeared in the series on two previous occasions. He was played by Ronald Korosy during the opening episodes and by Andrew McKaige for two stints during the 1983 run.)
* Rodney Adams (Philip Hyde - episodes 630–692), an evil, sinister and nasty trainee officer who thinks he is great at his job but is generally despised by both prisoners and staff. He tries to rule Wentworth with an iron fist but is seen as a complete joke by the women (and most of the staff!). He is made a fool of many times by the inmates.
* Delia Stout (Desirée Smith - episodes 630–679), dedicated trainee officer who was seen as a soft touch by the women but she was a hard working and compassionate officer. Delia harbours a secret crush on colleague Marty Jackson. She vanished from the show without any explanation. The reason being that Desirée Smith's contract was not renewed and she was meant to have been given an exit storyline but due to the announcement that the series was being axed for good coming around the same time, scripts had to be suddenly re-worked and Delia's exit was dropped because of this. She is however mentioned by Marty Jackson in episode 686 in regards to helping him start decorating his apartment hinting that Delia is still around despite not being seen.
* Pamela Madigan (Justine Saunders - episodes 653–668), an aboriginal social worker working with Sarah West and an old friend of governor Ann Reynolds.
* Terry Walters (Bruce Kilpatrick - episodes 665–677), Officer at Blackmoor. He is taken hostage during riot, and exchanged for Bongo, witnessing Craven's double-crossing of Rita and his order that Bongo be shot. He is traced by Phil Clayton and "persuaded" by Ann to appear on "City Probe" to discredit Craven after his death.
* Ernest Craven (Ray Meagher - episodes 665–672), (Ray Meagher's 3rd role in the series) the Governor of corrupt neighbouring high security prison "Blackmoor". Transferred to Wentworth after Rita burnt down Blackmoor. his vow to kill Rita was almost taken through with but failed. at the same time he was blackmailing Lorelei to lag on the prisoners so he could discover what their plans were. Rita asked Lorelei to hide the knife she attempted to kill him with but she failed to when Craven's last threat was made to blackmail her because of the alarm they used to find out when Craven was attacking Rita. She stabbed him and he staggered through the corridors until dying in front of the prisoners, Joan Ferguson and Meg Morris but he still made one more lunge for Rita.
* Tom Lucas (John McTernan - episodes 687–692), maverick teacher who arrives at Wentworth to tutor the women, forming particularly strong friendships with prisoners Merle Jones and Kath Maxwell. | WIKI |
Patents Assigned to Scanera S.C.
• Patent number: 5638119
Abstract: A device for increasing the dynamic range of a camera comprising a lens (2) which forms a picture (6) of a scene (1) on a primary electronic image sensor (3) having a first dynamic range, a second image data source (4) corresponding to one picture of said scene (1), and an electronic image processing circuit (5), which combines the data from the primary image sensor (3) and the data from the second image data source (4) and provides image data representing the scene (1) as observed and represented by said image data, with a ratio between the brightest and dimmest areas of said scene (1) which is greater than the dynamic range of a primary image sensor (3). In various embodiments, the second image data source (4) is either a secondary image sensor or a memory which stores a previously sensed image from the primary image sensor (3).
Type: Grant
Filed: August 17, 1992
Date of Patent: June 10, 1997
Assignee: Scanera S.C.
Inventor: Georges Cornuejols
• Patent number: 5051770
Abstract: An image processing device having at least an image sensor, a flat image transfer screen and a computer, characterized by a sensor (3) arranged as a first network of image points or pixels, an analysis device (6, 4) adapted to generate for each pixel of the sensor a signal representative of at least one parameter, and at least a flat screen (18, 20, 25) organized according to a network of image points or pixels in association with processing means (5, 9) intended to elaborate for each pixel of the screen a state control signal which is a function of the representative signals delivered by the analysis means, the sensor and the screen receiving images of same objects, these images being transmitted or reflected by the screen. The device is more particularly suited to be used in the photographic industry.
Type: Grant
Filed: April 30, 1990
Date of Patent: September 24, 1991
Assignee: Scanera S.C.
Inventor: Georges Cornuejols | ESSENTIALAI-STEM |
New contraceptive vaginal ring prevents pregnancy for a year, gives women more control
(Reuters Health) - A new contraceptive vaginal ring prevents pregnancy for a year and allows women to have complete control over conception, according to a report that details the results of two clinical trials testing the safety and efficacy of the device. While the device may become a real convenience for American women, its global impact may be even larger since it will offer women who have little access to pharmacies or electricity for refrigerators the ability to decide when they wish to become pregnant. “This is a very exciting addition to the options for women to prevent unintended pregnancy,” said study coauthor Dr. Erika Banks, vice-chair of obstetrics and gynecology at the Albert Einstein and Montefiore Medical Center. “The advantages are huge in that women don’t have to go to the pharmacy every month and don’t have to have a refrigerator to store them in. Patients loved it.” Other contraceptive rings don’t last as long and do need to be stored in refrigerators. The new ring-shaped device is made of soft plastic and is around two inches in diameter. It prevents pregnancy through the slow release of the hormones progesterone and estrogen, in forms that don’t need to be refrigerated, Banks explained. “They are flexible and you can pinch the sides together and push them up into the vagina,” she added. “Once inside, it gets to be whatever shape the vagina is.” Dubbed Annovera, the device was developed by the nonprofit Population Council and was approved by the Food and Drug Administration in August 2018. It will be sold in the U.S. market by TherapeuticsMD, Inc., starting later this year or in 2020. The company has not announced the price of Annovera but has agreed to provide significantly reduced pricing to family planning clinics serving lower-income women. The Population Council is planning to make the device available to women in developing countries, which was the main audience it was designed for, said coauthor Ruth Merkatz, director of clinical development at the Population Council. One strategy may be “trying to get companies in other parts of the world licensed to make it,” Merkatz said. “Our whole focus was women in the developing world. That’s why we worked so hard to develop it. It’s not easy to formulate a contraceptive - or any medication - with enough medication in it to last a full year and be effective without the need for refrigeration.” While women are told they can take the rings out for two hours at a time, presumably for intercourse, “you can wear them while having sex,” Banks said. “Men don’t notice when they’re in there and the few who do notice it doesn’t seem to bother.” The new device was tested in two large, identically designed trials, one at 15 U.S. academic and community sites and one at 12 U.S. and international academic and community sites. As reported in The Lancet Global Health, the trials were run between 2006 and 2009. The 2,265 participants, ages 18 to 40, were told they should wear the rings for 21 days and take them out for seven, thus mimicking the normal menstrual cycle. They were also told they could periodically take the rings out, but for no more than two hours at a time, since the efficacy of the contraceptive might be affected if the rings were removed for longer periods. When the data from the trials were analyzed, the device turned out to be 97.5% effective, meaning that if 1,000 women used the device, 25 could become pregnant. The researchers followed up on 290 of the women and found that all had started to menstruate normally once they stopped using the rings, and 24 of the 38 who had wanted to become pregnant did so within six months of ring removal. The new study did not report on side effects from the ring. The new device is “fantastic,” said Dr. Leena Nathan, an assistant clinical professor of obstetrics and gynecology at UCLA Health in Los Angeles. “I would offer this to my patients and encourage them to give it a try.” A big advantage is that women don’t have to think about it once it’s inserted and they don’t need a doctor to insert it, Nathan said. “And it’s pretty easy to stop. If the woman doesn’t like it she can just pull it out.” “It’s awesome that it works for a full year,” Nathan said. “This will change the landscape for us.” SOURCE: bit.ly/2YUWR7V and bit.ly/2YUX5vN Lancet Global Health, online June 20, 2019. | NEWS-MULTISOURCE |
Newmarket Hotel
Newmarket Hotel is a heritage-listed former hotel in Hamilton Hill, Western Australia.
Located at the corner of Rockingham Road and Cockburn Road, it was built in 1912, and operated as a hotel until the late 1990s.
It has sometimes been referred to as being in South Fremantle, and at other times, Hamilton Hill.
The hotel was often chosen as a terminating point for cycling events. It was also named as a tram line extension point, and was a local focal point for the horse racing industry. The hotel was a filming location in the 1991 cult film Black Neon.
Change in lease/management was regular during its operational years.
After being vacant for 18 years, it was renovated and reopened in 2017 as Hamilton House, a dance studio for the Swan River Ballet school. | WIKI |
Anna Sentina
Anna Sentina (born September 16, 1994) is an American musician, multi-instrumentalist, best known for her work as a session bass guitarist, live performer and YouTube celebrity. She has performed around the U.S. at venues such as the world-famous Whisky a Go Go, the Viper Room, the Mint, SOMA San Diego, the Hard Rock Cafe and the House of Blues. In 2012, Sentina started a YouTube music channel that by October 2015 had over 21 million views and by July 2021 had over 55 million views.
Life
Anna Sentina is from San Diego, California and is of Italian, Spanish, and Venezuelan descent. She began her study of music at the age of 8, when she was classically trained in piano. At the age of 12, she started studying the guitar at School of Rock in Vista, California, and at 15 took up the bass.
At 14, Sentina went on her first United States tour with the School of Rock All-Stars, where students from each School of Rock in the United States are hand chosen to form a band and tour. She was chosen to tour with the All-Stars again at 15.
In 2009, Sentina performed at the 40th Anniversary of Woodstock reunion in San Diego, California where she performed several songs played at 1969 Woodstock, as well as a solo performance of Jimi Hendrix's "Star-Spangled Banner".
After parting ways with the School of Rock at 16, Sentina formed a metal band with her twin brother, Ricky Sentina, where they performed several shows in the Southern California area.
In 2011, Sentina joined the Summer Shot program at Musicians Institute in Los Angeles, California, where she further studied bass and live performance. She also landed a role in the live musical Fame as "Lambchops."
In 2012, Sentina started her YouTube channel, posting several cover videos on guitar, bass, and piano of popular metal and rock songs and becoming a YouTube Partner at the age of 19 in 2014.
Also in 2014, Sentina formally enrolled in the Musicians Institute and joined the bass program. She began work as a demo musician, creating several demonstration videos of amps, pedals, and instruments and performing live at the NAMM Show and Bass Player magazine's event Bass Player Live for her various endorsers. The videos have been featured on sites and magazines like Guitar World and Bass Musician world Sentina is one of Roland's featured guitar artists, alongside other musicians such as Marty Friedman (ex-Megadeth) and Gus G (Ozzy Osbourne).
In February 2015, Sentina was a part of Converse's Rubber Tracks Sample Library, recording several hours' worth of loops available for free use by musicians globally. Later on in 2015, Esquire magazine named Sentina "A Badass Musician We Love on Instagram."
In November 2015, Sentina's cover of "Seinfeld Theme Song" was posted by the online version of Sports Illustrated.
Sentina was involved in projects with America's Got Talent finalists Emil and Dariel and Candlebox's Kevin Martin.
Presently, Sentina is involved in a heavy metal band called FLOOD, featuring former Tourniquet members guitarists Gary Lenaire and Erik Mendez and vocalist Guy Ritter, as well as Extol drummer David Husvik.
Instruments
* Kiesel Icon IC5
* Kiesel Vanquish V49K
* Kiesel Vanquish V59K
* Kiesel Xccelerator X44
* Kiesel Vader Headless Bass
* Kiesel CT624 Carved Top
* Roland FA-08 Workstation
* Roland KR-3 Piano
Pedals
* BOSS RC-3 Loop Station
* BOSS ODB-3 Bass Overdrive
* BOSS BB-1X Bass Overdrive
* BOSS GEB-7 Bass Equalizer
* BOSS SYB-5 Bass Synthesizer
* BOSS OC-3 Super Octave
* BOSS LMB-3 Bass Limiter Enhancer
* BOSS CEB-3 Bass Chorus | WIKI |
WFKJ
WFKJ is a Christian radio station licensed to Cashtown, Pennsylvania, broadcasting on 890 kHz AM. The station which only operates during daytime hours serves Gettysburg metropolitan area and is owned by Jesus Is Lord Ministries International. WFKJ's programming consists of Christian talk and teaching along with Christian music, with a portion of its programming from the Oasis Radio Network.
By day, WFKJ is powered at 890 watts, using a non-directional antenna. But because 890 AM is a clear channel frequency reserved for Class A WLS in Chicago, WFKJ must sign off at night to avoid interference. | WIKI |
Verna H. DORAN, William E. Doran and Verna H. Doran dba Plasti-Personalities, a sole proprietorship, Plaintiffs, v. SUNSET HOUSE DISTRIBUTING CORP., a corporation, and American Cover Co., Inc., a corporation, Defendants.
No. 1342-60.
United States District Court S. D. California, Central Division.
Sept. 20, 1961.
Richard F. Carr, William E. Moore, Los Angeles, Cal., for plaintiffs.
Vaughan, Brandlin & Baggot and Marvin A. Freeman, Attorneys, Los Angeles, Cal., for defendants.
BYRNE, District Judge.
Plaintiffs filed their complaint in two counts for copyright infringement and unfair competition, invoking the court’s jurisdiction under the copyright laws of the United States, Title 17 U.S.C.A. § 1 et seq., and under Title 28 U.S.C.A. §§ 1338(a) and 1338(b).
In the first count, plaintiffs state that they are the authors and proprietors of a work of art, namely a Santa Claus figure, for which they obtained copyright registration on August 28, 1959. It is alleged that since this date the defendants, and each of them, have infringed plaintiffs’ copyright by manufacturing, publishing and placing upon the market a Santa Claus figure which defendants copied largely from plaintiffs’ copyrighted work of art without plaintiffs’ consent.
The second count alleges a cause of action for unfair competition under California law.
When assembled and stuffed with crumpled newspaper, plaintiffs’ Santa Claus figure is three-dimensional and approximately five feet six inches in height. This figure is designed to be used as a Christmas decoration and may be placed either inside or outside of the home.
The major component of plaintiffs’ Santa Claus is a large bag cut from red plastic material, sewn together, and provided with a slit in the back for the insertion of crumpled newspaper. This bag is cut from an appropriate pattern so that it defines the arms, legs and torso of a human form. White trim is utilized at the end of the arms to give the appearance of mittens, while black plastic at the end of the legs serves as boots. At the top of the torso, a smaller bag is included to represent the head.
The second component of plaintiffs’ Santa Claus consists of a face and hood, which are slipped over the head of the figure.
Finally, a tunic snapped around the waist performs the dual function of providing the illusion of a coat and of holding in the stuffing. A square molded belt buckle, inscribed with scroll work and including a central opening, is attached to the top of the tunic. At the bottom' is a horizontal white plastic stripe representing fur trim.
Plaintiffs package their Santa Claus figure for sale in a transparent plastic bag accompanied by an instruction sheet for the construction of a simple wire frame to hold the figure erect in a standing position. Plaintiffs’ trademark and trade name, “Plasti-Personalities”, appears on this sheet, and is also printed-on other descriptive material included in the package.
Plaintiffs have sold their product since 1958. The distributors of plaintiffs’ Santa advertised the product extensively in newspapers. Each ad showed Santa in a pose depicting its use as a Christmas decoration.
During the year 1960, defendant American Cover Co., Inc., commenced the manufacture of its Santa Claus figure, which was sold to the retail trade by defendant Sunset House Distributing Corp. This included sales through nationally distributed mail order catalogues and through retail stores. In addition, there were some sales by representatives of American Cover Co.
The Santa Claus figure produced by defendant American Cover is, like plaintiffs’ product, made of plastic and life-sized. Defendants concede that their Santa Claus has many mechanical features “not dissimilar” to those of plaintiffs’ Santa. It, too, has a mask and hood, and a tunic with a black belt at the top and a horizontal white stripe at the bottom. It utilizes an aperture at the back for inserting newspaper stuffing, a sleeve as a receptacle for a slat or yardstick to hold the head erect, and a tunic to hold the stuffing inside.
However, there are certain differences between defendants’ Santa Claus and that of plaintiffs. Defendants did not use a molded belt buckle, but instead cut a more simple item from flat sheet plastic having a somewhat different form and appearance from that of plaintiffs’ belt buckle. Also, the face for defendants’ unit is a fabric mask, while the hood is of cloth instead of plastic.
Defendants sold their Santa Claus figure in a transparent plastic bag similar to plaintiffs' package. The first shipment of Santas received for distribution from American Cover included an instruction sheet bearing the name “Plasti-Personalities”. Officials of defendant American Cover have no explanation as to how this name came to appear on their instruction sheet.
In the promotion of defendants’ Santa Claus figure, defendant Sunset House distributed a catalogue and published newspaper advertisements. These advertisements depicted Santa perched on a roof gable much the same as the illustrations in the ‘earlier ads for plaintiffs’ product. The language in defendants’ ads followed a similar format to those of plaintiffs. The price, however, was $6.98 instead of the $7.95 cost of plaintiffs’ Santa Claus.
Although the witnesses failed to recall all the events leading up to the production and sale of defendants’ Santa Claus figure, representatives of both defendants conceded that they had been inspired by plaintiffs’ product. Mr. Tashman of defendant American Cover admitted having obtained one of plaintiffs’ Santa Claus figures and testified that it might have been secured from Mr. Carlson of defendant Sunset House. At any rate, Mr. Tashman was asked by Mr. Carlson to produce a Santa Claus figure such as that manufactured by plaintiffs, and such as Mr. Carlson had observed in the advertisements of plaintiffs’ product.
The evidence established that in 1960, the first year defendants’ product appeared, plaintiffs sold approximately 2,-000 fewer of their Santas than in the preceding year.
Plaintiffs’ Santa Claus was copyrighted as a work of art, or a model or design for a work of art, as provided in 17 U.S.C.A. § 5(g).
' Defendants contend that plaintiffs’ copyright is invalid for two reasons.
First, they argue that since Santa Claus is in the public domain, a work of art embodying this legendary figure cannot be the subject of a valid copyright.
Unlike the subject matter of a patent, copyrighted material need not be new, but only original. Stein v. Mazer, 4 Cir., 1953, 204 F.2d 472, affirmed 1954, 347 U.S. 201, 74 S.Ct. 460, 98 L.Ed. 630; Ricker v. General Electric Co., 2 Cir., 1947, 162 F.2d 141. “Originality” in the realm of copyright refers to the form of the expression, and not to the novelty of the subject matter. Chamberlin v. Uris Sales Corporation, 2 Cir., 1945, 150 F.2d 512; Silvers v. Russell, D.C.S.D.Cal.1953, 113 F.Supp. 119. This is necessarily so because a copyright protects only the expression of the idea, not the idea itself. Mazer v. Stein, 1954, 347 U.S. 201, 74 S. Ct. 460, 98 L.Ed. 630; Kalem Co. v. Harper Bros., 1911, 222 U.S. 55, 32 S.Ct. 20, 56 L.Ed. 92; Holmes v. Hurst, 1899, 174 U.S. 82, 19 S.Ct. 606, 43 L.Ed. 904; Kaeser & Blair, Inc., v. Merchants’ Ass’n, 6 Cir., 1933, 64 F.2d 575.
The fact that a copyrighted article depicts a figure, theme or idea in the public domain, does not in itself void the copyright. Rather, the test of copyrightability must be the form which the author has used to express the figure, idea or theme. In the instant case, plaintiffs have reproduced the familiar figure of Santa Claus in a three-dimensional, plastic form. Therefore, the question is whether this medium of expression is sufficiently original to support the granting of the copyright.
To be copyrightable, a work must be “original” in that the author has created it by his own skill, labor and judgment. Dorsey v. Old Surety Life Ins. Co., 10 Cir., 1938, 98 F.2d 872, 119 A.L.R. 1250; Smith v. George E. Muehlebach Brewing Co., D.C.W.D.Mo.1956, 140 F. Supp. 729. As stated in Alfred Bell & Co. v. Catalda Fine Arts, 2 Cir., 1951, 191 F.2d 99, 102.
“ * * * ‘Original’ in reference to a copyrighted work means that the particular work ‘owes its origin’ to the ‘author.’ No large measure of novelty is necessary. * * *
“ * * * All that is needed to satisfy both the Constitution and the statute is that the ‘author’ contributed something more than a ‘merely trivial’ variation, something recognizably ‘his own.’ Originality in this context ‘means little more than a prohibition of actual copying.’ No matter how poor artistically the ‘author’s’ addition, it is enough if it be his own. Bleistein v. Donaldson Lithographing Co., 188 U.S. 239, 250, 23 S.Ct. 298, 47 L.Ed. 460.”
Thus, it appears that the requirements for the “originality” necessary to support a copyright are modest. The author must have created the work by his own skill, labor and judgment, contributing something “recognizably his own” to prior treatments of the same subject. However, neither great novelty nor superior artistic quality is required.
Here, plaintiffs first envisioned, and then created by their own skill, labor and judgment, a Santa Claus in the form of a three-dimensional figure made of plastic. These features are part and parcel of the “idea” of Santa Claus, and hence are not copyrightable. However, the originality here lies in the form —three-dimensional—and the medium— plastic — which plaintiffs have used to express the idea of Santa Claus. As far as the record reveals, plaintiffs were the first to reproduce the traditional character in this particular form and medium. It may truly be said that plaintiffs’ Santa Claus, as copyrighted, owes its origin.to its authors.
Therefore, laying aside the purely functional features which plaintiffs concede are not subject to copyright protection, plaintiffs’ Santa is “original” because of its form and medium, and this originality is sufficient to form the basis of a valid copyright.
Defendants’ second attack upon the validity of plaintiffs’ copyright is that plaintiffs’ product is not a work of art at all, but rather a garment. Presumably, this attack is based upon the premise that the utilitarian aspects of an item preclude its copyrightability as a work of art.
In the first place, it may well be doubted whether plaintiffs’ Santa Claus is actually a garment, as defendants assert. This figure was intended for use as a Christmas decoration, and the copyright was granted on the basis of a photograph submitted to the Registrar of Copyrights showing plaintiffs’ Santa Claus in its three-dimensional form. Moreover, “garment” is defined by Webster as “Any article of clothing.” Plaintiffs’ Santa is not a “garment” because it was neither designed nor intended to be worn by anyone as an article of clothing.
However, even if plaintiffs’ Santa could be used as a garment, the copyright would not thereby be invalidated. For, in Ma-zer v. Stein, 1954, 347 U.S. 201, 74 S.Ct. 460, 98 L.Ed. 630, the Supreme Court put to rest all previous doubts on the subject by holding that the actual or intended use in industry of an article eligible for copyright does not bar or invalidate its registration:
“* * * [A] rtistie articles are protected in ‘form but not their mechanical or utilitarian aspects.’ * The dichotomy of protection for the aesthetic is not beauty and utility but art for the copyright and the invention of original and ornamental design for design patents. We find nothing in the copyright statute to support the argument that the intended use or use in industry of an article eligible for copyright bars or invalidates its registration. We do not read such a limitation into the copyright law.” At page 218 of 347 U.S. at page 471 of 74 S.Ct. * *
In the instant case, plaintiffs’ copyright secures to them the right to reproduce their Santa Claus as an artistic figure, an item of decoration. Therefore, any utilitarian features possessed by plaintiffs’ Santa because of its possible use as a garment, do not invalidate plaintiffs’ copyright registration.
Finally, defendants contend that, even if the copyright is valid, the copyright notice is defective for the following reasons:
(1) The notice in this case reads: “Copyright 1958, Plastic Personalities.” Plaintiff Verna Doran ceased using “Plastic Personalities” both as a trade name and a trademark in 1959, when she changed the trademark to “Plasti-Per-sonalities” and secured State registration therefor. Title 17 U.S.C.A. § 19 requires that the copyright notice bear the name of the owner.
(2) Plaintiffs’ copyright notice is affixed only to the hood, one separate item of the three that comprise the product.
Title 17, U.S.C.A. § 19 prescribes the form and content of the copyright notice. Defendants argue that plaintiffs’ copyright notice does not comply with the provisions of the statute because the notice gives neither the name of the copyright owners (Verna H. Doran and William E. Doran) nor their registered trademark (“Plasti-Personalities”), but merely their former trade name (“Plastic Personalities”). However, plaintiffs since 1959 have used their present trademark and trade name, “Plasti-Personalities,” on their copyrighted product, as well as on instructional material packaged with the product, and on advertising literature used in soliciting the sale of the product.
The copyright notice need not set forth the family or corporate name of the copyright proprietor, it being sufficient if the notice contains either the trademark or the trade name of the proprietor. Scarves by Vera, Inc. v. United Merchants, D.C.S.D.N.Y.1959, 173 F.Supp. 625 (trademark); Trifari, Krussman & Fishel, Inc. v. B. Steinberg-Kaslo Co., D.C.S.D.N.Y.1956, 144 F.Supp. 577 (trademark); Hollywood Jewelry Mfg. Co. v. Dushkin, D.C.S.D.N.Y.1955, 136 F. Supp. 738 (trade name); Werckmeister v. Springer Lithographing Co., D.C.S.D.N.Y.1894, 63 F. 808 (trade name).
Therefore, plaintiffs’ use of their trademark and trade name in its present form, “Plasti-Personalities,” in their copyright notice, constitutes sufficient compliance with the notice requirement set forth in § 19.
However, even if it were true, as defendants assert, that plaintiffs have continued to use the designation “Plastic Personalities” in their copyright notice, such designation would still be sufficient notice of plaintiffs’ copyright.
The purpose of the notice requirement in § 19 is to advise the public of the copyright proprietor’s claim and to prevent innocent persons, unaware of the copyright, from incurring infringement penalties. Fleischer Studios v. Ralph A. Freundlich, Inc., 2 Cir., 1934, 73 F.2d 276, certiorari denied 1935, 294 U.S. 717, 55 S.Ct. 516, 79 L.Ed. 1250; Inter-City Press, Inc. v. Siegfried, D.C.W.D.Mo. 1958, 172 F.Supp. 37; Glenco Refrigeration Corp. v. Raetone Commercial R. Corp., D.C.E.D.Pa.1957, 149 F.Supp. 691; Trifari, Krussman & Fishel, Inc. v. B. Steinberg-Kaslo Co., D.C.S.D.N.Y.1956, 144 F.Supp. 577; Hollywood Jewelry Mfg. Co. v. Dushkin, D.C.S.D.N.Y.1955, 136 F.Supp. 738; Harry Alter Co. v. Graves Refrigeration, D.C.N.D.Ga.1951, 101 F.Supp. 703.
In Fleischer Studios v. Ralph A. Freundlich, Inc., supra, the fact that the copyright notice stated the name of the copyright proprietor to be “Fleischer Studios,” without adding the abbreviation, “Inc.,” which was part of the corporate name, was held not fatal to the notice. The court stated: “A reasonable construction of the statutory requirement shows that the name of the copyright proprietor, is sufficient in form, if it gives notice of copyright to one who is looking for the truth and who desires to avoid infringement.” [73 F.2d 277.]
Here, plaintiffs conducted their business, a sole proprietorship, under the name “Plastic Personalities” until 1959, and thereafter under the name “Plasti-Personalities.” At all times, their copyrighted product was manufactured under one of these two names. Hence, the fact that plaintiffs’ trademark and trade name is now “Plasti-Personalities” rather than “Plastic Personalities” should not invalidate a notice using the latter designation. “Plastic Personalities” was plaintiffs’ trade name at the time they received their certificate of registration; and the dropping of a “c” and the addition of a hyphen are at most insubstantial variations which would not mislead innocent persons. As stated in the Fleischer case, the name of the copyright proprietor is sufficient in form if it gives notice of copyright to one who is looking for the truth and desires to avoid infringement. Surely the name “Plastic Personalities” would lead defendants or other interested persons to plaintiffs, and no one would have been better forewarned or informed if the name in its present form, “Plastic-Personalities,” had appeared in the copyright notice.
Therefore, whether plaintiffs since 1959 have used their present trademark and trade name “Plasti-Personalities” in their copyright notice, or whether they have continued to use their original trade name “Plastic Personalities,” they have complied with the notice requirement of 17 U.S.C.A. § 19, because either designation gives notice of the copyright to interested persons and is sufficient to lead such persons to plaintiffs.
.Defendants urge that plaintiffs’ copyright notice is deficient for another reason, viz., that the notice appears only on the hood of plaintiffs’ Santa, and not on the other two components of the product.
In support of their contention, defendants cite two cases in which it was held that hangtags attached to copyrighted articles do not constitute sufficient notice of copyright. Scarves by Vera, Inc. v. United Merchants, D.C.S.D.N.Y.1959, 173 F.Supp. 625; Trifari, Krussman & Fishel, Inc. v. B. Steinberg-Kaslo Co., D.C.S.D.N.Y.1956, 144 F.Supp. 577. No other conclusion was possible in these cases because hangtags, not being part of the article, may be easily removed or lost, and 17 U.S.C.A. § 19 requires that the copyright notice appear on some portion of the article itself.
In the instant case, plaintiffs’ placement of their copyi'ight notice on Santa’s hood constitutes literal compliance with the requirement of § 19, since the notice appears on an “accessible portion” of the product. The fact that the notice is placed only on the hood and not on the body and tunic as well, does not render the notice defective. See Patterson v. Century Productions, 2 Cir. 1937, 93 F.2d 489, certiorari denied 1937, 303 U.S. 655, 58 S.Ct. 759, 82 L.Ed. 1114; also Boucher v. Du Boyes, Inc., 2 Cir., 1958, 253 F.2d 948, certiorari denied 1958, 357 U.S. 936, 78 S.Ct. 1384, 2 L.Ed.2d 1550.
Since plaintiffs’ copyright notice appears on one component of their Santa Claus figure, and all three components are sold as a unit and indeed cannot be used separately, the notice is properly and adequately placed on the copyrighted product.
A copyright confers upon its owner the sole right to multiply copies of his work, and to prevent others from so doing. Mazer v. Stein, 1954, 347 U.S. 201, 74 S.Ct. 460, 98 L.Ed. 630; Richards v. Columbia Broadcasting System, D.C.D.C.1958, 161 F.Supp. 516; Gordon v. Weir, D.C.E.D.Mich. 1953, 111 F.Supp. 117, affirmed 6 Cir., 1954, 216 F.2d 508.
To constitute infringement of a copyright, the copying need not be of every detail so long as the copy is substantially similar to the copyrighted work. Comptone Company v. Raytex Corporation, 2 Cir., 1958, 251 F.2d 487; Universal Pictures Co. v. Harold Lloyd Corporation, 9 Cir., 1947, 162 F.2d 354. A copy, such as will constitute copyright infringement, is that which ordinary observation would cause to be recognized as having been appropriated from or patterned after the copyrighted work. Dymow v. Bolton, 2 Cir., 1926, 11 F.2d 690; Peter Pan Fabrics, Inc. v. Acadia Company, D.C.S.D.N.Y.1959, 173 F.Supp. 292, affirmed 2 Cir., 1960, 274 F.2d 487; Lewis v. Kroger Co., D.C.S.D.W.Va.1952, 109 F.Supp. 484; Allegrini v. De Angelis, D.C.E.D.Pa.1944, 59 F.Supp. 248, affirmed 3 Cir., 1945, 149 F.2d 815.
