Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Kidney disease and chronic kidney disease (CKD) are conditions that cause a gradual loss of kidney function over time. Your kidneys have many important functions, but are primarily responsible for filtering waste products, excess water and other impurities of the blood. Approximately 30 million Americans suffer from kidney disease and CKD, of which nearly 50 percent have underlying conditions that contributed to their CKD. Which chronic diseases are related to kidney disease and CKD? The two main causes of kidney disease and CKD are diabetes and high blood pressure, because they damage blood vessels. When blood vessels in the kidneys are damaged, they are unable to work properly. If these conditions are left untreated, they can lead to kidney disease and CKD. There are many chronic diseases that can lead to CKD, including: • Lupus nephritis Lupus nephritisis inflammation of the kidney, which is caused by systemic lupus erythematous (SLE), commonly known as lupus. Lupus is an autoimmune disease that targets and attacks its own body tissues. • Glomerular/vascular disorders Glomerular/vascular disorders affect the blood vessels in the kidneys. These disorders may be caused by a direct result of an infection or a drug that is toxic to the kidneys. They may also result from a disease that affects the entire body, like lupus or diabetes. • Proteinuria & hematuria Proteinuria is a condition in which there is too much protein in your urine, and hematuria occurs when there is blood in your urine. Because they affect the blood vessels in the kidneys, they can cause a range of other health problems, including kidney disease and CKD. • Fluid & electrolyte disorders While fluid and electrolyte disorders are primarily caused by reduced kidney function, they can also result from insulin deficiency. The kidneys play an important role in the regulation of fluids and electrolytes. When they malfunction, they can cause imbalances that lead to serious health complications, such as kidney disease and CKD. • Kidney stones Kidney stones and other acute conditions of the kidney can lead to kidney disease, CKD and kidney failure, if they are not treated quickly and effectively. For expert chronic kidney disease management in San Antonio, call South Texas Renal Care Group at 210-212-8622 to schedule an appointment. Our goal is to slow the progression of kidney disease, and keep you as healthy as possible through leading-edge treatment programs.
ESSENTIALAI-STEM
User:Phxntxsos/Bipedalism rough draft (feb 10): Bold and italicized: my edit Evolution of human bipedalism[edit] 'The form and function of modern-day humans' upper bodies appear to have evolved from living in a more forested setting. Living in this kind of environment would have made it so that being able to travel arboreally would have been advantageous at the time. It has also been proposed that, like some modern-day apes, early hominins had undergone a knuckle-walking stage prior to adapting the back limbs for bipedality while retaining forearms capable of grasping. ' Numerous causes for the evolution of human bipedalism involve freeing the hands for carrying and using tools, sexual dimorphism in provisioning, changes in climate and environment (from jungle to savanna) that favored a more elevated eye-position, and to reduce the amount of skin exposed to the tropical sun.[41] Consequences[edit] Prehistoric fossil records show that early hominins first developed bipedalism before being followed by an increase in brain size.[83] The consequences of these two changes in particular resulted in painful and difficult labor due to the increased favor of a narrow pelvis for bipedalism being countered by larger heads passing through the constricted birth canal. This phenomenon is commonly known as the obstetrical dilemma. 'Non-human primates habitually deliver their young on their own, but the same cannot be said for modern-day humans. Isolated birth appears to be rare and actively avoided cross-culturally, even if birthing methods may differ between said cultures. This is due to the fact that the narrowing of the hips and the change in the pelvic angle caused a discrepancy in the ratio of the size of the head to the birth canal. The result of this is that there is greater difficulty in birthing for hominins in general, let alone to be doing it by oneself. ' Walking[edit] 'Unlike non-human apes that are able to practice bipedality such as Pan and Gorilla, hominins have the ability to move bipedally without the utilization of a bent-hip-bent-knee (BHBK) gait, which requires the engagement of both the hip and the knee joints. This human ability to walk is made possible by the spinal curvature humans have that non-human apes do not. Rather, w'alking is characterized by an "inverted pendulum" movement in which the center of gravity vaults over a stiff leg with each step. Force plates can be used to quantify the whole-body kinetic & potential energy, with walking displaying an out-of-phase relationship indicating exchange between the two. This model applies to all walking organisms regardless of the number of legs, and thus bipedal locomotion does not differ in terms of whole-body kinetics. Respiration[edit] 'Quadrupeds, unlike bipeds, cannot respire while moving. This is due to the fact that the impact of propelling themselves fall on their forelimbs. The closeness of the chest to the points of impact means that their organs would hit one another, which is not sustainable for running. Thus, they are only able to run in short bursts before having to rest. Humans, on the other, do not have that limitation. Due to the use of bipedality for locomotion, the impact of running or walking does not travel far enough to jar the organs in the chest cavity.' A biped has the ability to breathe while running, without strong coupling to stride cycle. Humans usually take a breath every other stride when their aerobic system is functioning. During a sprint the anaerobic system kicks in and breathing slows until the anaerobic system can no longer sustain a sprint. 'Respiration through bipedality means that there is better breath control in bipeds, which can be associated with brain growth. The modern brain utilizes approximately 20% of energy input gained through breathing and eating, as opposed to species like chimpanzees who use up twice as much energy as humans for the same amount of movement. This excess energy, leading to brain growth, also leads to the development of verbal communication. This is because breath control means that the muscles associated with breathing can be manipulated into creating sounds. This means that the onset of bipedality, leading to more efficient breathing, is the source of verbal language.' rough draft (feb 21) Lead: === I will be adding more information to the pre-existing sections in order to flesh out the article better. The sections I will be adding onto are the overview of "Evolution of Human Bipedalism," and the more specialized subsections "Consequences," "Walking," "Respiration," "Running," and "Musculature". === Running[edit] 'Early hominins underwent post-cranial changes in order to better adapt to bipedality, especially running. One of these changes is having longer hindlimbs proportional to the forelimbs and their effects. As previously mentioned, longer hindlimbs assist in thermoregulation by reducing the total surface area exposed to direct sunlight while simultaneously allowing for more space for cooling winds. Additionally, having longer limbs is more energy-efficient, since longer limbs mean that overall muscle strain is lessened. Better energy efficiency, in turn, means higher endurance, particularly when running long distances.' Running is characterized by a spring-mass movement. Kinetic and potential energy are in phase, and the energy is stored & released from a spring-like limb during foot contact, achieved by the plantar arch and the Achilles tendon in the foot and leg, respectively. Again, the whole-body kinetics are similar to animals with more limbs. Musculature[edit] Bipedalism requires strong leg muscles, particularly in the thighs. Contrast in domesticated poultry the well muscled legs, against the small and bony wings. Likewise in humans, the quadriceps and hamstring muscles of the thigh are both so crucial to bipedal activities that each alone is much larger than the well-developed biceps of the arms. In addition to the leg muscles, the increased size of the gluteus maximus in humans is an important adaptation as it provides support and stability to the trunk and lessens the amount of stress on the joints when running.
WIKI
Max 107.3 Max 107.3 is an Australian commercial radio station broadcasting to the Mid North Coast of New South Wales. Owned and operated by Broadcast Operations Group, the station broadcasts a hot adult contemporary music format with local breakfast and afternoon shows based from studios in Taree. History The station was first launched on 29 January 1997 as Max FM. The first song played on the station was "Good Times" by INXS & Jimmy Barnes. Under the ownership of Broadcast Operations Group, the station broadcasts a variety of local and networked programming, from network hubs based in Newcastle and Tweed Heads. Max 107.3 broadcasts on 107.3FM across the Mid North Coast of New South Wales, ranging from Port Macquarie in the north through to Bulahdelah in the south. The station competes with sister station 2RE, as well as hit102.3, Radio 531 and Triple M from Port Macquarie. In September 2018, the station relaunched as Max 107.3, transitioning to a hot adult contemporary music format in line with its sister stations, including New FM Newcastle. Previously, the station broadcast a contemporary hit radio format during local hours. As of August 2022, talent Scott Frappell (Frappers) joined the team. With success in the Sydney market, he has made his way to Taree to drive us home. Transmitters Max 107.3 is broadcast via one full power station, and one repeater station.
WIKI
Demon Slayer: Kimetsu no Yaiba season 4 Demon Slayer: Kimetsu no Yaiba is a Japanese anime television series based on Koyoharu Gotouge's manga series of the same name. At the end of the third season finale, a fourth season covering the manga's "Hashira Training" arc was announced. The fourth and final season, titled Demon Slayer: Kimetsu no Yaiba – Hashira Training Arc, adapts from the 15th and 16th volumes (chapters 128–139) of the manga. It premiered on May 12, 2024, with a one-hour episode. The season ended with a one-hour special, which aired on June 30 of the same year. The season follows Tanjiro and his allies as they enter "Hashira Training"; an organized regimen led by the Hashira to prepare them for the coming conflict against Muzan Kibutsuji, who continues to search for Nezuko and Kagaya Ubuyashiki. A compilation film titled Demon Slayer: Kimetsu no Yaiba – To the Hashira Training, which includes footage from the final Swordsmith Village Arc episode and an advanced screening of the first Hashira Training Arc episode, premiered in Japanese theaters on February 2, 2024. Aniplex of America licensed the season outside of Asia and streamed it on Crunchyroll, which began streaming an English dub on June 30, 2024. The opening theme song is "Mugen" (夢幻), while the ending theme is "Tokoshie" (トコシエ), both performed by My First Story and Hyde.
WIKI
Afrin District Afrin District (منطقة عفرين, Kurdish: Herêma Efrînê) is a district of Aleppo Governorate in northern Syria. The administrative centre is the city of Afrin. At the 2004 census, the district had a population of 172,095. Syria's Afrin District fell under the control of the People's Protection Units (YPG) around 2012 and an "Afrin Canton" was declared in 2014, followed by an "Afrin Region" in 2017. During Operation Olive Branch, the entire district was captured by Turkey and its allies. History The area around Afrin developed as the center of a distinctive Sufi tradition. In modern post-independence Syria, the Kurdish society of the district was subject to heavy-handed Arabization policies by the Damascus government. Syrian civil war In the course of the Syrian civil war, Damascus government forces pulled back from the district in spring 2012 to give way to the People's Protection Units (YPG) and autonomous self-government under the Autonomous Administration of North and East Syria, which was formally declared on 29 January 2014. Until 2018, violence in Afrin was minor, involving artillery shelling by Jabhat al-Nusra as well as by Turkey. Afrin was captured by the Turkish Land Forces and Syrian National Army (SNA) as a result of the 2018 Afrin offensive. Tens of thousands of Kurdish refugees fled from Afrin City before its capture by the SNA in March 2018, and the YPG vowed to retake it. The YPG subsequently announced its intention to start a guerrilla war in Afrin, leading to the SDF insurgency in Northern Aleppo. The region has seen human rights abuses, including kidnappings ethnic cleansing, torture, forced evictions and killings since the start of Turkish occupation in Afrin. Demographics In the 1930s, Kurdish Alevis who fled the persecution of the Turkish Army during the Dersim Massacre, settled in Maabatli in the Afrin District. Prior to the Syrian Civil War, the population of the Afrin District area was overwhelmingly ethnic Kurdish, to the degree that the district had been described as "homogeneously Kurdish". The overall population of Afrin Canton, based on the 2004 Syrian census, was about 200,000. Cities and towns with more than 10.000 inhabitants according to the 2004 Syrian census are Afrin (36,562) and Jandairis (13,661). Throughout the course of the Syrian Civil War, the Afrin District served as a safe haven for inbound refugees of all ethnicities. According to a June 2016 estimate from the International Middle East Peace Research Center, about 316,000 displaced Syrians of Kurdish, Yazidi, Arab and Turkmen ethnicity lived in Afrin Canton at the time. After the Turkish-led forces had captured Afrin in early 2018, they began to implement a resettlement policy by moving their mostly Arab fighters and refugees from southern Syria into the empty homes that belonged to displaced locals. The previous owners, most of them Kurds or Yazidis, were often prevented from returning to Afrin. Refugees from Eastern Ghouta, Damascus, told Patrick Cockburn of The Independent that they were part of "an organised demographic change" which was said to replace the Kurdish population of Afrin with an Arab majority. Economy A diverse agricultural industry is at the heart of the Afrin District's economy, traditionally olives in particular, and more recently there has been a focus on increasing wheat production. A well-known product from the area is Aleppo soap, a hard soap made from olive oil and lye, distinguished by the inclusion of laurel oil. While the Afrin District has been the source of olive oil for Aleppo soap since antiquity, the destruction caused by the Syrian Civil War to other parts of Aleppo governorate increasingly made the entire production chains locate in Afrin District. At the height of the fighting for Aleppo, up to 50 percent of the city's industrial production was moved to the Afrin District. As of early 2016, two million pairs of jeans were produced per month and exported across Syria. In January 2017, 400 textile industry workshops counted 17,000 employees, supplying the whole of Syria. In 2015 there were 32 tons of Aleppo soap produced and exported to other parts of Syria, but also to international markets. Tourism Afrin District also served as a center for domestic tourism due to its beautiful landscapes. The tourism was however somewhat constricted due to the YPG's tight control of the borders, and the war; local tourism mostly collapsed during the Turkish invasion of 2018. Subdistricts The district of Afrin is divided into seven subdistricts or nawāḥī (population as of 2004 ):
WIKI
Cane Tago Cane Tago ("The Dog Tago") is a statue erected in Bologna, Italy, in 1777. It was the work of Luigi Acquisti, commissioned by the marquis Tommaso dè Buoi, to celebrate the fidelity of his German Weimaraner hound. The dog had fallen from the windowsill in joy at seeing its master returning from a long journey. The terracotta statue was placed on the spot where the dog was supposed to have fallen, at the de’ Buoi’House, now the seat of the Cultural Department of the Municipality of Bologna in via Oberdan 24. After 200 years, atmospheric damage necessitated restoration, and the statue was subsequently displayed at the local Museum of Archeology. It is now at the Collezioni Comunali d’Arte, inside Palazzo d'Accursio.
WIKI
testmd command Version: v0.0.0-...-84aa581 Latest Latest Warning This package is not in the latest version of its module. Go to latest Published: Sep 23, 2019 License: MIT Imports: 7 Imported by: 0 README Test Status GoDoc codecov Go Report Card Test is a simple golang test utils package. test.File test.File implements a simple file testing utility that: 1. reads input file in the testdata/ directory into a string 2. runs this against the provided test function 3. compares against the contents of the output file (also in the testdata/ directory) 4. reports discrepancies in the diff format (such as the one used by git) It also accepts a -golden flag which when specified skips the comparison and instead saves the output provided by the function into the output file. This makes creation of initial output files and updates relatively easy test.Markdown Markdown() converts a set of code snippets in markdown into test cases. For example: if len("hello") != 5 { fmt.Println("This should not happen") } // Output: The above snippet is converted to an ExampleXXX() which runs the code. Snippets can also be named, with ability to import code from elsewhere: // import runtime _, fname, _, _ := runtime.Caller(1) if fname == "" { t.Error("Could not find caller info") } The name of the snippet must be TestXYZ or ExampleXYZ or just a plain function (presumably for use in other snippets). Two sepcial cases are "skip" to indicate the fence block should not be considered testable and "global" to indicate the fence block is a global variable: // this has sample code that is not expected to compile booya fmt.Println("ok", stranger()) // Output: ok stranger If the info name has a dot in it, the word before the dot is compared to the package name. If they don't match the fence block is skipped. This allows a single markdown to have multiple fence blocks destined for different packages: ... ... Documentation Overview Command testmd generates test files out of markdown snippets $ go get github.com/tvastar/test/cmd/testmd This is useful when writing tutorials in markdown and making sure all the tutorials remain valid as the code underneath changes If no output file is specified (via -o), a temporary go file is generated and it is immediately run via `go test`. Any additional arguments are passed through to go test. If a package name is provided and it does not include '_test', it will be assumed to be a runnable go program and "go run" will be used instead of "go test". The snippets of code must use the markdown code fence with an info string starting with "go" (i.e. go or golang) Additional fields on the info string can provide the name of the test: “`golang TestSomething ..some stuff here.. “` If the name starts with anything but Test, an empty function with no args is produced which conveniently works for Examples Global variables can be introduced by using the special name of global: “`golang global var hidden := flag.Bool("hidden", false, "is it hidden?") “` Snippets can be marked to be ignored: “`golang skip ..some stuff here.. “` A single markdown can be used to generate multiple package entries. A snippet can be designated as being limited to a specific package by using the name of the package: “`golang script_one.global ..some stuff here.. “` The snippet above will only be included if the package name is script_one. This is useful when describing multiple main package options in one tutorial. Snippets can indicate import paths via a comment: “`golang // import fmt ..some stuf here.. “` Usage: $ testmd -pkg readme_test -o readme_test.go *.md $ testmd README.md -v Note: all options must come before the markdown file names. Any options provided after the markdown file names will be passed through to `go test` (if no output is specified). Source Files Jump to Keyboard shortcuts ? : This menu / : Search site f or F : Jump to t or T : Toggle theme light dark auto y or Y : Canonical URL
ESSENTIALAI-STEM
Page:Tracts for the Times Vol 2.djvu/554 4 What if even in antiquity itself there be two or three men, nay one community, or even province, discovered in error? Then he will be careful to prefer to the rashness or ignorance of the few (if so be) the ancient decrees (i.e. in Council) of the Universal Church. What if a case arises when no such acts of the Church are found? then he will do his best to compare and search out the opinions of the ancients; of those, that is, who in various times and places, remaining in the faith and communion of the one Catholic Church, are the most trustworthy authorities; and, whatever, not one or two, but all alike, with one consent, held, wrote, and taught, and that openly and perseveringly, that he will understand is to be believed without any hesitation. [Take, for instance, the case of the Society of Friends (so called); they reject baptism altogether; so did some heretics of the second century, whom Tertullian wrote against (vide Records, No. 22); yet that of course is no defence of them against the general consent of the Doctors of the Church. Or again, the authority of Jerome, who wrote in the fourth century, is brought by some Anti-Episcopalians, to justify their rejection of Bishops: but, were he ever so clearly for them, (which we by no means allow) yet his authority would go for nothing against the consent of the ancient teachers.] Let us seriously dread to incur the guilt of altering the faith and violating religious truth, which we are warned against by the judgment of Apostolic authority as well as by the received rule of the Church. All know how seriously, how sternly, how forcibly the blessed Apostle Paul inveighs against certain light-minded men, who had passed with strange rapidity from him who called them to the grace of, into another Gospel which was not another, who had heaped to themselves masters at their own pleasure, turning away the ear from the truth and converted to fables, having damnation, because they had made void their first faith. When, then, such men went about provinces and cities, offering their lying doctrines for sale, and at length came to the Galatians, and the Galatians seized somehow with a nausea of Divine truth, and putting away the manna of the Apostolic and Catholic doctrine, refreshed themselves with the filth of
WIKI
Talk:Boltysh crater Add Crater Infobox? Someone may want to apply crater template --YakbutterT (talk) 23:25, 18 February 2010 (UTC) * Done. Tim Pierce (talk) 17:01, 4 May 2010 (UTC) pronunciation Please: Ukranian pronunciation of "Boltysh." — Preceding unsigned comment added by Ntnglmnt (talk • contribs) 07:14, 8 December 2013 (UTC) Geological Time The Cretaceous-Paleogene boundary has recently been reappraised to 66 mya, so many of the speculations made in this article are no longer valid. Please consider reassessment. Gruekiller (talk) 08:07, 13 December 2013 (UTC)
WIKI
Reference : Formal Framework for Verifying Implementations of Byzantine Fault-Tolerant Protocols ... Dissertations and theses : Doctoral thesis Engineering, computing & technology : Computer science Security, Reliability and Trust http://hdl.handle.net/10993/43529 Formal Framework for Verifying Implementations of Byzantine Fault-Tolerant Protocols Under Various Models English Vukotic, Ivana mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >] 20-May-2020 University of Luxembourg, ​Esch sur Alzette, ​​Luxembourg DOCTEUR DE L’UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE 143 + 52 Esteves-Verissimo, Paulo mailto Ryan, Peter Y A mailto Volp, Marcus mailto Merz, Stephan mailto Rushby, John mailto Rahli, Vincent mailto Correia, Miguel mailto [en] Fault-tolerance ; Byzantine fault ; SM ; PBFT ; MinBFT ; Formal verification ; Compositional reasoning ; Coq ; Knowledge calculus ; Monad ; Step-indexing ; Hybrid protocols [en] The complexity of critical systems our life depends on (such as water supplies, power grids, blockchain systems, etc.) is constantly increasing. Although many different techniques can be used for proving correctness of these systems errors still exist, because these techniques are either not complete or can only be applied to some parts of these systems. This is why fault and intrusion tolerance (FIT) techniques, such as those along the well-known Byzantine Fault-Tolerance paradigm (BFT), should be used. BFT is a general FIT technique of the active replication class, which enables seamless correct functioning of a system, even when some parts of that system are not working correctly or are compromised by successful attacks. Although powerful, since it systematically masks any errors, standard (i.e., ``homogeneous'') BFT protocols are expensive both in terms of the messages exchanged, the required number of replicas, and the additional burden of ensuring them to be diverse enough to enforce failure independence. For example, standard BFT protocols usually require 3f+1 replicas to tolerate up to f faults. In contrast to these standard protocols based on homogeneous system models, the so-called hybrid BFT protocols are based on architectural hybridization: well-defined and self-contained subsystems of the architecture (hybrids) follow system model and fault assumptions differentiated from the rest of the architecture (the normal part). This way, they can host one or more components trusted to provide, in a trustworthy way, stronger properties than would be possible in the normal part. For example, it is typical that whilst the normal part is asynchronous and suffers arbitrary faults, the hybrids are synchronous and fail-silent. Under these favorable conditions, they can reliably provide simple but effective services such as perfect failure detection, counters, ordering, signatures, voting, global timestamping, random numbers, etc. Thanks to the systematic assistance of these trusted-trustworthy components in protocol execution, hybrid BFT protocols dramatically reduce the cost of BFT. For example, hybrid BFT protocols require 2f+1 replicas instead of 3f +1 to tolerate up to f faults. Although hybrid BFT protocols significantly decrease message/time/space complexity vs. homogeneous ones, they also increase structural complexity and as such the probability of finding errors in these protocols increases. One other fundamental correctness issue not formally addressed previously, is ensuring that safety and liveness properties of trusted-trustworthy component services, besides being valid inside the hybrid subsystems, are made available, or lifted, to user components at the normal asynchronous and arbitrary-on-failure distributed system level. This thesis presents a theorem-prover based, general, reusable and extensible framework for implementing and proving correctness of synchronous and asynchronous homogeneous FIT protocols, as well as hybrid ones. Our framework comes with: (1) a logic to reason about homogeneous/hybrid fault-models; (2) a language to implement systems as collections of interacting homogeneous/hybrid components; and (3) a knowledge theory to reason about crash/Byzantine homogeneous and hybrid systems at a high-level of abstraction, thereby allowing reusing proofs, and capturing the high-level logic of distributed systems. In addition, our framework supports the lifting of properties of trusted-trustworthy components, first to the level of the local subsystem the trusted component belongs to, and then to the level of the distributed system. As case studies and proofs-of-concept of our findings, we verified seminal protocols from each of the relevant categories: the asynchronous PBFT protocol, two variants of the synchronous SM protocol, as well as two versions of hybrid MinBFT protocol. Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Critical and Extreme Security and Dependability Research Group (CritiX) Researchers ; Professionals ; Students ; General public http://hdl.handle.net/10993/43529 FnR ; FNR8149128 > Paulo Esteves-Veríssimo > IISD > Strategic RTnD Program on Information Infrastructure Security and Dependability > 01/01/2015 > 31/12/2019 > 2014 File(s) associated to this reference Additional material(s): File Commentary Size Access Open access thesis+code.zip5.26 MBView/Open Bookmark and Share SFX Query All documents in ORBilu are protected by a user license.    
ESSENTIALAI-STEM
Waterboys sing William Butler Yeats | Concert Preview | Soundposts | Seattle Times A blog for Seattle music lovers of all stripes, from hip-hop and indie rock to jazz and world music. (Paul MacManus) The Waterboys' founder Mike Scott first found himself falling in love with the words of Irish poet William Butler Yeats as a teenager growing up in Edinburgh, Scotland. It took him nearly 30 years, but Scott found a way to properly honor his boyhood idol by recording An Appointment With Mr. Yeats, an album of the bard's poems set to The Waterboys' unique blend of rock and Celtic folk music. The Waterboys play the Neptune Friday, the first time they've visited Seattle in six years. My mother is an English literature college professor, so I grew up in a house full of books even before I went to school, Scott said. My mother always mentioned this guy Yeats. Eventually I checked him out and by that time he was almost like a friend of the family, he'd been spoken about so much. As a teenager, Scott didn't understand all of the themes Yeats explored, but what he did pick up on was Yeats' exquisite use of language. When it came time to create an album on Yeats poems, Scott drew on his experience setting a couple of the poet's songs to music, as well as adapting the poems of Robert Burns and George MacDonald into songs. The key, Scott said, is letting the poem dictate things. The album's first track, for example, The Hosting Of The Shee, has a cadence that shaped the song's driving horns and drums. The biggest challenge was not to get in the way, he said. In every case, the poems themselves suggested the rhythms and the melody. I went with where those suggestions went. I didn't obstruct that flow. Since the formation of the band in 1983, dozens and dozens of musicians have been members of the Waterboys. It's a revolving door of international talent just like Scott imagined it would be at the very start. In my mind that was the natural way for an artist or band to be, to keep evolving or changing with the music, Scott said. I didn't want to be tied down with a fixed lineup, I wanted to be able to change musicians like (Bob) Dylan had. I would have made some really bad (expletive) records if I'd kept the same lineup the whole time. However, one musician has been a Waterboys fixture since 1985: fiddler Steve Wickham. He's had a profound influence on the band's sound. He was the key to us becoming a band that could improvise on stage and in the studio, Scott said, adding that Wickham led the band into their Fisherman's Blues period. He brought an instrumental eloquence that was crucial and that I'm still grateful for to this day. Since it's been so long since the band has toured America, Scott said that they'll play a few cuts off the new album but will sprinkle in plenty of fan favorites. I really do like playing for American audiences, Scott said. They really know their music so well, and for me and the boys from Europe it's so great to play in American cities because of the great musical heritage, like in Seattle and Austin. It's a real thrill for us. The Waterboys 9 p.m. Friday at the Neptune Theatre, 1303 N.E. 45th St., Seattle; $35(877-784-4849 or www.stgpresents.org). Comments | More in Folk, Rock/Pop | Topics: Concert Preview, Mike Scott, The Waterboys Click here to read the past comments No personal attacks or insults, no hate speech, no profanity. Please keep the conversation civil and help us moderate this thread by reporting any abuse. See our Commenting FAQ. 206UPAmerican Standard TimeAnother Rainy SaturdayBackbeatCity of Seattle Office of Film + MusicCountry UniverseEarshot JazzGene StoutGuerrilla CandyHearth MusicInside Right WristKEXPKMPSLine Out No DepressionNada MuchoPastePitchforkReverbRollingStone.comSSG MusicSeattle Music insiderSEA Live MusicSeismic SoundSound on the SoundStereogumThree Imaginary GirlsThe Finest Kiss Recent Activity Take a minute to subscribe and continue to enjoy The Seattle Times for as little as 99 cents a week. We've got good news for you. Unlimited seattletimes.com content access is included with most subscriptions. We hope you have enjoyed your complimentary access. For unlimited seattletimes.com access, please upgrade your digital subscription. Call customer service at 1.800.542.0820 for assistance with your upgrade or questions about your subscriber status. We hope you have enjoyed your complimentary access. Subscribe now for unlimited access! We've got good news for you. Unlimited seattletimes.com content access is included with most subscriptions. Today's front page (PDF) The Seattle Times Network: seattletimes.com | Jobs | Autos | Homes | Classifieds | Rentals | Personals Copyright 2012The Seattle Times | Advertise with us | Privacy statement | Terms of service
NEWS-MULTISOURCE
Fairfax-backed Digit Insurance files draft papers for India IPO Adds background, details from filing BENGALURU, Aug 16 (Reuters) - India's Digit Insurance, backed by Canadian billionaire Prem Watsa's Fairfax Group, has filed for an initial public offering, papers submitted to the market regulator showed on Tuesday. Founded in 2017, Digit is trying to expand its presence in India's under-penetrated general insurance market by offering a better customer experience including easier claim settlements. The IPO consists of a fresh issue of shares worth 12.5 billion rupees, while existing shareholders will sell up to 109.4 million shares, the prospectus showed. The total IPO is likely to be worth 35 billion rupees ($440 million), according to a person with direct knowledge of the matter. Digit Insurance declined to comment on the IPO's size. Reuters first reported on May 25 about Digit Insurance's plans to raise $500 million via an IPO. Morgan Stanley MS.N and local investment banks ICICI Securities ICCI.NS, Axis Capital, Edelweiss Financial Services EDEL.NS, HDFC Bank HDBK.NS and IIFL Securities IIFS.NS are managing the IPO. ($1 = 79.4210 Indian rupees) (Reporting by Chris Thomas in Bengaluru and M. Sriram in Mumbai; Editing by Subhranshu Sahu and Tom Hogue) ((chris.thomas@thomsonreuters.com; +91 80 6210 0487;)) The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
      Windows C drive is the most common place where the Windows system files take place. Many people also store all kinds of software installation files in the C drive. Sometimes, we download files, and our browser stores these files on the C drive naturally. But the C drive doesn't have unlimited space more often, and it's obvious to run out of space when you keep installing games or software in the same drive. If you are also facing the same problem, running out of space or you want to move games from C drive to D drive then we are here to help. In this article, we are going to talk about how to transfer games from C drive to D drive using multiple guidelines. Read till the end to get the exclusive idea of the whole issue, and solve it easily. Is It Good to Save Games on C Drive? Should I Change Location? To be frank, no. It's not good to save games on C drive, and you should change location. No matter what you do, one thing is certain that your Windows system files are on C drive. So when you keep saving games on C drive, you'll find the lagging issues on your system, or it will become slow eventually. So if you don't want your computer to slow down, or you don't want it to provide laggy performance all the time, then it's wise not to save games on C drive. Instead, you can change the location when you install a game or save it on D drive, which will help you keep the system C drive clean and smooth. So you can have perfect experience on your computer, no matter what you do with it. How to Transfer Games from C Drive to D Drive?  Many people want to move games from C drive to D drive. To do that, you must follow some step-by-step guidelines so that you can successfully transfer the full game data. This part of the article will show you the solutions on how to transfer games from C drive to D drive. Method 1. Move Games from C Drive to D Drive by Powerful Software If you want to move games from C drive to D drive effectively, then you must use a powerful software that can guarantee you successful data transfer. With EaseUS Todo PCTrans, you can quickly transfer all kinds of data from one drive to another without hassle. It's an all-in-one data transfer and recovery tool that will allow you to move games from C drive to D drive in a few clicks. It can also recover data from your dead computer. Various transfer modes, effective transfer methods and simple transfer processes make this tool absolutely accessible for everyone. No matter you are a newbie or an advanced user, anyone can use this tool to transfer or move files between different drives or devices easily.   Free Download Support Windows 11/10/8/7 Features: • It's one of the fastest tools to transfer content between devices or drives. • It ensures automatic migration of your files from one computer to another without data loss in one click. • It's safe and easy to transfer large files. • It even allows you to transfer user accounts and settings. • Different transfer modes are available to move data in different situations. You can follow these steps to move games from C drive to D drive with this powerful software: Step 1. Connect the destination drive to your computer Where do you want to place the games from their original location? Use the correct way to connect the drive to your computer, where EaseUS Todo PCTrans is installed. Run the games transfer software, choose "App Migration" and then click "Start". choose app migration to change the game location Step 2. Choose the games you want to change the location On the left bar, choose the original drive where your game programs are installed, locate the games and tick the checkboxes. Click the triangle icon to choose the target drive as the file path. After all the selection, click "Transfer". choose the destination location Step 3. Transfer the games to the destination drive The software will work on moving the selected games from the original location to your customized location. Wait for the process to finish. click transfer to change the game location Method 2. Move Games from C Drive to D Drive by Registry The information used by programs and Windows itself is contained by the registry. In managing your computer, the registry assists the operating system. By changing the registry, you can relocate installed apps. But if you are a newbie, it would be better if you didn't try this method because your system may crash if you misplay the registry. Still, if you want to know how to transfer games from C drive to D drive, just follow the steps below. Steps to move games from C drive to D drive by the Registry: Step 1. First, you need to open the File Manager and open the D drive location. In the D drive, create a new folder named "Program Files (86)". move games from c to d drive by registry Step 2. To the new folder, copy "Program Files" and "Program Files (x86)" directories next. copy Program Files and Program Files Step 3. In the search bar, insert "CMD" and right-click it. Then choose "Run as administrator." insert CMD and right-click it Step 4. Next, you need to press "Enter" after inserting the following commands. Robocopy" C\ Program Files" " D\ Program Files" / mir Robocopy" C\ Program Filesx86" " D\ Program Filesx86)" / mir Here, the drive letter of the created file is "D." Step 5. Then you need to type "Regedit.exe" after pressing "Win + R." Step 6. In this step, search for the folder path and change the C to D drive. Windows 10: HKEY_LOCAL_MACHINE \ SOFTWARE \ Wow6432Node \ Microsoft \ Windows \ CurrentVersion. Windows 7/8/8.1: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion. search for the folder path Method 3. Move Games from C Drive to D Drive by Windows Utility If the low disk space shows up an alert in C drive, it means that the partition doesn't have enough free space. It can cause the PC to run slower and apps to respond late. However, plenty of space is available in your D drive or any other drive. To deal with the problem, it would be better to transfer programs from C drive to D drive by Windows Utility. Though, sometimes, this method doesn't work on all the apps/games. You should know that the more effective method is provided at the article's beginning. Steps to move games from C drive to D drive by Windows Utility: Step 1. From the Control Panel in Windows, you can change the location of certain apps. First, you need to press "Win + R" and open the Run box. Step 2. To open control the panel now, click "OK" after inputting "Control." click OK Step 3. From the control panel, you need to click on the "Programs" option. Step 4. Then select the "Program and Features" option from the "Programs" page. Step 5. After that, you will see a list of installed programs on your computer. Give a right-click the program that you want to move, and select "Change." Then simply change the drive to your desired location. If the program you want to move doesn't have any "Change" option, try Method 1 of this article to move programs safely. right click the program and select change Conclusion: If you want to move games from C drive to D drive, you'll definitely need a working method that can guarantee you the safe transfer of all the data. Unfortunately, some methods are very technical that you'll need to perform advanced commands and follow tough steps to succeed. This will never be the case if you start using EaseUS Todo PCTrans. This program will guarantee you 100% no data loss security and successful data transfer when you need to change the game installation location. So we hope you choose your method wisely if you don't know how to transfer games from C drive to D drive.   Free Download Support Windows 11/10/8/7 Was This Page Helpful? Updated by Tracy King Tracy joined in EaseUS in 2013 and has been working with EaseUS content team for over 10 years. Being enthusiastic in computing and technology, she writes tech how-to articles and share technical solutions to resolve Windows & Mac data recovery, data backup, partition management, data transfer, Windows update issues, etc. Read full bio
ESSENTIALAI-STEM
BRIEF-Deere & Co announces factory workforce adjustments July 22 (Reuters) - Deere & Co : * Factory’s workforce currently includes approximately 1050 production employees. * Deere said it expects sales of agricultural equipment to decrease for 2016 fiscal year * About 120 production employees at john Deere harvester works in East Moline, Illinois will be placed on indefinite layoff * Deere announces factory workforce adjustments * Deere & Co says has informed approximately 120 production employees at john deere harvester works in east moline, Illinois that they will be placed on indefinite layoff * Company continues to adjust size of its production workforce to market demand for products manufactured at each of its factories Source text for Eikon: Further company coverage: (Bengaluru Newsroom : +1-646-223-8780)
NEWS-MULTISOURCE
Ford's attorneys ask FBI to call, after getting 'no response' from investigators Washington (CNN)Christine Blasey Ford's attorneys sent a letter Tuesday to FBI Director Christopher Wray requesting a call, saying they "have received no response" from anyone involved in the supplemental background investigation of Supreme Court nominee Brett Kavanaugh. The letter, addressed to Wray and and FBI general counsel Dana Boente and obtained by CNN, says Ford's attorneys have offered her "full cooperation, including her willingness to be interviewed by FBI agents," but have received no response. Ford has accused Kavanaugh of physically and sexually assaulting her at a party while they were in high school. He vehemently denies the allegation. The letter notes it has been five days since the Senate Judiciary Committee and the White House announced that the FBI had been directed to conduct the supplemental investigation, following Kavanaugh's and Ford's testimony before the committee Thursday about her allegation. "We also sent you a series of emails and letters," the letter reads, "in which we identified witnesses and evidence that would likely assist the FBI in its investigation into Mr. Kavanaugh's sexual assault of Dr. Ford and asked you to forward them to the supervisory agent." "Despite these efforts, we have received no response from anyone involved in this investigation, and no response to our offer for Dr. Ford to be interviewed," the letter says. Whether Ford -- or Kavanaugh -- would be interviewed as part of the inquiry has remained an open question. The senators who spearheaded the FBI's renewed look at the nominee's background remained in consultation with the White House over the scope of the probe, which was focused on the allegations of Ford and a second woman, Deborah Ramirez. Those senators, in consultations with the White House, have urged that the FBI be allowed to follow leads, but sources say they did not stipulate that Ford or Kavanaugh be interviewed. Those sources suggested the extensive public testimony by both could be deemed sufficient. On Tuesday, the letter continues, Ford's attorneys learned of media reports that the FBI does not intend to interview her or Kavanaugh. "We hope that this reporting is inaccurate," it says. "It is inconceivable that the FBI could conduct a thorough investigation of Dr. Ford's allegations without interviewing her, Judge Kavanaugh, or the witnesses we have identified in our letters to you," Ford's attorneys wrote in the letter. "We request a call with you or the Supervisory Special Agent in charge of this investigation this afternoon," the attorneys wrote.
