Document
stringlengths
87
1.67M
Source
stringclasses
5 values
In the Matter of IOWA RAILROAD COMPANY, Debtor. UNION PACIFIC RAILROAD COMPANY, et al., Plaintiffs-Appellees, v. Terry F. MORITZ, Trustee of Iowa Railroad Company, Defendant-Appellant. Nos. 86-2760 & 87-1082. United States Court of Appeals, Seventh Circuit. Argued June 3, 1987. Decided Feb. 23, 1988. Rehearing and Rehearing En Banc Denied March 18, 1988. Terry F. Moritz, Joanne M. Harmon, Goldberg, Kohn, Bell, Black, Rosenbloom & Mo-ritz, Ltd., Chicago, Ill., for defendant-appellant. James D. Benak, Omaha, Neb., for plaintiffs-appellees. Before EASTERBROOK and RIPPLE, Circuit Judges, and GRANT, Senior District Judge. The Honorable Robert A. Grant, of the Northern District of Indiana, sitting by designation. EASTERBROOK, Circuit Judge. The Iowa Railroad endured from October 1981 to November 1984. During these years it conducted operations, largely with rented equipment, over 511 miles of other lines’ track. Much of its business involved freight handled by two or more carriers. When the Iowa was the first carrier — for example, when picking up a shipment of grain that it would turn over to the Union Pacific for the haul to the west coast — it collected the charge for the entire movement. Other carriers would do the same for shipments they originated in which the Iowa was the terminating line. At the end of the month, the Iowa and its business partners sent each other vouchers showing the sums they had collected for transportation provided on other lines. Perhaps the Iowa would collect $50,000 on behalf of the Union Pacific, and the Union Pacific $10,-000 on behalf of the Iowa. The carriers would set off thase amounts, producing an “interline balance”. If the difference ran in the Union Pacific’s favor, that railroad sent the Iowa a bill. When the Iowa filed its petition in bankruptcy, it owed interline balances of about $4 million for shipments of freight, more than $1.4 million to the Union Pacific alone. We must decide whether the railroad creditors have first claim to the Iowa’s assets on the ground that interline balances are held in trust for other railroads. If the interline balances are trust funds, then the railroads will be paid in full and the Iowa’s other creditors get next to nothing; if they are general unsecured debts, all creditors will receive about 64% of their claims. The district court held that the interline freight balances are trust funds, with corresponding priority. The court did not rely on any provision of the Bankruptcy Act or state law. It relied, instead, on In re Penn Central Transportation Co., 486 F.2d 519, 531-33 (3d Cir.1973) (en banc) (Adams, J., concurring), in which Judge Adams — rejecting the majority’s conclusion that interline balances are trust funds only to the extent state law so characterizes them — concluded that interline creditors are entitled to a preference because of “Congress’ interest in creating and maintaining a viable interline rail system”. Id. at 533. Judge Adams believed that a preference in bankruptcy is essential to ensure that railroads participate in a system in which carrier collects the entire cost of the movement; the abolition of this single-bill system, Judge Adams feared, “would greatly impede the smooth and efficient functioning of the through-route network.” Id. at 532. The district court in this case added: “Principles of common sense and elemental justice require that the railroad which earned this money be declared to be its owner.” I We may dispose summarily of the argument from “common sense and elemental justice”. The railroads that moved the freight are entitled to be paid — but so are the people who supplied it with diesel fuel, and its other creditors. All of these persons contributed essential ingredients of the movement of the freight and earned their right to payment. That the interline creditors have been short changed by the Iowa does not imply that the other creditors should get nothing. Justice in a bankruptcy case is decision according to law. If the Iowa’s general creditors have the same sort of property interest as the i^+^rline creditors, then justice requires coarto to recognize both interests. As we said in Boston & Maine Corp. v. Chicago Pacific Corp., 785 F.2d 562, 566 (7th Cir.1986), another case involving interline balances: [The district court thought] that considerations of equity overrode the law. But equity in law is the consistent application of legal rules. The definition of inequity is unequal application of norms. Federated Department Stores v. Moitie, 452 U.S. 394, 401 [101 S.Ct. 2424, 2429, 69 L.Ed.2d 103] (1981). The bankruptcy law treats all pre-bankruptcy claims of the same class equally. When one claimant gets treatment that is denied to others, they have been treated inequitably. See also, e.g., Bonded Financial Services, Inc. v. European American Bank, 838 F.2d 890, 893 (7th Cir.1988); In re Chicago, Milwaukee, St. Paul & Pacific R.R., 791 F.2d 524, 528 (7th Cir.1986); Guerin v. Weil, Gotshal & Manges, 205 F.2d 302, 304 (2d Cir.1953) (A. Hand, J.). The decision in this case turns on property rights, not notions of equity. II Unless a specific provision of the Bankruptcy Code requires a different result, the function of bankruptcy law is to marshal the debtor’s assets and distribute them according to the property rights of the creditors. (We put to one side managerial tasks such as maintaining the firm during a reorganization.) Those property rights are defined in most cases by state law. When they are so defined, the bankruptcy court must implement rather than alter them. Butner v. United States, 440 U.S. 48, 54-57, 99 S.Ct. 914, 917-19, 59 L.Ed.2d 136 (1979); In re American Reserve Corp., 840 F.2d 487 (7th Cir.1988); Boston & Maine, 785 F.2d at 565-66. We said in Boston & Maine that interline creditors do not get special treatment. It remains to be seen, however, just what the ordinary treatment may be. State law is the principal but not the only source of property rights; federal law, too, may supply these rights, and the pervasive federal regulation of the rail business requires us to scrutinize federal law with some care. The survey is animated, however, by the principle that we are looking for legal entitlements rather than for the arrangements that seem to us best. We start with the question whether the Bankruptcy Code settles the subject. The trustee says that it does, in his favor. Since the trustee believes that the 1978 Code disposes of the subject by not discussing it, the appreciation of the argument requires a bit of background. Railroads have been turning belly up with great frequency ever since Stephenson’s “Rocket”. Interline operations have been common since the founding of American roads, so the treatment of interline balances also is an old subject. See Miltenberger v. Logansport Ry., 106 U.S. (16 Otto) 286, 293, 1 S.Ct 140, 146, 27 L.Ed. 117 (1882). Until 1933, when Congress added § 77 to the old Code, 11 U.S.C. § 205 (1976), all railroad bankruptcies were handled as equity receiverships; under § 77 the ICC acquired a principal role in reorganizations but the principles of the common law continued to govern most relations among creditors. The rules for equity re-ceiverships permitted courts to enhance the priority of debts incurred as operating expenses within the six months prior to insolvency or necessary to the continued operation of the debtor. See Miltenberger, 106 U.S. at 311, 1 S.Ct. at 162. Courts applied these principles, without extended discussion, to interline balances. E.g., Gregg v. Metropolitan Trust Co., 197 U.S. 183, 25 S.Ct. 415, 49 L.Ed. 717 (1905); Southern Ry. v. Flournoy, 301 F.2d 847, 850-53 (4th Cir.1962); Southern Ry. v. United States, 306 F.2d 119 (5th Cir.1962); In re Tennessee Central Ry., 316 F.Supp. 1103, 1110-12 (M.D.Tenn.1970), vacated on other grounds, 463 F.2d 73 (6th Cir.1972). This approach assumed that interline balances are general, unsecured debts. Not until 1967 did any interline creditor argue that the balances are “trust funds” or otherwise entitled to priority exceeding that available to other operating expenses. In re Central Railroad Co. of New Jersey, 273 F.Supp. 282, 288 (D.N.J.1967), affirmed by adoption, 392 F.2d 589 (3d Cir.1968), brusquely replied: “That they are not trust funds is clear. The relationship among the several carriers engaged in an interline freight movement is that of debtor and creditor.” The Third Circuit took a different path in its en banc decision of 1972. It distinguished among kinds of interline balances. Those for freight and passenger transportation, it concluded, are collected by one carrier and held in trust for others. 486 F.2d at 523-27. (We discuss in Part V the court’s grounds for this conclusion.) Other interline balances — per diem car charges (rental of one line’s cars being used by another pending their return), switching charges, and several other categories — the court thought were general unsecured debts, largely because the debtor did not collect a specific charge from customers for these balances and so did not generate a fund. Id. at 527-29. The trust funds for pre-bankruptcy balances must be turned over immediately, the court held, regardless of the claims of competing creditors. The other balances, however, could be retained pending final reckoning. In 1976 we took still a different approach, holding that ICC rules required the immediate payment in full of pre-bankruptcy interline per diem balances, whether or not they were trust funds. In re Chicago, Rock Island & Pacific R.R., 537 F.2d 906 (7th Cir.1976). Interline freight and passenger balances were current operating expenditures to be paid as they arose. Other pre-bankruptcy balances would be treated as unsecured debt. The Third Circuit promptly rejected this holding, reiterating its position that per diem car charge balances are general, unsecured debts. In re Penn Central Transportation Co., 553 F.2d 12 (3d Cir.1977). When Congress overhauled bankruptcy law in 1978, then, the Third Circuit treated passenger and freight balances (but no others) as trust funds; this court treated passenger and freight balances as current operating expenses and per diem accounts as trust funds; other courts had been silent since 1963. The rules in force in the Third and Seventh Circuits had two effects: priority for certain debts, and immediate payout (rather than payment with other secured creditors at the end of the case). Lobbyists for solvent (creditor) railroads tried to consolidate and extend these gains. The House passed a bankruptcy bill first, including nothing on the subject. The principal bill pending in the Senate, S. 2266, 95th Cong., 1st Sess. (1977), contained a provision (§ 1169) authorizing a railroad’s trustee to pay in full all pre-bankruptcy interline balances without waiting for a court to approve the payment. Witnesses for creditor railroads objected to this on the ground that it did not require the trustee to pay these claims. Hearings on S. 2266 and H.R. 8200 Before the Subcommittee on Improvements in Judicial Machinery of the Senate Committee on the Judiciary, 95th Cong., 1st Sess. 759-71 (1977) (testimony on behalf of the Association of American Railroads and the Union Pacific Railroad). The Committee then reported, and the Senate passed, a bill providing: [T]he debtors under this chapter shall pay in cash pursuant to statutory, [ICC], or recognized rail industry settlement procedures, or Commission orders of general applicability, the current net balances owed by the debtor to other carriers on its interline freight, passenger and per diem ... accounts for the periods both prior and subsequent to the date of filing of the petition without the necessity of court approval. Section 1168(1) of S. 2266, as passed (emphasis, added). The House did not accept this part of the Senate’s bill, and the Senate capitulated. The Code as enacted does not so much as mention interline balances. See 11 U.S.C. § 1166, the provision into which § 1168 of the Senate bill evolved. The managers from each side remarked: “[T]he proposal contained in Section 1168(1) of the Senate bill is rejected as violative of the principle [of] equal treatment of all creditors under title 11.” 124 Cong.Rec. 34008 (Oct. 5, 1978) (Sen. DiConcini), 32409 (Sept. 28, 1978) (Rep. Edwards). (The bill lacks a conference report, but its managers in each chamber read identical explanatory statements into the Congressional Record.) The failure of the industry’s lobbyists was among the considerations that led the First Circuit in In re Boston & Maine Corp., 600 F.2d 307, 313 (1st Cir.1979), to reject Chicago, Rock Island and conclude that interline per diem car balances should be treated as general, unsecured debt. We then concluded in Boston & Maine v. Chicago Pacific, 785 F.2d at 567, that Chicago, Rock Island had been effectively overturned. Our Boston & Maine decision held that pre- and post-bankruptcy interline balances are not “mutual” debts and may not be offset. The Iowa’s trustee argues that the events of 1978 also dispose of the Third Circuit’s holding that interline freight and passenger balances are trust funds. Doubtless the excision of language from a pending bill may be highly informative. E.g., Carey v. Donahue, 240 U.S. 430, 36 S.Ct. 386, 60 L.Ed. 726 (1916). We cannot give the bill, as enacted, a meaning that was confronted and deleted. So if the interline creditors try to rely on the 1978 Code they must lose. But they do not rely on the Code; they rely on ICC rules and state law that predates the Code. The excision in 1978 reflects only disagreement between House and Senate. The trustee believes that this disagreement — which blocked the enactment of any legislation on the subject — changed existing rules. An unsuccessful attempt to change the law does not by itself change the law in the other direction. E.g., FTC v. Dean Foods Co., 384 U.S. 597, 608-12, 86 S.Ct. 1738, 1744-47, 16 L.Ed.2d 802 (1966); Wong Yang Sung v. McGrath, 339 U.S. 33, 47, 70 S.Ct. 445, 452, 94 L.Ed. 616 (1950). Congress must act by agreement of both chambers, see INS v. Chadha, 462 U.S. 919, 103 S.Ct. 2764, 77 L.Ed.2d 317 (1983). If the refusal of one chamber to accede to the other’s proposal were enough to change the law, we would have unicameral action, the same problem that doomed the legislative veto. The most one can say is that a stalemate in 1978 compelled Congress to avoid the subject of this case. Whatever the law was then, it still is. If interline freight balances are “trust funds” under governing law, then giving creditor railroads the status of trust beneficiaries does not violate any principle of equal treatment; the absolute priority rule requires trust beneficiaries to be paid first. If interline creditors do not have interests in trust funds, then giving them a preference would violate the rule that creditors of the same class be treated equally. So the question remains: what type of property interest do interline creditors have? Ill The interline creditors have three possible sources of property rights: federal statutory law, federal. interests sufficiently strong to demand the creation of federal common law, and state law. Butner holds, and our opinion in Boston & Maine reiterates, that state law is the usual source of creditors’ rights in bankruptcy cases — exactly as the majority in Penn Central held. The district court followed Judge Adams’ concurring opinion, however, and so did In re Ann Arbor R.R., 623 F.2d 480 (6th Cir.1980), concluding that the federal interest in a unified national rail system requires interline balances to be treated as trust funds. We therefore take up federal law first — statute law in Part III, common law in Part IY — before turning to state law in Part V. The Interstate Commerce Act does not mention interline balances. It is, indeed, mostly silent on relations among carriers. They need not offer interline services or through rates — although the ICC may order the establishment of through routes, 49 U.S.C. § 10705(a)(1). If a carrier proposes to back out it must show that the cessation is appropriate, and the ICC may suspend the withdrawal and investigate the discontinuation. 49 U.S.C. § 10705(e); Chesapeake & Ohio Ry. v. United States, 704 F.2d 373 (7th Cir.1983). The ICC has the power to make regulations affecting the question, and these regulations may have the force of law. It has promulgated regulations concerning per diem ear charges. Each railroad must accept others’ cars, which it must pay for at fixed rates until returning them. Ex Parte No. 334, Car Service Compensation, 362 I.C.C. 884 (1980), invoking authority under 49 U.S.C. § 11122. It has not exercised regulatory power, however, with respect to freight or passenger interline balances. The ICC also has the power to require a uniform system of accounts, see 49 U.S.C. § 11142. Uniform accounting promotes comparative judgments in ratemaking, cf. ICC v. Goodrich Transit Co., 224 U.S. 194, 32 S.Ct. 436, 56 L.Ed. 729 (1912), and the ICC extensively regulates how (some) railroads account for interline balances. 49 C.F.R. §§ 1200-1201. These rules could be a source of property interests in the treatment of interline balances, and we asked for supplemental briefs on this subject. It turns out that the qualification “some” is important, for the ICC’s accounting rules apply only to Class I railroads, lines with revenues exceeding $50 million per year. 49 C.F.R. § 1201(A)(l-l)(a), (c). The Iowa was a Class III railroad (revenues less than $5 million annually) and therefore not governed by the rules; whatever rights they establish among Class I railroads do not apply to the Iowa. Moreover, the accounting rules assist the Iowa’s trustee to the extent they apply. The ICC requires railroads to account for interline balances due as “accounts receivable”, and for interline balances payable as “accounts payable”. 49 C.F.R. § 1201, Rules 705 and 752. The accounting rules do not hint that these funds must be segregated and accounted for as trust monies. We conclude, therefore, that federal statutes and regulations do not support the interline creditors. IY The old National Transportation Policy, 49 U.S.C. preceding § 1 (1976), proclaimed a federal objective of “developing, coordinating, and preserving a national transportation system”. Judge Adams wrote against this background. See 486 F.2d at 531 & n. 2, 533 (relying on the National Transportation Policy). The Staggers Rail Act of 1980 ended the application of this policy to railroads. The new Rail Transportation Policy, 49 U.S.C. § 10101a, speaks of permitting competition “to the maximum extent possible” (§ 10101a(l)) and “mini-mizpng] the need for Federal regulatory control over the rail transportation system” (§ 10101a(2)). It does not mention promoting a unified national rail system. See ICC v. Texas, — U.S. -, 107 S.Ct. 787, 793, 93 L.Ed.2d 809 (1987). We may assume, however, that shippers’ ability conveniently to send freight over a network of connected railroads is an important federal objective, making some cooperation among railroads essential. Dennis W. Carlton & J. Mark Klamer, The Need For Coordination Among Firms, With Special Reference to Network Industries, 50 U.Chi.L.Rev. 446 (1983). We also assume, with Judge Adams, that convenience includes the ability to pay a single carrier for the entire movement. Judge Adams believed that treating interline carriers as unsecured creditors would lead each to insist on separate payment, ending the convenient payment system now in use. We part company with him at this step — both because it is not the sort of interest that permits the creation of federal common law and because it is not supported. A. To say that there is a federal common law governing interests in funds received by rail carriers is to say that state law is preempted. Until Butner many courts believed that bankruptcy permitted federal courts to override state rules when that would be desirable in light of some other objective. Butner disapproved of that approach, holding that property rights under state law govern unless there is a contrary federal rule. A federal rule must be grounded in a concrete federal interest with which the application of state law would interfere. That the dispute involves the interstate transportation network is not enough. See Miree v. DeKalb County, 433 U.S. 25, 97 S.Ct. 2490, 53 L.Ed.2d 557 (1977), rejecting the argument that the flow of commercial aviation justifies a national rule concerning airports’ responsibility to make it safe for planes to take off. Even when the United States is a party, and multi-state transactions are involved, courts must ordinarily find in state law the rules of decision. United States v. Kimbell Foods, Inc., 440 U.S. 715, 727-29, 99 S.Ct. 1448, 1457-59, 59 L.Ed.2d 711 (1979). Private parties stand on both sides of this transaction. Congress has not occupied the field in question. So only a demonstration of substantial conflict between state law and the achievement of an objective defined by federal law would support a conclusion that federal law controls. Extensive regulation is no substitute for a conflict. E.g., Louisiana Public Service Comm’n v. FCC, 476 U.S. 355, 106 S.Ct. 1890, 90 L.Ed.2d 369 (1986); Silkwood v. Kerr-McGee Corp., 464 U.S. 238, 104 S.Ct. 615, 78 L.Ed.2d 443 (1984). And it is hard to identify a conflict between state and federal policies even if failure to treat interline balances as trust funds should lead railroads to bill customers separately. This is at most a question of convenience. Small conveniences add up, no doubt, and shippers prefer the current system, but the inconvenience of separate invoicing would not strike at the life blood of interstate commerce. B. The heart of Judge Adams’ position, which the district court adopted, is the belief that treating interline railroads as unsecured creditors would compel them to deny to customers the convenience of unitary billing. Both Judge Adams and the district judge viewed this as so obvious that argument was unnecessary. We do not find it obvious at all. Railroads need security, not complete assurance. The system of interline balances assures payment of most debts automatically: the Iowa “pays” the Union Pacific by providing transportation services when the Union Pacific is the originating carrier. Only the nets become debts. The risk railroads take is a correspondingly small portion of their revenues. Railroads have ways to deal with the risk of default by collecting carriers on the balances remaining after the automatic set-offs. One is to scrutinize the creditworthiness of their trading partners, just as firms ordinarily do. Sellers of carpets to department stores are treated as unsecured creditors in department-store bankruptcies, but this has not led to the end of trade credit. Sound railroads will do business as usual. Collecting carriers with shaky finances may be required to post bonds, secure letters of credit, o: find other ways to assure that they turn over receipts to the railroads that provide part of the transportation. The economy teems with such devices. Standby letters of credit assure payment for billions of dollars of transactions daily. Factors provide the financing for many a thinly capitalized firm. To protect their investments, factors commonly receive incoming sums and apportion them properly. It is easy to imagine the equivalent of a factor in the railroad business receiving the remittances on the Iowa’s invoices, then sending the Union Pacific its due and holding the rest for the Iowa’s account. Other railroads also could put the Iowa on a cash basis, receiving payment in advance for a fixed quantity of transportation services (which would let the Iowa keep the collection for the entire movement), or could take security interests in the Iowa’s cash and receivables. And, of course, they could do what they largely have done: require other railroads to remit exceptionally quickly, holding to a minimum the exposure at any moment. (More on this below.) These devices work reasonably well. Railroads have employed the one-charge system on interline shipments for at least 100 years, even though until 1973 no court had held that interline balances are trust funds. We can learn something from the experience of other industries, too. The airline business, the trucking business, the telecommunications business, and several others use interline transfers. A traveler may buy from United Airlines a ticket covering a movement on multiple carriers. A single charge covers a phone call that may start on Ameritech’s lines, move over MCI’s interstate trunks, and end on Nynex’s lines. The carriers apportion among themselves the payments for the joint service. Yet in none of these businesses are the sums paid to the originating carrier treated as trust funds for the subsequent carriers. Take the airline business. Although no statute requires this, most carriers have interline agreements with others whose routes make interchanges feasible — either individual contracts or through the Airline Clearing House, Inc., an association formed for this purpose. Airlines do this even though bankruptcy has become common (Continental, Braniff, and Frontier are prominent examples). They do so even though the sums one airline has collected for transportation rendered by another are treated as unsecured debts. See In re Braniff Airways, Inc., No. 482-00369 (Bkr.N.D.Tex. Feb. 1, 1983). The problems in collecting from a bankrupt airline pale beside the problems in collecting from bankrupt travel agents. Agents receive billions of dollars from travelers for services furnished by airlines; they stand to all airlines much as the Iowa stands to the Union Pacific. In re Morales Travel Agency, 667 F.2d 1069 (1st Cir.1981), holds that the claims of the airlines are unsecured debts of travel agencies. Yet airlines go on dealing with travel agents, and travelers reap the benefits of convenience. See also, e.g., In re Shulman Transport Enterprises, 33 B.R. 383 (S.D.N.Y.1983), affirmed, 744 F.2d 293 (2d Cir.1984), holding that the relation between air freight forwarding services and the airlines supplying the transportation is that of debtor-creditor. The motor carrier business looks much the same. Motor carriers may enter into joint and through route agreements, 49 U.S.C. § 10703, and the ICC may prescribe them when appropriate. The originating or destination carrier collects the price of the entire movement and remits the divisions to other carriers. Courts treat sums owing to other carriers as unsecured debts. E.g., In re Penn-Dixie Steel Corp., 10 B.R. 878 (S.D.N.Y.1981); Allied Van Lines, Inc. v. SBA, 507 F.Supp. 397 (E.D.Mo.1980), affirmed, 667 F.2d 751 (8th Cir.1982). The lack of trust status — and the fact that motor carriers face bankruptcy risks at least as great as travel agents, airlines, and railroads — has not prevented motor carriers from offering customers the convenience of a single bill per shipment. The parties have not called to our attention any business other than railroads in which even one court has treated interline balances as trust funds. They also have not called to our attention, and we could not find, an industry in which the treatment of interline balances as unsecured debts has led to inconvenience to customers. Cf. CFTC v. Heritage Capital Advisory Services, Inc., 823 F.2d 171 (7th Cir.1987) (money deposited with a broker for transfer to a manager is not held in trust for the customer). This should not be a great surprise. If customers value the convenience of paying by a single bill, firms will strive to supply their desires. Those that figure out how to do so at least cost will flourish. This may seem to overlook the cost. If the railroad business swallows losses in order to provide convenient billing, the customer pays in the end. Perhaps one could argue that the financial health of the railroad business depends on being able to collect interline balances quickly. This is not a complete view, however. Railroads are on both sides of these transactions. If some railroad is more secure, another is less so. If interline creditors always get 100c on the dollar, then other creditors (suppliers of fuel, equipment, and labor first among them) get less. They perceive the risks as greater and must do more to protect themselves — take security interests, charge higher interest, and so on. Shippers must pay these alternative costs, too. In other words, the risk of failure is part of the business. If railroads insulate some of their creditors (interline roads) from the risk, they expose other creditors to more of it; in the end, someone bears the whole risk, and shippers pay the full cost. There is no panacea in making interline creditors better off. We therefore do not agree with Judge Adams that giving interline creditors priority claims on the funds of bankrupt railroads is essential to the preservation of a national transportation system. Perhaps it would help; we express no view on the long run merit of the system. It is not so clearly important that a federal court may .create federal common law to trump the .state law that governs competing claims to a debtor’s funds. V The opinion of the court in Penn Central held that interline freight balances between Class I railroads are held in trust under state law. The railroad creditors in this case rely on that holding. The Third Circuit did not say which state’s law; neither do the railroad creditors here. The railroads apparently are content to rely on a “general common law” — as if Justice Holmes had never observed that there is no transcendental body of law outside of any particular State but obligatory within it unless and until changed.... Law is a word used with different meanings, but law in the sense in which courts speak of it today does not exist without some definite authority behind it. The common law so far as it is enforced in a State, whether called common law or not, is not the common law generally but the law of that State existing by the authority of that State without regard to what it may have been in England or anywhere else. Black and White Taxicab & Transfer Co. v. Brown and Yellow Taxicab & Transfer Co., 276 U.S. 518, 533-34, 48 S.Ct. 404, 409, 72 L.Ed. 681 (1928) (Holmes, J., dissenting), overruled by Erie R.R. v. Tompkins, 304 U.S. 64, 58 S.Ct. 817, 82 L.Ed. 1188 (1938). See also Guaranty Trust Co. v. York, 326 U.S. 99, 101-03, 65 S.Ct. 1464, 1465-67, 89 L.Ed. 2079 (1945). The law applicable to this case under the conflicts rules of Illinois, in which the federal court sits, may be different from the trust law of Pennsylvania. The parties are free to agree on substantive law within limits, however, and have treated this as a subject on which state laws do not differ. The federal courts refer to the “whole law” of the forum state, Klaxon v. Stentor, 313 U.S. 487, 61 S.Ct. 1020, 85 L.Ed. 1477 (1941). When (as here) the parties do not say that the forum state’s conflict-of-laws rules require the application of another state’s substantive law, this means we must apply the forum state’s substantive law. Casio, Inc. v. S.M. & R. Co., 755 F.2d 528, 531 (7th Cir.1985). The parties have done little to enlighten us about Illinois law, however, turning instead as the Third Circuit did to the Restatement (Second) of Trusts (1957). Railroads use two principal methods to settle interline balances. Under the bill- and-voucher method, which the Iowa used for most of its existence, the destination carrier computes the portions of the total charge each railroad involved in the movement is entitled to receive. (The originating carrier may collect the shipping charges from the shipper, or the destination carrier from the consignee; in either case, the destination carrier computes the divisions of revenue, because the final waybill shows the complete movement, which could change en route.) The destination carrier sends statements of entitlements called “abstracts” to all other railroads involved by the 18th of the month after the waybills were issued. The railroads send each other monthly statements of sums received for movements performed by others, by the 20th of the month (that is, almost immediately after receiving the abstracts). Railroads offset these statements, and the creditor railroad sends a bill for the balance. The debtor railroad pays this bill as it does others. It does not maintain segregated accounts. The Iowa remitted 60 or more days after receiving its bills, without protest by the creditor railroads. The 28 Class I railroads use a different method, prescribed by the Association of American Railroads. Eighty or so Class II and III railroads participate in this system voluntarily (while about 420 small railroads use the bill-and-voucher system). After the circulation of the abstracts by the 18th of the month and the statements of net balances by the 20th, the nets are subject to immediate collection. Each railroad participating in the AAR’s system has a microen-coded plastic card for each of the others. The creditor line uses the card to prepare a sight draft against the debtor’s bank account. The creditor road puts this draft into the bank settlement system just as if it were a check signed by the debtor railroad. The debtor’s bank pays in the ordinary course. The balance thus is paid instantly without any action by the debtor line. At the time of the Penn Central case, the Class I railroads used a system of sight drafts minus the microencoded cards; then, as now, the creditor line took charge of obtaining payment from the debtor’s banks. Penn Central dealt with the payment of balances for May 1970, the month before that railroad entered bankruptcy. The petition was filed on June 21, 1970, just as sight drafts for May were being received. The Penn Central’s banks dishonored drafts for about $15 million received on or after June 22, and the creditor railroads asked the bankruptcy court to order payment. Relying on the Restatement, the Third Circuit concluded that the Penn Central held this $15 million in trust for the other railroads and ordered immediate payment. It recognized that under § 2 of the Restatement —and so far as we know the law of all 50 states — a trust is a contractual arrangement and therefore depends on the parties’ agreement. See La Throp v. Bell Federal Savings & Loan Ass’n, 68 Ill.2d 375, 12 Ill.Dec. 565, 370 N.E.2d 188 (1977). The railroads have not expressly declared interline balances to be trust funds, and they do not use some of the customary indicia of trusts, such as segregated accounts. The Iowa regularly invested its collections and kept the proceeds, remitting only the principal to the interline carriers. And the shippers, potential settlors of such trusts, not only have no pertinent intent but also do not know how the railroads handle the funds (or much care, so long as the goods are delivered). There is no express trust. Penn Central concluded that agreement may be implied as well as express. The AAR’s system of prompt settlement and immediate payment amounted to an implied trust agreement, the court held. The AAR’s settlement system treats each railroad as a collecting agent for the others. The funds may be commingled by the collecting railroad, but they are at the disposal of the creditor railroad with the power to write sight drafts. Penn Central thought it significant that the funds were payable without interest, 486 F.2d at 524, and insignificant that they could be commingled, id. at 525. The magnitude of the daily collections, and the number of interline roads (the Penn Central dealt with more than 300), made segregation of accounts impractical, the court thought. We are sympathetic to the contention that the AAR’s accounting rules, coupled with the system of sight drafts that give creditor lines effective dominion over the funds, is the practical equivalent of a declaration of trust. The trouble from the interline creditors’ perspective is that the Iowa did not participate in the AAR’s system for more than a few months. During the period at issue in this case it used the bill-and-voucher system, under which interline railroads had no more control over payment than did the Iowa’s suppliers of diesel fuel. Penn Central expressly distinguished such a case. Southern Ry. v. United States, 306 F.2d 119, 124-25 (5th Cir.1962), declined to accord priority treatment to interline claims by the Southern against the Tallulah Falls Ry. when Southern submitted a bill and waited for more than a year to be paid, without demanding the segregation of funds. The Third Circuit viewed this decision as consistent with its own (486 F.2d 525-26); it was apparently cases like Southern that led Judge Adams to urge the creation of federal common law to protect interline creditors who fail to protect themselves. The Iowa’s case is much closer to Southern than to Penn Central. The Iowa did not allow other railroads to write sight drafts against its accounts. It declined to pay interline balances until presented with both an abstract of waybills and an invoice; when billed, it paid slowly (60-90 day delays were common). The other lines did not respond by insisting that the Iowa segregate its collections for their benefit; so far as the record shows, they did not even protest the slow payment. When the Iowa failed, it had at least six months of interline balances outstanding. It is difficult to resist the impression that the Iowa treated other railroads as trade creditors, and that they acquiesced in this treatment. This is the opposite of a manifest intent to create a trust, and without such an intent there is no trust. Restatement § 24 comment c: “It is essential to the creation of a trust that the settlor should manifest by some external expression his final and definitive intention that a trust should arise.” The “external expression” is important to other creditors, who need objective signs in order to determine their own priority to the assets ostensibly held by their trading partners. Although the Iowa did not hold the receipts in an express trust, perhaps it held them as a resulting trust. Under Restatement § 440, “[w]here a transfer of property is made to one person and the purchase price is paid by another, a resulting trust arises in favor of the person by whom the purchase price is paid”. See In re Wilson, 81 Ill.2d 349, 43 Ill.Dec. 23, 410 N.E.2d 23 (1980). The paradigm is the sale of a cow from A to B, with B paying but C temporarily in possession. C holds the cow in trust for B. Or A sells stock to B, which places the certificates with C to be held in street name; C is trustee for B. Restatement § 440 Illustration 1. Perhaps one could say that the Union Pacific transferred “services” to the Iowa, which collected the price; but on this reading the Iowa holds the transportation services in trust for shippers. The parties have not called to our attention, and we have not found, any case treating as a “resulting trust” the money received from a customer when the seller was blending goods or services , of several suppliers and selling them as a unit. “A resulting trust ... seeks to carry out a donative intention rather than to thwart a wicked scheme.” American National Bank & Trust Co. v. United States, 832 F.2d 1032, 1035 (7th Cir.1987) (Illinois law). No one argues that the shippers or consignees — the settlors in a resulting-trust approach — had any particular intent about how the Iowa would apportion the shipping charges. They cared only that they receive the transportation they paid for, as they did. Since in Illinois the “burden of proof is upon the party seeking to establish a resulting trust and the evidence must be clear, convincing and unmistakable”, Wilson, 43 Ill.Dec. at 47, 410 N.E.2d at 27, this approach does not yield the railroads much mileage. The air and truck transportation cases we discussed above, those closest in principle to the railroad case, all reject the argument that the collecting airline, trucker, or travel agent holds the funds in trust for the carriers providing the service. The last possibility we need consider is the “constructive trust” under the Restatement of Restitution § 160 (1937), providing that a trust arises “[w]here a person holding title to property is subject to an equitable duty to convey it to another on the ground that he would be unjustly enriched if he were permitted to retain it.” The interline railroads mention but do not seriously pursue this possibility. A constructive trust usually depends on a fraudulent act to obtain control of the assets, see In re General Coffee Corp., 828 F.2d 699 (11th Cir.1987) (Florida law); Fender v. Yagemann, 29 Ill.2d 205, 210, 193 N.E.2d 794 (1963); and the Iowa put its hands on this money legitimately. There could be a decent claim of unjust enrichment if we had to decide whether the Iowa’s stockholders or the interline railroads should get the money remaining in the Iowa’s coffers; it would unjustly enrich the stockholders to receive this money. But that is not the problem. The question is whether the interline railroads get all of the money and the suppliers of diesel fuel (and tort creditors) none; or whether all creditors share the inadequate funds. The suppliers of diesel fuel will not be “unjustly enriched” if they receive 70% of their debts (without interest). All of the Iowa’s creditors have supplied valuable goods and services; all have been stiffed. No case of which we are aware employs the idea of the “constructive trust” to settle priorities among bona fide business suppliers. Several have rejected this approach. E.g., In re North American Coin & Currency, Ltd., 767 F.2d 1573 (9th Cir.1985); In re First Capital Mortgage Loan Corp., 60 B.R. 915 (Bkr.D.Utah 1986). The sellers of diesel fuel might as well argue that a constructive trust runs in their favor. What we have is a breach of contracts, which is not enough to create a constructive trust, id. at § 108. The Iowa did not expressly declare that it held funds in trust; it did not segregate its funds; it did not accede to the AAR’s system of sight drafts that would put funds at the disposal of the interline railroads; these railroads did not protest the Iowa’s glacial payment. Nothing in the way the Iowa did business would have alerted other creditors that the funds ostensibly in its control were held in trust. We therefore conclude that the interline balances are general, unsecured debts of the Iowa. Reversed and Remanded RIPPLE, Circuit Judge, concurring. I join the judgment and the opinion of the court. I write separately to emphasize that, as the court notes explicitly in the last several sentences of Part IV, our holding is based on the policy choices Congress has made with respect to national transportation policy. Our views as to whether this policy is an appropriate one are irrelevant to a resolution of the legal question before us. The Iowa has assets of about $4.4 million in cash and receivables, plus some machinery. The interline creditors lay claim to $4.06 million; the Iowa’s trustee concedes the validity of these claims but disputes their priority. Other creditors claim $1.9 million; these, too, are largely undisputed. A suit pending against the Iowa has an ad damnum of $7.2 million; and if these plaintiffs prevail in full, the railroad’s debts would exceed $13 million, with correspondingly smaller payoffs for all creditors in the event the interline balances are general unsecured debt.
