Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Citations:assassin * 1818 — Mary Shelley. Frankenstein. * "Come, Victor; not brooding thoughts of vengeance against the assassin, but with feelings of peace and gentleness, that will heal, instead of festering, the wounds of our minds.
WIKI
Do Whales live in Groups? How do Groups of Whales Behave? Written by Cindy Rasmussen Published: November 23, 2021 Image Credit Chase Dekker/Shutterstock.com Share this post on: In the spring of 2021 a video of a thousand dolphins swimming together was filmed off the coast of California. A group of whale watchers were entertained for hours while this group of dolphins frolicked in the ocean waters. A group this size is larger than normally seen but not that rare.  Dolphins generally live in pods of 5-20 dolphins, but these smaller pods will often come together with other pods to form larger pods for feeding or mating. Dolphins are one species that pod life has been extensively studied, but what other whales live in pods? Are whales social creatures or do some prefer to live alone? Do any whales form pods with other whales outside their species? Why do some whales live in pods? Let’s take a look at the pod life! What is a group of whales called? What do whales eat - a pod of humbacks feeding A group of whales feeding together. Humpback whales form pods during migrations Chase Dekker/Shutterstock.com A group of whales is known as a “pod.” Other terms used for groups of whales are a “gam” and “school,” but pod is by far the most common name. The term “pod” refers to a group of animals living together. In general smaller animals are more likely than larger animals to form pods. The whale group Cetacea is divided into two suborders, Baleen whales (Mysticeti) and Toothed whales (Odontceti). Baleen whales are the largest whales, largest mammals on Earth actually, and toothed whales are significantly smaller and include dolphins, porpoises and belugas. So it makes sense that most baleen whales are solitary animals that come together only to mate and most toothed whales live in pods ranging in size from 2-50 with pods coming together to form larger pods at times. There are exceptions to these guidelines with some baleen whales consistently seen in pods of 3, like the Sei whales and some like the humpback whales that form pods during migration. There are some species of toothed whales, like the Amazon River dolphin that is a solitary animal and only get together to mate. Why do dolphins live in pods? Group of Whales - pod-of-long-beaked-common-dolphins A pod of dolphins bursts out of the water Chase Dekker/Shutterstock.com Dolphins provide a good example of what pod life is like, they are also one of the most researched marine animal providing years of data over the years. The common bottlenose dolphin is one of the dolphins that have been studied and these dolphins can commonly be found in groups of 2-50, forming larger pods as well. These smaller pods are sometimes referred to as nursery groups because it is comprised of a group of females dolphins and their calves. The mothers teach their young to hunt, find food, avoid predators and they nurture their young ones. The baby dolphins will stay close to their mothers for 3-6 years. Dolphins from smaller pods will join together with other pods for hunting and protection. A typical hunt may look like a group of 400 dolphins spread out in the same area foraging for food and also watching out for predators. They feed on prey that often congregate in schools, like squid, anchovies, and sardines. When they find a school of potential prey the dolphins will start to swim closer together and then encircle the prey and begin an attack. If a group of dolphins encounters a group of killer whales (their predators) they will immediately form a tight group and try to flee together, with the younger dolphins learning to stay with the group. Another reason dolphins may form pods is because they are very social animals. They use a combination of clicks and whistles to communicate with each other and they are able to teach each other. One group of dolphins uses sponges on their beaks as protection when they dig for food in the sand. Young dolphins learn how to do this by watching their mothers. Dolphins in zoos and aquariums have been able to be trained to do a variety of skills and tricks and seem to be very social with their trainers.  With their beaks that seem to always be smiling it is no wonder that we have a fascination with these water wonders. Do humpback whales form pods to migrate? mother and baby humpback whale swimming together Mother and baby humpback whale swimming together Humpback whales migrate to warmer waters during the winter. Whales from the northern hemisphere will make their way to the warm waters off Hawaii and whales from the southern hemisphere migrate to eastern Australia. One research study followed humpback whale’s migration over a period of two years, following both the northward and southward movement. These whales were congregating off the east coast of Australia. The result of the study was that they found the majority of the whales paired up, male-female, for the long migration. Of all of the whales the study found, “231 singletons, 257 pairs, 63 trios, 7 quads and 4 pods containing more than 5 individuals were observed during two land-based surveys carried out throughout the northward migration in 1991 and 1993.” So there was some variety, with a large group of whales making a solo trek and a group that preferred to travel in threes. Whales that are pods of three are often identified as a female, her calf and an escort or mate-guard. The large number of whales that make the migration paired is thought to be mating related, like a Honeymoon in Hawaii! What is a competition pod? Humpback Whale (Megaptera novaeangliae) breaching at Puerto Lopez, Ecuador. A humpback breaching Paul S. Wolf/Shutterstock.com Whale watchers can travel to Maui between December and April or to eastern Australia between May and November to watch a spectacular display of the whale mating season. A group of male humpback whales will form a completion pod of 3-25 whales that are eager to pursue a female whale. They jockey to get close to the female to either overtake her male escort or win the right to mate with her. The female and her escort remain in the center of the group and the escort tries to defend himself to remain with the female. Whales can be observed slapping the water with their tails (flukes) slapping each other with their tails, bumping heads and racing quickly in pursuit of a female. During the competition whales may lose interest and leave or other whales may be enticed by the action and join in. The action can last for a few hours until a “winner” is determined. Do killer whales hunt in pods like a pack of wolves? Fastest Sea Animal: Killer Whale The Orca are the largest of the dolphins and are very intelligent animals. Andrea Izzotti/Shutterstock.com Killer whales seem to have an advanced social structure with pods forming based on the type of diet they prefer. In the Pacific Northwest, killer whales (or orcas) form pods of 2-50 whales and they do hunt together like a pack of wolves. Researchers have found that killer whales tend to either be residential, meaning they live and hunt in the same area, or transient traveling around to find the food according to availability. The group of residential whales is fish eaters and they hunt for fish like salmon. The other group hunts for marine mammals like sea lions, walruses and seals. A producer on the TV show Frozen Planet on BBC Earth showed video of a group of killer whales working together to knock a seal off of its floating ice float. Four or five whales swam together under the ice to create a wave that knocked the seal into the water! Dinner is served! Killer whales are very intelligent and have a variety of techniques to capture their prey. They have learned to even attack sharks. Some of the group will force the shark to the surface and another one will use their tail to slap the shark and then flip them over making them more vulnerable. They then can use their sharp teeth to tear into the shark for dinner. Did a group of belugas “adopt” a narwhal? Animals That Use Sonar-Beluga whale Mother and baby Beluga whale swimming together. Toothed whales use echolocation to navigate in murky water with low visibility. CampCrazy Photography/Shutterstock.com One story from the Smithsonian Magazine reports that a lone narwhal was sighted swimming with a group of belugas. Researchers were studying the beluga group by using drones as surveillance. The scientists have video of a narwhal swimming with a pod of 11-12 belugas. It is believed that they are all juvenile males. The markings on the narwhal indicate that it is the same one that has been observed with this group before over a span of three years. Another interesting twist is that the narwhals typically live nowhere near these belugas with his home waters being 600 miles north of the St. Lawrence River where these belugas are. Belugas and narwhals do belong to the same family (Monodontidae), but don’t typically cross paths because the narwhals live in the arctic waters. Belugas are very social animals and seem to stick together. Researches have tracked the same beluga pods of related whales spending the summers together at the same location year after year. Sometimes more than a thousand belugas will gather in the same waters off the shore. Do narwhals live in pods? narwhals swimming together A narwhal’s horn is actually a tooth! Narwhals are a bit trickier to study due to the fact they live in the icy arctic waters and rarely come close to shore. These whales look like dark colored belugas with their most pronounced feature being a unicorn-like horn (it is actually a tooth) coming out of their face area (just the males). Their bodies can grow to be 12-20 feet long and their horn-like tooth can be up to 10 feet long! They are a social animal and live in pods of 2-20 whales and they often join pods together to from large groups of up to a few hundred. The pods vary and can be a group of males, a group of females or a mixed group. Narwhals do migrate and spend time in the same wintering and summering waters. They migrate together in large groups and can be seen leaping out of the water together and diving at the same time like some kind of elaborate synchronized swimming team! Share this post on: About the Author I'm a Wildlife Conservation Author and Journalist, raising awareness and suggesting actions we can all do to help wildlife. As a former elementary school teacher I have a love for learning and teaching. My goal is to get kids fired-up about animals. Learning about the animals we share this earth with makes life better. When I am not writing I am living the good life with my husband and six kids (we are down to two that are still at home...and our giant labradoodle, Tango!). More from A-Z Animals
ESSENTIALAI-STEM
Jane Miller Jane Miller (born 1949) is an American poet. Life Jane Miller was born in New York and lives in Tucson, Arizona. She served as a professor for many years in the Creative Writing Program at the University of Arizona—including a stint as its Director—and is currently Visiting Poet at The University of Texas Michener Center in Austin. She has published ten volumes of poetry of which The Greater Leisures was a National Poetry Series selection. ''Who Is Trixie the Trasher? and Other Questions'' (Copper Canyon Press, 2018) is her most recent book of poems. Her numerous awards include a Western States Book Award, a Lila Wallace Reader's Digest Award, a Guggenheim fellowship and two fellowships from the National Endowment for the Arts. Awards * National Poetry Series Selection for The Greater Leisures * Western States Book Award for August Zero * Two National Endowment for the Arts Fellowships * Lila Wallace Reader’s Digest Award * John Simon Guggenheim Memorial Foundation Fellowship * Audre Lorde Award Works * "Life's Ironies," poets.org, 2014 * Black Holes Black Stockings * Heartbeats * Black Holes Black Stockings * Heartbeats * Black Holes Black Stockings * Heartbeats * Black Holes Black Stockings * Heartbeats * Black Holes Black Stockings * Heartbeats * Heartbeats Prose * Seven Mediterraneans Essays * "Sea Level." * "Sea Level." * "Sea Level." Ploughshares * "Scene", Ploughshares, Spring 1979 * "Without a Name for This", Ploughshares, Spring 1979 * "A Dream of Broken Glass ", Ploughshares, Spring 1979 * "Eavesdropping at the Swim Club, 1934 ", Ploughshares, Spring 1979 * "Blanks for New Things", Ploughshares, Winter 1990-91 * "Warrior", Ploughshares, Winter 1990-91 * "The General's Briefing", Ploughshares, Winter 1991-92 * "Parts of Speech", Ploughshares, Spring 1996 * "Humility", Ploughshares, Winter 2001-2 Reviews "Poet Jane Miller collaborates with artist Beverly Pepper on a highly personal journey through the debris of the poet’s crumbling relationship, and her mother’s descent into illness. Beautifully rendered poems and short chapters of poetic prose combine with Pepper’s chalk and oil drawings to form an intimate and unique meditation on the nature of love, of heartache, of the many midnights we, each and every one of us, live through and carry with us through our lives." "A major accomplishment of Jane Miller’s Midnights is that she rescues middle-of-the-night ideas from worn-out truisms and offers them as the torturous realities they can be in experience." "Jane Miller is hardly alone in demanding that the structures of her art reflect the compulsions of consciousness, but unlike poets who allow pallid abstraction to attenuate emotion and song, Miller, as late millennium supplicant, won't relinquish extravagance, seduction, rapture, as essential elements of a poem's brash presence. Her human figure, careening through its volatile relations, 'charge card in hand,' indebted and reverential, makes of shatter a kind of atomized coherence, a kinetic, compassionate form."
WIKI
Chaitin's constant Etymology Named after. Proper noun * 1) A real number that informally represents the probability that a randomly-constructed program will halt.
WIKI
São Tomé and Príncipe escudo The escudo was the currency of São Tomé and Príncipe between 1914 and 1977. It was equivalent to the Portuguese escudo and subdivided into 100 centavos. History The escudo replaced the real at a rate of 1000 réis = 1 escudo. Initially, only banknotes were issued in the name of São Tomé and Príncipe and the colony used Portuguese coins. Only in 1929 were coins also issued for the colony. The escudo was replaced at par by the dobra following independence. Coins In 1929, nickel-bronze 10, 20 and 50 centavos coins were introduced. These were followed in 1939 by cupro-nickel 1 escudo and silver $1/100$, 5 and 10 escudos. Bronze 10, 20 and 50 centavos and 1 escudo, and cupro-nickel $2 1/2$ escudos were introduced in 1962, followed, in 1971, by aluminium 10 centavos and cupro-nickel 5, 10 and 20 escudos. This was the last year of coin production. Banknotes In 1914, the Banco National Ultramarino introduced notes for 10, 20 and 50 centavos, followed by 5 centavos notes in 1918. In 1921, larger denominations of 1, $2 1/2$, 5, 10, 20, 50 and 100 escudos were introduced. 500 escudos were introduced in 1956, followed by 1000 escudos in 1964. Between 1974 and 1976, the Banco Nacional de São Tomé e Príncipe issued bearer cheques for circulation in denominations of 100, 500 and 1000 escudos. In 1976, the Banco Nacional also issued notes of the Banco National Ultramarino, overprinted with the new bank's name, in denominations of 20, 50, 100, 500 and 1000 escudos.
WIKI
Greatest Hits 1972–1978 Greatest Hits 1972–1978 is a compilation album by the English rock band 10cc Content The compilation brings together all the band's charting UK singles between 1972 and 1978 and is the first to include the band's recordings both with UK Records and Mercury. "Rubber Bullets", "Life Is a Minestrone" and "Art for Art's Sake" are presented in single edited forms. The cover art for the album was designed by Storm Thorgerson. Release and reception The album was released in time for Christmas 1979 and was intended as a stop-gap between albums, whilst Eric Stewart recovered from his car accident that temporary halted the band's activity. The album was a big success reaching No.5 in the UK charts. A single was released alongside, coupling 10cc biggest hit "I'm Not in Love" with "For You And I" from the Bloody Tourists album. The single failed to chart. The album was reissued as part of 2017 During After - The Best of 10cc and Beyond compilation album and Before During After - The Story of 10cc box set. Critical reception Reviewing in Christgau's Record Guide: Rock Albums of the Seventies (1981), Robert Christgau wrote: "Separating the jokes from the japes, eschewing atmospheric preciosity, and climaxing with two great pieces of lovesong schmaltz that define the group's seriousness, this is as consistent a 10cc LP as you can buy. But I miss oldies like 'Johnny, Don't Do It,' 'The Worst Band in the World,' 'Oh Effendi.' And I still don't believe 'Dreadlock Holiday' is 'Safe European Home' in corporate-rock drag." Track listing * 1) "Rubber Bullets" (Godley, Creme, Gouldman) - 4:43 * 2) "Donna" (Godley, Creme) - 2:56 * 3) "Silly Love" (Stewart, Creme) - 3:15 * 4) "The Dean and I" (Godley, Creme) - 2:52 * 5) "Life Is a Minestrone" (Creme, Stewart) - 4:27 * 6) "The Wall Street Shuffle" (Stewart, Gouldman) - 3:52 * 7) "Art for Art's Sake" (Stewart, Gouldman) - 4:21 * 8) "I'm Mandy Fly Me" (Stewart, Gouldman, Godley) - 5:21 * 9) "Good Morning Judge" (Stewart, Gouldman) - 2:54 * 10) "The Things We Do for Love" (Stewart, Gouldman) - 3:22 * 11) "Dreadlock Holiday" (Stewart, Gouldman) - 5:01 * 12) "I'm Not in Love" (Stewart, Gouldman) - 6:06
WIKI
うちかた Etymology 1 From. Noun * 1) firing of a firearm or artillery * 1) firing of a firearm or artillery Etymology 2 From.
WIKI
User:Ralbegen Hello! I pronounce my username /rælbə'dʒən/, to rhyme with oxygen or nitrogen, but you can pronounce it however you want to. Most of my editing is on pages related to elections in the United Kingdom. I currently maintain the UK-wide graph on the page Opinion polling for the next United Kingdom general election; you can find the code that produces it here. I've put quite a bit of work into the 20XX Plymouth City Council election article series, along with some other local authority election pages. I would like to see more articles about local authority elections expanded beyond lists of results and statistics formatted into wikitables. They benefit from more prose material so that readers can understand the issues and the noteworthy people involved. I've also written or made major contributions a few biographical pages, mostly about modern or historical politicians and public servants. I think Alfred Watson, Miriam Moses and Geraldine Aves are all fairly interesting. Here's a mostly complete list of biographical articles I've made significant contributions to: * Geraldine Aves * Yvonne Coghill * Jamie Driscoll * David Evans (political official) * Tudor Evans * Muriel Forbes * Paula Forteza * Robert Westley Hall-Dare * Fanny Hertz * Fay Jones (politician) * Bernadette Kelly * Stella Manzie * Sigismund Mendl * Charles Mendl * Miriam Moses * Caroline Neave * Mary Ney * Luke Pollard * Luisa Porritt * Olly Robbins * Janet Vitmayer * Alfred Watson (actuary) * Sarah Webb (housing professional) * Peter Willsman
WIKI
TY - EJOU AU - Kapoor, Divneet Singh AU - Kohli, Amit Kumar TI - Intelligence-based Channel Equalization for 4x1 SFBC-OFDM Receiver T2 - Intelligent Automation \& Soft Computing PY - 2020 VL - 26 IS - 3 SN - 2326-005X AB - This research paper represents an intelligent receiver based on the artificial-neuralnetworks (ANNs) for a 4x1 space-frequency-block-coded orthogonal-frequencydivision-multiplexing (SFBC-OFDM) system, working under slow time-varying frequency-selective fading channels. The proposed equalizer directly recovers transmitted symbols from the received signal, without the explicit requirement of the channel estimation. The ANN based equalizer is modelled by using feedforward as well as the recurrent neural-network (NN) architectures, and is trained using error backpropagation algorithms. The major focus is on efficiency and efficacy of three different strategies, namely the gradient-descent with momentum (GDM), resilient-propagation (RProp), and Levenberg-Marquardt (LM) algorithms. The recurrent neural network architecture based SFBC-OFDM system is found to be an appropriate choice in terms of the low bit-error-rate performance, while using different quasi-orthogonal space-time block codes. KW - ANN KW - backpropagation KW - SFBC-OFDM DO - 10.32604/iasc.2020.013920
ESSENTIALAI-STEM
by Psoriasis is a complex genetic disease which includes previously been connected Psoriasis is a complex genetic disease which includes previously been connected with numerous one nucleotide polymorphisms (SNPs) that are implicated in a variety of processes including epidermis barrier features and in the legislation of inflammatory and defense responses. had been examined. Molecular analyses had been performed using TaqMan? assays within a TaqMan? OpenArray? Genotyping program. Outcomes were analyzed using the Golden Helix Deviation and SNP Collection 7 plan. From the 32 SNPs six had been associated with a greater threat of developing psoriasis including: rs10484554 [allele T: chances proportion (OR) 3.51] rs3212227 (allele T: OR 1.88) IL-12B rs3213094 (allele C: OR 1.94) HLA organic group 27 rs1265181 (allele C: OR 2.83) annexin A6 rs17728338 (allele A: OR 2.41) and rs6125829 (allele G: OR 1.98). Fisher’s specific test discovered statistical significance; nevertheless following false breakthrough price and Bonferroni modification this association was no more significant (threshold for genome-wide significance P<1.56×10?3). SNPs which were connected with an increased threat of psoriasis in today's study have got previously been connected with psoriasis in Western european American and Asian populations. To be able to create genome-wide significance potential research must analyze a larger test size. To the very best of our understanding today's pilot study may be the first to research the association between these 32 SNPs and psoriasis within a Mexican Mestizo people. and metallopeptidase domains 33 (gene as well as the rs20541 allele from the gene) weren't in Hardy-Weinberg equilibrium SB 202190 (P<0.01). Desk I. SNPs analyzed in sufferers with handles and psoriasis. From the 32 SNPs six had been proven to confer risk for psoriasis including: rs10484554 (T allele; OR 3.51; 95% CI 1.54-7.99) rs1265181 (C allele; OR 2.83; 95% CI 1.29-6.23) rs17728338 (A allele; OR 2.41; 95% SB 202190 CI 1.00-5.77) rs6125829 (G allele; OR 1.98; 95% CI 1.17-3.35) rs3213094 (C allele; OR 1.94; 95% CI 1.13-3.36) and rs3212227 (T allele; OR 1.88; 95% CI 1.09-3.24) (Desk I actually) (Fisher's exact check P<0.05). Nevertheless pursuing FDR and Bonferroni modification (threshold for SB 202190 genome-wide significance P<1.56×10?3) statistical significance was no more detected. Discussion In today's research six SNPs matching to different genes were associated with an increased risk of developing psoriasis of which the rs10484554 SNP exhibited the highest (T allele; OR 3.51) and the rs3213094 SNP exhibited the Rabbit Polyclonal to Dynamin-1 (phospho-Ser774). lowest OR (C allele; OR 1.94). The gene offers most frequently been associated with psoriasis in earlier studies investigating additional populations (9-11). This locus is known as and is located in the 6p21.3 genomic region. The SNP rs10484554 (12) is located 34.7 kb upstream of the start site and has previously been associated with immune reactions including antigen demonstration and organic killer cell rules (13). The rs1265181 SNP of the gene offers previously been shown to have a markedly positive correlation with psoriasis in the Chinese human population (2 13 14 The rs6125829 SNP of the gene was previously associated with psoriasis in English individuals of north Western descent (13) and in the present study. The gene localizes to the 20q13 locus and encodes a cytosolic protein that has an important part in the ubiquitin pathway. A earlier study offers detected abundant manifestation in disease-associated cells including CD4+ T-lymphocytes dendritic cells and the skin (15). The rs3212227 and rs3213094 SNPs of the gene have previously been associated with psoriasis SB 202190 in Western North American and Japanese populations (14-16). These SNPs are located in the 5q31.1-q33.1 chromosomal region which is known as gene encodes the p40 subunit of IL-12 which is also found in IL-23. This is consistent with earlier studies that have connected IL-12 and IL-23 with psoriasis (16-18). IL-12 induces T-helper cells whereas IL-23 expands and maintains Th17 cells. In earlier studies biological treatments against the p40 subunit were effective in individuals with psoriasis (18-21). The results of the present study suggested SB 202190 the rs3212227 T and rs3213094 C SNPs confer an increased risk for psoriasis; however the two SNPs that were analyzed including rs7530511 and rs2066808 SB 202190 did not. It would be interesting to determine whether the polymorphisms are associated with the response to medicines focusing on the p40 subunit in the Mexican human population. The gene belongs to the conserved annexin protein family which is a group of Ca2+-dependent membrane binding proteins. It is an important candidate gene for developing psoriasis since it is involved in.
ESSENTIALAI-STEM
Thomas Martinetz Thomas Martinetz (born 2 January 1962 in Nettesheim) is a German physicist and neuro-informatician. Life Thomas Martinetz studied mathematics and physics at the Technical University of Munich, where he earned his doctorate in theoretical biophysics under Klaus Schulten in 1992 after several years as a guest at the University of Illinois at Urbana-Champaign. After working in the central research and development department of Siemens AG, in 1996 he moved to a professorship at the Institute for Neuroinformatics of the Ruhr University Bochum and took over the management of the Center for Neuroinformatics GmbH. In 1999 he accepted a call to the University of Lübeck as director of the Institute for Neuro- and Bioinformatics. From 2006 to 2008 he was Vice-Rector of the University of Lübeck, and from 2008 to 2011 Vice-President for Research and Technology Transfer. Since 2013 he is chairman of the Senate of the University of Lübeck. His major contribution in the field of neuroinformatics is the so-called Neural gas, a variant of self-organizing maps. He is co-founder of the software companies Consideo, the Pattern Recognition Company and gestigon. Awards The Center for Neuroinformatics GmbH, whose management he took over in 1996, was awarded in the same year with the Innovation Award of the German economy. awarded him as a "courageous entrepreneur", and in 2011 he received the transfer award of the Innovation Foundation Schleswig-Holstein.
WIKI
In this post I will be explaining how to design your own Neural Network (Keras-like) framework from scratch in python 3.7+. This post assumes you have basic understanding of how a Neural Network works and familiarity with forward-backward propagation, Loss functions, Optimizers, Regularization and so on. Without any further due, let’s jump right into it. Photo by [Moritz Kindler](https://cdn.hashnode.com/res/hashnode/image/upload/v1620220626760/1w0avz-fZ.html) on [Unsplash](https://unsplash.com?utm_source=medium&utm_medium=referral)Photo by Moritz Kindler on Unsplash A basic neural network model implementation in Keras framework looks like the following. In our implementation from scratch, we will try to design a similar framework as Keras (but basic). # define the keras model model = Sequential() model.add(Dense(12, input_dim=8, activation='relu')) model.add(Dense(8, activation='relu')) model.add(Dense(1, activation='sigmoid')) model.compile(loss='binary_crossentropy', optimizer='adam', metrics=['accuracy']) model.fit(X, y, epochs=150, batch_size=10) Base Neural Network class In order to keep all the functional elements together we will create a class (Vanilla here) to organize the functionality of our Neural Network. The class can store variables to define how the network in structured and parameterized. class Vanilla: def __init__(self): self.layers = [] self.activations = [] self.alpha_0 = 0.01 self.loss_fn = "entropy" self.iterations = 0 self.dict = {} self.decay_rate = 0.001 self.problem_type = "c" # c for classification & r for regression Adding Layers This function will allow users to add layers and design the graph of the network. Note that this function stores the number of hidden units in a variable named layers (similarly activation). def add_layer(self, units, input_dim=0, activation="sigmoid"): if input_dim == 0: self.layers.append(units) self.activations.append(activation) else: self.layers.append(input_dim) self.layers.append(units) self.activations.append(activation) Compile Function This function initializes various model parameters before starting the training in the next step. def compile(self, learning_rate=0.01, decay_rate=0.001, loss="entropy"): self.alpha_0 = learning_rate self.loss_fn = loss self.decay_rate = decay_rate Training the network The fit method lies at the heart of this implementation. Although the actual function has a vast functionality, we will look at the most important part which is forward and backpropagation. # Forward Pass for i in range(no_of_layers): a.append(self.forward( a[i], self.dict['W' + str(i+1)], self.dict['b' + str(i+1)], activation=self.activations[i])) dz = [] dW = [] db = [] dz.append(y_train) # Backpropagation of Gradients for i in range(no_of_layers, 0, -1): if i == no_of_layers: [dzz, dWW, dbb] = self.backward( a[i-1], a[i], [], dz[no_of_layers-i], activation=self.activations[i-1], output_layer=True) else: [dzz, dWW, dbb] = self.backward( a[i-1], a[i], self.dict['W' + str(i+1)], dz[no_of_layers-i], activation=self.activations[i-1]) dz.append(dzz) dW.append(dWW) db.append(dbb) # Update Weights and Biases for i in range(1, no_of_layers + 1): if regularize: dW[no_of_layers - i] += self.l1_reg(self.dict['W' + str(i)], lambda_) self.dict['W' + str(i)] -= (alpha * dW[no_of_layers-i]) self.dict['b' + str(i)] -= (alpha * db[no_of_layers-i]) Activation Functions There are several activation functions (relu, sigmoid, softmax, tanh) defined in original Vanilla. An example of sigmoid and it’s derivative is shown below. def sigmoid(self, x): return (1.0/(1.0+np.exp(-x))) def d_sigmoid(self, x): a = self.sigmoid(x) return a * (1 - a) Loss Functions Vanilla class contains three different loss functions — Cross Entropy, Logistic Loss, Mean Squared Error (MSE). An example implementation of Cross entropy is shown below. def cross_entropy_loss(self, y_train, y_hat, epsilon=1e-11): m = y_train.shape[0] n = y_train.shape[1] y_hat_clip = np.clip(y_hat, epsilon, 1 - epsilon) result = ((-1.0 / (m)) * np.sum(np.sum(y_train * np.log(y_hat_clip), axis=1), axis=0)) if (np.any(np.isnan(result))): print("Error in Cross Entropy") exit() return result Predicting the output The predict method takes the input data (X) and performs a forward pass through the network in order to get prediction values (y). def predict(self, X): no_of_layers = len(self.layers) - 1 a = [] a.append(X) for i in range(no_of_layers): a.append(self.forward(a[i], self.dict['W' + str(i+1)], self.dict['b' + str(i+1)], activation=self.activations[i])) return a[-1] This is a developing post and more details will be added soon. If you found this post helpful, follow me and share this post! Github Link: Vanilla Neural Network Repository Cheers.
ESSENTIALAI-STEM
Polycystic Ovarian Syndrome (PCOS) – A Guide Mar 20, 2017 | Blog, Health & Hygiene Despite Polycystic Ovarian Syndrome remaining the most common ovulatory disorder of the female reproductive system affecting a really high 4-12% of women, it’s still very difficult to diagnose. An estimated 50% of women who have the condition don’t know what ‘label’ to give it. I can imagine that finally understanding what is happening in the bodies of those diagnosed is a relief. With a seemingly disparate combination of menstrual/mind/metabolic things like appetite changes, emotional complaints, physical pain and discomfort with hugely irregular cycles and long periods of bleeding, it’s no wonder that so often this results in a lot of to-ing and fro-ing from the doctor’s for blood tests, pelvic exams, and x-rays. In many cases the syndrome raises it’s head at puberty, when ovulation first happens. For a young girl who doesn’t know what her flow, the body sensations of having a period, and her cycle length is supposed to be like, this must be a confusing introduction to menstruation. In a friend’s case her doctor told her that her cycle could take a couple of years to settle down, so as a young girl unversed in the embodied knowledge of menstruating, she accepted this and suffered for a too-long time. These kinds of stories are all too common because there are, as we will see, many facets to the Polycystic Ovarian Syndrome puzzle. So what are the symptoms of Polycystic ovaries? Women affected may suffer sudden weight gain, facial hair, irregular menses, enlarged ovaries, ovarian cysts, acne, growth of body hair, high blood pressure, dandruff, baldness, high insulin levels, obesity, high cholesterol, type II diabetes, depression anxiety bipolar and binge-eating, and 70% of women may be infertile. Long term PCOS also increases the risk of endometrial cancer and heart disease. This ‘list’ is not exhaustive but covers the most common things. Credits: Shutterstock Not everyone experiences everything and there are huge variations in the severity and extent of these experiences. This is because all of our bodies are an ongoing process rather than a fixed object, with millions of complex changes happening all the time. Everybody’s body is different. Not one size fits all! What is PCOS? Polycystic Ovarian Syndrome, a.k.a Stein-Leventhal Syndrome or chronic oligo-anovulation or PCOS for short, is a condition of the hormonal system that can cause infertility. It means that instead of the ovarian follicles releasing a developed egg at ovulation, a cyst is formed, trapping the underdeveloped egg inside the swelling follicle. How is PCOS caused? It’s thought to be caused by an imbalance of hormones. Women with PCOS show about twice the level of testosterone (a male steroid hormone naturally found in a woman’s body) as other women, and they are often insulin-resistant. There are many research theories for PCOS. Some suggest it can be genetically passed on from mother to child, some think that the ovaries produce too much testosterone because the hypothalamus has abnormalities, some theorize that ovarian abnormality causes overproduction of testosterone, another shows that too much insulin can cause the ovaries to overproduce testosterone, and another idea is that PCOS itself is a side effect of insulin-resistance not the other way round. So it’s complex and there are no definite answers available from the medical world yet. “So with this syndrome not having an ‘official’ cause, being difficult to diagnose, and being uncomfortable to experience, what can we do if we or our friends or family have it?” Be gentle with ourselves and each other. Ask for support from our friends, our families, our doctors, and those who care about us when we need it. Self care is of the utmost importance and is not to be confused with selfishness; it is actually the opposite! Here are some holistic self-help ideas for PCOS sufferers that have come from a series of experts all passionate in making a difference to the quality of people’s lives. The main wish from me is that we all find strength to explore some new ways to take care of ourselves better in every day life. To live in the best way we can depending on where we are in our embodied physical process. Weight loss OK, doctors will almost definitely suggest this one because it is a proven, very powerful self-help technique. Exercising moderately and regularly has been shown to help alleviate depression and anxiety, diabetes, endometrial cancer, and heart disease; while weight loss for PCOS has been medically proven to lower circulating testosterone levels, improve metabolism, and reduce all the PCOS symptoms. It’s a no-brainer, it doesn’t have to be boring, and the good thing is you only need a 5% weight drop to regulate your hormones. Think about that dance class you have always fancied, or dream about the healthy toned body you have always wanted, use that gorgeous vision to motivate you, then go go go! Diet A vegan diet is often recommended by doctors to PCOS sufferers, because it has been proven that it is conducive to quick weight loss (and it’s a lot nicer for the animals and the environment which can be a welcome feel-good factor). Rich in plant-based nutrition and beneficial plant proteins like beans and lentils, a plant-based diet easily provides the good sources of protein recommended to be eaten with each meal. It’s recommended to increase foods with Omega 3 fatty acids by things like cooking with rapeseed (canola) oil, eating more nuts and ground up seeds like flax, walnuts, chia, mustard and hemp. Increasing Vitamin A via well-cooked green red and orange foods is also beneficial. Avoid trans-fats because research says they interfere with hormonal signals throughout the body. Alisa Vitti, who’s entire work is based on how she overcame PCOS has named 5 foods other than sugar and dairy for PCOS sufferers to avoid; stevia, red meat, raw kale, ‘cooling’ foods like cucumber mint and spirulina, and soy. As with any dietary change, listen to your body, consult a nutritionist and do your own research to see what agrees with you. Acupuncture Often recommended by doctors, acupuncture is a very respected method of reducing testosterone production and regulating menses. If you haven’t tried it yet it could be a wonderful extra support for you. And don’t worry it doesn’t hurt! Menstrual cycle awareness work Take a deep dive into the menstrual cycle and learn about the energy dynamics of your own intrinsic monthly process via the many books on the subject or going to a workshop. (Follow us on Instagram to know about our upcoming workshops) In this lesser known woman’s health technique you will learn all kinds of things we should have learned when we started cycling, and it makes such a lot of sense to so many women. This starts with learning how to chart whatever cycle we have. Then we can learn how to observe our inner fluctuations, such as our emotions, energy levels, and physical body changes. If we respond to our inner changing rhythms we’re actually putting less stress on our system as a whole. If our life is a little chaotic we can aim to bring a little more rhythm and routine into it. Things like regular meal times and sleep patterns can help regularize an irregular cycle as can getting as much natural light as possible. If you’re a really driven person who is really bad at taking breaks, planning for some ‘down-time’ and really resting mind and body can be really good for the overall menstrual cycle. Physical Research and try the AVIVA Method, Deer Exercise and Maya Abdominal massage. Psychological Dr Christine Northrup recommends that we look at any negative conditioning received as a child about being a fertile woman. By being mindful of these narratives and bringing light to these old messages we can work out if it’s something useful or something to let go of. Journaling about the above can be a really good tool to be used at different times of your cycle because your feelings will be different for example when you are pre-menstrual, and the conclusions will therefore be easier to come to. Affirmations The idea with affirmations is that you repeat them over and over, out loud if possible, until they become a mental habit. I have a personal experience of affirmations working when I repeated one positive phrase for two weeks and the wart on my hand that had been there for two years disappeared! The power of the mind is extraordinary. Meditation I recently attended a secular meditation retreat (called Vipassana) that coincided with my period, and proved a fascinating, wonderful dive into the relationship with emotions and physical bodily sensations. It was a tough 10 days in some respects but I couldn’t recommend it enough. It involved many hours per day in meditation, thinking about life from a deeper perspective, and in silence, but if you feel inspired to research further, the website is listed in the resources below. Herbs Some recommendations are Chaste Berry tincture (vitex) for its strong effect on the reproductive system, Saw Palmetto for its ability to regulate androgens (male sex hormones), Dandelion tincture, and Fenugreek to help cells accept and use insulin. Shepherd’s purse tincture can also help to control bleeding, and 3-6 quarts of nourishing herbal infusion (see resources for recipe). Another herb recommended to me by a PCOS sufferer is Shatavari which can balance the endocrine system and has the reputation of being a classic woman’s herb. Aromatherapy A few recommendations are clary sage (10 drops), fennel (10 drops), geranium (7 drops), and rose (3 drops), diluted in two tablespoons of olive oil rubbed on the belly to help alleviate the pain of PCOS. Because of the strength of aromatherapy oils consider using them on a short term basis. As we know, this syndrome can only be diagnosed by repeated tests by a doctor. And many doctors also recommend many different holistic tips, cremes for extra hair growth, and fertility drugs. The below list is not exhaustive and covers some (but not all) of the medical solutions and prescription drugs for PCOS. As with any course of drugs, checking out the side effects is always recommended. Another influencing factor worth considering in any decision is whether you are considering pregnancy, you’re menopausal, or you don’t want to conceive. Metformin A commonly used insulin-assisting drug that helps to reduce testosterone, is beneficial with regards insulin, promotes ovulation, increases the chances of pregnancy, helps to prevent weight gain, and lessens extra hair growth. The combined contraceptive pill: It reduces male hormones, helps acne, regulates hormone production, and it has become an accepted option within the medical industry to regulate the menstrual cycle by artificial hormones and it works really well for lots of people. Surgery A last-resort option involving ovarian drilling (a.k.a laparoscopy), oophorectomy, hysterectomy, or cyst aspiration. Resveratol New developments in research (as recent as 2016) has led to the discovery of a compound called resveratol, found in grapes nuts and berries (and tiny amount in red wine!) that decreases testosterone production while positively affecting both insulin levels and insulin sensitivity. However, pills containing concentrated amounts of the compound are not certified yet. The keenest wine drinker might be a little disappointed to hear that they would need to drink about 1000 bottles of red wine per day to reach the suggested 1,500mg. So rest assured that things are being done, knowledge is increasing, and by sharing the information in this article as well as your own personal experience with what has helped you will all help other people who are new to PCOS. You are not alone. I encourage you to look up the links in this article as well as checking out the book list below and see what helps. Then share that! The views, opinions and self-care tips expressed in this article have been brought together from a wide range of sources. Many ideas presented are holistic taking into account the whole system of body and mind rather than focusing on individual symptoms alone; on the basis that ‘one size doesn’t fit all’ and that everyone’s body is different. Finally, the diagnosis of PCOS has to be by a series of blood tests scans and pelvic examinations given by a medical practitioner, so if you feel you may be affected by PCOS seek out medical advice straight away. Compiled by Jane Legge, Eco Femme Ambassador   Books:
ESSENTIALAI-STEM
List of Primera División de Nicaragua seasons The Primera División de Nicaragua is the top division of football in Nicaragua. This list shows the champions and movements in and out of the Primera División for each season since its foundation in 1933.