NEWS-MULTISOURCE
Constructing and drilling well water and maintenance Guide to Constructing a water well for living off-grid Thinking about construction a water well? Off-grid lifestyle looks idyllic and hassle-free from the outside but the reality is quite different. Amenities, such as water, heat, and electricity are not easily accessible when you're living on your own. Want to know the best way to get drinkable water at your off-grid cabin? Keep reading below. You can get water from lakes, rivers, springs, rain water and ocean water desalination but wells are the most reliable source in rural areas. Well drilling, however, is not simple and requires extensive knowledge about the geography, aquifers, and regulations of the state. This article will inform you all about it. Water Supply Sources in Off-Grid Cabins Living off-grid means arranging your own water, electricity, and food at your secluded country home or cabin. But it's not that easy to get reliable sources. Finding a good source of clean drinkable water is important when living off-grid. The following are some of the options. Lakes, rivers and springs You can use lakes as a water source if you have a permit. A jet water pump and pipe with a large diameter can be used to draw the water. You'll need a primary filter and a chlorine-based filter to get rid of debris and germs respectively. Rain Water A tank can be installed on your roof to collect rainwater. It needs to be filtered using a primary filter and a purifier. You can set up an indoor water supply system using pumps by connecting it with the water tank. But the outdoor pipes will need to be heated in colder months. Well water If your off-grid home already has a well on the property then that's great. But if not or it has dried out then then you should consider constructing a water well. You can use a submersible pump to draw water from the well to your house. Types of Water Supply When Off-grid There are two ways you can draw water from a well. Electric Pump Image: Electric Well Water Pump Using an electric pump requires the setup of an electricity generator. Solar panels or wind turbines are good options to generate electricity. The regulations for producing your electricity may vary from place to place. So, check out with the local energy office before setting up your plant. Manual Water Supply You can carry the water from the well manually if you want. A hand-operated pump can also be used. This is tougher to run compared to an electric pump. Basics of Well Drilling There are contractors for well drilling who can help set up your well. Most well-drilling companies not only drill water wells but assist with fixing problems including well pump repair. Well drilling and pump repair are expensive. The contractor needs to have the necessary skills to properly drill a well without contaminating the source. Geological tests and surveys also need to be conducted before you can drill a well. How Groundwater Wells Can Be Useful When You're Off-grid Ground water wells can help you outside of the city's water supply system when you're living off-grid. It may be expensive and require permits for setting up but is generally worth the trouble. Over a billion people around the world use groundwater wells as a source of clean water. The soil and stones filter out impurities in it but also add minerals. You must regularly monitor and test your well for contaminants such as E. Coli or chemicals. Types of Water Wells There are three types of wells based on the method of construction. These are as follows. Dug Wells Dug wells are shallow and can be made manually. For dug wells, the soil needs to be soft with a shallow water table underneath. The well is lined with stones and bricks to prevent it from collapsing. A wooden or stone tile is used to cover the well. This type of well can be easily contaminated by surface materials. The surface level of the table drops during the drought season. Driven Wells Driven wells are built by inserting a pipe down into the aquifer through a soft layer of soil. The pipe contains a filter to prevent the inflow of sand and debris. Driven wells can be contaminated by surface pollutants easily. Drilled Wells Modern wells are drilled using drill rigs. These rigs are powerful and can drill up to a thousand feet into hard soil. Some drill rigs install pumps as well to force up water. Components of a Private Water Well There are community wells and there are private wells. Community wells are set up in small communities in rural areas. If you set up a well for yourself, then it would be a private well. • Well-Casing: A casing is installed into the well on the sides. It can keep out sand, debris, and excess water from the aquifer. • Well Cap: Well caps prevent insects, animals, and debris from falling inside. • Screens: Screens prevent sediments from the bottom of the well from entering the pump. • A Pitless Adapter: This keeps the water-carrying pipe frost free and sanitary. • Jet Pump: Pump to draw water from shallow wells through suction. • Submersible Pump: A pump used to draw water from deep wells. Widely used in private wells. Water Level in a Well The geographic area and the depth of the aquifer will determine how deep you need to drill your well. The yield will indicate the type of pump you need. The water level before and after pumping and the time required to refill are measured in yield tests. Steps to Constructing a water well There are a few steps you need to take care of before starting to drill a well. These are as follows. 1. Make a Plan First, you need to decide where to set up the well. The area should be significantly away from sewer lines and should have an aquifer with a good yield. Well drilling is quite costly. So make sure you're prepared for a big investment. 2. Look for Well Drilling Permits and Regulations Drilling wells usually need community or state approval. You should get the necessary permits before starting the operation. States have different regulations for setting up wells and electricity supplies. Check out these regulations at the municipal office before constructing anything. 3. Conduct Geographical Location Tests Geographical tests are necessary before drilling wells. You need to know if the aquifer you found is confined or unconfined. Confined wells are surrounded by non-porous soil and are harder to drill into. Unconfined aquifers are surrounded by porous soil and are easier to drill. Records on previously drilled wells can indicate the locations of aquifers and the state of their yields. Geological maps contain locations of aquifers and topographic maps indicate the nature of the topography. These should be studied before constructing a well. 4. Review Your Water Needs You should calculate how much water you need daily and how much your selected aquifer can supply. Every aquifer does not contain a good amount of water. Your well won't be of much use if it can't meet your needs. Grass lawns and farming may require a lot of extra water in areas with little rain. 5. Review the Water Well Construction Contractor You must properly review the well-drilling contractor before hiring them. A contractor should have a license issued by the state for drilling wells. They should have proper drilling rigs and know how to repair pumps. 6. Ask for Detailed Plans for the Well Your contractor should provide you with a detailed plan of the construction. It should include the types and materials of the well components. There should be enough information provided on the depth of the well, diameter, casing, screen, and estimated completion of the project. 7. What to Look for in a Contractor The contractor should be registered in the state where they work and have property damage and liability insurance. They should also be willing to take care of the registration process of the well. As you already know, well drilling is a critical and expensive job. You should only select the best people with proper references. 8. Expenses Related to Well Drilling Each component of well construction is priced individually. Consult multiple contractors to get a good idea about the market and the prices. Cheap isn't always better. So, try to hire a reliable contractor who offers a good quote. Common well water contaminants and issues One of the biggest challenges with well water is ensuring that the water is safe to use for drinking, bathing and showering. Major risks include pathogens such as eColi but also pesticides, herbicides, metals and other contaminants from the ground. A common misconception is that a TDS meter can be used to measure water quality. This couldn't be further from the truth. TDS primarily measures the amount of minerals in your well water or other water source. Read more about TDS. Best water filter for your well water What is the best water filter for your water well? Ultra by TAPP Water installed on the kitchen faucet Until recently the only solutions were chlorination or using a Reverse Osmosis filter. Ultra by TAPP Water has completely revolutionised well water filtration. With the ultrafiltration filter Ultra you can be sure that the water is always clean, healthy and tasty. Ultra is easy to install, affordable and sustainable. The cost starts at around $39 for initial installation and $60 per year including the refill cartridges. Other more expensive and complex water filtration solution alternatives include Reverse Osmosis and Distillation filters. Summary about constructing and maintaining an off-grid well • Water is a primary component to sustain life. You cannot live off-grid without a reliable water source. • Connecting to a public water source is often not an option, expensive or an unreliable as a water source. • Living off-grid takes years of preparation and cannot be done on a whim. Basics such as water and electricity production can be challenging. • Construction a water well is the best way to guarantee yourself a safe source of water. • A high quality affordable water filter such as Ultra by TAPP Water will guarantee a reliable water supply • Hopefully, this article has helped you understand the process. Torna al blog
ESSENTIALAI-STEM
OH3 / Docker / Nginx Hi all, So I managed to get my pi upgraded to 2.5.12 and I thought it would be sensible to do something leftfield and set up OH3.1 in a docker on my Synology. Now, it’s been a while since I’ve been on OH and even longer since I have used docker but it seems the right time to get my head back in the game this way. I’ve installed OH3 in docker, but used this guide as I couldn’t get even the most basic of commands working…to be honest, I fell at the first step - sudo useradd -r -s /sbin/nologin openhab I putty SSL into the synology as the admin user, run the command and it asks me for a password, trying the admin password and any other password I can think of returns sudo: useradd: command not found I’m sure I am missing something absolutely basic - any pointers? Following the other guide and it worked perfectly… So, I’m in OH3.1, looks a lot more user friendly and seems to have come on in leaps and bounds - kudos everyone involved. However, I don’t have an openhab user…does that matter long term? Everything else seems to work just fine, things, items etc tick. Next step was to install nginx, installed it from the registry and it installed fine, I can browse to myip:post and it shows the welcome to nginx screen so I know it’s installed ok. However, there are no folders in the docker folder and although I can cd into /etc/nginx/sites-enabled/ there is no default file to edit… Again, probably a real head slap moment, but any pointers please? Maybe RUN useradd -r -s /sbin/nologin openhab ? 1 Like It’t not clear which command it can’t find, the sudo or the userdadd. This will be specific to the Synology. You might look up adduser which is an alternative way to create users. One is lower level than the other but I always forget which one. I’m not sure which one is standard. It’s a good security policy to keep services running as an unprivileged user. That way if the program runs amok or someone attacks it the amount of damage it can do is limited. By default openHAB in the container will be running with UID 9000. If you don’t tell it to use some other UID by passing it in the environment variable all the files it needs access to will be owned by 9000:9000. So all the files in the mounted volumes will have that ownership. It looks odd and can in some cases a little hard to deal with when working with the volumes outside of the container. So the recommendation is to create an openhab user on the host and tell the container to use that user’s uid when it runs. 1 Like Use Synology’s GUI to create the openhab user and group and assign them the appropriate rights. After creating them SSH into the Syno and enter “id openhab” which will display the ID numbers for the user and the group. You will need the id numbers when updating the environment variables. Retrieving the id numbers should be the only thing that you need to do via SSH. Create a share named Docker if it does not already exist. After installing the Docker package in Package Center open it up, click on “Registry” in the left hand menu, then search for openhab. Download the openhab/openhab image (it will probably be the first image listed), selecting the “latest” version. Click on “Image” in the left hand menu. Once the download is complete (you should receive a Syno notification) click on the openhab/openhab image and press “Launch:” Complete the entries in the “Create Container” pop-up, especially the “Advanced Settings” and then OpenHab will start. The “Volumes” tab will allow you to create the openhab folder and the three subfolders (addons, conf & userdata). In my case I change the EXTRA_JAVA_OPTS, GROUP_ID, HTTP_PORT, HTTPS_PORT, and USER_ID environment variables. (I need to change the ports due to conflicts with other software.) 1 Like Hi, That’s amazing thanks, I didn’t want to use the GUI as I assumed there was some special setting that I’d miss that way. I’m far more comfortable in the Syno DSM so that’s a relief… I’ve got very similar settings to you, haven’t changed the ports as I’ve got no conflicts. I set crypto to unlimited as per the docker install instructions. However, there always is a however, when I go to myip:8080 I get a connection refused: image I’m guessing I’ve missed something in the user rights to allow access? I have an openhab group which has r/w access to the docker folder but nothing else, no quota, allow for all applications, no speed limit. I have an openhab user which has a fixed password, is a member of the openhab group and just follows the group permissions etc, ie nothing extra user specific… What have I missed? EDIT - FIXED No idea what happened but I cleared everything down, deleted folders etc and then started a fresh…working fine now! Might have been too eager or just set up slightly wonky from all the tries… I have set up a task in Synology Task Scheduler - set to run once - so that if I need to fire up a new container I can do it easily, (just need to change the name to something different)…might help someone else here: docker run \ --name openhab \ --net=host \ -v /volume1/docker/openhab/addons:/openhab/addons \ -v /volume1/docker/openhab/conf:/openhab/conf \ -v /volume1/docker/openhab/userdata:/openhab/userdata \ -d \ -e USER_ID=xxxx \ -e GROUP_ID=yyyy \ -e CRYPTO_POLICY=unlimited \ --restart=always \ openhab/openhab:latest (where xxxx is your openhab user id and yyyy is your openhab group id) Onto NGINX…anyone any pointers as to the process to set this up in Docker please??? Makes total sense, I’ve deleted the docker container that I created so will try again with a proper openhab user at the helm :slight_smile:
ESSENTIALAI-STEM
-- Citigroup Top Lobbyist Turns Christmas-Tree Seller for Holidays Citigroup Inc. (C) Executive Vice President Candi Wolff can talk about Christmas trees for hours. She can tell you how an electric tree baler works, the difference between a Colorado Blue Spruce and a Douglas Fir, and that tree sales are a year-end economic indicator, although she can’t quite tell you why. Wolff can also recall the times former Vice President Dick Cheney and former President George W. Bush would phone while she was working on her family’s Christmas tree farm in Round Hill, Virginia. “I’d say, ‘Hold on, I’m out selling trees, hold on!’” she said in an interview. “And I’d run somewhere where I could actually have a conversation.” Wolff, 48, Citigroup’s head of global government affairs and a former assistant to Bush for legislative affairs, has been escaping the Beltway -- literally and figuratively -- for Snickers Gap Tree Farm every winter since 1994. That’s when she met her hydrogeologist husband, Mark Wolff, whose father started planting trees on the 40-acre farm in 1981. The mountainside farm 55 miles from the White House provides a welcome break from Wolff’s corner office on Pennsylvania Avenue, she says. There, she directs a staff of 42 and oversees Citi’s relations with more than 100 governments, including the U.S. Aside from the poinsettia on her office coffee table, you might not know that the lobbyist, named one of Washington ’s 25 most influential women in 2012 by the National Journal, is also a Christmas tree aficionado. ‘Getting’ Friends You won’t know, that is, until she’s “gotten to you” -- her phrase for inviting you out to Snickers Gap -- as she’s done with many Washington friends over the years. “I would get my Hill colleagues,” said Wolff, who worked for the Republican Senate Steering Committee and Policy Committee during her first few years of farm visits. “We sort of had this high-priced crowd out there -- we were the lawyers or lobbyists.” In those early days, Wolff helped work the baler, a netting machine, because she had smaller fingers than the farm men and was better at tying knots. Today, Snickers Gap trees have grown too big for her to lift easily, so she sticks to customer- related tasks like refilling the apple cider heater, giving directions and handling the money -- a fitting job for someone who has been a bank executive since May 2011. Wolff says she enjoys interacting with customers, many of them longtime Snickers Gap visitors, and that she finds the retail experience “grounding,” in part because not all the customers know who she is. Wearing Jeans “I’m wearing jeans and I’m kind of getting back to the earth, if you will,” Wolff said. As much as Wolff enjoys the farm, she says she doesn’t mix business with pleasure. She chuckles at the mention of agriculture policy, which she jokes about avoiding while at the White House. “It was never really my interest,” she said while walking through a plot of firs. “I can do this and this is fun, but I don’t want to understand ag policy.” Fun it may be, though not exactly relaxing. The choose-and- cut farm, which opens the weekend after the U.S. Thanksgiving holiday, is usually so busy during the first two weekends of December that Wolff doesn’t have time to check her Blackberry until sundown. This year, Snickers Gap sold out of all but the largest trees early, giving Wolff more time to chat with her family: Her brother-in-law now owns the farm, her niece and nephew run the “Snack Shack,” and her husband and teenage daughters help customers claim their trees from the hillside. Wolff says the simple human interaction away from Washington’s Scrooges and stress is one of the tree farm’s greatest holiday gifts. “They’re out there for Christmas,” Wolff said. “For the most part there’s not a bah-humbug mood. Occasionally you get a few Grinches, but most people are just happy to be out there.” To contact the reporter on this story: Emma Fidel in Washington at efidel@bloomberg.net . To contact the editor responsible for this story: Maura Reynolds at mreynolds34@bloomberg.net
NEWS-MULTISOURCE
Mahara (surname) Mahara or Mahra is a Chhetri surname from Nepal and Kshatriya (Rajput) surname in Uttarakhand. In Kali Kumaon, the Mahra(Mahara) and Phartyals were the most famous 'dharras'/(धड़ा) in the recorded history of Kumaon. Have no relation with Mahar community of other states of India. Notable people with the surname include: * Kalu Singh Mahara, Indian Kumaoni freedom fighter * Karan Mahara (born 1972), Indian politician * Krishna Bahadur Mahara (born 1958), Nepalese politician and minister * Mahendra Singh Mahra, Indian politician and MP of Rajya Sabha for Uttarakhand. * Ummed Singh Mahra (21 January 1942 – 6 July 1971), Indian Kumaoni posthumous recipient of the Ashoka Chakra.
WIKI
Ōsama-tachi no Viking Ōsama-tachi no Viking (王様達のヴァイキング) is a Japanese manga series written and illustrated by Sadayasu, with collaboration from Makoto Fukami. It was serialized in Shogakukan's seinen manga magazine Weekly Big Comic Spirits from March 2013 to August 2019, with its chapters collected in nineteen tankōbon volumes. Publication Written and illustrated by Sadayasu, with collaboration from Makoto Fukami, Ōsama-tachi no Viking was serialized in Shogakukan's seinen manga magazine Weekly Big Comic Spirits from March 4, 2013, to August 26, 2019. Shogakukan collected is chapters in nineteen tankōbon volumes, released from June 28, 2013, to September 30, 2019. Reception Ōsama-tachi no Viking was one of the Jury Recommended Works at the 18th Japan Media Arts Festival in 2014. The series was nominated for the 8th Manga Taishō in 2015 and placed 9th with 35 points.
WIKI
Mohamed Abozekry & Heejaz Mohamed Abozekry & Heejaz is a Franco-Egyptian band of instrumental music formed in 2010. Led by the young music prodigy Mohamed Abozekry who received the first prize at the international Oud competition in Damascus in 2009, the quartet also includes: Guillaume Hogan (Guitar), Anne Laure Bourget (Percussion instruments) and Hugo Reydet (Double bass). The beginnings and the release of the first album Mohamed Abozekry entered the Arabic Oud House in Cairo at a very early age and received his teaching from Naseer Shamma. At the age of fifteen, he became the youngest professor of Oud in the Arab world. On 29 August 2007, he met Guillaume Hogan during a concert in Cairo. This latter convinced him to continue his musical studies in France where he will enroll in the University of Lyon II in August 2009. Over this period, Mohamed Abozekry composed jazz and blues-inspired music tracks. In 2010, he drew upon some friends from Lyon to join his band. Together they will form the “Heejaz” ". With their unique musical styles, each member of the band has contributed to the singular compositions that define their genre. In 2011, the band made several tours in France and abroad such as a 10-day road trip across South America. They also performed several concerts in Egypt, Pakistan, Iraq and the United Arab Emirates. Chaos is the debut album by Mohamed Abozekry & Heejaz. Released on the 25th of March 2013, it refers to the torment and pain of a young musician who is helplessly watching as his country is going through a revolution. Therefore, every track is told as a story with each event and twist setting the pace and the rhythm of the composition. The track “25 janvier”, initially destined to be included in the album and then eventually withdrawn, pays tribute to the victims of the Egyptian revolution. It is available for free downloading on their official website.
WIKI
Do Metal Detectors Detect Phones Metal detectors are devices that identify metallic objects. They emit electromagnetic fields to detect metal. Commonly used for security checks, they locate items like weapons or coins. Metal detectors work by creating a magnetic field and detecting disruptions caused by metallic objects. Curious about what your metal detector might find? Ever wondered Do metal detectors detect phones? Explore the surprising answer and satisfy your inquisitiveness. Unveil the truth about whether your trusty detector can uncover your mobile device among other metal items. Metal detectors can typically detect phones due to the metal components within them, like the battery, circuitry, or metallic elements in the casing. It depends on the detector’s sensitivity and the specific materials used in the phone’s construction. Sensitivity and Range of Metal Detectors The sensitivity and range of metal detectors determine their effectiveness in identifying various metals. Sensitivity refers to a detector’s ability to detect smaller or less conductive metals, impacting the device’s accuracy. High sensitivity enables detection of tiny metallic objects, while lower sensitivity might overlook smaller items. Additionally, the range of a metal detector influences how far it can detect metal. This range varies based on the detector’s design and the type of metal it’s intended to detect. The interplay between sensitivity and range significantly influences a metal detector’s performance. A balance between high sensitivity and an adequate detection range is crucial for different purposes, ensuring the device can spot a wide array of metallic objects without compromising accuracy or coverage area. Adjusting these features helps tailor the detector’s functionality to specific needs, whether in security, industrial settings, or recreational pursuits like treasure hunting. Detector Sensitivity and its Impact Detector sensitivity refers to the device’s ability to detect even the slightest variations in a magnetic field caused by metallic objects. A higher sensitivity means the detector can pick up smaller or less magnetic materials. This impacts the accuracy and range of the detector, allowing it to identify a wider array of items. However, too much sensitivity might result in false alarms or the detection of insignificant metal components, creating challenges in differentiating between valuable finds and irrelevant disturbances.  The impact of detector sensitivity is crucial in various scenarios, especially in security or treasure-hunting applications. A finely tuned sensitivity setting can enhance the chances of detecting smaller metal items or objects buried deeper underground. However, in high-traffic settings like airports or public places, overly sensitive detectors might cause unnecessary disruptions or delays. Adjusting the sensitivity based on the specific needs of the environment or task is vital to optimize the detector’s performance while minimizing false readings. Detection Range and Limitations The detection range of metal detectors refers to the distance at which they can identify metal objects. It’s determined by the detector’s design and sensitivity. Factors like the size and composition of the object, as well as environmental interference, can impact this range. Larger or more metallic objects can be detected from a greater distance, while smaller or less metallic items might require closer proximity to be identified. Additionally, the type of detector and its technology influence the detection range.  However, despite advancements, metal detectors have their limitations. They may struggle to differentiate between certain metals or might not detect very small or thinly constructed metal objects. Additionally, environmental factors like interference from electromagnetic fields or mineralized soil can affect a detector’s accuracy and range. These limitations highlight the need for users to understand the capabilities of their specific detector and to consider environmental conditions when using them. Tips for Managing Phones in Metal Detection Zones Tips for Managing Phones in Metal Detection Zones When entering areas with metal detectors, managing your phone can make the process smoother. Begin by being aware of your phone’s metallic components; it’s not just the obvious metal parts but also elements like the battery or internal circuitry. To avoid any inconvenience, consider placing your phone in a separate container or a designated area while going through security. Some detectors might pick up on phones, so having it ready for inspection or following security personnel guidelines can expedite the process. It’s also wise to research the specific guidelines of the place you’re visiting. Some areas might have more stringent policies regarding phones and metal detectors, so being aware of these rules in advance can save time and potential hassle. Ultimately, cooperating with security personnel and following their instructions will ensure a smooth and efficient passage through metal detection zones. Best Practices for Phone Handling Best practices for phone handling in metal detection zones involve being mindful of the device’s components. To minimize interference with metal detectors, it’s advisable to limit metal accessories like cases or attachments that could trigger a detection. Additionally, placing the phone in designated areas or containers provided for personal items during security checks can streamline the process and reduce the likelihood of it being flagged. Ensuring that the phone is readily accessible for inspection while being aware of its metallic elements can facilitate a smoother experience through metal detection areas. Moreover, adopting a proactive approach by familiarizing oneself with the particular policies and guidelines of the security checkpoints can be immensely helpful. This might include being aware of the sensitivity of the metal detectors in use and understanding how different types of metals or components within the phone could potentially trigger a response. Being cooperative and communicative with security personnel while following their instructions can significantly contribute to a hassle-free and efficient passage through metal detection zones. Recommendations for Users When dealing with metal detectors and personal devices like phones, a few recommendations can ensure a smooth experience. It’s advisable to be aware of the specific guidelines of the area you’re entering, as different places might have varying rules regarding electronic devices and security protocols. In general, switching off your phone or putting it in airplane mode can minimize the chances of it interfering with the detector.  Being transparent and communicative with security personnel can facilitate the process. For those concerned about their phone’s exposure to electromagnetic fields, keeping a safe distance between the phone and the detector can offer peace of mind. while metal detectors are designed to spot metallic objects, including phones, a cooperative and informed approach by users can help streamline the process and ensure a hassle-free experience in areas where these devices are in use. FAQ’s Do phones pass through metal detectors? Yes, phones can pass through metal detectors as they typically contain metallic components. Is your phone a metal detector? No, your phone is not inherently a metal detector. Do cell phones have metal in them? Yes, cell phones contain metal components. These can include elements like copper, gold, silver, aluminum, and rare earth metals in various parts such as the battery, circuitry, and casing. Conclusion While it’s established that cell phones do contain metal components, the extent and nature of these materials might vary. The presence of metals like copper, aluminum, gold, and silver within phones is common, primarily in components like wiring, the battery, and the device’s internal circuitry. However, the quantity and specific metals used can differ based on the phone’s make, model, and design.  Understanding the metal composition within cell phones is crucial, especially in scenarios where these devices come in contact with metal detectors. It’s important to acknowledge that while metal detectors can detect phones due to these components, the sensitivity of the detector and the phone’s materials play a significant role. Users can take precautions by understanding the rules of the area, cooperating with security measures, and minimizing potential interference by either turning off their phones or maintaining a safe distance. Leave a Comment
ESSENTIALAI-STEM
Eosinophils What are eosinophils? Eosinophils are a type of white blood cell and are measured as part of a full blood count, making up approximately 1-6% of the total white blood cells. They ingest foreign cells such as bacteria, viruses and parasites. Eosinophils attack multicellular parasites such as worms and are also involved in allergic reactions. Why measure eosinophils? Eosinophils have two functions in your immune system. They destroy substances related to parasitic infection and they also help regulate inflammation. Eosinophils help promote inflammation, which helps to isolate and control a disease site. In some people, the inflammatory response may be greater than necessary and therefore contribute to producing the symptoms of asthma and allergies. Elevated eosinophils Elevated levels of eosinophils is called eosinophilia and is most commonly caused by allergic disorders such as asthma, eczema and allergic rhinitis in the UK. Worldwide the most common cause of eosinophilia is parasitic infections. Increased levels of eosinophils can also occur in response to connective tissue diseases such as rheumatoid arthritis. Decreased eosinophils A low number of eosinophils in the blood is called eosinopenia. This can occur in blood infections (sepsis), and treatment with some steroid medications. However, a low number of eosinophils does not usually cause problems because other parts of the immune system compensate adequately. A low number of eosinophils is usually detected by chance when a complete blood count is done for other reasons. Browse Our Tests Go to Inflammation and Immune System. Take a look at Reviews to find out what our users think of us.
ESSENTIALAI-STEM
Saldanha da Gama Luís Filipe de Saldanha da Gama (7 April 1846 – 24 June 1895) was an admiral of the Brazilian Navy. He led the Revolta da Armada against the First Brazilian Republic alongside Custódio José de Melo and was killed by government forces during the Federalist Revolution in the Battle of Campo Osório. Biography A Bachelor of Arts, he took a course at the Academia da Marinha, which he joined at the age of seventeen, always climbing the ranks until reaching admiralty. He represented Brazil at the Vienna exposition in 1873, the Philadelphia exposition in 1876 and the Buenos Aires exhibition in 1882. He received the dinstinctions for his service in the Paraguayan War, the siege of Uruguaiana and Military Merit. He led the Second Armada Revolt in 1893, participating in the revolt, despite being director of the Naval School in Rio de Janeiro. Defeated by the troops of Hipólito Ribeiro on 24 June 1895, he was killed in combat at the Battle of Campo Osório by Salvador Sena Tambeiro, a Uruguayan commanded by João Francisco. Witnesses said the admiral's last words were “Respect me! I'm admiral Saldanha!” and the major's reply was: "These are the ones I like!" Tambeiro attacked Saldanha with a spearhead, then cut his throat and mutilated him, tearing out his ears and teeth. Before dying, Saldanha would have said: “Enough, miserable!”. His body would only be found days later and buried in the cemetery of Riveira. In 1908, his remains, together with those of admiral Francisco Manuel Barroso da Silva, were transferred to Brazil and are currently buried in a mausoleum in the São João Batista Cemetery. In "Minha Formação" (1900), Joaquim Nabuco says about him: "'I had met Saldanha at the Philadelphia Exposition, then we connected a lot in New York, where we lived in the same hotel, the Buckingham. […] Poor Saldanha! Born for the world, for love, for glory, who would have thought, seeing him back then in New York, that his fate would be what it was? The sphinx of life that had given him, as a teenager, one of his indecipherable enigmas to solve, destroying in him the aspiration to be happy, reappeared again, blocking his step just as he could dispute the most important position in the country'."
WIKI
with No Comments Third Stage of Labour by New beginnings student, Verlyndah Hodge The third stage of labour is defined as that time extending from the birth of the baby until the birth of the placenta. In contrast, a ‘forced birth’, by comparison, is one that is primarily devoid of spontaneity and is contrived to fit the pre-determined expectations of the woman and/or her attendants. Photo by Pixabay: 1. What is involved in a normal physiologic third stage? Medically led care of childbearing women includes the use of active management of the third stage of labour, which include the administration of uterotonic agents [pharmacological agents used to induce contraction or greater tonicity of the uterus], controlled cord traction and uterine massage of the uterus after delivery of the placenta, as appropriate. This process includes the following: • Within 1min of the birth of the baby, palpate the abdomen to rule out the presence of an additional baby(s) and give oxytocin 10 units IM. • Keep slight tension on the cord and await a strong uterine contraction (2—3 min) With the strong uterine contraction, encourage the mother to push and very gently pull downward on the cord to deliver the placenta while maintaining counter traction above the pubic bone. As the placenta delivers, hold the placenta in both hands and gently turn it until the membranes are twisted. Slowly pull to complete the delivery. • Immediately after the placenta is born, massage the fundus of the uterus until the uterus is contracted However, normal physiologic third stage should resemble the following: • Fahy and Hastie Midwifery Guardianship model in 3rd stage labour. • The woman has been given information about, discussed and consented to birthing her placenta in a natural, mindful manner. •  The woman is well prepared and understands that she is still in labour when the placenta is being born. • Expectant management was defined as a ‘hands off’ policy, which involves waiting for signs of separation and allowing the placenta to delivery spontaneously. • The woman and her baby are physically and emotionally healthy at the end of second stage. • The woman feels that she is in a safe and supportive environment. • The attending midwife knows how to act as a midwifery guardian. • Both the woman and midwife are willing to utilise an exogenous oxytocics if bleeding needs to be controlled quickly • Immediate and sustained mother and baby skin-to-skin contact • Mother and baby are kept warm [Self-attachment breastfeeding; Upright position] • Midwife unobtrusively observes for signs of separation of the placenta • Placenta birthed entirely by maternal effort and gravity • No cord traction • No fundal meddling or massage • Midwife gently encourages woman to be ‘present’ and mindful, to focus on baby while aware of placenta that is yet to be born Partner/support people ensure interactions remain focused on mother and baby • What important decision needs to be made before labor has even started in order to have a physiologic third stage labor? Factors that should be identified prior to the start of labour: 1. Discuss Medical History 2. Previous history of primary PPH[Postpartum Hemorrhage] e.g. fibroids, uterine septum, previous uterine surgery including caesarean 3. Over distended uterus e.g. due to multiple gestation, macrosomia or polyhydramnios 4. Abnormalities of the placenta e.g. low lying placenta, placenta accreta, percreta, placenta praevia 5. Antepartum haemorrhage e.g. associated with the placenta Hb of less than 110 g per litre 6. Abnormalities of coagulation e.g. due to: fetal death in utero, hypertension, clotting diseases, anti-coagulant therapy, ante-partum haemorrhage, general infections 1. Assess Environment and Ensure It Is Safe And Comfortable– Another way in which the third stage of labour can be affected by psychophysiology is the impact that birthing environment has on the autonomic nervous system and hormonal regulation. Lack of appropriate birth environment e.g. bright lights, cold temperature, noisy strangers in the room, excessive chatter and noisiness  affect oxytocin levels and can increase pain and unfavourable placenta detachment and bonding with baby. Any factor that does not allow the mother to practice mindfulness in her environment should be considered. The mother should also be informed of the importance of the third stage of labour and how it promotes natural connection with the baby. Mention should be made of the effects of synthetic oxytocin ; how it may potentially block the release of natural oxytocin [ which helps to relax the uterus and reduces the adequate amount of hormones to maintain fear and anxiety]. 1. Promoting Skin- to Skin-During the third stage of labour, the mother’s levels of oxytocin increase in response to the smell and touch of her baby; most particularly during breastfeeding. During a physiological third stage of labour, oxytocin floods the woman’s brain, triggering feelings of profound love for her infant . High levels of oxytocin spill over into the mother’s blood circulation.This hormonal response is exactly what the woman needs so that strong uterine contractions continue during third stage, enabling the placenta to be born naturally with sustained haemostasis. 1. Engaging Midwifery Guardianship- This should be carried out by a trusted midwife. • What factors can the doula help with during labor to make sure that this is a possibility? • Give mother handout on the benefits of a normal third stage of labour; she can review it and discuss it with her OB and midwife • Discuss with the mother how she wants to maintain a comfortable environment in her birth plan during the third stage of labour and immediately after the medical team have completed their tasks. i.e lighting, limiting persons in the room, where the baby should be placed. • Providing information on the importance of the third stage of labour in relation to bonding with baby and an overall positive birth experience. • Step-by-step explaining of the events that an ideal third stage looks like so the mother can know what to expect from her body, her medical team and how she can be included in the process. • Discuss the use of artificial oxytocin , benefits and overall effects so mother can make an informed decision of whether she consents or not • Explaining Midwifery Guardianship and what it should and should not look like. • What factors must the medical personal be involved with medically? Unfortunately, clinicians are usually advised to limit third stage to 30 minutes. Active management of third stage uses power external to the woman to deliver the placenta and achieve haemostasis. It is believed that unless the woman is fully involved in deciding what happens to her, then the use of external power can be disintegrative of her own inner power with unintended consequences, such as PPH. Safety Considerations for a Normal Physiologic Third Stage of Labour: • The woman has had a healthy pregnancy • All women who (in the antenatal period) were expecting a vaginal birth • The woman has been given information about, discussed and consented to birthing her placenta in a natural, mindful manner, including women who had many of the risk factors for PPH • Partner/support people ensure interactions remain focused on mother and baby The midwifery guardian’s focus is on nurturing the woman’s sense of confidence and safety through a trusting relationship within which the woman’s attitudes, values and beliefs are respected and of primary importance. Midwifery Guardianship involves guarding the woman and her birth territory so that she may labour, feeling safe and supported, without unwanted intrusions, distractions or interruptions. A Midwifery Guardian works with the woman so that she is able to slow down her everyday thinking mind and focus mindfully on her baby, her body and the birthing process Supporting women to find and use their own integrative power is a different activity from the obstetric concept that the woman needs to be ‘rescued’ from suffering and ‘delivered’ of her baby. The placenta should be birthed entirely by the woman’s efforts and gravity in order for the membranes to come completely and safely off the uterine wall. A couple of DON’TS are required. In natural third stage, leave the uterus alone; DO NOT massage, or meddle with it. It is inappropriate interference in a normal placental birth because meddling with the uterus creates partial separation and bleeding. Likewise, leave the cord alone: DO NOT pull on the cord which, again, can cause partial separation and bleeding and could even invert the uncontracted uterus. Reference: Optimising Psychophysiology In Third Stage Of Labour: Theory Applied To Practice Follow Samantha Kitchel: Doula, Community Manager Leave a Reply This site uses Akismet to reduce spam. Learn how your comment data is processed.
ESSENTIALAI-STEM
Wiki Why use Linux Web hosting A guide to Linux web hosting. A brief history of Linux and web hosting Linux is a free software operating system which was created in 1991 and has been widely accepted as a powerful operating system for business applications since the late 90's. Open source applications such as the Apache web server and sendmail are the most widely adopted web and mail servers respectively, which have evolved over many years. Why use a Linux web host? Linux-based hosting provides the level of reliability and performance that you need. Reliability You would reasonably expect to always have access to your website. If your website or those of your clients are used primarily for marketing purposes it is important that the information is always available. If, for example, a visitor or potential client is trying to get to your website and cannot then you will miss the opportunity. If a visitor is mid-way through viewing your website and it becomes unavailable due to a server problem, again, the impression is not good. In many cases your website will be the first impression or first point of contact your business has with a new client. Applications and Price Linux and all applications used to provide the hosting service are free software, so there are no licensing costs for the hosting company. For you, the end user, this means access to a larger array of powerful applications at a lower cost. For example, SQL databases such as MySQL and PostgreSQL, and application servers such as Tomcat. The ease with which Linux based services and applications can be customised enables the provision of a more tailored and flexible hosting service. Why is Linux a good platform for web developers? Powerful development tools PHP, JSP/Java Servlets, PostgreSQL and MySQL allow for rapid cost-effective development of web based services. Linux-based development tools are available free of charge as part of free software initiatives and widely supported online through an ever-growing developer community. For example: Pre-built professional applications Literally any application you could possibly need is available online and supported by a large and active international developer community. SourceForge.net and freshmeat.net provide lists of thousands of such applications ranging from e-commerce applications, content management systems and intranet/extranet applications. Some popular applications include: Do I need to have Linux on my PC to use a Linux web host? No. You can develop your sites online using our web hosting service as you build websites and applications. Keywords : linux, web-hosting, webhosting, web hosting, linux-webhosting Wiki: development/Linux_web_hosting (last edited 2008-09-23 17:36:54 by AndrewRogers)
ESSENTIALAI-STEM
Tunstall, North Yorkshire Tunstall is a village and civil parish in the Richmondshire district of North Yorkshire, England about 2 mi west of Catterick Village and the A1(M) motorway. It had a population of 253 increasing to 271 at the 2011 census. History Tunstall was mentioned in the Domesday Book in 1096 as being in the hundred of "Land of Count Alan" and the county of Yorkshire, the population was estimated at 14.8 households. In 1870-72 John Marius Wilson's Imperial Gazetteer of England and Wales described Tunstall as:"'a township-chapelry in Catterick parish, N. R. Yorkshire; 3 miles S of Catterick-Bridge r. station. Post town, Catterick. Acres, 1,262. Real property, £2,139. Pop., 293. Houses, 66. The living is annexed to Catterick. The church was built in 1847. There are a Wesleyan chapel and a slightly endowed school.'" Governance The village lies within the Richmond (Yorks) parliamentary constituency, which is under the control of the Conservative Party. The current Member of Parliament, since the 2015 general election, is Rishi Sunak. Tunstall also lies within the Scotton ward of Richmondshire District Council. Community and culture The church was built in 1846 as a chapel of ease to St Michael and All Angels in neighbouring Hudswell. The building was grade II listed in 1969. Tunstall has one public house, The Bay Horse, which is tied to the Yorkshire-based brewer Samuel Smith.
WIKI
Talk:Battle of Musgrove Mill one sided This article is entirely from the perspective of the Patriots. The language is too colourful for an Encyclopedia article: "In the best tradition of guerrilla tactics" "the Patriots understood that they must stand and fight despite being outnumbered" "British and Loyalists" How many "British"? I suspect almost all were Americans Almost all the citations are from Edgar and Buchanan. More balance is needed.
WIKI
How Solar Electric Modules Work The cells or thin film circuits of the solar modules are specially manufactured to respond to light by producing electric current. The scientific term for “solar electricity” is “photovoltaic” energy – which means electricity from light. The more light the cells get, the more electricity can be produced. These cells when connected together, laminated and framed are called a ‘solar module’. These modules are designed to produce electricity at convenient direct current (DC) voltages for storing in a battery or for conversion into typical 120-230 volt alternating current (120 VAC). Solar electricity can be used to run DC motors, or it may be stored in batteries for later use, or converted instantly into AC power and ‘net metered’ into the utility grid. In a standalone solar electric system if a household current is needed to run 120 volt AC powered appliances like those found in most homes, the DC power stored in the battery bank must be changed from DC (direct current) to AC (alternating current) by an inverter. An inverter is a device used to change solar electricity into regular household current. In a utility-interconnected solar electric system, the DC power from the solar array is converted instantly into 120/240 volt AC power and fed directly into the utility power distribution system of the building. The power is ‘net metered’ and reduces power demand from the utility when the solar array is under the sun. These systems can lower the power bill of a building. Where To Install Your Solar Electric Modules In most instances, the modules are installed on the roof of the building, but they can be mounted on a ground rack or on a pole mount. The major factor in deciding where to place the modules is to maximize exposure to the sun and avoid shading from 9 am to 3 pm. A solar pathfinder device is available to help locate the ideal location of a solar array. At Wayne’s Solar, we have a team of extensively experienced and knowledgeable staff who can help you out with all of your solar needs. If you have more questions about how solar electric modules work, just schedule your free consultation session. You may also request a free quote by calling us at 386-673-9720! ​FREE SOLAR CONSULTATIONS Wayne’s Solar offers free solar consultations to determine the very best solar investments for your unique situation. This will help you to determine the cost savings that you can realize from a solar investment for your home or business. We can also show you how you can monitor the performance of your solar product in real-time! Schedule your consultation today, and take the first step to a green energy future today! Close Menu
ESSENTIALAI-STEM
Understanding the Evolution: From Concrete5 to Concrete CMS – Features, Rebranding, and Modern Capabilities Concrete5, now known as Concrete CMS, is an open-source content management system (CMS) designed to help users build and manage websites easily. Here’s an overview of both terms: Concrete5: • Origins: Concrete5 was first released in 2008, developed by a team led by Franz Maruna. It was designed to be a flexible and user-friendly CMS, focusing on ease of use for both developers and content editors. • Features: Concrete5 allowed users to edit content directly on the webpage, using an in-context editing interface. This “What You See Is What You Get” (WYSIWYG) approach made it particularly appealing for non-technical users who needed to manage website content without diving into code. • Modularity: The CMS was built with modularity in mind, allowing users to extend its functionality through add-ons and themes, much like other CMS platforms. Concrete CMS: • Rebranding: In 2021, Concrete5 was rebranded to Concrete CMS to better align with modern web development trends and to clarify that it is a comprehensive content management system. • Modern Capabilities: Concrete CMS continues to offer a powerful and flexible platform for website building. It includes robust features like a flexible page management system, advanced user permissions, and an integrated marketplace for add-ons and themes. • User Experience: Concrete CMS emphasizes an easy user experience with features like in-context editing, drag-and-drop functionality, and a simple yet powerful interface for managing content. • Security and Scalability: The platform is known for its strong security features and ability to scale from small websites to large, complex web applications. • Community and Support: Concrete CMS has an active community of developers and users who contribute to its ongoing development, offering support, themes, and add-ons through its official website. In summary, Concrete5 (now Concrete CMS) is a flexible, user-friendly content management system that allows users to build, manage, and maintain websites with ease. Its evolution into Concrete CMS represents its ongoing commitment to modern web standards and user experience.
ESSENTIALAI-STEM
People with panic disorder may also experience comorbid bipolar disorder, alcohol or substance use disorder, or medical problems that accompany their panic. It is common for individuals with panic disorder to have thyroid problems, respiratory issues, heart problems, or feelings of dizziness (APA, 2013). In general, it has been reported that 93.7% of people with panic disorder meet criteria for at least one other medical or mental disorder (Arch, Kirk, & Craske, 2017). That being said, comorbidity is not inevitable with panic disorder and it is important to discuss your symptoms thoroughly with a medical professional. Additionally, the causality of the link between panic disorders and medical problems remains unclear. Research upon adolescents who as infants had been highly apprehensive, vigilant, and fearful finds that their nucleus accumbens is more sensitive than that in other people when deciding to make an action that determined whether they received a reward.[56] This suggests a link between circuits responsible for fear and also reward in anxious people. As researchers note, "a sense of 'responsibility', or self-agency, in a context of uncertainty (probabilistic outcomes) drives the neural system underlying appetitive motivation (i.e., nucleus accumbens) more strongly in temperamentally inhibited than noninhibited adolescents".[56] Warren: With anxiety to the point where it’s part of a disorder — let’s say generalized anxiety disorder, mostly characterized by anxiety and worry about a whole bunch of different situations — we would treat it by teaching a patient about the role of worry in creating the symptoms and how to manage the worry. That sometimes involves challenging unrealistic thoughts or working to increase one’s ability to tolerate uncertainty, which is a big part of anxiety. Comorbidity is more common than not with anxiety disorders, meaning that most individuals who experience significant anxiety experience multiple different types of anxiety. Given this co-morbidity, it is not surprising that many risk factors are shared across anxiety disorders, or have the same underlying causes. There is a lot of research identifying risk factors for anxiety disorders, and this research suggests that both nature and nurture are very relevant. It is important to note that no single risk factor is definitive - many people may have a risk factor for a disorder, and not ever develop that disorder. However, it is helpful for research to identify risk factors and for people to be aware of them, as being aware of who might be at risk can potentially help people get support or assistance in order to prevent the development of a disorder. Anxiety can be either a short-term "state" or a long-term "trait". Whereas trait anxiety represents worrying about future events, anxiety disorders are a group of mental disorders characterized by feelings of anxiety and fear.[10] Anxiety disorders are partly genetic but may also be due to drug use, including alcohol, caffeine, and benzodiazepines (which are often prescribed to treat anxiety), as well as withdrawal from drugs of abuse. They often occur with other mental disorders, particularly bipolar disorder, eating disorders, major depressive disorder, or certain personality disorders. Common treatment options include lifestyle changes, medication, and therapy. Metacognitive therapy seeks to diminish anxiety through reducing worry, which is seen[by whom?] as a consequence of metacognitive beliefs.[11] I’m not sure if this counts as a panic attack, but lately I’ve experienced instances where my head feels like it’s being squeezed, I feel really dizzy, and I get an intense fear of becoming schizophrenic because In that moment it feels like I’m going crazy. It’s happening right now and I’m kind of freaking out because the feeling won’t stop. I’m worried that it’ll never go away and I’ll be like this forever. Hopefully this is just a panic attack? If the person has a family history of seizures or symptoms that are not typical for panic attack, a neurologist may be asked to evaluate the person. There is some overlap between the symptoms of panic attack and what is known as "partial seizures." Distinguishing between the two is important because the treatment for each is quite different. A neurologist, if consulted, will order an EEG (electroencephalogram) to check for seizure activity in the brain. This is a painless test but does require some time to complete (typically overnight). You can learn more about this in the Recovery Support area of our website. Our support area contains a wealth of self-help information on how to treat anxiety disorder, including anxiety attacks. Many find it to be their “one stop” destination for anxiety disorder help. You can click here for more information about our Recovery Support area membership options. This disorder is characterized by panic attacks and sudden feelings of terror sometimes striking repeatedly and without warning. Often mistaken for a heart attack, a panic attack causes powerful physical symptoms including chest pain, heart palpitations, dizziness, shortness of breath and stomach upset. Many people will go to desperate measures to avoid an attack, including social isolation. Research is inconsistent as to whether nutritional deficiencies (for example, zinc or magnesium deficiency) may be risk factors for panic disorder. While food additives like aspartame, alone or in combination with food dyes, are suspected to play a role in the development of panic attacks in some people, it has not been confirmed by research so far. While the term "test anxiety" refers specifically to students,[29] many workers share the same experience with regard to their career or profession. The fear of failing at a task and being negatively evaluated for failure can have a similarly negative effect on the adult.[30] Management of test anxiety focuses on achieving relaxation and developing mechanisms to manage anxiety.[29] It’s normal to feel anxious when facing a challenging situation, such as a job interview, a tough exam, or a first date. But if your worries and fears are preventing you from living your life the way you’d like to, you may be suffering from an anxiety disorder. There are many different types of anxiety disorders—as well as many effective treatments and self-help strategies. Once you understand your anxiety disorder, there are steps you can take to reduce your symptoms and regain control of your life. All human beings experience anxiety. In many cases, anxiety can have some beneficial and adaptive qualities such as pushing one to study for an upcoming difficult exam or propelling a person to flee from danger. Although experiencing some anxiety with life stressors and worries is normal, sometimes it can be difficult to manage and can feel overwhelming. Below we provide a list of tips and strategies to help individuals prevent anxiety from reaching a diagnosable level. Even though not everyone will struggle with a diagnosable anxiety disorder, learning strategies to aid in relief from anxiety and to manage the "normal" anxiety experienced in everyday life can help you live the life you desire. Separation anxiety disorder: Separation anxiety is often thought of as something that only children deal with; however, adults can also be diagnosed with separation anxiety disorder. People who have separation anxiety disorder have fears about being parted from people to whom they are attached. They often worry that some sort of harm or something untoward will happen to their attachment figures while they are separated. This fear leads them to avoid being separated from their attachment figures and to avoid being alone. People with separation anxiety may have nightmares about being separated from attachment figures or experience physical symptoms when separation occurs or is anticipated. ×
ESSENTIALAI-STEM
User:Maalancha Partho Pratim Dasgupta, 58 years,Bengali, is an alumnus of Scottish Church College (BA 1975), Calcuta,Xaviers Institute of Social Service, Ranchi (XISS- PGDPM&IR 1978). He is presently settled in Gurgaon, married to Maalancha Dasgupta with two daughters, Ankita and Aditi. Partho Dasgupta has earned a place for himself in the field of HR in the Indian Sub-Continent. He is well known for his contribution in the field of Employee Relations,Restructuring and Handling of Mergers and Acqusition. Partho during his last 33 years has been associated with Times of India as Chief Manager (Personnel), Corporate Manager - Employee Relations with ICI,Vice President - HR for Vedanta Group (India and Africa),Vice President - HR for Raymond and Raymond-UCO,Group HR Head for Escorts Group,Executive Vice President with Beiqi Foton Group in Beijing and is presently serving as President - Human Capital with Welspun Corp. a US 3 billion Group. Partho is widely travelled (26 Countries) and has handled M&A across the Globe and till recently assisted in getting top end talent from India for one of the largest manufactures of commercial vehicles in world, in China. Partho has wriiten quite few articles for TOI and other reputed magazines and is a guest faculty for various business schools of repute.