CASELAW
Common Side Effects of Medications On Body Side effects of medications affect a lot of people. Prescription pharmaceuticals, over-the-counter (OTC) medications, and nutritional and herbal supplements can all cause these negative effects. While these side effects aren’t always called allergic reactions, ignoring them can be potentially fatal. Always be sure to take medications or treatments that are suitable or not. In the following content, we will explain the side effects of some medications (Semaglutide) and treatments (Botox). What is a side effect? Unwanted symptoms caused by medical treatment are known as side effects. All medications, including over-the-counter, prescription, and complementary therapies, have the potential to have adverse effects. Herbal remedies, vitamins, and some products prescribed by naturopaths and other alternative medicine practitioners are examples of complementary medicines. Every year, side effects and other medication-related issues result in the hospital admission of about 230,000 Australians. While most adverse effects are manageable, some can be fatal. You should use your medications sensibly. For more details and recommendations, speak with your physician or pharmacist. As individuals seek to enhance their physical performance or manage certain medical conditions, the use of stimulants such as Clenbuterol has become increasingly prevalent. However, it’s crucial to understand the potential “Clenbuterol Side Effects: What You Need to Know in Stimulant Use” to make informed decisions about its usage. While Clenbuterol is renowned for its bronchodilator and thermogenic properties, it can also lead to adverse effects such as increased heart rate, palpitations, tremors, insomnia, and electrolyte imbalances. Additionally, prolonged or excessive use of Clenbuterol may pose serious health risks, including cardiac hypertrophy and arrhythmias. Therefore, individuals considering Clenbuterol should prioritize thorough research, consultation with healthcare professionals, and cautious dosage management to mitigate the potential risks associated with its use in stimulating physical performance or achieving specific health goals. What Are The Effects of Medicine on the Body? Medicine, including over-the-counter medications, prescription drugs, herbal supplements, and dietary supplements, undergo four stages called ADME.  The first stage involves absorption, where the drug enters the Body through the small intestine. The liver processes the medication, which circulates throughout the Body. Distribution can be challenging due to the blood-brain barrier, proteins, and fat molecules. Metabolization occurs after the drug reaches its destination, making excretion easier.  Genetics can affect the liver’s metabolism speed, leading to side effects, drug interactions, and allergic reactions.  Excretion involves the drug being flushed out through urine and feces, with higher doses needed for better treatment.    Side effects of vitamins on the Body Typical adverse effects include the following: Uneasy stomach: Taking multivitamins frequently causes upset stomachs, one of its negative effects. This may involve signs and symptoms like constipation, diarrhea, and nausea. Unusual or unpleasant taste: A few multivitamins may give you an unpleasant aftertaste. Side effects of semaglutide for weight loss Common side effects include belching, gaseous stomach pain, heartburn, and stomach discomfort. Rare side effects include burning sensations, indigestion, and tenderness in the stomach area. Anxiety, blurred vision, chest tightness, chills, cold sweats, confusion, cough, darkened urine, difficulty swallowing, discouragement, dizziness, fast heartbeat, sadness, and vomiting. Some side effects do not need medical attention and may disappear during treatment. Healthcare professionals may provide information on preventing or reducing these side effects. If you live in Tampa, FL, and want to lose weight with medications, do not worry; access high-quality weight loss medication centers such as semaglutide tampa fl. Side effects of Botox vial This medication, given at the injection site, may cause side effects such as redness, bruising, infection, and pain. It may also cause dizziness, difficulty swallowing, respiratory infections, headaches, and muscle weakness when used to relax muscles.  Side effects may include double vision, drooping eyelids, eye irritation, dry eyes, tearing, reduced blinking, and increased sensitivity to light. If these effects worsen, contact your nearby doctor or pharmacist. If you seek high-quality botox treatments in Bozeman, MT (Montana), you should visit botox bozeman mt. How to reduce the risk of side effects in the Body? To reduce the risk of harsh side effects from medicines, follow your doctor’s prescriptions, avoid taking others, and learn about your medication through Consumer Medicine Information (CMI). Consult your pharmacist for over-the-counter or complementary medicines, as they can advise on side effects and interactions.  Inform your doctor about all medicines, especially for older people. Have an annual review of all medicines, and consider improving your lifestyle with diet and exercise. Return unwanted medicines to your pharmacy for safe disposal. Talk to your pharmacist about dosage aids and ask questions to understand their benefits.
ESSENTIALAI-STEM
Epigenetics Unlocking the Secrets of Epigenetics: Understanding the Key Points Introduction Epigenetics, a relatively new and rapidly evolving field of study, is changing our understanding of how genes work. It provides insights into the complex interplay between nature and nurture, shedding light on how environmental factors can influence our health, behavior, and even our future generations. In this blog, we will delve into the fascinating world of epigenetics, exploring its key points and significance in shaping our lives. 1. Epigenetics 101 Epigenetics refers to the study of changes in gene expression or cellular phenotype that occur without changes in the underlying DNA sequence. While our DNA sequence remains constant throughout our lives, epigenetic modifications can switch genes on or off, affecting their activity and subsequent protein production. These modifications, such as DNA methylation and histone modification, play a crucial role in development, aging, and disease progression. 1. Nature vs. Nurture: Epigenetics as the Link Epigenetics bridges the gap between nature and nurture, proving that our genes are not solely responsible for our traits and behaviors. Environmental factors, including diet, stress, pollution, and even our social interactions, can trigger epigenetic modifications, altering gene expression patterns. These modifications can be long-lasting and may even be passed down to future generations. 1. Epigenetics and Disease Epigenetic changes can have profound implications for disease susceptibility and development. Studies have identified associations between epigenetic modifications and various conditions like cancer, cardiovascular diseases, neurodegenerative disorders, and mental illnesses. Understanding these modifications allows us to devise targeted interventions and therapies to prevent or treat these diseases. 1. Environmental Factors and Epigenetic Modifications Studies have revealed the impact of environmental factors on epigenetic modifications. These factors can include exposure to toxins, diet, stress, exercise, and even the socioeconomic status of individuals. The influence of these factors on epigenetic changes emphasizes the importance of a healthy lifestyle and the potential for targeted interventions to mitigate the negative effects of harmful environments. 1. Epigenetics and Personalized Medicine Epigenetic modifications provide valuable insights into disease prediction, prognosis, and response to treatments. By analyzing the epigenetic alterations specific to an individual, healthcare providers can offer personalized medicine strategies. Epigenetic biomarkers are also becoming increasingly crucial in early disease detection, helping in the development of preventive strategies. Conclusion Epigenetics is revolutionizing our understanding of gene regulation and its impact on our health and well-being. By uncovering the key points of epigenetics, we realize the power of our environment in shaping our genetic expression. This newfound knowledge opens up new avenues for precision medicine, disease prevention, and therapies. As we continue to unravel the intricacies of this field, epigenetics promises to provide even more profound insights into the nature of life itself.
ESSENTIALAI-STEM
Vikram Vikram - 1 year ago 64 JSON Question How to extract values from json which has multiple hierarchies inside using Python Below is the json content, how to extract values for "GBL_ACTIVE_CPU" using python. { "test": "00.00.004", "Metric Payload": [ { "ClassName": "test", "SystemId": "test", "uri": "http://test/testmet", "MetaData": [ { "FieldName": "GBL_ACTIVE_CPU", "DataType": "STRING", "Label": "test", "Unit": "string" } ], "Instances": [ { "InstanceNo": "0", "GBL_ACTIVE_CPU": "4" } ] ] } I tried below code, but doesn't work. Any help is appreciated: result = json.loads(jsonoutput) print(result) node = result["Metric Payload"]["Instances"]["GBL_ACTIVE_CPU"] print(node) I get below error: TypeError: list indices must be integers or slices, not str Answer Source In JSON "Instances" is a list. You are accessing it like a dict. So it have 2 ways on is static other is dynamic. If you like to use static way:- result = json.loads(jsonoutput) print(result) node = result["Metric Payload"][0]["Instances"][0]["GBL_ACTIVE_CPU"] print(node) If you like to use dynamic way:- result = json.loads(jsonoutput) print(result) for metric in result["Metric Payload"]: for inst in metric["Instances"]: node = inst["GBL_ACTIVE_CPU"] print(node) Recommended from our users: Dynamic Network Monitoring from WhatsUp Gold from IPSwitch. Free Download
ESSENTIALAI-STEM
User:TylerParrott88 Tyler Parrott (born September 4, 1993) is a Canadian professional ice hockey player for the Chicago Blackhawks of the National Hockey League (NHL). He has also played for the New Jersey Devils, Toronto Maple Leafs, LA Kings and Nashville Predators.
WIKI
The Agnew Funeral E.P. The Agnew Funeral E.P. is a 1995 extended play from Lotion, released through spinART Records. Track listing All songs composed by Lotion, except where noted * 1) "Marijuana Vietnam" – 4:49 * 2) "Walk Away Renée" (Michael Brown, Bob Calilli, and Michael Lookofsky) – 2:47 * 3) "Switch" – 2:48 * 4) "Famous Redheads" – 5:12 * 5) "Treat Me" – 5:41 * 6) "Untitled" – 22:44 The 10" EP version excludes "Untitled". Personnel * Lotion * Bill Ferguson – bass guitar * Jim Ferguson – guitar * Rob Youngberg – drums * Tony Zajkowski – vocals * Additional musicians * Joe McGinty – synthesizer * Kurt Ralske – flugelhorn
WIKI
Beljina Beljina (Бељина) is a suburban settlement of Belgrade, Serbia. It is located in the municipality of Barajevo. Beljina is a small rural settlement with 775 inhabitants as of 2011, located on the northeastern tip of the Kosmaj mountain, 12 km south of the municipal seat of Barajevo. In 1956 the municipality of Beljina was created, comprising villages of Beljina, Arnajevo, Manić and Rožanci, but already in 1957 the municipality was dissolved and annexed to the municipality of Barajevo. Old section of the village, known as Čaršija in Beljina, is placed under the state protection as the spatial cultural-historical unit. Demographics In 2011, the settlement contained 270 households with an average of 2.87 members. There were 228 families, with 87% of the population being adults and an average age of 46.2. Wildlife By the 21st century, number of migratory European rollers in Serbia was reduced to some 20 nesting couples, where only few were recorded in Central Serbia and none in the central Šumadija region. The species was widespread by the mid-20th century, but was protected by the state in 1993. In order to try to repopulate the species, ornithologists placed bird houses on top of the trees in Beljina in 2015, but the attempt was unsuccessful. In 2017 the bird houses was moved to the village's utility poles, and rollers began nesting again, starting in 2018, in slowly growing numbers each year.
WIKI
No mess, 100 calorie breakfast in bed for Mother's Day - DIY Boston - Boston.com Photo: Melissa Massello Photo: Melissa Massello Each year on Mother's Day, kids and spouses the world over decide to spoil Mom early in the morning with a good, old-fashioned, home-cooked breakfast in bed. And then, hearts full, those same moms get out of bed to face their special day and the kitchen wreck left behind. Spoil mom completely this Mother's Day with a delicious (100 calorie!) recipe that's not only fail-proof for kids of all ages and spouses of all culinary talent, it requires only the minimal cleanup of two muffin tins and a mixing bowl. (And no messy flour!) Now in regular brunch rotation at my house, this drool-worthy recipe for Bacon & Egg Cups from the blog Fat Girl Girl in a Skinny Body is the ultimate crowd pleaser, and as you can see from my step-by-step home photos not rocket science. Especially when paired with my own mom's signature fried baked potatoes (recipe below photos), this will be a Mother's Day she won't soon forget! Mom's Fried Baked Potato RoundsServes 4-6 Allow the baked potatoes to cool completely (best when refrigerated overnight a great use for leftover baked potatoes from dinner the night before). Slice each potato into rounds and set aside. Heat 1 tbsp each of the olive oil and butter in a cast iron skillet (best) or other nonstick pan. When the pan and olive oil/butter is nice and hot, carefully place potatoes in a single layer and fry until crispy brown, approximately 2-3 minutes. Sprinkle with salt and pepper to taste. Carefully flip each potato round and repeat on the other side. (With additional seasoning, if you like.) Transfer to a paper towel-lined plate, add the remaining 1 Tbsp each of olive oil and butter, and repeat with remaining potatoes. Serve immediately. For more muffin tin recipe ideas, check out this Pinterest board our intern Miko pulled together just for the occasion! Patrick Smith Becca Olcott & Casey Harrison David Zimmerman and Jim Lopata Bruins Daily Staff Barbara Meltz Julian Cardillo Peter Post David D'Onofrio Boston World Partnerships Erik Frenz Scott Kirsner Dr. Suzanne Koven Karyn Polwaczyk Local Finance Experts Scott Kearnan Obnoxious Boston Fan Craig Forde Dr. Ishani Ganguli Timothy Loew David Sabino Maura Welch Kip Durney
NEWS-MULTISOURCE
Closed Bug 1117599 Opened 8 years ago Closed 8 years ago CVE ID format change: CVE-\d{4}-\d{4} becomes CVE-\d{4}-\d{4,} this year Categories (bugzilla.mozilla.org :: Extensions, defect) Production defect Not set normal Tracking () RESOLVED FIXED People (Reporter: glob, Assigned: glob) References Details +++ This bug was initially created as a clone of Bug #1080600 +++ https://cve.mitre.org/cve/identifiers/syntaxchange.html They haven't *yet* reached CVE-2014-10000, but if they don't, they promise to release a five-digit CVE at the beginning of 2015. Interestingly, "There is no limit on the number of arbitrary digits. Leading 0’s will only be used in IDs 1 to 999, as shown in column one below." So these CVEs would need to match: CVE-2014-0001 CVE-2014-9999 CVE-2014-10000 CVE-2014-99999 CVE-2014-100000 CVE-2014-999999 CVE-2014-1000000 CVE-2014-9999999 And these would be invalid: CVE-2014-00001 CVE-2014-099999 CVE-2014-0123456 Which sounds more like this than my simplified subject: CVE-\d{4}-(?:\d{4}|[1-9]\d{4,6})(?!\d) (Reed Loden [:reed] from comment #5) This is incorrect.... New CVE-ID Syntax The new CVE-ID syntax is variable length and includes: CVE prefix + Year + Arbitrary Digits So, either CVE-\d{4}-(0\d{3}|[1-9]\d{3,}) or CVE-\d{4}-\d{4,} :reed, could you provide a test case for a valid CVE id that would be mishandled by the original regex, but handled correctly by your replacement regex(es)? Flags: needinfo?(reed) (In reply to Richard Soderberg [:atoll] from comment #1) > :reed, could you provide a test case for a valid CVE id that would be > mishandled by the original regex, but handled correctly by your replacement > regex(es)? CVE-2014-9999999999999 is a valid CVE id that is mishandled by the original regex. Flags: needinfo?(reed) The regex from bug 1080600 ended up being: > qr/(?<!\/|=)\b((?:CVE|CAN)-\d{4}-(?:\d{4}|[1-9]\d{4,6})(?!\d))\b/ so it seems like simply altering {4,6} to {4,} would be sufficient: > qr/(?<!\/|=)\b((?:CVE|CAN)-\d{4}-(?:\d{4}|[1-9]\d{4,})(?!\d))\b/ Note that, from a practical standpoint, if {4,6} or {4,8} is more efficient than {4,}, I fully support going with a restricted parser that doesn't support more than a 10^6 CVEs in any given year, since we're currently at 10^4. (In reply to Richard Soderberg [:atoll] from comment #4) > Note that, from a practical standpoint, if {4,6} or {4,8} is more efficient > than {4,}, I fully support going with a restricted parser that doesn't > support more than a 10^6 CVEs in any given year, since we're currently at > 10^4. MITRE has made it clear that any parsing should support an arbitrary length of digits to the point that they may even assign a real issue to a high integer. http://seclists.org/oss-sec/2015/q1/47 thanks reed and atoll :) - match => qr/(?<!\/|=)\b((?:CVE|CAN)-\d{4}-(?:\d{4}|[1-9]\d{4,6})(?!\d))\b/, + match => qr/(?<!\/|=)\b((?:CVE|CAN)-\d{4}-(?:\d{4}|[1-9]\d{4,})(?!\d))\b/, To ssh://gitolite3@git.mozilla.org/webtools/bmo/bugzilla.git 7834fbf..50ae5be master -> master Assignee: nobody → glob Status: NEW → RESOLVED Closed: 8 years ago Resolution: --- → FIXED Component: Extensions: BMO → Extensions You need to log in before you can comment on or make changes to this bug.
ESSENTIALAI-STEM
Fathi, Y., Faghih, S., Zibaeenezhad, M. J., & Tabatabaei, S. H. (2016, February). Kefir drink leads to a similar weight loss, compared with milk, in a dairy-rich non-energy-restricted diet in overweight or obese premenopausal women: A randomized controlled trial. European Journal of Nutrition, 55(1), 295–304. Retrieved from https://link.springer.com/article/10.1007/s00394-015-0846-9 A high intensity, sweat pouring, heart pumping, muscle burning workout! In this class you will get a total body experience using fast paced cardio drills, circuit weight training, and fierce calisthenics. Finishing with a core strengthening cool down, you will be pushing your body from start to finish with little to no breaks. This is an intermediate/advanced boot camp designed to challenge you to take your body to its limit. Lean protein like fish is a great way to fight fat and boost your metabolism. But the farmed salmon you get at the local market might not be the best bet for your belly. The cold-water fish has a well-deserved reputation for packing plenty of heart-healthy omega 3 fatty acids—1,253 mg of the good stuff, and just 114 mg of inflammatory, belly-busting omega 6s. But the farmed variety—and 90 percent of what we eat today is farmed—has a very different story to tell. It packs a whopping 1,900 mg of unhealthy omega-6s. What happens if you fast for a day? What happens if you don't eat for a day? While most people will feel hungry and possibly tired, there is also a range of other effects. In this article, learn about how the body starts to burn fat for energy and whether fasting for 24 hours can be a good weight loss tool. We also investigate the possible risks. Read now I am fasting for Ramadan. Can I do this diet? Yes, but you will have to spread your meals out. Drink cold water at 4 a.m. Wait 15 to 20 minutes and eat a big meal with the foods on that day's menu. Then at 7 p.m. when you can break your fast, drink another glass of cold water and wait 15 to 20 minutes. Eat another meal. Repeat through the evening, eating small meals until bedtime. In what is perhaps the biggest buzzkill of all time, sex doesn’t quite count as cardio or burn a significant amount of calories: Women burn about 3.6 per minute. "It’s still a good idea," Dr. Seltzer says, citing the activity’s other benefits, like increasing the output of the neurotransmitters serotonin and dopamine, which naturally reduce food cravings. Instead of subjecting yourself to another endless workout, crank up the intensity and you’ll see results faster than you ever thought possible. The results of a study conducted at McMaster University in Ontario reveal that adult male study subjects who exercised intensely for a single minute had equivalent respiratory and metabolic changes to those who worked out at a slower pace for close to an hour, so if you want to burn through that belly fat, say so long to slow and steady. Avocados are a double-whammy to belly fat. First, they’re packed with heart-healthy monounsaturated fats that dim your hunger switches; a study in Nutrition Journal found that participants who ate half a fresh avocado with lunch reported a 40 percent decreased desire to eat for hours afterwards. Second, healthy fats like the unsaturated fats found in avocados seem to prevent the storage of belly fat. 2. Sweep: Start with basic abs tuck (standing crunch). For that you have to lift one knee using the abs, and bend the other knee to sit slightly on the ground. Bring the rib cage to the bellybutton so that the spine is in C-curve position. Simultaneously, squeeze the oblique on one side to crunch while reaching down for the opposite foot. Do 10 repetitions for each side, then do 10 again (total of 20, alternating after 10). Harvie, M. N., Pegington, M., Mattson, M. P., Frystyk, J., Dillon, B., Evans, G., … Howell, A. (2011, May). The effects of intermittent or continuous energy restriction on weight loss and metabolic disease risk markers: A randomized trial in young overweight women. International Journal of Obesity (London), 35(5), 714–727. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3017674/ So how does the diet work? High trans fat diets cause obesity and other health issues (2). Fat deposits under your skin make you grow in size and weight. To lose weight you need to cut back on fatty, high-calorie foods. Some so-called health experts recommend cutting down on all types of carbohydrates, which I believe is the big mistake. Not all carbohydrates are bad and this diet plan has plenty of carbs. When you cut down fats with carbs, you restrict yourself from almost al satisfying foods, which leads to starving, feeling stressed all the time, and not being able to carry out daily life activities. So to lose weight, you just need to limit your calorie intake or adopt a calorie-deficit diet. You must have noticed that some of your friends eat a lot of sugar-based foods, fried foods, or cold drinks. Yet, they manage to have a flat stomach, the reason being they have a very high metabolic rate. If your metabolism is not good, you may have a bloated stomach. Thyroid conditions, diabetes, and other medical conditions can be the reasons for slow metabolism. If you want to lose weight, you’d better avoid special “low-carb” products that are full of carbs. This should be obvious, but creative marketers are doing all they can to fool you (and get your money). They will tell you that you can eat cookies, pasta, ice cream, bread and plenty of chocolate on a low-carb diet, as long as you buy their brand. They’re full of carbohydrates. Don’t be fooled. A goal really helps you focus, so start by thinking about what fit and healthy means to you. Is it about being able to climb the stairs at work without getting out of puff? Or going for a long walk without your legs wobbling? By finding a personal “finish line” – one that is about you, rather than other people’s standards – you will give yourself the motivation you need to keep going. And simply by turning your attention to exercise for the next month, you will become fitter and healthier – it’s as simple as that. You might have heard the term ‘middle-age spread’. This means, as women progress towards their middle years, the ratio of body fat increases compared to the body weight. During menopause, when the levels of estrogen go down, and the amount of androgens or male hormones increase, then there is an increased risk of fat accumulation in the waist. Hormones actually regulate the fat concentration in the body, and your figure depends entirely on it! “Extreme diets where you're cutting out entire food groups like carbs should be monitored by a doctor or a professional,” says Cara Clark, a certified clinical and sports nutritionist in Orange County, Calif. “This is not usually good for most people. My favorite thing to tell them is if you're cutting carbs to lose weight, expect to be tired and dumb. Our brains thrive with using carbs as fuel. They are essential to our health.” If you’ve been eating fast food for years, get real about your approach: You’re probably not going to stick to an organic, gluten-free, paleo overhaul for very long. "You want to change as little as possible to create calorie deficit," says Dr. Seltzer, who insists the best way to support sustainable weight loss is to incorporate small changes into existing habits. So instead of giving up your daily BLT bagels in favor of an egg-white wrap, try ordering your sandwich on a lighter English muffin. Or say you eat a snack bar every afternoon: Swap your 300-calorie bar for a 150-calorie alternative. "Your brain will feel the same way about it, so you won’t feel deprived," he says. Avoiding salt doesn’t mean your food has to be bland. Experiment with using different herbs and spices. Try adding fresh cilantro and cumin to grilled fish, lemon and rosemary to chicken, or ginger and Chinese five spice to tempeh or beef. Pick up some spice blends from your local market to help add more spice to your life… just read the ingredients and make sure there’s no salt added. At any given time, there are dozens of weight-loss hypes in the marketplace that claim to take off 10 pounds in 10 days, or whatever. Desperation can tempt us to try anything — from "clean eating" to cutting out food groups entirely. Keep in mind: Just because an avocado-walnut-"crunchy"-kale-salad dripping in coconut oil is deemed "clean" by a so-called "expert" on your Instagram feed does not make it an unlimited food. Moral of the story? Avoid fads, eat real food, watch some Netflix, and unwind (perhaps with a glass of wine in hand). Now that's my kind of detox. A great natural bile stimulant and acid reflux preventer. It keeps the stomach pH levels balanced so you will have a flatter tummy and look hot in that bikini! Add a capful to half a glass of water and drink after you wake up. You can try cooking with it. For example, check out these Healthy Mummy 356 Calorie Sweet and Sour Chicken Meatballs You can also buy Healthy Mummy HIGH STRENGTH Apple Cider Vinegar TABLETS here Get FIT involves three workouts and one luncheon seminar each week. The workouts, which are conducted in Bellmont Hall and offered throughout the day, are a balanced mix between cardiovascular and resistance training, the goal being to maximize weight loss from fat and improve daily functioning. The weekly luncheon is a one hour seminar where Get FIT participants bring their lunch and learn from a Registered Dietician and behavioral specialist about healthy eating habits and factors influencing consistent exercise habits, such as barriers and common myths. Get FIT also includes before and after DXA Body Composition tests allowing each participant to see changes in fat, muscle, and bone (see Body Comp FIT). ×
ESSENTIALAI-STEM
Talk:Museum of Tolerance Jerusalem Haaretz special report on the MOT Haaretz has been running a story on the soon to be built Museum of Tolerance in Jerusalem. Specifically the backlash against it within certain areas of Israel (the political left and most of the non-Jewish residents). The issue is that the museum is being built on top of a Muslim cemetery that dates back to at least the 14th century. Recently a report came out showing that the bodies have been damaged by the company hired to excavate the area. http://www.columbiatribune.com/news/2010/may/19/excavators-accused-of-desecration/ http://www.telegraph.co.uk/news/worldnews/middleeast/israel/7737047/Israeli-contractors-dig-up-Muslim-graves-at-museum-of-tolerance.html http://www.ottawacitizen.com/travel/Israel+Contractors+accused+damaging+cemetery/3044884/story.html http://www.nytimes.com/2010/05/19/world/middleeast/19webbriefs-CEMETERY.html?ref=middleeast http://www.haaretz.com/magazine/friday-supplement/museum-of-tolerance-special-report-part-ii-secrets-from-the-grave-1.290941 I am not a wikipedia member or someone who can be completely neutral on the subject so I leave it to those of you who can both edit and be fair —Preceding unsigned comment added by <IP_ADDRESS> (talk) 13:53, 21 May 2010 (UTC) External links modified Hello fellow Wikipedians, I have just modified 1 one external link on Center for Human Dignity. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20081113124606/http://www.ipcri.org:80/files/cityoftolerance.html to http://www.ipcri.org/files/cityoftolerance.html Cheers.— InternetArchiveBot (Report bug) 04:07, 18 November 2016 (UTC) You forgot the essence: what's its purpose? Purpose: which is...? We don't have a single word about why it's being built, neither the officially declared purpose, nor what critics see as its less visible implications. You can't post an article about a topic lacking a definition! Arminden (talk) 08:34, 31 May 2022 (UTC) * Made a start. Now it's up to us to figure out what's hiding behind the weasel words of the SWC. Tolerance for what & whom? Harmony between whom? What's the justification for this mammoth project, just across the street from another weird museum, the FOZ (here)? Forget the cemetery for a minute (and after that read what Hajj Amin al-Husseini said when his project, quite expectedly, stumbled over old bones – just for the sake of perspective, not for anything else). Arminden (talk) 14:08, 31 May 2022 (UTC)
WIKI
Saskia Elemans Saskia Elemans (born 11 March 1977 in Nijmegen) is a Dutch professional cyclo-cross racing cyclist. Career highlights * 2002 * 1st in Boxtel, Cyclo-cross (F) (NED) * 2003 * 2nd in National Championship, Mountainbike, Elite, The Netherlands (F) (NED) * 2004 * 2nd in Eindhoven, Cyclo-cross (F) (NED) * 2007 * 2nd in Moergestel, Cyclo-cross (F) (NED) * 2nd in Veghel-Eerde, Cyclo-cross (F) (NED) * 2nd in Overijse, Cyclo-cross (F), Overijse (BEL) * 3rd in Loenhout, Cyclo-cross (F) (BEL) * 2008 (Team Flexpoint) * 3rd in National Championship, Cyclo-cross, Elite, The Netherlands (F), Sint Michielsgestel (NED) * 1st in Surhuisterveen Centrumcross (F) (NED)
WIKI
Ulcer peptic disease Ulcer peptic disease opinion Among the 2,244 women analyzed, 631 (28. In relation to total weight gain during pregnancy, 750 (33. Gestational diabetes was diagnosed in 164 (7. Pregnant women with low pre-pregnancy weight had a mean weight gain in the 2nd trimester near the lower limit recommended, and below this limit in the 3rd trimester. Insufficient total weight gain was associated with a lower risk of cesarean section (RR 0. In contrast, excessive total weight gain was associated with higher risk of cesarean section (RR 1. For women with insufficient weight gain in the 2nd trimester, a higher risk of SGA (RR 1. No association was found with insufficient weight gain in the final trimester. For women with excessive weight gain in the second trimester, we found a greater risk of LGA birth (RR 1. Wt G: weight gain. Weight gain in the 2nd and 3rd trimester and total weight gain showed associations with birth ulcer peptic disease, preterm birth and cesarean section, independent of pre-pregnancy BMI and maternal characteristics. Extremes of infant birth weight were more associated with weight gain in the 2nd trimester, whereas risk of preterm birth and cesarean section with excessive weight gain in the 3rd trimester. The mean gestational weight gain in the 2nd trimester was higher than in the 3rd, except for women with pre-pregnancy obesity. Fetal growth in the 2nd trimester is indeed faster compared to the other trimesters, and more subject to interferences related to maternal nutrition. The main paradox ulcer peptic disease the relationship between gestational weight gain and birth weight is the playoff of benefits of greater maternal gain in terms of reducing SGA births and harm in terms of increasing LGA births. In the present study, women who had excessive weight gain ulcer peptic disease the 2nd Azelex (Azelaic Acid Cream)- FDA regardless of pre-pregnancy BMI, 3rd trimester weight gain, height, diabetes and presence of smoking habit, had higher risk of Ulcer peptic disease. Gestational weight gain appears to be inadequately monitored in primary care services. Two apparently paradoxical findings were present. First, having few prenatal visits was ulcer peptic disease risk factor for insufficient weight gain, but was a protective factor against excessive weight gain. Secondly, starting pregnancy when overweight or obese proved to be a risk factor for excessive weight gain, while starting underweight was not a risk factor for ulcer peptic disease weight gain during pregnancy. This previous study highlights that despite macrosomia being a strong predictor of cesarean section, excessive weight gain was an independent risk factor for this outcome, stanford binet it also argues that from the 288,000 cesarean deliveries performed in the U. The present study is in accordance with these findings regarding total and especially 3rd trimester excessive weight gain. An intriguing finding in this study was that excessive weight gain in 3rd ulcer peptic disease was a risk factor for preterm birth. There are no clear biologic mechanisms for the link between excessive pregnancy Nubain (Nalbuphine hydrochloride)- Multum gain and preterm delivery. However, in the present study, this association ulcer peptic disease adjusted for hypertensive disorders and others confounding variables. The present study has some limitations. Pre-pregnancy weight was reported by the woman. The correlation between the reported and the measured weight is very strong, reaching values up to 0. Information about 2nd, 3rd trimester and total weight gain was only possible to be performed in 40. Though many women ended up being excluded due to lack of ulcer peptic disease, those ulcer peptic disease had similar maternal characteristics ulcer peptic disease enrollment. Another limitation is that the weights used to calculate weight gain were retrieved from medical records. Weight at enrollment was the only weight obtained in duplicate. Given the limited availability of standardized prospective cohort studies in pregnancy, the data presented here contribute to the knowledge of this area, especially in the Brazilian context. However the use of these North American recommendations to promote adequate pregnancy outcomes for Brazilian women is not supported for pregnant women with respect to insufficient weight gain in the 3rd trimester as insufficient gain did not result in any adverse maternal and fetal outcome. If further studies confirm this lack of association between the low weight gain in the last trimester and obstetric events, independent of pre-pregnancy BMI, consideration should be ulcer peptic disease to a lower recommended weight gain in this trimester. Contribution(s) to critical aspects of the conduct of the research, revising it for important intellectual content, approval of the final, submitted version): MD BBD GK MIS. Conceived and designed the experiments: MD MIS. Performed the experiments: MD BBD GK MIS. Analyzed the data: MD MIS. Wrote the paper: MD BBD GK MIS. Is the Subject Area "Weight gain" applicable to this article. Yes NoIs the Subject Area "Pregnancy" applicable to this article. Yes NoIs the Subject Area "Gestational diabetes" applicable to this article. Yes NoIs the Subject Area "Body weight" applicable to this article. Yes NoIs the Subject Area "Cesarean section" applicable to this article. Yes NoIs the Subject Area "Hypertensive disorders in pregnancy" applicable to this article. Yes NoIs the Subject Area "Preterm birth" applicable to this article. Conclusion Though insufficient weight gain in the 3rd trimester was not associated with adverse outcomes, other deviations from recommended weight gain during second and third trimester were associated with adverse pregnancy outcomes. Ulcer peptic disease of cesarean section and preterm birth with weekly gestational weight gain in the 2nd and 3rd trimesters and total weight gain (according to Institute of Medicine, 2009, categories). Brazilian Study of Gestational Diabetes (EBDG). Ulcer peptic disease of small for gestational age and large for gestational age birth with weekly gestational weight gain in 2nd and 3rd trimesters and with total weight gain (according to Institute of Medicine, 2009 categories). DiscussionThe Ulcer peptic disease, a cohort study designed and carried out in the 1990s, remains the largest study of the association of gestational ulcer peptic disease gain with maternal and infant obstetric outcomes in Brazilian women. Author ContributionsContribution(s) to critical aspects of the conduct of the research, revising ulcer peptic disease for important intellectual content, approval of the final, submitted version): MD BBD GK MIS. Gardner B, Wardle J, Poston L, Croker H (2011) Changing diet and physical activity to reduce gestational weight gain: a meta-analysis. Asbee SM, Jenkins TR, ButlerJR, White J, Elliot M, et al. Bodnar LM (2011) Should Gestational weight gain recommendations be tailored ulcer peptic disease maternal characteristics. Further... Comments: 18.11.2019 in 11:18 Akilmaran: I am ready to help you, set questions. Together we can find the decision. 21.11.2019 in 10:29 Milrajas: This situation is familiar to me. I invite to discussion.    
ESSENTIALAI-STEM
, Volume 200, Issue 5, pp 447-468 Sodium transport-related proteins in the mammalian distal nephron – distribution, ontogeny and functional aspects Rent the article at a discount Rent now * Final gross prices may vary according to local VAT. Get Access Abstract  The mammalian distal nephron plays a pivotal role in adjusting urinary sodium excretion. Successive portions of the renal tubule are formed to adapt to this function, and an axial heterogeneity of the distal segments has been defined. The specific transport properties of these epithelia are accomplished by the expression of proteins (cotransporters, exchangers, channels) governing the movement of ions on either cell side. Molecular cloning of these proteins has had a marked impact on the study of their localization and function in the healthy and diseased kidney. Electroneutral cation-chloride cotransporters [Na(K)CC] have been localized to the thick ascending limb and the distal convoluted tubule using specific probes. Proteins implicated in the function of aldosterone target cells, such as the epithelial Na+ channel (ENaC), the mineralocorticoid receptor (MR) and 11β-hydroxysteroid dehydrogenase type 2 (11HSD2), an enzyme that confers mineralocorticoid specificity, have been found in the terminal portion of the nephron and the collecting duct. A mineralocorticoid-sensitive component of thiazide-sensitive NaCl transport has been identified in the distal convoluted tubule. Analysis of the ontogeny of these proteins in the maturing kidney has provided a detailed picture of epithelial differentiation and morphological specialization of the renal tubule. The study of mutations of the proteins related with NaCl transport has led to the identification of the molecular causes of inherited human diseases associated with hypo- or hypertension, and the respective sites of an impaired ion transport could be mapped to the renal tubule.