WIKI
Wikipedia:Articles for deletion/Josefa Salas Mateo The result was Redirect to Oldest people, insufficient reliable sources to establish notability for a seperate article but ok for in list. Davewild (talk) 19:45, 17 December 2007 (UTC) Josefa Salas Mateo * – (View AfD) (View log) Stub article on very old person, with an assertion of notability (having been world's oldest person for a while), but no sign of any substantial coverage in reliable sources to establish notability per WP:BIO. Mateo is already listed in Oldest people and in Oldest validated person by year of birth; this is quite sufficient unless substantial coverage is available in reliable sources to establish notability per WP:BIO, and my google searches found none. I suggest deletion. --BrownHairedGirl (talk) • (contribs) 23:49, 11 December 2007 (UTC) Keep Like Martijn Hoekstra, this factoid is good enough for me. Neal (talk) 02:28, 12 December 2007 (UTC). * Delete or Merge No substantial independent, reliable sources to establish meeting WP:N or WP:BIO. Nothing here that couldn't be summarized in the many supercentenarian lists. Cheers, CP 23:54, 11 December 2007 (UTC) * Comment The guiness book of record claim is very strong. It would be a reliable source. If anyone can reproduce that, I think notability is sufficiently established. If not, and no other reliable soures turn up, delete. Martijn Hoekstra (talk) 00:07, 12 December 2007 (UTC) * I have no reason to doubt that the Guinness Book of Records claim is genuine, and it can be easily verified in any library. However, such entries are not substantial, and do not satisfy WP:BIO's requirement of substantial coverage. --BrownHairedGirl (talk) • (contribs) 00:26, 12 December 2007 (UTC) * The guiness book of records being reliable, but trivial coverage, and several so-so sources on the internet from not so established sources giving some coverage is just on the better side of notable for me. weakest keep Martijn Hoekstra (talk) 00:38, 12 December 2007 (UTC) * Which of these "so-so sources" come anywhere near meeting WP:RS? --BrownHairedGirl (talk) • (contribs) 12:11, 12 December 2007 (UTC) * Note: This debate has been included in the list of People-related deletions. -- Double Blue (Talk) 02:42, 12 December 2007 (UTC) * Redirect to Oldest people. With no more than trivial coverage in secondary sources, a separate article is not necessary. Karanacs (talk) 15:07, 12 December 2007 (UTC) * I could live with that. Martijn Hoekstra (talk) 15:08, 12 December 2007 (UTC) * I too could live with that. --BrownHairedGirl (talk) • (contribs) 15:29, 12 December 2007 (UTC) * Since we're talking about "I could live with that," I guess it's about weighing 2 arguments, people who are for deletion: "I could not live with the fact that this factoid has it's own article," and, people who are against deletion: "I could not live with the fact that this factoid is on a table and doesn't have it's own article." Well for me - I could sleep well at night regardless of whether an article exists or not. But I guess the damage done to me over the existence of an article is smaller than my will to delete an article that does exist. Otherwise, I don't think it's about "I too could live with that." If this article really is a factoid and fails all other policies, it doesn't need an AfD. Neal (talk) 14:12, 17 December 2007 (UTC). * Delete Just getting old does not satisfy WP:BIO. The references, which are mere directory listings, are not the substantial coverage required to show notability per WP:N. Inclusion in a list is sufficient. All the succession boxes and are excessive. Edison (talk) 17:32, 12 December 2007 (UTC)
WIKI
User:Tennis12000/Kyle McDonald (artist) By Line: Kyle McDonald, Los Angles California Introduction: Kyle McDonald is not your typical artist where one simply uses a paint brush and a canvas. He is a media artist, who creates visually appealing models using code and tool kits for other artists, in order to customize their own art as they see fit. McDonald has a passion for exploring the never ending space in the digital world, as he is constantly seeking insight on new technologies and understanding how communication today with others is being affected. He was recently an adjunct professor at NYU ITP, a member of F.A.T. Lab (Free Art and Technology), and a community manager for OpenFrameworks. Not only this, but many of McDonald's work and contributions are known on the international level, such as Japan, France, Greece, the UK, and many more. Nut Graph: Exploring the world of art through the use of software has opened up numerous ways on changing the way we perceive as well as develop future technologies. Some of the work/research Kyle McDonald has done in particular, are being able to identify whether an AI image is fake called "Generative adversarial network"(GANs). They essentially take data into a neural network, and it is "trained" to produce the best possible image. While most images generated by these types of networks have become increasingly harder to tell a difference, they are not perfect. For example, GAN's have a tough time with background images because the data is being trained too focused on the face itself and as a result produces a random one. Another interesting aspect of how our world has changed today is through our style of communication. There are people, who enjoy more face to face interaction, while others enjoy texting. While it may seem more convenient, text message can be intercepted and changed to disrupt the communication between people, leaving them confused. As part of his work/research, Kyle McDonald and another artist named Lauren McCarthy, worked on a project on what was called MWITM(Man/Woman in the middle). Essentially, there was a server that would intercept the message, and two chat bots, one for each artist, would communicate automatically without any direct messaging. The messages created were based on the communication style of the users, which one can imagine in the beginning, the conversations were pretty off. Over time however, the conversation made more sense as the chat bots were being trained, like in a neural network, to understand and interpret human thought. It is very interesting indeed, how we have the resources to make technology as "smart" as we want, and yet it is not nearly as powerful and dynamic as the human mind.
WIKI
Level Up Your JavaScript With These 60 Quick Fixes for VS Code Level Up Your JavaScript With These 60 Quick Fixes for VS Code Lars Grammel Lars Grammel Published on December 21, 2021 When programming, we often edit text directly to achieve our goals. Such manual editing can be slow and error-prone. For behavior-preserving changes (refactorings), automation can save you time, ensure the transformation is executed correctly, and warn about potential breakages. You can communicate your intention, e.g., "I want to extract this expression into a variable" more directly, and let the machine figure out the details. I've written an extension for Visual Studio Code called P42 JavaScript Assistant that adds 60 automated refactorings, quick fixes, and cleanups for JavaScript and TypeScript to make your life easier. This blog post provides an overview of the different code actions and their categories. 💡  This blog post shows P42 JavaScript Assistant v1.64 But first, here is an example of how P42 works to give you an idea of how it can help you: P42 JavaScript Assistant Core Refactorings Visual Study Code already contains basic refactorings such as Rename and Extract Function. P42 adds additional refactorings or extended functionality such as safety checking. React Refactorings and Quick Fixes In React, components often contain JSX, a syntax extension for JavaScript. P42 provides code actions that make working with JSX and React easier: ECMAScript Modernizations The Javascript ecosystem is progressing rapidly, thanks to the great work of TC39. However, it is hard to keep codebases up-to-date with the newer JavaScript features, and codemods are not always an option due to their significant churn and potential for breakages. P42 supports both codemod-like mass code refactoring and more opportunistic code modernization for the following upgrades: ES2015 ES2016 ES2020 ES2021 Actions for Logical Expressions Boolean logic can be challenging to read, especially as expressions get more complex. P42 provides several refactorings that can help you simplify and tease apart logical expressions to make them easier to understand: Actions for If-Else Statements If-else statements are a central element in many programs. Restructuring them can increase the readability of your programs, often in combination with refactoring their conditions: Syntax Conversion It is often annoying to make small syntactical changes by editing text. Often more than one position needs to be edited, and the code is broken during the edit, leading to incorrect errors and auto-completions that get in the way. You can execute the following syntax conversions with a single P42 quick fix: Convert Language Elements Sometimes you want to switch to a language element that is a better fit for what you are doing. For example, a for..of loop is more concise and can replace a regular for loop in many situations. Code Cleanups Code cleanups remove unnecessary code. Such code can result from code churn, e.g., by applying other refactorings, adding new features, or fixing bugs. P42 shows hints and automates the cleanup for the following situations: Other Actions If you find these refactorings & actions useful, you can install the P42 JavaScript Assistant from the VS Code marketplace. For feedback and updates, you can find P42 on Twitter or LinkedIn.
ESSENTIALAI-STEM
Talk:Greatrex Untitled Geoffrey B. Greatrex - no article? --13Peewit (talk) 19:52, 4 February 2011 (UTC)
WIKI
What is a HTTP 415 Status Code (Unsupported Media Type)? Reliqus Marketing 01 May 2024 HTTP Status Codes By Ankit Bhatia Founder & CEO Are you one of the many who are unfamiliar with the HTTP 415 status code? You’re not alone. These numerical codes can be daunting, especially for those not well-versed in web development or server protocols.  But don’t be overwhelmed, because in this blog post, we will simplify the meaning and significance of the 415 status code. We understand how frustrating and confusing it can be to encounter an error message, so let’s dive in and demystify the HTTP 415 error together in a way that’s easy to grasp. What Exactly is a HTTP 415 Status Code? A 415 Status Code, often seen as “415 Unsupported Media Type Error” occurs when a web server refuses to accept the request because the payload format is unsupported. Imagine trying to insert a key into a lock that doesn’t fit. Similarly, when you or an application attempts to communicate with a server using a media type (like an image, video, or document format) that the server doesn’t understand or support, it responds with a 415 HTTP Response Status Code. The server says, “I recognize your request, but I can’t process it in this form.” This error highlights the importance of compatibility between what’s being sent and what the server is equipped to handle. 415 UNSUPPORTED MEDIA TYPE Source: RFC7231 Section 6.5.13 415 Code References Rails HTTP Status Symbol :unsupported_media_type Go HTTP Status Constant http.StatusUnsupportedMediaType Symfony HTTP Status Constant Response::HTTP_UNSUPPORTED_MEDIA_TYPE Python2 HTTP Status Constant httplib.UNSUPPORTED_MEDIA_TYPE Python3+ HTTP Status Constant http.client.UNSUPPORTED_MEDIA_TYPE Python3.5+ HTTP Status Constant http.HTTPStatus.UNSUPPORTED_MEDIA_TYPE Why Does the 415 Status Code Happen? When you come across a HTTP 415 status code, it signifies that the server has declined to process a request from your browser. This refusal is typically because the payload—the data sent to the server—is not in a format that the server can recognize or is willing to accept. More often than not, this error occurs from the Content-Type or Content-Encoding headers in a format the server rejects. This error is widespread when the server inspects the message body and discovers it cannot accept the file type because it doesn’t support the payload. The server is programmed to work with specific data types, and anything outside of that set can lead to a 415 error. It’s also worth noting that this error can indicate an issue within the PHP code of your application, where the specified content type may not be correctly configured or supported. HTTP 415 Status Code Example Let’s bring the HTTP 415 error code to life with an example. Imagine you’re trying to request a gif file from a server, but the server only accepts PNG files. That’s when you’ll encounter the 415 error code. Initial request POST /blog/ HTTP/1.1 Host: www.example.com Content-Type: gif Content-Length: 15 Initial response HTTP/1.1 415 Unsupported Media Type Content-Type: text Content-Length: 130 <html> <head> <title> Unsupported format </title> </head> <body> <p> This media type is not supported </p> </body> </html> Common Issues That Can Lead to 415 Unsupported Media Type Error Incorrect Content-Type Headers: When a request is sent to the server, it includes headers that inform the server about the type of content being sent. If the Content-Type header is incorrect or mismatches the actual content type of the payload, the server may not recognize the format and return a 415 error. It’s akin to labelling a sugar jar as salt; the label guides expectations no matter what’s inside.  Unsupported Media Type: Each server is configured to support certain media types, such as images in JPEG format, text in HTML, or data in JSON. If you attempt to send data in a format the server does not support, it will not be able to process your request. This is similar to trying to play a Blu-ray disc in a DVD player; the technology doesn’t match up. Inappropriate Payload Encoding: How data is encoded when transmitted can also lead to a 415 error. If the server does not support the encoding of the payload or is not correctly identified in the request, the server may refuse to process it. Imagine sending a message in Morse code to someone who can only read Braille. The message is there, but the recipient lacks the means to understand it. While we’re discussing various HTTP status errors, understanding other related issues can also be beneficial. For example, the HTTP 414 status code occurs when the URL requested by the client is too long for the server to handle. Learn more about how this relates to overall server request handling in my detailed guide on What Is HTTP 414 Status Code? How to Fix a 415 Status Code Error? Fixing a HTTP 415 status code error typically requires some coding experience. Here are a few steps you can take to address this issue: • Ensure that the request being sent includes the appropriate Content-Type header. This header should match the media type of the data you’re attempting to upload or submit.  • Make sure that the server you’re interacting with is configured to accept and process the specific Content-Type header you’re sending.  • Use the Accept Header for Double Checking what your server can process If you do not have coding experience or are unsure how to proceed with these steps, consulting a professional service like Reliqus Consulting can be a great option. We have the expertise to diagnose and resolve such errors, ensuring your requests are correctly understood and processed by servers. Which HTTP Method is used with 415 HTTP Status Code? Navigating through the complexities of the 415 HTTP Status Code, it’s essential to understand the various HTTP methods that can be associated with this error. These methods include: Each method serves a distinct purpose in the world of web communication.  The GET method, for instance, is used to retrieve a representation of a specific resource. It’s designed with the intention that making a request using GET should only return data and have no other effect.  The DELETE method, as the name implies, removes a specified resource from the system. When successful, it’s a direct action that deletes the targeted resource and alters the server’s state. Lastly, the POST method is employed to submit an entity to the specified resource, often resulting in a change in the server’s state or other consequential side effects. This method is fundamental for creating new resources or submitting data for processing to an existing resource. What are the Related HTTP Response Headers with 415 HTTP Status Code? Navigating the world of HTTP status codes can sometimes feel overwhelming, but understanding the nuances can be empowering. In relation to the 415 HTTP Status Code, certain HTTP Response Headers play a crucial role in both the occurrence of this error and its resolution.  Here’s how they intertwine: – The Content-Type HTTP Header is crucial as it indicates the resource’s original media type before any content encoding for transmission occurs. This tells the server what type of file or data is being sent. – The Content-Encoding HTTP Header is essential for reducing the media size for more efficient transmission. When the server receives this header, it understands which encoding has been used and whether it can decode it. – The Accept HTTP Header plays a pivotal role from the client’s end. It communicates the content types the client is equipped to understand, stating its preferences or capabilities regarding data processing. HTTP 415 Status Codes (Unsupported Media Type) Impact on SEO Understanding the impact of a 415 Status Code on your website’s SEO can be crucial, as it goes beyond a simple error message. It touches the core of user experience and your website’s relationship with search engines.  Here’s how: • User Experience (UX): A 415 error can frustrate users who encounter it, potentially leading them to leave your site searching for one that works correctly. This negative experience can decrease their likelihood of returning, impacting your site’s engagement metrics and, indirectly, its SEO performance. • Lost Link Equity: If other websites link to content that returns a 415 error, this can result in lost link equity. Search engines like Google value links pointing to your content, but if those links lead to errors, it diminishes the value passed through them, potentially affecting your site’s ranking. • Crawl Errors: Search engines crawl your website to index content. Encountering a 415 error can halt or slow down this process, leading to crawl errors. This means that new or updated content may take longer to appear in search results. • Site Quality: Frequent 415 errors can indicate poor site quality to search engines. A well-maintained site shouldn’t regularly return such errors. High error rates may lead search engines to downgrade your site’s rankings, perceiving it as less reliable or lower quality. Will Search Engines Index a URL with a 415 Unsupported Media Type Status Code? When it comes to search engines like Google, it’s essential to understand that they will not index URLs that return a 415 error. This is crucial because web pages experiencing a 415 Unsupported Media Type status code could significantly lose their rankings within search results. It’s vital to be aware of this consequence, as it directly impacts the visibility of your content online. Conclusion In wrapping up, the HTTP 415 error, with its unique and intricate nature, presents a challenge that often requires a developer’s touch to properly address. This error, deeply rooted in compatibility issues between the server and the media type of the content being requested, can seem daunting at first glance. A practical starting point for those looking to troubleshoot on their own is to meticulously check the Content-Type header values in the request for any potential typos or mismatches. This simple step can resolve the issue without the need for deeper intervention. If the problem persists or if you find yourself lacking the necessary technical expertise, remember that Reliqus Consulting is always prepared to lend a hand. Our extensive experience in navigating website and server issues can be the key to resolving not only HTTP 415 errors but a wide range of technical challenges. Moreover, our comprehensive HTTP Status Code guide is not just a resource, but an invaluable tool for those interested in expanding their knowledge of HTTP status codes and understanding more about what each code signifies. It delves into various errors, offering insights and solutions that empower developers and website owners alike. FAQs Understanding the nuances of various error codes can be overwhelming, but we’re here to break them down for you with warmth and clarity.  How to Use 415 HTTP Status Codes for a Website? Implement the 415 Status Code on a website by configuring the server to return this status code when it receives a POST request with a Content-Type of application/x-www-form-text that it does not support. How to Check HTTP 415 Status Code? Verify a 415 HTTP Status Code by utilizing the network tab in your browser’s developer tools to inspect the responses for each resource request made by the client. What is the Browser’s Compatibility with 415 Status Codes? Most modern browsers, including Chrome, Firefox, Edge, Internet Explorer, Opera, Safari, and Samsung Internet, support the 415 HTTP status code. What is REST error code 415? 415 Unsupported Media Type is a REST error code that indicates that the server refuses to accept the request because the payload format is unsupported. What is Status Code 415 in Axios? A 415 status code in Axios, a promise-based HTTP client for JavaScript, signifies that the server cannot handle the request’s media type. This is typically due to the `Content-Type` header being set to a format the server does not support or is incorrectly defined. What is Error 415 in Rails?  Error 415 in Rails, a web application framework written in Ruby, means that the request contained a media type that the server or the resource does not support. It’s a hint to check if the content type of the sent data matches what the server expects. What is Error 415 in LoadRunner? Error 415 in LoadRunner, a performance testing tool, occurs when a virtual user script sends a request with an unsupported media type. It suggests reviewing the content type specified in the script to match the one the server accepts. What is the Difference Between Error 400 and 415? Error 400 indicates a bad request, while error 415 indicates an unsupported media type. What is the Difference Between 406 and 415 error codes? Error 406 indicates that the server cannot find any acceptable response, while error 415 indicates that the server refuses to accept the request because the payload format is unsupported. Ankit Bhatia Founder & CEO at Reliqus With 12+ years of experience building a web presence for 300+ businesses, Ankit understands how businesses can use technology to increase revenue. Latest from the blog What is HTTP 422 Status Code (Unprocessable Entity)? Introducing the HTTP 422 status code – a lesser-known but crucial part of the HTTP response landscape. As a web developer or someone workin... What is HTTP 421 Status Code (Misdirected Request)? In today’s digital landscape, the performance of your website is crucial. HTTP status codes, like the 421 Error, play a significant role in... What is HTTP 420 Status Code (Method Failure or Enhance Your Calm)? Mastering HTTP status codes is a key skill for developers and web administrators in the dynamic digital landscape. These codes are not mere error... What is HTTP 419 Status Code (Session Has Expired)? If you’ve ever encountered the HTTP 419 Status Code while browsing the web, you may have needed clarification and support by its meaning. A...
ESSENTIALAI-STEM
Master C# How to avoid temporal coupling in C# Two approaches to solving temporal coupling, a 'design smell' that results when members of a class must be invoked in a specific sequence How to avoid temporal coupling in C# Thinkstock Master C# Show More Two hallmarks of good software design are low coupling and high cohesion. Cohesion is a measure of how focused a module of a program is on a set of responsibilities. Coupling is a measure of the degree to which the modules of a program are dependent on other modules. Giving a module a broad set of responsibilities, or making it dependent on many other modules, makes the code more difficult to maintain and discourages code reuse. In other words, low cohesion and high coupling are detrimental to your application. Thus we should strive for high cohesion and low coupling: Restricting the focus of modules to closely related functionality, and minimizing their dependence on external code.  I have discussed the various types of cohesion and coupling in a previous article (see “Design for change: Coupling and cohesion in object oriented systems”). In this article I will look specifically at temporal coupling and suggest some strategies to avoid this particular design smell.  What is temporal coupling? Temporal coupling is a “design smell” that occurs when you have an implicit temporal relationship between two or more members of a class. This generally means having to invoke multiple members of a class in a specific sequence. The members are effectively tightly coupled because the calls must follow a strict order. Let’s look at an example. Consider the following class, called FileLogger, which contains two methods named Initialize and Write. public class FileLogger     {                public void Initialize(string fileName)         {             //TODO         }         public void Write(string message)         {             //TODO         }     } Note that I’ve skipped the method definitions here. While the Initialize method is called to set the filename and path, the Write method is used to log messages to a text file. These methods have to be called one after the other, i.e., in a pre-defined sequence, because the Write method needs the filename of the text file where the messaged will be logged. If the file name is not set in the Initialize method, an error will be thrown at runtime when the application tries to write text into the file. The code snippet given below illustrates how these two methods should be called in a sequence. static void Main(string[] args)         {             string fileName = @"D:\IDG\Sample.txt";             FileLogger logObj = new FileLogger();             logObj.Initialize(fileName);             logObj.Write("Hello World!");         } Solve temporal coupling with constructor injection One solution to temporal coupling is to use constructor injection. Let’s refactor our FileLogger class and implement constructor injection. Here’s the updated version of the FileLogger class for your reference. public class FileLogger     {         private readonly string fileName;         public FileLogger(string fileName)         {             if (string.IsNullOrEmpty(fileName))             {                 throw new ArgumentNullException(“File Name”);             }             this.fileName = fileName;         }         public void Write(string message)         {             //TODO         }     } Note that our FileLogger class now contains a private read-only string variable that represents the name of the file where the text messages will be logged, and the value of this variable is set in the constructor. We also check for a null or empty value and report it appropriately. In doing so, we ensure that the filename is always available to the Write method while eliminating the need to call two methods in sequence. Solve temporal coupling with an abstract factory Another approach to avoiding temporal coupling is to use an abstract factory. Note that the abstract factory design pattern is a creational pattern that can be used to decouple your application from the way class instances are created. Here is a version of our FileLogger class that uses an abstract factory. The FileLogger class now implements the ILogger interface. public interface ILogger     {         void Write(string message);     }     public class FileLogger: ILogger     {         private readonly string fileName;         public FileLogger(string fileName)         {             this.fileName = fileName;         }         public void Write(string message)         {             //Write code here to log message(s) to a text file         }     } Note how our factory implementation decouples the creation of the log file from the logger implementation. Because the filename variable is read-only in the FileLogger class, its value can only be changed in the constructor. Below you can see the LoggerFactory class that implements the ILogger interface. public interface ILoggerFactory     {         ILogger Create(string name);     }     public class LoggerFactory : ILoggerFactory     {         public ILogger Create(string fileName)         {             if (string.IsNullOrEmpty(fileName))             {                 throw new ArgumentNullException(“File Name”);             }             return new FileLogger(fileName);         }     } Finally, the code snippet given below illustrates how all of this works. Note how the invariants, i.e., the log file and the log message, are protected by the LoggerFactory and the FileLogger classes. static void Main(string[] args)         {             string fileName = @”D:\IDG\Sample.txt”;             LoggerFactory factory = new LoggerFactory();             var logObj = factory.Create(fileName);             logObj.Write(“Hello World!”);         } Temporal coupling occurs when you have method calls that need to be invoked in a particular order. In essence, if you have a set of activities in your application that are strictly ordered, i.e., the results of one or more activities are needed in subsequent activities for the application to function properly, you may say that such methods are temporarily coupled. Note that the same applies to properties as well, i.e., you might have some methods that should be preceded by some property calls because the results are needed by subsequent methods. Copyright © 2017 IDG Communications, Inc.
ESSENTIALAI-STEM
Margaree River The Margaree River (Abhainn Mhargaraidh) is a river on Cape Breton Island in Nova Scotia. The northeast branch of the river derives from the watershed of the Cape Breton Highlands, while the Southwest Margaree flows northeast from Lake Ainslie. The two branches join at Margaree Forks. The river then flows north to empty into the Gulf of Saint Lawrence at Margaree Harbour, Nova Scotia. The river is 120 km in length and drains an area of 1,375 km². The Margaree has been well known for a century for its trout and Atlantic salmon sport fishery, that draws anglers from near and far. Fishing is highly regulated now and is restricted to fly fishing only, with barbless hooks, in the main stem of the river. Famed American angler and Atlantic salmon conservationist Lee Wulff caught his first salmon on a fly on the Margaree in 1933. The gravel bars of the upper Northeast Margaree provide spawning grounds for Atlantic salmon; its steep valleys provide habitat for American marten and the rare Gaspé shrew. The Margaree Valley includes a mix of farms and woodlands. During the 18th century, Acadians settled along the coast near the mouth of the river; the French name for this river was St. Marguerite. Scottish Highlanders began to settle in the Margaree Valley at the beginning of the 19th century. Moses Coady, a noted son of the Margaree Valley, attended school in Margaree Forks and later, taught there before completing his education in Antigonish and Rome. The Margaree was designated a Canadian Heritage River in 1998. HMCS Margaree, a World War II Canadian naval destroyer, was named after this river.
WIKI
Step C: Complete the input mappings - AWS Elemental Live Step C: Complete the input mappings Next, complete the Input mappings to assign an ID to each input on the router. You only need to assign an ID to the inputs that you are using (the ones that are cabled): 1. On the Elemental Live web interface, make sure you're on the Routers page. Choose Edit (pencil icon) beside the router. 2. On the Edit Router screen, choose Map Inputs. 3. Complete the fields to identify the inputs that you're using. You must know the identification of each input on your router. Elemental Live can't detect information about the state of the input IDs. You can add inputs with the following options: • Add: Adds one input. Select the ID of the input according to the router. • Add inputs starting at: Adds a range of inputs. Select the first and last number in the range. 4. Choose Add (+ icon). 5. Repeat to add all of the inputs that you require. A line appears for each input. Each line has a unique Elemental ID, the ID of the input on the router, and the name (that Elemental Live automatically generates, based on the input ID).
ESSENTIALAI-STEM
Page:The New International Encyclopædia 1st ed. v. 10.djvu/320 * HUBBARD. 280 HTTBE. Message to (larcia |18!)8). an nrraipiment of the careless employee, and Time and Chance (1001). a graphic sketch of .Jolin Brown's career. HTTBBABD. Gardiner Greene (1822-97). An AiMoriciin lawyer, born in Boston. After graduatinf; at Dartmouth (1S4I) anil complet- ing the law course at Harvanl. he hegan the practice of his profession in Boston, where he lived until 187.3, when he removed to Washing- ton. D. C Here he was intimately connected with the organization and development of the American Bell Telephone Company. He was the founder, and for many yeiirs the president, of the National Geographic Swiety. and was a trus- tee of several inijiortant educational institutions. Hubbard devoted much attention to the ad- vancement of oral instruction among deaf mutes. He made a large collection of etchings and en- gravings, which were given by his widow to the Library of (iingrcss with a fun<I for additions. HTTBBABD, .Joseph Still.man (1823-G3). An American astronomer, born in New Haven, Conn. He graduated at Yale College in 1843. and the next year went to Philadelphia, where he acted as assistant to Sears Cook Walker, who had built the observatory of the Philadelphia High School. Soon afterward he accepted a posi- tion offered him by General Trf'-mont, then a lieutenant, as computor of the observations for latitude and longitude made during the explorer's journey across the continent. On May 7, 184.'5. he was appointe<l to a vacancy in the corps of professors of mathematics in the Navy, and was assigned to the Washington Observatory, where he remained <luring the rest of his life. He con- tributed frci|ucntly to the Aslronomical Journal and twice, for long priods, was its editor. Dur- ing his connection with the Washington Observa- tory he made a number of comctary investiga- tions and important computations, lie was a member of the National Academy of Sciences and of various other scientific societies. HUBBARD, Lucks Frederick (1836—). An American soldier. He was born in Troy. N. Y., went to school in Granville. N. Y., learned the trade of a tinsmith, and followed it for three years in Chicago. In 1857 he started a news- paper in Re<l Wing. Minn., and afterwards served in the Civil War. conduiting himself gallantly and becoming briga<lier-gcncral. Later he en- gijged in railroad building and milling. He was a State Senator (l.s72-7fil. (kivernor of Min- nesota (1882-87), and in the Spanish-American War commanded a volunteer brigade. HUBBARD, Oliver Payson (18001900). An American chemist, born at Pomfret, Conn, He was educated at Hamilton College, where he studie<l in 182.i-2(!, and at Yale, where he grad- uated in 1828. He was assistant at Yale to Ben- jamin Silliuian. From 1830 to 18(i(? he occupied the chair of chemistry, pharmacy, mineralogy, and geology at Dartmouth College. From 18(16 to 1871 he was a general lecturer on those subjects, and from 1871 until his retirement as professor emeritus in 1883 was again connected with the faculty of Dartmouth, holding the professorship of chemistry and pharmacy. In 1832 he made investigations in the Kastern I'nited States in connection with the examination conducted by Silliman for the Secretary of the Treasury in regaril to the cultivation of the sugarcane. He ■was a member of the New Hampshire State Leg- islature in 1863-64, and a secretary of the Ameri- can Association of Geologists and Naturalists in 1844. He published a Lecture /iitroduclorii to the Eighty-third Coursr of the rw Hampshire Medical Institute at Dartmouth f'ullcge (1879) and a llistunj of Dartmouth Medical College ( 1880), and contributed to the American -/ournal of Science : "Observations Made Duringan Kxi-ur- sion to the White Mountains" ( 1838), "Geological .Surveys of New York, Ohio, Indiana, and .Mich- igan" (1840-41), "Condition of Trap Dikes in New Hampshire" (1850), and other articles. HUBBARD, Richard Wim.iam (1817—). . .mh ricaii painter, born at Middletown, Conn. He studied under Daniel Huntington, and in France. His landscapes include: ".Meadows Near Utica" (18)in); "Vermont Hills" (1874); "Autumn. Lake George"; "Connecticut Pastoral" (1880); "Lake in the Adirondacks" (1883); and ■D.iun in the .Meadows" (188.5), HUBBARD, Wii.UAM (1621-1704). . American clergynum and historian, born in Kng- land. As a child he was l)rouglit by his parents to New England, graduated at Harvard (l(i42), was ordained, and became assistant and after- wards pastor of the Congregational church at Ipswich, Mass., a post which he resigned Imt a year before his death. He wrote, at the order of the Colonial Government, which paid him fifty pounds for it, a llislorti of New England, mainly compilation, which liarely escaped destruction l)y fire when Gov. Thomas Hutchinson's house was mobbed in 1765. The Massachusetts Historical Society printed it in 1815. He wrote also A Xarrutire of Troubles uith the Indians (1677). which was for years popular in New England, and was even reprinted at the l)cginning of the nine- teenth century at Worcester, .Mass.. ISOl, and Rox- bury. -Mass., 1805. It is full of errors, hut illus- trates what was regarded by the writer's contem- poraries as an elegant prose style. Minor works are a volume of sermons (1684) and Testimony of the Order of the Gospel in Churches ( 1701 ). HUB'BARDTON. A (own in Rutland County. 't.. IS miles northwest of Rutland(Map: Vermont. B 7). It was the scene of a sharp conflict on .luly 7. 1777, between the rear-guard of (icncral Saint Clair's army, retreating from Ticonderoga. and a British and Hessian force under (icnerals Eraser and Kiedesel. The .Ameri- cans under Colonels Warner ami Francis were defeated, with a total loss in killed, wounded, and prisoners of 324 men. nearly one-third their number, while the British loss was only 183. A monument commemorates the battle. Popula- tion, in 1890. .506; in 1900. 488. HUBE, hiTT.'bf, RoMfALD (1803-90). A Polish jurist, born at Warsaw, and educated there, at Cracow, and in Berlin. From 1820 to 1832 he was professor of criminal law at Warsaw, then became head of a committee on revision of the laws of Poland, and was for a time profes- sor at Saint Petersburg. In 1846. and again in 1807, he went with Count Bludoff on diplomatic missions to Rome, He died at Warsaw after thirteen years' service in the Russian Council of State, His works include: treatises on penal law (1828) : on Polish criminalists ( 1830) ; Antiquis- simtr Const itutiones Synodales Provineiw Qnes- nensis (1856) : Loi ftalif/ue (1867) ; Uistoire de la formation de la loi Bourguignonne (1867); Droit romain et grico-byzantin ches les peuples
WIKI
ใคร Etymology . Compare the dialectal, from 🇨🇬, from which the following are also derived: 🇨🇬; 🇨🇬, ; 🇨🇬; 🇨🇬; 🇨🇬; 🇨🇬; 🇨🇬; 🇨🇬,. Pronoun * 1) who; which person; what person? * 2) whoever; anyone; someone; everyone; they (people in general). * 3) person; one. * 1) person; one. * 1) person; one. * 1) person; one.
WIKI
Bosu Medicine Ball Stability Ball Foam roller Back pain is a problem that affects most of us at some point in our lives, but it is not always easy to identify the cause. If you suffered a back injury then the occurrence of your back pain is clear, but what if you have pain in your back for no apparent reason? Suddenly got lower back pain? Lower back pain can occur after doing heavy lifting or repetitive movements beyond your usual range, digging in the garden or clearing a garage for example could leave you feeling sore the next day with a noticeable lack of flexibility. Lower back pain from performing activities that are strenuous often starts the next day and could last for 24-72 hours. If your back pain occurred whilst doing the activity then you may need to seek the attention of a registered physiotherapist, chiropractor or GP. The general advice for muscular back pain is to perform gentle flexibility exercises and to keep active to encourage range of movement to return to the affected muscles. Lower back stretch: Sit on a chair, lean forward and hug your knees, hold the stretch for 30 seconds, repeat if needed. Spine mobility: On the floor, get on your hands and knees, slowly arch your back up towards ceiling and then down towards floor, repeat for a minute. Had back pain for a while now? Poor posture – Incorrect alignment of the spine, shoulders or pelvis can place additional strain on muscles leading to muscle spasms. Muscle spasms can be very painful when they occur and may concern you as they can last for a long time reducing your ability to perform daily tasks. Correcting posture through exercise may be the solution to reduce the possibility of spasms in muscles that are overloaded by strengthening weak muscle groups and increasing flexibility in tight muscle groups. Muscle inflexibility – Tight, short or inflexible muscles reduce the range of movement in joints and often the opposing muscle group will be long or flexible. People who spend many hours using a computer tend to have short, tight chest muscles and long, flexible upper back muscles. Exercises that strengthen the upper back muscles and lengthen the chest muscles will help to improve posture in this instance. Mis-aligned vertebrae – Sometimes back pain is not due to muscles and requires the attention of a chiropractor or osteopath to re-align vertebrae or ribs that have moved out of the correct anatomical position. These problems can occur simply from the position that you slept in or a movement that was out of your usual range. Disc problem – Probably the issue that is most serious and requires careful care to ensure it is not made worse. A herniated or bulging disc can be extremely painful and debilitating and requires the attention of a GP, physiotherapist or highly qualified personal trainer. Developing more strength in the muscles that support the spine like the transverse abdominus can help to reduce the amount of pressure placed on the affected disc but as mentioned it is important to seek advice about the correct exercises from a professional as the problem could be exacerbated through incorrect treatment. The good news is that back pain can be managed and often in a short amount of time it can be possible to reduce or even remove your back pain just by making some small changes to your body or the activities you perform. The best option to avoid back pain is to maintain good strength and flexibility through regular training. Frank recommends: Stability BallMedicine BallBosuFoam Roller        
ESSENTIALAI-STEM
-- Australia Will Send Team to East Timor to Discuss Plan for Refugee Center Australia will send a delegation to East Timor this week as it pursues a plan to open a refugee processing center in the Southeast Asian nation to cope with a surge in asylum seekers arriving by boat. East Timor is the only nation Australia has approached to open a such a bureau, Foreign Minister Stephen Smith told Australian Broadcasting Corp. television today. More than 3,500 people have arrived in Australia on 75 boats this year, Immigration Department figures show, compared with 2,726 on 60 boats in 2009. Julia Gillard , who became prime minister on June 24, announced plans for the center last week, as she seeks to modify the government’s border control policy before an election is held this year. East Timor, which borders part of Indonesia on an island about 500 kilometers (310 miles) north of Australia, hasn’t approved the plan. The country became independent in 2002. “We will be sending officials to East Timor in the course of this week to start a detailed discussion,” Smith said. “We’ve got to try and find a regional solution to this very difficult problem.” Gillard last week said she wants to “wreck” the people smuggling trade, the second of three key issues she identified when she became prime minister. The others are an agreement on a proposed mining tax that was announced July 2 and reaching “consensus” on action to tackle climate change. Opposition’s Policy The government’s East Timor proposal was released the same day opposition leader Tony Abbott updated his policy. Abbott has pledged to re-establish processing centers offshore for asylum applications, refuse claims from those who discard their identification and turn back refugee boats if his coalition wins the election. Australia will hold a federal election some time before the end of 2010, Gillard said last month. As of July 1, there were 2,573 people in detention on Christmas Island, an Australian territory more than 800 kilometers off the northwestern coast. About 1,503 people, who arrived by boat were transferred to mainland detention centers in Sydney, Darwin, Melbourne, Brisbane, Perth and regional centers in Curtin and Leonora in Western Australia and Port Augusta in South Australia state. To contact the reporter on this story: Robert Fenner in Melbourne at rfenner@bloomberg.net
NEWS-MULTISOURCE
Page:Dictionary of National Biography volume 13.djvu/234 sums thus accrued to them from royalties alone. In 1864 the concern was changed into a limited liability company, and with a view to increasing the interest felt by the employés in the working of the business, a portion of the shares in the new company were offered to them under favourable conditions, and were very generally accepted. Crossley was elected in the liberal interest as M.P. for Halifax, 8 July 1852; he sat for that borough until 1859, when he became the member for the West Riding of Yorkshire. On the division of the riding in 1868 he was returned for the northern division, which he continued to represent to the time of his decease. His generosity was on a princely scale. His first great gift to Halifax consisted in the erection of twenty-one almshouses in 1855, with an endowment which gave six shillings a week to each person. On his return from America in 1855 he announced his intention of presenting the people of Halifax with a park, and on 15 Aug. 1857 this park was opened. It consists of more than twelve acres of ground, laid out from designs by Sir Joseph Paxton, and, with a sum of money invested for its maintenance in 1867, cost the donor 41,300l. About 1860, in conjunction with his brothers John and Joseph, he began the erection of an orphan home and school on Skircoat Moor. This was completed at their sole united cost, and endowed by them with a sum of 3,000l. a year; it is designed for the maintenance of children who have lost one or both parents, and has accommodation for four hundred. In 1870 he founded a loan fund of 10,000l. for the benefit of deserving tradesmen of Halifax, and in the same year presented to the London Missionary Society the sum of 20,000l., the noblest donation the society had ever received. About the same period he gave 10,000l. to the Congregational Pastors' Retiring Fund, and the like sum towards the formation of a fund for the relief of widows of congregational ministers. He was mayor of Halifax in 1849 and 1850, and was created a baronet 23 Jan. 1863. After a long illness he died at Belle Vue, Halifax, 5 Jan. 1872, and was buried in the general cemetery on 12 Jan., when an immense concourse of friends followed his remains to the grave. The will was proved 27 May 1872, when the personalty was sworn under 800,000l. He married, 11 Dec. 1845, Martha Eliza, daughter of Henry Brinton of Kidderminster, by whom he had an only son, Savile Brinton, second baronet, M.P. successively for Lowestoft and for Halifax. He was the author of ‘Canada and the United States,’ a lecture, 1856. [Drawing-room Portrait Gallery (1859), with portrait; Statesmen of England (1862), with portrait; Sir F. Crossley, Bart., Religious Tract Society, Biog. Ser. No. 1028 (1873); Smiles's Thrift (1875), pp. 205–17; Illustr. News of the World, vol. iii. (1859), with portrait; Times, 6 Jan. 1872, p. 12; Illustr. London News, lx. 55, 57, 587 (1872), with portrait; Family Friend, 1 March 1870, pp. 39–43, with portrait.] CROSSLEY, JAMES (1800–1883), author, was born at Halifax on 31 March 1800, being the son of James Crossley, a merchant of that town, and Anne, his wife, daughter of William Greenup of Skircoat. He was educated at the grammar schools of Hipperholme and Heath, where he was well grounded in the classics. When he left school in 1816 he went to Manchester, and in the following year was articled to Thomas Ainsworth, solicitor, father of the novelist, W. Harrison Ainsworth [q. v.], whose literary mentor he became. Crossley's father possessed a fair library, and the youth, having a free run of the books, acquired a decided taste for literature, especially for the Latin poets and the old English writers, a predilection which was fostered by Thomas Edwards, the bookseller and binder of Halifax, and further developed by frequent recourse to the Chetham Library at Manchester. Before he was out of his teens he began writing for ‘Blackwood's Magazine,’ his first article appearing in January 1820. It was an able essay on Sir Thomas Browne. Other disquisitions soon followed, viz. on ‘Sir Thomas Urquhart's “Jewell”’ (March 1820) on the ‘Literary Characters of Bishop Warburton and Dr. Johnson’ (December 1820); on ‘Beard's Theatre of God's Judgments;’ on ‘Manchester Poetry;’ ‘Manchester versus Manchester Poetry;’ a charming essay on Chetham's Library (June 1821); on ‘Sir Thomas Browne's Letter to a Friend;’ on the ‘Comedy of Eastward Hoe;’ and on Jasper Mayne's ‘City Match.’ When the ‘Retrospective Review’ was started in 1820 he rendered great assistance to the editors, and, among other papers, contributed the following: on ‘Sir Thomas Browne's Urn-Burial,’ ‘Jerome Carden,’ ‘Sir Philip Sidney,’ and ‘The Arcadia’ (reprinted in separate form in 1853); on Fuller's ‘Holy and Profane State;’ and on ‘Quarles's Enchiridion.’ Some years later, it is said, he assisted Lockhart in the ‘Quarterly Review,’ but whether he is answerable for any of the articles in that work is not known. In 1822 he edited a small duodecimo volume of ‘Tracts by Sir Thomas Browne, Knight, M.D.,’ of which five hundred copies were printed. He intended to bring out a complete edition of Browne's works, but was
WIKI
Friday, November 25, 2022 Is It Safe To Use Cannabis Before Or After Surgery? Your body may react to anesthesia differently depending on how you ingest cannabis, how often you partake, and your dosage. If you’re planning to use marijuana before surgery, it’s crucial to do so safely. Start by talking to your doctor about whether it’s a good idea for you to use marijuana before surgery. Cannabis can interact with other medications, so it’s important to know what you’re taking and how those interactions might affect you. It’s also best to avoid vaping or smoking marijuana before surgery, as smoking or vaping can irritate your lungs and make it harder to heal. pain post surgery marijuana Photo by engin akyurt via Unsplash Weed and Anesthesia When it comes to weed and anesthesia, it is necessary to follow the advice of your doctor and anesthesiologist. While some people think that using marijuana before anesthesia will make them more relaxed during surgery, it can lead to complications. Your body may react to anesthesia differently depending on how you ingest cannabis, how often you partake, and your dosage. Marijuana and anesthesia affect the central nervous system similarly, which means people who regularly consume marijuana may require more anesthesia. Therefore, your doctor needs to know how much and how often you use marijuana to determine what to give you. Anesthesiologists agree you should avoid eating cannabis edibles and smoking marijuana for at least six hours before anesthesia. In some cases, eating before surgery can cause aspiration pneumonia, a severe complication that can result in death. If someone is put under anesthesia within an hour or two of using marijuana, he or she is at an increased risk of complications. This risk is most profound in patients with cardiovascular disease, increasing their chances of experiencing strokes. If you want to know about smoking weed after anesthesia, ask your anesthesiologist as the answer will vary based on the surgical procedure and a variety of other factors. Smoking Weed After Wisdom Teeth Removal Smoking weed after wisdom teeth removal is often a concern for patients. Many people want to know if it’s safe to smoke weed after getting wisdom teeth removed and whether it will cause more pain or damage. Some people can smoke weed safely after wisdom teeth removal without any problems, while others may experience some anesthesia-related side effects like dizziness, nausea, or vomiting. If you are considering smoking weed after wisdom teeth removal, it is best to speak with your dentist first. They can advise you on if it is safe and any precautions you should take. In general, it is not recommended to smoke weed within 48 hours after getting wisdom teeth removed. RELATED: Marijuana Users Might Experience More Pain Post Surgery — Here’s Why Smoking weed after wisdom teeth removal increases the risk of developing dry sockets. A dry socket happens when the blood clot at the extraction site comes loose or falls out prematurely due to trauma like smoking or using straws. Smoking weed can dry out saliva, which increases your risk of developing a dry socket. Want to know how weed causes dry mouth? dentist Photo by Cedric Fauntleroy via Pexels One of the most frequently asked questions is, “Can you eat edibles after wisdom teeth removal?” In general, the answer is yes. Edibles are a great way to relieve pain and improve sleep after surgery. Just make sure to avoid anything crunchy or chewy, as it could irritate the surgical site. However, you should avoid ingesting cannabis if you are on narcotic painkillers due to the surgery. Additionally, if you want to use cannabis edibles after wisdom teeth removal, you should consult your dentist. The topic hasn’t been extensively researched, so they will give you the best advice. Additionally, make sure your dentist knows that you smoke weed before you go under anesthesia. Cannabis After Surgery Consuming cannabis after surgery is a popular choice due to its pain-relieving properties. Some people also enjoy smoking weed after surgery to reduce nausea and vomiting, which are common side effects of surgery and anesthesia. Additionally, cannabis can make it easier to fall asleep while you’re recovering from your procedure. RELATED: Is Marijuana A Depressant? If you’re heading into surgery in the future, know that smoking weed before getting anesthesia can increase the risk of complications. This topic is not well-studied, so we advise you to speak with your doctors, surgeons, and anesthesiologists about using cannabis before or after surgery. Get Started On Your Cannabis Wellness Journey Have you started your cannabis wellness journey? Jointly is a new cannabis wellness app that helps you discover purposeful cannabis consumption so you can achieve your wellness goals with cannabis and CBD. On the Jointly app, you can find new cannabis products, rate products based on how well they helped you achieve your goals, and track and optimize 15 factors that can impact your cannabis experience. These 15 factors include your dose, the environment in which you consume cannabiswho you are with when you ingesthow hydrated you arethe quality of your diethow much sleep you got last night, and more. Download the Jointly app on the App Store or the Google Play Store to get started on your cannabis wellness journey. Sam Anderson is the content Director at Jointly, a cannabis wellness company powered by a proprietary data platform to help people reach their full potential. The company was created on the premise that purposeful cannabis consumption is the key to unlocking a better you. This article originally appeared on Jointly and has been reposted with permission. MUST READ MORE BY THIS AUTHOR How To Get A Medical Marijuana Card From A Doctor Not all doctors can recommend medical cannabis. Only cannabis doctors registered in your state can recommend medical marijuana. In the United States, medical marijuana is legal... Don't Miss Your Weekly Dose of The Fresh Toast. Stay informed with exclusive news briefs delivered directly to your inbox every Friday. We respect your privacy. Unsubscribe anytime.