WIKI
Load Segment data to Microsoft Azure in minutes. Load your Segment data to Microsoft Azure to run custom SQL queries on your analytic events and to generate custom reports and dashboards. Combine your Segment data with other data sources, such as billing and user data, to make it even more valuable. How it works By leveraging the Alooma enterprise data pipeline, you can easily integrate, connect, and watch your Segment data flow into Microsoft Azure. Integrate Add Segment as a data source. Connect Map Segment data to Microsoft Azure. Watch See Segment data flow into Microsoft Azure. Export your Segment data along with all of your other data sources to Microsoft Azure. Segment Segment is the single hub to collect, manage and route your customer analytics data. Instead of wasting time integrating all of your tools individually, track data to Segment once. Microsoft Azure Microsoft Azure SQL Data Warehouse is a SQL-based fully managed, petabyte-scale cloud data warehouse. It is highly elastic, enabling you to provision in minutes and scale capacity in seconds.
ESSENTIALAI-STEM
Armando Wila Armando Lenin Wila Canga (born 12 May 1985) is an Ecuadorian footballer currently playing for LDU Portoviejo. Club career Wila started his career at Deportivo Cuenca. With just one appearance for Cuenca, he was loaned out to many other clubs. In 2009, Wila was loaned out to Técnico Universitario where he has had the most success in his career. Currently, he is the team's second goalscorer after Omar Guerra with 6 goals. In July 2009, in a game against ESPOLI, Wila was banned out of football for three months after he chested and argued with the referee about a play which got him a red card. It was confirmed that Wila would be joining Barcelona for the 2015 Serie A. In 2015, Wila joined Saudi Professional League side Al-Nassr FC. In February 2019, Wila joined LDU Portoviejo alongside his older brother Polo Wila. International career Wila was called up for an unofficial friendly on April 23, 2014 against the Serie A Rest of the World team composed of foreigners. He scored his 1st goal for Ecuador in this very same game. Ecuador went on to win the match 2-1. Wila made his "Official" debut for Ecuador against Netherlands on May 17, 2014. He was subbed out during the 2nd half due to an injury for Fidel Martínez. Statistics As of 15 May 2015 Club * Al-Nassr * Saudi Professional League (1): 2014-15
WIKI
Explain Primary Constructor in C# 12 A Primary Constructor is a new way to write constructors in C# 12 that makes your code shorter and easier to read. How Does It Work? 1. Where to Write It: You write the primary constructor right after the class or struct name inside parentheses. 2. Using Parameters: The parameters you define in the primary constructor can be used throughout the class or struct. For example, you can declare a class with a primary constructor like this. public class Student(string name, int age) { // primary constructor parameters are in scope here } The primary constructor parameters name and age are not public properties, but they can be used to initialize public properties like this. public class Student(string name, int age) { public string Name { get; } = name; // initialize a readonly property public int Age { get; set; } = age; // initialize a read-write property } You can also use primary constructor parameters to call a base constructor like this. public class Alumni(string name, int age, string school) : Student(name, age) { public string School { get; } = school; } In this example, • Student is a class with a primary constructor that takes name and age as parameters. • These parameters are used to set the values of the properties Name and Age. Why Use It? • Less Code: You don’t need to write a separate constructor method. • Clearer Code: It’s easier to see what the class needs to be created. Important Note • If you use a primary constructor, the class won’t have a default (parameterless) constructor unless you add one yourself. Some Limitations • Primary constructor parameters are not stored as fields unless they are needed. This means they do not consume memory or affect the size of the type. • Primary constructor parameters are not members of the type. This means you cannot access them using this or base or use them in attribute arguments or default parameter values. • Primary constructor parameters can be assigned to them, but they are not properties. This means they do not have getters or setters, and they do not support attributes or modifiers. • Primary constructor parameters are only available in the type where they are declared. This means derived types do not inherit them and are not visible to external callers. • Every other constructor for a class must call the primary constructor, directly or indirectly, through this() constructor invocation. This ensures that primary constructor parameters are always assigned and available in the type. Similar Articles
ESSENTIALAI-STEM
Closterkeller Closterkeller is a Polish gothic rock band from Warsaw. It was formed in 1988 by Przemysław Guryń, Jacek Skirucha, and the vocalist Anja Orthodox. Despite many changes in the band's line-up it has created a characteristic sound. Orthodox is the only member of the original line-up, performing continuously for over 30 years. The band is called one of the forerunners of gothic and atmospheric rock in Poland. They are also influenced by other music styles such as new, cold wave, and heavy metal. Many other groups like Delight, Moonlight or Artrosis said they took inspiration from Closterkeller. Current members * Anja Orthodox – vocals, keyboards (1988–present) * Michał "Rollo" Rollinger – keyboards (1990–present) * Adam "Najman" Najman – drums (2014–present) * Aleksander "Olek" Gruszka – bass guitar (2014–present) * Michał Jarominek – guitars (2016–present) Former members * Grzegorz Tomczyk – drums (1988–1989) * Przemysław Guryn – keyboards (1988–1991) * Jacek Skirucha – guitars (1988–1992) * Tomasz "Wolfgang" Grochowalski – bass guitar (1988–1992) * Andrzej "Szczota" Szymańczak (deceased) – drums (1989–1991) * Piotr Bieńkowski – drums (1989–1990) * Marcin "Freddie" Mentel – guitars (1999–2006) * Paweł Pieczyński – guitars (1992–2000) * Robert Ochnio – guitars (1992) * Marcin "Pucek" Płuciennik – bass guitar (1999–2006) * Piotr "Pawłoś" Pawłowski – drums (1991–1997) * Dariusz Boral – keyboards (1995–1996) * Tomasz "Mechu" Wojciechowski – keyboards, guitars (1996–1998) * Andrzej Kaczyński – bass guitar (1999) * Piotr Czyszanowski – bass guitar (1999) * Tomasz Kasprzycki – guitars (1992) * Mikis Cupas – guitars (1991) * Jarosław Kidawa – guitars (1991) * Zbigniew Kumorowski – drums (1990–1991) * Krzysztof Dominik – drums (1989) * Janusz Jastrzębowski – drums (2006–2011) * Gerard "Gero" Klawe – drums (1997–2006, 2011–2013) * Krzysztof Najman – bass guitar (1992–1999, 2006–2014) * Robert "Qba" Kubajek – drums (2013–2014) * Zuzanna "ZuZa" Jaśkowiak – guitars (2014) * Mariusz Kumala – guitars (2006–2013, 2014–2015) Music videos Source * "Purple" (1990, directed by: Marek Jurkowski) * "Nieuchwytny" (1990, directed by: Marek Jurkowski) * "Maska" (1990, directed by: Marek Jurkowski) * "Czekając na dzień" (1991, directed by: Marek Jurkowski) * "I jeszcze raz do końca" (1991, directed by: Marek Jurkowski) * "Immanoleo" (1992, directed by: Marek Jurkowski) * "Blue" (1992, directed by: Marek Jurkowski) * "Spokój" (1992, directed by: Marek Jurkowski) * "Iluzyt" (1992, directed by: Marek Jurkowski) * "Agnieszka" (1993, directed by: no data) * "W moim kraju" (1993, realization: Katarzyna Kanclerz) * "Babeluu" (1994, realization: Katarzyna Kanclerz) * "Supernova" (1994, realization: TVP) * "Scarlett" (1995, directed by: Jerzy Grabowski) * "Owoce wschodu" (1995, directed by: no data) * "Dlaczego noszę broń" (1995, realization: TVP) * "Władza" (1996, directed by: no data) * "Cisza w moim domu" (1996, directed by: no data) * "Dwa dni" (1997, realization: TVP) * "Na krawędzi" (1999, directed by: no data) * "Czas komety" (1999, directed by: no data) * "Zegarmistrz światła" (2000, directed by: no data) * "A nadzieja" (2000, production: Krzysztof Wasilewski) * "Poza granicą dotyku" (2003, directed by / realization: Radek "LarryTM" Grabiński) * "Ktokolwiek widział" (2004, directed by / realization: Radek "LarryTM" Grabiński) * "Królowa" (2004, directed by / realization: Radek "LarryTM" Grabiński) * "Lunar" (2005, directed by: no data) * "Nocarz" (2010, directed by: Stanisław Mąderek) * "Nie tylko gra" (2010, directed by: Stanisław Mąderek) * "Ogród półcieni" (2010, directed by: no data)
WIKI
Я пытался установить / скомпилировать драйвер php-firebird для php7.4 на macos, но пока безуспешно. В репозитории драйверов есть проблема, но с точки зрения помощи не так много. https://github.com/FirebirdSQL/php-firebird/issues/6 Пока я сделал это: 1. Установлен https://github.com/FirebirdSQL/firebird/releases/download/R2_5_9/FirebirdCS-2.5.9-27139-x86_64.pkg (также пробовал с firebird 3.x) 2. Клонировал это репо в php-firebird 3. cd php-firebird 4. phpize 5. CPPFLAGS=-I/Library/Frameworks/Firebird.framework/Versions/Current/Headers LDFLAGS=-L/Library/Frameworks/Firebird.framework/Versions/Current/Libraries ./configure 6. make ... и здесь начинаются ошибки /Users/bonovski/Sandbox/php-firebird/ibase_query.c:159:24: warning: equality comparison result unused [-Wunused-comparison] ib_result->stmt_res == NULL; ~~~~~~~~~~~~~~~~~~~~^~~~~~~ /Users/bonovski/Sandbox/php-firebird/ibase_query.c:159:24: note: use '=' to turn this equality comparison into an assignment ib_result->stmt_res == NULL; ^~ = /Users/bonovski/Sandbox/php-firebird/ibase_query.c:178:22: warning: equality comparison result unused [-Wunused-comparison] ib_query->stmt_res == NULL; ~~~~~~~~~~~~~~~~~~~^~~~~~~ /Users/bonovski/Sandbox/php-firebird/ibase_query.c:178:22: note: use '=' to turn this equality comparison into an assignment ib_query->stmt_res == NULL; ^~ = /Users/bonovski/Sandbox/php-firebird/ibase_query.c:253:22: error: use of undeclared identifier 'blr_bool' case blr_bool: ^ /Users/bonovskiSandbox/php-firebird/ibase_query.c:254:34: error: use of undeclared identifier 'SQL_BOOLEAN' a->el_type = SQL_BOOLEAN; ^ /Users/bonovski/Sandbox/php-firebird/ibase_query.c:598:22: error: use of undeclared identifier 'SQL_BOOLEAN' case SQL_BOOLEAN: ^ /Users/bonovski/Sandbox/php-firebird/ibase_query.c:724:25: warning: incompatible pointer types passing 'zend_long *' (aka 'long long *') to parameter of type 'const time_t *' (aka 'const long *') [-Wincompatible-pointer-types] res = php_gmtime_r(&Z_LVAL_P(b_var), &t); ^~~~~~~~~~~~~~~~ /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX.sdk/usr/include/time.h:127:46: note: passing argument to parameter here struct tm *gmtime_r(const time_t * __restrict, struct tm * __restrict); ^ /Users/bonovski/Sandbox/php-firebird/ibase_query.c:790:18: error: use of undeclared identifier 'SQL_BOOLEAN' case SQL_BOOLEAN: ^ /Users/bonovski/Sandbox/php-firebird/ibase_query.c:795:32: error: use of undeclared identifier 'SQL_BOOLEAN' var->sqltype = SQL_BOOLEAN; ^ /Users/bonovski/Sandbox/php-firebird/ibase_query.c:883:18: error: use of undeclared identifier 'SQL_BOOLEAN' case SQL_BOOLEAN: ^ /Users/bonovski/Sandbox/php-firebird/ibase_query.c:1386:14: error: use of undeclared identifier 'SQL_BOOLEAN' case SQL_BOOLEAN: ^ /Users/bonovski/Sandbox/php-firebird/ibase_query.c:1985:18: error: use of undeclared identifier 'SQL_BOOLEAN' case SQL_BOOLEAN: ^ /Users/bonovski/Sandbox/php-firebird/ibase_query.c:2012:18: error: use of undeclared identifier 'SQL_BOOLEAN' case SQL_BOOLEAN: ^ 3 warnings and 9 errors generated. make: *** [ibase_query.lo] Error 1 0 Bonovski 20 Май 2021 в 08:19 1 ответ Лучший ответ Ошибки, связанные с логическим типом данных, появившиеся в Firebird 3.0, ясно показывают, что ваша библиотека PHP ожидает Firebird 3+, но вы предоставляете ей исходники FB 2.5 или более ранней версии. CPPFLAGS=-I/Library/Frameworks/Firebird.framework/Versions/Current/Headers LDFLAGS=-L/Library/Frameworks/Firebird.framework/Versions/Current/Libraries Я думаю, что после того, как вы установили FB 2.5, Versions/Current, о котором вы упомянули, был создан как символическая ссылка на источники 2.5. Если вы установили исходные коды версии 3.0 - проверьте, на что указывает символическая ссылка Versions/Current, и при необходимости измените ее на источники версии 3.0 (ln -s в Linux, угадайте то же самое в утилитах командной строки BSD) Быстрая проверка, вероятно, открыла бы ibase.h в этом месте и проверила бы объявление версии API: в моем окне Windows прямо сейчас третья строка без комментариев следующая: #define FB_API_VER 21 в этом файле в папке с Firebird 2.1 .7 установлен. В качестве альтернативы отрегулируйте CPPFLAGS и LDFLAGS и, возможно, другие переменные, чтобы они указывали на конкретные источники версии 3.x, а не на какие-то неопределенные "по умолчанию" или "текущие". Эта настройка флагов, конечно, имеет смысл только в том случае, если вам нужны исходные коды FB 2.5, установленные как «текущие» для некоторых других целей вместе с источниками FB 3. Я не знаю, что такое UNIX, но, по крайней мере, в Windows тривиально и иногда удобно иметь несколько установленных / работающих серверов Firebird разных или даже одной и той же версии. Это может случиться и с некоторыми будущими читателями. 2 Arioch 'The 20 Май 2021 в 17:12
ESSENTIALAI-STEM
Jeffrey ALNWICK, Marie Alnwick and Big Blue Products, Inc., Plaintiffs, v. EUROPEAN MICRO HOLDINGS, INC., European Micro Plc., American Micro Computer Center, Inc., John B. Gallagher and Harry D. Shields, Defendants. No. 99-CV-7380 (ADS)(ARL). United States District Court, E.D. New York. Sept. 15, 2003. Cohen Tauber Spievack & Wagner LLP, New York, NY (Jay B. Spievack, Stephen Wagner, Andrea J. Lawrence, Leo L. Ess-es, and Kayo Naruse, of Counsel), for Plaintiffs. Phillips Nizer, LLP, New York, NY (Stuart A. Summit, and Michael Fischman, of Counsel), for Defendants. SPATT, District Judge. In this case, the plaintiffs Jeffrey Aln-wick, Marie Alnwick (the “Alnwicks”) and Big Blue Products, Inc. (“BBP”) (collectively, the “plaintiffs”) allege that the defendants European Micro Holdings, Inc. (“EM Holdings”), European Micro Pic. (“European Micro”), American Micro Computer Center (“AMCC”), John B. Gallagher (“Gallagher”) and Harry B. Shields (“Shields”) (collectively, the “defendants”) engaged in a scheme to defraud the plaintiffs in a joint venture known as Big Blue Europe, B.V. (“BBE”). Presently before the Court are two motions, one by the defendants to dismiss the amended complaint pursuant to Rules 9(b) and 12(b)(6) of the Federal Rules of Civil Procedure and on the basis of forum non conveniens, and another by the plaintiffs to file a second amended complaint pursuant to Rule 15(a) of the Federal Rules of Civil Procedure. I. BACKGROUND The facts in this case are detailed in the Court’s decision of March 22, 2001, Alnwick v. European Micro Holdings, Inc., 137 F.Supp.2d 112, 114-118 (E.D.N.Y.2001) and familiarity with that decision is presumed. Only the facts central to these motions are set forth here. A. The Parties BBP is a New York corporation with its principal place of business in Huntington Station, New York. BBP is engaged in the business of buying and selling computer parts in the United States, with limited operation in Europe. The Alnwicks are residents of Huntington, New York and are principals in BBP. EM Holdings is a Nevada corporation with its principal place of business in Miami, Florida. Through its subsidiaries, EM Holdings was engaged in the business of distributing “microcomputer option products” to customers primarily in Western Europe and was engaged in the business of buying and selling computer parts. Presently, EM Holdings has virtually no monies or assets and is no longer in operation. European Micro is a British corporation with its principal place of business in Che-sire, England. Through its subsidiaries, European Micro was engaged in the business of distributing microcomputer option products to customers primarily in Western Europe and was in the business of buying and selling computer parts. Presently, European Micro has virtually no monies or assets and is no longer in operation. AMCC is a Florida corporation with its principal place of business in Miami, Florida. Upon information and belief, presently, AMCC operates all of EM Holdings’ computer parts business. Gallagher is a resident of Ft. Lauder-dale, Florida. Upon information and belief, he has been a controlling principal of EM Holdings, European Micro and AMCC. Shields is a resident of Nashville, Tennessee. Upon information and belief, he has been a controlling principal of EM Holdings, European Micro and Square 1 International Ltd. (“Square 1”). B. The Facts The facts are taken from the amended complaint unless otherwise noted. In late November or early December 1996, the Alnwicks entered into an oral agreement with Shields and Gallagher to form a joint venture company to engage in the purchase and sale of computer parts in Europe. This oral agreement contained three parts: the European Joint Venture Agreement, the Shareholders’ Capital Contribution Agreement and the Big Blue License Agreement. In the European Joint Venture Agreement, the Alnwicks and BBP agreed with the EM Group to form BBE to purchase and sell computer parts in Europe. The EM Group consisted of European Micro, Technology Express, AMCC, Ameritech Argentina SA, Ameritech Exports, Inc., and any successors, assignees, affiliates, parents or subsidiaries or any companies owned, controlled or managed by Shields and Gallagher. In this agreement, the parties agreed to model the joint venture after BBP and to use their “best efforts” to assist BBE to meet its business and financial objectives. The amended complaint notes that the material terms of this agreement are contained in various writings. However, no writings are attached and neither party provides the Court with a copy of these alleged writings. The European Joint Venture Agreement also contained an oral Non-Competition Agreement which was designed to preserve the demarcation between BBP (computer parts business in the United States), the defendants’ computer options business in Europe, and BBE (computer parts business in Europe). The Non-Competition Agreement provided that, subject to certain unspecified limited exceptions, BBE could not solicit, buy or sell computer parts in the United States; BBE could not solicit, buy or sell computer options in Europe; Shields, Gallagher and the EM Group companies could not solicit, buy or sell computer parts in Europe or the United States; and neither the Alnwicks nor BBP could solicit, buy or sell computer parts in Europe. The Shareholders’ Capital Contribution Agreement appointed the Alnwicks, Shields and Gallagher the sole shareholders in BBE; issued 530,000 shares of BBE stock; allotted 132,500 shares of stock to each shareholder; appointed each shareholder to BBE’s Board of Directors; required the Alnwicks to contribute $132,500 worth of computer parts products in exchange for 50% of BBE stock; and required Shields and Gallagher to contribute a combined contribution of $132,500 in cash in exchange for 50% ownership of BBE stock. The amended complaint notes that the material terms of the Shareholders’ Capital Contribution Agreement are contained in a writing. However, no writings are attached and neither party provides the Court with a copy of this alleged writing. In the Big Blue License Agreement, the Alnwicks and BBP agreed to license the service mark “Big Blue” to BBE to be used in accordance with the terms of the European Joint Venture Agreement. Shortly after the oral agreement to form a joint venture, the Alnwicks, Shields and Gallagher launched BBE. The Alnwicks allegedly accomplished their preliminary goals for BBE, including the creation of its infrastructure, the hiring and training of its sales force, the setting up of its headquarters, the crafting of its inventory management system, the implementing of its policies and procedures and the developing of its new and significant accounts. In developing BBE’s infrastructure, the Aln-wicks and BBP disclosed most of their trade secrets to BBE and the defendants, including, (i) customer contacts, lists and leads; (ii) supplier contacts, lists and leads; (iii) method of inventory acquisition; (iv) method of dismantling and testing computer equipment and computer parts inventory; (v) method of pricing computer parts inventory, inventory management and movement; and (vi) method of operating BBP’s business. In contrast to the Alnwicks’ efforts, Shields and Gallagher allegedly attempted to weaken the joint venture through gross mismanagement of its affairs and encumbering it with unnecessary and exorbitant debt. Shields, Gallagher, European Micro and AMCC took steps to develop its “nascent” computer parts business in violation of the Non-Competition Agreement. In order to severely undermine BBE’s chances of success, they along with other EM Group companies bought and sold computer parts in direct competition with BBP in the United States and BBE in Europe. In May 1997, upon information and belief, Shields and Gallagher transferred their shares in BBE to European Micro without the Alnwicks’ knowledge or consent. Upon information and belief, they did this to impress upon institutional and individual investors that the EM Group was committed to expanding its computer options business into the computer parts business. This was done with the hope to attract additional investors to their anticipated EM Group IPO. Because Shields and Gallagher required the Alnwicks’ consent before transferring their shares, they “fraudulently represented” to them that the transfer to European Micro would assist in the success of BBE by providing it with access to additional capital sources, potential financial resources to expand its business through the acquisition of competitors, greater visibility, and a significantly stronger position to market and obtain major European accounts for BBE. The amended complaint further alleges that in spite of these representations, Shields and Gallagher intended to use the monies from the EM Group IPO for their computer options business and their own independent computer parts business which would have an adverse financial impact on the Alnwicks, BBP and BBE. Based on these representations, the Aln-wicks consented to the transfer of the BBE shares to Shields and Gallagher to European Micro. This was memorialized in a new agreement, the Shareholders’ Cross-Purchase Agreement. In September 1997, European Micro, Shields and Gallagher convinced the Aln-wicks to permit BBE to secure a short-term loan to expand its operations. To induce the Alnwicks’ consent, it is alleged that Shields and Gallagher “fraudulently represented” that the loan would accelerate BBE’s growth by allowing it to: (i) purchase more computer equipment to dismantle and process into computer parts inventory that ultimately would be sold to new accounts; (ii) hire more employees to service these new accounts; and (iii) develop large deals for BBE involving the EM Group’s Premier Dealer Business Program. Notwithstanding these representations, European Micro, Shields, Gallagher and AMCC sought the short-term loan to burden BBE with debt obligations and devalue BBE’s business and stock. In October 1997, the Alnwicks agreed to allow BBE to obtain a $350,000 loan from Salinas Investment Company (the “Salinas Loan”). In December 1997, Shields and Gallagher created EM Holdings as the parent company for European Micro and the other companies in the EM Group. It is alleged that they then attempted to strengthen EM Holdings and its subsidiaries in anticipation of the EM Group IPO and to weaken the financial position of BBE and the Alnwicks. In March 1998, Shields and Gallagher offered to buy the Alnwicks’ interest in BBE. The Alnwicks rejected this offer but agreed to cede daily management control over BBE to Shields, Gallagher and European Micro. Upon gaining control of the daily management of BBE, Shields, Gallagher, European Micro and AMCC introduced new policies and procedures to depreciate the value of BBE and the Alnwicks’ interest in that company. In June 1998, Shields and Gallagher completed the EM Holdings’ IPO. However, in breach of their previous promises to the Alnwicks, they did not use the IPO proceeds to further develop BBE’s business. In October 1998, at the direction of Shields, Gallagher, European Micro, AMCC and EM Holdings and without the knowledge or consent of the Alnwicks, BBE solicited computer parts business from United States-based companies and United States divisions of foreign companies in the market for buying and selling computer parts in the United States. At the same time, European Micro and European Micro B.V., an entity within the EM Group, aggressively solicited computer parts business in Europe while either Nor’Easter, an unexplained entity, or AMCC or other affiliated EM Group companies solicited computer parts business in the United States. Allegedly, the reason for the shift in the EM Group’s core business from computer options to computer parts arose largely from the deterioration in the computer options market and the rise in the computer parts market. It is further alleged that during the time that the defendants allegedly used BBE to solicit computer parts business in the United States, the defendants entered into a number of unfavorable loan transactions without the Alnwicks’ knowledge or permission. Those loans included: (a) EM Holdings’ buy-out of the Salinas Loan to BBE on terms significantly more onerous to BBE than the original Salinas Loan; (b) a $250,000 increase in the Rabobank credit line; (c) European Micro’s $100,000 loan to BBE in violation of a new capital contribution agreement between European Micro and the Alnwicks; and (d) European Micro’s $150,000 loan to BBE in violation of the same agreement. Allegedly, the purpose of these loans was: (1) to continue to damage the financial position of the plaintiffs; and (2) to have EM Holdings and European Micro become the largest combined creditor of BBE. In June 1999, the Alnwicks sought to terminate the joint venture and dissolve BBE in accordance with the Shareholders’ Cross Purchase Agreement. In response, Shields and Gallagher informed them that the necessary paperwork to transfer their shares to EM Holdings had never been filed and thus under Dutch law, the corporation could not be liquidated. On July 16, 1999, Shields and Gallagher offered to purchase the Alnwicks’ interest in BBE for $200,000. In August 1999, Shields and Gallagher informed the Alnwicks of the European Micro loans for the first time and provided them with a report on BBE which set forth the significant debt and encumbrances that the defendants had placed upon the shareholders’ equity of BBE without the knowledge or consent of the Alnwicks. On September 17, 1999, Shields and Gallagher reiterated their offer of $200,000, less the Alnwicks’ payment obligations concerning the outstanding loans made to BBE. Shields and Gallagher then threatened the Alnwicks that if they did not agree to the offer, they would seek to collect their loans and reorganize or liquidate BBE. The Alnwicks rejected the offer. In response, Shields and Gallagher threatened that, if the Alnwicks did not accept their offer, they would contact Ra-bobank as a creditor of BBE and call in all of its loan on October 31,1999. On October 8, 1999, BBE and the Aln-wicks filed an action against European Micro and EM Holdings in the District Court of Amsterdam, Holland seeking to attach European Micro’s shares of BBE and attach all loan proceeds owed to European Micro and EM Holdings pending the outcome of all disputes involving the defendants. That day, the Alnwicks informed the Dutch Court that it intended to file another action against the defendants within four weeks in both the United States and Holland. The Dutch Court then granted a temporary attachment on the condition that BBE and the Alnwicks file their lawsuits in the United States and Holland within 30 days. On December 31, 2000, the parties liquidated BBE. It is alleged that between the summer and fall of 2001, Shields and Gallagher engaged in a series of “fraudulent conveyances” designed to deplete EM Holdings and European Micro of their assets to the detriment of legitimate creditors, including the Alnwicks and BBP. On August 17, 2001, European Micro’s primary lender, NatWest, froze all of its operating accounts and threatened to call due its loans to European Micro as a result of its poor financial condition. In response, Shields made a series of “facially transparent” loans in the amount of $1.9 million to European Micro to satisfy the NatWest loans. EM Holdings also gave European Micro a loan in an unspecified amount. Upon information and belief, Shields and Gallagher intended to liquidate European Micro for the purpose of: (a) repaying Shields and Gallagher for loans made by them to European Micro; (b) generating cash for EM Holdings to pay off its debts; (c) enabling Shields and Gallagher, the only remaining secured EM Holdings’ debt-holders, to privatize a small group of privately-held computer parts businesses; and (d) rendering European Micro judgment proof to prevent the Alnwicks and BBE from pursuing their claims against it. In July 2001, EM Holdings was not able to satisfy its obligations to creditors, including its senior lender SouthTrust Bank (“SouthTrust”) and Gallagher. South-Trust directed EM Holdings to repay immediately all of its loan by August 15, 2001. On August 21, 2001, EM Holdings repaid its loan to SouthTrust. About that time, Gallagher also directed EM Holdings to repay his loan. In September 2001, EM Holdings transferred ownership of AMCC to its former shareholders, including Gallagher. This transfer rendered EM Holdings a “defunct company”, lacking assets and an operating business. In exchange for this transfer, AMCC and its former shareholders gave a “financially transparent” release to EM Holdings from any of its obligations to AMCC and its former shareholders. Upon information and belief, on October 12, 2001, the plaintiffs allege that Shields and others formed Square 1 which was a computer parts company founded on the trade secrets and proprietary information that the Alnwicks and BBP provided to the defendants pursuant to their joint venture agreement. Further, upon information and belief, Shields and Gallagher allegedly reinvested the money and assets that they received from the liquidation of European Micro and EM Holdings in connection with the AMCC stock transfer to launch Square 1 and to aggressively fund AMCC in the computer parts market. C. The Procedural History On November 12, 1999, the plaintiffs commenced this action. Initially, the Court dismissed the complaint in its entirety on the ground that the Netherlands was a more convenient forum to litigate this case. Alnwick, 137 F.Supp.2d at 112. The Second Circuit then vacated that decision and remanded the case for reconsideration in light of a recent decision concerning the dismissal of actions pursuant to the doctrine of forum non conveniens. Alnwick v. European Micro Holdings, Inc., 29 Fed.Appx. 781, 782 (2d Cir. Mar.15, 2002). The plaintiffs have now filed an amended complaint containing 17 claims. The first claim alleges that all of the defendants misappropriated trade secrets relating to BBP’s business. The second claim alleges that Shields, Gallagher, European Micro and AMCC fraudulently induced the plaintiffs to enter into the joint venture agreement in order to learn the plaintiffs’ trade secrets and develop their own independent computer parts business. The third claim alleges that EM Holdings aided and abetted Shields, Gallagher, European Micro and AMCC in their scheme to defraud the plaintiffs in the joint venture. The fourth claim alleges that Shields and Gallagher breached the European Joint Venture Agreement by failing to use their best efforts to help BBE meet its business and financial objectives. The fifth claim alleges that Shields and Gallagher breached the Shareholders’ Capital Contribution Agreement by transferring their BBE shares to European Micro without the Alnwicks’ knowledge or permission. The sixth claim alleges that Shields and Gallagher breached the Shareholders’ Second Capital Contribution Agreement by fading to make their required capital contributions to BBE. The seventh claim alleges that European Micro breached the Shareholders’ Second and Third Capital Contribution Agreements by failing to make its required contributions to BBE. The eighth claim alleges that European Micro breached the Shareholders’ Cross-Purchase Agreement by encumbering BBE’s shares without the Alnwicks’ knowledge and consent and by failing to provide the Alnwicks with advance notice of the First European Micro Loan and the Second European Micro Loan. The ninth claim alleges that European Micro and AMCC breached the European Joint Venture Agreement and the Non-Competition Agreement on various grounds. The tenth claim alleges that Shields, Gallagher and European Micro breached the Big Blue License Agreement by causing BBE to solicit, buy and sell computer parts in the United States computer parts market using the service mark of “Big Blue” in direct competition against BBP. The eleventh claim alleges that Shields, Gallagher, EM Holdings and AMCC tor-tiously interfered with various contracts in connection with BBE in that they intentionally induced European Micro to breach those contracts. The twelfth claim alleges that European Micro tortiously interfered with various contracts in connection with BBE in that it intentionally induced Shields and Gallagher to breach those agreements. The thirteenth claim alleges that Shields and Gallagher breached their fiduciary duty to the Alnwicks on various grounds. The fourteenth claim alleges that European Micro breached its fiduciary duty to the Alnwicks on various grounds. The fifteenth claim alleges that European Micro and AMCC aided and abetted Shields’ and Gallagher’s breach of their fiduciary duty to the Alnwicks. The sixteenth claim alleges that Shields and Gallagher aided and abetted European Micro’s breach of its fiduciary duty to the Alnwicks. The seventeenth claim alleges that Shields, Gallagher and AMCC fraudulently transferred the assets of European Micro and EM Holdings to Square 1 and AMCC in order to render claims against European Micro and EM Holdings uncol-lectible. The defendants now move to dismiss the amended complaint in its entirety. In support of this motion, the defendants present a number of contentions. First, the first claim for misappropriation of trade secrets does not adequately allege the prerequisites for that claim. Second, the second claim for fraud fails to satisfy the particularity requirement of Rule 9(b) and the applicable state substantive requirements for fraud. Third, the fifth claim for breach of the Shareholders’ Capital Contribution Agreement is invalid on its face because the amended complaint alleges that the plaintiffs consented to Shields’ and Gallagher’s transfer of their BBE shares to European Micro. Fourth, the ninth claim for breach of the oral Non-Competition Agreement fails to satisfy the statute of frauds. Fifth, the ninth claim for breach of the oral Non-Competition Agreement against AMCC fails to allege consideration. Sixth, the tenth claim for breach of the oral Big Blue License Agreement fails because it depends on the ninth claim which has no merit. Seventh, the eleventh claim for breach of tortious interference with various contracts in connection with BBE fails to allege “but for” AMCC’s actions the alleged breaches would not have occurred. Eighth, the seventeenth claim for fraudulent conveyance against Gallagher and AMCC fails to state a claim upon which relief can be granted. Ninth,-the remaining causes of action should be dismissed on the ground of forum non conve-niens. The Court will address each contentions separately. II. DISCUSSION A. The Standard A court may grant a Rule 12(b)(6) motion only when “ ‘it appears beyond doubt that the plaintiff can prove no set of facts in support of [her] claim which would entitle [her] to relief.’ ” Tarshis v. Riese Org., 211 F.3d 30, 35 (2d Cir.2000), abrogated on other grounds, Swierkiewicz v. Sorema N. A., 534 U.S. 506, 122 S.Ct. 992, 152 L.Ed.2d 1 (2002) (quoting Conley v. Gibson, 355 U.S. 41, 45-46, 78 S.Ct. 99, 2 L.Ed.2d 80 (1957)). A court must accept as true all of the factual allegations set out in the complaint, draw inferences from those allegations in the light most favorable to the plaintiff, and construe the complaint liberally. See id. (citing Desiderio v. National Ass’n of Sec. Dealers, Inc., 191 F.3d 198, 202 (2d Cir.1999)). Under Rule 12(b)(6), a court “must confine its consideration to facts stated on the face of the complaint, in documents appended to the complaint or incorporated in the complaint by reference, and to matters of which judicial notice may be taken.” Tarshis, 211 F.3d at 39 (citing Allen v. WestPoint-Pepperell, Inc., 945 F.2d 40, 44 (2d Cir.1991)). Except in certain limited situations, a plaintiff must only provide a “short and plain statement” that “give[s] the defendant fair notice of what the plaintiffs claim is and the grounds upon which it rests.” Swierkiewicz, 534 U.S. at 512-513, 122 S.Ct. 992 (citing Conley, 355 U.S. at 47, 78 S.Ct. 99). This notice pleading standard expects “liberal discovery rules and summary judgment motions to define disputed facts and issues and to dispose of unmeritorious claims.” Swierkiewicz, 534 U.S. at 512, 122 S.Ct. 992. In support of their motion, the defendants submit affidavits, exhibits and numerous documents which are not found in the pleadings. The Court may not consider this material in a Rule 12(b)(6) motion, see Tarshis, 211 F.3d at 39, and declines to convert their motion to one for summary judgment. See Fonte v. Bd. of Managers of Cont’l Towers Condo., 848 F.2d 24, 25 (2d Cir.1988) (stating that a court may decide to convert a Rule 12(b)(6) motion to one for summary judgment for the purposes of considering material outside the pleadings but must first allow each party an opportunity to submit supporting material). B. The Misappropriation of Trade Secrets The defendants argue that the first claim for misappropriation of trade secrets fails to state a claim for relief. In a claim of misappropriation of a trade secret, a plaintiff must show that: “(1) [she] possessed a trade secret, and (2) defendant is using that trade secret in breach of an agreement, confidence, or duty, or as a result of discovery by improper means.” Integrated Cash Mgmt. Servs., Inc. v. Digital Transactions, Inc., 920 F.2d 171, 173 (2d Cir.1990). Under New York law, a trade secret means, [A]ny device ... which is used in one’s business, and which gives [the owner] an opportunity to obtain an advantage over competitors who do not know or use it.... [Six factors are to be considered in determining whether a trade secret exists:] (1) the extent to which the information is known outside of his business; (2) the extent to which it is known by employees and others involved in his business; (3) the extent of measures taken by him to guard the secrecy of the information; (4) the value of the information to the business and to its competitors; (5) the amount of effort or money expended by him in developing the information; (6) the ease or difficulty with which the information could be properly acquired or duplicated by others. North Atl. Instruments, Inc. v. Haber, 188 F.3d 38, 44 (2d Cir.1999) (internal quotation marks and citation omitted). The amended complaint alleges that the plaintiffs possessed the following trade secrets: (a) customer contacts, lists and leads; (b) supplier contacts, lists and leads; (c) method of inventory acquisition; (d) method of dismantling and testing computer equipment and computer parts inventory, including their training of technical computer staff in connection therewith; (e) method of pricing computer parts inventory, inventory management and movement; and (f) method of operating BBP’s business. It is also alleged that all of the defendants used these trade secrets to compete against BBP in the United States computer parts market which was in violation of the Non-Competition Agreement contained in the European Joint Venture Agreement. These allegations sufficiently plead a claim of misappropriation of trade secrets. Accordingly, the motion to dismiss the first claim is denied. C. As to Common Law Fraud The defendants argue that the second claim for fraud fails to satisfy the pleading requirements of Rule 9(b) and the applicable state substantive requirements for fraud. In pleading a claim of common law fraud, the plaintiffs must satisfy the requirements of Rule 9(b) and the elements of the applicable state or federal substantive law. See 2 James WM. Moore Et Al., Moore’s Federal Practice ¶ 9:03[1][e] (3d ed. 2003) (“[I]n an action in federal district court, even if state law provides the elements of fraud, claimants must plead the circumstances constituting fraud with particularity under Rule 9(b). Therefore, even if conclusory allegations of fraud are sufficient under state law, they will be insufficient in federal district court.”). See also Marcus v. Frome, 275 F.Supp.2d 496, 504 (S.D.N.Y.2003). The Court will first address the requirements of Rule 9(b) and then the substantive elements of the applicable state law. 1. Rule 9(b) Rule 9(b) sets forth additional pleading requirements with respect to allegations of fraud. The reason for these requirements are three-fold: (1) to provide the defendant with fair notice of the claims against her; (2) to protect the defendant from harm to her reputation or goodwill as a result of unfounded allegations of fraud; and (3) to reduce the number of strike suits. See DiVittorio v. Equidyne Extractive Indus., Inc., 822 F.2d 1242, 1247 (2d Cir.1987). “[C]onclusory allegations that defendant’s conduct was fraudulent or deceptive are not enough.” Decker v. Massey-Ferguson, Ltd., 681 F.2d 111, 114 (2d Cir.1982). To satisfy the pleading requirements of Rule 9(b), the plaintiff must plead the circumstances of the fraud with particularity and that the defendant acted with fraudulent intent. Fed.R.Civ.P. 9(b). a. Pleading the Circumstances of Fraud Rule 9(b) requires that “[i]n all aver-ments of fraud or mistake, the circumstances constituting fraud or mistake shall be stated with particularity.” Fed.R.Civ.P. 9(b). In order to satisfy this requirement, the complaint must, “ ‘(1) specify the statements that the plaintiff contends were fraudulent, (2) identify the speaker, (3) state where and when the statements were made, and (4) explain why the statements were fraudulent.’ ” Shields v. Citytrust Bancorp, Inc., 25 F.3d 1124, 1128 (2d Cir.1994) (quoting Mills v. Polar Molecular Corp., 12 F.3d 1170, 1175 (2d Cir.1993)). As such, this requires the plaintiff to identify which defendant caused each allegedly fraudulent statement to be spoken, written, wired or mailed, and to whom the communication was made; when the communication was made; and how it advanced the fraudulent scheme. McLaughlin v. Anderson, 962 F.2d 187, 191 (2d Cir.1992). Where there are multiple defendants, Rule 9(b) requires that the plaintiff allege facts specifying each defendant’s contribution to the fraud. See DiVittorio, 822 F.2d at 1247 (‘Where multiple defendants are asked to respond to allegations of fraud, the complaint should inform each defendant of the nature of his alleged participation in the fraud.”). Count two of the amended complaint alleges that Shields, Gallagher, European Mico and AMCC induced the plaintiffs to enter into the joint venture so that they could: (1) weaken the financial strength of the joint venture through a number of secret self-interested transactions designed to force the plaintiffs to sell their share of the company to them for less than its actual value; and (2) learn the plaintiffs’ trade secrets in the computer parts industry and form their own independent computer parts business. In support of this claim, Shields, Gallagher and European Micro allegedly made the following fraudulent misrepresentations to the plaintiffs: (i) [their] strong presence in the European computer options market would enable BBE to become a significant presence in the international computer parts market; (ii) [they] would make their extensive network of contacts and product acquisition sources fully available to the joint venture; (iii) [they] would employ their strong financial relationships with European banks to obtain a necessary line of credit for the proposed joint venture company without any guaranty; (iv) [they] would utilize their experience and background in European financial matters to benefit the new joint venture company; and (v) [they] would make their European marketing and prospecting techniques available to BBE. Count two of the amended complaint also alleges that Shields, Gallagher and European Micro fraudulently induced the plaintiffs to consent to the transfer of Shields’ and Gallagher’s shares of BBE to European Micro. In support of this claim, Shields, Gallagher and European Micro allegedly made the following fraudulent misrepresentation to the plaintiffs: [T]he transfer [to European Micro] would prove beneficial to BBE, as the proposed [EM Group] IPO would provide defendant European Micro with the additional capital that it would, in turn, partially utilize to provide the joint venture with (i) access to additional capital sources; (ii) potential financial resources to expand its business through the acquisition of competitors; (iii) greater visibility; and (iv) a significantly stronger position to market and obtain major European accounts for BBE. The amended complaint alleges that, in reality, Shields, Gallagher, European Micro and AMCC had no intention of using the capital from the IPO to fund BBE. Rather, they intended to use the monies from the EM Group IPO for their own computer options business and their own computer parts business which would adversely affect the financial welfare of the plaintiffs and BBE. i. The Inducement to Enter into the Joint Venture As to the alleged fraud which induced the plaintiffs to enter into the joint venture, the first requirement of Rule 9(b) is satisfied because the statements that the plaintiffs argue were fraudulent are specified in the amended complaint. The second requirement is however not met because the amended complaint lumps Shields, Gallagher and European Micro together and fails to specify what each defendant said. See Mills v. Polar Molecular Corp., 12 F.3d 1170, 1175 (2d Cir.1993) (“Rule 9(b) is not satisfied where the complaint vaguely attributes the alleged fraudulent statements to ‘defendants’.”) (citing Luce v. Edelstein, 802 F.2d 49, 54 (2d Cir.1986); Doehla v. Wathne Ltd., Inc., No. 98-6087, 1999 WL 566311, *17-18 (S.D.N.Y. Aug.3, 1999)) (finding that the plaintiff failed to sufficiently plead the circumstances of fraud where all the defendants were lumped together in a group). Moreover, it does not attribute any of the statements to AMCC. The third requirement is also not satisfied because the amended complaint does not particularize where and when the statements were made. Rather, it merely alleges that they were made “in the Fall and Winter of 1996 and the first months of 1997.” This vague window of time is insufficient to satisfy the pleading standards of Rule 9(b). See Doehla, 1999 WL 566311, at *18 (finding that a four-month period during which alleged misrepresentations took place is insufficient to meet the pleading standards of Rule 9(b)); Skylon Corp. v. Guilford Mills, Inc., No. 93-5581, 1997 WL 88894, at *2 (S.D.N.Y. Mar.3, 1997) (finding that “a four-month window during which all of the misrepresentations occurred ... does not satisfy the pleading standard of Rule 9(b).”). Further, the fourth requirement is not met because it does not explain why the statements are fraudulent. Rather, the statements are vague and conclusory. They do not identify the contacts that the defendants were to make available to BBE. Nor do they identify the banks that the defendants were to employ for a line of credit for BBE. Also, the allegations that the defendants promised to utilize their experience and background in European finance to benefit BBE and that they would make their European marketing and prospecting techniques available to BBE are general assurances and efforts. See Arista Techs., Inc. v. Arthur D. Little Enters., Inc., 125 F.Supp.2d 641, 647 (E.D.N.Y.2000) (stating that “vague allegations of unstated misrepresentations, assurances, and efforts” are insufficient under Rule 9(b)). Finally, count two of the amended complaint states, in conclusory fashion, that these statements were false and misleading. ii. The Inducement to Permit the Transfer of Stock Shares As to the alleged fraud which induced the plaintiffs to consent to the transfer of BBE shares, the first requirement is satisfied because the statement that the plaintiffs argue was fraudulent is specified in the amended complaint. The second requirement is not met because the amended complaint lumps Shields, Gallagher and European Micro together and fails to specify what each said. Again, the amended complaint does not attribute the statement to AMCC. The third requirement is also not met because the amended complaint does not particularize where and when the statement was made. Rather, it alleges that it was made between May 1997 and August 1997. This vague four-month period of time is insufficient to satisfy the pleading standards of Rule 9(b). See supra Part II.B.1.a.i. However, the fourth requirement is met because the amended complaint explains why this statement was fraudulent. This statement is not vague. Rather, it states that the defendants promised to use some of the capital from the EM Group IPO to strengthen the resources of BBE. It alleges further that the defendants never intended to use this capital to help BBE. Instead, they intended to use the capital for their own computer options and computer parts business. As such, the amended complaint adequately explains why this statement is fraudulent. However, because prerequisites two and three of Rule 9(b) are not satisfied, the circumstances of this alleged misrepresentation are insufficiently plead. Based on the foregoing, all of the alleged misrepresentations in count two of the amended complaint fail to plead the circumstances of fraud with the particularity required under Rule 9(b). b. Pleading Fraudulent Intent As well as specifying the circumstances that constituted the fraud “with particularity,” the plaintiff must allege facts which give rise to a strong inference of fraudulent intent. S.Q.K.F.C., Inc. v. Bell Atl. Tricon Leasing Corp., 84 F.3d 629, 634 (2d Cir.1996) (citing Shields, 25 F.3d at 1128). However, this scienter requirement need not meet the more rigorous standard of Rule 9(b). Rather, Rule 9(b) permits the plaintiff “to allege fraudulent intent generally.” Powers v. British Vita, P.L.C., 57 F.3d 176, 184 (2d Cir.1995). Nevertheless, the plaintiff must still “ ‘provide some minimal factual basis for conclusory allegations of scienter that give rise to a strong inference’ of fraudulent intent.” Id. (citing Polycast Tech. Corp. v. Uniroyal, Inc., 728 F.Supp. 926, 935 (S.D.N.Y.1989) (citation omitted)). In order to satisfy the scienter requirement, the plaintiff must allege either: (1) facts which demonstrate that the defendant had both the motive and a clear opportunity to commit the fraud, or (2) facts which show strong circumstantial evidence of conscious behavior or recklessness by the defendants. Id. Neither the defendants nor the plaintiffs discuss whether the amended complaint sufficiently pleads fraudulent intent. Nevertheless, the Court finds that the amended complaint adequately pleads facts showing that the defendants had the requisite motive and opportunity to commit fraud. i. Motive “Motive would entail concrete benefits that could be realized by one or more of the false statements and wrongful non-disclosures alleged.” Shields, 25 F.3d at 1130. To determine whether motive is adequately alleged, courts must “assume that the defendant is acting in his or her informed economic self-interest.” Id. Courts may not base an allegation of motive on the desire of an executive to increase her company’s financial health, her desire to achieve incentive compensation, or her desire for continued employment. Id. (citations omitted). Here, the amended complaint sufficiently alleges motive. It alleges that the defendants engaged in a scheme to decrease the value of BBE in order to purchase the plaintiffs’ interest in the company at a low value. It also alleges that the defendants entered into the joint venture with the intention of learning the plaintiffs’ trade secrets and using them to form their own independent computer parts business in direct competition with the plaintiffs. ii. Opportunity A “clear opportunity” to commit fraud means that the defendant is “well positioned to carry out the fraudulent transaction.” Powers, 57 F.3d at 185; see also Shields, 25 F.3d at 1130 (stating that “[o]p-portunity ... entails the means and likely prospect of achieving concrete benefits by the means alleged”). A defendant who has the necessary trust and authority to commit fraud is well positioned. Turkish v. Kasenetz, 27 F.3d 23, 28 (2d Cir.1994) (holding that, as fiduciaries of the plaintiff trust, defendants had a clear opportunity to commit fraud). “Where pleading is permitted on information and belief, a complaint must adduce specific facts supporting a strong inference of fraud or it will not satisfy even a relaxed pleading standard.” Wexner v. First Manhattan Co., 902 F.2d 169, 172 (2d Cir.1990). It is undisputed that Shields, Gallagher and European Micro were in the position to commit fraud in this case. They agreed to form the joint venture with the plaintiffs. Shields and Gallagher were partners and each were 25% shareholders in BBE. As such, they were in the position to engage in a scheme to defraud the plaintiffs in connection with the joint venture. Since the amended complaint alleges motive and a clear opportunity to commit fraud, it sufficiently pleads fraudulent intent. However, because the amended complaint fails to adequately plead the circumstances of the fraud, count two cannot survive. Based on the foregoing, count two is dismissed for failure to comply with the pleading requirements of Rule 9(b). To complete the record, the Court will address the defendants’ remaining argument that the allegations of fraud are insufficient under New York law. 2. New York Law New York law governs this dispute because the parties assume that it applies here. See Tehran-Berkeley Civil & Envtl. Eng’rs v. Tippetts-Abbett-McCarthy-Stratton, 888 F.2d 239, 242 (2d Cir.1989) (“[Ijmplied consent to use a forum’s law is sufficient to establish choice of law.”) (citations omitted). Under New York law, the elements of a claim of fraud are that: “(1) the defendant made a material false representation, (2) the defendant intended to defraud the plaintiff thereby, (3) the plaintiff reasonably relied upon the representation, and (4) the plaintiff suffered damage as a result of such reliance.” Banque Arabe et Internationale D'Investissement v. Maryland Nat’l Bank, 57 F.3d 146, 153 (2d Cir.1995) (citing Keywell Corp. v. Weinstein, 33 F.3d 159 (2d Cir.1994)). The defendants argue that the first element is not satisfied because the alleged misrepresentations are expectations and opinions or involve the failure to perform future acts. In the first instance, it is well-settled that allegations that a party entered into a contract with the intention of breaching the contract are insufficient to support a claim of fraud under New York law. See Manning v. Utils. Mut. Ins. Co., 254 F.3d 387, 401 (2d Cir.2001) (holding that a representation that “is merely a statement of intent to perform under the contract, cannot constitute fraud in New York.”); Bridgestone/ Firestone, Inc., v. Recovery Credit Servs., Inc., 98 F.3d 13, 19-20 (2d Cir.1996) (holding that a fraud claim where the alleged misrepresentations “amount[ed] to little more than intentionally-false statements ... indicating [defendant’s] intent to perform under the contract.”). As noted above, count two of the amended complaint alleges that Shields, Gallagher and European Micro made the following representations to induce the plaintiffs to enter into the joint venture agreement: (ii) [they] would make their extensive network of contacts and product acquisition sources fully available to the joint venture; (iii) [they] would employ their strong financial relationships with European banks to obtain a necessary line of credit for the proposed joint venture company without any guaranty; (iv) [they] would utilize their experience and background in European financial matters to benefit the new joint venture company; and (v) [they] would make their European marketing and prospecting techniques available to BBE. These representations claim that Shields, Gallagher and European Micro entered into the joint venture intending to breach the agreement. As such, they are insufficient to support a claim of fraud under New York law. Second, generalized allegations that the defendants were too optimistic when they projected future prospects is insufficient to support a claim of fraud. See Decker v. Massey-Ferguson, Ltd., 681 F.2d 111, 117 (2d Cir.1982) (“[E]conomic prognostication, though faulty, does not, without more, amount to fraud.”) (internal quotation marks omitted). Count two of the amended complaint alleges that Shields, Gallagher and European Micro represented that their “strong presence in the European computer options market would enable BBE to become a significant presence in the international computer parts market.” This representation is a highly optimistic statement concerning projected future prospects. As such, it is insufficient to support a claim of fraud under New York law. Third, “ ‘[w]hile [m]ere promissory statements as to what will be done in the future are not actionable, ... it is settled that, if a promise was actually made with a preconceived and undisclosed intention of not performing it, it constitutes a misrepresentation of material existing fact upon which an action for recision [based on fraudulent inducement] may be predicated.’ ” Stewart v. Jackson & Nash, 976 F.2d 86, 89 (2d Cir.1992) (quoting Sabo v. Delman, 3 N.Y.2d 155, 160, 164 N.Y.S.2d 714, 716, 143 N.E.2d 906 (N.Y.1957)) (emphasis in original). Count two of the amended complaint alleges that Shields, Gallagher and European Micro stated to the plaintiffs that their transfer of BBE shares to European Micro would prove beneficial to BBE because the proposed IPO would provide European Micro with the additional capital to provide BBE with more resources. It further alleges that at the time the representation was made they “had no intention of infusing BBE with capital from the proposed IPO.” This representation is “an allegation of present fact which gives rise to a claim of fraudulent inducement.” Id. (citing Deerfield Comms. Corp. v. Chesebrough-Ponds, Inc., 68 N.Y.2d 954, 956, 510 N.Y.S.2d 88, 89, 502 N.E.2d 1003 (1986)). As such, this representation is sufficient under a theory of fraudulent inducement. However, because this representation does not satisfy Rule 9(b), it must be dismissed. See Hoffenberg v. Hoffman & Pollok, 248 F.Supp.2d 303, 310 (S.D.N.Y.2003) (stating that the pleader must satisfy the elements of fraudulent inducement under New York law and Rule 9(b)). Based on the foregoing, the second claim for fraud against Shields, Gallagher, European Micro and AMCC is dismissed. D. The Shareholders’ Capital Contribution Agreement The defendants contend that the fifth claim for breach of the Shareholders Capital Contribution Agreement is invalid on its face because there was no breach of that agreement. Count five of the amended complaint alleges that Shields and Gallagher breached this agreement by transferring their BBE shares to European Micro without the Alnwicks’ knowledge and consent. The defendants submit no case law to support dismissal of this claim based on consent. Accordingly, at this stage of the litigation, the motion to dismiss the fifth claim is denied. E. The Oral Non-Competition Agreement The defendants argue that the ninth claim for breach of the oral Non-Competition Agreement violates the statute of frauds under New York law. Under the statute of frauds, an agreement that cannot be performed within one year is void unless it is in writing and signed by the party to be charged. N.Y. Gen. Oblig. Law § 5-701(a) (McKinney 2003). Courts analyze oral agreements closely and the statute of frauds does not apply when there is “any possible means of performance within one year.” D & N Boening, Inc. v. Kirsch Beverages, Inc., 63 N.Y.2d 449, 455, 483 N.Y.S.2d 164, 472 N.E.2d 992 (N.Y.1984). If the oral contract is terminable at will, then the statute of frauds is not implicated. Cron v. Hargro Fabrics, Inc., 91 N.Y.2d 362, 367, 670 N.Y.S.2d 973, 694 N.E.2d 56 (N.Y.1998). Nevertheless, where a party does not have the option of terminating the contract but, instead, would be in breach of the agreement, the statute of frauds applies. Kirsch Beverages, 63 N.Y.2d at 456, 483 N.Y.S.2d 164, 472 N.E.2d 992. Count nine of the amended complaint alleges that European Micro and AMCC breached the European Joint Venture Agreement and the oral Non-Competition Agreement on various grounds. The amended complaint further states that the oral Non-Competition Agreement, which was a part of the European Joint Venture Agreement, provided that subject to certain limited exceptions, BBE could not solicit, buy or sell computer parts in the United States; BBE could not solicit, buy or sell computer options in Europe; Shields, Gallagher and the EM Group companies could not solicit, buy or sell computer parts in Europe or the United States; and neither the Alnwicks not BBP could solicit, buy or sell computer parts in Europe. Where, as here, there is no definite term of duration for the joint venture, it may be terminated at will. See Scholastic, Inc. v. Harris, 259 F.3d 73, 86 (2d Cir.2001) (“Absent any definite term of duration, the joint venture arguably is one at will.”) (citing Shandell v. Katz, 95 A.D.2d 742, 743, 464 N.Y.S.2d 177 (1st Dep’t 1983)); Artco, Inc. v. Kiddie, Inc., 88-5734, 1993 WL 962596, *8 n. 6 (S.D.N.Y. Dec.28, 1993) (“When there are no writings sufficient to satisfy the statute of frauds, an oral joint venture, if wholly or partially executed, will be deemed terminable at will.”); Hooker Chem. & Plastics Corp. v. Int’l Minerals & Chem. Corp., 90 A.D.2d 991, 991-92, 456 N.Y.S.2d 587, 589 (4th Dep’t 1982) (noting that where a joint venture or “a partnership is not limited as to time and ‘there is nothing to show the intention of parties as to its duration,’ ” it is an at will agreement) (citation omitted). Because the joint venture was an at will agreement, the parties could have terminated it within one year of its making. Artco, 1993 WL 962596, at *8 n. 6 (“New York law is clear that a venture at will can be terminated without liability for breach of contract by any partner at any time by any act which evidences intent to terminate the association.”) (citing N.Y. Partnership Law § 62(1)(b)); Ebker v. Tan Jay Intern. Ltd., 741 F.Supp. 448, 469 (S.D.N.Y.1990) (“As a partner at will, [the defendant] had the right to terminate the joint venture, and his termination of the partnership was not legally actionable.”). It therefore follows that the oral Non-competition Agreement, which was a distinct part of the joint venture agreement, could have been terminated at anytime after the joint venture was terminated. As such, the oral Non-Competition Agreement could have been performed within one year and thus does not fall within the statute of frauds. Accordingly, the motion to dismiss the ninth claim is denied. F.The Oral Non-Competition Agreement The defendants contend that the ninth claim for breach of the oral Non-Competition Agreement against AMCC is insufficient because AMCC was never a party to the joint venture agreement and that the claim fails to plead that AMCC received any consideration for entering into that agreement. Viewing the amended complaint in the light most favorable to the plaintiffs, the Court finds that it sufficiently pleads a claim against AMCC for breach of the oral Non-Competition Agreement. The amended complaint alleges that AMCC, as a member of the EM Group, was a party to the oral Non-Competition Agreement. As a party to that agreement, AMCC received consideration for entering into the agreement, namely the plaintiffs’ promise not to solicit, buy and sell computer parts in Europe. Accordingly, the motion to dismiss the ninth claim against AMCC is denied. See Newman & Schwartz v. Asplundh Tree Expert Co., Inc., 102 F.3d 660, 662 (2d Cir.1996) (finding that the question of defendant’s liability under the contract is a disputed issue, despite his argument that he is not a party to the agreement, which is not properly decided on a motion under Rule 12(b)(6)). G. The Big Blue License Agreement The defendants assert that the tenth claim for breach of the oral Big Blue License Agreement fails to state a claim for relief because it depends on the ninth claim. In particular, the defendants argue that the breach of the oral license agreement depends on the enforceability of the oral Non-Competition Agreement. As noted above, at this stage of the litigation, the oral Non-Competition Agreement is a valid agreement. Accordingly, the motion to dismiss the tenth claim is denied. H. The Tortious Interference with Contract The defendants argue that the eleventh claim for tortious interference with contract does not allege that “but for” the activities of AMCC the breach would not have occurred and does not allege the acts that AMCC committed which form the basis of this claim. In a claim of tortious interference with contract under New York law, the plaintiff must plead: (1) the existence of a contract between the plaintiff and a third party; (2) the defendant’s knowledge of that contract; (8) the defendant’s intentional, unjustified procurement of a breach of the third-party contract; and (4) ensuing damages. See Lama Holding Co. v. Smith Barney Inc., 88 N.Y.2d 413, 424, 646 N.Y.S.2d 76, 82, 668 N.E.2d 1370 (1996). The plaintiff must also “ ‘allege that there would not have been a breach but for the activities of defendants.’” Sharma v. Skaarup Ship Mgmt. Corp., 916 F.2d 820, 828 (2d Cir.1990) (internal quotation marks omitted). As such, the plaintiff must allege that the defendant was the motivating force behind the alleged breach. See id. The allegations in count eleven against AMCC are insufficient. In the first instance, the plaintiffs do not allege “but for” AMCC’s activities, European Micro would have breached the various contracts concerning the joint venture agreement. There are no allegations how AMCC contributed to European Micro’s breach of those agreements. Second, the amended complaint alleges that AMCC was a party to some of those agreement. As such, a claim of tortious interference is not permitted with respect to those agreements. See NAS Elecs., Inc. v. Transtech Elecs. PTE Ltd., 262 F.Supp.2d 134, 147-48 (S.D.N.Y.2003) (“[A] claim of tortious interference cannot be raised against a defendant who is a party to the contract.”) (citing Kosson v. Algaze, 203 A.D.2d 112, 113, 610 N.Y.S.2d 227, 228 (1st Dep’t 1994)). Accordingly, the motion to dismiss count eleven against AMCC is granted. I. The Fraudulent Transfer of Assets The defendants contend that the seventeenth claim for fraudulent transfer of assets against Gallagher and AMCC fails to state a claim for which relief can be granted. Count seventeen alleges that Shields, Gallagher and AMCC transferred all of the assets of European Micro and EM Holdings to Square 1 and AMCC in order to deprive the plaintiffs of any potential judgment. It is settled that a claim of fraudulent conveyance must satisfy the pleading requirements of Rule 9(b). See Atl. Shipping Corp. v. Chem. Bank, 818 F.2d 240, 251 (2d Cir.1987). As with the claim of fraud, the fraudulent conveyance claim is not pled with sufficient particularity. First, the plaintiffs do not identify the assets which were allegedly transferred. Second, the date of the alleged transfer, namely on or about 2001, is vague and insufficient to meet the pleading standards under Rule 9(b). See Doehla, 1999 WL 566311, at *18 (finding that a four-month period where alleged misrepresentations took place is insufficient under Rule 9(b)). Accordingly, the motion to dismiss the seventeenth claim is granted. J. As to Forum Non Conveniens 1. The Standard In & forum non conveniens analysis, a court must first determine what level of deference to accord a plaintiffs choice of forum. DiRienzo v. Philip Servs. Corp., 294 F.3d 21, 28 (2d Cir.2002) (citing Iragorri v. United Techs. Corp., 274 F.3d 65, 73 (2d Cir.2001)). After this is decided, a court must consider whether there is an adequate alternative forum. Iragorri, 274 F.3d at 73. If one exists, a court must then weigh the relative convenience of the forums by evaluating certain private and public interest factors. Id. “[T]he greater the degree of deference to which the plaintiffs choice of forum is entitled, the stronger a showing of inconvenience the defendant must make to prevail in securing forum non conveniens dismissal.” Id. at 74. a.The Deference Owed to the Plaintiffs Choice of Forum The Second Circuit has established a “sliding scale” approach to determine the proper deference to accord a plaintiffs choice of forum. Id. at 71. Under that scale, “the greater the plaintiffs or the lawsuit’s bona fide connection to the United States and to the forum of choice and the more it appears that considerations of convenience favor the conduct of the lawsuit in the United States ... [the greater deference must be accorded plaintiffs choice of a forum and] the more difficult it will be for the defendant to gain dismissal for forum non conveniens.” Id. at 72. The plaintiffs filed this case in the forum where they have their principal place of business, the Eastern District of New York. As such, the Court must accord this choice of forum great deference. See Iragorri, 274 F.3d at 71 (“[Plaintiff’s choice of forum is generally entitled to great deference when the plaintiff has sued in the plaintiffs home forum.”) (citations omitted); Wiwa v. Royal Dutch Petroleum Co., 226 F.3d 88, 101-102 (2d Cir.2000) (stating that a plaintiffs choice of forum increases as her ties to the forum increase); Murray v. British Broad. (Am.) Lumbermens Mut. Cas. Co., 330 U.S. 518, 524, 67 S.Ct. 828, 91 L.Ed. 1067 (1947) (“[A] real showing of convenience by a plaintiff who has sued in his home forum will normally outweigh the inconvenience the defendant may have shown.”). b. The Alternative Forum Next, the Court must determine whether an adequate alternative forum exists. “An alternative forum is adequate if: (1) the defendants are subject to service of process there; and (2) the forum permits ‘litigation of the subject matter of the dispute.’ ” Alfadda v. Fenn, 159 F.3d 41, 45 (2d Cir.1998) (citing Piper, 454 U.S. at 254 n. 22, 102 S.Ct. 252). It is undisputed that the Netherlands is an adequate alternative forum. c. The Balancing of the Interest Factors Having determined that an adequate alternative forum exists, the Court must now weigh the private and public interest factors to decide which forum-the Eastern District of New York or the Netherlands-is more convenient and serves the interests of justice. Iragorri, 274 F.3d at 73. The private interest factors are: (1) the relative ease of access to evidence; (2) the cost to transport witnesses to trial; (3) the availability of compulsory process for unwilling witnesses; and (4) other factors that make the trial more expeditious or less expensive. Id. at 73-74. The public interest factors are: (1) settling local disputes in a local forum; (2) avoiding the difficulties of applying foreign law; and (3) avoiding the burden on jurors by having them decide cases that have no impact on their community. Id. at 74. The private interest factors favor the plaintiffs. The parties have engaged in extensive discovery in this action. See Alnwick, 29 Fed.Appx. at 783-84 (“It has been observed that ‘whenever discovery in a case has proceeded substantially so that the parties already have invested much of the time and resources they will expend before trial, the presumption against dismissal on the grounds of forum non conve-niens greatly increases.’ ”). As noted by the Second Circuit, Shields and Gallagher, two United States citizens, are arguably the most important witnesses. Id. at 783-84. The parties here will be able to compel the testimony of foreign individuals through letters rogatory and other discovery devices. See DiRienzo, 294 F.3d at 30. Unlike here, courts in the Netherlands have the authority to prevent the plaintiffs from testifying live in connection with their fraud claims where an issue can be resolved on the written submissions. Because many documents are in English and Dutch, the translation of documents will be required in either forum. The fact that the plaintiffs filed an action in Holland first is not of great weight because they commenced that action to prevent the defendants from carrying out their threats of rendering BBE insolvent. Finally, the plaintiffs have pleaded this case as one arising from a scheme to exploit a joint venture in the computer parts industry. As such, the claims of fraud must be given great weight in this analysis. Alnwick, 29 Fed.Appx. at 784 (noting that United States courts have a strong relation to litigation where fraud is allegedly committed against its residents). The public interest factors favor the plaintiffs. The parties negotiated and entered into the joint venture agreement in the United States. The defendants’ due diligence surrounding the joint venture was allegedly conducted in New York. The individual defendants each reside in this country. New York law governs this dispute. And, finally, this case would not burden jurors by having them decide a case that does not impact their community because the plaintiffs have their principal place of business in this district. Based upon a review of the private and public interest factors in light of the great deference accorded to the plaintiffs’ choice of their home forum, the Court finds that the defendants have failed to show that the Netherlands is a more convenient and just forum than the Eastern District of New York. Accordingly, the motion to dismiss the amended complaint on the ground of forum non conveniens is denied. K. Leave to Amend The plaintiffs seek leave to file a second amended complaint in order to clarify the definition of AMCC. The defendants do not oppose this application. Pursuant to Rule 15(a) of the Federal Rules of Civil Procedure, leave to amend a complaint “shall be freely granted when justice so requires.” See Cortec Indus., Inc. v. Sum Holding L.P., 949 F.2d 42, 48 (2d Cir.1991) (“It is the usual practice upon granting a motion to dismiss to allow leave to replead.”). The Court grants the plaintiffs leave to file a second amended complaint to clarify the definition of AMCC. In addition, because today is the first occasion that the Court has addressed the sufficiency of the pleadings, it grants the plaintiffs leave to amend all of the claims that are dismissed in this decision. The second amended complaint must be filed within 30 days from the date of this order. Failure to file within this period of time wall render the dismissal of those claims to be with prejudice. III. CONCLUSION Based on the foregoing, it is hereby ORDERED, that the motion to dismiss the second claim for fraud against Shields, Gallagher, European Micro and AMCC, the eleventh claim for tortious interference with contract against AMCC and the seventeenth claim for fraudulent transfer of assets against Gallagher and AMCC is granted; and it is further ORDERED, that the motion to dismiss the remaining claims is denied; and it is further ORDERED, that the plaintiffs are granted leave to file a second amended complaint within 30 days from the date of this order and that the failure to file within this time period will render the dismissal of the second, eleventh and seventeenth claims with prejudice; and it is further ORDERED, that the parties are directed to contact United States Magistrate Judge Arlene R. Lindsay forthwith to schedule the completion of discovery; and it is further ORDERED, that the parties are directed to select a jury in this 1999 lawsuit on November 12, 2003 at 9 a.m. SO ORDERED.
CASELAW
Other What happens to the unborn baby when the mother uses illegal drugs during pregnancy? What happens to the unborn baby when the mother uses illegal drugs during pregnancy? Studies show when a pregnant woman uses illegal drugs during pregnancy it can result in miscarriage, low birth weight, premature labor, placental abruption, seizures, respiratory problems, feeding difficulties, and death of the baby and the mother. What are three effects of drugs on an unborn fetus? Illicit Drugs Illicit drug use during pregnancy may cause miscarriage, preterm labor, birth defects, stillbirth, withdrawal symptoms in the baby after birth, a higher risk of sudden infant death syndrome (SIDS), poor fetal growth rate, and cognitive and behavioral problems. What effects can drugs have on a fetus? Drugs or medication taken by the mother may cross the placenta and reach the developing fetus. The possible effects may include developmental delay, intellectual disability, birth defects miscarriage and stillbirth. What happens if a baby is born with drugs in its system? Once the supply of drugs (delivered through the mother’s umbilical cord) goes away, babies can experience painful withdrawal symptoms and other health problems. In newborns, this type of withdrawal is called neonatal abstinence syndrome (NAS). NAS can be caused by exposure to many different drugs. What harmful substances can pass from mother to baby? Tobacco, alcohol and drugs can have harmful effects on anyone’s health. When a pregnant or nursing woman uses these substances, her baby also is exposed to them, for all substances cross the placenta through the umbilical cord and enter into the baby’s bloodstream. Why is smoking bad for pregnancy? Tobacco. Smoking during pregnancy increases the risk of health problems for developing babies, including preterm birth, low birth weight, and birth defects of the mouth and lip. Smoking during and after pregnancy also increases the risk of sudden infant death syndrome (SIDS). Why is smoking bad pregnancy? Smoking during pregnancy increases the risk of health problems for developing babies, including preterm birth, low birth weight, and birth defects of the mouth and lip. Smoking during and after pregnancy also increases the risk of sudden infant death syndrome (SIDS). Why do drugs cross the placenta? A health care practitioner may recommend that a woman take certain vitamins and minerals during pregnancy. Drugs taken by a pregnant woman reach the fetus primarily by crossing the placenta, the same route taken by oxygen and nutrients, which are needed for the fetus’s growth and development. Is NAS considered a disability? NAS is a serious withdrawal syndrome that can occur in newborns after exposure to opioids during pregnancy. More research is needed to help us better understand the effects of exposure to non-essential opioids during pregnancy on the baby’s health, education, and needs for social services as they grow. Can a baby be born with a nicotine addiction? Prenatal exposure to nicotine may lead to low birth weight, premature birth, and stillbirth. Babies exposed to nicotine during pregnancy may also be born with an increased startle reflex, tremor, and other problems. Can hand sanitizer hurt a fetus? Although hand sanitizer has shown to be generally safe for both mom and baby, in addition to an effective way to clean your hands, it is not the CDC’s first recommendation. What are the four causes of birth defects? What causes birth defects? • Genetic problems. One or more genes might have a change or mutation that results in them not working properly, such as in Fragile X syndrome. • Chromosomal problems. • Infections. • Exposure to medications, chemicals, or other agents during pregnancy.
ESSENTIALAI-STEM
Page:Roosevelt in the Kansas City Star.djvu/92 30 so as to develop all his latent resources, fitting him to make good as a citizen and expecting him thus to make good. There will be, where necessary, a money compensation for the injury, but the great compensation will be the return to useful life of the man himself. The far-reaching effect of such a policy is evident. The purpose is to insist that every man, no matter how maimed, shall be made of further use in the world. If once the army acts on this theory, the great industries will follow suit. The cripple, in the sense of being a helpless or useless cripple, will largely be eliminated, and out of this war will have come another step in the slow march of mankind towards a better and more just life. is stated in a press report from Washington that the Allies wish the United States to stop sending men abroad and use its ships for food and munitions instead, but that the Administration will not agree to the plan, and furthermore that the Administration is determined that there shall be no peace until Germany is completely beaten. If the report is correct, the Administration is absolutely right on both points. As to the first point, we can well understand, in view of the steady U-boat campaign, how greatly the Allies desire food and munitions, and we regret
WIKI
The United States of America, a country whose roots had been founded on new revolutionary theories of government (Democracy), had found itself in a great position of new national wealth, after the war of 1812, which ignited the fire in the countrys patriotic policies. The country, although wrongly informed, believed that they had been victorious in the War of 1812, because of the battle that was fought in New Orleans, and was an American victory. Although the Americans had won the battle of New Orleans, and thought they had won the war, this wasnt so. The war was over before the battle even started, and a truce had been declared amongst the British and the Americans. To the new boastful Americans, this did not matter, for their presumption of victory was enough to ignite the patriotic fire which, unraveled its creative and nationalistic flare in American Literature, by providing America with its new own breed of poets and writers who sought nothing but the embellishment of their new great country. This patriotic flare also sought its light upon American Art, and gave the country a new breed of Artists who would seek out the beauty of the wonderful country, which they had created. This enraging fire also gave the country a group of new nationalistic heroes whom they could present to the world as the pride of America. The countrys new nationalistic spirit sprouted an entire shift into the new roots of American Literature. These new American writers and poets sought the embellishment of their wonderful country. This new breed of literature gave the Unites States a multitude of great writers such as Washington Irving, who no longer sought to please the European standards of literature, but instead wrote about the wonders that is America in such stories as Rip Van Winkle, or uncovered a new form of imaginative literature by giving America Sleepy Hollow, a story which no longer sought to fulfill the European standards that literature should be reserved for the aristocracy, or that the imagination should play no part in the composition of Literature. No longer did literature have to be proper, or socially appealing, this was not the concern of these new patriots who saw that they could shape the world into anything they chose, just by writing what they thought was great literature. Another great American writer of the period was James F. Cooper. ... 1684-95. O’Connor, Flannery. “Good Country People. ” The Norton Anthology of American Literature: Shorter Seventh Edition. Ed. ... nineteenth to twentieth centuries unleashed a great freedom in American literature, both in subjects explored, and ... picture of this issue of 1900s America: escape from reality. Roethke’s poem My ... and then he dreamed for better. He sought refuge from the present in the past. ... Cooper did not write about the common American, nor did he write about how the Anglo-Saxon culture, which was predominant in America, ruled the people or conducted a civilized culture. Coopers task was a different one: He wrote about how the Indian savages of America were not so savage, and were actually more civilized than they were given credit for. Cooper wrote The Last of The Mohicans, which is about nonetheless than a group of Native Americans, which he gave the perception of being more of a civilized culture than the white mans culture. Cooper also wrote other novels and stories that captured the spirit of the countys superfluous nationalism. Although not all of his work dealt with only Native Americans, he also wrote other novels that although about the white culture, they still had a good sense of nationalistic honor. Another writer, although not necessarily dealing with American Literature, instead with American social politics, Alexis de Tocqueville wrote in 1830 Democracy in America. This French writer spoke of the singularity of America because they were able to establish a country in which social class did not exist. Tocqueville also spoke of the United Stated being a Nation of Joiners, in which he denominated Americans as being very socially active where they were able to establish civic organizations, all of which were meant to help each and every American in one way or another. Tocqueville also predicted in his writing that the two great nations of the World would be The United States of America, and Russia. The Native Americans are very rich of all the other groups in terms of culture of all the other groups in America. Most of the modern ways of life in America is either directly or indirectly borrowed or learnt from the Indian cultures of long ago. Many symbols used in America today can trace their roots from the Native Indian Americans. Since the beginning of time right from independent the ... And up to this point in history he has been right, not completely though, for Russia has not been able to keep their country out of massive turmoil, but they are powerful. Then there was William Wadsworth Longfellow, who also wrote about the many patriotic adventures of Paul Reveres Midnight Ride, all of which was Longfellows idealistic view of what really happened. But nobody really was concerned whether these writers told the truth or not, as long as America looked well, the country was happy. Besides all of the new nationalistic literature America also found a new love for nationalistic art. There were new patriotic artists that in the 1820s sought of nothing else but embellishing the beauty that was America through their paintings. Gilbert Stuart (1755-1828), a Rhode Islander, who painted many portraits of George Washington, all of which were slightly dehumanized and slightly idealized. Charles Wilson Peale (1741-1827), a Marylander, painted about sixty portraits of George Washington. John Trumbull (1756-1843), a soldier in the Revolutionary War, recaptured its scenes and spirit on scores of striking canvases. James Audobon, a naturalist, painted Birds of America, which was a composition of a large variety of paintings of American birds. All of these painters had one thing that drove them all. This nationalistic spark, which influenced the artistry of the 1820s to embellish the beauty that was America. From its leaders to its birds, these artists wanted nothing more than to show the wonders of America. The United States of America, besides having an amazing quantity of artists, writers, and poets to represent them in the intellectual and artistic world, also needed a group of heroes to represent the countrys booming greatness in the social circles, and international glory. For this ominous assignment a group of very highly classified men were chosen. Amongst these were Andrew Jackson, who chased the Indians into Florida, so was considered a national hero. Stephen Decatur had gained American pride overseas by defeating the North African pirates, therefore showing the strength of the countrys naval capacity. Oliver Hazard Perry was also considered a national hero for winning the battle on Lake Erie. Noah Webster although not being a victor at war, was a victor elsewhere. Webster created the New World Dictionary, which was another reaffirmation that the United States was now its own country and would establish its own rules, and conduct all matters according to how they saw fit. After the War of 1812, a lot of drastic actions took place in America. For one the Federalists died out because they were sought as treasonous for trying to establish their secession at the Hartford Convention (1814), and for their anti-war policies. Many economic and political factors lie behind the cause of the American Civil War. Among such causes, the issue of slavery is raised repeatedly. Many men and women sacrificed all that they had in opposition to the evils of slavery. Through these hardships comes the inspiration for such an epic of American literature as Uncle Tom's Cabin, by Harriet Beecher Stowe. Her novel, a stirring indictment ... The new nationalist spark lights fires everywhere in American life. American Literature becomes universally recognized as literature for the first time. In art, the new American painters looked for all of the beauty that was America. All of the painters, writers, and poets looked to idealize America, and did it very successfully. Patriotism was at an all time high, and the whole country was riding the crest of a beautiful wave that changed what America would become forever.
FINEWEB-EDU
Wikipedia talk:WikiProject Eurovision/Archive Request items be archived here Ktkvtsh (talk) 12:48, 5 August 2023 (UTC)
WIKI
Should You Sell in May and Go Away? It’s been a year to forget for the markets as the S&P 500 SPX is off to the worst start (-13% through April) dating back to 1939. The blue-chip index fell 8.8% in April, extending the decline and marking the worst April since 1970. There’s no shortage of concerns for investors, ranging from an ongoing foreign war to high inflation and rising interest rates. After a brutal start, investors are now entering a seasonally weak period for stocks. The question now is – should you sell in May and go away? Most investors have heard this phrase before as the underperformance during the May-October period has been weak over time. Since 1950, this 6-month period has averaged just a 1.8% return, making it the weakest period of the year. The S&P 500 has been higher 65.3% of the time during this 6-month period over the past 72 years. Yet this ‘worst’ 6-month period has been higher 9 of the past 10 years, with an average return of 5.7%. May returns have been strong lately, averaging 0.94% over the past nine years. With many stocks in oversold territory and consumer sentiment hovering near historic lows, investors are wondering if the recent history will repeat itself. I’m not one for predictions; rather, I like to focus on facts. We are privileged to have many decades of market data to learn from, and it is this historical research and analysis that can help guide us in the current market environment. This begs the question – what has happened in the past when the market has started off the year extremely weak? As we can see below, the previous worst ten starts to a year haven’t corresponded to continued weakness throughout the remainder of the year. According to LPL Research, the S&P 500 experienced a 10% average gain through the rest of the year and was higher 66.7% of the time. Image Source: Zacks Investment Research It’s important to state that history rarely repeats itself exactly in the market – but it often rhymes. We don’t want to get too zoned in on any one particular statistic or data point. While other years may serve as a guidepost for what we can expect, markets are dynamic and can shift directions quickly. There are variables at play that may not have been present in those prior years, and these will impact the market’s direction moving forward. Should we sell in May? There isn’t an easy answer to this question, but history has shown that above-average returns after painful starts to the year may be waiting for us on the other side. Fear has settled into the minds of investors, many of whom may be anticipating more pain ahead. But as we know, the market has a way of proving the majority wrong. The truth is no one knows for sure what the market will do, and anyone who tells you otherwise is not to be trusted. Having a plan in place for a variety of outcomes is the key to managing portfolio risk. We’ll see how it all unfolds from here. Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report SPDR S&P 500 ETF (SPY): ETF Research Reports To read this article on Zacks.com click here. Zacks Investment Research The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
ym88659208ym87991671 Custom Memory | Документация для разработчиков Custom Memory Обновлено 4 марта 2024 Although there are a few predefined types of memory in LangChain, it is highly possible you will want to add your own type of memory that is optimal for your application. This notebook covers how to do that. For this notebook, we will add a custom memory type to ConversationChain. In order to add a custom memory class, we need to import the base memory class and subclass it. from typing import Any, Dict, List from langchain.chains import ConversationChain from langchain.schema import BaseMemory from langchain_openai import OpenAI from pydantic import BaseModel In this example, we will write a custom memory class that uses spacy to extract entities and save information about them in a simple hash table. Then, during the conversation, we will look at the input text, extract any entities, and put any information about them into the context. • Please note that this implementation is pretty simple and brittle and probably not useful in a production setting. Its purpose is to showcase that you can add custom memory implementations. For this, we will need spacy. %pip install --upgrade --quiet spacy # !python -m spacy download en_core_web_lg import spacy nlp = spacy.load("en_core_web_lg") class SpacyEntityMemory(BaseMemory, BaseModel): """Memory class for storing information about entities.""" # Define dictionary to store information about entities. entities: dict = {} # Define key to pass information about entities into prompt. memory_key: str = "entities" def clear(self): self.entities = {} @property def memory_variables(self) -> List[str]: """Define the variables we are providing to the prompt.""" return [self.memory_key] def load_memory_variables(self, inputs: Dict[str, Any]) -> Dict[str, str]: """Load the memory variables, in this case the entity key.""" # Get the input text and run through spacy doc = nlp(inputs[list(inputs.keys())[0]]) # Extract known information about entities, if they exist. entities = [ self.entities[str(ent)] for ent in doc.ents if str(ent) in self.entities ] # Return combined information about entities to put into context. return {self.memory_key: "\n".join(entities)} def save_context(self, inputs: Dict[str, Any], outputs: Dict[str, str]) -> None: """Save context from this conversation to buffer.""" # Get the input text and run through spacy text = inputs[list(inputs.keys())[0]] doc = nlp(text) # For each entity that was mentioned, save this information to the dictionary. for ent in doc.ents: ent_str = str(ent) if ent_str in self.entities: self.entities[ent_str] += f"\n{text}" else: self.entities[ent_str] = text We now define a prompt that takes in information about entities as well as user input from langchain.prompts.prompt import PromptTemplate template = """The following is a friendly conversation between a human and an AI. The AI is talkative and provides lots of specific details from its context. If the AI does not know the answer to a question, it truthfully says it does not know. You are provided with information about entities the Human mentions, if relevant. Relevant entity information: {entities} Conversation: Human: {input} AI:""" prompt = PromptTemplate(input_variables=["entities", "input"], template=template) And now we put it all together! llm = OpenAI(temperature=0) conversation = ConversationChain( llm=llm, prompt=prompt, verbose=True, memory=SpacyEntityMemory() ) In the first example, with no prior knowledge about Harrison, the "Relevant entity information" section is empty. conversation.predict(input="Harrison likes machine learning") > Entering new ConversationChain chain... Prompt after formatting: The following is a friendly conversation between a human and an AI. The AI is talkative and provides lots of specific details from its context. If the AI does not know the answer to a question, it truthfully says it does not know. You are provided with information about entities the Human mentions, if relevant. Relevant entity information: Conversation: Human: Harrison likes machine learning AI: > Finished ConversationChain chain. " That's great to hear! Machine learning is a fascinating field of study. It involves using algorithms to analyze data and make predictions. Have you ever studied machine learning, Harrison?" Now in the second example, we can see that it pulls in information about Harrison. conversation.predict( input="What do you think Harrison's favorite subject in college was?" ) > Entering new ConversationChain chain... Prompt after formatting: The following is a friendly conversation between a human and an AI. The AI is talkative and provides lots of specific details from its context. If the AI does not know the answer to a question, it truthfully says it does not know. You are provided with information about entities the Human mentions, if relevant. Relevant entity information: Harrison likes machine learning Conversation: Human: What do you think Harrison's favorite subject in college was? AI: > Finished ConversationChain chain. ' From what I know about Harrison, I believe his favorite subject in college was machine learning. He has expressed a strong interest in the subject and has mentioned it often.' Again, please note that this implementation is pretty simple and brittle and probably not useful in a production setting. Its purpose is to showcase that you can add custom memory implementations. ПАО Сбербанк использует cookie для персонализации сервисов и удобства пользователей. Вы можете запретить сохранение cookie в настройках своего браузера.