Applying this test to the facts here, it will readily be seen that defendants’ Santa Claus constitutes a copy of, and hence an infringement of, plaintiffs’ Santa. Both have a mask and hood, as well as a tunic with a black belt at the top and a horizontal white stripe at the bottom to give the illusion that the figure is wearing a coat. Indeed, defendants admit that the only differences between their Santa Claus and that of plaintiffs are these: defendants did not use a molded belt buckle but instead cut a more simple item from a flat sheet plastic; and the face for defendants’ Santa is a fabric mask, while the hood is of cloth instead of plastic.
From these facts, it appears that the ordinary observer seeing the two products could not fail to recognize that defendants’ Santa Claus was patterned after plaintiffs’ Santa. The differences between the two products are so minor as not to change this result.
In addition to requiring a showing of copying, some cases state that the alleged infringer’s access to the copyrighted article must be proved in order to establish infringement. Richards v. Columbia Broadcasting System, D.C.D.C., 1958, 161 F.Supp. 516; Cain v. Universal Pictures Co., D.C.S.D.Cal.1942, 47 F. Supp. 1013. However, since it is obvious that there can be no copying unless the infringer is familiar with the copyrighted work, and since there is no infringement if two authors independently create similar works, access is but a means of eliminating coincidence or independent effort as an explanation for likenesses between the copyrighted article and the infringing article.
In the instant case, Mr. Stanley Tash-man, vice president of defendant American Cover Co., testified that he himself didn’t originate the idea of a plastic Santa; he “got the idea from plaintiff but didn’t copy her.” He further testified that he “came into contact” with plaintiffs’ Santa Claus figure before he manufactured his, but that he “couldn’t remember exactly when.”
In addition to manufacturing a plastic copy of plaintiffs’ Santa Claus, defendants also prepared and distributed with their product a leaflet bearing a picture of a stuffed Santa Claus. The model for this illustration was a Santa Claus figure which was supplied to the artist by Mr. Tashman of defendant American Cover Co. From this, it may be inferred that the model for defendants’ illustration was plaintiffs’ Santa Claus figure, inasmuch as the Santa Claus in the drawing had a belt buckle with the scroll work characteristic of plaintiffs’ Santa, but absent in defendants’ Santa.
The conclusion is inescapable that defendants had access to plaintiffs’ Santa Claus and that they copied it, thereby infringing plaintiffs’ copyright.
Title 28 U.S.C.A. § 1338(b) confers upon the district court jurisdiction of a claim of unfair competition when joined with a “substantial and related” claim under the copyright law. Plaintiffs’ claim of copyright infringement is “substantial and related” and the court has jurisdiction of the claim of unfair competition, which is governed by the law of California, the place where the acts complained of occurred. National Van Lines v. Dean, 9 Cir., 1956, 237 F.2d 688; Sunbeam Furniture Corp. v. Sunbeam Corp., 9 Cir., 1951, 191 F.2d 141; Silvers v. Russell, D.C.S.D.Cal., 1953, 113 F.Supp. 119.
California Civil Code, § 3369 defines unfair competition and provides that such conduct may be enjoined. Since § 3369 defines “unfair competition” disjunctively as any “unfair or fraudulent business practice,” plaintiff need not allege or prove fraudulent intent on the part of defendant in order to be entitled to injunctive relief. However, damages for lost profits cannot be awarded without proof of actual fraud.
Unfair competition may result from the unauthorized use of a trademark or trade name, American Distilling Co. v. Bellows & Co., 1951, 102 Cal.App.2d 8, 226 P.2d 751, MacSweeney Enterprises v. Tarantino, 1951, 106 Cal.App.2d 504, 235 P.2d 266; or from imitation of plaintiffs’ product, Grant v. California Bench Co., 1946, 76 Cal.App.2d 706, 173 P.2d 817, I. Rokeach & Sons v. Kubetz, 1935, 10 Cal.App.2d 537, 52 P.2d 567. The test of whether such practices constitute unfair competition is the likelihood of confusion in the mind of the public as to the source or origin of the product. American Distilling Co. v. Bellows, supra; MacSweeney Enterprises v. Tarantino, supra; Grant v. California Bench Co., supra; I. Rokeach & Sons v. Kubetz, supra; 47 Cal.Jur.2d, Trademarks, Tradenames, and Trade Practices § 26, page 743.
In the instant case, defendants infringed plaintiffs’ registered trademark and trade name, “Plasti-Personalities,” by including with their product an instruction sheet bearing this name. Furthermore, defendants imitated plaintiffs’ product, manufacturing and distributing an almost exact replica thereof. There can be little doubt that this conduct on the part of the defendants not only was likely to, but actually did, confuse the purchasing public as to the source and origin of defendants’ product. In fact, a retail distributor of Christmas decorations testified that in 1960 his customers were confused as to which Santa Claus figure he was selling, plaintiffs’ or defendants’.
Therefore, defendants’ conduct constitutes unfair competition under California law, as well as copyright infringement under federal law.
Under 17 U.S.C.A. § 101(a), plaintiffs are entitled to an injunction enjoining the defendants, and each of them, from further infringing plaintiffs’ copyright. Subsection (b) of § 101 provides in essence that the court may award to the copyright proprietor either the actual damages he has suffered due to the infringement, plus the profits made by the infringer, or damages in an amount to be computed in accordance with an arbitrary standard set forth in the statute.
In the instant case, plaintiffs have not attempted to show the monetary damage which they have sustained by reason of defendants’ acts. As to the profits derived by defendants from their infringement, Mr. Tashman of defendant America Cover Co. testified that this defendant sold its Santa Claus figures to defendant Sunset House for $3.10 each, at a profit of about 7 per cent. However, the record is wholly devoid of any indication of the profits made by defendant Sunset House by virtue of its participation in the infringement.
Where, as here, there is no evidence as to the damage suffered by the copyright owner or the profits realized by the infringer, the court is justified in awarding statutory damages. Woolworth Co. v. Contemporary Arts, 1952, 344 U.S. 228, 73 S.Ct. 222, 97 L.Ed. 276; Jewell-La Salle Realty Co. v. Buck, 1931, 283 U.S. 202, 51 S.Ct. 407, 75 L.Ed. 978; Westermann Co. v. Dispatch Printing Co., 1919, 249 U.S. 100, 39 S.Ct. 194, 63 L.Ed. 499; Dan Kasoff, Inc. v. Palmer Jewelry Mfg. Co., D.C.S.D.N.Y., 1959, 171 F.Supp. 603; Harms, Inc. v. Sansome House Enterprises, Inc., D.C.E.D.Pa.1958, 162 F.Supp. 129, affirmed Leo Feist, Inc., v. Lew Tendler Tavern, Inc., 3 Cir., 1959, 267 F.2d 494; M. J. Golden & Co. v. Pittsburgh Brewing Co., D.C. E.D.Pa.1956, 137 F.Supp. 455; Edward B. Marks Music Co. v. Borst Music Pub. Co., D.C.D.N.J., 1953, 110 F.Supp. 913.
Section 101(b), provides that the copyright proprietor shall be allowed $1 for each infringing copy of his work of art (except a painting, statue, or sculpture, for which $10 is allowed) made or sold by or found in the possession of the in-fringer or his agents or employees. Since plaintiffs’ Santa is a work of art other than a painting, statute or sculpture, the sum of $1 applies here.
It appears from the evidence that defendant American Cover Co. delivered 2,246 Santa Claus figures to defendant Sunset House and sold 45 elsewhere making a total of 2,291 for which the plaintiffs should be allowed $2,291.
In accordance with the provisions of 17 U.S.C.A. § 101(d), plaintiffs are also entitled to a decree ordering defendants to deliver up for destruction all infringing copies of plaintiffs’ work and the means for making same.
Under 17 U.S.C.A. § 116, it is mandatory for the court to allow “full costs” to the prevailing party, but discretionary with the court as to whether to award a “reasonable attorney’s fee” as part of the costs. Official Aviation Guide Co. v. American Aviation Associates, 7 Cir., 1947, 162 F.2d 541; Cloth v. Hyman, D.C.S.D.N.Y.1956, 146 F. Supp. 185; Alexander v. Irving Trust Co., D.C.S.D.N.Y.1955, 132 F.Supp. 364, affirmed 2 Cir., 1956, 228 F.2d 221, certiorari denied 1956, 350 U.S. 996, 76 S. Ct. 545, 100 L.Ed. 860.
As to the considerations which should guide the court in determining whether to allow attorney’s fees as part of the costs, it has been held that such fees are awarded to the prevailing party only where dictated by “equity and good conscience.” National Brass Co. v. Michigan Hardware Co., D.C.W.D.Mich.1948, 75 F. Supp. 140, 142. As expressed in Cain v. Universal Pictures Co., D.C.S.D.Cal.1942, 47 F.Supp. 1013, at page 1019:
“[Attorney’s fees] should not be awarded unless equity considerations exist which call for the penalization of the losing party. * * * ”
Applying these criteria to the facts of this case, plaintiffs should be allowed reasonable attorney’s fees as part of their costs. Here, defendants deliberately copied plaintiffs’ copyrighted Santa Claus figure. Then, in an effort to capitalize on the good will and reputation enjoyed by plaintiffs’ product, they also imitated plaintiffs’ advertisements, included a picture of plaintiffs’ Santa with their product, and used plaintiffs’ registered trademark and trade name. However, defendants’ product was inferior to that of plaintiffs and sold for less, with the overall result that defendants not only captured part of plaintiffs’ market, but also injured the reputation of plaintiffs’ product.
Plaintiffs are entitled to reasonable attorney’s fees as part of their costs. The court finds that reasonable attorney fees in this case amount to $1,000.
Counsel for the plaintiffs is directed to prepare, serve and lodge findings, conclusions and judgment pursuant to local Rule 7, West’s Ann.Code.
. “§ 5. Classification of works for registration
“The application for registration shall specify to which of the following classes the work in which copyright is claimed belongs:
$ ífc Sjt íji S¡5 $
“(g) Works of art; models or designs for works of art.”
. The slit in the back to receive newspaper stuffing, the tunic to hold in the stuffing, and the flap to accommodate a stick for holding the head erect.
. “§ 19. Notice; form
“The notice of copyright required by section 10 of this title shall consist either of the word ‘Copyright’, the abbreviation ‘Copr.’, or the symbol ©, accompanied by the name of the copyright proprietor, and if the work be a printed literary, musical, or dramatic work, the notice shall include also the year in which the copyright was secured by publication. In the case, however, of copies of works specified in subsections (f) to (k), inclusive, of section 5 of this title, the notice may consist of the letter C enclosed within a circle, thus ©, accompanied by the initials, monogram, mark or symbol of the copyright proprietor; Pro-,
vided, That on some accessible portion of such copies or of the margin,, back, permanent base, or pedestal,’or'of the: substance on which such copies shall be mounted, his name shall appear. * * * ”
. “§ 1338. Patents, copyrights, trademarks, and unfair competition.
s¡; # ❖ Hs * * *
“(b) The district courts shall have original jurisdiction of any civil action asserting a claim of unfair competition when joined with a substantial and related claim under the copyright, patent or trade-mark laws.”
. “§ 3369.
“2. [Unfair competition enjoinable.] Any person performing or proposing to perform an act of unfair competition within this State may be enjoined in any court of competent jurisdiction.
“3. [Definitions.] As used in this section, unfair competition shall mean and include unfair or fraudulent business practice and unfair, untrue or misleading advertising * *
. 47 Cal.Jur.2d, Trademarks, Tradenames, and Trade Practices § 24, pages 740-741.
| CASELAW |
-- Brazil Doesn’t Plan to Increase Gasoline Prices, Estado Says
Brazil doesn’t plan to increase
gasoline prices at a time the government is working to slow
inflation, Agencia Estado quoted Energy Minister Edison Lobao as
saying today. Petroleo Brasileiro SA (PETR4) Chief Executive Officer Maria das Gracas Foster told O Estado de S. Paulo on Feb. 26 that the
company needed an increase in fuel prices to compensate for a
rise in international oil prices . To contact the reporter on this story:
Peter Millard in Rio de Janeiro at
Pmillard1@bloomberg.net To contact the editor responsible for this story:
Dale Crofts at
dcrofts@bloomberg.net | NEWS-MULTISOURCE |
Hugs all round as Wozniacki completes return from wilderness
MELBOURNE (Reuters) - No wonder Caroline Wozniacki could not stop hugging the trophy she referred to affectionately as ‘Daphne’ on Saturday after outlasting Simona Halep to win the Australian Open title. It was an embrace with grand slam silverware, in this case the Daphne Akhurst Memorial Cup, that had been a long time coming and the 27-year-old was going to enjoy it. As “Sweet Caroline” blared out of the sound system on a sweltering Rod Laver Arena, Wozniacki paraded around the blue hardcourt with a smile that spoke a 1,000 words. Not only was she celebrating a first grand slam title at the 43rd time of asking (only three players have taken longer), she also toppled Halep from the top of the WTA rankings, six years after relinquishing her 67-week hold on the top spot. Her previous stint in that eminent position had always felt hollow because she never rubber-stamped it with a major. This time, however, there can be no doubting that she deserves the title of the world’s best female tennis player. “I’m never going to have to answer that question again,” she told reporters later, with a glass of Champagne and Daphne by her side. “Now they’ll ask me when I’ll get the second one.” Close friend, 23-times grand slam champion Serena Williams, who is preparing to return after having a baby, was one of the first to congratulate Wozniacki on her overdue title. “I got too nervous to watch but woke up to @CaroWozniacki new number one and Aussie open champ. So awesome. So happy. Are those tears? Yup they are. From a year ago to today I’m so proud my friend so proud,” the American said on Twitter. The previous six years have witnessed much heartache for the blonde Dane who has been coached by her father Piotr, a former professional footballer, since the age of seven. Not just on the court either. There was a U.S. Open final loss to Serena Williams in 2014, five years after a teenaged Wozniacki fell to Kim Clijsters there in her first grand slam final. Titles on the WTA Tour slowed to a trickle and a spate of early losses in the grand slams saw her ranking slide down to a lowly 74th in the summer of 2016. “At that point you’re thinking is it really worth it to keep going,” Wozniacki told Channel Seven after her battling 7-6(2) 3-6 6-4 victory in Saturday’s Melbourne sweat-fest. There was also the emotional body blow of a high-profile split with former world number one golfer Rory McIlroy who she was due to marry in 2014. Wozniacki did return to the top 20 by the end of 2016, thanks to a run to the U.S. Open semi-finals. But her steady, safety-first brand of tennis had begun to look obsolete, especially in a world of fearless big hitters like Jelena Ostapenko who bundled her out of last year’s French Open at the quarter-final stage. Less than a year later Wozniacki’s dogged professionalism has paid dividends and with new fiance, former NBA star David Lee, leading the applause on Rod Laver Arena on a memorable night for Danish tennis, life could not be better. She might even get to realize another one of her dreams. “Maybe I’ll get that Elle (magazine) cover,” part-time model Wozniacki said on court as her agent watched on. Reporting by Martyn Herman, editing by Pritha Sarkar | NEWS-MULTISOURCE |
Narinder Singh Sandhu
Brigadier Narinder Singh Sandhu MVC (1 September 1932 – 30 March 2018) was an Indian Army officer who was awarded the Maha Vir Chakra (MVC), the second-highest Indian military decoration, for gallantry, leadership and devotion to duty during the Indo-Pakistan War of 1971. Sandhu was commissioned into the Indian Army Armoured Corps in 1953, and participated in the Battle of Asal Uttar during the Indo-Pakistani War of 1965, and was mentioned in dispatches. He transferred to the Dogra Regiment in 1970, and it was for his performance as commanding officer of the 10th Battalion, Dogra Regiment during an assault on a fortified Pakistan Army position that he was awarded the MVC. He retired as a brigadier and was active in veterans' and gallantry award recipients' matters until his death of colorectal cancer in 2018.
Early life and family
Narinder Singh Sandhu was born on 1 September 1932 at Narli, Amritsar, in the British province of Punjab, the son of Shri Hari Singh. His grandfather, Thakur Singh, was a major in the British Indian Army in World War I during which he was awarded the Military Cross for gallantry; he was subsequently made an Officer of the Most Excellent Order of the British Empire. He attended Khalsa College, Amritsar. His wife's name was Harinder, and they had two children: a son, Sandeep; and a daughter, Mandeep; both were born in 1965. Mandeep married Lieutenant General Alok Singh Kler. Sandhu's uncle and younger brother also served with distinction in the Indian Army.
Career
Sandhu was commissioned into the Indian Army Armoured Corps on 13 December 1953. He served with the 3rd Cavalry Regiment and the 65th Armoured Regiment. He served in the Khemkaran sector during the Indo-Pakistani War of 1965, during which he participated in the Battle of Asal Uttar on 8–10 September 1965, and his unit was responsible for destroying several Pakistani M47 Patton tanks for which he was mentioned in dispatches. He transferred to the Dogra Regiment in 1970.
At the time of the Indo-Pakistan War of 1971, he held the rank of lieutenant colonel, commanding the 10th Battalion, Dogra Regiment. As part of Operation Cactus-Lilly, his battalion was tasked to capture an enemy position in the Western Sector, which was located at the eastern end of a bridge over the Ravi River at Dera Baba Nanak. Control of the bridge was considered strategically important because it enabled the Pakistan Army to launch an offensive into India, potentially threatening Pathankot, Beas City and Amritsar.
The Pakistan Army had extensively fortified the position with a network of bunkers that were connected by tunnels, and contained machine guns and anti-tank weapons, and it was strongly held. At 17:30 on 5 December 1971, Sandhu led about 420 men of his battalion in the assault, initially mounted on 21 tanks. The tanks became bogged in the marshes along the Ravi River, so they dismounted and made the remaining 5 km to the bridge on foot. Surprising the defenders with a charge from 15 m, the Indian troops shouted the battle cry "Durga Mata Ki Jai", invoking the Hindu goddess of war, Durga. Sandhu led the assault with "grim determination", and without regard for his own safety, and the assault resulted in fierce fighting during which Sandhu fought from bunker to bunker, and was wounded in the leg. Once the position was captured, he then reorganised his troops despite his wound. During the assault the 10th Battalion suffered five killed and ten wounded; 22 Pakistani defenders were killed and 14 were captured. A large quantity of weapons and ammunition was also captured by the Indians.
For his actions during this operation, Sandhu was commended by the Indian government for his gallantry, leadership and devotion to duty. He was awarded the Maha Vir Chakra, the second-highest award for gallantry available to members of the Indian Armed Forces. The award was promulgated on Independence Day in 1972.
Sandhu later served as the Deputy Director General of the Punjab, Haryana, Himachal Pradesh and Chandigarh National Cadet Corps Directorate. He retired from the army as a brigadier, and after retirement was active in veterans' and gallantry award recipients' matters. He died of colon cancer on 30 March 2018, aged 85 in Chandigarh. A contingent from the 3rd Cavalry and Dogra Regiments formed a ceremonial guard at his funeral, which was also attended by several senior military officers. | WIKI |
Grandal's double lifts Dodgers over Braves
Grandal’s double lifts Dodgers over Braves ATLANTA — The Los Angeles Dodgers didn’t mind playing two extra-inning games against the Atlanta Braves in less than 24 hours. They won them both. Yasmani Grandal delivered an RBI double in the 10th inning to give the Dodgers a 2-1 victory over the Braves on Thursday afternoon following a 5-3 win in 10 innings the previous night. “He’s calm under pressure,” Dodgers manager Dave Roberts said of Grandal, who had walked as a pinch hitter in the eighth inning. “He likes to be on those big spots.” Enrique Hernandez singled with one out and Grandal followed with a booming two-base hit to the fence in left-center field off Alexi Ogando (1-1). The Dodgers (10-6) left 13 runners on base, but still completed the series victory against the Braves (4-11) in their last visit to Turner Field after dropping the opener 8-1 on Tuesday. Dodgers starter Clayton Kershaw made it through eight innings and allowed just one run despite giving up five hits to the first seven matters he faced. “Today was a fight from the beginning,” Roberts said. “But Clayton finds a way to gut it out. ... Sometimes he wills himself and the team to victories. ... He’s as competitive a person as I’ve ever met.” The three-time Cy Young Award winner surrendered 10 hits for the just the fourth time in his career, but also struck out 10 and walked only one in the no-decision. The left-hander threw 116 pitches. “A weird day,” said Kershaw, who struggled with his curve and slider. “You give up a bunch of runs and 10 hits, you got shelled. You give up 10 hits and not many runs, you scattered them. “It’s a weird deal. Five hits in two innings. I kind of turned the page after that. I refocused a little bit.” Braves starter Matt Wisler deserved a better fate than his no-decision, allowing four hits and just an unearned run in 6 2/3 innings. The right-hander struck out six and walked two, throwing 115 pitches. “I knew I had to come in and pitch well today and help the guys stay in the game,” Wisler said. “I had seven days between starts. My arm felt good today.” The Dodgers almost took the lead in the seventh inning on a second unearned run, with Kershaw involved in a bang-bang play at the plate. After reaching on a two-base error by rookie Braves center fielder Mallex Smith, Kershaw was called out at the plate on a throw from right fielder Jeff Francoeur as he tried score on a single by Corey Seager. Kershaw thought he had beat the tag by Tyler Flowers, but the call stood after a video review that lasted nearly five minutes. “My first time to be thrown out at the plate I think,” Kershaw said. “I felt safe. Even looking at the replay. ... It was good to get that run in the 10th.” Kershaw gave up extra-base hits to the opening two batters of the game for the first time in his career, then surrendered three singles to start the second inning. The Braves, though, couldn’t break through for a big inning either time. Daniel Castro was thrown out trying to stretch his RBI double into a triple, the call was allowed to stand after review, and Kershaw got out of the bases-loaded jam with a strikeout and double play turned by second baseman Chase Utley. “That was a game changer,” said Roberts of Utley’s turn. That left the game tied, with the Dodgers’ first-inning run unearned after a throwing error by Braves third baseman Adonis Garcia. Joc Pederson, batting cleanup for the first time on his 24th birthday, had an RBI single that a diving Drew Stubbs couldn’t hold in left field. The Dodgers loaded the bases with two outs in the eighth inning, but Jim Johnson got pinch-hitter Justin Turner to fly out. Then Kershaw stranded two runners in the bottom of the inning. Utley doubled in the ninth for the Dodgers, but Arodys Vizcaino struck out Peterson following an intentional walk to Adrian Gonzalez to end the threat. Gonzalez had three hits and drew a walk. Chris Hatcher (2-1) got credit for the victory after a perfect ninth inning and Kenley Jansen got his seventh save by pitching around a one-out double by Erick Aybar in the 10th. The two scoreless innings continued the good work by the Dodgers bullpen, which has a 0.34 ERA over the past eight games. “I can’t say enough for the guys in the pen,” Roberts said. “They are winning games for us.” NOTES: The Dodgers recalled LHP Luis Avilan on Thursday from Triple-A Oklahoma City, where the veteran reliever had allowed three hits and no runs over six innings. ... RHP Louis Coleman, who has a 7.20 ERA for five relief appearances, was placed on the bereavement list, creating the spot for Avilan. ... Dodgers LF Carl Crawford (lower back tightness) is expected to come off the disabled list Monday after his rehab with Oklahoma City and Single-A Rancho Cucamonga. ... RHP Pedro Baez was cleared after being tested for a concussion when he was hit in the back of the head by a throw in the Dodgers bullpen on Wednesday. ... RHP Bud Norris (1-2, 6.23 ERA) will start Friday when the Braves open a three-game series against the New York Mets as part of an eight-game homestand. ... The Dodgers conclude their six-game road trip with a weekend series in Colorado. ... LHP Scott Kazmir (1-1, 6.43 ERA) will start Friday against the Rockies. | NEWS-MULTISOURCE |
User:BrittanyJ/ENES-100/Project 1
Week0 Task
Here are the projects of interest:
1. Power Supply (1st and 3rd project)
2. EEG (2nd project)
My First Task
https://www.circuitlab.com/circuit/zp64qr/powersupplytester/
This week I will learn about the basics of electrical circuits in order to explain what is happening in the power supply project, review Power Supply diagram and become familiar with the drawing. In addition, I will recreate the drawing without the meters as a diagram of what we are doing.
CDIO page for this project:
/Operate/
Week1 Narrative
I changed the power supply tester diagram 35 ohm to 2k ohm, add a fuse and removed the meters. In addition, I created the /Operate/ CDIO page and uploaded diagrams and some pictures from the Implement page.
My Second Task
Creste a CircuitLab tutorial for others to learn how to use the simulation feature.
Continue to update CDIO /Operate/ page.
Week2 Narrative
This week I created...
CircuitLab Tutorial video
Power Supply Tester process of modification video
Simulation results
In addition, I updated the /Operate/ CDIO page.
My Third Task
https://www.circuitlab.com/circuit/6es8xq/scottf-circuit-w_o-meters-w-fuse-change-resistor/
Week 3 Narrative
Uploaded my three attempts for tutorials on to YouTube. One I recorded sound with but it's not working.
* 1) video http://www.youtube.com/watch?v=lViqokQneXw
* 2) video http://www.youtube.com/watch?v=mMH2z2moPzc
* 3) video http://www.youtube.com/watch?v=-BqknfFCoBg
Updated CDIO page.
My Fourth Task
Record tutorial again and figure out the sound issue.
Show the simulation of original circuit capable of drawing 30 amps (change pots to 0 ohms to see max).
Week Four
Figured out that the sound recording option is no the same as audio recording. Watched a YouTube video to figure this out.
http://www.youtube.com/watch?v=XulY6N61q04
Created a plan for video flow/set-up to include the original circuit capable of drawing 30 amps. | WIKI |
Tests for Poor Circulation
By Andrea Helaine
Peripheral vascular disease, or poor circulation, is caused by a number of disorders. Poor circulation means that blood flow is compromised in various parts of the body, such as the arms or legs. If you suffer from poor circulation, have tests done to determine the cause and start the cycle of treatment immediately.
Peripheral vascular disease, or poor circulation, is caused by a number of disorders. Poor circulation means that blood flow is compromised in various parts of the body, such as the arms or legs. If you suffer from poor circulation, have tests done to determine the cause and start the cycle of treatment immediately.
Symptoms
Problems with circulation can lead to changes in body temperature, such as feeling cold, and changes in skin color. If you have poor circulation, it can also lead to blueness in the face and extremities. Many sufferers with circulatory problems have difficulty healing from injuries. Pain can occur and you might feel incredible pressure, or even swelling, in the area of the blockage.
Ankle Brachial Index
A diagnosis of poor circulation can be made by administering an ankle brachial index test. This test consists of a cuff being placed around the ankle instead of the upper arm. If there is a gross variation in the blood pressure between the ankle and the arm, it may be determined that poor circulation is to blame.
Blood Tests
Blood tests and glucose tests are administered to determine if cholesterol levels or diabetes are sources of poor circulation. Diabetes can cause symptoms similar to poor circulation and the two health problems are often intertwined.
Ultrasound
An ultrasound may be ordered to produce an image of blood flow in your body. It can help determine the source of poor circulation. Ultrasounds measure the speed of blood flow in different parts of the body. Sound waves produce images of the body that can be studied by a technician and your physician.
Arteriography
Arteriography is a test in which a physician injects dye into the artery to determine the location and extent of the blockage. An arteriography is often used to examine the arms, hands and legs, if a doctor thinks that circulatory problems necessitate surgery. A numbing medication is applied before the needle is inserted, while X-rays are taken to determine if structures are normal.
Imaging
An MRI or CT scan may be used to provide images of a part or the entire body to test for peripheral artery disease. These tools eliminate other health problems or determine if a blockage or narrowing of blood vessels is present. They also look at other parts of the body, such as the brain, abdomen, heart, and other organs, to determine if an aneurysm is present.
Treatment
Patients with poor circulation can reduce symptoms by making changes in lifestyle patterns, such as following an exercise regime under clinical advice. If you participate in mild exercise, pain problems and circulation can improve.
If you smoke, it is important to stop as it can cause arteries to tighten and decrease blood flow. Smoking also hinders the body’s ability to process oxygen and causes blood clots.
Medication may be necessary to control poor circulation. Apsirin or Plavix might be prescribed to prevent blood clots. Cilostazol can help dilate arteries in some cases, if surgery is not an option. Pain relievers can reduce symptoms and some medications can treat problems, like high cholesterol, to reduce the problems caused by poor circulation.
If exercise and medication do not reduce the pain, surgery helps to reduce the pain by removing blockages or putting a stent inside.
References
About the Author
Andrea Helaine has a Bachelor of Philosophy in theology and is currently finishing her thesis course for a Master of Fine Arts in creative writing. Helaine has been writing professionally for over 10 years and has been published in several anthologies and is currently breaking into the screenwriting market.
Related Articles
More Related | ESSENTIALAI-STEM |
Installing Python dependencies
This page describes how to install Python packages and connect to your Cloud Composer environment from a few common applications.
Dependencies are installed with the existing Python dependencies that are included in the base environment.
Options for managing dependencies
If your Python dependency has no external dependencies and does not conflict with Cloud Composer's dependencies, you can install Python dependencies from the Python Package Index. You can also install a Python dependency from private package repository.
For other requirements, here are a few options.
Option Use if ...
Local Python library Your Python dependency can't be found the Python Package Index, and the library does not have any external dependencies, such as dist-packages.
Plugins feature You want to use plugin-specific functionality, such as modifying the Airflow web interface.
PythonVirtualenvOperator Your Python dependency can be found on the Python Package Index and has no external dependencies. However, you don't want your Python dependency to be installed for all workers, or the dependency conflicts with dependencies required for Cloud Composer.
KubernetesPodOperator
You require external dependencies that can't be installed from pip, such as dist-packages, or are on an internal pip server.
This option requires more setup and maintenance and should generally be considered if the other options do not work.
Before you begin
• The following permission is required to install Python packages in the Cloud Composer environment: composer.environments.update. For more information, see Cloud Composer Access Control.
• Requirements must follow the format specified in PEP-508 where each requirement is specified in lowercase and consists of the package name with optional extras and version specifiers.
• When you install custom Python dependencies by using the API, all Cloud Composer processes run with newly-installed PyPI dependencies.
• Custom PyPI dependencies might cause conflicts with dependencies that Airflow requires, causing instability.
• Before deploying to production, we recommend that you test your PyPI packages locally in an Airflow worker container.
Installing a Python dependency from PyPi
Your Python dependency must not have external dependencies or conflict with Cloud Composer's dependencies to install Python dependencies from the Python Package Index.