ESSENTIALAI-STEM
zfr/zfr-cors Zend Framework 2 module that let you deal with CORS requests Installs: 57 680 Dependents: 4 Stars: 39 Watchers: 11 Forks: 18 Open Issues: 4 Language: PHP v1.2.0 2014-07-23 10:50 UTC README Build Status Scrutinizer Quality Score Coverage Status Latest Stable Version ZfrCors is a simple ZF2 module that helps you to deal with Cross-Origin Resource Sharing (CORS). What is ZfrCors ? ZfrCors is a Zend Framework 2 module that allow to easily configure your ZF 2 application so that it automatically builds HTTP responses that follow the CORS documentation. Installation Install the module by typing (or add it to your composer.json file): $ php composer.phar require zfr/zfr-cors:1.* Then, enable it by adding "ZfrCors" in your application.config.php file. By default, ZfrCors is configured to deny every CORS requests. To change that, you need to copy the config/zfr_cors.global.php.dist file to your autoload folder (remove the .dist extension), and modify it to suit your needs. Documentation What is CORS ? CORS is a mechanism that allows to perform cross-origin requests from your browser. For instance, let's say that your website is hosted in the domain http://example.com. By default, user agents won't be allowed to perform AJAX requests to another domain for security reasons (for instance http://funny-domain.com). With CORS, you can allow your server to reply to such requests. You can find better documentation on how CORS works on the web: Event registration ZfrCors registers the ZfrCors\Mvc\CorsRequestListener with the MvcEvent::EVENT_ROUTE event, with a priority of -1. This means that this listener is executed AFTER the route has been matched. Configuring the module As of now, all the various options are set globally for all routes: • allowed_origins: (array) List of allowed origins. To allow any origin, you can use the wildcard (*) character. If multiple origins are specified, ZfrCors will automatically check the "Origin" header's value, and only return the allowed domain (if any) in the "Allow-Access-Control-Origin" response header. To allow any sub-domain, you can prefix the domain with the wildcard character (i.e. *.example.com). Please note that you don't need to add your host URI (so if your website is hosted as "example.com", "example.com" is automatically allowed. • allowed_methods: (array) List of allowed HTTP methods. Those methods will be returned for the preflight request to indicate which methods are allowed to the user agent. You can even specify custom HTTP verbs. • allowed_headers: (array) List of allowed headers that will be returned for the preflight request. This indicates to the user agent which headers are permitted to be sent when doing the actual request. • max_age: (int) Maximum age (seconds) the preflight request should be cached by the user agent. This prevents the user agent from sending a preflight request for each request. • exposed_headers: (array) List of response headers that are allowed to be read in the user agent. Please note that some browsers do not implement this feature correctly. • allowed_credentials: (boolean) If true, it allows the browser to send cookies along with the request. Preflight request If ZfrCors detects a preflight CORS request, a new HTTP response will be created, and ZfrCors will send the appropriate headers according to your configuration. The response will be always sent with a 200 status code (OK). Please note that this will also prevent further MVC steps from being executed, since all subsequent MVC steps are skipped till Zend\Mvc\MvcEvent::EVENT_FINISH, which is responsible for actually sending the response. Actual request When an actual request is made, ZfrCors first checks it the origin is allowed. If it is not, then a new response with a 403 status code (Unauthorized) is created and sent. Please note that this will also prevent further MVC steps from being executed, since all subsequent MVC steps are skipped till Zend\Mvc\MvcEvent::EVENT_FINISH, which is responsible for actually sending the response. If the origin is allowed, ZfrCors will just add the appropriate headers to the request produced by Zend\Mvc. Security concerns Don't use this module to secure your application! You must use a proper authorization module, like BjyAuthorize, ZfcRbac or SpiffyAuthorize. ZfrCors only allows to accept or refuse a cross-origin request. Custom schemes Internally, ZfrCors uses Zend\Uri\UriFactory class. If you are using custom schemes (for instance if you are testing your API with some Google Chrome extensions), you need to add support for those schemes by adding them to the UriFactory config (please refer to the doc). Example To register the chrome-extension custom scheme in your API, simply add: UriFactory::registerScheme('chrome-extension', 'Zend\Uri\Uri'); to the onBootstrap() method in module/Application/Module.php. Do note that, if your IDE doesn't resolve this automatically, you should add the following use definition to the same file: use Zend\Uri\UriFactory; Registering the chrome-extension custom scheme like this allows you to use Google Chrome extensions for testing your API.
ESSENTIALAI-STEM
The Bizarre Adventures of Woodruff and the Schnibble Woodruff and the Schnibble of Azimuth (marketed in North America as The Bizarre Adventures of Woodruff and the Schnibble) is a 1995 French adventure game developed by Coktel Vision. The creator of the Gobliiins series, Pierre Gilhodes, worked on the game, and Woodruff shares that series' visual style, gameplay and offbeat humor, though is not an official part of the Gobliiins series or canon. The game was released in April 1995 on Windows 3.1 (in French, English, Spanish and German), and was later released for newer Windows versions (Polish was added). Woodruff was distributed in North America in 1995 by Sierra On-Line. Setting Following the near-annihilation of Earth during the last atomic war, the surviving human population retreated to the center of the planet where the last traces of life-sustaining warmth remained. Waiting out the surface radiation, centuries passed before the humans finally ventured back into the world above, discovering that their planet had sprouted a lush, overgrown jungle in their absence along with various races of mutants, including a peaceful race known as the Bouzouk (spelled "Boozook" in the US release), who differ from humans by their tails, pointed ears, and extraordinarily long noses. In the societal structure of the Bouzouk there was a King and a Council of Wisemen, seven mystics who had successfully maintained universal harmony by guarding the Chprotznog, a sacred containment unit used to channel and subsequently trap evil spirits. Having failed to learn their lesson from last time, the humans immediately waged war on the tranquil Bouzouk tribe in what became known as "The Great Battle". In a mere day, the humans destroyed the Bouzouk civilization, massacring many innocent civilians and looting their holy artifacts, including the Chprotznog. The surviving Bouzouks were enslaved and forced to construct a new society for the humans, the great vertical city of Vlurxtrznbnaxl, an economically self-sufficient city run on wind power and surrounded by rich farmland. Its citizens live in different parts of the city according to their socio-economic status: the poor live on the lower levels while the rich and powerful live on the higher levels. The remaining Bouzouk peoples became exploited and oppressed; their once great society in shambles, they're left to work menial jobs and manual labor, living uneasily alongside the humans while their deposed King now spends his days in his dilapidated castle, drinking beer and watching TV. The present The game begins about a century later, where the great city has since devolved into a nightmarish dystopia under the rule of a bureaucratic and totalitarian government. Heading the government is the reclusive President, who's represented by his corrupt advisor, a hideous man known only as the BigWig. In the lower levels of the city, relations between humans and Bouzouks have grown to their most tense, giving rise to a group known as the Bouzouk Freedom Party, a terrorist organization who, being natural pacifists, have yet to commit any actual acts of terrorism. Professor Azimuth, an eminent political and scientific human personality known for his work on manipulating the aging process of cells, sympathizes with the plight of the Bouzouks and becomes determined to help end their oppression. In his research, he discovers the legend of the Schnibble, a mystical entity that is believed to have the ability to cause peace and prosperity to flourish in times of need, and begins work on finding a way to unleash it. Word spreads about his goal, and Azimuth is hailed as a hero by the Bouzouk community. The word of the Schnibble also reaches the ears of the BigWig. To stave off any chance of a revolution, the BigWig and his thugs storm the home of Professor Azimuth and his young adopted half-human, half-Bouzouk son, Woodruff. Azimuth barely has time to hide Woodruff before the BigWig breaks into their home, kidnapping the Professor and ruthlessly gunning down Woodruff's beloved teddy bear in the process, but not before befitting him with a Viblefrotzer, an invention of his own design that helps rapidly speed the aging process. Within seconds, Woodruff ages about fifteen years, finding himself now prepared (albeit without shoes or the ability to read) for an epic quest: rescue his adopted father, avenge the death of his teddy bear by exacting revenge on the BigWig, and unravel the mystery of the Schnibble to help bring harmony back to the city. Gameplay Woodruff's relatively simple point-and-click interface is nearly identical to the one featured in Sierra's King's Quest VII: by moving the cursor over certain objects, they'll become highlighted, indicating that it's an item or person Woodruff can interact with. Woodruff's inventory is accessed by clicking the right mouse button; clicking and dragging an inventory item onto a highlighted object will combine the two. However, if the items do not connect, Woodruff may openly mock the player. Reception Despite a less-than-heralded release in America, Woodruff was released to primarily positive reviews, with most praise being given to its visual style and sense of humor. Strategy Plus (now Computer Games Magazine) gave it its most notable review, claiming it was "so addictive, you may lose your job", which ended up being printed on the box's front cover and used in most of its advertisements. The review further elaborated with "…features splendid high-resolution graphics that provide further evidence that Sierra is on a roll". PC Gamer also praised the game for its "exceptional graphics and sound", comparing it to other offbeat adventure games such as Day of the Tentacle and Sam & Max Hit the Road. French magazine Joystick called it "truly wonderful" and "a real cartoon". MobyGames currently gives it a ranking of 85 out of 100. Of the negative aspects of the game, Gamer's Zone, although having given it a positive review, complained about the often ludicrously hard puzzles, the lack of original music, and the repetitive background sound effects, complaints that were often echoed in other reviews. Despite critical acclaim, however, Woodruff failed to find a mass audience and turned out to be a financial disappointment for Sierra, eventually slipping into obscurity behind most of the company's better-known titles. Although Woodruff has been more or less largely forgotten within the adventure game genre (so little information is there that the game's English voice actors have never been identified; the French version, however, features the voices of Edgar Givry as Woodruff and Claude Piéplu as the narrator), there still remains a small, yet devoted cult fanbase.
WIKI
The Secrets of Seagrass Zosteramarina Zostera marina. Public domain, via Wikimedia Commons. It’s the ancient story of plant evolution: photosynthetic algae moved to damp places on land, eventually evolving more complex architecture, and spreading across almost all terrestrial habitats. To cope with the drier conditions, plants developed roots to absorb water, and vascular tissue to transport it; a waxy cuticle coating their surfaces to prevent evaporation; and microscopic pores called stomata that open to allow carbon dioxide to diffuse in for photosynthesis but close to prevent excessive water loss. How, then, does eelgrass (Zostera marina) fit in to this tale? It’s a monocot descended from the flowering plants, but it has turned its back on dry land and returned to the sea; a rare feat that only appears to have happened on three occasions. The recent sequencing of the eelgrass genome has revealed several interesting insights into the dramatic genetic changes that have allowed it to adapt to what lead author Professor Jeanine Olsen described as, “arguably the most extreme adaptation a terrestrial (and even a freshwater) species can undergo.” Sayonara to stomata If you live in the sea, conserving water isn’t your main concern. Eelgrass was known to lack stomata, but genetic comparisons to other species, including its freshwater relative Spirodela polyrhiza, revealed the first surprise of the study: eelgrass has lost not only its stomata but also the genes involved in their development and patterning. “The genes have just gone, so there’s no way back to land for seagrass,” said Olsen. A difference in defense When angiosperms are attacked by herbivores or pathogens, their defense response typically involves the release of volatile secondary metabolites through their stomata. How can eelgrass release these compounds without stomata? The answer is: it doesn’t. The genome study found that eelgrass is missing crucial genes involved in making ethylene (an important hormone release in times of stress), as well as those responsible for producing non-metabolic terpenoids, which act to repel pests. Selective pressures of the marine environment differ greatly from those of terrestrial habitats, so different pathways may be involved. Second, eelgrass has a wide repertoire of pathogen resistance genes, which suggests that it is exposed to a very different set of pathogens that may not respond to typical immune responses. Third, volatile secondary metabolites are often involved in attracting pollinators; this is not believed to be necessary in eelgrass, where submarine pollination occurs using the water itself. Zostera marina. Public domain, CC0 1.0. Zostera marina – National Museum of Nature and Science, Tokyo. Public domain, CC0 1.0, via WikiMedia Commons. Changing the cell wall Eelgrass is subject to extremely salty conditions, and it’s had to adapt to osmotic stress. Unlike typical plant cell walls, eelgrass has engineered its cell wall matrix to retain water in the cell wall, even during low tide. This involves depositing sulfated polysaccharides and low methylated pectins in the cell wall matrix, but until its genome was sequenced no-one knew exactly how. It turns out that eelgrass has rearranged its metabolic pathways: “They have re-engineered themselves,” Olsen explains. Living with a lack of light Some species of Zostera can grow in water 50m deep, where light levels are reduced and shifted into a narrow wavelength range; ultraviolet (UV), red and far-red light have particularly low penetration after the first 1–2m of seawater. In a classic eelgrass ‘use it or lose it’ response, it has lost the UVR8 gene, which is responsible for sensing and responding to UV damage, as well as the phytochromes associated with red and far-red receptors. It does, however, retain the photosynthetic machinery, including photosystems I and II. Unravelling angiosperm evolution The recent eelgrass publication has revealed how this plant has either lost or adapted typical angiosperm traits to suit its needs, by ditching its stomata, volatile secondary metabolites and certain light sensing genes, or by altering the structure and function of the cell wall. It also developed adaptations that enable gas exchange, help pollen stick to submerged stigmas, and promote nutrient uptake. Could these adaptations be useful in crop breeding? While a lack of defense compounds would probably be a step backwards, it would be extremely useful to understand how eelgrass copes with biotic stresses without them. Removing light receptors would also be problematic, but could eelgrass help us to develop crops that can grow in shaded conditions, perhaps in intercropping systems? What can we learn from eelgrass’ nutrient uptake and salt-tolerant adaptations? Now that we have seen some of the secrets of eelgrass, how can we best make use of them?   Read the paper: The genome of the seagrass Zostera marina reveals angiosperm adaptation to the sea (Open Access) Read the editorial: Genomics: From sea to sea (paywall) Read the press release: Genome of the flowering plant that returned to the sea  
ESSENTIALAI-STEM
Talk:Friedrich Laun Contested deletion This page should not be speedy deleted because... --Boleyn (talk) 07:03, 22 April 2011 (UTC) It was created one minute ago! Context clear - 19th-century novelist, referenced with Wikisource link. Boleyn (talk) 07:03, 22 April 2011 (UTC) Schopenhauer Was acquainted with Arthur Schopenhauer -- Yodin T 22:39, 16 September 2023 (UTC)
WIKI
List of number-one albums of 2010 (Netherlands) 13 albums were number one on the Mega Album Top 100, the official albums record chart of the Netherlands, in 2010. The first album to top the chart that year was Susan Boyle's I Dreamed a Dream, and the last was Dromen durven delen by Marco Borsato. Artists and bands who had an album reach number one on the chart for at least one week were Boyle, K3, Jurk!, Caro Emerald, Jan Smit, Alain Clark, Ilse DeLange, Phil Collins, Nick & Simon, Jamiroquai, Bursato and Michael Jackson. Out of all of them, Jurk!, Emerald and Jamiroquai had their first ever number-one album on the chart. Emerald's Deleted Scenes from the Cutting Room Floor was the best-performing of 2010, topped the 2010 year-end chart. Chart history Source:
WIKI
Talk:stormo RFV discussion: February 2018–January 2019 Rfv-sense: (military, aviation) a wing (an organizational level). Italian, tagged but not listed. ←₰-→ Lingo Bingo Dingo (talk) 13:32, 27 February 2018 (UTC) * On Italian Wikipedia, there are many units listed as "stormo" (plural==stormi) in w:it:Categoria:Stormi, and lists the equivalent German term as "Jagdgeschwader" (wing (Jagdgeschwader)) -- <IP_ADDRESS> 23:52, 27 June 2018 (UTC) * Thank you. Searching for stormo with a lot of military terms or some of the batallion names on Wikipedia gives many results. In my opinion this can be closed as obviously citable. ←₰-→ Lingo Bingo Dingo (talk) 08:56, 25 July 2018 (UTC) * Could you have a look at this? ←₰-→ Lingo Bingo Dingo (talk) 09:35, 28 November 2018 (UTC) * Both the Treccani vocabulary and the Olivetti dictionary mention the military sense of the word. Seems to me it's well estabilished. -- GianWiki (talk) 17:55, 28 November 2018 (UTC) * Sorry to bother you again, but as it stands this could still fail RFV. Do these searches produce several attestations of the sense? If so, this can probably be kept as clearly in widespread use. ←₰-→ Lingo Bingo Dingo (talk) 15:46, 29 November 2018 (UTC) * RFV passed. Sufficient cites in BGC links provided. —Μετάknowledge discuss/deeds 01:16, 6 January 2019 (UTC)
WIKI
Is type 2 diabetes serious? Type 2 diabetes is not a death sentence, but it is a very serious disease that demands attention and careful monitoring. There is no such thing as ‘mild’ diabetes. Elevated glucose levels can damage the nervous system, blood vessels, eyes, heart, and kidneys. These complications really impact quality of life (through blindness, amputations, dialysis etc). They also significantly increase the chance of a stroke or heart attack. Managing blood glucose levels immediately, along with other health risk factors (e.g., cholesterol, blood pressure, weight), is necessary for preventing these complications. Losing even a small amount of weight and keeping it off can also improve glucose control as well as have other clinical benefits (read more tips on managing diet and exercise below for more on weight loss). Keep in mind that better diabetes management also has benefits in the here and now – mood and energy levels are adversely affected when your glucose levels are high.  If eaten as part of a healthy meal plan, or combined with exercise, sweets and desserts can be eaten by people with diabetes. They are no more "off limits" to people with diabetes than they are to people without diabetes. The key to sweets is to have a very small portion and save them for special occasions so you focus your meal on more healthful foods. Sources of processed or added sugar, including condiments, honey, and especially sugary drinks, are just a few of the potential culprits for weight gain, Grieger says, and it’s when they’re consumed in excess that they can contribute to diabetes risk. “The largest source of added sugar comes from sweetened beverages. They run the gamut of soda, sweetened tea, juices with added sugar, sports drinks — it’s a plethora. Just about everything we drink has added sugar in it, except for water,” she explains. The classic symptoms of diabetes are polyuria (frequent urination), polydipsia (increased thirst), polyphagia (increased hunger), and weight loss.[23] Other symptoms that are commonly present at diagnosis include a history of blurred vision, itchiness, peripheral neuropathy, recurrent vaginal infections, and fatigue.[13] Many people, however, have no symptoms during the first few years and are diagnosed on routine testing.[13] A small number of people with type 2 diabetes mellitus can develop a hyperosmolar hyperglycemic state (a condition of very high blood sugar associated with a decreased level of consciousness and low blood pressure).[13] central diabetes insipidus a metabolic disorder due to injury of the neurohypophyseal system, which results in a deficient quantity of antidiuretic hormone (ADH or vasopressin) being released or produced, resulting in failure of tubular reabsorption of water in the kidney. As a consequence, there is the passage of a large amount of urine having a low specific gravity, and great thirst; it is often attended by voracious appetite, loss of strength, and emaciation. Diabetes insipidus may be acquired through infection, neoplasm, trauma, or radiation injuries to the posterior lobe of the pituitary gland or it may be inherited or idiopathic. Insulin treatment can cause weight gain and low blood sugar. In addition, there may be discomfort at the injection site. There are several types of tablets used to treat diabetes and they have different side-effects. The most common are diarrhoea (metformin), nausea (GLP-1 agoniists), weight-gain (sulphonylureas and pioglitazone), low blood sugar (sulphonylureas) and genital thrush (SGLT2 inhibitors). However, not all patients will experience some or any of these side-effects and patients should discuss any concerns with their doctor. In this health topic, we explain the dangers of hyperglycemia, or high blood sugar levels, and diabetes. Hyperglycemia causes many of the warning signs of diabetes listed above. Hyperglycemia may be caused by skipping or forgetting your insulin or diabetes medicine, eating too many grams of carbs for the amount of insulin administered, simply eating too many grams of carbs in general, or from stress or infections. ×
ESSENTIALAI-STEM
User:Jessiruiz13/sandbox Kim Abeles Kim Abeles (born August 28, 1952, age 70) is a visual artist. She is known for using her work to explore biography, geography, feminism, and the environment. In the art community, Abeles is known as an activist because her work has expressed political and social aspects. Instagram: @kimsbeles Website: https://kimabeles.com/ Life and Education Kim Abeles was born in Richmond Heights, Missouri, and grew up in Pittsburg, Pennsylvania. At an early age, Abeles realized that she deeply loved art. While in 5th grade, Abeles would teach art classes to the neighborhood children. After high school, she attended Ohio University and earned her Bachelor of Fine Arts in Painting. Then she was accepted into Cal Arts for graduate school but could not attend due to tuition costs. Fortunately, she received an offer from the University of California, Irvine, and decided to attend. At UCI, she graduated with a Master’s in Fine Arts degree in studio art in 1980. Work Kim Abeles is a visual artist who uses her art to send important messages to the world and, in a way, motivate people to take action and change the world. Kim Abeles stated, "Art that provides a viewer with meaningful portrayals of nature and society is in service to re-engage a person with the physical world; this is where positive change is possible." Abeles takes important issues like feminism, mental illness, and environmental issues, amongst other issues, and uses art to convey a message through her artwork. She believes motivating people and showing them where change must occur will allow society to participate and work for improvement. Pearls of Wisdom Abeles collaborated with A Window Between Worlds, a non-profit that uses art to end domestic violence. To create this art piece, Abeles gathered 800 participants from shelters and workshops that experience domestic violence. Each participant created a pearl and wrote about their experience with domestic violence. Pearls are a metaphor for domestic violence because pearls are formed as a way to protect the oyster from harmful irritants. Much like these oyster victims of domestic violence, through their experience, they are made stronger and empowered by the hardships, transforming them into something beautiful like a pearl. Smog Collectors This collection is an artwork that allows the public to see the real issue with smog development. Abeles collects smog from the air and turns it into images, allowing us to see how big of an issue smog can become for the human body. She began this collection in 1987 when she first noticed how much smog filled the air where she lived in the San Gabriel Mountains. Smog is an issue that not many people realize can cause damage to the lungs over time. According to the CDC, "Ground-level ozone (a key component of smog) is associated with many health problems, such as diminished lung function, increased hospital admissions and emergency room visits for asthma, and increases in premature deaths." Kim Abeles uses her artwork to show that smog is not as "invisible" as people believe these pieces are meant to be a shock factor in encouraging people to make a change because otherwise they will be affected. Paper Person Paper Person is a sculpture Kim Abeles created and is a permanent collection at the California Science Center. Abeles created an enormous artwork suspended from the ceiling and shaped like a person. The sculpture was made out of the trash collected from the California Science Center and left behind by people who visited on Earth Day 2009. Signs of Life Diptych Kim Abeles made an artwork depicting Downtown Los Angeles to show the environmental impact of climate change. One image depicts Downtown LA with beautiful and lively trees, and the next depicts the same location, but the trees are dead. Abeles is sending the message that if we do not make changes and try to protect the environment, we will ultimately be the downfall of the world and ourselves. Notable Moments 1996: Published an Environmental Activity Book - an activity book that discusses issues like water, air pollution, and recycling. The Los Angeles Cultural Affairs Department funded this book 1999: Created the piece "Reason, Imagination and Memory and Literary Lanterns," funded by the City of Los Angeles Department of Cultural Affairs Panorama City Public Library. 2001: Created "From Your Seat, Sidewalk Medallions, and Hill Street Time Keeper," located in Grand Central Market Court 2002: Created "Illuminated Fig Leaves," located at Marriott Hotel and Armory Center for the Arts, Pasadena, CA2009: Published Mapping Space, Time, and Narrative - compiling all of her work on mapping. 2013: Created "Woven Hands," located at Kedren Community Health Center. 2015: Gallery-of-Solutions: an exhibition under the Luckman Project in Cal State LA. This exhibition is about human behavior and its impact on the environment. Students, professors, and guest artists come together to set up the exhibition. Kim Abeles is one of the guest artists. 2017: Published Talking Air - an activity book that was designed to teach children about air pollution 2018: CAA MFA Exhibition - Kim Abeles was one of the curators for this event that picked students to participate in an exhibition and win a scholarship. 2023: Smog Collectors Exhibition in Sacramento State University displaying Abeles's work from 1987-2020.
WIKI
Bands of the Uganda People's Defence Force Bands of the Uganda People's Defence Force (UPDF) are maintained in accordance with British traditions. All three services (the Land and Air Forces as well as the Special Forces Command) have their own military bands. It holds British Army traditions that date back to the Band of the King's African Rifles in the Uganda Protectorate. Colonial era The colonial era Band of the 4th Battalion, KAR was the regional military band for British Uganda. It was known for wearing traditional Scottish attire such as kilts on parade alongside the standard khaki drill fabric and tall fezzes as headgear. Based in Bombo, many members of the band took part in the Burma campaign during the Second World War. The Kabaka of Buganda also maintained military bands in his personal military forces, going off of the British model as well. Military bands under Amin Military bands under President Idi Amin grew under his leadership and with his approval. Amin particularly grew to appreciate the composition of praise songs by these bands. This gave him cause to create a military band in every major military barracks across the country. These bands include: * Simba Airborne Jazz Band (Mbarara) * Suicide Revolutionary Jazz Band (Masaka) * Bombo Barracks Band * Tiger Army Band (Mubende) * Military Police Band (Making) * EKO Jazz Band (Moroto) * Masindi Army Jazz Band (Masindi) * Malire Army Jazzy Band (Lubiri) * Headquarter Army Jazz Band (Bugolobi) * Uganda Air Force Jazz Band (Entebbe) * Eagle Jazz Band (Jinja) All of these were independent of the police and prisons bands. Sarah Kyolaba, the fifth and last wife of Amin, was a member of the Revolutionary Suicide Band as a dancer. Kyolaba earned the nickname "Suicide Sarah" by her bandmates, who all served in the Mechanised Regiment. Standard repertoire of bands * Oh Uganda, Land of Beauty (National anthem) * EAC Anthem (East African Community anthem) * Moto Wa Waka (Anthem of the UPDF) * The Garb of Old Gaul (Slow march during parades and inspections) * The Grenadiers' Slow March (During the Trooping the Colour on Independence Day) Army Band The band is based in Bombo, just outside of the capital of Kampala. Consisting of 42 members, it is the chief band of the country. It performs at military parades, national ceremonies and during official state visits of foreign leaders. The band has often been controversial its choice of music. During the visit of Kenyan President Uhuru Kenyatta to Kampala, the band stirred controversy when it played Kanu Yajenga Nchi, a song praising the Kenya African National Union, which is associated with the authoritarian rule of Daniel Arap Moi. In March 2015, advisors from British Corps of Army Music took a 10-day tour of Uganda in which it trained troops of the UPDF Brass Band. The band has also trained musicians from neighboring African states such as Rwanda. In 2009, the band conducted training at the Rwanda Military Academy in Nyakinama. Today, military bands outside the mainstream include the UPDF's 4th Division Brass Band. Air Force Band The Air Force Band is the official representative band of the Uganda People's Air Defence Forces. It is currently based at Katabi Barracks in Entebbe. The Uganda Air Force Jazz Band was an ensemble of the band and one of the most notable of the bands created under the Amin government. It participated in FESTAC 77 in the Nigerian city of Lagos among other regional visits. The album Uganda Souvenir was the only LP the band ever produced, having a total of 20 songs. Others that were released were single records. Notable members of the band included Bonny Kyambadde, Simon Kaate Nsubuga, and Fred Kanyike. Special Forces Band The Special Forces Command Band the official service band of the country's Special Operations Command. On 18 June 2018, training began for over 40 soldiers of the SFC Directorate of Band to form a new musical unit. This was intended on making all three service branches self-reliant in terms of musical accompaniment. Much of the training was provided by its associated band from the Uganda People's Defence Air Forces. The soldiers were trained in music theory, orchestration and aural. On 5 July 2019 a graduation day in honor of the band was held at Sera Kasenyi Training School in the Wakiso District. Congratulatuons were made by the representative of the SFC Commander James Birungyi and the UPDF deputy spokesperson. It is one of the few bands in the world that are attached to a special forces unit.
WIKI
Marijuana has become one of the most widely used drugs in the United States. Marijuana has many different effects which result from using the drug. Effect means how a person reacts to the drug. Marijuana is a mild hallucinogenic drug which is used for individual pleasure or medical treatment. The effects can be physical, psychological, or medicinal.Many physical effects result from smoking marijuana. The most common effects from the use of marijuana are an accelerated heart rate and a reddening of the eyes. The effect on the eyes has been attributed to a "swelling of the minor conjunctival blood vessels in the eye" (Abel 153). The increase in pulse rate has been shown to be dose dependent. According to Abel, "The more THC given to the subject, the greater the pulse rate" (153).Evidence has proven that marijuana not only increases heart rate but also temporarily weakens heart muscle contractions. The drug also impairs a persons judgment and coordination. Therefore, it is very dangerous to operate a motor vehicle under the influence of marijuana. Some long term effects of marijuana are coughing and chest pains. Sometimes these respiratory problems develop into bronchitis. Among males, prolonged use of marijuana reduces the production of sperm and of the male sex hormone testosterone. Among females, it may cause menstrual irregularity and reduced fertility. There are also many psychological effects associated with marijuana.The psychological reaction consists of alterations in the users feelings and thoughts. These changes are caused by THC, a chemical found in marijuana. In most cases, "It consists of a dreamy, relaxed state in which people seem more aware of their senses" (DuPont 161). For many marijuana users, a feeling of pleasant euphoria and well-being is established. It is very common for the drug to produce time distortion in the user. The user usually feels like hours have passed when, in actuality, only a few minutes have passed. Sometimes, however, marijuana produces a feeling of panic or dread. Highly potent marijuana can lead to "intense emotional reactions, substantial distortions in perception, a panic that one has lost control of oneself, and vivid hallucinations" (Sullivan 343). Marijuana has many medicinal effects as well. Marijuana has an ancient history of medicinal use in many countries. A report by the United States Department of Health, Education, and Welfare states that, "In patients suffering from glaucoma, marijuana serves to reduce intraocular pressure" (25). Marijuana has many positive effects if used by cancer patients after chemotherapy. The THC in marijuana reduces nausea, vomiting and increases appetite. A third area in which marijuana has shown promise in treatment is in the management of asthmatics. "Synthetic THC produces a desirable temporary increase in the size of the air conducting passage" (United States Department of Health, Education, and Welfare 25). Marijuana has many physical, psychological, and medicinal effects which may be short term or long term, positive or negative. Physical effects include an increased heart rate, a reddening of the eyes, coordination impairment, and respiratory problems. Most physical effects which result from the use of marijuana are negative. Psychological effects include relaxation, time distortion, the establishment of a euphoria, panic, and dread. These effects can be positive or negative. The medicinal effects reduce pressure in the eye for glaucoma patients, increase appetite, and reduce nausea and vomiting in cancer patients, and opens the airway for asthmatics. The medicinal effects are usually positive. Bibliography:
ESSENTIALAI-STEM
Page:Bird Haunts and Nature Memories - Thomas Coward (Warne, 1922).pdf/204 150 be noticed. But when the average results are considered the final doom is always the same—all but two of the hopefuls must go to the wall. A pair of birds may lay an average of four eggs per year for three years; ten out of twelve produced must have negative results; the young if hatched and reared must never become parents, or if more than the two survive in many of the same species we shall at once have a noticeable increase. A small steady increase in the families descended from one pair of birds will, in a few years' time, mean a vast army; any mathematician can demonstrate that. And what does happen when this occurs? for it does constantly in certain species. Simply this, that the joy and success of one species spells sorrow and failure for others. The supply of victuals, whether animal or vegetable, of each species is not inimitable, and when your successful species gets to grips with others the weaker kinds suffer famine. How often do we deplore the decrease, say, of the woodpecker, the chough, the swallow. Do we ever think that there may be any connection between this and the increases we welcome of sterling, jackdaw, swift? That these particular species mentioned have any interdependence is mere theory, and the whole skein is so ravelled that we cannot disentangle its intricate meshes; but there is connection between all increases and decreases. By no means is it certain that the improved breech-loader explains the absence of the great bustard from our open plains, or that the egg~collector wiped out Savi's warbler and threatens the Kentish plover and Dartford warbler; men, in their greed, help to destroy the struggling species, and there is no excuse for this rapacity; but these were struggling when man took a hand in their final extinction. The red-legged partridge, a hungry alien, the go-ahead reed warbler, the ringed plover, and even the willow wren, may have
WIKI
A study has found those who played video games while growing up had improved cognitive processing and performed better at memory-based tasks. Despite the narrative that video games are the culprit for all numbers of issues facing young people today, studies have indicated people who grew up playing video games performed better at working memory tasks and showed increased motivation. The paper was published in the scientific journal Frontiers in Human Neuroscience, and revealed that individuals who played video games growing up are in fact better at memory tasks as well as hand-eye coordination. The study, conducted at the Open University of Catalonia in Barcelona, was originally intended to measure correlation between non-invasive brain stimulation and video game training. After finding no correlation, they decided to shift their focus to past gaming experiences on intelligence. The study sample included 27 individuals between the ages of 18 and 40, of all sexes. The group was mixed with those who had played video games earlier in life and those who had not. All participants played the Nintendo classic Super Mario 64, a game that has previously been used in studies to show structural changes in the brain. The study members were required to play for one and a half hours per day for 10 days, and were then tested to see if cognitive function had improved. The results showed that participants who grew up playing video games were much better at working memory tasks than those who had not, even if they hadn’t played since their childhood. Other areas the gamers excelled was puzzle solving and mind work. Marc Palaus, a researcher who conducted the study, said: “People who were avid gamers before adolescence, despite no longer playing, performed better with the working memory tasks, which require mentally holding and manipulating information to get a result…” “People who played regularly as children performed better from the outset in processing 3D objects, although these differences were mitigated after the period of training in video gaming, when both groups showed similar levels.” So if you ever considered putting ‘professional gamer’ down on your resume, now might be the time.
FINEWEB-EDU
Template:Cite Arnold Hague Convoy Database/doc This template (still in development) is for citing information from the Arnold Hague Convoy Database, found online currently at convoyweb.uk.org Usage This code generates this: For an inline citation, enclose the template call inside Which will generate this. * Notes:
WIKI
Page:The Wisconsin idea (IA cu31924032449252).pdf/337 number of votes cast for governor at the last preceding election of whom not more than one-half shall be residents of any one county. 5. The legislature shall provide for furnishing the electors the text of all amendments to the constitution to be voted upon by the people. 6. If the people shall approve and ratify such amendment or amendments by a majority of the electors voting thereon, such amendment or amendments shall become a part of the constitution, from and after the election at which approved; provided, that if more than one amendment be submitted they shall be submitted in such manner that the people may vote for or against such amendments separately. 7. If proposed amendments to the constitution which conflict with each other in any of their essential provisions are submitted at the same election, only the proposed amendment receiving the highest number of votes shall become a part of the constitution. . Dean of the college of letters and science; Superintendent of the geological and natural history survey. (Also serves as member of Fish commission, Forestry commission, Conservation commission.) . Professor of chemical engineering; on engineering staff Railroad and Tax commissions. . Professor of chemistry; Dairy and food commission.
WIKI
Zederhaus Zederhaus is a municipality of the Tamsweg District in the Austrian state of Salzburg. Geography The Zederhaus Valley is located in the northwestern part of the Salzburg Lungau region, on the southern slopes of the Lower Tauern mountain range, reaching up to Mt Weißeck at 2711 m. The crest of the Radstadt Tauern in the north separates it from the Pongau region. From the Rieding high valley, today a protected area, the Zederhaus creek flows southeastwards, reaching the upper Mur River at neighbouring Sankt Michael. The smaller village stream passes several historic watermills. The sparsely settled municipal area, the largest in the Tamsweg District, comprises the cadastral communities of Lamm, Rothenwand, Wald, and Zederhaus proper. The valley today is characterised by the construction of the Tauern Autobahn in the 1970s, a major north-south road connection which is part of the European route E55. The south portal of the Tauern Road Tunnel, one of the longest in Austria, is located near the Zederhaus centre. A junction leads on the motorway in the Salzburg direction. Several attempts have been made to reduce emissions by the construction of extended noise protection walls; currently an overhead noise barrier is built along a 900 m section near the Zederhaus village centre. History Zederhaus shares the history of the rustic Lungau region, once part of the Roman Noricum province. The remote area possibly was not settled until the 14th century. For centuries, the estates belonged to the Prince-Archbishopric of Salzburg until its secularisation in 1803. A local chapel was first mentioned in a 1445 deed, then a filial of St Rupert Church in nearby Weißpriach. Since 1813 Saint John's at Zederhaus is a parish in its own right. The local peasants relied on seasonal mountain pasture farming, while today many inhabitants are commuter employees. A local custom at least since the 17th century is the annual procession with Prangstangen, up to 8 m high wooden poles which are decorated with flowers and carried by local bachelors on St John's Day, June 24 into the church. Politics Seats in the municipal assembly (Gemeinderat) as of 2014 elections: * Austrian People's Party (ÖVP): 8 * Freedom Party of Austria (FPÖ): 4 * Social Democratic Party of Austria (SPÖ): 1 Notable people * Heimo Pfeifenberger (born 1966), football player
WIKI
Turning High-Level Live Sequence Charts into Automata Yves Bontemps, Patrick Heymans Résultats de recherche: Contribution dans un livre/un catalogue/un rapport/dans les actes d'une conférenceArticle dans les actes d'une conférence/un colloque Résumé Message Sequence Charts (MSCs) are a widely used scenario notation. However, we believe that this language lacks message abstraction and the ability to express whether a scenario is an example or a universal rule. Live Sequence Charts (LSCs) improve MSCs by solving these two shortcomings. However, LSCs have no formally defined high-level structuring mechanism. We extend LSCs with composition operators and define their semantics in terms of $\omega$-regular traces. We build Buchi automata from these scenarios. We show that standard algorithms on this (low-level) formalism can be used to check consistency and refinement, and to synthesize a state-based specification from a set of consistent requirements. langue originaleAnglais titreProceedings of the First International Workshop on Scenarios and State Machines (SCESM), (ICSE'02 workshop) rédacteurs en chefTarja Systa, Albert Zundorf Etat de la publicationPublié - 2002 Empreinte digitale Examiner les sujets de recherche de « Turning High-Level Live Sequence Charts into Automata ». Ensemble, ils forment une empreinte digitale unique. Contient cette citation
ESSENTIALAI-STEM
hullock Noun * 1) A small part of a sail lowered in a gale to keep the ship’s head to the sea. Translations * Irish: ullóg
WIKI
Article Text PDF Heat tolerance of vancomycin resistant Enterococcus faecium. 1. S Panagea, 2. P R Chadwick 1. Department of Microbiology, North Manchester General Hospital. Abstract The heat tolerance of 27 Enterococcus faecium isolates in water was studied. Stationary phase cultures including vancomycin resistant and sensitive clinical and food isolates were exposed to heat at 60 degrees, 65 degrees, 71 degrees, and 80 degrees C for one, three, 10, and 30 minutes and the log10 reductions in bacterial counts were determined. Exposure at 71 degrees and 80 degrees C resulted in > 6 log10 reduction in viable counts for all isolates. Seven (24%) isolates survived (< 5 log10 reduction) heat at 65 degrees C for 10 minutes. The E faecium isolates were more resistant to heat than the two E faecalis reference strains. No differences in heat tolerance were observed between vancomycin sensitive and resistant strains or between isolates of human or food origin. Statistics from Altmetric.com Request Permissions If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways.