ESSENTIALAI-STEM
Talk:Weapons of the Vietnam War/Archive 1 Rename? This should at the very least be renamed "Infantry weapons of the Vietnam War" and be more like what has been done for WW2 JidGom 13:01, 24 Mar 2004 (UTC) * Well maybe you could provide an example of what has been done for WW2 so we may model this article after it. I don't think, until that time, that this article should be renamed though, because it contains both Infantry and Vehicle weapons.Thmars10 21:31, 18 April 2006 (UTC) hya No Shotguns? Didnt the U.S army make use of shotguns during patrolling in Vietnam? I remembered that because of the dense jungle, the Marines and Army saw great use of shotguns. Which model I dont know, but I guess Remington was used alot during the war. Hanchi 2006 December —The preceding unsigned comment was added by Hanchi (talk • contribs). Focus If this page is to be devoted to WEAPONS, then jeeps and trucks can only be listed in so far as they actually were used to mount weapons There is a lot missing here Headings are not precise enough --<IP_ADDRESS> 05:33, 15 February 2007 (UTC) French Mausers? Any Mauser rifles used by the VC would have come from either China (as the Nationalists had used Mausers) or the Soviet Union (which used Indochina as something of a dumping ground for obsolete weapons captured from the Germans). Other dubious items on the page include SVD sniper rifles, the RPK machine gun, and the BMP-1 APC; I've never seen any of these mentioned as having been used in Vietnam. They either need to be properly sourced (that is, from an actual BOOK) or removed.--<IP_ADDRESS> (talk) 04:11, 23 March 2010 (UTC) The SVD was used late in the Vietnam war, the RPK saw limited use as well. the BMP-1 I have not heard of it's use in the Vietnam war. There are several Russian weapons that I have not heard of them being found in Vietnam like the Soviet APS Sketchin or the Scorpion Machine pistol. there are a few American weapons that are hinky as well. I'm removing things that I know didn't show up in Vietnam and a few of the more questionable stuff.Paulwharton (talk) 06:54, 20 May 2011 (UTC) Ruger M77&HK 21 Please show source about Ruger M77 use in vietnam war.I think HK-21 Use in COD black ops.But not in vietnam war. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 06:29, 3 June 2011 (UTC) Precision Rifles for ARVN, US, South Korean, Australian, and New Zealand There are no precision rifles listed for these armies. Aside from the M21 (briefly mentioned, but not named) there are no others. What did the other above armies use? Mequellios (talk) 04:03, 26 November 2011 (UTC) Helio Courier? I'm just looking the english documentary "air war in vietnam" on youtube (in german), it is from the 80's since it begins with a comment "more than 10 years after the end of the war...", but it starts with a comment, that it looked like this was a job for propeller aircrafts in 1962 (as support for the Soutvietnamese Aircraft I think? But I think the USA was also involved in air war before 1964 attack on USS Madox and the Tonkin resolution, I watched a movie about this... Air America?! Flying from Laos and Cambodia?) however the documentary lists 3 of these propeller aircrafts, the Helio Courier, the Douglas C-47 and the Curtiss C-46 Commando with the comment that the last two ones were from the 2nd World War. At least the Helio Courier is missing in the list, I can't remember that I've ever heard of it before but maybe it should be added to the list... ? Greetings Kilon22 (talk) 14:38, 28 March 2013 (UTC) Overly long summary It seems that the summary for this article is overly long, the summary should be at most two medium paragraphs. <IP_ADDRESS> (talk) 07:43, 22 October 2013 (UTC) Bad citations there are a lot of citations that are just text Retartist (talk) 08:23, 22 October 2013 (UTC) M16 Categorization The M16 Rifle was only listed as a Small Arm which is actually an all compassing term for handheld firearms. I moved it to the infantry rifles category. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 13:13, 9 June 2015 (UTC) Page Cleanup I'm going to try and commit to cleaning up bits of this page - there are lots of errors, inconsistencies, and misplaced content. Some moderate changes may be incoming. Chaingunfighter (talk) 05:50, 18 February 2016 (UTC) Which are VC arms? I wanted to know what guns were used by the north (in particular, machine guns). Could we put in some info about that? Think Russian weapons of the era, and WW2 as well (They kind of used them as an outlet for the weapons they were phasing out), so AKs, RPGs, Mosin Nagants, Ppsh-40s and the like,(I'm not sure if the NVA would've used anything after this point, but the Viet-Cong Probably did) also maybe some (infuriatingly hard to find) french weapons like the Mas 36 Rifle, Mas 38 SMG, Mat 48 SMG, and the FM 24/29 LMG, Captured NATO Weapos are also fair game, maybe even a few WW2 Japanese Weapons. Yolo McSwagginz93 (talk) 04:33, 12 July 2016 (UTC) Unsourced Equipment While most of it has been cleared out I have been seeing some Unsourced equipment being edited back into the Article. I have never seen a source for things like the APS Machine pistol or the Scorpion. Someone did add the H&K G3 and said it was used by Thailand and US Navy SEALs. Thailand has had a production liscence since 1971 so they may have had German made copies at that time. As for the Navy SEALs they have never used the G3. What causes the confusion is that they did use the T223. There are other weapons that do need sources. Paulwharton (talk) 08:28, 6 July 2015 (UTC) I was checking out some information when I followed a link to a video showing US Marines using the Beretta model 12 during Tet. Janes backs up the video and ID's the weapon. Paulwharton (talk) 08:50, 6 July 2015 (UTC) * Some of the weapons you removed actually did serve or were at least captured in Vietnam, and thus are probably relevant enough to be listed. There are also others not listed on the page. The page is somewhat disorganized, too, and a lot of the weapons seem to be placed in random order (The MP-40 and MP-38 are separated by two other completely different guns under the NVA weapons.) Some of the text needs be to changed as well; "SVT-40 Soviet rifle used in limited numbers, used in early stages of the war" is a poorly written sentence. Also, I feel like it might be worthwhile to list weapons used by both sides commonly twice, such as the Thompson that was used extensively by the VC in addition to the US and its allies. Chaingunfighter (talk) 04:27, 16 July 2015 (UTC) * FG-42 - * Mauser C96 - * Luger P08 - (If you read the document; it's in Vietnamese, dated 1970, and you can see it mentions a "Germany, k.k., 9mm" confirming that Luger came from Vietnam.) * Pak-40 Guns - * RPG-2 and B-40 - * One of the Big issues that this page has is that there are no sources for most of these weapons. Meaning that one has to look up the various weapons and make sure that they were actually seen in Vietnam. Several weapons that were on here were from video games. What makes things worse is that you have to find reliable sources for the information.While I readily admit that I am axing several weapons that possibly were there I am only doing so when I do not have a reliable source. Paulwharton (talk) 08:00, 23 September 2015 (UTC) Well some of the weapons listed above seem to make sense, FG-42, Mauser C96, and Luger PO8 were German and probably ended up there because the Russians were all like, "Here have all of our outda- I mean extremely valuable vintage weapons that are much wo- I mean just as good as the AK-47, and all of these useless German- I mean valuable war trophies from World War 2 that we feel we need to get rid o- I mean that we feel you could put to better use you usele- I mean valuable allies of ours, have a terri-bly great day!" the RPG 2 and probably the rest were probably the aforementioned ahem "valuable vintage" weapons so I doubt it's vandalism (But they still need sources).Yolo McSwagginz93 (talk) 04:34, 12 July 2016 (UTC) M2 light and medium tanks. Who and where? If memory serves, the French and ARVN used a lot of M24 tanks, and some M2/3 halftracks, yeah. Some M5s. M2 tanks were kinda a rara avis; there were, though, some captured Japanese light tanks that were used early on that look similar. Any hard cites on particular units using these? The British during 45/46? Anmccaff (talk) 03:53, 20 March 2017 (UTC) https://wwiiafterwwii.wordpress.com/2015/07/10/wwii-german-weapons-during-the-vietnam-war/ There appears to be some useful stuff on here, but it's the usual AnonoBlog, with at least some major factual errors. (DOS tip: Cao Dai was a southern, not northern phenomenon, and had little use for the commies, on the whole.) Anmccaff (talk) 06:30, 6 July 2017 (UTC) Hungarian AMD-65 AMD-65 imperial war museum london has one captured in Vietnam, was the first example of the type to be evaluated in the West. It shows signs of damage from Claymore Mine fragments.Man74 (talk) 23:46, 3 December 2017 (UTC) http://www.iwm.org.uk/collections/item/object/30030077 External links modified Hello fellow Wikipedians, I have just modified one external link on Weapons of the Vietnam War. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20100414001319/http://www.centennialofflight.gov/essay/Rotary/Heli_at_War/HE14.htm to http://www.centennialofflight.gov/essay/Rotary/Heli_at_War/HE14.htm Cheers.— InternetArchiveBot (Report bug) 04:24, 12 December 2017 (UTC) AK-74? Did AK-74 was used during late part of Vietnam War? — Preceding unsigned comment added by Scout MLG (talk • contribs) 05:44, 11 May 2018 (UTC) * No way. There's a minuscule chance that Soviet advisors in the North could have had some AK-74s with them when the war was drawing to a close, but they would have been nowhere near a combat zone. The North Vietnamese didn't even get the AKM (produced in 1959, before the US even got involved) in large quantities until after most US forces withdrew. --<IP_ADDRESS> (talk) 21:53, 24 May 2018 (UTC) Carl Gustaf 84 mm bazooka does Carl Gustaf recoilless rifle were used in Vietnam? note: Carl Gustaf bazooka already exist in 1948 Scout MLG (talk) 08:38, 20 September 2018 (UTC) Mossberg M500 does Mossberg M500 were used in Vietnam War? Scout MLG (talk) 09:47, 20 September 2018 (UTC) AR15, M16, XM16E1, M16A1 and "CAR-15" I think this needs some change, but I want to talk about it first, rather than make a change that someone will want to revert. Currently the article states; "M16, XM16E1, and M16A1 – M16 was issued in 1964, but due to reliability issues, it was replaced by the M16A1 in 1967 which added the forward assist and chrome-lined barrel to the rifle for increased reliability.[39]" Which is rather incorrect and mythical. The designations M16 and XM16E1 were introduced in late November 1963, several weeks after an order exceeding 100,000 was made for the AR15. M16 was applied to all AR15 already in service, which covered more than ten thousand, and included 1,000 already in service in VN with US special forces (very few), ARVN and notably, "Father Hoa", who ran a private militia. The newly designated M16 continued in production for many years afterwards and was *not* replaced by either the XM16E1 or the M16A1 during the VN war, least of all for reliability issues. The US Army insisted on the forward assist device for their version, despite being advised that it was a bad idea. The AR15 program manager, Col. Yount, really was able to offer no technical justification for insisting on this, he simply stated that he was directed to do it by higher authority. The X in the designation XM16E1 did not indicate experimental, it meant limited issue, experimental configuration one. Sometime in 1965, it was redesignated as XM16A1, with retrospective application, then in 1967, it was decided to make it the standard issue rifle, so it was further redesignated (also retrospectively) to M16A1. Both M16 and M16A1 continued in production side by side after 1967. Most of the incremental changes, such as buffer design, chrome lining of the chamber, detail changes here and there, such as fences, firing pin split pin substituted for machined pin, detail changes in extractor, etc... were in lock-step for the two rifles from 1963 to 1973. The M16 even started using the M16A1 bolt carrier in 1967, as it was no cheaper to make smaller quantities the M16 bolt carrier, and occasionally, an M16A1 would be manufactured with an M16 bolt carrier, with this only discovered after issue in VN. of The forward assist was very detrimental to reliability - if there is a problem feeding a round into the chamber, forcing it in is only going to make matters worse, particularly with the prospect of a rim shear due to a round jammed in the chamber. The only practical way to deal with that is with a clearing rod, yet that is exactly what using the FA achieves. The forward assist was a big part of the problem, the article makes it sound like it was an improvement and a solution to a reliability issue, rather than the cause of problems that it was. Yes, the XM16E1 was improved during its service, but there was no improvement that was not also incorporated into the M16 at the same time, save for those specific to the ludicrous Forward Assist, which was there from November 1963, not from 1967. As the AR15 was already on issue in Vietnam and in combat in early 1963, and was retrospectively redesignated as M16 in November 1963, the M16 was issued in 1963 rather than 1964. The article then states; "CAR-15 – carbine variant of the M16 produced in very limited numbers, fielded by special operations early on. Later supplemented by the improved XM177. XM177 (Colt Commando)/GAU-5 – further development of the CAR-15, used heavily by MACV-SOG, the US Air Force, and US Army.[30]" CAR-15 was Colt's name for the entire weapons system, earlier, it was the Colt AR-15 weapon system, then they shortened it to CAR-15. This included several SMG versions (as Colt's described them), several LMG versions, an MMG version using a tripod, several "Heavy Assault Rifles", which were belt fed heavy barrel AR15, and a variety of other things such as survival rifles and grenade launchers, all under the CAR-15 weapons system banner. Several CAR-15 SMG variants were trailed in VN. AFAIK, the USAF designation was GAU-5/A for their SMG variant with M16 upper receiver, and GAU-5A/A for those using A1 style uppers with forward assist, whilst GAU-5 was the M16. Later, Colt's changed their commercial name to Colt Commando for their shortened versions. CAR-15 as a name for a shortened variant was a common term, but actually, it was a "CAR-15 SMG". "Known as the CAR-15" is fine with me, but it was not the name of it. Whilst the US never adopted it, several of the CAR-15 LMG and Heavy Assault Rifle variants did become standardised elsewhere, starting with Singapore in 1963.Psaccani (talk) 15:27, 21 November 2021 (UTC) Wasn't the MG-42 Used in the Vietnam War? I found this statement on the internet, but I'm not sure what to think about it. "The 3rd Colonial Commando Parachute Battalion drew German weapons from surrendered stocks (war reparations) for their 1948–50 tour in Indochina. Photos of MG 42s, Mausers, and MP-40s can be found in Cyril Bondroit’s book." Is this true in any way? Does anyone have a book from mister "Cyril Bondroit" saying anything about this? TheJawaManiac (talk) 07:17, 20 July 2023 (UTC)
WIKI
Hi, I'm writing a large program but require Multithreading for this software. I've searched the web for just over an hour and now is just after midnight but still can't find anything simple. The only thing I saw that came close to what I need was at http://www.computersciencelab.com/MultithreadingTut1.htm but I can't even get that code to work. Basically I have 4 functions (same function but different parameters) and need each function to go into it's own thread making a total of 5 threads (5th thread being the GUI/main() function. The code I have for these functions are as follows: myfunction(list,count,0,4); myfunction(list,count,1,4); myfunction(list,count,2,4); myfunction(list,count,3,4); So can somebody point me in the right direction as to how to get each of those functions to go into their own thread simultaneously and preferably with a lower priority than that of the GUI. Also the GUI is done in Microsoft Visual C++ 2008 with the CLR interface. Any help is greatly appreciated and I'll check this topic in the morning when I wake up as it is now 12:42 at night. Thanks for any information/code provided. :) Recommended Answers All 14 Replies Here is a simple example. The only reason it includes windows.h is because it uses the win32 api function Sleep() It will become more complicated if each of the threads must access the same global variable or common function. In that cast the threads have to be synchronized to avoid clashes while reading or writing at the same time. #include <process.h> /* _beginthread, _endthread */ #include <Windows.h> #include <iostream> using std::cout; void MyThread( void *dummy ); int main() { for(int i = 0; i < 5; i++) { _beginthread( MyThread, 0, (void *) (&i) ); /* Wait one second between loops. */ Sleep( 1000L ); } } void MyThread( void *param ) { int i = *(int *)param; cout << "Hello World from " << i << '\n'; } commented: Great code in speedy time :=]] +6 @AD Since his application is on the CLR, it's probably easier to incorporate all of this as a BackgroundWorker class. @OP Check out http://msdn.microsoft.com/en-us/library/system.componentmodel.backgroundworker.aspx and scroll about halfway down to "Examples" and make sure you have the C++ tab selected. It's not identical to what you are doing but you should be able to adapt it readily. I did not find a lot of information on C++/CLI threading out there, but if you look up the concept of delegates for C# you can adopt some of the information by changing the syntax (as it's all .NET under the hood). (the code box starts out below the second screenshot, the one above that has nothing in it) Here is a simple example. The only reason it includes windows.h is because it uses the win32 api function Sleep() It will become more complicated if each of the threads must access the same global variable or common function. In that cast the threads have to be synchronized to avoid clashes while reading or writing at the same time. #include <process.h> /* _beginthread, _endthread */ #include <Windows.h> #include <iostream> using std::cout; void MyThread( void *dummy ); int main() { for(int i = 0; i < 5; i++) { _beginthread( MyThread, 0, (void *) (&i) ); /* Wait one second between loops. */ Sleep( 1000L ); } } void MyThread( void *param ) { int i = *(int *)param; cout << "Hello World from " << i << '\n'; } That code looks good an all but I still have one question. How do I pass multiple parameters to the MyThread function? In my first post the function is defined as follows: void myfunction(std::map <unsigned int, std::string> list,unsigned int count, 0, 4); So could you please modify your code to allow these additional parameters as I don't have a clue. I'm not 100% certain myself. There may be issues of having to marshal copy the map values (as they are an unmanaged type and not compatible with the managed code). As far as how to pass parameters, I'm assuming that for example on the line: e->Result = ComputeFibonacci( safe_cast<Int32>(e->Argument), worker, e ); e->Argument would have to be some kind of data structure or ref class containing all of your parameters (see http://www.codeproject.com/Messages/2369118/Re-Custom-DoWorkEventArgs.aspx for a posting on custom event args), but again, I don't think that will work with the std::map. I wish I had more help to give you, but hopefully this gives you some more terms to search on. Poke around C# sites that cover BackgroundWorker too. The only issue is translating the syntax (. being both :: and -> at times). The forum here will probably have some examples too. I just found on the net the following code which I will try and embed and I'll let you know how it goes. #include <process.h> /* _beginthread, _endthread */ #include <Windows.h> #include <iostream> using std::cout; typedef struct ST{ int num; int i; char* buf; }threadparam; void MyThread( threadparam* param ) { int i = (param)->i; int j = (param)->num; cout << "Hello World from " << i << " - " << j << '\n'; } int main() { for(int i = 0; i < 5; i++) { threadparam st; st.num = 6000; st.i = i; _beginthread((void(*)(void*))MyThread, 0,(void*)&st); /* Wait one second between loops. */ Sleep( 1000L ); } } All of those are unmanaged pointers which are not going to work in the CLR, unfortunately. I have nearly completed the code but still got one problem. In myfunction I have the following line: resultbox->AppendText(std2sys("asdfasdf\n")); However the resultbox (richtextbox) cannot be found due to the function being outside the Form1 class. Does anybody know how I can append to this field outside its class? Thanks. If somebody can work out the answer that would be great but for now my patch might have to be to write to a text file from the thread functions and to get CLR to read the text file and update the fields accordingly. So if anybody has a better way I would love to hear it too. Could somebody please explain to me what is wrong with the following code as I struggle to write to a file. void file_put_contents(std::string data) { std::ofstream myfile ("datalog.tmp"); if (myfile.is_open()){ myfile << data; myfile.close(); } } std::string file_get_contents() { std::string line, res; std::ifstream myfile ("datalog.tmp"); if (myfile.is_open()) { while (myfile.good()) { getline (myfile,line); res+=line; } myfile.close(); } return res; } See http://www.codeproject.com/Messages/3198006/Communicating-with-main-GUI-thread-from-worker-thr.aspx you can't write directly to the GUI thread as that could lock up your main application. You cannot use an ofstream object. Any unmanaged types have to be transferred in between the unmanaged and managed parts through marshaling. Use a StreamWriter (http://msdn.microsoft.com/en-us/library/system.io.streamwriter.aspx) but as it says in the documentation, it is not thread-safe. There is a Textwriter::Synchronized available, but I've never used it. commented: Thanks for the hand. +6 That's it. I give up. The machine has won the match point. C++ CLR is ever so hard so for this project I'll switch to the php-gtk language as it will make things ever so much more simple. After 12 intensive hours my head now hurts and perhaps switching languages will be the ideal solution. I'll reward rep points to those who help when I needed it and thanks for the great help. Just abandon the CLR part. .NET and all this C# and managed C++ is useless and cumbersome. If your problem would have been just in straight C++, it would have been solved in minutes (using Boost.Thread), but only because of marshalling stuff and the evil .NET platform, you are stuck... another case of downsides outweighing the upsides in managed programming languages. Here is an article about how to create managed threads in the current version of CLR. When I posted my example earlier today I didn't realize that the OP was using CLR. Be a part of the DaniWeb community We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.
ESSENTIALAI-STEM
Cascading Style Sheets/Introduction Cascading Style Sheets (CSS) describe the visual style and presentation of a document, most commonly web sites. One purpose of CSS is to separate the presentation of a document from the structure and content (although it is possible to embed CSS within the structure as well). This separation is a W3C standard recommendation. Separation of style from structure and content increases maintainability for the author(s) of a document as well as accessibility for the audience. CSS is commonly applied to HTML, XHTML and XML documents, though it is possible, albeit rare, to apply it to other types of documents as well. The styles described by CSS include the colors, fonts, layout, and other presentation aspects of a document. A single CSS file can describe a common style for many HTML, XHTML, and XML documents. Typically, a particular element in a XHTML file has a "cascade" of CSS style rules that can be applied to it. The highest priority style rule is applied to each element. Why use CSS? CSS is a powerful tool that gives web designers flexibility and modularity in the presentation layer of a web site. CSS allows you to have every format rule defined for later use (here "format" means how things appear). So if you are writing a large website and you want a consistent appearance for every title, sub-title, how examples of code appear, how paragraphs are aligned, etc. then CSS is the way to go. Let's say you have a 1200 page website that took you months to complete. Then you decide to change the font, the size, the background, the appearance of tables, etc. everywhere on the site. If you engineered your site appropriately with CSS, you could do this by editing one linked CSS file that has all your appearance (format) rules in one place. If you had put the styles into the HTML, you would have to adjust each and every one of your 1200 HTML pages. By using CSS, changes can be made fast and easy simply by editing a few rules and lines in the global stylesheet. Before CSS, these changes were more difficult, expensive, and very time-consuming. Some server-side template systems can largely be used for the same purpose. Unlike CSS, however, they most often separate the structure from the content and instead of separating the presentation from the structure. Such templates make it much more difficult for users to disable or ignore styling or use alternate structures for the same content.
WIKI
Acobamba District, Sihuas Acobamba is a district of the Sihuas Province in the Ancash Region of northern Peru.
WIKI
 Advantage Developer's Guide > Appendixes > Appendix B - Troubleshooting and Other Issues > Defining Server-Side Aliases Navigation:  Advantage Developer's Guide > Appendixes > Appendix B - Troubleshooting and Other Issues >      Defining Server-Side Aliases Advantage Database Server v8.1: A Developer’s Guide by Cary Jensen and Loy Anderson   © 2007 Cary Jensen and Loy Anderson. All rights reserved. Previous pageReturn to chapter overviewNext page Server-side aliases are defined in an INI file named AdsServer.ini. This file needs to be placed on the server in the same directory used for the error log file. See "The Error Table" section earlier in this appendix for steps on how to locate this directory. AdsServer.ini is not created for you automatically. If you want to use server-side aliases, you have to create this file using an editor, such as NotePad.exe or emacs. Within AdsServer.ini, you define your server-side aliases in a section named ServerAliases. Within this section, you can define one or more name/value pairs, where the name is the server-side alias and the value is either a local drive path or UNC (Universal Naming Convention) path. In many instances, you will include the full path for the data dictionary or free tables, though a partial path is also acceptable. Here is a sample of what an AdsServer.ini file might look like: [ServerAliases] demopath=share\AdsBook restorepath=c:\adsdata\restore From your client application, you include the alias as part of your connection string. For example, consider the partial C# code for connecting to the server using the Advantage Data Provider for .NET: public void InitializeDataComponent() {  dataPath = "\\\\dataserver\\share\\AdsBook\\" +    "\\DemoDictionary.add";  connection1 = new AdsConnection("Data Source=" +    dataPath + ";user ID=adsuser;password=password;"+    "ServerType= REMOTE | LOCAL;" +    "FilterOptions=RESPECT_WHEN_COUNTING;" +    "TrimTrailingSpaces=True");  connection1.Open(); Given the server-side alias named demopath shown earlier, you can change the dataPath variable to the following: public void InitializeDataComponent() {  dataPath = "\\\\dataserver\\demopath\\DemoDictionary.add";  connection1 = new AdsConnection("Data Source="+    dataPath + ";user ID=adsuser;password=password;"+    "ServerType= REMOTE | LOCAL;" +    "FilterOptions=RESPECT_WHEN_COUNTING;" +    "TrimTrailingSpaces=True");  connection1.Open(); When ADS reads the demopath part of the connection string, it replaces it with share\AdsBook before continuing.  
ESSENTIALAI-STEM
(died 981). A German monk of the Benedictine order of the Roman Catholic Church, Adalbert was the leader of a failed attempt in 961 to evangelize Russian pagans. He later became, as the first archbishop of the strategic German city of Magdeburg, a patron of learning and promoter of the Christian faith. Little is known of Adalbert’s early life. He entered the monastery of Saint Maximin at Trier, Germany. After the Russian princess Olga had become a convert to Christianity at the age of 70, she asked the German king Otto the Great to send missionaries to her Russian subjects. Otto was greatly interested in evangelizing the pagans of eastern Europe. (Pagans believed in many gods rather than a single god.) Otto chose Adalbert to lead a small mission. In 961 the missionaries left for Russia but near Kyiv (Kiev) encountered a hostile reception from Olga’s pagan son Svyatoslav, who had usurped his mother’s power. Some of the missionaries were killed, but Adalbert escaped and returned to his own country. He spent time at the imperial court in Mainz and later became abbot at Weissenburg, where he was known for his encouragement of learning. Otto had meanwhile developed Magdeburg, in the historic German region of Saxony, into an important city. He obtained papal sanction to appoint its first archbishop. Adalbert was appointed to the post in 968 and had jurisdiction over the Slavs in the area. He worked tirelessly for the conversion of many Wends in his diocese and was strict in his enforcement of discipline in religious communities. Adalbert died in 981 after becoming ill during a visit to Merseburg. He was later canonized as a saint. His feast day is June 20.
FINEWEB-EDU
Page:Song of Hiawatha (1855).djvu/234 of wrath was Hiawatha When he came into the village, Found the people in confusion, Heard of all the misdemeanors, All the malice and the mischief, Of the cunning Pau-Puk-Keewis. Hard his breath came through his nostrils, Through his teeth he buzzed and muttered Words of anger and resentment, Hot and humming, like a hornet. "I will slay this Pau-Puk-Keewis, Slay this mischief-maker!" said he.
WIKI
The 1920s were a period of freedom, victory, and widespread growth in jazz. Many Americans felt free and ready for celebration after the end of the first world war. This resulted in a rise in nightclubs and bars. Louis Armstrong is one of Jazz’s most popular figures. He became a major hit at nightclubs such the Cotton Club. Dutch Schultz of New York, an infamous gangster in New York, gave Armstrong the order to perform “(What did I do To Be So) Black and Blue”. His version “Black and Blue” was a huge hit. Louis Armstrong’s song “Black and Blue” accurately portrayed jazz during the 20s due to its use break-and-riff arrangements. You can see it in his repeated use of “Black and Blue”. His style was different from the fast-paced, upbeat jazz of the 20s. Louis Armstrong’s blues-based approach to jazz led to a shift at the end of 20s. This can be seen in “(What did I do to Be so) Black and Blue”. The song has a distinct style from the jazz many are familiar with. It has blue notes and blue chord progressions, call and reply, Improvisation, repetition of lyrical structure, and an improvisation. These characteristics were unique to traditional jazz and attracted a lot of interest from Americans. Armstrong was an American Ambassador to Ghana and performed several songs for the over 100,000 Ghanais who attended his concert. The police used clubs to disperse the crowd after riots brokeout during the concert. Armstrong performed “Black and Blue” due to his sympathy for people. He described the struggle of a people that were coming out of decades colonialism optimistically but weren’t yet free. This feeling of shared struggle was repaid. Nkrumah sang “Black and Blue” while Armstrong’s version was also captured by the crew. Edith Wilson sang and wrote one of the earliest renditions of the song. This jazz version was composed. This was underground jazz, which used two singers and one piano. This was originally meant to refer to the unjust treatment of African Americans. Waller wanted the book to be a wakeup call about the privileges and rights that African Americans were denied compared to other races. Many restaurants, jobs and pools were divided by race. African Americans found themselves in harder-working jobs that paid less and required longer hours. Louis Armstrong had a different take on the song. He stripped the lyrics and added his personal touches to them. Because of the place he was playing his music, he tried to make the song more funny. He was a DJ in clubs with wealthy whites. They didn’t want to hear about the oppression of African Americans as they tried to party and relax. “In Hot Chocolates Razaf, the lyric was prefaced with a verse in that a dark-skinned lady complains about intra-racial discrimination. Armstrong changed the chorus to a threnody that was appropriate for all blacks. Armstrong’s original version of “Black and Blue”, however, was not too lugubrious. Armstrong was aware of his audience and the music they liked. “I wouldn’t do anything that would require people to stare at the song with depressing thoughts and think about marching for equal rights. Armstrong did alter the lyrics of “Black and Blue”, however, I think he is a great advocate for equality and racial tolerance. His job was to entertain the audience and perform. Although he was a blues musician, he did his best to keep his audience happy and focused on the positive things. He was still a strong advocate for African American rights. “..he was a “greater attraction between the whites than my people, a fact which has always troubled me …” He still cares deeply about his race and takes the opinions of others very seriously. Andy Razaf knew it was not as serious after all. “Certainly, Razaf had the intention of “Black and Blue”, and it was clearer than anyone could have imagined-despite some who claim that the first verse is a plea for dark-skinned Africans. Razaf was also clever in his execution. He cleverly filled the opening chorus with comical, minstrellike images. “Feel like old ned,” “even my mouse ran from mine”- drawing in his listeners before his most powerful lines. Armstrong was a role model and an influence for young African Americans. Armstrong can be regarded as one the first African Americans to become nationally well-known. He was the American dream symbol, of starting from nothing to achieve success. He was a great ambassador for the US. His trips to foreign countries were meant to improve the perception of America and also to show the world how to reduce racial tension and inequality.
FINEWEB-EDU
Harry Fletcher (footballer, born 1873) Henry Handley Fletcher (13 June 1873 – December 1923) was an English professional footballer who made over 270 appearances as an inside left and outside right in the Football League for Grimsby Town. He also played League football for Notts County and made one appearance for the Football League XI.
WIKI
Mark McInnes, Baron McInnes of Kilwinning Mark McInnes, Baron McInnes of Kilwinning, (born 4 November 1976) is a Scottish Conservative politician and member of the House of Lords. He was educated at Kilwinning Academy and the University of Edinburgh (MA, 1998). Political career McInnes was the director of the Scottish Conservative Party and was a Councillor for the Meadows/Morningside ward of Edinburgh City Council. McInnes was appointed a Commander of the Order of the British Empire (CBE) in the 2016 New Year Honours. McInnes was included in the list of nominations for life peerages in the 2016 Prime Minister's Resignation Honours. He was created Baron McInnes of Kilwinning, of Kilwinning in the County of Ayrshire on the morning of 1 September. At the time he said: “It is an enormous honour and overwhelming responsibility I was intending to stand down from council next year in any case and will now look forward to representing people somewhere else. “I will do my very best to represent Scotland and Edinburgh to scrutinise legislation and bring what knowledge I have from a Scottish perspective and also with experience of working in local government to the House of Lords.”
WIKI
Antonio Modarelli Antonio Modarelli (1894 in Braddock, Pennsylvania – 1954) was an American conductor and composer. Though popular in Europe, even to the point of being the first American to be invited into the Gesellschaft der deutschen Komponisten, Modarelli was never really appreciated at home, being asked to resign by the board of the Pittsburgh Symphony Orchestra in 1936. Other orchestras led by Modarelli include the Wheeling Symphony Orchestra from 1937 to 1942 and West Virginia Symphony Orchestra from 1942 to 1954.
WIKI
Although most of us experience occasional low points in life, there are times when a depressed mood can become overwhelming. Telling people to cheer up, or get over it, often makes things much worse. That sense of being alone can feel all consuming, but despite how powerful those feelings are, talking with a psychologist can and often does help. When strong feelings of sadness or loss of interest persistently cause disruption or distress for more than two weeks running, we can describe those experiences as depression. Not everybody is the same. Depression is expressed in many different ways. Some become disinterested, others agitated, or indecisive. Depression can affect your sleep, leading you to oversleep or hardly sleep at all. Your appetite can be affected, leading to marked weight loss or weight gain, depending on the person. People living with depression can be preoccupied with a sense of unworthiness, guilt, or thoughts about death. Talking with a counsellor or a psychologist can help you see what is going on, to express your feelings, be heard, and hopefully make a few positive changes. You don’t have to struggle on your own. Grief shares a lot in common with depression. There is a natural emotional response as people come to terms with the inevitable losses we encounter over the course of living (loss of loved ones, serious illness or injury, or significant changes to identity for instance). People often describe grief as “depressing”, however, we often find with grief that profound feelings of loss come in waves mixed with some positive feelings and memories. A measure of self-esteem is often retained in grief. The grieving process can involve complex and conflicting experiences, such as shock, denial, or feeling emotionally numb, when struggling to accept the reality of a loss. Significant losses often require some adjustment, both in terms of practical changes and making some meaning in life after the loss. Getting support during that time can help to come to terms with loss, express your feelings about it, and to find a new way forward. Our counsellors and psychologists at Likeminds Clinic are experienced in working with depression, grief, and loss. If you’d like to request an appointment, follow the prompts on the main menu above.
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Bhat People The result was delete. Sandstein 06:57, 8 July 2019 (UTC) Bhat People * – ( View AfD View log Stats ) Unsourced and full of POV and fantasy Fylindfotberserk (talk) 11:01, 16 June 2019 (UTC) * Having done some googling around, I think this page ought to just redirect to Bhatra. But I'd appreciate it is someone who actually knows about the subject could confirm this! Alarichall (talk) 13:25, 16 June 2019 (UTC) * Note: This discussion has been included in the list of People-related deletion discussions. Fylindfotberserk (talk) 11:01, 16 June 2019 (UTC) * Note: This discussion has been included in the list of India-related deletion discussions. Fylindfotberserk (talk) 11:01, 16 June 2019 (UTC) * Note: This discussion has been included in the list of Pakistan-related deletion discussions. Fylindfotberserk (talk) 11:01, 16 June 2019 (UTC) Relisted to generate a more thorough discussion and clearer consensus. Please add new comments below this notice. Thanks, – filelakeshoe (t / c) 🐱 17:15, 23 June 2019 (UTC) Relisted to generate a more thorough discussion and clearer consensus. Please add new comments below this notice. Thanks, North America1000 14:33, 30 June 2019 (UTC) * Comment - The only source I can find that describes an ethnic group called Bhat is this:, but I do not know if it is reliable. I suspect that the shortage of sources on this apparent group might be due to a spelling or translation error. A previous commenter's suggestion of a connection to Bhatra seems viable to me, but I also am not an expert in this area. --- DOOMSDAYER 520 (Talk&#124;Contribs) 15:24, 30 June 2019 (UTC) * Delete - This article is strange in my eyes. There is no term for "Bhat People" as distinct group; it refers merely to the specific connotations of a particular caste within Hindu / Sikh traditions. I would suggest deleting this or rewriting such that it is distinct from Brahmin. Michepman (talk) 16:13, 30 June 2019 (UTC)
WIKI
Letters to the editor - On Africa, the Commonwealth, precision, America, energy poverty, China, migrants, George Martin, Moore’s law “A green evolution” (March 12th) highlighted the things that are getting better in African agriculture. But you underplayed two negative aspects. The first is the pernicious effect of aid. When I was in Tanzania, working for a venture-capital fund, the country had the third-largest cattle population in Africa. Yet there was no indigenous dairy industry, not least because the European Union used it as a convenient place to dump its surplus milk powder. It is hard to compete with free goods. Upgrade your inbox and get our Daily Dispatch and Editor's Picks. The second point is that African entrepreneurs, on the whole, do not want to invest in agriculture. Aid programmes may have given potential businessmen an education, but most then choose an urban lifestyle, if they have not moved abroad. Setting up mobile-phone and internet companies in the big city, yes; being farmers out in the bush, no. The absence of domestic go-getters means that farms remain small; the added value of agricultural processing is negligible or absent. I looked at investing in a farm outside Dar es Salaam run by a doctor who was the medical adviser to many of the city’s elite. They all thought him completely bonkers. ROBERT SATCHWELLHaarby, Denmark Investments in small-scale water technologies such as low-till or zero-till agriculture, supplemental irrigation, groundwater recharge and rainwater harvesting could yield a direct net benefit of up to $200 billion to Africa’s 100m farmers. CALLUM CLENCHExecutive directorInternational Water Resources AssociationParis You correctly noted the potential for African farmers to increase their production through the use of hybrid seed and fertiliser. But you also described the challenges facing the industry because of human handicaps. There is an important link between the two. Data from Uganda show that significantly fewer farmers, 10%, are using hybrid seeds and only 3% are using fertiliser. Our research investigating the quality of agricultural inputs found that in local markets, 30% of nutrient is missing in fertiliser. Hybrid maize seeds contain less than 50% of authentic seed. These shortfalls in quality imply that many of the fertilisers and seeds sold in the market are simply not profitable. Therefore, tackling the issue of substandard inputs is an important step towards increasing productivity in agriculture in Uganda in the near future. Agriculture in Africa is complex and heterogeneous. There will not be a single answer for the whole of the continent. RICHARD NEWFARMERCountry director for UgandaInternational Growth CentreLondon Big problems arising from increased crop production in Africa include tremendous erosion and the depletion of natural vegetation. Traditional shifting cultivation has given way to continuous cropping with few, if any, conservation practices; marginal land is particularly vulnerable. The results are all too evident: perennial streams are now ephemeral, and massive quantities of topsoil silt up dams and flow into the oceans. The Economist should stop looking at sub-Saharan Africa through rose-coloured spectacles. The region is doomed to more frequent famines that will be the consequence of diminishing cropland, grazing and water resources. BRIAN DUNCANGettysburg, Pennsylvania My response to whether the Commonwealth is worth it is an emphatic Yes! (“What’s the point of it?”, March 19th). Most Commonwealth countries often get out more than they put in. When I was heading up the Commonwealth Secretariat, Britain’s concerns were dominated by its relationship with America and with Europe, and by the threats, dramas and problems of the Middle East. Thinking about the Commonwealth was well down the pecking order. But British ministers who have understood the Commonwealth, and who have wanted to expand initiatives, have found a ready forum in the organisation. With more than 50 member countries it is a mini UN. The Commonwealth is no drain on the British taxpayer. A few years ago, my research showed that the cost per British citizen to belonging to the EU was about £60 ($85) a year, to the UN about £10, NATO £2 and the Commonwealth about 17 pence. And never underestimate the 80-plus organisations who carry the name Commonwealth for a variety of linkages and benefits. This grouping is the envy of La Francophonie. When the Commonwealth moves collectively, that is, when all countries are pursuing the same objective of free and fair elections and good governance, it can act against countries that don’t even pay lip service to those values. The fact that Zimbabwe and Gambia are no longer in the Commonwealth is because of a reluctance by the leaders of those countries to accept, adhere, commit and administer those values. SIR DONALD MCKINNONCommonwealth secretary-general 2000-08Pukekohe, New Zealand* The crisis of the Commonwealth is one of identity rather than purpose. Many people would like it to be an organisation defined by shared values rather than an imperial legacy which it it isn’t: its members include undemocratic, human-rights violating governments. But one thing Commonwealth countries do share is their people. In 2010 the average Commonwealth country had received around half its immigrants from, and sent half its emigrants to, other Commonwealth countries. They collectively constitute one of the world’s great migration arenas, accounting for about a fifth of all migration globally. Despite differing values and their historical antagonisms, Commonwealth countries have an unparalleled depth of experience in cooperation over migration, and they have much to teach other regions where migration is now wrongly treated as a crisis. Migration is a defining issue that could galvanize the energy and expertise of the Commonwealth and perhaps even demonstrate its ongoing relevance as an organisation. And so, before asking what the Commonwealth is for, it is worth reconsidering what it is. ALAN GAMLENAssociate Professor Visiting Scholar, Stanford University “More than 40” I get. “Nearly 50” I get. But “Isaac Nabwana has written, directed and edited more than 47 films since 2008,” I don’t get (“Lights, camera, no budget”, March 5th). How many films did Mr Nabwana produce: 48? MICHAEL ARKINToronto For months you have written off Bernie Sanders, consistently using punchy language to describe him as “crotchety” or a “septuagenarian”, even though he has only a few years on Hillary Clinton and Donald Trump. “Beware the ides of March” (March 19th) went so far as to claim that Mrs Clinton “breezed through” the Midwestern primaries. I would hardly call margins of victory of 1.8 and 0.2 percentage points in Illinois and Missouri solid wins. Mrs Clinton’s delegate lead has been amassed from mostly southern states, which she will not carry in November. These statistics, however, mask the importance of describing a populist movement spreading in America that is the antithesis of Mr Trump’s vitriolic message. Mr Sanders is calling for a systemic, pragmatic change and a government that works for all, not the few. MICHAEL MARZANOChicago In 1935, with fascism on the rise in Germany and Italy, Sinclair Lewis wrote “It Can’t Happen Here”, a chilling semi-satirical political novel. The book focuses on the rise to power of Senator Berzelius “Buzz” Windrip who, with fantasist promises, wins the presidency. Windrip’s campaign strategy is eerily similar to Mr Trump’s: xenophobic and violent and at the same time promoting traditional values. His base of support came from the League of Forgotten Men, made up from the millions who were dispossessed by the Depression. Suffice to say, it does not end well for those who prize democracy and freedom. RON MCALLISTERYork, Maine Mrs Clinton is not the first lady to run for president of the United States. That would be Victoria Woodhull in 1872. She was an advocate for free love, famously proclaiming that she had an “inalienable, constitutional and natural right to love whom I may, to love as long or as short a period as I can, to change that love every day if I please”. MATTHEW GOMELNew York Predicting American primary elections has always been a mug’s game (“Mich-fire”, March 12th). In every primary-election cycle some excellent polling firms, which have good records of forecasting general elections, have been badly embarrassed. Extreme volatility, very low turnout and the difficulty of finding likely voters can make even the best polls look bad. Everyone notices a bad prediction, whereas you get little credit for a good one. Which is why we decided, 25 years ago, not to poll primaries. HUMPHREY TAYLORChairman emeritusHarris PollNew York * You commendably shed light on off-grid solar companies’ role in improving electricity access in East Africa and yet your article omits some of the real challenges of ending energy poverty (“Power to the powerless”, February 27th). Analysis by the Overseas Development Institute, CAFOD and Christian Aid shows the cheapest way for most energy-poor people to get electricity is via off-grid, largely through renewable technologies. For grid access, the main barriers involve distribution, not generation: unreliable service, unaffordable connection fees and, as you explain, utilities’ failure to recover their costs. African countries need more capacity to power economic development, but it is not true that wind and solar power is too expensive and unreliable. In South Africa, Eskom recently purchased wind power at prices 17% lower than those projected for the two new coal plants, Medupi and Kiseli. Africa has huge untapped renewables potential, and as its share of capacity grows, there are many options to balance supply and demand. However, increasing the electricity supply will not necessarily tackle the most prevalent form of energy poverty—cooking with polluting fuels like firewood. Indoor air pollution contributes to 4.3m deaths globally each year. Few African and Asian households cook with electricity, even once connected to the grid. Other methods of cleaner cooking are cheaper, such as advanced biomass cook stoves, liquid petroleum gas stoves or biogas systems.ILMI GRANOFFSenior Research FellowOverseas Development InstituteSARAH WYKESLead Energy Analyst, CAFODLondon It is true that the Chinese government has recognised the problem of overcapacity in China (“The march of the zombies”, February 27th). There should be no illusion about the problem: overcapacity, including excessive capacity in the steel industry, is a daunting global challenge, but particularly acute in China. The government is thoroughly restructuring the Chinese economy, despite the social costs this entails. Eliminating overcapacity heads the agenda for reforming the supply side. The State Council has urged all authorities across the country to implement its directives on cutting capacity. Zombie enterprises with redundant capacity are leaving the market. Banks in China are banned from providing loans to them. It is therefore practically impossible for zombie enterprises to manoeuvre the export of their excessive products. Moreover, new projects in the industries with excessive capacities will not be approved any more and both state-owned enterprises and private firms are encouraged not to expand but to merge and cut capacity in order to carry out industrial transformation. Tackling overcapacity in the steel industry is a telling case. China has reduced capacity by more than 90m tonnes in recent years; last year it cut investment in iron and steel assets by 13%. Steel-production capacity is to be reduced by a further 100-150m tonnes. China has surpluses, yes, and more may need to be done, but things are moving in the right direction. YE FUJINGEconomic adviserChina’s Mission to the EUBrussels You analysed the feasibility of the Turkey-EU agreement but overlooked why many people are so sceptical of it (“A messy but necessary deal”, March 12th). It is not because it is unreasonable—it is because it is unenforceable. The last grand bargain was struck at the EU-Turkey Summit last November. The €3 billion ($3.4 billion) aid package had been contingent on taking action. Within hours Turkey launched the largest sting operation to date, rounding up 1,300 migrants on its beaches. Since then Turkey has done little to make good on its promise. The police have been overlooking much of the smuggling economy in Izmir. Cesme’s beaches are unpoliced, with hundreds departing to Chios daily. It is not just that Turkey makes shallow promises. EU membership has been dangled in front of Turkey since negotiations started in 2005, despite the glaring problem of German and Cypriot rejections. Furthermore, visa-liberalisation has been offered at a time of intense debate about the EU’s free-movement policy. Granting Turkey “safe country of origin” status comes at Mr Erdogan’s most fruitful period of press-censorship. I wonder who will call whose bluff first. MARIA WILCZEKOxford His modesty notwithstanding, George Martin’s indelible influence on The Beatles cannot be overstated (Obituary, March 19th). His suggestions transformed “Please Please Me” from a slow, sombre song into a number-one hit. His string quartet turned “Yesterday” into an introspective timeless classic. His genius is evident in the baroque-style piano bridge he wrote and played for “In My Life”, in Paul McCartney’s deftly multi-tracked lead vocal in “Here, There and Everywhere”, and in his thunderous orchestral crescendo for “A Day in the Life”. He added a marching band to “Yellow Submarine”, a French horn solo to “For No One”, and piccolos to “Here Comes the Sun”. He was unquestionably one of the most important and talented producers in music history. STEPHEN SILVERSan Francisco, California As a veteran of the semiconductor industry I thoroughly enjoyed your assessment of the state of computing and Moore’s law (Technology quarterly, March 12th). I was fortunate enough to work under Moore at the Fairchild research facility and to hear his early presentation on the trend he observed in transistor density at a meeting of local engineers in Palo Alto. At the time, he wondered how all these projected thousands (not billions) of transistors could possibly be utilised. However, I think you have understated the cost/transistor trend. In the past, shrinking transistor geometry augmented by increased wafer diameter drove the cost of chips ever lower and functionality ever higher, as predicted by the self-fulfilling trajectory of Moore’s law. Your curve showing the number of transistors bought per dollar illustrates the incredible cost reduction that we had experienced until about 2012, when the curve actually peaks, and then shows costs increasing. The electronic revolution has been fuelled by the low cost of memory and microprocessor chips because this opened up the possibility of previously inconceivable cost-effective applications. Although, as you suggest, clever programming and specialised chip designs can still deliver some interesting products, the main cost-reduction driver will no longer be available and this will undoubtedly have a dampening effect on the future rate of change in electronic innovation. KEN MOYLEBeaverton, Oregon I can’t help but think that an “internet of things” will really mean “adverts on everything”. WARREN CULLYLondon Seeing the numerous mentions of computers based on 1s and 0s in your report reminded me of the T-shirt I saw a few years ago at MIT, my alma mater. On the front: “There are 10 types of people in the world”. And on the back: “Those who understand binary and those who don’t!” TOM BURNSBerkeley, California * Letters appear online only
NEWS-MULTISOURCE
Whitney Houston Has Died At The Age Of 48 « K-EARTH 101 Kristen Foster, the publicist for [lastfm link_type=artist_info]Whitney Houston[/lastfm] has confirmed the singer has died at the age of 48. The story is still developing but we've heard from sources close to the situation, which we cannot confirm as of yet, Houston was allegedly found in her hotel room bathroom at the Beverly Hilton with drug paraphernalia around her. She was scheduled to go to record mogul Clive Davis' GRAMMY party tonight. Beverly Hills PD received a 911 call at 3:23pm when the singer was found unresponsive. Beverly Hills Fire Department was already on the scene due to another unrelated call. Medical personnel attempted life saving procedures to save her life in her 4th floor hotel room at the Beverly Hilton. At 3:55pm she was pronounced dead and positively identified. Investigators are on the scene investigating. Houston first started singing in the church as a child. In her teens, she sang backup for Chaka Khan, Jermaine Jackson and others, in addition to modeling. It was around that time when music mogul Clive Davis first heard Houston perform. Houston made her album debut in 1985 with Whitney Houston, which sold millions and spawned hit after hit. Saving All My Love for You brought her her first Grammy, for best female pop vocal. How Will I Know, You Give Good Love and The Greatest Love of All also became hit singles. In 1992, she became a star in the acting world with The Bodyguard. Despite mixed reviews, the story of a singer (Houston) guarded by a former Secret Service agent (Kevin Costner) was an international success. She returned to the big screen in 1995-96 with Waiting to Exhale and The Preacher's Wife. Both spawned soundtrack albums, and another hit studio album, My Love Is Your Love, in 1998, brought her a Grammy for best female R&B vocal for the cut It's Not Right But It's Okay. Over the years the singer became involved in drug use which caused album sales to drop and great affected her career. For more updates visit CBSLA.com. REST IN PEACE Please log in using one of these methods to post your comment: You are commenting using your Twitter account. ( Log Out / Change ) You are commenting using your Facebook account. ( Log Out / Change ) You are commenting using your Google+ account. ( Log Out / Change ) Connecting to %s Notify me of new comments via email. Notify me of new posts via email. Listen Live
NEWS-MULTISOURCE
Page:Narrativeavoyag01wilsgoog.djvu/203 Rh It is a singular circumstance, that the Aboriginal tribes of New Holland should possess so very little affinity of language, while in personal figure, manners, mode of life, and implements of war, there is so striking a resemblance. The dialect of the natives of Baffles Bay is by no means inharmonious, but it was extremely difficult to obtain the true sound of their words, as it frequently happened, that the words (the correct sound of which not being caught at first) were repeated by us as near as we could guess, when they, either through indifference or complaisance, adopted our mode of pronunciation; and it required some pains, on our part, to obviate the effects of their apathy or inconvenient politeness. Whether they have any idea of a Superior Being, or of a future state of existence, it was impossible for us to ascertain. It was easy enough to reciprocate communication, as far as regarded objects evident to the external senses; but, as may be imagined by those conversant on the subject, any attempt to talk of abstract principles must have proved altogether fruitless. When it is called to mind that they were just beginning to lay aside suspicion, and to visit the settlement without fear, not long before it was abandoned, it will not seem strange that these particulars, relating to them, are so scanty and imperfect. A little longer
WIKI
Page:Fsi-AmharicBasicCourse-Volume1-StudentText.pdf/46 RV 27 (Rh) Substitute the words listed to the right of each sentence for the underlined word of the following sentences. Replace the underlined pronoun with those listed to the right of each sentence. Change the form of the verb 'to be' as necessary to agree with the pronoun used.