To add, update, or delete the Python dependencies for your environment:
Console
Specify the package name and version specifiers as shown:
• "pi-python-client", "==1.1.post1"
• "go-api-python-client", "==1.0.0.dev187"
For a package without the version specifier, use an empty string for the value, such as "glob2", " ".
To access an environment's Python dependencies, navigate to the PyPi dependencies page using the following steps:
1. Open the Environments page in the Google Cloud Platform Console.
Open the Environments page
2. Click the Name of the environment you want to install, update, or delete Python dependencies for.
3. Select the PyPi dependencies tab.
4. Click the Edit button.
5. To add a new dependency:
1. Click the Add dependency button.
2. Enter the name and version of your library in the Name and Version fields.
6. To update an existing dependency:
1. Select the Name and/or Version field of the library you want to update.
2. Enter a new value.
7. To delete a dependency:
1. Hover over the name of the dependency to delete.
2. Click the trash can icon that appears.
gcloud
Pass a requirements.txt file to the gcloud command-line tool. Format the file with each requirement specifier on a separate line.
Sample requirements.txt file:
scipy>=0.13.3
scikit-learn
nltk[machine_learning]
Pass the requirements.txt file to the environments.set-python-dependencies command to set your installation dependencies.
gcloud composer environments update ENVIRONMENT-NAME \\
--update-pypi-packages-from-file requirements.txt \\
--location LOCATION
The command terminates when the operation is finished. To avoid waiting, use the --async flag.
If a dependency conflict causes the update to fail, your environment continues running with its existing dependencies. If the operation succeeds, you can begin using the newly installed Python dependencies in your DAGs.
rest
Use the projects.locations.environments.patch method, specifying config.softwareConfig.pypiPackages as the prefix for the updateMask query parameter.
Installing a Python dependency from private repository
You can install packages hosted in private package repositories. The packages must be properly configured packages that the default pip tool can install.
To install from a private package repository:
1. If the service account for your Cloud Composer environment does not have a project.editor role, grant the iam.serviceAccountUser role to the service account.
2. Create a pip.conf file and include the following information in the file if applicable:
• Access credentials for the repository
• Non-default pip installation options
Example:
[global]
extra-index-url=https://my-example-private-repo.com/
3. Upload the pip.conf file to your environment's Cloud Storage bucket and place in the directory path /config/pip/, for example: gs://us-central1-b1-6efannnn-bucket/config/pip/pip.conf
Installing a local Python library
To install an in-house or local Python library:
1. Place the dependencies within a subdirectory in the dags/ folder. To import a module from a subdirectory, each subdirectory in the module's path must contain a __init__.py package marker file.
In this example, the dependency is coin_module.py:
dags/
use_local_deps.py # A DAG file.
dependencies/
__init__.py
coin_module.py
2. Import the dependency from the DAG definition file.
For example:
from dependencies import coin_module
Using Python packages that depend on shared object libraries
Certain PyPI packages depend on system-level libraries. While Cloud Composer does not support system libraries, you can use the following options:
1. Use the KubernetesPodOperator. Set the Operator image to a custom build image. If you experience packages that fail during installation due to an unmet system dependency, use this option.
2. Upload the shared object libraries to your environment's Cloud Storage bucket.
1. Manually find the shared object libraries for the PyPI dependency (an .so file).
2. Upload the shared object libraries to /home/airflow/gcs/plugins.
3. Set the following Cloud Composer environment variable: LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/home/airflow/gcs/plugins
If your PyPI packages have installed successfully but fail at runtime, this is an option.
Connecting to the Flower web interface
Flower is a web-based tool for working with Celery clusters. Flower is pre-installed in your environment. You can use its web UI to monitor the Apache Airflow workers for your environment.
To access Flower:
1. To determine the Kubernetes Engine cluster, view your environment:
gcloud composer environments describe ENVIRONMENT-NAME /
--location LOCATION
The cluster is listed as the gkeCluster. The zone where the cluster is deployed is listed as the location.
For example:
gcloud composer environments describe environment-name --location us-central1
config:
airflowUri: https://uNNNNe0aNNbcd3fff-tp.appspot.com
dagGcsPrefix: gs://us-central1-may18-test-00a47695-bucket/dags
gkeCluster: projects/example-project/zones/us-central1-a/clusters/us-central1-environment-name-00a47695-gke
nodeConfig:
diskSizeGb: 100
location: projects/example-project/zones/us-central1-a
In the example, the cluster is us-central1-environment-name-00a47695-gke, and the zone is us-central1-a. This information is also available on the Environment details page in the GCP Console.
2. Connect to the Kubernetes Engine cluster:
gcloud container clusters get-credentials CLUSTER_NAME /
--zone CLUSTER_ZONE
For example:
gcloud container clusters get-credentials us-central1-environment-name-00a47695-gke --zone us-central1-a
Fetching cluster endpoint and auth data.
kubeconfig entry generated for us-central1-environment-name-00a47695-gke.
3. View the worker pods and select the pod to run Flower on:
kubectl get pods --all-namespaces | grep worker
For example:
kubectl get pods --all-namespaces | grep worker
airflow-worker-89696c45f-49rkb 2/2 Running 1 29d
airflow-worker-89696c45f-gccmm 2/2 Running 1 29d
airflow-worker-89696c45f-llnnx 2/2 Running 0 29d
The pod names match the regex "airflow-(worker|scheduler)-[-a-f0-9]+").
4. Run Flower on the worker pod:
kubectl exec -n NAMESPACE -it POD_NAME -c airflow-worker -- celery flower /
--broker=redis://airflow-redis-service:6379/0 --port=5555
For example:
kubectl exec -n composer-1-6-0-airflow-1-10-1-9670c487 -it airflow-worker-89696c45f-llnnx /
-c airflow-worker -- celery flower --broker=redis://airflow-redis-service:6379/0 --port=5555
[I 180601 20:35:55 command:139] Visit me at http://localhost:5555
[I 180601 20:35:55 command:144] Broker: redis://airflow-redis-service:6379/0
5. In a separate terminal session, forward the local port to Flower:
kubectl -n NAMESPACE port-forward POD_NAME 5555
For example:
kubectl -n composer-1-6-0-airflow-1-10-1-9670c487 port-forward airflow-worker-c5c4b58c7-zhmkv 5555
Forwarding from 127.0.0.1:5555 -> 5555
6. To access the web UI, go to http://localhost:5555 in your local browser.
Installing SQLAlchemy to access the Airflow database
SQLAlchemy is a Python SQL toolkit and Object Relational Mapper (ORM). You can install SQLAlchemy and use it to access the Cloud SQL instance for Cloud Composer. During installation, Cloud Composer configures the Airflow environment variable AIRFLOW__CORE__SQL_ALCHEMY_CONN.
To install SQL Alchemy:
1. Install sqlalchemy in your environment.
gcloud composer environments update ENVIRONMENT-NAME /
--location LOCATION /
--update-pypi-package "sqlalchemy"
2. To determine the Kubernetes Engine cluster, view your environment:
gcloud composer environments describe ENVIRONMENT-NAME /
--location LOCATION
3. Connect to the Kubernetes Engine cluster:
gcloud container clusters get-credentials CLUSTER_NAME /
--zone CLUSTER_LOCATION
4. View the worker pods and select the pod to connect to:
kubectl get pods --all-namespaces | grep worker
5. SSH to the worker pod:
kubectl -n NAMESPACE exec -it POD_NAME -c airflow-worker -- /bin/bash
For example:
kubectl -n composer-1-6-0-airflow-1-10-1-9670c487 /
exec -it airflow-worker-54c6b57789-66pnr -c airflow-worker -- /bin/bash
airflow@airflow-worker-54c6b57789-66pnr:~$
6. Use the sqlalchemy library to interact with the Airflow database:
python
import airflow.configuration as config
config.conf.get('core', 'sql_alchemy_conn')
Was this page helpful? Let us know how we did:
Send feedback about...
Cloud Composer | ESSENTIALAI-STEM |
Forums » Technics
Laravel Development is a Great Choice for Web Project
• April 15, 2023 3:35 PM +06
As a web developer, I've worked with a variety of different frameworks over the years, but I keep coming back to Laravel for a number of reasons. If you're considering a new web project and aren't sure which framework to use, here are just a few reasons why Laravel development might be the right choice for you.
First and foremost, Laravel is incredibly powerful and flexible. It's a PHP-based framework that allows you to build complex, feature-rich web applications quickly and easily. Laravel provides a wide range of pre-built components and modules, as well as a comprehensive set of tools for managing database migrations, routing, authentication, and more. This makes it an ideal choice for both small-scale projects and large-scale enterprise applications.
Another reason why Laravel development is so popular is its focus on developer experience. The framework is designed to be intuitive and easy to use, with a clean and well-organized codebase that's easy to understand and maintain. This means that even if you're new to Laravel development, you can quickly get up to speed and start building your application without any significant learning curve.
One of the biggest advantages of Laravel development is its active community. Laravel has a large and active community of developers who are constantly contributing to the framework, building new packages, and providing support and advice to fellow developers. This means that if you run into any issues or need help with your project, there's always someone available to lend a hand.
Finally, Laravel development is known for its robust security features. Laravel includes built-in protection against common security threats such as SQL injection, cross-site scripting, and cross-site request forgery. Additionally, the framework provides developers with a range of tools and best practices for securing their applications, making it an excellent choice for projects that require high levels of security.
Overall, Laravel development is a fantastic choice for any web project. Its powerful features, intuitive design, active community, and robust security make it one of the most popular and widely-used web development frameworks available today. Whether you're building a small-scale application or a large-scale enterprise project, Laravel can help you achieve your goals quickly and efficiently. | ESSENTIALAI-STEM |
module ietf-yang-opstate-metadata { namespace "urn:ietf:params:xml:ns:yang:ietf-yang-opstate-metadata"; prefix "opstate"; import ietf-yang-metadata { prefix "md"; } organization "IETF NETCONF (Network Configuration Protocol) Working Group"; contact "WG Web: WG List: WG Chair: Mahesh Jethanandani WG Chair: Mehmet Ersue Editor: Robert Wilton "; description "This module defines YANG metadata to allow the reason why a config true node exists in the operational state datastore to be determined using YANG metadata. Copyright (c) 2016 IETF Trust and the persons identified as authors of the code. All rights reserved. Redistribution and use in source and binary forms, with or without modification, is permitted pursuant to, and subject to the license terms contained in, the Simplified BSD License set forth in Section 4.c of the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info). This version of this YANG module is part of draft-wilton-netconf-opstate-metadata-00; see the Internet draft itself for full legal notices."; revision 2016-07-06 { description "Initial revision"; reference "Internet draft: draft-wilton-netconf-opstate-metadata-00"; } md:annotation cfg-status { type enumeration { enum applying { description "The configuration for the annotated node is currently changing (i.e. being created, deleted or changing in value) as part of an ongoing configuration operation"; } enum applied { description "The configuration is fully applied. The node exists in both the intended and applied datastores and has exactly the same value in both."; } enum applied-deviation { description "The configuration has been applied to the extend the server is able to, but the value in the applied configuration datastore does not exactly match the value in the intended configuration datastore."; } enum overridden { description "The configuration node value has been overridden by the same node in another configuration datastore."; } enum system-controlled { description "The configuration node only exists in the Operational State Datastore because it is system controlled. It is not present in the abstract applied configuration datastore."; } enum blocked { description "The system cannot apply the configuration because the required hardware resources are not present. The configuration node does not exist in the applied configuration datastore."; } enum failed { description "The system cannot apply the configuration due to an error. The configuration node does not exist in the applied configuration datastore."; } } description "Status indicates why a configuration node (i.e. config=true) in the operational-state datastore does not match the corresponding node in the intended config datastore"; } md:annotation cfg-status-reason { when "../status = 'blocked' or ../status = 'failed'" { description "An optional status reason can be provided for blocked or failed configuration"; } type string; description "Indicates the reason why the applied configuration node is blocked or failed"; } } | ESSENTIALAI-STEM |
Samuel Kibathi
Samuel Kibathi Wanjiru (born 23 February 2005) is Kenyan long distance and cross country runner.
Early life
Originally from Nyandarua County, he attended Kurashiki High School in Japan.
Career
Kibathi won the 5000 metres Kenyan national U20 world championship trials in a time of 13:47.86 in July 2022. He finished sixth at the 2022 World Athletics U20 Championships over 5000 metres in Cali, Colombia in August 2022 after he fell close to the finish line.
At the start of 2023, he won the men's Under-20 8km at the Kenyan National Cross Country Championships and the U20 race at the Sirikwa Cross Country Classic in Eldoret. He ran a personal best time of 13:36.02 over 5000 metres in Nairobi. He was a bronze medalist in the 10,000 metres at the 2023 African U18 and U20 Championships in Athletics in Ndola.
In 2024, he won the Kenyan U20 national cross country title and was subsequently selected for the 2024 World Athletics Cross Country Championships in Serbia. On 30 March 2024, he won gold in the U20 individual and in the team U20 race at the 2024 World Athletics Cross Country Championships in Serbia. | WIKI |
Life
Which way does the diaphragm contract?
Which way does the diaphragm contract?
When the lungs inhale, the diaphragm contracts and pulls downward. At the same time, the muscles between the ribs contract and pull upward. This increases the size of the thoracic cavity and decreases the pressure inside.
Does the diaphragm contract up or down?
When you breathe in, your diaphragm contracts (tightens) and flattens, moving down towards your abdomen. This movement creates a vacuum in your chest, allowing your chest to expand (get bigger) and pull in air. When you breathe out, your diaphragm relaxes and curves back up as your lungs push the air out.
How does diaphragm move when it contracts?
The diaphragm is the primary muscle of inspiration. It is a thin, dome-shaped sheet of muscle that inserts into the lower ribs. When it contracts, it pushes downward and spreads out, increasing the vertical dimension of the chest cavity and driving up abdominal pressure.
What muscle contracts the diaphragm?
The diaphragm and, to a lesser extent, the intercostal muscles drive respiration during quiet breathing. The elasticity of these muscles is crucial to the health of the respiratory system and to maximize its functional capabilities.
Does the diaphragm lift up?
When you inhale, your diaphragm contracts (tightens) and moves downward. This creates more space in your chest cavity, allowing the lungs to expand. When you exhale, the opposite happens — your diaphragm relaxes and moves upward in the chest cavity.
What is the process of ventilation?
Ventilation, or breathing, is the movement of air through the conducting passages between the atmosphere and the lungs. The air moves through the passages because of pressure gradients that are produced by contraction of the diaphragm and thoracic muscles.
When the diaphragm contracts it results in the action called?
Inspiration (inhalation) is the process of taking air into the lungs. It is the active phase of ventilation because it is the result of muscle contraction. During inspiration, the diaphragm contracts and the thoracic cavity increases in volume. This decreases the intraalveolar pressure so that air flows into the lungs.
What happens to the diaphragm when it contracts?
When your diaphragm contracts, the dome flattens out as if it were a flexible umbrella-top that was pulled downward by the handle. As your diaphragm flattens, it creates more space and reduces pressure in the chest cavity and this pressure change forces air into your lungs.
When to seek help for a diaphragm condition?
A condition affecting the diaphragm can cause symptoms similar to those of a heart attack. Seek emergency treatment if you experience chest pain or pressure that extends to your jaw, neck, arms, or back. Symptoms of a diaphragm condition may include: The diaphragm is one of the body’s most important muscles because of its crucial role in breathing.
Why does the diaphragm form a dome shape?
Diaphragm: The diaphragm is the umbrella muscle that forms a dome shape at the base of your ribcage. When the diaphragm contracts, it flattens and creates more space and less pressure in the chest cavity. This reduced pressure causes air to flow into the lungs.
How does the diaphragm push air out of the lungs?
How Does the Diaphragm Work? The movement of the diaphragm muscle provides the primary force for every inhale and exhale that you take. When the diaphragm is relaxed, it forms a dome that presses into your chest cavity and pushes against the lungs to help push air out.
Share this post | ESSENTIALAI-STEM |
A Novel Assay to Identify the Trafficking Proteins that Bind to Specific Vesicle Populations
Marvin Bentley, Gary Banker
Research output: Contribution to journalArticlepeer-review
12 Scopus citations
Abstract
Here we describe a method capable of identifying interactions between candidate trafficking proteins and a defined vesicle population in intact cells. The assay involves the expression of an FKBP12-rapamycin binding domain (FRB)–tagged candidate vesicle-binding protein that can be inducibly linked to an FKBP-tagged molecular motor. If the FRB-tagged candidate protein binds the labeled vesicles, then linking the FRB and FKBP domains recruits motors to the vesicles and causes a predictable, highly distinctive change in vesicle trafficking. We describe two versions of the assay: a general protocol for use in cells with a typical microtubule-organizing center and a specialized protocol designed to detect protein-vesicle interactions in cultured neurons. We have successfully used this assay to identify kinesins and Rabs that bind to a variety of different vesicle populations. In principle, this assay could be used to investigate interactions between any category of vesicle trafficking proteins and any vesicle population that can be specifically labeled.
Original languageEnglish (US)
Pages (from-to)13.8.1-13.8.12
JournalCurrent protocols in cell biology
Volume69
Issue number1
DOIs
StatePublished - Dec 1 2015
Keywords
• FKBP
• FRB
• Rab
• kinesin
• membrane trafficking
• vesicle
ASJC Scopus subject areas
• Cell Biology
Fingerprint
Dive into the research topics of 'A Novel Assay to Identify the Trafficking Proteins that Bind to Specific Vesicle Populations'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
Page:A biographical dictionary of modern rationalists.djvu/156
ENGELS
ESPINAS
tration on the way to the scaffold, saying that he was " an infidel by conviction " (Maxwell s History of the Irish Rebellion). D. Sep. 20, 1803.
ENGELS, Friedrich, German Socialist leader. B. Nov. 28, 1820. He went into his father s business, and from 1842 to 1845 he managed a branch of it in Man chester. On his return to Germany he wrote his first Socialist work, Die Lage der arbeitenden Klassen in England. He then co-operated with Karl Marx, but he was in 1850 compelled to return to England on account of his share in the rebellion of 1849. He helped to found the Inter nationale. Engels lived in England again from 1869 to his death. Belfort Bax, who knew him, calls him " the devout Atheist " (Reminiscences, p. 51). He followed Feuer- bach [SEE] in his Eationalist ideas. D. Aug. 5, 1895.
ENGLISH, George Bethune, American writer. B. Mar. 7, 1787. Ed. Harvard. A member of the Boston Bar, he turned to the study of theology, with a view to entering the ministry, but he developed Deistic views. In 1813 he replied to Channing s sermons on infidelity, and published The Grounds of Christianity Examined. In later years he served in the army of Ismail Pacha, and afterwards as agent for the U.S. Government in the Levant. D. Sep. 20, 1828.
ENSOR, George, B.A., Irish Deist. B. 1769. Ed. Trinity College, Dublin. He indulged in political writing, in opposition to the English Government, but otherwise took no active part in politics. In 1806 he published The Independent Man (2 vols.), and in 1814 a Deistic Review of the Miracles, Prophecies, and Mysteries of the Old and New Testaments and of the Morality and Consolation of the Christian Religion. His other works are political. D. Dec. 3, 1843.
ERDMANN, Professor Johann Eduard,
239
German philosopher. B. June 13, 1805. Ed. Dorpat and Berlin. In 1829 he entered the Lutheran ministry, but he abandoned it in 1832, and in 1836 was appointed professor of philosophy at Halle University. Erdmann s history of philosophy (2 vols., 1865-67) is one of the most useful and learned works on its subject. He was an Hegelian "the last of the Mohicans," Germans say and thought that soul and body are aspects of one reality. D. June 12, 1892.
ERICSSON, John, American inventor. B. (Sweden) July 31, 1803. Ericsson served for some years as an engineer in the Swedish army. In 1826 he emigrated to London, where he perfected the inven tion of the screw-propeller for steamships, which is mainly due to him. As the English builders were slow to accept his ideas, he went to America in 1839, and the new form of propulsion was at once adopted. He was a brilliant engineer, and an extraordinary number of valuable inven tions stand to his credit. It was he who designed the monitors that were so effec tively used in the Civil War. Ingersoll, who knew him well, tells us that he was one of the profoundest Agnostics I ever met " (Works, vii, 319). The State of New York erected a statue in honour of him, and his remains were conveyed to Sweden on a United States cruiser. D. Mar. 8, 1889.
ESCHERNY, Count Francois Louis d ,
Swiss writer. B. Nov. 24, 1733. Of a wealthy family, he spent his early years in travel and made the acquaintance of Rousseau and other great French Ration alists. In his Lacunes de la philosophie (1783) he chiefly follows Rousseau, and is Deistic. He accepted the better principles of the Revolution, but was driven from France by its excesses. D. July 15, 1815.
ESPINAS, Professor Victor Alfred,
French sociologist. B. May 23, 1844. Ed.
Lyc6e de Sens and Lycee Louis le Grand.
240 | WIKI |
Page:History of India Vol 5.djvu/298
250 THE MEMOIES OF THE EMPEKOK BABAR station, on Monday, the twenty-eighth of Jumada-1- awwal, we began to receive repeated information from Ibrahim's camp that he was advancing slowly by a league or two at a time, and halting two or three days at each station. I, for my part, likewise moved to meet him, and after the second march from Shahabad, encamped on the banks of the Jumna, opposite Sirsa- wah. Haidar Kuli, a servant of Khwaja Kilan, was sent out to procure intelligence, after which I crossed the Jumna by a ford and went to see Sirsawah. From this station we held down the river for two marches, keeping close along its banks, when Haidar Kuli returned, bringing information that Baud Khan and Haitim Khan had been sent across the river into the Doab with six or seven thousand horse and had encamped three or four leagues in advance of Ibrahim's position on the road toward us. On Sunday, the eight- eenth of Jumada-1-akhir, I despatched Chin Timur Sul- tan against this column, together with the whole of the left wing commanded by Sultan Junaid, as well as part of the centre under Yunas Ali, directing them to ad- vance rapidly and to take the enemy by surprise. Next morning, about the time of early prayers, they came upon the enemy, who put themselves in some kind of order and marched out to meet them; but our troops had no sooner come up than the enemy fled, and were followed in close pursuit and slaughtered all the way to the limits of Ibrahim's camp. The detachment cap- tured Haitim Khan, Baud Khan's eldest brother, and one of the generals, as well as seventy or eighty pris- | WIKI |
Maria Protopappa
María Protópappa (born 5 May 1973 in Athens) is a retired Greek long-distance runner who mainly competed in the 5000 metres. She represented her country at the 2004 Summer Olympics without reaching the final.
Personal bests
Outdoor Indoor
* 1500 metres – 4:10.51 (Bucharest 2002)
* 3000 metres – 8:59.49 (Haniá 2002)
* 5000 metres – 15:04.03 (Brussels 2006)
* 10,000 metres – 32:46.17 (Maribor 2004)
* 3000 metres – 9:19.41 (Piraeus 2001) | WIKI |
Updated
Natural gas can be deadly if ignited by a flame or spark or if mixed with certain concentrations of air. Signs of a gas leak include a strong odor similar to rotten eggs and a roaring or hissing sound. The sight of bubbles in standing water, blowing dust or plants that appears to be dead for no reason are also signs of a possible leak.
If you suspect you have a gas leak, you should:
-- Leave your home immediately and take others with you
-- Open windows before you leave your house if the odor is faint
-- Call your gas company to report a suspected leak once you have evacuated the building
If you suspect you have a gas leak, you should not:
-- light a match or use lighters
-- activate light switches, electrical appliances, flashlights, doorbells, garage door openers, or telephones (including cellular), as they could create a spark.
-- start a car
-- re-enter your building until gas company inspectors have declared it safe
Sources:
conEdison
New Jersey Natural Gas
Xcel Energy | ESSENTIALAI-STEM |
Executive Order 12689
By the authority vested in me as President by the Constitution and laws of the United States of America, and in order to protect the interest of the Federal Government, to deal only with responsible persons, and to insure proper management and integrity in Federal activities, it is hereby ordered as follows:
Section 1. Definitions.
* For purposes of this order:
* (a) ‘‘Procurement activities’’ refer to all acquisition programs and activities of the Federal Government, as defined in the Federal Acquisition Regulation.
* (b) ‘‘Nonprocurment activities’’ refers to all programs and activities involving Federal financial and nonfinancial assistance and benefits, as covered by Executive Order No. 12549 and the Office of Management and Budget guidelines implementing that order.
* (c) ‘‘Agency"’’refers to executive departments and agencies.
Sec. 2. Governmentwide Effect.
* (a) To the extent permitted by law and upon resolution of differences and promulgation of final regulations pursuant to section 3 of this order, the debarment, suspension, or other exclusion of a participant in a procurement activity under the Federal Acquisition Regulation, or in a nonprocurement activity under regulations issued pursuant to Executive Order No. 12549, shall have governmentwide effect. No agency shall allow a party to participate in any procurement or nonprocurement activity if any agency has debarred, suspended, or otherwise excluded (to the extent specified in the exclusion agreement) that party from participation in a procurement or nonprocurement activity.
* (b) An agency may grant an exception permitting a debarred, suspended, or otherwise excluded party to participate in procurement activities of that agency to the extent exceptions are authorized under the Federal Acquisition Regulation, or to participate in nonprocurement activities of tha agency to the extent exceptions are authorized under regulations issued pursuant to Executive Order No. 12549.
Sec. 3. Implementation.
* (a) The Office of Management and Budget may assist Federal agencies in resolving differences between the provisions contained in the Federal Acquistion Regulation and in regulations issued pursuant to Executive Order No. 12549. The Office of Management and Budget may determine the date of resolution of differences and then shall notify affected agencies of that date.
* (b) To implement this order, proposed regulations amending the Federal Acquisition Regulation and the agency regulations issued pursuant to Executive Order No. 12549 shall be published simultaneously within 6 months of the resolution of differences.
* (c) Final regulations shall be published simultaneously within 12 months of the publication of the proposed regulations, to be effective 30 days thereafter.
, August 16, 1989. | WIKI |
Pride and Prejudice: Chronic disease prevention
Obesity is a serious threat to people’s general health, but remains a hard problem to tackle. We know that physical activity and diet are two key factors for a healthy lifestyle. But these aspects are not only difficult to modify for people on the long-term, they are also difficult to measure. The Pride and Prejudice research project combines the development of programs of design interventions with real-life monitoring and evaluation of the long-term effectiveness of these combined interventions.
Many people are unable to change their habits, as these are not just dependent on individual choices. The environments in which people live are likely to support some behaviors and discourage other ones. The most successful changes in people’s behaviour result from combined interventions in multiple environments (at home, at school, at sports club) and focus on groups rather than on individuals.
The Pride and Prejudice project aims to generate new scientific knowledge and innovative technology to improve people’s lifestyles. These include systems to monitor remotely health parameters and behaviour, new frameworks for prolonged behaviour change, and design approaches to develop interventions that encourage people to make healthy choices about what they eat and their degree of physically activity. The project combines real-life monitoring through sensors (food intake, physical activity and health parameters) with development of design interventions at different levels of the system (person, group, society), and evaluation of the long-term effectiveness of these combined interventions.
Pride and Prejudice is part of the 4TU Federation and features a unique combination of researchers from Delft University of Technology, Eindhoven University of Technology, University of Twente and Wageningen University.
Mailin Lemke | ESSENTIALAI-STEM |
書初
Noun
* 1) kakizome, or the first calligraphy written at the beginning of a year
Alternative forms
* (kakizome) | WIKI |
Thread synchronization in C Sharp
Synchronization: It is a technique that where another thread can share the piece of code (critical section) , only if the current thread complete its execution.
No other thread can enter into the critical section , until the current thread finishes its execution and come out from the critical section.
In multi threaded environment threads can share any resource and executes asynchronously.
Some times asynchronous execution may halt the system.
To avoid this we can go with thread synchronization where only one can share the resource until its execution completed or releasing the resource.
Advantage of synchronization.
–To avoid the deadlock.
— To maintain Consistency.
Look at the Output of below program on console. You should find the unwanted output i.e. mixture of both strings.
using System;
using System.Threading;
using System.Threading.Tasks;
class Program
{
static void Main(string[] args)
{
//Both thread will print a same string on console.
Thread t1 = new Thread(printer);
Thread t2 = new Thread(printer);
t1.Start();
t2.Start();
t2.Join();
}
static void printer()
{
String arr = "finesrc is the excellent resource for interview preparation!!!";
for (int i = 0; i < arr.Length; i++)
{
Console.Write(arr[i]);
}
}
}
Output
finesrc is the excellent resourfinesrc is the excellent resource for intce for i
erview preparation!!!nterview preparation!!!
if we observe the output of the above program it is a mixture of unwanted output i.e mixture of both strings.
To avoid unwanted mixture other thread needs to share the resource only after execution of current thread. This kind of context switching we can achieve through thread synchronization.
Thread synchronization can be achieved with the following categories.
• Simple blocking methods -Sleep, Join, and Task.Wait
• Locking constructs – exclusive locks(lock, mutex, spinlock,monitor), and non exclusive locks (semaphore, semaphore slim, and read/writer locks)
• Signaling constructs -event wait handles, Monitor’s Wait/Pulse, CountdownEvent and Barrier classes.
• Non blocking synchronization constructs – Thread.MemoryBarrier, Thread.VolatileRead, Thread.VolatileWrite, the volatile keyword, and the Interlocked class.
We will discuss all the above mechanisms in later session, first we will concentrate on lock to achieve synchronization.
Thread synchronization C# example
When we synchronize the code block of printer() function where printing is going on console, program will print the correct string for both threads on the console.
using System;
using System.Threading;
using System.Threading.Tasks;
class Program
{
//Object lock to lock the crtical section/ shared resource.
//cmd console is the shared resource here.
private static Object lockCode = new Object();
static void Main(string[] args)
{
//Both thread will print a same string on console.
Thread t1 = new Thread(printer);
Thread t2 = new Thread(printer);
t1.Start();
t2.Start();
t2.Join();
}
static void printer()
{
String arr = "finesrc is the excellent resource for interview preparation!!!";
//Synchronize the code for printing string on console.
lock (lockCode)
{
for (int i = 0; i < arr.Length; i++)
{
Console.Write(arr[i]);
}
}
}
}
Output
finesrc is the excellent resource for interview preparation!!!finesrc is the exc
ellent resource for interview preparation!!!
In the above program we have used Object lock to synchronize the code block in printer () function where threads are printing strings on same console.
Thread synchronization in C Sharp
Scroll to top | ESSENTIALAI-STEM |
Desperate Housewives: The Game (2006 video game)
Desperate Housewives: The Game is a life simulation adventure game developed by Liquid Entertainment and released by Buena Vista Games in 2006, in the style of The Sims games. It is based on the television series Desperate Housewives. The player takes the part of a housewife with amnesia who has recently moved with her husband and son to Wisteria Lane. The plot takes place over 12 episodes. The game features a script by Desperate Housewives writer Scott Sanford Tobis and voice acting by Brenda Strong. It achieved sales in excess of 400,000 copies by early 2009.