ESSENTIALAI-STEM
Home » How do I delete my outlook com account? How do I delete my outlook com account? Answer 1. First, sign in to your account. 2. Next, select the three lines in the top left corner of the screen. 3. Under “Your Account,” select “Manage Accounts.” 4. Select “Delete my Outlook.com account. Delete Microsoft Outlook or Hotmail Account 2019 HD Remove or delete an email account from Outlook How do I delete my Outlook account 2022? If you want to delete your Outlook account 2022, you first need to find out how to do so. Microsoft has a step-by-step guide on their website which can be accessed by clicking the link below: The process of deleting an Outlook account is simple and straightforward. Once you have completed the steps, your account will be permanently deleted and you will not be able to access it again. There are some important points to keep in mind before deleting your Outlook account: To delete your Outlook account, first log in to the account and click on the gear icon in the top right corner of the window. How do I delete my Outlook account without deleting my Microsoft account? To delete your Outlook account, follow these steps: Open Outlook. Click the gear icon in the top right corner of the screen. Select Accounts and then click the account you want to delete. Under Account settings, click Delete this account. Confirm your decision by clicking Yes in the dialog box that appears. Why can’t I remove my account from Outlook? One of the main features of Outlook is its ability to keep a user’s information organized and easily accessible. However, there may be times when a user wants to remove their account from Outlook. Reasons for wanting to remove an account could include changing jobs, moving, or simply wanting to purge their inbox of old messages. There are several reasons why removing an account from Outlook may not be possible. First, if the user has added personal information (like email addresses) to their profile, removing the account may result in lost emails and other data. Secondly, accounts that have been inactive for a certain amount of time will automatically be deleted by Microsoft. Finally, some features – like forwarding messages – require an active account in order for them to work properly. How do I delete my Outlook? If you want to remove an Outlook account from your computer, follow these steps: Close all open programs on your computer. Click the Start button and select Control Panel. Double-click Add or Remove Programs. Under Outlook 2010 or later, select Microsoft Outlook, and then click Remove. If you’re removing an Outlook account from a workstation, leave Office active on that workstation so that you can access your email in the future using another email client (such as Gmail). On a desktop PC, sign out of your Outlook account by clicking Sign Out at the top left of the window. Close down the Microsoft Office program if it is still open on your computer (if it isn’t already closed). What is an outlook com account? An outlook.com account is a web-based email account that lets you manage your email, calendar, and contacts with one place. You can also use it to share files and collaborate with colleagues. How do I permanently delete my Microsoft account? Microsoft offers a variety of ways for users to permanently delete their Microsoft account. The following methods are available: -Permanently delete an account from the Microsoft website: Users can visit the Microsoft website and select “My Account” from the top menu. Under “Account Settings,” select “Permanently Delete My Account.” On the next page, users will be asked to confirm their decision. After confirming, the account will be permanently deleted. -Delete an account using a computer: To delete an account using a computer, users must first sign in to their Microsoft online account. Under “Account Name,” select the name of the account they want to delete. Next, click on the three lines in the top right corner of the window and select “Remove Account.” On the next page, users will be asked to confirm their decision. How do I erase an email account? If you want to erase your email account, there are a few different ways to do so. You can delete all of your emails from the mail server, remove the email address from your account on various web-based services, or use a third-party tool to permanently delete all of your data. The most straightforward way to erase an email account is to delete all of your emails from the mail server. This can be done by navigating to the “My Account” page and clicking on “Delete Email Accounts.” Once you have deleted all of your emails, you can remove the email address from various web-based services like Gmail, Yahoo Mail, and Hotmail. Alternatively, you can use a third-party tool like EraseME that will permanently delete all of your data including images, videos, and messages. Why can’t I remove a Microsoft account? Microsoft accounts can be removed for a number of reasons, including if the account is no longer needed or if the user no longer wishes to use the account. In some cases, Microsoft may also choose to remove an account if it believes that the user is violating the company’s terms of service. How can I delete my email account? Are you feeling overwhelmed with all of your email? Maybe you’re just not using it and don’t need it anymore. Perhaps you’ve been considering deleting your email account but are unsure of how to go about it. Here are 8 steps to help delete your email account: There are a few ways to delete an email account. You can go through the settings on your device, or use a third party service. The most popular way is to use the settings on your device. If you’re using a desktop or laptop, open up the settings menu and select “Email.” Under “Account,” select “Manage Accounts.” Next, select the email account that you want to delete and click on the “Delete” button. If you’re using a mobile device, open up the app store and find “Email. How do I delete my email account from my computer? If you want to permanently delete your email account from your computer, there are a few ways to go about it. The most straightforward way is to use the email client’s deletion feature. This will remove all of your email messages and associated files from the computer. If you don’t want to use the deletion feature, you can also simply delete your email account’s folder on the computer. This will remove all of your messages and files from the server, but it won’t remove them from your computer. Finally, if you want to completely erase all traces of your email account on the computer, then you should create a backup of all of your data and delete the original account files. Is Outlook and Outlook COM the same? Outlook and Outlook COM are not the same. Outlook is a desktop application and Outlook COM is a web application. Is Outlook COM A good email service? Outlook.com is a widely used email service. It offers a user-friendly interface and has a large user base. However, Outlook COM is not considered to be a good email service because it lacks features and has low reliability. Is Outlook COM the same as Office 365? Outlook.com is a free email service from Microsoft that is similar to its paid subscription service, Office 365. However, there are some key differences: Outlook.com does not offer the full range of features that are available with Office 365 (such as collaboration tools and branding support), and it lacks certain security features (such as two-factor authentication). However, if all you need is an email address and some basic functionality, Outlook.com can be a useful option. It’s also worth noting that Outlook.com is currently the only fully supported way to access your email messages on a mobile device – Office 365 currently offers limited support for smartphone and tablet apps. What happens when I close my Outlook account? Outlook will save your email, contacts, and calendar information in the cloud, so you can continue working on your account even if you lose access to your computer. You’ll also keep any new messages that come in while you’re offline. How do I remove my Microsoft account from my computer? If you no longer need or want a Microsoft account on your computer, there are several ways to remove it. There are two main ways to remove a Microsoft account: through the Windows 10 Settings app and through online services. The first way is easier, but only works with Windows 10. To remove a Microsoft account through the Windows 10 Settings app: Open the Settings app on your computer. Under “accounts,” click on “Microsoft.” Under “account settings,” select “Sign out.” Click “Sign out now” to finish removing your Microsoft account. The second way to remove a Microsoft account is to use online services like RemoveMyAccount or MyMicrosoft Account removal tool .
ESSENTIALAI-STEM
7th Antiaircraft Artillery Battalion The 7th Antiaircraft Artillery Battalion (7th AAA Bn) was a United States Marine Corps antiaircraft unit that served during World War II. Formed in 1940 as the 7th Defense Battalion, its original mission was to provide air and coastal defense for advanced naval bases. It was one of first five defense battalions deployed in support of the color-coded war plans that called for the defense of Hawaii and other outlying United States possessions in the Pacific Ocean. These five battalions were nicknamed the "Rainbow Five." During the war the battalion defended Tutuila, Upolu, Savai'i and Nanumea and took part in combat operations at Anguar. The 7th was decommissioned before the end of World War II on 2 August 1945. Organization The 7th Defense Battalion was commissioned on 16 December 1940 at Marine Corps Base San Diego, California. From 16 December through 26 February 1941 the battalion focused on organizing, equipping and training for future employment. The battalion was organized differently then the other defense battalions at the time which were optimized for coastal and air defense. The 7th originally lacked the air defense capability and was composed of a headquarters company, an infantry company (Company A), and an artillery company (Company B). American Samoa Prior to the battalion even being formed an advanced party had been sent to Pago Pago on Tutuila to scout out locations. It arrived on 21 December 1940. On 27 February the battalion's main body embarked on the USS William P. Biddle (APA-8) at San Diego and sailed for Tutuila, American Samoa with a stop at Pearl Harbor on the way. The main body of the 7th Defense Battalion arrived at Tutuila on 18 March 1941. This made the battalion the first unit of the Fleet Marine Force to ever operate in the South Pacific. The next few weeks saw the battalion heavily engaged in camp construction and the installation of artillery emplacements. In April 1941, after coming out of measles quarantine, the 7th Defense Battalion moved to Faga'alu and began construction of Camp Samuel Nicholas. In May 1941 authority was granted for the raising of a reserve native Samoan Battalion. The 1st Samoan Battalion was commissioned on 1 July 1941 and Marines from the 7th Defense Battalion were responsible for organizing and training these new recruits. On 7 December 1941 the battalion was informed about the attack on Pearl Harbor via a radio and immediately went to general quarters. The battalion's first exposure to combat occurred at 2:30AM on 11 January 1942 when a Japanese submarine surfaced and began shelling the Naval Station on Tutuila for approximately seven minutes. The 7th Defense Battalion, with the 1st Samoan Brigade attached, remained the sole defensive unit on Tutuila until 21 January 1942 when the island was reinforced by the 2nd Marine Brigade. Upon the brigade's arrival, the 7th Defense Battalion fell under its command. Maintaining the position on Tutuila was critical to ensuring that the lines of communication between Hawaii and Australia remained open. Movement to Upolu, Hawaii and Nanomea On 28 March 1942 the 7th Defense Battalion departed Tutuila onboard the SS President Garfield bound for the island of Upolu in Samoa. The battalion reinforced a small garrison of New Zealanders. Later on the battalion also establish a position on Savai'i. Savai'i was too mountainous for an airfield and the harbor was not deep enough for an anchorage however the detachment was needed for internal island security. On 9 May 1942 the battalion fell under the command of the 3rd Marine Brigade. Beginning on 12 August 1943, the battalion left Apia Harbor in three successive waves headed for Nanumea, the northernmost of the Ellice Islands. The first detachment arrived on 14 August 1943 in order to occupy, organize, and defend the airfield that was being constructed by the 16th Naval Construction Battalion. On 10 November 1943 the battalion downed one Japanese bomber of a force of twelve that were sent to bomb the airfield. On 26 December 1943, E Battery was detached for duty with the 8th Defense Battalion on Apamama in the Gilbert Islands. The battalion remained on Nanumea until February 1944 when they were relieved by the 51st Defense Battalion. The battalion departed Nanumea on 9 March 1944 arriving at Kauai on 21 March 1944. As the war progressed, the Marine Corps removed coastal artillery from the defense battalions in order to form additional heavy artillery units for the Fleet Marine Force. Because of the divestiture of the coastal defense mission, the battalion was re-designated as the 7th Antiaircraft Artillery Battalion on 16 April 1944. Battle of Anguar, garrison duty and decommissioning The assault echelon of the newly reorganized 7th Antiaircraft Artillery Battalion departed Kauia on 7 August 1944. The battalion had been tasked with installing, operating and maintaining and air warning system in support of the United States Army's 81st Infantry Division during the assault on Anguar. Anguar was part of the larger operation to dislodge the Japanese from the Palau Islands. The main body of the advance echelon went ashore on Anguar on 24 September 1944. On 11 November 1944 the 7th AAA Battalion became part of the Army Garrison Force on the island. The 7th AAA Battalion remained on Anguar as the garrison force until it was relieved of its mission on 12 July 1945. The battalion's personnel were transferred to the United States or other units in theater and the battalion was officially decommissioned 2 August 1945 on Guam. Unit awards A unit citation or commendation is an award bestowed upon an organization for the action cited. Members of the unit who participated in said actions are allowed to wear on their uniforms the awarded unit citation. The 7th Antiaircraft Artillery Battalion has been presented with the following awards:
WIKI
Talk:Non-statutory law This article is "original research," as evidenced by the comment of the original author, below. The author has a point of view about non-statutory law, which is fine, but not appropriate for wikipedia. The legitimate topic of the common law (as that term is generally understood) is better treated elsewhere. Editing by others appears to have removed some of the point of view from the article, but as this is gradually removed, the article has less reason for being. Please note that I'm not disparaging anyone's efforts, just the appropriateness of this article in light of the stated goals and standards of Wikipedia. I suggest either deletion or, if there is something worth keeping here, incuding some references. --Sjsilverman 04:09, 21 December 2005 (UTC) The editorial on Common Law v Statutory law is the result of a number of years of intensive study of the law as used in the courts today. I have a number of case citations that need to go with this edited article. If someone would like to work with me to organize better, it would be appreciated. My goal is education. My E-mail is billmay@wvi.com.
WIKI
User:Mohammed Rehanuddin This is Mohammed rehan Uddin from Aurangabad city of Maharashtra, India Mr Mohammed Rehan Uddin is studying MCA and he wants to be a good Engineer of computer
WIKI
Re: [Linux-ia64] gcc bug From: Jim Wilson <wilson_at_cygnus.com> Date: 2001-01-27 15:20:31 There was a comment about non-int bitfields. This isn't allowed by the ISO C standard, but it is a very common extension. Most C compilers support it. Gcc will give a warning about this construct if you use -pedantic. This isn't related to the problem though. The problem with the code is that it uses invalid casts. ISO C says that if you access an object using a type other than what the object was declared with, then the result is undefined. There are a few exceptions, signedness doesn't matter, qualifiers don't matter, aggregate types containing the type are OK, and char is OK. (In the 1989 ANSI C standard, this is in section 3.3 Expressions.) This rule exists so that C compilers can do type-based alias analysis. Gcc tries to do aliasing based on addresses first, but if it gets confused by address arithmetic, then it will try type-based alias analysis. So in this case, it decides that the read of the unsigned int w and the store to struct f w can't alias because the types are different, and then it emits an instruction schedule that causes the code to perform differently than what you expected. This code would probably work on other targets. The lack of addressing modes in IA-64 makes it harder for the alias analysis pass to figure out whether two addresses are the same, and hence we fall back on type-based aliasing more often than we would on say an IA-32 machine. Gcc does support type punning via unions, though the ISO C standard technically does not allow this. If you write the code like this it should work union g { struct f f; unsigned long l; }; ((union g*)&w)->f.lo = ((union g*)&value1)->f.lo; ((union g*)&w)->f.hi = ((union g*)&value2)->f.hi; However, this is a bit cryptic. It would be clearer, and you will get much more efficient code, if you write it something like this. Using & usually forces values onto the stack. If we do it this way, we do everything in registers until the write to r. union g { struct f f; unsigned long l; }; doit (unsigned long value1, unsigned long value2) { union g w, t, u; t.l = value1; w.f.lo = t.f.lo; u.l = value2; w.f.hi = u.f.hi; r = w.l; } int main (int argc, char **argv) { doit(0xbeef, 0xfeed00000000); printf ("%lx\n", r); } Jim Received on Fri Jan 26 20:17:05 2001 This archive was generated by hypermail 2.1.8 : 2005-08-02 09:20:01 EST
ESSENTIALAI-STEM
Munkhkhairkhan National Park Munkhkhairkhan National Park (Мөнххайрхан) is centered on Mönkhkhairkhan Mountain, the second highest mountain in Mongolia. The park straddles Bayan-Ölgii Province and Khovd Province in the Mongol-Altai Mountains of western Mongolia, 15 km from the border with China. Topography The park's area runs for 90 km northwest-to-southeast along the ridge of the mountain, with a width of 30 km that takes in rivers and lakes in the adjoining valleys. Munkh Kharirkhan's highest peak, Noyon, rises to an elevation of 4362 meters in the Mongol-Altai Range of the Altai Mountains. The mountain features glaciers and snowfields, with glacial activity leaving steep slopes of rock and gravel. Climate and ecoregion The climate of the area is Cold semi-arid climate (Köppen climate classification (BSk)). This climate is characteristic of steppe climates intermediary between desert humid climates, and typically have precipitation is above evapotranspiration. At least one month averages below 0 C. Precipitation in the Munkhkhairkhan region averages 76 – 158 mm/year. Flora and fauna The valleys and low foothills area covered with shrubs, sagebrush and other dry steppe vegetation. Higher elevations support mountain meadows with grasses such as Koeleria. The park reports 15 square kilometers of Larch forest along the rivers in the lowest valleys.
WIKI
Why your phone gets so hot during calls, and how to prevent it Hoping to make a long phone call or video chat, but afraid your iPhone will overheat? Kurt "CyberGuy" Knutsson can help you prevent your phone from getting too hot. Why your phone gets so hot during calls, and how to prevent it I recently received an email from Gordie about an issue he was having with his iPhone.  He wrote, "Kurt: got an interesting iPhone question for you…. I have a base model IPhone 11…, & I use Google Meet to vid chat with a buddy of mine (he has an Android phone), and after about 20-25 minutes, my phone gets very hot… But I can talk to another person (who has an iPhone (so I use FaceTime) & I’ll talk with her for the same amount of time (90 minutes), and the phone doesn’t get hot at all. Any ideas???!!! - GORDIE Hey Gordie, there are several answers to your question. Let's start with the fact that you are using the Google Meet app to conduct your video chat. Google Meet may be using more processing power, memory, and network resources compared to FaceTime, leading to higher heat generation. So, it's no surprise that your iPhone gets very hot because you're using an app that uses many of the device's resources, including the processor and graphics processor, which handle the video and audio streams - not to mention memory and data. When these processors are too overworked by running demanding apps like Google Meet for an extended period, your phone is guaranteed to heat up after a while.  Also, if other apps are running in the background, they could be using resources and draining the battery, also causing your phone to get hot. Video calls consume a lot of battery power, causing your phone to get hot. Also, a low phone battery can cause it to heat up as it struggles to keep your device powered. If your battery is older, it may not be able to handle the high usage and could cause your phone to get hot. It is recommended that those of you with an iPhone replace your batteries once they are below 80% battery health. This means that at a full charge, your iPhone is holding less than 80% of the charge that it held when it was new, which could cause various issues in the device's performance. To check if your phone needs a new battery, perform the following steps:  If the network connection where you're using your iPhone is weak or unstable, it can cause an app that you're using to use more resources to maintain a good connection, causing it to get hot. Google Meet may be using higher quality video and audio settings compared to FaceTime, leading to increased heat generation.  Simply using your iPhone for an extended period of time can also cause it to get warm. Close out your apps: If you have a lot of apps open, close out of them fully by swiping upward from the bottom of the screen and pausing in the middle of the screen. Swipe right or left to find the app that you want to close. Then swipe up on the app's preview to close the app. This will help reduce the workload on your phone.  Turn off unnecessary features: Turn off features such as background app refresh and location services when not in use.  Check your connection: Try connecting to a stronger Wi-Fi network if you’re using a cellular connection. You can check your modem or router if you believe you're having a poor connection at home or call your internet provider. Charge your phone: Before using a high-resource app, plug your phone in and don't use it until it has charged fully. Also, avoid charging your phone in direct sunlight, and do not overcharge your iPhone. Limit charging time to prevent overheating.  Update your software: Keep your iPhone updated to the latest version of iOS to ensure optimal performance.  Use a case: Using a case can help to dissipate heat, such as those made of silicone or leather.  Reduce screen brightness: Reducing screen brightness can help to reduce the heat generated by your iPhone as it requires less power to run the screen at lower brightness levels. Also, a darker screen will also reduce the overall load on the phone's processor, which is another source of heat.  Keep it clean: Clean the vents and charging port of your iPhone to ensure proper airflow.  Give it a break: Finally, if your iPhone feels hot, give it a break, and stop using it until it cools down.  Do you have any other suggestions for how to keep your phone from overheating? Let us know.  For more of my tips, subscribe to my free CyberGuy Report Newsletter by clicking the "Free newsletter" link at the top of my website.  Copyright 2023 CyberGuy.com. All rights reserved. CyberGuy.com articles and content may contain affiliate links that earn a commission when purchases are made.
ESSENTIALAI-STEM
Science Copyright © 2022 Jiri Kriz, www.nosco.ch Cryptography: Modular Arithmetic Topics Introduction In modular arithmetic, integer numbers "wrap around" upon reaching a certain value called the modulus. An example is in the 12-hour clock. If the time is 7:00 now, then 8 hours later it will be 3:00 because 7 + 8 = 15, 15 - 12 = 3. Congruence Modular arithmetic is based on the congruence relation. Two numbers a and b are congruent modulo n if their difference a − b is an integer multiple of n. This is written as a ≡ b (mod n). (1) The arithmetic operations like addition and multiplication are carried over to the respective congruences, e.g. if a1 ≡ b1 (mod n). a2 ≡ b2 (mod n). then a1 ⋅ a2 ≡ b1 ⋅ b2 (mod n) k⋅ a1 ≡ k ⋅ b1 (mod n). In general, we cannot cancel a common multiplicative factor from a congruence. For example, it is: 7 ⋅ 2 ≡ 12 ⋅ 2 (mod 10) = 4 but after cancelling 2 we get: 7 ≢ 12 (mod 10). However, if k is coprime with n then it can be cancelled: k ⋅ a ≡ k ⋅ b (mod n) (2a) implies a ≡ b (mod n) (2b) Eq. (2a) says that n divides k ⋅ a - k ⋅ b = k ⋅ (a -b). Since n and k have no common multiplicative factors, n must divide a - b, so eq. (2b) follows. The following useful property will be applied in the public key cryptography. If (3a) a ≡ b (mod n) (3b) a ≡ b (mod m) and n and m are coprime, then a ≡ b (mod m ⋅ n) (4) The proof is easy but tricky. Equations (3) can be written as a - b = k1 ⋅ n = k2 ⋅ m (5) for some integers k1 and k2. Because n and m are coprime we know from the Bézout's idententity that there exist numbers x and y such that 1 = n ⋅ x + m ⋅ y (6) We multiply eq. (6) by a - b and substitute the expressions (5): a - b = (a - b) ⋅ n ⋅ x + (a - b) ⋅ m ⋅ y = k2 ⋅ m ⋅ n ⋅ x + k1 ⋅ n ⋅ m ⋅ y = (k2 ⋅ x + k1 ⋅ y) ⋅ (m ⋅ n) So, a - b is a multiple of n · m and the eq. (4) follows. Integers modulo n When we compute (mod n) it is sufficient to consider only the numbers 0, 1, .. n-1 because all other numbers are reduced to them via the congruence relation. The set of these "residues" Zn is a mathematical structure called a ring. A ring provides the operations of addition and multiplication with the usual properties. It does not provide division. However, in the special case when n = prime p each number a in Z+p = {1, .. p-1} has also an inverse with respect to multiplication that is denoted a-1 a ⋅ a-1 ≡ 1 (mod p) for a ≢ 0 (mod p) (7) because gcd(a, p) = 1. The inverse a-1 can be computed using the Extended Euclidean Algorithm. So, the set Zp provides also division and is a mathematical field, denoted by Fp or GF(p) (GF for Galois Field). Fermat's Little Theorem If p is a prime number and a is a natural number, a ≢ 0 (mod p), then ap-1 ≡ 1 (mod p). (8) Proof: consider the numbers 1⋅a, 2⋅a, 3⋅a, ... (p-1)⋅a (9) all (mod p). These numbers are different because if it were k1 ⋅ a = k2 ⋅ a (mod p) we could cancel a since a and p are coprime and get k1 = k2 So, these p-1 numbers correspond to the numbers 1, 2, 3, ... (p-1) (10) in some order. Consequently the product of the numbers (9) equals the product of the numbers (10): ap-1 ⋅ (p-1)! ≡ 1 ⋅ (p-1)! (mod p) Now we may cancel (p-1)! in GF(p) and get equation (8). A simple corollary from equation (8) is: ap ≡ a (mod p) for every a (11) Euler's Φ Function Euler's generalization of Fermat's Little Theorem is that for any modulus n aΦ(n) ≡ 1 (mod n) (12) provided that a and n are relatively prime. Here, Φ(n) is the count of numbers 0, 1, .. n-1 that are relatively prime to n. The proof is analogous to the proof of the Fermat's theorem. Notice that the Fermat's theorem is a special case of the Euler's theorem, because Φ(p) = p - 1 for a prime p. The Euler's Φ function satisfies the following relation for coprime m and n (without proof): Φ(n ⋅ m) = Φ(n) ⋅ Φ(m) (13) Links:
ESSENTIALAI-STEM
Howard Dean running for DNC chief | TheHill Howard Dean announced Thursday that he will run to be chairman of the Democratic National Committee for a second time. “The dems need organization and focus on the young. Need a fifty State strategy and tech rehab. I am in for chairman again,” Dean tweeted Thursday afternoon. Dean, a former Vermont governor, served as DNC chair from 2005 to 2009. In an interview with Bloomberg Politics, Dean said the party needs to be "rebuilt from the ground up."  "I don't believe in going back, but the party's in big trouble, and I have the best record of any DNC holder I think in history."  During the 2006 and 2008 elections cycles, Democrats gained 52 House seats, 14 Senate seats, 7 governorships and the White House in 2008. During his DNC tenure, Dean focused on a 50-state strategy and to build up the party even in more Republican strongholds. After a few shakeups at the DNC and major losses for Democrats on Election Day, the party is eyeing new leadership. On Thursday, Sanders endorsed Rep. Keith Ellison (D-Minn.) to be the next DNC chair. Ellison was an early endorser of Sanders in the Democratic primary. Dean said while he loves Ellison, he thinks it would be difficult for him to be party leader and a senator at the same time.  Former DNC chairwoman Debbie Wasserman Schultz resigned her post over the summer after leaked emails revealed DNC officials appearing to tilt the scales for Clinton in the presidential primary and undercut Sanders’s campaign. Donna Brazile took over as interim chair, but has also come under fire after leaked emails showed she shared debate questions with the Clinton campaign. Jessie Hellmann contributed View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
muhqa muhqa - 6 months ago 37 SQL Question Ordering dates for 4 weeks I am writing a SQL query that pulls some information for the last 4 weeks. I am seeing two issues with my results (see below). First problem is that when I look back four weeks, the range should be August 10 - September 6. When I order by 'Day of the Month', the dates in September get moved to the top of the results when they should actually be at the end. So my results should start from 10 (august) and end at 6 (September). Second problem is I'm missing a few random dates (3, 4, 13, 27). Day of the Month Number of X 1 125 2 77 5 5 6 23 10 145 11 177 12 116 14 2 15 199 16 154 17 134 18 140 19 154 21 8 22 166 23 145 24 151 25 107 26 79 28 3 29 151 30 163 31 147 Here a general version of my query: DECLARE @startDate datetime, @endDate datetime; SET @startDate = dateadd(day, -28, GETDATE()); SET @endDate = dateadd(day, -1, GETDATE()); Select DATEPArt(dd, Time) AS 'Day of the Month', count(*) AS ' Number of X' from SomeTable ST where Time >= @startDate AND Time < @endDate group by DATEPArt(dd, Time) order by 'Day of the Month' Answer For the first problem you can order by date to get the correct date order. I use convert to get a time-free date so that the entries group correctly. DECLARE @StartDate datetime, @EndDate datetime; SET @StartDate = DATEADD(day, -28, GETDATE()); SET @EndDate = DATEADD(day, -1, GETDATE()); SELECT DATEPART(dd, Convert(date, Time)) AS 'Day of the Month', COUNT(*) AS ' Number of X' FROM SomeTable ST WHERE Time >= @StartDate AND Time < @EndDate GROUP BY Convert(date, Time) ORDER BY Convert(date, Time) As for the missing days, this is more complicated as the data needs to be there for the group-by to work. One option is to create a temporary table with all the dates in, then join in the data. This will still leave a row where the join does not find any data, and can get a "zero" count. DECLARE @StartDate datetime, @EndDate datetime; SET @StartDate = DATEADD(day, -28, GETDATE()); SET @EndDate = DATEADD(day, -1, GETDATE()); --Create temporary table with all days between the two dates ;WITH d(d) AS ( SELECT DATEADD(DAY, n, DATEADD(DAY, DATEDIFF(DAY, 0, @StartDate), 0)) FROM ( SELECT TOP (DATEDIFF(DAY, @StartDate, @EndDate) + 1) n = ROW_NUMBER() OVER (ORDER BY [object_id]) - 1 FROM sys.all_objects ORDER BY [object_id] ) AS n ) --Join in our query to the table temporary table SELECT DATEPART(dd, d.d) AS 'Day of the Month', COUNT(Time) AS ' Number of X' FROM d LEFT OUTER JOIN SomeTable ST ON DATEPART(dd, d.d) = DATEPART(dd, Time) AND Time >= @StartDate AND Time < @EndDate GROUP BY d.d ORDER BY d.d
ESSENTIALAI-STEM
Talk:bootstrap Bootstrap Please complete with the meaning of bootstrap in "bootstrap aggregating" expression seen in the "bagging" (a short for the expression) method for sample training enhance, mainly used in decision trees constructions? Uh, I think something is missing... The very first Google result for the word "bootstrap" is Wikipedia's article on Bootstrapping (Statistics). The statistics-related definition seems to be nowhere to be found here. The reason I am not fixing this is I don't know exactly what the definition should be. Somebody who knows should probably add this one... (I'm also pretty sure this is related to "bootstrap aggregating" in the above comment). --<IP_ADDRESS> 01:43, 12 March 2008 (UTC)
WIKI
Ghotour Bridge Ghotour Bridge is a railway bridge in Khoy County, West Azerbaijan Province, Iran, over the river Ghotour. It is an arch bridge, and was completed in 1970. It has a length of 442.9 m (1453 ft.) with the largest span being 223.1 m (732 ft.).
WIKI
Electric Boogie "Electric Boogie" (also known as the "Electric Slide") is a dance song written and originally recorded in 1976 with Bunny Wailer. History It is strongly associated with the "Electric Slide" line dance and has since become a celebratory staple. The song was very popular in North America at weddings, bar and bat mitzvahs, and other special occasions in the 1990s. Marcia Griffiths recording The most successful recording was performed by Marcia Griffiths. Griffiths' recording of "Electric Boogie" was originally released in 1983; while this version did not catch on internationally, a remixed version featured on her album Carousel reached number 51 on the US Billboard Hot 100 in 1990. This version was also a minor hit on the Hot Black Singles chart, peaking at number 78.
WIKI
User:Andzig de rular Andzig De Rular Andziswa Vilakati, better known by his stage name Andzig De Rular, is a African rapper. He is best known for his debut hit single, "Listen to Andzig De Rular- Never Gone For Long {Mixed by C.I.V. Entertainment}.mp3 by Andzig de rular on #SoundCloud.last track in may Never Gone For Long Best track so far is Sibonga Malungelo available on SoundCloud with the best ever Collaboration which made him world favorites with his younger brother (Young dangerous)also available on SoundCloud Basala Babheka - feat Young dangerous Listen to Basala Babheka (feat Young Dangerous) (Mixed By @njabulo_rider) by Andzig de rular on #SoundCloud https://soundcloud.com/andzig-de-rular/basala-babheka-feat-young?ref=clipboard&p=a&c=0&utm_source=clipboard&utm_medium=text&utm_campaign=social_sharing wasnever signed on a record label as never signed,a gun man hustler,[2] His debut album changed from umswazi omnyama Umswazi Omnyama included his breakthrough hit "Umsindvo" and the follow-up hit single "Sibonga Malungelo". Andzig De Rular released his 5th track Never Gone For Long in 15 may 2021, the title referring to his upsence as he was at boarding school. His 6th track was released in 2021 and marked his final release with following his departure from the his home town in. Early life Andziswa Vilakati was Born and lived in Mpolonjeni in his early age,with his Dad and mom before they separated,He then lived with his mom through out his childhood,and visited his Dad frequently,And has a semi twin sibling,Winile ,she supported him through out his music, Early career Andzig De Rular kept working on his music at 10 years old,Teached by his only known as Mtre In 2021, De Rular collaborated with Young dangerous,his brother on a song titled "Basala Babheka". They appeared on SoundCloud .Andzig De Rular was part of the rap group but then decided to go alone. He updates his fans as he soon be releasing a tracklist named (The Come Back)with 7 tracks
WIKI
informatica Etymology A contraction of, possibly via the cognate 🇨🇬, also cognate with 🇨🇬, 🇨🇬, 🇨🇬 etc. Noun * 1) The discipline computer science, information science, informatics, study of computers and computing Etymology 1 Cognate with Dutch (see above), 🇨🇬, 🇨🇬, 🇨🇬 etc. Noun * 1) the discipline computer science, information science, informatics Etymology 2 Cognate with the above, 🇨🇬 etc.
WIKI
Plant Growth Promoting Rhizobacteria (PGPR) The term “plant growth-promoting rhizobacteria” [PGPR] as introduced by Kloepper and Schroth (1978) is used to define bacteria that are found in the rhizosphere and help in plant growth, nutrition and disease control and thereby crop productivity. Bacteria are the most abundant species present in the rhizosphere followed by actinomycetes, fungi, algae, and protozoa that colonize rhizosphere. PGPR can live in a symbiotic association, or as free-living microbes. Mechanisms of action of PGPR : PGPR promote plant growth through direct and indirect mechanisms A) Direct mechanisms a) Production of phytohormones Phytohormones are the plant growth hormones or phytostimulants that influence plant growth. They include auxin [indole-3-acetic acid [IAA], gibberellic acid [GA], cytokinins, and ethylene. A variety of PGPR species possess the ability to produce phytohormones that helps in growth promotion of crop plants. b) Nitrogen fixation Nitrogen is one of the major and important nutrients required by all living organisms for a variety of cellular, synthesis and metabolic functions. Although it is present abundantly (78%) in the atmosphere, its direct availability to plants and animals is restricted. Nitrogen-fixing PGPR plays a significant role in providing nitrogen in the soluble forms to the plants and from the plant the soluble nitrogen reaches to human etc. Several bacteria living freely in the soil or in symbiotic association with plants convert (fix) elemental nitrogen into a soluble form that can be easily taken up by plants. Symbiotic Nitrogen Fixers – Rhizobium and Frankia sp. Azorhizobium, Bradyrhizobium, and Cvanorhizobium. The efficient strain of Rhizobium can fix 40-200 kg/ha N in the soil. Free Living Nitrogen Fixers -Azotobacter sp., Azospirillum sp., BGA, Acetobacter sp., and Azolla sp. are known as best free-living nitrogen-fixing PGPR. They can fix 40-100 kg/ha N in the soil. c) Sulfur Solubilization Although sulfur is present in large quantities (95%) in soil, it is not easily available to crop plants as it is present in organically bound nature in the form of sulfate esters or sulfonates, which are unavailable to the plant and need conversion into inorganic forms via microbial desulfurization. Sulfur-oxidizing PGPR like Thiobacillus thioxidans and T. novelis, oxidize insoluble sulfur into a soluble form through multienzyme complex responsible for cleaving the S group from the aromatic ring. S solubilizing PGPR plays a significant role in sulfur nutrition of crop plants. d) Potash Solubilization Potassium (K) is an essential macronutrient for plant growth; it plays important roles in several metabolic processes such as protein synthesis, photosynthesis, and enzyme activation, etc. Potassium-solubilizing microorganisms (KSMs) present in soil are capable to solubilize insoluble ‘unavailable forms of the K into soluble/available form. The main mechanism of K’ solubilization includes acidolysis, chelation, exchange reactions, and the production of organic acid. KSM can increase crop yield by 20-25%. e) Phosphate(P) solubilization P is the second important key element after nitrogen as a mineral nutrient in terms of quantitative plant requirement. It is abundantly available in soil in insoluble forms thus not available for plants. Phosphate-solubilizing microorganisms (PSM) such as Bacteria, molds, yeasts, actinomycetes, Cyanobacteria, etc sp solubilize insoluble P into soluble P that is easily absorbed by plants. f) Iron Nutrition Iron is an essential element for the survival of almost all cell types, it is a fourth most abundant element present in the soil but it exists in an insoluble and therefore unavailable form. In order to sequester and solubilize the iron soil, PGPR produces a variety of iron-chelating molecules referred to as siderophores. g) Zinc solubilization Zinc is one of the important micronutrients required for growth and reproduction of plants. Zn deficiency in plants is due to its low solubility in soils. Several PGPR including Pseudomonas sp. Bacillus sp., Burkholderia sp., Klebsiella sp., Enterobacter sp. are known as Zn solubilizers. B) Indirect Mechanisms a) Antibiotics Production Antibiotics production is one of the most studied biocontrol strategies displayed by PGPR. Many antibiotics such as amphisin, 2,4-diacetylphloroglucinol, oomycin-A, phenazine, pyoluteorin, pyrrolnitrin, tensin, tropolone, the cyclic polypeptides (oligomycin, kanosamine, zwittermicin A, and xanthobaccin) are produced by PGPR strains namely Pseudomonas strains, Bacillus, Streptomvces and Stenotrophomonas sp. b) Nutrients and Niche Competition In order to establish as a dominant species in the soil, PGPR must be able to compete favorably for the available nutrient and space. This is a vital strategy needed for limiting disease incidence and severity. Rapid and abundant colonization of rhizosphere makes the rhizosphere unavailable for phytopathogens. c) Induced Systemic Resistance (ISR) and Systemic Acquired Resistance (SAR) PGPR trigger inducement of a defense system in plants that is capable of fighting phytopathogens. SAR is a defense mechanism activated in the plant following the primary infection, while ISR involves an increase in physical and mechanical strength of the cell wall and modulation of physical and biochemical reactions of the cell wall to environmental stress. ISR by PGPR is mediated through the production of salicylic acid. siderophores. lipopolysaccharide, flagella, N-acyl homoserine lactone (AHL) molecules. d) Production of hydrolytic enzymes The production of lytic enzymes such as chitinases, cellulases, lipases, 8-1-3 glucanases, and proteases by rhizobacteria has been suggested to be a vital form of biocontrol. These hydrolytic enzymes degrade a wide range of compounds of phytopathogens. e) Hydrogen cyanide (HCN) Hydrogen cyanide is principally produced by Pseudomonas sp. Its cyanide ion of HCN inhibits most metallo enzymes, especially copper-containing cytochrome c oxidases f) Use of Hypovirulent Strains Hypovirulence is a reduced virulence found in few strains of phytopathogens. Application of such hypovirulent strains of phytopathogens has helped in reducing the effect of virulent phytopathogenic strains. Rhizoctonia solani, Gaeumannonnveces hramini var. Tritici and Ophiostoma ulmi has been used as hypovirulent strains to reduce the severity of plant diseases caused by virulent strains (Sayyed et al. 2013). g) Detoxification or Degradation of Virulence Factors. Detoxification of virulence factors of pathogens is another important mechanism of biocontrol. In this mechanism, biocontrol strain produces a protein that reversibly binds the toxin leading to irreversible detoxification. Biocontrol strain of Pseudomonas sp is known to detoxify albicidin toxin produced by Yanthomonas albilineans h) Mycoparasitism PGPR with biocontrol potential can be parasites or predators of the pathogens. Mycoparasites, such as Coniothyvrium minitans and Sporidesmium sclerotivorum inhibit the growth of Sclerotinia sp. and other sclerotia forming fungi. The mycoparasitic fungus produces cell wall degrading enzymes such as beta 1,3-glucanase, chitinase, acid phosphatase, acid proteases, and alginate lyase, etc.