WIKI
Institute of Management and Technology, Enugu The Institute of Management and Technology, Enugu, popularly known as IMT Enugu, is a Polytechnic located in Enugu State, Nigeria. The state-owned Institute of Management and Technology is a Polytechnic school that was founded in the year 1965. In October 1971,the ukpabi Asika Administration decided to merge the former college of technology with the institute of administration The National Board for Technical Education (NBTE), Nigeria, has officially certified and/or recognized the Institute of Management and Technology, Enugu, Enugu State. Notable alumni * Azuka Okwuosa – former Anambra State Commissioner for Works and Transport * Phyno – Nigerian Rapper, singer-songwriter and a record producer Courses The institution offers the following courses: Purchasing & Supply Graphic Design Printing Technology Fashion Design and Clothing Technology Fine & Applied Art Ceramic Technology Science Laboratory Technology Food Technology Hospitality Management Statistics Computer Science Estate Management Architecture Quantity Surveying Urban and Regional Planning Building Technology Insurance Banking and Finance Accountancy Library and Information science Mass Communication Mechatronics Engineering Mechanical Engineering Electrical/Electronics Engineering Civil Engineering Chemical Engineering Agric Engineering Public Administration Office Technology and Management Co-operative Economics and Management Business Admin and Management
WIKI
23,519 ARTICLES ON THIS WIKI Blood Channel Blood Channel Blood Channel Name Blood Channel Source Mod Tinkers' Construct ID Name TConstruct:blood.channel Type Fluid Stackable Yes (64) Blast Resistance 1.5 Hardness 0.3 Solid No Transparent Yes Affected by Gravity No Emits Light No Flammable No Required Tool Grid Bucket.png Blood Channels are blocks that acts similarly to a fluid and can function as a replacement for noisy, lag-inducing flowing water in many constructions. Placing[edit] Blood Channels will flow away from you when placed. If you hold shift while placing the Blood Channel, it will flow towards you instead. Blood Channels are not solid blocks; they act like a fluid in that they will allow you to sink through and swim up through them. They always have a direction of flow, and will push mobs and items through them as any flowing liquid does. It is possible, if somewhat difficult, to drown in a Blood Channel block. Unlike a liquid, Blood Channels have a selection box and allow other blocks to be placed against them, rather than being replaced by any placed block. They do not spread outwards, like a normal liquid (such as water or lava). Recipe[edit] GUI Crafting Table.png Shapeless Redstone Coagulated Blood Coagulated Blood Coagulated Blood Coagulated Blood Blood Channel
ESSENTIALAI-STEM
USS Supply (1872) USS Supply, ex- Illinois, was a schooner-rigged iron steamer built in 1873 by William Cramp & Sons of Philadelphia. Illinois was purchased by the Navy Department from the International Navigation Company on 30 April 1898 for $325,000.00 and commissioned as Supply, Lt. Comdr. R. R. Ingersoll in command. Spanish–American War Supply was used as the supply ship for the fleet in Cuban waters during the Spanish–American War. The ship was decommissioned at the New York Navy Yard on 28 April 1899. She was refitted after the war, with better living quarters, and recommissioned on 1 August 1902. Peacetime service After recommissioning, Supply was ordered to duty on the Asiatic Station. She operated as the supply ship for the Asiatic Fleet and as Station Ship at Guam for many years. In 1904, she transported Governor of Guam William Elbridge Sewell back to the United States when he fell deathly ill. The ship was overhauled at the Puget Sound Navy Yard in July 1912 and again from November 1915 to March 1916. Supply put to sea on 19 March 1916 and after embarking passengers at San Francisco for passage to Guam and sailed on 29 March. She called at Honolulu, Territory of Hawaii, in early April and arrived at Apra Harbor on 25 April. This was her home port while serving as a stores ship for the Asiatic Station. From 22 October to 7 December 1916, she cruised to the Philippine Islands, China, and Japan. In January 1917 the ship was overhauled at Olongapo, Philippines, and returned to Guam on 27 March. First World War The German auxiliary cruiser SMS Cormoran (1909) had been in Asiatic waters at the outbreak of World War I and later operated in the southern Pacific. However, lack of provisions forced Cormoran to put in at Guam on 14 December 1914. The German captain accepted internment of the ship the following day, and the cruiser remained in that status until the United States declared war on Germany in April 1917. The morning of 6 April, Supply put a prize crew of 32 men afloat to board the German ship. Her captain offered to surrender the men but not the cruiser. At 0803, Cormoran was blown up by her own crew. Supply immediately lowered all boats to aid in recovering Cormoran's crew and their personal effects from the water. Supply remained on station in Apra Harbor until steaming for Manila on 21 May 1917. She departed there on 6 June en route to Japan, via Guam. After visiting various Japanese ports, the ship returned to Cavite, Philippines, for drydocking and repairs. Upon completion, she returned to Guam on 29 August and resumed her duties until 28 November when she got underway for the United States. Christmas 1917 was celebrated at Pearl Harbor; the Panama Canal was transited on 19 January 1918; and Supply arrived at the Charleston Navy Yard on the 25th. Decommissioning Upon completion of repairs, Supply was designated flagship of the Train, Atlantic Fleet, based at Charleston. On 29 May 1919, she was reassigned to Guam for duty as Station Ship. However, upon her arrival on the west coast, she was ordered to Mare Island for repairs and placed out of commission there on 15 September 1919. Supply was struck from the Navy list and sold for scrap on 30 September 1921. She was scrapped in 1928.
WIKI
This week's book giveaway is in the Servlets forum. We're giving away four copies of Murach's Java Servlets and JSP and have Joel Murach on-line! See this thread for details. The moose likes Programmer Certification (SCJP/OCPJP) and the fly likes String concatenation Big Moose Saloon   Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies Register / Login Win a copy of Murach's Java Servlets and JSP this week in the Servlets forum! JavaRanch » Java Forums » Certification » Programmer Certification (SCJP/OCPJP) Bookmark "String concatenation" Watch "String concatenation" New topic Author String concatenation Carlo Smits Greenhorn Joined: Jul 09, 2001 Posts: 22 In Jaworski's applet I found the following question: //what is the output displayed by the following program? class Question { public static void main(String [] args) { String s1 = "ab"; String s2 = "abcd"; String s3 = "cd"; String s4 = s1 + s3; s1 = s4; System.out.println("s1"+((s1 == s2)? "==" : "!=")+" s2"); } } The answer is: s1 != s2 Apparently, after concatenating s1 and s3, the reference s4 does not refer to a literal in the string pool. However, if you replace String s4 = s1 + s3; with String s4 = "ab" + "cd"; the result is: s1 == s2 Apparently, the concatenation of these two string literals again results in a reference string literal. Does anybody know what's going on? ------------------ Manfred Leonhardt Ranch Hand Joined: Jan 09, 2001 Posts: 1492 Hi Carlo, It is simply the compiler doing the work for you. In your first case, the compiler can not make any assumptions because you are using variables in the addition (references can point to any object). The compiler assigns string literals to the "string table" which means they can be treated as constants because they are immutable. Using that logic, in your second example the compiler can replace "ab" + "cd" with "abcd" without changing anything. Then it is easy to see that compiler created literal matches an already defined "string table" entry. Regards, Manfred. Jason Li Ranch Hand Joined: Jun 24, 2001 Posts: 46 If you use s4 = "ab" + "cd", at compiling time the compiler knows it is a string literal "abcd" and optimize to use any string literal in string pool if existed. It's importmant to know all these happen in the compiling time (It is compiler depended, See JLS 15.8.1). So if any variable is one operand or any string is generated during run time, then two string equals but not "==". green horn Carlo Smits Greenhorn Joined: Jul 09, 2001 Posts: 22 Thanks all! It get it now. Eric Pramono Ranch Hand Joined: Jul 09, 2001 Posts: 74 Hi Carlo, Consider the following code: After compiling, please run "javap -c X" and see the result. Here's what the compiler does when creating: s3: compiler created a string literal "abcd" s4: 1) compiler created a StringBuffer object, 2) load first string literal ("ab") into the StringBuffer 3) create a string literal "cd" 4) append the string literal "cd" into the StringBuffer 5) store the String as a result of StringBuffer.toString() s5: 1) compiler created a StringBuffer object, 2) load first string literal ("ab") into the StringBuffer 3) load the second string literal ("cd") and append the string into the StringBuffer 4) store the String as a result of StringBuffer.toString() so, if I try the following code: it'll give me a result: true; true; false; false; because we're comparing the address of memory here, and not what it contains. correct me if I'm wrong. - eric   I agree. Here's the link: http://aspose.com/file-tools   subject: String concatenation   Similar Threads == with Strings is giving a different result String literal - strange problem Strings... Help needed on intern(), compile time Vs run time String puzzle
ESSENTIALAI-STEM
Transform Method (IXPathNavigable, XsltArgumentList, XmlWriter) XslCompiledTransform.Transform Method (IXPathNavigable, XsltArgumentList, XmlWriter)   Executes the transform using the input document specified by the IXPathNavigable object and outputs the results to an XmlWriter. The XsltArgumentList provides additional run-time arguments. Namespace:   System.Xml.Xsl Assembly:  System.Xml (in System.Xml.dll) public void Transform( IXPathNavigable input, XsltArgumentList arguments, XmlWriter results ) Parameters input Type: System.Xml.XPath.IXPathNavigable An object implementing the IXPathNavigable interface. In the Microsoft .NET Framework, this can be either an XmlNode (typically an XmlDocument), or an XPathDocument containing the data to be transformed. arguments Type: System.Xml.Xsl.XsltArgumentList An XsltArgumentList containing the namespace-qualified arguments used as input to the transform. This value can be null. results Type: System.Xml.XmlWriter The XmlWriter to which you want to output. If the style sheet contains an xsl:output element, you should create the XmlWriter using the XmlWriterSettings object returned from the OutputSettings property. This ensures that the XmlWriter has the correct output settings. Exception Condition ArgumentNullException The input or results value is null. XsltException There was an error executing the XSLT transform. If the XSLT document() function is enabled, it is resolved using an XmlUrlResolver with no user credentials. If the external resource is located on a network resource that requires authentication, use the overload that takes an XmlResolver as one of its arguments and specify an XmlResolver with the necessary credentials. This method does not support the xsl:strip-space element. If your compiled style sheet included the xsl:strip-space element, you must use the Transform overload which takes an XmlReader as the input argument. The IXPathNavigable interface is implemented in the XmlNode and XPathDocument classes. These classes represent an in-memory cache of XML data. • The XmlNode class is based on the W3C Document Object Model (DOM) and includes editing capabilities. • The XPathDocument class is a read-only data store based on the XPath data model. XPathDocument is the recommended class for XSLT processing. It provides faster performance when compared to the XmlNode class. Transformations apply to the document as a whole. In other words, if you pass in a node other than the document root node, this does not prevent the transformation process from accessing all nodes in the loaded document. To transform a node fragment, you must create an object containing just the node fragment, and pass that object to the Transform method. For more information, see How to: Transform a Node Fragment. .NET Framework Available since 2.0 Return to top Show: © 2015 Microsoft
ESSENTIALAI-STEM
Princess Pauline Foundation The Princess Pauline Foundation (Fürstin-Pauline-Stiftung) is an independent Lutheran foundation in Detmold, wholly devoted to charitable purposes and to childcare, youth work and care of the elderly. Previously known as the Paulinenanstalt, it is named after its founder Princess Pauline of Anhalt-Bernburg.
WIKI
longest common subsequence how this conditional operator is being used here #include <iostream> #include <string> #include <algorithm> using namespace std; int longestCommonSubsequence(const string& a, const string& b) { int A = a.size(), B = b.size(); int L[2][B + 1]; for (int i = 0; i <= 1; ++i) L[i][0] = 0; for (int i = 0; i <= B; ++i) L[0][i] = 0; for (int i = 1; i <= A; ++i) { int this_i = i % 2, pre_i = this_i ? 0 : 1;//explain the conditional operator how it is being used here for (int j = 1; j <= B; ++j) { if (a[i - 1] == b[j - 1]) L[this_i][j] = 1 + L[pre_i][j - 1]; else L[this_i][j] = max(L[pre_i][j], L[this_i][j - 1]);//expalain why we are calculating L[pre_i][j], L[this_i][j - 1] } } return max(L[0], L[1]); } int main() { string a, b; cin >> a >> b; cout << longestCommonSubsequence(a, b) << endl; } expalain the use of conditional operator being used and why we are calculating L[pre_i][j], L[this_i][j - 1] @yogeshforyou: (int this_i = i % 2, pre_i = this_i )?( 0) :frowning: 1) Here **int this_i = i 2, pre_i = this_i **, **0**, and **1** are expressions. Notice the use and placement of the colon. The value of a ? expression is determined like this: **int this_i = i 2, pre_i = this_i ** is evaluated. If it is true, then 0 is evaluated and becomes the value of the entire ? expression. If int this_i = i % 2, pre_i = this_i is false, then 1 is evaluated and its value becomes the value of the expression. The ? is called a ternary operator because it requires three operands and can be used to replace if-else statements, which have the following form: if(condition) { var = X; } else { var = Y; } For example, consider the following code: if(y < 10) { var = 30; } else { var = 40; } Above code can be rewritten like this: var = (y < 10) ? 30 : 40; 1 Like @saiavinashiitr where is the condition in this case since it is a conditional operator and we are doing assignment how can it be?? The format of the conditional operator is expression1 ? expression2 : expression3. Now let me explain this. If expression1 evaluates to true ( that is 1 ), then the value of the whole expression is the value of expression2, otherwise, the value of the whole expression is expression3. Now take this simple example result = marks >= 50 ? 'P' : 'F' ; result will have the value 'P' if the expression marks >= 50 evaluates to true ( or 1 ), otherwise, result will get 'F'. Now let us move on to your case int this_i = i % 2, pre_i = this_i ? 0 : 1; this_i is assigned the value of i % 2, that is, if i is an even number, this_i gets the value 0, otherwise, if i is an odd number, this_i gets the value 1. Now moving onto your conditional statement, as mentioned above, this_i will have the value 1 or 0 if i is odd or even. Your conditional statement checks if this_i is true, that is 1. If this_i has the value 1 then pre_i gets the value 0, otherwise, pre_i gets the value 1. Hope this solves your confusion… 1 Like @arun_as thanks for the explaination The proper break down should be int (this_i = i % 2), (pre_i = (this_i ? 0 : 1)) That is two variable declarations/initializations happening there. this_i is set to i % 2 Based on whether this_i is 0 or not, pre_i will be set to a particular value. Specifically, pre_i is 0, if this_i is 1 and vice versa. @tijoforyou can you explain the L[this_i][j] = max(L[pre_i][j], L[this_i][j - 1]) part and how the final answer will be in max(L[0], L[1]);
ESSENTIALAI-STEM
Clooney’s Candidate Snared in Sex Scandal; Butch Cassidy: Film Shakespeare notwithstanding, nobody gets assassinated in “ The Ides of March ,” George Clooney ’s smart thriller about a presidential candidate threatened by a sex scandal. There is plenty of gloom and doom, however. Backroom deals, petty jealousies and broken promises are as plentiful as the stars in the cast, which includes Ryan Gosling , Philip Seymour Hoffman, Paul Giamatti , Evan Rachel Wood and Marisa Tomei . “The Ides of March” isn’t always plausible a Machiavellian plot by a rival campaign manager seems particularly far-fetched and some of the characters border on stereotypes. But Clooney (the director, co-writer and co-star) has pulled off a considerable feat, transforming Beau Willimon’s play “Farragut North” into a fast-paced, suspenseful film that bares the underbelly of U.S. politics. Clooney plays Mike Morris, a liberal governor running for the Democratic nomination. Hoffman is his savvy campaign manager, Gosling his idealistic press secretary and Wood a pretty young intern. Giamatti runs the campaign of Morris’s main opponent, while Tomei is a brash New York Times reporter who gets tipped off about a secret meeting that could embarrass both sides. Intern’s Affairs The story takes place in March on the eve of the decisive Ohio primary, when strange bedfellows complicate the campaign. Morris’s press secretary has a fling with the intern and learns that she earlier slept with the governor and is now pregnant. As the primary approaches, Gosling’s character must choose between his idealistic impulses and practical considerations. When he confronts Morris in a dark, empty bar, we get to see the candidate’s win-at-all-costs side. Hoffman and Giamatti are standouts as the crafty campaign managers, and Gosling strikes the right tone as a man with divided loyalties. Clooney’s part is relatively small, but his smooth directing style makes “The Ides of March” an enjoyable diversion from our real, equally sordid presidential politics. “The Ides of March,” from Columbia Pictures , opens tomorrow across the U.S. Rating: *** ‘Blackthorn’ What if Butch Cassidy and the Sundance Kid hadn’t died in that 1908 Bolivian shootout made famous in the Oscar-winning film starring Paul Newman and Robert Redford ? That’s the premise of “ Blackthorn ,” a laconic Western that picks up with Butch (Sam Shepard) living peacefully in a Bolivian village in the 1920s under the alias James Blackthorn. A homesick Butch decides to return to the U.S., but gets sidetracked by a young robber (Eduardo Noriega) who enlists him to track down $50,000 buried in a mine. They’re chased by a former Pinkerton detective (Stephen Rea) and a posse hired by the mine owners to get their money back. The Sundance Kid is no longer around, yet we don’t learn his fate until a series of flashbacks let us know what really happened after that gunfight with Bolivian soldiers. Filmed on location by Spanish director Mateo Gil, “Blackthorn” features gorgeous shots of Bolivia ’s vast salt desert, pithy dialogue and an Eastwood-esque performance by Shepard. “Blackthorn,” from Magnolia Pictures , opens tomorrow in New York and Los Angeles . Rating: *** (Rick Warner is the movie critic for Muse, the arts and leisure section of Bloomberg News. Opinions expressed are his own.) To contact the writer on the story: Rick Warner in New York at rwarner1@bloomberg.net . To contact the editor responsible for this story: Manuela Hoelterhoff at mhoelterhoff@bloomberg.net .
NEWS-MULTISOURCE
[Project Euler] Problem 31 원문: Problem 31 In England the currency is made up of pound, £, and pence, p, and there are eight coins in general circulation: 1p, 2p, 5p, 10p, 20p, 50p, £1 (100p) and £2 (200p). It is possible to make £2 in the following way: 1×£1 + 1×50p + 2×20p + 1×5p + 1×2p + 3×1p How many different ways can £2 be made using any number of coins? 영국에서 화폐는 파운드 £, 펜스 p로 구성되어 있고 일반적인 통화에는 8개의 동전이 있다: 1p, 2p, 5p, 10p, 20p, 50p, £1 (100p) and £2 (200p). £2를 만드는 것으로 다음과 같은 방법이 가능하다: 1×£1 + 1×50p + 2×20p + 1×5p + 1×2p + 3×1p 임의의 개수의 동전을 사용해서 £2를 만들 수 있는 서로 다른 방법은 몇 개인가? Python 1 가장 단순하지만 무식한 방법이다. 그만큼 시간도 오래 걸린다. 대략 20분 이상이 소요됐다. >>> n = 1 # £2 한 개 사용 >>> for p1 in range(201): ... for p2 in range(101): ... for p5 in range(41): ... for p10 in range(21): ... for p20 in range(11): ... for p50 in range(5): ... for p100 in range(3): ... if (p1 + 2 * p2 + 5 * p5 + 10 * p10 + 20 * p20 + 50 * p50 + 100 * p100) == 200: ... n += 1 ... >>> print(n) 접기 Python 2 수학을 조금 이용해서 제한 조건을 거는 방법이다. 20초 정도 걸렸다. >>> n = 1 >>> for p1 in range(201): ... for p2 in range(101): ... if (p1 + 2 * p2) % 5 != 0: # 5펜스 단위가 되어야 5p와 짝을 이룰 수 있음 ... continue ... for p5 in range(41): ... for p10 in range(21): ... for p20 in range(11): ... if (p1 + 2 * p2 + 5 * p5 + 10 * p10 + 20 * p20) % 50 != 0: # 마찬가지로 50펜스 단위가 되어야 50p와 짝을 이룰 수 있음 ... continue ... for p50 in range(5): ... for p100 in range(3): ... if (p1 + 2 * p2 + 5 * p5 + 10 * p10 + 20 * p20 + 50 * p50 + 100 * p100) == 200: ... n += 1 ... >>> print(n) 접기 Python 3 문제를 풀고나서 포럼에 있는 내용을 참고해서 얻은 아이디어를 이용해서 재귀로 구현하였다. 실행 즉시 결과가 나온다. >>> n = 0 >>> coins = [200, 100, 50, 20, 10, 5, 2, 1] >>> def func(remain, remain_coins): ... global n ... if remain_coins[0] == 1: # 1펜스만 남게 되면 1펜스로만 계산해야 함 ... n += 1 ... return ... for k in range(remain // remain_coins[0] + 1): ... if remain - remain_coins[0] * k == 0: # 현재 동전으로 모두 계산이 끝남 ... n += 1 ... return ... func(remain - remain_coins[0] * k, remain_coins[1:]) ... >>> func(200, coins) >>> print(n) 접기 이 외에도 DP 솔루션과 같은 좀 더 고급적인 방법을 이용해서 풀은 사람들을 포럼에서 볼 수가 있다. 댓글 없음: 댓글 쓰기 크리에이티브 커먼즈 라이선스
ESSENTIALAI-STEM
Talk:Long Wall of Quảng Ngãi RqImg A cross-sectional diagram of the wall, and a layout plan for the forts would be good, as well as a map of the course of the wall. -- <IP_ADDRESS> (talk) 06:13, 10 July 2014 (UTC) * I'll settle for just the map. — Llywelyn II 15:08, 12 April 2023 (UTC)
WIKI
Cellini (disambiguation) Benvenuto Cellini (1500–1571) was an Italian goldsmith, painter, sculptor, soldier and musician of the Renaissance. Cellini may also refer to: * Cellini (play), a 2001 play by John Patrick Shanley * Cellini (surname) * Cellini (horse) * Cellini (apple), see Laxton's Superb
WIKI
Page:Chronicles of pharmacy (Volume 1).djvu/282 prepared by combining 4 oz. of the extract with a cerate composed of 8 oz. of wax in 18 oz. of rose ointment. This was made stronger or milder as the case might need. There was another pomatum made with the extract of Saturn, sulphur, and alum, for the treatment of itch; and several plasters for rheumatic complaints. Goulard gave full details of the various uses of these applications in inflammations, bruises, wounds, abscesses, erysipelas, ophthalmia, ulcers, cancers, whitlows, tetters, piles, itch, and other complaints His own experience was supported by that of other practitioners. In giving the results of his experience thus freely and completely, Goulard was aware of the sacrifice he was making. "I flatter myself," he says, "that the world is in some measure indebted to me for publishing this medicine, which, if concealed in my own breast, might have turned out much more to my private emolument"; at the same time he did not object to reap some profit from his investigations, if this could be done. At the end of the English translation of his book, a copy of a document is printed addressed to his fellow student of fifty years before, Mr. G. Arnaud, practising as a surgeon in London, engaging to supply to him, and to him only, a sufficient quantity of extract of Saturn made by himself, to be distributed by the said Mr. Arnaud, or by those commissioned by him, over all the dominions of his British Majesty. Karl Wilhelm Scheele is the most famous of pharmacists, and has few equals in scientific history. He was the seventh child of a merchant at Stralsund,
WIKI
ComServPac Service Force, United States Pacific Fleet, usually known as COMSERVPAC, was a service support command of the United States Pacific Fleet from 1942 until 1973. It was the reincarnation of the former Base Force. The Service Force comprised the supply train of the fleet which includes Oilers (AO), Gasoline Tanker (AOG), Repair Ships (AR), Ammunition Ships (AE), Destroyer Tenders (AD) and Submarine tenders (AS). Service forces under the ComServPac were known as ServPac or SERVPAC. From 1942, the early Service Force was organized around four squadrons: Two, Four, Six, and Eight. * Squadron Two included hospital ships, fleet motion-picture exchange, repair ships, salvage ships, and tugs. Commander Service Squadron Two administered the following: * 1) Fleet Motion Picture Exchange. * 2) Administration of Hospital Ships and Mobile Hospitals. * 3) Administration of Repair Ships and Tenders. * 4) Mobile Salvage. * 5) Fleet Mail. * 6) Shore Patrol. * 7) Fleet Personnel (through Service Force Subordinate Command). * Squadron Four had the transports and the responsibility for training. This was the tiny nucleus of what eventually became the great Amphibious Force, or Forces. * Squadron Six took care of all target-practice firing and of the towing of targets, both surface and aerial. Six also controlled the Fleet Camera Party, Target Repair Base, Anti-Aircraft School, Fleet Machine Gun School, and Small Craft Disbursing. * Squadron Eight had the responsibility for the supply and distribution to the fleet of all its fuels, food, and ammunition. In March 1942 the name was changed to Service Forces Pacific Fleet. Headquarters had already moved ashore from the USS Argonne (AS-10) to the Pearl Harbor Navy Yard, and later moved again to the new administration building of the Commander in Chief Pacific, in the Makalapa area outside the navy yard. In 1973 cruisers, destroyers, amphibious ships, mine warfare vessels, and service ships in the Pacific Fleet all came under the command of Commander, Naval Surface Force Pacific. The ships of the modern day equivalent of the service force have gradually transferred from Naval Surface Force Pacific to the Military Sealift Command's Combat Logistics Force. In 1984, Service Group 1 and Service Squadron 3 on the West Coast had a total of fifteen ships assigned (2 AFS, 2 AOE, 3 AOR, 1 AR, 7 AE). In addition, Service Squadron 5 at Pearl Harbor had another 2 ARS and 2 ATS. By 1987, Service Squadron 3 had been disestablished and there were a total of fourteen service ships on the West Coast, plus five more in Service Squadron 5. By 2012, the Military Balance listed 5 Sacramento class fast combat support ships and Supply-class oilers (AOE) in regular U.S. Navy service, but 42 vessels in the Naval Fleet Auxiliary Force. Commanders Former Commanders, Base Force, Pacific Fleet * Rear Admiral William L. Calhoun USN (December 1939 – 27 February 1942) Former Commanders, Service Force, Pacific Fleet * Vice Admiral William L. Calhoun USN(27 February 1942 – 6 March 1945) * Vice Admiral William W. Smith USN (6 March 1945 – 2 September 1945) * Rear Admiral Francis C. Denebrink USN (1949–1953) * Rear Admiral W.D. Irvin USN (1963–1965) * Rear Admiral Edwin B. Hooper USN (1965–1968) * Rear Admiral Walter V. Combs USN (1968) * Vice Admiral John M. Barrett USN (1969–1971)
WIKI
Call Arity: In "e x", the result of "x" is not shared Authored by nomeata. Description Call Arity: In "e x", the result of "x" is not shared in contrast to "e (f x)", where CorePrep will turn it into "let y = f x in e x". So in let f = ... in e (f x) we know that f is called at most once, but in let f = ... in e f we do not know that. Previously Call Arity would assume that in "e x", "x" is evaluated at most once. This rarely would make a difference (the argument "x" is analized with an incoming arity of 0, so no eta-expansion would be done anyways), but of course this should still be fixed. This fixes Trac #11064. Note the corresponding code dmdTransformThunkDmd in DmdAnal. Details Committed nomeataNov 6 2015, 8:31 AM Parents rGHC10647d4e2e8e: Linker: #ifdef cleanup Branches Unknown Tags Unknown Build Status Buildable 6557 Build 7617: GHC Continuous Integration (amd64/Linux)
ESSENTIALAI-STEM
Talk:Akbar Khazaei Commons files used on this page or its Wikidata item have been nominated for deletion The following Wikimedia Commons files used on this page or its Wikidata item have been nominated for deletion: Participate in the deletion discussion at the nomination page. —Community Tech bot (talk) 22:53, 19 May 2023 (UTC) * Akbar Khazai in Mr. Olympia Pakistan 2022.webm * Akbar khazaei (ABBF Asian Thailand Referee Certificate).jpg * Akbar khazaei (Iraq My Show 2022 competition judge ).jpg * Akbar khazaei (Medal of refereeing npc competitions in Iraq 2022).jpg * Akbar khazaei (Mr. Olympia 2022 Pakistan).jpg * Akbar khazaei IFBB INTERNATIONAL JUDGE CARD.jpg * Akbar khazaei داوری عراق ماسل شو 2023 Iraq Ifbb pro bodybuilding competitions-.jpg * Akbar-khazaei- Appreciation-ceremony-for-the-international-judge.webm * IFBB PRO CARD Akbar khazaee.jpg * International bodybuilding jude- akbar khazaee.jpg
WIKI
最新消息: rsyncd配置文件模板 Linux ipcpu 531浏览 /etc/rsyncd.conf文件模板 通用 log file = /var/log/rsyncd.log uid=root gid=root ##port = 873 #limit access to private LANs hosts allow=192.168.2.0/255.255.255.0 10.0.0.0/255.0.0.0 hosts deny=* max connections = 30 timeout = 180 [htdocs] path = /home/htdocs ##uid=root ##gid=root ##hosts allow = 10.11.17.75 ##hosts deny=* ##auth users = linuxsir ##secrets file = /etc/rsyncd/rsyncd.secrets read only = true ##write only = yes 简单 log file = /var/log/rsyncd.log uid=root gid=root max connections = 30 timeout = 180 [htdocs] path = /home/download read only = true 转载请注明:IPCPU-网络之路 » rsyncd配置文件模板
ESSENTIALAI-STEM
The Gospel of the Brothers Barnabas: Present Day/Act I, § ii FRANKLYN. The time has always come to make a move. BURGE. How true! But what is the move to be? You are a man of enormous influence. We know that. Weve always known it. We have to consult you whether we like it or not. We&mdash; FRANKLYN [interrupting firmly] I never meddle in party politics now. SAVVY. It's no use saying you have no influence, daddy. Heaps of people swear by you. BURGE [shining at her] Of course they do. Come! let me prove to you what we think of you. Shall we find you a first-rate constituency to contest at the next election? One that wont cost you a penny. A metropolitan seat. What do you say to the Strand? FRANKLYN. My dear Burge, I am not a child. Why do you go on wasting your party funds on the Strand? You know you cannot win it. BURGE. We cannot win it; but you&mdash; FRANKLYN. Oh, please! SAVVY. The Strand's no use, Mr Burge. I once canvassed for a Socialist there. Cheese it. BURGE. Cheese it! HASLAM [spluttering with suppressed laughter] Priceless! SAVVY. Well, I suppose I shouldnt say cheese it to a Right Honorable. But the Strand, you know! Do come off it. FRANKLYN. You must excuse my daughter's shocking manners, Burge; but I agree with her that popular democratic statesmen soon come to believe that everyone they speak to is an ignorant dupe and a born fool into the bargain. BURGE [laughing genially] You old aristocrat, you! But believe me, the instinct of the people is sound&mdash; CONRAD [cutting in sharply] Then why are you in the Opposition instead of in the Government? BURGE [shewing signs of temper under this heckling] I deny that I am in the Opposition morally. The Government does not represent the country. I was chucked out of the Coalition by a Tory conspiracy. The people want me back. I dont want to go back. FRANKLYN [gently remonstrant] My dear Burge: of course you do. BURGE [turning on him] Not a bit of it. I want to cultivate my garden. I am not interested in politics: I am interested in roses. I havnt a scrap of ambition. I went into politics because my wife shoved me into them, bless her! But I want to serve my country. What else am I for? I want to save my country from the Tories. They dont represent the people. The man they have made Prime Minister has never represented the people; and you know it. Lord Dunreen is the bitterest old Tory left alive. What has he to offer to the people? FRANKLYN [cutting in before Burge can proceed&mdash;as he evidently intends&mdash;to answer his own question] I will tell you. He has ascertainable beliefs and principles to offer. The people know where they are with Lord Dunreen. They know what he thinks right and what he thinks wrong. With your followers they never know where they are. With you they never know where they are. BURGE [amazed] With me! FRANKLYN. Well, where are you? What are you? BURGE. Barnabas: you must be mad. You ask me what I am? FRANKLYN. I do. BURGE. I am, if I mistake not, Joyce Burge, pretty well known throughout Europe, and indeed throughout the world, as the man who&mdash;unworthily perhaps, but not quite unsuccessfully&mdash;held the helm when the ship of State weathered the mightiest hurricane that has ever burst with earth-shaking violence on the land of our fathers. FRANKLYN. I know that. I know who you are. And the earth-shaking part of it to me is that though you were placed in that enormously responsible position, neither I nor anyone else knows what your beliefs are, or even whether you have either beliefs or principles. What we did know was that your Government was formed largely of men who regarded you as a robber of henroosts, and whom you regarded as enemies of the people. BURGE [adroitly, as he thinks] I agree with you. I agree with you absolutely. I dont believe in coalition governments. FRANKLYN. Precisely. Yet you formed two. BURGE. Why? Because we were at war. That is what you fellows never would realize. The Hun was at the gate. Our country, our lives, the honor of our wives and mothers and daughters, the tender flesh of our innocent babes, were at stake. Was that a time to argue about principles? FRANKLYN. I should say it was the time of all others to confirm the resolution of our own men and gain the confidence and support of public opinion throughout the world by a declaration of principle. Do you think the Hun would ever have come to the gate if he had known that it would be shut in his face on principle? Did he not hold his own against you until America boldly affirmed the democratic principle and came to our rescue? Why did you let America snatch that honor from England? BURGE. Barnabas: America was carried away by words, and had to eat them at the Peace Conference. Beware of eloquence: it is the bane of popular speakers like you. [Exclaiming all together:] * FRANKLYN. Well!! * SAVVY. I like that! * HASLAM}. Priceless! BURGE [continuing remorselessly] Come down to facts. It wasn't principle that won the war: it was the British fleet and the blockade. America found the talk: I found the shells. You cannot win wars by principles; but you can win elections by them. There I am with you. You want the next election to be fought on principles: that is what it comes to, doesnt it? FRANKLYN. I dont want it to be fought at all! An election is a moral horror, as bad as a battle except for the blood: a mud bath for every soul concerned in it. You know very well that it will not be fought on principle. BURGE. On the contrary it will be fought on nothing else. I believe a program is a mistake. I agree with you that principle is what we want. FRANKLYN. Principle without program, eh? BURGE. Exactly. There it is in three words. FRANKLYN. Why not in one word? Platitudes. That is what principle without program means. BURGE [puzzled but patient, trying to get at Franklyn's drift in order to ascertain his price] I have not made myself clear. Listen. I am agreeing with you. I am on your side. I am accepting your proposal. There isnt going to be any more coalition. This time there wont be a Tory in the Cabinet. Every candidate will have to pledge himself to Free Trade, slightly modified by consideration for our Overseas Dominions; to Disestablishment; to Reform of the House of Lords; to a revised scheme of Taxation of Land Values; and to doing something or other to keep the Irish quiet. Does that satisfy you? FRANKLYN. It does not even interest me. Suppose your friends do commit themselves to all this! What does it prove about them except that they are hopelessly out of date even in party politics? that they have learnt nothing and forgotten nothing since 1885? What is it to me that they hate the Church and hate the landed gentry; that they are jealous of the nobility, and have shipping shares instead of manufacturing businesses in the Midlands? I can find you hundreds of the most sordid rascals, or the most densely stupid reactionaries, with all these qualifications. BURGE. Personal abuse proves nothing. Do you suppose the Tories are all angels because they are all members of the Church of England? FRANKLYN. No; but they stand together as members of the Church of England, whereas your people, in attacking the Church, are all over the shop. The supporters of the Church are of one mind about religion: its enemies are of a dozen minds. The Churchmen are a phalanx: your people are a mob in which atheists are jostled by Plymouth Brethren, and Positivists by Pillars of Fire. You have with you all the crudest unbelievers and all the crudest fanatics. BURGE. We stand, as Cromwell did, for liberty of conscience, if that is what you mean. FRANKLYN. How can you talk such rubbish over the graves of your conscientious objectors? All law limits liberty of conscience: if a man's conscience allows him to steal your watch or to shirk military service, how much liberty do you allow it? Liberty of conscience is not my point. BURGE [testily] I wish you would come to your point. Half the time you are saying that you must have principles; and when I offer you principles you say they wont work. FRANKLYN. You have not offered me any principles. Your party shibboleths are not principles. If you get into power again you will find yourself at the head of a rabble of Socialists and anti-Socialists, of Jingo Imperialists and Little Englanders, of cast-iron Materialists and ecstatic Quakers, of Christian Scientists and Compulsory Inoculationists, of Syndicalists and Bureaucrats: in short, of men differing fiercely and irreconcilably on every principle that goes to the root of human society and destiny; and the impossibility of keeping such a team together will force you to sell the pass again to the solid Conservative Opposition. BURGE [rising in wrath] Sell the pass again! You accuse me of having sold the pass! FRANKLYN. When the terrible impact of real warfare swept your parliamentary sham warfare into the dustbin, you had to go behind the backs of your followers and make a secret agreement with the leaders of the Opposition to keep you in power on condition that you dropped all legislation of which they did not approve. And you could not even hold them to their bargain; for they presently betrayed the secret and forced the coalition on you. BURGE. I solemnly declare that this is a false and monstrous accusation. FRANKLYN. Do you deny that the thing occurred? Were the uncontradicted reports false? Were the published letters forgeries? BURGE. Certainly not. But I did not do it. I was not Prime Minister then. It was that old dotard, that played-out old humbug Lubin. He was Prime Minister then, not I. FRANKLYN. Do you mean to say you did not know? BURGE [sitting down again with a shrug] Oh, I had to be told. But what could I do? If we had refused we might have had to go out of office. FRANKLYN. Precisely. BURGE. Well, could we desert the country at such a crisis? The Hun was at the gate. Everyone has to make sacrifices for the sake of the country at such moments. We had to rise above party; and I am proud to say we never gave party a second thought. We stuck to&mdash; CONRAD. Office? BURGE [turning on him] Yes, sir, to office: that is, to responsibility, to danger, to heart-sickening toil, to abuse and misunderstanding, to a martyrdom that made us envy the very soldiers in the trenches. If you had had to live for months on aspirin and bromide of potassium to get a wink of sleep, you wouldn't talk about office as if it were a catch. FRANKLYN. Still, you admit that under our parliamentary system Lubin could not have helped himself? BURGE. On that subject my lips are closed. Nothing will induce me to say one word against the old man. I never have; and I never will. Lubin is old: he has never been a real statesman: he is as lazy as a cat on a hearthrug: you cant get him to attend to anything: he is good for nothing but getting up and making speeches with a peroration that goes down with the back benches. But I say nothing against him. I gather that you do not think much of me as a statesman; but at all events I can get things done. I can hustle: even you will admit that. But Lubin! Oh my stars, Lubin!! If you only knew&mdash; The parlor maid opens the door and announces a visitor. THE PARLOR MAID. Mr Lubin. BURGE [bounding from his chair] Lubin! Is this a conspiracy? * They all rise in amazement, staring at the door. Lubin enters: a man at the end of his sixties, a Yorkshireman with the last traces of Scandinavian flax still in his white hair, undistinguished in stature, unassuming in his manner, and taking his simple dignity for granted, but wonderfully comfortable and quite self-assured in contrast to the intellectual restlessness of Franklyn and the mesmeric self-assertiveness of Burge. His presence suddenly brings out the fact that they are unhappy men, ill at ease, square pegs in round holes, whilst he flourishes like a primrose. * The parlor maid withdraws. LUBIN [coming to Franklyn] How do you do, Mr Barnabas? [He speaks very comfortably and kindly, much as if he were the host, and Franklyn an embarrassed but welcome guest]. I had the pleasure of meeting you once at the Mansion House. I think it was to celebrate the conclusion of the hundred years peace with America. FRANKLYN [shaking hands] It was long before that: a meeting about Venezuela, when we were on the point of going to war with America. LUBIN [not at all put out] Yes: you are quite right. I knew it was something about America. [He pats Franklyn's hand]. And how have you been all this time? Well, eh? FRANKLYN [smiling to soften the sarcasm] A few vicissitudes of health naturally in so long a time. LUBIN. Just so. Just so. [Looking round at Savvy] The young lady is&mdash;? FRANKLYN. My daughter, Savvy. * Savvy comes from the window between her father and Lubin. LUBIN [taking her hand affectionately in both his] And why has she never come to see us? BURGE. I don't know whether you have noticed, Lubin, that I am present. Savvy takes advantage of this diversion to slip away to the settee, where she is stealthily joined by Haslam, who sits down on her left. LUBIN [seating himself in Burge's chair with ineffable comfortableness] My dear Burge: if you imagine that it is possible to be within ten miles of your energetic presence without being acutely aware of it, you do yourself the greatest injustice. How are you? And how are your good newspaper friends? [Burge makes an explosive movement; but Lubin goes on calmly and sweetly] And what are you doing here with my old friend Barnabas, if I may ask? BURGE [sitting down in Conrad's chair, leaving him standing uneasily in the corner] Well, just what you are doing, if you want to know. I am trying to enlist Mr Barnabas's valuable support for my party. LUBIN. Your party, eh? The newspaper party? BURGE. The Liberal Party. The party of which I have the honor to be leader. LUBIN. Have you now? Thats very interesting; for I thought I was the leader of the Liberal Party. However, it is very kind of you to take it off my hands, if the party will let you. BURGE. Do you suggest that I have not the support and confidence of the party? LUBIN. I dont suggest anything, my dear Burge. Mr Barnabas will tell you that we all think very highly of you. The country owes you a great deal. During the war, you did very creditably over the munitions; and if you were not quite so successful with the peace, nobody doubted that you meant well. BURGE. Very kind of you, Lubin. Let me remark that you cannot lead a progressive party without getting a move on. LUBIN. You mean you cannot. I did it for ten years without the least difficulty. And very comfortable, prosperous, pleasant years they were. BURGE. Yes; but what did they end in? LUBIN. In you, Burge. You don't complain of that, do you? BURGE [fiercely] In plague, pestilence, and famine; battle, murder, and sudden death. LUBIN [with an appreciative chuckle] The Nonconformist can quote the prayer-book for his own purposes, I see. How you enjoyed yourself over that business, Burge! Do you remember the Knock-Out Blow? BURGE. It came off: don't forget that. Do you remember fighting to the last drop of your blood? LUBIN [unruffled, to Franklyn] By the way, I remember your brother Conrad&mdash;a wonderful brain and a dear good fellow&mdash;explaining to me that I couldn't fight to the last drop of my blood, because I should be dead long before I came to it. Most interesting, and quite true. He was introduced to me at a meeting where the suffragettes kept disturbing me. They had to be carried out kicking and making a horrid disturbance. CONRAD. No: it was later, at a meeting to support the Franchise Bill which gave them the vote. LUBIN [discovering Conrad's presence for the first time] Youre right: it was. I knew it had something to do with women. My memory never deceives me. Thank you. Will you introduce me to this gentleman, Barnabas? CONRAD [not at all affably] I am the Conrad in question. [He sits down in dudgeon on the vacant Chippendale]. LUBIN. Are you? [Looking at him pleasantly] Yes: of course you are. I never forget a face. But [with an arch turn of his eyes to Savvy] your pretty niece engaged all my powers of vision. BURGE. I wish youd be serious, Lubin. God knows we have passed through times terrible enough to make any man serious. LUBIN. I do not think I need to be reminded of that. In peace time I used to keep myself fresh for my work by banishing all worldly considerations from my mind on Sundays; but war has no respect for the Sabbath; and there have been Sundays within the last few years on which I have had to play as many as sixty-six games of bridge to keep my mind off the news from the front. BURGE [scandalized] Sixty-six games of bridge on Sunday!!! LUBIN. You probably sang sixty-six hymns. But as I cannot boast either your admirable voice or your spiritual fervor, I had to fall back on bridge. FRANKLYN. If I may go back to the subject of your visit, it seems to me that you may both be completely superseded by the Labor Party. BURGE. But I am in the truest sense myself a Labor leader. I&mdash;[he stops, as Lubin has risen with a half-suppressed yawn, and is already talking calmly, but without a pretence of interest]. LUBIN. The Labor Party! Oh no, Mr Barnabas. No, no, no, no, no. [He moves in Savvy's direction]. There will be no trouble about that. Of course we must give them a few seats: more, I quite admit, than we should have dreamt of leaving to them before the war; but&mdash;''[by this time he has reached the sofa where Savvy and Haslam are seated. He sits down between them; takes her hand; and drops the subject of Labor]''. Well, my dear young lady? What is the latest news? Whats going on? Have you seen Shoddy's new play? Tell me all about it, and all about the latest books, and all about everything. SAVVY. You have not met Mr Haslam. Our Rector. LUBIN [who has quite overlooked Haslam] Never heard of him. Is he any good? FRANKLYN. I was introducing him. This is Mr Haslam. HASLAM. How d'ye do? LUBIN. I beg your pardon, Mr Haslam. Delighted to meet you. [To Savvy] Well, now, how many books have you written? SAVVY [rather overwhelmed but attracted] None. I don't write. LUBIN. You dont say so; Well, what do you do? Music? Skirt-dancing? SAVVY. I dont do anything. LUBIN. Thank God! You and I were born for one another. Who is your favorite poet, Sally? SAVVY. Savvy. LUBIN. Savvy! I never heard of him. Tell me all about him. Keep me up to date. SAVVY. It's not a poet. I am Savvy, not Sally. LUBIN. Savvy! Thats a funny name, and very pretty. Savvy. It sounds Chinese. What does it mean? CONRAD. Short for Savage. LUBIN [patting her hand] La belle Sauvage. HASLAM [rising and surrendering Savvy to Lubin by crossing to the fireplace] I suppose the Church is out of it as far as progressive politics are concerned. BURGE. Nonsense! That notion about the Church being unprogressive is one of those shibboleths that our party must drop. The Church is all right essentially. Get rid of the establishment; get rid of the bishops; get rid of the candlesticks; get rid of the 39 articles; and the Church of England is just as good as any other Church; and I don't care who hears me say so. LUBIN. It doesn't matter a bit who hears you say so, my dear Burge. [To Savvy] Who did you say your favorite poet was? SAVVY. I dont make pets of poets. Who's yours? LUBIN. Horace. SAVVY. Horace who? LUBIN. Quintus Horatius Flaccus: the noblest Roman of them all, my dear. SAVVY. Oh, if he is dead, that explains it. I have a theory that all the dead people we feel especially interested in must have been ourselves. You must be Horace's reincarnation. LUBIN [delighted] That is the very most charming and penetrating and intelligent thing that has ever been said to me. Barnabas: will you exchange daughters with me? I can give you your choice of two.