Plot
The game begins when a family moves to Wisteria Lane: a successful doctor working at the Fairview Medical Center, a wife with a forgotten past after a jogging accident and their son. In the game, the player takes on the role of the wife, and is able to customise her and build relationships with other characters. Edie Britt first introduces the wife to Wisteria Lane and visits Bree Van de Kamp, who invites her to gossip at her house along with Susan Mayer, Lynette Scavo and Gabrielle Solis. A pair of brothers then visit the player's house: Daniel Fox, a famous designer and his twin brother Frank Fox, who installs an Internet service in the player's computer. The player's character then progresses through episodes, completing tasks that range from gardening and cooking for player's family, to discovering the secrets of the neighborhood.
The player must battle off a love rival to her husband – his secretary Jackie Marlen who stops at no cost to get what she wants – and the cranky neighbor, Etta Davenport. She must also deal with the antics of her unruly 14-year-old son and the people around him. Other residents aren't as nice as they seem when a private investigator, Erik Larsen, shows up in town alongside a shady businessman, Vincent Corsetti, who seems to have ulterior motives. In the end, their secrets are aired to the public and a desperate decision is made in a hostage situation.
The game features four possible endings. The player can decide to run away with Erik Larsen or Vincent Corsetti, or remain married to her husband. A fourth ending allows the player to shoot all three men.
Reception
Desperate Housewives received "mixed" reviews according to the review aggregation website Metacritic. Some reviewers praised it as a well-written and faithful adaption of the television series; however, the game also attracted criticism for its derivative, simplistic gameplay and prominent product placement. The editors of PC Gamer US presented Desperate Housewives with their 2006 "Best Adventure Game" award. During the 10th Annual Interactive Achievement Awards, the Academy of Interactive Arts & Sciences nominated Desperate Housewives for "Outstanding Achievement in Character Performance - Female" (Brenda Strong as Mary Alice Young).
In the United States, Desperate Housewives: The Game debuted at #6 on the NPD Group's weekly computer game sales chart for the October 8–14 period. Tor Thorsen of GameSpot reported that the game "instantly became the subject of widespread derision" upon its announcement, but that its first-week placement suggested its "publisher may be having the last laugh". Desperate Housewives ultimately achieved sales in excess of 400,000 copies by January 2009.
Future
On June 28, 2017, MegaZebra released an officially licensed mobile game also entitled Desperate Housewives: The Game. This episodic mystery game allows players to create their own housewife that has recently moved to Wisteria Lane, and acts as a prequel to the main television series. The game received its final update in February 2019. | WIKI |
Page:United States Statutes at Large Volume 47 Part 1.djvu/438
414 72d CONGRESS. SESS. I. CH. 314 . J UNE 30, 1932 . Saving provisions. I:Snue n effec etc., SEC. 405. (a) All orders, rules, regulations, permits, or other privi- le ges in effect. leges made, issued, or granted by or in respect of any executive agency or function transferred or consolidated with any other execu- tive agency or function urrder the provisions of this title, and in effect at the time of the transfer or consolidation, shall continue in effect to the same extent as if such transfer or consolidation had not occurred, until modified, supers eded, or repeale d. No suit abated by (b) No suit, action, or other proceeding lawfully commenced by reason of transfer of authority, etc. or again st the h ead of a ny depar tment or executiv e agency or othe r officer of the United States, in his official capacity or in relation to the discharge of his official duties, shall abate by reason of any trans- fer of a uthority, powers , and du ties fro m one off icer or executiv e agency of the Government to another under the provisions of th is title, but the court, on motion or supplemental petition filed at any time within twelve months after such transfer takes effect, showing a ne cess ity for a survival of such suit, action, or other proceeding to obtain a settlement of the questions involved, may allow the same to be maintained by or against the head of the department or execu- ti ve agency or other officer of the United States to whom the authority, powers, anti duties are transferred. Existing laws to re- (c) All laws relating to any executive agency or function trans- main in force. ferred or consolidated with any other executive agency or function under the provisions of this title, shall, in so far as such laws are not inapplicable, remain in full force and effect, and shall be adminis- tered by the head of the executive agency to which the transfer is made or with which the consolidation is effected. Statut ory age ncies. S TATU TORY AGE NCIE S Transfer or elimina- SEC. 406. Whenever, in carrying out the provisions of this title, the tion by President not provided. President concludes that any executive department or agency created by statute should be abolished and the functions thereof transferred to another executive department or agency or eliminated entirely the Report to Congress. authority granted in this title shall not apply, and he shall report his conclusions to Congress, with such recommendations as he may dee m proper. Disapproval of Ex- DISAPPROVAL OF EXECUTIVE ORDER ecutiv e order. Orders to be trans- SEC. 407. Whenever the President makes an Executive order under milted to Congress the provisions of this title, such Executive order shall be transmitted during sessions. Post, p .1519. to the Congress while in session and shall not b ecome effective u ntil after the expiration of sixty calendar days after such transmission, Effective date. unless Congress shall sooner approve of such Executive order or orders by concurrent resolution, in which case said order or orders Provisos, shall become effective as of the date of the adoption of the resolution Congress of order if Pro vid ed, Th at if Co ngress s hall adj ourn bef ore the expirati on of sixty calendar days from the date of such transmission such Exec- utive order shall not become effective until after the expiration of sixty calendar days from the opening day of the next succeeding Resolution of disap- regular or special session : Provided further, That if either branch proval. of Congress within such sixty calendar days shall pass a resolution disapproving of such Executive order, or any part thereof, such Executive order shall become null and void to the extent of su ch Consolidationsofeer- disapproval : Provided further, That in order to expe dite the merg- tain activities without compliance herewith, ing o certain activities, the President is authorized and requested authorized. to proceed, without the application of this section, with setting up consolidations of the following governmental activities : Public SAVING PROVISIONS | WIKI |
Learning The Secrets About
Tips of Living Up to 100 years
The person known to have lived on highest number of years is Jeanne Calment as the Guinness World Records indicate. This individual died at the age of 122 years. It is essential to note that a person who wishes to live to hundred years has to follow some simple steps below.
The essential step for a person to take is to give more priority to sleeping. You will increase the possibility of living to 100 when your rest, play and work are hard. The production of adults would be increase to optimum when they obtain time to speed adequately at night. The important aspect to know is that sleeping for like 7-9 hours will result many benefits even when the time of sleep for adults is never constant. It is vital for a person to adhere to routine each day. In this case, a person ought to go bed same time each night and wake up same time each morning of the week. It is prudent to consult your doctor when you face it a challenge in sleeping. It is with the best tools, therapies and treatments that will be offered by a doctor that your issues with sleep will be addressed in the right manner.
You should consider the meat that you consume. It is essential to know that juicy steak consumption more often is not bad. The only challenge that is there is that meat can lead to colorectal cancer, especially when it exceeds 18 oz. A person should learn that processed meat could lead cancer because of the carcinogens formed in the course of smoking or grilling. The other thing to know is that when nitrates are added to meat, carcinogens form, thus leading to cancer. It will be prudent for who use grilling meat, to reduce volume, flip it more often and marinate it to avoid cancer risks.
It will be essential for a person to have the reason for his/her living. The important fact to note is that life expectancy in Japan is more than mean of the globe. This can be attributed to the fact that people have a sense of purpose in their lives. You need to learn the Japan people are always excised as well as revitalized to start off their each day. With the reason for living, people will be able to carry out things in the best manner possible. A person who has no reason of living ought to start identifying what gives him/her joy in life. It will be prudent for a person who happiness largely depends on his/her family to secure opportune time to meet them to secure the happiness he/she desires. It is so advantageous for a person to have sense of purpose because it will increase optimism which in effect will make the life expectancy of a person to increase. | ESSENTIALAI-STEM |
Tag Archives: glutamine deprivation
ERN1 modifies the effect of glutamine deprivation on tumor growth related factors expression in U87 glioma cells
O. H. Minchenko, A. P. Kharkova, O. S. Hnatiuk, O. Y. Luzina, I. V. Kryvdiuk, A. Y. Kuznetsova
Palladin Institute of Biochemistry, National Academy of Sciences of Ukraine, Kyiv;
e-mail: ominchenko@yahoo.com
The expression of a subset of genes encoding important tumor growth related factors in U87 glioma cells with ERN1 (endoplasmic reticulum to nucleus signaling 1) loss of function as well as upon glutamine deprivation was studied. It was shown that glutamine deprivation down-regulated the expression level of ATF6 (activating transcription factor 6), EIF2AK3/PERK (eukaryotic translation initiation factor 2 alpha kinase 3), GLO1 (glyoxalase I), BIRC5 (baculoviral IAP repeat-containing 5), and RAB5C (RAB5C, a member of RAS oncogene family) mRNAs in control glioma cells. At the same time, the expression level of HSPB8 (heat shock 22kDa protein 8) and HSPA5/GRP78 (heat shock protein family A (Hsp70) member 5) mRNAs was resistant to glutamine withdrawal in these glioma cells. It was also shown that inhibition of ERN1, which controled cell proliferation and tumor growth, modified the effect of glutamine deprivation on the expression levels of most studied genes in U87 glioma cells: up-regulated the expression of ATF6 and HSPA5 genes and enhanced sensitivity of EIF2AK3 and BIRC5 genes to glutamine withdrawal. Furthermore, the expression of all studied genes, except EIF2AK3, was down-regulated in ERN1 knockdown glioma cells in the presence of glutamine. It was demonstrated that glutamine deprivation affected the expression of most studied genes in ERN1 dependent manner and that these changes possibly contributed to the suppression of glioma growth from cells without ERN1 signaling enzyme function.
Expression of ubiquitin specific peptidase and ATG7 genes in U87 glioma cells upon glutamine deprivation
O. V. Halkin1, D. O. Minchenko1,2, О. O. Riabovol1,
V. V. Telychko1, О. O. Ratushna1, O. H. Minchenko1
1Palladin Institute of Biochemistry, National Academy of Sciences of Ukraine, Kyiv;
e-mail: ominchenko@yahoo.com;
2Bohomolets National Medical University, Kyiv, Ukraine
We have studied the effect of glutamine deprivation on the expression of genes encoding for ubiquitin specific peptidases (USP) and ubiquitin activating enzyme E1-like protein/autophagy related 7 (GSA7/ATG7) in U87 glioma cells in relation to inhibition of inositol requiring enzyme-1 (IRE1). It was shown that exposure of control glioma cells (transfected by empty vector) upon glutamine deprivation led to suppression of USP1 and ATG7 mRNA expression and up-regulated USP25 mRNA. At the same time, glutamine deprivation did not significantly change USP4, USP10, USP14, and USP22 gene expressions in these cells. Inhibition of ІRE1 signaling enzyme function in U87 glioma cells increased effect of glutamine deprivation on the expression of USP1 gene and introduced sensitivity of USP4 and USP14 genes to this condition. Therefore, glutamine deprivation affected the expression level of most studied genes in gene specific manner in relation to the functional activity of IRE1 enzyme, a central mediator of endoplasmic reticulum stress, which controls cell proliferation and tumor growth.
Expression of IGFBP6, IGFBP7, NOV, CYR61, WISP1 and WISP2 genes in U87 glioma cells in glutamine deprivation condition
O. H. Minchenko1, A. P. Kharkova1, D. O. Minchenko1,2, L. L. Karbovskyi1
1Palladin Institute of Biochemistry, National Academy of Sciences of Ukraine, Kyiv;
e-mail: ominchenko@yahoo.com;
2Bohomolets National Medical University, Kyiv, Ukraine
We have studied gene expression of insulin-like growth factor binding proteins in U87 glioma cells upon glutamine deprivation depending on the inhibition of IRE1 (inositol requiring enzyme-1), a central mediator of endoplasmic reticulum stress. We have shown that exposure of control glioma cells upon glutamine deprivation leads to down-regulation of NOV/IGFBP9, WISP1 and WISP2 gene expressions and up-regulation of CYR61/IGFBP10 gene expression at the mRNA level. At the same time, the expression of IGFBP6 and IGFBP7 genes in control glioma cells was resistant to glutamine deprivation. It was also shown that the inhibition of IRE1 modifies the effect of glutamine deprivation on the expression of all studied genes. Thus, the inhibition of IRE1 signaling enzyme enhances the effect of glutamine deprivation on the expression of CYR61 and WISP1 genes and suppresses effect of the deprivation on WISP2 gene expression in glioma cells. Moreover, the inhibition of IRE1 introduces sensitivity of the expression of IGFBP6 and IGFBP7 genes to glutamine deprivation and removes this sensitivity to NOV gene. We have also demonstrated that the expression of all studied genes in glioma cells growing with glutamine is regulated by IRE1 signaling enzyme, because the inhibition of IRE1 significantly down-regulates IGFBP6 and NOV genes and up-regulates IGFBP7, CYR61, WISP1, and WISP2 genes as compared to control glioma cells. The present study demonstrates that glutamine deprivation condition affects most studied IGFBP and WISP gene expressions in relation to IRE1 signaling enzyme function and possibly contributes to slower glioma cell proliferation upon inhibition of IRE1. | ESSENTIALAI-STEM |
Page:EB1911 - Volume 03.djvu/830
but who is known in history as the comte de Chambord. A daughter, afterwards duchess of Parma, was born in 1819.
The duchess of Berry was compelled to follow Charles X. to Holyrood after July 1830, but it was with the resolution of returning speedily and making an attempt to secure the throne for her son. From England she went to Italy, and in April 1832 she landed near Marseilles, but, receiving no support, was compelled to make her way towards the loyal districts of Vendée and Brittany. Her followers, however, were defeated, and, after remaining concealed for five months in a house in Nantes, she was betrayed to the government and imprisoned in the castle of Blaye. Here she gave birth to a daughter, the fruit of a secret marriage contracted with an Italian nobleman, Count Ettore Lucchesi-Palli (1805–1864). The announcement of this marriage at once deprived the duchess of the sympathies of her supporters. She was no longer an object of fear to the French government, who released her in June 1833. She set sail for Sicily, and, joining her husband, lived in retirement from that time till her death, at Brunnensee in Switzerland, in April 1870.
BERRY, JOHN, (1340–1416), third son of John II., king of France and Bonne of Luxemburg, was born on the 30th of November 1340 at Vincennes. He was created count of Poitiers in 1356, and was made the king’s lieutenant in southern France, though the real power rested chiefly with John of Armagnac, whose daughter Jeanne he married in 1360. The loss of his southern possessions by the treaty of Bretigny was compensated by the fiefs of Auvergne and Berry, with the rank of peer of France. The duke went to England in 1360 as a hostage for the fulfilment of the treaty of Bretigny, returning to France in 1367 on the pretext of collecting his ransom. He took no leading part in the war against the English, his energies being largely occupied with the satisfaction of his artistic and luxurious tastes. For this reason perhaps his brother Charles V. assigned him no share in the government during the minority of Charles VI. He received, however, the province of Languedoc. The peasant revolt of the Tuchins and Coquins, as the insurgents were called, was suppressed with great harshness, and the duke exacted from the states of Languedoc assembled at Lyons a fine of £15,000. He fought at Rosebeke in 1382 against the Flemings and helped to suppress the Parisian revolts. By a series of delays he caused the failure of the naval expedition prepared at Sluys against England in 1386, and a second accusation of military negligence led to disgrace of the royal princes and the temporary triumph of the marmousets, as the advisers of the late king were nicknamed. Charles VI. visited Languedoc in 1389–1390, and enquired into his uncle’s government. The duke was deprived of the government of Languedoc, and his agent, Bétizac, was burnt. When in 1401 he was restored, he delegated his authority in the province, where he was still hated, to Bérnard d’Armagnac. In 1396 he negotiated a truce with Richard II. of England, and his marriage with the princess Isabella of France. He tried to mediate between his brother Philip the Bold of Burgundy and his nephew Louis, duke of Orleans, and later between John “sans Peur” of Burgundy and Orleans. He broke with John after the murder of Orleans, though he tried to prevent civil war, and only finally joined the Armagnac party in 1410. In 1413 he resumed his rôle of mediator, and was for a short time tutor to the dauphin. He died in Paris on the 15th of June 1416, leaving vast treasures of jewelry, objects of art, and especially of illuminated MSS., many of which have been preserved. He decorated the Sainte Chapelle at Bourges; he built the Hôtel de Nesle in Paris, and palaces at Poitiers, Bourges, Mehun-sur-Yèvre and elsewhere.
BERRY, or, a former province of France, absorbed in 1790 in the departments of Cher, corresponding roughly with Haut-Berry, and Indre, representing Bas-Berry. George Sand, the most famous of “berrichon” writers, has described the quiet scenery and rural life of the province in the rustic novels of her later life. Berry is the civitas or pagus Bituricensis of Gregory of Tours. The Bituriges were said by Livy (v. 34) to have been the dominating tribe in Gaul in the 7th century, one of their kings, Ambigat, having ruled over all Gaul. In Caesar’s time they were dependent on the Aedui. The tribes inhabiting the districts of Berry and Bourbonnais were distinguished as Bituriges Cubi. The numerous menhirs and dolmens to be found in the district, to which local superstitions still cling, are probably monuments of still earlier inhabitants. In 52 the Bituriges, at the order of Vercingetorix, set fire to their towns, but spared Bourges (Avaricum) their capital, which was taken and sacked by the Romans. The province was amalgamated under Augustus with Aquitaine, and Bourges became the capital of Aquitania Prima. In 475 Berry came into the possession of the west Goths, from whom it was taken (c. 507) by Clovis. The first count of Berry, Chunibert (d. 763), was created by Waifer, duke of Aquitaine, from whom the county was wrested by Pippin the Short, who made it his residence and left it to his son Carloman, on whose death it fell to his brother Charlemagne. The countship of Berry was suppressed (926) by Rudolph, king of the Franks (fl. 923–936). Berry was for some time a group of lordships dependent directly on the crown, but the chief authority eventually passed to the viscounts of Bourges, who, while owning the royal suzerainty, preserved a certain independence until 1101, when the viscount Odo Arpin de Dun sold his fief to the crown. Berry was part of the dowry of Eleanor, wife of Louis VII., and on her divorce and remarriage with Henry II. of England it passed to the English king. Its possession remained, however, a matter of dispute until 1200, when Berry reverted by treaty with John of England to Philip Augustus, and the various fiefs of Berry were given as a dowry to John’s niece, Blanche of Castile, on her marriage with Philip’s son Louis (afterwards Louis VIII.). Philip Augustus established an effective control over the administration of the province by the appointment of a royal bailli. Berry suffered during the Hundred Years’ War, and more severely during the wars of religion in the 16th century. It had been made a duchy in 1360, and its first duke, John [Jean] (1340–1416), son of the French king John II., encouraged the arts and beautified the province with money wrung from his government of Languedoc. Thenceforward it was held as an apanage of the French crown, usually by a member of the royal family closely related to the king. Charles of France (1447–1472), brother of Louis XI, was duke of Berry, but was deprived of this province, as subsequently of the duchies of Normandy and Guienne, for intrigues against his brother. The duchy was also governed by Jeanne de Valois (d. 1505), the repudiated wife of Louis XII. ; by Marguerite d’Angoulême, afterwards queen of Navarre; by Marguerite de Valois, afterwards duchess of Savoy; and by Louise of Lorraine, widow of Henry III., after whose death (1601) the province was finally reabsorbed in the royal domain. The title of duke of Berry, divested of territorial significance, was held by princes of the royal house. Charles (1686–1714), duke of Berry, grandson of Louis XIV., and third son of the dauphin Louis (d. 1711), married Marie Louise Elisabeth (1686–1714), eldest daughter of the duke of Orleans, whose intrigues made her notorious. The last to bear the title of duke of Berry was the ill-fated Charles Ferdinand, grandson and heir of Charles X.
BERRYER, ANTOINE PIERRE (1790–1868), French advocate and parliamentary orator, was the son of an eminent advocate and counsellor to the parlement. He was educated at the Collège de Juilly, on leaving which he adopted the profession of the law; he was admitted advocate in 1811, and in the same year he married. In the great conflict of the period between Napoleon I. and the Bourbons, Berryer, like his father, was an ardent Legitimist; and in the spring of 1815, at the opening of the campaign of the Hundred Days, he followed Louis XVIII. to Ghent as a volunteer. After the second restoration he distinguished himself as a courageous advocate of moderation in the treatment of the military adherents of the emperor. He | WIKI |
User:Francesco Donati/International Lyric Competition of Portofino
CLIP - International Lyric Competition of Portofino is an annual singing competition for young opera singers from all over the world aged between 18 and 32 years. The competition will take place from 2015 in Portofino and the jury is composed of six directors and casting managers of major Italian and European opera houses. Since the first edition of the competition, the jury has been presided over by Maestro Dominique Meyer, Superintendent of the Teatro alla Scala in Milan.
Jury
* Dominique Meyer, Wiener Staastoper and Teatro alla Scala in Milan (editions: I,II,III,IV,V)
* Peter de Caluwe, La Monnaie/de Munt di Bruxelles (editions: I,II,III,IV,V)
* Fortunato Ortombina, Gran Teatro La Fenice in Venice (editions: I,II)
* Tobias Richter, Grand Théâtre de Genève (edition: I)
* Jochen Schönleber, Rossini in Wildbad (edition: I)
* Patricia Cuesta, Ópera de Oviedo (edition: I)
* Evamaria Wieser, Salzburg Festival e Lyric Opera of Chicago (edition: II)
* Gianni Tangucci, Maggio Musicale Fiorentino (editions: II,III,IV,V)
* Eva Kleinitz, Opéra National du Rhin e Staatsoper Stuttgart (editions: II,III)
* Alessandro di Gloria, Teatro Massimo in Palermo (edition: III)
* Christophe Ghristi, Théâtre du Capitole de Toulouse (edition: III)
* Sophie de Lint, Dutch National Opera in Amsterdam (editions: IV,V)
* Olga Kapanina, Bolshoi Theatre in Moscow (editions: IV,V)
* Valerio Tura, New National Theatre Tokyo (edition: IV)
* Annette Weber, Hamburg State Opera (edition: V) | WIKI |
Lesley Lee GOSCH, Appellant, v. The STATE of Texas, Appellee.
No. 69,726.
Court of Criminal Appeals of Texas, En Banc.
Dec. 18, 1991.
Rehearing Denied Feb. 26, 1992.
Will Gray, Houston, for appellant.
Fred G. Rodriguez, Dist. Atty., and Sam Ponder, Charles Strauss and Edward F. Shaughnessy, III, Asst. Dist. Attys., San Antonio, Robert Huttash, State’s Atty., Austin, for the State.
OPINION
McCORMICK, Presiding Judge.
A jury found appellant, Lesley Lee Gosch, guilty of capital murder, and answered penalty issues one and two in the affirmative. The death penalty was assessed as punishment. Now before this Court appellant raises five points of error. We will affirm the conviction.
We begin by addressing appellant’s claim that the evidence is insufficient to corroborate an accomplice’s testimony. Appellant was indicted for the offense of capital murder; in pertinent part the indictment reads as follows:
“[0]n or about the 18th day of September, A.D., 1985, LESLEY LEE GOSCH, hereinafter called defendant, did then and there intentionally cause the death of an individual, namely: REBECCA SMITH PATTON, hereinafter called complainant, by shooting the said complainant with a handgun and the said defendant did then and there intentionally cause the death of the said complainant while in the course of committing and attempting to commit the offense of KIDNAPPING upon REBECCA SMITH PATTON”
State’s witness, John Lawrence Rogers, had also been indicted for the capital murder of Rebecca Patton. The State’s case against Rogers was pending at the time of trial. Appellant specifically asserts that the record is devoid of any evidence to corroborate the testimony of Rogers. We disagree.
Article 38.14, V.A.C.C.P., provides that “[a] conviction cannot be had upon the testimony of an accomplice unless corroborated by other evidence tending to connect the defendant with the offense committed; and the corroboration is not sufficient if it merely shows the commission of the offense.” The test for deciding whether there is sufficient corroboration “is to eliminate from consideration the evidence of the accomplice witness and then to examine the evidence of the other witnesses with the view to ascertain if there be inculpatory evidence, that is evidence of incriminating character which tends to connect the defendant with the commission of the offense.” Edwards v. State, 427 S.W.2d 629 (Tex.Cr.App.1968). See also Reed v. State, 744 S.W.2d 112, 125 (Tex.Cr.App.1988). The corroborative testimony need not directly link the accused to the crime or be sufficient in itself to establish guilt. Richardson v. State, 700 S.W.2d 591, 594 (Tex.Cr.App.1985); Castaneda v. State, 682 S.W.2d 535, 537 (Tex.Cr.App.1984).
All facts, both direct and circumstantial, may be examined in ascertaining whether sufficient corroboration exists. Reed, 744 S.W.2d at 126. If the combined cumulative weight of the other incriminating evidence tends to connect the accused with the commission of the offense, then the mandate of Article 38.14 has been fulfilled. See Jackson v. State, 745 S.W.2d 4, 13 (Tex.Cr.App.), cert. denied, 487 U.S. 1241, 108 S.Ct. 2916, 101 L.Ed.2d 947 (1988); Reed, 744 S.W.2d at 125; Mitchell v. State, 650 S.W.2d 801, 807 (Tex.Cr.App.1983), cert. denied 464 U.S. 1073, 104 S.Ct. 985, 79 L.Ed.2d 221 (1984); Pinson v. State, 598 S.W.2d 299, 302 (Tex.Cr.App.1980); Edwards, 427 S.W.2d at 632. An analysis of the accomplice and non-accomplice testimony is necessary in the case before us to ascertain if there is anything of an incriminating character which tends to connect appellant to the murder of Rebecca Patton other than the testimony of John Rogers.
Accomplice Testimony
The accomplice witness, Rogers, was a long-time acquaintance of appellant. At some point in 1984, Rogers lived with appellant and appellant’s girlfriend, a woman named Georgina. In August of 1985, appellant told Rogers that he was concerned about going to federal prison on a weapons violation conviction. Appellant felt that it would not be “constructive” for him to be imprisoned for this offense and sought to have Rogers aid him in fleeing the country. The two originally planned to rob a bank but Rogers rejected this alternative as “too risky and too violent.”
The two then discussed a second alternative — that being kidnapping and ransoming the wife of a bank president. Appellant informed Rogers that he knew of two potential targets in the Alamo Heights area of San Antonio and, in the latter part of August of 1985, appellant began to focus on a specific target for his extortion scheme. In the latter part of August or early September of 1985, appellant first mentioned the name of Frank Patton as a potential target for the extortion plan.
Approximately two weeks later, Rogers and appellant began to formalize their scheme. They drove by the Patton home in early September to ascertain whether the plan could be completed safely. In mid-September appellant and Rogers began to take steps to carry out their plans. They planned that appellant was to gain access to the Patton home under the guise of delivering flowers to Rebecca Patton. After entering the home, appellant was to bind his victim with duct tape and then take her to a secluded, rural area of Bexar County. Rogers’ role was to go to North Star Mall and wait for Frank Patton to arrive with a ransom payment. Originally, this scheme was to begin on September 16, 1985.
On September 15, 1985, appellant and Rogers made a dry run by the Patton residence. On September 16, at approximately 8:80 a.m., Rogers picked up appellant at the Windsor Park Mall’s “Park and Ride.” The two then drove to a Stop and Go convenience store located in the 500 block of Austin Highway near Alamo Heights. There Rogers purchased a soft drink along with a pastry and appellant bought a carton of milk. After leaving the store, Rogers and appellant drove around the Pat-tons’ neighborhood to determine whether there was much activity on the streets and whether Rebecca Patton’s automobile was parked at the home.
While driving around the neighborhood, Rogers began having second thoughts. Rogers felt that they should carry out their plan another day because of problems with his car. Appellant was angered by Rogers’ position; nevertheless, he agreed to cancel plans for that day. The two agreed to try again the next day, September 17, 1985. Rogers and appellant then left Alamo Heights.
On the 17th of September, Rogers again rendezvoused with appellant at the Park and Ride. The pair once again drove to the same Stop and Go convenience store on Austin Highway. Once again Rogers’ lack of courage and his misgivings about his automobile caused the operation to be postponed. The two agreed to try the next day.
On September 18th, Rogers once again met appellant at the Park and Ride. They once again visited the Stop and Go convenience store on Austin Highway. Rogers and appellant then returned to the Pattons’ neighborhood. After satisfying themselves that Mrs. Patton was at home, the two drove to Rogers’ apartment so that appellant could change his shirt. At Rogers’ apartment, appellant changed out of a camouflage shirt and into a blue one belonging to Rogers’ one-time roommate, Stephen Hurst. Rogers made a phone call (at approximately 10:30 a.m.) to the Patton residence to determine if Mrs. Patton was home alone. Rogers also called the bank where Mr. Patton worked. Rogers was informed that Mr. Patton was in a meeting; Rogers stated that he would call back. After calling the bank, Rogers and appellant returned to Alamo Heights.
Rogers drove appellant to the Pattons’ neighborhood and dropped him off in the vicinity of the Patton home. Appellant left the car with a flower box containing a .22 caliber pistol, a black silencer and a roll of duct tape. Rogers then drove around the block twice; on the second trip around the block, Rogers saw appellant walking toward the bus stop. At this point Rogers picked up appellant. Appellant informed Rogers that no one had answered the door at the Patton home. The two drove around looking for a pay telephone. After finding one, appellant called the Patton home and spoke with Rebecca Patton. He told her that he was from a nursery and that he had sent a man to the house who was unable to deliver some flowers. Mrs. Patton apologized saying she had been unable to hear the door because she had been vacuuming.
At some point between 1:00 p.m. and 2:00 p.m., Rogers again called the Castle Hills bank and asked to speak with Frank Patton. Rogers used the fictitious name of Mr. Anderson in this second call and hung up as soon as Frank Patton answered the phone. After making his call to the bank, Rogers drove appellant back to the Pat-tons’ neighborhood and once again dropped him off in the vicinity of their home. Rogers then drove to a liquor store with a pay telephone and waited for appellant to call.
Rogers stood by the phone for approximately twenty minutes awaiting appellant’s call. The call never came; instead, appellant came running back to the phone booth. Upon seeing Rogers, appellant stated, “There was no need to go get the money because [I] killed her.”
When appellant got into the car, he removed the .22 caliber pistol, silencer and duct tape from the waistband of his blue jeans. The two drove back to appellant’s apartment. Appellant also gave Rogers a bag containing appellant’s shirt and shoes. Rogers placed all these items in the trunk of his car and returned to his apartment. With the exception of the shoes, Rogers took these items, along with a pair of gloves belonging to appellant, to his apartment. Rogers examined the murder weapon at the apartment and determined that it was no longer loaded. Rogers put the two pistols, the two silencers and the ammunition into a brown attache case and gave it to Stephen Hurst that evening. Rogers asked Hurst to take the weapons and put them up out of the way, or, as he phrased it, “put them in the deep freeze.”
On the day after the murder, Rogers picked up appellant at the Wonderland Mall and they returned to Rogers’ apartment. Appellant lived at Rogers’ apartment until the two were arrested on September 25, 1985.
Non-accomplice Testimony
At approximately 11:00 a.m. on September 18, Sherry Satel, Rebecca Patton’s friend, was talking with her over the phone. At some point in their conversation, Rebecca told Sherry that she had another call. She put Sherry on hold and came back on the line a “few seconds” later. Mrs. Patton told Mrs. Satel that someone had called to tell her they would be coming to her home to deliver some flowers. Mrs. Patton was puzzled about who might be sending her flowers. This phone conversation continued until approximately 12:30 p.m.
Sherry Covarrubias related that in September of 1985 she was employed by Stop and Go convenience stores in San Antonio. She was assigned to work the Stop and Go at 506 Austin Highway in Alamo Heights. According to Covarrubias, on September 18 appellant came into her store with a “heavy set” man who was taller than appellant (this individual was later identified as appellant’s accomplice John Rogers). Covar-rubias stated she recalled appellant because she had a conversation with him regarding the thick lenses on his glasses, and because he had been in the store a couple of times in the week prior to September 18th.
On September 18th, at approximately 2:25 p.m., Mrs. Patton called her husband on his private line at the bank. According to Frank Patton’s secretary from the Castle Hills National Bank, Jo Ann Galindo, Mrs. Patton seemed to be in a strange frame of mind. Galindo felt that Mrs. Patton was acting unusually abrupt and unfriendly over the phone. Mrs. Patton told Galindo that she needed to speak to Frank; the secretary put the call on hold and informed Frank Patton that his wife was on the telephone. Moments later, Frank Patton waved Galindo into his office and began to write a note for her trying to explain that there was an extortion threat. Galindo left the office immediately and called the FBI. Another cashier began getting the ransom money together. According to Galindo, at approximately 12:30 that same day, an individual by the name of Mr. Anderson had called and asked to speak with Frank Patton.
Frank Patton testified that he was the president of the Castle Hills National Bank in San Antonio. He had been married to Rebecca for seventeen years. On the morning of September 18th, Frank and his wife jogged around the neighborhood before he left for the bank. Shortly after lunch, his wife called the bank; Mr. Patton’s secretary answered. When he took the call, his wife told him “there is someone here that has to talk to you.” At that point, a male voice came over the phone and informed Mr. Patton that, “I want you to get some money together in a briefcase.” The caller told Mr. Patton he wanted it in “fifties” and “hundreds.” The caller also informed Mr. Patton that the money was to be taken to the picnic area of North Star Mall. While listening to the call, Mr. Patton called the secretary into his office and began to write “extortion threat” on a piece of paper for her to see. Mr. Patton asked how much money the caller wanted. The caller told him to bring “as much as you can get in a brief case.” Before hanging up, the caller informed Mr. Patton that he had “forty-five minutes to get the money there, or it will all be over.”
Shortly after the extortion call, members of the Castle Hills police department arrived at the bank and informed Mr. Patton that his wife was dead. In an attempt to catch the murderer, Mr. Patton went to the picnic area of North Star Mall and stood by the pay phone for an hour. No one came.
According to Mr. Patton’s testimony, he met appellant at Chris Catham’s sailboat shop in San Antonio in June of 1985. At that time he informed appellant that he was a bank president in San Antonio. He gave appellant a business card.
Officer Dornak of the Alamo Heights police department was one of a number of law enforcement officers who were dispatched to the Patton home on the afternoon of September 18th. According to Officer Dornak, the rear door of the Patton home was locked with a dead-bolt. There were no signs of a disturbance.
Officer David Anderson, an investigator with the San Antonio police department, testified that he was also dispatched to the Patton home to collect and preserve any available evidence. Officer Anderson obtained seven spent shell casings found near the body. Another investigator with the San Antonio police department, Officer David DeLuna, testified that he recovered three bullet fragments also near Mrs. Patton’s body. Officer Giles Fortson Alamo Heights police department testified that he was the first law enforcement officer to gain entry to the Patton home. When he arrived, Mrs. Patton’s body was still “warm to the touch.”
Dr. Vincent DeMaio, Chief Medical Examiner of Bexar County, testified that Rebecca Patton had been shot six times in the head. DeMaio recovered the bullet fragments from the skull of the deceased and turned them over to a firearms examiner. According to DeMaio, Rebecca Patton died as a result of multiple gunshot wounds to her head.
Roger Terry, police chief for the city of Alamo Heights, related that on September 25th an individual named Stephen Hurst gave him a brown briefcase. In the briefcase there were two silencers, a .22 caliber Ruger semi-automatic pistol and three boxes of Eley ammunition. Terry took the silencers and the .22 caliber pistol to the Bexar County medical examiner’s office for the purpose of having ballistic tests run on those items. After obtaining these items, the police procured a search warrant for the apartment of John Rogers. Appellant was arrested during the execution of this warrant.
Texas Ranger Bob Steele also assisted in the search of Rogers’ apartment. According to Steele, during the execution of the search warrant police officers found appellant in the apartment and promptly arrested him. Rogers had left the apartment prior to the execution of the warrant and was arrested approximately one mile from the residence. During the search, officers found a number of books and newspapers — one of the books told how a person could change his or her identity and the newspapers contained articles about the Patton murder. Officers also found a crumpled, handwritten note containing the following notation:
“Long-Term Strategic Goals: 1. New I.D. w/ complete history 2. $100 K to $200 K U.S. Cash 3. Closed File on Old I.D.”
Allen Southmayd, a forensic document examiner from the Bexar County Regional Crime Laboratory, testified that he made a handwriting comparison between a job application filled out by appellant, a “bill of sale” also filled out by appellant and the “Things To Do” note found in the Glendale apartment. Southmayd concluded that appellant wrote the “Things To Do” note.
Officers also recovered a pair of blood splattered blue jeans from the apartment; and, in Rogers’ automobile, they found a pair of black gloves, a map of Belize and a story on the nation of Belize along with a birth certificate belonging to Chris Catham.
Jayne Nellis, a forensic serologist with the Bexar County Regional Crime Laboratory, testified that appellant had type “0” blood, while Rebecca Patton had type “A” blood. Nellis also conducted a test on the blood found on the blue jeans seized at the Glendale apartment; this test revealed that the jeans were smeared with type A human blood.
Richard Stengel, a firearms examiner with the Bexar County Regional Crime Laboratory, testified that he performed forensic tests on the Ruger .22 caliber semiautomatic pistol, the two silencers, the bullet fragments that Dr. DeMaio had removed from the skull of the deceased, and the spent shell casings found next to the body. According to Stengel, the ammunition used in the murder was Eley ammunition. Stengel was also able to determine, through test firing of the weapon, that the Ruger .22 caliber pistol was the murder weapon used to cause the death of Rebecca Patton.
Special Agent Larry Swisher of the United States Treasury Department’s Bureau of Alcohol, Tobacco and Firearms testified that, according to the Bureau’s firearms transaction records, the murder weapon (Ruger pistol, Mark II, .22 caliber, serial number 21097013) was purchased at Don’s Gun Sales in San Antonio. The State introduced a document showing that the pistol was purchased in the name of Randall Wroblewski.
Randall Wroblewski testified that he had been appellant’s friend for approximately ten years. Wroblewski related that he had a conversation with appellant concerning appellant’s up coming sentencing hearing in federal court. According to Wroblewski, appellant stated, “[i]f I walk in, I’m not walking out, so I’m not going to show up.” Appellant also told Wroblewski that if the FBI ever inquired about him (appellant), Wroblewski was not to mention appellant’s association with Rogers. Wroblewski also testified that when he purchased the Ruger .22 caliber pistol at Don’s Gun Sales he was purchasing it for appellant. Wroblewski related that he paid for the pistol but he immediately gave it to appellant who kept it thereafter. Wroblewski identified State’s Exhibit Number 52 as the pistol which he purchased at appellant’s request.
The owners of Don’s Gun Sales, Don and Leslie Carter, testified that on Labor Day of 1985 appellant visited their home for the holiday weekend. At that time appellant informed Leslie that he owned a .22 caliber Ruger pistol.
One of Rogers’ acquaintances, Stephen Hurst, testified that during the late summer and early fall of 1985, he was living with Rogers at Rogers’ apartment in San Antonio. According to Hurst, on September 18th, at approximately 5:00 p.m., Rogers gave him a brown briefcase containing three pistols and two silencers. Included among the pistols was a .22 caliber Ruger (identified at trial as the murder weapon). Later that same day, Hurst took the briefcase, containing the weapons and silencers, to the home of John Howells. Howells returned the briefcase with the .22 Ruger to Hurst on September 25th, after which Hurst turned the briefcase and its contents over to the Alamo Heights police department.
John David Howells, a friend of Stephen Hurst and John Rogers, testified that on the day Rebecca Patton was murdered Hurst came to his home. Hurst brought with him the brown briefcase. The brief-, case was locked with a combination lock. Howells did not know the combination. Howells kept the briefcase until the following Monday, at which time John Rogers took it for “two or three” hours. Later that Monday, Howells retrieved the briefcase from Rogers and kept it until the following Wednesday. On that day, Howells returned the briefcase to Stephen Hurst. According to Howells, on the morning before Hurst came to get the briefcase, Hurst had given him the combination to the lock on the briefcase. When Howells opened it, he found that it contained two silencers, a .22 caliber pistol, a couple of boxes of shells and some small rubber disks.
Chris Catham, the owner of Sweetwater Sailcraft, testified that he had known appellant for approximately four years. Appellant worked on a contract basis with Catham until April of 1985 at which time Catham hired appellant to work for an hourly wage. At the time he was hired as a full time employee, appellant filled out and signed an employment application. One of appellant’s duties at Sweetwater Sailcraft was to answer the telephone and make a log of incoming phone calls. That telephone log contained an entry from July 12, 1985, which read, “Frank Patton needs to pick up trailer.” Catham also identified a birth certificate that he had kept in his sailboat shop office. Catham testified that appellant had free access to the office where the birth certificate was kept. (As mentioned above, the police found Chris Catham’s birth certificate in Rogers’ automobile on September 30, 1985.)
Jorge Valdez was one of appellant’s coworkers from the sailboat shop. While working there, appellant introduced Valdez to Frank Patton. At that time, appellant informed Valdez that Patton was the president of a bank. Henry Holly testified that he had also worked with appellant at the Sweetwater Sailcraft Shop in San Antonio. In early September of 1985, appellant told Holly that he was concerned about his upcoming sentencing in a San Antonio federal court. Two days after the murder, on September 20, 1985, appellant asked Holly if he could help him get to Belize by giving him a ride to McAllen.
The defense offered no testimony and closed immediately after the State.
Our examination of the non-accomplice witness testimony reveals the following facts which we conclude sufficiently “tend to connect” appellant to the murder of Rebecca Smith Patton: (1) appellant knew the identity and occupation of the target of the attempted extortion plan, Frank Patton; (2) appellant was seen in the vicinity of the offense in the company of the accomplice on the day of the crime; (3) appellant owned the murder weapon; (4) appellant was arrested at a location where police found clothes splattered with the same blood type as that of the deceased; (5) appellant wrote a note stating he needed “$100 K to $200 K U.S. Cash” and had a motive for obtaining that large amount of money in a hurry; (6) appellant solicited the aid of a friend in an attempt to flee the country two days after the offense. There is ample evidence to corroborate the testimony of John Rogers by tending to connect appellant with the murder of Rebecca Patton. Appellant’s fourth point of error is overruled.
In his first point of error appellant contends that the trial court erred in admitting evidence of extraneous acts of misconduct at the guilt-innocence phase of trial. Specifically, appellant complains that the trial court erred in allowing John Rogers to testify to an extraneous offense regarding appellant’s federal firearms violation conviction.
According to Rogers’ testimony, appellant was afraid of having to do some “federal time” for the offense of the illegal transfer of a silencer. Appellant felt that it would not be “constructive” for him to be incarcerated in a federal prison and he therefore sought an alternative to appearing in federal court on September 20, 1985, for his sentencing hearing. As discussed above, Rogers testified that the two of them concocted a scheme to extort a large amount of cash from a bank president in order to finance appellant’s flight to Belize.
Appellant’s desire to avoid being incarcerated in a federal prison for his weapons offense was the triggering factor of the chain of events which ultimately resulted in the murder of Rebecca Patton. Appellant’s urgent need for thousands of dollars to finance his flight to Belize and thus avoid appearing in federal court was shown to be the motivation of the extortion plot. Evidence which demonstrates the presence of a motive on the part of the accused is admissible if it is relevant as a circumstance tending to prove the commission of the offense. See Russell v. State, 598 S.W.2d 238, 250 (Tex.Cr.App.1980), cert. denied 449 U.S. 1003, 101 S.Ct. 544, 66 L.Ed.2d 300 (1981).
If the evidence in question also happens to involve an extraneous act of misconduct on the part of the accused it is nevertheless admissible if the relevancy value of the testimony outweighs its potential for undue prejudice. See Williams v. State, 662 S.W.2d 344 (Tex.Cr.App.1983); Russell, 598 S.W.2d at 250-251; Barefoot v. State, 596 S.W.2d 875, 886-887 (Tex.Cr.App.1980), cert. denied 453 U.S. 913, 101 S.Ct. 3146, 69 L.Ed.2d 996 (1981). In the case at bar, the testimony of Rogers concerning appellant’s impending sentencing and his need for cash to avoid imprisonment by fleeing the country clearly outweighs any undue prejudice arising from that testimony. The efforts of the accused to avoid future incarceration are clearly admissible to show a motive for committing a seemingly senseless murder. See Valdez v. State, 776 S.W.2d 162, 167 (Tex.Cr.App.1989) (testimony that defendant was on federal parole and knew that he had outstanding warrant for violating this parole by carrying a firearm was admissible to show motive for shooting police officer); Russell, 598 S.W.2d at 251 (testimony that murder victim was a potential witness in a robbery prosecution against the accused held admissible); Barefoot, 596 S.W.2d at 886-887 (testimony that accused was an escapee from New Mexico where he was wanted for criminal sexual penetration of a minor held admissible in trial for murder of police officer who stopped accused for questioning); Hughes v. State, 563 S.W.2d 581, 588 (Tex.Cr.App.1978), cert. denied 440 U.S. 950, 99 S.Ct. 1432, 59 L.Ed.2d 640 (1979) (testimony that accused was placed on probation seven months prior to slaying of police officer held admissible in light of fact that accused was in possession of weapons and credit cards in another individual’s name). We cannot say that the trial court abused its discretion in allowing the jury to hear the complained of evidence. Accordingly, appellant’s first point of error is overruled.
In his second point of error, appellant contends that he was denied the effective assistance of counsel because his trial counsel made no objections when Wroblew-ski and Holly gave testimony relating to his federal parole violation. Appellant insists that counsel should have objected to such testimony. Related to this point of error, appellant contends in his third point of error that he was denied the effective assistance of counsel by the State’s use of this extraneous offense testimony as the “sole” corroboration of the accomplice witness testimony. Once again we disagree with appellant’s position.
In reviewing claims of ineffective assistance of counsel, the standard to be applied is whether an accused received “reasonably effective” assistance. Brewer v. State, 649 S.W.2d 628, 630 (Tex.Cr.App.1976). The Supreme Court formulated a standard of review for an appellate court to utilize in making its decision regarding whether counsel has rendered effective assistance of counsel to his client in Strickland v. Washington, 466 U.S. 668, 104 S.Ct. 2052, 80 L.Ed.2d 674 (1984). Under Strickland a two-pronged test is utilized. First, appellant must demonstrate that counsel’s representation was deficient and not reasonably effective. Second, appellant must show that the deficient performance prejudiced the defense. This two-pronged test is the “benchmark for judging ... whether counsel’s conduct so undermined the proper functioning of the adversarial process that the trial cannot be relied on as having produced a just result.” Strickland, 466 U.S. at 686, 104 S.Ct. at 2064. “The Sixth Amendment ... envisions counsel’s playing a role that is critical to the ability of the adversarial system to produce just results.” 466 U.S. at 685, 104 S.Ct. at 2064. Thus, in determining whether trial counsel’s performance was deficient (the first of the two prongs), the reviewing court must ascertain whether counsel’s errors were so serious that counsel was not functioning in a manner envisioned by the Sixth Amendment. See Strickland, 466 U.S. at 687, 104 S.Ct. at 2064. See also Burger v. Kemp, 483 U.S. 776, 107 S.Ct. 3114, 97 L.Ed.2d 638 (1987); Kimmelman v. Morrison, 477 U.S. 365, 106 S.Ct. 2574, 91 L.Ed.2d 305 (1986).
Because we find that the trial court did not abuse its discretion in allowing the jury to hear testimony concerning the extraneous offense (see point of error number one), we find that counsel was not ineffective for his failure to object at times where the same or similar testimony was presented to the jury. That is, we find that there is no deficiency in counsel’s failure to convince the trial court in the first instance to exclude relevant testimony regarding appellant’s motive and thus subsequently failed to object when the same or similar testimony was brought forward. See Holland v. State, 761 S.W.2d 307, 318-319 (Tex.Cr.App.1988) (holding that “counsel was under no obligation to do what would amount to a futile act”); Bridge, 726 S.W.2d at 566 (because trial court did not err in excusing prospective juror, counsel cannot be faulted for failing to object). Consequently, such testimony could be used to corroborate the accomplice witness’ testimony (see point of error number four). Appellant’s second and third points of error are without merit and are overruled.
In his fifth point of error, appellant contends that the Texas capital murder sentencing scheme is unconstitutional because it contains no provisions for directing and instructing the jury’s consideration of mitigating circumstances at the penalty stage of the trial. Specifically, appellant asks this Court to undertake a “new, detailed re-examination” of the Texas capital sentencing scheme; he submits that the special issues, as currently submitted, are insufficient to allow the jury to give adequate consideration to mitigating evidence which may have been presented during either the guilt-innocence or punishment phase of trial. Although appellant failed to advance his constitutional claims in the trial court we will examine his complaint in light of Penny v. Lynaugh, 492 U.S. 302, 109 S.Ct. 2934, 106 L.Ed.2d 256 (1989).
In Penny the Supreme Court determined that the Texas death penalty statute was unconstitutional as applied because the statutory jury instructions, Article 37.071, V.A.C.C.P., provided no vehicle for the jury to express its “reasoned moral response” and thus give mitigating effect to Penry’s evidence of mental retardation and childhood abuse. The Court reasoned that to meet constitutional muster, the sentencing authority in a capital case must be allowed to consider all relevant mitigating evidence. Penry, 492 U.S. at 317, 109 S.Ct. at 2946. See also Franklin v. Lynaugh, 487 U.S. 164, 108 S.Ct. 2320, 101 L.Ed.2d 155 (1988) (plurality opinion); Lockett v. Ohio, 438 U.S. 586, 98 S.Ct. 2954, 57 L.Ed.2d 973 (1978) (plurality opinion); Green v. Georgia, 442 U.S. 95, 99 S.Ct. 2150, 60 L.Ed.2d 738 (1979); Eddings v. Oklahoma, 455 U.S. 104, 102 S.Ct. 869, 71 L.Ed.2d 1 (1982).
Prior to Penry, the Supreme Court, in examining Article 37.071 in regards to a juror’s consideration of mitigating evidence, explicitly held that “the Texas capital-sentencing procedure guides and focuses the jury’s objective consideration of the particularized circumstances of the individual offense and the individual offender before it can impose a death sentence.” Jurek v. Texas, 428 U.S. 262, 274, 96 S.Ct. 2950, 49 L.Ed.2d 929 (1976). In Penry, however, the Court gave special signifi-canee to the phrase “reasoned moral response.” The Court concluded that, in the absence of instructions informing the jury that it could consider and give effect to the mitigating evidence of Penry’s mental retardation and abused background, “the jury was not provided with a vehicle for expressing its ‘reasoned moral response’ to that evidence in rendering its decision.” 492 U.S. at 328, 109 S.Ct. at 2952. Thus, in those particular cases where evidence is presented that 1) is mitigating in nature, 2) is relevant to a juror’s determination that death would or would not be the appropriate “reasoned moral response” to the defendant’s particular circumstances, and 3) the mitigating effect of the evidence cannot be considered under the statutory special issues, the trial court judge is required to submit to the jury “instructions informing the jury that it could consider and give effect to the [particular] mitigating evidence ... by declining to impose the death penalty.” Penry, 492 U.S. at 328, 109 S.Ct. at 2952.
Appellant has failed to direct our attention to where in the record there exists mitigating evidence that would give rise to “Penry” special instructions. Nevertheless, from our reading of the record we find that the only evidence offered at trial, even arguably mitigating in nature, was presented to the jury in the context of the second special issue and could be considered by the jury in deciding its response to that issue.
Appellant presented only two witnesses in the punishment phase of trial — a close acquaintance and his adoptive father. The acquaintance testified that appellant was an “easy going nonviolent type person,” and he did not consider it to be unusual that appellant had an interest in explosives and weaponry. Appellant’s father related that he adopted appellant after appellant’s mother (the wife of his step child) had abandoned him before the age of six months. The father also testified that appellant was “very active” in school activities and that appellant had “diplomas hanging all over the wall in his room that he won from various organizations.” He testified that appellant was adept in science and that he had a high IQ. Appellant was an Eagle Scout. The father also testified that appellant was a gunsmith and that he enjoyed the “engraving and all this fine workmanship” involved with gun making. Appellant’s father further testified that appellant used to experiment with explosives until he disfigured his hand and lost sight in one of his eyes in an accident that involved experimenting with nitroglycerin.
Certainly appellant’s evidence is not of the same quality and character as that facing the Supreme Court in Penry. There the Court confronted evidence demonstrating that Penry suffered from organic brain damage and moderate mental retardation. He was shown to have had a gruesome upbringing where as a youth he was beaten frequently resulting in a variety of learning and behavioral dysfunctions in his adult life. The Supreme Court determined that such mitigating evidence “ha[d] relevance to his moral culpability beyond the scope of the special issues and that the jury was unable to express its ‘reasoned moral response’ to that evidence in determining whether death was the appropriate punishment.” 492 U.S. at 322, 109 S.Ct. at 2948. The evidence in this case, is unrelated to any aspect of how or why death in this case would or would not be an appropriate response to appellant’s actions. That is, because the evidence in the case before us is dissimilar to that found in the Penry, we conclude that appellant’s claim that the Texas death penalty statute is unconstitutional is without merit in this case where the jury could give mitigating effect to any mitigating evidence through the special issues that were submitted. See Trevino v. State, 815 S.W.2d 592 (Tex.Cr.App.1991); Russell v. Lynaugh, 892 F.2d 1205, 1214-1215 (5th Cir.1989); McCoy v. Lynaugh, 874 F.2d 954, 966 (5th Cir.1989). See also Franklin v. Lynaugh, 487 U.S. at 177, 108 S.Ct. at 2328. Accord Stewart v. State, 686 S.W.2d 118, 121 (Tex.Cr.App.1984), cert. denied 474 U.S. 866, 106 S.Ct. 190, 88 L.Ed.2d 159 (1985) (this Court holding that the questions prescribed under Article 37.-071 allowed the jury to grasp the logical relevance of mitigating evidence, and as such there was no need to further charge the jury regarding evidence of mitigating circumstances); Quinones v. State, 592 S.W.2d 933 (Tex.Cr.App.), cert. denied 449 U.S. 893, 101 S.Ct. 256, 66 L.Ed.2d 121 (1980) (same).
Appellant also attacks the constitutionality of the death penalty statute on the additional ground that it fails to narrow properly the class of persons eligible for the death penalty. This issue has been decided adversely to appellant in Jurek v. State, 522 S.W.2d 934, 938-939 (Tex.Cr.App.1975), affirmed by, Jurek v. Texas, 428 U.S. 262, 268, 96 S.Ct. 2950, 2954-55, 49 L.Ed.2d 929 (1976). We are not persuaded by appellant’s argument to re-review that decision.
Accordingly, appellant’s last point of error is overruled and the conviction is affirmed.
BAIRD, J., concurs in the result.
CLINTON, J.,
dissents for reasons given in his dissenting opinion in Ex Parte Bower, 823 S.W.2d 284 (Tex.Cr.App.1991).
. Included in the trial court’s instructions was a paragraph informing the jury that John Rogers was an accomplice and his testimony alone was insufficient to convict appellant of the offense.
. There is no longer a requirement that the accomplice witness’ testimony be corroborated as to the specific element that makes the murder in question a capital murder. Holladay v. State, 709 S.W.2d 194, 196-199 (Tex.Cr.App.1986).
. This plan to extort money was corroborated by two other witnesses, Henry Holly and Randall Wroblewski. Specifically, Henry Holly testified as follows:
"Q. [By State’s Attorney]: Do you — you ever remember having a conversation with Lesley Gosch regarding some problems he was having about a weapons violation?
"A. Yes, sir.
“Q. All right. Do you recall where this conversation took place?
"A. Jim’s Coffee Shop.
“Q. And do you recall approximately when it took place, say in relationship to the murder of Becky Patton?
"A. I’m no good with dates, but it was a week or so before.
"Q. Okay. Sometime before Mrs. Patton was killed?
"A. Yes, sir.
"Q. What was the conversation about?
"A. Well, we started out talking about sailing, and then we got on to this arms violation that he had been busted on, and he was paranoid about going to the joint.
"Q. What did he say about that?
"A. Well, he was shook up and didn't want to go. But, you know, he didn’t have much choice.”
During the examination of Randall Wroblewski, the State elicited the following testimony:
"Q. [By State’s Attorney]: Did you ever have a conversation with Lesley Gosch about his having to go to see the judge?
"A. He had a conversation that he mentioned he had to go see a judge concerning one of the weapons. Yes, sir, he did.
I think he was relating to me that he was kind of scared of going to jail.
“Q. He was going to drop out of sight or disappear?
"A. Just drop out of sight for a while until the F.B.I. cools their — gets their heat cooled off a little, until everything cools off and come out again.”
. Portions of Holly’s and Wroblewski’s testimony are set out in footnote number 3.
. This Court adopted the Strickland standard in Bridge v. State, 726 S.W.2d 558, 571 (Tex.Cr.App.1986) and Hernandez v. State, 726 S.W.2d 53, 56 (Tex.Cr.App.1986).
. Under our capital sentencing procedure a jury, after finding the evidence sufficient to establish guilt, is required to answer three special issues:
"(1) Whether the conduct of the defendant that caused the death of the deceased was committed deliberately and with the reasonable expectation that the death of the deceased or another would result;
"(2) whether there is a reasonable probability that the defendant would commit criminal acts of violence that would constitute a threat to society; and
"(3) if raised by the evidence, whether the conduct of the defendant in killing the deceased was unreasonable in response to the provocation, if any, by the deceased.” Article 37.071, V.A.C.C.P.
If the jury answers all questions "yes," the court must impose a death sentence. If the jury answers any of the questions "no,” or fails to answer any question, the court must sentence the defendant to life imprisonment.
. The phrase can be traced to Brown v. California, 479 U.S. 538, 107 S.Ct. 837, 93 L.Ed.2d 934 (1987), where Justice O'Connor wrote:
“In my view, evidence about the defendant’s background and character is relevant because of the belief held by this society that defendants who commit criminal acts that are attributable to a disadvantaged background, or to emotional and mental problems, may be less culpable than defendants who have no such excuse. This emphasis on culpability in sentencing decisions has long been reflected in Anglo-American jurisprudence. As this Court observed in Eddings, the common law has struggled with the problem of developing a capital punishment system that is ‘sensible to the uniqueness of the individual.’ 455 U.S. at 110, 102 S.Ct. at 874. Lockett and Eddings reflect the belief that punishment should be directly related to the personal culpability of the criminal defendant. Thus, the sentence imposed at the penalty stage should reflect a reasoned moral response to the defendant’s character, background, and crime rather than mere sympathy or emotion." 479 U.S. at 545, 107 S.Ct. at 841 (O’Connor, J., concurring) (emphasis added).
. We note here that all of the evidence presented by the State was aggravating in nature. The State’s witnesses testified as to appellant's bad reputation in the community, his experimenting with explosives, his prior offenses (robberies and firearms violations), and his unfavorable conduct while being incarcerated on the capital murder charges. We have searched the entire statement of facts — both the statement from the punishment phase and the guilt/innocence phase — to find evidence that would have given rise to special instructions. We were not able to find any such evidence in the guilt/innocence phase of trial.
. The father started to testify that his wife, who had attended the mother after she gave birth to appellant, told him that the child had been mistreated. The State objected that such testimony was hearsay. The trial court sustained the objection and the defense did not further develop this type evidence.
. Our conclusion is buttressed by Penry’s implicit affirmation of the facial constitutionality of the Texas death penalty laws. 492 U.S. at 318, 109 S.Ct. at 2946-2947 (Supreme Court noting that "the facial validity of the Texas death penalty statute had been upheld in Jurek
on the basis of assurances that the special issues would be interpreted broadly enough ... [and that] Penry argues that those assurances were not fulfilled in his particular case ...” [emphasis in the original]). See also Blystone v. Pennsylvania, 494 U.S. 299, 110 S.Ct. 1078, 1081, 108 L.Ed.2d 255 (1990) (Supreme Court noting constitutionality of Texas death penalty after Penry decision). If we were to hold that the slightest bit of good character testimony, not shown to be relevant to the offense or the offender warranted a special instruction in every case, we would have serious doubts as to the statute’s constitutionality. See Furman v. Georgia, 408 U.S. 238, 309-310, 92 S.Ct. 2726, 2762-63, 33 L.Ed.2d 346 (1972) (Stewart, J., concurring).
| CASELAW |
User:AndrewTroccoli
Andrew Troccoli is the founder, principal consultant, and an instructor at Anfeald, LLC. Andrew has worked in the occupational safety and health field in one capacity or another since 1992. Andrew has a wide range of experience that includes occupational safety, occupational health, environmental health, critical incident management, risk management, business insurance, workers compensation, physical security, business continuity, and related areas. Andrew has provided thousands of hours of occupational safety and health training on numerous topics in safety, health, and the environment.
Andrew holds a Bachelor of Science degree from the Colorado State University Department of Environmental and Radiological Health Sciences. Andrew maintains the Certified Safety Professional (CSP) designation from the Board of Certified Safety Professionals and Certified Hazardous Materials Manager (CHMM) designation from the Institute of Hazardous Materials Management. Andrew is a professional member of the American Society of Safety Professionals (ASSP) and has served in a variety of leadership positions at ASSP over the years. Andrew was previously certified as an emergency medical technician (basic, Colorado) and was previously OSHA-authorized to facilitate outreach classes in construction and general industry.
With Sister Mary Alice Murphy, Andrew co-founded a Fort Collins, Colorado based non-profit called the Hand-Up Cooperative, that subsequently merged with a larger Fort Collins, Colorado non-profit called the Homeward Alliance. The Hand-Up Cooperative became a program within Homeward Alliance and the program continues to this day providing job-coaching and job-placement services to the homeless and near-homeless. | WIKI |
Mazie
Mazie may refer to:
People
* Bob Mazie (1938–2017), American college football coach
* Mazie (given name), a variant of Maisie
* Mazie (pop singer)
Places
* Mazie, Kentucky, an unincorporated community
* Mazie, Oklahoma, a census-designated place
Other uses
* "Mazie", a cat, the first live mascot of the New Hampshire Wildcats, between 1927 and 1929 | WIKI |
Agreement on Trade-Related Aspects of Intellectual Property Rights/Part II/Section 2
Section 2: Trademarks
Article 15. Protectable Subject Matter
1. Any sign, or any combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings, shall be capable of constituting a trademark. Such signs, in particular words including personal names, letters, numerals, figurative elements and combinations of colours as well as any combination of such signs, shall be eligible for registration as trademarks. Where signs are not inherently capable of distinguishing the relevant goods or services, Members may make registrability depend on distinctiveness acquired through use. Members may require, as a condition of registration, that signs be visually perceptible.
2. Paragraph 1 shall not be understood to prevent a Member from denying registration of a trademark on other grounds, provided that they do not derogate from the provisions of the Paris Convention (1967).
3. Members may make registrability depend on use. However, actual use of a trademark shall not be a condition for filing an application for registration. An application shall not be refused solely on the ground that intended use has not taken place before the expiry of a period of three years from the date of application.
4. The nature of the goods or services to which a trademark is to be applied shall in no case form an obstacle to registration of the trademark.
5. Members shall publish each trademark either before it is registered or promptly after it is registered and shall afford a reasonable opportunity for petitions to cancel the registration. In addition, Members may afford an opportunity for the registration of a trademark to be opposed.
Article 16. Rights Conferred
1. The owner of a registered trademark shall have the exclusive right to prevent all third parties not having the owner’s consent from using in the course of trade identical or similar signs for goods or services which are identical or similar to those in respect of which the trademark is registered where such use would result in a likelihood of confusion. In case of the use of an identical sign for identical goods or services, a likelihood of confusion shall be presumed. The rights described above shall not prejudice any existing prior rights, nor shall they affect the possibility of Members making rights available on the basis of use.
2. Article 6$bis$ of the Paris Convention (1967) shall apply, mutatis mutandis, to services. In determining whether a trademark is well-known, Members shall take account of the knowledge of the trademark in the relevant sector of the public, including knowledge in the Member concerned which has been obtained as a result of the promotion of the trademark.
3. Article 6$bis$ of the Paris Convention (1967) shall apply, mutatis mutandis, to goods or services which are not similar to those in respect of which a trademark is registered, provided that use of that trademark in relation to those goods or services would indicate a connection between those goods or services and the owner of the registered trademark and provided that the interests of the owner of the registered trademark are likely to be damaged by such use.
Article 17. Exceptions
Members may provide limited exceptions to the rights conferred by a trademark, such as fair use of descriptive terms, provided that such exceptions take account of the legitimate interests of the owner of the trademark and of third parties.
Article 18. Term of Protection
Initial registration, and each renewal of registration, of a trademark shall be for a term of no less than seven years. The registration of a trademark shall be renewable indefinitely.
Article 19. Requirement of Use
1. If use is required to maintain a registration, the registration may be cancelled only after an uninterrupted period of at least three years of non-use, unless valid reasons based on the existence of obstacles to such use are shown by the trademark owner. Circumstances arising independently of the will of the owner of the trademark which constitute an obstacle to the use of the trademark, such as import restrictions on or other government requirements for goods or services protected by the trademark, shall be recognized as valid reasons for non-use.
2. When subject to the control of its owner, use of a trademark by another person shall be recognized as use of the trademark for the purpose of maintaining the registration.
Article 20. Other Requirements
The use of a trademark in the course of trade shall not be unjustifiably encumbered by special requirements, such as use with another trademark, use in a special form or use in a manner detrimental to its capability to distinguish the goods or services of one undertaking from those of other undertakings. This will not preclude a requirement prescribing the use of the trademark identifying the undertaking producing the goods or services along with, but without linking it to, the trademark distinguishing the specific goods or services in question of that undertaking.
Article 21. Licensing and Assignment
Members may determine conditions on the licensing and assignment of trademarks, it being understood that the compulsory licensing of trademarks shall not be permitted and that the owner of a registered trademark shall have the right to assign the trademark with or without the transfer of the business to which the trademark belongs. | WIKI |
Page:The Holy Bible, containing the Old & New Testament & the Apocrypha (Volume 2).djvu/1199
vision of Obadiah.
* HUS saith the Lord God concerning Edom;
* We have heard a rumour from the Lord,
* And an ambassador is sent among the heathen,
* Arise ye, and let us rise up against her in battle.
* Behold, I have made thee small among the heathen:
* Thou art greatly despised.
* The pride of thine heart hath deceived thee,
* Thou that dwellest in the clefts of the rock, whose habitation is high;
* That saith in his heart, Who shall bring me down to the ground?
* Though thou exalt thyself as the eagle,
* And though thou set thy nest among the stars,
* Thence will I bring thee down, saith the Lord.
* If thieves came to thee, if robbers by night, (how art thou cut off!)
* Would they not have stolen till they had enough?
* If the grapegatherers came to thee,
* Would they not leave some grapes?
* How are the things of Esau searched out!
* How are his hidden things sought up!
* All the men of thy confederacy have brought thee even to the border: | WIKI |
Saturday, 26 November 2016
What is Polymorphism in Java? Overriding or Overloading?
Polymorphism vs Overloading vs Overriding
Someone asked me What are the difference between Polymorphism and Overriding in Java and the similar difference between Polymorphism and Overloading. Well, they are not two different things, Polymorphism is an object oriented or OOPS concept like Abstraction, Encapsulation or Inheritance which facilitate the use of the interface and allows Java program to take advantage of dynamic binding in Java. Polymorphism is also a way through which a Type can behave differently than expected based upon which kind of Object it is pointing. Overloading and overriding are two forms of Polymorphism available in Java.
Both overloading and the overriding concept are applied on methods in Java. Since polymorphism literally means taking multiple forms, So even though you have the name of the method same in the case of overloading and overriding, an actual method called can be any of those multiple methods with the same name.
Polymorphism vs Overriding
Overriding is a form of polymorphism which is used in Java to dynamically bind method from the subclass in response to a method call from sub class object referenced by superclass type.
Suppose you have two methods size() in both base class and derived class and Base class variable is pointing to an object which happens to be subclass object at runtime then method from subclass will be called, i.e. overridden method will be called.
This allows to program for interface than implementation, a popular OOPS design principle because Polymorphism guarantees to invoke correct method based upon the object. Method overriding is key for much flexible design pattern in Java.
Polymorphism vs Overloading
Method overloading is another form of Polymorphism though some people argue against that. In the case of overloading, you also got multiple methods with the same name but different method signature but a call to correct method is resolved at compile time using static binding in Java. Overloading is a compile time activity oppose to Overriding which is runtime activity. Because of this reason overloading is faster than method overriding in Java. Though beware with an overloaded method which creates conflict e.g. methods with only one parameter e.g. int and long etc.
What is Polymorphism in Java? Overriding or Overloading?
An example of Polymorphism in Java
Difference between Polymorphism, Overloading and Overriding in Java with ExampleLet's see a short example of Polymorphism in Java. In this example, Pet variable behaves polymorphic because it can be either Cat or Dog. this is also an example of method overriding because makeSound() method is overridden in subclass Dog and Cat.
import java.util.ArrayList;
import java.util.List;
abstract class Pet{
public abstract void makeSound();
}
class Cat extends Pet{
@Override
public void makeSound() {
System.out.println("Meow");
}
}
class Dog extends Pet{
@Override
public void makeSound() {
System.out.println("Woof");
}
}
Let's test How Polymorphism concept work in Java:
/**
*
* Java program to demonstrate What is Polymorphism
* @author Javin Paul
*/
public class PolymorphismDemo{
public static void main(String args[]) {
//Now Pet will show How Polymorphism work in Java
List<Pet> pets = new ArrayList<Pet>();
pets.add(new Cat());
pets.add(new Dog());
//pet variable which is type of Pet behave different based
//upon whether pet is Cat or Dog
for(Pet pet : pets){
pet.makeSound();
}
}
}
Output:
Meow
Woof
Related Posts | ESSENTIALAI-STEM |
DWT filter generator - formfilters.m (for chain processing)
David Valencia December 5, 2010 Coded in Matlab
Used for the chain-processing version of the DWT program.
For details go to the blog post:
http://www.dsprelated.com/showarticle/126.php
% Created by José David Valencia Pesqueira
% UPIITA-IPN 2010
% For the DWT chain-processing example
% as posted in DSPrelated.com
% http://www.dsprelated.com/showcode/44.php
%
function [hx] = formfilters(n_stages,branch,h0,h1)
p = branch;
% Seed vector
hx = 0;
hx(1) = 1;
switch n_stages
case 1
if mod(branch,2) ~= 0
hx = h0;
else
hx = h1;
end
case 2
switch branch
case 1
hx = conv(h0,upsample2(h0,2));
case 2
hx = conv(h0,upsample2(h1,2));
case 3
hx = conv(h1,upsample2(h0,2));
case 4
hx = conv(h1,upsample2(h1,2));
otherwise
beep;
fprintf('\nFor a 2-stage bank there cannot be a fifth branch');
end
otherwise
for i=0:n_stages-2
q = floor(p /(2^(n_stages-1-i)));
if (q == 1)
hx = conv(hx,upsample2(h1,2^i));
else
hx = conv(hx,upsample2(h0,2^i));
end
% p = mod(p,2^(n_stages-1-i)); %For DWPT
p = mod(2^(n_stages-1-i),p); %For DWT
end
t = mod(branch,2);
if(t == 1)
hx = conv(hx,upsample2(h0,2^(n_stages-1)));
else
hx = conv(hx,upsample2(h1,2^(n_stages-1)));
end
end
Comments:
There are no comments yet!
Sorry, you need javascript enabled to post any comments. | ESSENTIALAI-STEM |
Page:An Elementary History of Art.djvu/74
44 Greek Architecture. of Lysicrates, in which we see the Egyptian and Asiatic features combined with the Ionic. This monument was erected in 334 B.C. (Fig. 20.) Fragments have lately been found of the colossal mauso- leum at Halicarnassus, erected to Mausolus, king of Caria, by his widow Artemisia, in 353 B.C. It was one of the Seven Wonders of the World, and we must consider it to have been the finest structure of the kind ever discovered. Some marble pilasters with richly inlaid panels, a statue of the king in several pieces (now joined together, and at the British Museum), and part of the quadriga (i. e. four- horse chariot) which crowned the monument, were amongst the ornaments excavated. Asia Minor also contains a good many remains of fine buildings of the Corinthian style belonging to this age. Such are the temple of Athena at Priene, dedicated to the patroness of the arts by Alexander the Great, and the famous temple of Apollo at Miletus — a huge dipteral building, 303 ft. long by 164 wide. | WIKI |
Page:Life with the Esquimaux - 1864 - Volume 1.djvu/65
44 house; and these stoves require 100 barrels of coal and five fathoms of wood.
There are reckoned to be 1,700 Esquimaux sealers in Greenland, 400 fishers, and one Esquimaux officer (a clerk), whose father was a Dane and the Governor of Lieveley—Goodhavn. In addition, there are of Esquimaux 17 foremen and boatsmen; 22 coopers and blacksmiths; 87 sailors; 15 pensioners, whose business is to look after goats, and who get half rations of beer, pork, meat, and butter, &c. but full rations of peas, barley, &c. There are also 20 native catechists or missionaries. The European missionaries and priests number 13 German and 11 Danish.
Of first and second governors there are 31.
Three doctors visit each place one year. There are 36 European clerks; 7 boat-steerers; 28 coopers, carpenters, and blacksmiths; 19 sailors and cooks; and 8 pensioners.
The whole body of missionaries are paid per annum, in Danish money, $16,360; of which amount Government House gives $14,650, and the East India Missions, at the outside, $2,000. For schools and school-books the sum of $6,500 is appropriated.
I now proceed with my personal narrative.
Among the numerous visitors that greeted us on our arrival, I was astonished to find myriads of musquitoes. Little did we expect so warm a reception in the arctic regions. Talk about musquitoes in the States as being numerous and troublesome! Why no man who has not visited the arctic shores in the months of July and August can have a good idea of these Liliputian elephants. In the States the very hum of a musquito is enough to set any one upon his guard. How many a poor soul there has been kept in a state of torment all night by the presence of only two or three musquitoes! But here, in the North, it is a common, every-hour affair to have thousands at one time around you, some buzzing, some drawing the very life-blood from face, hands, arms, and legs, until one is driven to a state approaching | WIKI |
Thread:User talk:CodeCat/Changes to Module:links/reply
I didn't think it was really significant, and it makes more sense if transliterations are shown the same always. Do you think transliterations for normal links should not be in italics while transliterations for term links are? | WIKI |
User:Riferimento
Wikipedia is the place where fools push their personal agendas and disregard the work of legitimate published experts.
This editor is taking a vacation. Good-bye
This editor no longer edits under this name. | WIKI |
Charley Boswell
Charles A. Boswell (December 22, 1916 – October 22, 1995) was an Alabama football player and a blind golf player who fought in World War II. He was born in Birmingham, Alabama. He graduated from Ensley High School in 1936, earning a football scholarship to attend the University of Alabama. He won a minor league baseball spot with the Atlanta Crackers in 1941, but was drafted into the United States Army. He was promoted to captain of the Third Battalion, 335th Infantry Regiment, 84th Infantry Division. During action, Boswell was attempting to rescue a wounded comrade from a burning Sherman tank when the tank exploded, leaving him permanently blinded. He took up golf during his rehabilitation and eventually placed second at the National Blind Golf Championship in 1946. He won the championship at the Northland Country Club in Duluth, Minnesota the following year. He subsequently won 16 national championships and 11 international championships over the span of his career. During his career, Boswell shot three holes in one. He was inducted into the Alabama Hall of Fame in 1972. | WIKI |
Waistband
A waistband is a strip of material that is either elastic or some other confining fabric that encircles the waist, usually as a component of clothing such as skirts, trousers, shorts, swimsuits, and undergarments.
A waistband can be a complete undergarment, worn to limit expansion of the abdomen, to meet various objectives including to help prevent overeating, to encourage mindful eating, to encourage good posture, or to immediately slim the appearance of the waist (much like a corset, also sometimes called a waist cincher, or girdle).
A waistband can be an outer garment, worn for fashion, or for utility.
History
Historically, in northern India, waistbands served various purposes including fastening miscellaneous items to oneself, such as knives. In ancient history in the southern Levant, the waistband could serve as a status symbol when people would adorn themselves with ornaments attached to their waistbands. In the early 19th century, members of some Taoist branches had their waistbands colored as a distinguisher and in order to symbolize their membership of the sect. In the western world during the 19th century, the contortion of waistbands was less pronounced due to the fashionability of suspenders.
Material and culture
Among some members of the Yoruba, the placement of beads upon their waistbands is an established tradition that is believed to enhance and accentuate a women's femininity. The dimensions of the waistband serve as a contrivance for streamlining waist measurements. Waistbands are often designed with belt loops in order to allow for variation in case of manufacturer subtleties or weight variation in the wearer. A recent Debenhams survey revealed that the placement of one's waistband by males varies with age, with mid-teen boys placing them the lowest, while it steadily rises until the age of 57. The exposure of the underpant waistband has become a trend among followers of grunge music and hip-hop. In stretchy waistbands, the material can be made of various materials including rubber and latex. In contemporary times, waistbands are more picturesque and scintillating compared to previous designs. In western culture waist bands are now often used to achieve body goals such as to prevent overeating in order to maintain a healthy weight.
Unwanted erections
Some men use the waistband in order to hide a genital bulge (also known by the informal terms man-bulge or moose-knuckle ) in order to avoid embarrassment. During an erection, this is done by jutting it upwards beneath the waistband. This approach may on occasion be colloquially and informally referred to by slang terms such as a waistband tuck, the waistband trick, the uptuck or the tuck, the "6 to midnight", or the boner tuck. Although such penile concealment is common in many cultures, some analysts have proposed limiting such a sentiment to informal etiquette so it mitigates the possibility of a young male's propensity for genital dysphoria and subsequent gender dysphoria or body dysmorphia. | WIKI |
Page:The Ambassadors (London, Methuen & Co., 1903).djvu/327
Rh reasoning he still hung fire. He had been waiting for Mrs. Pocock and the sound of the oracle; but he had to gird himself afresh—which he did in the embrasure of the window, neither advancing nor retreating—before provoking the revelation. It was apparently for Sarah to come more into view; he was at her service when the sense of it should move her. She did, however, as meanwhile happened, come more into view: only she came, luckily, at the last minute, not in the form he had conceived. The occupant of the balcony was after all quite another person, a person presented, on a second look, by a charming back and a slight shift of her position, as beautiful, brilliant, unconscious Mamie—Mamie alone at home, Mamie passing her time in her own innocent way, Mamie in short, rather shabbily used, but Mamie absorbed, interested and interesting. With her arms on the balustrade and her attention dropped to the street, she allowed Strether to watch her, to consider several things, without turning round.
But the oddity was, that when he had so watched and considered he simply stepped back into the room without following up his advantage. He revolved there again for several minutes, quite as with something new to think of and as if the bearings of the possibility of Sarah had been superseded. For frankly, yes, it had bearings thus to find the girl in solitary possession. There was something in it that touched him to a point not to have been reckoned beforehand, something that softly, but quite pressingly, spoke to him, and that spoke the more each time he paused again at the edge of the balcony and saw her still unaware. Her companions were, plainly, scattered; Sarah would be off somewhere with Waymarsh and Chad off somewhere with Jim. Strether didn't at all mentally impute to Chad that he was with his "good friend"; he gave him the benefit of supposing him involved in appearances that, had he had to describe them—for instance to Maria—he would have conveniently qualified as more subtle. It came to him indeed the next thing that there was perhaps almost an excess of refinement in having left Mamie, in such weather, up there alone, however she might in fact have extemporised, under the charm of the | WIKI |
-- Tower Falls Most in Year After Loss, Outlook: Tel Aviv Mover
Tower Semiconductor Ltd. (TSEM) dropped the
most in a year after the maker of customized chips reported a
second-quarter loss and said this quarter’s sales will fall
short of analysts’ estimates. The shares of the Migdal Haemek, Israel-based company fell
13 percent, the most since August 2011, to 36.30 shekels at the
close in Tel Aviv. Tower tumbled 14 percent to $8.84 at 11:07
a.m. in New York , headed for the biggest drop since December
2008. EZchip Semiconductor Ltd. (EZCH) plunged 22 percent, the most
since October 2008, to 118 shekels after second-quarter sales
missed estimates by about 50 percent. Israel ’s benchmark stock
index lost 0.3 percent. Tower posted a loss of $9.4 million compared with a profit
of $1.7 million a year earlier, according to a statement filed
with the Tel-Aviv Stock Exchange today. Third-quarter sales will
be between $152 million and $162 million, Tower said in the
statement. The mean estimate of three analysts is for sales of
$174 million, according to data compiled by Bloomberg. “The guidance is disappointing and it doesn’t look like
they will get the $200 million in fourth-quarter sales that
investors were expecting,” Eran Jacoby, head of research at DS
Securities & Investments Ltd., said by phone from Tel Aviv.
“This is overshadowing margin improvements they’ve been
making.” Tower said operating margins improved to 31 percent in the
second quarter from 26 percent a year earlier. “We are seeing some discrete markets declining as
consumers move from PCs to tablets and smartphones,” Chief
Executive Officer Russell Ellwanger said in a phone interview
today. “And with the shift to these devices, we are seeing
demand from our other customers, such as Skyworks Solutions
Inc. (SWKS) , whose technology is at the heart of all advanced
smartphones.” To contact the reporter on this story:
Robert Lakin in Tel Aviv at
rlakin1@bloomberg.net To contact the editor responsible for this story:
Claudia Maedler at
cmaedler@bloomberg.net | NEWS-MULTISOURCE |
Talk:Shell chief executive warns Europe may have to ration energy
Review of revision 4683943 [Not ready]
Apologies, I did not realise that the Financial Times was behind a firewall, possibly that is a regional difference? I have removed the content from that article and resubmitted this page for review.--CSJJ104 (talk) 13:41, 16 July 2022 (UTC)
* No worries. The most-cited, paywalled sources are the New York Times, Washington Post, The Telegraph, The Times & The Sunday Times and the FT. --JJLiu112 (talk) 15:49, 16 July 2022 (UTC)
Review of revision 4684043 [Not ready]
I've corrected June 21 to July 21, and to clarify the November 1 date can be found in the article from Reuters. If it helps the full sentence is "European nations have scrambled in recent months to fill winter natural gas storage with the European Commission mandating storage reach at least 80% by November 1."
It has been a while since I've contributed to Wikinews, is the use of hidden text no longer allowed? I have previously used it to let the reviewer know which source to check for attribution, but I see this has been removed from this article.
Before I move this back for review, can I query the last line in the article? Currently this states "There are warnings achieving this target will be difficult if disruption to Russian gas supplies from the invasion of Ukraine continues." but neither source states that the disruption is directly caused by the war. I have attempted to rework this sentence to reflect that supplies are being limited as a response to EU sanctions. I'm not concerned over the exact wording, but would including this seem sensible to you? --CSJJ104 (talk) 01:18, 17 July 2022 (UTC)
* Hi, thanks for pointing out the date. Hidden text is OK, I personally don't like it so I've removed it — anyway, no difference on the reader. See BBC "The bloc has made moves to wean itself off Russian fossil fuels in response to war Ukraine" and "Energy prices jumped earlier this year after Russia invaded Ukraine"; IMO its inclusion draws a relevant parallel as both points are a disruption to what was the pre-invasion status quo. --JJLiu112 (talk) 01:34, 17 July 2022 (UTC)
* looks good for publication. Please resubmit for review. --JJLiu112 (talk) 01:40, 17 July 2022 (UTC)
* I made some minor edits and resubmitted. SVTCobra 01:56, 17 July 2022 (UTC)
* I've reversed your edits: 'on Thursday' and 'Thursday' are equivalent, the Shell company is both well-known and it is not mandatory to specify companies' descriptions in WN articles (Elon Musk emails tell Tesla employees return to office, or "assume you have resigned": "Leaked correspondence between Tesla, Inc. boss Elon Musk"...India grants Novavax Covid-19 vaccine emergency use authorisation for teens: "On Tuesday, the Drugs Controller General of India (DCGI) granted emergency use authorisation to Novavax"), it is not normal practice to wikilink titles (President, Prime Minister, CEO, Head). JJLiu112 (talk) 02:02, 17 July 2022 (UTC)
* I thought it beneficial to make sure readers didn't think it was a Shell corporation and I don't know how global usage of the moniker CEO is. If it said company president, I would not have added a link. Anyway, I am happy to see we published another article. Cheers, SVTCobra 02:09, 17 July 2022 (UTC)
* Regarding the 'on Thursday' and/or on 'July 14' (on front page), it feels to me that without 'on' something like "Speaking at the Aurora Spring Conference Thursday" becomes indistinguishable from the name of the conference. Maybe if we move it earlier, like "Speaking Thursday at the Aurora Spring Conference" it would clear up any possible confusion. Cheers, SVTCobra 02:17, 17 July 2022 (UTC) | WIKI |
Page:Our Neighbor-Mexico.djvu/181
Rh
, and morning reveals the muleteers sleeping soundly under their wagons. Their women find beds under the shed or under the canvas of the wain. An Indian and his wife are stretched, asleep, on a common blanket, on the common ground, under the shed near the gate-way. So we have plenty of comrades inside the gates to rob us of our slumber and our watches. The watch we left at Mexico, fulfilling (this once) the command against putting on of gold and costly apparel; and the slumber they left undisturbed. "I both laid me down in peace and slept, and I awaked; for thou, O Lord, sustained me." David laid himself down and slept in a caravansary not unlike this. His condition, protection, and comfort are ours to-day. How true is it that our Lord is the same yesterday, to-day, and forever!
The morning rays creep in at our doors. We are up and out and off. How splendid is the weather! They never talk of the | WIKI |
%0 Journal Article %J Journal of Geophysical Research-Solid Earth %D 1994 %T Bathymetric Prediction from Dense Satellite Altimetry and Sparse Shipboard Bathymetry %A Smith, W. H. F. %A Sandwell, D. T. %K age %K atlantic %K compensation %K emperor seamount chain %K experimental isostasy %K marine gravity %K ocean %K profiles %K south-pacific %K topography %K worlds oceans %M WOS:A1994PR67500018 %P 21803-21824 %R 10.1029/94jb00988 %U ://WOS:A1994PR67500018 %V 99 %X
The southern oceans (south of 30 degrees S) are densely covered with satellite-derived gravity data (track spacing 2-4 km) and sparsely covered with shipboard depth soundings (hundreds of kilometers between tracks in some areas). Flexural isostatic compensation theory suggests that bathymetry and downward continued gravity data may show linear correlation in a band of wavelengths 15-160 km, if sediment cover is thin and seafloor relief is moderate. At shorter wavelengths, the gravity field is insensitive to seafloor topography because of upward continuation from the seafloor to the sea surface; at longer wavelengths, isostatic compensation cancels out most of the gravity field due to the seafloor topography. We combine this theory with Wiener optimization theory and empirical evidence for gravity noise-to-signal ratios to design low-pass and band-pass filters to use in predicting bathymetry from gravity. The prediction combines long wavelengths (> 160 km) from low-pass-filtered soundings with an intermediate-wavelength solution obtained from multiplying downward continued, band-pass filtered (15-160 km) gravity data by a scaling factor S. S is empirically determined from the correlation between gravity data and existing soundings in the 15-160 km band by robust regression and varies at long wavelengths. We find that areas with less than 200 m of sediment cover show correlation between gravity and bathymetry significant at the 99% level, and S may be related to the density of seafloor materials in these areas. The prediction has a horizontal resolution limit of 5-10 km in position and is within 100 m of actual soundings at 50% of grid points and within 240 m at 80% of these. In areas of very rugged topography the prediction underestimates the peak amplitudes of seafloor features. Images of the prediction reveal many tectonic features not seen on any existing bathymetric charts. Because the prediction relies on the gravity field at wavelengths < 160 km, it is insensitive to errors in the navigation of sounding lines but also cannot completely reproduce them. Therefore it may be used to locate tectonic features but should not be used to assess hazards to navigation. The prediction is available from the National Geophysical Data Center in both digital and printed form.
%Z n/a %8 Nov %9 Article %@ 0148-0227 | ESSENTIALAI-STEM |
1,3-alternate calix[4]arene as a homobinuclear ditopic fluorescent chemosensor for Ag+ ions
I. Ting Ho, Kuan Chang Haung, Wen-Sheng Chung*
*此作品的通信作者
研究成果: Article同行評審
48 引文 斯高帕斯(Scopus)
摘要
A novel 1,3-alternate calix-[4]arene L, containing two different cationic binding sites of bis-triazoles and bis-enaminone groups, was synthesized and shown to be a homobinuclear ditopic fluorescent chemosensor for Ag+ ions. The fluorescence intensity of L was selectively enhanced by binding with Ag+ ions in methanol/chloroform (49:1, v/v) cosolvent. In the presence of most competing metal ions, L retains its selectivity toward Ag + ion. The binding constants K1 and K2 of the successive complexation of L with the first and second Ag+ ions were calculated to be 4.46×103 and 9.20×104M -1, respectively. The higher K2 value revealed that a positive allosteric effect participated in the complexation of L with the second equivalent of Ag+. Based on 1HNMR titration results, we inferred that the two distal bis-enaminone and bis-triazole groups on L cooperatively coordinated to Ag+ ions with the help of cation-π interactions from the phenoxy rings. Furthermore, the ESI-MS spectrometry clearly proved the formation of the homobinuclear complex L·(Ag +)2, because a base peak at m/z of 750.1701 was detected and its isotope pattern was in excellent agreement with the calculated one.
原文English
頁(從 - 到)2738-2746
頁數9
期刊Chemistry - An Asian Journal
6
發行號10
DOIs
出版狀態Published - 4 10月 2011
指紋
深入研究「1,3-alternate calix[4]arene as a homobinuclear ditopic fluorescent chemosensor for Ag+ ions」主題。共同形成了獨特的指紋。
引用此 | ESSENTIALAI-STEM |
Various Components of the Heat Pump: Expansion Valve and Evaporator
Expansion Valve
The expansion valve is the pressure reducing devise. When the high pressure, and medium temperature refrigerant enters the expansion valve its pressure reduces suddenly and along with it its temperature also becomes very low suddenly. The expansion valve most commonly used in the heat pumps is copper capillary tube. The refrigerant leaves the expansion valve at extremely low pressure and low temperature in partially liquid state and partially gaseous state.
Evaporator
While in the air conditioners the evaporator is located inside the room, in heat pumps the evaporator is located outside the room and exposed to the atmosphere which is at very low temperature. Just like condenser the evaporator is also made up of copper coil. The low pressure and low temperature refrigerant enters the evaporator coil, due to this the temperature of the coil also reduces drastically and it becomes even lower than the atmospheric temperature.
Since the temperature of the refrigerant inside the evaporator is less than the atmospheric temperature, it tends to absorb the heat from the atmosphere. The fan or the blower blows atmospheric air over the evaporator giving up the heat to the refrigerant and heating it. Since the refrigerant absorbs the heat from atmospheric air, its temperature increases, while its pressure remains constant and it get converted entirely into the gaseous state.
The low pressure and medium temperature refrigerant in gaseous state enters the compressor. In compressor the refrigerant is compressed to extremely high pressure and high temperature in gaseous state. This refrigerant then enters the condenser of the heat pump, where it heats the room air. In this the cycle of operation of the heat pump keeps on continuing. The refrigerant continuously flows through the closed cycle getting heated and cooled during each cycle. The refrigerant selected for the refrigerators and the heat pumps have the capacity to undergo phase changes without undergoing any chemical changes.
This post is part of the series: Heat Pumps
Heat pumps are the devices that are used for heating the room. The heat pump consumes less power than the electric room heater, however their initial cost is high. This series of article describes the various parts of heat pump, its working and comparison to refrigerator and air conditioner.
1. What is Heat Pump?
2. Difference between Heat Pumps and Refrigerators
3. Various Components of the Heat Pump – Part 1
4. Various Components of the Heat Pump – Part 2
5. Various Components of the Heat Pump – Part 3
6. Various Components of the Heat Pump: Part 4
7. Coefficient of Performance of the Heat Pumps
8. Difference between the Heat Pump and the Air-Conditioner | ESSENTIALAI-STEM |
Who Do You Wanna Be
"Who Do You Wanna Be" is the eighth single by the Dutch girl group Luv', released in the autumn of 1979 by Philips/Phonogram Records. This song appears on the formation's debut album With Luv' and their first compilation "Greatest Hits". It was the trio's closing release under their contract with Philips/Phonogram just before they joined CNR/Carrere Records.
Song history
When record producer Hans van Hemert and Luv' planned to leave Phonogram Records in 1979, the label decided as a counterattack to release Who Do You Wanna Be only in the Netherlands. This song was taken from the group's first opus With Luv' and later included on a Greatest Hits album. Luv' group didn't promote the song and instead focused on their Carrere releases (Ooh, Yes I Do and True Luv'). That's why it failed to enter the record charts. Lead singer José Hoebee has stated this is her favourite song from their debut album, and that it was her first choice for a lead single.
Cover version
In 1979, Irish pop group Gina, Dale Haze and the Champions released a cover version of this track. This followed a cover version of You're the Greatest Lover (also originally by Luv') - both singles made the Irish top ten. | WIKI |
Sir William Robertson Academy
Sir William Robertson Academy (formerly Sir William Robertson High School) is a coeducational secondary school of around 1000 pupils, situated in Welbourn, near Lincoln, Lincolnshire, England. The school is sited on a former WWII munitions dump for the nearby Wellingore Aerodrome.
The school used to specialise languages and taught French, Spanish and German, but now only French is taught. From September 2012 the school has catered for students aged 11 to 18. The school also achieved its best ever GCSE results in 2008.
The school has four houses, each with a differently coloured tie: Simla (yellow), Dragoon (red), Chitral (blue) and Lancer (green). These are named after experiences in Sir William Robertson's life.
Secondary modern school
Sir William Robertson Academy is named after Field Marshal William Robertson, born in Welbourn, who served in the First World War.
The school was to open as Leadenham County Secondary Modern School. The name change to William Robertson took place on Wednesday 30 November 1960, at a meeting of Kesteven Education Committee in Sleaford.
It opened on 5 January 1961, with HORSA buildings. The first head was educated in Grantham, who was a flight lieutenant in the RAF during the war. It was officially opened on Tuesday 17 October 1961 by Brian Robertson, 1st Baron Robertson of Oakridge.
The school was to be three form entry. There were new buildings in the mid-1960s. The school was to cost £74,767. The deputy headteacher, Mr Padgett, became the first headteacher of the new secondary modern at Billinghay, in 1963. From September 1964 it worked with Grantham College to teach commercial subjects for one day a week.
Comprehensive
It became a comprehensive around 1975.
Notable former pupils
* Farren Blackburn, film and TV director (1980–85) | WIKI |
“Shameful,” “not a president”: late-night hosts confront Trump’s response to Charlottesville
Late-night talk shows have become one of television’s most unfiltered sources of news, with hosts confronting the day’s events via blunt jokes that, at their sharpest, can cut through the usual fog of the 24-hour news cycle. But since Donald Trump was elected president, late-night has also become more somber. Some hosts — namely Late Night’s Seth Meyers and The Daily Show’s Trevor Noah — are more frequently breaking their usual rhythms to deliver serious monologues of disapproval concerning the president’s policies, the hyper-partisanship that’s paralyzed Washington, and the increasingly bold racism making its presence known in America every waking day. So it’s not surprising that late-night TV took this past weekend’s deadly racism in Charlottesville seriously — but the depth of the resulting solemnity was still startling to see from shows whose first priority is usually just making people laugh. Here are some of the highlights from an unusually somber evening in late night. Before all hell broke loose in Charlottesville, Stephen Colbert had booked an interview with Anthony Scaramucci, who briefly captured America’s attention as Trump’s show-stopping, comically short-tenured White House communications director. But for all of the Mooch’s attempts at rehabbing his humiliation into a victory lap, Colbert framed both his interview with Scaramucci and the episode itself around Trump and Charlottesville, wondering aloud why Trump can’t seem to bring himself to condemn white supremacy without being forced into it. “What a terrible weekend,” Colbert said to begin his show, to a smattering of nervous laughter from the studio audience. After describing the weekend’s terrifying events, Colbert turned his disdain onto President Trump’s responses, the first of which decried violence “on many sides” while the second finally denounced racism as “evil” a full two days later. “It is difficult to express how heartbreaking it is to see something like this happening in our country,” Colbert said, “but here’s one thing that’s not difficult to express: Nazis are bad. The KKK, I’m not a fan!” He took a moment to pause as his audience applauded, then shrugged. “That wasn’t hard. That was easy.” “We went into the weekend worrying about Kim Jong Un starting a war,” Kimmel said as he opened his show, “and came out of it wondering if our president is cutting eyeholes out of his bedsheets.” Like Colbert, Kimmel focused on Trump’s reaction to Charlottesville — or more accurately, his lack thereof. “The one thing he decides to be quiet about is this,” Kimmel said, later adding that “there was two sides, not many sides — and one of those sides had Nazis on it. All he had to do was condemn the Nazis! It shouldn’t have been a difficult thing.” In conclusion, Kimmel declared, “if there’s any silver lining to this — and there isn’t, by the way — it’s that whatever vacation [Trump] was hoping to have is now ruined.” Usually, if Jimmy Fallon interrupts his regularly scheduled programming, it’s because he’s laughing too hard to keep going. As he (somewhat nervously) put it while opening Monday’s episode of The Tonight Show, his iteration of the program “isn’t a political show.” But he then took a left turn from his usual apolitical path to speak plainly about how he found the Charlottesville protest and its aftermath “disgusting.” After describing how much he hates thinking about his daughters growing up in a world like this, Fallon took on Trump more directly. “The fact that it took the president two days to come out and clearly denounce racists and white supremacists is shameful. And I think he finally spoke out because people everywhere stood up and said something. It's important for everyone — especially white people — in this country to speak out against this. Ignoring it is just as bad as supporting it.” It was a slightly confusing statement from someone who typically ignores politics — but also a powerful one for those who no doubt tuned into The Tonight Show expecting an escape and got this instead. In contrast to Fallon, Seth Meyers has made a name for himself in the past year by being straightforward whenever he finds something particularly frightening about the Trump administration, or identifies something worth exposing for its malice. Both those traits were out in force for his first episode of Late Night after Charlottesville, in which he took a gobsmacked, 14-minute “Closer Look” at Trump’s two responses and the chaos surrounding them both. “It shouldn’t take longer for the president to do the right thing than it takes to get a package from Amazon,” Meyers marveled. “In fact, it would’ve taken less time to literally order a DVD copy of Do the Right Thing.” But the most stark part of Meyers’s response on Monday came earlier in the episode, with his opening statement. He immediately slammed Trump’s initial “on many sides” qualification as proof that the “jury is still out” on whether or not Trump is “a normal and decent person.” Meyers also had zero qualms about tying what happened in Charlottesville to Trump and his longstanding rhetoric, including his “racist and insane” insistence that Barack Obama was born in Kenya. Meyers concluded this statement with firm, blunt force: Donald Trump did not immediately denounce the white supremacist movement when given the chance, and now, whether he knows it or not, many of those people see him as leading that movement. The leader of our country is called a ‘president’ because he’s supposed to preside over our society. His job is to lead, to cajole, to scold, to correct our path, to lift up what is good about us and to absolutely and unequivocally and immediately condemn what is evil in us. And if he does not do that — if he does not preside over our society — then he is not a president. You can stand for a nation, or you can stand for a hateful movement. You can’t do both. And if you don’t make the right choice, I am confident that the American voter will. | NEWS-MULTISOURCE |
Page:Bennachie budget.pdf/7
In smoky toun, or valley green,
When stent or tax is pressin’,
Where could the sons o’ toil convene,
If nae in Huntly’s Blessin’?
There wages they discuss an’ spend,
Tho’ drink is trade depressin;
Then give their wives, their fare to mend,
A kick frue Huntly’s Blessin’?
In filth an rags their offspring slouch,
The neighbours sair oppressin’;
While fathers fill the tapster’s pouch,
For waughts in Huntly’s Blessin’?
Tho’ Boards may big an’ garnish schools,
The sober folk assessin’;
Yet drunkards bairns will stand like snools
Depraved thro’ Huntly’s Blessin’?
The Preacher warns, an ſervent prays,
The nation’s sins confessin’;
But tipplers scorn his sober says,
Inspired by Huntly’s Blessin’?
Young men an maids, thro’ a’ the land,
Are Hymen’s torch depressin’;
But drink an' dance go hand in hand,
Wi’ shouts in Huntly’s Blessin’?.
All Publicans, that favoured race,
'Their grateful hearts expressin’,
On signs portray his Lordship’s face,
Inscribed wi’ Huntly’s Blessin’?
There crouse the Northern Cock may craw
The midden-tap possessin';
Frae Pentlan’ Firth to Gallowa’,
Proclaimin' Huntly’s Blessin’?
Yes ; far an’ near, ’mong rich an’ poor,
Development’s progress-in’;
An’ meu for care may find a cure—
But nae in Huntly’s Blessin’. | WIKI |
Template talk:kanjigrade
RFDO discussion: February–March 2017
Unused. The { {kanji} } mentioned in the documentation hasn't existed for ten years. —suzukaze (t・c) 07:45, 19 February 2017 (UTC)
* RFDO failed. —Μετάknowledge discuss/deeds 05:52, 26 March 2017 (UTC) | WIKI |
0
I had a web project setup to run through IIS and now all of a sudden the debugger does not work. It crashes and restarts vs 2012 each time I try and run it. I can run the debugger using the built in server and I can run it on new projects I setup and hook up to IIS.
It seems like some how this one went flaky on me and I'm not sure how to get it to work.
Faulting application name: devenv.exe, version: 11.0.60315.1, time stamp: 0x5142bb7b Faulting module name: KERNELBASE.dll, version: 6.1.7601.18015, time stamp: 0x50b83c8a Exception code: 0xe0434352 Fault offset: 0x0000c41f Faulting process id: 0x1178 Faulting application start time: 0x01ce81aaa9ffdace Faulting application path: C:\Program Files (x86)\Microsoft Visual Studio 11.0\Common7\IDE\devenv.exe Faulting module path: C:\Windows\syswow64\KERNELBASE.dll Report Id: c2498861-ed9e-11e2-ba62-10604b7df519
Application: devenv.exe Framework Version: v4.0.30319 Description: The process was terminated due to an unhandled exception. Exception Info: System.Reflection.TargetInvocationException Stack: at System.RuntimeMethodHandle.InvokeMethod(System.Object, System.Object[], System.Signature, Boolean) at System.Reflection.RuntimeMethodInfo.UnsafeInvokeInternal(System.Object, System.Object[], System.Object[]) at System.Reflection.RuntimeMethodInfo.Invoke(System.Object, System.Reflection.BindingFlags, System.Reflection.Binder, System.Object[], System.Globalization.CultureInfo) at Microsoft.VsPixPkg.XXX_DebugLaunchHook.OnLaunchDebugTargets(UInt32, Microsoft.VisualStudio.Shell.Interop.VsDebugTargetInfo4[], Microsoft.VisualStudio.Shell.Interop.VsDebugTargetProcessInfo[]) at Microsoft.VisualStudio.Shell.Interop.IVsDebugger3.LaunchDebugTargets3(UInt32, Microsoft.VisualStudio.Shell.Interop.VsDebugTargetInfo3[], Microsoft.VisualStudio.Shell.Interop.VsDebugTargetProcessInfo[]) at Microsoft.VisualStudio.Web.Application.DebugCfg.DebugLaunch(UInt32)
• I am having the exact same problem starting around the same time. What virus scanner are you using? I am researching if McAfee Enterprise 8.8 is getting in the way of the cross bit-depth remote debugging... – Chris Tillman Jul 29 '13 at 20:00
2
The problem was that I was trying to debug through IIS when I had the multiple worker processes setup. Once I set it back to one, everything worked fine.
Your Answer
By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy
Not the answer you're looking for? Browse other questions tagged or ask your own question. | ESSENTIALAI-STEM |
Joyeuse marche
Joyeuse marche is a popular orchestra piece by the French composer Emmanuel Chabrier. It is the second half of a pair of orchestral pieces (the other was Prélude pastoral) first performed on 4 November 1888 in Angers, conducted by the composer. The Joyeuse marche is dedicated to Vincent d'Indy.
Background
The march went through several versions before arriving at the popular orchestral version known today.
In September 1888 Chabrier wrote to his publisher that he would be orchestrating six piano pieces: four pieces from his piano suite Pièces pittoresques (which would become his Suite pastorale), as well as La marche française and the Andante in F. Delage proposes that the Andante was originally performed in 1875 at the Cercle de l'Union artistique in Paris, with Jules Danbé conducting his orchestra. However, the pieces are also related to Chabrier's Prélude et marche française for piano 4-hands, completed by May 1885, the Andante having by then become a Prélude.
The concert at which the premiere of the Prélude pastoral and Joyeuse marche took place also included the first performance of Chabrier's Suite pastorale and Habañera, España (all conducted by the composer), plus Rossini's William Tell Overture, Mozart's Divertimento No. 2 for two horns and strings and the Adagietto from Bizet's L'Arlésienne.
By the time of the Paris premiere in April 1889, the title had changed to Marche joyeuse. The piece was again enthusiastically received.
The final version of the work's title was reached at a Lamoureux concert on 16 February 1890, when the march became the Joyeuse marche. However, the Prélude then disappeared until it surfaced among autographs belonging to Robert Brussel in 1943. The Joyeuse marche became particularly popular, and was also played in a piano duet version.
The tempo marking for the march is 'Tempo di marcia molto risoluto e giocoso'.
Keyboard versions
* Prélude et marche française for piano 4-hands, completed by May 1885
* Joyeuse marche for piano, four-hands - 1889
* Transcriptions of Joyeuse marche for piano, four-hands for piano (1890) and for two pianos (1891) by Ernest Alder
Instrumentation
Strings; 2 flutes, 1 piccolo, 2 oboes, 2 clarinets in B flat, 4 bassoons; 4 horns in F, 2 cornets à piston, 2 trumpets, 3 trombones, tuba; timpani, percussion (bass drum, cymbals, side drum, triangle); harp. | WIKI |
User:PoliceSheep99/TalkArchive/3
Adoption
Hello! I saw that you're looking for adoption and was wondering if I might offer myself as an option. I'm familiar with some automated programs (STiki, TW, AWB, HG are the main ones), and our interests seem to overlap vaguely, inasmuch as we're both interested in history and politics. I can hopefully help you out some with whatever it is you're interested in some capacity. —Compassionate727 (T·C) 19:15, 3 September 2018 (UTC)
Thank you for the offer. I would appreciate your teachings Compassionate727. Is there anything I have to do to accept PoliceSheep99 (talk) 19:20, 3 September 2018 (UTC)
* Sorry for the delay! The answer is no, there is not anything in particular expected of you, although I wanted to ensure that there's nothing in particular expected of me before I said as much. This relationship can take whatever former we find most convenient. Doing a quick scan of your 500 most recent contributions, it looks like a lot of WikiGnome-type stuff: a lot of counter-vandalism recently, looks you did NPP-style stuff earlier. Is this generally in line with what you want to do? Do you have any interest in writing articles (new or otherwise)? That will give me some idea of where to go from here. —Compassionate727 (T·C) 22:13, 3 September 2018 (UTC)
* Compassionate727, I am interested in making current articles better and making new articles. I have tried this by, as you said, generally combated vandalism however I would like to try to venture out from that and go into making articles/ making stubs longer. I have tried this a few times with some being okay such as Andrew K.C. Nyirenda and some being nominated for deletion such as Saman Arastoo. Any help or guidance in any of these areas would be greatly appreciated. PoliceSheep99 (talk) 22:37, 3 September 2018 (UTC)
* I promise I've seen this and will respond… soon. …Hopefully tonight. Need to get back to homework now, will be in touch soon. —Compassionate727 (T·C) 19:56, 4 September 2018 (UTC)
* Okay, so. Writing articles on Wikipedia is very hard: not only is an encyclopedia article a very different piece of writing than most of the stuff you write in a high school or college English course, but Wikipedia has this labyrinthine network of standards (we call them policies) about everything from how many sources you need to say that someone to report that someone's been accused of a crime to whether the period goes on the outside or the inside of the parenthesis. The good news is, if I haven't scared you off yet, you've already overcome the biggest obstacle. Specifically in reference to the articles you mention, you appear to be tussling with our notability policy, which is our way of deciding what is important enough to have an article here. There's an overarching standard, the general notability guideline, plus a plethora of specialized guidelines for specific topics ranging from battles to actors. Andrew K.C. Nyirenda was considered acceptable because he's the chief justice of Malawi, and our notability guideline for politicians and judges states that almost all people of such rank are notable. By contrast, Saman Arastoo was not considered okay because he doesn't meet any of the criteria listed in our guideline for actors. Most importantly, he doesn't currently appear to have major roles in multiple notable films (and we have special guidelines for films, too). Because notability is an attribute of the subject rather than the article itself, the fact that an article is not notable doesn't mean there's anything wrong with your writing itself; on the other hand, there's usually nothing you can do to prevent an unnotable article from being deleted, because you can't make it notable. You can demonstrate that it is notable by finding multiple reliable, independent sources that cover the subject in some depth, but often, one finds they simply don't exist.
* That probably doesn't give you a whole lot to go off of. My only advice is to memorize the GNG, and make sure to reference the special guideline when you're considering a specific article. (There's a master list of notability pages in the box on the right at WP:N, and usually finding something from there is simple). Notability is basically the brick wall of content creation, and I'm unfortunately not sure what else to say on the matter. If you have any further questions about notability or anything else pertaining to content creation, of course feel free to ask. —Compassionate727 (T·C) 23:52, 4 September 2018 (UTC)
* For what it's worth, after reviewing the sourcing of Saman Arastoo, I've concluded it is notable and cast in favor of keeping it (you can read my argument on the AfD, but it's essentially that he isn't an actor for the purposes of determining notability because that's not what he's known for). This is one of the more nuanced ones I've run into; we'll have to see what happens (and for the record, you are more than welcome to vote yourself; just remember that arguments decide these discussions, not tallies of votes.) —Compassionate727 (T·C) 00:06, 5 September 2018 (UTC)
Your GA nomination of Ecological economics
Hi there, I'm pleased to inform you that I've begun reviewing the article Ecological economics you nominated for GA-status according to the criteria. This process may take up to 7 days. Feel free to contact me with any questions or comments you might have during this period. Message delivered by Legobot, on behalf of David Eppstein -- David Eppstein (talk) 01:20, 14 September 2018 (UTC)
Your GA nomination of Ecological economics
The article Ecological economics you nominated as a good article has failed ; see Talk:Ecological economics for reasons why the nomination failed. If or when these points have been taken care of, you may apply for a new nomination of the article. Message delivered by Legobot, on behalf of David Eppstein -- David Eppstein (talk) 01:41, 14 September 2018 (UTC)
Orphaned non-free image File:CHS, with Name (PAT).png
Thanks for uploading File:CHS, with Name (PAT).png. The image description page currently specifies that the image is non-free and may only be used on Wikipedia under a claim of fair use. However, the image is currently not used in any articles on Wikipedia. If the image was previously in an article, please go to the article and see why it was removed. You may add it back if you think that that will be useful. However, please note that images for which a replacement could be created are not acceptable for use on Wikipedia (see our policy for non-free media).
Note that any non-free images not used in any articles will be deleted after seven days, as described in section F5 of the criteria for speedy deletion. Thank you. --B-bot (talk) 17:16, 14 September 2018 (UTC)
Speedy deletion nomination of File:CHS, with Name.png
A tag has been placed on File:CHS, with Name.png requesting that it be speedily deleted from Wikipedia. This has been done under section F1 of the criteria for speedy deletion, because the image is an unused duplicate or lower-quality copy of another file on Wikipedia having the same file format, and all inward links have been updated.
If you think this page should not be deleted for this reason, you may contest the nomination by visiting the page and clicking the button labelled "Contest this speedy deletion". This will give you the opportunity to explain why you believe the page should not be deleted. However, be aware that once a page is tagged for speedy deletion, it may be deleted without delay. Please do not remove the speedy deletion tag from the page yourself, but do not hesitate to add information in line with Wikipedia's policies and guidelines. Pkbwcgs (talk) 13:09, 16 September 2018 (UTC)
Non-free rationale for File:CHS, with Name (PAT).png
Thanks for uploading or contributing to File:CHS, with Name (PAT).png. I notice the file page specifies that the file is being used under non-free content criteria, but there is not a suitable explanation or rationale as to why each specific use in Wikipedia is acceptable. Please go to the file description page, and edit it to include a non-free rationale.
If you have uploaded other non-free media, consider checking that you have specified the non-free rationale on those pages too. You can find a list of 'file' pages you have edited by clicking on the "my contributions" link (it is located at the very top of any Wikipedia page when you are logged in), and then selecting "File" from the dropdown box. Note that any non-free media lacking such an explanation will be deleted one week after they have been tagged, as described in section F6 of the criteria for speedy deletion. If the file is already gone, you can still make a request for undeletion and ask for a chance to fix the problem. If you have any questions, please ask them at the Media copyright questions page. Thank you. ShakespeareFan00 (talk) 20:45, 18 September 2018 (UTC)
Your submission at Articles for creation: Harvey Specter (September 24)
Your recent article submission to Articles for Creation has been reviewed! Unfortunately, it has not been accepted at this time. The reason left by Frayae was:
* If you would like to continue working on the submission, go to Draft:Harvey Specter and click on the "Edit" tab at the top of the window.
* If you now believe the draft cannot meet Wikipedia's standards or do not wish to progress it further, you may request deletion. Please go to Draft:Harvey Specter, click on the "Edit" tab at the top of the window, add "db-self" at the top of the draft text and click the blue "publish changes" button to save this edit.
* If you need any assistance, you can ask for help at the [//en.wikipedia.org/w/index.php?title=Wikipedia:WikiProject_Articles_for_creation/Help_desk&action=edit§ion=new&nosummary=1&preload=Template:Afc_decline/HD_preload&preloadparams%5B%5D=Draft:Harvey_Specter Articles for creation help desk] or on the [//en.wikipedia.org/w/index.php?title=User_talk:Frayae&action=edit§ion=new&nosummary=1&preload=Template:Afc_decline/HD_preload&preloadparams%5B%5D=Draft:Harvey_Specter reviewer's talk page].
* You can also use Wikipedia's real-time chat help from experienced editors.
— Frayæ (Talk/Spjall) 20:04, 24 September 2018 (UTC)
File:Lord Buckethead.jpeg
Hi, I'm RonBot, a script that checks new non-free file uploads. I have found that the subject image that you recently uploaded was more than 5% in excess of the Non-free content guideline size of 100,000 pixels. I have tagged the image for a standard reduction, which (for jpg/gif/png/svg files) normally happens within a day. Please check the reduced image, and make sure that the image is not excessively corrupted. Other files will be added to Category:Wikipedia non-free file size reduction requests for manual processing. There is a full seven-day period before the original oversized image will be hidden; during that time you might want to consider editing the original image yourself (perhaps an initial crop to allow a smaller reduction or none at all). A formula for calculation the desired size can be found at WP:Image resolution, along with instructions on how to tag the image in the rare cases that it requires an oversized image (typically about 0.2% of non-free uploads are tagged as necessarily oversized). Please contact the bot owner if you have any questions, or you can ask them at Wikipedia talk:Non-free content. RonBot (talk) 17:17, 28 September 2018 (UTC)
Supply Chain Coordination Limited
I use the wikipedia template for citations. What do you think is wrong with them?
The tag has been taken off. I apologise. I had many tabs open and I put it on the wrong article. PoliceSheep99 (talk) 18:12, 2 October 2018 (UTC) | WIKI |
A limited-edition set of prints, designed by David Reid, James Klein and Eva Zeisel, is now available.
Eva Zeisel Prints With Wings
When David Reid, left, and James Klein, the Long Island City ceramicists behind the KleinReid studio, were given the opportunity to meet one of their design idols, Eva Zeisel, center, they had no idea the encounter would lead to a lasting relationship. But more than a decade after their first meeting in 1999, the three continue to collaborate on a series of projects. Their latest, on sale today, is a limited-edition set of prints of reticulating shapes with classic Zeisel themes of wings and sprouts. The series is called “Lovers’ Suite” because “when we worked on the original porcelain pieces, Eva said, ‘Oh, you want them to make love,’ ” Mr. Klein said. “It’s a graphic description of how two forms interact so they mirror each other. They balance each other, and they come together to create something new and beautiful.” | NEWS-MULTISOURCE |
Accidental Continuous Delivery and Docker
Erica Kastner · July 25, 2015
When I started at Faraday in the Summer of 2014, the company had begun a transition into a Saas product company. There were several individual apps that had grown into web services and queue workers. One of my first goals was to have a Continuous Integration system to run all the tests on each individual project.
Because many of our services relied on system libraries for GIS work and most of the tests were tightly coupled to a single postgres database, a lot of hosted CI solutions lost their appeal. I considered the various services we had that were written in varying versions of ruby and node. I also recognized that as our team grew and added programmers from different specialties (i.e. data scientists using python or R), I realized self-hosting a CI server configured to run all these different languages and platforms would become a mess. Especially when configuring deployments of our CI system.
But, I thought, what if the CI server could just be a web server and a bunch of dumb agents, and the projects themselves could define the platform they ran on? What if each test could run in its own sandbox with any external services linked in as needed? This idea is what initially attracted me to docker.
First steps
In late 2014 I set up a Jenkins server to do this very thing. One by one, I converted each project to define a CI-specific Dockerfile. This mainly involved making each app 12-Factor compatible, configured by environment variables.
I initially waded through the various plugins for Jenkins that dealt with docker, but many of them seemed to be related to strange use cases I wasn’t considering yet. None of them involved simply building images and running them on a docker host. As I looked around at various CI servers, I ran into GoCD. GoCD’s pipeline workflows really attracted me, as I recognized that Jenkins was pretty ill equiped to handle the multiple stages needed for building and running test containers along with backing services. Go also relies less on plugins and more on defining per-project shell scripts to handle job setup. Since I would be doing a lot of manual service startup and docker commands anyway, I decided to switch to Go.
Continuous Delivery is a Thing
One thing I learned while using Go is that it is built quite specifically for supporting a pipelined Continuous Delivery workflow. It was a concept I was never aware of, but quickly grew to appreciate and adopt. My coworker, Eric, was a big help in bringing CD ideas to fruition and pointed me to the excellent book on Continuous Delivery.
Some of the biggest changes and challenges in adopting CD were: Making small changes directly to the mainline. It’s a major change in mindset to stop making huge branches on each service and instead make small, backwards-compatible changes to individual services, deprecating old functionality as older services are upgraded. This meant I no longer needed to worry about how to hammer GoCD around to try and get it to test PRs and branches. Testing master is enough.
Treating CD build errors as “andon” events. That is, when tests break, it’s everyone’s immediate job to get the CD pipelines fixed. It’s interesting that the CD pipeline effectively becomes your “car factory” in the Toyota Production System/Lean Software sense. If there’s a problem in the pipeline, it is a blocker that prevents your team from pushing new software.
The docker/CD combination is pretty instrumental in the idea of “immutable infrastructure.” The CD system contains your entire app’s cloud configuration and you can deploy any version of your system (including the specific combinations of service versions) at any time.
From Test Images to Production
While our work on GoCD started as a way to test services, my team decided to move each service to run in docker in production. Our initial solution was to use docker-machine to spin up instances and docker-compose to define and run our cluster. This has worked exceedingly well, although it is not a zero-downtime or rapidly scalable solution. Luckily, services like Amazon ECS are providing easier ways to deploy dockerized apps. We provide a docker-compose.yml configuration and they mostly do the rest.
Development Environments
When I joined the team, all of the services were managed by some shell scripts sitting in a repo called “cage.” These scripts checked out branches on each service and used foreman to start the whole app cluster locally. As we migrated to docker, this cage tool became an app all its own.
One of the most difficult things about docker, I think, is using it in development. There are several tradeoffs involving how to install gems as you develop and making the service available for local testing/browsing.
I wasn’t attracted to the idea of rebuilding docker images and restarting the cluster each time I made a change. Instead, I came up with a way to run each app where local code changes appear immediately and libraries are shared in order to shorten image build/startup time. Initially I wrote separate Dockerfiles for dev, test, CI, and production environments, but later found that a single Dockerfile for all environments is sufficient.
Here’s an example docker-compose.yml and Dockerfile for a Rails app:
# docker-compose.yml
myservice:
volumes:
- myservice:/app
- /var/lib/docker/gems:/usr/local/bundle
environment:
RAILS_ENV: development
myservicetest:
volumes:
- myservice:/app
- /var/lib/docker/gems:/usr/local/bundle
environment:
RAILS_ENV: test
FROM ruby:2.1.5
WORKDIR /app
ADD Gemfile /app/Gemfile
ADD Gemfile.lock /app/Gemfile.lock
RUN bundle
ADD . /app
EXPOSE 5000
CMD rails s -p 5000
Lines 5–8 of the Dockerfile allow us to make changes to the app code without forcing a full bundle install. Only a change to Gemfile/Gemfile.lock will trigger a bundle.
When interactively writing tests, all that is necessary is to run them with: docker-compose run myservicetest rspec. Now, our internal cage app makes this more succinct, but this is essentially what happens under the hood. Running docker-compose up -d myservice will start up a running rails app with local code changes recognized.
While there have been and are some bumps in the road in running a fully dockerized development environment, I think this approach adds several benefits: We can specify every service to run using a CD-tested and approved version, meaning we don’t have to go into each service repo and make sure we’re on the right branch/git commit when running the cluster locally. We also have a tool that modifies the docker-compose.yml to use specific versions of each service (using docker image tags) derived from GoCD’s last good build. This lets a developer work on her/his specific service while resting assured that every other service is at “last known good.” It also lets us select specific release combinations to debug locally.
We don’t need to manage the software configuration for every developer’s virtual machine. This used to be the case, where we had to be careful that the correct GIS libs, postgres version, ruby and node versions, etc. were installed on our vagrant VMs. Now, we just spin up a VM with docker-machine and let the containers do their own configurations.
Backing services like postgres, rabbitmq, etc. are easy to spin up for development. No more init scripts or arcane configs to worry about! Integration/acceptance tests can be run in a dedicated cluster. Using docker links, we can run an entire test suite (or even multiple concurrent suites) completely separate from the development cluster, without involving manual cluster management. It’s just a docker-compose up command away.
Conclusion
I feel a bit like Bilbo going on an Unexpected Journey through all of this, but it has been very rewarding. We’ve gone from weekly/monthly releases, to at-will releases, usually once or twice a week (non-zero downtime deployment is our biggest blocker at the moment). I love how the Continuous Delivery philosophy/tooling forces us to break our changes into smaller, independent units. While it seems like an impediment, I think it has made us more able to quickly address critical issues when we don’t have to wait for huge new feature branches to be merged in. | ESSENTIALAI-STEM |
USDA proposes allowing 'more flexibility' in school lunches
Washington (CNN)The US Department of Agriculture on Friday announced two new proposals that would give school nutrition professionals "more flexibility" in what they serve to students. The Washington Post reports the proposals would allow schools to reduce the amount of vegetables and fruits required at lunch and breakfast, and would let schools sell more burgers, pizza and french fries. The move appears to be the latest attempt by the Trump administration to roll back federal nutrition standards that were championed by former first lady Michelle Obama. The USDA's school lunch announcement came the same day as Obama's birthday. A news release from the agency provided few specifics about the proposed changes, but says the agency would allow schools to offer "more vegetable varieties," "customize meal patterns" and "adjust fruit servings." About 30 million students get school meals every day. Agriculture Secretary Sonny Perdue said in a statement, "Schools and school districts continue to tell us that there is still too much food waste and that more common-sense flexibility is needed to provide students nutritious and appetizing meals. We listened and now we're getting to work." Colin Schwartz, deputy director of legislative affairs for Center for Science in the Public Interest, told the Post that the rules "would create a huge loophole in school nutrition guidelines, paving the way for children to choose pizza, burgers, french fries and other foods high in calories, saturated fat or sodium in place of balanced school meals every day." The proposals would allow schools to offer potatoes as a vegetable every day, according to the Post. They would allow schools to reduce the amount of fruit included in breakfasts served outside of the cafeteria from one cup to a half cup, according to the Post. The rest of the calories could be replaced with pastries and granola bars, the newspaper reports. CNN has reached out to USDA for more specifics on the proposed changes. | NEWS-MULTISOURCE |
'Magic Thinks Big' and Other Children's Books
A cat requires options much more than it actually needs to exercise them by, say, moving from a sunny spot. That's why Magic, a big, soft, utterly at-ease tom, is lying on a threshold. He's half indoors, half outdoors on a lakeside porch, considering his options. That's all he's really going to do in this completely charming book, but that's not to say it isn't an adventure story. MAGIC THINKS BIG, written and illustrated by Elisha Cooper (Greenwillow, $14.99; ages 3 and up), is a book of few words -- fewer than this review -- but many wonderful moments. Magic stays perfectly still and thinks with pleasure about the things he might do. He could ask for more food. He could sleep a little. Wait, he could chase some loons. No -- he assigns that job to a dog. He then imagines diving into the lake and wrangling a salmon. It will be such a big salmon that he'll need a moose to help him carry it, and some bears to help him eat it. He and the bears will eat the salmon with blueberry pie. And the great thing is that the bears will clean up, so that Magic can put his paws over his eyes and rest. . | NEWS-MULTISOURCE |
Talk:Glass art
Opening heading
Capitalization of title needs fixing but I don't know how. The page "Glass art" re-directs to the article Studio Glass whichh is under discussion and due for a major overhaul. The redirect is incorrect because "Glass art" does NOT equal "Studio Glass". The two are distinct and separate.
* You will have to go to requested moves to get this moved over a redirect. fetch comms ☛ 15:56, 19 March 2010 (UTC)
Requested move
The result of the move request was: page moved. Vegaswikian (talk) 04:24, 26 March 2010 (UTC)
Glass Art → Glass art — lowercase fetch comms ☛ 17:01, 19 March 2010 (UTC)
* Support Not a proper name.--Labattblueboy (talk) 17:07, 21 March 2010 (UTC)
Make this an overview page w/ a section on monumental glass art
This doesn't seem to be a common term of art. And we need an overview page for art made with glass, encompassing monumental works, art glass, the studio glass movement, and the like. This seems like the logical name for that page. [Note that most of the works mentioned or featured on this page are also mentioned on the art glass/studio glass pages.]
There's a discussion about this merge and overview on talk:studio glass. – SJ + 17:34, 18 August 2016 (UTC)
* Done. The previous material was all preserved in the overview. – SJ + 18:58, 22 August 2016 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified one external link on Glass art. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://archive.is/20130104033701/http://www.navypier.com/things2do/rides_attract/smith_museum.html to http://www.navypier.com/things2do/rides_attract/smith_museum.html
Cheers.— InternetArchiveBot (Report bug) 08:09, 18 October 2017 (UTC)
A Commons file used on this page or its Wikidata item has been nominated for speedy deletion
The following Wikimedia Commons file used on this page or its Wikidata item has been nominated for speedy deletion: You can see the reason for deletion at the file description page linked above. —Community Tech bot (talk) 14:23, 29 June 2020 (UTC)
* Karen LaMonte - Nocturnes - Cast Glass - Glasstress 2017.jpg
Museums and collections
There is a list page for artists by country. Should we create a list page of museums/major collections? Zatsugaku (talk) 14:09, 30 September 2020 (UTC)
* I should have noted that I see there is a category "Glass museums and galleries". So this is just floating the generic list vs category topic, as a list would seem to more readily allow inclusion of collections that don't currently have their own page. Zatsugaku (talk) 14:22, 30 September 2020 (UTC) | WIKI |
Transportation in the Marshall Islands
Railways: 0 km Highways: total: NA km paved: 64.5 km unpaved: NA km note: paved roads on major islands (Majuro, Kwajalein), otherwise stone-, coral-, or laterite-surfaced roads and tracks (2002)
Ports and harbors: Majuro
Merchant marine: total: 342 ships (1,000 GT or over) totaling 14,471,690 GT/ ships by type: bulk 86, cargo 18, chemical tanker 31, combination bulk 4, combination ore/oil 7, container 69, liquified gas 8, multi-functional large load carrier 1, passenger 6, petroleum tanker 106, roll on/roll off 1, short-sea passenger 1, vehicle carrier 1 (2002 est.) note: a flag of convenience registry; includes the ships of People's Republic of China 1, Cyprus 1, Denmark 9, Germany 70, Greece 54, Hong Kong 2, Japan 4, Monaco 8, Netherlands 8, United Kingdom 3, United States 87, and Uruguay 1 (2002 est.)
Airports: 35 (2009), see list of airports in the Marshall Islands
Airports - with paved runways: total: 5 1,524 to 2,437 m: 4 (Eniwetok, IATA airport code ENT; Kwajalein, KWA; and Marshall Islands International, MAJ; Rongelap, RNP). 914 to 1,523 m: 1 (2009)
Airports and airstrips - with unpaved runways: total: 30 914 to 1,523 m: 29 under 914 m: 1 (2009) | WIKI |
The Lion’s Seat: Maharaja Ranjit Singh’s Throne and The Apex of Sikh Empire
The founder and the leader of Sikh Empire in the early 19th century famously known as the lion of Punjab, Maharaja Ranjit Singh. A fascinating historical figure remembered for his military powers who was able to establish a strong kingdom in the northwest region of India. He was the first Indian to return the invaders, the Pashtuns [Afghans] into their homeland and hence was rightly called the lion for the same. Now, picture a seat with immense power, covered in gold showcasing the weight and prosperity of the region. This magnificent throne belongs to Maharaja Ranjit Singh which goes on to becoming a dazzling center of attraction in the narrative of the leader who changed the landscape of politics of his time. His bold move of capturing Lahore, the capital of Punjab [now in Pakistan] in 1799 solidified his position as the de-facto ruler and was acknowledged by the afghan ruler, Zaman Shah as the governor of Lahore but his ambitions moved beyond being a mere governor.
A few years later in 1899 he went on to declare himself as the maharaja of the entire Punjab region. He did not stop after this victory, he went on to seize Amritsar, a city very important for the northern region and along with that sacred to the Sikh community. This was just the beginning of his powerful and strategic reign as he united all the smaller Sikh and Pashtun community that was scattered around the region. His legacy goes beyond the realm of politics and military skills, he was also a notable patron of the art. He even employed various artisans from Kashmir, which contributed to a flourishing artistic landscape.
The Sheesh Mahal in Lahore, the palace where he resided was decorated with captivating murals and frescoes. Other than that, the infamous Golden temple in Amritsar underwent a magnificent gold makeover under his rule which enhanced its sacred beauty. This showcased his dedication for the religion. Along with the enhancement of the temple, he made sure that his back never turned towards the golden temple. It symbolizes his profound respect for the holy temple, and it also reflects his efforts to integrate Sikh values into his daily life and even in the lives of his people. He was committed to the Sikh culture which was reflected in his efforts to new modifications of Guru Granth Sahib, the holy scripture of the Sikhs.
This modification initiative for spiritual heritage mirrored his dedication to the education system of Punjab which left a lasting impact. His support and motivation for arts and education had two major effects, firstly it enriched the cultural tapestry of Sikh empire and secondly, it solidified his legacy as a leader with comprehensive vision for his people.
The richness of his region is reflected in the magnanimous throne that is intricately decorated with gold. However, Maharaj Ranjit Singh was a simple man and had a modest personal style. He often did not indulge in showcasing wealth and power. The year 1818 was an important year in the history of Sikh as the Multans succumbed to the power of Sikh, which promoted the commissioning of the grand throne to celebrate this significant event. Even though the throne is originally linked to Lahore, it was then discovered in the year 1849 after the British took over the Punjab and the control of the royal treasury.
Talking about the throne, it was made by Hafez Muhammed Multani who was a goldsmith. The construction of the throne reveals great craftsmanship. It consists of a combination of wood and resin which provides a strong foundation for the throne. On the exterior, gold sheets are place meticulously which not only adds a layer of grandeur to the throne but also showcases the skillful artistry that was used to create this masterpiece. Talking about its unique design which features a base including two layers of lotus petals, these petals symbolize purity and creation. According to various traditions, thrones with lotus have been reserved as seats for Hindu gods, thus adding a cultural and spiritual significance to Maharaja Ranjit Singh’s royal throne.
However, despite the royal nature of the throne, the Maharaja rarely used it. His aversion to elaborate ceremonies was a reason that led him to sit cross-legged on the carpets. This emphasized simplicity over the extravagance associated with the traditional royal seating. His nuanced approach to the throne reflects cultural symbolism that is embedded in its design and also the Maharaja’s humility and practicality.
The Mughal empire weakened after the death of Aurangzeb in 1707, and could not govern and tax most of the Indian subcontinent. Thus, the Khalsa community gained strength and begin occupying the northwest region of India which included parts of Pakistan and Punjab. Even though there were internal conflicts between the Sikh community they were always united against external threats. In the battle of Amritsar, 1798 Maharaja Ranjit Singh successfully resisted the afghan army by showcasing his strategic skills. Further, he even went on to conquer Lahore, where he was welcomed whole heartedly.
Slowly, he took over major parts of the northern region and was known as Sarkar Khalsa and to mark his rule he even issued a coin under Guru Nanak’s name called Nanakshahi. His reign also witnessed cultural harmony as he welcomed all the religions. Prayers took place in mosques, temples and gurudwaras during his rule. As mentioned, he even played an important role in uniting the Sikh community when internal conflicts were prevalent. He skillfully formed alliances and treaties with neighboring regions which helped in creating a stable political environment and also fostered sense of unity among Sikhs. His administration included reforms that helped in creating a cohesive and effective governance and his policies even contributed in the overall well-being of the community.
The Sikh empire has witnessed numerous conquest and tributary collections, thus collecting great wealth for the empire. His treasuries in Lahore and Amritsar became rich depositaries not just for the loot after the conquest by the Britishers but also for the priceless articles that dated back to the era of the Sikh warriors and the Gurus. The governor general, lord Dalhousie was uncertain of the throne’s significance and hence was hesitant to send the throne to Britain. He wrote a letter to London, asking whether the throne would be of some importance to the East India Company and eventually in the year 1853 they decided to preserve this historic piece.
It was sent to Calcutta where its duplicate was made after which it was shipped to the Indian museum in London. The throne finally found its permanent residence in the south Kensington museum, now known as Victoria and Albert museum. However, Punjab was annexed in 1849 when the British took these valuables which included the Golden Throne. These relics which were once integral to the Sikh heritage were now being transported to the UK to be part of the museums. Interestingly, the Koh-i-noor, one of the most prized possession was taken away from the Durrani dynasty of Afghanistan, and it became a symbol of cultural heritage and wealth for the Sikh empire. The diamond was passed to the Jagannath temple in Odisha. Currently, these artifacts stand as bygones of the era and represent the legacy of Maharaja Ranjit Singh and the vibrant history of the Sikh empire. Sadly, in his later years he turned towards alcohol and opium. He died peacefully in his sleep on 27TH of June, 1839 and all that was left behind was his legacy. He was remembered for his military conquests, the creation of Khalsa army and lastly the gathering of a considerable wealth.
With a remarkable reign and much more iconic throne, Maharaj Ranjit Singh became a visionary leader in the northwest kingdom of the Indian subcontinent. His golden throne stands as a symbol of glory and regality. It represents purity but also tells us a lot about Maharaja’s simple nature. His history that includes strategic achievements, his love for arts, his religious tolerance and his splendid administration resulted in the cultural and political flourishing of the Sikh empire. The narrative around the golden throne and its present state serves as a testament to the wealth and their cultural heritage. His glorified rule that begin from the decline of Mughal empire and establishing a solid base for his community marks as a great historic achievement for the Sikhs.
As a tribute to his excellence, a 22 feet tall statue of the Maharaja was installed in the parliament of India. It does not stop here, as his statues can be found in various parts of India, Pakistan and even in the French town called St. Topez. This widespread recognition of Maharaja’s legacy reflects his global importance and how his rule had severe impacts on different regions. His influence has left an irreplaceable mark on the historical narrative of the Sikh empire and even the Indian subcontinent. However, the challenges of succession had created problems after he died and thus his rule saw an eventual end in the 19th century. | FINEWEB-EDU |
Palestinian leader Abbas offers apology for remarks on Jews
JERUSALEM (Reuters) - Palestinian President Mahmoud Abbas on Friday offered an apology after he was accused of anti-Semitism for suggesting that historic persecution of European Jews had been caused by their conduct, not by their religion. Abbas condemned anti-Semitism and called the Holocaust the “most heinous crime in history” in a statement issued by his office in Ramallah after a four-day meeting of the Palestinian National Council (PNC), at which he had made the remarks. “If people were offended by my statement in front of the PNC, especially people of the Jewish faith, I apologize to them,” Abbas said in the statement. “I would like to assure everyone that it was not my intention to do so, and to reiterate my full respect for the Jewish faith, as well as other monotheistic faiths.” Abbas, 82, was excoriated by Israeli and Jewish leaders and diplomats who accused him of anti-Semitism and Holocaust denial for his remarks on Monday during his opening speech to the PNC, the de facto parliament of the Palestine Liberation Organization. He said that Jews living in Europe had suffered massacres “every 10 to 15 years in some country since the 11th century and until the Holocaust”. Citing books written by various authors, Abbas said: “They say hatred against Jews was not because of their religion, it was because of their social profession. So the Jewish issue that had spread against the Jews across Europe was not because of their religion, it was because of usury and banks.” Israeli Defense Minister Avigdor Lieberman swiftly rejected Abbas’ apology. He wrote on Twitter: “Abu Mazen is a wretched Holocaust denier, who wrote a doctorate of Holocaust denial and later also published a book on Holocaust denial. That is how he should be treated. His apologies are not accepted.” Reacting to the speech, Prime Minister Benjamin Netanyahu on Wednesday accused Abbas of grave anti-Semitism and Holocaust denial. Rabbis Marvin Hier and Abraham Cooper of the U.S.-based Jewish human rights organization the Simon Wiesenthal Center said Abbas’ words were those of “a classic anti-Semite”. U.N. Middle East envoy Nickolay Mladenov called Abbas’ comments “deeply disturbing”. The United States on Friday asked the U.N. Security Council to denounce the comments by Abbas as “unacceptable, deeply disturbing” and not in “the interests of the Palestinian people or peace in the Middle East.” Such statements have to be agreed by consensus. A veteran member of Fatah, the PLO’s dominant faction, Abbas served for decades as a loyal deputy of his predecessor, Yasser Arafat. He assumed the leadership of Fatah, the PLO and the Palestinian Authority after Arafat died in 2004, and was re-elected as chairman of the PLO’s Executive Committee on Friday. In 1982 Abbas obtained a doctorate in history at the Moscow Institute of Orientalism in the then-Soviet Union. His dissertation, entitled “The Secret Relationship between Nazism and the Zionist Movement” - to which Lieberman referred - drew widespread criticism from Jewish groups. The following year the Simon Wiesenthal Center released translated quotations from the book, including one excerpt about World War Two in which, according to the center’s translation, Abbas wrote: “Following the war ... word was spread that six million Jews were amongst the victims and that a war of extermination was aimed primarily at the Jews ... The truth is that no one can either confirm or deny this figure. In other words, it is possible that the number of Jewish victims reached six million, but at the same time it is possible that the figure is much smaller - below one million.” After Abbas’ speech on Monday, Hier and Cooper said: “The world can now see that see that, for Palestinian Authority President Abbas, nothing has changed in the 45 years since his doctoral dissertation was first published.” But in his apology on Friday, Abbas said: “I would also like to reiterate our long held condemnation of the Holocaust, as the most heinous crime in history, and express our sympathy with its victims. “Likewise, we condemn anti-Semitism in all its forms, and confirm our commitment to the two-state solution, and to live side by side in peace and security,” he said, referring to an eventual resolution of the Israel-Palestinian conflict. Reporting by Stephen Farrell, additional reporting by Michelle Nichols at the UNITED NATIONS; Editing by Angus MacSwan | NEWS-MULTISOURCE |
Category:Social events
* This category includes planned events which involve large groups of people, generally arranged and advertised by an organization. | WIKI |
Timeline of manifolds
This is a timeline of manifolds, one of the major geometric concepts of mathematics. For further background see history of manifolds and varieties.
Background
Manifolds in contemporary mathematics come in a number of types. These include:
* smooth manifolds, which are basic in calculus in several variables, mathematical analysis and differential geometry;
* piecewise-linear manifolds;
* topological manifolds.
There are also related classes, such as homology manifolds and orbifolds, that resemble manifolds. It took a generation for clarity to emerge, after the initial work of Henri Poincaré, on the fundamental definitions; and a further generation to discriminate more exactly between the three major classes. Low-dimensional topology (i.e., dimensions 3 and 4, in practice) turned out to be more resistant than the higher dimension, in clearing up Poincaré's legacy. Further developments brought in fresh geometric ideas, concepts from quantum field theory, and heavy use of category theory.
Participants in the first phase of axiomatization were influenced by David Hilbert: with Hilbert's axioms as exemplary, by Hilbert's third problem as solved by Dehn, one of the actors, by Hilbert's fifteenth problem from the needs of 19th century geometry. The subject matter of manifolds is a strand common to algebraic topology, differential topology and geometric topology.
1945 to 1960
Terminology: By this period manifolds are generally assumed to be those of Veblen-Whitehead, so locally Euclidean Hausdorff spaces, but the application of countability axioms was also becoming standard. Veblen-Whitehead did not assume, as Kneser earlier had, that manifolds are second countable. The term "separable manifold", to distinguish second countable manifolds, survived into the late 1950s. | WIKI |
SDK
SDK Java v3.x
2
This SDK is deprecated. We recommend to use the Kuzzle SDK-JVM.
A migration guide is available here
search #
Searches document.
There is a limit to how many documents can be returned by a single search query. That limit is by default set at 10000 documents, and you can't get over it even with the from and size pagination options.
When processing a large number of documents (i.e. more than 1000), it is advised to paginate the results using SearchResult.next rather than increasing the size parameter.
When using a cursor with the scroll option, Elasticsearch has to duplicate the transaction log to keep the same result during the entire scroll session.
It can lead to memory leaks if a scroll duration too great is provided, or if too many scroll sessions are open simultaneously.
Available since Kuzzle 2.2.0
You can restrict the scroll session maximum duration under the services.storage.maxScrollDuration configuration key.
Arguments #
Copied to clipboard!
public CompletableFuture<SearchResult> search(
final String index,
final String collection,
final ConcurrentHashMap<String, Object> searchQuery,
final SearchOptions options) throws NotConnectedException, InternalException
Arguments Type Description
index
String
Index
collection
String
Collection
searchQuery
ConcurrentHashMap
Search query
options
SearchOptions
Query options
searchQuery body properties: #
An empty body matches all documents in the queried collection.
options #
A SearchOptions object.
The following options can be set:
Options Type
(default)
Description
from
Integer
(0)
Offset of the first document to fetch
size
Integer
(10)
Maximum number of documents to retrieve per page
scroll
String
("")
When set, gets a forward-only cursor having its ttl set to the given value (ie 1s; cf elasticsearch time limits)
Return #
Returns a SearchResult object.
Usage #
Copied to clipboard!
ConcurrentHashMap<String, Object> suv = new ConcurrentHashMap<>();
suv.put("category", "suv");
ConcurrentHashMap<String, Object> limousine = new ConcurrentHashMap<>();
limousine.put("category", "limousine");
CreateOptions options = new CreateOptions();
options.setWaitForRefresh(true);
for (int i = 0; i < 5; i += 1) {
kuzzle.getDocumentController().create("nyc-open-data", "yellow-taxi", suv, options).get();
}
for (int i = 0; i < 10; i += 1) {
kuzzle.getDocumentController().create("nyc-open-data", "yellow-taxi", limousine, options).get();
}
ConcurrentHashMap<String, Object> searchQuery = new ConcurrentHashMap<>();
ConcurrentHashMap<String, Object> query = new ConcurrentHashMap<>();
ConcurrentHashMap<String, Object> match = new ConcurrentHashMap<>();
match.put("category", "suv");
query.put("match", match);
searchQuery.put("query", query);
SearchResult results = kuzzle
.getDocumentController()
.search("nyc-open-data", "yellow-taxi", searchQuery).get();
System.out.println("Successfully retrieved " + results.total + " documents");
/*
{
"aggregations"=undefined,
"hits"=[
{
"_id"="AWgi6A1POQUM6ucJ3q06",
"_score"=0.046520017,
"_source"={
"category"="suv",
"_kuzzle_info"={
"author"="-1",
"createdAt"=1546773859655,
"updatedAt"=null,
"updater"=null
}
}
},
...
]
},
"total"=5,
"fetched"=5,
"scroll_id"=undefined
*/ | ESSENTIALAI-STEM |
All Data Structures Files Functions Variables Typedefs Enumerations Enumerator Macros Groups Pages
Typedefs | Functions
exfile.h File Reference
API for managing concurrent file access. More...
Go to the source code of this file.
Typedefs
typedef struct exfile_t exfile_t
Functions
int exfile_close (exfile_t *lf, int fd)
Close the log file. More...
exfile_texfile_init (TALLOC_CTX *ctx, uint32_t entries, uint32_t idle, bool locking)
Initialize a way for multiple threads to log to one or more files. More...
int exfile_open (exfile_t *lf, char const *filename, mode_t permissions, bool append)
Open a new log file, or maybe an existing one. More...
int exfile_unlock (exfile_t *lf, int fd)
Detailed Description
API for managing concurrent file access.
Id:
f820f161d115600712077517c92adf3ffcb90099
Definition in file exfile.h.
Typedef Documentation
typedef struct exfile_t exfile_t
Definition at line 36 of file exfile.h.
Function Documentation
int exfile_close ( exfile_t ef,
int fd
)
Close the log file.
Really just return it to the pool.
When multithreaded, the FD is locked via a mutex. This way we're sure that no other thread is writing to the file. This function will unlock the mutex, so that other threads can write to the file.
Parameters
efThe logfile context returned from exfile_init.
fdthe FD to close (i.e. return to the pool).
Returns
• 0 on success.
• -1 on failure.
Definition at line 356 of file exfile.c.
+ Here is the call graph for this function:
+ Here is the caller graph for this function:
exfile_t* exfile_init ( TALLOC_CTX * ctx,
uint32_t max_entries,
uint32_t max_idle,
bool locking
)
Initialize a way for multiple threads to log to one or more files.
Parameters
ctxThe talloc context
max_entriesMax file descriptors to cache, and manage locks for.
max_idleMaximum time a file descriptor can be idle before it's closed.
lockingwhether or not to lock the files.
Returns
• new context.
• NULL on error.
Definition at line 100 of file exfile.c.
+ Here is the call graph for this function:
+ Here is the caller graph for this function:
int exfile_open ( exfile_t ef,
char const * filename,
mode_t permissions,
bool append
)
Open a new log file, or maybe an existing one.
When multithreaded, the FD is locked via a mutex. This way we're sure that no other thread is writing to the file.
Parameters
efThe logfile context returned from exfile_init().
filenamethe file to open.
permissionsto use.
appendIf true seek to the end of the file.
Returns
• FD used to write to the file.
• -1 on failure.
Definition at line 142 of file exfile.c.
+ Here is the call graph for this function:
+ Here is the caller graph for this function:
int exfile_unlock ( exfile_t lf,
int fd
)
Definition at line 382 of file exfile.c.
+ Here is the call graph for this function:
+ Here is the caller graph for this function: | ESSENTIALAI-STEM |
Year 1 - REAL PEBack to News
During Year One’s Real PE lessons they have been learning how to move a ball around their bodies with one hand and then two hands.
First, they rolled the ball up and down their legs, then they tried to move the ball around their legs, neck and back and down their legs again! This was a bit tricky but with practice everyone was able to do it! After that the children had to move the ball around their tummies, some children were even able to do this without touching their bodies; amazing! Last of all, they stood with their legs slightly apart and threaded the ball around their knees just like a basketball player. We all loved this one but we all need to practice this one a bit more next week. | FINEWEB-EDU |
Talk:The Cotswolds (UK Parliament constituency)
Error
Wootton-under-Edge is part of the existing constituency (although in Stroud local government district) - not a new addition for the next general election | WIKI |
跳到主要内容
版本:v2.0-v2.4
Cloning Clusters
If you have a cluster in Rancher that you want to use as a template for creating similar clusters, you can use Rancher CLI to clone the cluster's configuration, edit it, and then use it to quickly launch the cloned cluster.
Duplication of imported clusters is not supported.
Cluster TypeCloneable?
Nodes Hosted by Infrastructure Provider
Hosted Kubernetes Providers
Custom Cluster
Imported Cluster
Warning: During the process of duplicating a cluster, you will edit a config file full of cluster settings. However, we recommend editing only values explicitly listed in this document, as cluster duplication is designed for simple cluster copying, not wide scale configuration changes. Editing other values may invalidate the config file, which will lead to cluster deployment failure.
Prerequisites
Download and install Rancher CLI. Remember to create an API bearer token if necessary.
1. Export Cluster Config
Begin by using Rancher CLI to export the configuration for the cluster that you want to clone.
1. Open Terminal and change your directory to the location of the Rancher CLI binary, rancher.
2. Enter the following command to list the clusters managed by Rancher.
./rancher cluster ls
1. Find the cluster that you want to clone, and copy either its resource ID or NAME to your clipboard. From this point on, we'll refer to the resource ID or NAME as <RESOURCE_ID>, which is used as a placeholder in the next step.
2. Enter the following command to export the configuration for your cluster.
./rancher clusters export <RESOURCE_ID>
**Step Result:** The YAML for a cloned cluster prints to Terminal.
1. Copy the YAML to your clipboard and paste it in a new file. Save the file as cluster-template.yml (or any other name, as long as it has a .yml extension).
2. Modify Cluster Config
Use your favorite text editor to modify the cluster configuration in cluster-template.yml for your cloned cluster.
Note: As of Rancher v2.3.0, cluster configuration directives must be nested under the rancher_kubernetes_engine_config directive in cluster.yml. For more information, refer to the section on the config file structure in Rancher v2.3.0+.
1. Open cluster-template.yml (or whatever you named your config) in your favorite text editor.
Warning: Only edit the cluster config values explicitly called out below. Many of the values listed in this file are used to provision your cloned cluster, and editing their values may break the provisioning process.
1. As depicted in the example below, at the <CLUSTER_NAME> placeholder, replace your original cluster's name with a unique name (<CLUSTER_NAME>). If your cloned cluster has a duplicate name, the cluster will not provision successfully.
Version: v3
clusters:
<CLUSTER_NAME>: # ENTER UNIQUE NAME
dockerRootDir: /var/lib/docker
enableNetworkPolicy: false
rancherKubernetesEngineConfig:
addonJobTimeout: 30
authentication:
strategy: x509
authorization: {}
bastionHost: {}
cloudProvider: {}
ignoreDockerVersion: true
2. For each nodePools section, replace the original nodepool name with a unique name at the <NODEPOOL_NAME> placeholder. If your cloned cluster has a duplicate nodepool name, the cluster will not provision successfully.
nodePools:
<NODEPOOL_NAME>:
clusterId: do
controlPlane: true
etcd: true
hostnamePrefix: mark-do
nodeTemplateId: do
quantity: 1
worker: true
3. When you're done, save and close the configuration.
3. Launch Cloned Cluster
Move cluster-template.yml into the same directory as the Rancher CLI binary. Then run this command:
./rancher up --file cluster-template.yml
Result: Your cloned cluster begins provisioning. Enter ./rancher cluster ls to confirm. You can also log into the Rancher UI and open the Global view to watch your provisioning cluster's progress. | ESSENTIALAI-STEM |
Talk:Nowhere girls
Rewrite needed
I've tried to improve the article but the sections such as causes and effects takes the assertions and suppositions made by the television program zh:沒女大翻身, at face value, and is written as if this programme was an honest documentary of a documented sociological condition. It is not, the programme was dishonest in trying to squeeze entertainment value from seven unhappy women, and dressed it up as a reflection of reality, and apart from TVB's own material, which as a prime source, is not a reliable source, the other references in this article are a commentary of the programme not about the "phenomena" of nowhere girls in society. Unless reliable academic sources can be found, this article will be as dishonest as the TV programme. I suggest that this article be rewritten as an article about the television program.--KTo288 (talk) 07:54, 1 November 2014 (UTC)
* @KTo288 It's been a decade and none of this has been fixed 😞 Aotoda (talk) 03:58, 21 June 2024 (UTC)
* I agree that the article needs a complete re-write, and no one has done it. @Aotoda, should this be nominated for deletion? Observer31 (talk) 12:43, 21 June 2024 (UTC) | WIKI |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.