ESSENTIALAI-STEM
nasulgc.org - bad rendering of text html RESOLVED INCOMPLETE Status RESOLVED INCOMPLETE 16 years ago 4 years ago People (Reporter: allltaken, Unassigned) Tracking Details (URL) (Reporter) Description 16 years ago User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.5a) Gecko/20030718 Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.5a) Gecko/20030718 The top of the page seems ok, but further down the page, large amounts of text overlap and make the page unreadable. I viewed the page with MSIE with no problems. Mozilla 1.4 has the problem, and the 20030718 1.5a version does also. Reproducible: Always Steps to Reproduce: 1. enter http://www.nasulgc.org/ in the url box 2. observe the satisfactory rendering at the top of the page 3. scroll down and note the text overwriting text Actual Results: Text in lower part of page was rendered unreadably Expected Results: Text should have been rendered readably I have no idea if the webpage coding of http://www.nasulgc.org/ is standard or coded specifically for MSIE. This could be an evangelism issue. I also don't know if this problem occurred in earlier versions (1.3, 1.2 etc) or if it's a problem introduced in version 1.4. There is CSS 'height' specified all over the place (in pixels) that makes the content overflow and overlap with following content. For example: <div class="latestnews" style="width: 229; height: 244"> IE treats 'height' as 'min-height' and that is a bug in IE. --> Tech Evangelism Assignee: general → english-us Status: UNCONFIRMED → NEW Component: Browser-General → English US Ever confirmed: true OS: Windows 98 → All Product: Browser → Tech Evangelism QA Contact: general → english-us Version: Trunk → unspecified (Reporter) Comment 2 15 years ago Here's another problem webpage at MSNBC: http://www.msnbc.msn.com/id/4008194/ It appears normal in MSIE 5.5. Is MSNBC deliberately coding to exploit bugs in MSIE to prevent other browsers from viewing MSNBC pages ok? Or using transmitted browser info to select whether it displays ok or not? If there's something deliberate going on, Microsoft via its MSNBC entity may be violating something in its antitrust agreement of nearly 2 years ago. Can someone set up a browser to report that it's MSIE 5.5 for example, and see if that makes a difference in the appearance of the page? (Reporter) Comment 3 15 years ago Here's a page with an element out of place, the separator line between the list of columnists and the columns banner. I don't know if this is a bug or nonstandard html, but perhaps someone could look into it. http://www.nytimes.com/top/opinion/editorialsandoped/oped/columnists/ Comment 4 14 years ago here's another page with the rendering problem http://www.cnet.com/4520-10602_1-5545074-1.html?tag=nbt. Comment 5 14 years ago Conforming summary to TFM item 10 at http://www.mozilla.org/projects/tech-evangelism/site/procedures.html#file-new Summary: bad rendering of text html → nasulgc.org - bad rendering of text html INCOMPLETE due to lack of activity since the end of 2009. If someone is willing to investigate the issues raised in this bug to determine whether they still exist, *and* work with the site in question to fix any existing issues, please feel free to re-open and assign to yourself. Sorry for the bugspam; filter on "NO MORE PRE-2010 TE BUGS" to remove. Status: NEW → RESOLVED Last Resolved: 8 years ago Resolution: --- → INCOMPLETE Product: Tech Evangelism → Tech Evangelism Graveyard You need to log in before you can comment on or make changes to this bug.
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Planned Parenthood of Illinois The result was delete. Courcelles 05:28, 6 January 2011 (UTC) Planned Parenthood of Illinois * – ( View AfD View log ) While Planned Parenthood is no doubt notable and important, I'm not sure every state chapter is notable enough for a separate article. D O N D E groovily Talk to me 05:55, 30 December 2010 (UTC) * Note: This debate has been included in the list of Illinois-related deletion discussions. Closeapple (talk) 08:57, 30 December 2010 (UTC) * Note: This debate has been included in the list of Medicine-related deletion discussions. Closeapple (talk) 08:57, 30 December 2010 (UTC) * Note: This debate has been included in the list of Sexuality and gender-related deletion discussions. Closeapple (talk) 08:57, 30 December 2010 (UTC) * Redirect to Planned Parenthood: I brought this up as WP:CSD (organization not asserting notability). No reason to believe that this chapter does anything that stands out from its parent organization or otherwise meets Notability (organizations and companies). (Same user created Planned Parenthood Illinois Action, up for deletion as Articles for deletion/Planned Parenthood Illinois Action, for what it's worth.) --Closeapple (talk) 08:57, 30 December 2010 (UTC) * Delete as per WP:CLUB. Redirect would also be OK but seems unnecessary. --MelanieN (talk) 15:31, 30 December 2010 (UTC) * Delete, this state chapter is not independently notable. Roscelese (talk &sdot; contribs) 21:35, 30 December 2010 (UTC) * Note: This debate has been included in the list of Organizations-related deletion discussions. -- Jclemens-public (talk) 00:37, 31 December 2010 (UTC) * Delete according to our established practice for stater branches of societies without major individual separate notability . I see no reason to redirect: essentially ever major organization in the US has the expected 50 branches. People will know to look for the name of the main organization, and the only purpose of the redirects would be promotional. DGG ( talk ) 05:35, 31 December 2010 (UTC) * Delete - per DGG's reasoning. Don&#39;t call me shorely (talk) 00:55, 6 January 2011 (UTC)
WIKI
The USE Method is a model for troubleshooting a system that is in distress when you don't know exactly what the nature of the problem is. For example, if users within a specific part of your network are complaining of slowness, disconnects and poor application performance, you can probably isolate your troubleshooting to 2-3 switches or routers. However, since the problem description is so vague (we all love the “it's slow!” report, right? ?), it's hard to know where to start with detailed troubleshooting on those specific switches/routers. That's where the USE Method comes in. I learned about the USE method while reading Brendan Gregg's blog. Brendan is a very skilled performance engineer specializing in UNIX systems. To quote Brendan: The USE Method can be summarized as: For every resource, check utilization, saturation, and errors. • Resource: all physical [network element] functional components (eg, CPU, memory) • Utilization: the average time that the resource was busy servicing work • Saturation: the degree to which the resource has extra work which it can't service, often queued • Errors: the count of error events In this post, I adapt the USE Method to Cisco network devices and show how their physical resources (CPUs, different areas and types of memory, interfaces, and more) can be methodically examined in the three dimensions of utilization, saturation, and errors. Be sure to read Brendan's blog post to understand the logic behind the USE Method and to gain insight into how to apply it. Table of Contents Routers (ISRg2, ISR 4000, ASR 1000, CSR 1000V) running IOS or IOS-XE The different colors denote the grouping of physical components Component Type Metric Control Plane CPU Utilization show proc cpu: "CPU utilization for five seconds: 5%/1%; one minute: 4%; five minutes: 2%" General CPU business 5%/1% — 5% total/1% time spent in interrupt context (CEF switching) show proc cpu history: histograms; where was the CPU at X seconds/minutes ago? What was peak vs average? Control Plane CPU Saturation show proc cpu extended: Run queue lengths, response times show logg | inc CPUHOG: Is a process sitting on the CPU too long, not willingly giving it up? Control Plane CPU Errors ? Control Plane Memory Utilization show proc memory: used/free "Processor" memory is for IOS, processes, etc "I/O" memory is for storing packets while they're being switched through the box show proc memory sorted: process hogging memory? process memory leak? Control Plane Memory Saturation show buffers, show buffers failures: allocation failures, "no memory" failures show logg: malloc errors Control Plane Memory Errors show logg Execute Generic Online Diagnostics (GOLD) tests: • diagnostic start ... (run memory test) • show diagnostic events • show diagnostic result ... Data Plane (ISR 4k, ASR 1k, CSR1000V) Utilization show platform hardware qfp active datapath utilization The aggregate in/out data plane utilization Data Plane (ISR 4k, ASR 1k, CSR1000V) Errors show platform hardware qfp active statistics drop detail Packet drop reasons and counters UADP-Based Catalyst Switches (3650, 3850, 4500E Sup8E) running IOS-XE The different colors denote the grouping of physical component Component Type Metric Control Plane CPU (IOS-XE/Linux processes) Utilization show processes cpu detailed show processes cpu detailed | exclude 0.00 (processes with non-zero CPU utilization) Control Plane CPU (iosd threads) Utilization show processes cpu detailed process iosd sorted Control Plane CPU Saturation show platform punt statistics port-asic 0 cpuq -1 direction rx • Number of port-asics depends on platform type and model • "cpuq -1" will list all queues; if you know the specific queue you want to view, substitute its value • Look at "dropped" counters • Look for high packet rate CPU Punt Path Architecture on UADP-Based Switches /CiscoLive BRKCRS-3146 show platform punt client • Look for high number of packets in a queue over multiple runs of the command • Look for incrementing counters in the "failures" columns show pds tag all | include Active|Tags| (reveals some stats and the name of the queue) Decoding CPU Queues on UADP-Based Switches show platform punt tx show logg | inc CPUHOG: Is a process sitting on the CPU too long, not willingly giving it up? Control Plane CPU Errors ? Control Plane Memory (IOS-XE/Linux processes) Utilization show processes memory sorted (sorts by RSS, descending) Control Plane Memory (iosd process memory) Utilization show processes memory detailed process iosd sorted Control Plane Memory Saturation show buffers: allocation failures, "no memory" failures show logg: malloc errors Control Plane Memory Errors show logg Execute Generic Online Diagnostics (GOLD) tests: • diagnostic start ... (run memory test) • show diagnostic events • show diagnostic result ... Data Plane TCAM Utilization show platform tcam utilization asic all Data Plane TCAM Saturation show logg (look for messages indicating TCAM is full: MAC addresses can't be learned; ACEs cannot be installed in hardware) Data Plane TCAM Errors ? Catalyst 6500/6800 Series The different colors denote the grouping of physical components Component Type Metric Control Plane CPU Utilization show proc cpu: CPU utilization for five seconds: 5%/1%; one minute: 4%; five minutes: 2% General CPU business 5%/1% — 5% total/1% time spent in interrupt context (CEF switching) show proc cpu history: histograms; where was the CPU at X seconds/minutes ago? What was peak vs average? Data Plane (Switch Fabric) Utilization show fabric utilization all Data Plane (Switch Fabric) Errors show fabric channel-counters Data Plane (TCAM) Utilization show platform hardware capacity pfc show tcam counts Data Plane (TCAM) Saturation show platform hardware capacity pfc"show tcam counts
ESSENTIALAI-STEM
MOVE CONVERSATION (Transact-SQL) TOC Collapse the table of content Expand the table of content MOVE CONVERSATION (Transact-SQL) Moves a conversation to a different conversation group. MOVE CONVERSATION conversation_handle TO conversation_group_id [ ; ] conversation_handle Is a variable or constant containing the conversation handle of the conversation to be moved. The conversation_handle must be of type uniqueidentifier. TO conversation_group_id Is a variable or constant containing the identifier of the conversation group where the conversation is to be moved. The conversation_group_id must be of type uniqueidentifier. The MOVE CONVERSATION statement moves the conversation specified by conversation_handle to the conversation group identified by conversation_group_id. Dialogs can be only be redirected between conversation groups that are associated with the same queue. ms174987.note(en-US,SQL.90).gifImportant: If the MOVE CONVERSATION statement is not the first statement in a batch or stored procedure, the preceding statement must be terminated with a semicolon (;), the Transact-SQL statement terminator. The MOVE CONVERSATION statement locks the conversation group associated with conversation_handle and the conversation group specified by conversation_group_id until the transaction containing the statement commits or rolls back. MOVE CONVERSATION is not valid in a user-defined function. To move a conversation, the current user must be the owner of the conversation and the conversation group, or be a member of the sysadmin fixed server role, or be a member of the db_owner fixed database role. A. Moving a conversation This example moves a conversation to a different conversation group. DECLARE @conversation_handle UNIQUEIDENTIFIER, @conversation_group_id UNIQUEIDENTIFIER ; SET @conversation_handle = <retrieve conversation handle from database> ; SET @conversation_group_id = <retrieve conversation group ID from database> ; MOVE CONVERSATION @conversation_handle TO @conversation_group_id ; Community Additions ADD Show: © 2015 Microsoft
ESSENTIALAI-STEM
Talk:2014 Perth Hills bushfire removed main space sections time line and aftermath sections are not touched for over 2 years - some material is here for anyone interested: and so on - there are other key words to look for more information for the removed sections... * Parkerville bushfire 2014 trial * 2014 Parkerville bushfire * Parkerville bushfire class action * Perth Hills bushfire - well worth checking JarrahTree 14:20, 5 March 2019 (UTC) JarrahTree. I suspect a key reason no one has worked on the article, is that it would have been very hard to find. I seems to have been an orphan until late last year and even then still essentially an orphan until I linked it in to a couple more articles yesterday, which I presume is how you came be here above? If so it just goes to show how important it is to get articles and links in front of other potential editors? Regards. Aoziwe (talk) 22:35, 5 March 2019 (UTC) * slippage of term used - Perth Hills to Parkerville * ramifications leading from report - the inquiry was important re insurance and fire hazard reduction * victims - property more than life - emphasised * class action all the elements of a blockbuster... JarrahTree 23:28, 5 March 2019 (UTC)
WIKI
One of the two genomic copies of the glycine decarboxylase cDNA has been deleted at a 5′ region in a patient with nonketotic hyperglycinemia Toshihiro Sakakibara, Hirohisa Koyata, Yoshihisa Ishiguro, Shigeo Kure, Akihiro Kume, Keiya Tada, Koichi Hiraga 研究成果: Article査読 7 被引用数 (Scopus) 抄録 One of eight patients with nonketotic hyperglycinemia resulted by the lesion in glycine decarboxylase showed the deletion of 0.6-kb SacI and 1.5-kb PstI fragments identified by the cDNA for this protein. A genomic clone, λHGDG10, encodes a 5′ region of this cDNA in an organized structure and can produce these two fragments. The other clone, λHGDG8, carries a processed gene. Southern analysis using a limited segment of this cDNA demonstrated that the 1.7-kb and 1.5-kb PstI fragments predicted from its recognition sites in both genomic clones occur actually in the human genome, indicating that at least two copies of glycine decarboxylase cDNA exist in the haploid genome, and the patient has the glycine decarboxylase gene deleted at a 5′ region. 本文言語English ページ(範囲)801-806 ページ数6 ジャーナルBiochemical and biophysical research communications 173 3 DOI 出版ステータスPublished - 1990 12月 31 ASJC Scopus subject areas • 生物理学 • 生化学 • 分子生物学 • 細胞生物学 フィンガープリント 「One of the two genomic copies of the glycine decarboxylase cDNA has been deleted at a 5′ region in a patient with nonketotic hyperglycinemia」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。 引用スタイル
ESSENTIALAI-STEM
Page:1977 Books and Pamphlets July-Dec.djvu/1895 R682354 - R682460 R682353 (con.) B5-16400. Edgar Rice Burroughs, Inc. (PWH); 30Dec77; R682353. R682354. Rising danger. By Edgar Rice Burroughs. (Tarzan, no. 3557) (In United feature comics, Dec. 29, 1950) © 29Dec50; B5-16401. Edgar Rice Burroughs, Inc. (PWH); 30Dec77; R682354. R682355. Off guard. By Edgar Rice Burroughs. (Tarzan, no. 3558) (In United feature comics, Dec. 29, 1950) © 29Dec50; B5-16402. Edgar Rice Burroughs, Inc. (PWH); 30Dec77; R682355. R682356. Taxonomic keys to the common animals of the north central states, exclusive of the parasitic worms, insects and birds. By Samuel Eddy & A. C. Hodson. NM: additions & revisions. © 30Jan50; A40617. Mrs. Sam Eddy (W) & A. C. Hodson (A); 22Dec77; R682356. R682385. The Glass house. By Alice Lent Covert. Appeared in a shortened version in Redbook magazine, 1949. © 20Jul50; A45859. Alice Lent Covert (A); 5Dec77; R682385. R682386. Oregon trunk. By Dan J. Stevens, pseud. of Wayne D. Overholser. © 20Jul50; A45860. Wayne D. Overholser, copyright under pseud. Dan J. Stevens (A); 5Dec77; R682386. R682387. The Good shepherdess. By Joan Sargent, pseud. of Sara Jenkins. © 20Jul50; A46669. Sara Jenkins, copyright under pseud. Joan Sargent (A); 5Dec77; R682387. R682388. Love can wait. By Watkins Eppes Wright. © 28Sep50; A49537. Watkins E. Wright (A); 5Dec77; R682388. R682389. Texas fury. By John Callahan, pseud. of Joseph Chadwick. © 28Sep50; A49538. Joseph Chadwick, copyright under pseud. John Callahan (A); 5Dec77; R682389. R682390. Gilded challenge. By Frances Sarah Moore. Appeared in a condensed version in Redbook magazine, 1948. © 28Sep50; A49539. Frances Sarah Moore (A); 5Dec77; R682390. R682391. Honeymoon in Honolulu. By Ethel Hamill, pseud. of Jean Francis Webb. Portions prev. pub. in 1949. NM: additions. © 20Oct50; A50619. Jean Francis Webb, copyright under pseud. Ethel Hamill (A); 5Dec77; R682391. R682392. Follow your heart. By Natalie Shipman. Prev. pub. as I love you but in a condensed form in Redbook magazine, Nov. 1949. © 20Oct50; A50620. Natalie Shipman (A); 5Dec77; R682392. R682393. Flight to happiness. By Jennifer Ames, pseud. of Maysie Greig. © 20Nov50; A50951. Maysie Greig, copyright under pseud. of Jennifer Ames (A); 5Dec77; R682393. R682394. Goddess in the home. By Phyllis Arthur, pseud. of Natalie Shipman. Prev. pub. as After she marries in a shortened version in Redbook magazine, 1949. © 20Nov50; A50952. Matalie Shipman, copyright under pseud. Phyllis Arthur (A); 5Dec77; R682394. R682396. Western land and water use. By Mont Harris Saunderson. © 12May50; A43832. Mont H. Saunderson (A); 29Nov77; R682396. R682408. Psychoanalysis and anthropology. By Geza Rohein. © 16Oct50; A48896. Werner Muensterberger (E); 15Dec77; R682408. R682430. Mister Pinkerton returns. By David Frome, pseud. of Zenith Brown. (Homicide house) NM: additions. © 23Feb50; A41265. Zenith Brown (Mrs. Ford Brown) (A); 27Dec77; R682430. R682431. The Pony Express. By Samuel Hopkins Adams, illustrator: Lee J. Ames. NM: editorial revisions. © 12Oct50; A49740. Hester H. Adams & Katherine A. Adell (C); 27Dec77; R682431. R682434. Murder in Montana. By Muriel D. Bradley. AI pub. in The Star weekly, Toronto, Canada, Oct. 14, 1950. © 14Oct50, AI-2918; 19Oct50, A48870. Muriel D. Bradley (A); 4Nov77; R682434. R682435. Biddy Christmas. By Priscilla M. Warner, illustrated by the author. Prev. pub. abroad 1Oct48, AI-2826, renewed R615800. © 26Oct50; A49860. Priscilla M. Warner (A); 4Nov77; R682435. R682436. Jeremy Poldark. By Winston Graham. U.S. ed. pub. as Venture once more, 6May54, A136477. © 27Oct50; AI-913. Winston Graham (A); 4Nov77; R682436. R682437. Independent member; with 17 illus. & 2 maps. By A. P. Herbert. U.S. ed. pub. 7Jun51, A56148. © 19Oct50; AI-758. Lady Gwendolen Herbert (W); 4Nov77; R682437. R682438. Once upon a time. By James Reid Parker. (In Woman's day, Dec. 1950) © 10Nov50; B273466. James Reid Parker (A); 17Nov77; R682438. R682439. Katrina. By James Reid Parker. (In Woman's day, Aug. 1950) © 10Jul50; B254060. James Reid Parker (A); 17Nov77; R682439. R682440. Miss Ber. By James Reid Parker. (In Woman's day, Apr. 1950) © 10Mar50; B236444. James Reid Parker (A); 17Nov77; R682440. R682441. Partners—the United Nations and youth. Eleanor Roosevelt & Helen Ferris (Helen Ferris Tibbets) © 14Nov50; A50217. National Bank of Westchester (E of Helen Ferris Tibbets); 17Nov77; R682441. R682442. Laughter incorporated: the cream of the recent crop of stories and anecdotes harvested and prepared for market. By Bennett Cerf with illus. by Paul Galdone. © 13Nov50; A49876. Phyllis Cerf Wagner (W); 17Nov77; R682442. R682443. Baghdad: 1951. By Herb Caen. © 13Nov50; A49595. Herb Caen (A); 17Nov77; R682443. R682444. On the verge. By Maurice Sandoz, illustrated by Salvador Dali. One story prev. pub. in Aug. 1950 issue of Cosmopolitan. © 9Nov50; A49509. Edouard Marcel Emile Sandoz (NK); 17Nov77; R682444. R682445. The Best laid plans. By Anne Hocking, pseud. of Mona Messer. © 9Nov50; A49506. Prudence M. R. Smith (C); 17Nov77; R682445. R682446. Grim rehearsal. By Ruth Fenisong. © 9Nov50; A49505. Ruth Fenisong (A); 17Nov77; R682446. R682447. Candy for breakfast; a novel. By Gwen Davenport. © 9Nov50; A49504. Gwen Davenport (A); 17Nov77; R682447. R682448. Hiawatta and De night in de front from Chreesmas. Written & illustrated by Milt Gross, introd. by Max Shulman. © on introd.; 9Nov50; A49501. Max Shulman (A); 17Nov77; R682448. R682449. The Fundamentals of contract bridge. By Charles H. Goren. © 6Nov50; A49428. Charles H. Goren (A); 17Nov77; R682449. R682456. The Jews: their history, culture and religion. Vol. 1-4. By Louis Finkelstein. © 30Dec49; A40624. Louis Finkelstein (A); 27Dec77; R682456. R682457. Presidential agency OWMR: the Office of War Mobilization and Reconversion. By Herman Miles Somers. © 13Jun50; A45056. Herman Miles Somers (A); 28Oct77; R682457. R682458. Hugo L. Black: a study in the judicial process. By Charlotte Williams. © 6Nov50; A50822. Charlotte Williams (A); 30Nov77; R682458. R682459. The Rise of Chingis Khan and his conquest of North China. By Henry Desmond Martin. © 1Nov50; A50813. Betty G. Martin (E); 30Nov77; R682459. R682460. The Diplomacy of the dollar: first era, 1919-1932. By Herbert Feis. © 1Nov50; A50792. Herbert Feis (A); 30Nov77; R682460. R682461. The Critical opinions of William Wordsworth. By Markham L. Peacock, Jr. © 27Nov50; A50226. Markham L. Peacock, Jr. (A); 30Nov77; R682461. R682462. The Patent grant. By Edgar Burke Inlow. © 1Nov50; A51364. Edgar Burke Inlow (A); 30Nov77; R682462. R682463. Teacher's manual for At home on our earth. By Gertrude Whipple, Preston E. James & Lucille W. Fruehling. © 5Sep50; AA160098. Gertrude Whipple & Preston E. James (A); 3Oct77; R682463. R682480. Ring around the moon. By Jean Anouilh, translation: Christopher Fry. Pub. abroad 18May50, AI-2882, renewed R674406. NM: English translation of L'Invitation au chateau. © 23Nov50; A50255. Christopher Fry (A); 30Nov77; R682480. These entries alone may not reflect the complete Copyright Office records pertaining to a particular work. Contact the U.S. Copyright Office for information about any additional records that may exist.
WIKI
Talk:Motion capture Marketing department 1/19/2009: Ironically I wrote the original Active Marker System paragraph, since I work for PhaseSpace and it got changed by Vicon and other companies to water down any reference to the company. I also wrote most of the segments in this article that have to do with technology rather than companies, and movies, and no one complains about those paragraphs. This includes the Active Marker, Magnetics, Passive Marker, RF and other sections. Every time I try to make this a level playing field it starts another Wiki War. This whole article needs to be re-written by someone with no bias, rather than just differing bias. Tmcsheery (talk) 20:08, 19 January 2009 (UTC) The first line sounds like the marketing department wrote it. I've reverted to "hobo" because the character isn't simply a generic "homeless man". He is a hobo: living on his own, "riding the rails" on the sly, fixing his dinners over a campfire, etc. It's how the character is identified in the credits. "Hobo" is a culturally and historically appropriate term, and it describes the character more correctly than "homeless man" does. The paragraph about active motion capture reads like and ad. I believe Final Fantasy "Spirits Within" holds the distinction of the first fully motion capture feature and not Polar Express. Both have motion capture and some animation thrown in on the top, but Final Fantasy beats it by a few years. 7/22/06: The Final Fantasy movie wasn't done with performance capture. The idea behind performance capture (and how it differs from traditional motion capture) is the fact, that first, the performance of the actors is captured to a computer (and possibly composited together, if all the actors in a scene weren't captured simultaneously). This is basically just traditional mocap. The difference comes after: In performance capture, the cinematography is done with a "virtual camera" that the cinematographer (or director, in Robert Zemeckis's case) moves around. The scene is rendered live and shown on the camera's viewfinder and the movement of the camera is captured as well, so it's possible to get more lifelike handheld camera movements, than it would be, if the movements were animated on a computer. No if only someone could make this apparent in the article. And I agree, all the stuff about Imagemetrics and Phasespace read like an ad. Apparently someone from their marketing departments thought it would be a good idea to put a little marketing hype on wikipedia. To me the difference between motion capture and performance catpure is that motion capture deals with just capturing a motion, which could be a crash test dummy in a car, or a footballer throwing a ball, or a kid walking across a room that has force plates in the floor. But performace cature deals with capturing an actors performance and in addition deals with part of the process of delivering that performance to the screen (capture, cleanup, retargetting, editing, placement). I think one of the first characters to really illustrate this was the relationship between andy serkis and gollum. Any any point of the production if there was any question as to what gollums performance was to be, the usual answer would be found by "looking at the andy reference". This reference may be filmed footage or motion capture data. The performance of andy was key towards the creation of gollum, and this to me is an illustraion of "performance capture". Zemekis and sony imageworks have taken "Performance Capture" on in a big way, but they by no means invented it. I would agree that final fantasy was the first film to use motion capture in a big way, but it would be wrong to say "fully motion capture" as there is always an editing process an animation augmented to the mocap. An example of making a movie without using performance capture would be to mocap 10 different people for the lead role, and let the animator or motion editor re-edit the performance to remove the unique subtleties that each actor brings and insert their own. I hope this illustrates my view of the difference between motion capture and performance capture. This article is full of application specific examples that has obviously been written by a vendor or someone close to a vendor. It also seems to use terms "Performance Capture" and "Motion Capture" interchangably. There is a lot of content that belongs under "Motion Capture", but there is some valid content that talks about "performance capture". Do Sony Imageworks or Zemekis have a trakemark on the name "Performance Capture", I thought I read that somewhere a while ago. Peeldog 00:24, 5 September 2006 (UTC) Spammed Link, What to do? The target of the link to the world records of motion capture has been usurped by WikiSpammers -- an amazing daily rate of edits, and no apparent way to restore a sufficiently-old page to restore sanity even momentarily. Judging by the varying content, it may even be competing spammers. I was able to navigate to a good page by clicking on the Home tab on the target Wiki, and then World Records tab. But I'm afraid that if I were to update the link on this page, it would lead to the good page being spammed instead, if it were being found due to being linked from here. Now, these folks at the Motion Capture Society somewhat deserve what they get for running their Wiki so poorly, but I'm not eager to cause them more grief, nor am I eager to remove a link to an otherwise good (if small) site (better than all these commercial links), and yet the link as it is does not serve the reader. For now, I'm going to annotate the link. I hope someone has a better idea. I hope the people behind the Motion Capture Society get their Wiki act together and block these spammers... Bob Kerns (talk) 18:23, 9 February 2008 (UTC) More Merge Talk My feeling is this article should be about motion capture technology and not the use, i.e. the process of digitally capturing real life motion data. Performance capture is an application of motion capture, as gait analysis in biomechanics, as is tracking an object to shoot it down by the military, as is a camera watching an assembly line so a robot can pick it up, etc. I think all the applications should be separate articles, and this article should cover the various technologies and methods, not the implementation by application or industry (save for the other articles). --Peeldog 03:55, 26 February 2007 (UTC) Don't Merge: Peeldog makes a great argument. Performance capture is an application of motion capture and not motion capture. --Xmurdoch 01:53, 15 March 2007 (UTC) Don't Merge: Agree with above. Indeed, "Motion Capture" gets about 8x more pages on Google than "Performance capture" (9.7M v. 1.25M) - mocap is clearly a topic in its own right. --<IP_ADDRESS> (talk) 00:24, 5 December 2012 (UTC) Advertising?!? It seems to me that the External Links entirely consist of companies supplying mocap products or services — is this in keeping with Wikipedia policy? --OldCommentator 16:13, 6 August 2006 (UTC) Yes, most if not all of the External Links consist of mocap companies and are not keeping with Wikipedia policy (Wikipedia:Neutral point of view). Ramirror 01:13, 4 February 2007 (UTC) Yes, the External Links to manufacturers websites should be removed. One compromise would be to create another article entitled "List of Motion Capture Companies". This has been done for a number of other articles. 007patrick 06:29, 16 May 2007 (UTC) I did not add external links to the edit I just made, but if you want a source for the mention of Disney distributing the Motion Captured film "Christmas Carol", here is an article: http://www.variety.com/article/VR1117968136.html?categoryId=13&cs=1 I had added Motek Entertainment to the external links list since they offer free motion capture data, not just for commercial linking. This edit keeps getting deleted. I will add a "List of Motion Capture Companies" section and post it there. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 23:14, 16 September 2009 (UTC) Merge with 'Performance capture' * Merge: Absolutely merge. Performance capture is not new nor is it unique. It is motion capture. Very unprofessional marketing from Image Metrics and Phase Space. * Merge: Extensive article on Motion capture covers the topic nicely. Performance capture is essentially the same thing (with facial capture added). * I agree completely. In the film industry we use motion capture technology to capture a performance. It makes no difference if points are added to the face; it’s still mocap. This should be folded into the Motion capture article. --OldCommentator 00:47, 19 January 2006 (UTC) * Don't Merge: Performance is different than canned the same way stage is different than film. Often you will see overlapping components, but the intent is that motion capture is a subset of performance capture. The reason this is relatively new is high power video cards, with dual or quad core computers only recently made real time performance possible. KWCC and PDI did early demonstrations almost 20 years ago, but it has taken two decades for this to become a potential. As far as I know there is not yet a major TV show using live performance capture, although several were tried over the last decade. Let's not write it off yet. Bias of PhaseSpace Optical Motion Capture Tmcsheery 23 March 2006 * Merge: I must beg to differ. In both the film industry and in life sciences research there is no distinction made between "motion" capture and "performance" capture, except that the former is the generally accepted term. Please see: Vicon Peak, MetaMotion, or Motion Analysis. * True, in the early days of "mocap" (as it's now more commonly known), only gross motor movements were captured. As the technology progessed it became possible to capture ever higher resolution spatial data, including finger movements and facial expression. We now routinely output the motion data in real time. On the television show I'm currently on, a director directs two motion-actors while watching their CGI characters interact in real-time on the monitor.''--OldCommentator 00:21, 5 February 2006 (UTC) * Also, don't forget to sign your comments.--OldCommentator 00:21, 5 February 2006 (UTC) * Merge As stated before, the terms are often use interchangeably, and Hollywood has not made statements of any sort declaring the two to be seperate techniques. (Although motion capture is used more frequently, as also stated before) ViceroyInterus 02:06, 8 March 2006 (UTC) * Merge To the layman, these are essetially terms for the same concept. Any minor distinctions between the two should be explained in a single article. &#126;MDD4696 01:45, 14 March 2006 (UTC) * Merge I agree that in the feature film business there is a considerable difference between the two - mocap and performance capture. However, I do agree that the two should share the same "space". I am more concerned that the article has some false or at least misguided statements regarding the use of mocap instead of animation. For instance Gollum was largly key frame animated with motion capture used as an underlying layer or reference. I would also venture to say from a politically correct point of view that mocap is used in Computer Graphics production. It has yet to be determined in my mind that if something is mainly "captured" using hardware and software that it can be called animation. And if so, mocap is not part of computer animation, but rather part of computer graphics production. * Merge. Big Mac is to double hamburger as performance capture is to motion capture. <IP_ADDRESS> 19:43, 31 March 2006 (UTC) * Don't Merge: Motion capture is the more generic term; performance capture is a specific application of motion capture. As noted in the main article, motion capture has many applications: animation, game development, biomechanics research, virtual environments, robotic control, and more. Motion can be captured without knowing what use will be made of the data. Using the term "performance capture" connotes an artistic or theatrical use and does not give proper recognition to its more hard-science applications. RobertM52 19:49, 14 April 2006 (UTC) Merge As mentioned above any minor distinctions between Performance and Motion capture should be explained in the motion capture entry. "Performance" is a more artistic term favored by actors, some of whom feel uneasy about the success of CGI movies. Use of that term then, may make them feel more comfortable with participating in a CGI project. All I've gathered from the 'don't merge' proponents is that Performance Capture is a good mocap system. <IP_ADDRESS> 03:41, 17 May 2006 (UTC)Matt Smith, Polygon Pictures Merge: Performance capture is a variant of Motion capture. The concepts are not distinct enough to warrant two articles. Furthermore, the term "performance capture" doesn't describe anything new, as we have been able to capture performance for over 100 years.... Porlob 20:57, 28 August 2006 (UTC) Dont Merge: I see them as seperate. Motion capture deals with capturing motion, which could be a crash test dummy or any other object in motion. Performance capture is the process of capturing an actors performance, and honouring that performance through the process of recreating it digitally in a 3d render. Peeldog 00:22, 5 September 2006 (UTC) Merge: Dah!! Merge: Performance Capture does capture the motion of actors, objects, props, and the camera, as does Motion Capture. Performance Capture is the name used at ImageMovers studios for their Motion Capture process, while other studios such as House of Moves capture actor's performances with similar Motion Capture techniques without using the term Performance Capture. History? The beginning of the Motion Capture article explains a brief history of Motion Capture in the 70s and 80s. Later in the article there is a section entitled history, where it looks like several different people are trying to claim inventors rights to motion capture in the 80s and 90s. I think that the second history section should be deleted, save for the bit about the Sinbad movie. Comments? 007patrick 01:56, 24 August 2007 (UTC) This article should change its name Instead of being called Motion capture, it should be called Performance capture. Motion capture is the original and more primitive version of performance capture, which is much more sophisticated. Actors act, they just don't move, which means it is their performance which is captured, not simply their motions. <IP_ADDRESS> 12:16, 29 August 2007 (UTC) There are many more applications for motion capture besides animation and film -- medical research, auto engineering, virtual reality, etc. -- all of these applications are capturing motion, not a "performance". Even animation and film are really only capturing motion. Truly capturing a performance would require much more data collection (i.e. audio, texture, lighting, etc.). From the arguments I've seen so far, Performance capture, as the term is used today, seems to be just motion capture and audio recorded at the same time. <IP_ADDRESS> 06:26, 6 September 2007 (UTC) 12 megapixel spatial resolution modulated systems show more subtle movements than 4 megapixel optical systems by having both higher spatial and temporal resolution. ???? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 14:53, 28 October 2008 (UTC) the cost can be potentially almost 0 so stop printing it's definitely going to be expensive; e.g. free software potential and hand made tools. —Preceding unsigned comment added by Leladax (talk • contribs) 21:43, 25 January 2010 (UTC) Article quality There is plenty of text here and just 2 references that probably will not pass WP:Reliable. But the text is not useless, and needs clean up etc. Does anyone here have deep expertise in this field? Else I may work on this gradually. History2007 (talk) 13:26, 17 September 2010 (UTC) History lacking Except for a fleeting mention in reference to games, there is nothing on the history of this technique. Can someone please tell us when it was first used, when it was first used in various other fields (e.g., sports, medicine, movies), and how it developed. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 12:07, 14 April 2011 (UTC) * Agreed. This timeline from the Motion Capture Society provides some good markers, many of which are entirely absent from the wiki article: http://www.motioncapturesociety.com/resources/industry-history --<IP_ADDRESS> (talk) 09:47, 12 March 2016 (UTC) Ultrasound positioning What about an ultrasound analogy to RF positioning? Is it possible, or maybe ultrasound can't pass through body in the best way, or is it bad for health? Or is it completely possible and highly precise? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 10:05, 18 November 2011 (UTC) Please see from 120 years olds approximatly, the guy who created this is also the precursor of the cinematograph, created byt the French Lumières Brothers. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:58, 21 February 2012 (UTC) Merge from Optical motion tracking I added a merge tag to suggest Optical motion tracking to be merged to this article, specifically to the section "Markerless motion tracking". That section contains only one paragraph and could be expanded with the info on the other article, which i.m.o. doesn't warrant a separate page. Thoughts? --Waldir talk 13:00, 9 March 2012 (UTC) * Looks like a good plan to me. HCA (talk) 16:02, 9 March 2012 (UTC) * Support. Looks also good to me. --Fluffystar (talk) 14:39, 1 August 2012 (UTC) * I support merging. --<IP_ADDRESS> (talk) 18:15, 17 June 2013 (UTC) Wording in "Disadvantages" Hi. I'm guessing that the statement "Movement that does not follow the laws of physics generally cannot be captured" is in reference to some specific situation that I'm unable to visualize. I completely agree with it, with the exception of using the word "generally"...versus 'certainly', or omitting it. I apologize for being pedantic, but without any further explanation on it, I see no need for this statement. The reason being, movement not following the laws of physics cannot exist (offscreen), so it's implicit that it cannot be captured. Mouthematician (talk) 00:34, 13 March 2012 (UTC) Mouthematician POV There is an enormous amount of original research and POV in this article, especially with qualitative claims and a list of advantages v. disadvantages, which should not lead the article body. The field isn't one I know well and I leave it to other editors with more expertise, but Wikipedia policies and guidelines I do know, and this article had numerous issues in that regard. I post this by way of explaining my edits and tags today.--Tenebrae (talk) 19:38, 21 October 2012 (UTC) * I fail to see what is non-neutral POV. There doesn't appear to be a discussion on this talk page about neutrality. There should probably be more citations and references, but on the whole, to me, the article appears pretty helpful. So please cite the specific sections that have POV disputed, or else please remove the comment as per rules on NPOVD tags. --<IP_ADDRESS> (talk) 00:17, 5 December 2012 (UTC) * NPOV tag removed, according to policy undr rules on NPOVD tags (talk) 06:32, 20 December 2012 (UTC) "Underwater Motion Capture System" seems like a copy/paste from a promo website The section "Underwater Motion Capture System" reads like an advertisement. And it doesn't add much to the general technique of motion capturing. It doesn't say how problems concerning change in optical transmission under water were tackled. I suggest to remove this section all together. — Preceding unsigned comment added by Frodo Muijzer (talk • contribs) 09:34, 22 May 2013 (UTC) Removed snow white section. The comment under "Applications" about Snow White is redundant since comparisons with rotoscoping were covered in the lede. To identify a use of rotoscoping as de facto a form of motion capture is wrong and misunderstands how the two techniques work, despite the similarities (i.e. taking real world physical performances and converting them to animation). I have removed it. Verlaine76 (talk) 17:23, 23 June 2016 (UTC) External links modified Hello fellow Wikipedians, I have just modified 2 external links on Motion capture. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20140703113656/http://www.nycastings.com/dmxreadyv2/blogmanager/v3_blogmanager.asp?post=motioncaptureactors to http://www.nycastings.com/dmxreadyv2/blogmanager/v3_blogmanager.asp?post=motioncaptureactors * Added archive https://web.archive.org/web/20091213053756/http://radoff.com/blog/2008/08/22/anatomy-of-an-mmorpg/ to http://radoff.com/blog/2008/08/22/anatomy-of-an-mmorpg/ Cheers.— InternetArchiveBot (Report bug) 06:27, 9 January 2018 (UTC) More advertising going on User kolsevska has edited some of the page to include information about 'Husky Sense', even going as far as changing the 'estimated cost' for a mocap suit to match the one Husky Sense alleges. The modification was also done around the time they stated advertising their product (not to mention the user kolsekova itself was created seemingly only for this modification). This seems to me like a case of editing in self interest or with advertising purposes and I don't think it aligns with Wikipedia's standards. If it is worth mentioning then it belongs in a list of examples, not as the one depicted on top of the article (However, I don't think anyone with relation to the product should be the one to do it). Reading some of the topics in the talk tab makes me think this isnt the first time this has happened. But I'd rather see a more industry standard representation of mocap than one that to my knowledge was released early this year. SP Jacob (talk) 14:38, 25 November 2023 (UTC)
WIKI
Yoshiyuki Sakaki Yoshiyuki Sakaki (榊 佳之) is a Japanese molecular biologist. He was the sixth president of Toyohashi University of Technology and an emeritus professor of the University of Tokyo. Sakaki was born in Nagoya. He received a bachelor's degree in biochemistry from the University of Tokyo, and received a Ph.D. in biochemistry from the University of Tokyo in 1971. Awards * 1999: Platinum Technology 21st Century Pioneer Partnership Award, Smithsonian Institution * 2001: Chevalier dans l'ordre des Palmes Academiques, France * 2001: Moosa Award, Biochemical Society of the Republic of Korea * 2001: Award of Japanese Society of Human Genetics * 2003: The Chunichi Cultural Prize, Chu-nichi Culture Foundation * 2003: Medal with Purple Ribbon, Japanese Government
WIKI
Anion exchange drives reversible phase transfer of coordination cages and their cargoes Grommet, Angela B. and Hoffman, Jack B. and Percástegui, Edmundo G. and Mosquera, Jesús and Howe, Duncan J. and Bolliger, Jeanne L. and Nitschke, Jonathan R. (2018) Anion exchange drives reversible phase transfer of coordination cages and their cargoes. Journal of the American Chemical Society, 140 (44). pp. 14770-14776. ISSN 0002-7863 (https://doi.org/10.1021/jacs.8b07900) [thumbnail of Grommet-etal-JACS-2018-Anion-exchange-drives-reversible-phase-transfer-of-coordination] Preview Text. Filename: Grommet_etal_JACS_2018_Anion_exchange_drives_reversible_phase_transfer_of_coordination.pdf Accepted Author Manuscript Download (1MB)| Preview Abstract Chemical separations technologies are energetically costly; lowering this cost through the development of new molecular separation methods would thus enable significant energy savings. Molecules could, for example, be selectively encapsulated and separated using coordination cages, which can be designed with cavities of tailored sizes and geometries. Before cages can be used to perform industrially relevant separations, however, the experimental and theoretical foundations for this technology must be established. Using hydrophobic and hydrophilic anions as stimuli, we show that cages can reversibly transfer many times between mutually immiscible liquid phases, thus transporting their molecular cargoes over macroscopic distances. Furthermore, when two cages are dissolved together, sequential phase transfer of individual cage species results in the separation of their molecular cargoes. We present a thermodynamic model that describes the transfer profiles of these cages, both individually and in the presence of other cage species. This model provides a new analytical tool to quantify the hydrophobicity of cages. ORCID iDs Grommet, Angela B., Hoffman, Jack B., Percástegui, Edmundo G., Mosquera, Jesús ORCID logoORCID: https://orcid.org/0000-0001-6878-4567, Howe, Duncan J., Bolliger, Jeanne L. and Nitschke, Jonathan R.;
ESSENTIALAI-STEM
Template talk:Infobox school/Archive middle school Request for Instructions It may help to include some instructions in this talk section on how to fill out this template. My best attempt to utilize this template at Wilbur Wright Middle School does not appear to be a complete success. -- Jreferee 18:43, 27 November 2006 (UTC) Merger Proposal I looked at the list of Education infoboxes, and there are about half a dozen American school infoboxes that give largely identical information. I think it would be a good idea to merge all of these into Template: Infobox Education in the United States, because they're almost exactly the same and aren't specific to any one specific type of American school. I propose merging the following infobox templates into Template: Infobox Education in the United States: * Template:Infobox HighSchool * Template:Infobox HighSchool (American) * Template:Infobox VirginiaHighSchool * Template:Infobox K-12 School * Template:Infobox US school * Template:Infobox middle school Also, does anyone have experience with merging templates? How will infoboxes appear when the template for them no longer exists under the same name? Will a redirect on the deleted pages be enough to fix it? Tserton 20:50, 24 August 2007 (UTC)
WIKI
Characterization of acid sulfate soils and assessing their impact on a humic boreal lake Janne Toivonen*, Peter Österholm *Corresponding author for this work Research output: Contribution to journalArticleScientificpeer-review 35 Citations (Scopus) Abstract Due to acidity and metals from acid sulfate soils (a.s. soils), many watercourses in midwestern Finland have since 1960s regularly experienced short but intensive periods of poor water quality during high water flow. This has led to occasional massive fish kills and a significant decline in fish populations.However, many watercourses in northern Europe are often also characterized by low pH caused by naturally occurring organic acids, non-carbonate bedrock and previously a large input of acid rain. Therefore the role of acid sulfate soils has not always been properly addressed.This study was done on Larsmo and Öja Lake, a freshwater reservoir embanked from the alkaline Bothnian Bay in the 1960s. Since that, events of severe acidity and fish kills have been documented on several occasions. Severe but heterogeneous a.s. soils with relatively coarse grain sizes were found in the catchment. These soils were found to leach metals typical for a.s. soils such as Al, Cd, Co, Ni and Zn to recipient streams, but in contrast to other a.s. soils studied in Finland, some of them even seem to be leaching large quantities of Fe. Patterns of acidity, sulfate, sulfur isotopes, organic carbon and metals in rivers, streams and the lake revealed that (1) a.s. soils in the catchment are by far the most important source of acidity and metals in the lake i.e. the main reason for fish kills, (2) the load from discharge of organic (humic) acids and dredging operations is insignificant on the lake as a whole, (3) young near-field sediments comprising only 7% of the whole catchment accounted for roughly 20-30% of the total acidic load, (4) most of the acid/metal load entered the lake system from the south, and (5) by regulating outlets to the sea it seems to be possible to prevent this load from dispersing into the northern part of the lake system. Original languageEnglish Pages (from-to)107-117 Number of pages11 JournalJournal of Geochemical Exploration Volume110 Issue number2 DOIs Publication statusPublished - Aug 2011 MoE publication typeA1 Journal article-refereed Keywords • Acid sulfate soils • Dredge spoils • Metals • Organic acids • Sulfur isotopes Fingerprint Dive into the research topics of 'Characterization of acid sulfate soils and assessing their impact on a humic boreal lake'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Talk:USS Potomac (1822) USS Potomac There is disagreement between the text and the history box as to the "laid down" and "launch" dates. Which is correct? Would someone please change as neccessary?<IP_ADDRESS> 18:12, 3 June 2007 (UTC)
WIKI
Michael Bunbury Sir Michael William Bunbury, 13th Baronet (born 29 December 1946) is a British businessman and landowner. Business life * Duchy of Lancaster (became a member 1993; retired as chairman and member of council on 31 December 2005) * Buckmaster & Moore, 1968–74 * Smith & Williamson, Partner 1974-97, Chm 1986-93 * Fleming High Income Investment Trust Plc, 1996–97, Dir 1995-97 * HarbourVest Global Private Equity, Chm 2007-20 * BH Global Ltd, Chm 2013-21 * JP Morgan Claverhouse Investment Trust Plc, Dir 1996-2015, Chm 2005 * Foreign & Colonial Investment Trust Plc, Dir 1998-2012 * Invesco Perpetual Select Trust Plc, Dir 2008-18 * Arix Bioscience Plc, Dir 2021-2022 * Mem Exec Cttee CLA, 1992–97 and 1999-2004 (Chm Taxation Cttee, 1999-2003) (Chm Cttee Suffolk Branch, 1995–97) * Suffolk Agricultural Association, President, 2001–02 * Suffolk Coastal Conservative Association, President 2019- * Patron of Holy Innocents Church, Great Barton, Suffolk * Lloyd's of London: chairman of the PSL (Personal Stop Loss) Policyholders' Association * He was appointed a Knight Commander of the Royal Victorian Order (KCVO) in the 2005 Birthday Honours * Was High Sheriff of Suffolk in 2006/07. * Deputy Lieutenant of Suffolk Personal life Educated Eton College and Trinity College, Cambridge. Married with two sons and a daughter, he lives at Naunton Hall, Rendlesham, Woodbridge, Suffolk.
WIKI
Alex Freitas Alex Freitas may refer to: * Alexandre Freitas (grappler) (born 1972), Brazilian grappler * Alex Freitas (footballer, born 1988), Brazilian footballer who plays as a defender * Alex Freitas (footballer, born 1991), Portuguese footballer who plays as a winger * Alexander Freitas (born 1990), Canadian wrestler better known by the stage name Alex Silva
WIKI
Page:Popular Science Monthly Volume 73.djvu/287 Rh "Autobiography," stereotyped during his lifetime and published in two large volumes shortly after his death in December, 1903, is now followed by two further volumes, a "Life and Letters," prepared by Dr. David Duncan in accordance with a clause in Spencer's will which read as follows: "I request that the said David Duncan will write a Biography in one volume of moderate size, in which shall be incorporated such biographical materials as I have thought it best not to use myself, together with such selected correspondence and such unpublished papers as may seem of value, and shall include the frontispiece portrait and the profile portraits, and shall add to it a brief account of the part of my life which has passed since the date at which the Autobiography concludes." Dr. Duncan, who was Spencer's secretary and assistant for two years in the late sixties and was subsequently in India as professor of logic at Madras, had a task made extremely difficult by the preexisting autobiography. This, like all Spencer's works, makes a different appeal to different minds; some find it tedious, while to others it is of absorbing interest. In any case it is a work of genius written by a man of genius. It is so full and complete that most of the material of real interest had been used, except for the last years when Spencer was a confirmed invalid and found his own life wearisome. Spencer says: "It is a provoking necessity that an autobiography should be egotistic." As a matter of fact the autobiography emphasizes the egotistic, the priggish and the petty sides of his character much less than does the biography, while the true largeness, sincerity and kindliness of the man emerge
WIKI
A Guide to Bearings: Types of Bearings and When to Replace Them Wheel bearings are small metal rings whose purpose is to keep your motorcycle’s wheels rotating smoothly. Although small, they play a crucial role in the safety and smoothness of your ride. Wheel bearings wear down over time, and it’s important to know when it’s time to part ways with your current ones, and get new ones. Furthermore, it’s important to know what to look for when buying these new ones, as they’re not a one-fits-all solution. Let’s discuss these Motorcycle Parts in detail so you can shop for replacement bearings with confidence. What Are They? Details of inside the engine of motorcycle. Bearing and gears details on the right placement. Source: pinterest.com Wheel bearings, as aforementioned, are small metal rings or races that hold tiny metal balls. The assembly of races and balls make up the bearing which allows wheels to spin smoothly by minimising friction. Besides a smooth rotation, wheel bearings also take up the weight of the motorcycle and are located inside the wheel hub, which is the part that connects wheels to axles. Generally, front and wheel bearings are similar and work similarly, but they can be different in size and construction. Types of Bearings Two Types of Bearings Source: krankengineering.com Just like most Motorcycle Parts, bearings come in a variety of shapes and sizes, and they can be made using different materials. Since bearings are important components that ensure the wheel, tyre and hub assembly work together properly, it’s important you get the right ones. Both wheels have their own set of bearings, and they can be different. Ball Bearings Ball bearings are the most common type of bearings used in most vehicles. They’re made up of round metal balls that allow the bearing to spin in both directions. Ball bearings are capable of withstanding radial loads, as well as axial and thrust loads. The spherical balls in these bearings feature a smaller contact area that limits them to specific applications and types of vehicles, as they’re not capable of withstanding heavy impacts and shocks. Roller Bearings These bearings feature a rolling element that utilises a cylinder rather than a ball. As a result, they feature cylindrical metal rollers that are enclosed by outer and inner races. The rollers also feature a constant diameter across the length, which basically allows them to spread the load across a wider point of contact. This makes them more capable than ball bearings, thus more suitable for heavy-duty applications. The one area they struggle in is handling axial loads, so avoid using them in non-cornering wheels. Tapered Roller Bearings These bearings are similar to roller bearings, but as their name implies, they’re tapered and placed at a specific angle. Due to their unique geometrical design, they can withstand both combined and axial loads pretty well. They feature a cone-shaped assembly that helps them reduce friction while cornering. So, when you corner, the wheels tilt at an angle depending on the weight placed on them. As a result, they provide a smooth operation and prevent shifting parts from grinding. Stainless Steel vs Ceramic Bearings Man holding Stainless Steel and Ceramic Bearings Source: youtube.com Bearings are typically made of either stainless steel or ceramic. Stainless steel is a popular material as it’s rust- and corrosion-resistant. Plus, it lasts a long time without needing lubrication, and is capable of withstanding high temperatures. On the other hand, ceramic bearings are self-lubricating and last longer than their stainless steel counterparts. They’re very tough and reduce the rolling resistance significantly. As a result, the driveline doesn’t take as high loads. However, ceramic bearings are more expensive, which is why they’re generally used for racing purposes. Bearing Kit vs Individual Bearing Wheel bearings can be purchased as kits and single units. The kits come with other parts such as protectors, covers, O-rings, spacers, lock nuts and split pin sealers. Single unit bearings just contain the bearing. So, if you’re looking to restore your entire wheel bearing assembly, you’ll probably need a kit. Otherwise, just the bearing will do, saving you money in the process. Make sure the bearings you buy are compatible with your motorcycle. This includes the load-carrying capacity the bearing is rated for, which you can find on the user manual of your bike. When to Replace Them? The life of your bearings will depend on a few factors, including manufacturer, driving conditions, loads, maintenance, etc. Generally, however, they are expected to last anywhere between 120.000 to 150.000km. Some of the warning signs for a failing bearing include: • Unusual sounds from the wheels – The bearings can fail even without any signs. if you’re lucky, however, you’ll at least hear some unusual noises coming from your wheels. Failing bearings will make grinding noises that are the result of worn-out metal balls, rollers or lack of lubrication. • Uneven tyre wear – When bearings wear out, they make the wheels loosen up. As a result, the wheels will wobble and wear your tyres unevenly. Check for signs of uneven tyre wear when performing maintenance. • Steering vibration – If you feel vibrations when steering your motorcycle, a bearing may be faulty.
ESSENTIALAI-STEM
How to check file extensions using QTP Using QTP, we want to validate whether the particular image on a web page is .jpg, .gif, .bmp or any other extension. Solution: 1. We will take the example of Mercury demo application http://newtours.demoaut.com/. image 2. The image to be checked is shown in red ellipse above. 3. Now “Object spy” on the object. image 4. Find the property containing filename. Usually the name of the property would be file name itself. The value for this case is featured_destination.gif. 5. Put this value into a array using GetTO property. 6. Now make use of split function with . (dot) as delimiter. 7. The last value of the array would be your required file extension. Usually the 2nd value inside an array would be the file extension, but in case developer assigns the name as featured.destination.gif [Notice the two dots] then it might create a problem that’s why always take the last value of the array. Here is the script for the process given above: Dim filename, arrfile 'Put filename into the array filename = Browser("Welcome: Mercury Tours").Page("Welcome: Mercury Tours").Image("Featured Destination:").GetTOProperty("file name") ' Split using "." as delimiter arrfile = split(filename,".") msgbox arrfile(Ubound(arrfile)) Ankur Jain Founder at LearnQTP Loves blogging and automation. 18 comments ↓ #1 Shrini Kulkarni on 10.20.08 at 07:31 Ankur, I would like to have a email conversation with you .. kindly reply me at shrinik@gmail.com Shrini Kulkarni http://shrinik.blogspot.com #2 jay on 12.19.08 at 12:09 Good example, short and good! #3 shilpi on 01.12.09 at 02:16 Hi.. My self Shilpi & I want to learn QTP online…Can you please help me out for this… Thaks & Regards Shilpi #4 Praabas on 01.21.09 at 18:10 we can also use GetExtensionName(agr) metod to find the extension of file.Am I right? #5 123 on 02.04.09 at 02:53 Good Example #6 Ajay on 02.08.09 at 22:28 hi, Very Good example. #7 Ajay on 02.08.09 at 22:29 Praabas is also right….. Check with that function. Thanks Ajay Garg #8 Ankur on 02.09.09 at 05:52 @Prabas and Ajay: I think that would work only for File System Objects #9 Rahul on 07.23.09 at 21:57 Can any body describe “How to use keyword driven framework”? Please give an example of this… Thanks in advance………. #10 Manoj Pant on 07.26.09 at 19:25 Do QTP supports a GUI application build using the QT libraray? #11 Navan on 07.28.09 at 08:17 I think we can also go for regular expression for file name. Since the file extension is always the last three letters prefixed with a .(dot), we can also make use of mid functions. I think they will be more easy than using an array n then splitting it 1. First take the string into a varible using GETROProperty(filename) 2. Use mid function to read last three letters of string 3. Display it / Use Msgbox / compare it with provided extensions #12 Venu Yalluri on 09.17.09 at 22:13 Navan, reading the last 3 characters using Mid will not work when the file extension is more than 3 characters #13 subbareddy on 01.09.10 at 03:04 i think Venu is right , for example , MS Excel 2007, extension is .xlsx . Also, Navan –> How would you use Mid function when you donot know the index to start with as the file names varies. #14 kami on 02.06.10 at 00:37 Ankur Iam new to testing….i want to know how to do functional testing of a website using QTP…i mean how to test a website with navigation ….i face this question in interviews so plz let me know the proper process…. #15 Michelle on 05.12.10 at 07:52 How to proceed with QTP when QTP doesn’t identify the object? When a object is not being recognized by QTP, what is the work around so that you can continue with automation? #16 Anunay on 06.09.10 at 23:12 @Michelle – A better idea is to use descriptive programming with regular expressions. Even with thsi if you are unable to continue, the only way left is using the index or location properties of the object plus the Smart Identification being enabled. However, i do not believe you would ever come to a situation where QTP is unable to identify an object. You may either be missing an addin or something wrong with the software installation or other environment issues. #17 Venu on 06.11.10 at 15:16 I just want to know where can I get new version of QTP user guide through net. #18 Rajasekhar on 11.30.12 at 13:26 Nice example… Leave a Comment
ESSENTIALAI-STEM
Lukács Bőle Lukács Bőle (born 27 March 1990) is a Hungarian professional footballer as a left winger for Mezőkövesd. Politehnica Iași After playing all his career for Kaposvár, Bőle moved to Romanian club Politehnica Iași. On 26 June 2014 he signed a one-year contract with the Liga I club. On 7 April 2015 Lukács scored a very important goal against Dinamo București to help his team to a 1–0 victory. Ferencváros On 12 June 2017, Bőle was signed by Nemzeti Bajnokság I club, Ferencvárosi TC. The duration of the contract was not revealed by the club, although it turned out that Ferencváros signed Bőle for free since his contract expired with Politehnica Iași. On 16 June 2020, he became champion with Ferencváros by beating Budapest Honvéd FC at the Hidegkuti Nándor Stadion on the 30th match day of the 2019–20 Nemzeti Bajnokság I season. Honours * Ferencváros * Nemzeti Bajnokság I: 2018–19
WIKI
Danish pension funds back 'green transition' with $50 billion COPENHAGEN (Reuters) - Danish private pension funds on Monday pledged to invest more than $50 billion in green assets over the next decade to fight climate change, as part of Denmark’s ambition to reduce greenhouse gas emissions by 70% in 2030. The funds will invest 350 billion Danish crowns ($52 billion) in energy infrastructure, green stocks and bonds and energy efficient construction up to 2030, Danish pensions industry association Insurance and Pension Denmark said in a statement. The investment was first announced on Sunday by Denmark’s prime minister Mette Frederiksen at a news conference in New York before the summit. Frederiksen recently took office on promises of setting a 70% reduction target in greenhouse gas emissions, one of the world’s most ambitious, by 2030 compared to 1990 levels. “Now we need to work on getting international investors on board. That is imperative to realize the green transition globally,” Frederiksen said in a statement. The funds will bring the total green investments to 511 billion crowns. Danish private pension funds, which doesn’t include public pension fund ATP, currently hold assets worth 3,100 billion crowns. Environmental groups say the New York climate summit is coming at a crucial time, as extreme weather events and spiking temperatures affect more people in more parts of the globe. Denmark’s biggest private pension provider, PFA Pension, which manages more than 600 billion Danish crowns, will focus investments in offshore wind farms and photovoltaic energy as well as climate-friendly properties and energy storage. “There are quite big financing needs in many energy projects,” Allan Polack, PFA’s chief executive told Reuters and said PFA would invest in both shares and bonds as well as stakes in unlisted companies and projects. “But the exciting thing about the energy sector is the transformation. We are trying to get BP, Shell and Total and others to adapt and become far more climate friendly in their energy production,” Polack said. More than 90 big companies, including Denmark’s wind turbine maker Vestas and wind farm developer Orsted, both market leaders, have promised to slash emissions in a new campaign launched ahead of Monday’s climate summit. Reporting by Nikolaj Skydsgaard. Editing by Jane Merriman, Jacob Gronholt-Pedersen and David Evans
NEWS-MULTISOURCE
Archive Highlighted Is there any method to index log4j syslog from remote log4j server? Builder I want to index log4j syslog from remote log4j server, but I noticed the data is not plain text, splunk can not index them dicretly via network. I read the best way to index log4j file is to set up a standard log4j-syslog appender on my log4j host. However, log4j-syslog appender seems to be no longer available. http://www.splunk.com/wiki/Community:Log4j Does anybody know if there is any other method to index log4j from remote log4j server? If log4j-syslog appender is still available, please also let me know how I can get it. Tags (1) 0 Karma Highlighted Re: Is there any method to index log4j syslog from remote log4j server? Builder the syslog appender is still available. You can configure it like so; # Syslog appender log4j.appender.syslog=org.apache.log4j.net.SyslogAppender log4j.appender.syslog.layout=org.apache.log4j.PatternLayout log4j.appender.syslog.layout.ConversionPattern=%-5.5p | %other_pattern | %m%n # Set the following to yoursyslogserver:514 for remote. log4j.appender.syslog.SyslogHost=localhost:514 log4j.appender.syslog.Facility=Local0 log4j.appender.syslog.Threshold=WARN log4j.appender.syslog.FacilityPrinting=false The syslog appender is definitely still available in log4j 1.2 API: API doc On a side note, we use a local splunkforwarder with udp:localhost:514 listener forwarding to our index server - its more reliable like this, as UDP is a "fire and forget" protocol. 0 Karma Speak Up for Splunk Careers! We want to better understand the impact Splunk experience and expertise has has on individuals' careers, and help highlight the growing demand for Splunk skills.
ESSENTIALAI-STEM
Page:Confiscation in Irish history.djvu/210 II. of more than thirteen hundred at the outside. This would lead to the apparently absurd result that there were fewer Irish Catholic landowners after the execution of the two Acts than there had been under Cromwell. The explanation would seem to be that among the two thousand who are said to have received assignments from Cromwell w^est of the Shannon there were first a certain number who did not receive assignments in feesimple, second some whose allotments were so small as not to have been worth notice in 1677, third some who never actually got possession of the lands assigned to them, and finally that a very large number of the poorer transplantees sold their lands at once to Protestant purchasers. These Protestant purchasers were evidently uneasy about their rights, as special promises were asked for from the King by some of them, and clauses to protect them were introduced into the Acts. It is to be noted that the Books of Survey and Distribution show that in 1666 a large amount of land in Clare was held by the new interest, a fact that can only be explained by purchase or by fraud. It is also possible that in the case of the landowners west of the Shannon who had got from the Cromwellian authorities assignments on what had been their own property in 1641 no new
WIKI
Non è la RAI Non è la RAI ("It's not RAI" in English) is an Italian variety television series that aired from 9 September 1991 to 30 June 1995. Initially broadcast by Canale 5, it was moved to Italia 1 in January 1993. The show was presented by Enrica Bonaccorti in its first season, Paolo Bonolis in the second and Ambra Angiolini in the third and fourth. Produced by Gianni Boncompagni, the show was broadcast every day in the afternoon, starring 100 girls between 14 and 22 years old who sang, danced and presented some telephone competitions. The show created scandal in Italy due to the girls' age and some political declarations by Angiolini, who was 17 years old in 1994. From the show came many Italian television, music and theatre stars like Angiolini, Pamela Petrarolo, Claudia Gerini, Romina Mondello, Nicole Grimaudo, Antonella Elia, Yvonne Sciò, Alessia Merz, Alessia Mancini, Antonella Mosetti, Emanuela Panatta, Laura Freddi, Miriana Trevisan, Gloria Scotti, Cristina Quaranta, Sabrina Impacciatore, Barbara Lelli and Letizia Catinari. The program was rebroadcast on the Happy Channel on satellite TV some year after its end and in the digital channel Mediaset Extra from 2011. Foreign version The concept of Non è la RAI was copied by the Brazilian television network SBT, which produced a local version called Fantasia, aired between 1997 and 2000 and again between 2007 and 2008.
WIKI
User:Ajnunes AJNUNES Medical student with particular interest in Cardiovascular and Thoracic Surgery, Health Economics, Mathematical Modeling, and Management.
WIKI
Fraunhofer-Gesellschaft Publica Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten. Multi-pelvis characterisation of articular cartilage geometry   : Gillard, Faye C.; Dickinson, Alexander S.; Schneider, Urs; Taylor, Andrew C.; Browne, Martin : Proceedings of the Institution of Mechanical Engineers. Part H, Journal of engineering in medicine 227 (2013), Nr.12, S.1255-1264 ISSN: 0046-2039 ISSN: 0954-4119 ISSN: 2041-3033 Englisch Zeitschriftenaufsatz Fraunhofer IPA () Hüftpfanne; implant; Implantat; design; Kugel; Anatomie; Medizintechnik Abstract The shape of the acetabular cartilage follows the contact stress distribution across the joint. Accurate characterisation of this geometry may be useful for the development of acetabular cup devices that are more biomechanically compliant. In this study, the geometry of the acetabular cartilage was characterised by taking plaster moulds of the acetabulum from 24 dry bone human pelvises and digitising the mould shapes using a three-dimensional laser scanner. The articular bone surface geometry was analysed, and the shape of the acetabulum was approximated by fitting a best-fit sphere. To test the hypothesis that the acetabulum is non-spherical, a best-fit ellipsoid was also fitted to the geometry. In each case, points around the acetabular notch edge that disclosed the articular surface geometry were identified, and vectors were drawn between these and the best-fit sphere or ellipsoid centre. The significantly larger z radii (into the pole) of the ellipsoids indicated that the acetabulum was non-spherical and could imply that the kinematics of the hip joint is more complex than purely rotational motion, and the traditional ball-and-socket replacement may need to be updated to reflect this motion. The acetabular notch edges were observed to be curved, with males exhibiting deeper, wider and shorter notches than females, although the difference was not statistically significant (mean: p = 0.30) and supports the use of non-gender-specific models in anatomical studies. : http://publica.fraunhofer.de/dokumente/N-275788.html
ESSENTIALAI-STEM
ETF Preview: Broad Market ETFs Mixed With Earnings in Spotlight Pre-Market Movers TQQQ +2.4% QLD +1.8% INDL -5.1% RUSS -2.5% NUGT -2.5% Broad Market Indicators Broad-market exchange-traded funds, including SPY, IWM and IVV were mixed. Actively traded PowerShares QQQ ( QQQ ) was up 0.8%. U.S. stock futures were pointing to a higher open, looking to build on Thursday's gains that took the Nasdaq to a record high. Earnings continued to provide the main focus, with office equipment giant Xerox ( XRX ) declining more than 4% after cutting its full-year guidance and providing a weaker-than-expected Q2 forecast. Biogen IDEC ( BIIB ) also dropped on an earnings miss, while Microsoft ( MSFT ) surged after its Q1 report late Thursday that beat the Street. Power Play: Technology Technology Select Sector SPDR ETF ( XLK ) was higher, iShares Dow Jones US Technology ETF (IYW), iShares S&P North American Technology ETF (IGM) and iShares S&P North American Technology-Software Index (IGV) were inactive after a higher close Thursday. SPDR S&P International Technology Sector ETF (IPK) was also unchanged. Semiconductor ETFs, SPDR S&P Semiconductor (XSD) and Semiconductor Sector Index Fund (SOXX) are inactive and bucked the trend Thursday to close lower. Microsoft ( MSFT ) was up almost 5% pre-bell after it reported Q3 EPS of $0.61, including $0.01 per share in items, better than the analyst consensus of $0.53 per share on Capital IQ. After the close Thursday, the software company reported revenue was $21.7 billion, ahead of expectations of $21.0 billion. Winners and Losers Financial Select Financial Sector SPDRs (XLF) was edging lower. Direxion Daily Financial Bull 3X shares (FAS) was tipping into the green, while Direxion Daily Financial Bear 3X Shares (FAZ) was up 0.17%. Simon Property Group (SPG) on Friday reported Q1 earnings and funds from operations above analysts' expectations despite a slight revenue miss, while the real-estate investment trust focused on retail properties boosted its quarterly dividend by 7.1% and raised its 2015 guidance. Net income attributable to common stockholders rose to $362.2 million, or $1.16 per share, from $341.6 million, or $1.10 per share, a year earlier. The prior-year period included a gain of $0.11 per share from discontinued operations. Analysts polled by Capital IQ were expecting a profit of $1.14 per share, on average. Industrial Industrial ETFs iShares Trust Dow Jones U.S. Industrial Sector Index Fund (IYJ) and Vanguard Industrials (VIS) were flat and Select Sector SPDR-Industrial (XLI) was heading lower. American Airlines Group (AAL) shares are up 1% pre-bell after the airline reported better-than-expected Q1 earnings and revenue in line. Adjusted Q1 income tripled to $1.2 billion, or $1.73 per diluted share, beating estimates by three cents, according to Capital IQ. Total revenue fell 1.7% to $9.8 billion, in line with expectations. The decline was attributed to softness in Latin America, the strong U.S. dollar and competitive capacity growth. Energy Dow Jones U.S. Energy Fund (IYE) was flat and Energy Select Sector SPDR (XLE) was down 0.16%. Westmoreland Coal (WLB) reported its Q1 loss narrowed while sales jumped from a year ago. The operator of coal-fired power generating units and surface coal mines said its net loss narrowed to $11.7 million or $0.67 per diluted share from a loss of $19.3 million or $1.30 a year earlier. Four analysts had expected the company to report EPS between a non-GAAP loss of $0.72 and a GAAP profit of $0.50, if comparable. Revenue surged to $371.5 million from $180.2 million compared to the $327.4 million average estimate from three analysts polled by Capital IQ. Commodities Crude was down 0.4%; United States Oil Fund (USO) was down 0.05%. Natural gas was up 0.6% and United States Natural Gas Fund (UNG) was flat. Gold fell 0.6%, while silver declined 0.5%. Among rare metal funds, SPDR Gold Trust (GLD) fell 0.5% and iShares Silver Trust (SLV) dropped 0.7%. Consumer Consumer Staples Select Sector SPDR (XLP), iShares Dow Jones US Consumer Goods (IYK), and Vanguard Consumer Staples ETF (VDC) were inactive after a weaker close. Consumer Discretionary Select Sector SPDR (XLY) was up 0.4%, SPDR S&P Retail (XRT), PowerShares Dynamic Retail (PMR) and Market Vectors Retail ETF (RTH) were inactive after closing higher Thursday. Steven Madden (SHOO), a footwear and accessories designer and marketer, reported Q1 results that topped the Street view on EPS and total revenues as the company reaffirmed full year guidance. The company reported Q1 net income of $19.8 million, or $0.32 per diluted share, down from $23.6 million, or $0.36 per diluted share, in the prior year's Q1. Net income excluding special items, including a $3.0 million loss related to the partial impairment of the company's Wild Pair trademark, remained at $19.8 million, or $0.32 per diluted share, down from $0.36 in the same period a year ago but topping analyst estimates of $0.31. Total revenues of $323.9 million were up from $304.6 million in Q1 2014 and topped analyst projections of $316.4 million. Health Care Health Care SPDR (XLV) gained 0.2%, iShares Dow Jones US Healthcare (IYH) was flat and Vanguard Health Care ETF (VHT) slipped. Biotech ETF iShares NASDAQ Biotechnology Index (IBB) fell 0.6%. Biogen Idec ( BIIB ) shares gave up earlier pre-market gains after reporting Q1 earnings and revenue that fell short of analysts' estimates. The biotechnology company said non-GAAP earnings rose 55% to $3.82 but fell short of the $3.91 average estimate from analysts polled by Capital IQ. Revenue rose 20% to $2.55 billion compared to the $2.66 billion consensus estimate. Active broad-market exchange-traded funds in Thursday's regular session: VelocityShares 3X Long Crude ETN (UWTI): +8.6% SPDR S&P 500 (SPY): +0.3% iShares MSCI Emerging Index Fund (EEM): +0.7% United States Oil Fund (USO): +2.6% iShares MSCI Japan Index Fund (EWJ): -0.2% The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. Copyright (C) 2016 MTNewswires.com. All rights reserved. Unauthorized reproduction is strictly prohibited. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Talk:Windsor Gardens station/GA1 GA Review The edit link for this section can be used to add comments to the review.'' Reviewer: The Rambling Man (talk · contribs) 16:18, 2 September 2021 (UTC) Comments That's all I have. The Rambling Man (Keep wearing the mask...) 09:07, 3 September 2021 (UTC) * "not accessible. The only access" This is potentially confusing because you're using access to mean two things in very short order. Perhaps you could say something like "it does not support accessibility" or similar? * ✅ Reworded. * "Franklin Line station" in lead, "Franklin Branch" in infobox but that link is piped to "Norfolk County Railroad" which then redirects to "New York and New England Railroad".... to say this is mildly confusing (to me) would be an understatement! * I've made the link in the infobox go to Franklin Line. It is a bit confusing - the Franklin Branch is the physical section of track that the Franklin Line service operates on, though colloquially they're often conflated. That section of track originated as the Norfolk County Railroad, which became part of the NY&NE. I've reworded a few things to clarify. * "Norwood, just north of the Walpole border" probably worth reiterating this is Massachusetts. * Engamore Lane is mentioned in the infobox but nowhere else. * You then use "The Norfolk County Railroad opened"... in the prose, so perhaps this needs explanation? * Per above, hopefully my rewordings help a bit with clarity. * Do all the alternative names with bold links have redirects here? Winslow(s) doesn't appear to, can you check the others? * I did create redirects for all of them. "Winslow(s)" means that both "Winslow" and Winslows" were used - often interchangably. That's pretty common for early railway stations. * "Walpole.[8][12][9]:365 " order. * "accessible.[19][20][3] " order. * ISBNs should be consistently formatted. * "accessible.[19][20][3] " order. * ISBNs should be consistently formatted. * ISBNs should be consistently formatted. * ISBNs should be consistently formatted. * Thanks for the review! I believe I've addressed all your comments. Pi.1415926535 (talk) 18:22, 3 September 2021 (UTC)
WIKI
A lottery is a form of gambling in which people purchase tickets for a chance to win a prize, such as a house or a car, based on the results of a random drawing. It is also a popular way for states to raise funds. In the United States, there are 37 lotteries. Some are run by the state, while others are private. Some people may be surprised to learn that the lottery is a major source of revenue for many public services, including education, health care and roads. The history of the lottery is long and varied. It has been used as a means of giving away goods and land since ancient times, and was even once an official state business. In the modern world, it has become a popular form of fundraising and is responsible for much-needed infrastructure projects. However, there are a number of problems associated with the lottery that need to be taken into account. These include issues involving the poor and problem gamblers, as well as the way in which the lottery is promoted. In the early days of the lottery, it was often used as a kind of party game—during Roman Saturnalia festivities, for example, guests would receive tickets and prizes might consist of fancy dinnerware. The lottery was a common feature of Roman culture, and the casting of lots was often seen as a method of divining God’s will. Lottery proponents in the nineteenth century argued that it could fill state coffers without raising taxes, and therefore keep money in the hands of average citizens. But the reality proved to be much different. A few state-run lotteries managed to bring in a significant amount of money, but most did not. And, as Cohen explains, the fact that lottery proceeds are not sufficient to finance state operations quickly put an end to the fantasy that lotteries were “budgetary miracles.” Although it is true that lotteries can bring in tremendous amounts of money, it is also the case that those winnings do not cover the costs of running a government or even cover the cost of the prizes. A significant percentage of proceeds must be spent on the costs of organizing and promoting the lottery, while another proportion goes to profit and dividends for the sponsor. Depending on the lottery’s structure, the remainder might be distributed among a few very large prizes or a large number of smaller ones. Moreover, because lotteries are run as businesses with an emphasis on maximizing revenues, advertising is designed to persuade target groups to spend their hard-earned money. This is an inappropriate function for a public service, particularly when it focuses on encouraging gambling, which can have negative social impacts. It can also encourage compulsive gambling and can contribute to poverty. This is why, argues Cohen, the debate surrounding lotteries shifts from the general desirability of them to a focus on their specific features and operations.
FINEWEB-EDU
George Liu George Liu - 8 months ago 54 Python Question How to convert df name strings back to df's? I have several dataframes, such as df1, df2 etc. then i made a list of the names of these df's like lst = ['df1', 'df2'] Now, I want to use these df's in a function "my_func()" my_func(dataframe=df1) my_func(dataframe=df2) ... How can i express the list of dataframes in a loop, so that i can call different df's in my_func? (the way below does't work, since I'm calling strings instead of df's...) for i in lst: my_func(dataframe=i) Thanks! Answer I would argue that storing the name of your data-sets as strings, and then try to pass the string as a argument is counter productive. Instead, what I would do is create a dictionary with all your data-sets as values to string keys, and pass the dictionary objects into your function. my_frames = {'df1' : [1,2,3], 'df2' : [4,5,6]} def my_func(dataframe): ... do work on dataframe ... for df_name, df_obj in my_frames.items(): print('Doing work on:', df_name) my_func(df_obj) Another nifty thing with dictionaries and functions is that you can expand the dictionary as named parameters right off the bat. my_frames = {'temperature' : 25.5, 'wind' : 4.6} def weather(temperature=None, wind=None): print('The temp is:', temperature, 'and the wind speed is:', wind) weather(**my_frames) But that's just a little side note.
ESSENTIALAI-STEM
ALTER SERVICE MASTER KEY (Transact-SQL) Applies to: SQL Server (all supported versions) Changes the service master key of an instance of SQL Server. Topic link icon Transact-SQL Syntax Conventions Syntax ALTER SERVICE MASTER KEY [ { <regenerate_option> | <recover_option> } ] [;] <regenerate_option> ::= [ FORCE ] REGENERATE <recover_option> ::= { WITH OLD_ACCOUNT = 'account_name' , OLD_PASSWORD = 'password' } | { WITH NEW_ACCOUNT = 'account_name' , NEW_PASSWORD = 'password' } Note To view Transact-SQL syntax for SQL Server 2014 and earlier, see Previous versions documentation. Arguments FORCE Indicates that the service master key should be regenerated, even at the risk of data loss. For more information, see Changing the SQL Server Service Account later in this topic. REGENERATE Indicates that the service master key should be regenerated. OLD_ACCOUNT ='account_name' Specifies the name of the old Windows service account. Warning This option is obsolete. Do not use. Use SQL Server Configuration Manager instead. OLD_PASSWORD ='password' Specifies the password of the old Windows service account. Warning This option is obsolete. Do not use. Use SQL Server Configuration Manager instead. NEW_ACCOUNT ='account_name' Specifies the name of the new Windows service account. Warning This option is obsolete. Do not use. Use SQL Server Configuration Manager instead. NEW_PASSWORD ='password' Specifies the password of the new Windows service account. Warning This option is obsolete. Do not use. Use SQL Server Configuration Manager instead. Remarks The service master key is automatically generated the first time it is needed to encrypt a linked server password, credential, or database master key. The service master key is encrypted using the local machine key or the Windows Data Protection API. This API uses a key that is derived from the Windows credentials of the SQL Server service account. SQL Server 2012 (11.x) uses the AES encryption algorithm to protect the service master key (SMK) and the database master key (DMK). AES is a newer encryption algorithm than 3DES used in earlier versions. After upgrading an instance of the Database Engine to SQL Server 2012 (11.x) the SMK and DMK should be regenerated in order to upgrade the master keys to AES. For more information about regenerating the DMK, see ALTER MASTER KEY (Transact-SQL). Changing the SQL Server Service Account To change the SQL Server service account, use SQL Server Configuration Manager. To manage a change of the service account, SQL Server stores a redundant copy of the service master key protected by the machine account that has the necessary permissions granted to the SQL Server service group. If the computer is rebuilt, the same domain user that was previously used by the service account can recover the service master key. This does not work with local accounts or the Local System, Local Service, or Network Service accounts. When you are moving SQL Server to another computer, migrate the service master key by using backup and restore. The REGENERATE phrase regenerates the service master key. When the service master key is regenerated, SQL Server decrypts all the keys that have been encrypted with it, and then encrypts them with the new service master key. This is a resource-intensive operation. You should schedule this operation during a period of low demand, unless the key has been compromised. If any one of the decryptions fail, the whole statement fails. The FORCE option causes the key regeneration process to continue even if the process cannot retrieve the current master key, or cannot decrypt all the private keys that are encrypted with it. Use FORCE only if regeneration fails and you cannot restore the service master key by using the RESTORE SERVICE MASTER KEY statement. Caution The service master key is the root of the SQL Server encryption hierarchy. The service master key directly or indirectly protects all other keys and secrets in the tree. If a dependent key cannot be decrypted during a forced regeneration, the data the key secures will be lost. If you move SQL to another machine, then you have to use the same service account to decrypt the SMK - SQL Server will fix the Machine account encryption automatically. Permissions Requires CONTROL SERVER permission on the server. Examples The following example regenerates the service master key. ALTER SERVICE MASTER KEY REGENERATE; GO See Also RESTORE SERVICE MASTER KEY (Transact-SQL) BACKUP SERVICE MASTER KEY (Transact-SQL) Encryption Hierarchy
ESSENTIALAI-STEM
3 Stocks to Watch in August Much anticipated second-quarter earnings -- which include the worst of the economic lockdown to attempt to halt the spread of COVID-19 -- are rolling in at a torrid pace. And early results are, not surprisingly, better for digital-based businesses, as the crisis of the last few months is rendering older operations redundant. But the pace of tech companies handing in report cards to shareholders will pick up pace in August. Three software stocks I'm watching closely are Fortinet (NASDAQ: FTNT), Twilio (NYSE: TWLO), and Zoom Video Communications (NASDAQ: ZM). A rapidly evolving landscape for work Cybersecurity is a tough segment of the tech sector to invest in. Plenty of promising stocks have gotten off to a hot start, only to later struggle as technologies evolve and security needs quickly pivot. Where some firms have gone wrong is lack of speed in picking up on new security risks, or lacking the financial flexibility to capitalize on them when they emerge. But one firm has done exceptionally well. Fortinet has been around since 2000 and became a public stock in 2009, making it a "legacy" security outfit that got its start selling firewalls (traditionally, hardware used to create a perimeter around a piece of real estate from which an organization operates). But Fortinet shares have risen consistently since then, and are up nearly 1,600% since IPO. In spite of massive changes -- including the migration to the cloud that makes traditional firewalls irrelevant, the need for AI and security automation to help strapped IT teams keep up, and, more recently, COVID-19, which has dispersed the global workforce and brought on a new work-from-home movement -- Fortinet has been able to adapt. In fact, while other legacy firms' growth trajectories have slowed or even begun to contract in recent years at the expense of new cloud-native upstarts, Fortinet's pace has picked up a bit. First-quarter 2020 revenue increased 22%, up from 20% in 2019. The secret is that Fortinet has been disciplined with its spending and maintained positive operating profit margins while investing in new in-house product and service development. That's in stark contrast with other firms that have blown money on expensive sales and marketing campaigns and mega-acquisitions that haven't panned out over the long term. In the last year, Fortinet has made a handful of very small acquisitions to supplement its efforts, but the emphasis is on the "very small" part of that sentence. It continues to make a graceful transition into the cloud and related security service era. The company finished March with $1.4 billion in cash and equivalents and zero debt, currently has a market cap of $22.5 billion, and trades for 29.8 times trailing 12-month free cash flow (revenue less cash operating and capital expenses). Fortinet reports earnings on Aug. 6, but barring some unforeseen occurrence, this will remain one of my favorite cybersecurity stocks. Image source: Getty Images. Meeting the demands of the 21st-century consumer Unified digital communications technologist Twilio (NYSE: TWLO) is one hot stock this year. Shares are up a whopping 184% 2020 to-date as of this writing. Stellar first-quarter results are part of the reason. Active customers increased 23% from a year ago and surpassed 190,000, and existing customers spent an average of 35% more with Twilio when excluding the company's takeover of SendGrid in early 2019. As a result, total revenue surged 57% higher, with no less than 33% growth forecast for Q2 (which will be reported on Aug. 4). But that alone doesn't explain the massive upside the stock has experienced. Twilio's market cap is now over $39 billion, valuing it at more than 20 times expected one-year forward sales -- all for a company that has run at negative $35.5 million free cash flow in the last year. The reason is Twilio's business model. The company operates a cloud-based portfolio of integratable software algorithms that allows developers to integrate digital communications into applications. With much of the world getting locked down at some point in recent months and organizations scrambling to put together continuity plans, digital communications are more important than ever before. Specifically, Twilio's software can help a company build video, voice, text, email, and chat capabilities into their existing operations, or build entirely new applications from the ground up. The company's customer list is impressive, including Airbnb, Lyft (NASDAQ: LYFT), and salesforce.com (NYSE: CRM), to name just a few. There is a lot up in the air at the moment given the current state of world affairs, but spending on customer experience management tools could grow an average of 18% a year for the better part of the next decade according to some researchers, surpassing $23 billion in annual spend in 2027. In the driver's seat of (and largely responsible for starting) this movement, Twilio's opportunity is thus quite large. There was $1.84 billion in cash and equivalents and $464 million in convertible debt on the books at the end of Q1. This is another stock to watch closely leading up to and following the next quarterly update. Voice is dead, long live video If you had never heard of Zoom prior to the pandemic, you almost certainly have now. It and other web-based video conferencing tools have been a part of the business world for years, but demand for video communications has boomed in recent months. While the phone certainly isn't going anywhere -- nor will travel once social distancing begins to ease -- video as a means to stay in touch looks poised to stick in a post-COVID-19 world. Zoom's goal is nothing short of that. In fact, the company's mission is to make "Zoom meetings better than in-person meetings." While that may sound ridiculous if you're anxious to go visit family and friends, it may not be ridiculous for a business, school, or some other organization where meetings with others happen out of necessity rather than for pleasure. It may turn out that in-person meetings and all the travel in cars, trains, and planes to facilitate them may have been excessive -- given that Zoom's technology now exists. With the aim of tightening up the budget or to free up cash for better return on investment projects, Zooming could be part of the new normal. Of course, this isn't news to anyone, and the stock price's more than 270% return this year alone indicates that more than a few people have caught on to the video software company as an investment. And for good reason. Revenue was up 169% from a year ago in Q1, with as much as 190% growth forecast for the full-year period. Even when factoring for an incredible run in 2020, shares trade for a very hefty 31.6 times expected sales. But though free cash flow margin of $252 million (good for a margin of 77%!) to kick off the year will certainly moderate, this is a highly profitable enterprise that's well-funded to disrupt the way people meet together. Zoom had $1.1 billion in cash and equivalents on the books at the end of March and zero debt. When the company reports in late August or early September, massive growth is already a given. But seeing where Zoom decides to take its incredible momentum will be an intriguing story to follow. Find out why Fortinet is one of the 10 best stocks to buy now Motley Fool co-founders Tom and David Gardner have spent more than a decade beating the market. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* Tom and David just revealed their ten top stock picks for investors to buy right now. Fortinet is on the list -- but there are nine others you may be overlooking. Click here to get access to the full list! *Stock Advisor returns as of June 2, 2020 Nicholas Rossolillo and his clients own shares of Fortinet, Salesforce.com, Twilio, and Zoom Video Communications. The Motley Fool owns shares of and recommends Salesforce.com, Twilio, and Zoom Video Communications. The Motley Fool recommends Fortinet and recommends the following options: short August 2020 $130 calls on Zoom Video Communications. The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Upgrading BLU Advance L4 to Android 13: A Comprehensive Guide Upgrading BLU Advance L4 to Android 13: A Comprehensive Guide The BLU Advance L4 is an entry-level smartphone that offers basic features and functions, making it a perfect choice for users who need a simple device to stay connected with their family and friends. However, as technology advances, it becomes essential to keep up with the latest Android updates to ensure that the device continually functions effectively and securely. Moreover, these updates can bring significant improvements to the device’s overall performance, add novel features, and enhance user experience. The latest Android update to the BLU Advance L4 is the Android 13 Tiramisu, which offers a wide range of new features and improvements that users cannot afford to miss. Updating your BLU Advance L4 to Android 13 Tiramisu ensures that you have the most recent security patches, improved device performance, and a better user experience. If you own the BLU Advance L4 and are curious about how to update it to Android 13 Tiramisu, read on to learn more about everything you need to know to stay up-to-date with the latest Android updates. Android 13 Tiramisu offers many exciting new features and improvements that make it a desirable upgrade for BLU Advance L4 users. Here are some noteworthy features of Android 13 Tiramisu: • Improved device performance • Refined animations • New UI elements and widgets • Smarter notifications • More control over app permissions • Enhanced privacy features • Built-in screen recording • New Emoji and Emoticons • Reduced battery drain and improved battery efficiency Overall, Android 13 Tiramisu improves the user experience on many fronts. From speed to efficiency, the upgrade keeps the device secure and functioning smoothly. The new Android 13 update has many security enhancements, such as a password vault and anti-malware features, making the device safer for users. Apart from the above-mentioned features, Android 13 Tiramisu also promises to be more responsive, intuitive, and personalized, ensuring it gives users a better experience. With these impressive features, you can be sure that your BLU Advance L4 device will be better than ever. Is Android 13 Tiramisu? Android 13 is not Tiramisu. In fact, Android 13 does not exist as a version of the Android operating system. The latest version of Android is Android 11, which was released in September 2020. Tiramisu is a dessert and has no connection to the Android operating system. For more information about the latest version of Android and its features, refer to the official Android website or visit tech websites like TechCrunch or The Verge. Before you begin the update process for BLU Advance L4 to Android 13 Tiramisu, there are a few things to consider. Here’s a quick checklist to help you prepare for a successful update: Backup data: Back up all your important data, such as contacts, messages, media files, and any other important documents in case of data loss during the update process. Ensure sufficient storage space and battery life: Make sure your BLU Advance L4 smartphone has enough storage space to download and install the Android 13 Tiramisu update. Also, charge your phone or ensure that it is connected to a power source throughout the update process to avoid turning off in the middle of updating. Stable and strong internet connection: To download and install Android 13 Tiramisu, you must have a secure and speedy internet connection. It is recommended to use Wi-Fi, as you may need to use your phone’s mobile data during the update process. It is important to note that not following these steps or attempting to skip them can lead to various issues such as data loss, incomplete installs or bricking the device. Therefore, the above preparations must be adhered to avoid any interruptions during the update BLU Advance L4 to Android 13 Tiramisu. How to Update BLU Advance L4 to Android 13 Tiramisu After completing the preparation steps mentioned earlier, we can now proceed with the update process. Follow these simple steps to update your BLU Advance L4 smartphone to Android 13 Tiramisu: 1. Go to “Settings” from the home screen of your device. 2. Scroll down and select “System“. 3. Select “Software update“. 4. Click on “Download and install“. 5. Wait for the download and installation process to complete. 6. After completion, restart your device to complete the installation process. If after completing the above steps, you encounter any problems such as a failed download or installation, try the following solutions: • Restart your device. • Clear cache in your device’s storage option. This clears any potential errors that may have popped up during the operation. • Contact the BLU Advance L4 manufacturer for assistance if all else fails. Updating to Android 13 Tiramisu will take a short time, depending on various factors like internet connection speed or size of downloaded updates. Also, a phone may be updating some apps with the new update which can increase the time taken to complete. Be patient with the process, and if it takes longer than expected, avoid performing any actions until the operation is completed. How to update Android version? To update your Android version, follow these steps: 1. Go to your device’s settings 2. Scroll down and tap on “System” 3. Select “System Update” 4. Tap on “Check for update” 5. If an update is available, click “Download and Install” Note: You need to be connected to a stable Wi-Fi network and have enough storage space available for the update. Manufacturers such as Samsung and Google have specific websites for downloading updates. Make sure to check their official websites for more information on updating your device. Benefits of Updating BLU Advance L4 to Android 13 Tiramisu The update to Android 13 Tiramisu provides significant benefits to BLU Advance L4 users. Here are some of the advantages of updating your device: • Improved device performance: Android 13 Tiramisu comes with improved device performance, providing better user experience and smoother operation. • New features: With Android 13 Tiramisu, there are a lot of new features that users can take advantage of, such as enhanced privacy controls, redesigned notification panel and a customizable lock screen. • Better security features: With every update, Android keeps improving its security features to ensure that the device is protected from any potential threats. Updating your device to Android 13 Tiramisu is no different, with smarter and more effective security feature. • Optimization: Android 13 Tiramisu comes with optimization features that make the device more power-efficient and user-friendly. These features help prolong battery life and connect you with your apps and services quicker. Updating BLU Advance L4 to Android 13 Tiramisu allows users to take full advantage of the new and improved features introduced in the latest update. The device performance improves dramatically and is protected by the latest security measures. Conclusion In conclusion, updating your BLU Advance L4 to Android 13 Tiramisu is an essential step towards better device performance, security, and optimization. The new features and functionalities of Android 13 Tiramisu will provide users with a better and more enjoyable experience. The process of updating the device is relatively simple and takes a short amount of time. Users can also back up their data to avoid any loss during the process. The device will work seamlessly after the update, with no hindrance or lag. Keeping up with updates is an essential practice to ensure that the device performs optimally and is secure from any potential threats. If you’re looking to keep your device running smoothly and benefit from the latest features and security measures, then updating to Android 13 Tiramisu is the right choice. The steps are reasonably simple, and the benefits are immense, making it a worthwhile process for every BLU Advance L4 user. Updating opens doors to exciting features, better security measures and a more enjoyable user experience, improving the overall quality of the device.
ESSENTIALAI-STEM
Court: Feds can keep drone legal opinions secret - POLITICO Josh Gerstein on the Courts, Transparency, & More Get alerts from Under the Radar blog By signing up you agree to receive email newsletters or alerts from POLITICO. You can unsubscribe at any time. By JOSH GERSTEIN 01/02/2013 02:31 PM EST The U.S. Government has no legal duty to disclose legal opinions justifying the use of drones to kill suspected terrorist operatives abroad, although doing so would contribute to intelligent public debate over the legality of that practice, a federal judge wrote in a ruling issued Wednesday. In her decision, U.S. District Court Judge Colleen McMahon largely rejected lawsuits brought by the New York Times and the American Civil Liberties Union seeking to use the Freedom of Information Act to make public more details about the legal basis for the drone programs. There are indeed legitimate reasons, historical and legal, to question the legality of killings unilaterally authorized by the Executive that take place otherwise than on a 'hot' field of battle, McMahon wrote in a 68-page public opinion filed along with a secret, classified appendix. She cited the Constitution's guarantee of due process, the Constitutional provision regarding treason and a specific criminal statute that prohibits any American from killing another American abroad. McMahon said more detailed disclosure of the administration's legal rationale would allow for intelligent discussion and assessment of a tactic that (like torture before it) remains hotly debated. However, she concluded the law did not permit her to require such transparency. I find myself stuck in a paradoxical situation in which I cannot solve a problem because of contradictory constraints and rulesa veritable Catch-22. I can find no way around the thicket of laws and precedents that effectively allow the Executive Branch of our Government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws, while keeping the reason for their conclusion a secret, wrote McMahon. The Times and the ACLU had argued that public statements from President Barack Obama, Attorney General Eric Holder and other officials provided enough detail about the legal basis for the program that the underlying documents should also be released. McMahon disagreed. However, in so doing, she seemed to be tacitly criticizing the administration by describing those remarks as vague and imprecise. A key speech by Holder last Marchone repeatedly pointed to by the administration as laying out the legal basis for targeted killingswas a far cry from a legal research memorandum, McMahon wrote. The speech mentions relevant doctrines but does not explain the actual reasoning that led the Government to conclude that the targeted killing of a suspected terrorist complies with the law of war, or accords a suspect due process of law, or does not constitute assassination. In fact, in the approximately 15 minutes (out of an approximately 40 minute speech) that Attorney General Holder devoted to the subject of the Government's targeted killing program, he did not cite to a single specific constitutional provision (other than the Due Process clause), domestic statute (other than the AUMF), treaty obligation or legal precedent.....In fact, when you really dissect the speech, all it does is recite general principles of law and the Government's legal conclusion. In the March speech, Holder said U.S. citizens were entitled to due process before being targeted for killing abroad, but he said no judicial action was required to provide the legal process Americans are entitled to. (In a TV interview last year, Obama also insisted that due process was adhered to in the drone operations.) McMahon, a Clinton appointee, also said the law prohibited her from disputing executive branch officials' contention that many of the relevant documents were classified. It is beyond the power of this Court to conclude that a document has been improperly classified, she wrote. While judges are usually extremely deferential to Executive Branch claims regarding national security concerns and classification, few have said explicitly that they have no power to reject a classification. Indeed, the text of FOIA indicates that they do, and in very rare cases they have done so. The Justice Department acknowledged in response to the litigation that an opinion from Justice's Office of Legal Counsel addresses the targeted killing issue. The CIA and Pentagon may have more legal opinions on the point, but they have refused to provide any details about the documentsan approach McMahon ruled was legally permissible. McMahon did hold out the possibility she might order the release of two Defense Department memoranda regarding the impact of U.S. citizenship on attempts to target enemy fighters. She said the Pentagon's explanation of why the records were part of an internal deliberative process was wholly conclusory. A Justice Department spokesman said officials were reviewing the ruling. An attorney for the Times, David McCraw, said the newspaper plans to appeal. Judge McMahon's decision speaks eloquently and at length to the serious legal questions raised by the targeted-killing program and to why in a democracy the government should be addressing those questions openly and fully, McCraw said in statement. We continue to believe that disclosure is required under FOIA. The ACLU also expressed disappointment in the decision. This ruling denies the public access to crucial information about the government's extrajudicial killing of U.S. citizens and also effectively green-lights its practice of making selective and self-serving disclosures, ACLU deputy legal director Jameel Jaffer said in a statement. As the judge acknowledges, the targeted killing program raises profound questions about the appropriate limits on government power in our constitutional democracy. The public has a right to know more about the circumstances in which the government believes it can lawfully kill people, including U.S. citizens, who are far from any battlefield and have never been charged with a crime. UPDATE (Wednesday, 3:11 P.M.): This post has been updated with more from McMahon's opinion and a revised opinion released by the court. 2019 POLITICO LLC
NEWS-MULTISOURCE
China CO2 emissions from energy sector still on rise - researchers BEIJING/SHANGHAI (Reuters) - China’s emissions of the climate-warming greenhouse gas carbon dioxide from its energy sector are expected to increase this year and next, driven by rising oil and gas consumption instead of by coal, a team of industry experts warned on Thursday. The oil and gas sectors could add more than 200 million tonnes of carbon dioxide to China’s total emissions, meaning overall greenhouse gas from energy use would still rise 2% this year and 1.2% in 2020, said researchers with the “China Coal Cap Research Project” at a Thursday briefing. Meanwhile, emissions from coal are expected to fall 75.6 million tonnes in 2020 after a concerted effort to switch to cleaner energy sources, they said. The research team, led by the Natural Resources Defense Council, a U.S. think tank, is urging China to cut its coal use by at least 400 million tonnes - 8% of the total - over the 2021-2025 period. The council regularly submits recommendations to the Chinese government. “We are facing a question - either to cut coal consumption faster in order to offset the emission growth from oil and gas, or to control carbon emissions coming from oil and gas use as well,” said Yang Fuqiang, senior advisor with the Natural Resources Defense Council. China lowered the share of coal in its energy mix to 59% last year, from 68% in 2012, and the researchers said it was expected to fall to 55.3% by 2020. Although China is the world’s biggest carbon emitter, it is still designated as a developing country and has not yet been obliged to cut its absolute CO2 levels. However, it had promised to cut carbon intensity - the amount produced per unit of economic growth - by 40%-45% over the 2005-2020 period, and met the target two years in advance. A government researcher has also suggested China could meet a 2030 target to bring its emissions to a peak as early as 2022. But environmental groups have warned recently of signs that China is letting up in its campaign to shift away from coal in an attempt to stimulate economic growth and head off future energy shortages. Premier Li Keqiang said last month that China should continue to develop more clean coal and coal-fired power. Beijing approved 196 million tonnes of new coal production capacity in the first three quarters of 2019, and it has 226 gigawatts of new coal-fired electricity capacity at various stages of development. Reporting by Muyu Xu and David Stanway; Editing by Tom Hogue
NEWS-MULTISOURCE
Page:Scarface.pdf/261 His brother, Detective Lieutenant Ben Guarino, was a constant and interested spectator at the trial. He was a little surprised at his brother's appearance. Ben had taken on weight and his face looked bloated. He'd been hitting the high spots and it was beginning to tell on him. The last afternoon of the trial, Tony saw his brother seated beside Jane in the first row of spectators. Occasionally they chatted in whispers and several times he saw them exchange a smile. Jealous rage flowed through the gang leader like molten metal and his eyes blazed. With an effort he turned his attention back to the course of the trial. The climax was approaching rapidly. In their summation to the jury, Moran and his assistant obviously did their utmost to induce the twelve men to bring in a verdict of murder in the first degree. As they verbally flayed him with all the biting vituperation and sarcastic innuendo of which clever criminal lawyers are capable, Tony found it almost beyond his powers of self-control to remain in his chair. His strong hands gripped the chair arms until his knuckles gleamed white with the effort. His swarthy face flushed to a deep purple and his fingers itched to get at the throats of these hypocrites who characterized him an in­-
WIKI
Page:Quarterly Journal of the Geological Society of London, vol. 26.djvu/595 Dimensions of p 3 in Tapirus priscus. T. sinensis. T. malayanus. in. lines. in. lines. in. lines. Greatest transverse diameter 0 11-1/2 1 3 1 1 Antero-posterior diameter 0 10-1/2 1 0 0 11 Among minor differences may be noted a better development in the Chinese tooth of the inner extension of the hind part of the cingulum (r'), and a ridged production of opposite sides of the contiguous bases of the two elongate compressed conical lobes (c, d) at their inner ends, meeting, as it were, to close the inner entry to their dividing valley, e. Compared with Tapirus priscus, from the Eppelsheim miocene, the Chinese tooth is still larger than it is in comparison with the Sumatran species, and its transverse extension of crown is greater ; the degree is given in the above admeasurements*. The fangs are broken away from this premolar ; and in the hollow of the post- external root were crystals, determined by my friend and colleague, Professor Maskelyne, to be calcite in complete scalenohedra, a form or condition of carbonate of lime commonly met with in limestone caves. This was satisfactory in the degree in which it was confirmatory of the statement that the fossils were from a cave. The next molar, in the degree of transverse contraction of the hinder half of the crown, answers to the penultimate molar, m 2; it is from the left side ; the pulp-cavity, exposed by the breaking away of the fang, is partially filled with a reddish earth. Dimensions of m 2 in Tapirus priscus. T. Sinensis. T. Malayanus. in. lines. in. lines. in. lines. Transverse diameter 1 0 1 3 1 2 Antero-posterior diameter 0 10 1 2 1 0 The part of the cingulum continued inward from that which bends up the back part of the rear ridge is better developed in Tapirus sinensis than in Tapirus malayanus. The third upper molar (Pl. XXVIII. fig. 9) is the last of the right side, and repeats the differential characters, as to size, of the two preceding molars, as compared with Tapirus malayanus and T. priscus. The antexternal root is preserved, part of the postexternal one, and the base of the confluent pair supporting the inner side of the crown (c, d); in the cavity of the fang, exposed by fracture, were also crystals of calcite. The divergence of the outer and inner fangs carries the transverse breadth of that part of the tooth much beyond the same diameter of the crown. In the left lower penultimate premolar, p 3 (Pl. XXIX. fig. 6), besides a difference of size as compared with its homologne in Tapirus malayanus, there is a marked superiority of development of the ridge (t), continued from the outer angle of the anterior lobes (a) forward and inward, circumscribing a cavity in front of that lobe, — also in the height of the corresponding ridge from the outer angle of the 'Quarterly Journal of the Geological Society,' vol. xii. 1856, " Upper molar of Tapirus priscus, from the Crag of Suffolk." * It may also be estimated by comparing fig. 8, Pl. XXVIII. with fig. 9, p. 231, 2 g 2
WIKI
Bacterial swimming strategies and turbulence. (1/1135) Most bacteria in the ocean can be motile. Chemotaxis allows bacteria to detect nutrient gradients, and hence motility is believed to serve as a method of approaching sources of food. This picture is well established in a stagnant environment. In the ocean a shear microenvironment is associated with turbulence. This shear flow prevents clustering of bacteria around local nutrient sources if they swim in the commonly assumed "run-and-tumble" strategy. Recent observations, however, indicate a "back-and-forth" swimming behavior for marine bacteria. In a theoretical study we compare the two bacterial swimming strategies in a realistic ocean environment. The "back-and-forth" strategy is found to enable the bacteria to stay close to a nutrient source even under high shear. Furthermore, rotational diffusion driven by thermal noise can significantly enhance the efficiency of this strategy. The superiority of the "back-and-forth" strategy suggests that bacterial motility has a control function rather than an approach function under turbulent conditions.  (+info) In vitro characterization and micromechanics of tumor cell chemotactic protrusion, locomotion, and extravasation. (2/1135) The objective of this paper is to introduce some novel in vitro applications in characterizing human melanoma cell protrusion and migration in response to soluble extracellular matrix protein stimulation. Specifically, we describe two assay systems: (1) dual-micropipette manipulation and (2) flow-migration chamber. Applications of the dual-micropipet technique provided kinetic measure of cell movement, cyclic pseudopod protrusion, and subsequent cell locomotion governed by chemotactic molecular transport dynamics. Chemotactic concentration gradient was found to influence significantly pseudopod protrusion frequency and locomotion speed, but not the protrusion extension. To further characterize active tumor cell extravasation, a process that involves dynamic tumor cell adhesion to vascular endothelium under flow conditions and subsequent transendothelial migration in response to chemotactic signals from the interstitial space, we developed a flow-migration chemotaxis system. This assay enabled characterization of tumor cell transcellular migration in terms of chemotactic signal gradients, shear forces, and cell-substrate adhesion. Results suggest that shear flow plays significant roles in tumor cell extravasation that is regulated by both tumor cell motility and tumor cell adhesion to endothelial molecules in a cooperative process.  (+info) Fluid shear stress remodels expression and function of junctional proteins in cultured bone cells. (3/1135) We tested the hypothesis that fluid shear stress (tau) modifies the expression, function, and distribution of junctional proteins [connexin (Cx)43, Cx45, and zona occludens (ZO)-1] in cultured bone cells. Cell lines with osteoblastic (MC3T3-E1 cells) and osteocytic (MLO-Y4 cells) phenotypes were exposed to tau-values of 5 or 20 dyn/cm(2) for 1-3 h. Immunostaining indicated that at 5 dyn/cm(2), the distribution of Cx43, Cx45, and ZO-1 was moderately disrupted at cell membranes; at 20 dyn/cm(2), disruption was more severe. Intercellular coupling was significantly decreased at both shear stress levels. Western blots showed the downregulation of membrane-bound Cx43 and ZO-1 and the upregulation of cytosolic Cx43 and Cx45 at different levels of shear stress. Similarly, Northern blots revealed that expression of Cx43, Cx45, and ZO-1 was selectively up- and downregulated in response to different shear stress levels. These results indicate that in cultured bone cells, fluid shear stress disrupts junctional communication, rearranges junctional proteins, and determines de novo synthesis of specific connexins to an extent that depends on the magnitude of the shear stress. Such disconnection from the bone cell network may provide part of the signal whereby the disconnected cells or the remaining network initiate focal bone remodeling.  (+info) Shear bond strength of a new dental adhesive used to bond brackets to unetched enamel. (4/1135) The aims of the present study were to measure the shear bond strength of a new multipurpose dental adhesive, IntegraCem, for direct bonding of stainless steel and ceramic brackets to unetched enamel, and to determine the mode of bond failure. Both stainless steel and ceramic brackets (GAC) were bonded with IntegraCem to unetched extracted human premolars. After bonding, the teeth were either stored in a water bath at 37 degrees C for 3 days or passed 2500 thermocycles from 6 to 60 degrees C. Debonding was then performed with a shearing force using an Instron universal testing machine. The force was recorded at bond failure. The results showed that the shear bond strength achieved was between 6.7 and 10.8 megapascals (MPa). Bond failure occurred at the enamel-adhesive interface, enabling more efficient enamel clean up. The shear bond strengths measured suggest that IntegraCem adhesive may be effectively used in orthodontic treatment.  (+info) Shear properties of passive ventricular myocardium. (5/1135) We examined the shear properties of passive ventricular myocardium in six pig hearts. Samples (3 x 3 x 3 mm) were cut from adjacent regions of the lateral left ventricular midwall, with sides aligned with the principal material axes. Four cycles of sinusoidal simple shear (maximum shear displacements of 0.1-0.5) were applied separately to each specimen in two orthogonal directions. Resulting forces along the three axes were measured. Three specimens from each heart were tested in different orientations to cover all six modes of simple shear deformation. Passive myocardium has nonlinear viscoelastic shear properties with reproducible, directionally dependent softening as strain is increased. Shear properties were clearly anisotropic with respect to the three principal material directions: passive ventricular myocardium is least resistant to simple shear displacements imposed in the plane of the myocardial layers and most resistant to shear deformations that produce extension of the myocyte axis. Comparison of results for the six different shear modes suggests that simple shear deformation is resisted by elastic elements aligned with the microstructural axes of the tissue.  (+info) Comparative analysis of various platelet glycoprotein IIb/IIIa antagonists on shear-induced platelet activation and adhesion. (6/1135) Platelet accretion into arterial thrombus in stenotic arterial vessels involves shear-induced platelet activation and adhesion. The Cone and Plate(let) Analyzer (CPA) is designed to simulate such conditions in vitro under a rotating high shear rate in whole blood. In the present study, we evaluated various experimental conditions (including aspirin, temperature, and calcium concentration) and investigated the effects of small molecules along with peptide glycoprotein IIb/IIIa antagonists on platelet adhesion using the CPA system. Concentration-dependent effect of glycoprotein IIb/IIIa antagonists on shear-induced platelet adhesion showed marked differences in potencies: IC50 = 34, 35, 91, 438, and 606 nM for DPC802 (a specific glycoprotein IIb/IIIa antagonist), roxifiban, sibrafiban, lotrafiban, and orbofiban (free acid forms), respectively, and IC50 values of 43, 430, and 5781 nM for abciximab, tirofiban, and eptifibatide, respectively. Parallel study was also conducted to evaluate the effect of glycoprotein IIb/IIIa inhibitors using optical aggregometry. The potency of fibans in blocking shear-induced platelet adhesion correlated well with their binding affinity to the resting and activated glycoprotein IIb/IIIa receptors, as well as their "off-rates". Nevertheless, none of these fibans was able to effectively block shear-induced platelet adhesion at targeted clinical dosing regimens except for abciximab. These data suggest that glycoprotein IIb/IIIa antagonists that show similar efficacy in the inhibition of platelet aggregation in a static in vitro assay may differ substantially in a shear-based system of platelet adhesion. The clinical significance of this phenomenon awaits further investigation.  (+info) Shear stress magnitude and directionality modulate growth factor gene expression in preconditioned vascular endothelial cells. (7/1135) OBJECTIVE: The purpose of this study was to simultaneously monitor the transcriptional levels of 12 endothelial growth factor genes in response to alterations in wall shear stress (WSS) under conditions relevant to the development of intimal hyperplasia, a major cause of arterial bypass graft failure. METHODS: Human umbilical vein endothelial cells were preconditioned in vitro under steady flow (WSS, 15 dynes/cm(2)) for 24 hours before being subjected to WSS at 25 (Delta = +10), 15 (Delta = 0), 5 (Delta = -10), 2.5 (Delta = -12.5), and 0 (Delta = -15) dynes/cm(2) or low magnitude WSS reversal (-2.5 dynes/cm(2)) for 6 hours. A focused complementary DNA array was used to simultaneously measure messenger RNA expression levels for END1, endothelial nitric oxide synthase (NOS3), platelet-derived growth factor A, platelet-derived growth factor B (PDGFB), acidic fibroblast growth factor, basic fibroblast growth factor, transforming growth factor-alpha, transforming growth factor-beta, vascular endothelial growth factor, insulin-like growth factor-1, epidermal growth factor, and angiotensin converting enzyme. RESULTS: Preconditioning significantly (P <.05) increased the fold expression of NOS3 (4.1 +/- 1.4), basic fibroblast growth factor (3.90 +/- 1.16), vascular endothelial growth factor (3.39 +/- 1.04), and insulin-like growth factor-1 (2.8 +/- 0.7) but decreased END1 (0.47 +/- 0.05) and PDGFB (0.70 +/- 0.04) messenger RNA expression levels relative to no-flow controls, an effect that was sustained on removal from flow for 6 hours. Notably, the ratio of END1/NOS3 expression was diminished (0.11 +/- 0.03) relative to that of cells maintained in static culture. Although few differences in gene expression from baseline (15 dynes/cm(2)) were measured in cells exposed to either constant (Delta = 0) or step decreases (Delta = -10, -12.5, or -15 dynes/cm(2)) in WSS, marked changes were seen in the group exposed to a step increase in WSS (Delta = +10) or to WSS reversal. Low magnitude retrograde WSS evoked significant (P <.05) transcriptional changes in multiple genes, including elevated END1 (4.1 +/- 0.5), platelet-derived growth factor A (1.5 +/- 0.2), PDGFB (2.3 +/- 0.3), and transforming growth factor-beta (1.5 +/- 0.2) levels, but depressed NOS3 (0.60 +/- 0.17) levels, and a marked increase in END1/NOS3 (6.7 +/- 1.6) when compared with equal magnitude antegrade WSS (2.5 dynes/cm(2)). CONCLUSION: These results support the implementation of a preconditioning phase for in vitro WSS studies to establish a physiologic baseline. Our findings complement previous macroscale findings and are consistent with a cellular mechanism involving increased END1 and PDGFB levels, but decreased NOS3 levels, leading to intimal hyperplasia at regions of low magnitude reversing WSS.  (+info) Microrheology of human lung epithelial cells measured by atomic force microscopy. (8/1135) Lung epithelial cells are subjected to large cyclic forces from breathing. However, their response to dynamic stresses is poorly defined. We measured the complex shear modulus (G(*)(omega)) of human alveolar (A549) and bronchial (BEAS-2B) epithelial cells over three frequency decades (0.1-100 Hz) and at different loading forces (0.1-0.9 nN) with atomic force microscopy. G(*)(omega) was computed by correcting force-indentation oscillatory data for the tip-cell contact geometry and for the hydrodynamic viscous drag. Both cell types displayed similar viscoelastic properties. The storage modulus G'(omega) increased with frequency following a power law with exponent approximately 0.2. The loss modulus G"(omega) was approximately 2/3 lower and increased similarly to G'(omega) up to approximately 10 Hz, but exhibited a steeper rise at higher frequencies. The cells showed a weak force dependence of G'(omega) and G"(omega). G(*)(omega) conformed to the power-law model with a structural damping coefficient of approximately 0.3, indicating a coupling of elastic and dissipative processes within the cell. Power-law behavior implies a continuum distribution of stress relaxation time constants. This complex dynamics is consistent with the rheology of soft glassy materials close to a glass transition, thereby suggesting that structural disorder and metastability may be fundamental features of cell architecture.  (+info)
ESSENTIALAI-STEM
Reflux Surgery Reflux surgery is needed when the upper part of the stomach protrudes (herniates) into the upper inside of the chest (thorax). A bulge forms (a hiatus hernia) in the diaphragm above the stomach (oesophagus) due to a weakness in the diaphragm opening. Reflux Surgery in brief Reflux surgery can vary from the repair of a small portion of the stomach moving upwards to a larger defect. With a larger defect it is possible for the whole stomach and other organs to migrate up out of the abdominal cavity and up into the chest. Reflux Surgery Call us to make appointment +61 8 9386 2634 Call us to make appointment 9386 2634 Reflux Surgery What is Fundoplication? Fundoplication is the name for the surgical procedure used to repair a hiatal hernia. The procedure can be performed via open incision or keyhole (laparoscopic) approach, through the abdomen or through the chest. The procedure involves moving the lower end of the oesophagus and freeing the upper part of the stomach from the pinch point in the diaphragm. (The diaphragm acts like a flat, stretchy barrier separating the lungs above from the stomach and intestines underneath.) The hernia is reduced by bringing  stomach below the diaphragm. Then the opening on the diaphragm is narrowed with sutures. The repair is called a diaphragmatic crural repair or cruroplasty. During the Procedure To prevent recurrence of the hiatal hernia and reflux of gastric acid, the gastric fundus (upper part of the stomach) is wrapped around the lower part of the oesophagus. The surgeon can reinforce large defects and weak tissue with a synthetic or biological mesh. After the Procedure Most people recover from the laparoscopic reflux surgery quickly. In rare cases after reflux surgery, a person can have bloating and discomfort from gas build up because the person is not able to burp, has excess gas or flatulence. The surgeon will provide post surgical guidance to prevent the recurrence of the hernia, mesh infection or mesh erosion. Complications are fairly uncommon and 90% of the surgeries are a success. A person needs to notify the surgeon if the heartburn comes back or has difficulty swallowing. In a few cases, the surgeon may need to prolong a person’s hospitalization or repeat the surgery. Send us an email. Contact Advance Surgical ADDRESS Hollywood Medical Centre, Suite 8, 85 Monash Avenue Nedlands WA 6009 PHONE   +61 8 9386 2634 FAX       +61 8 9386 2167 HOURS Monday – Friday 9 - 5
ESSENTIALAI-STEM
User:Jordain 67/sandbox hello i am a vegan plz enter my body with your massive black money size computer
WIKI
Pandit Jawaharlal Nehru(Chacha Nehru) was the first prime minister of India. He was born on 14th of November, 1889 in Allahabad. He was the son of the famous lawyer Mr. Motilal Nehru and Mrs. Swarup Rani Nehru. Pandit Jawaharlal Nehru was well known for his love and care towards children as well as for roses. Even he was saying that children are like buds in the garden. He was a friend of children, loving and keeping them precious to his heart. So, children were calling him Chacha Nehru. He worked more for the education, welfare, and progress of children and youngsters after the independence of India. He also organized a 5-year plan to provide free meals and education to the school children for avoiding children malnutrition in India. He was saying that children are the power of the country as they would build a developed society in the future. Nehuruji committed himself to the nation by engaging in Civil Disobedience and Satyagraha. Even he managed to write one of the best books of Indian history the Discovery of India during the 4-year custody in Ahmednagar. Jawaharlal Nehru was nominated for the Nobel Peace Prize for 13 times but did not receive the global honour. It was Pandit Nehru who introduced Article 44 to the constitution which sought to establish India’s status as a secular state. There were many controversial stories about him, from giving interview to Adult magazine “Playboy” to being in a relationship with Louis Mountbatten’s wife. Did Jawaharlal Nehru give an interview to the adult magazine Playboy? This question remains a riddle since past more than half a century. Although, an interview of India’s first PM was published in the Playboy magazine in its October edition of 1963, Playboy magazine had highlighted that in its cover page too. The corridors of History has it that Lady Mountbatten, the wife of Louis Mountbatten had a very close friendship with Jawaharlal Nehru. India’s first prime minister Jawaharlal Nehru and the country’s last vicereine Edwina Mountbatten deeply loved each other but they had never mentioned anything about their relationship. It is said that more than 1.5 million people gathered to witness his cremation because he was loved by everyone. It was one of the largest gatherings of people. After the death of Jawaharlal Nehru in May 1964, the Children’s Day is celebrated on 14th November every year. Image Source : Google
FINEWEB-EDU
Does Smoking Marijuana Kill Brain Cells? Many people view smoking marijuana as one of the lesser drugs you can become addicted to. The purported beneficial side effects outweigh any potential negative associated with harder drug abuse. With marijuana quickly becoming legalized across the United States, people that were originally reluctant to try it due to legal ramifications might be more inclined to try it. Other drugs like alcohol, meth, and heroin have shown to cause irreversible brain damage if left unchecked, and studies surrounding prolonged marijuana use remain scarce. However, these potential new users should try to find the answer to one critical question that has followed regular cannabis use for years — does smoking marijuana kill brain cells? How Does Marijuana Affect Your Brain Chemistry? Our brain chemistry is a complex subject with various mysteries still being studied by the medical and scientific communities. However, what we do know is that regular drug use does have a noticeable impact on your brain’s chemical makeup. Different drugs rewrite your reactions to specific actions and release more dopamine when you perform that action. The more you partake in a certain vice, the more your brain will associate that activity with a positive outcome — in the process, rewriting your brain chemistry. While long-term studies on cannabis use aren’t as common as other substances, the studies that have been conducted show that prolonged usage can have a noticeable impact on your brain activity. The psychoactive chemical in marijuana is tetrahydrocannabinol (THC), which attaches itself to the brain’s cannabinoid receptors. These connect to nerves in the brain responsible for memory, appetite, pain regulation, and mood. What Does the Science Say? When it comes to the long-term effects that regular marijuana use has on brain chemistry and development, the studies aren’t there to make definitive claims one way or the other. However, there does seem to be a correlation between cannabis users, ongoing brain development, and decreased IQs later in life. People under the age of 25 have a potentially higher risk of experiencing these negative effects marijuana has on brain chemistry while their brains are still in the development stages. Some studies have shown that regular marijuana use in your teenage years can significantly decrease your IQ points in middle age. What About Synthetic Weed? In recent years, the popularity of “synthetic weed” has dramatically increased based on the promise that you get the same high as natural marijuana without it appearing on a tox screen. However, this artificial substance causes a significantly stronger reaction in your brain, and the resulting side effects can prove far more intense and harmful for substance abusers. Synthetic marijuana has far fewer studies conducted than its natural counterparts, but the higher potency can lead to harder-to-break addictions and more adverse effects on your brain. The Long-Term Effects of Regular Marijuana Use While everyone knows that regular cannabis users often have increased appetites, trouble remembering, and paranoia in the short term, the long-term effects shouldn’t go unnoticed. These complications can include: • Signs of cognitive impairment • Memory loss • Increased tolerance • Notable dependency Find a Marijuana Addiction Treatment Center in Mahanoy City, PA, Today! While many recreational users may see their regular cannabis as something that they don’t need to seek help from, there are potential long-term side effects that they should consider. While the scientific research may not definitively prove that their prolonged use kills brain cells, the research that has been done does show a correlation between the drug’s impact on young people while their brain is still developing. Provide your teenagers and young adults with a space where they can talk about their experiences with marijuana and receive the help and support they need to recover before the potential long-term side effects can cause lasting damage. Silver Pines Treatment Center has the substance abuse treatment programs you need to get the necessary support to make a positive change in your life. If you or a loved one is struggling with marijuana addition, contact our team to learn more about our programs and admissions procedures. Tags: Sources https://www.addictioncenter.com/drugs/marijuana/kill-brain-cells/ Does Marijuana Kill Brain Cells? https://recovered.org/marijuana/does-marijuana-kill-brain-cells
ESSENTIALAI-STEM
Up and Down the River: Suffrage success Today's article is brought to you by the word "suffrage," which, despite sounding like pain and suffering, means "the right of voting." Its roots are in classical Latin, and it was used in relationship to voting from the 16th century onward. "Franchise" and "enfranchisement" are terms that can be used as synonyms as can "ballot" and "vote," but for now, suffrage will do. The term is pertinent this month, since August 2020 marks the 100th year since women in the whole United States were enfranchised. The effort was not without the aforesaid "pain and suffering," since the work to gain the vote for women began way back in the 1800s. As a constitutional amendment, the idea was first introduced in 1878, but it was not until New York, as a state, agreed to let women vote in 1917, and then President Wilson changed his position to support such an amendment in 1918, that the political balance shifted to allow passage of the 19th Amendment. In between those times, there were countless marches, demonstrations, speeches, campaigns, a silent vigil in front of the White House, and even hunger strikes in jail, all with the goal of gaining the right to vote for fully half of the U.S. population. There were successes in that time: nine western states granted women the right to vote. And please note that the term used here is "granted." Women were not GIVEN the right to vote; they EARNED it, through lectures, lobbying, marching, picketing, and certain acts of civil disobedience (trying to vote). If you'd like to "watch it happen," PBS has an excellent two-part program simply called "The Vote" streaming this month. It is so worth a watch. Learning about that slice of our history makes one wonder "What would I have done if I lived in that time period?" Thousands of women did something, some of them more notably than others, but this milestone was reached because of the participation of women from all walks of life and economic backgrounds. On May 21, 1919, the U.S. House of Representatives passed the amendment. Two weeks later, on June 4, 1919, the Senate followed suit. But it wasn't until August 18, 1920, when Tennessee became the 36th state to ratify the amendment, that the required three-fourths of the states was achieved. On August 26, 1920, the Secretary of State certified the ratification, and the face of the American electorate was changed forever. The success of the 19th Amendment did not extend to women of color, however. And despite the efforts of the National Women's Party to pass the Equal Rights Amendment, it took until the Voting Rights Act of 1965 to fully enfranchise all women citizens of the United States. Their suffrage took longer. Their ultimate success is important to note today because 2020, besides being the 100th anniversary, is an election year. The right to vote should not be taken for granted. It should be exercised each and every time an election takes place as a tribute to those who labored so diligently to earn it for us.
FINEWEB-EDU
List of Irgun attacks During the 1936–1939 Arab revolt in Palestine against the Mandatory Palestine, the militant Zionist group Irgun carried out 60 attacks against Palestinian people and the British Army. Irgun was described as a terrorist organization by The New York Times, the Anglo-American Committee of Enquiry, prominent world figures such as Winston Churchill and Jewish figures such as Hannah Arendt, Albert Einstein, and many others. The Israeli Ministry of Foreign Affairs describes it as "an underground organization." The New York Times at the time cited sources in an investigative piece which linked the Haganah paramilitary group to Irgun attacks such as the King David Hotel bombing. Irgun launched a series of attacks which lasted until the founding of Israel. All told, Irgun attacks against Arab targets resulted in at least 250 Arab deaths during this period. The following is a list of attacks resulting in death attributed to Irgun that took place during the 1930s and 1940s. Irgun conducted at least 60 operations altogether during this period.
WIKI
How to Import Highlights from Medium into Glasp How to Import Highlights from Medium into Glasp We added a new feature to import Medium highlights into Glasp. You can sync all the highlights on Medium with Glasp, organize them, and share them with others easily. If you haven't signed up for Glasp or installed the Glasp browser extension, please do so. You can refer to this tutorial. Step 1: Go to the Home or My Highlights page Please click your profile icon at the top right on the Home or My Highlights page. It shows a modal, so click Settings to go to the Settings page. On the Settings page, click Integrations on the left. Then, click Import on the Medium section. Step 2: Connect with Medium It opens a modal to connect with Medium. If you know your Medium integration token, please insert it. If you don't know it, please click the Medium Integration Token text button. It opens Medium's setting page. You can name the token whatever you want. Click Get token. Then, you can see the token generated. So, copy the token and paste it on the modal to connect Glasp with Medium. Step 3: Sync Glasp with Medium After pasting the Medium token, please click Save Integration Token. It automatically starts syncing Medium highlights with Glasp. The color of highlights is dependent on your default highlight color setting. To update it, please check the tutorial below. How to Set Default Highlight Color On Glasp, you can set the default color for highlights. This setting is used when you import highlights from other note-taking apps such as Medium, Readwise, etc. How to Import Highlights from ReadwiseWe added a new feature to import highlights from Readwise to Glasp. With this feature, you can see Step 4: View imported Highlights on Glasp Once importing highlights is finished, please click Go to My Highlights. It takes you to the My Highlights page. You can see all the imported highlights on the My Highlights page. The imported date is set to the date when you import highlights from Medium. By default, the imported highlights are visible to anyone, so be careful when you sync with Medium. If you'd like to hide your highlights, please upgrade to the premium plan. If you see any issues importing highlights from Medium, please try it again. If the issue continues, please let us know through the bug report form, Slack, Twitter, or LinkedIn 🙏 (Optional) Step 5: Delete the imported highlights If you'd like to delete the imported highlights, please go to the My Highlights page. Select the imported article you'd like to delete. At the top right, there is the three dots button, so please click it. You can see Delete Highlight to delete the article and highlights. Before you leave If you have any questions, please look at the FAQ or message us. 👉 FAQs 👉 Twitter 👉 Slack See you next time, Glasp team Twitter Share Your Excitement Ready to highlight and find good content? Glasp is a social web highlighter that people can highlight and organize quotes and thoughts from the web, and access other like-minded people’s learning. Start Highlighting
ESSENTIALAI-STEM
Diseases About Sleep Disorder Sleep is absolutely essential for normal, healthy function. Scientists and medical professionals still have much to learn about this complicated physiological phenomenon. According to the National Institute of Neurological Disorders and Stroke, about 40 million people in the United States suffer from chronic long-term sleep disorders each year and an additional 20 million people experience occasional sleep problems. There are more than 70 different sleep disorders, which are generally classified into one of three categories: * lack of sleep (e.g., insomnia), * disturbed sleep (e.g., obstructive sleep apnea), and * excessive sleep (e.g., narcolepsy). In most cases, sleep disorders can be easily managed once they are properly diagnosed. Insomnia is the most common sleep disorder. It occurs more often in women and in the elderly. The amount of sleep that a person needs to function in a normal manner depends on several factors, including age. Infants sleep most of the day (about 16 hours); teenagers usually need about 9 hours a day; and adults need an average of 7 to 8 hours a day. Although older adults require about as much sleep as younger adults, they usually sleep for shorter periods and spend less time in deep stages of sleep. About 50% of adults over the age of 65 have some type of sleep disorder, although it is not clear whether this is a normal part of aging or a result of other factors, such as medications that are commonly used by older people. Contact Contact - Address 306 Alankar Point, Geeta Bhavan Square, Indore - 452001
ESSENTIALAI-STEM
Talk:Nokia X5 requesting there be seperate pages for X5-00 & X5-01, i am creating a seperate page for X5-01. This page needs renaming to X5-00 after that. Rajeshontheweb (talk) 07:57, 27 November 2010 (UTC)
WIKI
 Repair and operation of the car Mazda 626 - 3.6.10. Removal and installation of nozzles// Mazda 626 1991-1998 of release Repair and operation of the car Mazda 626 + 1. Maintenance instruction + 2. Maintenance - 3. Engines    + 3.1. Petrol engines (1,6 and 1,8 liters)    + 3.2. Petrol 4-cylinder engine (2 liters)    + 3.3. Petrol V6 engine (2,5 liters)    + 3.4. Partition of engines (1,6 and 1,8 liters)    + 3.5. Partition of engines (2,0 and 2,5 liters of V6)    - 3.6. Diesel engine 2,0 liters       3.6.1. Technical characteristics       3.6.2. Maintenance, repair       3.6.3. Principle of operation of the diesel engine       + 3.6.4. Gear belt, installation of phases of gas distribution       3.6.5. System of preliminary warming up       3.6.6. Check of the device of preliminary warming up       3.6.7. Removal of air from fuel system       3.6.8. Check and replacement of the electromagnetic valve of a cut-off of fuel       3.6.9. Check and adjustment of turns of idling       3.6.10. Removal and installation of nozzles       3.6.11. Removal of the vacuum pump       3.6.12. Diagnostics of malfunctions of a power supply system of the diesel engine    + 3.7. Systems of electric equipment of the engine + 4. Heating and ventilation + 5. Fuel system + 6. Exhaust system + 7. Transmissions + 8. Coupling and half shafts + 9. Brake system + 10. Running gear + 11. Body + 12. Electric equipment + 13. Electrical circuitries + 14. Useful tips 3.6.10. Removal and installation of nozzles GENERAL INFORMATION Defective nozzles can cause a strong detonation of the engine and as a result damage of bearings. In the presence of such symptoms leave the engine to idle and in turn release cap nuts of the pipeline of injection. If the detonation disappears when weakening any cap nut, then it indicates the corresponding defective nozzle. The defective nozzle can be defined, consistently weakening cap nuts and on bystry to the course (at an engine warming up). If after weakening of a cap nut speed does not change, it indicates the corresponding defective nozzle. The nozzle can be checked by means of the manometer. (Work in a workshop; the required value of a pressure of injection: 135 bars). The first signs of violation of work of a nozzle are shown as follows:   – false ignition;   – a detonation in one or several cylinders;   – engine overheat;   – decrease engine capacity;   – excessively strong black exhaust;   – increase in fuel consumption. Removal PERFORMANCE ORDER 1. Disconnect a cable of negative weight from the accumulator. Prevention At the same time contents of electronic memory devices, for example memory of defects of the engine or a code of the radio receiver are erased. Before shutdown of the accumulator it is necessary to read subsection 2.11. 2. Carefully clear outside a cleaner or diesel fuel of a tube of injection and by-pass fuel tubes. 3. Remove injection tubes in a set for what weaken cap nuts (are specified by shooters) on the pump and on nozzles. Prevention Do not break a form of a bend of tubes. 4. Remove nozzles and postpone in the same order, as well as it is necessary to establish. Prevention In the combustion chamber through openings of nozzles dirt should not get. 5. In each opening there is a wavy laying and a washer which are subject to replacement. 6. Needles of nozzles should not have the beaten-out and rough places of landing. Remove a deposit from nozzles the wooden pallet. Prevention Do not process a nozzle and a needle of a nozzle a wire, a file or an emery paper at all. Do not mix a detail of different forms. Installation Prevention Observe adjusting situation. The banner of nozzles can cause their deformation and by that to lead to lag of a needle or other damages. PERFORMANCE ORDER 1. Put nozzles (2) and tighten with effort 65 N. of m. Establish 4 new wavy laying (4) and pro-masonry washers (3). 2. Put injection tubes, tighten cap nuts with 25 N.' effort of m. 3. Put tubes of removal of fuel with new laying and tighten nuts with effort 30 N. of m. 4. On all nozzles weaken cap nuts of tubes of injection a little. 5. Turn the engine a starter to a fuel exit from injection tubes. Fix injection tubes with the ordered effort of an inhaling. 6. Install the muffler of air supply and the channel of the resonator. 7. Connect a cable of negative weight to the accumulator. 8. If there are hours, expose time and set a security code of the radio receiver. 9710b8b3
ESSENTIALAI-STEM
Conditional sale A conditional sale is a real estate transaction where the parties have set conditions. A standard real estate transaction usually begins when a prospective purchaser submits an offer to purchase to the vendor of a property. As in a standard offer, a conditional offer sets out the terms of the sale such as the purchase price, the date of closing, the names of the parties, and the amount of any required deposit, but it also stipulates various conditions which must be met in order for the contract to be binding on the parties. These conditions may include approval by a co-purchaser, financing acceptable to the purchaser, the receipt and review of a survey showing that the buildings on the property comply with local zoning regulations, a title search showing no unacceptable liens or encumbrances, confirmation from the current mortgagee that the property is not in foreclosure, and the like. If the offer is accepted by the vendor, the offer to purchase will become a contract binding on the parties when all conditions are satisfied. An alternative to a conditional sale is an invitation to treat. Unlike a conditional sale, an invitation to treat does not become binding upon satisfaction of any conditions. Issues arise as to the distinction between actions which constitute an offer or an invitation to treat, especially when the intentions of the parties are not clearly specified at the time.
WIKI
Wikipedia:Suspected sock puppets/Believe It Or Not (2nd) User:The Other Hand * Suspected sock puppeteer * Suspected sock puppets * Report submission by ThuranX (talk) 21:21, 6 January 2009 (UTC) Prior case was closed just days ago - (can't find proper link anymore). Gone To The Library's only edit, ever, (Special:Contributions/Gone_To_The_Library contribs) is to the Talk:Gratin gratin talk page, again insisting we go by two references already in the page. . Looks like a duck test situation, and matchees TOH's behavior with User:Michael Grossman, another of his socks. * Evidence * Comments * Please remember to notify all accounts listed as possibly linked to the sock puppetry in question (instructions). * Conclusions
WIKI
Has Serial wire debug debug. Why would you ever get one without unless you are a clueless newbie like Ciro Santilli?!?! You can connect form an Ubuntu 22.04 host as: screen /dev/ttyACM0 115200 When in screen, you can Ctrl + C to kill main.py, and then execution stops and you are left in a Python shell. From there: • Ctrl + D: reboots • Ctrl + A K: kills the GNU screen window. Execution continues normally but be aware of: Raspberry Pi Pico W freezes a few seconds after after screen disconnects from UART. The first/only way Ciro could find was with ampy: stackoverflow.com/questions/74150782/how-to-run-a-micropython-host-script-file-on-the-raspbery-pi-pico-from-the-host/74150783#74150783 That just worked and it worked perfectly! python3 -m pip install --user adafruit-ampy ampy --port /dev/ttyACM0 run blink.py TODO: possible with rshell? Install on Ubuntu 22.04: python3 -m pip install --user adafruit-ampy Ctrl + X. Documented by running help repl from the main shell. Our examples at: rpi-pico-w/upython. The examples can be run as described at Program Raspberry Pi Pico W with MicroPython. Ubuntu 22.04 build just worked, nice! Much feels much cleaner than the Micro Bit C setup: sudo apt install cmake gcc-arm-none-eabi libnewlib-arm-none-eabi libstdc++-arm-none-eabi-newlib git clone https://github.com/raspberrypi/pico-sdk cd pico-sdk git checkout 2e6142b15b8a75c1227dd3edbe839193b2bf9041 cd .. git clone https://github.com/raspberrypi/pico-examples cd pico-examples git checkout a7ad17156bf60842ee55c8f86cd39e9cd7427c1d cd .. export PICO_SDK_PATH="$(pwd)/pico-sdk" cd pico-exampes mkdir build cd build # Board selection. # https://www.raspberrypi.com/documentation/microcontrollers/c_sdk.html also says you can give wifi ID and password here for W. cmake -DPICO_BOARD=pico_w .. make -j Then we install the programs just like any other UF2 but plugging it in with BOOTSEL pressed and copying the UF2 over, e.g.: cp pico_w/blink/picow_blink.uf2 /media/$USER/RPI-RP2/ Note that there is a separate example for the W and non W LED, for non-W it is: cp blink/blink.uf2 /media/$USER/RPI-RP2/ Also tested the UART over USB example: cp hello_world/usb/hello_usb.uf2 /media/$USER/RPI-RP2/ You can then see the UART messages with: screen /dev/ttyACM0 115200 TODO understand the proper debug setup, and a flash setup that doesn't require us to plug out and replug the thing every two seconds. www.electronicshub.org/programming-raspberry-pi-pico-with-swd/ appears to describe it, with SWD to do both debug and flash. To do it, you seem need another board with GPIO, e.g. a Raspberry Pi, the laptop alone is not enough. Articles by others on the same topic (0) There are currently no matching articles See all articles in the same topic
ESSENTIALAI-STEM
User:Grgr111521 Hello! I'll try to contribute what I know here and cite it appropriately and remove not relevantly cited information.
WIKI
Often asked: What Is The Components Of Fitness? What is the definition of the components of fitness? What is a ‘fitness component’ A fitness component is simply a way of identifying a certain part of a person’s fitness – essentially you are labelling a subset of changes that you want to occur as a component. For example, if a client wants to be more flexible I’d work on the ‘flexibility’ component of their fitness. What are the 5 main components of fitness? 5 Components of Physical Fitness • Cardiovascular Endurance. • Muscular Strength. • Muscular endurance. • Flexibility. • Body Composition. What are the 3 main components of fitness? A complete fitness and exercise program should incorporate three basic components: Endurance (Aerobic), Flexibility, and Strength. Each of these components has specific guidelines, which govern their effectiveness. What are the 14 components of fitness? Definitions of the following components of fitness: • agility. • balance. • cardiovascular endurance (aerobic power) • coordination. • flexibility. • muscular endurance. • power/explosive strength (anaerobic power) • reaction time. What are the 10 components of physical fitness and their meaning? In this post we’re going to dive a little deeper into what we believe to be the 10 components of fitness, and why they’re important to include in your training programme: endurance; stamina; strength; flexibility; power; speed; coordination; agility; balance & accuracy. You might be interested:  Quick Answer: Which Response Is A Complete List Of The Skill Components Of Fitness? What are the six components of fitness? So, what defines true physical fitness? Considering the total body, there are six elements of fitness: aerobic capacity, body structure, body composition, balance, muscular flexibility and strength. Who needs physical fitness? To put it simply, physical activity and exercise is important for everyone. Children, adolescents, and adults of all ages need regular physical activity. Physical activity promotes good health, and you should stay active throughout all stages of your life regardless of your body type or BMI. What are the 4 steps of a fitness plan? There are four stages of mastery for physical fitness; Introduce, Improve, Master, and Generalize. The primary goal when introducing exercise programs is to pair them with reinforcement, taking new and potentially frustrating tasks and adding a component of enjoyment. What are the 2 types of exercise? There are two main types of exercise: aerobic and resistance. Both are important, since each conveys different health benefits. What component of fitness is jumping jacks? Aerobic Qualities Jumping jacks is an aerobic activity. It is a full-body, rhythmic movement that elevates your heart rate which burns calories and leads to weight loss. It also serves to increase blood flow, which improves capillary function within your arms and legs. What are the 7 components of fitness? Physical fitness components include: cardiorespiratory endurance, body composition, muscular strength, muscular endurance, and flexibility. Comprehension check: • agility, • coordination, • balance, • power, • reaction time, • and speed (American College of Sports Medicine, 2013). What are the 9 components of physical fitness? Power, Agility, Co-Ordination, Balance, Strength, Muscular Endurance, Cardiovascular Endurance, Flexibility and Speed. You might be interested:  Readers ask: Which One Of The 5 Components Of Fitness Does Situps Fall Into? What are the 3 types of fitness activities? The Three Kinds of Fitness • Aerobic fitness. Aerobic activities condition your heart and lungs. • Muscle strengthening. Stronger muscles can mean either more powerful muscles that can do bigger jobs (such as lifting heavier weights) or muscles that will work longer before becoming exhausted (endurance). • Flexibility. Leave a Reply Your email address will not be published. Required fields are marked *
ESSENTIALAI-STEM