WIKI
화학공학소재연구정보센터 Biotechnology Letters, Vol.43, No.10, 1967-1976, 2021 DFF40-iRGD, a novel chimeric protein with efficient cytotoxic and apoptotic effects against triple-negative breast cancer cells Purpose DNA fragmenting factor (DFF40), an endonuclease inducing irreversible apoptosis protein, is down-regulated in many types of tumor cells. iRGD is a tumor-penetrating peptide with high affinity to cancer cells overexpressing alpha(V)beta(3) receptor. The aim of this study was to produce the recombinant DFF40-iRGD protein as a new molecule to selectively induce cytotoxicity in cancer cells and evaluate its biological effects. Methods The three-dimensional structure of DFF40-iRGD was predicted using Modeller software and its interaction with alpha(V)beta(3) receptor was evaluated by HADDOCK web-server. Recombinant DFF40 and DFF40-iRGD proteins were produced using intein fusion system in Escherichia coli BL21 (DE3). To improve the soluble expression, the inducer concentration, temperature and incubation time were optimized. After purification of DFF40 and DFF40-iRGD using chitin column, the cytotoxic and apoptotic effects of the proteins against MDA-MB-231 (alpha(V)beta(3) positive) and MCF-7 (alpha(V)beta(3) negative) cell lines were evaluated using cell viability assay and flow cytometric analysis. Results The results of molecular docking indicated the proper interaction of DFF40-iRGD with the integrin receptor comparable to iRGD. The optimum conditions of soluble expression of proteins were the induction by 0.5 mM and 0.1 mM of IPTG for DFF40 and DFF40-iRGD, respectively, at 7 degrees C for 24 h. After 48 h of incubation, DFF40-iRGD exhibited significantly higher cytotoxic effect against MDA-MB-231 cells than MCF-7 cells as IC50 values of 19.25 and 41 nM were found for MDA-MB-231 and MCF-7 cells, respectively. However, DFF40 cytotoxicity was not significantly different in two cell lines. Furthermore, Flow cytometry results showed that the fusion protein can induce remarkably apoptotic cell death in cancer cells. Conclusion In this study, DFF40-iRGD protein was produced in soluble form and its inhibitory effects on cancer cell survival and induction of apoptosis were established; therefore, it has the potential to be used as a drug candidate for targeted treatment of breast cancer, especially Triple Negative Breast Cancer Cells.
ESSENTIALAI-STEM
Wikipedia:Disambiguation dos and don'ts Disambiguation pages are not encyclopedia articles – they are navigation aids!
WIKI
1976 Tehran UFO incident From Wikipedia, the free encyclopedia Jump to navigation Jump to search Map of Iran and surrounding countries, showing Tehran and Hamadan, where two F-4 jet interceptors were launched The 1976 Tehran UFO Incident dolat was a radar and visual sighting of an unidentified flying object (UFO) over Tehran, the capital of Iran, during the early morning hours of 19 September 1976. During the incident, two Iranian Air Force F-4 Phantom II jet interceptors reported losing instrumentation and communications as they approached the object. These were restored upon withdrawal. One of the aircraft also reported a temporary weapons systems failure while the crew was preparing to open fire. Explanation and analysis[edit] According to Martin Bridgstock of Griffith University:[1] Stripped of details, a couple of F4 jets from the Iranian airforce were scrambled to investigate some sightings of lights in the sky. Reports vary, but at least one jet suffered grave electrical failures, tried to fire a missile at something and had something fired at it. A nearby jet airliner also suffered radio failure. According to journalist Philip J. Klass, it was likely the pilots initially saw an astronomical body, probably Jupiter, an explanation also cited by aerospace researcher James Oberg. Klass wrote that pilot incompetence and equipment malfunction likely accounted for the reported equipment failures.[2] According to Klass, the Westinghouse technician at Shahrokhi airbase stated that only the first F-4 reported failing equipment, and that this F-4 was known for equipment failures with a long history of electrical outages, having been repaired only a month before the incident. Klass cites a McDonnell Douglas repair supervisor's opinion that the F-4's radar could have been in "manual track" mode, causing a wrong interpretation of the radar lock.[2] Bridgstock criticized UFOlogists reports as "not a reliable account of the Iran UFO incident" and summed up Klass' conclusions:[1] Klass found that only one aircraft had suffered electrical malfunctions, not two. What is more, that plane had had a history of unexplained electrical faults, and the electrical workshop responsible for it was notorious for poor performance. In this context, a temporary electrical malfunction can hardly be characterised as mysterious. He also points out that the aircrews at the time were tired and rattled, and could have mistaken stars or meteors for UFOs and "missiles". In addition, Klass points out that radio faults on airliners are not unknown, and that is why they carry backup radio sets. Regarding pilot reports of "bright objects" falling to the ground and "leaving a bright trail", author Brian Dunning observes that September 19, the day of the incident, was the height of two annual meteorite showers, the Gamma Piscids and the Southern Piscids and the tail of the Eta Draconids shower, so observation of falling objects or odd lights would not have been unusual. At the site where the falling light supposedly crashed, a beeping transponder from a C-141 aircraft was found according to investigating Col. Mooy.[3] According to Dunning:[3] Once we look at all the story's elements without the presumption of an alien spaceship, the only thing unusual about the Tehran 1976 UFO case is that planes were chasing celestial objects and had equipment failures. There have been many cases where planes had equipment failures, and there have been many cases where planes misidentified celestial objects. Once in a while, both will happen on the same flight. Dunning criticized UFOlogists and UFO-themed television programs like Sightings for describing all the events related to the incident "from the context of a presumption that the light was a hostile and intelligently guided alien spacecraft".[3] Reference to incident in the media[edit] Gallery[edit] Editorial published in the United States Air Force Security Services quarterly MIJI (Meaconing, Intrusion, Jamming, and Interference) newsletter that is "often waved by the UFOlogists as compelling evidence". According to Brian Dunning, "because this service requires a security clearance, their newsletter is protected as well. There is nothing especially interesting about the actual article; it's just a dramatized retelling of the same information in Col. Mooy's memo, offered in the newsletter as a curious editorial on the subject of jamming and interference."[3] See also[edit] References[edit] 1. ^ a b Martin Bridgstock. Beyond Belief: Skepticism, Science and the Paranormal. Cambridge University Press; 20 October 2009. ISBN 978-1-139-48254-7. p. 125–. 2. ^ a b Philip J. Klass (1 January 1983). UFOs: The Public Deceived. Prometheus Books. ISBN 978-0-87975-322-1. 3. ^ a b c d Dunning, Brian (19 June 2012). "Skeptoid #315: The Tehran 1976 UFO". Skeptoid. Retrieved 22 June 2017. 4. ^ Otto, Sasjkia (17 August 2009). "UFO Files: top 10 UFO sightings". The Daily Telegraph. London. 5. ^ Michael Hogan. "Top 10 UFO sightings: from Roswell to a pub in Berkshire | World news". The Guardian. Retrieved 2015-12-17. External links[edit]
ESSENTIALAI-STEM
Lyme Disease 0 73 Overview Lyme disease is caused by infection of the 4 main bacterial species: 1. Borrelia burgdorferi 2. Borrelia mayonii 3. Borrelia afzelii 4. Borrelia garinii The bacteria are spread via a tick bite, from an infected tick. The disorder is more common in grassy, heavily wooded areas. Causes When a black-legged tick, also known as the deer tick, gets infected with one of the species of Borrelia, it can transmit the bacteria to a healthy human individual by biting them. The bacteria penetrate the skin through the bite and eventually enter the human’s bloodstream. For the tick to actually transmit the infection, it must be attached to the bite site for at least 36-48 hours. Symptoms The symptoms for Lyme disease can be divided into two stages: 1. Early stage signs and symptoms: 1. Late stage signs and symptoms: • Erythema migrans • Joint pain • Neurological problems such as meningitis (Inflammation of meninges), Bell’s palsy (temporary paralysis of half face), numbness and weakness of extremities • Nausea and vomiting Diagnosis Since the symptoms of Lyme disease are often nonspecific, it is not very easy to diagnose the disease by history and physical exam. However, once there is a suspicion of Lyme disease, the following tests can help confirm the diagnosis: • Enzyme-linked immunosorbent assay (ELISA) – detects antibodies against the bacteria • Western blot – detects antibodies against the bacteria Treatment The treatment of Lyme disease is done through antibiotics. You might also like Comments Loading...
ESSENTIALAI-STEM
Wikipedia:Featured picture candidates/Portland Skyline Portland Skyline * Reason:A large, sharp, high quality photograph. Plenty of ENC value. Eye catching. * Articles this image appears in:Portland, Oregon, Downtown Portland * Creator:User:Fcb981 * Support as nominator and creator &mdash; Fcb981 01:15, 21 June 2007 (UTC) * Support It looks very nice. Althepal 05:27, 21 June 2007 (UTC) * Update I like the original most, but if not that, the third panorama also has my support. Althepal 23:54, 26 June 2007 (UTC) * Oppose It is oversaturated and ideally would've been taken closer to the Morrison Bidge so that the Hawthorne doesn't obscureWells Fargo Center and KOIN Center, two of the most prominent buildings in the Portland skyline. That angle would also give a better view of the Hawthorne and the pillars at the bottom right wouldn't be a distraction. Having the Spirit of Portland docked would also be an improvement. In other words, it is highly reporducable and could be improved. Cacophony 05:36, 21 June 2007 (UTC) * I didn't compose this on some whim. At that location on the waterfront trail there is an ideal vantage point to avoid dock pillars, trees, shrubs and fences that obscure parts of the city from almost everywhere. Idealy, I'd be able to go up on the marqum bridge and take it from there, thus avoiding the Hawthorne, but standing in a 8 inch space between cars and the water is not going to happen. I did try closer to the morrison but couldn't get nearly as much of the north part of downtown. So I figured, koin center and wells fargo building vs. all of north downtown. As to the saturation, I shot with a polorizer to saturate a bit and by camera is set to +2 saturation which I prefer. In other words. Its the best composition I could find in 45 min of looking. Its big and sharp and free of stitching errors and lit well. So please by all means try to take a better shot but I am confident that we will have to wait a while. -Fcb981 06:20, 21 June 2007 (UTC) * Oppose The colors look too vivid, like it was printed for a tourist brochure rather than an encyclopedia. The resolution could be higher. Bleh999 07:36, 21 June 2007 (UTC) * Oppose. Oversaturated, contrasts too harsh (bridge is under exposed and the buildings in the bg are overexposed), and for the picky: the verticals could be corrected a tad better (but that's really just for the picky). --Dschwen 09:05, 21 June 2007 (UTC) * Weak opppose : It might be possible to tweak the levels a bit to get an FP out of it, but the buildings look like chalk drawings because they're a bit low on detail (up contrast a bit?) and over-saturated. Adam Cuerden talk 10:46, 21 June 2007 (UTC) * Support Edit 2 - That fixed the problems nicely. Adam Cuerden talk 22:27, 21 June 2007 (UTC) * Support edit two - per above. Schcambo 19:14, 22 June 2007 (UTC) * Support Edit 2 Beautiful. SingCal 05:41, 24 June 2007 (UTC) * Support Edit 2 Very nice work. Great job the second time around! —BrOnXbOmBr21 • talk • contribs • 22:04, 26 June 2007 (UTC) * Support Edit 2, with urging that Edit 2 be substituted for the original nom in the articles in which it appears. Spikebrennan 17:55, 29 June 2007 (UTC) --Raven4x4x 08:45, 30 June 2007 (UTC)
WIKI
Installing Datto Workplace on a desktop This article describes how to install the Datto Workplace agent on a desktop PC or Mac workstation. It contains the following sections The first two sections describe the download process when you have been given a link to the appropriate install file. The last section shows how the Datto Workplace agent can be downloaded from Workplace Online.   Installing Datto Workplace on a Windows PC To install Datto Workplace on a Windows PC, proceed as follows. 1. Open your Welcome email containing a link to the appropriate Datto Workplace installation file. 2. Click to open the link, and download the DattoWorkplace.exe file. The DattoWorkplace.exe file is downloaded and appears on your System Tray.  Note: You may receive a message saying, "This type of file can harm your computer". If so, click Keep. 1. Click the DattoWorkplace.exe file to start the Datto Workplace Setup wizard. 2. Click Install. The setup process begins, and the following User Account Control dialogue box appears. 1. Click Yes. You may receive the following notification. 1. Click Close the applications and attempt to restart them. Then click OK. The installation continues. Note: If you had an earlier version of Cloud Direct: ABC or Autotask, this is uninstalled, and replaced by the current version of Datto Workplace. When the installation is complete, the following notification appears. 1. Click Restart, to restart your computer and use the software now. Alternatively, click Close to end the installation and use your software when your computer restarts later. An Datto Workplace Online shortcut icon is placed on your desktop. The following icon appears in your system tray Note: If this icon is not visible, it may be hidden. Click the up-arrow to reveal hidden icons.   Installing Datto Workplace on a Mac workstation To install the Datto Workplace agent on an Apple Mac workstation, proceed as follows. 1. Open a browser, go to, https://eu.dwp.datto.net/update/DattoWorkplace.dmg, and download the .dmg file. 2. Double-click the .dmg file to start the installation. The Datto Workplace installer appears. 1. Double-click the MacAgent.pkg icon.               The Install Sentinel window appears, with a prompt asking you to confirm the install. 1. Click the Continue button. The Installation Type screen appears. 1. From here, if required, you can change the destination volume that the Datto Mac Agent will be installed to by clicking Change Install Location. 2. When you are finished making changes, click Install to continue. The Password prompt dialogue box appears. 1. Enter the Username and Password of a local administrator then click Install Software. The Password prompt dialogue box disappears, leaving the Install Sentinel window. 1. Click Install. A pop-up appears, indicating that you must restart your computer after the installation. 1. Click Continue Installation. The pop-up disappears, leaving the Install Sentinel window. 1. Click Install. The installation continues to completion. When finished, the following screen appears. 1. Click the Restart button to restart your Mac. When your Mac has restarted, the Datto Mac Agent icon appears in your toolbar. From here, you can view the About information, Check for Updates, toggle Prevent Sleep, or Quit Datto Mac Agent. After rebooting your Mac, you can pair the protected machine with your Datto appliance to begin taking backups. Note: The colour of the Datto Mac Agent icon changes depending on its status: Blue means that the Datto Mac Agent is backing up your data to the Datto appliance. Black means that the app is idle. Red means there's a problem with the Datto Mac Agent.   Installing the Datto Workplace agent from Workplace Online If you have access to Workplace Online, then the Datto Workplace agent may be downloaded and installed from there. Proceed as follows. 1. Double-click the Datto Workplace Online icon on your desktop, to log into Workplace Online.  Note: You can also log into Workplace Online by:      Opening a web browser, then going to one.clouddirect.net, or by,      Clicking the Datto Workplace icon in your System Tray, and then clicking Workplace Online. Workplace Online opens on the Dashboard tab. 1. Click the Devices tab, to open the Devices page. 2. Click Install Workplace. The following page appears. 1. To install Workplace on your Windows desktop, click Windows. (If you're using a Mac, then click Mac). 1. Now follow the instructions given earlier in this article: 1. For Windows PC installation, go to Step 3 of Installing Datto Workplace on a Windows PC. 2. For Apple Mac installation, go to Step 2 of Installing Datto Workplace on a Mac workstation.
ESSENTIALAI-STEM
Seal Cay Seal Cay is a plain island within The Bahamas. Administratively, the area belongs to the Grand Cay. At 3 m, it is the highest point in the Bahamas. The island is located in the north of the archipelago Abaco for 3.3 km to the east of the island of Walker's Cay. There are extreme east to the highest (height 3 m) island group. It has elongated length 700 m, width 85 m. Tourism As Walker's Cay is known for its shallow coastal waters, here dwells a lot of fish, especially sharks, which can be fed with it. In addition there developed diving. In 2002, the barrier reef to the surrounding waters north of the islands were declared a national park; Walker's Cay National Park.
WIKI
LOINC Version 2.72 88197-9Middle East respiratory syndrome coronavirus (MERS-CoV) RNA [Presence] in Nasopharynx by NAA with probe detectionActive Part Description LP173753-7   Middle East respiratory syndrome coronavirus Middle East Respiratory Syndrome (MERS) is an illness caused by the virus Middle East Respiratory Syndrome Coronovirus (MERS-CoV). The illness was first reported in Saudi Arabia in 2012, but was later found to have originated in Jordan in 2012. MERS has been found in camels leading to speculation that they may be the initial reservoir for the virus. The largest outbreak of MERS that has occurred outside of the Arabian Peninsula was in the Republic of Korea in 2015 and was linked to an individual who had been traveling in the Arabian Peninsula. The virus is probably spread through respiratory secretions from infected individuals though the exact mode of transmission is under investigation. Infection with MERS begins with an incubation period of 5-6 days followed by a severe acute illness that involves fever, shortness of breath and for patients with comorbidities or reduced immunity can lead to pneumonia and kidney failure. The mortality rate of MERS is 3-4 out of 10 people who are infected, though most of the people who die have underlying conditions. In addition, some people experience only cold-like symptoms and others have no symptoms at all. In the United States, most state laboratories are approved to test for MERS-CoV using the real-time reverse transcription-PCR assay developed by the CDC. The assay can be run on respiratory, serum and stool specimens.[CDC:coronavirus/mers] Copyright Text is available under the Creative Commons Attribution/Share-Alike License. See http://creativecommons.org/licenses/by-sa/3.0/ for details. Source: Regenstrief LOINC, Coronavirus (Wikipedia) Fully-Specified Name Component Middle East respiratory syndrome coronavirus RNA Property PrThr Time Pt System Nph Scale Ord Method Probe.amp.tar Additional Names Short Name MERS-CoV RNA Nph Ql NAA+probe Display Name MERS-CoV RNA NAA+probe Ql (Nph) Consumer Name Alpha Middle East respiratory syndrome coronavirus (MERS-CoV), Nasopharynx Example Answer List LL744-4 Source: Regenstrief Institute Answer Code Score Answer ID Detected LA11882-0 Not detected LA11883-8 Basic Attributes Class MICRO Type Laboratory First Released Version 2.63 Last Updated Version 2.63 Order vs. Observation Both Member of these Groups LG50060-9 Middle East respiratory syndrome coronavirus RNA|PrThr|Sys:ANYResp Language Variants Get Info zh-CNChinese (China) 中东呼吸综合征冠状病毒 RNA:存在情况或阈值:时间点:鼻咽:序数型:探针法.基因扩增.靶向 nl-NLDutch (Netherlands) Middle East Respiratory Syndrome-coronavirus RNA:aanwezigheid:moment:neusholte:ordinaal:moleculaire techniek (PCR) fr-FRFrench (France) Coronavirus MERS ARN:Présence/Seuil:Ponctuel:Nasopharynx:Qualitatif:PCR amplification de cible it-ITItalian (Italy) Sindrome respiratoria mediorientale da Coronavirus (MERS) RNA:PrThr:Pt:Nph:Ord:Sonda.amp.tar ru-RURussian (Russian Federation) Ближневосточный респираторный синдром коронавирус РНК:PrThr:ТчкВрм:НГл:Пор:Проба.усил.миш es-MXSpanish (Mexico) Síndrome respiratorio de Oriente Medio coronavirus ARN:Presencia o umbral:Punto temporal:Nasofaringe:Ordinal:Amplificación de ácidos nucleicos con detección de sonda es-ESSpanish (Spain) Coronavirus del sindrome respiratorio de Oriente medio RNA:PrThr:Punto temporal:Nasofaringe:Ord:Sonda con amplificación dirigida tr-TRTurkish (Turkey) Orta doğu solunum sendromu koronovirüs (MERS-CoV) RNA:MevcEşik:Zmlı:Nfks:Srl:Prob.amf.hdf LOINC FHIR® API Example - CodeSystem Request Get Info https://fhir.loinc.org/CodeSystem/$lookup?system=http://loinc.org&code=88197-9
ESSENTIALAI-STEM
Solved Disk Clean Up. Simple question Posted on 2004-03-22 3 125 Views Last Modified: 2010-04-13 After the Disk clean wizard completes its scan there is an option listed as "Compressed Old Files" I find the explaination that teh wizard gives for these files to be vauge and un helpful. Can someone shed some light on it and help me understand what they are, and more importantly are they "Safe" to delete ? Thanks! 0 Comment Question by:tmercer • 2 3 Comments   LVL 31 Expert Comment by:Gareth Gudger ID: 10652077 Actually I dont believe ti removes any files just compacts old files you haven't used in a while.... To quote from the MSKB, "Compress Old Files - Windows can compress files that you have not used in a while. Compressing the files saves disk space while still enabling you to use them. No files are deleted. Because files are compressed at different rates, the displayed amount of disk space you will gain is approximate. There is an Options button that you can use to specify the number of days to wait before an unused file is compressed." @ http://support.microsoft.com/default.aspx?scid=kb;en-us;253597&Product=win2000 0   Author Comment by:tmercer ID: 10652642 Ok just so I understand correctly, The system would take a date and compare it with the one in the last modified date of each file. If it fails or passes, The file gets compressed ? How will this file be affected in regards to performace, and does that file stay compressed after its been opened and closed again ? Thanks. 0   LVL 31 Accepted Solution by: Gareth Gudger earned 20 total points ID: 10653379 Yes you can spoecify in options after how many days since last usage that the OS should compress those files. Anything over that date would be compressed. I would recommend keeping it high. With the size of hard drives these days there would be no significant improvement on reclaiming the space (unless you were seriously low) and later accessing these files would most likely take longer as it would need to uncompress them again for usage. However I doubt the extra time would be that noticable. In regards to the last question, I am not sure. I would imagine if the access date falls below the one specified in the options (see article) then it would stay uncompressed. Or at least you would hope so. 0 Featured Post Free Tool: SSL Checker Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration. One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community. Question has a verified solution. If you are experiencing a similar issue, please ask a related question Suggested Solutions Title # Comments Views Activity Task scheduler to manage event fails 4 828 P2V Windows NT/2000 SP4 3 1,827 Just changed my 2000 Server DCs IP now what 3 405 Application Deployment - Simple 7 652 NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc… Learn how to PXE Boot both BIOS & UEFI machines with DHCP Policies and Custom Vendor Classes Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks … Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed… 840 members asked questions and received personalized solutions in the past 7 days. Join the community of 500,000 technology professionals and ask your questions. Join & Ask a Question
ESSENTIALAI-STEM
Better Buy: Plug Power vs. Tesla Picture a company investing in a disruptive, zero-emissions vehicle technology. It's achieved some success in establishing a niche for its product, but profitability has been elusive. Naysayers abound, but some investors are totally sold on the technology and the company. Will it be the pioneer of a green revolution, or bankrupt in five years? This company could easily be the multibillion-dollar, headline-grabbing Tesla (NASDAQ: TSLA) , which at this point is practically a household name. Or it could be the multi million -dollar, under-the-radar Plug Power (NASDAQ: PLUG) , which almost nobody has heard of. Let's compare these two to see which one is the better buy right now. Tesla and Plug Power are both invested in the zero-emissions transportation industry. But one is more likely to outperform. Image source: Getty Images. In the red Of course, there's more to the differences between Plug Power and Tesla. Tesla manufactures not only the batteries for its electric vehicles, but also the cars themselves. Meanwhile, Plug Power produces fuel cells that fit into existing forklifts and other industrial vehicles, replacing lead-acid batteries. That said, the companies are in similar financial circumstances: PLUG Revenue (TTM) data by YCharts . The charts above show some of the fundamentals for Plug Power and Tesla. Both companies have seen steadily increasing amounts of revenue (blue line) over the last five years, while failing to turn a profit on a trailing-12-month basis (orange line). Instead, they've been keeping afloat by taking on more and more debt (red line) and issuing more shares (green line). Both companies' managements also have a history of promising brighter days just around the corner and then failing to deliver . But Tesla may have a small leg up on Plug Power: It managed to post a quarterly profit in Q3 2018 -- its second quarterly profit in five years -- while Plug Power hasn't posted a single profitable quarter since 2014. Was it just a blip, or the start of a profitable trend for Tesla? Nobody's sure, but Tesla certainly seems to be closer to profitability than Plug Power, at least for the time being. Turning a profit Because neither company is profitable, we can't compare them using traditional valuation metrics like P/E ratio or enterprise value to EBITDA , which can't be computed when earnings are negative. But we can look at how close the companies seem to be coming to turning an annual profit. As previously mentioned, Tesla managed to post a quarterly profit in Q3 2018 -- its first in years -- thanks to finally ramping up production of its Model 3 sedan. During Q3, Tesla delivered 55,840 Model 3s. And the trend is moving in the right direction: Model 3 deliveries increased further in the fourth quarter (although not by quite as much as analysts were hoping) to 63,150. This brought total deliveries of all models to 245,240 in 2018. That's more than double the 102,807 deliveries from the prior year. In theory, more deliveries should yield higher profits, and a consecutive profitable quarter might indicate that Tesla has finally hit on a business model that works. On the other hand, Plug Power is also making more sales than ever, but isn't turning a profit. The bulk of its sales (71% in 2017) go to major partners Amazon and Walmart , which use forklifts powered by Plug Power's cells. But it appears as though those partners -- which are hundreds of times larger than Plug Power by market cap -- may be using their clout to demand such favorable contract terms that the company is unable to turn a profit. And it's not like Plug Power can just walk away from nearly three-quarters of its revenue. Candy everybody wants For all their similarities, Tesla has something that Plug Power will probably never have: brand power. According to Automotive News , Tesla is the world's seventh-most-valuable car brand, with a value of about $9.4 billion. It also has legions of devoted fans and, of course, hundreds of thousands of Tesla owners worldwide. That brand power and prestige is likely to hold steady no matter how many quarters Tesla goes without making a profit, and no matter how many unorthodox statements are made by controversial CEO Elon Musk. On the other hand, as a non-consumer brand, Plug Power doesn't have this kind of cachet. Even if hydrogen-powered passenger vehicles suddenly become a hot consumer item, the brand prestige would likely go to the automobile manufacturer itself rather than the company making the fuel cells. And when Plug Power talks about "expanding" its cells' applications, it's looking at commercial and mass transit vehicles like the hydrogen-powered delivery truck it recently provided to FedEx . Breaking into this market will be incredibky challenging and investors shouldn't put to much stock into it until we see tangible results. That means that there's going to be more pressure on Plug Power to start turning a profit, and soon. And the winner is... Although Plug Power and Tesla are both experiencing rising revenue but negative annual profits, and both have had to take on debt and issue new shares in recent years, Tesla's position is much stronger than Plug Power's. With its strong brand and recent evidence that it can -- under the right circumstances -- make a profit, Tesla is the better buy. Right now, hydrogen fuel cells are little more than a niche product powering industrial forklifts. While Plug Power clearly has dreams of introducing fuel cells to all kinds of other applications around the globe, today it's a very small company that can't even make money doing what it's doing, even with buy-in from powerful partners. Until that changes, investors should steer clear. Find out why Teslais one of the 10 best stocks to buy now Motley Fool co-founders Tom and David Gardner have spent more than a decade beating the market. (In fact, the newsletter they run, Motley Fool Stock Advisor, has tripled the market!*) Tom and David just revealed their ten top stock picks for investors to buy right now. Tesla is on the list -- but there are nine others you may be overlooking. Click here to get access to the full list! *Stock Advisor returns as of November 14, 2018 John Mackey, CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool's board of directors. John Bromels owns shares of AMZN and Tesla. The Motley Fool owns shares of and recommends AMZN, FDX, and Tesla. The Motley Fool has a disclosure policy . The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Home » C++ programming language acos() function with example in C++ C++ acos() function: Here, we are going to learn about the acos() function with example of cmath header in C++ programming language? Submitted by IncludeHelp, on April 28, 2019 C++ acos() function acos() function is a library function of cmath header, it is used to find the principal value of the arc cosine of the given number, it accepts a number (x) and returns the principal value of the arc cosine of x in radians. Note: Value (x) must be between -1 to +1, else it will return a domain error (nan). Syntax of acos() function: acos(x); Parameter(s): x – is the value whose arc cosine to be calculated. Return value: double – it returns double type value that is the principal value of the arc cosine of the given number x. Example: Input: float x = 0.65; Function call: acos(x); Output: 0.863212 C++ code to demonstrate the example of acos() function // C++ code to demonstrate the example of // acos() function #include <iostream> #include <cmath> using namespace std; // main() section int main() { float x; x = -1.0; cout<<"acos("<<x<<"): "<<acos(x)<<endl; x = -0.89; cout<<"acos("<<x<<"): "<<acos(x)<<endl; x = 0.65; cout<<"acos("<<x<<"): "<<acos(x)<<endl; x = 1; cout<<"acos("<<x<<"): "<<acos(x)<<endl; return 0; } Output acos(-1): 3.14159 acos(-0.89): 2.66814 acos(0.65): 0.863212 acos(1): 0 Example with domain error If we provide the value out of the range (except -1 to +1), it returns nan. // C++ code to demonstrate the example of // acos() function #include <iostream> #include <cmath> using namespace std; // main() section int main() { float x; x = -0.89; //no error cout<<"acos("<<x<<"): "<<acos(x)<<endl; x = 2.65; //error cout<<"acos("<<x<<"): "<<acos(x)<<endl; x = -1.25; //error cout<<"acos("<<x<<"): "<<acos(x)<<endl; return 0; } Output acos(-0.89): 2.66814 acos(2.65): nan acos(-1.25): nan Reference: C++ acos() function Comments and Discussions! Copyright © 2023 www.includehelp.com. All rights reserved.
ESSENTIALAI-STEM
Home Health Should You Consider Using A Water Filter? Here’s What To Know 2 Mins read • Here's what to know about whether you should think about using a water filter Drinking water to stay healthy and hydrated is essential, especially during the hot summer months. However, where you should get your water isn’t always an easy decision. Is it best to drink it straight from the tap or should you drink it from a bottle? Should you consider using a water filter, instead? These are all valid questions. To find an answer, you must first understand the implications of choosing one over another. The Dark Side of Bottled Water Many people believe that bottled water is healthier than tap water. However, this isn’t necessarily true. Researchers have found microplastics in 90% of popular brands’ bottled water. It seems the bottling and packaging processes may contribute to this contamination. Scientists have also recently found high levels of arsenic, E. coli, fertilizer, pain relievers and other impurities in bottled water. Drinking this contaminated water can result in gastrointestinal complications, reproductive problems and other illnesses. Yet, people continue to buy and drink it. In addition to never truly knowing what is in bottled water, those who choose it over tap water must be ready to face the facts regarding plastic waste. In 2018, people all over the world bought more than 480 billion plastic bottles. Yet, they only ever recycled 29% of them. Obviously, this poses a problem for the environment, wildlife and marine ecosystems, which take the brunt of most of this waste. Is Tap Water Any Better? With so many issues surrounding bottled water, you may wonder if tap water offers a better alternative. While drinking from the tap won’t produce plastic waste, it can be detrimental to your health. Just like bottled water, tap water contains more contaminants than you might realize. Currently, the U.S. Environmental Protection Agency (EPA) regulates 90 contaminants commonly found in drinking water. Yet, U.S. industries use more than 60,000 chemicals that may or may not wind up in your tap water. Even the chemicals companies use to disinfect tap water can create harmful byproducts that may contaminate it. Still, if the EPA and Food and Drug Administration (FDA) decide levels are low enough, you will ingest arsenic, lead, flouride, chlorine, radioactive contaminants and more through your tap water. This negligence and under-regulation has been linked to 100,000 cancer cases in the U.S. Therefore, just because the federal government deems tap water safe doesn’t mean it truly is. Water Filters Can Help Since you can’t know if bottled water or tap water is safe to drink, your best bet is to purchase a filter. Depending on what kind of filter you use, it can remove sediment, metals, chemicals and other unwanted contaminants. While there is no single filter that will remove everything from your water, there are a few that can remove a majority of harmful pollutants. For instance, granular activated charcoal filters remove chlorine, volatile organic compounds and foul odors and tastes. In addition to traditional filters, there are other treatment methods that may effectively remove things like bacteria, viruses and other microorganisms. Reverse osmosis is one such method. An RO system will remove fluoride and block other contaminants from entering your water supply. Meanwhile, distillation filtration can remove E. coli, hepatitis A, norovirus, arsenic, lead, sulfate and more. How to Choose When it comes to choosing a filter, it’s best to first determine what contaminants might be lurking in your tap water. Check your water supplier’s annual report or enter your ZIP code in EWG’s tap water database. Then, depending on what is in your water, you may choose between a carbon filter, a reverse osmosis system, water softeners, a distillation system and a few other kinds of filters. Often, these systems come as a water filter pitcher or a faucet attachment. Once you have your filter, be sure to use it regularly and replace the filter every few months. Doing so will ensure the filter continues to effectively remove contaminants and keep your water — and your body — safe. Related posts Home HealthSpecialties Essential Flooring Tips to Minimize Painful Accidents 2 Mins read Falls are the single most common cause of accidental injuries in the United States. The CDC reports that around 3 million older… Home Health A Guide to Keeping You Fresh Throughout Winter 3 Mins read During the winter, your skin, hair, and the chemistry in your body starts to change into full-on hibernation mode. You probably noticed… FitnessHome HealthSpecialtiesWellness Here are the 6 must-have ingredients for the 'perfect plan' for your physical well-being in future? 3 Mins read Everyone gets those sudden urges to stay fit and transform their lives. These good-intentioned moments, however powerful, are short-lived, to say the…
ESSENTIALAI-STEM
Rygge Station Rygge Station (Rygge stasjon) is a railway station on the Østfold Line at Ryggebyen in Rygge, Norway. In addition to serving the village, the station acts as an airport rail link to Moss Airport, Rygge via a free shuttle bus. The station has two platforms and is located on a 7 km double track section of the line. It has hourly services by Vy southbound to Halden and northbound to Oslo. Service The station is located 69.28 km from Oslo Central Station, south of Moss Station and north of Råde Station. It is served by Vy, who operate an hourly regional train service between Oslo and Halden using NSB Class 73 electric multiple units, with an extra departure in the rush hour. Five of the daily services continue onwards south via the Norway/Vänern Line to Gothenburg Central Station. Travel time to Oslo S is 50 minutes, to Halden is 55 minutes, and to Gothenburg C is 3 hours and 3 minutes. The station has two platforms, one for trains in each direction, with an underpass between them. There is free parking for cars and bicycles, and the station has ticket machines. NSB operates a free shuttle bus to Moss Airport, Rygge, which takes 8 minutes. There is a waiting room in the station building. History The station was opened on 2 January 1879, as one of the original stations on the Østfold Line. The station building was designed by Peter Andreas Blix. The railway past the station was electrified on 1 May 1940. The station became centrally controlled from 17 December 1973. Construction of a new 7 km double track section of the Østfold Line past Rygge started in 1996. The new section reduced travel time for trains south of Rygge by five to seven minutes, and also allowed better regularity on the line. The section is also free of level crossings, having replaced 21 crossings with bridges or tunnels. The station itself was all-new, and included two platforms, sheds, bicycle parking and lighting. During construction there had been found a 3000-year-old bronze ax. The section cost 490 million Norwegian krone (NOK) and stretches from Såstad in Rygge to Haug in Råde. It was completed one year behind schedule after funding was reduced in 1998. On 28 June 2000, Minister of Transport and Communications Terje Moe Gustavsen opened the section and station. The section past the station received GSM-R on 2 January 2007. On 14 February 2008, Moss Airport, Rygge opened. To make the station an airport rail link, NSB introduced a free shuttle bus from the station to the airport in connection with all train services that call at Rygge Station. This increased the annual ridership at the station by 100,000. However, neighbors of the station had problems with strangers in the middle of the night asking for directions to the airport. In 2010, the National Rail Administration reopened the station building for waiting passengers, after the waiting room had been closed for 30 years. The estimated cost of keeping the waiting room open is NOK 120,000. The station building is owned by Rom Eiendom, who will rent the building to the National Rail Administration. Rom Eiendom stated that they hoped a café or other customer facility would rent part of the building as well.