ESSENTIALAI-STEM
Hopes of U.S. tax cuts lift dollar index to 3-week high NEW YORK (Reuters) - The dollar rose to a near three-week high against a basket of currencies on Monday, lifted by hopes of U.S. tax cuts to stoke corporate profits and investments, as well as bets on whether the Federal Reserve may raise interest rates more quickly. The greenback last week booked its strongest gain since mid-December after U.S. President Donald Trump on Thursday promised a “phenomenal” tax plan that the White House said would include tax cuts for businesses and individuals. Investors hope Trump’s promise of a tax plan signals that the focus of the president and his aides is shifting away from trade protectionism and security, and toward policies that promote economic growth. “People seemed to be more comfortable with the fiscal policy outlook. It’s been friendly for stocks and also for the dollar,” said Thierry Albert Wizman, global interest rates and currencies strategist at Macquarie Group Ltd in New York. The dollar index, which measures the greenback against six other currencies, reached 101.11, its strongest level since Jan. 20. It was last up 0.15 percent at 100.95. The dollar advanced to a two-week peak against the yen following reports that Trump did not discuss the currency or its strength during weekend talks with visiting Japanese Prime Minister Shinzo Abe. The dollar was last up 0.4 percent at 113.60 yen. The outcome of the two leaders’ meeting was an affirmation for Japan in the face of challenges such as China’s maritime expansion and North Korea’s nuclear weapons and missile development. The euro slipped to its lowest level against the dollar since Jan. 19, Reuters data showed. The single currency was last down 0.4 percent at $1.0600. Investors are also focused on testimony by Federal Reserve Chair Janet Yellen before Congress on Tuesday and Wednesday in the wake of hints from other policy-makers who are leaning toward more hikes in interest rates this year than the two currently priced in by markets. “I doubt that she will try to explicitly jawbone the markets to expect a March move, but I also do not think she wants March to be priced out,” Stephen Stanley, chief economist at Amherst Pierpont Securities, wrote in a research note. Interest rates futures implied traders saw a 21 percent chance the Fed will increase rates at its March 14-15 policy meeting, little changed from Friday, according to CME Group’s FedWatch program. [FED/DIARY] Currency bid prices at 2:38PM (1938 GMT) Description Last U.S. Close Pct Change Previous Session Euro/Dollar $1.0599 $1.0638 -0.37% Dollar/Yen 113.5500 113.1900 +0.32% Euro/Yen 120.41 120.40 +0.01% Dollar/Swiss 1.0048 1.0020 +0.28% Sterling/Dollar 1.2527 1.2489 +0.30% Dollar/Canadian 1.3061 1.3078 -0.13% Australian/Doll 0.7643 0.7669 -0.34% ar Euro/Swiss 1.0657 1.0667 -0.09% Euro/Sterling 0.8459 0.8507 -0.56% NZ 0.7174 0.7194 -0.28% Dollar/Dollar Dollar/Norway 8.3796 8.3573 +0.27% Euro/Norway 8.8886 8.9205 -0.36% Dollar/Sweden 8.9308 8.9195 -0.27% Euro/Sweden 9.4685 9.4937 -0.27% Additional reporting by Shinichi Saoshiro in TOKYO and Patrick Graham, Marc Jones in LONDON; Editing by Will Dunham and Leslie Adler
NEWS-MULTISOURCE
Talk:Prince Kuni Asahiko Update While trying to add in-line citations, I found that this article may be relying too much on one source (Keene). Darwin Naz (talk) 23:59, 14 October 2019 (UTC) 朝彦 can be read Asahiko or Tomoyoshi. T/O 高堂升平 (talk) 23:52, 1 June 2024 (UTC)
WIKI
Wiktionary talk:Votes/2010-09/Enabling AbuseFilter extension For me, the obvious question What the f*** is it? Mglovesfun (talk) 21:28, 21 September 2010 (UTC) * Beats me - and I've read the blurb. SemperBlotto 21:34, 21 September 2010 (UTC) * Essentially, it is a simple filter that allows us to track, and prevent, certain types of edits (using conditionals - if/and/or and regexes) - that way, combatting vandalism can be made more effecive, for example by adding a filter on large removals. -- Prince Kassad 21:39, 21 September 2010 (UTC) * Of course, if you want something explained in straightforward English, ask a German! Mglovesfun (talk) 21:41, 21 September 2010 (UTC) * See w:Wikipedia:Edit filter for some information. --Yair rand (talk) 21:42, 21 September 2010 (UTC) what does it filter Some questions about the extension: Feel free to answer any questions, revert me, or tell me to go fuck myself. --Felonia 11:51, 16 October 2010 (UTC) * 1) Would it mean I'd be automatically blocked if I told someone to go fuck themselves for no reason? * 2) Would it stop me linking to hardcore porn sites, attack sites, and racist websites? * 3) With it enabled, would it be able to tell which Wiktionarians are total jerks? * 4) If you don't understand something, should you really vote against it? * 5) If an admin decides to go rouge and do something really gay, like, for example, delete the main page and other useful pages, before blocking the entire group of administrators and sending a "yay, I deleted the main page again" message to the beer parlour, would the admin be able to? * 6) If not, is there a way for the hypothetical admin to disable the filter? * Felonia is Wonderfool, AFAICT, although no perfect evidence is available right now AFAIK. --Dan Polansky 12:00, 16 October 2010 (UTC) * I'm actually not Wonderfool. --Felonia 12:21, 16 October 2010 (UTC) * When I read the first post in this very thread again, the post contains several signs that point to your being Wonderfool. Either you are Wonderfool, or you are a person with Wonderfool-behavior. The latter is only slightly better than the former. --Dan Polansky 12:31, 16 October 2010 (UTC) * OK then, let's play - let's assume I'm Wonderfool: what now? What will you do? What will I do? * And now, let's assume that I'm not Wonderfool? What now? What will you do? What will I do? --Felonia 12:51, 16 October 2010 (UTC)
WIKI
David Elm (footballer) David Elm (born 10 January 1983) is a Swedish former professional footballer who played as a striker. He played professionally for the Swedish clubs Kalmar FF, Falkenbergs FF and IF Elfsborg – and also played for Fulham in the English Premier League during a career that spanned between 2004 and 2017. He is the older brother of fellow former footballers Rasmus Elm and Viktor Elm. Early career Elm began his career playing for youth clubs Johansfors IF and Emmaboda IS, alongside his younger brothers Rasmus and Viktor (although he went on to play for Nybro IF). Falkenbergs FF Elm moved to Superettan club Falkenbergs FF on a free transfer in 2004. Upon his arrival, he quickly established himself as first-choice. In his time there, he scored a total of 14 goals on 68 matches. He left Falkenbergs FF for Allsvenskan club Kalmar FF at the end of the 2006 season. Kalmar FF At Kalmar FF, Elm was mostly used as a substitute during his first season. However, after several departures, he became first-choice in the 2008 season, contributing 7 goals in 27 games, which saw Kalmar win the Swedish Cup. Kalmar also went on to win Allsvenskan for the first time in the club's history. This led to a possible move to Fulham. Fulham On 1 September 2009, Elm signed for Premier League side Fulham for an undisclosed fee, thought to be around £500,000. Spokesman Patrick Mörk stated that Fulham chief scout Barry Simmonds held talks with Elm. He also stated that Roy Hodgson had personally attended the second leg between Kalmar and Hungarian club Debrecen in the Champions League first qualifying match, which Hodgson was interested in. He also suggests that Elm might come to be featured in the squad as a midfielder. On 23 September 2009, Elm made his Fulham debut on in a 2–1 away defeat to Manchester City in the League Cup third round, replacing Eddie Johnson in the 91st minute. On 9 February 2010, Elm scored his first goal for Fulham, netting the second in a 3–0 home win over Burnley in the Premier League, he also assisted Danny Murphy for Fulham's first goal. At the end of the 2009–10 season, he signed a contract extension lasting until the end of the 2011–12 season. Elfsborg On 24 January 2011, Elm signed a five-year contract with Swedish club IF Elfsborg. The estimated transfer sum was around £500,000- £1,000,000, Elm transferred from Fulham due to lack of playing time. Elm was bought by Elfsborg because they had recently sold their top striker Denni Avdic to Werder Bremen for around £2,500,000 – £3,000,000. The similarities were the height of both of the players, even if David is more of a target man, exactly what the former head coach Magnus Haglund was looking for. During Elm's first season he played 25 matches, scored 7 times and assisted two times. He had a hard time in the beginning to get into the first squad, but after he scored in important matches he gained trust from the coach and the audience. In the 2010–11 season he scored the winning goal in a 3–2 derby win against IFK Göteborg, netting in the 93rd minute. Return to Kalmar FF and retirement He returned to Kalmar FF during the summer of 2013. He retired from professional football after the 2017 season. He spent one season with his boyhood club Johansfors IF in Division 6 in 2018. Style of play Elm's favourite playing position is supporting striker, connecting his striking partner, with the wingers. At Fulham, his preferred partnership was with Andrew Johnson, creating what was known as 'Jelm'. He has been compared to Peter Crouch, tall, strong and good with the head. Personal life He has two brothers, Rasmus and Viktor who both plays for Kalmar FF. Elm is a fan of Swedish indie band Kent and The Boss. He has a child named Alve. Honours Kalmar FF * Allsvenskan: 2008 * Svenska Cupen: 2007 Elfsborg * Allsvenskan: 2012
WIKI
I Was a Communist for the FBI I Was a Communist for the FBI is a 1951 American film noir crime film directed by Gordon Douglas and starring Frank Lovejoy. The film was produced by Bryan Foy who was head of Warners B picture unit until 1942. The film was based on a series of stories written by Matt Cvetic that appeared in The Saturday Evening Post. The stories were later turned into a best-selling book, and a radio show starring Dana Andrews that ran for 78 episodes from April 23, 1952, until October 14, 1953. The story follows Cvetic, who infiltrated a local Communist Party cell for nine years and reported back to the Federal Bureau of Investigation (FBI) on their activities. Plot Matt Cvetic (Frank Lovejoy), who works in a Pittsburgh steel mill, has been infiltrating the Communist Party for the FBI in Pittsburgh for nine years. During this time he has been unable to tell his family about his dual role, so they assume that he is a genuine believer in communism and despise him. He becomes emotionally involved with a Communist school teacher (Dorothy Hart), who is becoming disenchanted with the party. She breaks with the party when it foments a violent strike. Cvetic helps her escape the Communists in violent sequences in which two Communists and an FBI agent are killed. Communists are portrayed in the film as hypocritical opportunists who are interested only in seizing power on behalf of the Soviet Union, and in living luxuriously (e.g., having caviar and champagne at a Party party) instead of ascetically. They are shown exploiting ethnic tensions to get their way, such as by wrapping copies of a Jewish newspaper around lead pipes used to beat up people during a strike. They also are shown fomenting discontent among blacks. They are shown as cynical racists, calling blacks "niggers" and Jews "kikes," and as violent thugs who kill informers. Cvetic ultimately testifies against the Communists before the House Un-American Activities Committee and reconciles with his brother and son. Cast * Frank Lovejoy as Matt Cvetic * Dorothy Hart as Eve Merrick * Philip Carey as Mason * James Millican as Jim Blandon * Richard Webb as Ken Crowley * Konstantin Shayne as Gerhardt Eisler * Paul Picerni as Joe Cvetic * Roy Roberts as Father Novac * Edward Norris as Harmon (as Eddie Norris) * Ron Hagerthy as Dick Cvetic * Hugh Sanders as Clyde Garson * Hope Kramer as Ruth Cvetic * Lyle Latell as FBI Officer Cahill Radio The radio version of I Was a Communist for the FBI consisted of 78 episodes syndicated by the Frederick W. Ziv Company to more than 600 stations, including KNX in Los Angeles, California, with original episodes running from March 30, 1952, to September 20, 1953. The program was made without the cooperation of the FBI. Real-life undercover agent Matt Cvetic was portrayed by Dana Andrews. The show had a budget of $12,000 per week, a very high cost to produce a radio show at the time. The program frequently dealt with the great stress that Cvetic was under, as he covertly infiltrated a local Communist Party cell. There were many personal and family problems caused by his being a Communist as well as a certain amount of mental torment. He saw the party as being hypocritical and a great danger to society. In 1953, Ziv created I Led Three Lives, based on the life of Herbert Philbrick, an advertising executive who also infiltrated the U.S. Communist Party on behalf of the FBI in the 1940s. This time, the FBI approved all of the show's scripts. Box office According to Warner Bros, records, the film earned $1,319,000 in the U.S. and $440,000 elsewhere. Critical response When the film was released, The New York Times film critic Bosley Crowther was critical of the message in the film. He wrote, "In many respects, this heated item bears comparison to the hearings before the House Un-American Activities Committee—which, incidentally, it extols...For instance, in glibly detailing how the Communists foment racial hate and labor unrest in this country...[it] hint[s] that most Negroes and most laborers are 'pinks'. It raises suspicion of school teachers...[and] that people who embrace liberal causes, such as the Scottsboro trial defense, are Communist dupes...and the film itself glows with patriotism. But it plays a bit recklessly with fire". The staff at Variety magazine wrote a positive review: "From the real life experiences of Matt Cvetic [published in the Saturday Evening Post as I Posed as a Communist for the F.B.I], scripter Crane Wilbur has fashioned an exciting film. Direction of Gordon Douglas plays up suspense and pace strongly, and the cast, headed by Frank Lovejoy in the title role, punches over the expose of the Communist menace." Accolades This dramatic film was nominated for an Academy Award as the Best Documentary Feature of the year. Audio streaming * I Was A Communist for the F.B.I. "I Walk Alone" episode, on the Ziv Television Programs: Apr 23, 1952
WIKI
Comments:Wikinews interviews Donald K. Allen, independent candidate in US presidential elections "Right now Americans are receiving Pavlovian conditioning, hearing the name, "Obama," ten thousand times a day, and "McCain," six thousand times a day." I like that quote! Harris Morgan (talk) 23:55, 7 July 2008 (UTC). We need a candidate chosen by the people, not one forced on us. I'm 66 years old person and have seen many Presidents come and go. But this is the first election I am powerless to chose a qualified candidate, except for Donald K. Allen. A political machine shoved Bush down my throat and got a lot of young men killed in a war that never should have been. Face it, it was all about oil, not 9/11. Now once again this political machine wants to shove yet another unqualified candidate down my throat. If we as Americans want our country back and the respect of the world once again then we need to look away from the Republican and Democrat political machine and toward ourselves and Donald K Allen to help us. He is indeed our best chance for our values and freedoms for ALL America. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 22:21, 5 September 2008 (UTC)
WIKI
The Glasshouse, Gateshead The Glasshouse is an international centre for musical education and concerts on the Gateshead bank of Quayside in northern England. Opened in 2004 as Sage Gateshead and occupied by North Music Trust The venue's original name honours a patron: the accountancy software company The Sage Group. History Planning for the centre began in the early 1990s, when the orchestra of Sage Gateshead, Royal Northern Sinfonia, with encouragement from Northern Arts, began working on plans for a new concert hall. They were soon joined by regional folk music development agency Folkworks, which ensured that the needs of the region's traditional music were taken into consideration and represented in Sage Gateshead's programme of concerts, alongside Rock, Pop, Dance, Hip Hop, classical, jazz, acoustic, indie, country and world, Practice spaces for professional musicians, students and amateurs were an important part of the provision. The planning and construction process cost over £70 million, which was raised primarily through National Lottery grants. The contractor was Laing O'Rourke. The centre has a range of patrons, notably Sage Group which contributed a large sum of money to have the building named after it. Sage plc has helped support the charitable activities of Sage Gateshead since its conception. The venue opened over the weekend 17–19 December 2004. Sage Gateshead was developed by Foster and Partners following an architectural design competition launched in 1997 and managed by RIBA Competitions. Over 100 architects registered their interest and 12 – a mixture of local, national and international talent – were invited to prepare concept designs. A shortlist of six was then interviewed with Foster and Partners unanimously selected as the winner. The Design has gone on to win a number of awards: the RIBA Inclusive Design Award, Civic Trust Award and The Journal North East Landmark of the Year Award. As a conference venue, the building hosted the Labour Party's Spring conference in February 2005 and the Liberal Democrat Party conference in March 2012. On 18 August 2009, Sage Gateshead was selected to host the 2010 and 2011 National Union of Students annual conference. The 2010 Annual Conference took place 13–15 April 2010. It also hosts accessible learning courses for all ages and its constant interaction with local schools and academies through programmes such as Sing Up and the option of school visits. In 2022 The Sage Group announced that they were also sponsoring a new development that is being built next to Sage Gateshead which will be called The Sage. Sage Gateshead announced that they will be finding a new name for the venue prior to The Sage opening in 2024. On 13 September 2023 the venue announced its new name, The Glasshouse International Centre for Music. Building The centre occupies a curved glass and stainless steel building designed by Foster and Partners, Buro Happold (structural engineering), Mott MacDonald (engineering consultants) and Arup (acoustics), with views of Newcastle and Gateshead Quaysides, the Tyne Bridge and the Gateshead Millennium Bridge. The Glasshouse contains three performance spaces; a 1,700-seater, a 450-seater, and a smaller rehearsal and performance hall, the Northern Rock Foundation Hall. The rest of the building was designed around these three spaces to allow for maximum attention to detail in their acoustic properties. Structurally it is three separate buildings, insulated from each other to prevent noise and vibration travelling between them. The gaps between them may be seen as one walks around inside. A special 'spongy' concrete mix was used in the construction, with a higher-than-usual air capacity to improve the acoustic. These three buildings are enclosed (but not touched) by the now-famous glass and steel shell. Sage One was intended as an acoustically perfect space, modelled on the Musikverein in Vienna. Its ceiling panels may be raised and lowered and curtains drawn across the ribbed wooden side walls, changing the sound profile of the room to suit any type of music. Sage Two is a smaller venue, possibly the world's only ten-sided performance space. The building is open to the public throughout the day. Concerts The Glasshouse hosts concerts from a wide range of internationally famous artists, and those who have played at the venue include Above and Beyond, Blondie, James Brown, Bonobo, Andy Cutting, De La Soul, Nick Cave, George Clinton, Bill Callahan, Crosby, Stills & Nash, Dillinger, Grace Jones, Gretchen Peters, Elbow, Explosions in the Sky, the Fall, Herbie Hancock, Mogwai, Morrissey, Marillion, Mumford & Sons, Pet Shop Boys, Sunn O))), Nancy Sinatra, Snarky Puppy, Sting, Yellowman, Shane Filan of Westlife and others. In February 2015, it was one of the hosts of the second annual BBC Radio 6 Music Festival. It is also home to Royal Northern Sinfonia, of which The Guardian wrote there is "no better chamber orchestra in Britain", and frequently hosts other visiting orchestras from around the world. Until 2020, the music director for Royal Northern Sinfonia was the pianist and conductor Lars Vogt. In late 2014, Royal Northern Sinfonia collaborated with John Grant, performing at Sage Gateshead, and other venues throughout the UK. Recordings from this tour were made available as a limited edition CD and 12" record via Rough Trade Records in 2015. Awards * 2019: UK National Lottery 25th Birthday Award - Best Arts, Culture and Film * 2019: Julie's Bicycle Creative Green 2 Star * 2019: Gold Standard - Attitude is Everything * 2018: Gold Award for Inclusive Tourism (North East Tourism Awards) * 2018: Gold Award for Business Tourism (Visit England Awards for Excellence) * 2005: Local Authority Building of the Year * 2005: British Construction Industry Awards * 2005: RIBA Award for Inclusive Design
WIKI
About this Journal Submit a Manuscript Table of Contents Journal of Biomedicine and Biotechnology Volume 2008 (2008), Article ID 728908, 2 pages http://dx.doi.org/10.1155/2008/728908 Editorial Frontiers in the Convergence of Bioscience and Information Technology QinetiQ Limited, Malvern Technology Centre, St Andrew's Road, Malvern, Worcestershire WR14 3PS, UK Received 15 June 2008; Accepted 15 June 2008 Copyright © 2008 Daniel Howard. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. This special issue places its emphasis on the crossroads between computational modeling and the biosciences. It is ambitious but fruitful interdisciplinary research, and this special issue aims to illustrate different presentations of it. It offers those advancing knowledge in some particular area the view to related research activity and opportunities. Many of the articles exemplify how mathematics and computer simulation inform experimentation to obtain new knowledge about nature. Some articles represent discoveries and others review, introduce, test, or trial algorithms or tools that are potentially helpful to arrive at discoveries. A few articles, however, are reversed in that they demonstrate how bioinspired algorithms or biological devices can solve hard computational challenges. Consider that manipulating chemicals may compute an answer much faster than by means of the standard silicon-based computer and within this special issue there is an article by K. Li et al. describing the principles by which such a DNA computer can compromise an encryption algorithm that is central to present day secure communications. One might classify the articles in this special issue into three groupings: (1) those concerned with biological problems from molecular cell biology to systems biology, (2) those which apply classification algorithms in cancer diagnosis and methods of computer vision to anatomy, and finally (3) those which offer new knowledge or possibilities in bioengineering and biomedicine. The first grouping covers Systems Biology, an exciting interdisciplinary field that marries experiments with computer simulations. Synthetic and systems biotechnology, for example, is a technology at these frontiers that aims to sequester the services of micro-organisms for the benefit of mankind. Its ability to produce foods in a vat that would otherwise take up valuable land resources with conventional agriculture will offer flexibility in food production. In their article, M.-J. Han et al. reveal how knowledge and understanding of cell physiology in the presence of oleic acid are obtained for E. coli. Interesting research about signaling networks in retina, as induced by light exposure in mice, is presented by J. Krishnan et al. showing marked alterations in gene expression upon light exposure. Certain transcription factors are discovered to be important for the responses to light-induced retinal loss, revealing that many of the apoptosis-related genes are up- or downregulated in this process. In their article, R. Moreno-Sanchez et al. offer a very useful review of metabolic control analysis (MCA), a tool that represents a type of engineering control theory for cell biology and when applicable MCA can help to grapple with an understanding of the complex control of the metabolic pathways. Also in the first grouping, three articles by S. Huang and his colleagues develop the emergent and interdisciplinary field of infectomics, which is the study of infectomes encoded by the genomes of microbes and their hosts. Infectomics has potential to advance the rational strategies that will prevent and treat infectious diseases as these could require a full appreciation of the infectomes that contribute to microbial infections. There is a need to figure out how to dissect the dynamic duality relationship between symbiosis and pathogenesis in microbial infections, and advocates of this new field oppose what they see as the misguided, though current and popular, reductionist and Manichean views of the microbe-human host relationship. Another article on the topic of infectious diseases by K.-Y. Hwa et al. investigates the emerging and life-threatening infectious disease known as SARS, where there is a compelling need for the development of effective therapeutics. Their article presents interesting and potentially important findings, that molecular mimicry occurs between SARS-CoV and host proteins. They investigate how to predict those peptides that are worthy of exploration for their biological activity. The article by L. Hamel et al. provides novel insight into the field of phylogenetics with the idea of the spectra of a tree, and reviewers identified its potential to compare with phylogenetic trees across different genes and for detecting lateral gene transfer. The first grouping of articles also covers specialist numerical algorithms for gene sequencing, genomics, and proteomics. With genomic sequencing, an error in contig assembly causes serious error proliferation, and ConPath (P.-G. Kim et al.) is a tool that can address this problem. It constructs scaffolds, ordering and orienting separate sequence contigs by exploiting the mate-pair information between contig pairs. C.-K. Chan et al. develop the growing self-organized map (GSOM) for binning (the clustering of these unassembled DNA sequences). They report improvements over the binning that combines oligonucleotide frequency and self-organizing maps (SOMs), and identify suitable training features and quantitative measures for assessing results in this area. In their article, K. Han et al. develop an algorithm to search for the highly connected subgraphs in protein interaction networks because this might be helpful to predict protein function. The article by Mi-Young Kim expounds a new approach to the very important problem of text mining of biomolecular text, and is specifically concerned with detecting gene interactions. There follow two articles in biological chemistry with computational chemistry. C.-J. Kuo et al. solve the crystal structure of H. pylori undecaprenyl pyrophosphate synthase and perform virtual screening of inhibitors from a chemical library of thousands of compounds. M. Muddassar et al. explore receptor-guided 3D-QSAR to design IGF-1R inhibitors by pursuing careful statistical analysis to interpret the models that are obtained with the help of contour maps. The article by J.-C. Lue and W.-C. Fang proposes a compact integrated microsystem solution for robust, real-time, and onsite genetic analysis. It uses a preceding VLSI differential logarithm microchip that is designed to compute the logarithm of the normalized input fluorescence signals and a succeeding VLSI artificial neural network (ANN) processor chip to analyze the processed signals from the differential logarithm stage. It is submitted that the version of ANN chosen is particularly adept at recognizing the low-fluorescence patterns. The second grouping includes cancer diagnosis, biomedical imaging and also computational anatomy (the study of anatomical variability in health and disease via deformable templates as inspired by D'Arcy Wentworth Thompson). These fields sit in the frontiers of biosciences, image analysis, mathematics, and numerical methods. In this grouping, a number of articles implement (D. Howard et al.), evaluate (N. A. Lee et al.), or introduce (J. Kolibal et al.) techniques of image analysis to cluster, segment, or analyze images, or extract information or enrich biomedical images. For example, J. Woo et al. discuss multimodal data integration for computer-aided ablation of atrial fibrillation. Y. Park et al. analyze the interpoint dissimilarity comparisons in the hippocampus shape space to distinguish between hippocampi of subjects with three conditions (clinically depressed, high risk, and control subject), and discover the high-risk population closer in shape space to the control population than to the clinically depressed population. Additionally, they find that the left hippocampi carry more information than do the right. In their article, N. A. Lee et al. examine performance in the segmentation of high-resolution MRI subvolumes containing hippocampus, prefrontal cortex, and occipital lobe, as acquired on different scanners. They offer evidence that the alternating kernel mixture algorithm outperforms alternatives on the ten datasets considered. The availability of powerful imaging and other sensors, the availability of information technology, and the nature of modern threats point to population biometrics as a topic of enormous current and future importance. Implementing biometrics well is hard and is not yet properly understood. The methodological paper by Y. N. Shin et al. proposes a formal performance evaluation model for a biometric recognition system. They also implement face recognition systems based on the proposed model. The model seems to be useful in terms of database availability, compliance with standards, and evaluation costs. The proposed formalism may gain traction for other biometrics, and it has the potential to inform strategies for population-based biomedical imaging performance evaluation and standardization. The last article of this second grouping by J. Wichard et al. evaluates how bioinspired and computational intelligence algorithms compare in providing reliable early cancer diagnosis. The third grouping comprises articles which cover advances in biomechanics, biophysics, and biomedicine. It includes a detailed biomechanics study by J. S. Merritt et al. on the equine distal forelimb, which is a common location of injuries related to mechanical overload. These authors combine analysis with experiment in a fairly thorough but concise way to calculate the forces in the major tendons and joint reaction from kinematic and kinetic data of walking and trotting horses. Their findings point to the importance of muscle tendon wrapping when evaluating joint loading in the distal forelimb. The article by C. Handapangoda and M. Premaratne describes a novel numerical technique for modeling optical pulse propagation in inhomogeneous scattering and absorption cross-sections through weakly scattering biological tissues. The design of implantable electronic devices to interact with the nervous system is an active field, the development of an efficient system for long-term stimulation of the optic nerve is rather timely (e.g., it is required to evaluate the long-term safety of retinal implants), and the methodological report by J. A. Zhou et al. describes the design of a suprachoroidal electrical retinal stimulator for long-term application. Finally, two articles in the third category advance novel robots (H. Sawada et al.) and haptic solutions (K.-U. Kyung et al.) that interact with the human senses and which might prove helpful to the sensorially impaired. Daniel Howard
ESSENTIALAI-STEM
TransactionBatchStage From Request Tracker Wiki Jump to: navigation, search Introduction ScripExecOrder article gives you overview and example about what "stages" is and what happens if scrip in batch stage instead of create stage. In two words: If Scrip in batch stage then it's applied only when all transactions of the user's request have been created. When do you want to use batch stage • When people resolve tickets they can write a comment, in some setups it's cool to send a notification that the ticket is resolved to requestor and add the comment to the email. RT allows user to leave comment blank or RT as well could create a resolve transaction earlier than a transaction for the comment. In this situation batch stage can help you, you can find example of a template below. • Another situation when you need batch stage is custom field updates. Consider some page with custom fields change boxes and fields for other manipulations and for example you want set field X on status change. RT sets status (create transaction) in create stage your scrip updates a CF, but then RT reverts this change as it starts CFs update action which checks if object has values in arguments of the request, the new value is not there then RT deletes it. • Keep in mind that if your TransactionBatch scrip sends email, the email address of the people notified will not be visible while users are composing a reply. How to enable it? Add to RT_SiteConfig.pm (only needed in RT versions less than 3.8.2 which defaultes this to on) Set($UseTransactionBatch , 1); Then restart server to apply changes and now you can set stage for scrips you want to run in batch stage. How it works? This is complex Template that adds "last" comment to email. Template works in both stages, but works better in batch stage cause adds only comment that was added within resolve action only. -------------------- Clever 'resolved' template ---------------------- Subject: Resolved: {$Ticket->Subject} According to our records, your request has been resolved. If you have any further questions or concerns, please respond to this message. { my $old_user = $Ticket->CurrentUser; $Ticket->CurrentUser( $RT::SystemUser ); my $batch = $Ticket->TransactionBatch; my $comment; if( !$batch || !ref($batch) ) { $RT::Logger->info("TransactionBatch stage is disabled, fallback to last comment. Turn on TransactionBatch stages for acurate results."); my $transactions = $Ticket->Transactions; $transactions->Limit( FIELD => 'Type', VALUE => 'Comment' ); $transactions->OrderByCols( { FIELD => 'Created', ORDER => 'DESC' }, { FIELD => 'id', ORDER => 'DESC' } ); $transactions->RowsPerPage(1); $comment = $transactions->First; } else { $comment = (grep { ($_->Type eq 'Comment')? 1: 0;} @$batch)[0]; } $OUT = " "; if ( $comment ) { # Since we're effectively turning this comment into # correspondence, it is possible to use RT::Record to alter # history a bit here. This is normally really frowned upon, # but without this, users may be confused that the reply they # got by email isn't visible in the Web UI, because they don't # have the ShowTicketComment right RT::Record::_Set($comment, ( Field => 'Type', Value => 'Correspond' )); $OUT = "Resolution:\n"; $OUT .= ("-"x76) ."\n"; $OUT .= $comment->Content; } $Ticket->CurrentUser( $old_user ); } You can set the stage on your scrip from the Applies To page in 4.2, or from the Scrip page in 4.0.  In 4.2 you can even choose to run scrips in TransactionBatch mode on a per-queue basis. See also the Initialdata docs
ESSENTIALAI-STEM
Slack has hired Goldman Sachs for 2019 IPO Slack, a provider of chat and direct messaging services for businesses, has hired investment bank Goldman Sachs to lead its initial public offering (IPO) next year as an underwriter, people familiar with the matter said. The San Francisco-based company is among a string of Silicon Valley companies valued over $1 billion expected to debut in the stock market in 2019. Other IPO hopefuls include apartment-rental service Airbnb, analytics firm Palantir and Stripe, a digital payment company. Ride-hailing company Lyft beat bigger rival Uber in filing for an IPO this week, defying the recent market jitters that have weighed on corporate valuations. Slack is rounding up its underwriting syndicate and hopes to fetch a valuation of well over $10 billion in its IPO, whose exact timing will depend on market conditions, the sources said on Friday. The sources asked not to be identified because the matter is confidential. Slack and Goldman Sachs both declined to comment. Slack is competing against the likes of Microsoft's Teams, Alphabet's Google Hangouts Chat and Cisco's Webex Teams in the so-called workplace collaboration market, which research firm IDC has projected will be worth $3.2 billion by 2021. Slack last raised $427 million in August in a private fundraising round, led by Dragoneer Investment Group and General Atlantic, giving it a valuation of more than $7.1 billion. It previously raised $250 million in 2017 at a $5.1 billion valuation, in a fundraising round led by Japan's SoftBank. It is unclear how market turmoil fueled by the escalating trade tensions between the United States and China could impact Slack's IPO plans.
NEWS-MULTISOURCE
purdy Pretty print objects in real purdy colors. Allows clearer visualization of objects than you get from most pretty printers due to colors. It will also print out the complete path to an object, something that's extremely useful for debugging. Purdy will als Usage no npm install needed! <script type="module"> import purdy from 'https://cdn.skypack.dev/purdy'; </script> README Purdy build coverage Print things real purdy for nodejs. Usage const Purdy = require('purdy'); Purdy({list: [1,2,3], string: 'some string'}); Purdy(object, [options]) image Prints anything indented, and with arrays with index keys, and different types in colors such that it's very easy to get an overview of what object you're dealing with. • object - anything, number, object, array, etc. • options - optional object with the following keys. • plain - when true, prints result without colors. Defaults to false with tty, true when not. • path - when true, prints result with a path (To be used with Hoek.reach() or lodash.get, etc). Default: false • pathPrefix - prefix for path. Default: // • arrayIndex - enables index printing for arrays. Default: true • indent - defines the number of spaces to indent. Default: 4 • align - determines how to align object keys. Default: left • depth - tells purdy how many times to recurse while formatting the object. This is useful for viewing complicated objects. Default: 2. Set to null to recurse indefinitely • proto - include the prototype chain and print all inherited properties as well. Default: false • json - attempt to parse strings beginning with { as JSON. Default: false Purdy.stringify(object, [options]) This function returns a string without printing it to stdout. This may prove to be useful for log files other other applications. const purdyString = Purdy.stringify({a: 'b'}, {plain: true}); writeLog(purdyString); Purdy.purdy([options]); Useful if you want to print multiple objects like console.log const purdy = Purdy.purdy({plain: true}); purdy.print('one', 'two'); purdy.stringify('one', 'two'); Examples The following code prints what's in the image above. const mises = function mises () { this.moop = 3 } const instance = new mises(); const circularObj = { }; circularObj.a = circularObj; const obj = { integer: Date.now(), string: 'foo', anonPurdy: Purdy, defined: function Yes() {}, nested: {hello: 'hapi'}, error: new Error('bad'), null: null, undefined: undefined, regexp: new RegExp, falseBool: false, trueBool: true, symbol: Symbol('purdy'), emptyArr: [], circular: circularObj, date: new Date(), arrayWithVisibleIndex: [ 'one', 'two', 'three' ], instance: instance, }; Purdy(obj); Command-line Interface This package also installs the purdy CLI tool. Right now this just prints any JSON file with default options. purdy package.json will, for example, print the JSON contents of package.json. Similarly, cat package.json | purdy -s will use stdin to print the contents. A new option -l has been added to parse log files for newline delimited JSON (NDJSON). purdy -l logfile.log will print that or cat app.log | purdy -l -s Contributing This project adheres to the hapi styleguide. Acknowledgements
ESSENTIALAI-STEM
karfai karfai - 4 months ago 30 Groovy Question How to implement this 'dynamic block' in Gradle? I am new to gradle. So let straight to the point. I want to implement the block as below. Note that the libraries is dynamic, and available for other developers to add on for the needed libraries. libraries { slf4j 'org.slf4j:slf4j-api:1.7.21' junit 'junit:junit:4.12' } So that I can call them out like this. dependencies { compile libraries.slf4j testCompile libraries.junit } I am not sure how to make it. But I found some related solution from here. As shown below: apply plugin: GreetingPlugin greeting { message 'Hi' greeter 'Gradle' } class GreetingPlugin implements Plugin<Project> { void apply(Project project) { project.extensions.create("greeting", GreetingPluginExtension) project.task('hello') { doLast { println "${project.greeting.message} from ${project.greeting.greeter}" } } } } class GreetingPluginExtension { String message String greeter } The problem is as I add on to the greeting block, I need to declare them in GreetingPluginExtension as well. Any idea how to make it such that only update on greeting block? Answer What you need to do is to utilize groovy meta programming. Below you can find just a sample, however fully functional. apply plugin: LibrariesPlugin libraries { slf4j 'org.slf4j:slf4j-api:1.7.21' junit 'junit:junit:4.12' } class LibrariesPlugin implements Plugin<Project> { void apply(Project project) { project.extensions.create("libraries", LibrariesPluginExtension) project.task('printLib') { doLast { println "$project.libraries.slf4j" println "$project.libraries.junit" project.libraries.each { println "$it.key -> $it.value" } } } } } class LibrariesPluginExtension { Map libraries = [:] def methodMissing(String name, args) { // TODO you need to do some arg checking here libraries[name] = args[0] } def propertyMissing(String name) { // TODO same here libraries[name] } Iterator iterator() { libraries.iterator() } }
ESSENTIALAI-STEM
Riau Ega Agata Riau Ega Agata Salsabilla (born 25 November 1991) is an Indonesian recurve archer. He represented Indonesia at the 2016 and 2020 Summer Olympics. Career At the 2013 Islamic Solidarity Games, Ega won gold along with partner Ika Yuliana Rochmawati in the mixed team recurve category. He competed in the individual recurve event and the team recurve event at the 2015 World Archery Championships in Copenhagen, Denmark. 2015 SEA Games In the 2015 SEA Games, Ega won silver in the men's team recurve event, along with Hendra Purnama & Muhammad Hanif Wijaya. In the mixed team recurve event, he along with partner Ika Yuliana Rochmawati won the gold medal. 2016 Summer Olympics Ega, along with compatriot Hendra Purnama & Muhammad Hanif Wijaya, qualified for the 2016 Summer Olympics in Rio de Janeiro. The three of them would be competing in the men's individual and team category. In the men's team category, the Indonesia team scored a total of 1962 from 216 arrows in the ranking round, scoring 48 10s and 23 Xs, the team managed to rank ten out of twelve teams overall. In the 1/8 Eliminations, the team met seventh-ranked Chinese Taipei, consisting of Kao Hao-wen, Wei Chun-heng, and Yu Guan-lin. Indonesia went on to win 6–2 after two wins and two ties. In the Quarterfinals, they were put up against second-ranked United States, consisting of Brady Ellison, Zach Garrett, and Jake Kaminski. Indonesia went on to lose 2–6 after they had equalized points 2–2 in the second set. In the men's individual, Ega ranked 32 out of 64 participants, scoring a total of 660 from 72 arrows with 26 10s and 7 Xs. He met Xing Yu of China in the first round, and went on to win 7-1. He then was put up against first-ranked Kim Woo-jin of South Korea, who had just broken the world record the previous day in the ranking round. However, in an upset, Ega Agatha won the match 6–2 against the world champion. He went on until the Round of 16, where he was beaten by Italy's Mauro Nespoli, who had beaten Ega Agatha's compatriot Muhammad Hanif Wijaya earlier on. 2020 Summer Olympics Ega, along with compatriot Arif Dwi Pangestu and Alviyanto Prastyadi, qualified for the 2020 Summer Olympics in Tokyo, Japan. The three of them competed in the men's individual and team category. He also played in the mixed team category along with partner Diananda Choirunisa.
WIKI
PlayStation 4’s new beta software reduces clutter, improves multitasking – TechCrunch The beta for PlayStation 4’s 4.00 operating system arrives tomorrow for those enrolled, and Sony wants to give everyone a preview of what it brings to the table. The most noteworthy features are improved library organization, as well as UI tweaks that mean the Share and Quick Menus don’t drop you out of the gaming action. Folders are new in PS4 v 4.00, letting you group together content both in your library and on the launcher bar. This should make for a much better, cleaner experience for players who take the time to sort their stuff, since right now, it’s sometimes hard to find what you’re looking for, especially if you haven’t used it in a while. Library content is now also easier to navigate, thanks to the addition of a Purchased Content tab, which gives you a look at everything you’ve ever bought with your PlayStation ID. The main library tab now only shows stuff you currently have downloaded to your PS4, which is hugely helpful for players with lots of content. Added sort options now also let you rank items by the date you purchased, and by their current install status, and you can now search with keywords. [gallery ids="1369296,1369297,1369298"] As mentioned, there are also UI tweaks, including changes to the overall look and feel of system elements like icons and notifications. The Quick Menu and the Share Menus also now overlay on just a portion of the display, meaning you don’t actually have to jump out of your game to access them (they currently take over the UI entirely). I’ve been using my PS4 a lot after a lengthy absence thanks to the launch of No Man’s Sky, and I can see how all of these changes would be useful. They all make the PS4 more like an actual computer, and less like a console from the early era of modern computing, which is what PlayStation’s UX has always felt like to me. The Beta rolls out to testers tomorrow, and people who can get it will be told how via email. The rest of us will have to wait a while for access, but it sounds like it’ll be worth the wait.
NEWS-MULTISOURCE
From Bone Marrow to Brain: How Myeloid Cells Can Enter the CNS Identification: Priller, Josef Description From Bone Marrow to Brain: How Myeloid Cells Can Enter the CNS   Josef Priller Charité - Universitätsmedizin Berlin, Germany   Microglia are the primary immune effector cells of the central nervous system (CNS). They originate from primitive erythromyeloid progenitors during emybronic development and populate the entire CNS. Under physiological conditions, they continuously survey their microenvironment and rapidly respond to changes in homeostasis. Dysfunction of microglia is increasingly recognized as a pathogenic event in neurological and psychiatric disorders. Thus, targeting of hematopoietic cells to the CNS by appropriate conditioning, e.g. irradiation or chemotherapy, may represent a treatment option. In fact, the transplantation of wild type bone marrow cells has resulted in improvements in various animal models of neuropsychiatric disorders. However, the mechanisms of CNS engraftment of bone marrow-derived cells are not well understood. Here, we identified a population of hematopoietic progenitors that target to sites of damage in the CNS and alleviate neurodegenerative diseases. Credits Credits: None available. You must be logged in and own this product in order to post comments.
ESSENTIALAI-STEM
Pelham Bay (neighborhood), Bronx Pelham Bay is a middle class residential neighborhood in the borough of the Bronx, in New York City. It is named for Pelham Bay Park, New York City's largest park, which lies on the neighborhood's northeastern border; and for Pelham Bay, a body of water in that park. The neighborhood is bounded roughly by Pelham Parkway on the north, the New England Thruway (I-95) on the east, the Bruckner Expressway (I-95) on the south, and the Hutchinson River Parkway on the west. Pelham Bay is part of Bronx Community District 10, and its ZIP Code is 10461. Pelham Bay is patrolled by the 45th Precinct of the New York City Police Department. History Most of the neighborhood is land that was purchased by Thomas Pell in 1654, part of an original grant to the Dutch West India Company. Despite the name, the area that is now the Pelham Bay neighborhood was not part of the historical Town of Pelham, which consisted of the modern-day town of Pelham in Westchester County as well as Pelham Bay Park and City Island in the Bronx. The latter two areas were annexed by the City of New York in 1895. Land use Pelham Bay's boundaries, starting from the north and moving clockwise, are Pelham Parkway to the north, New England Thruway to the east, Bruckner Expressway to the south, and Hutchinson River Parkway to the west. Pelham Bay includes the residential enclave of Country Club, which occupies the portion of the neighborhood east of Interstate 95 (I-95). The core of Pelham Bay is the portion west of I-95 and north of Middletown Road. Pelham Bay is part of Bronx Community District 10, which also covers Throgs Neck and Co-op City. The neighborhood is home to a number of active civic and community associations, including the Pelham Bay Little League. A variety of stores and eateries line the streets of this neighborhood, including Westchester Avenue, Buhre Avenue, Middletown Road, and Crosby Avenue (these two cross to form one of the main intersections of the neighborhood). Arnow Place, a small street between Westchester Avenue and the New England Thruway (I-95) in Pelham Bay, was the site of the December 2005 shooting death of off-duty police officer, Daniel Enchautegui. Actor Lillo Brancato and an accomplice were charged with murder in the case. In 2006, the street was renamed Daniel Enchautegui Way. There is a community playground called Westchester Square Playground located adjacent to the Hutchinson River Parkway. It has a baseball field, swing sets and a paddle ball court. Demographics The neighborhood is home to longstanding Italian American population with a recent influx of Hispanics changing the neighborhoods demographics considerably. Some homes have both Italian and American flags proudly waving. The neighborhood also has sizeable population of Greeks. While the majority of the population is white, there is a significant Hispanic minority, consisting mostly of Puerto Ricans. As with Riverdale and Country Club, Pelham Bay ranks as one of the safest and most desirable neighborhoods in the Bronx. It was ranked as the best neighborhood for children in the Bronx and top 10 neighborhood in the whole New York City. Based on data from the 2010 United States Census, the population of Pelham Bay-Country Club-City Island was 26,583, a decrease of 557 (2.1%) from the 27,140 counted in 2000. Covering an area of 917.45 acres, the neighborhood had a population density of 29.0 PD/acre. The racial makeup of the Pelham Bay-Country Club-City Island neighborhood was 62.0% (16,488) White, 2.9% (773) African American, 0.1% (36) Native American, 3.6% (969) Asian, 0.0% (5) Pacific Islander, 0.4% (110) from other races, and 0.9% (252) from two or more races. Hispanic or Latino of any race were 29.9% (7,950) of the population. The entirety of Community District 10, which comprises City Island, Co-op City, Country Club, Pelham Bay, Schuylerville, Throgs Neck and Westchester Square, had 121,868 inhabitants as of NYC Health's 2018 Community Health Profile, with an average life expectancy of 81.1 years. This is about the same as the median life expectancy of 81.2 for all New York City neighborhoods. Most inhabitants are youth and middle-aged adults: 20% are between the ages of between 0–17, 26% between 25–44, and 27% between 45–64. The ratio of college-aged and elderly residents was lower, at 9% and 18% respectively. As of 2017, the median household income in Community District 10 was $59,522. In 2018, an estimated 14% of Community District 10 residents lived in poverty, compared to 25% in all of the Bronx and 20% in all of New York City. One in eleven residents (9%) were unemployed, compared to 13% in the Bronx and 9% in New York City. Rent burden, or the percentage of residents who have difficulty paying their rent, is 45% in Community District 10, compared to the boroughwide and citywide rates of 58% and 51% respectively. Based on this calculation,, Community District 10 is considered high-income relative to the rest of the city and not gentrifying. Police and crime Community District 10 is patrolled by the 45th Precinct of the NYPD, located at 2877 Barkley Avenue in Throggs Neck. The 45th Precinct ranked 28th safest out of 69 patrol areas for per-capita crime in 2010. , with a non-fatal assault rate of 53 per 100,000 people, Community District 10's rate of violent crimes per capita is less than that of the city as a whole. The incarceration rate of 243 per 100,000 people is lower than that of the city as a whole. The 45th Precinct has a lower crime rate than in the 1990s, with crimes across all categories having decreased by 67% between 1990 and 2022. The precinct reported five murders, 13 rapes, 235 robberies, 265 felony assaults, 108 burglaries, 609 grand larcenies, and 323 grand larcenies auto in 2022. Fire safety Pelham Bay is served by two fire stations of the New York City Fire Department (FDNY). Engine Co. 89/Ladder Co. 50 is located at 2924 Bruckner Boulevard while Squad 61/Battalion 20 is located at 1518 Williamsbridge Road. Health , preterm births are more common in Community District 10 than in other places citywide, though births to teenage mothers are less common. In Community District 10, there were 110 preterm births per 1,000 live births (compared to 87 per 1,000 citywide), and 10.3 births to teenage mothers per 1,000 live births (compared to 19.3 per 1,000 citywide). Community District 10 has a low population of residents who are uninsured. In 2018, this population of uninsured residents was estimated to be 7%, lower than the citywide rate of 14%, though this was based on a small sample size. The concentration of fine particulate matter, the deadliest type of air pollutant, in Community District 10 is 0.0075 mg/m3, the same as the city average. Fourteen percent of Community District 10 residents are smokers, which is the same as the city average of 14% of residents being smokers. In Community District 10, 24% of residents are obese, 13% are diabetic, and 37% have high blood pressure—compared to the citywide averages of 24%, 11%, and 28% respectively. In addition, 25% of children are obese, compared to the citywide average of 20%. Eighty-seven percent of residents eat some fruits and vegetables every day, which is the same as the city's average of 87%. In 2018, 77% of residents described their health as "good", "very good", or "excellent", about the same as the city's average of 78%. For every supermarket in Community District 10, there are 7 bodegas. The nearest large hospitals are Calvary Hospital, Montefiore Medical Center's Jack D. Weiler Hospital, and NYC Health + Hospitals/Jacobi in Morris Park. The Albert Einstein College of Medicine campus is also located in Morris Park. Post office and ZIP Code Pelham Bay is located within ZIP Code 10461. The United States Postal Service operates the Pilgrim Station post office at 1545 Crosby Avenue. Education Community District 10 generally has a lower rate of college-educated residents than the rest of the city. While 34% of residents age 25 and older have a college education or higher, 16% have less than a high school education and 50% are high school graduates or have some college education. By contrast, 26% of Bronx residents and 43% of city residents have a college education or higher. The percentage of Community District 10 students excelling in math rose from 29% in 2000 to 47% in 2011, and reading achievement increased from 33% to 35% during the same time period. Community District 10's rate of elementary school student absenteeism is slightly higher than the rest of New York City. In Community District 10, 21% of elementary school students missed twenty or more days per school year, a little more than the citywide average of 20%. Additionally, 75% of high school students in Community District 10 graduate on time, the same as the citywide average of 75%. Schools Served by the New York City Department of Education, the neighborhood is home to the elementary schools Public School 71 (named the Rose E. Scala School to honor a former principal) and Public School 14 (named the John D. Calandra School to honor a former State Senator), as well as to Herbert H. Lehman High School (right on the neighborhood's border). Several private and parochial schools also serve the neighborhood, including the Roman Catholic elementary schools associated with the church St. Theresa, and the Greek American Institute, a Greek Orthodox parochial school. Library The New York Public Library (NYPL)'s Pelham Bay branch is located at 3060 Middletown Road. The branch's one-story brick building opened in 1976. Transportation The following MTA Regional Bus Operations and Bee-Line bus routes serve Pelham Bay: * Bx5: to Bay Plaza Shopping Center or Simpson Street station ( trains) (via Crosby Avenue / Bruckner Boulevard / Story Avenue) * Bx8: to Williamsbridge or Locust Point (via Westchester Avenue / Williamsbridge Road) * Bx12: to University Heights (via Fordham Road – Pelham Parkway) * Bx12 SBS: to Bay Plaza Shopping Center or Inwood – 207th Street station ( train) (via Fordham Road – Pelham Parkway) * Bx23: to Co-op City * Bx24: to Country Club * Bx29: to City Island (via City Island Avenue) * Q50: to Co-op City or Flushing–Main Street station ( trains) (via Bronx–Whitestone Bridge) * BxM8: to Midtown Manhattan via Bruckner Blvd and 5th Ave * BL45: to Eastchester in Westchester County The following New York City Subway stations serve Pelham Bay: * Middletown Road * Buhre Avenue * Pelham Bay Park Notable people * Paul Attanasio (born 1959), screenwriter and film and television producer, who was an executive producer on the TV series House and received Academy Award nominations for his screenplays for Quiz Show and Donnie Brasco. * James Coco (1930–1987), actor known for his roles in Man of La Mancha and Only When I Laugh. * John Fox (1952–1990), novelist and short-story writer. * John F. Good (1936-2016), FBI agent who created the Abscam sting operation in the late 1970s and early 1980s which led to the arrest and conviction of several elected officials at the local, state and federal level, which was portrayed in the 2013 film American Hustle. * James Madio (born 1975), actor known for his roles in USA High, Hook and Band of Brothers. * Ronnie Ortiz-Magro (born 1985), actor best known as one of the eight main cast members in the MTV reality series Jersey Shore. * Thomas Pell (1612-1669), physician who bought the area known as Pelham, New York. In popular culture The movie The Taking of Pelham One Two Three, and its 2009 remake, involved the hijacking of a subway train leaving the Pelham Bay Park station at the scheduled time of 1:23.
WIKI
Stock Code 002851 Languages Shenzhen Megmeet Welding Technology Co.,Ltd.jpg Why and How to Spot Weld With TIG Welder? In the realm of welding, the Tungsten Inert Gas (TIG) welding method stands out for its precision, cleanliness, and versatility. While commonly associated with intricate welds and fine details, TIG welding also finds its place in spot welding applications, offering unique advantages over other methods. In this comprehensive guide, we delve into the why and how of spot welding with a TIG welder, exploring techniques, benefits, and the remarkable capabilities of the Megmeet MetaTIG HF ACDC/DC TIG welder. I. Basics of TIG for Spot Welding. TIG welding employs a non-consumable tungsten electrode to create the weld, while a shielding gas, typically argon, protects the weld area from atmospheric contamination. Spot welding with TIG involves the controlled application of heat to specific points, fusing materials together without the need for filler metal. II. Why Choose TIG for Spot Welding? 1. Precision: TIG welding offers unparalleled precision, making it ideal for spot welding applications where accuracy is paramount. The ability to control heat input ensures consistent, high-quality welds, even in delicate materials. 2. Cleanliness: Unlike other welding methods, TIG produces minimal spatter and smoke, resulting in cleaner welds and reduced post-weld cleanup. This is particularly advantageous when working on projects that demand pristine finishes. 3. Versatility: TIG welding can handle a wide range of materials, including stainless steel, aluminum, copper, and titanium, making it suitable for diverse spot welding needs across various industries. III. How to Spot Weld with a TIG Welder? Spot welding with a TIG welder requires precision, patience, and a firm understanding of welding fundamentals. Here's a step-by-step guide to mastering the technique: 1. Prepare Your Workspace: Ensure your work area is clean, well-ventilated, and free from any flammable materials. Secure the materials to be welded in a stable position, minimizing movement during the welding process. 2. Select the Right Equipment: Invest in a reliable TIG welding machine equipped with spot welding capabilities, such as the Megmeet MetaTIG HF ACDC/DC TIG welder. This advanced machine offers precise control over welding parameters, ensuring optimal results. 3. Choose the Correct Electrode and Shielding Gas: Select an appropriate tungsten electrode based on the material you're welding. For instance, use pure tungsten for aluminum and thoriated tungsten for steel. Additionally, ensure the shielding gas matches the material being welded for optimal protection and weld quality. 4. Set the Welding Parameters: Adjust the welding current, arc length, and travel speed according to the material thickness and desired weld characteristics. Experiment with different settings to achieve the perfect balance of penetration and heat control. 5. Position the Torch and Initiate the Arc: Position the TIG torch at the desired spot weld location, maintaining a consistent angle and distance from the workpiece. With a steady hand, initiate the arc by striking the tungsten electrode against the workpiece, then quickly withdraw to establish the welding arc. 6. Control Heat Input: Control the heat input by modulating the foot pedal or amperage control on the TIG welder. Apply short bursts of current to create localized heat, gradually building up the weld pool without overheating the surrounding area. 7. Monitor Weld Pool and Progress: Keep a close eye on the weld pool formation and overall progress of the spot weld. Adjust welding parameters as needed to maintain proper fusion and prevent defects such as burn-through or lack of penetration. 8. Complete the Weld: Once the spot weld is complete, gradually reduce the welding current and allow the weld to cool naturally. Inspect the weld for any imperfections and make necessary adjustments for subsequent spot welds. IV. Megmeet MetaTIG HF ACDC/DC TIG Welder: Unleash Precision For professionals and enthusiasts alike, the Megmeet MetaTIG HF ACDC/DC TIG welder represents the pinnacle of TIG welding technology. With its advanced features and superior performance, this welder empowers users to tackle spot welding challenges with confidence and precision. V. Key Features of the Megmeet MetaTIG HF ACDC/DC TIG Welder: • Dual Voltage Capability: Seamlessly switch between AC and DC welding modes, catering to a wide range of materials and applications. • High-Frequency Start: Ensures smooth arc initiation and minimal tungsten contamination, enhancing weld quality and consistency. • Pulse Welding Function: Enables precise control over heat input and weld bead appearance, perfect for spot welding thin materials and intricate components. • Digital Display and Programmable Settings: Allows users to fine-tune welding parameters with precision and ease, optimizing weld performance and efficiency. • Robust Construction and Reliability: Built to withstand the rigors of industrial welding environments, ensuring years of dependable service and performance. VI. Conclusion Spot welding with a TIG welder opens up a world of possibilities for welders seeking precision, cleanliness, and versatility in their projects. By harnessing the power of the Megmeet MetaTIG HF ACDC/DC TIG welder and mastering the techniques outlined in this guide, you can elevate your welding capabilities to new heights. Whether you're fabricating intricate components or joining dissimilar materials, TIG spot welding offers unmatched quality and control, making it a valuable skill for welders across industries. For more information about the Megmeet MetaTIG HF ACDC/DC TIG welder and other welding solutions, visit Megmeet Welding and explore the MetaTIG ACDC Welder Series here. Master the art of TIG spot welding and unleash your full potential as a welder. Related articles 1. Spot Welding vs. TIG Welding vs. MIG Welding: Differences & How to Choose? 2. What is Spot Welding? (A Complete Welding Process Guide) 3. Spot Size, Laser Quality and Welding Performance 4. The Most Complete TIG Welding Basics 5. Robotic TIG Welding Improves Speed, Quality, and Efficiency
ESSENTIALAI-STEM
Medical Conditions Uterine Fibroid (Uterine Leiomyomas) The Facts Uterine fibroids, also known as uterine leiomyomas, are benign (non-cancerous) growths of muscle cells in the uterine (womb) wall. This is a condition that occurs most commonly in women of childbearing age, but it can affect women of any age. Fibroids can range in size, from being undetectable with the human eye to the size of a grapefruit or larger. The majority of women with fibroids will not experience any symptoms and do not require therapy. However some women may experience heavy or prolonged menstrual bleeding, pelvic pain, and urinary issues due to the size and location of the fibroids. Risk factors for uterine fibroids include: • Family history of uterine fibroids • African-American descent • First menstruation period starting prior to the age of 10 • Never having given birth • Diet including lots of meat and alcohol and low vitamin D Causes Uterine fibroids are abnormal growths of the uterus. The causes of uterine fibroids are unknown, but it is thought to be related to hormones such as estrogen, progesterone, and growth hormones. Genetic changes and environmental factors such as diet may also be related to fibroid growth. Fibroids occur when normal uterine muscle cells change into abnormal muscle cells and develop into benign growths. Fibroids are not cancerous and most of them are small and do not cause any symptoms. However, they can cause problems based on their size, number, or location. For example, fibroids can push against the bladder, or push the uterus against the bladder, and cause the urge to urinate frequently. They can also push against the bowel and cause constipation. Symptoms and Complications Many women usually do not experience symptoms caused by uterine fibroids. However, you may experience symptoms due to the size, number, or location of the fibroid(s) which may be severe enough to impact your quality of life. These symptoms can include: • Abnormal uterine bleeding, such as heavy or prolonged menstruation • Menstrual pain • Vaginal bleeding not due to menstruation • Anemia from the blood loss • Pelvic pressure • Frequently or having difficulty urinating • Pain during intercourse • Constipation, or rectal pain • Reproductive problems (e.g., infertility, miscarriages) Of these symptoms, abnormal uterine bleeding and menstrual pain (cramps) are the most common. Many women with uterine fibroids can still get naturally pregnant. However, some may experience reproductive problems such as infertility, multiple miscarriages, or premature birth, as the fibroid may distort the surface of the uterus. Making the Diagnosis Usually uterine fibroids are detected when your doctor does a routine pelvic examination. However, a pelvic ultrasound is required to confirm diagnosis. Your doctor may ask you questions about your symptoms to evaluate the impact of the fibroid. This can include questions about urinary issues, constipation, fertility issues, abdominal pressure or pain, painful menses, and pain during intercourse. Treatment and Prevention Most women with no symptoms and no fertility issues do not need treatment. If you do have symptoms, treatment will depend on your age, health, the severity of the symptoms; the type, size; and location of the fibroids; and whether you want to have children in the future. For women with mild symptoms, the symptoms are monitored but no specific treatment is given. For women who are pre-menopausal and have moderate-to-severe symptoms, fibroids may be managed with medication or surgery. If you are experiencing painful or prolonged menstrual bleeding due to uterine fibroids, your doctor may prescribe medications to reduce the severity of the bleeding. Treatments may also include a medication called ulipristal that can slow growth and shrink fibroids. A surgery called myomectomy to remove the uterine fibroid may also be possible. Since myomectomy leaves the uterus intact, women who have the surgery can still have children. If you are near menopause with mild symptoms, your doctor may recommend waiting for menopause as your fibroid may shrink after this time. If you have reached menopause, or if other treatments have not worked, your physician may recommend a surgery called a hysterectomy to remove the uterus. This is the most effective treatment for uterine fibroids and it prevents further fibroids from forming. Helpful tips for managing symptoms of uterine fibroids: • Nonsteroidal anti-inflammatory medications such as ibuprofen or naproxen can help manage pain. • Increasing iron intake through diet or supplements can help treat or prevent the occurrence of anemia due to blood loss. All material copyright MediResource Inc. 1996 – 2020. Terms and conditions of use. The contents herein are for informational purposes only. Always seek the advice of your physician or other qualified health provider with any questions you may have regarding a medical condition. Source: www.medbroadcast.com/condition/getcondition/Uterine-Fibroid
ESSENTIALAI-STEM
UK Petroleum Industry Association The UK Petroleum Industry Association (UKPIA) is a trade body representing downstream companies in the oil and gas sector in the UK. The current Chief Executive is Elizabeth de Jong. The trade body's website says that "we and our members are committed to taking a leadership role in shaping a flexible and resilient fuels future for UK industry and ensuring the downstream fuels sector continues to play a part in tomorrow's sustainable, energy-secure landscape". In written evidence to Parliament in 2021, UKPIA said that it represents "eight oil refining, distribution and marketing companies that operate the six major oil refineries in the UK and source over 85% of the transport fuels used. UKPIA members also own and operate multiple oil terminals and oil pipelines". UKPIA publishes reviews and statistical studies about the downstream oil industries in the UK. Lobbying allegations In February 2022, The Guardian published a report alleging that lobbyists representing fossil fuel giants were running All-Party Parliamentary Groups (APPGs) to give oil producers a voice in parliament without having to declare an interest. The report notes that UKPIA "is playing a key role in the running of the All-Party Parliamentary Group (APPG) on downstream energy and fuels", which gave the association's members access to MPs, for example by hosting presentations by UKPIA members like BP and Phillips 66. Following an investigation by the Office of the Registrar of Consultant Lobbyists concluded that "Based on assurances given, UKPIA has not conducted consultant lobbying activities."
WIKI
Taking Your Programming to the Next Level What are some things that I’ve learned that really made my brain stretch? I’ve seen plenty of articles or essays written talking about what the basics are that every programmer should know.  I’m not just talking about kernel authors, device drivers, or embedded microcontroller developers. I’m also talking about JavaScript or Python developers doing typical “jam value A from box B into database field C”. For any programmer, there are a few basics that you can learn that will really help you expand beyond just being an average programmer, things that help you understand stuff like the Law of Leaky Abstractions, or the Law of Demeter. Most good, experienced developers are already utilizing these concepts, perhaps without even realizing it.  The first two that start down the path are Pointers and Recursion. Pointers are important because they help you understand the difference between pass-by-value and pass-by-reference. That’s really where the key is. I don’t think you necessarily need to know all the details of how C handles pointers in terms of looking at memory spaces and indexes, but you should understand the idea of memory heap vs stack, sizeof, and addressing. Again, that concept of understanding how data moves around within your program is very valuable when you’re working with frameworks, singletons, SDKs, and other libraries.  The pass-by-reference concept is also important because some modern languages push the concept of immutable data objects, so you have to understand where the values really are being updated in your code. Sometimes there are “surprises” when variables are, or are not, changing when you’re not expecting it. Once you understand pointers, then you can understand linked lists, which I believe is also important. You’ll probably never really implement a linked list, but understanding not only how they are implemented, but how you perform operations on them, is key to understanding the “bigger-picture” concepts of managing data. Pop, push, shift, moving an item in and out of a random spot in the middle, or even moving items around to different indexes.  Again, this is important to understand how your data is moving around in your program, or in this case even in your bigger pipelines like CI orchestration or cross-application integration. I’ve found I spend a lot of my debugging time just trying to draw long, detailed dataflow diagrams or data sequence diagrams. It’s interesting how, in computer science, there’s a strong order to how concepts stack on one another.  Once you have learned pointers, the groundwork is set for the next step. There’s two other things that I learned that really helped me make that next step to being a better programmer: lambdas and b-trees/hashing. Hashing Hashing ends up being important because it’s such a widely used concept in so many places.  Many basic containers in modern languages utilize this, but also since so much is data-driven, or even database-driven, that understanding the basics of hashes can help you understand indexing and searching.  This is really important if you ever end up working with large sets of data. If you are working with databases, indexes, and especially NoSQL nowadays, understanding how a hash organizes its pointers, and then how a b-tree shards the data, helps you know which indexes to create and how to push down into data more quickly and efficiently.  For example, with dynamodb, you can’t really and truly understand the difference between a local secondary index and a global secondary index unless you understand what hashes and search trees are. Lambdas For many years, I read and heard so often the idea that functional programming was “better” than procedural, and that understanding functional programming would take your development skills to the next level. Trying to sit down and learning Haskell or Lisp was much harder than I expected.  More than once I got a hold of a functional interpreter or compiler, and a tutorial, and I tried to learn a purely functional language.  But each and every time, I just could not get through the tutorial without understanding what was really going on. Eventually I just sort of gave up, and wrote myself off as being forever a mediocre programmer. However, I happened to stumble across a book one time and reading just the first few chapters turned on an enormous light bulb. By the way, the book is available for free online by the author.  Enormous shout-out to Mark Dominus. So I started reading this book, working the exercises and examples, and it’s a really great book. It starts just as a regular procedural programming language book, albeit teaching you advanced techniques. It has you writing fairly straightforward code, but then it gently inserts some interesting and tricky things, which at first just seem like little “tricks” to make your code more efficient.  But suddenly you realize, you’re using recursion and lambdas. Then suddenly again, it’s like, Surprise! You just learned functional programming! Once you understand what a lambda is, and anonymous functions, that’s really all it takes to flip your mind into understanding functional programming. The reason lambdas are important, from a pragmatic programming perspective, is that they are actually more frequently use then people maybe realize. JavaScript, databases, even C#, anonymous functions are used in lots of places. JavaScript a really good example. If you’ve ever written an inline function to format the data in a row for a datagrid widget (i.e. you don’t know how many rows there are in a grid, but every time a new row in the grid is rendered that anonymous function fires), there you go, you’ve just written a lambda. In fact that’s the idea behind functional programming making procedural programming better, that you’re not spinning off into another method or library but instead rolling your code directly into your other code. There’s much more I want to talk about, but these couple of basic concepts above are what can start you down the path of being a truly exceptional programmer. Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out /  Change ) Google photo You are commenting using your Google account. Log Out /  Change ) Twitter picture You are commenting using your Twitter account. Log Out /  Change ) Facebook photo You are commenting using your Facebook account. Log Out /  Change ) Connecting to %s
ESSENTIALAI-STEM
Vyacheslav Vyacheslav, also transliterated Viacheslav or Viatcheslav (Вячеслав ; В'ячеслав ), is a Russian and Ukrainian masculine given name. It is the equivalent of Belarusian Вячаслаў/Вацлаў (transliterated Viačaslaŭ/Vaclaŭ, or Viachaslau/Vaclau), Croatian Vjenceslav, Czech Václav, Polish Wacław and Więcesław &mdash; Latinised as Wenceslaus. Also: Romanian of Moldova Veaceslav. It is a Slavic dithematic name (that is, composed of two lexemes) derived from the Slavic words vyache, "great(er)", and slava, "glory, fame". Common short forms are Slava, Slavik. Feminine forms: Vyacheslava, Więcesława. Notable people Notable people with the given name Vyacheslav include: Academia * Vyacheslav Ivanov (1929-2017), Russian philologist and scholar specialising in Indo-European studies * Vyacheslav Ivanovich Lebedev (1930–2010), Soviet and Russian mathematician, known for his work on numerical analysis and development of the Lebedev quadrature * Vyacheslav Lypynsky (1882–1931), Ukrainian historian, social and political activist who founded the Ukrainian Democratic-Agrarian Party * Vyacheslav Nikonov (born 1956), Russian political scientist and the grandson of Vyacheslav Molotov, for whom he is named * Vyacheslav Shokurov (born 1950, Russian mathematician best known for his research in algebraic geometry and now a full Professor at Johns Hopkins University Arts, entertainment and literature * Vyacheslav Akhunov (born 1948), Kyrgyz-born Uzbek visual artist, and author * Vyacheslav Ivanov (1866–1949), Russian symbolist poet and philosopher * Vyacheslav Kotyonochkin, director of the 1988 Soviet animated film The Kitten from the Lizyukov street * Vyacheslav Klykov (1939–2006), Russian sculptor who specialized in public monuments to key figures of national history and culture * Vyacheslav Kryklyvyy, known as Slavik Kryklyvyy, Ukrainian-born ballroom dancer specialising in International Latin * Vyacheslav Nevinny (1934–2009), Russian actor who worked in the Moscow Art Theatre (1959–2003) and was titled a People's Artist of the USSR in 1986 * Vyacheslav Ivanovich Polunin (born 1950), better known as Slava Polunin, Russian performance artist and clown * Vyacheslav Rybakov (born 1954), Soviet and Russian science fiction author * Vyacheslav Shalygin (born 1968), Russian science fiction writer who completed medical school (1993) after reaching the rank of starshina in the Soviet Army * Vyacheslav Spesivtsev (born 1943), Russian and Soviet actor and director of the Taganka Theatre Studio in Moscow from 1966 * Vyacheslav Tikhonov (1928–2009), Soviet and Russian actor best known for his role as Soviet spy Stierlitz in the television series Seventeen Moments of Spring * Vyacheslav Mikhailovich Zaitsev (1938–2023), more commonly known as Slava Zaitsev, Russian fashion designer, painter, graphic artist and theatrical costume designer Diplomats * Vyacheslav Dolgov (born 1937), Soviet and Russian diplomat who has served as Ambassador to Australia (1990–1994), Kazakhstan (1994–1997), Belarus (1999–2002), and Slovenia (2002–2004), and since 2005, he has been lecturing in consular law * Vyacheslav Kovalenko (born 1946), Russian diplomat who is presently the Ambassador Extraordinary and Plenipotentiary to the Republic of Armenia * Vyacheslav Trubnikov (born 1944), Russian journalist, political scientist, spy and diplomat who served as Director of the Russian Foreign Intelligence Service (1996–2000) and was appointed Ambassador to India in 2004 Military * Vyacheslav Alexandrovich Alexandrov (1968–1988), Russian-born Soviet Guards Junior Sergeant and squad commander who was killed in Afghanistan and posthumously awarded the title of Hero of the Soviet Union * Vyacheslav Borisov (born 1955), Russian general who commanded troops in the Russo-Georgian War * Vyacheslav Kevorkov, KGB major general who in 2010 published a book about journalist and agent provocateur Victor Louis (1928–1992) * Vyacheslav Ivanovich Zof (1889–1937), Ukrainian-born Soviet Commissar and Chief of Naval Forces of the USSR (1924–1936) * Vyacheslav Zudov (born 1942), Russian-born Soviet cosmonaut who spent 2 days in space in 1976 as Commander on Soyuz 23 Music * Vyacheslav Artyomov (or Artemov) (born 1940), Russian and Soviet composer * Vyacheslav Bodolika (born 1977), Moldavan musician and member of Russian musical group Premyer-Ministr * Vyacheslav Butusov (born 1961), lead singer of Russian rock group Nautilus Pompilius, who started his own career as a singer after its disbandment * Vyacheslav Dobrynin (born 1946), Russian composer and singer also known as Doctor Shlyager * Vyacheslav Ganelin (born 1944), Lithuanian Jewish jazz musician and composer * Vyacheslav Kruglik, Russian composer and conductor * Vyacheslav Kuznetsov (composer) (born 1955), Austrian-born Belarusian classical music composer * Vyacheslav Mescherin (1923–1995), Soviet musician noted for producing music with synthesisers and his long-time directorship of the Moscow Orchestra of Electromusical Instruments * Vyacheslav Nagovitsin (born 1939), Russian composer and former student of Dmitri Shostakovich * Vyacheslav Ovchinnikov (1936–2019), Soviet and Russian composer * Vyacheslav Suk (also known as Václav Suk) (1861–1933), Czech-born Russian violinist, conductor and composer * Vyacheslav Bodolika (born 1977), Moldavan musician and member of Russian musical group Premyer-Ministr * Vyacheslav Polozov (born 1950), is an operatic spinto tenor from the former Ukrainian SSR. Politics * Vyacheslav Bitarov (born 1961), Russian politician, Head of the Republic of North Ossetia-Alania and Chairman of the Government of the Republic of North Ossetia-Alania, one of the commanders during Insurgency in the North Caucasus * Vyacheslav Chornovil (1937–1999), Ukrainian politician and prominent dissident to Soviet policies who paved the path for Ukraine's independence * Vyacheslav Dudka (born 1960), Governor of the Russian Oblast of Tula (2005–2011) * Vyacheslav Gayzer (born 1966), Russian politician who is currently serving as President of the Komi Republic (since 2010) * Vyacheslav Jordan (born 1966), Moldovan politician who served as interim general mayor of Chisinau (January to June, 2007) * Vyacheslav Kebich (1936–2020), Belarusian political figure who served as the first Prime Minister of the Republic of Belarus (1991–1994) * Vyacheslav Kislitsyn (born 1948), Russian politician who served as President of Mari El (1997–2001) * Vyacheslav Nikolayevich Kuznetsov (born 1947), Belarusian politician who served as Acting Chairman of the Supreme Soviet in 1994 * Vyacheslav Lypynsky (1882–1931), Ukrainian historian, social and political activist who founded the Ukrainian Democratic-Agrarian Party * Vyacheslav Malyshev, Soviet politician for whom the Malyshev Factory in Ukraine is named * Vyacheslav Menzhinsky (1874–1934), Polish-Russian revolutionary, Soviet statesman and Party official * Vyacheslav Molotov (1890–1986), birth name Vyacheslav Mikhailovich Skryabin, Soviet politician and diplomat for whom the Molotov cocktail was derisively named * Vyacheslav Nagovitsyn (born 1956), President of the Republic of Buryatia (since 2007), a federal subject of Russia * Vyacheslav von Plehve (1846–1904), director of police in Tsarist Russia and later Minister of the Interior (1902–1904) * Vyacheslav Pozgalyov (born 1946), appointed governor of Vologda Oblast in Russia in 1996 * Vyacheslav Prokopovych (1881–1942), Ukrainian politician and historian * Vyacheslav Mikhailovich Skryabin, birth name of Vyacheslav Molotov * Vyacheslav Shtyrov (born 1953), Russian politician who was President of the Sakha Republic (2002–2010), a federal subject of Russia * Vyacheslav Shverikas (1961–2021), Russian politician, member of the Federation Council (2004–2017) Royalty * Grand Duke Vyacheslav Constantinovich of Russia (1862–1879), Romanov grand duke and youngest son of Grand Duke Constantine Nicholaevich and Grand Duchess Alexandra Iosifovna * Vyacheslav Vladimirovich, Prince of Pereyaslavl (1132–1134, 1142) Association football (soccer) * Vyacheslav Ambartsumyan (1940–2008), Russian football player (senior career 1959–1972) and coach (1973–1987) who played 2 matches for the USSR national team * Vyacheslav Amin (born 1976), Kyrgyzstani football player (senior career from 1994) and member of the Kyrgyzstan national football team (from 2000) * Vyacheslav Andreyuk (1945–2010), Russian-born Soviet football player (senior career 1963–1969) who twice played for the USSR national team * Vyacheslav Bazylevych (born 1990), Ukrainian football player (senior career since 2007) * Vyacheslav Chadov (born 1986), Russian football player (senior career since 2005) * Vyacheslav Chanov (born 1951), Russian football player (senior career 1969–1993) and current coach * Vyacheslav Checher (born 1980), Ukrainian football player (senior career since 2000) who is a member of the Ukraine national team (since 2004) * Vyacheslav Danilin (born 1984), Russian football player (senior career since 2002) * Vyacheslav Dayev (born 1972), Russian football player (senior career 1991–2004) who was a member of the Russian national team at the 2002 FIFA World Cup * Vyacheslav Dmitriyenko (born 1977), Russian football player (senior career since 1996) * Vyacheslav Dmitriyev (born 1990), Russian football player (senior career since 2006) * Vyacheslav Geraschenko (born 1972), Belarusian football player (senior career 1990–2005), member of the Belarus national team (1997–2004), and coach (since 2006) * Vyacheslav Hleb (born 1983), Belarusian football player (senior career from 2000) * Vyacheslav Horbanenko (born 1984), Ukrainian football player (senior career from 2003) * Vyacheslav Hrozny (born 1956), Ukrainian soccer coach (since 1987) * Vyacheslav Ivanov (born 1987), Ukrainian football player (senior career from 2004) * Vyacheslav Kalashnikov (born 1985), Russian football player (senior career from 2002) * Vyacheslav Kamoltsev (born 1971), Russian football player (senior career 1988–2006) * Vyacheslav Kartashov (born 1966), Russian football player (senior career 1990–2000) * Vyacheslav Kernozenko (born 1976), Cuba-born Ukrainian football player (senior career 1993–2009) who was also a member of the Ukraine national team (2000–2008) * Vyacheslav Kirillov (born 1989), Russian football player (senior career from 2005) * Vyacheslav Komarov (born 1950), Russian football player (senior career 1973–1976) and coach (1997–2004) * Vyacheslav Kovneristov (born 1973), Russian football player (senior career 1993–2009) * Vyacheslav Krendelyov (born 1982), Turkmenistani football player (senior career from 2000) and member of the Turkmenistan national team (from 2004) * Vyacheslav Krykanov (born 1971), Russian football player (senior career 1989–2006) and coach (since 2009) * Vyacheslav Kuznetsov (footballer) (born 1962), Russian football player (senior career 1979–1997) and coach (since 2003) * Vyacheslav Leshchuk (born 1951), Ukrainian and Soviet football player (senior career 1969–1983) and coach (1983–1995) * Vyacheslav Lugovkin (born 1968), Russian football player (senior career 1988–2003) and coach (2001–2008) * Vyacheslav Lychkin (born 1973), Azerbaijani football player (senior career 1989–2008) who was a member of the Azerbaijan national team (1995–2001) * Vyacheslav Malafeev (born 1979), Russian football player (senior career from 1997) and member of the Russia national football team (from 2003) * Vyacheslav Malakeev (born 1973), Russian-born Finnish football player (senior career since 1991) * Vyacheslav Marushko (1938–1999), Russian-born Soviet football player (senior career 1957–1968), and coach (1971–1989) * Vyacheslav Melnikov (footballer, born 1954), Russian football player (senior career 1975–1986) and coach (1991–2008) * Vyacheslav Melnikov (footballer, born 1975), Russian football player (senior career 1991–2007) * Vyacheslav Nurmagombetov (born 1984), Russian football player (senior career from 2001) who holds Kazakhstan citizenship * Vyacheslav Nikolayevich Petrukhin (born 1953), Russian football player (senior career 1971–1989) and coach (since 2004) * Vyacheslav Ponomarev (born 1978), Uzbek football player who made one appearance for the Uzbekistan national team in 2000 * Vyacheslav Protsenko (born 1974), Ukrainian football player (senior career since 1992) * Vyacheslav Rafikov (born 1986), Russian football player (senior career since 2004) * Vyacheslav Rodin (born 1981), Russian football player (senior career since 1999) * Vyacheslav Semyonov (born 1947), Ukrainian football player (senior career 1966–1978) * Vyacheslav Serdyuk (born 1985), Ukrainian football player (senior career since 2005) * Vyacheslav Shevchenko (born 1985), Ukrainian football player (senior career since 2001) * Vyacheslav Shevchuk (born 1979), Ukrainian football player (senior career from 1996) who has made 16 appearances for the Ukraine national team * Vyacheslav Sobolev (born 1984), Kazakhstani football player (senior career from 2005) * Vyacheslav Solovyov (1925–1996), Russian-born Soviet football player (1946–1954) and coach (1954–1991) * Vyacheslav Sukristov (born 1961), Lithuanian football player (senior career 1984–1998) and manager (since 2005) * Vyacheslav Sviderskyi (born 1979), Ukrainian football player (senior career 1997–2009) who played in Ukraine's 2006 World Cup Squad * Vyacheslav Tsaryov (1971–2010), Russian football player (senior career 1988–2002) * Vyacheslav Verushkin (born 1989), Russian football player (senior career since 2007) * Vyacheslav Volkov (born 1970), Russian football player (1991–2006) and coach (since 2008) * Vyacheslav Zapoyaska (born 1980), Ukrainian football player (senior career since 2000) * Vyacheslav Zemlyanskiy (born 1986), Russian football player (senior career since 2005) Athletics * Vyacheslav Ivanenko (born 1961), Russian Olympic Gold Medallist (representing the USSR) in the 50 km race walk event * Vyacheslav Lykho (born 1967), Russian Olympic shot putter who represented the USSR, the Unified Team, and later Russia * Vyacheslav Muravyev (born 1982), Kazakhstani Olympic sprinter who specializes in the 100 and 200 metres events * Vyacheslav Shabunin (born 1969), Russian middle distance runner who specializes in the 1500 metres * Vyacheslav Voronin (born 1974), Russian Olympic athlete who won World (1999) and European Indoor (2000) championships in high jump Boxing * Vyacheslav Glazkov (born 1984), Ukrainian super heavyweight division boxer and Olympic Bronze Medallist * Vyacheslav Lemeshev (1952–1996), Russian middleweight boxer and Olympic Gold Medallist representing the USSR * Vyacheslav Senchenko (born 1977), Ukrainian boxer who won the WBA welterweight title on April 10, 2009 * Vyacheslav Yanovskiy (born 1957), Belarusian light welterweight boxer and Olympic Gold Medallist for the USSR Canoeing * Vyacheslav Ionov (born 1940), Soviet sprint canoer who won an Olympic gold medal in the K-4 1000 m event * Vyacheslav Kononov, Soviet sprint canoer who won two World Championship gold medals in the K-2 10000 m event * Vyacheslav Kutuzin (born 1973), Soviet Olympic sprint canoer who competed in the K-4 1000 m event * Vyacheslav Tsekhosh, Ukrainian sprint canoer who won a World Championship silver medal in the C-1 4 × 200 m relay event in 2010 * Vyacheslav Vinnik, Soviet sprint canoer who won World Championship medals Championships in the K-1 4 × 500 m and K-4 1000 m events in 1963 * Vyacheslav Yonov, Soviet sprint canoer who won a World Championship gold medal in the K-4 10 000 m event in 1966 Ice hockey * Vyacheslav Anisin (born 1951), Russian ice hockey player who played in the Soviet Hockey League and is the father Winter Olympic ice dancing champion Marina Anissina * Vyacheslav Bulanov (born 1970), Russian ice hockey referee, who has officiated at both Winter Olympics and World Hockey Championship matches * Vyacheslav Buravchikov (born 1987), Russian ice hockey player (since 2004) * Vyacheslav Butsayev (born 1970), Russian professional ice hockey player (1987–2007) and Winter Olympics Gold Medalist * Vyacheslav Bykov (born 1960), Soviet and Russian ice hockey player (1979–2000), dual Winter Olympics Gold Medalist, and present head coach of the Russian national ice hockey team * Vyacheslav Chistyakov, Russian ice hockey player * Vyacheslav Fetisov (born 1958), Russian ice hockey player (1977–1998) and dual Winter Olympics Gold Medalist who was the inaugural Chairman of the WADA Athlete Committee * Vyacheslav Kozlov (born 1972), Russian ice hockey player (since 1987) and two-time Stanley Cup champion (1997, 1998) with the Detroit Red Wings * Vyacheslav Kulemin, Russian ice hockey player * Vyacheslav Litovchenko, Russian ice hockey player * Vyacheslav Starshinov (born 1940), Russian ice hockey player who played in the Soviet Hockey League and has been inducted into the International Ice Hockey Federation Hall of Fame * Vyacheslav Voynov (born 1990), Russian ice hockey player Other sports * Vyacheslav Atavin (born 1967), Soviet and Russian handball player who has won gold medals at European and World Championships and at the Olympic Games * Vyacheslav Chukanov (born 1952), Olympic Gold Medalist in show jumping with the Soviet Union * Vyacheslav Denisov (born 1983), Uzbek basketball player who is a member of the Uzbekistan national team and made his debut at the 2009 FIBA Asia Championships * Vyacheslav Domani (born 1947), Russian Olympic volleyball player who won a bronze medal competing for the Soviet Union * Vyacheslav Dryagin (born 1940), Russian Winter Olympic skier and World Championships bronze medalist who competed for the Soviet Union * Vyacheslav Dubinin, runner up in the Individual Ice Racing World Championship in 1966 and 1967 * Vyacheslav Ekimov (born 1966), Russian gold medal-winning Olympic road and track cyclist who was named Russian Cyclist of the Century in 2001 * Vyacheslav Gorpishin (born 1970), Russian Olympic Gold Medalist in handball * Vyacheslav Ivanov (born 1938), Russian rower who was the first three-time Olympic gold medalist in the single scull event * Vyacheslav Koloskov (born 1941), Russian and Soviet sport functionary who served as vice-president of FIFA (1980–1996) * Vyacheslav Kravtsov (born 1987), Ukrainian basketball player (professional career since 2005) * Vyacheslav Kurennoy (1932–1992), Russian Olympic water polo player who competed for the Soviet Union * Vyacheslav Nikulin, represented Russia and later Germany at the Individual Ice Racing World Championship, runner up in 2002 and third place (1994, 1995, 1996, 1998, 1999, and 2001) * Vyacheslav Oleynyk (born 1966), Ukrainian wrestler and Olympic Gold Medalist * Vyacheslav Pimenov (born 1991), Russian triathlete, supersprint junior champion and the Olympic Distance junior silver medalist in 2010 * Vyacheslav Savlev, Soviet bobsledder who finished runner-up in the two-man event for the 1985–86 World Cup season * Vyacheslav Shyrshov (born 1979), Ukrainian Olympic swimmer who won a gold medal at the 2001 European Championships * Vyacheslav Vasilevsky, Russian mixed martial arts fighter * Vyacheslav Vedenin (born 1941), Russian-born Soviet Olympic and World Championships Gold Medalist in cross country skiing * Vyacheslav Zaytsev (born 1952), Russian volleyball player who won Olympic gold and silver medals for the Soviet Union * Vyacheslav Zahorodnyuk (born 1972), four-time Ukraine national figure skating champion Other people * Vyacheslav Ivankov (1940–2009), assassinated member of the Russian Mafia * Vyacheslav Oltarzhevsky (1880–1966), Russian architect and one of the first Soviet experts in skyscraper construction * Vyacheslav Ivanovich Silin (1907–1975), Russian gunsmith known for his development of the Silin gun * Vyacheslav Mikhaylovich Tichonitsky (1873–1959), Metropolitan Bishop of the Russian Orthodox Church in Western Europe Fictional characters * Vyacheslav Grinko (1959–2004), fictional former Spetznaz soldier in the Splinter Cell series of video games and novels
WIKI
Network Computing is part of the Informa Tech Division of Informa PLC This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726. All Archive Data is Not Alike Just because we call all the data users aren't changing on a daily basis archival, that doesn't mean it's all the same.  Depending on its source and usage patterns, different types of archival data can be best served by different storage techniques and media. The most common type of archival data is made up of email messages and files that have been put into the archive and may need to be accessed by users transparently. Realizing that object access rates fall off dramatically as objects age, system administrators set up policies to migrate objects over 30 or 60 days old to an archival storage system and replace them with some sort of pointer or stub so the user can still access the data from its current location in their mailbox or home directory. Organizations with strict regulatory requirements like SEC 17a-4 require that some data be retained, and will archive objects as they're created and/or published/finalized and then replace the original files with stubs as they reach the 30-60 day age. • 1
ESSENTIALAI-STEM
Talk:Histidine Wiki Education Foundation-supported course assignment This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available on the course page. Student editor(s): AguayoJ. Peer reviewers: Davidho3. Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 23:30, 16 January 2022 (UTC) Untitled The use of the single double-headed arrow between the tautomers of histidine depicted is misleading. It should be a pair of single-headed arrows to denote equilibrium not resonance. 3D structure The 3D structure shows the amino acid as an uncharged molecule but it should be rather present as a zwitterion. Also the IUPAC name and formula are not for the endogenous amino acid but the racemate of R and S histidine. Is it on purpose or should I change it? -- Panoramix303 (talk) 19:16, 23 March 2008 (UTC) I just took a look at the illustration of the histidine molecule http://en.wikipedia.org/wiki/File:L-histidine-zwitterion-from-xtal-1993-3D-balls-B.png There has to be an error here. Look at the second carbon from the right end. It is attached to a blue nitrogen, but the nitrogen group should be NH2, not the NH3 shown. Am I imagining things or should this be changed? Eric <IP_ADDRESS> (talk) 15:44, 29 September 2009 (UTC) Amino acids exist as zwitterions where overall uncharged. Note the anionic carboxylate group. --Rifleman 82 (talk) 16:00, 29 September 2009 (UTC) Shouldn't the sidechain be protonated (rather than the N-terminus) in the formally neutral zwitterion? There should also be a reference for the claim that the two NH groups in the imidazolium ring share the charge "equally" when the sidechain is protonated, because an intramolecular hydrogen bond to the N-terminus, e.g., could make the charge sharing unequal.--JP —Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:57, 13 December 2010 (UTC) One of the hydrogens bound to the imidazole carbon appears to be out of plane, which is not correct as the carbons are sp2-hybridized. Experimental structure with hydrogens may be found for example here - Acta Cryst. (1972). B28, 2377-2382. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:56, 8 April 2014 (UTC) Aromaticity i quote from the second paragraph: One (nitrogen) is bound to hydrogen and donates its lone pair to the aromatic ring and as such is slightly acidic, whereas the other one donates only one electron to the ring so it has a free lone pair and is basic. The last part of this sentence doesn't add up does it? the 'basic' nitrogen in the ring is double bonded to one carbon and single bonded to another, that uses up 3 of its 'outer' electrons, leaving it with 2 left, if it then 'donates one to the ring' its left with one electron; not a pair as is said in the article (nitrogen has only 5 outer e-) i didn't want to change this just in case i have missed something here, but if it is incorrect please change it, or explain my error underneath. ty --JCW 14:02, 11 August 2008 (UTC) So related to the discussion below: one nitrogen donates a lone pair to the ring, apparently the other lone pair never participates in the ring. Is this because of orbital geometry or what? Qchristensen (talk) 07:44, 20 March 2009 (UTC) * Yes, whichever nitrogen isn't bonded to hydrogen (this can change rapidly by tautomerism) has a lone pair at 90° (orthogonal) to the ring, so the lone pair cannot participate in the ring's pi system. * Imidazoles-pi-orbitals-2D.png * Above: orbitals involved in aromaticity in green, lone pair that is orthogonal to pi system and cannot participate in red * Below: nitrogen lone pair (far left) and pi molecular orbitals of imidazole * Imidazole-pi-system-Spartan-HF-6-31Gstar-3D-balls.png * Ben (talk) 21:09, 21 March 2009 (UTC) Using the N-1 and N-3 (and N-1-H and N-3-H) nomenclature demands that the article note the numbering discrepancy between IUPAC and conventional biochemical usage. Best would be to couch this entire discussion in terms of tele (TAU) and PI nitrogens. <IP_ADDRESS> (talk) 13:31, 11 November 2010 (UTC)John Thaden, UAMS, USA. Can someone please check this statement: "Histidine can be aromatic. When it is deprotonated, and uncharged, it is not aromatic. It no longer obeys Hückel's rule because 8 electrons are in the ring system (an extra two from the deprotonated nitrogen). Histidine obeys Hückel's rule when it is protonated, so then is aromatic." I am quite sure this is wrong. First off all, when the imidazole ring is neutral, it has six pi electrons, two from the nitrogen lone pair and four from the double bonds. Thus, it is aromatic. When deprotonated the N-metal bond is orthogonal to the pi-system, so it remains aromatic. I'm going to correct this in a day or two if I don't hear to the contrary. Eugene Kwan (talk) 18:35, 13 February 2009 (UTC) I wrote it because it is a common question for molecular biologists, but a good answer is hard to find. Now it makes sense to me that the second lone pair doesn't participate in the ring system ever (like pyridine). If anyone could find a reference for this I think this would be a great addition. Quin Christensen (talk) 18:50, 18 March 2009 (UTC) * Stryer (5th Edn.) p. 47: "Histidine contains an imidazole group, an aromatic ring that can also be positively charged". * See also Imidazole. Clayden probably has info on the aromaticity of imidazole. * Ben (talk) 00:21, 19 March 2009 (UTC) Ok, but "NMR shows that the chemical shift of N-1 drops slightly, while the chemical shift of N-3 drops considerably (about 190 vs. 145 ppm). Because these chemical shifts are relative to nitric acid, a substance which resonantes far downfield, a decrease in chemical shift corresponds to deshielding." So does the deshielding of N-3 suggest an uneven distribution of of the pi electron cloud? Does this affect the "aromaticity" of this form? Quin Christensen (talk) 20:23, 19 March 2009 (UTC) * Be careful to avoid OR. Here's a good article: J. Mol. Struct. (2003) 655, 397-403 - references within may also prove informative. * Ben (talk) 01:32, 20 March 2009 (UTC) * Thanks! It looks like it is very aromatic. It definitely is not considered as such in biochemistry books. Qchristensen (talk) 07:41, 20 March 2009 (UTC) No. The deshielding indicates the presence of the second-order paramagnetic effect, which arises from a mixing of electrons in the lone pair into the aromatic system. It's kind of complicated, but the point is, yes, it's aromatic. It's always aromatic, no matter what the pH is. —Preceding unsigned comment added by E kwan (talk • contribs) 03:40, 3 April 2009 (UTC) I think that the histidine ring structure is only aromatic when in the positive state as only then does it obey the Huckel 4n + 2 rule. In the base form, the ring has one nitrogen double bonded and therefore contributing three electrons, the other nitrogen with hydrogen attached only contributing two electrons and the three carbon atoms each contributing one electron each. This makes a total of eight pi electrons in the ring. However, the ring structure may disobey the Huckel rule and actually be aromatic as the rule does not include all aromatic molecules. Geoff e j (talk) 11:41, 22 February 2013 (UTC) That's incorrect, because you can only count the p-electrons that are orthogonal to the ring. That means that histidine is aromatic at any protonation state. Eugene Kwan (talk) 15:45, 23 February 2013 (UTC) Supplementation I deleted some of the content from this section diff as the content made rather extraordinary and sweeping claims that would need good citations to remain. Tim Vickers (talk) 21:50, 2 April 2009 (UTC) Synthesis and precursors The article does not mention whether histidine is synthesized in the body from some other precursor substance or is itself a commonly occurring amino acid in food. —Preceding unsigned comment added by Carusus (talk • contribs) 11:19, 16 May 2010 (UTC) The first paragraph claims that humans begin to synthesize it after "several years." I think this claim needs a citation and a time frame more specific than "several years." Does this mean as a toddler, after puberty, in middle age, or what? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 00:41, 1 September 2010 (UTC) It is not synthesized. It is an essential amino acid in humans. The early research didn't find any change in adults in the short term, but longer experiments later confirmed it is essential. I added the reference. Qchristensen (talk) 20:20, 11 November 2010 (UTC) pKa The imidazole sidechain of histidine has a pKa of approximately 6.0, and, overall, the amino acid has a pKa of 6.5. What does that mean (the "overall" pKa)? The pI of the free amino acid? Why is that relevant? AlphaHelical (talk) 02:14, 4 May 2013 (UTC) Molecular Formula What's the molecular formula? Eg: Phenylalanine has a chemical formula of C9H11NO2 but a molecular forumla of C6H5CH2CHCOOH ~ender 2014-10-06 5:52:AM MST — Preceding unsigned comment added by <IP_ADDRESS> (talk • contribs) 12:52, 6 October 2014 (UTC) * for the condensed formula see here Jytdog (talk) 13:15, 6 October 2014 (UTC) * OP posted this on several amino acid pages; please see discussion here: Talk:Tryptophan Jytdog (talk) 14:20, 6 October 2014 (UTC) 23 Proteinogenic amino acids? Proteinogenic amino acid says there are 22. I'm not clear enough to tell whether there's some subtlety, but it seems to me that, unless someone can come up with what number 23 is, we should go with 22.--Wcoole (talk) 00:20, 27 October 2015 (UTC) Assessment comment Substituted at 17:58, 29 April 2016 (UTC) Outline for Editing Hello, In the next couple of weeks I will be editing this page. Here is my current plan outline: I will focus on expanding the metabolism section. I will start with the Biosynthesis of Histidine and perhaps continue with the Catabolism section depending on the information I can find about Catabolism. More specifically I want to add information about: 1. Histidine biosynthesis in plants 2. How Histidine biosynthesis is regulated 3. And the Histidine precursor- L-Histidinal I would also like to expand the external links section by adding other interesting articles that I have found about Histidine. What do you all think about this? I appreciate any feedback! AguayoJ (talk) 14:22, 5 May 2016 (UTC) * Keep in mind the overall WP:WEIGHT of the sections you add in light of the article as a whole, and make sure everything you bring is reliably sourced. We'll see on the external links. See WP:EL for guidance. Jytdog (talk) 15:48, 5 May 2016 (UTC) note on structures the following was added to the article in this diff by User:Johnmichaeloliver - moved here as this is where it belongs. [(Please note that the images of the molecular structure at the top of the panel on the right appear inconsistent. The left one shows the imidazole side chain as CNCNC whereas the right hand version shows CCNCN) -- Jytdog (talk) 00:02, 19 February 2017 (UTC) History of discovery: In 1874, Miescher observed that the sperm of the Rhine salmon had “nuclein”, which the basic substance could be secured from an acid extract of the material by precipitation with chloroplatinic acid. About the new base, it contained a high proportion of nitrogen, which the ratio of the nitrogen to carbon is 5:9. No further investigation of the base substance was made until 1894, when Kossel isolated the protamine. He searched for a more convenient source of protamine than the Rhine salmon, which was the sperm of the sturgeon. About his method, he subjected sturine to hydrolysis with sulfuric acid, removed the reagent with barium hydroxide, and added mercuric chloride to the strongly alkaline solution. At last, he got the chloride of the protein, which had the result either with C12H20N6O4.2HCl.2H2O or with C6H9N3O3.HCl.H2O. On May 11 1896, Hedin can make purer base substance by removing the water and other compound based on the basis of the result of the Kossel, which can infer the right formula of the histidine between the C12H20N6O4.2HCl.2H2O and the C6H9N3O3.HCl.H2O. About his method, he added the silver nitrate to the free bases derived from the protein, and then the silver chloride was removed by the evaporation. At last, he got the purer result, C6H9N3O3, by removing the water with the silver sulfate and alcohol. They both observed the histidine, but they discover the histidine in two widely separated laboratories. Of course, their materials were different, Kossel discovered histidine by using the protamine and Hedin discovered histidine by using the proteins. However, the wide distribution of histidine became apparent from the work of Kossel and his students. [7] — Preceding unsigned comment added by Xiwentan (talk • contribs) 01:12, 8 April 2020 (UTC) Basic interactions with other molecules The histidine has five interaction types of histidine: (1) Cation-π interaction, (2) hydrogen-π interaction, (3) π-π stacking interaction, (4) Coordinate bond interaction and (6) Hydrogen bond interaction. About the Cation-π interaction, the protonated His+ is an organic cation, which can join the cation-π interactions as an organic cation with other aromatic amino acids (Phe, Tyr, and Trp). About hydrogen-π interaction, the polar hydrogen atom of histidine can form hydrogen-π bond with other aromatic amino acids in ‘T’ orientation. About π-π stacking interaction, the imidazole structure of histidine side chain is a conjugative π-plane, which can make π-π stacking interactions with the aromatic side chains of other amino acids (Phe, Tyr, and Trp). About Coordinate bond interaction, the basic nitrogen atom in the imidazole of histidine has a lone electron pair that make it a coordinate ligand of metallic cations, such as Zn2+ and Ca2+. About Hydrogen bond interaction, the polar hydrogen atom of the imidazole is a hydrogen-bond donor, and the basic nitrogen atom is a hydrogen-bond acceptor. [8] The bond of the histidine and water belong to the hydrogen bond interaction. — Preceding unsigned comment added by Xiwentan (talk • contribs) 01:20, 8 April 2020 (UTC) Biosynthesis in animals https://doi.org/10.1186/s13059-018-1552-8 "Uniquely amongst animals, a complete histidine biosynthesis pathway is present in robust corals but not in complex corals or sea anemones" Copper olives (talk) 01:57, 5 October 2022 (UTC)
WIKI
If recession fears overblown, homes are a great buy On paper, Toll Bros.' recent earnings report looked like good news. The nation's biggest luxury homebuilder matched Wall Street profit forecasts and boosted its backlog of orders 34 percent from a year ago. So why is Toll Bros. stock down 15 percent this year? "The stock market seems to be pricing in a steep decline in the economy and, along with it, our sector," said executive chairman Robert Toll in an earnings conference call. "We, on the other hand, are seeing signs that reflect strength and positive momentum in our business." The whole home-building industry poses the same question for investors now reconsidering whether the economic outlook is as weak as the year's start suggested. Of all the oddities of the market's 2016 downturn, one of the oddest is the decline in home-building stocks, like Toll Bros., and exchange-traded funds that make broad bets on the Tolls of the residential real estate world, such as the SPDR Homebuilders ETF (XHB) and iShares U.S. Home Construction ETF (ITB), the two largest funds tracking the industry. These two ETFs are down near-10 percent, three times the decline in the S&P 500. On the face of it, it doesn't make much sense, and it could be an anomaly for aggressive investors to exploit. After all, the average price of a new home is up 2.9 percent in the last year, according to the Census Bureau. Most major builders beat forecasts for fourth-quarter earnings, and new single-family home sales rose 14 percent in 2015, with forecasts calling for a 20 percent gain this year, according to National Association of Home Builders economist Robert Dietz. "That would make 2016 the first year (since the recession) where the growth in single-family exceeds the growth in apartments," Dietz said. Investors are worried that the good news can't last, according to MKM Partners analyst Megan McGrath. And some of the short-term data has been troubling. Wells Fargo's economics team noted this week that sales of new homes started the year on a weak note, existing home sales posted meager gains, housing starts tumbled in January, and homebuilder sentiment fell to a nine-month low on fears that slower global growth and increased financial market volatility will discourage homebuying. Builders like CalAtlantic Group warned in recent earnings calls that orders weakened in January, raising fears about the crucial spring selling season, especially with the broader market looking shaky: Last fiscal year, the No. 1 builder, D.R. Horton, received 30 percent of its orders for the year between January and March. Industry-wide, an index published by the NAHB and Wells Fargo said builders saw foot traffic at new-home communities fall by five points in January, to a reading of 39 on an index of 100. But there are reasons to remain optimistic. Wells Fargo noted that job growth has held up relatively well and incomes are rising solidly. U.S. employers added an average of 228,000 jobs per month in 2015, marking the second-strongest pace of growth in 16 years. The breadth of job gains has also improved, across both industries and the nation. Moreover, household finances are also in far better shape, with fairly low debt service ratios and personal income growing solidly. "While the most recent housing numbers are a bit disappointing, the monthly data tend to be fairly volatile and do not reconcile well with housing demand, which still appears to be strong," the bank's economic team concluded. Housing sales depend on job gains and consumer confidence, both of which have been strong in recent months, if not as strong as they were in the middle of 2015. The economy's 4.9 percent unemployment rate is the best since February 2008, but the 151,000 new jobs created in January were well below the fourth-quarter average of 279,000 a month. On Wednesday, the most recent monthly ADP private payroll number totaled 214,000 for February, exceeding estimates. The more closely watched government nonfarm payroll report will be released Friday. The University of Michigan's consumer confidence index is sitting at 92, well above 2013 levels but below a January 2015 peak of 98.1. A strong job market could work against builders' efforts to widen profit margins on each home sold, adding to investors' concerns, Morgan Stanley analyst Ryan Gilbert said. In a Morgan Stanley survey, nearly three-fourths of builders reported being affected by labor shortages, with a third saying problems finding enough workers was affecting how quickly they could build homes and their gross margins, or the percentage of a home's price left over after construction costs. Gross margins actually narrowed in 2015 as labor shortages emerged, and more than half of builders in a Morgan Stanley survey think they'll remain at about the same level in the first half of this year, Gilbert said. But fundamentally, "good things are still happening in housing," McGrath said. "Most years, there is a hope trend (with stocks rising before spring season). This year investors are too nervous across the board.'' (Source: XTF.com) Another problem for some builders is weakness in the oil patch. Texas is one of the largest new-home markets, and cities like Houston are hit hard by the fall in oil prices. Demand in Dallas has held up, but Toll Bros. orders in the Houston market fell 26 percent, and CalAtlantic saw an 8 percent fourth-quarter decline in its Southwest region, which includes Texas. Only about 2 percent of the company's sales are in Houston. Wells Fargo's economics team released a report this week saying some of the slowing in household growth may be due to the weakening energy patch. Even with this slowdown, the trend in home sales and residential construction is still improving, albeit at a more sluggish pace than was expected a few months ago. "If you can put a house in Texas in pretty much any market and sell it to make a margin at [$250,000], you're going to sell houses," Horton CEO David Auld said on its earnings call in late January. "I think there's still pent-up demand in Houston; I think that pent- up demand is growing. But it is just not the frenzy that we've seen in the past or is really taking place in some of the other Texas markets." (Source: XTF.com) Builders themselves are talking confidently. Horton said on its conference call that it is boosting investment in lots and land by 20 percent this year, though it did not raise its sales guidance. Toll Bros. said it spent $150 million buying back its own shares in the quarter, at an average price 13 percent above where the stock is now. "We believe the sell-off of homebuilder stocks, including Toll Brothers, over the past few months is not reflective of the fundamentals of our business,'' CFO Martin Connor said during its earnings call. But expect two reoccurring challenges in the housing market: affordability and low inventories. Wells Fargo noted that home prices have continued to rise at a faster-than-expected pace across the nation. In particular, cities that have seen meaningful employment gains, such as Portland, San Francisco and Denver, have also seen some of the greatest increases in home prices. Many of these city centers now face a significant affordability hurdle, as home prices are rising at a much faster pace than incomes. Price constraints have shut many potential buyers out of the market. Wells Fargo expects home-price appreciation to moderate in 2016. Housing affordability is likely to remain an issue in many markets, Wells Fargo wrote in its housing report this week. Available inventory of homes for sale is scarce relative to historical norms. The inventory of new homes for sale has been particularly strong, as the series reported its sixth consecutive gain in January. But most of that increase is homes under construction or not yet started. Completed inventory remains exceptionally low, reflecting sluggish demand for starter homes. The real tests for the stocks and the ETFs will come over the next few weeks, McGrath said. Builders, like Hovnanian Enterprises, KB Home and Lennar, will report earnings in March, and their order flow and commentary about traffic will set the tone until the spring home-buying season comes into focus, the MKM analyst said. "To get the builders moving, we need to see proof the spring selling season will be healthy,'' McGrath said. If the news is good, the bounce over the rest of the year could be fairly substantial. Homebuilding stocks normally make their gains for the year between fall and early spring before flattening out or tailing off. If the skeptics are wrong and the recovery in new-home sales and profits continues, that bounce could come late this year. —By Tim Mullaney, special to CNBC.com
NEWS-MULTISOURCE
Page:The humbugs of the world - An account of humbugs, delusions, impositions, quackeries, deceits and deceivers generally, in all ages (IA humbugsworld00barnrich).djvu/104 The mediums produce “blood-red letters on the arm” in a very simple way. It is done with a pencil, or some blunt-pointed instrument, it being necessary to bear on hard while the movement of writing is being executed. The pressure, though not sufficient to abrade the skin, forces the blood from the capillary vessels over which the pencil passes, and where, when the reaction takes place, an unusual quantity of blood gathers and becomes plainly visible through the cuticle. Gradually, as an equilibrium of the circulation is restored, the letters pass away. This “manipulation” is generally produced by the medium in connection with the ballot-test. Having learned the name of an investigator’s spirit-friend, in the manner stated in a previous article, the investigator is set to writing some other names. While he is thus occupied, the medium quickly slips up his sleeve under the table, and writes on his arm the name he has learned. Try the experiment yourself, reader. Hold out your left arm; clench the fist so as to harden the muscle a little, and write your name on the skin with a blunt
WIKI
Odibo Odibo is a village in the north of Namibia close to the Angolan border known for its Anglican mission St Mary. It belongs to the Oshikango electoral constituency in the Ohangwena Region. Odibo is also an Archdeaconry in the Diocese of Namibia. Odibo is situated on top of a large underground water reservoir. Cracks in the soil and in stone structures are attributed to this. The village Headman is Charles Namoloh, Namibia's Minister of Regional and Local Government, Housing and Rural Development. Odibo in Igbo language of South Eastern Nigeria means servant. History St Mary's Mission in Odibo was established in August 1924 by George Tobias, Nelson Fogarty, and Reverend R White, Anglican priest that had the task of setting up a mission in northern Ovamboland. The tree where they camped before starting their work is today known as Tobias' Tree. The mission eventually comprised a church, a hospital, and the St Mary Mission School, a high school and seminary. St Mary Mission School operated until 1979 when it was closed by the South African colonial administration. Several notable people attended this school, including human rights activist and Bishop James Kauluma, National Council member Michael Hishikushitja, People's Liberation Army of Namibia (PLAN) commander Peter Mweshihange, National Assembly member and Bishop of Ovamboland Peter Kalangula and Minister of Foreign Affairs Netumbo Nandi-Ndaitwah. During the Namibian War of Independence the seminary was bombed in 1981 by the South African Defence Force. Education There are two schools at the village, St. Mary's Odibo High School, the successor of Saint Mary Mission School, and Odibo Combined School. There is also a Lutheran Centre for Arts and Crafts for artistic subjects, established by one of Namibia's most famous artists, John Muafangejo, in the early 1970s. People Sons and daughters of the village include: * Hidipo Hamutenya, former opposition leader * Charles Namoloh, Minister of Safety and Security
WIKI
Can we go beyond 5-sense based humanity? Can we go beyond 5-sense based humanity? David Eagleman We are built out of very small stuff, and we are embedded in a very large cosmos, and the fact is that we are not very good at understanding reality at either of those scales, and that’s because our brains haven’t evolved to understand the world at that scale….Instead, we’re trapped on this very thin slice of perception right in the middle. But it gets strange, because even at that slice of reality that we call home, we’re not seeing most of the action that’s going on…our brains are sampling just a little bit of the world. Across the animal kingdom, different animals pick up on different parts of reality. So in the blind and deaf world of the tick, the important signals are temperature and butyric acid; in the world of the black ghost knife fish, its sensory world is lavishly colored by electrical fields; and for the echolocating bat, its reality is constructed out of air compression waves. That’s the slice of their ecosystem that they can pick up on, and we have a word for this in science. It’s called the umwelt, which is the German word for the surrounding world. Now, presumably, every animal assumes that its umwelt is the entire objective reality out there.  The brain figures out what to do with the data that comes in. And when you look across the animal kingdom, you find lots of peripheral devices. So snakes have heat pits with which to detect infrared, and the ghost knife fish has electroreceptors, and the star-nosed mole has this appendage with 22 fingers on it with which it feels around and constructs a 3D model of the world, and many birds have magnetite so they can orient to the magnetic field of the planet. So what this means is that nature doesn’t have to continually redesign the brain. Instead, with the principles of brain operation established, all nature has to worry about is designing new peripherals. So here’s the concept…as I’m speaking, my sound is getting captured by the tablet, and then it’s getting mapped onto a vest that’s covered in vibratory motors, just like the motors in your cell phone. So as I’m speaking, the sound is getting translated to a pattern of vibration on the vest. Now, this is not just conceptual: this tablet is transmitting Bluetooth, and I’m wearing the vest right now. So as I’m speaking —  the sound is getting translated into dynamic patterns of vibration. I’m feeling the sonic world around me. We’ve been very encouraged by our results with sensory substitution, but what we’ve been thinking a lot about is sensory addition. How could we use a technology like this to add a completely new kind of sense, to expand the human umwelt? For example, could we feed real-time data from the Internet directly into somebody’s brain, and can they develop a direct perceptual experience?” David Eagleman is an American neuroscientist, author and science communicator 0 - 0 Thank You For Your Vote! Sorry You have Already Voted!
ESSENTIALAI-STEM
Phosphorosaurus Phosphorosaurus ("phosphate lizard") is an extinct genus of marine lizard belonging to the mosasaur family. Phosphorosaurus is classified within the Halisaurinae subfamily alongside the genera Pluridens, Eonatator, and Halisaurus. Stratigraphically, Phosphorosaurus is only known from the Maastrichtian age of the Late Cretaceous. Although treated as synonymous with Halisaurus in the past, recent studies recognize it as a valid genus. Two species are known: Phosphorosaurus ortliebi, from the Craie de Ciply Formation in Belgium, and P. ponpetelegans, from the Hakobuchi Formation of Hokkaido in Japan. P. ponpetelegans is only known from the very earliest Maastrichtian, whilst P. ortliebi lived throughout the Maastrichtian. Description Phosphorosaurus was small compared to most other mosasaurs, but rather standard in size for a halisaurine. Analysis of Phosphorosaurus biology suggests that this mosasaur was a deep-water or nocturnal hunter, potentially preying on animals such as squid and bioluminescent fish similar to the modern lanternfish present in the same areas. The large eyes of Phosphorosaurus had overlapping fields of vision, giving it depth perception, which would have given it an advantage when chasing such animals in poorly-lit conditions. Studies also indicate that the animal was likely an ambush predator that would lie in wait for prey, as it was not as efficient a swimmer as larger mosasaurs, much like other halisaurines. Konishi et al. 2015 listed the following unambiguous character states for the genus: "Dorsal exposure of prefrontal confined to preorbital segment of frontal; preorbital segment of frontal narrow, sloping anteroventrally; frontal preorbital borders subparallel with each other; interorbital emargination present; frontal lateral border forming a step-like junction between preorbital and interorbital segments; apex of posterodorsal triangular plateau on frontal reaching level of interorbital constriction; frontal articulation facet for postorbitofrontal squareshaped in outline; parietal postorbital process dorsally not separated by ridge from parietal table; and stapedial meatus parallel-sided". Classification Belgian palaeontologist Louis Dollo defined the genus in 1889, with the description of Phosphorosaurus ortliebi from the upper Maastrichtian Craie phosphateé of Ciply in Belgium. The holotype is a fragmented and incomplete skull that is estimated to have been around 42 cm long. It was reclassified as Halisaurus ortliebi in 1996, but this was not taken up by later authorities due to differences in the cranium. Below is a cladogram following an analysis by Takuya Konishi and colleagues (2015) done during the description of P. ponpetelegans, which showcases the internal relationships within the Halisaurinae. The analysis excluded the dubious Halisaurus onchognathus and the genus Pluridens. In their 2023 description of the new Halisaurus species, H. hebae, Shaker et al. performed a phylogenetic analyses of members of the Halisaurinae. They suggested that Phosphorosaurus ponpetelegans and Eonatator coellensis were more closely related to the genus Halisaurus than the type species of their respective genera. They tentatively assigned these species to Halisaurus, with "Phosphorosaurus" ponpetelegans possibly representing a distinct genus in need of a new name. The results of their analyses are displayed in the cladogram below: Species Two species are known, P. ortliebi and P. ponpetelegans, the latter from the oldest Maastrichtian beds located in Hokkaido, Japan. The skull of the latter species is thought to be around 50 cm long. The etymology of P. ponpetelegans derives from the words "ponpet", which means "creek" in Ainu (language of the indigenous peoples of Hokkaido), and "elegans", Latin for "elegant", referencing the exceptional preservation of the holotype specimen of the species and the clean Pankerusano-sawa Creek where the fossil was discovered. P. ortliebi and P. ponpetelgans can be distinguished from each other by several fossil characters. For instance, the prefrontal postnarial medial lamina are smaller in P. ponpetelgans than in P. ortliebi and the development of prefrontal supraorbital tuberosity is minimal compared to P. ortliebi. In P. ponpetelgans the median dorsal ridge of the frontal becomes weak posterior to the orbits, which does not occur in P. ortliebi.
WIKI
The most frequently asked questions about andrology and urology 1-What is andrology? Andrology, Greek for “ανηρ” man and “λόγος” speech, it is the part of medicine that deals with human health with particular reference to reproductive dysfunction and uro-genital (sexual and otherwise). It is generally associated with Urology, but truly rare urologists are engaged and studying only this. 2-What is Urology? Urology, Greek for “oyro-ôyron” urine and -logia, is the part of medicine that deals with diseases of the urinary and genital Aparado: kidneys, ureters, bladder, prostate, urethra, penis and testicles. Fields of interest include endoscopy, minimally invasive surgery, laparoscopy, robotics and microsurgery. 3-What is erectile dysfunction? Erectile dysfunction or impotence is the inability, on the part of man to achieve or maintain an erection that can allow satisfactory sexual intercourse. Different causes responsible for ED and there are several possible solutions. 4-What is Vasectomy? Vasectomy is a male contraceptive method and consists of a simple intervention (which is done on an outpatient basis) which aims to enable ejaculation without sperm thus avoiding the use of any contraceptive method (condom, coitus interruptus, pills, patches, etc). The reversibility of the intervention is possible and the results are above 80% in experienced hands. 5-What is Prostatic Obstruction and Plasma? Prostate is a gland che embraces the urethra (the tube urine), gradually grows in size and this can cause over the years urethral obstruction manifested by a certain symptoms. When the time arrives operate, several solutions can be Plasma being the newest among them. Millimeter instrument tip creates a plasma cloud which vaporizes prostate tissue and accurately closed vessel thereby reducing bleeding simultaneously. Plasma Vaporization Prostatic represents an innovative procedure allows che offer the patient a maximum level of safety and effectiveness in treating prostate obstruction of benign prostatic hyperplasia. 6-What are the functional changes in the bladder? The urinary bladder is a “special” muscle functional abnormalities that may occur due to different causes. These anomalies or functional abnormalities of the bladder can cause different symptoms (obstructive, irritative) that can make longer path per porta to diagnosis. 7-What is Incontinence? Incontinence is the involuntary loss of urine and represents an important social and hygienic problem for the patient. Depending on the underlying cause incontinence, it can be divided into two large families (stress or urge) that are treated in quite different ways including. 8-What is the Prostate? The prostate is a gland that is part of the male reproductive system, it is located below the bladder and in front of the rectum and goes all around a tube called the urethra that carries urine from the bladder through the penis to the outside; its main function is to produce a fluid that enriches semen. 9-I have prostate surgery and since then, I have erection problems it’s not like before and, sometimes, it is impossible to have a normal erection. Is there a remedy? There is always a remedy but not always possible to find the solution in a short time. Oral medications (pills) are a good solution but it is not the only and the specialist will know advise the best. 10) I have operated penile prosthesis, corporoplasty (penile curvature), or varicocele vasectomy. When I can go back to having sex with my partner? The time between the intervention and to maintain security sex changes depending on the intervention. In case of penile prosthesis and corporoplasty never before month after surgery and never without “authorization” of cirugano, if varicocele vasectomy or no contraindications but physical rest is recommended 24-48 hours after surgery. Last Updated on by Marco Cosentino
ESSENTIALAI-STEM
Buchloe station Buchloe station is the only station in the town of Buchloe in the German state of Bavaria. It is at the junction of the Augsburg–Buchloe and Buchloe–Memmingen, Munich–Buchloe and the Buchloe–Lindau railways. History Buchloe station was established with the Augsburg–Kaufbeuren railway, which opened on 1 September 1847. The station building was completed a year later on 15 October 1848. The station at that time was about a kilometre from the town of Buchloe. The town then had about 850 inhabitants and was selected as one of eleven waterering points and stations for handling fast freight between Augsburg and Lindau. A loading dock in the loading shed for three wagons and a cattle ramp were built after the construction of the station building. Similarly, there was a 35-metre long carriage shed, where minor repairs could be made. A few years later, many houses were built along Bahnhofstrasse (station street). Business increased with the construction of the Munich–Memmingen line through Buchloe. The old freight shed and the carriage shed were later replaced by a new freight shed, a locomotive shed with two tracks and an accommodation building. A building for the office of the track supervisor (Bahnmeisterei) and other buildings were also built. On 1 May 1897, the Buchloe North and Buchloe South mechanical signal boxes were built. Station building The original brick station building opened in 1848 was built by local craftsmen. The price was 15,197 guilders. It was a local freight office and contained a ticket office, a luggage room, waiting rooms for first and second class and various offices for operations. The building had three round arched entrances and a clock tower and bell. On the first floor were the apartments of the station manager and the track supervisor. The post office and telegraph services were also housed in the building. The main station building was demolished in 1873 and rebuilt for 160,000 guilders; other station buildings were renovated. On the first floor of the new station building there were flats at the back. Current building since 1967 The station building built in 1873 was demolished in 1967. A new concrete building was constructed, which still exists today. It includes a counter, which is open each day, a kiosk and a small waiting area. There are three ticket machines. Two are located here next to the entrance to the station building from the north, one is in the passageway to Karwendelstraße. Proposed new construction Plans for construction of a new station building are almost finished. The new building would consist of two building structures connected by a covered patio, which would be more comfortable for passengers and visitors to the town. The station building may accommodate a travel centre, a bookstore, a fast food restaurant, a retailer of travel supplies and a bakery, as well as public toilets. The cost of the project is estimated at €2 million, with the town of Buchloe funding more than €500,000. The project has overwhelmingly local support. Also planned is the construction of a central bus station and the associated redesign of the station forecourt.
WIKI
Do we have an alien-contact contingency plan? The Chinese government has promised to investigate the unidentified flying object that forced Xiaoshan Airport to delay 18 flights last week. Tabloids rushed to cover the incident, with the U.K. Sun making a gratuitous alien craft reference, and video footage on YouTube led to numerous comments regarding the existence of extraterrestrial life. What if aliens were to make contactdo we have an E.T. contingency plan? Sort of. The U.S. government is not particularly interested in alien planning. Starting in 1947, the Air Force made a formal study of UFOs but stopped investigations in 1969 after having failed to uncover any evidence of extraterrestrial vehicles or of a threat to national security. In 1992, the government paid for a SETI (Search for Extraterrestrial Intelligence) project through NASAthe Microwave Observing Program's mission was to conduct targeted analyses of nearby starsbut deemed it unworthy of funding one year later. There is, however, a nongovernmental organization established by the International Academy of Astronautics to prepare, reflect on, manage, advise, and consult in preparation for … a putative signal of extraterrestrial intelligent (ETI) origin. That organization, the SETI: Post-Detection Taskgroup helmed by the theoretical physicist Paul Davies, has a set of recommendations in place. The protocol, adopted in 1989, is that if someone detects a radio signal seemingly indicating that we're not alone, he should get in touch with SETI researchers, who will help him verify whether the signal is really and truly evidence of extraterrestrial intelligence. At that point, he should notify the International Astronomical Union as well as the United Nations and relevant research organizations. On the finders-keepers principle, the discoverer would get to make the first public announcement, but data should be made available to the international scientific community. (Source coordinates, however, would be kept secret, to avoid a situation in which anyone with a radio telescope could start up a conversation.) The next step would be figuring out whether a response signal were warranted and, if so, what message to senda process that would involve not just scientists but other experts and government appointees. Probably something very simple would be best, like numbers in binary code. (You can hear Davies discuss this issue with Ira Glass on a recent episode of This American Life.) In the farfetched Hollywood scenario wherein we detect an alien spaceship or aliens send us a Greetings, Earthlings!-type messageall bets are off. (If the Pentagon or some such has a plan for how to deal with contact, it's classified.) Naturally the response would hinge on the nature of the contact: peaceful or violent, needy (give us fossil fuels) or helpful (cold fusion). Many scientists, including Stephen Hawking, believe that contact with intelligent aliens would end badly for uswe'd be the Native Americans to the alien Europeans. I imagine they might exist in massive ships, Hawking said recently, having used up all the resources from their home planet. Such advanced aliens would perhaps become nomads, looking to conquer and colonize whatever planets they can reach. Lacking official protocol, those worried about first contact can turn to the very unofficial Introduction to Planetary Defense: A Study of Modern Warfare Applied to Extra-Terrestrial Invasion. Like Hawking, the authors believe humans would play the part of Native Americans circa 1492. They also think that, in light of the sluggish global response to natural disasters, there's little indication that we could react effectively to invasion. Since we'll probably be technologically outmatched, the best defense strategy would be guerilla warfare. Got a question about today's news? Ask the Explainer. Explainer thanks Michael Michaud of the International Academy of Astronautics. Like Slate and the Explainer on Facebook. Follow us on Twitter. Like Slate and the Explainer on Facebook. Follow us on Twitter. Juliet Lapidos is a staff editor at the New York Times. Juliet Lapidos is a staff editor at the New York Times.
NEWS-MULTISOURCE
Tech leaders are demanding platforms stop amplifying hate speech A collective of prominent tech leaders that calls itself Build Tech We Trust signed a letter Tuesday demanding that the tech industry stop the spread of hate and terrorism on digital platforms. “We are a collective of tech CEOs, activists, changemakers, and workers who believe the time to act to counter the hate and terrorism is now,” stated the letter, which was signed by over 20 notable figures in the tech industry, including Ellen Pao, ReadySet CEO Y-Vonne Hutchinson, and Code2040 CEO Karla Monterroso. The letter, published in full below, blames tech companies for amplifying violent ideologies on their platforms, specifically white supremacist beliefs. “Technology platforms promised us connection, access, and democracy but instead are radicalizing and fragmenting communities by providing an unprecedented ability to coordinate attacks and amplify hate,” the letter’s authors wrote. The letter goes on to cite recent shootings such as El Paso and Gilroy, stating, “[W]e are watching the entire country pay the price of unchecked white supremacy, hate, and violence that spread as a result of multiple tech platforms.” Mass shootings, unfortunately, happened before social media platforms existed. But increasingly, shooters behind these events are engaging in and inspired by extremist discourse online. The El Paso, Texas, shooting was the third case in recent times where a mass shooter posted a violent screed on the fringe website 8chan shortly before opening fire. The Gilroy, California, shooter posted a white supremacist manifesto on Instagram. YouTube and Facebook have been accused of contributing to political polarization in the content they surface to audiences. The letter stops short of prescribing any specific solutions, but it calls on technology companies to take more serious action and tech workers to rally around the cause. In recent months, President Trump and other Republican leaders have accused social media companies of censoring conservative speech on their platforms (without any evidence) and threatened to take action against them for allegedly doing so. The letter cautions tech companies not to let such political pressure stop them from fighting hate speech. “During this critical time, we must not conflate messages of white supremacy and attacks on marginalized communities with ‘freedom of speech,’ ‘anti-conservative bias,’ or ‘hearing all opinions,’” the letter says. “We must be vigilant in recognizing and fighting real harm and fear that marginalized communities face.” So far, social media platforms have all promised to do a better job at policing hate speech. But their actions, critics say, are too few and far between. Today’s letter is an attempt to draw more tech leaders, researchers, and activists to join a growing chorus of voices calling for serious reform from within. Here’s the full text of letter: Technology platforms promised us connection, access, and democracy but instead are radicalizing and fragmenting communities by providing an unprecedented ability to coordinate attacks and amplify hate. Five years ago, when relentless harassment in the gamer community against three women game developers happened, underrepresented people sounded an alarm. People of color, the LGBTQIA+ community, and others warned and continue to warn us about how tech platforms are used to abuse, and how it keeps getting worse. In a time where mass shootings have become tragically more commonplace, the recent string of shootings in Gilroy, El Paso, and Dayton have shaken us to our core. We are a collective of tech CEOs, activists, changemakers, and workers who believe the time to act to counter the hate and terrorism is now. We believe technology should improve the human experience and quality of life for everyone, and be held accountable when it causes harm. We believe technology has the power to transform our lives for the better, but only if we prioritize people over the gains for the few. Today, we invite you to join us in changing the way we build and use tech. We invite you to demand that we build tech we can trust. White supremacist terrorism and violence, fueled by racism and misogyny, and empowered by technology, is on the rise. They’ve moved beyond their white robes and hoods to social media and public rallies where they radicalize and fund their growing membership. Our government leaders at the highest levels encourage and spread it. Our industry leaders enable and profit from it. Four of the five worst gun massacres in modern history have taken place over the past two years. Evidence shows that many of these shooters are inspired by white supremacist ideology and targeting marginalized people. Almost all of the 22 victims of the El Paso shooting were Latinx, six of the nine killed in Dayton were Black. The Pulse Nightclub shooting targeted the Latinx LGBTQIA+ community, the Tree of Life shooting targeted Jewish people, the Charleston church massacre also targeted the Black community, and members of the Sikh faith were targeted in Oak Creek. Emboldened by xenophobic rhetoric and aided by tech platforms, government agencies like ICE are targeting the Latinx and undocumented communities, inflicting generational trauma onto vulnerable families and children. The country is suffering in ways that will continue to haunt us well beyond this current moment. Whether it is motorcycle backfire in Times Square causing a stampede, or children afraid their immigrant parents will no longer be home upon their return from school -- we are watching the entire country pay the price of unchecked white supremacy, hate, and violence that spread as a result of multiple tech platforms. During this critical time, we must not conflate messages of white supremacy and attacks on marginalized communities with “freedom of speech,” “anti-conservative bias,” or “hearing all opinions.” We must be vigilant in recognizing and fighting real harm and fear that marginalized communities face. Freedom of speech does not exist if marginalized voices are digitally and physically attacked, threatened and doxxed for speaking up in the face of injustice. We must challenge the shortcomings of today’s largely monolithic, highly concentrated tech leadership and their failures to represent and protect the identities and voices of these communities. We can do better. We can be the generation of leaders that builds tech that restores humanity. We can be the architects of responsible tech. Tech that powers equity and justice for all. Tech we trust. We believe in ourselves, we believe in you, and we believe in those who are already taking action. Whether it be a walkout, refusing to build or buy tech that accelerates hate, calling out unfair anti-abuse policies that silence marginalized voices, especially of Black women, or continuing to demand answers from those in positions of power, the time to act is now. In the words of Zora Neale Hurston, “If you are silent about your pain, they’ll kill you and say you enjoyed it.” We know that we are not alone, yet many of us have been doing this work in silos. We realize that we don’t have all the answers -- you too hold a piece of the puzzle. Our group hopes to aid in the hard but important task of coalition building and convening. We, leaders from marginalized groups and allies, have joined forces to call out tech’s responsibility and invite peer organizations who are raising their voices here to unite in coalition. We know there are many more like us out there and we want to do our work alongside you. Let’s build the future we want together. There is strength in numbers. Whether you are an individual or an organization, we invite you to share with us the work that you and others are doing. Our first task is to connect with and acknowledge those who want to build a better future. We then hope to create a space for organizing, amplifying, and exchanging information. In the meantime, we encourage you to take whatever actions you can to support people who have been harmed. Let’s hold tech platforms accountable. Let’s build tech that unites not divides. Signed, Y-Vonne Hutchinson, CEO, ReadySet Karla Monterroso, CEO, Code2040 Erica Baker, Founding Member, Project Include Tracy Chou, CEO, Block Party Anil Dash, CEO, Glitch Laura Gomez, CEO, Atipica Michelle Kim, CEO, Awaken Ellen Pao, CEO, Project Include Nicole Sanchez, CEO, Vaya Consulting Aniyia Williams, Executive Director, Black & Brown Founders With support from, Tiffani Ashley Bell, Founder & Executive Director, The Human Utility Catherine Bracy, CEO and Co-founder, TechEquity Joy Buolamwini, Founder, Algorithmic Justice League Sherrell Dorsey, CEO, ThePLUG Rey Faustino, CEO, One Degree Kathryn Finney, CEO, digitalundivided Lilibeth Gangas, Chief Technology Community Office, Kapor Center Arlan Hamilton, Founder and Managing Partner & Christie Pitts, General Manager, Backstage Capital Leigh Honeywell, CEO, Tall Poppy Dr. Carmen Rojas, Founder and CEO, The Workers Lab Maria Salamanca, Principal, Unshackled Ventures
NEWS-MULTISOURCE
* UM6K33N NMOSFET model * Model Generated by ROHM * All Rights Reserved * Commercial Use or * Resale Restricted * Date: 2010/08/05 ****************D G S .SUBCKT UM6K33N 1 2 3 M1 11 22 3 3 MOS_N D1 3 1 DDS R1 1 11 RTH 1.24 D2 22 11 DDG R2 2 22 120 .MODEL MOS_N NMOS + LEVEL=3 + L=2.0000E-6 + W=0.1 + KP=71.930E-6 + RS=300.00E-3 + RD=0 + VTO=.86767 + RDS=50.000E6 + TOX=2.0000E-6 + CGSO=185p + CGDO=10p + CBD=0 + RG=0 + N=2 + RB=1.0000E-3 + GAMMA=0.2 + ETA=0.0003 + KAPPA=0 + NFS=7G .MODEL DDS D + IS=902.67E-15 + N=1.1748 + RS=52.526E-3 + IKF=85.409E-3 + CJO=8.5443E-12 + M=.39333 + VJ=.75126 + BV=50 + TT=22n .MODEL DDG D + CJO=11.090E-12 + M=.64576 + VJ=.78355 + N=10000 + FC=0.1 .MODEL RTH RES + TC1=0.0063 + TC2=0.000022 .ENDS UM6K33N
ESSENTIALAI-STEM
1/* 2 * Copyright (C) 2011 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17#ifndef ANDROID_RS_CONTEXT_H 18#define ANDROID_RS_CONTEXT_H 19 20#include "rsUtils.h" 21#include "rs_hal.h" 22 23#include "rsThreadIO.h" 24#include "rsScriptC.h" 25#include "rsScriptGroup.h" 26#include "rsSampler.h" 27#include "rsFont.h" 28#include "rsPath.h" 29#include "rsProgramFragment.h" 30#include "rsProgramStore.h" 31#include "rsProgramRaster.h" 32#include "rsProgramVertex.h" 33#include "rsFBOCache.h" 34#include <string.h> 35 36// --------------------------------------------------------------------------- 37namespace android { 38 39namespace renderscript { 40 41class Device; 42 43#if 0 44#define CHECK_OBJ(o) { \ 45 GET_TLS(); \ 46 if (!ObjectBase::isValid(rsc, (const ObjectBase *)o)) { \ 47 ALOGE("Bad object %p at %s, %i", o, __FILE__, __LINE__); \ 48 } \ 49} 50#define CHECK_OBJ_OR_NULL(o) { \ 51 GET_TLS(); \ 52 if (o && !ObjectBase::isValid(rsc, (const ObjectBase *)o)) { \ 53 ALOGE("Bad object %p at %s, %i", o, __FILE__, __LINE__); \ 54 } \ 55} 56#else 57#define CHECK_OBJ(o) 58#define CHECK_OBJ_OR_NULL(o) 59#endif 60 61class Context { 62public: 63 struct Hal { 64 void * drv; 65 66 RsdHalFunctions funcs; 67 }; 68 Hal mHal; 69 70 static Context * createContext(Device *, const RsSurfaceConfig *sc); 71 static Context * createContextLite(); 72 ~Context(); 73 74 static pthread_mutex_t gInitMutex; 75 // Library mutex (for providing thread-safe calls from the runtime) 76 static pthread_mutex_t gLibMutex; 77 78 class PushState { 79 public: 80 PushState(Context *); 81 ~PushState(); 82 83 private: 84 ObjectBaseRef<ProgramFragment> mFragment; 85 ObjectBaseRef<ProgramVertex> mVertex; 86 ObjectBaseRef<ProgramStore> mStore; 87 ObjectBaseRef<ProgramRaster> mRaster; 88 ObjectBaseRef<Font> mFont; 89 Context *mRsc; 90 }; 91 92 RsSurfaceConfig mUserSurfaceConfig; 93 94 ElementState mStateElement; 95 TypeState mStateType; 96 SamplerState mStateSampler; 97 ProgramFragmentState mStateFragment; 98 ProgramStoreState mStateFragmentStore; 99 ProgramRasterState mStateRaster; 100 ProgramVertexState mStateVertex; 101 FontState mStateFont; 102 103 ScriptCState mScriptC; 104 FBOCache mFBOCache; 105 106 void swapBuffers(); 107 void setRootScript(Script *); 108 void setProgramRaster(ProgramRaster *); 109 void setProgramVertex(ProgramVertex *); 110 void setProgramFragment(ProgramFragment *); 111 void setProgramStore(ProgramStore *); 112 void setFont(Font *); 113 114 void updateSurface(void *sur); 115 116 ProgramFragment * getProgramFragment() {return mFragment.get();} 117 ProgramStore * getProgramStore() {return mFragmentStore.get();} 118 ProgramRaster * getProgramRaster() {return mRaster.get();} 119 ProgramVertex * getProgramVertex() {return mVertex.get();} 120 Font * getFont() {return mFont.get();} 121 122 bool setupCheck(); 123 void setupProgramStore(); 124 125 void pause(); 126 void resume(); 127 void setSurface(uint32_t w, uint32_t h, RsNativeWindow sur); 128 void setPriority(int32_t p); 129 void destroyWorkerThreadResources(); 130 131 void assignName(ObjectBase *obj, const char *name, uint32_t len); 132 void removeName(ObjectBase *obj); 133 134 RsMessageToClientType peekMessageToClient(size_t *receiveLen, uint32_t *subID); 135 RsMessageToClientType getMessageToClient(void *data, size_t *receiveLen, uint32_t *subID, size_t bufferLen); 136 bool sendMessageToClient(const void *data, RsMessageToClientType cmdID, uint32_t subID, size_t len, bool waitForSpace) const; 137 uint32_t runScript(Script *s); 138 139 void initToClient(); 140 void deinitToClient(); 141 142 ProgramFragment * getDefaultProgramFragment() const { 143 return mStateFragment.mDefault.get(); 144 } 145 ProgramVertex * getDefaultProgramVertex() const { 146 return mStateVertex.mDefault.get(); 147 } 148 ProgramStore * getDefaultProgramStore() const { 149 return mStateFragmentStore.mDefault.get(); 150 } 151 ProgramRaster * getDefaultProgramRaster() const { 152 return mStateRaster.mDefault.get(); 153 } 154 Font* getDefaultFont() const { 155 return mStateFont.mDefault.get(); 156 } 157 158 uint32_t getWidth() const {return mWidth;} 159 uint32_t getHeight() const {return mHeight;} 160 161 uint32_t getCurrentSurfaceWidth() const; 162 uint32_t getCurrentSurfaceHeight() const; 163 164 mutable ThreadIO mIO; 165 166 // Timers 167 enum Timers { 168 RS_TIMER_IDLE, 169 RS_TIMER_INTERNAL, 170 RS_TIMER_SCRIPT, 171 RS_TIMER_CLEAR_SWAP, 172 _RS_TIMER_TOTAL 173 }; 174 uint64_t getTime() const; 175 void timerInit(); 176 void timerReset(); 177 void timerSet(Timers); 178 void timerPrint(); 179 void timerFrame(); 180 181 struct { 182 bool mLogTimes; 183 bool mLogScripts; 184 bool mLogObjects; 185 bool mLogShaders; 186 bool mLogShadersAttr; 187 bool mLogShadersUniforms; 188 bool mLogVisual; 189 uint32_t mDebugMaxThreads; 190 } props; 191 192 mutable struct { 193 bool inRoot; 194 const char *command; 195 const char *file; 196 uint32_t line; 197 } watchdog; 198 static void printWatchdogInfo(void *ctx); 199 void setWatchdogGL(const char *cmd, uint32_t line, const char *file) const { 200 watchdog.command = cmd; 201 watchdog.file = file; 202 watchdog.line = line; 203 } 204 205 void dumpDebug() const; 206 void setError(RsError e, const char *msg = NULL) const; 207 208 mutable const ObjectBase * mObjHead; 209 210 uint32_t getDPI() const {return mDPI;} 211 void setDPI(uint32_t dpi) {mDPI = dpi;} 212 213 uint32_t getTargetSdkVersion() const {return mTargetSdkVersion;} 214 void setTargetSdkVersion(uint32_t sdkVer) {mTargetSdkVersion = sdkVer;} 215 216 Device *mDev; 217protected: 218 219 uint32_t mTargetSdkVersion; 220 uint32_t mDPI; 221 uint32_t mWidth; 222 uint32_t mHeight; 223 int32_t mThreadPriority; 224 bool mIsGraphicsContext; 225 226 bool mRunning; 227 bool mExit; 228 bool mPaused; 229 mutable RsError mError; 230 231 pthread_t mThreadId; 232 pid_t mNativeThreadId; 233 234 ObjectBaseRef<Script> mRootScript; 235 ObjectBaseRef<ProgramFragment> mFragment; 236 ObjectBaseRef<ProgramVertex> mVertex; 237 ObjectBaseRef<ProgramStore> mFragmentStore; 238 ObjectBaseRef<ProgramRaster> mRaster; 239 ObjectBaseRef<Font> mFont; 240 241 void displayDebugStats(); 242 243private: 244 Context(); 245 bool initContext(Device *, const RsSurfaceConfig *sc); 246 247 248 bool initGLThread(); 249 void deinitEGL(); 250 251 uint32_t runRootScript(); 252 253 static void * threadProc(void *); 254 static void * helperThreadProc(void *); 255 256 bool mHasSurface; 257 bool mIsContextLite; 258 259 Vector<ObjectBase *> mNames; 260 261 uint64_t mTimers[_RS_TIMER_TOTAL]; 262 Timers mTimerActive; 263 uint64_t mTimeLast; 264 uint64_t mTimeFrame; 265 uint64_t mTimeLastFrame; 266 uint32_t mTimeMSLastFrame; 267 uint32_t mTimeMSLastScript; 268 uint32_t mTimeMSLastSwap; 269 uint32_t mAverageFPSFrameCount; 270 uint64_t mAverageFPSStartTime; 271 uint32_t mAverageFPS; 272}; 273 274} // renderscript 275} // android 276#endif 277
ESSENTIALAI-STEM
John Eichinger John Charles Eichinger (born February 18, 1972) is an American serial killer who was convicted of killing three women and one child from 1999 to 2005 in Pennsylvania, which he committed after two of the victims had rejected his romantic advances. He was handed three death sentences for the latter murders and one life sentence for the former and is currently awaiting execution. Early life John Charles Eichinger was born on February 18, 1972, in Malvern, Pennsylvania, as one of four brothers. He attended the Upper Merion Area High School in King of Prussia, where he was part of a large group of friends who would play Dungeons & Dragons in their spare time. Through this activity, he became acquainted with Jennifer Still and Heather Greaves, developing a romantic interest in both women. After graduation, he found work as a clerk at a local Acme supermarket, where he worked alongside Greaves. He was noted for playing in local chess tournaments in his spare time. Murders On July 6, 1999, Eichinger, donning a pair of rubber gloves and carrying a large knife under his jacket, went to Still's home in Bridgeport to confess his feelings towards her. To his dismay, she rejected his advances, stating that she would not leave her fiancé. Enraged by her rejection, Eichinger pulled out the knife and repeatedly stabbed her, ultimately cutting her throat before leaving the house. In the subsequent investigations, police questioned Still's boyfriend and friends, including Eichinger, who claimed that he had been in New Jersey at the time of the murders. In an attempt to ward the police off his trail, he claimed that two other Dungeons & Dragons players might have information about the murder, with one being heavily involved in Wicca. As the investigators had no evidence to connect him with the murder at the time, they focused on the players mentioned by Eichinger, until a DNA swab proved that they were innocent. After the murder, Eichinger stored the bloodied knife, clothing, and rubber gloves he had worn on the day of the murder in his room as a keepsake to remind him of the killing. For the next five years, when Halloween came about, he would take out the knife and don a mask of Ghostface from the horror franchise Scream, and would go out trick-or-treating with them. Around 2003, he moved to his parents' new home in Somers Point, New Jersey, where he transferred to work at a local Acme supermarket. On March 25, 2005, Greaves ordered some purple flowers for her upcoming birthday and arranged for Eichinger to deliver them at her home in King of Prussia. Bringing the knife with him, Eichinger went to the house and confessed his feelings for Greaves. After being rejected again, he pulled out the knife and started stabbing her before finishing her off by slitting her throat. The act was noticed by Greaves' 21-year-old sister Lisa and 3-year-old daughter, Avery, who were in at the house at the time. Unwilling to leave any witnesses, Eichinger went to the bathroom and stabbed Lisa to death before catching up to Avery in the hallway and killing her. He then started walking back to his car, where a neighbor of Greaves' observed him with bloodied clothes and a rag tied around his hand. The Greaves' father discovered the victims' bodies when he returned home from work. Arrest, trial, and imprisonment As the killings heavily resembled Still's murder years prior, authorities looked into whether the four victims had any connections. After learning that Still and Greaves had been mutual friends with each other and with Eichinger, Detective Richard Nilsen was dispatched to interrogate him at his workplace in Somers Point. Initially, Eichinger denied responsibility, claiming that the scratches on his arm were the result of a dog bite and a cut sustained while he was taking out the trash and that he had been at a boardwalk in Ocean City when the killings took place. However, when he noticed that Nilsen was carrying a gun on him, Eichinger decided to confess to the four killings, bizarrely stating that he followed company policy to "never resist a man with a gun." Not long after, Eichinger waived his right to an extradition hearing and was extradited to Pennsylvania, where he was charged with four counts of capital murder. He confessed to the four murders before the judge, arguing that he should be given a life sentence in light of mitigating evidence presented by his lawyers: these included claims that he suffered from schizoid personality disorder and that he was under extreme emotional duress when he committed the crimes, relating to the recent death of his father from Alzheimer's disease. These claims were contested by the prosecutors, who pointed that the defendant had no prior history of mental illness, had planned his crimes in advance and the murders of Lisa and Avery were done to get rid of witnesses. In the end, Eichinger was found guilty on all counts and was given three death sentences for the murders of the Greaves family; he was given a life term for Still's murder. At the sentencing phase, the victims' family members exclaimed that they hoped they would live long enough to see Eichinger executed for the murders. Since his incarceration, he has attempted to appeal his sentence on multiple occasions. Still, each time, his appeals have been denied. In 2008, Eichinger's death warrant was signed by Governor Ed Rendell, but the sentence is yet to be carried out. A notice of execution was signed on January 9, 2023, by the Pennsylvania Department of Corrections Acting Secretary George Little. The notice set March 7, 2023, as Eichinger's execution date, but it was not carried out. In the media and culture Eichinger's crimes were covered in two separate crime documentary series, both aired on Investigation Discovery: Homicide City as an episode titled Deadly Circle of Friends and In Ice Cold Blood as an episode titled Dungeons, Dragons and Death.
WIKI
Your best friend for file transfer. Fetch application logoFetch Connection issues at a particular FTP site (8 posts) • Started 5 years ago by JImBrandt • Latest reply 5 years ago from Jim Matthews • JImBrandt Member Jim, I’m having an issue with logging on to a specific FTP site and need to run this by you. All of this is using Applescript. I’m simplifying this as much as possible while trying to show the issue I’m having. set FTP_Site to “ftp://” & UserName & ":" & UserPass & "@" & HostAddress where UserName = the username UserPass = the password HostAddress = the site address (string, not numeric) ThePort = 21 Method 1: set tw to make new transfer window at beginning with properties {url:FTP_Site} tell tw to set ConnectionStatus to status Method 2: make new transfer window with properties {hostname:HostAddr, username:UserName, password:UserPass, port:ThePort, authentication:cleartext password} tell transfer window 1 to set ConnectionStatus to status For this particular site, UserName and UserPass, Method 1 fails every time, while Method 2 succeeds everytime. The failure of Method 1 is while getting the list of files at the remote location, according to the transcript window. Its hard to capture it because I’m closing Fetch and reopening it on failure and the window resets when you do that. The script is attached to a watch folder also, so I’m having to jump through hoops to debug this. I’m inclined to add more error trapping and write the resulting error messages to a log file (something I need to do anyways), but I use this script every day as part of my job and recently we changed the location of the FTP site and now it’s failing more often than it succeeds in connecting. Question 1: is there a difference using method 1 vrs method 2? Question 2: since method 2 is specifying the authentication while method 1 does not, is authentication something that “carries over” from one login to the next? Question 3: what exactly does the “at beginning” in method 1 do? (this was code you gave me in an answer to a question I asked over a year ago. I put it in without paying attention to it’s purpose). Jim Brandt Posted 5 years ago # • Jim Matthews Administrator Hi, Question 1: I don't see any reason why one of those methods would work and the other one not work. They should be equivalent as long as the script is the only Fetch "user" at the time (if you or another script opened a transfer window between the first and second lines of Method 2, "transfer window 1" wouldn't be the right window). Question 2: The authentication method is implicit in the FTP_Site URL you construct for Method 1 Question 3: The "make" verb is built into AppleScript, and is supposed to take a parameter that tells the application where to make the new object. The "at the beginning" fills that role, but doesn't really make a difference (I don't think there's a way to tell Fetch to make a new window anywhere but in front). I hope this helps. I sympathize with the difficulty of debugging folder action scripts! Jim Matthews Fetch Softworks Posted 5 years ago # • JImBrandt Member OK. Here's the Transcript Window text for one of these failures: Fetch 5.7.5 (5H1476) Intel (Web Store) running on Mac OS X 10.10.5 (14F1713) Intel English StuffIt Engine 0x820, StuffIt SDK Version 10.1.1b1 Partial serial FETCH55001-4BNU-MZ4P T Connecting to ftp.spothub.com port 21 (Mac OS X firewall is allowing connections) (4/14/16, 10:57 AM) Connected to 52.9.27.151 port 21 (4/14/16, 10:57 AM) 220-Welcome to CrushFTP! 220 CrushFTP Server Ready! USER WTXF 331 Username OK. Need password. PASS 230 Password OK. Connected. logged in SYST 215 UNIX Type: L8 PWD 257 "/" PWD command successful. PWD 257 "/" PWD command successful. PWD 257 "/" PWD command successful. TYPE A 200 Command ok : ASCII type selected. PASV get_reply():con_conn->Getline() returns 1,54 ftp_list: 2,-30014 (state == GETTING_LIST) QUIT send_cmd():con_conn->Putline() returns 1,54 It's connecting and quitting almost immediately when running under the script. If I log in manually, I can get to the site. This is driving me nuts, because a lot of other things the script does for me are not getting done because of this failure (I send a lot of files that are causing this to fail). BTW, this was all working until about a week ago. And, no, I didn't change the script (well, not the FTP login and send part, anyways :>) ). Posted 5 years ago # • Jim Matthews Administrator That's odd -- the connection is dropping when Fetch starts to get a file list. I don't see anything suspicious there from the Fetch side. You might try catching the error in your script, and trying again, to see if it's just a temporary problem. Let me know if you want advise on writing that code. Thanks, Jim Matthews Fetch Softworks Posted 5 years ago # • JImBrandt Member No, I don't need advice on that code. I've already got it trapped. Twice. The first time I display a message that the site failed to connect, I quit Fetch, reopen it and try again. On the second failure, I display a message and move on to the next upload. This whole process is driven by dropping plist files in a watch folder that define the FTP credentials and the source of the files for upload and email addresses for notification. The FTP is part of the script attached to the watch folder. This has me baffled, as it worked mostly flawlessly up until a couple of weeks ago. BTW, the -30014 error is the same error I'm seeing on the trapped error section. One more question: is there a way to tell Fetch how long to wait for a connection (in a script)? I have a couple of stations that are very slow in responding and I sometimes get disconnected just as the file list is coming through (the list is very large and takes a long time to generate on their end). OK, back to the drawing board. Thanks, Jim Posted 5 years ago # • JImBrandt Member No, I don't need advice on that code. I've already got it trapped. Twice. The first time I display a message that the site failed to connect, I quit Fetch, reopen it and try again. On the second failure, I display a message and move on to the next upload. This whole process is driven by dropping plist files in a watch folder that define the FTP credentials and the source of the files for upload and email addresses for notification. The FTP is part of the script attached to the watch folder. This has me baffled, as it worked mostly flawlessly up until a couple of weeks ago. BTW, the -30014 error is the same error I'm seeing on the trapped error section. One more question: is there a way to tell Fetch how long to wait for a connection (in a script)? I have a couple of stations that are very slow in responding and I sometimes get disconnected just as the file list is coming through (the list is very large and takes a long time to generate on their end). OK, back to the drawing board. Thanks, Jim Posted 5 years ago # • Jim Matthews Administrator That -30014 error means that the server dropped the connection while Fetch was waiting for the reply to a command. If you have access to the server logs you might find information to help understand the failures on that end. There isn't a way to tell Fetch to wait longer for a connection. I believe that it waits 75 seconds. Thanks, Jim Matthews Fetch Softworks Posted 5 years ago # • JImBrandt Member I found the problem. The "Use passive mode transfers" preference was checked. Apparently this site doesn't like passive transfers. Problem solved by unchecking preference. Sorry to be of trouble. Jim Posted 5 years ago # • Jim Matthews Administrator Well done! Glad you found the problem. Jim Matthews Fetch Softworks Posted 5 years ago # Reply • Or nickname, if you prefer. • This will be kept confidential. • This is to ensure that you’re a person, not a spambot.
ESSENTIALAI-STEM
User:JimmyQuinn5 Sloof Lirpa The Sloof Lirpa is a rare bird that enters the US during the first week of April. It is quite distinguished as it has bright orange wings. The bird tends to migrate to crowds as it often senses excitement and joy. To attract the Sloof Lirpa to your area, here are some common trends: 1) Flap your wings like a bird 2) Make noise sounds with your voice, like “ca-caw ca-caw” 3) The use of flashlights are optional during dusk. 4) Dancing while shouting 5) Generally, anything loud Happy Hunting.
WIKI
Wikipedia:Articles for deletion/Female-led relationship The result was keep. Randykitty (talk) 19:46, 21 January 2015 (UTC) Female-led relationship * – ( View AfD View log Stats ) The goal of the article seems to be to discredit feminism, and the article fails both WP:RELIABLE and WP:NPOV. E.g., the page has feminism-related categories and templates. Links to it has been inserted into feminism-related templates. Furthermore, it contains claims such as (without any WP:RELIABLE source of course): "However since the 1960s, second-wave feminism, modern-day goddess movements and female veneration movements have helped bring these types of relationships more out-of-the-closet and into the open, thereby becoming more socially acceptable (or tolerable) in the eye of the general public and formerly oppressive patriarchal authority structures." Cic (talk) 14:58, 11 January 2015 (UTC) * Note: This debate has been included in the list of Sexuality and gender-related deletion discussions. N ORTH A MERICA 1000 23:56, 11 January 2015 (UTC) * Delete and Redirect - At minimum this is a WP:TNT situation. The article makes very large claims about feminism, social trends, relationships, etc. but lacks even one reliable source. Of its four sections, the first, The History of Female-Led Relationships, is entirely OR (citing only Wiktionary); the second, Female Superiority, draws predominantly from, ahem, femalesuperiority.com (NSFW, for those who care); the third section, The Nature of the FLR, only cites a wiki page at aboutflr.com (note the URL again); the last section, The Dynamics of the FLR (continuing an oddly scientific organizational scheme), cites an archived version of a discussion forum at she-makes-the-rules.com and rwddh.com. ...It's also unclear that what encyclopedic potential this has isn't already addressed elsewhere (I'm not sure which is the best redirect target), e.g. matriarchy, gynocentrism, gender role, matrifocal family, Stay-at-home dad, Family economics, Men's liberation movement, and so on. --&mdash; Rhododendrites talk \\ 03:49, 12 January 2015 (UTC) * Delete as per above. My sweeps did not find much for the exact phrase Female-led relationship, although there was discussion in Slate magazine about the term. Given the current length of the article, and lack of WP:RS, seems like this is mostly original research. One aspect is disquieting, however -- the substantial daily pageviews numbering 200+/day, doubling since December 1 2014, seen here. What is that all about. It is my experience that articles with huge readership are more likely to be mishandled rather than worthy of deletion, so I am open to rethinking things.--Tomwsulcer (talk) 20:53, 12 January 2015 (UTC) * Probably because <IP_ADDRESS> spammed other articles with links to that article around that time. --Cic (talk) 20:34, 16 January 2015 (UTC) * Keep changing based on comments below, plus there are sources in a sweep of books such as here.--Tomwsulcer (talk) 19:01, 18 January 2015 (UTC) * Keep, I'm seeing multiple books with this very phrase, verbatim, in the book's titles, themselves. Cheers, &mdash; Cirt (talk) 23:15, 13 January 2015 (UTC) * A lack of sources using the phrase wasn't one of the deletion rationales, but if you could link those books they might help with the rest. --&mdash; Rhododendrites talk \\ 05:41, 14 January 2015 (UTC) * Keep I think that it is valuable to have an article about a lifestyle that isn't described under some of the redirects that the earlier poster posed, but agree with the need for one that is more balanced or presents different perspectives on what it means, or the motives behind it. It feels like should be a page about a romantic lifestyle chosen by individuals and the different reasons behind it, and practices within that lifestyle choice. I think this is a human sexuality topic, rather than a sociocultural anthropology topic like some of the suggested redirects (eg: matriarchy (referencing female heads of households, but also female lines of descent), or matrifocal (which emphasizes the absence of the father, like single motherhood). I think this is one of those topics where there may not be much in the way of authoritative sources at this time, related mostly to the relative newness of this topic to most people. Looking for books available on Amazon shows 400 results, most of which seem to be written by practitioners, which I think are in this case the best sources available. A quick 3 book selection How To Set Up An FLR: A Couple's Guide to Female Led Relationships, What To Do When Your Man Asks You For A Female Led Relationship, and The Mistress Manual: The Good Girl's Guide to Female Dominance. From the readership numbers (13k in the last 90 days) people are looking for this topic, and I think looking for the relationship/sex/sexuality definition. It seems like this page definitely needs a good overhaul, but I definitely would argue for keeping the article. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 03:34, 16 January 2015 (UTC) * Keep I think there's sufficient for a separate article. The various possibilities have their own nuances, and trying to merge them into more general articles is an impediment to proper adequate opov coverage. DGG ( talk ) 16:43, 18 January 2015 (UTC)
WIKI
Recipe: Santa's sidecar - California Cookbook Category: Drinks By Betty Hallock | Dec. 23, 2010 After last-minute shopping at two malls and a side trip to find wrapping paper only to come home and discover you've run out of Scotch tape, nothing makes the holidays happier than a good stiff drink. It's even better if ... Read more Step 1In a medium saucepan, combine the cranberries, orange and lemon juices, sugar, sage and ginger, with enough water to cover (about 1 1/2 cups). Cover and bring to a boil, then remove the cover and simmer until the berries are softened, about 15 minutes. Remove from heat and cool completely. This makes about 3 cups. Keep refrigerated for up to 1 week. Step 1Rim a martini glass with sugar. (Moisten the rim with water or lime juice and dip into sugar.) In a shaker with ice, combine the brandy, orange liqueur and compote. Shake; strain into the glass. By Betty Hallock | Dec. 23, 2010 After last-minute shopping at two malls and a side trip to find wrapping paper only to come home and discover you've run out of Scotch tape, nothing makes the holidays happier than a good stiff drink. It's even better if it's one that's easy to concoct and uses what's in season. And now that we're just days from turning the corner to 2011, sharing a cocktail or three with friends and family is imperative -- in a convivial setting, maybe with James Brown's Soulful Christmas playing, some mistletoe hanging or even balloons and streamers. (Happy New Year!) Your liquor cabinet Speak-easy trends may celebrate esoteric tinctures or rare liqueurs, but, fortunately, the success of a holiday cocktail doesn't rest on whether you've stocked up on unusual spirits or ingredients. Indonesian batavia arrack isn't necessary. No horehound candy (to dissolve in your rye) in your pantry? No problem. And if you don't have the time to barrel-age a couple of gallons' worth of Manhattans for six weeks before your get-together, it's OK. You're likely to have on hand whiskey, rum, gin, vodka, tequila. And maybe, because it's the season, a bottle of ginger liqueur or pear eau de vie (allspice dram might be pushing it). In other words, you probably already have the makings of a party. The flavors of the season also happen to make fantastic drinks. A Champagne cocktail made with persimmon, rosemary and a little nutmeg is like Christmas and New Year's Eve all in one glass. To help you celebrate, a dozen of L.A.'s best mixologists (including a chef) contributed recipes highlighting four seasonal flavors: pear, persimmon, cranberries and dried spices such as cinnamon, nutmeg or star anise. Flavorful shortcuts They don't call for days-long infusions but instead some easy-to-make simple syrups, such as the cinnamon syrup that bartender Alex Day makes for a pear- tequila cocktail called Papi Pera, or the cinnamon-allspice-vanilla syrup that Vincenzo Marianella of Copa d'Oro uses in his Nuit Rouge (ingeniously filled with cranberry-studded ice cubes). Smitten with persimmons, 320 Main's Jason Schiffer makes a sparkling cocktail with a syrup of the fruit, and Matthew Biancaniello of the Library Bar at the Roosevelt Hotel muddles his (from J.J.'s Lone Daughter Ranch at the Santa Monica and Hollywood farmers markets) with lime and mint for a bourbon drink and garnishes it with ground espresso. Most of the recipes can be made at the last minute, but Zahra Bates of Providence makes a cranberry compote with ginger and sage in advance. She puts it into a sugar-rimmed Santa's Sidecar but also adds it to cachaca for a Christmas caipirinha. You or your guests could add it to almost any spirit, Bates says. Allan Katz of Cana Rum Bar steeps agua de jamaica overnight and uses it for daiquiris, margaritas and gimlets. It's tasty on its own, Katz says, and also makes an awesome additive to ... basically anything. If you want an easy, light version of eggnog, Alex Straus' Hemingway's nog is it -- sort of a cross between eggnog and a rum fizz -- made not with eggs but creme fraiche. So here they are, 12 cocktail recipes to get you through the rest of the, um, decade.
NEWS-MULTISOURCE
ojek ojek - 1 year ago 62 C# Question Forms authentication with NetworkCredentials fails This is what I use to authenticate myself and make an action: var uri = new Uri(@"http://localhost:5898/forums/AddPost/1"); var request = WebRequest.Create(uri); request.Credentials = new CredentialCache { { new Uri(@"http://localhost:5898/Account/Login"), "Basic", new NetworkCredential("asdf", "ghijkl") } }; request.Method = "POST"; const string strPost = "Content=TestAplikacji&AddedValue=0"; StreamWriter myWriter = null; request.ContentLength = strPost.Length; request.ContentType = "application/x-www-form-urlencoded"; string response; try { myWriter = new StreamWriter(request.GetRequestStream()); myWriter.Write(strPost); } catch { } finally { if (myWriter != null) myWriter.Close(); } var objResponse = (HttpWebResponse)request.GetResponse(); using (var sr = new StreamReader(objResponse.GetResponseStream())) { response = sr.ReadToEnd(); sr.Close(); } When the code executes, in the response I get validation errors for login and password. But my provided login and password ( "asdf", "ghijkl" ) are satisfying those requirements, and that means, the http://localhost:5898/Account/Login is not receiving credentials that I have provided. What am I doing wrong? Answer Source I believe, you should use Windows authentication / Basic Authentication, if you want to use the Network credential. For forms authentication you need to post the username and password to the page just like what a browser will do and read the authentication cookie from the response. You should be using this cookie for communicating further with authenticated pages
ESSENTIALAI-STEM
Thalictrum pubescens Thalictrum pubescens, the king of the meadow or tall meadow-rue, is a plant in the buttercup family, Ranunculaceae. Description Thalictrum pubescens is a herbaceous plant with alternate, pinnately compound leaves, on hollow, green stems. The flowers are white, borne in spring and summer. Distribution The range of this plant includes most of eastern Canada and United States excluding Florida.
WIKI
Page:United States Statutes at Large Volume 88 Part 2.djvu/17 LIST OF PUBLIC LAWS Public Law 93-377 Atomic Energy Act of 1954, Atomic Weapons Rewards Act of 1955, amendments. AN ACT To amend the Atomic EnergyAct of 1954, as amended, and the Atomic Weapons Rewards Act of 1955, and for other purposes 93-378 Forest and Rangeland Renewable Resources Planning Act of 1974. AN ACT To provide for the Forest Service, Department of Agriculture, to protect, develop, and enhance the productivity and other values of certain of the Nation's lands and resources, and for other purposes 93-379 The District of Columbia Law Revision Commission Act. AN ACT To create a Law Revision Commission for the District of Columbia, and to establish a municipal code for the District of Columbia 93-380 Education Amendments of 1974. AN ACT To extend and amend the Elementary and Secondary Education Act of 1965, and for other purposes 93-381 Treasury, Postal Service, and General Government Appropriation Act, 1976. AN ACT Making appropriations for the Treasury Department, the United States Postal Service, the Executive Office of the President, and certain Independent Agencies, for the fiscal year ending June 30, 1975, and for other purposes 93-382 Women's Equality Day, designation authorization. JOINT RESOLUTION Designating August 26, 1974, as "Women's Equality Day" 93-383 Housing and Community Development Act of 1974- AN ACT To establish a program of community development block grants, to amend and extend laws relating to housing and urban development, and for other purposes 93-384 First Infantry Division, United States Forces in Vietnam, monument. JOINT RESOLUTION To authorize the erection of a monument to the dead of the First Infantry Division, United States Forces in Vietnam 93-385; Health services, scholarship and student loan programs, extension. AN ACT To amend the Public Health Service Act to extend through fiscal year 1975 the scholarship program for the National Health Service Corps and the loan program for health professions students 93-386 Small Business Amendments of 1974- AN ACT To clarify the authority of the Small Business Administration, to increase the authority of the Small Business Administration, and for other purposes 1 93-387 Council on Wage and Price Stability Act. AN ACT To authorize the establishment of a Council on Wage and Price Stability. 93-388 Holding Company System Regulatory Act. AN ACT To improve the laws relating to the regulation of insurance companies in the District of Columbia 93-389 District of Columbia Medical and Dental Manpower Act of 1970, extension. AN ACT To extend for three years the District of Columbia Medical and Dental Manpower Act of 1970 _ 93-390 Overseas Private Investment Corporation Amendments Act of 1974. AN ACT To amend the title of the Foreign Assistai;ice Act of 1961 concerning the Overseas Private Investment Corporation to extend the authority for the Corporation, to authorize the Corporation to issue reinsurance, to terminate certain activities of the Corporation, and for other purposes93-391 Department of Transportation and Related Agencies Appropriation Act, 1975. AN ACT Making appropriations for the Department of Transportation and related agencies for the fiscal year ending June 30, 1975, and for other purposes 93-392 Board for International Broadcasting, appropriation authorization. AN ACT To authorize appropriations for fiscal year 1975 for carrying out the Board for International Broadcasting Act of 1973 XVll Date Page Aug. 17, 1974 472 Aug. 17, 1974 476 Aug. 21 1974_-_ 480 Aug. 21, 1974 484 Aug. 21, 1974 613 Aug. 22, 1974___ 633 Aug. 22, 1974 633 Aug. 23, 1974 741 Aug. 23, 1974 741 Aug. 23, 1974 742 Aug. 24, 1974 750 Aug. 24, 1974.._ 752 Aug. 24, 1974. __ 763 Aug. 27, 1974 763 Aug. 28, 1974 768 Aug. 28, 1974_-_ 781 �
WIKI
Community Health Worker Manual/Diarrhea/Treatment Overview/Second Principle -- Keep Giving Nutrition During diarrhea, feed the child soft food appropriate for his age, such as khichri, sujhi ki kheer, mashed potatoes, mashed bananas, vegetables, seasonal fruit, etc. * Previous Principle * Next Principle * Treatment Overview
WIKI
User:ClueBot III/Detailed Indices/User talk:Roberticus/Archivef2015Tue, 10 Feb 2015 06:31:05 +000002am28= 1
WIKI
Wikipedia:Articles for deletion/Elise window seal The result was Speedy delete as a blatant copyright violation. Hut 8.5 16:07, 10 May 2008 (UTC) Elise window seal * ( [ delete] ) – (View AfD) (View log) Wikipedia is not an instruction manual. No salvagable encyclopaedic content. nancy (talk) 19:02, 8 May 2008 (UTC) * Delete: I was going to list this one too; this original how-to article does not belong in an encyclopedia. I feel like a tourist (talk) 19:07, 8 May 2008 (UTC) * Delete: original research: describes author's how they did it. Mukadderat (talk) 19:18, 8 May 2008 (UTC) * Delete. Note to the author: Wikipedia is neither an instruction manual nor your blog. Anturiaethwr Talk 19:23, 8 May 2008 (UTC) * Delete: per above. Nothing encyclopedic worth saving. nneonneo talk 19:29, 8 May 2008 (UTC) * Delete, obviously unencyclopedic WP:NOT – Zedla (talk) 21:18, 8 May 2008 (UTC) * Speedy delete G12 as a copyvio of this forum site. -FrankTobia (talk) 03:56, 9 May 2008 (UTC) * Speedy delete. Mr. Cut and Ms. Paste have visited a forum (see above), the text (and photo links, all broken) lifted and deposited here. If it weren't for the copyvio, I'd still urge a delete as Wikipedia is not a "how-to" guide. B.Wind (talk) 04:38, 10 May 2008 (UTC)
WIKI
Ding Yi Music Company Ding Yi Music Company (previously known as Arts Sphere Chamber Ensemble), established in 2007, is a Chinese chamber orchestra based in Singapore. The ensemble consists of both full-time and part-time musicians, most having attended professional training at the Nanyang Academy of Fine Arts. The ensemble’s repertoire ranges from traditional Chinese music to contemporary avant-garde interpretations and cross-genre works. Ding Yi has been named "one of Singapore’s most dynamic and successful ensembles". Their performances have been described as "inspirational and aspirational" and their music "invigorating and inspiring". Accolades As of 2014, the ensemble has accumulated the following accolades: - Silver Award at the 2011 28th Shanghai Spring International Music Festival - Champion at the 2009 Llangollen International Musical Eisteddfod (Wales, United Kingdom) - First Prize at the 2008 Singapore National Arts Council Chinese Music Competition The ensemble has also participated in several music festivals, including the 4th ASEAN Festival of the Arts in Philippines in 2010, the ASEAN Arts Fest 2012 in Cambodia, China Odyssey 2013 in Beijing, and the Jogja International Performing Arts Festival in Indonesia in 2014. The ensemble is also a regular performer in the SPH Gift of Music community concert series sponsored by Singapore Press Holdings. Emeritus Music Director Dr. Tay Teow Kiat is the Emeritus Music Director of Ding Yi Music Company. He is also the President of the Singapore Chinese Instrumental Music Association. He has received numerous awards, including the Cultural Medallion in 1993 and the Long Service Medal (Education Service) in 1997. Resident Conductor Wong De Li Dedric is the Resident Conductor of Ding Yi Music Company. He is also conductor for the China Conservatory of Music Middle School Orchestra Class. In 2006, he took first prize in the National Arts Council Chinese Music Competition's Suona Open Category. Notable Musicians The ensemble includes several award-winning musicians: Chua Yew Kok – NAC Young Artist Award 2013 Wong De Li Dedric – National Arts Council Scholarship 2014 recipient Low Yik Hang – National Arts Council Arts Scholarship 2012 DYMC Composium To promote new music compositions for Chinese chamber ensembles, Ding Yi Music Company has established the Composium, a triennial composition festival which includes composition competitions, symposiums and performances that encourages new compositions from local and international composers. Chinese Chamber Music Festival Ding Yi Music Company established the first Chinese Chamber Music Festival in 2013 where established ensembles from around the world perform in a three-day long festival. The second edition of the Festival will be held in 2015. Education and Outreach Programmes The ensemble does several public outreach and educational engagements to raise awareness for their music and the genre of Chinese chamber music. Some of these projects include the Feed Your Imagination (F.Y.I) collaboration with the Singapore Esplanade, and the Outdoor Fantasia concert series, which brings Chinese chamber music to the mass public. Discography Ding Yi Music Company released two music albums in 2011 - "Fire Phoenix" and "The Oriental Moon". They released a new album "Storytellers on Ann Siang Road" in 2016. The debut album, Fire Phoenix, features a compilation of traditional and contemporary Chinese chamber music works. Their sophomore release, Oriental Moon, features a compilation of Liang Wern Fook's works rearranged for Chinese orchestras. Their 2016 album, Storytellers on Ann Siang Road, features commissioned and premiered pieces from composers such as Phang Kok Jun, Cao Wen Gong, and Chow Jun Yi.
WIKI
How to Effectively Reduce Your Car’s Center of Gravity with Lowering Springs for Better Handling? February 8, 2024 Automobile enthusiasts and racing professionals know that a car’s handling is significantly influenced by its center of gravity. Reducing this center not only improves handling but also enhances overall performance. One of the most effective ways to achieve this reduction is by using lowering springs. This thorough guide will explain how lowering springs function and provide a step-by-step guide on how to use them to improve your car’s handling. What is the Center of Gravity and Why Does it Matter in Car Handling? When we talk about a car’s center of gravity, we are discussing the point at which the weight of an object is evenly dispersed and all sides are in balance. It’s an imaginary point, but it’s vital in influencing the dynamism and stability of the vehicle. The height of the center of gravity determines how weight is distributed and transferred during driving, especially while cornering, accelerating, and braking. A higher center of gravity results in more weight transfer, which can lead to less grip and a higher chance of rollover. On the other hand, a lower center of gravity means less weight transfer, improving grip and stability, thus enhancing the car’s overall handling. How Do Lowering Springs Improve a Car’s Handling? Lowering springs, also known as performance springs, are shorter and stiffer than regular springs. They lower your car’s ride height, which subsequently lowers the center of gravity. This reduction enhances the car’s balance and stability, leading to improved handling. Lowering springs can also help reduce body roll. Body roll occurs when your car leans to one side during cornering. By lowering your car’s center of gravity, there is less lean, which means less weight shift and less body roll. This creates a more stable ride, especially when cornering at high speeds. Furthermore, lowering springs are designed to be stiffer than stock springs. This added stiffness reduces the amount of suspension travel. Less suspension travel means your car’s suspension will compress less under load, reducing weight transfer and improving handling. Selecting the Right Lowering Springs for Your Car When it comes to choosing the right lowering springs for your car, there are a few factors to consider. The first is how much you want to lower your car. This will depend on your driving style and the purpose of your car. If it’s primarily a street car that sees occasional track use, a moderate drop of 1-1.5 inches might suffice. Next, consider the spring rate or stiffness. A stiffer spring will offer better handling but can negatively impact ride comfort. It’s essential to find a balance that suits your preferences. Lastly, consider the quality and reputation of the manufacturer. It’s worth investing in high-quality springs from reputable manufacturers to ensure durability and performance. Remember, the goal is to improve your car’s handling without sacrificing reliability. Installing Lowering Springs on Your Car Installing lowering springs on your car is a straightforward process, but it does require some knowledge of car mechanics. It’s always recommended to get a professional to perform the installation, but if you’re a handy person, you can do it yourself. Firstly, you’ll need to remove the old springs. This involves lifting the car, removing the wheels, and using a spring compressor to safely remove the springs from the strut assembly. The new lowering springs can then be fitted onto the strut assembly. This is usually done with the aid of the spring compressor. Once the new springs are in place, the strut assembly can be reinstalled on the car. The steps are repeated for all four corners of the vehicle. After the new springs are installed, it’s paramount to have the car’s alignment checked and adjusted if necessary. This ensures the optimal performance of the new setup. The Impact of Lowering Springs on Other Car Components While lowering springs enhance the handling and aesthetics of your car, it’s worth mentioning that they can also impact other vehicle components. For instance, lowering your car alters the suspension geometry, which can lead to increased tire wear if not properly aligned. It’s crucial to get your car realigned after installing lowering springs. Furthermore, a lower car might be more susceptible to road damage. Speed bumps and irregular road surfaces can cause damage to the undercarriage of a lowered vehicle. Lastly, the stiffer ride might not be to everyone’s liking. Some people find the stiffer ride uncomfortable, especially on longer journeys. It’s important to take these factors into consideration before deciding to lower your car. Lowering your car’s center of gravity using springs can significantly improve its handling. However, it’s crucial to understand the principles involved and the potential impact on your vehicle. By considering these factors, you can make an informed decision about whether this modification is right for you. Benefits and Drawbacks of Lowering Springs As you consider lowering your car’s center of gravity, it’s crucial to weigh the benefits and drawbacks of using lowering springs. One of the most significant advantages of lowering springs is their ability to improve your car’s handling. By reducing the center of gravity, you reduce body roll and weight transfer for a more balanced and stable ride. This enhancement is particularly noticeable during high-speed cornering, where the vehicle maintains optimal grip and control. Besides handling, lowering springs can also improve your car’s aesthetics. A lowered car has a more aggressive stance which many enthusiasts find appealing. Moreover, the reduced gap between the tire and the wheel arches gives your vehicle a sleek, sporty look. However, there are some potential drawbacks to consider. The stiffer ride that comes with lowering springs can make your vehicle less comfortable, particularly on rough roads or during extended trips. Additionally, your lowered car will be more vulnerable to road damage from speed bumps, potholes, and other obstacles. Another consideration is that lowering springs affect other car components. The change in suspension geometry can lead to increased tire wear unless you get the car realigned. In summary, lowering springs offer many benefits including improved handling and a sporty appearance. However, these advantages come with trade-offs such as a stiffer ride, potential road damage, and increased tire wear. It’s essential to weigh these factors before deciding to install lowering springs. Conclusion: Should You Lower Your Car’s Center of Gravity? Deciding to lower your car’s center of gravity is not a decision to be taken lightly. Lowering springs can certainly improve your vehicle’s handling and give it a sporty look. However, these benefits come with potential drawbacks like a less comfortable ride, greater susceptibility to road damage, and the need for regular alignments to prevent excessive tire wear. Before proceeding with this modification, consider your driving habits and the primary purpose of your car. If you frequently drive on rough roads or travel long distances, the stiffer ride might outweigh the handling benefits. But if you’re a car enthusiast who loves the appearance of a lowered car and appreciates improved handling, particularly during high-speed cornering, then lowering springs might be an excellent addition to your vehicle. Remember, it’s important to invest in high-quality lowering springs from reputable manufacturers. These typically offer better performance and durability, ensuring that your investment is worthwhile. At the end of the day, lowering your car’s center of gravity with springs is a personal decision. It’s a choice that should be based on careful consideration of the benefits, drawbacks, and potential impact on your vehicle’s performance and maintenance.
ESSENTIALAI-STEM
Page:United States Statutes at Large Volume 86.djvu/959 86 STAT. ] PUBLIC LAW 92-509-OCT. 19, 1972 917 "(f) The escrow agreement shall contain such other terms as the Secretary of Commerce may consider necessary to protect fully the interests of the United States. "SEC. 1109. The Secretary of Commerce is authorized and directed i^f^^J,^/ ^""^ '^^"' to make such rules and regulations as may be deemed necessary or appropriate to carry out the purposes and provisions of this title." SEC. 6. Nothing in this Act shall limit or affect the right of an i^^^^^^^^^^^^l^''^ obligor who maintains a capital reserve fund under section 607 of the "" ' ^^°^' ^' Merchant Marine Act, 1936, to make deposits of the proceeds of J^ ^*|^-1^^^guaranteed obligations into such capital reserve fund as provided in subparagraph (c) of condition (6) of section 1107 of the Merchant Marine Act, 1936, as in effect prior to the effective date of this Act. yJl^ll^*-2i^^^'' SEC. 7. Any citizen of the United States to whom the Secretary of 46 USC uVea. Commerce issued an approval in principle of an application for loan or mortgage insurance or a commitment with respect to such insurance under the provisions of title X I of the Merchant Marine Act, 1936, '*^ ^^^ ^^^*prior to the effective date of this Act may elect, with respect to the vessels covered by such approval or commitment, to be bound either by the provisions of title X I of the Merchant Marine Act, 1936. as in effect prior to the effective date of this Act or by the provisions of this Act. SEC. 8. This Act may be cited as the "Federal Ship Financing Act ^^°''^ *^*^^of 1972." Approved October 19, 1972. •^ Public Law 92-508 JOINT RESOLUTION October 19, 1972 To authorize and request the President to proclaim the week beginning [s. j. Res. 236] October 15, 1972, as "National Drug Abuse Prevention Week". Resolved by the Senate and Hotcse of Representatives of the United States of America in Congress assembled, That in order to heighten National oing the awareness of the people of the United States with regard to the J^"^^ Prevention national threat of drug abuse, and to provide an opportunity for a Designation period of special emphasis on this problem, the President is authorized authorization. and requested to issue a proclamation designating the week beginning October 15, 1972, as "National Drug Abuse Prevention Week", and / calling upon the people of the United States and interested groups and orgamzations to observe such period with appropriate ceremonies and activities. Approved October 19, 1972. Public Law 92-509 JOINT RESOLUTION October 19, 1972 To designate the week which begins on the first Sunday in March 1973 as [s. j. Res.2 i] "National Beta Club Week". Resoloed by the Senate and Home of Representatives of the United States of America m Congress assembled, That the President is National Beta authorized and requested to issue a proclamation designating the ^^pesTgni'tion week which begins on the first Sunday in March 1973 as "National authorization. Beta Club Week", to recognize the National Beta Club for its dedication to the positive accomplishments of American youth and to encourage the furthering of its goals to promote honesty, service, and leadership among the higli scliool students in America. Approved October 19, 1972. �
WIKI
Use this URL to cite or link to this record in EThOS: https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553527 Title: Variant selection and its effect on texture inTi-6Al-4V Author: Obasi, Gideon Chima ISNI:       0000 0004 2720 3668 Awarding Body: University of Manchester Current Institution: University of Manchester Date of Award: 2012 Availability of Full Text: Access from EThOS: Access from Institution: Abstract: Titanium alloys are strong candidates for the aerospace industry and biomaterial applications because of their low density, high strength-to-weight ratio and very high strength even at temperatures up to 600°C. Like many other engineering alloys, titanium alloys are prone to strong preferred crystallographic orientation development during thermomechanical processing. Part of the titanium processing route is to heat treat the material above the β transus for the purpose of homogenization and associated phase transformation. This heat treatment dramatically affected the microstructure and texture evolution. Theoretically, such heat treatment should result in a nearly random texture if all variants during α→β→α phase transformation are active. In reality, significant textures are observed after such a heat treatment process. The present project aims at developing a detailed understanding of the root cause for this relatively strong texture by means of EBSD and in-situ neutron diffraction studies. The effect of β grain growth on variant selection during β to α phase transformation has been investigated by using two variants of Ti-6Al-4V with and without 0.4 wt% yttrium addition. The aim of adding yttrium was to control β grain growth above the β transus by pinning grain boundaries with yttria. Both materials were first thermomechanically processed to generate a similar starting microstructures and crystallographic textures. Subsequently, both materials were solution heat treated above the β transus followed by slow cooling to promote growth of the α lath structure from grain boundary α. Detailed EBSD and in situ neutron diffraction analysis were carried out to study microstructure and texture evolution. The variant selection calculation suggests that more variant selection occurred in convectional material with a large grain size compared to material with yttrium addition. In situ measurements showed that β texture strengthened significantly above the β transus with increasing β grain size. There was no significant variant selection during α→β transformation; variant selection noticeably increased during β→α transformation with increasing β grain size. Additional interrupted cooling experiments followed by EBSD analysis showed early nucleation of α variants with a 'butterfly morphology' from β grain boundaries that have a pair of β grain with a common <110> pole. These observations suggest reduced nucleation energies for α formation in such circumstances allowing extensive growth of these α variants into unoccupied β grains making it a dominant variant. The influence of rolling temperatures (i.e. at 800 ºC and 950 ºC) to produce different starting texture, on texture evolution and variant selection during α→β→α transformation was also investigated. Laboratory X-ray, EBSD and in-situ neutron diffraction texture analyses were carried out. Even though the transformation texture is stronger at 800 ºC, the degree of variant selection is stronger in materials rolled at950 ºC compared to material rolled at 800 ºC. Here, the enhanced variant selectionfor the material rolled at 950 ºC was related to the different β texture. It is suggested that the combination of a particular β texture components promote variant nucleation that can increase the likelihood of having β grain pairs with a common <110> pole. Supervisor: Preuss, Michael Sponsor: EPSRC Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral EThOS ID: uk.bl.ethos.553527  DOI: Not available Keywords: Ti-6Al-4V ; Grain growth ; Texture evolution ; Variant selection and Texture memory Share:
ESSENTIALAI-STEM
Procedures for diagnosis - isolation of etiological agent, Biology Isolation and identification of the etiological agent: Isolation of the etiological agent is attempted in chicken embryos, cell cultures, laboratory animals, culture media or the host species. Cell cultures are most ideal, economic and often give quick results for virus agent. These could be homologous or heterologous; primary, secondary or established cell lines, and of diverse tissue origin (kidney, testes, liver, lung, whole embryo, etc.) depending upon the virus under study. If the viral agent involved is not known, primary kidney or thyroid cell cultures from embryo or young animals of the same (homologous) species should be preferred. The inoculums, after making it free from bacterial and fungal contamination by suitable antibiotic/antifungal treatment, are given 3 to 5 blind passages in a particular cell culture. Type of cytopathic effects (CPE), demonstration of virus particles/ antigen in the infected cells, haemadsorption, haemagglutination (HA), haemagglutination inhibition (HI), neutralization of CPE with specific serum and physiochemical and biological properties may be studied for identification of the virus. When cell culture facilities are not available or the virus does not grow in any cell culture or produce CPE, chicken embryos may be inoculated in appropriate route i.e. CAM, AC, YS, amniotic cavity or intravenous. Laboratory animals viz. mice, guinea pig, hamster, rabbit, chicken, etc., which support the growth of a number of pathogens may also be used. Route of inoculation for these animals are selected in accordance with the agent being looked for. Strictly host specific viruses those do not grow in any cell culture or chicken embryos, the host species has to be used for its isolation. Posted Date: 9/19/2012 1:18:58 AM | Location : United States Related Discussions:- Procedures for diagnosis - isolation of etiological agent, Assignment Help, Ask Question on Procedures for diagnosis - isolation of etiological agent, Get Answer, Expert's Help, Procedures for diagnosis - isolation of etiological agent Discussions Write discussion on Procedures for diagnosis - isolation of etiological agent Your posts are moderated Related Questions Clinical Evaluation of Infants and Young Children Approaches to clinical practice advanced in recent year are mostly directed at older children and adolescents. There has not b Explain about the Integumentary Tissues? The skin, hair and nails covering and protecting the body are the intengumentary tissues. Depigmentation of hair and wrinkling of skin How we can measure perimplant PD Perimplant PD should be measured routinely during maintenance appointment with a less probing force (0.2 to 0.3 N) as the tissue is more sensit Shape and size of protiens Fibrous proteins for example: keratin in hair, actin and myosin in muscles, and collagen. Globular proteins, for example enzymes and antibo Steps for Prevention Industrial Accidents These steps are as follow: Substitute a less hazardous equivalent. Remove worker from hazard (e.g. automate the sys What are diseases of the connective tissue? What are some of them? Diseases of the connective tissue are hereditary or acquired diseases(lots of autoimmune cause) characterized Q. Nutritional management for constipation? Calories, proteins, carbohydrates and fat the requirements would be the same as the RDA for a particular age, sex, occupation of t Tertiary Prevention: In tertiary prevention, emphasis is placed on reducing disability resulting from illness. Tertiary prevention often means long term care. Disability may r Casein is the main protein in milk. There are three types of casein, one of which is beta casein. Beta casein comes in two main variants called A1 and A2. The order of amino acids
ESSENTIALAI-STEM
To create a new landing page, is adding .html file to layouts folder enough? Hi, I am looking at Meghna theme. I wanted to add a new landing page and added a new ‘message.html’ file in the layouts folder. (I copied the existing 404.html file in the same folder and modified it minimally to add a new paragraph) Should this be good enough to generate message.html in the Public folder when I run the Hugo command? Or, do I need another step to tell Hugo to generate message.html from the layout file? Is message.html static or does it contain template code? Hi, Here is message.html. I believe the inclusion of partial makes it a template code? {{ define "main" }} {{ partial "navigation.html" . }} <section class="section"> <div class="container"> <div class="row"> <div class="col-12 text-center"> <h1>Thank you!</h1> <h2>Thank you for reaching out, we will contact you shortly.</h2> <a class="btn btn-main" href="{{ site.BaseURL | relLangURL }}">Back to home</a> </div> </div> </div> </section> {{ end }} Inclusion of any {{ foo }} makes it template code. Place message.html in layouts/_default. Then create a content page to use that layout. For example… content/foo.md +++ title = 'Foo' date = 2022-08-11T11:01:58-07:00 draft = false layout = 'message' +++ 1 Like Thank you, I tried it as you had indicated a few times, but, a new file was not generated. As a work around, I have created an html file (edit by hand) and deployed, the edit path worked. I not sure what you did, but you did it wrong. Try it: git clone --single-branch -b hugo-forum-topic-39951 https://github.com/jmooring/hugo-testing hugo-forum-topic-39951 cd hugo-forum-topic-39951 hugo server Thanks for sharing, I tried yours and I see how it works. I noticed one thing that might make a difference. Themefisher classifies the theme I have as a Bootstrap Template … is this different from a Hugo Theme? Hugo_vs_Bootstrap Yes, they are two different things. Some of their Hugo themes may leverage the Bootstrap library, but that’s a question for Themefisher. 1 Like This topic was automatically closed 2 days after the last reply. New replies are no longer allowed.
ESSENTIALAI-STEM
Entity Time filter Source Type South San Francisco, CA, United States Ridker P.M.,Harvard University | MacFadyen J.G.,Harvard University | Wolfert R.L.,diaDexus | Koenig W.,University of Ulm Clinical Chemistry | Year: 2012 BACKGROUND: Although lipoprotein-Associated phospholipase A2 (Lp-PLA2) levels are associated with cardiovascular events, L p-PLA2 is physically linked to LDL cholesterol (LDL-C). Whether measures of Lp-PLA2 mass or activity continue to predict risk after LDL-C reduction by statin therapy is uncertain. METHODS: L p-PLA2 mass concentration and activity were evaluated at baseline and after treatment in the Justification for the Use of Statins in Prevention: an Intervention Trial Evaluating Rosuvastatin (JUPITER) trial comparing rosuvastatin 20 mg to placebo among 17 802 men and women without cardiovascular disease or diabetes at study entry. The relationships of L p-PLA2 mass and activity with risk of future vascular events were evaluated in the placebo and rosuvastatin groups. RESULTS: Before randomization, levels of Lp-PLA2 mass and activity correlated moderately with each other and with LDL-C. The magnitude of these correlations increased after statin therapy. Rosuvastatin reduced Lp-PLA 2 mass by 33.8%, Lp-PLA2 activity by 33.2%, and LDL-C by 48.7% (all P < 0.0001). Among those study participants allocated to placebo, increasing quartiles of Lp-PLA2 activity (Ptrend<0.04) but not Lp-PLA2 mass (Ptrend < 0.92) were associated with incident cardiovascular events after adjustment for LDL-C and conventional risk factors. Comparable analyses conducted among those allocated to rosuvastatin revealed no significant relationship between L p-PLA2 levels and subsequent vascular events. The ability of rosuvastatin to reduce vascular events was not significantly modified by baseline Lp-PLA2 level. CONCLUSIONS: Among JUPITER trial participants allocated to placebo, levels of Lp-PLA2 activity, but not mass, were associated with cardiovascular risk. However, Lp-PLA2 no longer predicted risk or modified clinical outcomes when participants were treated with rosuvastatin. © 2012 American Association for Clinical Chemistry. The present invention provides a new method for detecting, diagnosing, monitoring, staging, prognosticating, imaging and treating selected cancers including gynecologic cancers such as breast, ovarian, uterine and endometrial cancer and lung cancer. Patent diaDexus | Date: 2011-12-16 The invention provides isolated anti-ovarian, pancreatic, lung or breast cancer antigen (Pro104) antibodies that bind to Pro104 on a mammalian cell in vivo. The invention also encompasses compositions comprising an anti-Pro104 antibody and a carrier. These compositions can be provided in an article of manufacture or a kit. Another aspect of the invention is an isolated nucleic acid encoding an anti-Pro104 antibody, as well as an expression vector comprising the isolated nucleic acid. Also provided are cells that produce the anti-Pro104 antibodies. The invention encompasses a method of producing the anti-Pro104 antibodies. Other aspects of the invention are a method of killing a Pro104-expressing cancer cell, comprising contacting the cancer cell with an anti-Pro104 antibody and a method of alleviating or treating a Pro104-expressing cancer in a mammal, comprising administering a therapeutically effective amount of the anti-Pro104 antibody to the mammal. Patent diaDexus | Date: 2012-05-08 The invention provides isolated anti-PCan065 antibodies that bind to PCan065. The invention also encompasses compositions comprising an anti-PCan065 antibody and a carrier. These compositions can be provided in an article of manufacture or a kit. Another aspect of the invention is an isolated nucleic acid encoding an anti-PCan065 antibody, as well as an expression vector comprising the isolated nucleic acid. Also provided are cells that produce the anti-PCan065 antibodies. The invention encompasses a method of producing the anti-PCan065 antibodies. Other aspects of the invention are a method of killing an PCan065-expressing cancer cell, comprising contacting the cancer cell with an anti-PCan065 antibody and a method of alleviating or treating an PCan065-expressing cancer in a mammal, comprising administering a therapeutically effective amount of the anti-PCan065 antibody to the mammal. The invention provides isolated anti-Lp-PLA2 antibodies that bind to Lp-PLA2. The invention also encompasses compositions comprising an anti-Lp-PLA2 antibody. These compositions can be provided in an article of manufacture or a kit. Another aspect of the invention is an isolated nucleic acid encoding an anti-Lp-PLA2 antibody, as well as an expression vector comprising the isolated nucleic acid. Also provided are cells that produce the anti-Lp-PLA2 antibodies. The invention encompasses a method of producing the anti-Lp-PLA2 antibodies. Other aspects of the invention are a method of detecting an Lp-PLA2 in a subject. Discover hidden collaborations
ESSENTIALAI-STEM
Bischofswerda station Bischofswerda (Bahnhof Bischofswerda) is a railway station in the town of Bischofswerda, Saxony, Germany. The station lies on the Görlitz–Dresden and Neukirch West–Bischofswerda railway lines. There used to be also a line to Kamenz. Train services The station is served by regional and local services, which are operated by Trilex. Bus services These buses depart from the bus station at the front of the station. * A (Town service) * B (Town service) * 114 (Bischofswerda – Gaußig – Bautzen) * 177 * 178 * 180 * 181 * 182 * 183 * 185 * 188 * 189 * 191 * 193 * 264 * 305 * 306
WIKI
Trump's "reality tremor" as Mueller fallout piles up Last week's stunning court filings detonated what one official calls a "reality tremor" that has White House officials and key allies increasingly aware of President Trump’s rising legal and political vulnerability. What's happening: Some top officials are suddenly much more attuned to the political fallout from the Mueller investigation and are growing more anxious about Trump's re-election prospects, according to people close to the president. And on the outside, some hardcore Trump allies — who have mostly accepted his denials about Robert Mueller — were rattled by the specificity of the Friday night revelations by the special counsel and by federal prosecutors. One Trump loyalist said after a day of conversation with "hardcore MAGA [Make America Great Again] online influencers": "These are the people most predisposed to believing the 'witch hunt' rhetoric, but they are now expressing real concerns." Even these diehards "start looking at the legal stuff and have a hard time dismissing it all," the loyalist said. "I think SDNY [the Southern District of New York, where prosecutors said Trump directed Michael Cohen to make hush-money payments to women] has changed people’s perceptions. ... That’s viewed as a greater potential threat to Trump directly than Mueller. 'Collusion' is still met with eye rolls." "And even MAGA loyalists are asking why Trump feels the need to go on Twitter with bizarre legal explanations that don’t seem to help." AP reported: "For some Republicans, the implication that the president may have directed a campaign finance violation ... could foreshadow a true turning point in the Republican relationship ... when ... Mueller releases his report." This new recognition has made outside political savvy one of the top criteria in the frenetic search for the next White House chief of staff after the rejection over the weekend by Nick Ayers. One person involved in the conversations said the White House is looking for a political pro who speaks the language of modern campaigns, and can help focus the administration's message. That's why David Bossie, deputy campaign manager in 2016, is making a new push for the job. Rep. Mark Meadows (R-N.C.), chairman of the conservative House Freedom Caucus, confirmed Sunday's scoop by Axios that Trump is considering him: "The president has a good list of candidates. I’m honored to be one of those." Others who are being mentioned include operative David Urban, Treasury Secretary Steven Mnuchin, acting attorney general Matt Whitaker, Office of Management and Budget Director Mick Mulvaney and former New Jersey governor Chris Christie. Go deeper: What we now know about Trump and Russia Mueller's breadcrumbs suggest he has the goods Signs point to an acceleration of Mueller's endgame
NEWS-MULTISOURCE
HTTPS SSH Json Enhancements for PostgreSQL 9.2 This is a backport of two pieces of work I did making JSON more user friendly and useful for PostgreSL 9.3. The JSON type was introduced in PostgreSQL 9.2, but is somewhat lacking in useful features - there are no functions to pull data out of JSON or otherwise process it, and while there are some generator functions they have some limitations and can be a bit inefficient to use. This work is an attempt to remedy those defects. These enhancements do a these things: • to_json(any) turns any data value into valid json • json_agg(anyrecord) aggregates record values and returns a single piece of json. This can be used instead of array_to_json(array_agg(record)) which is both ugly and very inefficient. • to_json(hstore) and a cast that uses it that turns an hstore into json • to_json_loose(hstore) also turns an hstore into json but heuristically tries to detect numeric and boolean values and avoid quoting them • use by to_json() and json_agg() of a cast to json function, if one exists, when rendering a datum of a non-builtin type to json. This means, for example, that a record containing an hstore will have the hstore rendered sanely as a json object rather than as an opaque piece of text. • certain functions and operators below have text variants. They return the results as text rather than as json, and if the value returned is a json string value, it is dequoted, so you get back foo"bar instead of "foo\"bar". The text variants also turn join nulls into SQL nulls. • note that json arrays are always numbered from 0, unlike the SQL default. • operators -> and ->> to extract an object key if the right hand operand is a string, or array element if the right hand operand is an integer. ->> is the text variant as above. • operators #> and #>> take an array of text as the right hand operand, and return the corresponding item. #>> is the text variant as above. • json_extract_path(json, variadic text[]) and json_extract_path_text(json, variadic text[]) return the element at the denoted path. Elements in the path can be field names if the element at this nesting level is a json object or textified integers if the item is an array. json_extract_path_text() is the text variant as above. • json_object_keys(json) returns the set of keys in the json object • json_array_length(json) returns the length of the json array • json_array_elements(json) returns the elements in the json array. • json_each(json) and json_each_text(json) return the set of key/value pairs in a json object. json_each_text() returns the text variant values as above. • json_populate_record(anyrecord, json, use_json_as_text_bool) returns the input record with fields with identical names to the fields in a the json object set to the corresponding values. The third boolean parameter defaults to false, which means it will raise an error if it finds that a name maps to a json object or array instead of a scalar value. If it is true it will instead try to use the text of the nested value to populate the record field. • json_populate_recordset(anyrecord, json, use_json_as_text_bool) does the same as json_populate_record() but for each object element of the input array, i.e. it turns json which is an array of objects into a set of records. Examples of all of these should be found in the test files. You can also use these building blocks to build further useful functions, such as things like this: $ create or replace function json_pluck(j json, field text) returns text[] language sql as $$ select array_agg(j->>$2) from json_array_elements($1) j $$; $ create operator | (procedure = json_pluck, leftarg = 'json', rightarg = 'text'); and then you can do: $ select json '[{"name" : "moe", "age" : 40}, {"name" : "larry", "age" : 50}, {"name" : "curly", "age" : 60}]' | 'name' as names; names ------------------- {moe,larry,curly} What's missing? The proposed changes for 9.3 alter the behaviour of the array_to_json() and row_to_json() functions so that they honor casts from non-builtin types to json, as described above. This change could not be included in this extension. Just use to_json() instead. Caveats This extension requires the hstore extension to be loaded. What is more, either it needs to be built against the installed hstore library or the hstore library needs to be preloaded in your installation. See the Makefile for details. If you can't get it to build this way, try building with NOHSTORE defined. If you do that you'll miss out on the hstore extras above, of course. This module might make using pg_upgrade difficult or even impossible. This use has not been tested. IF YOU ARE PLANNING TO USE pg_upgrade THEN DO NOT USE THIS EXTENSION WITHOUT UPGRADE TESTING. If you ignore this warning and it breaks you get to keep all the pieces. Further extension It should be possible to build further json processing modules that leverage this library. The API is in the file jsonapi.h, and the extension should link against this library in the same way as we link against hstore (see above). Credits The original work from which this was drawn was supported by Heroku. The porting was supported by IVC. The original Json parser in PostgreSQL release 9.2 which is adapted here was written by Robert Haas.
ESSENTIALAI-STEM
BMC Complementary And Various Drugs Complementary medication is a group of diagnostic and therapeutic disciplines which can be used together with standard drugs. The one that performs this therapy (an acupuncturist) sticks skinny, sterile needles into your pores and skin The purpose is to help your physique’s pure healing course of kick in. Studies present that acupuncture can be effective in treating a variety of situations, like neck and again ache , nausea , anxiousness , despair , insomnia , infertility , and extra. Till the Nineteen Seventies, western practitioners that weren’t part of the medical establishment had been referred to “irregular practitioners”, and were dismissed by the medical institution as unscientific, as practising quackery 126 The Irregular practice became more and more marginalized as quackery and fraud, as western drugs increasingly incorporated scientific methods and discoveries, and had a corresponding improve in success of its remedies.alternative medicine However, if such a bias occurred, it will have tended to make the differences in survival between the choice drugs group and the standard therapy group smaller, not larger, that means that if such a bias occurred on this study the harm caused by choosing alternative medication is more likely to be significantly worse than reported. Come to the first visit prepared to reply questions about your well being history, including accidents, surgeries, and main sicknesses, in addition to prescription medicines, nutritional vitamins, and other dietary supplements you may take. For example, a research from Norway discovered a modest unfavourable effect of CAM use in cancers, with the next demise charge over the research interval (79{ae06c2b56fbc6d9ecb3874bc5eccb92025201fec4f8382de398fe8a47538e2ef} versus sixty five{ae06c2b56fbc6d9ecb3874bc5eccb92025201fec4f8382de398fe8a47538e2ef}), with a hazard ratio for death of 1.30 that simply missed statistical significance, main the authors to conclude that using alternative medication appears to predict a shorter survival from cancer” and that the effect seems predominantly in sufferers with a very good performance status” (i.e., the healthiest sufferers).alternative medicinealternative medicine
ESSENTIALAI-STEM
Nestlé leads $77 million round in prepared meal startup Freshly Nestlé USA has led a new $77 million funding round for New York-based Freshly, which sends weekly batches of prepared meals to customers who get to pick from a rotating selection of 30 dishes. What it means: Big food conglomerates are paying attention to the recent food consumption trends. Unilever previously invested in meal-kit startup Sun Basket, while Campbell Soup Co. poured $10 million into one called Chef'd. Freshly also part of the growing health food craze, which big food companies have had to adjust to. Synergies: Nestlé is expected to lend its expertise in food sourcing and R&D to Freshly, while receiving an look into Freshly's customer base and operations. Deal details: As part of the deal Jeff Hamilton, president of Nestlé USA's Food Division, is joining Freshly's board of directors. Existing investors Highland Capital Partners, Insight Venture Partners, and White Star Capital also participated in the round.
NEWS-MULTISOURCE
She Does It Right "She Does It Right" is a song by the band Dr. Feelgood, recorded in 1974 and appearing on their debut album, Down by the Jetty. The track was written by Wilko Johnson, and produced by Vic Maile. The song was the band's second UK single release, following their debut "Roxette", in March 1975, but failed to reach the UK Singles Chart. The B-side of the record, "I Don't Mind", was also penned by Johnson. The song was included in Dr. Feelgood's 1997's compilation album, Twenty Five Years of Dr. Feelgood. In a 2016 interview with Johnson, Songwriting Magazine described the track as "three and a half minutes of proto-punk heaven." He recorded the song again for his 2017 album I Keep It To Myself: The Best of Wilko Johnson.
WIKI
Jing Wang (professor) Jing Wang (王瑾; 1950 – July 25, 2021) was Professor of Chinese media and Cultural Studies and S.C. Fang Professor of Chinese Language & Culture at Massachusetts Institute of Technology. She was jointly appointed to MIT's Comparative Media Studies and Global Studies & Languages. After a bachelor's degree from National Taiwan University, Wang studied comparative literature at University of Michigan before earning her doctorate at the University of Massachusetts. She began her teaching career at Duke University, where she was on the faculty for 16 years. Her 1992 monograph The Story of Stone: Intertextuality, Ancient Chinese Stone Lore, and the Stone Symbolism in Dream of the Red Chamber, Water Margin, and The Journey to the West won the Joseph Levenson Prize for the year's best book on premodern China. Jing Wang was the founder and organizer of MIT's New Media Action Lab. In spring 2009, Wang launched an NGO2.0. Wang started working with Creative Commons in 2006 and served as the Chair of the International Advisory Board of Creative Commons Mainland China. She was appointed to serve on the advisory board for Wikimedia Foundation in 2010. She served on the editorial and advisory boards of ten academic journals in the US, Australia, Taiwan, Hong Kong, and the UK. Wang died in Boston, July 25, 2021, aged 71. Books * Brand New China: Advertising, Media, and Commercial Culture, Harvard University Press 2008. * High Culture Fever: Politics, Aesthetics, and Ideology in Deng's China, Duke University Press, 1996. * The Story of Stone: Intertextuality, Ancient Chinese Stone Lore, and the Stone Symbolism of "Dream of the Red Chamber," "Water Margin," and “Journey to the West."'' University Press, 1992. Edited * Locating China: Space, Place, and Popular Culture. In the series of “China in Transition” (ed. David SG Goodman). London and New York: Routledge, 2005. Paperback edition, 2006. * With Tani Barlow, Cinema and Desire: Feminist Marxism and the Cultural Politics in the Work of Dai Jinhua. New York & London: Verso. 2002. * Chinese Popular Culture and the State, a special issue for positions: east Asia cultures critique, 9:1 (spring 2001). [Nominated for the 2001 MLA Council of Editors of Learned Journals Award for the category of the Best Special Issue]. * China's Avant-Garde Fiction: An Anthology. Durham and London: Duke University Press, 1998.[Second Printing, 2004]. Candy R. Wei Memorial Scholarship Jing Wang's daughter Candy R. Wei took her own life at the age of 20. Jing Wang and Candy's father, Young Wei, established a travel scholarship fund at the University of Michigan School of Art & Design in 2001 to commemorate their daughter. The recipients of this fund made individual contributions to Wikipedia by submitting works inspired during their study abroad.
WIKI
Page:United States Statutes at Large Volume 95.djvu/1098 95 STAT. 1072 PUBLIC LAW 97-78—NOV. 16, 1981 centum in amount or value of production removed or sold from the lease. "(2) Except as provided in this section, nothing in the Combined Hydrocarbon Leasing Act of 1981 shall be construed to diminish or increase the rights of any lessee under any oil and gas lease issued prior to the enactment of such Act.". (9)(a) Section 2 of the Mineral Leasing Act for Acquired Lands (30 U.S.C. 351) is amended by adding at the end thereof: "The term 'oil' shall embrace all nongaseous hydrocarbon substances other than those leasable as coal, oil shale, or gilsonite (including all vein-type solid hydrocarbons).". (b) Section 3 of such Act (30 U.S.C. 352) is amended by inserting "gilsonite (including all vein-type solid hydrocarbons), after "oil shale". 30 USC 181 (10) Nothing in this Act shall affect the taxable status of production "o^from tar sand under the Crude Oil Windfall Profit Tax Act of 1980 26 USC 1 note. (Public Law 96-223), reduce the depletion allowance for production from tar sand, or otherwise affect the existing tax status applicable to such production. Prohibition. (H) No provision of this Act shall apply to national parks, national ??tY^^ ^^^ monuments, or other lands where mineral leasing is prohibited by note. law. The Secretary of the Interior shall apply the provisions of this Act to the Glen Csmyon National Recreation Area, and to any other units of the national park system where mineral leasing is permitted, in accordemce with any applicable minerals management plan if the Secretary finds that there will be no resulting significant adverse impacts on the administration of such area, or on other contiguous units of the national park system. Approved November 16, 1981. LEGISLATIVE HISTORY—H.R. 3975: HOUSE REPORT No. 97-174 (Comm. on Interior and Insular Affairs). SENATE REPORT No. 97-250 (Comm. on Energy and Natural Resources). CONGRESSIONAL RECORD, Vol. 127 (1981): July 14, considered and passed House. Oct. 29, considered and passed Senate. �
WIKI
CryoLife to Buy JOTEC, Preliminary Revenue Result Out for Q3 CryoLife, Inc.CRY recently entered into a definitive agreement to buy German-based JOTEC AG. JOTEC - a privately-held maker of technologically advanced endovascular stent grafts and cardiac and vascular surgical grafts focused on aortic repair. The company has been recording revenue CAGR of 17% over the last five years. Under the financial terms of the agreement, CryoLife will pay an aggregate of up to $225 million for the deal, with around $168.75 million in cash and $56.25 million in shares of CryoLife's common stock issued to JOTEC's shareholders. The buyout is slated to complete later in 2017, subject to customary closing conditions. Through this deal, CryoLife aims at expanding the existing portfolio with products focused on aortic surgery, thereby solidifying its footprint in the fast-growing endovascular surgical market. Per management, this deal will help CryoLife diversify its business by gaining access to the $2-billionglobal marketfor stent grafts used in endovascular and open repair of aortic diseases. The market is projected to value around $2.5 billion by 2021. Interestingly, CryoLife aims at delivering consistent, high single-digit revenue growth through this deal. The deal is also in line with the company's strategy to directly sell by eliminating distributors in Europe while creating cross-selling opportunities for the company's product portfolios. In the last reported quarter, CryoLife began the process of direct selling in Canada, Belgium, the Netherlands and Luxembourg, expanding direct operations in Europe. At the same time, management expects the newly-added products to continue to post double-digit growth outside the United States for at least the next five years. Moreover, the deal is expected to prove accretive to the company's non-GAAP EPS at a CAGR of not less than 20% over the next five years, while contributing to gross and operating margin. CryoLife expects to gain access to the $1.2-billion U.S. stent graft market, which is projected to value roughly $1.5 billion by 2021 through the newly gained, highly competitive product portfolio and advanced research and development platform. Thus, the company expects this deal to drive growth through 2018 as well. CryoLife also provided a sneak peek into its preliminary third-quarter results. The company has recorded revenues of $44.0 million. This considers a negative impact of around $1 million from hurricanes, delay in receipt of re-certification of Ascending Aortic Prosthesis, reversal of around $1.1 million of recorded revenues on repurchase of some inventory from third-party distributors in order to sell directly. We believe unhealthy lifestyle, favorable demographics, rising expenditure on healthcare by government and technological developments will continue to drive growth in the aortic aneurysm market. This fact is further substantiated by a Research and Markets report published by Nasdaq. Per the report, the global aortic aneurysm market is estimated to witness a CAGR of 6.6% between 2017 and 2023. Thus, this acquisition deal is expected to boost the top line of CryoLife. Share Price Performance Over the last six months, CryoLife has been trading above the broader industry . The stock has gained 35.1%, compared with the broader industry's 14.4% rise. Zacks Rank & Key Picks CryoLife currently carries a Zacks Rank #3 (Hold). A few better-ranked stocks in the medical sector are QIAGEN QGEN , IDEXX Laboratories, Inc. IDXX and Thermo Fisher Scientific Inc. TMO . QIAGEN, IDEXX Laboratories and Thermo Fisher carry a Zacks Rank #2 (Buy). You can see the complete list of today's Zacks #1 Rank (Strong Buy) stocks here. QIAGEN has a long-term expected earnings growth rate of 13.1%. The stock has rallied roughly 31.9% last year. IDEXX Laboratories has a long-term expected earnings growth rate of 19.8%. The stock has gained 42.8% last year. Thermo Fisher has a long-term expected earnings growth rate of 11.7%. The stock has gained 27.2% last year. Wall Street's Next Amazon Zacks EVP Kevin Matras believes this familiar stock has only just begun its climb to become one of the greatest investments of all time. It's a once-in-a-generation opportunity to invest in pure genius. Click for details >> Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report Thermo Fisher Scientific Inc (TMO): Free Stock Analysis Report IDEXX Laboratories, Inc. (IDXX): Free Stock Analysis Report CryoLife, Inc. (CRY): Free Stock Analysis Report Qiagen N.V. (QGEN): Free Stock Analysis Report To read this article on Zacks.com click here. Zacks Investment Research The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Why You Should Care More About Your Bone Health When people think about their health, they usually think about things like weight, heart health, and even mental health. However, it’s rare people think about their bone health! While taking care of your weight and other aspects of your general health can be great for your bones, knowing what to do and what not to do can ensure a long and pain-free life.  We should never underestimate the importance of strong bones. They help to keep the body strong and mobile, protect the organs, and store healthy calcium. Most people don’t realize that bones continue to change as we age, and the body works to build new bone while the old bone breaks down. Bone growth peaks when you turn 30 years old, and it’s much faster in younger people. So, what can you do to improve and preserve your own bone health?  Make Sure Your Diet Contains Enough Calcium Adults should consume 700mg of calcium a day, so you must make sure you’re consuming enough of it if you want to keep your bones super strong and healthy. You should get enough from a balanced, healthy diet, so try to make sure you’re getting your vegetables and eating foods rich in calcium like cheese.  Get Advice From A Professional It could be time to get advice from a professional or look into musculoskeletal services if you’re worried about your bone health. Take a look at a place like https://www.opaortho.com/ and you’ll get an idea of what an appointment could do for you.  Stay Active Staying active will help you to prevent osteoporosis and improve muscle structure, which in turn will protect the bones. You should aim for 150 minutes of moderate exercise each week, and do a mix of exercise types that you enjoy. Try not to sit down for too long either. If you’re sitting down for hours at a time, then it won’t matter if you go to the gym everyday - sitting for too long is still very bad for you! Boost Your Vitamin D Intake Vitamin D helps you to absorb calcium effectively, and we can get this from sunlight. However, most people don’t get enough sunlight as many of us work indoors! If you have a feeling that you don’t get enough vitamin D, it could be time to boost your intake with a supplement. In turn, you’ll strengthen your bone health, and you might even find that it has a profound effect on your mood.  Avoid Smoking and Alcohol Consumption Smoking and excess alcohol consumption is not going to do your bone health (or any aspect of your health) any favours. As few as one drink per day for women and two drinks per day for men amplifies your risk of osteoporosis. Smoking cigarettes also decreases the blood supply to the bones. Avoiding both will help you to stay healthier and happier.  Caring more about your bone health may not have been on your agenda before, but it’s definitely something you should look into if you want to live a long, happy life.
ESSENTIALAI-STEM
Bodybuilding Regimens – Proper Nutrition and Rest BFNMany people when they complete their regular bodybuilding routines believe that the straightforward exercise is enough to develop muscle cells, or control body fat. The truth of the matter is that going to the fitness center, or going through with their routine is practically the simplest component. It is very important making certain that you maintain appropriate nutrition and appropriate remainder! You must comprehend that during your workout is not really when you are really ‘getting stronger.’ It is when you are home, or outside of the health club when all this is happening. Where many people fail is that they do not have both proper nutrition and/or correct remainder to enable the muscle mass growth to develop beyond the fitness center. Protein, Carbohydrates, and fats are all converted into forms of energy which is crucial when entering into your common bodybuilding routines. Carbs are converted into glucose which is our bodies’ primary source of power. Protein and fat take longer to damage down and absorb, but is still exchanged a form of power. It is claimed that most people ought to absorb regarding 15-25% carbohydrates, 45-75% healthy protein, and 10-30% fats. Let is enter into more detail concerning carbohydrates and healthy proteins: • Proteins: You will discover more protein besides water than any other compound in the human body. Healthy protein is made use of to fix, keep and build body cells. The factor this is so crucial is since when you are experiencing your normal bodybuilding regimens, the workouts are actual damaging down and tearing your muscle tissue. The healthy protein is made use of in your off-time and throughout rest to repair and rebuild the muscle. Now the way our body works, is that when we get injuries tearing your muscle mass the healthy protein is most likely to reconstruct it more powerful compared to it previously remained in order to prevent injuries once more. This only occurs though offered correct rest and nutrition. • Carbohydrates: Carbohydrates are the bodies’ primary resource of power during your off time. There are 2 kinds of carbohydrates that are referred to as basic and facility. Basic carbs are made use of for fast energy; maybe something you would eat a hr or two before your usual BodyBuilding Food & Nutrition regimens fruit and juice. Facility carbohydrates are exactly what you would consume perhaps the evening before an early workout, or basically an excellent 5-6 hrs prior to workout. Complicated carbohydrates or foods even more like Starch, grains or vegetables. Facility make you really feel complete approximately after a dish, and take a few hours to digest and convert into power. An hour to an hour and a half after you bodybuilding regimens, you ought to consume a protein and complex carbohydrate dish. These two work terrific together, where the carbohydrates will certainly maintain you invigorated so the healthy protein can focus its work to muscle fixing and rebuilding. Also, you need to consume 5-6 meals a day, spread apart two and a half to 3 hours apart. In each of these 5-6 meals, you should eat about 50-70 grams of complex carbohydrates. Your protein consumption needs to include about 1.0-1.6 grams per pound of your body weight. Basically indicating if you weigh 175 extra pounds, you should eat 175 grams of protein minimum, and a maximum of 280 grams of protein.
ESSENTIALAI-STEM
 [Java教程]Java通过Mybatis实现批量插入数据到Oracle中 你的位置:首页 > Java教程 [Java教程]Java通过Mybatis实现批量插入数据到Oracle中 最近项目中遇到一个问题:导入数据到后台并将数据插入到数据库中,导入的数据量有上万条数据,考虑采用批量插入数据的方式; 结合网上资料,写了个小demo,文章末尾附上demo下载地址 1、新建项目:项目目录结构如下图所示,添加相应的jar包        2、新建数据库表:ACCOUNT_INFO    1 CREATE TABLE ACCOUNT_INFO (2 "ID" NUMBER(12) NOT NULL ,3 "USERNAME" VARCHAR2(64 BYTE) NULL ,4 "PASSWORD" VARCHAR2(64 BYTE) NULL ,5 "GENDER" CHAR(1 BYTE) NULL ,6 "EMAIL" VARCHAR2(64 BYTE) NULL ,7 "CREATE_DATE" DATE NULL 8 ) 3、创建AccountInfo实体类: 1 package com.oracle.entity; 2 3 import java.sql.Date; 4 5 public class AccountInfo { 6 private Long id; 7 private String userName; 8 private String password; 9 private String gender;10 private String email;11 private Date createDate;12 13 public Long getId() {14 return id;15 }16 17 public void setId(Long id) {18 this.id = id;19 }20 21 public String getUserName() {22 return userName;23 }24 25 public void setUserName(String userName) {26 this.userName = userName;27 }28 29 public String getPassword() {30 return password;31 }32 33 public void setPassword(String password) {34 this.password = password;35 }36 37 public String getGender() {38 return gender;39 }40 41 public void setGender(String gender) {42 this.gender = gender;43 }44 45 public String getEmail() {46 return email;47 }48 49 public void setEmail(String email) {50 this.email = email;51 }52 53 public Date getCreateDate() {54 return createDate;55 }56 57 public void setCreateDate(Date createDate) {58 this.createDate = createDate;59 }60 61 @Override62 public String toString() {63 return "AccountInfo [id=" + id + ", userName=" + userName64 + ", password=" + password + ", gender=" + gender + ", email="65 + email + ", createDate=" + createDate + "]";66 }67 68 } 4、新建接口映射类:AccountInfoMapper.java 1 package com.oracle.mapper; 2 3 import java.util.List; 4 5 import com.oracle.entity.AccountInfo; 6 7 public interface AccountInfoMapper { 8 /** 9 * 查询所有的数据10 * @return11 */12 List<AccountInfo> queryAllAccountInfo();13 14 /**15 * 批量插入数据16 * 17 * @param accountInfoList18 * @return19 */20 int batchInsertAccountInfo(List<AccountInfo> accountInfoList);21 }   5、创建mybatis配置文件:mybatis-configuration. 1 <??> 2 <!DOCTYPE configuration PUBLIC "-//mybatis.org//DTD Config 3.0//EN" "http://mybatis.org/dtd/mybatis-3-config.dtd"> 3 <configuration> 4 <environments default="development"> 5 <environment id="development"> 6 <transactionManager type="JDBC" /> 7 <dataSource type="POOLED"> 8 <property name="driver" value="oracle.jdbc.driver.OracleDriver" /> 9 <property name="url" value="jdbc:oracle:thin:@localhost:1521:orcl" />10 <property name="username" value="xxx" />11 <property name="password" value="xxx" />12 </dataSource>13 </environment>14 </environments>15 <mappers>16 <mapper resource="config/AccountInfoMapper. />17 </mappers>18 </configuration> 6、创建接口映射配置文件:AccountInfoMapper. Oracle的批量插入数据库跟MySQL不一样, MySQL: INSERT INTO ACCOUNT_INFO(ID, USERNAME,PASSWORD,GENDER, EMAIL,CREATE_DATE)values(,,,,,,)(,,,,,,,) Oracle: INSERT INTO ACCOUNT_INFO(ID, USERNAME,PASSWORD,GENDER, EMAIL,CREATE_DATE) (select 1,,,,,, from dual union all select 1,,,,,, from dual)   1 <??> 2 <!DOCTYPE mapper PUBLIC "-//mybatis.org//DTD Mapper 3.0//EN" "http://mybatis.org/dtd/mybatis-3-mapper.dtd"> 3 <mapper namespace="com.oracle.mapper.AccountInfoMapper"><!-- 接口的全类名 --> 4 <!-- type:实体类的全类名 --> 5 <resultMap id="BaseResultMap" type="com.oracle.entity.AccountInfo"> 6 <id column="ID" property="id" jdbcType="DECIMAL" /> 7 <result column="USERNAME" property="userName" jdbcType="VARCHAR" /> 8 <result column="PASSWORD" property="password" jdbcType="VARCHAR" /> 9 <result column="GENDER" property="gender" jdbcType="CHAR" />10 <result column="EMAIL" property="email" jdbcType="VARCHAR" />11 <result column="CREATE_DATE" property="createDate" jdbcType="DATE" />12 </resultMap>13 <!-- id 跟接口中的方法名称保持一致 -->14 <select id="queryAllAccountInfo" resultMap="BaseResultMap">15 select ID,16 USERNAME,PASSWORD,17 GENDER, EMAIL, CREATE_DATE from ACCOUNT_INFO18 </select>19 <insert id="batchInsertAccountInfo" parameterType="java.util.List">20 INSERT INTO ACCOUNT_INFO(ID, USERNAME,PASSWORD,GENDER, EMAIL,CREATE_DATE)21 (22 <foreach collection="list" index="" item="accountInfo"23 separator="union all">24 select25 #{accountInfo.id},26 #{accountInfo.userName},27 #{accountInfo.password},28 #{accountInfo.gender},29 #{accountInfo.email},30 #{accountInfo.createDate}31 from dual32 </foreach>33 )34 </insert>35 </mapper> 7、编写测试类: 1 package com.oracle.test; 2 3 import java.io.InputStream; 4 import java.sql.Date; 5 import java.util.ArrayList; 6 import java.util.List; 7 8 import org.apache.ibatis.io.Resources; 9 import org.apache.ibatis.session.SqlSession;10 import org.apache.ibatis.session.SqlSessionFactory;11 import org.apache.ibatis.session.SqlSessionFactoryBuilder;12 13 import com.oracle.entity.AccountInfo;14 import com.oracle.mapper.AccountInfoMapper;15 16 public class MybatisTest {17 public static void main(String[] args) throws Exception {18 String resource = "config/mybatis-configuration.;19 InputStream inputStream = Resources.getResourceAsStream(resource);20 SqlSessionFactory sessionFactory = new SqlSessionFactoryBuilder()21 .build(inputStream);22 SqlSession session = sessionFactory.openSession();23 AccountInfoMapper mapper = session.getMapper(AccountInfoMapper.class);24 List<AccountInfo> accountInfoList = mapper.queryAllAccountInfo();25 if (accountInfoList == null) {26 System.out.println("The result is null.");27 } else {28 for (AccountInfo personInfo : accountInfoList) {29 System.out.println(personInfo);30 }31 }32 mapper.batchInsertAccountInfo(generateData());33 session.commit();34 }35 36 static List<AccountInfo> generateData(){37 List<AccountInfo> result = new ArrayList<AccountInfo>();38 AccountInfo account = new AccountInfo();39 account.setId(3L);40 account.setUserName("zhangsanfeng");41 account.setPassword("123456");42 account.setGender("1");43 account.setEmail("zhangsanfeng@wudang.com");44 account.setCreateDate(new Date(System.currentTimeMillis()));45 result.add(account);46 47 account = new AccountInfo();48 account.setId(4L);49 account.setUserName("zhouzhiruo");50 account.setPassword("zhangwuji");51 account.setGender("0");52 account.setEmail("zhouzhiruo@emei.com");53 account.setCreateDate(new Date(System.currentTimeMillis()));54 result.add(account);55 56 account = new AccountInfo();57 account.setId(5L);58 account.setUserName("zhaomin");59 account.setPassword("zhangwuji");60 account.setGender("0");61 account.setEmail("zhaomin@yuan.com");62 account.setCreateDate(new Date(System.currentTimeMillis()));63 result.add(account);64 return result;65 }66 }  项目下载地址:http://download.csdn.net/detail/clqyhy/9553854
ESSENTIALAI-STEM
Why do I get sleepy when my blood sugar is high? When there is not enough insulin, or the insulin isn’t working effectively, it means the sugar in our blood cannot get into our cells and therefore our cells do not receive the energy they need. As a result, we feel tired. Do you get sleepy when your blood sugar is high? Fatigue is one of the most common symptoms of high blood sugar. In people with diabetes, it is referred to as diabetes fatigue. Many people with the condition feel tired all the time regardless of how well they sleep, how healthily they eat, or how much they exercise on a regular basis. How do you feel when your blood sugar is too HIgh? If your blood sugar level is too high, you may experience: 1. Increased thirst. 2. Frequent urination. 3. Fatigue. 4. Nausea and vomiting. 5. Shortness of breath. 6. Stomach pain. 7. Fruity breath odor. 8. A very dry mouth. IT IS IMPORTANT:  Can benzodiazepines cause high blood sugar? Why do diabetics get sleepy? With type 2 diabetes, poor blood sugar control typically results in hyperglycemia or high blood sugar, which can cause fatigue among other symptoms. Should I go to the hospital if my blood sugar is over 300? According to the University of Michigan, blood sugar levels of 300 mg/dL or more can be dangerous. They recommend calling a doctor if you have two readings in a row of 300 or more. Call your doctor if you’re worried about any symptoms of high blood sugar. What should I eat if my sugar is high? Here are seven foods that Powers says can help keep your blood sugar in check and make you happy and healthy to boot. • Raw, Cooked, or Roasted Vegetables. These add color, flavor, and texture to a meal. … • Greens. … • Flavorful, Low-calorie Drinks. … • Melon or Berries. … • Whole-grain, Higher-fiber Foods. … • A Little Fat. … • Protein. Does drinking water help lower blood sugar? Drinking water regularly may rehydrate the blood, lower blood sugar levels, and reduce diabetes risk ( 20 , 21 ). What is the highest blood sugar level that is safe? The highest blood sugar level that’s considered safe will depend on the person and whether they have diabetes, but will typically be between 160 to 240 mg/dL. Normal blood sugar levels for adults. Normal blood sugar levels for adults Before meal 70-130 1-2 hours after eating Less than 180 Bedtime 100-140 At what sugar level is diabetic coma? A diabetic coma could happen when your blood sugar gets too high — 600 milligrams per deciliter (mg/dL) or more — causing you to become very dehydrated. It usually affects people with type 2 diabetes that isn’t well-controlled. IT IS IMPORTANT:  Frequent question: Why are foot soaks bad for diabetics? Does metformin make you sleepy? As already discussed, metformin can result in sleep disturbance, and this might affect normal dream patterns. Nightmares are reported in patients receiving metformin. [7] However, they are less frequent than insomnia. How many hours should a diabetic sleep? To keep your blood sugar in balance, try to get at least 7 hours of sleep each night. If you work at night or have rotating shifts: Try to maintain regular meal and sleep times, even on your days off, if you can. Is 188 blood sugar high after eating? Scale of normal blood sugar range Hyperglycemia occurs when the blood sugar is above 130 mg/dL while fasting, or greater than 180 mg/dL after eating a meal. American Diabetes Association Glucose Goals for people with Diabetes: Before meals or fasting: 70 to 130 mg/dL. What is an alarming blood sugar level? In general, a blood sugar reading of more than 180 mg/dL or any reading above your target range is too high. A blood sugar reading of 300 mg/dL or more can be dangerous. If you have 2 readings in a row of 300 or more, call your doctor. Is 200 blood sugar normal after eating? Less than 140 mg/dL (7.8 mmol/L) is normal. 140 to 199 mg/dL (7.8 mmol/L and 11.0 mmol/L) is diagnosed as prediabetes. 200 mg/dL (11.1 mmol/L) or higher after two hours suggests diabetes. What if your blood sugar is over 400? Glucose builds up in the blood if there is not enough insulin to move glucose into your cells. During an episode of ketoacidosis, it is common for blood sugar to rise to a level over 400 milligrams per deciliter. When blood sugar levels are so high, some sugar “overflows” into the urine. IT IS IMPORTANT:  Frequent question: Can depression make your blood sugar high?
ESSENTIALAI-STEM
Mean Jeans Mean Jeans are a Portland, Oregon-based punk rock band formed in 2006 by guitarist Billy Jeans and drummer Jeans Wilder. They are known for their loud, humorous, fun-loving songs, and for their music's intentional resemblance to that of the Ramones. Studio albums * Are You Serious? (Dirtnap, 2009) * On Mars (Dirtnap, 2012) * Tight New Dimension (Fat Wreck Chords, 2016) * Jingles Collection (Fat Wreck Chords, 2018) * Gigantic Sike (Fat Wreck Chords, 2019) * Blasted (Fat Wreck Chords, 2024) Singles * Stoned 2 the Bone (Rehab single, 2008) * Tears in My Beers/Cool 2 Drive (Trouble in Mind single, 2010) EPs * License to Chill (Dirtnap EP, 2009)
WIKI
Two teenagers questioned after girl, 17, is stabbed to death | UK news | The Guardian Helen Pidd Thursday 21 June 2007 18.59 EDT The two girls were arrested at the scene and were yesterday being held at separate south London police stations as the murder investigation began. A Metropolitan police spokesman said they were known to the victim, but refused to confirm the nature of their relationship to her. Police were called to a disturbance in Mann Close, Croydon, just before 8pm on Tuesday. By the time officers arrived Sian had been punched and then stabbed. She was given first aid on the scene by paramedics but was pronounced dead at Mayday hospital. One woman, who lives just yards from the scene, said: The blade was the only thing you saw. It was the like the biggest one you have in your kitchen. She added: She was screaming at first. Then she staggered over to some railings. She fell on the floor. It was horrendous. Sian's uncle, Leroy Simpson, 49, said his niece was a family-orientated girl who had just finished her A-levels at a local sixth form college. She was the eldest of five children and lived with her grandmother in Croydon. It's devastating because she was such a nice kid, he said. Her aunt, Cheryl Simpson, said: She wanted to be an accountant. She said she used to help her father with his accounts. Speaking yesterday outside Sian's home in south Croydon her cousin, Darren Simpson, said she would be remembered as a happy and peaceful girl. Mr Simpson, 27, said: She always had a smile on her face. She was a bubbly and chirpy 17-year-old. He added: It was definitely a tragic accident. She was never in any trouble. If she was the type of teen that got involved with gangs then maybe, but she wasn't. Chief Superintendent Mark Gore, borough commander of Croydon, said: I would like to take this opportunity to reassure the local community that tragic events such as this remain extremely rare in the town centre and we will continue to work in partnership with the local authority to keep Croydon town centre safe for all those who work and visit here. A note, left with some flowers at the scene of the stabbing, read: To my bigirl Sian. I love u so much an will never be 4gotten.
NEWS-MULTISOURCE
  Title K-Cl Cotransporters, Cell Volume Homeostasis, and Neurological Disease Document Type Article Publication Date 8-2015 Abstract K+-Cl cotransporters (KCCs) were originally characterized as regulators of red blood cell (RBC) volume. Since then, four distinct KCCs have been cloned, and their importance for volume regulation has been demonstrated in other cell types. Genetic models of certain KCCs, such as KCC3, and their inhibitory WNK-STE20/SPS1-related proline/alanine-rich kinase (SPAK) serine-threonine kinases, have demonstrated the evolutionary necessity of these molecules for nervous system cell volume regulation, structure, and function, and their involvement in neurological disease. The recent characterization of a swelling-activated dephosphorylation mechanism that potently stimulates the KCCs has pinpointed a potentially druggable switch of KCC activity. An improved understanding of WNK/SPAK-mediated KCC cell volume regulation in the nervous system might reveal novel avenues for the treatment of multiple neurological diseases. DOI 10.1016/j.molmed.2015.05.008 Find in your library Off-Campus WSU Users Share COinS      
ESSENTIALAI-STEM
The Devonshire Manuscript/Take hede be tyme leste ye be spyede f. [2r] 1  Take hede be tyme leste ye be spyede s1 2    yor lovyng Iyes cane {n'} not hide 3    at last the trwthe will sure be tryde * therefore take hede 4    for Som ther be of crafite Kynde 5    thowe yow shew no parte of yor mynde 6    sewrlye there Ies ye can te not nott blynde * therefore take hede * for in lyke case there sselv of dyveris skools 7    ffor in lyke case ther selves ha hathe bene 8    &amp; thoʒt thought ryght sure none had theym sene 9    but it was not as thye did wene2 * therefore take hede 10    all thowgth theye be of dyvers skoolles {es} 11 {es} use  &amp; will can yose all craftye toolles 12    at leynthe thye prove them selfs bott fooll * therefor take 13    yff theye myght take yow in that trape 14    theye wolde sone leve yet in yor lape 15    to love vnspyed ys but a happe * therefore th take hed TTh W3 Notes & Glosses 1. The shape of the "s" mark suggests that it was made by Margaret Douglas. 2. "Wene" means to think, surmise, or consider. 3. Th W: This is a designation, perhaps of authorship, by an unidentified hand. Commentary Attributed to Sir Thomas Wyatt, the poem was entered by H1 and is unique to this manuscript. An adaption of this poem appears as a ballad in a later Elizabethan manuscript, British Library Harley MS 7578 (fol. 116v), entitled "Tak hede by tym whiles youth doth Rayn." John Milsom suggests that this adaptation is a moralization of Wyatt's poem.
WIKI
'The Politician' trailer has a very dark take on high school politics (CNN)For those who think the 2020 campaign could do with some more witty one-liners, Netflix has released a trailer for its upcoming satire "The Politician." Ben Platt stars as a wealthy high-schooler so focused on winning his student body's presidential election that his own mother (Gwyneth Paltrow) comments that his "ambition frightens [her]." The trailer showcases his manipulative choice for a running mate (Zoey Deutch's Infinity Jackson), who may not always make the most politically correct comments. She also has a scene-stealing grandmother played by Jessica Lange. The series is created by Ryan Murphy, Brad Falchuk and Ian Brennan and is an early example of the projects to come to the streaming service since it entered a lucrative partnership with Murphy last year. The trio have a shared history of exploring the dark underbelly of high school, having worked together on the Fox musical hit "Glee." Nor is the subject new to Platt. He won a Tony Award for starring in the Broadway smash "Dear Evan Hanson." "The Politician" premieres September 27 on Netflix. Falchuk and Murphy are also involved in another politically-themed project: The next installment of FX's "American Crime Story," which will focus on the Bill Clinton impeachment.
NEWS-MULTISOURCE
Archaeologists Find World's Oldest Bread and were Surprised Early "haute cuisine" is thousands of years older than previously thought. Archaeologists have discovered what appears to be the birth of sophisticated cooking - at a Stone Age site in the Middle East, dating back some 14,400 years. Until around that time, it is likely that food was primarily consumed for nutritional purposes. Throughout most of prehistory, food gathering and processing appears to have been carried out in order to ensure that food consumption was safe and provided more energy than it cost people to make. It was essentially carried out to produce a net energy gain. But now, archaeologists have discovered the world's oldest bread - that was cooked and probably eaten in what appears to have been some sort of ultra-early ceremonial or religious complex. The discovery - at an archaeological site known as Shubayqa 1 in what is now desert in northeast Jordan - is particularly significant because wild cereal bread does not produce a net nutritional gain. It would have almost certainly cost the prehistoric people at Shubayqa 1 more energy to make than they would have gained by consuming it. It is therefore likely that it was among the very first "special" foods to be made not primarily for nutrition - but mainly for cultural and potentially social or ideological reasons. The bread - made 3,500 years before the birth of agriculture - is from an area and a time associated with the world's oldest monumental stone buildings (constructed between 15,500 and 14,000 years ago). The buildings - which were not typical of the majority of houses of that era - were probably constructed for communal ceremonies and rituals (perhaps including feasting associated with celebrating or commemorating the dead). The rare...
FINEWEB-EDU
Snow Lion The Snow Lion (sometimes spelled snowlion; ; ) is a celestial animal of Tibet. It is the emblem of Tibet, representing the snowy mountain ranges and glaciers of Tibet, and may also symbolize power and strength, and fearlessness and joy, east and the earth element. It is one of the Four Dignities. It ranges over the mountains, and is commonly pictured as being white with a turquoise mane. In Journey to the West published in 1592, Snow Lion is depicted as one of monster-spirits. As national emblem of Tibet From 1909 until 1959, a single snow lion or a pair of them was used as the national emblem of Tibet on coins, postage stamps, banknotes and the national flag of Tibet. The version shown on right with two Snow Lions was introduced by the 13th Dalai Lama in 1912 based on old military banners, and is still used by the Government of Tibet in Exile. The flag is popularly known as the Snow Lion Flag (gangs seng dar cha). In Tibetan culture Snow lion is frequently mentioned in Tibetan folk songs and proverbs. It is thought to live in the highest mountains as it is the "king of beasts" that would tower over other animals of the lower levels. Snow lions may also represent hermits and yogis who live high up in the mountains. Marpa was called to interpret the meaning when, "Tibet's great yogin, Milarepa, once had a prophetic dream which included a snow lion." Snow Lioness milk In Tibetan lore, two Tibetan culture heroes, Gesar and Milarepa, were said to have been raised by snow lioness. The milk of the Snow Lioness (Tibetan: Gangs Sengemo) is reputed to contain special nutrients to heal the body and restore it to harmony. Some holy medicinal remedies are believed to contain the essence of Snow Lioness milk. Her milk is also used to symbolise the Dharma and its purity, as Milarepa replies to a man seeking to buy the Dharma from him with expensive gifts: "I, the snow lioness who stays in snowy solitudes, Have milk which is like the essential nectar. In the absence of golden cups, I would not pour it in an ordinary vessel." Legend has it that the lioness produces milk from its paws, and the milk may pass into hollow balls given to the lioness to play with. This ball may be represented in Tibetan art as a three-coloured "wheel of joy" (dga' 'khyil). Snow Lion dance A form of lion dance found in the Tibetan areas is called the snow lion dance or Senggeh Garcham. The name seng ge and its related forms come from Sanskrit siṅha, and cham or garcham is a Buddhist ritual dance. The snow lion dance may be performed as a secular dance, or as a ritual dance performed by bon po monks. This dance may also be found among people in other Himalayan regions such as the Monpa people in Arunachal Pradesh, and in Sikkim where it is called Singhi Chham. In Buddhist art The lion was adopted as a symbol of Shakyamuni Buddha in early Buddhism; it is also depicted as a vehicle for a number of Vajrayana deities such as Vaishravana and Manjushri, and the lion throne may be found in many nirmanakaya Buddha forms. The lion in India art is represented in Tibetan Buddhist art as the Snow Lion. The Snow Lion is the protector of Buddha and in paintings and sculpture is usually seen as holding up the Buddha's throne (one on the left and one on the right of the throne.) The throne of a Buddha may also be depicted with eight Snow Lions representing the 8 main Bodhisattvas of Buddha Shakyamuni. The body of the Snow Lion is white while its flowing hair of mane, tail and curls on legs, is either blue or green. While most Snow Lions are gender neutral in Buddhist art there are some that are represented as obviously male and some as obviously female. When represented as a symmetrical pair the male is on the left and the female on the right. Sculptural Snow Lions are often in repousse metal that has been gilt and painted. Attributes The Snow Lion is a tulku or personification of the primordial playfulness of ananda "joy, bliss", comparable to the western unicorn. Though paradoxical, the Snow Lion does not fly but their feet never touch the ground; their existence is a playful continuum of leaping from mountain peak to mountain peak. The energetic potency (wisdom or shakti) of the Snow Lion is expressed in the attribute of the gankyil or "ananda-wheel" the Snow Lion keep in eternal play. The gankyil is the principal polyvalent symbol and teaching tool of all the doctrinal trinities of Dzogchen and is the energetic signature of the trikaya. The gankyil is the inner wheel of the Dharmacakra of the Ashtamangala path of Vajrayana Buddhism. Roar The roar of the Snow Lion embodies the sound of 'emptiness' (Sanskrit: Śūnyatā), courage and truth, and because of this is often a synonym for the Buddhadharma, the Buddha’s teachings, as it implies freedom from karma and the challenging call to awakening. It was considered to be so powerful that just a single roar could cause seven dragons to fall from the sky. Tibetan Lion Dog The Shih Tzu, Lhasa Apso and Tibetan Terrier are also called the Lion Dog which may be due to their resemblance to the Snow Lion. However it is unknown whether the dogs were bred to resemble the Snow Lion or if the artistic depiction of the Snow Lion was influenced by the features of the dogs.
WIKI