WIKI
Wei Zhen Wei Zhen is the name of: * We1less (born 1997), real name Wei Zhen, Chinese League of Legends professional player * Wei Zhen (footballer) (born 1997), Chinese association footballer
WIKI
The interest in nurture has focused on the importance of socialization, how you become a human being in society, you are socialized into it, into the norms and rules of interaction. Many attitudes and personal traits a person develops is created through observation. A great example of this is the Bobo Doll Experiment, led by Albert Bandura, tested Bandura’s social learning theory, which tests that aggression occurs through observation and interactions with the people around you (Lansford). Aggression sits at the base of many social issues such as simply violence or war. The participants used for this experiment included thirty-six girls and thirty-six boys, all within the ages of three to six. They divided the groups into eight experimental groups with one control group; the children watched as an adult entered the room, in the aggressive situation the adult would violently attack the doll, after simply ten minutes of observing the children were taken to another room that contained items such as mallets, darts, and the Bobo doll, as well as simply children’s toys. Each child was given twenty minutes to play in the room. The conclusion to this experiment was that the children who were exposed to violence seemed to imitate the behavior they had seen. “Are we a product of our genes or are we a product of our experience…” (Perry). What happens to a child that has been abandoned by all who are charged with protecting them, left to fend for themselves in the wild, never knowing love or social interaction (Perry). The word ‘feral’ means wild or undomesticated, it brings to mind the myth of characters such as Tarzan who lived among animals. For centuries, feral children have posed questions that go to the very heart of what it means to be human. Part of being human is being brought up by them, if you are not brought up by humans, are you completely human? One of the most extraordinary cases has come to light in the Ukraine, Oxana Malaya, a girl whose parents were alcoholics; one night, too drunk to care, they left her outside; looking for warmth, Oxana crawled into a kennel next to a dog, who most likely is the reason she survived. While the dog helped her stay alive, her time in the kennel also had terrible consequences; for the next five years, she would spend her life living as a dog. Children can copy the habits of the creatures around them, if those creatures are human, the child in turn acts like a human, but, in Oxana’s case she was surrounded by dogs. Privation is defined as never having formed an attachment with a caregiver, people who have suffered from privation often develop social as well as emotional issues as they age. Genie Wilder was a child who was deprived of human interaction, locked in a cellar, and isolated from everyone, this lead to her becoming feral. Genie was locked away from birth to the age of seven, only given food by her parents, yet her parents would not allow her to form an attachment to them; as a result of this, when she was discovered and taken from her parents’ home, Genie was studied by many psychologists, as they studied her they noted that she behaved almost primitively; she could not walk very well, and she felt many things tactically with her face. They are drawing a lot of connotations to animalistic primitive references, Genie was not taught any of the means of human behavior, which we recognize today as social norms. Wilder was also not taught human language, leading her to not be able to speak, communicating in grunts. Genie was outside of the critical period, which is three years, she could not form attachments whatsoever. Our overall environment consists of everything around us, from the physical things that we interact with to the air that we breathe and the people that we spend our time with. Because of this, it is one of the most influential factors in both developing and affecting a person’s overall mental health (Schmidt), with this in mind, consider what your life would be like if you were confined to just one room, or how you would experience things if your air was constantly full of paint fumes. How do you think this would affect your mental health? Having to deal with noisy, crowded environments can have a huge impact on someone’s overall mental state, it’s been proven that those who deal with these types of environments tend to have higher rates of fatigue, more easily annoyed, and generally less patient. Similarly, living in crowded spaces has been found to have an adverse effect on people’s general moods and can lead to stress-related illnesses. Socialization is a life-long process where we learn about social expectations and how to interact with others, everything we consider ‘normal’ is actually learned through socialization. This is where we as humans learn to walk, talk, and feed ourselves; it’s all through socialization, and we also learn the behavioral norms to help us fit in. Some of the most important agents of socialization, or what is used to transmit culture; agents include people, organizations and institutions that assist us in learning our social world. Family is considered the most important agent, when you are born you are completely dependent on others to survive, your parents play the important role of teaching you how to care for yourself, they also teach you how close relationships work; along with this comes teaching you their own values, beliefs, and norms. Schools are also another important agent of socialization, in addition to teaching the basic subjects, schools also teach life skills. This makes it so students do not just learn from their academic curriculum, but they also learn social skills from interactions with their teachers and peers. For example, we learn the importance of obeying authority, and that to be successful we must learn to be quiet, to wait, and to even act interested when we are not interested at all. This is all part of what is called the hidden curriculum, which is simply standard behaviors, and are what is deemed acceptable, subtly taught by teachers. Peers help us develop our social behavior, peer pressure is an example of how other people influence us, peers especially in our teenage years also influence what movies we watch, or even the type of music we listen to. Mass media includes things like television, the internet, radio, movies, and books. When children are young they learn things through mass media. Today children are exposed to tons of content that is intended for more mature audiences yet is so readily available for anyone. Sometimes mass media even enforces gender and other stereotypes.
FINEWEB-EDU
Page:The Mastering of Mexico.djvu/189 How the great Montezuma looked, how he dined, his arsenals, his craftsmen and craftswomen, his gardens, aviary, beasts of prey; how we viewed the great market place and what else we saw when we ascended the chief temple. mighty Montezuma may have been at this time about forty years of age. He was tall and had a slender body of beautiful proportion, and a complexion not very brown but approaching the Indians' in color. He did not wear his hair long, but only so as to cover his ears, and his beard was scanty. His face was rather long, but cheerful, and he had fine eyes which reflected his moods of tenderness and gravity. He was particularly neat in his person and bathed every afternoon. The clothes that he had on one day he did not put on again till after four days. In halls entering his apartments he had always a guard of over two hundred men, with whom, however, he held no conversation, except to give or receive some intelligence. Whenever they went to speak to him they had first to take off their rich cloaks and put on others of little value, though these
WIKI
Category:Nazi Germany and Catholicism Articles concerning the relationships between Nazi Germany (1933-1945) and Catholicism.
WIKI
DDR Soars to a New 52-Week High - Analyst Blog Shares of DDR Corp. ( DDR ) reached a new 52-week high, touching $19.03 in the first half of the trading session on May 7. The closing price of this retail real estate investment trust (REIT) on May 7 was $18.91, representing a solid year-to-date return of 20.6%. The trading volume for the session was 2.03 million shares. Despite hitting its 52-week high, this Zacks Rank #2 (Buy) stock may not sustain this momentum going forward based on its current estimates revision trends. However, the company has strong fundamentals and expected year-over-year earnings growth of 6.71% for 2013. Factors to Consider Impressive first-quarter 2013 results on the back of its consistently strong portfolio restructuring activity as well as successful execution of its long-term strategy of improving the balance sheet by reducing leverage - were the primary growth drivers for DDR. However, DDR has a significant development pipeline, which increases its operational risks.In addition, excess retail space in a number of its markets and the rise in consumer purchases through catalogs and the Internet could hurt the demand for it's' properties. On Apr 30, DDR reported first-quarter 2013 operating FFO (funds from operations) per share of 27 cents. This was in line with the Zacks Consensus Estimate and surpassed the year-ago figure of 24 cents. Strategic acquisitions made in the past two years aided the year-over-year growth. Moreover, DDR has delivered positive earnings surprises in 2 of the last 4 quarters with an average beat of 4.01%. Estimate Revisions Over the last 30 days, the Zacks Consensus Estimate for full-year 2013 FFO remained unchanged at $1.10. For 2014, the Zacks Consensus Estimate decreased 0.8% to $1.17 per share. Other better performing REITs include the Host Hotels & Resorts Inc. ( HST ), Public Storage ( PSA ) and Acadia Realty Trust ( AKR ). All these stocks carry a Zacks Rank #2. Note: Funds from operations, a widely accepted and reported measure of REITs performance, are derived by adding depreciation, amortization and other non-cash expenses to net income. ACADIA RLTY TR (AKR): Free Stock Analysis Report DDR CORP (DDR): Free Stock Analysis Report HOST HOTEL&RSRT (HST): Free Stock Analysis Report PUBLIC STORAGE (PSA): Free Stock Analysis Report To read this article on Zacks.com click here. Zacks Investment Research The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Uluazapa Uluazapa is a municipality in the San Miguel department of El Salvador. The town is located approximately 30 minutes from San Miguel and is known for its musical atmosphere. Many refer to it as a "cradle of musicians" for its emphasis on musical education. The name "Uluazapa" stands for "Stony place of the Ulúas" in Nauathl, which were Indian tribes that inhabited the area pre-Columbian time. The municipality is made up of surrounding cantons, hamlets, and neighborhoods. The Uluazapa Central Park is located in the middle of the town, next to the colonial "San Pedro Apostal" church and the municipal hall. Surrounding the park are local shop, restaurants, and businesses. It also has a large sport center equipped with a soccer field and basketball courts. The town has a population of 3,351 Inhabitants.
WIKI
User:Foose007 FASHION IN THE 1950'S In the 1950's fashion was mainly influenced by rock'n'roll superstars and it was also influenced by TV and magazines. Some rock stars were Elvis Presley and Jerry Lee Lewis ect... Teenage girls wore where tight short sleeve tops with long frilly dresses that would have bright bold colours or have patterns on them.They also wore flat shoes and had their hair tied up in a pony tail. Teenage boys wore jeans with stylish foot wear like converse shoes and they wouldn't go any where without there black leather jackets and they wore it with the collar up.They would gel their hair back like a comb ova. Fashion was a lot different in the 1950's to today but maby one day retro might come back in to fashion. by Michael .M.
WIKI
In re Beverly C. GRIGGSBY, Debtor. No. 09-10796 (MG). United States Bankruptcy Court, S.D. New York. April 17, 2009. Earl A. Rawlins, Esq., New York, NY, for Debtor. Anthony J. Cornicello, Esq., Cornicello & Tendler, LLP, New York, NY, for 940 St. Nicholas, LLC. MEMORANDUM OPINION SUSTAINING OBJECTION TO NOTICE OF COMPLIANCE AND GRANTING LIFT-STAY MOTION MARTIN GLENN, Bankruptcy Judge. 940 St. Nicholas, LLC (“940 St. Nicholas” or “Landlord”), filed a Motion to Vacate the Automatic Stay in this case under chapter 13 (“Lift-Stay Motion”) (ECF Doc. No. 13), to permit it to execute a warrant of eviction obtained pursuant to a judgment of possession against the debt- or, Beverly C. Griggsby (“Griggsby” or “Debtor”), in Civil Court on January 5, 2007, before this chapter 13 case was filed. The judgment of possession and warrant of eviction were based on so-called “Col-lyer Conditions” in Griggsby’s residential apartment. The Landlord also filed an Objection to the Debtor’s certification pursuant to 11 U.S.C. § 362(0(1) (“Objection”)(ECF Doc. No. 11). The Court heard argument on the Objection and the Lift Stay Motion on April 2, 2009. At the conclusion of the hearing, the Court ruled from the bench, sustaining the Objection and granting the LifNStay Motion. A written order was entered that same day lifting the automatic stay. (ECF Doc. No. 16.) In its bench ruling, the Court stated that because of the novel issues involved in this matter, a written Opinion would follow explaining the Court’s reasoning. For the reasons explained below, the Court concludes that where a default giving rise to a prepetition judgment of possession could not be cured by the payment of money alone, the automatic stay under Bankruptcy Code § 362 does not operate as a stay of any eviction proceeding and the stay cannot be reinstated by the debtor under Bankruptcy Code § 362(i). On April 10, 2009, Debtor filed an application by order to show cause seeking to reinstate the automatic stay. The supporting affidavits rehash the issues presented to the Court at the April 2, 2009 hearing. The application is really a request for reconsideration of the April 2, 2009 bench ruling and Order lifting the automatic stay entered on that day. However viewed, the application to reinstate the stay fails to advance grounds supporting any different result. BACKGROUND On February 21, 2009, Debtor filed a voluntary petition commencing a chapter 13 bankruptcy case. Prior to filing her bankruptcy case, Griggsby resided as a tenant in Apartment 51 in 940 St. Nicholas Avenue, New York, N.Y. (the “Apartment”) pursuant to a rent-stabilized lease with the Landlord’s predecessor. On or about June 22, 2006, 940 St. Nicholas served a notice of termination on Griggs-by, alleging that she was responsible for excessive accumulated debris posing a health and fire risk (“Collyer Conditions”). The Landlord subsequently commenced a Collyer-type nuisance holdover proceeding in the Civil Court of the City of New York, County of New York (“Civil Court”), Index No. L & T 81890/06. On January 5, 2007, after a hearing, the Civil Court entered an order (the “2007 Order”) awarding a final judgment of possession to the Landlord. The judgment rested upon the presence of the Collyer Conditions and arrears owed by Griggsby in the amount of $4,640.24 for use and occupancy through January 5, 2007. The Order indicated that the Civil Court would issue a warrant of eviction forthwith but stayed the warrant’s execution to permit Griggsby to cure the defaults by a January 16, 2007 deadline. Griggsby’s appeal of the final judgment was dismissed for failure to perfect. On October 17, 2008, after a multi-day hearing, the Civil Court entered an Order (the “2008 Order”), finding that Griggsby had failed to cure the Col-lyer Conditions and authorizing 940 St. Nicholas to execute the warrant of eviction. The court’s written opinion did not indicate whether Griggsby had cured the outstanding money arrears, but it is clear from the opinion that the Collyer Conditions were the basis for the court permitting Griggsby’s eviction to go forward. Griggsby failed to timely appeal the 2008 Order. The court issued the warrant of eviction on December 10, 2008. An evietion scheduled for February 23, 2009 was stayed as a result of Debtor’s bankruptcy case. As explained below, pursuant to Bankruptcy Code § 362(b)(22), the automatic stay would not apply as a bar to the Landlord’s efforts to evict the Debtor because the state court judgment of possession was obtained before the Debtor filed her chapter 13 petition, unless the Debtor was able successfully to invoke § 362(i) by depositing 30 days’ post-petition rent with the Clerk of the Court and by filing a certification required by § 362(Z )(1). The Debtor timely deposited the funds and also filed a certification. On February 23, 2009, the Clerk entered a notice of Debtor’s compliance and intent to cure the prepetition judgment of possession (“Compliance Notice”) (ECF Doc. No. 7). On March 6, 2009, 940 St. Nicholas filed an Objection to Debtor’s certification and refused to accept a tender of the deposit. The Landlord argues that § 362(i) does not apply in this case because the outstanding judgment of possession rests upon Debtor’s non-monetary default — failing to cure the Collyer Conditions. The Landlord maintains that § 362(i) applies by its terms only to a curable monetary default that is present at the commencement of a debtor’s bankruptcy case. Because the judgment of possession and warrant of eviction were based on non-monetary obligations, the argument goes, § 362(Z) is not available to the Debtor. The Landlord further urges that even if § 362(i) did apply in this ease, the Debt- or’s right to cure the Collyer Conditions expired upon entry of the 2008 Order. The motion to lift the stay claims that the Landlord lacks adequate protection under § 362(d)(1) because the Collyer Conditions remain in the Apartment. The Landlord also contends that the Debtor’s estate lacks a property interest in the Apartment within the meaning of Bankruptcy Code § 541 because, pursuant to § 749 of the New York Real Property Actions and Proceedings Law (“RPAPL”), the issuance of the warrant of eviction cutoff the Debtor’s interest in the Apartment. DISCUSSION A. BAPCPA Limits Application of the Automatic Stay in Eviction Proceedings Section 362(b)(22), added to the Bankruptcy Code in 2005 as part of the Bankruptcy Abuse Prevention and Consumer Protection Act of 2005 (“BAPCPA”), provides that the automatic stay pursuant to § 362(a)(3) does not apply to the “continuation of any eviction, unlawful detainer action, or similar proceeding by a lessor against a debtor involving residential property in which the debtor resides as a tenant under a lease or rental agreement and with respect to which the lessor has obtained before the date of the filing of the bankruptcy petition, a judgment for possession of such property against the debt- or.” 11 U.S.C. § 362(b)(22). Section 362(i) provides a limited exception to the strictures of § 362(b)(22). The automatic stay does apply for a 30-day period after the filing of the bankruptcy petition if the debtor files with the petition a certification under penalty of perjury that “under non-bankruptcy law applicable in the jurisdiction, there are circumstances under which the debtor would be permitted to cure the entire monetary default that gave rise to the judgment of possession after that judgment of possession was entered.” 11 U.S.C. § 362(Z )(1)(A). A debtor must also deposit with the clerk of the court with the bankruptcy petition any rent that would become due during the 30-day period after the filing of the bankruptcy petition. 11 U.S.C. § 362(i )(1)(B). In order to extend the stay beyond the initial 30-day period, within that period the debtor must cure, “under nonbankruptcy law applicable in the jurisdiction, the entire monetary default that gave rise to the judgment under which possession is sought....” 11 U.S.C. § 362(i)(2). In this case, the Debtor filed a certification and tendered rent for the 30-day period with her bankruptcy petition. The Landlord objected to the certification arguing that the § 362(i) procedure cannot be used to reinstate the automatic stay where the judgment of possession and warrant of eviction were issued because of a non-monetary default. B. Landlord’s Objection to Debtor’s Certification Section 362(i)(3) provides that “[i]f the lessor files an objection to any certification filed by the debtor ..., the court shall hold a hearing ... to determine if the certification filed by the debtor ... is true.” 11 U.S.C. § 362(i )(3)(A). If the court sustains the objection, “subsection (b)(22) shall apply immediately and relief from the stay shall not be required to enable the lessor to complete the process to recover full possession of the property.” 11 U.S.C. § 362(Z)(3)(B)(i). In this case, the Landlord not only filed its Objection but also filed the Lift-Stay Motion. Both the Objection and the Lift-Stay Motion were heard together on April 2, 2009. The Court entered an Order that day granting the Lift-Stay Motion. In light of that Order granting stay relief to the Landlord, it is unnecessary separately to address whether the certification filed by the Debtor “is true.” The outcome here depends upon an issue of law— whether complying with § 362(i) reinstates the automatic stay where the judgment of possession cannot be cured by payment of any monetary default — not upon a determination of “truth” of facts or conclusions set forth in a debtor’s certification. The Landlord gets the same result — the ability to continue with eviction — whether the Objection is sustained or the Lift Stay Motion is granted. C. The Automatic Stay Could Not Be Reinstated Because of a Non-Monetary Default The Court concludes that § 362(i) does not apply where, as here, the prepetition judgment of possession and warrant of eviction are based upon a non-monetary default that cannot be cured by payment of money. Section 362(b)(22) makes the automatic stay inapplicable to eviction proceedings whatever the basis for the judgment of possession if the judgment was obtained before the bankruptcy petition was filed. Section 362(i) provides a mechanism to reinstate the stay if “there are circumstances under applicable nonbank-ruptcy law under which the debtor would be permitted to cure the entire monetary default that gave rise to the judgment of possession....” 11 U.S.C. § 362G)(1)(A) (emphasis added). See In re Alberts, 381 B.R. 171, 177 (Bankr.W.D.Pa.2008) (“Section 362(i) of the Code operates as a safe harbor precluding the termination of the stay in instances where ... the judgment for possession was obtained as a result of monetary defaults of the debtor.... ”); In re Williams, 371 B.R. 102, 105-09 (Bankr. E.D.Pa.2007) (analyzing the statute and legislative history). At issue in this case is whether the § 362(J) safe harbor is triggered if a pre-petition judgment of possession rests in whole or in part upon a non-monetary default. Caselaw is silent on this question. Section 362(Z )’s statutory language limits its applicability to cases in which state law would permit the debtor “to cure the entire monetary default that gave rise to the judgment for possession.... ” 11 U.S.C. § 362(Z )(1)(A). The legislative history does not specifically address the effect of the change made by BAPCPA in the event a judgment of possession was based solely on a non-monetary default, or where it was based on both monetary and non-monetary defaults. If the judgment of possession was based solely on a non-monetary default, there is no basis to argue from the language of the statute that the automatic stay can be reinstated under § 362(i). But what if the judgment of possession was based on mixed grounds, monetary and non-monetary? If nonbankruptcy law — in this case, New York law — would permit a debtor to cure monetary and non-monetary defaults, is the stay reinstated if the debtor takes the actions required to cure the monetary default only, or, for that matter, to cure all monetary and non-monetary defaults? The language of the Code does not provide clear answers to these questions. The legislative history also does not shed much light on the questions. As discussed in the next section of this Opinion, under New York law, there are circumstances under which a debtor would be permitted to cure both monetary and non-monetary defaults. But those are matters properly left for a state court to decide. Section 311 of Public Law 109-8 added §§ 362(b)(22), 862(b)(23), 362(0 and 362(m) to the Bankruptcy Code. Sections 362(b)(22) and 362(i), as previously described, deal with the effect on the automatic stay of a judgment of possession obtained before a bankruptcy petition is filed. Sections 362(b)(23) and 362(m) deal with the effect on the stay of circumstances creating grounds for an eviction action to be filed or adjudicated that seeks possession of residential property “based on endangerment of such property or the illegal use of controlled substances on such property-” 11 U.S.C. § 362(b)(23); see 5 Keith M. Lundin, ChapteR 13 Bankruptcy § 431.1 (3d ed.2006). The legislative history discusses these provisions together. House Report No. 109-31 describes these changes in BAPCPA as follows: Sec. 311. Automatic Stay. Section 311 of the Act amends section 362(b) of the Bankruptcy Code to except from the automatic stay a judgment of eviction with respect to a residential leasehold under certain circumstances. It is the intent of this provision to create an exception to the automatic stay of section 362(a)(3) to permit the recovery of possession by rental housing providers of their property in certain circumstances where a judgment for possession has been obtained against a debtor/resident before the filing of the petition for bankruptcy. ... It is also the intent of this section to permit eviction actions based on illegal use of controlled substances or endangering property in certain circumstances. Section 311 gives tenants a reasonable amount of time after filing the petition to cure the default giving rise to the judgment for possession as long as there are circumstances in which applicable nonbankruptcy law allows a default to be cured after a judgment has been obtained. Where nonbankruptcy law applicable in the jurisdiction does not permit a tenant to cure a monetary default after the judgment for possession has been obtained, the automatic stay of section 362(a)(3) does not operate to limit action by a rental housing provider to proceed with, or a marshal, sheriff, or similar local officer to execute, the judgment for possession. Where the debtor claims that applicable law permits a tenant to cure after the judgment for possession has been obtained, the automatic stay operates only where the debtor files a certification with the bankruptcy petition asserting that applicable law permits such action and that the debtor or an adult dependent of the debtor has paid to the court all rent that will come due during the 30 days following the filing of the petition. If, within thirty days following the filing of the petition, the debtor or an adult dependent of the debtor certifies that the entire monetary default that gave rise to the judgment for possession has been cured, the automatic stay remains in effect. If a lessor has filed or wishes to file an eviction action based on the use of illegal controlled substances or property endangerment, the section allows the lessor in certain cases to file a certification of such circumstance with the court and obtain an exception to the stay. .... This section does not provide any new right to either landlords or tenants relating to evictions or defenses to eviction under otherwise applicable law. H.R.Rep. No. 109-31, pt. 1, at 74-75(2005) (hereinafter, “House Report No. 109-31”), U.S.Code Cong. & Admin.News 2005, pp. 88, 142-43; see also In re Williams, 371 B.R. at 109. Congress provided in § 362(b)(22) that a prepetition judgment of possession obtained by a lessor for any reason keeps the stay from automatically being triggered by the filing of a bankruptcy petition. With respect to § 362(i), Congress’s focus was clearly upon allowing the stay to be reinstated if state law permits a cure of a monetary default; no mention is made of a non-monetary default. Sections 362(b)(23) and 362(m) provide a means for a lessor to terminate the automatic stay based upon alleged drug use or “property endangerment.” Sections 362(b)(23) and 362(m) presuppose that a lessor did not obtain a prepetition judgment of possession. “Property endangerment,” as used in the statute, is undefined, but the term would seem to fit with seeking eviction based on Collyer Conditions. While Congress established a procedure to terminate the stay based on alleged property endangerment, it is illogical to suppose that Congress would enable a debtor to stay the effect of a judgment of possession by curing a monetary default and leaving unresolved any material non-monetary default that may also form a basis for the prepetition judgment of possession. If alleged property endangerment is the basis for seeking to lift the stay and the tenant contests the existence of the “situation giving rise to the lessor’s certification,” 11 U.S.C. § 362(m)(2), the court is required to hold a hearing with the debtor having the burden of proof that the “situation giving rise to the lessor’s certification ... did not exist or was remedied.” 11 U.S.C. § 362(m)(2)(D). But where a prepetition judgment of possession is based on circumstances that meet the test of “property endangerment,” the bankruptcy court is precluded from relitigating these issues. In re Éclair Bakery Ltd., 255 B.R. 121, 133 n. 23 (Bankr.S.D.N.Y. 2000) (“A state court judgment issued pri- or to the filing of a debtor’s bankruptcy case is res judicata in the bankruptcy case, and the debtor may not relitigate issues already decided by the state court.”) (citations omitted). Accordingly, the Court concludes that § 362(m) does not apply if the lessor obtained a prepetition judgment based upon “property endangerment”; and § 362(i) does not apply if the prepetition judgment of possession is based in whole or in part on a material default that cannot be cured by the payment of money. In this case, the judgment of possession issued by the Civil Court on January 5, 2007 rested upon the Collyer Conditions and past-due use and occupancy payments alike. However, the 2008 Order authorizing the landlord to execute the warrant did not indicate the presence of an outstanding monetary default. The Landlord argues, and the Debtor fails to dispute, that the 2008 Order was based solely upon the Debtor’s failure to cure the Collyer Conditions. Accordingly, Section 362(i) does not apply in this case. D. New York Law Permits the State Court to Vacate a Warrant of Eviction and Reinstate the Landlord-Tenant Relationship In New York, RPAPL § 749(3) governs the effect of a warrant issued pursuant to a judgment of possession. Section 749(3) provides as follows: 3. The issuing of a warrant for the removal of a tenant cancels the agreement under which the person removed held the premises, and annuls the relation of landlord and tenant, but nothing contained herein shall deprive the court of the power to vacate such warrant for good cause shown prior to the execution thereof Petitioner may recover by action any sum of money which was payable at the time when the special proceeding was commenced and the reasonable value of the use and occupation to the time when the warrant was issued, for any period of time with respect to which the agreement does not make any provision for payment of rent. N.Y. Real Prop. Act. & PROC. L. § 749(3)(McKinney 2008) (emphasis added). The issuance of a warrant of eviction severs the landlord-tenant relationship. But bankruptcy courts have long recognized a debtor’s possessory interest in property — assuming the warrant has not been executed and the debtor remains in possession — as an equitable interest under Bankruptcy Code § 541 eligible for protection under the automatic stay. 48th Street Steakhouse, Inc. v. Rockefeller Group, Inc. (In re 48th Street Steakhouse), 835 F.2d 427, 430 (2d Cir.1987) (“Indeed, a mere possessory interest in real property, without any accompanying legal interest, is sufficient to trigger the protection of the automatic stay.”). The automatic stay can protect this interest and prevent the execution of a warrant even after a warrant has been issued when state law may allow a debtor to cure the default before execution of the warrant. 11 U.S.C. § 362(2 )(2). But the debtor must return to the state court for relief if the debtor wants the landlord-tenant relationship reinstated; the bankruptcy court cannot reinstate the landlord-tenant relationship. See In re Marcano, 288 B.R. 324, 338 (Bankr. S.D.N.Y.2003) (“Notwithstanding the issuance of a warrant, the tenant still retains ‘an equitable interest in the property, and the potential to reinstate the landlord-tenant relationship.’ The ... state court retains the ability to vacate the warrant and order a tenant reinstated at least until actual execution of the warrant. In appropriate cases, bankruptcy courts have continued the automatic stay of 362 in order to give the tenant an opportunity to seek an order from the state court vacating a warrant of eviction.”) (citations omitted); In re Éclair Bakery Ltd., 255 B.R. at 133 n. 23 (“The filing of a bankruptcy petition does not resurrect a lease, and a bankruptcy court does not have the power to resurrect a lease which was terminated prior to the filing of a lessee’s bankruptcy petition.”); 332-4 West 47th Street Assoc., L.P. v. Muniz (In re Muniz), 1999 WL 182588, at *2 (S.D.N.Y.1999). This equitable interest in the property is eligible for protection under the automatic stay as long as vaca-tur of the judgment of possession is possible. Id.; see also In re W.A.S. Food Service Corp., 49 B.R. 969, 973 (Bankr.S.D.N.Y.1985) (“Because the debtor is currently in possession of the premises, the automatic stay prohibits an eviction. This court is empowered to continue that stay, if the circumstances so require, to give the debtor a reasonable opportunity to re-negotiate with the landlord or to seek a vacatur of the warrant of eviction.”) (citation omitted). A debtor may retain an equitable interest consisting of a right to reinstate the landlord-tenant relationship. See Éclair Bakery, 255 B.R. at 133-34 (explaining that such an interest is comparable to a redemption right); In re Reinhardt, 209 B.R. 183, 186-87 (Bankr.S.D.N.Y.1997) (finding that option to redeem the tenancy by payment in full constituted an interest of the estate protecta-ble under § 362(a)). Such an interest may arise if, for example, a court issues a warrant of eviction but stays its execution to permit the tenant to cure before eviction. See Éclair Bakery, 255 B.R. at 133-34. RPAPL Section 749(3), which permits a court to vacate a warrant for good cause shown, recognizes this right. Nothing in the 2005 amendments in BAPCPA alters recognition of this equitable interest as long as the debtor remains in possession and state law permits the state court to reinstate the landlord-tenant relationship. As stated in House Report No. 109-31, the addition made by BAPC-PA “does not provide any new right to either landlords or tenants relating to evictions or defenses to eviction under otherwise applicable law.” H.R.Rep. No. 109— 31, at 75, U.S.Code Cong. & Admin.News 2005, p. 143. Sections §§ 362(b)(22) and 362(2), however, provide additional protection to the landlord’s interests before a debtor can reinstate the automatic stay if the landlord obtained a prepetition judgment of possession. As explained above, a debtor can only reinstate the stay if the prepetition judgment of possession can be cured by the payment of money and the debtor strictly complies with § 362(l). That is not the case here. Therefore, the automatic stay cannot be reinstated in this case. E. Even if the Automatic Stay Could Be Reinstated, The Landlord Has Established Cause to Lift the Automatic Stay The Landlord argues that even if the automatic stay can be reinstated under Bankruptcy Code § 362(2), it should nevertheless be lifted for lack of adequate protection under § 362(d)(1). The prepetition issuance of a warrant may provide “cause” to terminate the automatic stay pursuant to § 362(d)(1). Section 362(d)(1) provides that a court may grant relief from the automatic stay for cause, including the lack of adequate protection of an interest in the property of the moving party. 11 U.S.C. § 362(d)(1). In re Éclair Bakery Ltd., 255 B.R. 121, is instructive. In Éclair Bakery, the landlord of the debtor, Éclair Bakery Ltd., had obtained three warrants of eviction against the bakery for rent nonpayment. In the course of three bankruptcy cases, the parties executed three stipulations to cure rent defaults. In each case, the bakery failed to cure and commenced a fresh chapter 11 case to prevent the landlord from executing the outstanding warrant. Interpreting RPAPL § 749(3), Judge Gerber found that the issuance of the warrants constituted cause to lift the stay. The key issue, Judge Gerber stated, was whether a good-faith basis to vacate a warrant was present. “Thus, where state court litigation under the escape valve provided under the second clause of RPAPL § 749(3) is pending, or the basis for good faith litigation is apparent ..., a continuation of stay protection, at least for a limited time, may be appropriate. By contrast, where state court litigation is not pending or in the cards, or where the debtor has failed to show any basis for a belief that the state court will grant relief, the prepet-ition termination of the landlord-tenant relationship will at least normally provide cause for relief from the stay.” Id. at 136. In this case, cause would exist to terminate the stay if it were reinstated under § 362(i )(1). Like the debtor bakery in Éclair Bakery, Debtor has failed to show grounds upon which the Civil Court would vacate the warrant of eviction. Debtor’s appeal of the 2007 Order has been dismissed. (See Lift-Stay Motion, Exhibit F, ECF Doc. No. 13). Despite the passage of more than nine months from the original 2007 Order to the 2008 hearing regarding the continuation of the Col-lyer Conditions, the state court held that Griggsby failed to comply with the 2007 Order, resulting in the entry of the 2008 Order. Griggsby failed to timely appeal the Civil Court’s 2008 Order permitting the landlord to execute the warrant based on Debtor’s failure to cure the Collyer Conditions. And rather than requesting the Civil Court to vacate the warrant before the scheduled February 23, 2009 eviction, Griggsby filed this chapter 13 case, with a bare-bones petition and no required schedules or supporting information. The Court is left with the firm conviction that this chapter 13 case was not filed in good faith, but rather for the purpose of thwarting the Landlord’s efforts to evict her. The Debtor cannot collaterally attack the state court judgment in this court. Éclair Bakery, 255 B.R. at 133 n. 23. If Griggsby wants relief from the impending eviction, she will have to seek it from the state court. Therefore, cause would exist to lift the automatic stay under § 362(d)(1) if the Court had not otherwise concluded that the stay cannot be reinstated on the record here under § 362(i). CONCLUSION For reasons explained above, § 362(i) does not apply in this case. In any event, cause exists to lift the automatic stay even if it were reinstated. Accordingly, at the hearing on April 2, 2009, the Landlord’s Objection to Debtor’s certification pursuant to § 862(0 was SUSTAINED and Landlord’s motion to lift the stay was GRANTED to permit the landlord to execute the warrant of eviction. The application to reinstate the automatic stay, filed on April 10, 2009, is DENIED. . The Debtor filed a bare-bones bankruptcy petition in this case. The Clerk’s Office entered a Deficiency Notice on February 23, 2009, setting a deadline for filing missing schedules and information by March 9, 2009. (ECF Doc. No. 4.) None of the missing schedules and information has been filed. The Chapter 13 Trustee has filed a motion to dismiss the chapter 13 case for failure to timely file schedules, a statement of financial affairs, payment advices, and a plan. (ECF Doc. No. 14.) The motion to dismiss is scheduled for presentment on April 23, 2009. . Under New York law, the term “Collyer condition,” alternately spelled "Collier condition,” or "Collier-like condition,” refers to an excessive accumulation of debris and clutter in a residential apartment that poses a safety, health, or fire hazard. See Zipper v. Haroldon Court Condominium, 39 A.D.3d 325, 835 N.Y.S.2d 43, 45 (1st Dep’t 2007) (defining a Collyer condition as a "dangerous clutter[ing] with furnishings, boxes, and debris”); Gazivoda v. Sherman, 29 A.D.3d 458, 816 N.Y.S.2d 417, 418 (1st Dep't 2006) (agreeing that a Collyer condition and nuisance existed in an apartment "cluttered with papers, refuse and/or rubbish”); 5th & 106th St. Associates LP v. Rodriguez, 2008 WL 4952451 at * 6 (N.Y.City Civ.Ct. Nov.20, 2008) (finding that accumulated clutter constituted a Collyer condition); 107-109 East 88th Street LLC v. Nowillo, 2005 WL 1668400 at *3 (N.Y.City Civ.Ct. June 24, 2005) (finding that papers and wires left on a stove created a fire-hazard Collyer condition). The presence of a Collyer condition may constitute a violation of the New York City Housing Maintenance Code and may give rise to civil and criminal liability if left uncured. See New York City, N.Y., Code § 27-2011 (2008) (owner's duty to clean interior shared space); § 27-2012 (owner's duty to clean interior of dwelling units); § 27-2115 (civil penalties); § 27-2118 (criminal penalties). .The court's thorough opinion details "the extreme and hazardous nuisance conditions pervading respondent’s apartment.” (See 2008 Order, Exh. G, Lift-Stay Motion, ECF Doc. No. 13.) Rejecting Griggsby’s contention that she complied with the earlier order to clean up the apartment, the court "holds to a moral certainty that petitioner [Landlord] proved respondent's [Griggsby's] noncompliance.” (See id.) . At least one commentator (and judge) has argued that the statutory safe harbor should not be available to permit cure of a prepetition non-monetary default. See Alan M. Ahart, The Inefficacy of the New Eviction Exceptions to the Automatic Stay, 30 Am. Bank. LJ. 125, 132 (Winter 2006) ("If the only default that led to the prepetition judgment for possession was a monetary default and the debtor timely cures this default under applicable nonbankruptcy law, the lessor cannot proceed with the eviction regardless whether the debtor is protected by the bankruptcy automatic stay.”) (emphasis in original). . As one commentator has recognized, § 362(m) may give rise to a contested matter regarding the extent of the property endangerment. See 5 Keith M. Lundin, Chapter 13 Bankruptcy § 431.1, at 431-10 ("New § 362(b)(23) and (m) are likely to produce some fascinating hearings in bankruptcy courts. It is not uncommon for landlords to believe that Chapter 13 debtors are not taking proper care of their apartments or rental homes.... [T]he debtor's denial and evidence of ‘remedial’ action will not be dull. Bankruptcy court findings that property is endangered or that illegal drug activity is present could be preclusive in subsequent state court litigation between the landlord and debtor.”). . It is clear from the record that the state court’s order authorizing execution of the warrant of eviction is based on Griggsby’s failure over a long period of time to cure the very serious Collyer Conditions. While the Court need not resolve the issue here, in a case in which a judgment of possession appears to be based on both monetary and non-monetary defaults but the materiality of each default is not clear from the record, or if the state court judgment was obtained by default, the bankruptcy court may be empowered to enjoin continuation of eviction proceedings under Bankruptcy Code § 105 to permit the debtor expeditiously to seek clarification from the state court of the basis for the judgment, as this may clarify the debtor's right to extend the stay under § 362(l), while preserving property of the estate until the state court rules. On the record here, no such clarification is needed. Because of the tight deadlines under § 362(l), the debtor must timely file the required certifications and make all of the required cure payments to retain the possibility of obtaining additional stay relief. As explained in Section D infra, the bankruptcy court cannot in any event reinstate the landlord-tenant relationship in New York once a warrant of eviction has issued — only the state court may do so. Thus, in cases in which the warrant of eviction has issued, stay relief from the bankruptcy court can only provide the debtor with a brief window to go back to state court, usually to request that the warrant of eviction be vacated. This Court’s experience has shown that the Civil Court in New York City is willing to consider providing such relief on conditions for good cause shown. . As explained above, because the warrant of eviction has not been executed in this case, the Landlord’s argument that the Debtor holds no property interest in the Apartment has no merit. At least as of the date of the hearing, the Debtor remained in possession of the Apartment, retaining an equitable interest and potentially being entitled to relief in state court under RPAPL § 749(3), even though she cannot reinstate the automatic stay under Bankruptcy Code § 362(Z). . Often times, issues about curing monetary and non-monetary defaults, even if a prepetition judgment of possession has been obtained, are resolved by consent through conditional orders. But if a debtor is unable to reach agreement with a landlord involving a non-monetary default, the debtor’s remedy must be sought in the state court that entered the prepetition judgment of possession. If a warrant of eviction has not been executed, relief may be available from the state court for good cause shown under RPAPL § 749(3). . The New York City Civil Court Act governs appeals to the Appellate Terms of the Supreme Court. See N.Y.C.P.L.R. § 5702 (McKinney 2009). Section 1703 of the Act incorporates Article 55 of the New York Civil Practice Laws and Rules ("CPLR”). See N.Y. City Civ. Courts Act § 1703 (McKinney 2009). In turn, Section 5513 of the CPLR provides that an appeal as of right must be taken within thirty days after the appealing party receives service of a copy of the judgment or order and written notice of its entry. N.Y.C.P.L.R. § 5513. In this case, a Notice of Entry of the 2008 Order was apparently mailed to the Debtor on October 29, 2008, a little more than five months to date. (See Exh. G, Lift-Stay Motion, ECF Doc. No. 13.)
CASELAW
Financial Sector Update for 03/02/2022: BTRS,CDLX,PSFE,SOFI Financial stocks pared a portion of the prior gains in late Wednesday trade, with the NYSE Financial Index rising 2.1% this afternoon and the SPDR Financial Select Sector ETF (XLF) ahead 2.9%. The Philadelphia Housing Index also was climbing 2.6% and the SPDR Real Estate Select Sector ETF (XLRE) was up 2.1%. Bitcoin turned 0.2% lower, falling to $43,755, while the yield for 10-year US Treasuries was surging 15.8 basis points to 1.865%. In company news, BTRS Holdings (BTRS) climbed over 15% after the business payments and billings processor overnight reported a 15.4% increase in net revenue for its Q4 ended Dec. 31, rising to $34.1 million from $29.6 million during the year-ago period and beating Wall Street expectations looking for $33.1 million in Q4 net revenue, according to Capital IQ. Cardlytics (CDLX) rose 15% after the digital advertising platform for banks reported a non-GAAP Q4 net loss of $0.15 per share compared with $0.05 per share adjusted loss during the final three months of 2020 and beating the Capital IQ consensus expecting a $0.36 per share loss for the three months ended Dec. 31. Revenue increased 34.2% year-over-year to $90.0 million, also exceeding the $76.6 million Street view. Paysafe (PSFE) was hanging on a 4.2% advance after the digital payments processor Wednesday reported a 0.4% increase in Q4 revenue over the same quarter in 2020, rising to $371.7 million and exceeding the $357.4 million analysts mean. SoFi Technologies (SOFI) also gained 4.2% after the lender reported a Q4 net loss of $0.15 per share, improving on a $1.85 per share loss during the final three months of 2020 and beating the Capital IQ consensus expecting a $0.16 per share loss. Revenue increased 66.5% over year-ago levels to $285.6 million during the three months ended Dec. 31, also exceeding the $279.5 million analysts' mean. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE