Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Talk:International Imaging Industry Association Only Sourcing Issue The only sourcing in this article links to a page (https://www.loc.gov/preservation/digital/formats/fdd/fdd000241.shtml) that seemingly does not have anything to do with the statement being cited. If anyone can look as well, I don't want to remove it before verifying. Sophia (θ pr′me) 19:51, 28 November 2022 (UTC)
WIKI
軽い Etymology From, in turn from. In Old Japanese, seldom used outside of proper nouns, where in the ' it is spelled as 加流 and in the ' it is spelled as 軽, suggesting that this word was already used in Old Japanese with the meaning "light, lightweight". This might be weakly strengthened by a kana annotation of 軽 as karu(ku) in the . It is generally believed that karu(si) was the older form; this is also supported by Ryukyuan cognates (see ). In the and, the variant → has started to be in use, while → has still seldom usage. Later, both karosi and karusi began to be used in parallel. Then, in Early Modern Japanese, karui slowly began to replace karoi. Adjective * 1) light, lightweight * 2) slight, light, mild * 3) easy * 4) talkative * 1) easy * 2) talkative * 1) talkative * 1) talkative
WIKI
UK's first CO2 storage round attracts bids from 19 companies Adds Equinor, Neptune Energy LONDON, Sept 22 (Reuters) - A total of 19 companies applied to develop carbon dioxide (CO2) storages off Britain in the country's first such licensing round, the North Sea Transition Authority (NSTA) said on Thursday. Britain aims to use CCS technology, which involves filtering planet-warming carbon from industrial smokestacks before it hits the atmosphere and storing it underground, to hold 20 million to 30 million tonnes of CO2 by 2030. "The level of interest already expressed suggests there will be strong competition, meaning that prospective licensees will need to produce high-quality bids to win licences," the NSTA said. It didn't name the bidders, but Italy's Eni ENI.MI said on Wednesday it had applied to store CO2 at the depleted Hewett gas field. A spokesperson for Equinor EQNR.OL said the Norwegian oil and gas firm had applied together with BP BP.L. Independent oil and gas producer Neptune Energy, which aims to store more carbon by 2030 than it emits, has also applied. The NSTA offered 13 areas, consisting of a mix of depleted oil and gas fields and porous rock formations containing seawater. These come on top of six licences granted under a pilot scheme. While CCS can help carbon-heavy industries cut their emissions, it is yet to be deployed on a large scale anywhere in the world. NSTA estimates as many as 100 CO2 stores could be required in order for Britain to meet its net zero emissions target by 2050 target. Britain's greenhouse gas emissions stood around 425 million tonnes of CO2 equivalent last year, according to government data. Applications closed on Sept. 13, with awards expected to be made early next year, and the first injection of CO2 coming in four-to-six, NSTA said. (Reporting by Nina Chestney Additional reporting by Nerijus Adomaitis in Oslo; Editing by Mark Potter and Emelia Sithole-Matarise) ((nerijus.adomaitis@thomsonreuters.com; +47 9027 6699; Reuters Messaging: nerijus.adomaitis.thomsonreuters@reuters.net)) The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Here Are the 3 Best Warren Buffett Stocks to Buy in December Lots of holiday movies have already begun showing up on broadcast and streaming TV, with more to come. My personal favorite is Christmas Vacation. The lines from Cousin Eddie (played by Randy Quaid) are classic. One especially comes to mind: "Clark, that's the gift that keeps on giving the whole year." Cousin Eddie was referring to a one-year membership to the Jelly of the Month club. However, I think there are even better gifts that keep on giving the whole year for investors to consider as 2023 comes to a close. And you can find them listed among Warren Buffett's Berkshire Hathaway (NYSE: BRK.A)(NYSE: BRK.B) holdings. Here are my picks for the three best Buffett stocks to buy in December. 1. Amazon Buffett (or more likely, one of his two investment managers) reduced Berkshire's stake in Amazon (NASDAQ: AMZN) during the third quarter of 2023. I think, though, that Amazon remains a wonderful stock to buy this month. The company is arguably more focused on generating stronger profits and free cash flow than it's ever been. And that focus is paying off. The company's earnings more than tripled year over year in Q3. Its trailing-12-month free cash flow rose to $21.4 billion from an outflow of $19.7 billion in the prior-year period. I expect that artificial intelligence (AI) will continue to provide a major tailwind for Amazon in the coming years. In particular, Amazon Web Services (AWS) will likely attract additional business from the generative AI boom. Amazon hasn't stopped expanding into new markets, either. Earlier this year, it launched its Supply Chain by Amazon service that leverages its own unsurpassed internal supply chain capabilities. It also recently announced plans to begin selling cars online in 2024. 2. Bank of America There's a good case to be made that Bank of America (NYSE: BAC) is one of Buffett's favorite stocks. It wouldn't rank as the second-largest holding in Berkshire Hathaway's portfolio if it wasn't. Buffett no doubt likes Bank of America primarily because of its excellent underlying business. The company's balance sheet remains strong and revenue and profits are growing. Others also continue to recognize BofA's business leadership. It has received accolades, including being named the Best Bank in North America and the World's Most Innovative Bank in 2023 by Global Finance. I like Bank of America's business, but I especially like its current valuation. Shares currently trade at a forward earnings multiple of under 9x. And the company's price-to-book ratio is only 0.9x. We can't leave out Bank of America's dividend. The big bank's dividend yield stands at nearly 3.2%. BofA has also increased its dividend payout for 10 consecutive years. 3. Mastercard Mastercard (NYSE: MA) is one of the stocks in Berkshire Hathaway's portfolio that Buffett doesn't talk about very much. However, it's been a huge winner for the Oracle of Omaha, delivering a total return of more than 1,600% since Berkshire initiated a position in the first quarter of 2011. Those winning ways have continued into 2023. Mastercard stock is up nearly 20%. The company reported year-over-year revenue growth of 14% in Q3, with earnings soaring 28%. What I like most about Mastercard is its strong business moat. I really should use the plural form of the word, because the company enjoys multiple moats, including its well-known brand and switching costs associated with moving to rival payment-processing networks. Mastercard should be able to keep the momentum going over the long run. The shift from cash to digital payments will continue, and e-commerce will grow. The middle classes in emerging markets will also expand. This Buffett stock is a gift that should, to paraphrase Cousin Eddie, keep on giving during the whole decade and beyond. 10 stocks we like better than Mastercard When our analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* They just revealed what they believe are the ten best stocks for investors to buy right now... and Mastercard wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of November 29, 2023 John Mackey, former CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool's board of directors. Bank of America is an advertising partner of The Ascent, a Motley Fool company. Keith Speights has positions in Amazon, Bank of America, Berkshire Hathaway, and Mastercard. The Motley Fool has positions in and recommends Amazon, Bank of America, Berkshire Hathaway, and Mastercard. The Motley Fool recommends the following options: long January 2025 $370 calls on Mastercard and short January 2025 $380 calls on Mastercard. The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Berntson Berntson is a surname. Notable people with the surname include: * Eric Berntson (1941–2018), Canadian politician * Gary Berntson (born 1945), American professor of psychology * Sofia Berntson (born 1979), Swedish singer
WIKI
Solved Msgbox in VB Posted on 2004-09-24 10 1,504 Views Last Modified: 2008-03-17 1. How to close msgbox when user clicks "cancel" button? 2. How to convert text entered in textbox automatically converted to uppercase when the user leaves the textbox? Suppose types "john" in the textbox (text1.text) the display must be "JOHN" 3. I want to have a pop-up a msgbox when user enters less or more than 8 characters in the textbox, asking him to enter text 8 character long? Thanks very much 0 Comment Question by:Vasi04 • 2 • 2 • 2 • +3 10 Comments   LVL 8 Assisted Solution by:mladenovicz mladenovicz earned 150 total points ID: 12141077 1. it will be closed it self 2.3. Private Sub Text1_Validate(Cancel As Boolean)     Text1.Text = UCase(Text1.Text)     If Len(Text1.Text) <> 8 Then         MsgBox "invalid length. must be 8"         Cancel = True     End If End Sub 0   LVL 4 Accepted Solution by: Gruff82 earned 200 total points ID: 12141121 Hi Vasi04 What I would do is add the lost focus event handler for the textbox, so it get's called every time the user moves away from the text box. I would then cause the text to become upercase and validate the length. If it isn't 8 charachters return the user to the text box to re-enter. Here is the code: ' Event Handler gets called as user moves away Private Sub Text1_LostFocus()         ' make the text uppercase     Text1.Text = UCase$(Text1.Text)     ' Test the length to see if it is 8 charachters (trim off any trailing spaces)     If Len(trim$(Text1.Text)) <> 8 Then                 ' Fails validation so select from the start to the end of text in text box and return focus         MsgBox "You must enter 8 charachters", vbInformation + vbOKOnly         Text1.SelStart = 0         Text1.SelLength = Len(Text1.Text)         Text1.SetFocus     End If     End Sub Hope this helps 0   LVL 3 Assisted Solution by:sgayatri sgayatri earned 25 total points ID: 12141179 What do yu mean by saying 'close msgbox when click cancel' Clicking any button whether ok or cancel (or whatever way you display a msgbox ) will close yur msgbox You can use the button information after a click. ex: vbinfo = MsgBox("Click any button", vbYesNoCancel, "Message") If vbinfo = vbYes Then   MsgBox "Yes" '  do something Else   If vbinfo = vbNo Then      MsgBox "No"     'do something more   Else     MsgBox "Cancel"    'do something else   End If End If  For the remaining questions, the above two answers will suffice. 0   LVL 10 Assisted Solution by:fds_fatboy fds_fatboy earned 25 total points ID: 12141211 Gruff82: Validation on LostFocus gives problems. The Lostfocus event in general gives problems because it goes off after the next control has got focus and in certain circumstances, doesn't go off at all should only be used in moderation: For an example, try this: Create a new standard VB project with a single form. Add the following 2 textboxes, Text1 and Text2; add a command button Command1. Add the following code and run it. The When ti runs immediatey tab away from Text1 making it fail validation and see the results... Option Explicit Private Sub Command1_Click()     Unload Me End Sub Private Sub Form_Load()     Text1.Text = "Arry"     Text2.Text = "Bert" End Sub Private Sub Text1_LostFocus()     If Len(Text1.Text) < 8 Then         MsgBox ("Text1 less than 8 characters")     End If     Text1.SetFocus End Sub Private Sub Text2_LostFocus()     If Len(Text2.Text) < 8 Then         MsgBox ("Text2 less than 8 characters")     End If     Text2.SetFocus End Sub 0   LVL 10 Expert Comment by:fds_fatboy ID: 12141236 Also, another point about not using LostFocus event for validation is - your user can avoid validating a field simply by not visiting it. Using my previous example, run the program. Change the contents of Text1 to Arry1234 (valid - 8 characters) and click on the button. Hooray, passed validation - but the contents of Text2 are invalid. 0 Is Your Active Directory as Secure as You Think? More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.   LVL 4 Expert Comment by:Gruff82 ID: 12141269 Your right about the lost focus event, probably best to use the validate event handler with cancel = true to force the field to be valid before moving on to the next one. My mistake - thankfully its friday 0   LVL 18 Assisted Solution by:JR2003 JR2003 earned 100 total points ID: 12141300 Use these functions in a module and call them with the textbox as a paramewter on the form load. e.g to call it in the form load TextBoxNumericOnly Text1 Private Declare Function SetWindowLong Lib "user32" Alias "SetWindowLongA" (ByVal hwnd As Long, ByVal nIndex As Long, ByVal dwNewLong As Long) As Long Private Const ES_NUMBER = &H2000& Private Const ES_UPPERCASE = &H8& Private Const ES_LOWERCASE = &H10& Private Const GWL_STYLE = (-16) 'Makes TextBox only receive numerics Public Function TextBoxNumericOnly(TextBox As TextBox) As Boolean     Dim iTmp As Long     iTmp = SetWindowLong(TextBox.hwnd, GWL_STYLE, GetWindowLong(TextBox.hwnd, GWL_STYLE) Or ES_NUMBER) End Function 'Makes TextBox only receive uppercase letters Public Function TextBoxUpperCaseOnly(TextBox As TextBox) As Boolean     Dim iTmp As Long     iTmp = SetWindowLong(TextBox.hwnd, GWL_STYLE, GetWindowLong(TextBox.hwnd, GWL_STYLE) Or ES_UPPERCASE) End Function 'Makes TextBox only receive Lowercase letters Public Function TextBoxLowerCaseOnly(TextBox As TextBox) As Boolean     Dim iTmp As Long     iTmp = SetWindowLong(TextBox.hwnd, GWL_STYLE, GetWindowLong(TextBox.hwnd, GWL_STYLE) Or ES_LOWERCASE) End Function 0   Author Comment by:Vasi04 ID: 12141725 I have used codes from gruff82 and mladenovicz Thanks all for your support. I tried to use code from JR2003 for UPPERCASE. I could not get it compiled. If you could explain how to incorporate this, it would be great! Thanks all 0   LVL 8 Expert Comment by:mladenovicz ID: 12141752 I think you need this line too for JR2003 code Declare Function GetWindowLong Lib "user32" Alias "GetWindowLongA" (ByVal hwnd As Long, ByVal nIndex As Long) As Long 0   LVL 18 Expert Comment by:JR2003 ID: 12142009 Vasi04 Looks like you need the GetWindowLong as mladenovicz pointed out (thanks mladenovicz) JR 0 Featured Post Is Your Active Directory as Secure as You Think? More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more. Question has a verified solution. If you are experiencing a similar issue, please ask a related question Background What I'm presenting in this article is the result of 2 conditions in my work area: We have a SQL Server production environment but no development or test environment; andWe have an MS Access front end using tables in SQL Server but we a… This article describes some techniques which will make your VBA or Visual Basic Classic code easier to understand and maintain, whether by you, your replacement, or another Experts-Exchange expert. Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a… This lesson covers basic error handling code in Microsoft Excel using VBA. This is the first lesson in a 3-part series that uses code to loop through an Excel spreadsheet in VBA and then fix errors, taking advantage of error handling code. This l… 948 members asked questions and received personalized solutions in the past 7 days. Join the community of 500,000 technology professionals and ask your questions. Join & Ask a Question Need Help in Real-Time? Connect with top rated Experts 20 Experts available now in Live! Get 1:1 Help Now
ESSENTIALAI-STEM
Page:Idalia, by 'Ouida'.djvu/331 Rh have thought that he had nothing on earth which could give him the right ever to hope for her tenderness. But hope is always strong in tis till despair is forced on us, however little we may know that hope's existence; and thought was the last thing that was shaped in him—thought never grouped itself before him; he was still in the opium-dream: neither future nor past existed for him; he was drunk with his present; his love blinded him to any other memory than itself. It was too wholly in its early freshness for it to forecast its fate. His eyes eagerly swept over the building as he rode up the avenue; the lattices were all closed; this was usual in the noon, yet it gave him a vague disquietude and dread. The echo of his step resounded on the marble, as it had done when he had forced his entrance into what he had believed the lair of his assassin: it was the only sound, and the stillness froze his heart like ice; the rolling bay of the hound had never before failed to challenge his arrival. The first court was deserted; in the second he saw the Abyssinian. "The Countess Vassalis?" he asked, rapidly. "Is not here," answered the negress.
WIKI
@article {3387, title = {Dimethyl 4b,8b,8c,8d-tetrahydro-dibenzo[a,f]cyclopropa[cd]pentalene-8b-carboxylat e-8c-thionocarboxylate and the corresponding 8c-thiolocarboxylate}, journal = {Acta Crystallographica Section C-Crystal Structure Communications}, volume = {51}, year = {1995}, note = {ISI Document Delivery No.: TT225Times Cited: 2Cited Reference Count: 6Part 12}, month = {Dec}, pages = {2691-2694}, type = {Article}, abstract = {The title compounds, methyl 8c-[methoxy(thiocarbonyl)]-4b,8b,8c,8d-tetrahydrodibenzo [a,f]cyclo-propa [cd] pentalene-8b-carboxylate, C20H16O3S, and methyl 8c-[(methylthio)]carbonyl-4b,8b,8c,8d-tetrahydrodibenzo [a,f]cyclopropa[cd]pentalene-8b-carboxylate, C20H16O3S, are the photoproducts in the photolysis of the dibenzobarrelene thiono and thiolo esters, The geometry and dimensions of the molecules are similar to those of related materials. Only one photoproduct (of two possible) is formed in each case, with initial vinyl-benzo bond formation involving the vinyl C atom carrying the non-thioester group; intermediate biradicals are stabilized by resonance interaction with the thioester groups.}, isbn = {0108-2701}, url = {://A1995TT22500094}, author = {Jones, R. and Rattray, A. G. M. and Scheffer, J. R. and Trotter, J.} }
ESSENTIALAI-STEM
Talk:Black rice Name The article currently says the name comes from its being forbidden. That may be, but since the rice looks black, it seems more likely that the name comes from the color of the rice. The source for the forbidden claim is a pop culture article, not a scholarly article.<IP_ADDRESS> (talk) 01:34, 23 August 2014 (UTC) * Using google translate, I could not find anything about the name in the chinese wik article on black rice (黒 + 米 : black + rice}. Maybe the claim that black rice was so named because of its being rare/forbidden comes from the information in this CNN article: http://edition.cnn.com/2010/HEALTH/08/26/black.rice.new.brown/. Our article also starts off talking about china (but ignoring Indonesia) BUT Suddenly jumps to Manipur without making any sort of transition. A good -- but costly -- source is http://www.qyresearch.com/english/goods.php?id=4387. For possible health benefits, there is the article "Black rice (Oryza sativa L.) extract attenuates hepatic steatosis in C57BL/6 J mice fed a high-fat diet via fatty acid oxidation" at http://www.nutritionandmetabolism.com/content/9/1/27. The article is by researchers in Korea, where black rice is fairly common as a somewhat expensive admixture to white rice and is also used in making sticky rice cakes (though the black rice is not sticky). <IP_ADDRESS> (talk) 02:06, 23 August 2014 (UTC) This supposed origin for the term Forbidden Rice® is even less documentable than the old story that Marco Polo brought spaghetti back from China. That story is well known to be a recent fiction created by a US trade association. The very fact that Lotus Foods claims Forbidden Rice® as a registered trademark suggests they made the name up. I agree that if the name does exist in China it more likely refers to the color than to an actual prohibition on others than the Emperor eating it. But I doubt it exists there. Colin McLarty (talk) 20:16, 21 September 2014 (UTC) In fact "purple rice" (紫米饭) does exist on Baidu and other Chinese web sites. All I find are recipes for this specialty rice, no reference to any prohibition ever existing, and no association with Emperors. Colin McLarty (talk) 22:39, 21 September 2014 (UTC) * The whole forbidden rice thing is pure advertising with a self-created myth. It should be removed. - Takeaway (talk) 22:47, 21 September 2014 (UTC) * I asked one of my Chinese friends to do a quick search for this so-called household name in China and his conclusion was that it's only a marketing name that has been created, including the myth, by Lotus Foods. That this marketing myth is repeated by Western journalists does not support the assertion that it's a type of rice that is exclusively reserved for the former Chinese imperial household. I will (again) remove it. Only if Lotus Food comes up with a reliable Chinese source that supports this name, can it be included. - Takeaway (talk) 15:34, 22 September 2014 (UTC) Whether a myth or not, the name "forbidden rice" has caught on and is now a common name for black rice. I've seen it in numerous menus, recipes and news articles. Just google it to confirm. Regardless of the accuracy of the source, it has still become a popular name for black rice. People like sexy names and sometimes they stick and become generic whether the trademark owner likes it or not: kleenex, bandaid, aspirin, yo-yo, rollerblade, frisbee, escalator, heroin, thermos, teflon, etc. For more see https://en.wikipedia.org/wiki/List_of_generic_and_genericized_trademarks. Trademark owners can publish advertisements encouraging their preferred use but cannot stop people from using the term generically.Timoey (talk) 23:53, 20 September 2015 (UTC) Also, if you want citations of generic use in scholarly documents, check out the 9 pages of hits from the following Google Scholar search: https://scholar.google.com/scholar?start=10&q=%22forbidden+rice%22&hl=en&as_sdt=0,5 -- just scan the cited passages to see the use. Some reference a trademark but most are just generic. Timoey (talk) 00:01, 21 September 2015 (UTC) * In fact trademark owners can, and often do, require people to note their term is a registered trademark, unless a court rules that the owner has already lost control of the term. See https://en.wikipedia.org/wiki/Trademark#Enforcing_rights for discussion. They do this precisely to prevent losing control of the name the way kleenex, bandaid, aspirin were all lost to their one-time owners. If the term Forbidden Rice® is to be used, it should have the registration mark. On the other hand, the really important point to me is that the silly advertising story about emperors banning the rice to others should not be given as any even slightly possible origin for the term. Colin McLarty (talk) 13:52, 21 September 2015 (UTC) * Regarding "require", this is not true in this situation. See http://www.freecycleforever.org/history and the 2007 ruling by the Ninth District Court of appeals. Trademark owners cannot REQUIRE people in normal speech (such as on wikipedia, blogs, media, etc) to use a term only with a TM or registration mark. That trademark owners can require people to only use their term as a trademark rather than as a regular word or phrase in non-commercial speech is, unfortunately, a very common misconception. Of course since trademark owners benefit from this, most are glad to perpetuate this misconception.Timoey (talk) 06:46, 22 September 2015 (UTC) * The 2007 ruling you cite explains clearly that the reason the original FreecycleSunnyvale group cannot require people to respect "freecycle" as a trademark is that FreecycleSunnyvale themselves had previously encouraged generic use of the term. The ruling takes for granted, what was never in question, that a trademark owner can require respect of a trademark -- if it is a trademark! An owner can also lose control of a trademark against their will, if the word is very widely used as generic. Maybe a court today would find that has already happened to Forbidden Rice®. But I do not believe Wikipedia is the place to pioneer that claim. Colin McLarty (talk) 15:32, 22 September 2015 (UTC) * Read the ruling again, the 2007 ruling was not because FreecycleSunnyvale had previously encouraged generic use of the term, the Ninth Circuit ruling was based on the law covering trademark use and stated that trademark owners cannot require correct use of the term in normal speech regardless. Separately, trademark owners can request and they can buy ads to persuade, but they cannot require conformance (outside of the limited situations of commercial speech where trademark law applies -- such as labeling a commercial product). If the term is used as normal speech, as is the case with forbidden rice of which you'll find plenty of examples by googling it, it is not for Wikipedia to limit the use of terms people do (or wish to) use as plain speech. It is fine to make a note that a Forbidden Rice® trademark exists but not to force people to only use the trademark term and not the free speech term when the term is in common use. This is an extremely important concept to get right, especially for wikipedia. Jimmy Wales was even a signatory to one of the key amicus briefs which made this point (see https://docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnxmcmVlY3ljbGluZ2ZvcmV2ZXJ8Z3g6NWI2Y2JkZjMxZWMzYzk3Zg). If you need to, please run this up the flag pole and consult your legal counsel. I am not a lawyer myself but have been through a lot to understand this situation and believe I have got it right in this case.Timoey (talk) 06:27, 23 September 2015 (UTC) This is the source for the Forbidden Rice claim that everyone is referencing, often indirectly: http://www.flavorandfortune.com/ffdataaccess/article.php?ID=475 <IP_ADDRESS> (talk) 19:39, 18 August 2021 (UTC) Not to be confused with Black ice. Seriously? Mendeley (talk) 01:05, 27 June 2017 (UTC) * Removed. — Paleo Neonate – 13:42, 14 November 2017 (UTC) Black rice Black rice 2603:6080:7D04:1D93:88E5:F9B5:5101:25F0 (talk) 21:41, 22 November 2021 (UTC) Wiki Education assignment: Research Process and Methodology - SP23 - Sect 201 - Thu — Assignment last updated by Savannah yhzzz (talk) 19:00, 18 April 2023 (UTC)
WIKI
Buchanan, Iowa Buchanan is an unincorporated community in Cedar County, Iowa, United States. History It was named for Alexander Buchanan, a farmer who owned land near the original town site. Alexander Buchanan was born in Cedar County in 1841. Buchanan's population was 27 in 1902, and 61 in 1925. The population was 50 in 1940.
WIKI
Home>English homework help>Assignment 8 Assignment #8: Questions on Kafka’s The Metamorphosis 1) What was Gregor’s occupation before his transformation? How did he come to his particular job? What kept him from working for his firm? 2) When Gregor wakes to discover he has become a gigantic insect, he is mostly intent on the practical implications of his metamorphosis – how to get out of bed, how to get to his job, and so on. He never wonders why or how he has been changed. What does this odd reaction suggest about Gregor? 3) When Gregor’s parents first see the gigantic insect (paragraph 25), do they recognize it as their son? What do their initial reactions suggest about their attitude toward their son? 4) How does each family member react to Gregor after his transformation? How do their reactions differ from one another? What do they have in common? 5) What things about Gregor have been changed? What seems to have remained the same? List specific qualities. 6) The Metamorphosis takes place almost entirely in the Samsa apartment. How does the story’s setting shape its themes? 7) Which family member first decides that the family must ‘get rid’ of the insect? What rationale is given? In what specific ways does the family’s decision affect Gregor? 8) How does the family react to Gregor’s death? 9) Does Grete change in the course of the story? If so, how? The post What things about Gregor have been changed? What seems to have remained the same? List specific qualities. first appeared on Assignment writing service.
FINEWEB-EDU
Ein echter Wiener geht nicht unter Ein echter Wiener geht nicht unter (German; lit. 'A real Viennese does not go under'. Free translation: A real/proud Viennese never gives up) is a classic Austrian television series. It was produced by Österreichischer Rundfunk, Austrian Television, and ran for 24 episodes from 1975 to 1979. The script writer was Ernst Hinterberger; the series was based on his 1966 novel Das Salz der Erde (The Salt of the Earth). The producer was Hans Preiner, who initiated the project in his series Impulse (Impulses), which centered on development of new program formats and training of new, young directors. Ein echter Wiener geht nicht unter starred popular Austrian actor Karl Merkatz as the main character, Edmund "Mundl" Sackbauer. Mundl lives in a typical Vienna Gemeindebau (a working-class housing estate) at Hasengasse, in Vienna's 10th municipal district (Favoriten). The series used Viennese dialect and became successful after an initial campaign against it by the Krone newspaper as too "common." Movies In 1994 two episodes, Stille Nacht and Jahreswende, were combined into a movie that had success in theaters and was also available on VHS. On December 19, 2008, the movie Echte Wiener - Die Sackbauer-Saga ("Real Viennese - The Sackbauer Saga"), set 30 years after the last episode of the TV series, opened in Austria. It was directed by Kurt Ockermüller and scripted by Ernst Hinterberger, and Karl Merkatz again played Mundl. The sequel Echte Wiener II - Die Deppat'n und die Gspritzt'n is planned to open in December 2010. Edmund "Mundl" Sackbauer Edmund Sackbauer is the main character of the series. In the first 13 episodes he is shown as very tyrannical and angry. After a big quarrel with his wife and a serious accident at work, he changes, and the program lost something of its joke because Mundl's "fits" were really amusing. Antonia Sackbauer Antonia ("Toni") Sackbauer is Edmund Sackbauer's wife. Although a woman of few words, she generally has the last word and unlike her husband, always makes rational decisions. She is a housewife, but because of money problems gets a job as a janitor in a drugstore. She is warm and generous and a confidante to many of her friends and acquaintances. In the course of the series we learn that the super, Kurt Blahovec, once thought about marrying her. Karl Sackbauer Karl ("Karli") is the Sackbauers' older child and takes after his father: like Mundl he likes drinking beer, shouts a lot, and uses a lot of obscenities that sometimes get him in trouble. Very early in the series he marries Irma Werner and by the end they have two children, René and Petra. He fights a lot with his sister and is extremely disrespectful to his parents. He drives a forklift but a promotion to supervisor enables him to afford his own apartment. In the book on which the series is based, he turned his back on Vienna and went to Paris, where he did well as a wrestler; this had to be changed after the slightly built Klaus Rott was cast in the part, and also there was no money for filming out of the country. Rott had a cabaret act as Karli in which he continued the story of the Sackbauers. Johanna Sackbauer "Hanni" is the Sackbauers' younger child and in the first episode becomes engaged to an avant garde writer, Franz Vejvoda, leading to big problems in the family. She is often envious and takes offense easily. Starting with the episode Jahreswende she is preoccupied with women's liberation, which also causes problems in her male-dominated family. To keep up with her fiancé she takes college courses in literature and typing. Johann Sackbauer Mundl's brother, known as "Schani," is sympathetic to the family and often talks Mundl down from his rages.
WIKI
Mongodb java tutorial LEARNOVITA MongoDB and Node.js Tutorial | Create Database Last updated on 11th Aug 2022, Blog, Tutorials About author Jesica Parveen (Full Stack Developer ) Jesica Parveen has 8+ years of full-stack developer expertise in HTML, CSS, JavaScript, jQuery, CSS, SEO, facing UI, and back. He has skills in Servlet and JSP development, CSS, JavaScript, HTML, AJAX, jQuery, EXTJS, OSGi/FELIX, CMS development experience, Java Content Repository (JCR), and Eclipse IDE. (5.0) | 18739 Ratings 2164 MongoDB : MongoDB offers basic and advanced concepts of SQL.MongoDB is designed for beginners and professionals.MongoDB is a Nosql database.It’s a C++ document-oriented open-source database.Insert, update, delete, query, sort, limit, create collection, drop collection, etc. What is MongoDB: MongoDB is associate degree ASCII text file document info that gives high performance, high handiness, and automatic scaling.MongoDB is a document-oriented database.It’s a 10gen open source product.It is available under General Public license for free, and it is available under Commercial license from the manufacturer.The manufacturing company 10gen has explained MongoDB as:”MongoDB could be a scalable , open supply, high performance, document-oriented info.” – 10genMongoDB was designed to figure with goods servers.MongoDB uses commodity servers.It is used by companies of all sizes, across all the industries. History of MongoDB: • The initial development of MongoDB began in 2007 once the corporate was building a platform as a service almost like window azure. • MongoDB was developed by a NewYork based company named 10gen which is now known as MongoDB Inc. • Initially a PAAS (Platform as a Service). • Later in 2009, it was introduced in the market as an open source database server that was managed and supported by MongoDB Inc. • The first prepared production of MongoDB has been thought-about from version one.4 that was free in March 2010. All modern applications need big data, quick features development, flexible deployment, and the older database systems are not competent enough, so MongoDB was needed. The main purpose of building MongoDB is: • Scalability • Performance • High Availability • Scaling from single server deployments to Large, complicated multi-site architectures. • Key points of MongoDB • Develop Faster • Deploy Easier • Scale Bigger MongoDB Java: • MongoDB Java Driver Download • Creating MongoDB Java Connection • Connection to MongoDB Database • MongoDB and Collections Features of MongoDB: These are important features of MongoDB: 1. 1. Support ad hoc queries: In MongoDB, can search by field, range query and it also encourages regular expression searches. 2. 2. Indexing: All of a document’s fields may be indexed using indexing. 3. 3. Replication: MongoDB supports the Master Slave replication.One can read and write to a master, but only read and back up data can be done on a slave (not for writes) 4. 4. Duplication of data: MongoDB can run over multiple servers. Data duplication ensures continued service and data integrity in the event of hardware failure. 5. 5. Load balancing: It has an automatic load balancing configuration because of information placed in shards. 6. 6. Encourage map reduce and aggregation tools. 7. 7. Uses JavaScript instead of the Procedures. 8. 8. It is a schema-less database written in the C++. 9. 9. Provides more performance. 10. 10. Save files of any size simply without complicating the stack. 11. 11. simple to administer in the case of failures. 12. 12. It also supports: JSON data model with the dynamic schemasAuto-sharding for the horizontal scalabilityBuilding replication for more availability How many companies are using MongoDB to create new types of applications, high performance and availability. What is MongoDB Components of MongoDB: The important components of MongoDB are: id: This field represents an individual field in MongoDB. This field is created by default. Collection: It is a set of MongoDB documents. It exists with one database. Database: This is the container for collections. Multiple databases can be saved in a mongoDB server. Document: A record in mongoDB is called a document. It consists of names and values. Field: It is a name-value pair in the document. Terminologies: Understanding concepts in MongoDB becomes simpler if you can compare them to relational database structures.The analogies between Mongo and the traditional MySQL system: • Table in MySQL becomes the Collection in Mongo • Row becomes the Document • Column becomes the Field • Joins are explained as linking and embedded documents • This is an easy way to look at the MongoDB core concepts of course, but nevertheless useful. Connecting to a Database: It is interesting , we don’t need to create one. When Mongo sees that database not exist, it will create it for us: • DB database = mongoClient.getDB(“myMongoDb”); • Sometimes, by default, MongoDB runs in authenticated mode. • In that case, we need to authenticate while connecting to the database. • can do it as presented below: • MongoClient mongoClient = new MongoClient(); • DB database = mongoClient.getDB(“myMongoDb”); • boolean auth = database.authenticate(“username”, “pwd”.toCharArray()); Establishing connections to database: For making the connection, to mention the database name. MongoDB creates a database by default if no name is mentioned: 1. 1. Firstly, import the required libraries for establishing a connection. 2. 2. Here, “MongoClient” is used to make the client for the database. 3. 3. “MongoCredential” is used for making the credentials. 4. 4. And finally, to access the database “MongoDatabase” is used. 5. 5.Username will be: “GFGUser” and the database name will be “mongoDb“. 6. 6. The function “.toCharArray()” is used to convert the password into a character array. 7. 7.The function “.getDatabase()” is used for getting the database. MongoDB Data Types: Following is a usable data type in MongoDB: Data TypesDescription String String is the generally used datatype. It is used to save data. A string must be UTF 8 valid in the mongodb. Integer Integer is used to save the numeric value. It can be 32 bit or 64 bit depending on the server. Boolean This datatype is used to save boolean values. It just displays YES/NO values. Double Double datatype saves floating point values. Min/Max Keys This data type compared a value against the lowest and highest bson elements. Arrays This datatype is used to save a list or multiple values into a single key. Object Object datatype is used for the embedded documents. Null It is used to save null values. Symbol It is commonly used for languages that use a specific type. Date This data type saves the current date or time in unix time format. It makes it possible to specify its own date time by creating an object of date and passing the value of date, month, year into it. Syntax: 1. db.aggregate( [ <"pipeline"> ], { <"options"> } ): The pipeline parameter does not need any underlying collection and always starts with a compatible stage, such as $currentOp or $listLocalSessions. It is an array of levels that will be executed. #3. db.cloneDatabase(“hostname”): The clonedatabase method copies the particular database to the current database and assumes that the database at the remote location has the same name as the current database.The hostname parameter contains the hostname of the database that you want to copy. MongoDB #4. db.commandHelp(command): We have the help option for the particular database command using the commandHelp method.The command parameter contains the name of the database command. #5. db.createCollection(name, options): A new gathering or view will be created using this method.The createCollection method is used primarily for making new collections that use specific options when the collection is first referenced in a command. #6. db.createView(): When applying the particular aggregation pipeline to the collection, the createView method creates a new view for the collectionThe method can be computed during the read operations and acts as the read-only operations.The views can be created in the same database of the source gathering to execute read operations as a part of the underlying aggregation pipeline. Syntax: 1.db.createView(<"view'>, <'source'">, <"pipeline">, <"options">) #7. db.dropDatabase(<'writeConcern">) The drop method removed the specified database and the associated data files. For example – Use <"database"> operation to switch the current database to the temporary database.Use the db.dropDatabase() method to drop the temporary database. 1. 1. use temp 2. 2. db.dropDatabase() #8. db.getLogComponents() • The getLog method returns a current stilted setting. • The method finds the amount of Log Messages produced by MongoDB. • For every log message component. Are you looking training with Right Jobs? Contact Us Popular Courses
ESSENTIALAI-STEM
Magic in Anglo-Saxon England Magic in Anglo-Saxon England (galdorcræft) refers to the belief and practice of magic by the Anglo-Saxons between the fifth and eleventh centuries AD in Early Mediaeval England. In this period, magical practices were used for a variety of reasons, but from the available evidence it appears that they were predominantly used for healing ailments and creating amulets, although it is apparent that at times they were also used to curse. The Anglo-Saxon period was dominated by two separate religious traditions, the polytheistic Anglo-Saxon paganism and then the monotheistic Anglo-Saxon Christianity, both of which left their influences on the magical practices of the time. What we know of Anglo-Saxon magic comes primarily from the surviving medical manuscripts, such as Bald's Leechbook and the Lacnunga, all of which date from the Christian era. Written evidence shows that magical practices were performed by those involved in the medical profession. From burial evidence, various archaeologists have also argued for the existence of professional female magical practitioners that they have referred to as cunning women. Anglo-Saxons believed in witches, individuals who would perform malevolent magic to harm others. In the late 6th century, Christian missionaries began converting Anglo-Saxon England, a process that took several centuries. From the 7th century on, Christian writers condemned the practice of malevolent magic or charms that called on pagan gods as witchcraft in their penitentials, and laws were enacted in various Christian kingdoms illegalising witchcraft. Background Following the withdrawal of the Roman armies and administrative government from southern Britain in the early 5th century CE, large swathes of southern and eastern England entered what is now referred to as the Anglo-Saxon period. During this, the populace appeared to adopt the language, customs and religious beliefs of the various tribes, such as the Angles, Saxons and Jutes, living in the area that covers modern Denmark and northern Germany. Many archaeologists and historians have believed that this was due to a widespread migration or invasion of such continental European tribes into Britain, although it has also been suggested that it may have been due to cultural appropriation on behalf of native Britons, who wished to imitate such tribes. Either way, the Anglo-Saxon populace of England adopted many cultural traits that differed from those in the preceding Iron Age and Romano-British periods. They adopted Old English, a Germanic language that differed markedly from the Celtic and Latin languages previously spoken, whilst they apparently abandoned Christianity, a monotheistic religion devoted to the worship of one God, and instead began following Anglo-Saxon paganism, a polytheistic faith revolving around the veneration of several deities. Differences to people's daily material culture also became apparent, as those living in England ceased living in roundhouses and instead began constructing rectangular timber homes that were like those found in Denmark and northern Germany. Art forms also changed as jewellery began exhibiting the increasing influence of Migration Period Art from continental Europe. Paganism and Christianity Anglo-Saxonist scholar Bill Griffiths remarked that it was necessary to understand the development of the pantheon of Anglo-Saxon gods in order to understand "the sort of powers that may lie behind magic ritual." He argued that the Anglo-Saxon pagan religion was "a mass of unorganised popular belief" with various traditions being passed down orally. Terminology The language of the Anglo-Saxons was Old English, a Germanic language descended from those of several tribes in continental Europe. Old English had several words that refer to "powerful women associated with divination, magical protection, healing and cursing". One of these was hægtesse or hægtis, whilst another was burgrune. Another Old English term for magicians was dry, making them practitioners of drycræft. Etymologists have speculated that the latter word might have been an anglicised term for the Irish drai, a term referring to druids, who appeared as anti-Christian sorcerers in much Irish literature of the period. In this case, it would have been a term borrowed from the Celtic languages, which were widespread across southern Britain prior to the Anglo-Saxon migration. Medical manuscripts The "main sources of our knowledge of magic" in the Anglo-Saxon period are the surviving medical manuscripts from the period. The majority of these manuscripts come from the 11th century, some being written in Old English and others in Latin, and they are a mix of new compositions and copies of older works. Three main manuscripts survive, now known as Bald's Leechbook, the Lacnunga and the Old English Herbarium, as do several more minor examples. Remarking on the magico-medical knowledge of the Anglo-Saxons, historian Stephen Pollington noted that the amount "actually recorded was probably only a fraction of the total available to the communities of old, since not everybody had the time and skill to write down what they knew; and furthermore that the few records that survive are only a small part of the corpus: in the thousand years since our surviving manuscripts were written there have been a multitude of cases of accidental or deliberate destruction." Bald's Leechbook was written around the middle of the 10th century, and is divided into three separate books. Written at the Winchester scriptorium that had been founded by the King of Wessex Alfred the Great (848/849–899), it is a copy of an earlier work that may have been written during Alfred's reign. The first two books in the Leechbook are a collation of Mediterranean and English medical lore, whilst the third is the only surviving example of an early English medical textbook. This third book contains remedies listed under which part of the body they are supposed to heal, with plants described under their Old English (rather than Latin) names. This implies it was written before the later Mediterranean influence that came with Christianisation. In contrast with the first two parts of the Leechbook, the third contains more magical instructions, with longer and more complicated charms and a greater folkloric component. The second of these sources is the Lacnunga, a medical manuscript that opens with an Old English translation of the Herbarium Apulei, a description of plants and herbs found throughout classical and mediaeval Europe. The individual who had originally compiled the Lacnunga started with recipes to heal such ailments as headaches, eye pains and coughs, but whenever "he came across anything that struck his fancy for some reason or other, he immediately put it in without bothering about its form or the order of his book", leaving the work disjointed. The name "Lacnunga" does not itself appear in the manuscript, but was given to the work by the Reverend Oswald Cockayne who first edited and published it into modern English in the third volume of his Leechdoms, Wortcunning and Starcraft of Early England (1866). Godfrid Storms compared the Leechbook and the Lacnunga, arguing that if the former had been "the handbook of the Anglo-Saxon medical man", then the latter was more like "the handbook of the Anglo-Saxon medicine-man", placing a greater emphasis on magical charms and deviating from normal medical manuscripts in style. Burials Archaeologists have identified evidence for magical practices in various burials from Anglo-Saxon England. Ritual Storms noted that in Anglo-Saxon magical praxes, specific ritual procedures would have had to have been performed in the belief that doing so would enable the magical operation to work. Animism Godfrid Storms argued that animism played a significant role in the worldview of Anglo-Saxon magic, noting that in the recorded charms, "All sorts of phenomenon are ascribed to the visible or invisible intervention of good or evil spirits." The primary creature of the spirit world that appear in the Anglo-Saxon charms is the ælf (nominative plural ylfe, "elf"), an entity who was believed to cause sickness in humans. Another type of spirit creature, a demonic one, believed to cause physical harm in the Anglo-Saxon world was the dweorg or dƿeorg/dwerg ("dwarf"), whom Storms characterised as a "disease-spirit". A number of charms imply the belief that malevolent "disease-spirits" were causing sickness by inhabiting a person's blood. Such charms offer remedies to remove these spirits, calling for blood to be drawn out to drive the disease-spirit out with it. The adoption of Christianity saw some of these pre-Christian mythological creatures reinterpreted as devils, who are also referenced in the surviving charms. For instance, in the Leechbook, it states that: * Against one possessed by a devil: Put in holy water and in ale bishopwort, water-agrimony, agrimony, alexander, cockle; give him to drink. Charms Storms believed that these charm formulas were "the oldest relics of Anglo-Saxon and Germanic literature", belonging "to the oldest traditions of the Germanic and Indo-European peoples." Symbolic comparisons Many of the Anglo-Saxon charms use symbolic comparisons between a known, described event and the magical act being performed. In this way, the "...two things are in some way brought together, so that what happens to one of them will happen also to the other." Storms believed that in comparing the two things, the Anglo-Saxon magician hoped to actually make them similar and that their connection may have been based on a "similarity in sound, meaning, form, colour and so on." For instance, in one charm, a curse is placed upon an individual, and their punishment is compared to various other events: * May you be consumed as coal upon the hearth, may you shrink as dung upon a wall, and may you dry up as water in a pail. May you become as small as a linseed grain, and much smaller than the hipbone of an itchmite, and may you become so small that you become nothing. In other examples, comparisons are made between the magical operation being undertaken and Biblical events, for instance one charm states that: * Bethlehem is the name of the town where Christ was born. It is well known throughout the world. So may this act [a theft] become known among men. Magic and religion In his 1948 study of the subject, entitled Anglo-Saxon Magic, Godfrid Storms noted that the surviving evidence shows "the close connection there was in Anglo-Saxon times between magic and religion." Throughout the Anglo-Saxon period, the religion of the communities living in England changed, from that of Anglo-Saxon paganism, which dominated from the fifth through to the eighth centuries, to Anglo-Saxon Christianity, which was dominant thenceforth. Paganism Anglo-Saxon paganism was polytheistic, believing in the existence of multiple deities. They also appeared to have revered a number of local deities and spirits in addition to holding nature and specific natural formations in high regard. lack of surviving evidence makes it unclear what Anglo-Saxon people believed the relationship between magic and the gods was like, although from examining the Norse mythological story surrounding the god Odin and his quest for knowledge, Godfrid Storms argued that across the Germanic-speaking world, there was a belief that the gods were "as much subject to magic as more earthly creatures." The god Woden is the only pre-Christian deity to be mentioned in the surviving Anglo-Saxon charms. The charm in question is known as the Nine Herbs Charm, and involves a discussion of nine different herbs used medicinally. In the charm, it is proclaimed that: * A worm came crawling, it killed nothing. For Woden took nine glory twigs, he smote then the adder that it flew apart into nine parts. Storms noted that in this charm, Woden's victory in smiting the adder is evoked to symbolise how the poison in the human body is smitten by the recitation of the charm. Animal charms also featured prominently in Anglo-Saxon magic as wards against evil magic users. These charms contained clear zoomorphic symbolism borrowed from Pagan beliefs such as symbols of the Boar, Eagle and Wolf. Furthermore, these charms were often designed for Christianity Many of the beliefs in charms, the supernatural and the magical world survived Christianization and were incorporated in Popular Religion and a "Cultural Paganism" that was not always seen as being at odds with Christian beliefs. Charms were continued to be used and often contained zoomorphic symbolism such as the Wolf, Raven or Boar, obviously influenced by sacral worship of these creatures from Anglo-Saxon Paganism. These charms were often used to guard against elves and other supernatural creatures which were believed to have a malicious intent towards humans and which had access to hostile magic. Magical practitioners There were various different kinds of magician in the Anglo-Saxon world. Leeches Evidence from the medical manuscripts informs us that among those who performed magic were members of the Anglo-Saxon medical profession, now known as leeches. In the context of Anglo-Saxon medics, the term "leech" was unconnected to the bloodsucking worms, instead deriving from the Old English læce, a term that in Early Mediaeval England referred to healers of any kind. Being a commonly used word in Old English, læce was the basis to several place names in England, such as Lesbury (læce-burg, or leech-fort) and Lexham (læce-ham, or leech-settlement). The written record only ever refers to male leeches, with no mention made of any females operating in the profession. Pollington noted that this does not necessarily imply that there never were any female leeches, but could "reflect the bias of the records towards the official, fee-charging, professional physician over the local village healer or unofficial midwife." Cunning folk Various archaeologists, primarily Audrey Meaney and Tania Dickinson, have argued that there were cunning women, or female magical practitioners, during the Anglo-Saxon period. Evidence from penitentials Evidence for the practice of witchcraft, or malevolent magic, can be found in the written records dating from the latter centuries of Anglo-Saxon England. The earliest of these are Latin penitentials written as handbooks for Christian priests, explaining to them the type of penance required for each sin, including the sin of witchcraft. One of the earliest of these was the Paenitentiale Theodori, attributed to Theodore of Tarsus, who held the position of Archbishop of Canterbury from 667 to 690. In chapter I. XV, De Cultura Idolorum ('Concerning the worship of idols'), it states: Commenting on this section of the Paenitentiale Theodori, the archaeologist Audrey Meaney noted that it closely resembled Isidore Mercator's Latin version of Canon 23 of the Council of Ankara. She noted however that in this penitential, the sentence for witchcraft is far lighter that than prescribed at Ankara, and it refers specifically to women as witches. This section of the Paenitentiale Theodori was quoted in the Paenitentiale Ecgberhti, which is attributed to the first Archbishop of York, Ecgbert, and also in the English Scriftboc. In the latter, it remarks that: Evidence from law codes In the introduction to Alfred's Laws, containing a translation of biblical judgments, it includes an alteration on the law "Do not allow sorcerers to live" from the Book of Exodus. This alteration proclaims "Do not allow the women who are accustomed to receive enchanters, magicians and witches to live." Audrey Meaney speculated that it might have been influenced by the anti-witchcraft passages in the Paenitentiale Theodori. Societal role of the witch In the surviving records, the Anglo-Saxon witch was usually portrayed as a young woman, who practised magic to find a lover, win the love of her husbands, give birth to a live baby or to protect her children. This is in contrast to the later English stereotype of a witch, which is that of an elderly spinster or widow. All the records of Anglo-Saxon witchcraft were produced by men, potentially explaining why it was usually women who were accused of witchcraft.
WIKI
тяжко Etymology From. Adverb * 1) sorely, gravely, heavily * 2) with difficulty Predicative * 1) it is heavy * 2) it is hard Etymology From. Adverb * 1) heavily * 2) gravely, grievously, severely, sorely * 3) with difficulty Predicative * 1) (it is) hard, tough
WIKI
Page:The System of Nature.djvu/97 found himself inadequate to perform; he distinguished them from Nature, gave them an amplification of his own properties, and believed he understood them by thus obscuring ideas, which he never dared either define or analyze. us now apply the general laws we have scrutinized, to those beings of Nature who interest us the most. Let us see in what man differs from the other beings by which he is surrounded. Let us examine if he has not certain points in conformity with them, that oblige him, notwithstanding the different properties they respectively possess, to act in certain respects according to the universal laws to which every thing is submitted. Finally, let us enquire if the ideas he has formed of himself in meditating on his own peculiar mode of existence, be chimerical, or founded in reason. Man occupies a place amidst that crowd, that multitude of beings, of which Nature is the assemblage. His essence, that is to say, the peculiar manner of existence, by which he is distinguished from other beings, renders him susceptible of various modes of action, of a variety of motion, some of
WIKI
RD-856 The RD-856 (GRAU Index 8D69M), also known as the RD-69M, is a four-nozzle liquid-fuel rocket vernier engine, burning N2O4 and UDMH in a gas generator cycle. It was used on the R-36, Tsyklon-2 and Tsyklon-3 second stage as thrust vector control by gimbaling of its nozzle. The engine is distributed through a cylindrical structure that is integrated around the main engine RD-252 module. The structure includes aerodynamic protection for the nozzles. The engine was started by a pyrotechnic ignitor. The engine was serially produced between 1965 and 1992. It was first launched on December 16, 1965 on an R-36 and its last launch was on January 30, 2009 with the last launch of the Tsyklon-3. The production capability was restarted for the Tsyklon-4 but with the apparent cancellation of the program the engine would still be out of production.
WIKI
CodeNewbie Community 🌱 Cover image for Full-Stack Developer Vs Software Engineer Andrew Baisden Andrew Baisden Posted on • Updated on • Originally published at dev.to Full-Stack Developer Vs Software Engineer It can be complicated for some people to tell the difference between both roles as these days there is quite a bit of crossover. However there are quite a few areas that are defining when it comes to seeing the differences between both job titles. Full-Stack Developer Job Role Full-Stack Developers are capable of working on both the front end and the back end of websites and web applications. This means that they should have a knowledge of HTML, CSS and Javascript as well as a front end framework like React, Vue and Angular. These type of developers are capable of working on the designs and are good in client facing roles. In terms of back end skills they should also have an understanding of how databases and servers work and they should be able to create API's that can connect to the client front side applications. They typically also know at least a few back end programming languages like Node, Python, Kotlin, Java, C# or something similar which is used for writing code that works on the server. These days it is quite common for Full-Stack Developers to be polyglots which essentially means that they know multiple scripting languages and can adapt for various responsibilities. This can include working on a web, mobile or even a native technical stack. Knowing how to deploy your code and having some experience of Dev Ops is also a requirement. As creating an app that works the same way in different environments is good for production which is why Docker and Kubernetes are great tools to know. Software Engineer Job Role Software Engineers are more focused on creating native apps for desktop, mobile and even other platforms like consoles, set top boxes and TV's. The role is more system based compared to that of a Full Stack Developer who would usually be working with the web. These engineers are specialists in their field of work and typically use programming languages such as C#, Kotlin, Java, Swift and other general-purpose programming languages like C++. In terms of work they are used to building applications that can run on an operating system like Windows, macOS and Linux. In these types of roles Software Engineers tend to work on various aspects of the application that they are tasked with working on. Whereas in contrast a Full Stack Developer might be working on all areas of the app and it might not be a requirement to be as team focused although this depends on the role. Because of the technicalities of working with different operating systems Software Engineers have a good grasp of system architecture and the notions of Computer Science when applied to this area. Conclusion Both of these career fields are highly sought after so whichever path you choose you are going to find job opportunities. The role of a Full Stack Developer is one who develops applications that can be accessed anywhere on the internet. This means every website that you visit and all of the data that is stored on it. In contrast a Software Engineer creates applications that get installed in an operating system. Like Microsoft Office, Adobe CC, Visual Studio Code or any app that you have on your computer. The same can be said for any app that you have installed from an app store because it was likely that it was created using Kotlin/Java if its Android or Swift if its for iOS. Despite these differences the lines are starting to become blurred between the two. For example it is possible to create mobile apps using React Native which expands a Full Stack Developers skillset. And you can even create desktop apps using HTML, CSS and Javascript if you use Electron. Many popular apps have been created using Electron such as Slack, Visual Studio Code and Discord. Top comments (0)
ESSENTIALAI-STEM
Talk:Comparative religion (disambiguation) other books There are a number of other possibly notable books on comparative religion that I found through a quick search; it would be appreciated if other editors could add to this list. --KarlB (talk) 00:24, 14 May 2012 (UTC)
WIKI
Héctor Grauert Héctor Grauert (1907–1991) was a Uruguayan political figure. Background He was a lawyer by profession. His brother Julio César Grauert was a Colorado Party Deputy. Public offices He was elected a Deputy in 1942 and subsequently a Senator. He served as Interior Minister and in other ministries in the 1950s. In the early 1960s he served as minority member at the National Council of Government of Uruguay.
WIKI
Asbury Bascom Davidson Asbury Bascom Davidson (November 13, 1855 in Lincoln County, Tennessee – February 4, 1920) served as Lieutenant Governor of Texas from January 15, 1907, to January 21, 1913. He had previously served in the Texas Senate from 1899 to 1907. He was a lawyer who served on the board of directors of what became Texas A&M University. He married Minnie McClanahan in March 1890. Davidson's 1877 handwritten law license from the State of Texas is held at the Chisholm Trail Heritage Museum in Cuero, Texas. Davidson and wife Minnie Davidson lived at 306 Terrell Street there during much of their life together.
WIKI
Note: In July 2013 we changed the forum markup language—we now use Markdown. This may cause minor formatting issues with existing posts. 29 Sep 2012, 07:43 Generic-user-small d3vin h (4 posts) description of what’s happening: when minimizing a maximized pane, this message appears at bottom of terminal window: "Session not found: tmp" # pane appears to return to same place as initial/previous session but the new tmp window (that was opened when the pane was first maximized) fails to close and appears in the list of windows (in the status bar at the bottom of tmux) my hunch is kill-window -t tmp (in the below .tmux.conf code) is where things break. since executing a command in the tmp window appears to rename the window, kill-window -t tmp won’t work. so my question is: how could i alter .tmux.conf to prevent this from happening? steps to recreate bug: (note: you would need to have modified .tmux.conf for these commands to work) start tmux and create session w/ at least two panes # maximize one pane using [prefix] + [up] # execute a shell command in maximized pane (1) # minimize pane using [prefix] + [down] (1) if pane is maximized and minimized w/out executing a command in the shell this problem does not appear to occur. i.e. if you’re editing a file in a pane, then maximize that pane, and only edit/save the file (w/out exiting and then executing another command), then minimize – the bug doesn’t occur. 30s youtube clip showing what happens: http://youtu.be/WMdOeJdOYuU code that might be causing the error (from ~/.tmux.conf): unbind Up bind Up new-window -d -n tmp \; swap-pane -s tmp.0 \; select-window -t tmp unbind Down bind Down last-window \; swap-pane -s tmp.0 \; kill-window -t tmp also posted to SO: http://stackoverflow.com/questions/12650768/tmux-maximize-minimize-pane-bug-session-not-found-tmp feel free to let me know if i need to clarify or provide other information. thx! 29 Sep 2012, 09:01 Generic-user-small d3vin h (4 posts) thanks to a helpful #tmux irc’er this question is solved. the solution is to add set-window-option -g allow-rename off to ~/.tmux.conf this works b/c tmp doesn’t get renamed so kill-window -t tmp can properly execute.   You must be logged in to comment
ESSENTIALAI-STEM
Lawrence Scarpa Lawrence Scarpa (born October 28, 1959) is an American architect based in Los Angeles, California. He used conventional materials in unexpected ways and is considered a pioneer and leader in the field of sustainable design. Personal life Scarpa was born into a Jewish-Italian family in Queens, New York. After his mother's death from cancer in 1967, the family moved to Miami, Florida. As a child, Scarpa became interested in architecture while helping his father after school with small construction projects that his father undertook to supplement his regular income as a mailman. While on job sites with his father, Scarpa would often build little buildings made from construction debris and other small scraps of wood found there. This interest in making and construction has followed Scarpa his entire life. He is married to American architect Angela Brooks. Career In 1976, Scarpa's father moved the family to Winter Haven, Florida where he opened a restaurant. While working in the restaurant as a senior in high school, Scarpa befriended a regular customer named Gene Leedy, an architect and member of the Sarasota School of Architecture. Leedy soon became Scarpa's mentor. Scarpa worked for Leedy and in his father's restaurant while attending the University of Florida. Upon graduation from the university, Scarpa moved to Boca Grande, Florida to work for Leedy as the foreman for the construction of houses designed by Leedy. Scarpa then accepted a job and moved to New York to work for Paul Rudolph for nearly two years until he returned to Graduate School at the University of Florida in 1984. Upon graduation from the University of Florida, he moved to Vicenza, Italy for two years before returning to the United States to teach at the University of Florida where he met his future wife, Angela Brooks, whom he married in 1987. The couple moved to San Francisco and one year later relocated to Los Angeles, where they live with their one son. In 1991, after three years of working together with architect and engineer Gwynne Pugh, the two men formed the architecture firm Pugh + Scarpa. In 2011, the firm name changed its name to Brooks + Scarpa to reflect the firm's leadership under Brooks and Scarpa. Honors and awards Early in his career, Scarpa completed many National AIA award winning office projects. In 2004, the Architectural League of New York selected Scarpa as an "Emerging Voice" in architecture. His work has been exhibited at the National Building Museum in Washington, DC, MOCA and at numerous other venues worldwide. He was featured in Newsweek and in a segment on The Oprah Winfrey Show. In 2009, Interior Design Magazine honored him with their Lifetime Achievement Award. In 2010, his firm Pugh + Scarpa received the American Institute of Architects Firm Award, the highest award given to an architectural firm. He was also elected to the American Institute of Architects College of Fellows in 2010. In 2014 Brooks + Scarpa were the recipients of the Smithsonian Cooper-Hewitt National Design Museum Award in Architecture. In 2015, Scarpa received the American Institute of Architects California Council (AIACC) Lifetime Achievement Award. In 2018 he received the National American Institute of Architects Collaborative Achievement Award and the Gold Medal in Architecture from the American Institute of Architects Los Angeles Chapter. He is the recipients of the 2022 American Institute of Architects Gold Medal. As the institutes highest award, the Gold Medal honors an individual or pair whose significant body of work has had a lasting influence on the theory and practice of architecture. Sustainability Scarpa's project Colorado Court in Santa Monica was the first multi-family housing project in the USA to be LEED Certified. His Solar umbrella house in Venice, California has been named by the American Institute of Architects (AIA) as one of their Top Ten Green Projects. Both Colorado Court and the Solar Umbrella House and Step Up on 5th are the only projects in the history of the American Institute of Architects (AIA) to win a National AIA Design Award, an AIA "COTE" Committee on the Environment "Top Ten Green Building" Award and a National AIA special interest award for a single project. Academia Scarpa has held teaching positions at several universities for more than two decades and is currently on the faculty at the University of Southern California. In 2020, he was the William F. Stern Endowed Visiting Professor at the Gerald D. Hines College of Architecture and Design, University of Houston, the Paul Helmle Fellow at California Polytechnic University and the Regnier Visiting Professor at Kansas State University. He was the 2014 Barber McMurry Professor at the University of Tennessee. He was the 2012 visiting professor at Harvard University Graduate School of Design, and in 2011 was the John Jerde Distinguished Professor at The University of Southern California. He was also the 2009 E. Fay Jones Distinguished Chair in Architecture at the University of Arkansas, the 2008 Ruth and James Moore Visiting Professor at Washington University in St. Louis, the 2007 Eliel Saarinen Distinguished Professor in Architecture at the Alfred Taubman College of Architecture + Urban Planning, University of Michigan Ann Arbor, the 2004 Howard Friedman Fellow in Architecture at the University of California Berkeley. He has also taught at the University of California Los Angeles, Southern California Institute of Architecture, University of Florida as well as several other higher education institutions.
WIKI
2 I am writing some custom javascript in Joomla 4 Beta 6 to control various aspects of my custom front-end template's menus. It needs to load after the page has been rendered, so I want to add it at the bottom of the template's index.php file. If I add the script in full it works fine. If I add the code to /js/user.js and then add the full URL link to the file - as if it was an external file - in the bottom of the index.php file, it also works, fine, e.g: <script src="https://my.website.com/templates/my_template/js/user.js"></script> However, I'd rather not have the full link visible, but if I try to add it via a local reference (using both double and single quotes), it doesn't work, e.g.: <script src="/js/user.js"></script> I have also tried adding a php instruction like this: <?php $doc = JFactory::getDocument(); $doc->addScript('templates/'. $this->template . '/js/user.js'); ?> Which works for the template.js at the top of the file, but it doesn't work in this position at the bottom, either. What am I doing wrong? Thanks. 2 Answers 2 4 Unfortunately Casseopeia (default Joomla 4 frontend template) uses the following: <jdoc:include type="scripts" /> inside the <head> tags at the top of the DOM, so any script added via $doc->addScript(), HTMLHelper::script() or WebAssetManager will be added up there. That said, loading the file at the top doesn't really matter. You can simply defer the load and use the correct event listener, like so: use Joomla\CMS\HTML\HTMLHelper; HTMLHelper::_('script', 'user.js', ['version' => 'auto', 'relative' => true], ['type' => 'module']); Note the 'type' => 'module'. This does NOT mean a Joomla module. It means a Javascript module which is deferred automatically. Inside your user.js, you can then execute your code once the DOM has loaded: document.addEventListener('DOMContentLoaded', () => { // Your code here }) or once the entire page has loaded window.addEventListener('load', () => { // Your code here }) 6 • Thank you. I can't seem to get it to work. I added the code to the user.js file and then copied and pasted the line you provided, i.e. "HTMLHelper::...etc" inside the head tags before <jdoc:include type="metas" />. Was that the right place? Is there anything else I need to add into the index.php? Thanks. – Gillian Oct 30, 2020 at 17:27 • That line is PHP, so you need to wrap it inside <?php ... ?> tags. You can add it near the top of the index.php – Lodder Oct 30, 2020 at 21:51 • I have added exactly this: <?php HTMLHelper::_('script', 'user.js', ['version' => 'auto', 'relative' => true], ['type' => 'module']); ?> - and no other new code - just above the <!DOCTYPE html> declaration, another attempt just below it but above the <head> tag, a third under the <head> tag and finally in the <body>. In all cases it just returns the J4 error message "Oops! An Error Occurred. The server returned a "500 Whoops, looks like something went wrong.". – Gillian Oct 31, 2020 at 9:12 • Ahh, sorry, make sure you have use Joomla\CMS\HTML\HTMLHelper; at the top of the file before adding that bit of code. – Lodder Oct 31, 2020 at 10:21 • Great! It works perfectly, now. Many thanks :-) – Gillian Oct 31, 2020 at 10:30 0 Instead I suggest you to use the Child Template feature following the guide and adapt it to your case. This answer may help you: https://joomla.stackexchange.com/a/31954/15836 Your Answer By clicking “Post Your Answer”, you agree to our terms of service and acknowledge that you have read and understand our privacy policy and code of conduct. Not the answer you're looking for? Browse other questions tagged or ask your own question.
ESSENTIALAI-STEM
Public Repository Last pushed: a month ago Short Description DOMjudge judgehost image Full Description DOMjudge server image This image together with the DOMjudge domserver image can be used to run DOMjudge using Docker. Using the images MariaDB container Before starting the containers, make sure you have a MySQL / MariaDB database somewhere. The easiest way to get one up and running is to use the MariaDB Docker container: docker run -it --name dj-mariadb -e MYSQL_ROOT_PASSWORD=rootpw -e MYSQL_USER=domjudge -e MYSQL_PASSWORD=djpw -e MYSQL_DATABASE=domjudge -p 13306:3306 mariadb --max-connections=1000 This will start a MariaDB container, set the root password to rootpw, create a MySQL user named domjudge with password djpw and create an empty database named domjudge. It will also expose the server on port 13306 on your local machine, so you can use your favorite MySQL GUI to connect to it. If you want to save the MySQL data after removing the container, please read the MariaDB Docker Hub page for more information. DOMserver container Next, if you are on Linux make sure you have cgroups enabled. See the DOMjudge documentation about setting up a judgehost for information about how to do this. Docker on Windows and macOS actually use a small Linux VM which already has these options set. Now you can run the domserver using the following command: docker run -v /sys/fs/cgroup:/sys/fs/cgroup:ro --link dj-mariadb:mariadb -it -e MYSQL_HOST=mariadb -e MYSQL_USER=domjudge -e MYSQL_DATABASE=domjudge -e MYSQL_PASSWORD=djpw -e MYSQL_ROOT_PASSWORD=rootpw -p 12345:80 --name domserver domjudge/domserver:latest If you want a specific DOMjudge version instead of the latest, replace latest with the DOMjudge version (e.g. 5.3.0). The above command will start the container and set up the database. It will then start nginx and PHP-FPM using supervisord. You can now access the web interface on http://localhost:12345/. Use username admin and password admin to log in. Note that for DOMjudge 6.0.0 and higher the webserver configuration will be set up such that the debug front controller will be used. Make sure you change the password of the judgehost account in the webinterface to something and write down the value. Environment variables The following environment variables are supported by the domserver container: • CONTAINER_TIMEZONE (defaults to Europe/Amsterdam): allows you to change the timezone used inside the container. • MYSQL_HOST (defaults to mariadb): set the host to connect to for MySQL. Can be hostname or IP. Docker will add hostnames for any containers you --link, so in the example above, the MariaDB container will be available under the hostname mariadb. • MYSQL_USER (defaults to domjudge): set the user to use for connecting to MySQL. • MYSQL_PASSWORD (defaults to domjudge): set the password to use for connecting to MySQL. • MYSQL_ROOT_PASSWORD (defaults to domjudge): set the root password to use for connecting to MySQL. • MYSQL_DATABASE (defaults to domjudge): set the database to use. • DJ_DB_INSTALL_BARE (defaults to 0): set to 1 to do a bare-install for the database instead of a normal install. Commands The domserver container supports a few commands. You can run all commands using the following syntax: docker exec -it domserver [command] If you have named your container something other than domserver, be sure to change it in the command as well. The following commands are available: • nginx-access-log: tail the access log of nginx. • nginx-error-log: tail the error log of nginx. • symfony-log: for DOMjudge using Symfony (i.e. 6.x and higher), tail the symfony log. Of course, you can always run docker exec -it domserver bash to get a bash shell inside the container. To restart any of the services, run the following: docker exec -it domserver supervisorctl restart [service] where [service] is one of nginx or php, Judgehost container To run a single judgehost, run the following command: docker run -it --privileged -v /sys/fs/cgroup:/sys/fs/cgroup:ro --name judgehost-0 --link domserver:domserver --hostname judgedaemon-0 -e DAEMON_ID=0 domjudge/judgehost:latest Again, replace latest with a specific version if desired. Make sure the version matches the version of the domserver. This will start up a judgehost that is locked to the first CPU core of your machine. If the judgedaemon stops for whatever reason, you should be able to see the error it produced in the shell where you started the judgehost. If you want to restart the judgehost, run docker start judgehost-0, where judgehost-0 is the value you passed to --name in the docker run command. Environment variables The following environment variables are supported by the judgehost container: • CONTAINER_TIMEZONE (defaults to Europe/Amsterdam): allows you to change the timezone used inside the container. • DOMSERVER_BASEURL (defaults to http://domserver/): base URL where the domserver can be found. The judgehost uses this to connect to the API. Do not add api yourself, as the container will do this! • JUDGEDAEMON_USERNAME (defaults to judgehost): username used to connect to the API. • JUDGEDAEMON_PASSWORD (defaults to password): password used to connect to the API. This should be the value of the judgehost password you wrote down earlier. • DAEMON_ID (defaults to 0): ID of the daemon to use for this judgedaemon. If you start multiple judgehosts on one (physical) machine, make sure each one has a different DAEMON_ID. Image source The source of these images can be found on the domjudge-packaging GitHub project. Docker Pull Command Owner domjudge
ESSENTIALAI-STEM
NA-122 (Lahore-V) Constituency NA-122 (Lahore-V) (این اے-۱۲۲، لاهور-۵) was a constituency for the National Assembly of Pakistan. It was abolished after the 2018 delimitations and its areas were dispersed in the surrounding constituencies with the majority going to NA-130 (Lahore-VIII). Boundaries Prior to its abolishment, the Constituency includes the areas of Samanabad, Ichra, Shadman, Shah Jamal, Garhi Shahu, Dharam Pura and Upper Mall. The total number of voters in this constituency was close to 357,000. Election 2002 General elections were held on 10 October 2002. Sardar Ayaz Sadiq of the Pakistan Muslim League (N) won by 37,531 votes. Election 2008 General elections were held on 18 February 2008. Sardar Ayaz Sadiq of the Pakistan Muslim League (N) won by 79,507 votes. Election 2013 General elections were held on 11 May 2013. Sardar Ayaz Sadiq of the Pakistan Muslim League (N) won by 93,389 votes and became the member of the National Assembly, but many irregularities in the election results surfaced after Pakistan Tehreek-e-Insaf (PTI) chairman Imran Khan demanded recounts and verification with the actual results. On 22 August 2015, an election tribunal annulled Ayaz Sadiq's victory in the 2013 general elections was rigged and ordered re-polling in the constituency. A by-election was held on 11 October 2015. Detailed results for Constituency NA-122: Election 2015 After the order of election tribunal, a by-election was held on 11 October 2015. After a neck-to-neck competition between Sardar Ayaz Sadiq (PML(N)) and Aleem Khan (PTI), Sadiq won the election with 74,525 votes.
WIKI
Wikipedia:WikiProject Military history/Assessment/Helmut Wick/archive1 * The following discussion is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion. Promoted EyeSerene talk 08:50, 19 January 2012 (UTC) Helmut Wick * Nominator(s): MisterBee1966 (talk) I am nominating this article for A-Class review because I would enjoy improving the article further. Thanks in advance MisterBee1966 (talk) 15:30, 3 December 2011 (UTC) Support Comments -- Forgive a brief wave of nostalgia but I first came across the name Helmut Wick when, as a boy, I assembled an Airfix model in the livery of his Bf 109, so it's good to finally see a decent article on him in WP. * Prose -- Performed a pretty extensive copyedit so please let me know if I've unintentionally altered any meaning. In addition to that: * FYI, in Commonwealth bios the convention is to only open with the subject's rank when it's 1-star and above. However if it's the convention in German bios to start with their rank no matter what, then that's cool. * Have a look at the Helmut Lent article please. Here the rank passed various reviews MisterBee1966 (talk) 16:46, 12 December 2011 (UTC) * You italicise Luftwaffe in the infobox but not elsewhere. Since it's such a well-known term I'm not that fussed if it's italicised or not but you should decide which it will be and make it consistrent throughout the article. * done MisterBee1966 (talk) 16:32, 12 December 2011 (UTC) * He was also awarded the Iron Cross 1st Class (Eisernes Kreuz 1. Klasse) by Oberstleutnant Harry von Bülow-Bothkamp. -- Why "also"? In addition to what? Actually better we drop the "also" and record the date it was awarded (6 June, I believe) and, if possible, exactly what it was awarded for (perhaps an except from the citation, if available). * done MisterBee1966 (talk) 19:38, 12 December 2011 (UTC) * Although the fighting in the air grew increasingly difficult, Wick kept adding victories to his tally. -- Can you elaborate briefly on why it was more difficult? Was this when the RAF changed to its 'big wing' tactics, or when the Luftwaffe's focus shifted to blitzing cities instead of attacking airfields, or what? * He was also interviewed by an Adler (Eagle—the Luftwaffe weekly magazine) journalist prior to the presentation. Several articles appeared at the time. -- Several articles on what? Wick, or other German aces? * About Wick done MisterBee1966 (talk) 16:34, 12 December 2011 (UTC) * Upon his return to France. Wick was promoted to Hauptmann (captain) and on 9 September was officially named Gruppenkommandeur (group commander) of I. Gruppe JG 2. -- Why "officially named"? Was he unofficially doing the job before? If not simply drop "officially". * The last few sentences re. his death currently read: * "Only later did Pflanz find out that it was Wick he saw bailing out. Wick was never found, however, and the Luftwaffe declared him missing in action, presumed dead, on 4 December 1940, earning him his last reference in the daily Wehrmachtbericht. Göring had ordered Kriegsmarine torpedo boats on a night-long search-and-rescue mission for Wick. The next day, other naval vessels and the Seenotdienst (air-sea rescue) service, escorted by fighters of JG 2, continued in vain to search for him. Helmut Wick, on his 168th combat mission, was the first Oak Leaves recipient to lose his life in combat." * I'd suggest we make this one para instead of two, and juggle things so the info is presented more-or-less chronologically (haven't done this myself because I'm unsure of the best way to rearrange the citations) -- note that I've tweaked a few words as well as the sequencing: * "Only later did Pflanz find out that it was Wick he saw bailing out. Göring ordered Kriegsmarine torpedo boats on a night-long search-and-rescue mission for the downed ace. The next day, other naval vessels and the Seenotdienst (air-sea rescue) service, escorted by fighters of JG 2, continued to search for him. He was never found, however, and the Luftwaffe declared him missing in action, presumed dead, on 4 December 1940, leading to his last reference in the daily Wehrmachtbericht. Wick, on his 168th combat mission, was the first Oak Leaves recipient to lose his life in combat." * done MisterBee1966 (talk) 16:34, 28 December 2011 (UTC) Cheers, Ian Rose (talk) 12:56, 10 December 2011 (UTC) * General comment, in English we tend to only capitalise ranks when they're used as a title immediately in front of a person's name, e.g. we'd say "Major Jones" (capitalised) but "Jones was promoted to major" (not capitalised). Is the convention in German to capitalise no matter what? * In German, military ranks are always capitalised. In Denglish (we Germans refer to the language mix of Deutsch and English as Denglish) I have seen things like hauptmann, oberst, etc. but it hurts my eyes. If we have a guideline a gladly obey to this MisterBee1966 (talk) 16:42, 12 December 2011 (UTC) * Structure/detail -- These look okay to me. * Referencing/spotchecks * You don't cite his nickname of "Sigfried". Best to mention and cite it in the main body of the article if possible (i.e. when he acquired it and why) but at the very least it needs citation here. * done I removed it, I can't recall how it ended up in the article MisterBee1966 (talk) 16:37, 28 December 2011 (UTC) * Hagen appears in bibliography but don't see him cited anywhere. * done used now MisterBee1966 (talk) 16:35, 28 December 2011 (UTC) * With no online sources and no access to the books in question, I haven't performed any spotchecks. * Supporting materials * Image licensing checks out. * The caption for File:Bundesarchiv Bild 146-1968-015-19, Helmut Wick.jpg says 22 October 1940 but the date in the image file says September 1940. Can we rationalise the discrepancy 'cos it appears the infobox image was from the same photo session and I used the date of September to augment the infobox image caption... * Ringlstetter uses the same picture in his book on page 83. The caption below the picture in his book reads "Prior to leaving to receive the Oak Leaves..." This was on 6 October. I fixed the date in the caption. MisterBee1966 (talk) 18:36, 11 December 2011 (UTC) * Okay, have checked all that and copyedited a bit -- further comments: * I'd still like to see some brief elaboration on how the BofB fighting became more difficult, but won't hold up support because of that. * I'm not sure the recent addition re. the family and air group vacations adds much. It seems out of place where it is since you have a Family section at the end, but on the other hand it's such a specific item it doesn't really work in that section either. My preference would be to drop that whole bit. * Obviously I'm taking in good faith (and based on prior experience have absolutely no reason not to) the accuracy of the article vs. the information in the sources, i.e. per earlier comment I've done no spotchecking. Cheers, Ian Rose (talk) 14:43, 30 December 2011 (UTC) * Comments on Citation & Sourcing Fifelfoo (talk) 02:28, 12 December 2011 (UTC) * The newspapers articles in Further Reading need to be brought into style. * done I took the book by Walter Zuerl out of the list. MisterBee1966 (talk) 10:33, 12 December 2011 (UTC) * Bibliography: Published where? Williamson, Gordon and Bujeiro, Ramiro (2004) * done MisterBee1966 (talk) 08:40, 12 December 2011 (UTC) * Bibliography: München: a publishing city of note not requiring a nation's name, or not? cf: Die Wehrmachtberichte 1939–1945 Band 1, 1. September 1939 bis 31. Dezember 1941. versus Helden der Wehrmacht — Unsterbliche deutsche Soldaten. * Let's keep it uniform and keep the city name, Germany sequence for all German based references. MisterBee1966 (talk) 08:40, 12 December 2011 (UTC) * You may find at FAC that the website "World War 2 Awards" is not considered High Quality. Whether this deeply impacts a FAC depends on the reviewer's opinions there. I do note, however, that while "World War 2 Awards" is a wiki—it is not an open wiki, it edits and reviews all potential submissions, keeping the editorial control of what actually appears in the hands of the editors. Thus it is a trustworthy wiki, dependent upon the quality of the editors &tc. Good choice there. Fifelfoo (talk) 02:28, 12 December 2011 (UTC) * Support: generally looks fine. I have a couple of minor comments, though, that probably should be addressed prior to taking to FAC: * in the lead this could possibly be tighter: "By then he had been credited with 56 aerial victories—that is, 56 aerial combat encounters resulting in the destruction of the enemy aircraft, making..." Perhaps try: "By then he had been credited with destroying 56 enemy aircraft in aerial combat, making..." * done MisterBee1966 (talk) 07:55, 15 January 2012 (UTC) * there is slight mix of English variation: e.g. "defense" (US) v. "Labour", "recognise", "honour" etc. (British); * done MisterBee1966 (talk) 07:55, 15 January 2012 (UTC) * there is a sentence fragment here: "Upon his return to France. Wick was promoted to..." I suggest tweaking it by simply removing the full stop: "Upon his return to France Wick was promoted to..." AustralianRupert (talk) 02:56, 14 January 2012 (UTC) * doneMisterBee1966 (talk) 07:51, 15 January 2012 (UTC) Support Comments --Sturmvogel 66 (talk) 14:31, 17 January 2012 (UTC) * Shouldn't Jagdgeschwader be italicized? * done MisterBee1966 (talk) 11:45, 17 January 2012 (UTC) * Was he in temporary command before this: was officially named Gruppenkommandeur? If not then delete the "officially". * Thanks for picking this up, Storm, I'd raised this myself earlier and hadn't noticed that it wasn't actioned when I subsequently checked through acknowledgements to my comments. Cheers, Ian Rose (talk) 00:13, 17 January 2012 (UTC) * done MisterBee1966 (talk) 11:35, 17 January 2012 (UTC) * Too much use of this: Jagdgeschwader 2 "Richthofen" Use the abbreviation that you've already introduced.--Sturmvogel 66 (talk) 23:55, 16 January 2012 (UTC) * done MisterBee1966 (talk) 11:45, 17 January 2012 (UTC) Question User Mememe2222 on commons has added a number of pictures to commons claiming that they are family possession. Her/his additions to the German Wiki indicate that my assumption (family member) is valid. I would like to use these images here on the English article as well. Could someone please let me know if the rational applied allows the use of the images? MisterBee1966 (talk) 11:50, 17 January 2012 (UTC) * The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page, such as the current discussion page. No further edits should be made to this discussion.
WIKI
Republicans’ 2018 Resolution: Bipartisanship. Will It Last? On Washington WASHINGTON — Senator Mitch McConnell sounded downright magnanimous in anticipation of 2018, eager to work closely with Democrats even though he had cut them out of virtually every big-ticket deliberation during 2017. “We’re going to be looking for areas of bipartisan agreement because that’s the way the Senate is,” Mr. McConnell, the majority leader, said this month as Congress fled town for the holidays. The truth, as Mr. McConnell well knows, is that he has little choice. The certification of Doug Jones’s victory as the new Democratic senator from Alabama and his imminent arrival in Washington mean Mr. McConnell will be presiding over a Senate split 51 to 49 between Republicans and Democrats, a margin providing him scant room to maneuver. It will be almost impossible for congressional Republicans to do anything meaningful without at least modest support from the Democratic side. Another strong motivation exists as well. Congressional Republicans are heading into a dangerous midterm re-election that will serve as a referendum on their management of Washington as well as President Trump’s public standing. After a year spent trying to pass major overhauls of health care and taxes with no Democratic support, Republicans want to be able to present themselves as reasonable and responsible, fully capable of working across party lines for the common good. It is both an important message to send to independent and swing voters, who broke from Republicans in 2017 elections, and part of the Washington cycle — mix in a little bipartisanship to dilute the heavily partisan nature of much of what takes place in the capital. Whether it pays off this time will depend upon what — if anything — gets done and how sincere the efforts are. Democrats say they are open to Republican overtures and would like to see bipartisan progress on immigration, public works and domestic spending. New sexual harassment rules for Congress are also emerging as an area of consensus. But given what has transpired over the past 12 months, Democrats are skeptical about a major transformation in the coming 10 before the November elections. Senator Chuck Schumer of New York, the Senate Democratic leader, suggested real cooperation would require a wholesale attitude adjustment on the part of Republicans and Mr. Trump. “Senate Republicans have spent a year writing bills without any Democratic input that hurt the middle class and pleased their wealthy, hard-right benefactors,” Mr. Schumer said. “There is a chance for bipartisanship, but only if Senate Republicans reverse course, tell their hard-right benefactors they can’t dictate policy, and genuinely work with Democrats.” Democrats already see signs of trouble clouding the prospects for common ground. As they seek to make permanent the Deferred Action for Childhood Arrivals program, or DACA, which grants protection to immigrants brought to the United States illegally as children, Mr. Trump is already imposing conditions that Democrats say they will not accept. In a Twitter post on Friday, Mr. Trump said, among other things, that “Democrats have been told, and fully understand, that there can be no DACA without the desperately needed WALL at the Southern Border.” Democrats have consistently said that the Trump border wall funding is a nonstarter, and they are certain to object to his increasing insistence on ending other immigration programs they support. As for infrastructure, a national program to rebuild the country’s aging transportation system has always been considered a prime opportunity for the two parties to come together to create jobs and bolster economic growth. But so far, Democrats note, the White House has been alone in developing an infrastructure plan that the administration says it intends to roll out in January. Top Democrats say it is not true bipartisanship to devise a major program, make it public and then expect Democrats to be won over by seeking adjustments as opposed to bringing in both sides from the start. Other flash points could threaten bipartisanship. Senate Republicans and the White House remain frustrated with the pace of executive and judicial branch confirmations and would like to accelerate the process by slashing debate time for many nominees. The dispute could intensify as top appointees depart during the second year of the administration, putting new pressure on the Senate to fill those vacancies. But Democrats, eying a potential Senate takeover, are not likely to want to give much ground on nominations if they stand to gain more control over who fills those jobs in 2019. If Republicans try to force the issue through a unilateral rules change, it is safe to say that would not help foster a bipartisan atmosphere. In addition, Speaker Paul D. Ryan has suggested that Republicans might want to build on their tax overhaul success by pursuing changes in social spending programs that Democrats consider untouchable. Mr. McConnell, though, quickly put such topics off limits, saying that any changes in those programs would have to be done on a bipartisan basis — an impossibility given the Democratic refusal to go along. Republicans are also counting on the new tax law to bolster their election prospects by putting more money in the hands of workers at the start of the year. But the law got off to a rocky start with confusion and anger around the country over whether homeowners could prepay their property taxes to avoid new tax limits, and Democrats will continue to pound that issue, angering Republicans. Despite their minority status in the House and Senate, Democrats have significant leverage. With Republicans in search of bipartisan credibility, Democrats can hold out for legislative deals that meet their demands or sit back and accuse Republicans of going it alone and abandoning any pretense of bipartisanship. Political risks loom for both sides. For Democrats, working with Republicans and Mr. Trump could provoke recriminations from their voters who don’t want the party to compromise with Republicans in any way. For Republicans, cutting deals with Democrats on issues such as immigration — an area where many Trump voters want Republicans to hold firm — could elicit a strong backlash and sap the enthusiasm of conservative voters, which Republicans will need to survive the midterm elections with minimal damage. Those realities could combine to make the effort to cooperate — to “do bipartisan,” in the memorable words of the president — an unattainable goal in a political atmosphere where partisan habits are so deeply ingrained.
NEWS-MULTISOURCE
File talk:Ligtning new delhi view 1.GIF Suggest correcting spelling of filename to "Lightning New Delhi view 1.gif" as "Ligtning..." may be missed in searches for keyword "Lightning" WordSurd (talk) 20:58, 2 August 2015 (UTC)
WIKI
TRPC4 From Wikipedia, the free encyclopedia Jump to: navigation, search Transient receptor potential cation channel, subfamily C, member 4 Identifiers Symbols TRPC4 ; HTRP-4; HTRP4; TRP4 External IDs OMIM603651 MGI109525 HomoloGene22955 IUPHAR: TRPC4 GeneCards: TRPC4 Gene RNA expression pattern PBB GE TRPC4 220818 s at tn.png PBB GE TRPC4 220817 at tn.png More reference expression data Orthologs Species Human Mouse Entrez 7223 22066 Ensembl ENSG00000133107 ENSMUSG00000027748 UniProt Q9UBN4 Q9QUQ5 RefSeq (mRNA) NM_001135955 NM_001253682 RefSeq (protein) NP_001129427 NP_001240611 Location (UCSC) Chr 13: 38.21 – 38.44 Mb Chr 3: 54.16 – 54.32 Mb PubMed search [1] [2] The short transient receptor potential channel 4 (TrpC4), also known as Trp-related protein 4, is a protein that in humans is encoded by the TRPC4 gene.[1][2] Function[edit] TrpC4 is a member of the transient receptor potential cation channels. This protein forms a non-selective calcium-permeable cation channel that is activated by Gq-coupled receptors and tyrosine kinases, and plays a role in multiple processes including endothelial permeability, vasodilation, neurotransmitter release and cell proliferation.[3] Tissue distribution[edit] The nonselective cation channel TrpC4 has been shown to be present in high abundance in the cortico-limbic regions of the brain.[4] In addition, TRPC4 mRNA is present in midbrain dopaminergic neurons in the ventral tegmental area and the substantia nigra.[5] Roles[edit] Deletion of the trpc4 gene decreases levels of sociability in a social exploration task. These results suggest that TRPC4 may play a role in regulating social anxiety in a number of different disorders.[6] However deletion of the trpc4 gene had no impact on basic or complex strategic learning.[7] Given that the trpc4 gene is expressed in a select population of midbrain dopamine neurons it has been proposed that is may have an important role in dopamine related processes including addiction and attention.[5] Clinical significance[edit] Single nucleotide polymorphisms in this gene may be associated with generalized epilepsy with photosensitivity.[8] Interactions[edit] TRPC4 has been shown to interact with ITPR1,[9][10] TRPC1,[11][12] and TRPC5.[12] See also[edit] References[edit] 1. ^ Zhu X, Jiang M, Peyton M, Boulay G, Hurst R, Stefani E, Birnbaumer L (May 1996). "trp, a novel mammalian gene family essential for agonist-activated capacitative Ca2+ entry". Cell 85 (5): 661–71. doi:10.1016/S0092-8674(00)81233-7. PMID 8646775.  2. ^ Clapham DE, Julius D, Montell C, Schultz G (December 2005). "International Union of Pharmacology. XLIX. Nomenclature and structure-function relationships of transient receptor potential channels". Pharmacol. Rev. 57 (4): 427–50. doi:10.1124/pr.57.4.6. PMID 16382100.  3. ^ "Entrez Gene: transient receptor potential cation channel, subfamily C, member 4".  4. ^ Fowler MA, Sidiropoulou K, Ozkan ED, Phillips CW, Cooper DC (2007). "Corticolimbic expression of TRPC4 and TRPC5 channels in the rodent brain". PLoS ONE 2 (6): e573. doi:10.1371/journal.pone.0000573. PMC 1892805. PMID 17593972.  5. ^ a b Cooper D, Illig K, Varnell A, Ostertag E, Klipec W (2011). "TRPC4 ion channel protein is selectively expressed in a subpopulation of dopamine neurons in the ventral tegmental area". Nature Precedings. doi:10.1038/npre.2011.6577.1.  6. ^ Cooper D, Rasmus K, Wang J-G, Varnell A, Ostertag E (2011). "Sociability is decreased following deletion of the trpc4 gene". Nature Precedings. doi:10.1038/npre.2011.6367.1.  7. ^ Cooper D, Collins M, Drish A, Swenson L, Ostertag E, Klipec W, Nguyen P, Deeney B, Williamson C, Wenzel K, Stumme J (2012). "Deletion of the trpc4 gene and its role in simple and complex strategic learning". Nature Precedings. doi:10.1038/npre.2012.6929.1.  8. ^ von Spiczak S, Muhle H, Helbig I, de Kovel CG, Hampe J, Gaus V, Koeleman BP, Lindhout D, Schreiber S, Sander T, Stephani U (September 2010). "Association study of TRPC4 as a candidate gene for generalized epilepsy with photosensitivity". Neuromolecular Med. 12 (3): 292–9. doi:10.1007/s12017-010-8122-x. PMID 20574736.  9. ^ Yuan JP, Kiselyov K, Shin DM, Chen J, Shcheynikov N, Kang SH, Dehoff MH, Schwarz MK, Seeburg PH, Muallem S, Worley PF (September 2003). "Homer binds TRPC family channels and is required for gating of TRPC1 by IP3 receptors". Cell 114 (6): 777–89. doi:10.1016/S0092-8674(03)00716-5. PMID 14505576.  10. ^ Mery L, Magnino F, Schmidt K, Krause KH, Dufour JF (January 2001). "Alternative splice variants of hTrp4 differentially interact with the C-terminal portion of the inositol 1,4,5-trisphosphate receptors". FEBS Lett. 487 (3): 377–83. doi:10.1016/S0014-5793(00)02362-0. PMID 11163362.  11. ^ Strübing C, Krapivinsky G, Krapivinsky L, Clapham DE (October 2003). "Formation of novel TRPC channels by complex subunit interactions in embryonic brain". J. Biol. Chem. 278 (40): 39014–9. doi:10.1074/jbc.M306705200. PMID 12857742.  12. ^ a b Hofmann T, Schaefer M, Schultz G, Gudermann T (May 2002). "Subunit composition of mammalian transient receptor potential channels in living cells". Proc. Natl. Acad. Sci. U.S.A. 99 (11): 7461–6. doi:10.1073/pnas.102596199. PMC 124253. PMID 12032305.  Further reading[edit] • Islam, Md. Shahidul (January 2011). Transient Receptor Potential Channels. Advances in Experimental Medicine and Biology 704. Berlin: Springer. p. 700. ISBN 978-94-007-0264-6.  • Clapham DE, Julius D, Montell C, Schultz G (2006). "International Union of Pharmacology. XLIX. Nomenclature and structure-function relationships of transient receptor potential channels.". Pharmacol. Rev. 57 (4): 427–50. doi:10.1124/pr.57.4.6. PMID 16382100.  • Cavalié A (2007). Ionic Channels Formed by TRPC4. "Ionic channels formed by TRPC4.". Handb Exp Pharmacol. Handbook of Experimental Pharmacology 179 (179): 93–108. doi:10.1007/978-3-540-34891-7_5. ISBN 978-3-540-34889-4. PMID 17217052.  External links[edit] This article incorporates text from the United States National Library of Medicine, which is in the public domain.
ESSENTIALAI-STEM
Digitally Sign PDF from USB eToken #1 Is it possible to sign PDF document retrieving the private key from USB token? The examples available using the PdfSignDigitalOptions class gets the private key from a pfx file. Thanks. #2 @diego.fullana, Thank you for your inquiry. From your request, it’s not clear that you are trying to explore GroupDocs.Signature product for which platform (.NET, Java or Cloud)?. Please specify the details and we will be glad to help you. #3 Thanks for your reply. My request is for the .Net platform, specifically in C #. Basically, we need to sign with a certificate that we retrieve from the certificate store on the user computer. This certificate is associated with an RSACryptoServiceProvider (USB token) that holds the Private Key. Code we use to retrieve the certificate: X509Certificate2 x509; X509Store store = new X509Store(StoreLocation.CurrentUser); store.Open(OpenFlags.ReadOnly | OpenFlags.OpenExistingOnly); X509Certificate2Collection collection = (X509Certificate2Collection)store.Certificates; X509Certificate2Collection fcollection = (X509Certificate2Collection)collection.Find(X509FindType.FindBySubjectName, "CertSubjectName", false); X509Certificate2Collection scollection = X509Certificate2UI.SelectFromCollection(fcollection, "Test Certificate Select", "Select a certificate from the following list to get information on that certificate", X509SelectionFlag.SingleSelection); if(scollection.Count > 0) { x509 = scollection[0]; } store.Close(); Hope the details help! #4 @diego.fullana, We are investigating this scenario at our end. Your investigation ticket ID is SIGNATURENET-1746. As we have any further updates on it, we’ll notify you.
ESSENTIALAI-STEM
There is a proven way to start your day that studies show will help curb stress, boost energy and start your day calmer, happier, and with less fatigue. This ritual is a gentle, restorative Sun Salutation, which stretches your body and helps regulate your breathing as you set your intention for the day. And follow it up by sipping a turmeric drink, a curcumin-spiced tea or a non-dairy latte with turmeric creamer, which contains curcumin, a compound in turmeric that has been shown to contain. Here is how to integrate this new ritual into your morning, with the strengthening yoga flow and a natural Turmeric non-dairy creamer from Laird Superfood that transforms a latte into a functional drink. How to Do a Sun Salutation With Fluid Form A sun salutation is actually not a single move, but a flow of 12 connected postures with reaching and stretching movements integrated into one restorative sweep of gestures that has scientifically measurable health benefits. Simply add these movements to your morning, for up to ten minutes after you get out of bed, to feel better physically and mentally all day long. Start in a standing pose, feet parallel, and begin a sequence of reaching up with both arms, palms facing in, fingers pointing up towards the sky, then sweep arms back down toward the earth, and allow your steady breath to open your back muscles and feel each movement work to expand your range of motion. Each aspect of your post serves a purpose as it relates to your physical and mental health, your relationship to nature, the sun, the Earth, and the air. (see the video for full details) But altogether, the movements help your body to reduce stress and improve digestion, increase healthy circulation, and boost your athletic performance, scientific studies show. Sun salutations give your entire muscular-skeletal system a chance to stretch as you awaken the spine, lower back, and shoulders. These stretches help support a healthy lifestyle by breathing healthy energy into your body and allow stress to leave your muscles, which helps your body build a strong immune system and stave off lifestyle-driven diseases caused by stress or unhealthy imbalances, such as sitting all day, not moving in the morning, or a poorly functioning digestive system. The 5 Health Benefits of Sun Salutations Getty Images 1. Sun salutations improves muscle strength and endurance, lowers BMI If one of your goals is to build strong, lean muscle and improve your fitness, practicing sun solutions can improve your strength and endurance. In a study, a group of researchers had subjects perform 24 cycles of sun salutation, 6 days a week for 24 weeks. They then measured changes in upper body muscle strength by asking them to do a bench press and shoulder press and all of the subjects had gotten stronger doing the sun salutations, and while both groups lowered their overall BMI, the women lost body fat over the 24 weeks. The upshot: performing sun salutations helps to get stronger, build muscle or reach your optimal fitness level. 2. Sun salutations improves circulation and fights stress-related fatigue Throughout the flow of a sun salutation, your body is constantly in movement, increasing your heart rate and improving circulation. The poses also "open" the heart as you raise your chest up and forward and breathe air fully and deliberately into and out of the lungs, allowing for better blood circulation. If you're someone who feels tired all the time, then a helpful tip to boost energy levels is to start your day practicing sun salutations to get a natural boost of energy first thing in the morning. This is an easy way to stay focused without needing caffeine. 3. Sun salutations supports digestion and may help reduce IBS symptoms When you're practicing sun salutations, your diaphragm meets your abdomen as you lower your hands to the floor, to meet your feet, and then as you push your hips back into a downward dog position, almost as if there is a hurdle under your stomach. This healthy movement is beneficial for your lungs and chest, helping to regulate healthy breathing patterns, reducing feelings of stress, and ultimately aiding healthy digestion. When you're feeling stressed, your digestion and nervous system are thrown off track. This can take a toll on your immune system, according to studies that link stress to digestion. and the nutrients absorbed by your body. When stress throws off your digestive system, may experience muscle spasms, according to The American Psychological Association. To avoid these painful abdominal cramps, add sun solutions to your practice or daily ritual. The basic principles of yoga may positively impact patients with IBS, because internal organs such as the intestines (which get inflamed during IBS) can feel calmer in certain yoga poses (such as child's post), and a healthy stress-relieving yoga practice can help reduce abdominal pain that occurs with IBS, according to a study published by the National Library of Medicine. The study also pointed out that yoga helps to develop body awareness and physical discipline, supporting a healthy diet and exercise, which can reduce IBS symptoms. 4. Sun salutations may improve cardiovascular fitness if you don't love cardio If you're looking for an easy way to improve your fitness without cardio, just ten minutes of sun solutions a day could be your answer, according to a study published in the National Library of Medicine, which researched the effects of yoga versus cardio. The researcher zeroed in on the importance of sun solution postures, explaining that to gain fitness, sun salutations improved breathing and overall wellbeing. ©lindseybaumsteiger 5. For a drink, add a turmeric tea or latte to your morning practice For a turmeric drink, Laird Superfood's Turmeric Superfood creamer adds this natural flavor to your morning coffee, smoothie, or tea. or mix it with your favorite warm plant-based milk. Laird Superfood Creamers have naturally occurring MCTs from coconut oil and are made with all-natural, whole-food ingredients. They are vegan, dairy-free, gluten-free, stevia-free, soy-free, keto-friendly, and non-GMO,  and free of any artificial colors, flavors, and additives. To shop, visit Laird Superfood's website and see the rituals that work for others. Not sure how to use Turmeric Creamer? Add it to this Creamy Golden Milk Smoothie recipe. Laird Superfood Creamy Golden Milk Smoothie Serves 2 Time to Make: 5 Minutes Ingredients • 2 Tbs Laird Superfood Turmeric Creamer • 1 banana • 2 cups frozen mango chunks • 2 tablespoons ginger (about a 2”x2” nob) • 2 cups filtered water Instructions 1. Blend all ingredients together in a high-speed blender until smooth and consistent (adding more or less water for preferred consistency). 2. Enjoy! For more daily rituals, check out: 
ESSENTIALAI-STEM
UPDATE 1-Irish central bank eases deposit rules for first-time buyers * LTV ceiling for all first time buyers set at 90 percent * Central bank also amends rules on lenders’ exemptions * Regulators faced calls for changes as rental costs spiral (Adds quotes, details) By Padraic Halpin DUBLIN, Nov 23 (Reuters) - Ireland’s central bank eased deposit rules for first-time house buyers on Wednesday and amended how lenders can grant exemptions, after its first review of regulations introduced last year to curb excessive lending. Regulators faced calls for changes from industry and government as first-time buyers struggled to accumulate the deposits now required, amid spiraling rental costs that are now above the peak hit during a property bubble a decade ago. The central bank said that from January first-time buyers could now borrow 90 percent of the value of a home regardless of the price, an amendment of the current regime, which capped the 90 percent threshold at 220,000 euros with an 80 percent limit applicable on the excess value. “Over the past 18 months, the measures have helped to ensure that those who buy homes are better prepared to manage their mortgage payments in the event of a future downturn,” Irish Central Bank Governor Philip Lane said in a statement. “While our review process affirmed the value of the overall framework, some modifications were suggested by our evidence-based analysis. These measures constitute a sustainable framework to underpin our financial stability objectives.” Banks can breach the limit for 5 percent of all first-time mortgages written and for 20 percent of other homebuyers, compared with a previous 15 percent across-the-board cutoff. Limits on how much homeowners can borrow compared with their income remained unchanged, the central bank said. While house prices are a third below their pre-crash peak, they are now growing more than 7 percent year-on-year, after stabilising at an annual growth rate of around 4 to 5 percent last year following the introduction of the rules. Analysts say a chronic lack of housing would continue to drive the rental and home market higher, particularly in Dublin. Average asking prices there have risen to between 276,000 and 527,000 euros, according to property website Daft.ie. Irish Finance Minister Michael Noonan, who is also bringing in a tax break for first-time buyers of new homes in a bid to stimulate house building, said earlier on Wednesday that he was happy with the central bank’s changes. (Reporting by Padraic Halpin; editing by Kate Holton, Larry King)
NEWS-MULTISOURCE
Zhang Lingyun Zhang Lingyun (1895–1946) or Chang Ling-yun, was a general in the Chinese National Revolutionary Army during the Warlord era and Second Sino-Japanese War. Zhang Lingyun was a Northwestern Army officer under the warlord Feng Yuxiang. After the Central Plains War, Feng's forces were dispersed. When Feng made a comeback organizing the Chahar People's Anti-Japanese Army in 1933, Zhang, like many other former Northwestern Army soldiers, joined it. He was made the general commanding 6th Corps of the Anti Japanese Army. When the Anti Japanese army was dispersed in August 1933, Song Zheyuan made him Baochang garrison commander in Chahar. In September 1933, he assisted Fu Zuoyi against some of his former comrades, pursuing and blocking them east of Ertaizi, Suiyuan when they attempted to move west to Ningxia via Suiyuan, forcing them east to join Fang Zhenwu at Dushikou. By the outbreak of war with Japan, Zhang was with the 37th Division and served in the early campaigns of the Second Sino-Japanese War in North China. In August 1937 Zhang had become commander of the 37th Division succeeding Feng Chian. Under his command 37th Division fought in the Beiping–Hankou Railway Operation from August 1937 to Mid August 1937 under 77th Corps of 1st Army Group. His Division was involved in the Tianjin–Pukou Railway Operation for a short time in September and then returned to fighting in the other operation until January 1938. Also he was in the Battle of Northern and Eastern Henan. For some time he was not in command of 37th Division During the Battle of Xuzhou but was back in command for the Battle of Wuhan.
WIKI
Wikipedia:Articles for deletion/Streltsy (Hungary) The result was no consensus. (non-admin closure) Biblio worm 01:16, 24 October 2014 (UTC) Streltsy (Hungary) * – ( View AfD View log Stats ) I can't find any sources for this, including the mentioned references in both this and the hu-wiki article (which I wouldn't be able to read anyways). It would help if someone who knows Hungarian could look for something, but otherwise I don't think there's enough evidence that it meets WP:GNG. (Side note: I tagged it first, then decided to come to AfD.) ansh666 07:30, 30 September 2014 (UTC) * Note: This debate has been included in the list of Hungary-related deletion discussions. • Gene93k (talk) 14:41, 30 September 2014 (UTC) * Note: This debate has been included in the list of Slovenia-related deletion discussions. • Gene93k (talk) 14:42, 30 September 2014 (UTC) * Note: This debate has been included in the list of Military-related deletion discussions. • Gene93k (talk) 14:42, 30 September 2014 (UTC) * Relisted to generate a more thorough discussion so a clearer consensus may be reached. * Please add new comments below this notice. Thanks, czar ♔ 00:51, 7 October 2014 (UTC) * Delete – Very small entry with one source. Looks more like a dictionary entry than a encyclopedic erntry. Kingjeff (talk) 06:25, 7 October 2014 (UTC) * Sounds like it's about the militia of a single village—probably not notable—although it's hard to tell. The term is a very generic one, equivalent to Schütze. &mdash;innotata 17:18, 8 October 2014 (UTC) * Relisted to generate a more thorough discussion so a clearer consensus may be reached. * Please add new comments below this notice. Thanks, NorthAmerica1000 20:32, 15 October 2014 (UTC)
WIKI
Mousepad Dracula Dark theme for Mousepad and 318+ apps StarFork Mousepad Theme Preview 7,044 views Mousepad Install manually 1. Git clone this repository: git clone https://github.com/dracula/mousepad.git && cd mousepad 2. Create folder inside your $HOME folder mkdir -p "$HOME/.local/share/gtksourceview-3.0/styles" 3. Copy the dracula.xml cp dracula.xml $HOME/.local/share/gtksourceview-3.0/styles Note! if mousepad doesn't recognize change gtksourceview-3.0 to gtksourceview-4 Stay up to date Get updates about this theme and more. 7,245 people enjoy it. Contributors This theme wouldn't exist without these people. Wanna help too? Check the repository on GitHub. • alvinseptiano • zenorocha Edit this documentation on GitHub. Made with by Zeno Rocha under MIT license
ESSENTIALAI-STEM
Главная » Хабрахабр » [Из песочницы] Даже в Java 9 ArrayList всё ещё можно (и нужно) улучшать [Из песочницы] Даже в Java 9 ArrayList всё ещё можно (и нужно) улучшать Думаю, большинство джавистов согласится, что java.util.ArrayList — наиболее используемая коллекция в мире Java. Она появилась в версии 1.2 и быстро стала "коллекцией по умолчанию", ведь в большинстве случаев её возможностей вполне достаточно для повседневной работы. В этот класс вносилось множество изменений (см., например, историю изменений в репозитории JDK 8), чтобы сделать его как можно более производительным. В этой заметке я покажу, что даже такой прокачанный компонент, как ArrayList всё ещё хранит в себе возможности для улучшения. Положим, нам необходимо преобразовать в массив часть списка. Для этого опишем метод: public T[] toSubArray(ArrayList<T> list, int from, int to) { return list .subList(from, to) .toArray(new T[0]); } Оценим его производительность в сравнении с преобразованием в массив исходного списка: @BenchmarkMode(Mode.AverageTime) @OutputTimeUnit(TimeUnit.NANOSECONDS) @Fork(jvmArgsAppend = {"-XX:+UseParallelGC", "-Xms1g", "-Xmx1g"}) public class SubListToArrayBenchmark { /** * baseline */ @Benchmark public Integer[] list(Data data) { return data.list.toArray(new Integer[0]); } @Benchmark public Integer[] subList(Data data) { return data.list.subList(0, data.size).toArray(new Integer[0]); } @State(Scope.Thread) public static class Data { ArrayList<Integer> list; @Param({"0", "10", "100", "1000"}) int size; @Setup public void setup() { list = IntStream .range(0, size) .boxed() .collect(toCollection(ArrayList::new)); } } } Выполнив замеры обнаружим, что производительность метода subList() значительно уступает производительности baseline-а: Benchmark size Score Error Unit list 0 7,2 0,1 ns/op subList 0 12,8 0,2 ns/op list 10 34,6 3,9 ns/op subList 10 44,7 1,0 ns/op list 100 141,9 2,2 ns/op subList 100 252,1 4,9 ns/op list 1000 1201,6 21,0 ns/op subList 1000 2310,4 53,0 ns/op Учитывая то обстоятельство, что в обоих случаях перемещается равный объём данных, значительная разница выглядит удивительной. Разгадка лежит врутри класса ArrayList: public class ArrayList<E> extends AbstractList<E> implements List<E>, RandomAccess, Cloneable, java.io.Serializable { //... public Object[] toArray() { return Arrays.copyOf(elementData, size); } public <T> T[] toArray(T[] a) { if (a.length < size) // Make a new array of a's runtime type, but my contents: return (T[]) Arrays.copyOf(elementData, size, a.getClass()); System.arraycopy(elementData, 0, a, 0, size); if (a.length > size) a[size] = null; return a; } //... } Оба метода напрямую обращаются к массиву, используя Arrays.copyOf() и System.arraycopy() для перемещения данных. Заглянем внутрь: public class Arrays { //... @HotSpotIntrinsicCandidate // since Java 9 public static <T,U> T[] copyOf(U[] original, int newLength, Class<? extends T[]> newType) { @SuppressWarnings("unchecked") T[] copy = ((Object)newType == (Object)Object[].class) ? (T[]) new Object[newLength] : (T[]) Array.newInstance(newType.getComponentType(), newLength); System.arraycopy(original, 0, copy, 0, Math.min(original.length, newLength)); return copy; } //... } public final class System { //... @HotSpotIntrinsicCandidate // since Java 9 public static native void arraycopy(Object src, int srcPos, Object dest, int destPos, int length); //... } Указанные методы помечены как @HotSpotIntrinsicCandidate, что позволяет ВМ создавать для них высокопроизводительный машинный код для достижения наилучшего быстродействия. Теперь обратимся к методу subList(): public List<E> subList(int fromIndex, int toIndex) { subListRangeCheck(fromIndex, toIndex, size); return new SubList<>(this, fromIndex, toIndex); } Как видим, ArrayList располагает собственной реализацией данного метода, и (что гораздо важнее) собственной реализацией представления части списка: private static class SubList<E> extends AbstractList<E> implements RandomAccess { private final ArrayList<E> root; private final SubList<E> parent; private final int offset; private int size; //... } Теперь главное: хотя SubList и помечен как RandomAccess и через поле root имеет прямой доступ к массиву, он не располагает собственной реализацией методов toArray() и toArray(T[]). А раз так, то используются унаследованные методы класса AbstractCollection: public Object[] toArray() { // Estimate size of array; be prepared to see more or fewer elements Object[] r = new Object[size()]; Iterator<E> it = iterator(); for (int i = 0; i < r.length; i++) { if (! it.hasNext()) // fewer elements than expected return Arrays.copyOf(r, i); r[i] = it.next(); } return it.hasNext() ? finishToArray(r, it) : r; } public <T> T[] toArray(T[] a) { // Estimate size of array; be prepared to see more or fewer elements int size = size(); T[] r = a.length >= size ? a : (T[])java.lang.reflect.Array .newInstance(a.getClass().getComponentType(), size); Iterator<E> it = iterator(); for (int i = 0; i < r.length; i++) { if (! it.hasNext()) { // fewer elements than expected if (a == r) { r[i] = null; // null-terminate } else if (a.length < i) { return Arrays.copyOf(r, i); } else { System.arraycopy(r, 0, a, 0, i); if (a.length > i) { a[i] = null; } } return a; } r[i] = (T)it.next(); } // more elements than expected return it.hasNext() ? finishToArray(r, it) : r; } Здесь массив заполняется в цикле с помощью итератора, а это работает медленнее, чем перенос данных с помощью Arrays.copyOf() и System.arraycopy(). Отсюда следует, что для улучшения производительности нам нужно переопределить toArray() и toArray(T[]) и использовать тот же подход, что и ArrayList. Дополним: private static class SubList<E> extends AbstractList<E> implements RandomAccess { private final ArrayList<E> root; private final SubList<E> parent; private final int offset; private int size; //... @Override public Object[] toArray() { return Arrays.copyOfRange(root.elementData, offset, offset + size); } @Override public <T> T[] toArray(T[] a) { if (a.length < size) return (T[]) Arrays.copyOfRange(root.elementData, offset, offset + size, a.getClass()); System.arraycopy(root.elementData, offset, a, 0, size); if (a.length > size) a[size] = null; return a; } //... } Всё ли мы сделали правильно? Нет! Переопределённые нами методы не учитывают вероятность того, что исходный список может быть изменён уже после вызова метода subList(). Мы обязаны учесть такую возможность. Поэтому добавим проверку в начало каждого из переопределённых методов: @Override public Object[] toArray() { checkForComodification(); // <-- return Arrays.copyOfRange(root.elementData, offset, offset + size); } @Override public <T> T[] toArray(T[] a) { checkForComodification(); // <-- if (a.length < size) return (T[]) Arrays.copyOfRange(root.elementData, offset, offset + size, a.getClass()); System.arraycopy(root.elementData, offset, a, 0, size); if (a.length > size) a[size] = null; return a; } Прогнав бенчмарк с изменённым ArrayList-ом обнаруживаем, что теперь производительность метода subList() лишь незначительно уступает производительности baseline-а. Небольшое отставание обусловлено созданием подсписка и вызовом checkForComodification() в начале метода toArray(T[]). Benchmark size Score Error Unit list 0 7,2 0,1 ns/op subList 0 7,5 0,2 ns/op list 10 24,5 0,5 ns/op subList 10 25,4 0,6 ns/op list 100 142,8 4,5 ns/op subList 100 141,6 2,5 ns/op list 1000 1243,6 28,5 ns/op subList 1000 1247,8 23,7 ns/op В сухом остатке: Тикет и ссылка на патч (закроют, скорее всего, в Java 11) Что почитать: Длинная, сложная и чрезвычайно полезная статья о чёрном колдовстве в омуте ВМ Исходная переписка по теме заметки: находится тут Выводы • даже до боли знакомые классы могут скрывать недоработки • абстрактные коллекции написаны для покрытия как можно большего числа случаев и предлагают обобщённые алгоритмы, поэтому при создании конкретной реализации нередко есть возможность написать более производительный код, заточенный под особенности вашей структуры данных • для внесения изменений необязательно быть сотрудником "Оракла"; если у вас есть патч, устраняющий доказанную ошибку или привносящий ощутимое улучшение, — он будет принят к рассмотрению • чаще заглядывайте в исходный код платформы: джавист никогда не может знать о JDK слишком много x Ещё Hi-Tech Интересное! Орден куколки Прошу считать пятничным постом! Это как бы научная фантастика, но правда важный дисклеймер 1. Научная фантастика понятие очень широкое. Этот рассказ-эссе я смею предложить только тем, кто нормально относится к углу . Простите меня, если в вашем представлении научная фантастика ... Трудоголизм — болезненное состояние, о котором не принято говорить Тему профессионального выгорания не пинал на Хабре только ленивый. Были истории и о том, как с этим бороться, и рассказы людей, которые лично столкнулись с этой проблемой, и статьи вида «как избежать выгорания». На самом деле тема важная и нужная. ...
ESSENTIALAI-STEM
User:CODGirl247 Hi! This is my page, which I'll use as a blogging page ☺ :D because i can :) Thank you if your reading this BYE
WIKI
  Honors Projects for Zoology Permanent URI for this collection Browse Recent Submissions Now showing 1 - 6 of 6 • Item Control of Jackson’s chameleons using decoys (University of Hawaii at Manoa, 2015-05) Dobbs, Sonja ; Holland, Brenden ; Zoology The Jackson’s chameleon is an invasive east African species that was released on the island of Oahu as well as the other main Hawaiian Islands. This species poses a direct threat via predation to already-endangered native invertebrates, which are integral to the maintenance of healthy forest ecosystems. Current population management strategies are ineffective at best, requiring extensive, labor-intensive manual removal. This project endeavored to determine whether decoys of female Jackson’s chameleons deployed in the field would visually attract males in their arboreal habitat, concentrating them and making them more easily accessible for removal by resource managers. This hypothesis was tested by producing a number of female decoys of varying size and deploying them in the field; effectiveness was assessed via proximity to decoys. However, during this experiment, I failed to observe an increase in the number of male chameleons in the area immediately surrounding the decoys. These results are not prohibitive, as the experimental design used did not allow for absolutely certainty of chameleon presence or absence. Additional trials coupled with a modified experiment design may yet produce the desired response. If successful, the use of decoys in the field could provide a scalable, cost-effective solution to controlling Jackson’s chameleon populations, ultimately helping to protect sensitive native ecosystems in Hawaii and other areas where non-native Jackson’s chameleons have become established. • Item The Use of the Effluent from Marine Shrimp Culture to Grow Microalgae in Support of Oyster Growth in a Simulated Closed Microcosm Recirculating Aquaculture System (University of Hawaii at Manoa, 2014-09-26) Profita, Elizabeth ; Malecha, Spencer ; Zoology The Pacific white shrimp, Litopenaeus vannamei, is an important species of shrimp due to their ability to survive in low salinities. They are typically found in the Pacific, from Mexico to Peru, in areas that have lower salinities than the typical ocean, making them a beneficial species for aquaculture farming. Shrimp excrete ammonia, a nitrogenous compound, which can build up in aquaculture farms. The goal of my project is to investigate the effects of nitrogenous pollutants on the growth rate of these shrimp. Tanks will be created to simulate normal, medium and highly nitrogenous conditions. Five tanks will be used as the controls and will have normal amounts of nutrients, no nitrogenous pollutants and a normal density. Five other tanks will have 50% and five more tanks will have a 100% increase of nitrogen levels above the control to simulate an aquaculture environment. The water conditions such as pH, temperature, salinity, dissolved oxygen, and total nitrate in the tanks will be monitored daily. The number of larvae in each stage in each tank will be recorded daily and the time between each molt will indicate the growth rate. It is expected that the shrimp in the high nutrient tanks will have a higher growth rate initially, but will decline after a certain level. This research could be beneficial because the threshold for nitrogen levels for Pacific white shrimp cultivation can be determined. • Item Resurveying Of The Marine Environment Of KauaʻI: Views From The Perspective Of Locals And KūPuna (University of Hawaii at Manoa, 2014-09-26) Koethe, Francesca ; Maragos, James ; Zoology In 1983, an initial coastal inventory was produced on Kauaʻi that included an atlas and a narrative inventory report sponsored by the Army Corps of Engineers. This inventory included field surveys at 77 marine and coastal sites around Kauaʻi in 1981 and information on the recreational and historical practices on the coastline perimeter of the island. In addition to recreational uses, status and location of coral and other marine organisms were recorded. Since this date, there has been no island-wide survey of the status of the coastal ecosystems of Kaua‘i. The study is a qualitative investigation of the current status and health of these resources based on interviews with local participants. Eventually, field re-surveys of the island will be accomplished. In addition, the narrative provides cultural features of the areas. It was hypothesized that anthropogenic activities have caused changes in the marine environment based on the perspective of local people, scientists, and na kānaka maoli (Native Hawaiians). Interviews and observational information from locals were collected and analyzed to understand problematic areas. The new interviews and the old narrative were used to collaboratively create newly updated information that would be available to the public. Areas of high priority and changes were highlighted, based on the issues that were revealed during the interviews. Eventually, field teams will use the new narrative for the next phase of the project, which is to conduct surveys at the originally surveyed 77 sites. Furthermore, additional sites will likely be surveyed based on important feedback from the Kauaʻi elders, locals, and scientists. The interviews are an independent but important component of the coastal inventory, and will supplement the marine and coastal surveys in order to gain a better understanding and verify the current status of Kauaʻi coral reefs, beaches and water quality. • Item Nosema ceranae climate and seasonal prevalence in honeybees in Hawaii (University of Hawaii at Manoa, 2014-01-15) Moser, Elena ; Villalobos, Ethel ; Zoology Honeybees have a great influence on humans, not only because of honey production, but also, and more importantly, because of their role as pollinators. It has been estimated that one in every three bites of the food people consume is the result of pollinating activities of honeybees. According to the USDA, approximately 80% of the crops grown in the United States are a result of honeybee pollination (Moisset & Buchmann, 2011). They not only pollinate crops that humans consume, but they also pollinate crops that are utilized as feed for livestock. Given the importance of honeybees for food production, sustainability and health of managed colonies is a priority, not only in our own society, but also the world. • Item Behavioral Ecology and Evolution of Hawaii's Endemic Carnivorous Caterpillars (Lepidoptera: Cosmopterigidae Hyposmocoma spp.) (University of Hawaii at Manoa, 2013-07-16) Williams, Zachary ; Holland, Brendan The endemic Hawaiian moth genus Hyposmocoma includes hundreds of species, providing dramatic examples of explosive radiation and ecological specialization. Many of these species exhibit typical caterpillar feeding ecology, consuming plant material, including aquatic algae-grazing and fern stem-boring. However, one clade deviates from this norm and has developed carnivorous behavior, an extremely rare trait in Lepidoptera worldwide. These species demonstrate behavior ranging from simple scavenging to molluscivorous prey capture, and their behavioral ecology and morphology reflects this. Here I investigate the degree of specialization and variation in behavior and morphology of several species of carnivorous Hyposmocoma, including both described and undescribed species. Observations and analyses are focused on prey preference of the carnivorous, "cigar" case clade, and mandible morphology within this and other Hyposmocoma groups. My results demonstrate that prey preference varies among species within the carnivorous clade, and ranges from arthropod scavenging to specialized snail capture behavior. The genus Hyposmocoma exhibits extraordinary diversity in terms of: number of species, caterpillar case morphology, feeding behavior (from algae eaters in streams to obligate snail eaters in native forests) and preferred habitat (from dry lowland forests to upper elevation cloud forest, to streams). This study set out to investigate whether similar levels of polymorphism exist in mandible microstructure. My hypothesis was that with so many vastly different natural history traits, a feature with critical adaptive function such as mandible morphology will reflect this dramatic level of variation. However, an unexpectedly low level of variation was observed. Mandible microstructure was found to be highly conserved, whether preferred feeding type included wood boring or snail feeding. Possible reasons for mandible structure conservation include recent speciation events, and the possibility that the structure observed across the genus is versatile enough such that it is functionally effective in diverse settings. Continued analyses of Hyposmocoma ecology, behavior, and morphology will prove useful in phylogenetic inference, and warrants continued study alongside ongoing molecular research. • Item Behavioral Response of the O’ahu ‘amakihi to Experimental Infection with Avian Malaria (University of Hawaii at Manoa, 2010-05-11) Fisher, Danielle ; Freed, Leonard Avian malaria (Plasmodium relictum), like other introduced diseases, is considered one of the greatest threats to the recovery of Hawaiian forest birds. Most bird species survive only at high elevations. The O’ahu ‘amakihi (Hemignathus flavus) is one of few species that has stable and widespread populations in low elevation forest habitat. This study is part of a larger project that experimentally infected O’ahu ‘amakihi with avian malaria to determine how they deal with this disease at low elevation. My objective is to determine if behavioral changes during the course of infection could be used to document tolerance to the disease. The study used four experimentally infected birds as the treatment group, and four uninfected birds as a control group. All bird activity was recorded and processed using the data analysis program BEAST (Student Version 1.0) and analyzed with respect to changes in parasitemia (percentage of infected erythrocytes). Behavioral variation was tested using a mixed model analysis of variance (ANOVA), which could identify differences between infected and control groups as well as between time periods. Focused contrasts could test effects of different time periods. Percent of observation time spent sitting was the only behavior that differed significantly between infected and control birds. Sitting varied with degree of infection, climaxing during the crisis phase and returning to pre-infection levels, indicating recovery. There was no loss of mass or signficant decline in nectar consumption. The O’ahu ‘amakihi thus shows low morbidity, which may account for their continued survival in low elevation forest habitats where avian malaria is prevalent.
ESSENTIALAI-STEM
Talk:List of people from Calderdale Halifax I have removed the following content from the Halifax, West Yorkshire article. It was unreferenced. It could be used to reconstruct material at this page..... with sources this time though please: * Tom Bailey, singer with the Thompson Twins * Phyllis Bentley, novelist * Henry Briggs, mathematician * John Reginald Halliday Christie, the murderer from 10 Rillington Place * Keith Clifford, actor, in Last of the Summer Wine & Coronation Street * Daniel Coll, actor, appeared in Emmerdale (ITV Drama, UK) * Shirley Crabtree, wrestler Known as 'Big Daddy' * George Dyson, composer * Tony Field, footballer * Stuart Fielden, rugby league footballer * David Hartley, philosopher * Nick Holmes, musician * Charles Horner, jeweller and inventor of the Dorcas thimble * Barrie Ingham, actor * Paddy Kenny, footballer * John Kettley, weatherman * Nick Lawrence, radio presenter * Anne Lister, diarist and former owner of Shibden Hall * John Mackintosh, created Mackintosh's Toffee, which became Rowntree Mackintosh * Harold Vincent Mackintosh 1st Viscount Mackintosh of Halifax & chocolate manufacturer * Thomas Milner, actor * Brian Moore, rugby union footballer, TV Presenter, Pundit and Journalist * Thomas Nettleton, local physician who carried out some of the earliest systematic programs of smallpox vaccination * John Noakes, TV presenter * John Pawson, architect * Carolyn Pickles, actress * James Pickles, judge * Wilfred Pickles, actor, comedian & broadcaster * Kathryn Pogson, actress * Eric Portman, actor * Jesse Ramsden, inventor of the Ramsden theodolite * Sir Richard Saltonstall, colonist * Sir Henry Savile, bible translator * Percy Shaw, inventor of Cat's Eyes, used on public roads * Robin Simon, guitarist * Herbert Akroyd Stuart, inventor of the Hot Bulb Engine (ancestor to the diesel engine) * John Tillotson, Archbishop of Canterbury (1691–1694) * Brian Turner, chef, restaurateur and TV personality * Séan Walsh, local poet, writer & artist * Emma Williams (actress), West End musical theatre actress * John Wolfenden, Baron Wolfenden, chairman of the Wolfenden committee * Matthew Wolfenden (actor), actor in ITV's Emmerdale * Patrick Woodroffe, science fiction and fantasy artist * Frank Worthington, footballer Hope that helps, --Jza84 | Talk 23:36, 21 February 2010 (UTC) * Does the linked article on the person count as a reference? I reckon it does, and am inclined to restore this information to the Halifax article. Mr Barndoor (talk) 13:40, 28 April 2011 (UTC) * No - as wiki cannot be used as a reference and the linked article can be changed to remove the association to the place without anyone realising it is used as an indirect reference. Each entry in this article should have a reliable source added to show the association of the person to the place. Keith D (talk) 20:16, 9 May 2011 (UTC) Hebden Bridge Ditto, the following was removed from Hebden Bridge but could also be used: * Bogshed, cult 1980s indie group hailed from the town * Jane Cox actress who plays Lisa Dingle in Emmerdale * John Fawcett theologian and founder of Hope Baptist Church * Stuart Fielden Great Britain rugby league player * Eric Harrison former footballer and Manchester United youth team coach. * Ursula Holden-Gill (born 1974) TV actress (Emmerdale, Holby City, Teachers, The Bill) * Ted Hughes was born in Mytholmroyd * Bernard Ingham Prime Minister Margaret Thatcher's press secretary * Harry Mortimer composer and conductor * Thomas Nelstrop, actor and comedian * Alice Nutter from the band Chumbawamba * Sylvia Plath is buried in nearby Heptonstall * Jane Lumb, 1960s fashion model * Dario Coates, actor who plays Alex Neeson in Coronation Street * Steve Tilston, English folk singer-songwriter Again, hope that helps, --Jza84 | Talk 23:39, 21 February 2010 (UTC) Mytholmroyd From Mytholmroyd is supposedly: * John Duttine an actor (Sgt Miller, Heartbeat 2004-present) and his actress wife Mel Martin live nearby. * Ted Hughes * Bernard Ingham * Innes Ireland * Emilio Tightman --Jza84 | Talk 23:40, 21 February 2010 (UTC) * You should get out more. It would save Wikipedia from your absurd deletions. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 09:27, 23 November 2010 (UTC) Geoff Crowther I've removed this for the moment, as there is no indication of what his link to Calderdale is, and I can't find any appropriate reference. If you can, then please feel free to add him back. * Geoff Crowther (born 1944), head of BIT travel guides, London (1972-1977) one of the first guidebooks to cover the Hippie trail. Geoff became an internationally recognised patron saint of travellers in the third world and went on to be one of the pioneering authors for Lonely Planet (1977-1995). External links modified Hello fellow Wikipedians, I have just modified 2 external links on List of people from Calderdale. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20100103044958/http://www.juliekirkbride.com/ to http://www.juliekirkbride.com/ * Added archive https://web.archive.org/web/20040312081747/http://www.halifaxtoday.co.uk/mk4custompages/CustomPage.aspx?PageID=39556 to http://www.halifaxtoday.co.uk/mk4custompages/CustomPage.aspx?PageID=39556 Cheers.— InternetArchiveBot (Report bug) 17:56, 22 May 2017 (UTC)
WIKI
Court bars Tribune Co creditors from unwinding 2007 buyout WILMINGTON, Del (Reuters) - A U.S. Appeals Court has ruled that creditors of the Tribune Co cannot claw back the $8 billion paid to the multimedia company’s public shareholders nearly a decade ago in a buyout that was blamed for its bankruptcy. The ruling stems from the sprawl of litigation sparked by the 2007 buyout led by real estate mogul Sam Zell. A little over a year later, the publisher of the Chicago Tribune and Los Angeles Times filed for bankruptcy. Tribune emerged from bankruptcy in 2012 and junior creditors were repaid about a third of what they were owed. However, in a bid to recover more, they have spent years battling through the courts, using sometimes novel legal theories. In 2007, Tribune borrowed $11 billion and then used the money to buy its publicly traded stock and take the company private. Under the creditors’ view, borrowing the money rendered Tribune insolvent and public shareholders received more than reasonable value for their stock; therefore, some of that money could be potentially clawed back as a fraudulent conveyance. The U.S. Appeals Court for the Second Circuit in New York, however, found the buyout was protected by the Bankruptcy Code’s so-called “safe harbor.” The provision seeks to prevent turmoil in financial markets by ensuring securities transactions cannot be unwound except where there is intentional fraud. To allow the creditors to claw back funds paid so long ago “would seriously undermine, a substantial understatement, markets in which certainty, speed, finality and stability are necessary to attract capital,” said the court. The 53-page opinion by Judges Christopher Droney, Ralph Winter and Alvin Hellerstein said if the creditors’ theory were upheld, it would expose any investor who sold in a buyout to potential liability if the firm later went bankrupt. Roy Englert, an attorney with Robbins, Russell, Englert, Orseck, Untereiner & Sauber who represented the creditors, did not immediately respond to a request for comment. Philip Anker of Wilmer Cutler Pickering Hale and Dorr, who represented financial institutions in the case, declined to comment. He was one of many attorneys defending against the creditors’ lawsuit. A separate case on behalf of Tribune creditors, pursuing similar claims under federal law, is still pending. The Tribune ruling could make it harder for creditors to pursue a similar ongoing case involving the 2007 buyout of the Lyondell Chemical Co, which ended up in bankruptcy in 2009. Editing by Bernadette Baum
NEWS-MULTISOURCE
Solar Wreath Solar Wreath is a 1997 sculpture by American artist Larry Kirkland, located on the third floor of the Central Library in Portland, Oregon. Funded by public and private donations funneled through the advocate and support group Friends of the Multnomah County Library, the abstract suspended gilded ring measures 9 feet, 4 inches x 12 feet and is made of aluminum and brass or gold leaf. According to the Regional Arts & Culture Council, which administers the work, Solar Wreath is part of the artist's "Garden of Knowledge" series, which also includes Garden Stair and Garden Wreath (1997). These three works relate "in form, materials and metaphor", illustrating Kirkland's belief that the library is "a place where people explore, uncover and learn". They were installed before the library building's re-opening in April 1997 after being closed for renovation for more than two years. Solar Wreath is part of the City of Portland and Multnomah County Public Art Collection courtesy of the Regional Arts & Culture Council.
WIKI
Bo Donaldson and The Heywoods Bo Donaldson and The Heywoods are an American pop music group, known mainly for their 1970s hit singles, "Billy Don't Be a Hero" and "Who Do You Think You Are". History The band was formed in Cincinnati, Ohio in 1965 by their leader, Robert Walter "Bo" Donaldson. They were first discovered while touring with The Osmonds in the early 1970s and signed with Family Productions, releasing their first single in 1972, "Special Someone", but their big break came after moving to ABC Records and working with the record producer Steve Barri in 1973. Although their first single with ABC, "Deeper and Deeper,” failed to make a big impression on the charts, beginning in 1974, the band began a string of hit songs. Their first two (and largest two) hits were cover versions of British hit songs whose original versions had not been hits in the U.S.: "Billy Don't Be a Hero" (a cover of a #1 UK Paper Lace song that reached #1 for 2 weeks on the Hot 100 with the Heywoods version) and "Who Do You Think You Are" (written by Clive Scott & Des Dyer of Jigsaw, which originally became a hit for Candlewick Green and reached #15 on the Hot 100 with the Heywoods version). They were followed by their last top-40 hit, "The Heartbreak Kid" (#39 Hot 100), and their ominously titled last Hot 100 hit, "Our Last Song Together" (#95 on the Hot 100, another UK hit, originally recorded by its songwriter Neil Sedaka). "Billy Don't Be a Hero" sold over three and a half million copies, receiving a gold disc by the R.I.A.A. in June 1974. Despite the song's popularity, many people disliked it, and it was voted #8 on Rolling Stone magazine's readers' poll of "10 Worst Songs of the 1970s." After their initial popularity, they began a migration across three other record labels as the hits dried up by the end of the decade. In 1975, the band was working on a second album of material for ABC including "Our Last Song Together", released as a single (and which made the pop chart), and "Take Me Make Me Yours", which to this day remains unreleased. Ultimately the group left the label and joined Capitol Records, where they recorded songs by Nicky Chinn and Mike Chapman, the writing/producing team behind the UK act The Sweet, and released the album "Farther On" in 1975. By 1978, they were known as "The Bo Donaldson Band" and eventually split after trying country music with no success in the 1980s. They reformed again in 1996 as a nostalgia act and still make appearances, most notably in the Barry Williams hosted nostalgia show, Original Idols Live. In 1996, Varese Vintage Records released Best of Bo Donaldson and the Heywoods, a 15-song compilation of material originally released on Family Productions (1972) and ABC Records (1973–1975). The CD contains all their charted singles and, in fact, includes 9 of the 11 songs featured on the 1974 LP Bo Donaldson and the Heywoods (#97 on the Hot 200). The CD booklet includes liner notes written by Gordon Pogoda and the CD features such highlights as "Who Do You Think You Are", "The House on Telegraph Hill", and "The Heartbreak Kid". Lead singer and trumpeter Mike Gibbons died on April 2, 2016, at age 71. Members * Robert Walter "Bo" Donaldson - keyboards * Mike Gibbons - lead vocals and trumpet * David Krock - bass guitar and backing vocalist * Rick Joswick - lead vocals and tambourine * Gary Coveyou - saxophone, flute, and backing vocalist * Baker Scott - guitar (1974) * Richard Brunetti - drums Albums * Special Someone (Family, 1972) * ''Bo Donaldson & The Heywoods (ABC, 1974) (# 97 Billboard Magazine Hot 200) * Farther On (Capitol, 1975) * The Best of Bo Donaldson & The Heywoods (CD, Varese Sarabande, 1996) Singles * "Special Someone" (U.S. Billboard #64, Cashbox #51, 1972) * "Deeper and Deeper" (U.S. Cashbox #107, 1974) * "Billy, Don't Be a Hero" (U.S. #1, AC #20; Canada #1, 1974) * "Who Do You Think You Are" (U.S. #15, AC #19; Canada #11, Australia #64 1974) * "The Heartbreak Kid" (U.S. Billboard #39, 1974)(Cashbox # 41; Canada #47 ) * "The House on Telegraph Hill" (U.S. Cashbox #89, 1975) * "Our Last Song Together" (U.S. Billboard #95, 1975) * "A Fool Like You" (1976)
WIKI
Barrie Tomlinson Barrie Tomlinson is a former editor and writer of British comics in the 1970s and '80s. Tomlinson began his career at IPC Magazines in 1961, initially as a writer and then later as sub-editor on the comics Lion (1961–1967) and then Tiger, becoming editor of the latter title in 1969. He later became the founding editor of the comics Roy of the Rovers (1976), Speed (1980), Scream! (1984), Wildcat (1988) and Teenage Mutant Hero Turtles (1990). He became Group Editor for Sports and Adventure in 1976, and oversaw the launch of the new Eagle in 1982, something for which he had long campaigned. Tomlinson wrote most of the stories in Wildcat, as well as "Death Wish" for Speed, all of which continued to appear in Eagle after the cancellation of the comics in which they had originated. He also wrote "Survivor" for Eagle. Tomlinson has written two books of memoirs about his career in the British comics industry: * Real Roy of the Rovers Stuff, Pitch Publishing, ISBN 978-1785-31212-0, October 2016 * Comic Book Hero, Pitch Publishing, ISBN 978-1785-31324-0, September 2017
WIKI
API Driven Metal = OpenCrowbar + Chef Provisioning The OpenCrowbar community created a Chef-Provisioning driver that allows you to quickly build hardware clusters using Chef cookbooks. 2012-08-05_14-13-18_310When we started using Chef in 2011, there was a distinct gap around bootstrapping systems.  The platform did a great job of automation and even connecting services together (via the Search anti-pattern, see below) but lacked a way to build the initial clusters automatically. The current answer to this problem from Chef is refreshingly simply: a cookbook API extension called Chef Provisioning.  This approach uses the regular Chef DSL in recipes to create request and bind a cluster into Chef.  Basically, the code simply builds an array of nodes using an API that creates the nodes if they are missing from the array in the code.  Specifically, when a node is missing from the array, Chef calls out to create the node in an external system. For clouds, that means using the API to request a server and then inject credentials for Chef management.  It’s trickier for physical gear because you cannot just make a server in the configuration you need it in.  Physical systems must first be discovered and profiled to ready state: the system must know how many NICs and disk drives are available to correctly configure the hardware prior to laying down the Operating System. Consequently, Chef Provisioning automation is more about reallocation of existing discovered physical assets to Chef.  That’s exactly the approach the OpenCrowbar team took for our Chef Provisioning driver. OpenCrowbar interacts with Chef Provisioning by pulling nodes from the System deployment into a Chef Provisioning deployment.  That action then allows the API client to request specific configurations like Operating System or network that need to be setup for Chef to execute.  Once these requests are made, Crowbar will simply run its normal annealing processes to ready state and then injects the Chef credentials.  Chef waits until the work queue is empty and then takes over management of the asset.  When Chef is finished, Crowbar can be instructed to reconfigure the node back to a base state. Does that sound simple?  It is simple because the Crowbar APIs match the Chef needs very cleanly. It’s worth noting that this integration is a great test of the OpenCrowbar API design.  Over the last two years, we’ve evolved the API to make it more final result focused.  Late binding is a critical concept for the project and the APIs reflect that objective.  For Chef Provisioning, we allow the integration to focus on simple requests like “give me a node then put this O/S on the node and go.”  Crowbar has the logic needed to figure out how to accomplish those objectives without much additional instruction. Bonus Side Note: Why Search can become an anti-pattern?   Search is an incredibly powerful feature in Chef that allows cross-role and cross-node integration; unfortunately, it’s also very difficult to maintain as complexity and contributor counts grow.  The reason is that search creates “forward dependencies” in the scripts that require operators creating data to be aware of downstream, hidden consumers.  High Availability (HA) is a clear example.  If I add a new “cluster database” role to the system then it is very likely to return multiple results for database searches.  That’s excellent until I learn that my scripts have coded search to assume that we only return one result for database lookups.  It’s very hard to find these errors since the searches are decoupled and downstream of the database cookbook.  Ultimately, the community had to advise against embedded search for shared cookbooks 4 thoughts on “API Driven Metal = OpenCrowbar + Chef Provisioning 1. Great writeup, Rob. A small note: Chefs might bristle at calling it a DSL. Chef recipes are pure ruby. A larger note, and beyond the scope of this post – but it’s worth mentioning: The eventual consistency model embodied in the Chef search feature does have its important place in service discovery and hands-off management. Great products like Consul and other distributed databases make it a much safer model. Wrapping both models – eventual consistency and directed graph – into one comprehensible whole is just what Crowbar’s Annealer gives you… You might want to link your posts about that here. Thanks for the nice write up! Like • > Chefs might bristle at calling it a DSL. Chef recipes are pure ruby. No bristling. Chef provides a DSL that written in Ruby. That DSL implements the Resource/Provider model as well as other features. Because we use Ruby, you can insert Ruby in a recipe at any time. Chef-Provisioning extends the DSL to implement resources (and providers) to manage infrastructure components, such as instances, load balancers, and bare metal. Rob was spot on in his description of Chef and is how we at Chef explain it to new Chef users. Liked by 1 person 2. Pingback: Manage Hardware like a BOSS – latest OpenCrowbar brings API to Physical Gear | Rob Hirschfeld Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out /  Change ) Google+ photo You are commenting using your Google+ account. Log Out /  Change ) Twitter picture You are commenting using your Twitter account. Log Out /  Change ) Facebook photo You are commenting using your Facebook account. Log Out /  Change ) Connecting to %s
ESSENTIALAI-STEM
Getting issues running 10 DVD drives on single system Windows 7 Hi! Im new to this so here goes my question / problem. I havea customer that has a computer that he uses to burn a ton of movies that he records from events. He had a pc with 10 dvd writers in it that was running on windows xp no problems. The old ide controller cards didnt work with windows 7 so i bought 2 new Silicon Image ATA133 RAID cards, and flashed their bioses to make them ata133 controllers not raid. The drivers are all okay in windows 7 professional 32bit with nothing hookedi nto any ide ports on the pc all is well. Ill post specs b4 the next part myb theres some bug i dont know about. Motherboard: Gigabyte - GA-EP41-US3L Processor: Intel - core 2 duo e5300 Ram: Kingston - 2 gb pc6400 Graphics: Nvidia Geforce 210 512mb OS: Windows 7 Professional IDE Controllers: Silicon Image ATA 133 0680 Controller. Okay so the issue is that i can hook up 2 ide cables with 2 dvd drives on each 1 master 1 slave and the pc sees all 4 no probs. I then connect one more cable to the primary slot on the 2nd ide controller also with 2 drives attached, and the pc sees now 6 drives all is well!, This is where the problem comes. If i connect one more drive either onboard ide or in the 2nd ide slot on the 2nd ide controller or via a pci-e ide expansion, windows bugso ut and shows it as a questionmark harddrive. It will do this regardless if i connect 3,4,5 more drives its like he refuses to take more than 6. There was at some point i had him seeing 9 drives but stillt hat one drive that was a questionmark. It slows down the entire system and is a headache, i still havent solved it and am desperate for help. Basically i need to know why this is happening, if its windows 7 or the bios or some other odd reason i havent looked at. I can provide more info if needed. If any1 knows a fix ill be greatfull, i really need this system running 10 dvd drives no problem. Oh yeah btw, i have tried replacing all 10 drives with new ones and still acts stupid, also tried building the same setup on another pc in windows xp and it worked flawlessly. HELP! 3 answers Last reply More about getting issues running drives single system windows 1. I'm not sure if I understood you completely, but wouldn't everything work when hooked up to one or two SATA PCI cards? 2. Do you mean he was burning 10 copies of the same recorded event simultaneously or do you mean he was burning 10 copies of 10 different recorded events simultaneously? 3. Hey. I seem to have solved the issue. The problem was Windows 7 was running some sort of hardware driver installation but without actually saying it was doing just that. After i left the pc running for an hour and then rebooted it (it took the pc about 35 minutes to reboot, lol) it all worked. Not sure why this happend but im glad it finally worked, and yeah it really shouldnt be an issue but who knows. Thanx for your replies and sorry if my post was unclear in any way. Ask a new question Read More Windows 7 Components
ESSENTIALAI-STEM
List of stadiums in Angola This is a list of sports stadiums in Angola, ranked in descending order of capacity. Stadiums in Angola with a capacity of 7,000 or more are included, even though the list is incomplete.
WIKI
IMAGE: Private Japanese rocket crashes to Earth in fiery launch failure A private Japanese rocket bursts into flames as it crashes to Earth after a failed launch attempt in Taiki, a town on Japan's northernmost island of Hokkaido, on June 30, 2018. The rocket, Momo-2, would have been the first privately built Japanese rocket to reach outer space. (Kyodo News/Getty) A private Japanese rocket crashed to Earth in a fiery explosion on Saturday (June 30) just moments after lifting off from a test site near the town of Taiki on Japan&aposs northern island of Hokkaido. This was the second failed launch attempt for the startup Interstellar Technologies, which became the first Japanese company to launch a privately funded space rocket 11 months ago, on July 30, 2017. Its first rocket, Momo-1, crashed into the ocean after losing contact with flight controllers about 70 seconds after liftoff,  The Japan Times  reported. Its second mission, Momo-2, went out with more of a bang. After lifting off at 5:30 a.m. local time on June 30 (8:30 p.m. GMT on June 29), the uncrewed rocket had barely left the launchpad before it lost its upward thrust and succumbed to gravity, smashing back down onto the launchpad after less than 10 seconds of flight. [ Why Do Rockets Explode? ] Interstellar Technologies President Takahiro Inagawa told reporters that Momo-2 lost thrust 4 seconds after liftoff and that a glitch with the rocket&aposs main engine was likely to blame, according to The Japan Times. The rocket was originally scheduled to launch in April, but the mission was delayed when engineers discovered a nitrogen leak. More From Space.com The Japan Times Why Do Rockets Explode? The Asahi Shimbun Falcon 9 rocket "We have never seen a failure like this," Takafumi Horie, founder of Interstellar Technologies, told reporters, according to the Japanese newspaper  The Asahi Shimbun . "We are thinking about what we can do to maintain some tie to the next step even as the future remains barely visible." The Asahi Shimbun reported that there were no injuries from the accident. However, employees watching the launch about one-third of a mile (0.6 kilometers) from the pad were ordered to evacuate after the explosion. The Momo rocket is a small launch vehicle designed to lower the cost of launching satellites into space. It stands 33 feet (10 meters) tall and weighs about 1 metric ton. For contrast, SpaceX&aposs  Falcon 9 rocket  is about as tall as seven Momo rockets and weighs more than 540 tons. However, a Momo rocket launch costs only $440,000, compared with the $50 million it costs to launch a Falcon 9. Interstellar Technologies, which was founded in 2003, hopes to begin launching small satellites into orbit by 2020. While a second launch failure might force the company to push back that goal, Inagawa remained optimistic. "We could not accomplish what we were expected to do. I feel sorry for that," Inagawa said at a news conference. "I feel that I would like to keep giving it a shot." Original article on  Space.com .
NEWS-MULTISOURCE
Steven Lerud Steven James Lerud (born October 13, 1984) is an American former professional baseball catcher, who is currently a manager in the Chicago Cubs organization. During his playing days, he briefly played in Major League Baseball (MLB) for the Philadelphia Phillies (2012–2013). Early life Steven Lerud was born in Reno, Nevada. Lerud attended to Galena High School, in Reno, Nevada. Pittsburgh Pirates Lerud was drafted by the Pittsburgh Pirates in the third round of the 2003 MLB Draft. On November 9, 2009, he elected free agency. Kansas City Royals On December 7, 2009, he signed a minor league deal with the Kansas City Royals. Baltimore Orioles Lerud was acquired by the Baltimore Orioles on March 27, 2010. He elected free agency on November 6, 2010 and re-signed on a minor league deal on December 26, 2010. Lerud elected free agency again on November 2, 2011. Philadelphia Phillies On December 9, 2011, Lerud signed a minor league deal with the Phillies, who promoted him to the big leagues on August 24, 2012. He appeared in 3 MLB games in 2012, batting .200, in 10 at-bats. Lerud was subsequently dropped from the 40-man roster after the end of that season, but signed a 2013 minor league contract with the Phillies' organization. He appeared in 6 major league games with the Phillies in 2013, going hitless in 5 at-bats. Lerud elected free agency on October 1, 2013. Atlanta Braves He signed a minor league deal with the Atlanta Braves on November 11, 2013 and received a non-roster invitation to Major League spring training. Washington Nationals On January 12, 2015 Lerud signed a minor league deal with the Washington Nationals he was assigned to Triple–A Syracuse Chiefs the same day. He elected free agency on November 7. Seattle Mariners On February 3, 2016, Lerud signed a minor league deal with the Seattle Mariners and received an invite to spring training. He was released by the Mariners on April 7. San Francisco Giants On April 27, 2016, Lerud signed a minor league deal with the San Francisco Giants. He elected free agency on November 7, 2016. Texas Rangers On January 5, 2017, Lerud signed a minor league contract with the Texas Rangers that included an invitation to spring training. He did not appear in a game for the organization and elected free agency following the season on November 6. Coaching career On January 19, 2018, Lerud was named as manager of the Minor League Baseball (MiLB) Class A Short Season Eugene Emeralds, a Northwest League affiliate of the Cubs. In 2019, Lerud was named as manager for the Myrtle Beach Pelicans, Class A Advanced affiliate for the Chicago Cubs.
WIKI
Carole Lieberman Carole Lieberman is an American medical doctor, psychiatrist, and author who has provided expert witness testimony for cases that have included the murder of Scott Amedure. She gained attention in 2011 due to comments she made suggesting video games cause aggression and lead to sexual assault. Biography Carole Lieberman was born and raised in New York City. She received her medical degree from Belgium's Université Catholique de Louvain and received her psychiatric residency training at New York University, Bellevue, where she was Chief Resident. She studied in London, England at the Anna Freud Hampstead Clinic as well as the Institute of Psychiatry/Maudsley Hospital. She is a diplomate of the American Board of Psychiatry and Neurology. She received her Master's of Public Health degree from the University of California, Los Angeles where she also serves as a member of Clinical Faculty in the department of Psychiatry. Lieberman has appeared as a media expert for TV news, radio talk shows, print publications, and other media outlets. She has appeared on The Dr. Phil show; The Insider: Celebrity Stalking and the Role of Social Media, CBS news, NBC news, ABC news, KTLA news, The Morton Report, news blogs and other media resources in both the U.S. and abroad. Lieberman has appeared before the United States Congress providing testimony at the Congressional Hearing of the Subcommittee on National Security, International Affairs, and Criminal Justice of the Committee on Government Reform and Oversight - "Report from the Front Line: The Drug War in Hollywood"; she provided a statement at U.S. Senator Kent Conrad (D-North Dakota) Press Conference to announce the formation of a Citizens Task Force on TV Violence; she appeared before the U.S. Senate Judiciary Committee Joint Hearing, Constitution Subcommittee chaired by Senator Paul Simon (D-Illinois) and the House Judiciary Committee's Subcommittee on Crime and Criminal Justice – "10 Point Plan to Sweep Violence Off TV and Off Our Streets" Video games incident During a February 2011 interview with FOX News, Lieberman claimed that there existed a correlation between violent video games and sexual assault: "The increase in rapes can be attributed in large part to the playing out of [sexual] scenes in video games". However, in Wired magazine, journalist Jason Schreier wrote that when asked "multiple times to clarify her comments, she failed to cite a single study, statistic or piece of evidence that proved her point." Lieberman eventually responded with a single study to support her case as of February 14, 2011: "Violent Video Game Effects on Aggression, Empathy, and Prosocial Behavior in Eastern and Western Countries: A Meta-Analytic Review". However, the article makes no mention of sexual crime. Her claims were also ridiculed by Douglas Gentile, a professor at Iowa State University who studies the relationship between media and violence. Gentile, who "has been researching violence in media since 1999 [and] has written books and studies about the psychological effects of videogames," said of Lieberman's claims: "I don't know where [she] would get any evidence for this opinion. There's really very little to substantiate her claims in research literature." The Amazon.com ratings of Lieberman's books plummeted, apparently in response to this controversy. Books and publications * Bad Girls: Why Men Love Them & How Good Girls Can Learn Their Secrets, Cogito Media 2010 ISBN 978-2-923865-12-6 * Coping with Terrorism: Dreams Interrupted, co-authored by Mike Darton. European Atlantic Publications 2006 ISBN 978-1-905770-02-1 * Bad Boys: Why We Love Them, How to Live with Them & When to Leave Them Dutton/Signet 1997 ISBN 0-525-94116-9 * Reflection of the Early Theological Education of Martin Heidegger (a psychological profile), Journal of Religious Studies, 9 #2: 34-41 * Problems of Women Psychiatric Residents Psychiatric Quarterly, 53 #3: 175-177 * "Schizo-Affective Illness Defies the Dichotomy...And Keeps DSM III Pondering," Schizophrenia Bulletin, 5 #3: 436-440 * "The Existential 'School' of Thought...A Study of Existentialism and Education," The Clearing House * "Ambiguity in the Treatment of the Concept of God in Sein and Zeit (Being and Time) as a Reflection of the Early Theological Education of Martin Heidegger" (a psychological profile), Journal of Religious Studies, 9 #2: 34-41 * "Compulsive Shopping" – Encyclopædia Britannica
WIKI
TY - CONF AU - Rejiba, Z. AU - Masip, X. AU - Marin, E. T3 - 29th IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications PY - 2018 Y1 - 2018 SP - 1 EP - 6 PB - Institute of Electrical and Electronics Engineers (IEEE) DO - 10.1109/PIMRC.2018.8580822 UR - https://ieeexplore.ieee.org/document/8580822 AB - In order to fully leverage idle computational resources in a fog computing scenario, a suitable discovery mechanism is needed. Within this context, F2C-Aware has been proposed in a previous work as a discovery solution where a device can detect nearby fog resources by scanning for custom 802.11 beacons being broadcast by those resources. Since mobility is an inherent characteristic in fog computing, keeping the Wi-Fi-based discovery service always on during mobility will lead to unnecessary scans being performed in non-covered areas, causing energy consumption penalties. That is why, in this paper, we propose a Beacon-assisted Direction-aware Scanning Scheme (BDSS), where we use the discovery beacon to convey the distance remaining until a next fog will be reached in each of the four cardinal directions along with the channel used for beacon advertisements. Therefore, the scan will be disabled until the next fog is reached. Emulation results show that by using this scheme, considerable energy savings could be made while maintaining a high discovery rate. T2 - IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications TI - A Beacon-assisted direction-aware scanning scheme for 802.11-based discovery in Fog-to-Cloud systems ER -
ESSENTIALAI-STEM
Talk:Field Trip Procedures I can see where this might be merged with field trip - but the current definition of field trip is broader where school field trip includes specifics that teachers and students, generally in the k-12 range, both experience and engage in * That may be true, however, most of what's on the page here is a not viable wikipedia content. WP is not a how-to manual, so the step-by-step process descriptions don't belong here. Lots of info is fairly obvious: of course one plans ahead, further ahead if possible, and the timeframes for it are a useless di(tri?)chotomy; getting approval is a no-brainer too; etc.). And some parts appear specific to certain localities (who approves, what kinds of planning, approvals, and permissions are required, etc.). Need to reflect a global perspective, or else explain how it's locale-specific and talk about it generically, or else explain why something that is of such limited region is notable to those outside. DMacks 05:52, 2 February 2007 (UTC)
WIKI
Our volunteers haven't translated this article into 한국어 yet. Join us and help get the job done! You can also read the article in English (US). The DOMTokenList interface represents a set of space-separated tokens. Such a set is returned by Element.classList, HTMLLinkElement.relList, HTMLAnchorElement.relList or HTMLAreaElement.relList. It is indexed beginning with 0 as with JavaScript Array objects. DOMTokenList is always case-sensitive. Properties This interface doesn't inherit any property. DOMTokenList.length Read only Is an integer representing the number of objects stored in the object. Methods This interface doesn't inherit any method. DOMTokenList.item() Returns an item in the list by its index (or undefined if the number is greater than or equal to the length of the list, prior to Gecko 7.0 returned null) DOMTokenList.contains() Returns true if the underlying string contains token, otherwise false DOMTokenList.add() Adds token to the underlying string DOMTokenList.remove() Removes token from the underlying string DOMTokenList.replace() Replaces an existing token with a new token. DOMTokenList.supports() Returns true if a given token is in the associated attribute's supported tokens. DOMTokenList.toggle() Removes token from string and returns false. If token doesn't exist it's added and the function returns true DOMTokenList.entries() Returns an iterator allowing to go through all key/value pairs contained in this object. DOMTokenList.forEach() Executes a provided function once per DOMTokenList element. DOMTokenList.keys() Returns an iterator allowing to go through all keys of the key/value pairs contained in this object. DOMTokenList.values() Returns an iterator allowing to go through all values of the key/value pairs contained in this object. Specifications Specification Status Comment DOM The definition of 'DOMTokenList' in that specification. Living Standard Initial definition Browser compatibility Feature Chrome Firefox (Gecko) Internet Explorer Opera Safari (WebKit) Basic support (Yes) (Yes) 10 (Yes) (Yes) Feature Android Android Webview Firefox Mobile (Gecko) IE Phone Opera Mobile Safari Mobile Chrome for Android Basic support ? (Yes) ? ? ? ? (Yes) See Also 문서 태그 및 공헌자  최종 변경: teoli,
ESSENTIALAI-STEM
Page:Hindu Tales from the Sanskrit.djvu/56 did was to irrigate the land; that is to say, he made canals into which water was made to flow in times when there was plenty of rain, so that there was no danger of there being another famine, such as that which had driven his father and uncles away. The country in which he lived became very fruitful; everybody had enough to eat and drink; and Putraka was very much loved, especially by the poor and unhappy. When the king who ruled over the land died, everybody wanted Putraka to take his place, and he was chosen at once. CHAPTER IV. of the other wise things Putraka did, when he became king, was to make great friends with his Brahman subjects Brahmans are always very fond of travelling, and Putraka thought, if he were good and generous to them, they would talk about him wherever they went, and that perhaps through them his father and uncles would hear about him. He felt sure that, if they knew he was now a king ruling over their native land, they would want to come back. He gave the Brahmans plenty of money, and told them to try and find his father and uncles. If they did, they were to say how anxious he was to
WIKI
Bloomberg spends another $10 million to boost Democrats in final days of midterms (CNN)Former New York Mayor Michael Bloomberg is giving Democratic midterm candidates a last-minute boost, adding another $10 million to his $100 million effort to help Democrats wrest control of Congress away from Republicans. The majority of the new cash will fund an ad buy though Independence USA PAC, Bloomberg's super PAC. The ad will begin airing on television and online in eight cities -- Chicago, Seattle, Detroit, Kansas City, Miami, Orlando, Portland and Atlanta -- on Friday. The ad will also air on national cable outlets, including MSNBC and CNN. The ad buy from Bloomberg, reported first by CNN, comes during what has become an active midterm cycle for a politician who is openly flirting with a 2020 run. The ad slams Republicans for failing to deliver policies that benefit the middle class and suggests that the Democrats are more committed to cutting taxes for the middle class and ensuring health coverage for people with pre-existing conditions. "In Washington, one party is calling the shots and the middle class isn't being heard," a narrator in the ad. "It's clearer than ever that we need a new Congress," Bloomberg said in a statement to CNN. "With the midterm elections less than two weeks away, we're taking this message from coast to coast and urging voters to elect Democrats to the House and the Senate." Bloomberg, who served three terms as mayor, has been crisscrossing the country to speak at events and fundraisers in support of Democratic candidates. During the stops, Bloomberg frequently criticizes Trump's policies and chides Republicans for failing to serve as a check on Trump, stoking further speculation Bloomberg will run for president — an idea he's flirted with during the lead-up to previous election years. Democrats in Washington took Bloomberg's presidential ruminations more seriously, however, after he pledged in June to spend $80 million on behalf of Democrats in the 2018 midterms. He later upped the number to $100 million, a massive amount that has amplified Republican concerns in Washington that Democrats will be able to bury them in ads for the final weeks of the campaign. Bloomberg is already spending on key contested races in expensive media markets. On Thursday, for example, Independence USA will spend $4.5 million for Katie Hill and $4.1 million for Harley Rouda, according to the Federal Election Commission, two California congressional candidates looking to unseat Republicans in the expensive Los Angeles media market. While Bloomberg's giving will give him credibility with Democrats, should he decide to run in 2020 he will have marked hurdles to overcome, too -- namely the fact that Wall Street, something synonymous with the centrist former mayor, has become a bogeyman in left-leaning Democratic politics. Before running for mayor of New York, Bloomberg was a Democrat. He switched parties, registering as a Republican in 2000 to get on the ballot. The Democrats were backing another candidate. Bloomberg switched parties again and registered as an independent in the summer of 2007. Earlier this month, he re-registered as a Democrat. "Even as I support Democrats this fall, I will always believe no party has a monopoly on good ideas. Both sides can learn from each other if we are willing to listen to one another," Bloomberg said at CNN's CITIZEN conference earlier this week.
NEWS-MULTISOURCE
Instance Property timeStep The time interval between updates to the physics simulation. Declaration var timeStep: TimeInterval { get set } Discussion SceneKit processes the physics simulation and updates the state of all physics bodies once per the time interval specified by this property. The default value is 1/60 second (a rate of 60 Hz). A faster simulation rate provides more accuracy in simulation results—such as collisions between fast-moving objects—but at a higher cost in CPU time (which may in turn slow down your app’s rendering frame rate). Typically, you should set this property to match your target rendering frame rate (as defined by the preferredFramesPerSecond property of the SCNView object rendering your scene). See Also Managing the Physics Simulation var gravity: SCNVector3 A vector that specifies the gravitational acceleration applied to physics bodies in the physics world. var speed: CGFloat The rate at which the simulation executes. func updateCollisionPairs() Forces the physics engine to reevaluate possible collisions between physics bodies.
ESSENTIALAI-STEM
How to Set Up Passwords for Apple Wi-Fi by Solomon Poretsky Build a Mac home network using AirPort Extreme, Time Capsule or AirPort Express. Build a Mac home network using AirPort Extreme, Time Capsule or AirPort Express. Justin Sullivan/Getty Images News/Getty Images Apple's AirPort Wi-Fi routers offer a full range of features for your business. They have a dual-band Wireless-N radio which gives you the fastest possible signal while letting your devices use both the 2.4 and 5.0 GHz bands, to minimize interference with other equipment. Apple also includes a USB port for sharing a printer and, on the Extreme version, an external drive. What distinguishes the AirPort from other high-end dual-band routers, though, is the relative ease with which you can set up its security features. Setting Up an AirPort with an iOS Device or Mac 1. Plug your AirPort into the wall and plug the Ethernet cable from your DSL or cable modem into its input. 2. Select the Settings App, then "Wi-Fi," then the "Airport Base Station" on your iOS device. On a Mac, click the Wi-Fi icon showing radio waves in the menu bar and click the menu entry for your new AirPort. 3. Click the "Create a New Network" option. 4. Enter a name for the network, a name for the device and a password for the network's WPA security. You will have to enter the password twice to verify it. 5. Tap or click the "Done" button to finish setting up your AirPort. Setting Up an AirPort with a Windows Computer 1. Plug your AirPort into the wall and plug the Ethernet cable from your DSL or cable modem into its input. 2. Install the AirPort Utility software on your Windows computer by inserting the CD and following the prompts. Once it is installed, start the software by clicking its icon on your desktop or in the Start menu. 3. Select your AirPort router in the utility's window. Wait for it to connect to the router, and click the "Continue" button. 4. Enter a name and password for your AirPort router and click the "Continue" button. This is not the password that your computers will use to connect to the wireless network -- it is the configuration password for the router. 5. Select the "I don't have a wireless network and I want to create one" option from the list of three network setup options. Click "Continue." 6. Enter a name for the network, click the "WPA/WPA2 Personal" box, enter a password for the network and re-enter it for confirmation. Click the "Continue" button. 7. Select the Internet connection choice that corresponds to your service, then click the "Continue" button. The correct option is usually "I use a DSL or cable modem with a static IP address or DHCP." 8. Click the "Update" button, then click the "Continue" button. Once it finishes, you can close the AirPort utility. About the Author Solomon Poretsky has been writing since 1996 and has been published in a number of trade publications including the "Minnesota Real Estate Journal" and "Minnesota Multi-Housing Association Advocate." He holds a Bachelor of Arts, cum laude, from Columbia University and has extensive experience in the fields of financial services, real estate and technology. Photo Credits • Justin Sullivan/Getty Images News/Getty Images bibliography-icon icon for annotation tool Cite this Article
ESSENTIALAI-STEM
skip to main content Search for: All records Award ID contains: 1652694 Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval). What is a DOI Number? Some links on this page may take you to non-federal websites. Their policies may differ from this site. 1. Abstract Modifiers are commonly used in natural, biological, and synthetic crystallization to tailor the growth of diverse materials. Here, we identify tautomers as a new class of modifiers where the dynamic interconversion between solute and its corresponding tautomer(s) produces native crystal growth inhibitors. The macroscopic and microscopic effects imposed by inhibitor-crystal interactions reveal dual mechanisms of inhibition where tautomer occlusion within crystals that leads to natural bending, tunes elastic modulus, and selectively alters the rate of crystal dissolution. Our study focuses on ammonium urate crystallization and shows that the keto-enol form of urate, which exists as a minor tautomer, is a potent inhibitor that nearly suppresses crystal growth at select solution alkalinity and supersaturation. The generalizability of this phenomenon is demonstrated for two additional tautomers with relevance to biological systems and pharmaceuticals. These findings offer potential routes in crystal engineering to strategically control the mechanical or physicochemical properties of tautomeric materials.   more » « less 2. Abstract This work investigates the critical factors impacting electrochemical CO2reduction reaction (CO2RR) using atomically precise Au nanoclusters (NCs) as electrocatalysts. First, the influence of size on CO2RR is studied by precisely controlling NC size in the 1–2.5 nm regime. We find that the electrocatalytic CO partial current density increases for smaller NCs, but the CO Faradaic efficiency (FE) is not directly associated with the NC size. This indicates that the surface‐to‐volume ratio, i.e. the population of active sites, is the dominant factor for determining the catalytic activity, but the selectivity is not directly impacted by size. Second, we compare the CO2RR performance of Au38isomers (Au38Q and Au38T) to reveal that structural rearrangement of identical size NCs can lead to significant changes in both CO2RR activity and selectivity. Au38Q shows higher activity and selectivity towards CO than Au38T, and density functional theory (DFT) calculations reveal that the average formation energy of the key *COOH intermediate on the proposed active sites is significantly lower on Au38Q than Au38T. These results demonstrate how the structural isomerism can impact stabilization of reaction intermediates as well as the overall CO2RR performance of identical size Au NCs. Overall, this work provides important structure–property relationships for tailoring the NCs for CO2RR.   more » « less 3. While it is well established that nanoparticle shape can depend on equilibrium thermodynamics or growth kinetics, recent computational work has suggested the importance of thermal energy in controlling the distribution of shapes in populations of nanoparticles. Here, we used transmission electron microscopy to characterize the shapes of bare platinum nanoparticles and observed a strong dependence of shape distribution on particle size. Specifically, the smallest nanoparticles (<2.5 nm) had a truncated octahedral shape, bound by 〈111〉 and 〈100〉 facets, as predicted by lowest-energy thermodynamics. However, as particle size increased, the higher-energy 〈110〉 facets became increasingly common, leading to a large population of non-equilibrium truncated cuboctahedra. The observed trends were explained by combining atomistic simulations (both molecular dynamics and an empirical square-root bond-cutting model) with Boltzmann statistics. Overall, this study demonstrates experimentally how thermal energy leads to shape variation in populations of metal nanoparticles, and reveals the dependence of shape distributions on particle size. The prevalence of non-equilibrium facets has implications for metal nanoparticles applications from catalysis to solar energy.  more » « less 4. Atomically precise, thiolate-protected gold nanoclusters (TPNCs) exhibit remarkable catalytic performance for the electrochemical reduction of carbon dioxide (CO 2 R) to CO. The origin of their high CO 2 R activity and selectivity has been attributed to partial ligand removal from the thiolate-covered surfaces of TPNCs to expose catalytically active sulfur atoms. Recently, heterometal doped (alloy) TPNCs have been shown to exhibit enhanced CO 2 R activity and selectivity compared to their monometallic counterparts. However, systematic studies on the effect of doping (metal type and location on TPNC) on active site exposure and CO 2 R activity are missing in literature. Herein, we apply Density Functional Theory calculations to investigate the effect of heterometal (Pt, Pd, Hg and Cd) doping of Au 25 (SR) 18 TPNC on the active site exposure and CO 2 R activity and selectivity. We reveal that doping significantly modifies relevant TPNC electronic properties, such as electron affinity, while also altering partial ligand removal and carboxyl (*COOH) intermediate formation energies. Furthermore, we demonstrate that changing the dopant ( e.g. Hg) position can change the selectivity of the TPNC towards CO (g) or H 2(g) formation, highlighting the importance of dopant locations in TPNC-based CO 2 R. Most notably, we report a universal ( i.e. capturing different dopant types and positions) linear trend between the ligand removal energy and i) the *COOH formation energy, as well as, ii) the hydrogen (*H) formation energy on the different alloy TPNCs. Thus, utilizing the ligand removal energy as a descriptor for CO 2 RR activity and selectivity, our work opens new avenues for accelerated computational screening of different alloy TPNCs for electrocatalytic CO 2 R applications.  more » « less 5. null (Ed.) Thiolate-protected metal nanoclusters (TPNCs) have attracted great interest in the last few decades due to their high stability, atomically precise structure, and compelling physicochemical properties. Among their various applications, TPNCs exhibit excellent catalytic activity for numerous reactions; however, recent work revealed that these systems must undergo partial ligand removal in order to generate active sites. Despite the importance of ligand removal in both catalysis and stability of TPNCs, the role of ligands and metal type in the process is not well understood. Herein, we utilize Density Functional Theory to understand the energetic interplay between metal–sulfur and sulfur–ligand bond dissociation in metal–thiolate systems. We first probe 66 metal–thiolate molecular complexes across combinations of M = Ag, Au, and Cu with twenty-two different ligands (R). Our results reveal that the energetics to break the metal–sulfur and sulfur–ligand bonds are strongly correlated and can be connected across all complexes through metal atomic ionization potentials. We then extend our work to the experimentally relevant [M 25 (SR) 18 ] − TPNC, revealing the same correlations at the nanocluster level. Importantly, we unify our work by introducing a simple methodology to predict TPNC ligand removal energetics solely from calculations performed on metal–ligand molecular complexes. Finally, a computational mechanistic study was performed to investigate the hydrogenation pathways for SCH 3 -based complexes. The energy barriers for these systems revealed, in addition to thermodynamics, that kinetics favor the break of S–R over the M–S bond in the case of the Au complex. Our computational results rationalize several experimental observations pertinent to ligand effects on TPNCs. Overall, our introduced model provides an accelerated path to predict TPNC ligand removal energies, thus aiding towards targeted design of TPNC catalysts.  more » « less
ESSENTIALAI-STEM
The innate lymphocyte lineage natural killer (NK) is now the prospective of multiple clinical applications, although none has received an agreement from any regulatory agency yet The innate lymphocyte lineage natural killer (NK) is now the prospective of multiple clinical applications, although none has received an agreement from any regulatory agency yet. of specific NK subsets with particular activity. Finally, we propose to use specific NK cell subsets found in certain individuals that display increase activity against a specific disease, including the use of NK cells derived from individuals. evidence shows that CD56bright NK cells are precursors of CD56dim NK cells and this might also become the case (3). In contrast to T cells, grafted NK cells display short live, low growth and low alloreactivity such as graft-versus-host (GVH) in humans. Hence, NK can provide a potential source of allogeneic off-the-shelf cellular therapy and mediate major anti-target effects without inducing potentially lethal alloreactivity. Given the multiple unique advantages of NK cells, experts are now exploring different ways to increase and/or activate them for medical purposes. NK Cells in Clinics: the Problems Researchers working on the medical use of NK cells possess found numerous issues. Initial, this cell lineage represents a minimal percentage of lymphocytes, generally approximated to 5C15%. Furthermore this adjustments during human advancement (4), producing the transfer of enough allogeneic cells from an individual donor to an individual complicated. Second, NK cells possess low lifespans, in typical a week (5), recommending that allogenic cells can endure after MK-4827 enzyme inhibitor engraftment quickly. However, these total results ought to be taken with caution. Lifetime studies had been performed using deuterium incorporation, in support of dividing cells incorporate it actively. Hence, this system might not really take into account long-lived, nondividing cells. Furthermore, research workers concentrate on peripheral bloodstream normally, therefore NK cells generally homing in lymph nodes such as for example Compact disc56bcorrect cells aren’t considered in their true fat (5). But, research in bloodstream are valid due to the fact allogeneic NK cells for engraftment are extracted from peripheral bloodstream. Moreover, activated NK cells normally gain an adult phenotype despite high Compact disc56 appearance (6). Therefore, the prior estimates certainly are a acceptable proxy for the quantity of period NK cells will end up being energetic after allogenic engraftment. In contract, the persistence of haploidentical -extended and IL-2-turned on NK cells runs between 7 CIP1 and 10 times in sufferers with AML, NHL, and ovarian cancers (7). MK-4827 enzyme inhibitor The 3rd challenge is normally that NK cells display doubling times of just one 1.25 times after activation (8). That is considerably much longer than T cell doubling period during the preliminary expansion phase, that are 8 and 11 h for Compact disc4+ and Compact disc8+ T cells, respectively (9). Furthermore, after allogeneic engraftment most medical results failed to display significant growth of donor NK cells (6, 7, 10C13). Perhaps the high renew and short lifespan account for these poor expansions because NK cells have already strongly expanded during their maturation and they are prone to effector-like phenotype, at least in the blood population. Fourth, na?ve NK cells possess a relatively low activity compare to activated cells (6, 14). This could be responsible of the low effectiveness of NK cell-mediated therapies (11C13). Fifth, there are several efforts to activate endogenous NK cells, e.g., by obstructing NK cell inhibitory receptors. This led to the development of IPH2101, a killer inhibitory receptors (KIRs)/KIRL obstructing antibody (Ab) (15), or monalizumab, a humanized anti-NKG2A Ab (16). This approach has the hassle that in malignancy individuals NK cells are hyporeactive (11, 12, 17). Moreover, fresh therapies such as NK cell-based therapies are usually tested on individuals with advance medical phases, which correlate with enhance NK cell dysfunction, at least in multiple myeloma (18). This suggests that endogenous NK could be unable to get rid of tumor cells actually after liberating KIR inhibition. Interestingly, recent medical data also in myeloma suggest that such antibodies can improve the endogenous NK repertoire and make them further hyporeactive (19). Additional medical efforts to activate endogenous MK-4827 enzyme inhibitor NK cells include the use of lenalidomide [LEN; (20, 21)]. Biological results from the Phase Ib/II medical trial GALEN suggest that LEN could facilitate obinutuzumab (OBZ)-mediated NK cell activation (21), as was observed with rituximab (RTX) (22). In fact cancer individuals, at least those with hematological cancers, already possess NK cells, which identify and destroy tumor cells, but are unable to control the disease (21, 23, 24). Why only a portion of NK cells is definitely fighting against the tumor is definitely unknown. Which is definitely.
ESSENTIALAI-STEM
Henry, Prince of Nassau-Dillenburg Henry, Prince of Nassau-Dillenburg (born 28 August 1641 in Dillenburg; died: 18 April 1701 at Ludwigsbrunn Castle) was ruler (i.e. Fürst) of Nassau-Dillenburg from 1662 until his death. Life Henry was the son of George Louis, Prince of Nassau-Dillenburg (1618–1656) and his wife, Anna Augusta (17 December 1612 – 9 June 1673), a daughter of Duke Henry Julius of Brunswick-Wolfenbüttel. He studied at Herborn Academy, which could enjoy an upswing during his rule, and in France. After completing his studies, he served in the Dutch army, where he reached the rank of commander. When his grandfather, Louis Henry, Prince of Nassau-Dillenburg, died in 1662, he inherited the county, because his father had already died. When his uncle Adolph died without a male heir in 1676, he inherited Nassau-Schaumburg as well. His reign is regarded as competent but unspectacular. He tried unsuccessfully to claim the inheritance of his father-in-law, George III of Brieg. After his death, he was succeeded by his oldest son William II, and after William II died without a son, by his younger son Christian. Marriage and issue He married in 1663 with Dorothea Elizabeth, the daughter of Duke George III of Brieg. * George Louis (born: 21 June 1667; died: 25 July 1681) * William (born: 28 August 1670; died: 21 September 1724), married on 13 January 1699 in Harzgerode with Johanna Dorothea of Holstein-Plön (born: 24 December 1676; died: 29 November 1727), a daughter of Duke Augustus of Schleswig-Holstein-Sonderburg-Plön-Norburg * Charles (born: 4 February 1672; died 28 April 1672) * Adolph (born: 7 March 1673; died: 1 June 1690, fell in the Battle of Fleurus) * Frederick Henry (born: 10 November 1680, 1678; † July 24, 1681) * Louis Henry (born 10 October 1681; died: 13 January 1710) * John George (born: 28 January 1683; died: 10 May 1690) * Christian (born: 11 August 1688; died: 28 August 1739), married on 15 April 1725 at Oranienstein Castle with Isabella of Nassau-Dietz (1692–1757) * Henry (1689) * Sofie Auguste (born: 28 April 1666; died: 14 January 1733), married on 20 October 1695 at Frederiksborg Castle with Prince William Louis of Anhalt-Harzgerode (1643–1709) * Albertine (born: 8 August 1668; died: 13 August 1719), a nun at Herford Abbey * Friederike Amalie (born: 28 December 1674; died: 28 July 1724) * Elisabeth Dorothea (born: January 25, 1676; died: 25 July 1676) * Wilhelmine Henriette (born: 6 August 1677; died: 28 August 1727) * Charlotte Amalia (born: 13 June 1680, died: 11 October 1738), married in April 1706 to Prince William Henry of Nassau-Usingen (1684–1718) * Elisabeth Dorothea (born: 5 June 1685; died: 20 January 1686)
WIKI
Lyceum Theatre (Broadway) The Lyceum Theatre is a Broadway theater at 149 West 45th Street, between Seventh Avenue and Sixth Avenue, in the Theater District of Midtown Manhattan in New York City. Opened in 1903, the Lyceum Theatre is one of the oldest surviving Broadway venues, as well as the oldest continuously operating legitimate theater in New York City. The theater was designed by Herts & Tallant in the Beaux-Arts style and was built for impresario Daniel Frohman. It has 922 seats across three levels and is operated by The Shubert Organization. The facade became a New York City designated landmark in 1974, and the lobby and auditorium interiors were similarly designated in 1987. The theater maintains most of its original Beaux-Arts design. Its 45th Street facade has an undulating glass-and-metal marquee shielding the entrances, as well as a colonnade with three arched windows. The lobby has a groin-vaulted ceiling, murals above the entrances, and staircases to the auditorium's balcony levels. The auditorium has an ornately decorated proscenium and boxes, but the ceiling and walls are relatively plain. An apartment above the lobby, originally used by Frohman, was converted to the headquarters of the Shubert Archives in 1986. The stage door entrance is through 152 West 46th Street, a 10-story wing designed by Herts & Tallant, which also houses the dressing rooms and some backstage facilities. The current Lyceum replaced Frohman's earlier Lyceum on Fourth Avenue, which closed in 1902. The current theater opened on November 2, 1903, with the play The Proud Prince. Frohman's brother Charles served as the theater's manager until dying in 1915, and Daniel Frohman subsequently partnered with David Belasco to show productions at the theater until 1930. Afterward, Frohman lost the theater to foreclosure in the Great Depression, and a syndicate composed of George S. Kaufman, Max Gordon, and Moss Hart bought the theater in 1940. The Shubert Organization has operated the theater since 1950. The Lyceum was leased to the Association of Producing Artists (APA) and Phoenix Theatre in the late 1960s and to the National Actors Theatre during much of the 1990s. Site The Lyceum Theatre is on 149 West 45th Street, between Seventh Avenue and Sixth Avenue near Times Square, in the Theater District of Midtown Manhattan in New York City. The land lot covers 10,125 ft2, with a frontage of 85.73 ft on 45th Street and a depth of 200.84 ft. A wing runs northward to 46th Street. The modern theater's site covers five land lots at 149 to 157 West 45th Street, collectively measuring 88 by, as well as a rear lot on 152 West 46th Street, measuring 16 by. These lots formerly contained houses. On the same block, the Museum of Broadway adjoins the theater; additionally, 1540 Broadway is to the west, and Americas Tower and High School of Performing Arts are to the east. Other nearby buildings include the Church of St. Mary the Virgin to the northeast; the Palace Theatre, Embassy Theatre, and I. Miller Building to the north; the Millennium Times Square New York and Hudson Theatre to the south; and the Hotel Gerard and Belasco Theatre to the southeast. Design The Lyceum Theatre was designed by Herts & Tallant in the Beaux-Arts style and constructed from 1902 to 1903 for impresario Daniel Frohman. Operated by the Shubert Organization, it is the oldest continuously operating legitimate theater in New York City. 45th Street The primary elevation of the facade is on 45th Street and is made of limestone. A promotional brochure from the theater's opening in 1903 said that the facade "recalls in its style and amplitude the best period of Roman art". The street-level facade is made of rusticated blocks of limestone. Three large archways lead into the lobby; their doors are made of painted wood and contain arched panels of glass. The street level entrances are shielded by a sinuous marquee canopy made of iron and glass. When the theater opened, the entrance had a self-supporting canopy that could shield either five or eight carriages unloading their passengers. In 1986, the canopy was replaced with a replica that was cantilevered from the facade with metal rods. The modern canopy has moldings of pressed metal, medallions above each archway, and glass panels hanging underneath the canopy. The design of the Lyceum's canopy was subsequently replicated by that of the Paramount Theatre. Above the entrance, the 45th Street elevation contains a colonnade of three bays. The bays are delineated by a pair of neoclassical fluted columns at each end, as well as two single columns in the center. Each column contains fluting, bands with foliate ornament, and ornate capitals. Within each bay is a French window with a three-centered arched surround. There were also statues within each bay, which have since been removed. A frieze runs above the windows, containing six stone faces that signify both comedy and tragedy. An entablature runs above the columns. The three bays are flanked by a pair of outer pavilions that have no ornament at all. The colonnade and marquee were particularly intended to attract a "more cultured audience" than similar theaters. The theater contains a mansard roof above the entablature. The mansard roof contains three windows within triangular pediments, which illuminate a penthouse in the roof. A balustrade, directly on top of the entablature, encloses a balcony at the penthouse level. There are also six oval windows above the penthouse, which illuminate a former rehearsal hall. The roof also had four large urns that emitted gas at night. The urns were used to draw attention to the theater, since it was on a side street north of the other theaters of the time. At the theater's construction in 1903, the roof was described as being of "purple slate" with a bronze statue. The Lyceum's roof had two water towers, collectively capable of storing 15000 gal. 46th Street The stage door entrance is through the wing on 152 West 46th Street. Herts & Tallant designed the 46th Street wing with ten or eleven stories. The wing has a utilitarian design and contains vestiges of a slit that carried backdrops between the stage and the upper-story studios. Interior Frohman had offices on the upper portion of the main 45th Street structure, while the rear annex on 46th Street contained auxiliary facilities such as storage and dressing rooms. The color scheme of the interior was compared in contemporary media to autumn foliage, with a range of hues from "deep yellow to warm red and brown". From the outset, the auditorium was designed to use electric lighting exclusively. A switchboard controlled the stage lighting, which could be controlled to be as bright as natural illumination. The theater was also mechanically advanced for its time, with heating, cooling, and ventilation systems, as well as a fireproof structural frame. The air-intake system consisted of blowers that drew air from the chimneys and passed the air through a porcelain duct, a set of silk filters, and water sprayers. The auditorium floor had "mushrooms" for air intake and outflow. The heating and ventilation system could change the auditorium's air every six minutes. Lobby The entrance lobby is a rectangular space, with elliptical arches on the north and south walls. The space measures 65 ft long. The lobby floor is made of marble from Maryland, which was designed to resemble Athenian marble. The floor is made of marble mosaic tiles. The center of the floor has a panel with the theater's motif, a decorative letter "L" with foliate ornament around it. The walls contain a marble dado wrapping around the lobby, as well as piers topped by capitals with acanthus leaves. There are foliate moldings around each of the elliptical arches. The walls also have lighting sconces. The lobby's ceiling consists of a groin vault with a molded egg-and-dart border and decorative rosettes in the vault's ribs. There is a dome at the middle of the ceiling, with an egg-and-dart border, a hanging chandelier, and cove lights. The south doors lead to the street, while the north doors lead to the auditorium. Above the north and south walls are three small canvas murals by James Wall Finn. The murals depict female figures on either side of portraits of Sarah Siddons and David Garrick. Above the center door on the north wall is a segmentally-arched pediment, supported on console brackets flanking the doorway; these pediments contain the "L" motif. To the west and east are curving stairs leading up to the first balcony level. The staircases are covered in marble but are actually made of steel. The outer walls of the staircases contain marble dados, as well as bronze railings attached to them. The inside edges of the staircases have bronze balustrades with cast-iron and wrought-iron decorations, as well as newel posts containing nude figures. The east wall also has ticket windows. Another stair to the west leads down to the smoking room. At the balcony level was a foyer and smoking rooms. Auditorium The auditorium has an orchestra level, boxes, two balconies, and a stage behind the proscenium arch. The auditorium's width is greater than its depth, and the space is designed with plaster decorations in high relief. The Lyceum's auditorium generally has plain plaster walls, and much of the decoration is concentrated on the proscenium and boxes. The juxtaposition of plain walls and ornamented openings was intended to draw the audience's attention toward the stage. The auditorium took up about one-third of the entire theater building. The auditorium has 922 seats, making the Lyceum one of the smaller Broadway theaters. These are divided into 409 seats in the orchestra, 287 on the first balcony, and 210 on the second balcony, as well as 16 box seats. As designed, the seats were upholstered in dark yellow leather, which has since been replaced. Each seat measured 22 in wide, larger than in comparable theaters. The backs of different rows of seats were spaced 38 in apart. The large width of the auditorium compensated for the relatively small number of rows. Seating areas The rear (south) end of the orchestra contains a shallow promenade, which has wood-paneled walls, arched "L" motifs, and cartouches. The orchestra has a raked floor and painted wood paneling on the side walls. Above the paneling are ornamented pediments with foliate and egg-and-dart decorations. The orchestra level is wheelchair-accessible via the main doors, but the balcony levels can only be accessed by steps. Unusually for theaters of the time, the balconies are cantilevered from the structural framework, which obviated the need for columns that blocked audience views. The balcony levels have paneled wooden dados on both the side and rear walls; the first balcony has blind openings and cartouches. The balconies have foliate bands on their undersides, with light fixtures underneath. In front of the balconies are leaf moldings topped by brackets and foliate decoration. All three levels have sconces on the side walls. On either side of the stage is a wall section with one box at the first balcony level. Each wall section consists of Ionic-style fluted and banded columns, which support an elliptical arch. The boxes themselves are supported on large brackets, which in turn rest above piers with foliate capitals. In front of each box is a curved railing with leaf moldings. There is a cartouche with an "L" motif atop the boxes' arches, and a swag shaped like a leaf is suspended from the cartouche. Other design features The proscenium arch measures 33 ft high and 31 ft wide. The proscenium arch consists of a wide, molded band with foliate and egg-and-dart decorations. Above the center of the arch is a console bracket with swags, above which is a broken pediment, as well as a pair of swag-filled console brackets on either side of the pediment. The broken pediment has a figure of Pallas Athene, which is flanked by female representations of drama and music. These figures were also carved by J. W. Finn. The stage measures 37 ft deep and 89 ft wide. The depth of the stage could be increased by up to 40 ft. The stage contains a lift that could descend to 30 ft below the auditorium. The lift, no longer operational, divided the stage into several sections. It could be used not only to raise and lower scenery, but also to create sets with terrain elements, such as cliffs, terraces, and rivers. The depth of the auditorium to the proscenium is 29 ft, while the depth to the front of the stage is 31 ft. The coved ceiling is distinguished by console brackets with swags, and there are decorations of bellflowers within the cove. The ceiling is divided into ribs, containing bands with fruits and flowers. The center of the ceiling contains a rectangular panel with modillions around it, as well as floral cartouches and latticework inside. Around this panel are circular "L" motifs. Guilloche moldings hang over the second balcony. The ceiling lacked a chandelier, as the designers thought it would be distracting to the performers and audience. Instead, there are recessed light fixtures in the ceiling. Other facilities Daniel Frohman's "penthouse", comprising his office and apartment, was on the south side of the theater building, facing 45th Street. It was not part of his original plans but became his primary residence; he also had another residence in New York City. They were accessed by a stair and elevator from the lobby. Frohman's offices contained Chippendale furniture as well as a reproduction of playwright David Garrick's library. The adjacent rooms contained stenographers' offices and other rooms. A small window from his dining room's northern wall allowed Frohman to look at the performances in the auditorium. The window measured 18 in wide and was above the second balcony level. During the mid-1920s, The New York Times described Frohman's office as, "in a manner, the headquarters of the theatrical profession in the city". The office contained portraits of numerous oil paintings, drawings, photographs, and lithographs of show personalities. Frohman's office also had a phone line for contacting the stage manager directly. Frohman's offices were subsequently converted into the Shubert Archive, which contains the Shubert Organization's theatrical collection. The archive was organized in 1976 and opened at the Lyceum in 1986. Initially, it contained four million items from the Shuberts' history between 1900 and World War II, including 2,000 costume designs, 8,000 blueprints, and 12,000 manuscripts. There is also some space inside the mansard roof. Originally, this space included a large rehearsal room with its own stage, directly above the main auditorium. The room measured 80 ft long and 40 ft wide, and it had a miniature stage. In the basement were storage rooms, where sets originally could be swapped onto the movable stage. The 46th Street annex housed the scene-painting studio, a carpenter shop, a costume department, and storage spaces, along with dressing rooms. The scene-painting studio faced the street, with natural light coming from the north, and could be used to paint up to four backdrops at a time. This room measured 35 ft tall and 100 ft deep, with a full-height glass wall facing north and slots in the floors. The carpentry shop could accommodate 25 workers. The costume department was housed in a separate room that could fit 50 seamstresses and a varying number of cutters. The storage spaces included a full storage warehouse as well as rooms to store scenery. According to contemporary media, the dressing rooms could fit 200 people. Each dressing room had a bathroom, and there were large rooms for supernumerary actors as well. The old scenery rooms have also become part of the Shubert Archive and contain artifacts such as librettos, orchestrations, and cash books. History Times Square became the epicenter for large-scale theater productions between 1900 and the Great Depression. Manhattan's theater district had begun to shift from Union Square and Madison Square during the first decade of the 20th century. These venues were developed following the construction of the Empire Theatre on 41st Street in 1893 and Hammerstein's Olympia in 1895. The Lyceum, Hudson, and New Amsterdam, which all opened in 1903, were among the first theaters to make this shift; the Lyceum is one of the oldest surviving Broadway theaters. From 1901 to 1920, forty-three theaters were built around Broadway in Midtown Manhattan, including the current Lyceum. Development Daniel Frohman had operated an earlier Lyceum Theatre on Fourth Avenue, near Madison Square, which had been built in 1885 by Steele MacKaye. Metropolitan Life acquired the old Lyceum in 1902 to make way for the Metropolitan Life Insurance Company Tower, and Frohman sought to develop a new venue further north. In February 1902, shortly after the old Lyceum was acquired, Frohman announced he had purchased six lots on 45th and 46th Streets near Times Square. He planned to build a 900-seat theater on the site after the leases on the lots expired. Frohman chose the site specifically because it was on a less crowded side street while also being close to the then-under-construction New York City Subway. The auditorium would be on 45th Street, while a narrow wing with mechanical equipment and dressing rooms would be placed on 46th Street. The site cost Frohman $110,000, and he expected to spend another $230,000 on the new Lyceum Theatre. Frohman hired Herts & Tallant to design the new theater, while the Fuller Construction Company was hired as the general contractor. The old Lyceum ultimately closed on March 22, 1902. Work on the new theater began on April 1, a week after the old Lyceum was closed. The cornerstone was laid on October 16, 1902. Frohman, who considered 13 to be a lucky number, placed thirteen of the old Lyceum's bricks into the new theater. By then, the basement and cellar were largely complete and the theater was to be completed early the following year. The theater was supposed to open in September 1903 but encountered so many delays that the inaugural play, The Proud Prince, could only be scheduled at the Lyceum for two weeks. Daniel Frohman, his brother Charles Frohman, and William Harris formed the New Lyceum Theatre Company and divided ownership of the Lyceum equally. Instead of distributing stock, the company issued six promissory notes of $118,328 each, which could not be collected for as long as each partner lived. Early years The new Lyceum Theatre (also formally capitalized as the New Lyceum Theatre ) opened on November 2, 1903, with The Proud Prince. E. H. Sothern, who starred in The Proud Prince, had also appeared in the first production that Frohman had shown at the old Lyceum. At the theater's opening, an architectural publication praised the theater's design as "being intended for a high-class dramatic performance before a refined and cultured audience". Conversely, because of its relatively remote location, the New-York Tribune said that there were "many who refused to believe that a theater so far up town would be successful". Charles Frohman was the theater's first manager. From its inception, the new Lyceum was intended as a venue for "drawing-room comedies". Three weeks after the theater's opening, The Admirable Crichton premiered at the new Lyceum. The play The Other Girl and Granny appeared at the Lyceum in 1904, as did Mrs. Leffingwell's Boots and A Doll's House in 1905. The most successful production in the Lyceum's initial years was the drama The Lion and the Mouse, which opened in 1905 and ran for 686 performances. Daniel Frohman's wife Margaret Illington appeared at some productions in the Lyceum. beginning with Mrs. Leffingwell's Boots and The Thief (1907). Frohman would gesture through the window from his office to signify when Illington was overacting. Actresses such as Ethel Barrymore, Billie Burke, Ina Claire, and Lenore Ulric also performed at the Lyceum in its early years. Burke starred or co-starred in some plays during the Lyceum's first decade, including Love Watches in 1908, Mrs. Dot and Suzanne in 1910, and The Runaway in 1911. The Lyceum also hosted the U.S. premiere of the French silent film The Loves of Queen Elizabeth, featuring Sarah Bernhardt, in 1912. Barrymore, meanwhile, was featured in Our Mrs. McChesney (1915). Belasco partnership Charles Frohman died in May 1915 during the sinking of the RMS Lusitania, and his company, which had an ownership stake in the Lyceum, was subsequently acquired by Paramount Pictures. David Belasco announced in March 1916 that he would become one of the managers of the Lyceum Theatre. Contemporary media said the move was borne out of sentimental considerations, as Belasco had frequently collaborated with Charles Frohman. Among the major productions at the Lyceum in the late 1910s were Tiger Rose (1917), featuring Lenore Ulric; Daddies (1918), featuring Jeanne Eagels and George Abbott; and The Gold Diggers (1919), featuring Ina Claire. These shows all had several hundred performances, including The Gold Diggers, which had 720 performances. In addition, the theater held events such as a charity dinner for the Actors' National Memorial Fund in 1919. Frohman administered the Actors' Fund from his office. The Lyceum hosted many romantic comedies and other successful productions in the 1920s. Frohman leased the theater to Famous Players–Lasky, which was to present Belasco's works there for ten years starting in October 1921. The same year, the theater hosted The Easiest Way with Frances Starr, as well as The Grand Duke with Lionel Atwill and Lina Abarbanell. The Lyceum's stage and decorations were restored in 1922, prior to the opening of Shore Leave, which featured Starr and James Rennie. The Lyceum also hosted revivals of classical plays, including The Merchant of Venice (1922), The School for Scandal (1923), and Antony and Cleopatra (1924). During 1925, the theater hosted The Grand Duchess and the Waiter, with Elsie Ferguson and Basil Rathbone, and the romantic comedy Naughty Cinderella, with Irène Bordoni. In the late 1920s, the Lyceum hosted productions such as the comedy Fanny (1926) with Fanny Brice and Elmer the Great (1928) with Walter Huston. The decade ended with the 1929 romance Berkeley Square, which had over 200 performances. Frohman and Belasco's partnership ended when Belasco died in May 1931 after a long illness. The lease on the theater was set to expire later that year, and Frohman planned to rent the Lyceum as an independent playhouse. By then, Frohman was no longer an active producer. Great Depression and ownership changes The Lyceum Theatre suffered in general because of the Great Depression, and most shows generally closed after a small number of performances. Among the longer productions was Payment Deferred (1931), which had 70 performances, as well as Sailor, Beware! (1933), which had 500 performances. In 1934, the theater hosted Ode to Liberty, featuring Ina Claire. The Bowery Savings Bank moved to foreclose on a mortgage loan on the theater in mid-1935. Later that year, the Lyceum was leased for one year to Julius Stone for a presentation of Squaring the Circle. The next year, Frohman leased most of the theater, except for his own offices, to Spencer D. Bettelheim of the Lyco Company for five years. Contemporary newspapers said the lease to Bettelheim was "a sentimental gesture", since Bettelheim's father was Frohman's old friend. Bettelheim then announced a renovation of the interior, including new seats. Long-running productions during the late 1930s included Pre-Honeymoon (1936) with Jessie Royce Landis; St. Helena (1936) with Maurice Evans; and Having Wonderful Time (1937) with John Garfield and Katherine Locke. The theater was less financially stable after the Lyco Company dissolved in 1938. By March 1939, the Bowery Savings Bank was foreclosing on the Lyceum, which was in danger of demolition. After Stanley Howe, a friend of Frohman's and an aide to mayor Fiorello La Guardia, intervened, the bank promised that Frohman could stay in his apartment for the rest of his life. The Lyceum was leased to Victor Payne-Jennings that April, on the condition that Frohman be allowed to keep his residence. The Bowery Savings Bank acquired the theater at a foreclosure auction in December 1939 for $100,000. Shortly afterward, Samuel Briskman leased the theater and used it to show When We Are Married. In May 1940, the Bowery Savings Bank announced it would sell the Lyceum to a syndicate that included playwright George S. Kaufman, producer Max Gordon, and playwright Moss Hart for $250,000. Frohman was to be allowed to live in the apartment above the theater for $1 per year, though Frohman died in December 1940, less than a year afterward. Among the syndicate's first works at the Lyceum was George Washington Slept Here in 1940, as well as The Beautiful People and Junior Miss in 1941. This was followed by The Doughgirls, which had 671 performances, and The Late George Apley, which had 384 performances. The Lyceum then hosted Born Yesterday, which opened in 1946 and was the theater's longest-running production with 1,642 performances. Born Yesterday was transferred out of the Lyceum mid-run in 1948 and was followed by "a half-dozen flops". The Gordon syndicate agreed to sell the Lyceum to Harry Gould in April 1949 for $400,000, after having previously failed to sell the theater to Gould at twice that price. The sale was not finalized until that December, when the price had increased to $450,000. The first major production in the 1950s was the original The Country Girl, which opened in 1950. Melvyn Douglas then appeared in two successful comedies: Glad Tidings in 1951 and Time Out for Ginger in 1952. 1950s to 1970s The New York Times reported in 1952 that the Shubert Organization had taken over the Lyceum. During 1954, the theater hosted the comedy King of Hearts and the romance drama Anastasia, both of which ran for over 200 performances. This was followed by A Hatful of Rain (1955), The Happiest Millionaire (1956), and Look Back in Anger (1957). Notable productions of the late 1950s also included The Gazebo in 1958 and The Billy Barnes Revue in 1959. Subsequently, the Lyceum showed the British dramas A Taste of Honey in 1960 and The Caretaker in 1961. The Lyceum then had several short-lived works before showing Nobody Loves an Albatross in 1963. The Association of Producing Artists (APA) and Phoenix Theatre showed their productions at the Lyceum from 1965 to 1969. In March 1965, the Shuberts leased the theater to the partnership of APA and Phoenix for $100,000 a year, which the lessees considered a nominal fee. The APA and Phoenix originally did not have enough money to transfer their works to the Lyceum for the 1965–1966 season, but ultimately it opened a revival of the play You Can't Take It with You at the Lyceum in November 1965. During the APA-Phoenix era, the Lyceum hosted classical revivals such as War and Peace, The Show-Off, The Cherry Orchard, The Cocktail Party, The Misanthrope, and Hamlet. The Lyceum also operated as a repertory theatre for films in mid-1968. The APA and Phoenix dissolved their partnership in early 1969 due to a lack of funding. Afterward, the theater hosted plays such as Three Men on a Horse. There were few successful productions at the Lyceum during the 1970s, amid a decline in the Broadway theatrical industry. Among the longer runs in this era were the 1970 play Borstal Boy and the 1976 play Your Arms Too Short to Box with God. Phoenix also hosted some of its works at the Lyceum. During the early 1970s, Daniel Frohman's niece-in-law petitioned the New York City Landmarks Preservation Commission (LPC) to protect the Lyceum as a city landmark. The LPC designated the theater's facade, but not its interior, as an official city landmark in 1974, requiring the LPC to review and approve all proposed modifications to the facade. Gerald Schoenfeld of the Shubert Organization had opposed the landmark status, believing the small theater to be a liability. A landmark plaque was installed on the facade in 1978. Major productions during the late 1970s included Cold Storage in 1977 and Wings in 1979. 1980s and 1990s The Lyceum hosted a revival of Morning's at Seven in 1980. The theater then hosted productions such as "Master Harold"...and the Boys (1982), The Man Who Had Three Arms (1983), a set of monologues by comedian Whoopi Goldberg in 1984, and As Is (1985) The LPC gave the Shuberts permission to replace the facade marquee in 1986 after the original marquee began to fall apart. According to Schoenfeld, the Shuberts had to pay $350,000 to replace the marquee due to the commission's demands, though the highest bid was only about $150,000 and the theater was often unoccupied. The Shubert Archive also opened in 1986. In the dozen years after 1987, the Lyceum was idle for about 70 percent of the time. To increase the occupancy of the Lyceum and other little-used Broadway theaters, the League of American Theaters and Producers negotiated with Broadway unions and guilds during the late 1980s. Among the shows of the late 1980s were the 1986 puppet show A Little Like Magic, as well as Safe Sex (1987) and Our Town (1988). During the 1980s, the Shuberts renovated the Lyceum as part of a restoration program for their Broadway theaters. After the Lyceum's facade was successfully designated as a landmark, the LPC started considering a similar protection for the interior in 1982, with discussions continuing over the next several years. The Lyceum was designated as an interior landmark on December 8, 1987. This was part of the LPC's wide-ranging effort in 1987 to grant landmark status to Broadway theaters. The New York City Board of Estimate ratified the designations in March 1988. The Shuberts, the Nederlanders, and Jujamcyn collectively sued the LPC in June 1988 to overturn the landmark designations of 22 theaters, including the Lyceum's interior, on the merit that the designations severely limited the extent to which the theaters could be modified. The lawsuit was escalated to the New York Supreme Court and the Supreme Court of the United States, but these designations were ultimately upheld in 1992. The National Actors Theatre, led by Tony Randall, announced in 1992 that it would relocate from the Belasco to the Lyceum, despite the smaller size of the latter. The Lyceum was used by the National Actors Theatre for most of the 1990s, but most of its productions were unsuccessful. The first season of the National Actors Theatre opened with performances of The Seagull, Saint Joan, and Three Men on a Horse. The National Actors Theatre went on to host Timon of Athens, The Government Inspector, and The Flowering Peach in 1994; Gentlemen Prefer Blondes and The School for Scandal in 1995; and The Gin Game and The Sunshine Boys in 1997. Additionally, the actor Mandy Patinkin performed a limited engagement at the Lyceum in March 1997. The National Actors Theatre closed out the 1990s with the plays Night Must Fall and The Lonesome West in 1999. During the late 1980s, the Shubert Organization had leased 124000 ft2 of the site's unused air development rights. German firm Bertelsmann used the air rights to increase the height of the adjacent skyscraper at 1540 Broadway, paying $600,000 a year. The Shuberts had to maintain the Lyceum as a legitimate theater as part of the agreement concerning the theater's air rights. Bertelsmann had an option to buy the theater, raising concerns that the archives in the theater would have to be relocated. In 1999, there was a dispute over whether Spirit of Broadway, a theatrical museum with a 60-minute play targeted at tourists, should be produced at the Lyceum. Bertelsmann supported Spirit of Broadway, but Schoenfeld said it did not fall under the criteria for legitimate shows. Spirit of Broadway was ultimately determined to be legitimate. 2000s to present After the National Actors Theatre stopped producing at the Lyceum, the theater hosted Rose in 2000, a solo play with Olympia Dukakis. Subsequently, the Lyceum hosted productions such as The Invention of Love in 2001, The Play What I Wrote and I Am My Own Wife in 2003, and The Lieutenant of Inishmore in 2006. As part of a settlement with the United States Department of Justice in 2003, the Shuberts agreed to improve disabled access at their 16 landmarked Broadway theaters, including the Lyceum. The roof and 45th Street facade were repaired in 2005 as part of a $1 million renovation. During the late 2000s, the Lyceum hosted plays and musicals such as Inherit the Wind, Is He Dead?, Macbeth, title of show, Reasons to Be Pretty, and In the Next Room (or The Vibrator Play). The Lyceum Theatre hosted numerous shows in the 2010s as well. These included Looped, The Scottsboro Boys, Venus in Fur, The Nance, The Realistic Joneses, Disgraced, The Visit, A View from the Bridge, Fully Committed, Oh, Hello, The Play That Goes Wrong, Be More Chill, and A Christmas Carol. In addition, the NBC television series Smash used the theater in 2012 as the home of their fictional musical Bombshell. The theater closed on March 12, 2020, due to the COVID-19 pandemic. It reopened on October 11, 2021, with Is This A Room and Dana H. playing in repertory. Subsequently, A Strange Loop opened at the Lyceum in April 2022 and ran until January 2023. This was followed in May 2023 by the play Grey House, which ran for two months. The play My Son's a Queer (But What Can You Do?) was expected to open at the Lyceum in March 2024 for a three-month run, but it was postponed to the 2024–2025 season with new dates and a new theater. Subsequently, the off-Broadway play Oh, Mary! transferred to the Lyceum in July 2024, running for two months. Notable productions Productions are listed by the year of their first performance. 1900s to 1990s * 1903: The Admirable Crichton * 1904: David Garrick * 1905: A Doll's House * 1907: The Truth * 1909: * 1909: Penelope * 1910: The Pillars of Society * 1910: The Assumption of Hannele * 1910: The Importance of Being Earnest * 1913: The Ghost Breaker * 1915: John Gabriel Borkman * 1917: The Great Divide * 1917: The Case of Lady Camber * 1919: The Gold Diggers * 1922: The Merchant of Venice * 1923: The School for Scandal * 1924: Antony and Cleopatra * 1924: Ladies of the Evening * 1926: The Sport of Kings * 1929: Berkeley Square * 1931: Anatol * 1935: Squaring the Circle * 1936: St. Helena * 1939: The Mother * 1939: When We Are Married * 1941: Junior Miss * 1942: The Doughgirls * 1946: Born Yesterday * 1950: The Enchanted * 1950: The Country Girl * 1952: Anna Christie * 1952: Time Out For Ginger * 1955: A Hatful of Rain * 1957: Look Back in Anger * 1958: The Gazebo * 1959: The Billy Barnes Revue * 1959: Flowering Cherry * 1959: Goodbye Charlie * 1960: A Taste of Honey * 1960: The Importance of Being Oscar * 1960: Mandingo * 1961: The Caretaker * 1963: Ages of Man * 1963: Nobody Loves an Albatross * 1965: Entertaining Mr. Sloane * 1965, 1967: You Can't Take It With You * 1966: The School for Scandal * 1967: The Wild Duck * 1967: By George * 1967, 1968: The Show-off * 1968: Exit the King * 1968: The Cherry Orchard * 1968: The Cocktail Party * 1968: The Misanthrope * 1969: Cock-a-Doodle Dandy * 1969: Hamlet * 1969: Three Men on a Horse * 1970: Norman, Is That You? * 1970: Borstal Boy * 1971: The School for Wives * 1972: The Great God Brown and Don Juan * 1973: Out Cry * 1975: The Lieutenant * 1976: Something's Afoot * 1976: Best Friend * 1976: Your Arms Too Short to Box with God * 1979: Wings * 1980: Morning's at Seven * 1982: "Master Harold"...and the Boys * 1983: The Man Who Had Three Arms * 1985: As Is * 1988: Our Town * 1993: Saint Joan * 1993: Three Men on a Horse * 1993: Timon of Athens * 1994: The Government Inspector * 1994: The Flowering Peach * 1995: Gentlemen Prefer Blondes * 1995: The School for Scandal * 1997: The Gin Game * 1997: The Sunshine Boys * 1999: Night Must Fall * 1999: The Lonesome West 2000s to present * 2001: The Invention of Love * 2002: Morning's at Seven * 2003: The Play What I Wrote * 2003: I Am My Own Wife * 2005: Steel Magnolias * 2006: The Lieutenant of Inishmore * 2007: Inherit the Wind * 2007: Is He Dead? * 2008: Macbeth * 2008: title of show * 2009: Reasons to Be Pretty * 2009: In the Next Room (or The Vibrator Play) * 2010: Looped * 2010: The Scottsboro Boys * 2012: Venus in Fur * 2013: The Nance * 2014: The Realistic Joneses * 2014: Disgraced * 2015: The Visit * 2015: A View from the Bridge * 2016: Fully Committed * 2016: Oh, Hello * 2017: The Play That Goes Wrong * 2019: Be More Chill * 2019: A Christmas Carol * 2021: Is This a Room and Dana H. * 2022: A Strange Loop * 2023: Grey House * 2024: Oh, Mary! Box office record Macbeth previously set the Lyceum Theatre's box-office record with a gross of US$584,033 over seven performances in 2008. Be More Chill beat the seven-performance box-office record in 2019, grossing US$738,384, while Oh, Hello set an eight-performance record of US$804,513 during the week ending January 22, 2017. A Strange Loop broke the eight-performance record during its final week in January 2023, grossing US$955,590.
WIKI
Talk:Rod Smith (sportscaster) grey cup television I am watching the game and am not favoring either team. I love the cfl. * Why is the broadcast team favoring Winnipeg? It is very obvious and disappointing. 2607:FEA8:A962:6C00:59E2:3F55:5580:E7B4 (talk) 00:57, 21 November 2022 (UTC)
WIKI
La Esperanza, Jujuy La Esperanza (Jujuy) is a town and municipality in San Pedro Department, Jujuy Province in Argentina. It hosts an historical sugar factory, founded by British industrialists Walter (1858–1944) and William Leach (1851–1932). In 1906, German anthropologist Robert Lehmann-Nitsche signed an agreement with the Leach brothers. He had noted that workers there came from several different ethnic groups and used to sing while working. Lehmann-Nitsche recorded their songs in 30 phonograph cylinders that he sent to the Berliner Phonogramm-Archiv. Lehmann-Nitsche was later criticized for having conducted his research ignoring the exploitation and mistreatment of the native Argentinians who worked in the factory. In 2019, after twenty years of difficulties, the factory, which was administered by the government since 2015, was sold to an alliance of private groups.
WIKI
SocialDisNER – Detection of disease mentions in tweets (in Spanish, SMM4H 2022 – Task 10) Generated resources Please, cite: Luis Gasco Sánchez, Darryl Estrada Zavala, Eulàlia Farré-Maduell, Salvador Lima-López, Antonio Miranda-Escalada, and Martin Krallinger. 2022. The SocialDisNER shared task on detection of disease mentions in health-relevant content from social media: methods, evaluation, guidelines and corpora. In Proceedings of The Seventh Workshop on Social Media Mining for Health Applications, Workshop & Shared Task, pages 182–189, Gyeongju, Republic of Korea. Association for Computational Linguistics. @inproceedings{gasco-sanchez-etal-2022-socialdisner, title = "The {S}ocial{D}is{NER} shared task on detection of disease mentions in health-relevant content from social media: methods, evaluation, guidelines and corpora", author = "Gasco S{\'a}nchez, Luis and Estrada Zavala, Darryl and Farr{\'e}-Maduell, Eul{\`a}lia and Lima-L{\'o}pez, Salvador and Miranda-Escalada, Antonio and Krallinger, Martin", booktitle = "Proceedings of The Seventh Workshop on Social Media Mining for Health Applications, Workshop {\&} Shared Task", month = oct, year = "2022", address = "Gyeongju, Republic of Korea", publisher = "Association for Computational Linguistics", url = "https://aclanthology.org/2022.smm4h-1.48", pages = "182--189" } SocialDisNER Task overview About the task Mining social media content for disease mentions (SocialDisNER) [in Spanish language]. This task will focus on the recognition of disease mentions in tweets written in Spanish after selecting primarily first-hand experience of diseases and other health-relevant content (from patient associations and professional healthcare institutions). The aim is to use social media as a proxy to better understand societal perception of disease, from rare immunological and genetic diseases such as cystic fibrosis, highly prevalent conditions such as cancer and diabetes, to often controversial diagnoses such as fibromyalgia and even mental health disorders. Automatic data selection actively retrieved posts with personal messages and from patient associations. Thus, the SocialDisNER shared task will enable training deep learning named entity recognition approaches to detect all kinds of disease mentions in social media, including both lay and professional language. The Social Media Mining for Health Applications (#SMM4H) Shared Task 2022 invites researchers to develop systems to solve health informatics challenges for social media. The 10th track of the task focuses on the identification of disease mentions in Spanish tweets. This webpage is devoted to the Spanish part of this multilingual track (i.e. identification of diseases in Spanish tweets enriched with patient and healthcare professional social media content). There will only be a single sub-track: • NER offset detection and classification. Participants must find the beginning and end of disease mentions. The SMM4H 2022 general webpage can be accessed here. #SMM4H is held as part of the 29Th International conference on computational linguistics.
ESSENTIALAI-STEM
Adding a Calendar to Your OS X Menu Bar March 15, 2009 in applications,Macintosh by Dee-Ann LeBlanc There are times when you really need to look at a calendar. You could open iCal, but that seems like overkill. One option is to download an application that can add a calendar to your menu bar. There’s plenty of options for adding this feature to your Mac. Some are very simple and just offer a calendar, while others come as part of more complex packages. For example, if you’re the kind of person who likes to feel they know what’s happening on their system, you can download a free app called iStat Menus. This app actually adds itself to your System Preferences menu, and allows you to add little system monitors up in your menu bar, along with a heavily customizable calendar and date display. iStat Menus configuration dialog box iStat menus . The calendar, date, time, memory meter, and meters for both CPUs in iStat Menus. The calendar, date, time, memory meter, and meters for both CPUs in iStat Menus. Another popular option is MenuCalendarClock. With this application, if you pay to register (or get it as part of a discount bundle) you can also view your iCal entries in the drop-down calendar without having to open iCal itself. If you use Google Calendar instead, you may want to check out TinyCal. One more option of interest is Eigenclock, which is simple to localize if you’re a non-English speaker and is another free option. Dee-Ann LeBlanc (www.freelancesurvivor.com) has been a computer geek since childhood and a computer writer for the last 15 years. Her home is run by Macs, Linux boxes, and a trio of dogs.
ESSENTIALAI-STEM
tprintf Version 1.01 (10.3 KB) by per isakson tprintf writes tabular data to a text file 85 Downloads Updated Wed, 13 Sep 2017 23:43:20 +0000 View License tprintf provides an intuitive interface to fprintf for writing tabular data to a text file. tprintf(filespec,format,A1,...,An) creates a tabular text file by writing the columns of A1,...,An to columns in the text file. . fprintf(fid,format,v1,v2,...), where v1,v2,... are scalars, writes one row. To print several rows one may put the function in a for-loop. That code is easy to read and understand. However, with large files speed becomes a problem. fprintf(...,C{:}), where C is a cell array containing numeric and character data, writes the text file much faster. With pure numerical data fprintf(...,M), where M is matrix writes even faster. However, the cell array, C, and the matrix, M, come at a price. It takes some effort to create them and the resulting code is not all that easy to read and understand - IMO. With tprintf I try to combined the best of the two. . Installation: This submission consists of three m-files and this documentation. Copy the m-files to a folder on the Matlab search path. Verify that tprintf is working by running . >> tprintf( 1, '%d, %4.1f, %s, %s\n', [1;2], rand(2,1),{'first';'second'},['ABC';'DEF'] ) 1, 0.6, first, ABC 2, 0.1, second, DEF ans = 41 Cite As per isakson (2023). tprintf (https://www.mathworks.com/matlabcentral/fileexchange/64390-tprintf), MATLAB Central File Exchange. Retrieved . MATLAB Release Compatibility Created with R2016a Compatible with any release Platform Compatibility Windows macOS Linux Community Treasure Hunt Find the treasures in MATLAB Central and discover how the community can help you! Start Hunting! Version Published Release Notes 1.01 fixed typo lines added to "Overwiew" 1.0.0.0
ESSENTIALAI-STEM
Westeremden yew-stick The Westeremden yew-stick is a yew-wood stick found in Westeremden in the Groningen province of the Netherlands in 1917. It bears an Old Frisian runic inscription, dated to the second half of the 8th century. With a total of 41 letters, this is the longest of the extant Frisian runic inscriptions. Transliteration The inscription is divided into three lines, as follows: * ᚩᛈᚻᚳᛗᚢᛡᛁ[[Image:Rune-Stan2.png|12px|]]ᛅᛞᚪᚳᛗᛚᚢᚦ: * ᚹᛁᛗᛟ[[Image:Rune-Stan2.png|12px|]]ᚳᚻᚦᚢᚴᛅ * ᛁᚹᛁᚩ[[Image:Long-branch Kaun2.png|12px|]]ᚢ[[Image:Rune-Stan.png|12px|]]ᛞᚢᚿᚩᛚᛖ: Runes with unfamiliar shapes or uncertain values are: * [[Image:Runic letter stan.svg|14px|]], a Spiegelrune of ᛒ, similar to a variant of ᛥ stan, transliterated as B below * [[Image:Rune-Stan.png|14px|]], a Spiegelrune of ᛈ, similar to a variant of ᛥ stan, transliterated as P below * [[Image:Long-branch Kaun2.png|14px|]], like Younger Futhark kaun, transliterated as K below * ᚳ (like Anglo-Saxon cen, occurring three times); it apparently represents a vowel, likely æ, replacing absent ᚫ æsc * ᛅ (like Younger Futhark ar), transliterated as A below * ᚴ, a "bookhand-s", transliterated as S below * ᚿ, like a short-twig n, probably for ᚾ n with these decisions, the transliteration may be: * ophæmujiBAdaæmluþ: * wimœBæhþuSA * iwioKuPdunale: Interpretations Seebold (1990) reads (transliterating g for j, v for B, ë for A, ô for œ): * ophæmu givëda amluþ:iwi ok upduna (a)le wimôv æh þusë Looijenga (1997) reads: * op hæmu jibada æmluþ : iwi ok up duna (a)le wimœd æh þusa This reading gives rise to an interpretation along the lines of * "luck (amluþ) stays (gibada) at home (op hæmu); and (ok) at the yew (iwi) may it grow (ale) on the hill (up duna); Wimœd has (æh) this (þusa)." or paraphrased more loosely, "At the homestead stays good fortune, may it also grow near the yew on the terp; Wimœd owns this." In a controversial suggestion going back to 1937, the sequence æmluþ has often been interpreted as a reference to Amleth ("Hamlet"). The inscription is here interpreted as * ophamu gistadda amluþ : iwim ost ah þukn iwi os ust dukale and given the translation The association has led to speculative proposals to the point that Quak (1991) called for a re-examination for the inscription with the ironic caveat "maybe disregarding associations with Hamlet or Amluth". * "Amluth took his (fighting) position on the high place. Before his yews the waves cowered. May the waves cower before this yew."
WIKI
Burgstadt Burgstadt may refer to: * Bürgstadt, the community in the Miltenberg district, Lower Franconia, Germany * Burgstädt, town in the district of Mittelsachsen, in the Free State of Saxony, Germany
WIKI
Page:The Strand Magazine (Volume 1).djvu/435 T that time my aunt Herminie, fatherless and motherless, was living in the old abbey of Mauvoisin, near Corbeil, which was disaffected and had become very national. It was during the Reign of Terror, and she was nearly twenty years old. She was there with two old ladies, Madame Maréchal and Madame Badouillet: the former tall and thin, the latter little, stout, and one-eyed. One evening—but it will be better to let Aunt Herminie tell the tale herself. I fancy I can hear her now, relating this story which excited me so, the story which I was continually asking her to repeat. The story? You wish me to repeat it once more, my child? Well, it was in those days. That evening we were sitting by the fire: Madame Maréchal and I were chatting, Madame Badouillet had fallen asleep. It was about ten o'clock; outside it was very windy—blowing hard. Oh! I remember it well. Suddenly, there came a knock at the door. I must tell you first of all that a troop of soldiers, about a hundred, had arrived during the day. The officer in command, a big red-headed fellow, had shown us a paper, an order to billet them. They had taken up their quarters in the chapel, and had passed the day there, eating, drinking, singing, and playing cards. They made a dreadful din. They all calmed down when evening came, and were all sleeping in groups. You will understand, little one, that it was not very reassuring for three lone women to be near such people. Madame Maréchal's husband was away, Madame Badouillet was a widow, and I an orphan; so we bolted ourselves in the little room on the ground floor which was situated between the high road and the chapel, and that's where we were when the knock came, as I have just told you. Madame Badouillet woke up with a jump, and we all three looked straight at each other with frightened eyes. A moment passed and there was another knock—louder this time. We had a good mind to sham deafness, as you may imagine, but joking was dangerous in those days. If you refused hospitality to patriots, you were regarded as a "suspect," as they called it, and then—the guillotine! It was all over with you in no time. Madame Maréchal began to recite her prayers; Madame Badouillet shook in every limb; besides, I was the youngest, so I ought to open the door.
WIKI
Germline selection Mutations go up with paternal age.  Generally,  the increase is nearly linear with age, but a few increase far more rapidly.  In those cases, a special mechanism is involved. One of those cases is Apert syndrome,  a nasty congenital disorder characterized by skeletal malformations (skull, face, hands , and feet).   It’s rare, hitting about 1 in 100,000 kids. It’s an autosomal dominant, caused by mutations in the FGFR2 gene (fibroblast growth factor receptor 2) .  Oddly enough, almost all cases are caused by two particular mutations  of the FGFR2 gene, either the S252W mutation or the P253R mutation. Which means that it ought to be far rarer than it actually is. The per-generation mutation rate per nucleotide is about 1 x 10-8,  so with two possible sites, you’d expect to see a frequency of about 1 in fifty million.  It’s 500 times more common than it should be. You’re more likely to have heard of achondroplasia, standard dwarfism.  It’s caused by mutations of the FGFR3 gene.  Almost all cases are caused by a single mutation, a G-to-A transition at nucleotide 1138 that results ion a substitution of arginine for a glycine.. It’s not common – roughly 1 in 20,000 births – but it ought to be more like one in 100 million.  Five thousand times more common that it ought to be. The fact that these two genetic diseases are caused by two closely related genes, FGFR2 and FGFR3 is no coincidence. Here’s what seems to be happening: you have cells in the testes that reproduce, producing one daughter cell like the parent and one that develops into a sperm cell. That’s the way it’s supposed to be.  But carrying certain very specific mutations of FGFR2 or FGFR3 seem to  cause occasional divisions that result in two daughter cells – so the pre-sperm cells that carry such mutations gradually become more and more common in the testes and produce a growing fraction of sperm with those mutations.  It’s rather like cancer. You get clumps of cells producing the bad sperm. Same things is happening with MEN2B (RET gene), which is also more common than it should be, although not as much so as achondroplasia. Without this unusual mutational mechanism, there would be a shortage of dwarfs. This entry was posted in Genetics. Bookmark the permalink. 9 Responses to Germline selection 1. marcel says: Aren’t you supposed to link to this page so everyone is clear that this is a pun. (I only learned the collective noun for dwarves a few days ago, so that I could make the same pun in a comment on another web site). As it is, this humor is so dry, many (perhaps not those who know you well) will not recognize this is a joke. Are the genetics corrects, or was that merely a buildup to the punchline? 2. infowarrior1 says: Well. Looks like the testicles is going to be an area of treatment in times to come. The thought of which makes your testicles shrivel 3. Magus Janus says: forgive my total ignorance on the subject, but is it perhaps possible something similar is going on with respects to the ghey, or is it simply way too prevalent for even something genetic like this to make happen? • gcochran9 says: It would result in simple Mendelian inheritance patterns that do not actually exist. I don’t think there’s an older-father effect. And homosexuality is way more common than dwarfism or Apert syndrome. So no. 4. dave chamberlin says: One geneticist titled mutants “hopeful monsters,” I don’t know why I think that is funny but I do. From what little I can learn from wikipedia there are three species known to engage in sex when the female is not in estrus, they are humans, chimps and dolphins. That is a pretty short list and one quite pointed to the most intelligent species on land and water. What I find interesting is that sex for the fun of it combined with a short estrus cycle allows for a far higher rate of spontaneous abortions. Now we have a very elite group of big brained animals that have devised their very own form of faster evolution because procreating hopeful monsters two times out of three (I believe that is the spontaneous abortion rate in humans) is no big deal. Causation gets sticky here as it often does in complex situations. We can’t just credit sexual friskiness to higher intelligence, those big brains evolved faster when the hopeful monsters became more frequent without hurting fitness. • dave chamberlin says: Yo, Cochran….After a couple more days of thought there is one kernel worth emphasizing in this otherwise babblicious post. A while back you wondered why humans had such a high spontaneous abortion rate, higher than any other species. Me thinks the answer is what it has has to be, it has an evolutionary advantage. It allowed our ancestors to move faster down the evolutionary road to bigger better brains since as stated above we were able to create more hopeful monsters without denting fitness. Gould’s punctuated equilibrium is missing a piece to make it logical. That piece is how it works. Now lets open a gate of opportunity for a species to evolve a thousand tiny steps that yield a net result of evolving to a highly successful niche. The advantage given by each one thousandth mutation increase in chimp/man ancestor intelligence will never give enough push to move us down the evolutionary road. Humans were the lucky winner because of hands, geography (dividing the world into three continents with one meeting point sure as hell helped the hybridization thing to happen), higher spontaneous abortion rate, and a world filled with new food sources just waiting to be exploited by a slightly smarter ape. 5. Brian says: I’m sure he meant to say dwarrows. 6. Genetic Garbage says: I know that my girlfriend will want children once we’re married, but I suspect that my age (almost 40) combined with my unspectacular pedigree will place my children at a huge competitive disadvantage. I can’t imagine raising children, boys in particular, who will have just enough sense to realize their lowly caste but not enough to escape it. I’d forgive them for hating me for having brought them into such an existence. I probably should use a sperm donor, but I could never do so openly. My girlfriend would lose any respect she ever had for me. I agree with nearly everything on this site, but it has the unfortunate effect of convincing me that I really ought to be sterilized _at best_. Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out /  Change ) Google photo You are commenting using your Google account. Log Out /  Change ) Twitter picture You are commenting using your Twitter account. Log Out /  Change ) Facebook photo You are commenting using your Facebook account. Log Out /  Change ) Connecting to %s
ESSENTIALAI-STEM
Latter Day Saints' Messenger and Advocate/Volume 1/Number 11/Doctrine and Covenants DOCTRINE AND COVENANTS. By an article entitled "General Assembly," in this month's paper, it will be seen that the Doctrine and Covenants of the Church of Latter Day Saints, is nearly ready for sale. At any rate it may be expected in the course of a month, as one thousand copies have already been delivered to the binder. Since the commencement of this work, even in Missouri, where, just before it was ready to come out, it fell into the hands of a mob, our anxiety and exertions have been unabated, to put in the possession of the Saints, and all who feel a desire to be saved. We have greatly desired that this little sacred volume might go into the world, that the inhabitants thereof might know what the Lord was about to do in the last days. We know that the word of the Lord is sure, and never fails, and, as faithful servants to him, living in the hope of a glorious resurrection with the just when the righteous arise to meet him in the cloud, we bear testimony that the revelations therein contained are true and faithful. We hope and pray that the Saints may be as anxious to keep the commandments, and be governed by the Doctrine and Covenants, contained in said book, as they have been for its publication: if they do observe all the requirements towards perfecting themselves in holiness, that they may serve the Lord acceptably with "clean hands and pure hearts," it will be well with them: but if they neglect to walk in all the ordinances of the Covenants and law of the Lord blameless, they must be chastened. The righteous shall be had in everlasting remembrance before the Lord, but the ungodly shall be cut off and forgotten; and their end no man knoweth, save he that is ordained to such condemnation. P.
WIKI
San Bernardino Station San Bernardino station may refer to: * San Bernardino Santa Fe Depot, the rail station opened in 1918 * San Bernardino Transit Center, the rail and bus station opened in 2014 * San Bernardino Downtown Station, the post office on the list of National Register of Historic Places
WIKI
標題: Mammalian Ste20-like protein kinase 3 mediates trophoblast apoptosis in spontaneous delivery 作者: Wu, Hung-Yi Lin, Chia-Ying Lin, Tze-Yi Chen, Tai-Chang Yuan, Chiun-Jye 生物科技學系 Department of Biological Science and Technology 關鍵字: Mst3;oxidative stress;placenta;trophoblasts;apoptosis;parturition 公開日期: 1-Feb-2008 摘要: The placenta is essential in transferring gases and nutrients from the mother to the developing fetus. Trophoblast apoptosis may cause labor or other pregnancy-related disorders. This study demonstrated the essential role of Mst3, a human Ste20-like protein kinase, in the oxidative stress-induced apoptosis of trophoblasts of term placenta in normal spontaneous delivery. Oxidative stress, but not hormones released during labor such as prostaglandin E-1, oxytocin or angiotensin II, induces the expression of Mst3 and apoptosis of human term placenta after elective Cesarean section without labor pain. The role of Mst3 in oxidative stress-induced apoptosis was further demonstrated in the 3A-sub-E, a human trophoblast cell line. The H2O2-induced apoptosis of 3A-sub-E cells was largely suppressed by overexpressed Mst3(KR), the kinase-dead mutant or by selective knockdown of endogenous Mst3. Further studies showed that Jun N-terminal kinase (JNK) may participate in the signaling pathway of H2O2-induced apoptosis by mediating the level of Mst3. Subsequently, caspase 3 and other downstream apoptotic components may be activated by Mst3 and trigger the apoptotic process in human trophoblasts. URI: http://dx.doi.org/10.1007/s10495-007-0161-x http://hdl.handle.net/11536/9735 ISSN: 1360-8185 DOI: 10.1007/s10495-007-0161-x 期刊: APOPTOSIS Volume: 13 Issue: 2 起始頁: 283 結束頁: 294 Appears in Collections:Articles Files in This Item: 1. 000252797000009.pdf If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.
ESSENTIALAI-STEM
Charmin MINER, et al., Plaintiffs, v. DISTRICT OF COLUMBIA, et al., Defendants. Civil Action No. 13-633 (BAH) United States District Court, District of Columbia. Signed April 9, 2015 Joseph D. Gebhardt, Anthony J. Kamin-ski, The Law Offices of Gary M. Gilbert & Associates, P.C., Silver Spring, MD, for Plaintiff. Shermineh C. Jones, Office of the Attorney General for the District of Columbia, Washington, DC, for Defendant. MEMORANDUM OPINION BERYL A. HOWELL, United States District Judge The two plaintiffs in this matter, Charmin Miner and Gary Baldwin, allege that the defendants, the District of Columbia and four District of Columbia Metropolitan Police Department (“MPD”) Officers, violated the plaintiffs’ constitutional and common law rights during a traffic stop at the Anacostia Metro Station in Southeast Washington, D.C. See generally First Am. Compl. (“FAC”), ECF No. 13. The defendants now seek summary judgment, pursuant to Federal Rule of Civil Procedure 56, on all claims. Defs.’ Mot. Summ. J. (“Defs.’ Mot.”) at 1-2, ECF No. 26. For the reasons set forth below, the defendants’ motion is granted in part and denied in part. I. BACKGROUND The parties dispute many aspects, and the import, of the events giving rise to the. instant suit. Compare Defs.’ Statement of Undisputed Material Facts (“Defs.’ SMF”), ECF No. 26, mth Pis.’ Resp. Defs.’ SMF (“Pis.’ SMF”), ECF No. 28-1. The factual allegations set out in the FAC, as supported and supplemented by the record, are summarized here, with relevant disputes identified where necessary. On February 6, 2012, the plaintiffs “were dropping their friend off at his apartment when they noticed another vehicle pull in front of them.” Defs.’ SMF ¶ 1. As the plaintiffs drove away, the vehicle they had previously noticed “backed up and traveled in the same direction as they did.” Id. ¶ 2. The plaintiffs allege that, in doing so, the unidentified vehicle “started chasing [them]” through a nearby alley, driving so quickly as to stir up road debris as it passed. Pis.’ SMF ¶ 2. Alarmed, the plaintiffs admit that Plaintiff Miner, who was driving, “began to make ‘quick’ lefts and ‘quick’ rights to lose the [other] vehicle ... traveling at about 50 or 60 miles per hour,” Defs.’ SMF ¶¶ 3-4, although the plaintiffs contend that, at least initially, the plaintiffs were attempting to allow the unidentified vehicle “to get around [them],” Pis.’ SMF ¶ 3. The unidentified vehicle was only identified as an unmarked police SUV at the time of the plaintiffs’ stop and detention. FAC ¶¶ 10, 15, 19. The plaintiffs allege that when the defendant officers allegedly began chasing the plaintiffs vehicle, the defendant officers had no probable cause to detain them, a state of affairs that continued at the Anacostia Metro Station. See FAC ¶¶ 64-66. As the defendants continued following the plaintiffs, the plaintiffs believed they were being chased by unknown assailants, Pis.’ SMF ¶ 5, eventually resulting in the plaintiff driving “on the wrong side of the street” at up to “80 or 90 miles per hour,” Defs.’ SMF ¶ 5. After approximately five minutes, the plaintiffs believed “that they had lost the [other] vehicle,” but upon seeing the vehicle again, the plaintiffs again began to speed to escape. Defs.’ SMF ¶ 6. Eventually, the plaintiffs “drove into a ‘one-way’ street that was labeled with a ‘Do Not Enter’ sign traveling at about 70 miles per hour” at the Anacostia Metro Station. Defs.’ SMF ¶ 7. The plaintiffs “believe that, when pursued, they were being subjected to a carjacking or gang intimidation” and therefore “sought to drive [their] vehicle to an open, well-illuminated area.” FAC ¶¶ 13-14. Plaintiff Miner states that as he approached the Metro Station he “was really looking for a police officer, or somebody to run to,” Pis.’ Opp’n Defs.’ Mot. Summ. J. (“Pis.’ Opp’n”) Ex. 1 (Dep. of Plaintiff Charmin Miner (“PI. Miner’s Dep.”)) at 29:5-7, ECF' No. 28-3. Plaintiff Miner avers that he came to a stop next to a Washington Metropolitan Area Transit Authority (“Metro”) Police Officer, to whom he stated “somebody’s chasing me, somebody’s chasing me.” Id. at 29:18-19. Shortly after Plaintiff Miner brought his vehicle to a halt, four people, later identified as MPD officers, emerged from the pursuing SUV and “yelled to [the plaintiffs] ‘Where the guns and drugs at?’” Defs.’ SMF ¶ 8. The plaintiffs allege that at this time, the four MPD officers “pulled Mr. Miner and Mr. Baldwin from Mr. Miner’s vehicle, threw them on the ground, and put guns against their bodies, ie., their heads and backs.” FAC ¶ 14. Defs.’ SMF ¶ 9. Plaintiff Miner alleges that “Officer Elliott” grabbed him by the shirt “and threw [him] on the ground,” Defs.’ SMF ¶ 11, “pointed [a] gun at Plaintiff [Miner’s] head,” Pis.’ SMF ¶ 11, and stepped on Plaintiff Miner’s glasses, which had fallen off his face, Defs.’ SMF ¶ 11. As Plaintiff Miner was being “forced into a passive position on the ground,” Plaintiff Miner avers that he “asked the officers several times why they did not turn on their lights or sirens,” but did not receive an answer. FAC ¶ 19. Plaintiff Miner also alleges that he was “picked ... up off the ground and ... put on the hood of [a] car,” Defs.’ SMF ¶ 13, after Plaintiff Miner had his hands placed behind his back, id. ¶ 12. Both plaintiffs allege that as a result of these actions, including the MPD officers “aggressively pointing] guns” at them, the plaintiffs were put “in fear for their lives.” FAC ¶ 17. The plaintiffs allege that they were detained “against their will and without legal justification for approximately one half hour,” FAC ¶ 20, during which time “the officers asked for and ran their names in the system,” after which the plaintiffs were told “they were free to leave.” Defs.’ SMF ¶ 14. Plaintiff Miner was not issued a traffic citation. FAC ¶ 22. The next day, Plaintiff Miner “spoke with Assistant Chief of Police Diane Groomes and told her about the incident.” FAC ¶ 23. After documenting his allegations in an email on February 8, 2012, “Assistant Chief Groomes acknowledged Mr. Miner’s email and wrote that his complaint would be forwarded to MPD’s Internal Affairs Division.” Id. Plaintiff Miner was later contacted by an MPD Lieutenant, who interviewed Plaintiff Miner regarding the incident. Id. ¶ 24. The plaintiffs were later informed that “MPD found that there were insufficient facts to substantiate Mr. Miner’s complaint,” and that the officers involved were “not diseipline[d] ... for the February 6, 2012 incident, although MPD did discipline them for not patrolling their assigned area on that date.” Id. ¶ 25. The plaintiffs allege nine causes of action under common law and Federal law: Count I for common law “False Detention and/or False Arrest,” FAC ¶¶ 35-37; Count II for common law “Assault,” id. ¶¶ 38-40; Count III for common law “Battery,” id. ¶¶ 41-43; Count IV for common law “Negligent Supervision,” id. ¶¶ 44-46; Count V for “Negligent Supervision under” 42 U.S.C. § 1983, id. ¶¶ 47-57; Count VI for violation of the plaintiffs’ Fourth Amendment right to be free from unreasonable searches and seizures, pursuant to 42 U.S.C. § 1983, against the District of Columbia, id. ¶¶ 58-62; Count VII for violation of the plaintiffs’ Fourth Amendment right to be free from unreasonable searches and seizures, pursuant to 42 U.S.C. § 1983, against the individual MPD officers, id. ¶ 63-66; Count VIII for violation of the plaintiffs’ Fourth Amendment right to be free from the use of excessive force during a seizure, pursuant to 42 U.S.C. § 1983, against the District of Columbia, id. ¶¶ 67-72; and Count IX for violation of the plaintiffs’ Fourth Amendment right to be free from the use of excessive force during a seizure, pursuant to 42 U.S.C. § 1983, against the individual MPD officers, id. ¶¶ 73-77. The plaintiffs initially filed this matter in D.C. Superior Court and the defendants removed the case to this Court. Joint Not. Removal at 1, ECF No. 1. MPD Chief Cathy Lanier and former District of Columbia Mayor Vincent Gray, who were named as defendants in the initial complaint, was dismissed upon the defendants’ motion at a hearing held November 1, 2013. Minute Order, Nov. 1, 2013. Following discovery, the defendants have moved for summary judgment on all remaining claims against all remaining defendants. II. LEGAL STANDARD Federal Rule of Civil Procedure 56 provides that summary judgment shall be granted “if the movant shows that there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law.” Fed. R. Civ. P. 56(a). Summary judgment is properly granted against a party who, “after adequate time for discovery and upon motion, ... fails to make a showing sufficient to establish the existence of an element essential to that party’s case, and on which that party will bear the burden of proof at trial.” Celotex Corp. v. Catrett, 477 U.S. 317, 322, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). The burden is on the moving party to demonstrate that there is an “absence of a genuine issue of material fact” in dispute. Id. at 323, 106 S.Ct. 2548. In ruling on a motion for summary judgment, the Court must draw all justifiable inferences in favor of the nonmoving party and accept the nonmoving party’s evidence as true. Tolan v. Cotton, — U.S. -, 134 S.Ct. 1861, 1863, 188 L.Ed.2d 895 (2014) (per curiam); Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 255, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). As the Supreme Court recently stressed, “a ‘judge’s function’ at summary judgment is not ‘to weigh the evidence and determine the truth of the matter but to determine whether there is a genuine issue for trial.’ ” Tolan, 134 S.Ct. at 1866 (quoting Anderson, 477 U.S. at 249, 106 S.Ct. 2505). When a court “fail[s] to credit evidence” presented by the nonmovant “that contra-diet[s] some of its key factual conclusions, the court improperly weights] the evidence and resolve[s] disputed issues in favor of the moving party.” Id. at 1866 (internal quotations and citations omitted). In evaluating the evidence offered at summary judgment, the Court is only required to consider the materials explicitly cited by the parties, but may on its own accord consider “other materials in the record.” Fed. R. Civ. P. 56(c)(3). Discerning whether a genuine factual dispute requires presentation to a jury “is as much art as science.” Estate of Parsons v. Palestinian Auth., 651 F.3d 118, 123 (D.C.Cir.2011). To be “genuine,” .the nonmoving party must establish more than “[t]he mere existence of a scintilla of evidence in support of [its] position,” Anderson, 477 U.S. at 252, 106 S.Ct. 2505, and cannot rely on “mere allegations” or conclusory statements, Veitch v. England, 471 F.3d 124, 134 (D.C.Cir.2006); see also Greene v. Dalton, 164 F.3d 671, 675 (D.C.Cir.1999); Harding v. Gray, 9 F.3d 150, 154 (D.C.Cir.1993); accord Fed. R. Civ. P. 56(e). Rather, the nonmoving party must present specific facts that would enable a reasonable jury to find in that party’s favor on all essential elements of the claim on which that party will bear the burden of proof at trial. See Fed. R. Civ. P. 56(c)(1); Equal Rights Ctr. v. Post Props., 633 F.3d 1136, 1141 n. 3 (D.C.Cir.2011) (noting that at the summary judgment stage, plaintiff “can no longer rest on such ‘mere allegations,’ but must ‘set forth’ by affidavit or other evidence ‘specific facts,’ ... which for purposes of the summary judgment motion will be taken to be true,’ ” quoting Sierra Club v. EPA, 292 F.3d 895, 898-99 (D.C.Cir.2002) (ellipsis in original)); see also Solomon v. Vilsack, 763 F.3d 1, 12 (D.C.Cir.2014); United States ex rel. K & R Ltd. P’ship v. Mass. Hous. Fin. Agency, 530 F.3d 980, 983 (D.C.Cir.2008). “If the evidence is merely colorable, or is not significantly probative, summary judgment may be granted.” Anderson, 477 U.S. at 249-50, 106 S.Ct. 2505 (citations omitted). III. DISCUSSION The plaintiffs’ claims can be generally divided into two categories: those against the municipality and those against the individual MPD officers. Four claims are raised exclusively against the municipality: common law negligent supervision (Count IV); negligent supervision, pursuant to 42 U.S.C. § 1983 (Count V); and Fourth Amendment false arrest and excessive force violations, pursuant to 42 U.S.C. § 1983 (Counts VI and VIII, respectively). The remaining five claims in Counts I, II, III, VII, and IX, are raised against the individual MPD officers. The claims against the municipality are examined first before turning to the claims against the individual officers. A. Summary Judgment Is Warranted In Favor Of The District of Columbia On All Claims Against The Municipality In Counts IV, V, VI, and VIII In a Section 1983 suit, alleging violation of constitutional rights by an individual acting under color of state law, the District of Columbia, as a municipality, “cannot be held liable solely because it employs a tortfeasor—or, in other words, a municipality cannot be held liable under § 1983 on a respondeat superior theory.” Monell v. Dep’t of Soc. Servs., 436 U.S. 658, 691, 98 S.Ct. 2018, 56 L.Ed.2d 611 (1978) (emphasis in original). Instead, to succeed on a Section 1983 claim against a municipality, the plaintiff must show both a predicate violation of some right, privilege, or immunity secured by the Constitution or laws of the United States, see 42 U.S.C. § 1983, and “that the municipality’s custom or policy caused the violation.” Warren v. District of Columbia, 353 F.3d 36, 38 (D.C.Cir.2004) (citing Collins v. City of Harker Heights, 503 U.S. 115, 123-24, 112 S.Ct. 1061, 117 L.Ed.2d 261 (1992)). The plaintiffs appear to concede this requirement by arguing in their opposition that “evidence that the officers’ inappropriate actions are accepted by policymakers ... establishes municipal liability.” Pis.’ Opp’n at 6. The defendants do not argue, nor does the Court need to address, the first prong of the test, the presence of a predicate violation, since the plaintiffs have failed to put forward the evidence necessary to prove municipal liability. The plaintiffs are correct that one of three recognized methods for showing that a municipal policy or custom caused a constitutional violation for Section 1983 purposes is that “the municipality or one of its policymakers explicitly adopted the policy that was ‘the moving force of the constitutional violation.’ ” Jones v. Horne, 634 F.3d 588, 601 (D.C.Cir.2011). In the plaintiffs’ view, Assistant Chief Groomes “condoned” the individual officers’ behavior in following and stopping the plaintiffs without reason and using excessive force against them during the stop. Pis.’ Opp’n at 6-7. Yet, the plaintiffs admit that Assistant Chief Groomes opened an investigation into the defendant officers’ conduct and disciplined them for leaving their designated patrol area. Pis.’ SMF ¶ 16. Nevertheless, following the investigation, the plaintiffs contend that the failure to find sufficient facts “to support Mr. Miner’s allegations and failing to discipline the officers for any of their actions other than patrolling the wrong area” constitutes the “acceptance of the officers’ conduct.” Id. At base, then, the plaintiffs are challenging the municipal defendant’s actions in investigating the plaintiffs’ claims and, after finding insufficient evidence to support those claims, failing to discipline the officers involved despite the insufficient evidence. See id. Assuming, arguendo, that these actions could constitute “condoning” the officers’ behavior, the plaintiffs have offered no evidence that Assistant Chief Groomes is a “policymaker” for the District of Columbia. The Supreme Court has interpreted the term “policymaker” narrowly, noting that “when a subordinate’s decision is subject to review by the municipality’s authorized policymakers,” those policymakers “have retained the authority to measure the official’s conduct for conformance with their policies.” City of St. Louis v. Praprotnik, 485 U.S. 112, 127, 108 S.Ct. 915, 99 L.Ed.2d 107 (1988) (emphasis in original). In this Circuit, courts “have held that a final policy maker ‘typically must be at least an agency head or the governing body of an agency.’ ” Allen-Brown v. District of Columbia, No. 13-1341, 54 F.Supp.3d 35, 40, 2014 WL 3051021, at *4 (D.D.C. July 7, 2014) (quoting Coleman v. District of Columbia, 828 F.Supp.2d 87, 91 (D.D.C.2011)). This requirement is in accord with the D.C. Circuit’s holding in Tripett v. District of Columbia, that “[t]he only acts that count” for Monell purposes “are ones by a person or persons who ‘have final policymaking authority [under] state law.’ ” 108 F.3d 1450, 1453 (D.C.Cir.1997) (quoting Jett v. Dallas Indep. Sch. Dist., 491 U.S. 701, 737, 109 S.Ct. 2702, 105 L.Ed.2d 598 (1989)). In Mien-Brown, the court found that the “Director of MPD’s Medical Services Branch” was not a “policymaker” for municipal liability purposes, since “there was nothing in the record to indicate that [the Director] makes broad departmental policy decisions at all.” Allen-Brown, 54 F.Supp.3d at 42, 2014 WL 3051021, at *5. Other similarly high-ranking government officials who fell short of being the person with whom, for lack of a better term, the “buck stops,” have been found insufficiently empowered to trigger municipal liability. See, e.g., Sheller-Paire v. Gray, 888 F.Supp.2d 34, 40 (D.D.C.2012) (finding assistant fire chief and fire “Department’s upper management” insufficiently empowered to impute municipal liability as final decision-making authorities); Coleman, 828 F.Supp.2d at 91-92 (finding both Assistant Fire Chief and overall Chief of Fire Department insufficiently empowered to impute municipal liability absent statutory grant of final authority over Department actions); Byrd v. District of Columbia, 807 F.Supp.2d 37, 75 (D.D.C.2011) (finding Director of D.C. Parks and Recreation Department insufficiently empowered to impute municipal liability absent statutory grant of final authority over Department actions). In the District of Columbia, the Mayor is ultimately responsible for the police department, see D.C.Code § 5-101.03, and the Mayor appoints a Chief of Police, “with the advice and consent of the [City] Council,” D.C.Code § 5-105.01 (a-l)(l), to administer the police department. All police officers are required to “respect and obey the Chief of Police as the head and chief of the police force, subject to the rules, regulations, and general orders of the Council of the District of Columbia and the Mayor of the District of Columbia.” D.C.Code § 5127.03. Thus, by law, police officers below the level of the Chief of Police — and, arguably, the Chief herself, see Coleman, 828 F.Supp.2d at 92 (finding Fire Department Chief non-“policymaker” because, inter alia, the “Mayor and the City Council have expressly reserved supervisory powers to themselves”) — are subordinates whose “decisionfs are] subject to review by the municipality’s authorized policymakers.” See Praprotnik, 485 U.S. at 127, 108 S.Ct. 915. Set against the legal background, the conclusion is clear: even assuming that Assistant Chief Groomes “condoned” the actions of the four MPD officers at issue in this matter, the plaintiffs have submitted no evidence that Assistant Chief Groomes is imbued with the final authority necessary to qualify as a “policymaker” for Mo-nell purposes. Moreover, as described above, the statutory scheme would appear to foreclose holding a municipality liable for an Assistant Chiefs actions. Assistant Chief Groomes is not a “policymaker” such that her actions can be attributed to the municipality. See id.; see also Tripett v. District of Columbia, 108 F.3d at 1453 (noting in similar D.C.Code provision where Mayor appointed Director of Department of Corrections, said Director, Mayor, and City Council were “policymakers” for Section 1983 purposes). Thus, the plaintiffs’ policymaker theory must fail and summary judgment must be granted to the District of Columbia on the plaintiffs’ claims under Section 1983, since the plaintiff has failed to satisfy Monell’s requirement by identifying a policy or custom that caused the plaintiffs’ alleged injuries. The plaintiffs also assert a “deliberate indifference theory” of municipal liability, predicated on the notion that Assistant Chief Groomes’ “condon[ed]” the officers’ actions by acquiescing “in longstanding practice or custom which constitutes standard operating procedure.” Pis.’ Opp’n at 6-7. Courts determine whether municipal liability may lie on such a theory “by analyzing whether the municipality knew or should have known of the risk of constitutional violations, but did not act.” Warren v. District of Columbia, 353 F.3d 36, 39 (D.C.Cir.2004) (internal quotation marks omitted). In other words, “faced with actual or constructive knowledge that its agents will probably violate constitutional rights, the city may not adopt a policy of inaction.” Id. (citing Farmer v. Brennan, 511 U.S. 825, 841, 114 S.Ct. 1970, 128 L.Ed.2d 811 (1994)). The plaintiff fails to present evidence to show that the municipality in this case had “actual or constructive knowledge that its agents will probably violate constitutional rights.” Id. As support for its theory, the plaintiff produced a study conducted between 1994 and 1999 that found issues with MPD officers’ use of force, specifically, that MPD officers were using excessive force too often. See Pis.’ Opp’n at 7. This single study, which was more than a- decade old at the time of the incident, also . noted that the MPD had made strides by 1999, when the study was published, in improving its compliance with the law regarding excessive force. U.S. Dep’t of Justice, Findings Letter re: Use of Force by the Washington Metropolitan Police Department, (no date), available at http:// www.justice.gov/crt/about/spl/documents/ dcfindings.php. Thus, in addition to being stale, the study itself would seem to indicate that the MPD was moving in the right direction and had no reason to know it had any current issues when the events giving rise to the instant complaint occurred. See Moore v. District of Columbia, 79 F.Supp.3d 121, 140, 2015 WL 474532, at *14 (D.D.C. Feb. 5, 2015) (finding eight-year-old study showing pattern of lack of probable cause for disorderly conduct arrests too remote in time to support notice of potential policy or custom in MPD at summary judgment stage). Consequently, Counts V, VI, and VIII, all of which assert claims against the District of Columbia under Section 1983, are dismissed. The sole remaining claim against the District of Columbia is Count IV, which alleges common law negligent supervision for failing to ensure that the individual officers did not violate the plaintiffs’ constitutional rights. FAC ¶¶ 44-46. For a common law negligent supervision claim to succeed in the District of Columbia, the plaintiff must “show that an employer knew or should have known its employee behaved in a dangerous or otherwise incompetent manner, and that the employer, armed with that actual or constructive knowledge, failed to adequately supervise the employee.” District of Columbia v. Tulin, 994 A.2d 788, 794 (D.C.2010) (quoting Giles v. Shell Oil Corp., 487 A.2d 610, 613 (D.C.1985)); accord Rawlings v. Dis trict of Columbia, 820 F.Supp.2d 92, 114 (D.D.C.2011). Negligence actions require that the plaintiff “establish ] three elements: (1) the applicable standard of care; (2) a deviation from that standard by the defendant, and (3) a causal relationship between the deviation and the injury.” Robinson v. Wash. Metro. Area Transit Auth., 774 F.3d 33, 38 (D.C.Cir.2014) (quoting Varner v. District of Columbia, 891 A.2d 260, 265 (D.C.2006)) (internal quotation marks omitted). The defendants correctly point out that the plaintiffs have failed to identify an expert to establish the standard of care the defendants allegedly breached. Defs.’ Mem. Supp. Defs.’ Mot. (“Defs.’ Mem.”) at 6, ECF No. 26. Under District of Columbia law, “where the subject in question is so distinctly related to some science, profession or occupation as to be beyond the ken of the average layperson, the plaintiff must proffer expert testimony to establish the applicable standard of care.” Robinson, 774 F.3d at 39 (internal quotation marks and citations omitted). Although the plaintiffs rely on Wesby v. District of Columbia, 841 F.Supp.2d 20, 48 (D.D.C.2012), for the principle that “expert testimony is [not] required in all police negligent supervision cases,” Wesby is distinguishable on its facts in a manner that is fatal to the plaintiffs’ claim. In affirming the District Court’s holding that an expert on the standard of care for supervising police officers was not required in Wesby, the D.C. Circuit acknowledged that “courts often require expert testimony where the training and supervision of police officers is concerned,” but found that “the fact that the supervising official was on the scene and directed the officers to make the unlawful arrests distinguished” Wesby from those cases. Wesby v. District of Columbia, 765 F.3d 13, 30 (D.C.Cir.2014). In the instant matter, there is no contention that Assistant Chief Groomes was “on the scene” with the officers at the Anacostia Metro Station. Thus, the instant matter falls into the realm of cases where “expert testimony is routinely required,” because the negligence at issue “involves issues of safety, security and crime prevention.” Briggs v. Wash. Metro. Area Transit Auth., 481 F.3d 839, 845-46 (D.C.Cir.2007). Asking a jury to evaluate the appropriate standard of care in supervising police officers would result in the jury being “forced to engage in idle speculation regarding the duty of care governing ... the training of [the defendants’] employees, and such speculation on the part of a jury is not permissible.” Parker v. Grand Hyatt Hotel, 124 F.Supp.2d 79, 90 (D.D.C.2000). Although Wesby stands for the proposition that expert testimony may not be necessary when a supervisor is present on the scene of an incident, such an exception does not apply to the instant case, meaning the plaintiffs’ failure to identify an expert for the purpose of establishing the requisite standard of care is fatal to the plaintiffs’ negligent supervision claim. See Briggs, 481 F.3d at 845-46. Consequently, Defendant District of Columbia’s motion for summary judgment as to Count IV is granted. B. Material Factual Disputes Preclude Summary Judgment In Favor Of The Individual Officers On Counts I, II, III, VII, and IX The remaining counts against the individual officers involve myriad factual disputes that preclude summary judgment for either party. The validity of Counts I and VII, which allege common law false detention and seizure, respectively, in violation of the Fourth. Amendment under Section 1983, rests on whether the officers in question had probable cause to detain the plaintiffs. See Scott v. District of Co lumbia, 101 F.3d 748, 753-54 (D.C.Cir.1996) (“The elements of a constitutional claim for false arrest are substantially identical to the elements of a common-law false arrest claim ... the focal point of the action is the question whether the arresting . officer was justified in ordering the arrest of the plaintiff.”)- The defendants incorrectly assert that the Court may not look beyond the plaintiffs’ statements and pleadings in evaluating this Rule 56 motion. Defs.’ Reply Pis.’ Opp’n Defs.’ Mot. (“Defs.’ Reply”) at 1, ECF No. 29 (stating that “the District’s motion is based on Plaintiffs’ testimony concerning their encounter with the police” and asserting that deposition testimony of the officers involved is “a red-herring”). To the contrary, the Court may examine the entire record for the purposes of a Rule 56 motion, and the Court must “consider ... the cited materials” in the parties’ memoran-da. Fed. R. Crv. P. 56(c)(2). ' The defendants assert that the plaintiffs’ own admissions that they were driving in an erratic manner necessarily demonstrate that the defendant officers had probable cause to stop them. Defs.’ Mem. at 8-9; Defs.’ Reply at 12-13. This argument is substantially undercut by the defendant officers’ deposition testimony, denying that the officers chased the plaintiffs or observed them committing any traffic infractions. Pis.’ Opp’n at 4 (citing depositions of Officers Leboo and Torres). The plaintiffs’ admissions about driving over the speed limit and the wrong way on a roadway while fleeing from perceived threats from a pursuing vehicle, see Pis.’ SMF ¶ 5, would likely constitute probable cause for stopping the plaintiffs, if the officers admitted to observing these traffic infractions. Notably, the defendant officers do not admit to chasing the plaintiffs and, thereby, appear to foreclose the possibility that they observed the plaintiffs engaging in those acts. See, e.g., Pis.’ Opp’n Ex. 7 (MPD “Final Investigative Report,” Mar. 12, 2012) at 8, ECF No. 28-9 (statement from officer involved in incident that the officers “did not engage in a vehicular pursuit”). At least one officer stated during the subsequent MPD internal investigation that the officers did not chase the plaintiffs because their vehicle lacked the engine power to conduct a high speed chase and “because they know better than to chase.” Id. at 10-11. Indeed, for MPD officers to engage in a high-speed chase under the circumstances alleged in this case, may have violated MPD policy, see MPD Gen. Order 301.03 (Vehicular Pursuits), Feb. 25, 2003, available at https:// go.mpdconline.com/GO/GO_301_03.pdf, and this potential violation may be contributing to the unusually sharp and ironic divergence in accounts between the plaintiffs, who fully admit to traffic violations, in the face of the defendant officers’ denial of observing them. In any event, based upon the Court’s review of the entire record, a genuine dispute of material fact clearly exists as to whether the defendant officers had probable cause to stop the plaintiffs since the parties dispute whether the defendant officers actually witnessed Plaintiff Miner driving in an erratic manner with Plaintiff Baldwin in the vehicle. Thus, the defendants’ motion for summary judgment as to Counts I and VII is denied. Counts II, III, and IX, for common law battery, assault, and the use of excessive force, respectively, are also subject to material factual disputes that preclude summary judgment. The material dispute as to whether the defendant officers observed any traffic infractions, or are able to articulate any reasonable suspicion to stop the plaintiffs’ vehicle such that a half-hour search of the plaintiffs’ vehicle and detention of the plaintiffs was reasonable, see Terry v. Ohio, 392 U.S. 1, 18-19, 88 S.Ct. 1868, 20 L.Ed.2d 889 (1968); Olaniyi v. District of Columbia, 763 F.Supp.2d 70, 94 (D.D.C.2011), leads directly to a material dispute as to whether the defendant officers were authorized to use any force against the plaintiffs, let alone whether the defendants’ knowledge at the time of the stop supported the actions alleged by the plaintiffs, see Hundley v. District of Columbia, 494 F.3d 1097, 1101 (D.C.Cir.2007) (holding that “an unreasonable use of force” under Section 1983 “also is an assault and battery under D.C. law”). Since clear issues of material fact persist pertaining to the knowledge of the defendants at the time they stopped the plaintiffs, as well as the actions that occurred before and during the stop, summary judgment is precluded as to the defendant officers on Counts I, II, III, VII, and IX. IV. CONCLUSION For the foregoing reasons, the defendants’ motion is granted in part and denied in part. The defendants’ motion is granted as to the counts against the District of Columbia, namely, Counts IV, V, VI, and VIII. The defendants’ motion is denied as to the counts against the individual officers, namely, Counts I, II, III, VII, and IX. Since all dispositive motions have been resolved, the remaining parties shall appear for a pre-trial conference on June 19, 2015 at 10:00 a.m. in Courtroom 15, unless the parties seek referral to a Magistrate Judge for mediation or settlement negotiations. Absent such a referral, the parties shall be prepared to begin trial with voir dire at 9:15 a.m. on June 29, 2015 in Courtroom 15. An Order consistent with this Memorandum Opinion will issue contemporaneously. . Although the parties do not address this issue, the Court applies the law of the forum state-in this instance, the District of Columbia — when adjudicating common law claims. See Erie R. Co. v. Tompkins, 304 U.S. 64, 78, 58 S.Ct. 817, 82 L.Ed. 1188 (1938) ("Except in matters governed by the Federal Constitution or by acts of Congress, the law to be applied in any case is the law of the state .... [tjhere is no federal general common law.”); see also, Charles Alan Wright and Arthur R. Miller, et al„ 19 Fed. Practice & Proc. Juris. § 4520 (2d ed.) (noting Erie doctrine applies in in non-diversity cases).
CASELAW
Page:The Formation of Vegetable Mould through the Action of Worms (1881).djvu/26 Park, where the ground beneath was bare of all vegetation, not a single casting could be found over wide spaces, even during the autumn. Nevertheless, castings were abundant on some grass-covered glades and indentations which penetrated this forest. On the mountains of North Wales and on the Alps, worms, as I have been informed, are in most places rare; and this may perhaps be due to the close proximity of the subjacent rocks, into which worms cannot burrow during the winter so as to escape being frozen. Dr. McIntosh, however, found worm-castings at a height of 1500 feet on Schiehallion in Scotland. They are numerous on some hills near Turin at from 2000 to 3000 feet above the sea, and at a great altitude on the Nilgiri Mountains in South India and on the Himalaya. Earth-worms must he considered as terrestrial animals, though they are still in one sense semi-aquatic, like the other members of the great class of annelids to which they belong. M. Perrier found that their exposure to the dry air of a room for only a single night was fatal to them. On the
WIKI
Spiritual Counterfeits Project The Spiritual Counterfeits Project (SCP) is a Christian evangelical parachurch organization located in Pasadena, California. Since its inception in the early 1970s, it has been involved in the fields of Christian apologetics and the Christian counter-cult movement. Its current president is Dr. Mark J Harris. In its role as a think tank, SCP has sought to publish evangelically based analyses of new religious movements, New Age movements, and alternative spiritualities in light of broad cultural trends. SCP has also been at the center of two controversial U.S. lawsuits, one involving church-state issues (Malnak v. Yogi) and the other being a religious defamation case (Lee et al. v. Duddy et al.). It published the SCP Journal and Newsletter. Background The SCP began as a ministry within the Christian World Liberation Front, an outreach to students at the University of California, Berkeley. It was founded by Brooks Alexander, David Fetcho (who named the ministry), and Bill Squires. Both Alexander and Fetcho were converted to Christianity from the counterculture. Alexander had participated in the psychedelic drug usage of the counterculture, was an initiate of Transcendental Meditation, and lived in the famous Haight-Ashbury community in San Francisco. Fetcho had been involved with the Ananda Marga Yoga Society before converting to Christianity. History of SCP In 1973 Brooks Alexander and others distributed Christian leaflets at Millennium '73, a festival held at the Houston Astrodome by Guru Maharaj Ji's Divine Light Mission. That same year, Alexander, Fetcho and David Haddon launched a grass-roots campaign to oppose the practice of Transcendental Meditation in American public high schools. In 1975 the SCP was formally incorporated as an "independent Christian nonprofit organization." The four primary purposes of SCP included: "1. To research today's spiritual movements and critique them biblically. 2. To equip Christians with the knowledge, analysis, and discernment that will enable them to understand the significance of today's spiritual explosion. 3. To suggest a Christian response which engages the church with all levels of situation. 4. To bring the good news of Jesus Christ and extend a hand of rescue to those in psycho-spiritual bondage." Transcendental Meditation The campaign against Transcendental Meditation (TM) was premised on the grounds that transcendental meditation represented itself as a non-religious activity and was promoted as the Science of Creative Intelligence (SCI). The SCP maintained that transcendental meditation was not religiously neutral, and that its SCI was based on Maharishi Mahesh Yogi's Hindu faith. The SCP's Right On newsletter was the first to publish portions of the TM teacher's manual, including details of the Puja ceremony. The focal point for an anti-Transcendental Meditation campaign was a civil action lawsuit No. 76-431 in the US District Court of New Jersey. The lawsuit Malnak v. Yogi contested whether TM was religious or not, and if the former then it could not be taught in U.S. public high schools. The plaintiffs, which included the SCP, presented evidence to show that puja was religious in nature and the practice of meditation presented as SCI involved chanting Hindu mantras. SCP's Brooks Alexander and Bill Squires, along with SCP's attorney Michael Woodruff, moved into the Malnak's home and provided research, fundraising, and legal support, respectively. Justice Curtis Meanor who presided over the case concluded that Transcendental Meditation and SCI are "religious in nature within the context of the Establishment Clause of the First Amendment of the United States Constitution, and the teaching thereof in the New Jersey public schools is therefore unconstitutional." On February 2, 1979, the Third Circuit of the United States Court of Appeals upheld the lower court's ruling. The success of this campaign catapulted the SCP into prominence among evangelical Christians in North America and internationally. Local church controversy In 1977, SCP published an 80-page booklet called The God-Men: Witness Lee and the Local Church. An expanded edition was published first in 1979 in German as Die Sonderlehre by Schwengeler-Verlag and then in 1981 in English as The God-Men: An Inquiry into Witness Lee and the Local Church by InterVarsity Press. In the book, SCP alleged that the Local Church was both theologically and sociologically deviant. The dispute between the Local Church and SCP escalated into a lawsuit for defamation that was filed in Oakland, California in December 1980 and known as Lee et al. v. Duddy et al. According to Bill Squires, the four and a half years of pre-trial preparations and depositions involved expenditure that brought SCP into legal debt with their defense lawyers. The parties were to appear in court on March 4, 1985, to schedule the start of the defamation trial. Squires said, "The law firm representing us withdrew from the case" and SCP decided to file for Chapter 11 bankruptcy protection. Squires stated, "That move imposed an immediate stay on the plaintiffs' action against us, thus ending the financial drain of litigation. On that day, SCP, while continuing its larger ministry, officially dropped out of the lawsuit." However, SCP’s version of these events has been disputed. While SCP's Chapter 11 filing was proceeding through California bankruptcy court, action against the German publisher and the second edition's primary author proceeded, resulting in a finding that the book was "in all major respects false, defamatory and unprivileged, and, therefore, libelous." The judge’s award of US$11.9 million in damages was to that date the largest awarded in a libel case. Post-litigation history In the aftermath of the litigation, SCP sharply reduced staff and services. In 1989, the entire editorial staff and many other staff members left, some over what they perceived as a radical shift in SCP’s ideology. In 2013, SCP left its office in Berkeley because of severe financial problems and established a virtual office in Pasadena, California. Tal Brooke moved to Hawaii but continued as SCP's president and editor of its newsletter. On July 15, 2021, Tal Brooke died of a stroke while in New Zealand, and SCP Vice-President Mark Harris took over as president and editor of SCP.
WIKI
Descriptive Camera™, 2012 Descriptive Camera created by Matt Richardson Check out Matt's book, Getting Started with Raspberry Pi, which he co-authored with Shawn Wallace. Click here to sign up for infrequent email announcements from Matt or follow him on Twitter. The Descriptive Camera works a lot like a regular camera—point it at subject and press the shutter button to capture the scene. However, instead of producing an image, this prototype uses crowd sourcing to output a text description of the scene. Modern digital cameras capture gobs of "parsable" metadata about photos such as the camera's settings, the location of the photo, the date, and time, but they don't output any information about the content of the photo. The Descriptive Camera only outputs the metadata about the content. As we amass an incredible amount of photos, it becomes increasingly difficult to manage our collections. Imagine if descriptive metadata about each photo could be appended to the image on the fly—information about who is in each photo, what they're doing, and their environment could become incredibly useful in being able to search, filter, and cross-reference our photo collections. Of course, we don't yet have the technology that makes this a practical proposition, but the Descriptive Camera uses crowd sourcing to explore these possibilities. Technology Descriptive Camera in development The technology at the core of the Descriptive Camera is Amazon's Mechanical Turk API. It allows a developer to submit Human Intelligence Tasks (HITs) for workers on the internet to complete. The developer sets the guidelines for each task and designs the interface for the worker to submit their results. The developer also sets the price they're willing to pay for the successful completion of each task. An approval and reputation system ensures that workers are incented to deliver acceptable results. For faster and cheaper results, the camera can also be put into "accomplice mode," where it will send an instant message to any other person. That IM will contain a link to the picture and a form where they can input the description of the image. The camera itself is powered by the BeagleBone, an embedded Linux platform from Texas Instruments. Attached to the BeagleBone is a USB webcam, a thermal printer from Adafruit, a trio of status LEDs and a shutter button. A series of Python scripts define the interface and bring together all the different parts from capture, processing, error handling, and the printed output. My mrBBIO module is used for GPIO control (the LEDs and the shutter button), and I used open-source command line utilities to communicate with Mechanical Turk. The device connects to the internet via Ethernet and gets power from an external 5 volt source, but I would love to make a another version that's battery operated and uses wireless data. Ideally, The Descriptive Camera would look and feel like a typical digital camera. Presentation Video Results Prints from the Descriptive Camera After the shutter button is pressed, the photo is sent to Mechanical Turk for processing and the camera waits for the results. A yellow LED indicates that the results are still "developing" in a nod to film-based photo technology. With a HIT price of $1.25, results are returned typically within 6 minutes and sometimes as fast as 3 minutes. The thermal printer outputs the resulting text in the style of a Polaroid print. Below are a few samples from the Descriptive Camera: This is a faded picture of a dilapidated building. It seems to be run down and in the need of repirs. ----------------------------------- | | | | | | | | | | This is a faded picture | | | | of a dilapidated | | | | building. It seems to be | | | | run down and in the need of | | | | repirs. | | | | | | | | | | | ------------------------------- | | | | | ----------------------------------- Looks like a cupboard which is ugly and old having name plates on it with a study lamp attached to it. ----------------------------------- | | | | | | | | | | Looks like a cupboard | | | | which is ugly and old | | | | having name plates on it | | | | with a study lamp | | | | attached to it. | | | | | | | | | | | ------------------------------- | | | | | ----------------------------------- Corner of a wood floored room with a tool chest, bike, stack of books, box leaning against the wall, an open door with a bag hanging off the doorknob, and a pair of closed double doors with cables hanging on the handles. ----------------------------------- | | Corner of a wood floored | | | | room with a tool chest, | | | | bike, stack of books, box | | | | leaning against the wall, | | | | an open door with a bag | | | | hanging off the doorknob, | | | | and a pair of closed | | | | double doors with cables | | | | hanging on the handles. | | | ------------------------------- | | | | | ----------------------------------- Acknowledgements The Descriptive Camera was created for Dan O'Sullivan's Spring 2012 Computational Cameras class at New York University's Interactive Telecommunications Program (NYU ITP). © Copyright 2012 Awesome Button Studios, LLC
ESSENTIALAI-STEM
User:FlameTechKnight I, am making a form of turn-based RPG in my own time. I will be fleshing out the games characters and history on the site.
WIKI
Issues Workflow Download API definition: GET https://sampleHostName/issues/workflows/{type}?projectId Retrieves the workflow for the given issue type in the given project. The project must be specified using the 'projectId' query string parameter. It is possible for users of a project to choose not to set a workflow for a given type. In that case, requests to get the workflow of that type will return a 404 Not Found response where the 'code' property of the body's 'error' object is set to "WorkflowNotFound". This does not indicate client error. Other HTTP status codes, or other values of the 'code' property, do indicate an unexpected error of some sort. Note that workflows cannot be customized through this API; they can only be added, deleted, or changed manually by project administrators through the Bentley Form Manager webapp, found at https://connect-formmanager.bentley.com/manageforms.aspx?projectId=yourprojectid (replace yourprojectid with your actual project ID). Authentication Requires Authorization header with valid Bearer token for scope issues:read. For more documentation on authorization and how to get access token visit OAUTH2 Authorization page.
ESSENTIALAI-STEM
Chora Church The Chora Church or Kariye Mosque (Kariye Camii) is a former church, now converted to a mosque (for the second time), in the Edirnekapı neighborhood of Fatih district, Istanbul, Turkey. It is mainly famous for its outstanding Late Byzantine mosaics and frescos. The building is an example of Byzantine architecture. In the 16th century, during the Ottoman era, it was converted into a mosque; it became a museum in 1945, and was turned back into a mosque in 2020 by President Recep Tayyip Erdoğan. The interior of the building is covered with some of the finest surviving Byzantine Christian mosaics and frescoes, which were left in plain sight during Muslim worship throughout much of the Ottoman era. They were restored after the building was secularized and turned into a museum. The neighborhood is situated in the western part of the municipality of Fatih district. First phase (4th century) The Chora Church was originally built in the early 4th century as part of a monastery complex outside the city walls of Constantinople erected by Constantine the Great, to the south of the Golden Horn. However, when Theodosius II built his formidable land walls in 413–414, the church became incorporated within the city's defences, but retained the name Chora (for the presumed symbolism of the name see below). Second phase (11th century) The majority of the fabric of the current building dates from 1077–1081, when Maria Doukaina, the mother-in-law of Alexius I Comnenus, rebuilt the Chora Church as an inscribed cross or quincunx: a popular architectural style of the time. Early in the 12th century, the church suffered a partial collapse, perhaps due to an earthquake. Third phase: new decoration (14th century) The church was rebuilt by Isaac Comnenus, Alexius's third son. However, it was only after the third phase of building, two centuries after, that the church as it stands today was completed. The powerful Byzantine statesman Theodore Metochites endowed the church with many of its fine mosaics and frescoes. Theodore's impressive decoration of the interior was carried out between circa 1310 and 1317. The mosaic-work is the finest example of the Palaeologian Renaissance. The artists remain unknown. A renowned classical scholar as well as statesman, Theodore donated his personal library to the Chora monastery, too. In 1328, Theodore was sent into exile by the usurper Andronicus III Palaeologus. However, he was allowed to return to the city two years later, and lived out the last two years of his life as a monk in his Chora Church. Until the Conquest of Constantinople In the late 13th and early 14th centuries, the monastery was home to the scholar Maximus Planudes, who was responsible for the restoration and reintroduction of Ptolemy's Geography to the Byzantines and, ultimately, to Renaissance Italy. During the last siege of Constantinople in 1453, the Icon of the Theotokos Hodegetria, considered the protector of the City, was brought to Chora in order to assist the defenders against the assault of the Ottomans. Kariye Mosque (c. 1500–1945) Around fifty years after the fall of the city to the Ottomans, Hadım Ali Pasha, the Grand Vizier of Sultan Bayezid II, ordered the Chora Church to be converted into a mosque — Kariye Camii. The word Kariye derived from the Greek name Chora. Due to the prohibition against iconic images in Islam, the mosaics and frescoes were covered behind a layer of plaster. This and frequent earthquakes in the region have taken their toll on the artwork. Museum, art restoration (1945–2020) In 1945, the building was designated a museum by the Turkish government. In 1948, the American scholars Thomas Whittemore and Paul A. Underwood, from the Byzantine Institute of America and the Dumbarton Oaks Center for Byzantine Studies, sponsored a restoration program. From that time on, the building ceased to be a functioning mosque. In 1958, it was opened to the public as a museum, Kariye Müzesi. Reconversion to a mosque (2020–2024) In 2005, the Association of Permanent Foundations and Service to Historical Artifacts and Environment filed a lawsuit to challenge the status of the Chora Church as a museum. In November 2019, the Turkish Council of State, Turkey's highest administrative court, ordered that it was to be reconverted to a mosque. In August 2020, its status changed to a mosque. The move to convert Chora Church into a mosque was condemned by the Greek Foreign Ministry and by Greek Orthodox and Protestant Christians. This caused a sharp rebuke by Turkey. On Friday 30 October 2020, Muslim prayers were held for the first time after 72 years. The building was opened for Muslim worship on 6 May 2024. Interior The Chora Church is not as large as some of the other surviving Byzantine churches of Istanbul (it covers 742.5 m²) but it is unique among them, because of its almost completely still extant internal decoration. The building is divided into three main areas: the entrance hall or narthex, the main body of the church or naos (nave), and the side chapel or parecclesion. The building has six domes: two above the esonarthex, one above the parecclesion and three above the naos. Narthex The main, west door of the Chora Church opens into the narthex. It divides north–south into the outer, or exonarthex and the inner, or esonarthex. Exonarthex The exonarthex (or outer narthex) is the first part of the church that one enters. It is a transverse corridor, 4 m wide and 23 m long, which is partially open on its eastern length into the parallel esonarthex. The southern end of the exonarthex opens out through the esonarthex forming a western antechamber to the parecclesion. The mosaics that decorate the exonarthex include: * 1) Joseph's dream and the journey to Bethlehem * 2) The enrollment for taxation * 3) The Nativity * 4) The journey of the Magi * 5) The inquiry of King Herod; * 6) The flight into Egypt * 7) Two frescoes of the massacres ordered by King Herod * 8) Mothers mourning their children * 9) The flight of Elizabeth, mother of John the Baptist * 10) Joseph dreaming, and the return of the Holy Family from Egypt to Nazareth * 11) Christ taken to Jerusalem for the Passover * 12) John the Baptist bearing witness to Christ * 13) A miracle * 14) Three more miracles * 15) The Virgin and angels praying. This image faces the Christ Pantokrator lunette (#16 in this list), and Mary is labelled in Greek, “Mother of God, container (chora) of the uncontainable (achoritou).” This phrase both refers to the theological paradox of Christ's dual nature, as well as the name of the monastery, the Chora. * 16) Christ Pantokrator (or "Almighty," this image is in the lunette over the doorway to the inner narthex, and depicts Christ blessing the viewer with his right hand, and holding a jeweled Gospel in his left.) The label plays on the monastery's name, the Chora, in its reference to Christ as the "land of the living." This phrase comes from Psalm 116:9, used in the Orthodox funeral service, also significant because of the addition of the funerary spaces under Metochites, who anticipated burial in this monastery. Esonarthex The esonarthex (or inner narthex) is similar to the exonarthex, running parallel to it. Like the exonarthex, the esonarthex is 4 m wide, but it is slightly shorter, 18 m long. Its central, eastern door opens into the naos, while another door at the southern end of the esonarthex opens into the rectangular antechamber of the parecclesion. At its northern end, a door from the esonarthex leads into a broad west–east corridor that runs along the northern side of the naos and into the prothesis. The esonarthex has two "pumpkin" domes. The smaller is above the entrance to the northern corridor; the larger is midway between the entrances into the naos and the pareclession, and they continue the emphasis on imagery of the Virgin and Christ seen elsewhere in these mosaics. * 1) Enthroned Christ with Theodore Metochites presenting a model of his church. This image depicts Theodore in the traditional visual formula indicating that he is the donor, for this fourteenth-century leader was responsible for renovating the twelfth-century church as well as adding the parecclesion. * 2) Saint Peter * 3) Saint Paul * 4) A monumentally scaled mosaic of the Deesis: Christ and the Virgin Mary (without John the Baptist) with two earlier donors below, Isaac Komnenos and a nun labeled “Melanie, the Lady of the Mongols,” who may be the daughter of emperor Michael VIII (reigned 1261–82). The subject matter and large scale probably alludes to a similar scene in the south gallery of the Hagia Sophia, installed soon after the Latin occupation of Constantinople (1204–61) ended. * 5) The genealogy of Christ * 6) Religious and noble ancestors of Christ The mosaics in the first three bays of the inner narthex give an account of the life of the Virgin, and those of her parents. Some of them are as follows: * 1) The rejection of Joachim's offerings * 2) The annunciation to Saint Anne: the angel of the Lord announcing to Anne that her prayer for a child has been heard * 3) The meeting of Joachim and Anne * 4) The birth of the Virgin * 5) The first seven steps of the Virgin * 6) The Virgin given affection by her parents, this scene is more typical of the late Byzantine era, when artists were more inclined to explore emotional and/or everyday themes than artists in the early or middle Byzantine periods. * 7) The Virgin blessed by the priests * 8) The presentation of the Virgin in the Temple * 9) The Virgin receiving bread from an Angel * 10) The Virgin receiving the skein of purple wool, as the priests decided to have the attendant maidens weave a veil for the Temple * 11) Zechariah praying; when it was time for the Virgin to marry, the High Priest Zechariah called all the widowers together and placed their rods on the altar, praying for a sign showing to whom she should be given * 12) The Virgin entrusted to Joseph; * 13) Joseph taking the Virgin to his house; * 14) The Annunciation to the Virgin at the well. This image, in which the young Mary awkwardly turns towards the approach of the archangel Gabriel, was adapted to triangular space in which it was depicted. There is a strong emphasis on images of Christ and Mary in the exonarthex and esonarthex. * 15) Joseph leaving the Virgin; Joseph had to leave for six months on business and when he returned the Virgin was pregnant, arousing his suspicion. Naos The central doors of the esonarthex lead into the main body of the church, the naos. The largest dome in the church (7.7 m in diameter) is above the centre of the naos. Two smaller domes flank the modest apse: the northern dome is over the prothesis, which is linked by short passage to the bema; the southern dome is over the diaconicon, which is reached via the parecclesion. Only three mosaics survive in the Chora's naos: * 1) Koimesis (the Dormition of the Virgin; i.e. her last sleep before ascending to Heaven). Jesus is holding an infant, symbolic of Mary's soul. * 2) Jesus Christ * 3) Theotokos (the Virgin and Child), both the image of Christ (#2 in this list) and this mosaic of the Virgin originally were positioned as proskynetaria icons to flank the templon, the barrier which was in front of the sanctuary, though the templon no longer survives. Parecclesion To the right of the esonarthex, doors open into the side chapel, or parecclesion. The parecclesion was used as a mortuary chapel for family burials and memorials. The second largest dome (4.5 m diameter) in the church graces the centre of the roof of the parecclesion. A small passageway links the parecclesion directly into the naos, and off this passage can be found a small oratory and a storeroom. The parecclesion is covered in frescoes that emphasize the theological message of salvation, in keeping with the space's use as a funerary chapel. Within the Christian worldview, God raises the dead at the end of time, hence the significance of the Anastasis and Last Judgement scenes painted prominently on the ceiling. The image of the Anastasis is particularly renowned, appearing in many art history survey books as a key examplar of late Byzantine art. Along the walls of the Chora's parecclesion are arcosolia, arched recesses for tombs, likely intended for Theodore Metochites and his family. Also at this level are depictions of soldier saints, who wield swords as if protecting the tombs they accompany. * 1) Anastasis (literally Resurrection)": the Harrowing of Hell. Christ, who has just broken down the gates of Hell, is standing in the centre and pulling Adam and Eve out of their tombs. Christ is adorned in vivid white garments as well as encircled by a radiant mandorla, setting him in contrast to the dark colors of the fresco's background. Behind Adam stand John the Baptist, David, and Solomon, and other righteous kings. Below is the bound personification of Hades, rendered as an African individual. * 2) The Last Judgment, or Second Coming. Christ is enthroned with the Virgin and John the Baptist on either side of him. (This trio is also called the Deesis.) * 3) Virgin and Child * 4) Heavenly court of angels * 5) Two panels of Moses Name The original, 4th-century monastery containing the church was outside Constantinople's city walls. Literally translated, the church's full name was the Church of the Holy Saviour in the Country (ἡ Ἐκκλησία τοῦ Ἁγίου Σωτῆρος ἐν τῇ Χώρᾳ, hē Ekklēsia tou Hagiou Sōtēros en tēi Chōrāi). It is therefore sometimes incorrectly referred to as "Saint Saviour". However, "The Church of the Holy Redeemer in the Fields" would be a more natural rendering of the name in English. The last part of the Greek name, Chora, referring to its location originally outside of the walls, became the shortened name of the church. The name must have carried symbolic meaning, as the mosaics in the narthex describe Christ as the Land of the Living (ἡ Χώρα τῶν ζώντων, hē Chōra tōn zōntōn) and Mary, the mother of Jesus, as the Container of the Uncontainable (ἡ Χώρα τοῦ Ἀχωρήτου, hē Chōra tou Achōrētou). Literature * Chora: The Kariye Museum. Net Turistik Yayınlar (1987). ISBN 978-975-479-045-0 * Feridun Dirimtekin. The historical monument of Kariye. Türkiye Turing ve Otomobil Kurumu (1966). ASIN B0007JHABQ * Semavi Eyice. Kariye Mosque Church of Chora Monastery. Net Turistik Yayınlar A.Ş. (1997). ISBN 978-975-479-444-1 * Çelik Gülersoy. Kariye (Chora). ASIN B000RMMHZ2 * Jonathan Harris, Constantinople: Capital of Byzantium. Hambledon/Continuum (2007). ISBN 978-1-84725-179-4 * Karahan, Anne. Byzantine Holy Images – Transcendence and Immanence. The Theological Background of the Iconography and Aesthetics of the Chora Church (monography, 355 pp) (Orientalia Lovaniensia Analecta No. 176) Leuven-Paris-Walpole, MA: Peeters Publishers 2010.ISBN 978-90-429-2080-4 * Karahan, Anne. “The Paleologan Iconography of the Chora Church and its Relation to Greek Antiquity”. In: Journal of Art History 66 (1997), Issue 2 & 3: pp. 89–95 Routhledge (Taylor & Francis Group online publication 1 September 2008: DOI:10.1080/00233609708604425) 1997 * Krannert Art Museum. Restoring Byzantium: The Kariye Camii in Istanbul and the Byzantine Institute Restoration. Miriam & IRA D. Wallach Art Gallery (2004). ISBN 1-884919-15-4 * Robert Ousterhout (Editor), Leslie Brubaker (Editor). The Sacred Image East and West. University of Illinois Press (1994). ISBN 978-0-252-02096-4 * Saint Saviour in Chora. A Turizm Yayınları Ltd. (1988). ASIN B000FK8854 * Cevdet Turkay. Kariye Mosque. (1964). ASIN B000IUWV2C * Paul A. Underwood. The Kariye Djami in 3 Volumes. Bollingen (1966). ASIN B000WMDL7U * Paul A. Underwood. Third Preliminary Report on the Restoration of the Frescoes in the Kariye Camii at Istanbul. Harvard University Press (1958). ASIN B000IBCESM * Edda Renker Weissenbacher. Kariye: The Chora Church, Step by Step. ASIN B000RBATF8 * Edda Renker Weissenbacher. Kariye: The Chora Church, Step by Step. ASIN B000RBATF8
WIKI
Sevimli Sevimli may refer to: * Sevimli, Hanak, a village in the Hanak District, Ardahan Province, Turkey * Sevimli, Kızıltepe, a neighbourhood in the municipality and district of Kızıltepe, Mardin Province, Turkey
WIKI
DINACHARYA Adopting a fixed daily routine nurtures your health and well-being and makes you more productive throughout the day. ‘Dina’ means Day and ‘Charya’ means routine or a group of habits. Dinacharya or daily routine is meant to enhance health and prevent diseases. It is essential in our daily lives to achieve good health and vitality.    Why Dinacharya? Dinacharya is time-tested and has been followed as instructed by the great Himalayan masters for thousands of years which increases its credibility and reliability. People who have regular habits are able to build a deeper connection with their spiritual, psychological, emotional and physical well-being because routine makes them more aware of their body’s mind and spirit. Ayurveda insists on shaping lives according to positive sensory experiences so Dinacharya’s habits put together aim to enhance sensory perception in the most positive way which improves our overall human experience.  Dinacharya consists of many steps starting right from the time you wake up. It teaches us the importance of waking up early helps to cleanse the body and energizes it. Following are the steps of daily routine that need to be followed from the time you wake up.  1. Wake up early. Ayurveda recommends waking up approximately 90 minutes before sunrise. This waking-up time, however, differs from each Dosha type. Vata are the ones with quick energy expenditure who get excited easily. They have lean muscle, mass, and body weight so they need a little more rest so they can wake up as late as 30 minutes before sunrise. Pitta who are moderately built, are fire types and they get to sleep in up to an hour before sunrise. Kaphas, the water types or the earthy types, are the big builds, strong and robust and have to wake up an hour and a half before sunrise. Nowadays, our social lives and work lives have become night-driven due to which we are unable to get an adequate amount of sleep in the night time. Many people believe that securing a mere 8 hours of sleep after going to bed late at night is enough. However, Ayurveda states that merely resting your body is not enough as sleep is a mental phenomenon that works in synchrony with our circadian patterns. Disconnecting from the circadian rhythms can make us isolated in terms of our functionality and reality and might make us experience anxiety, panic, and fear. Hence, waking up early helps a person stay connected to the rhythm of nature. 1. Avoid overstimulation by using electronic gadgets on waking up. In the morning, our bodies are taken over by specialized systems like the parasympathetic system and an autonomous system that are active during the sleep state. These nervous systems are capable of generating bowel movements, urine, gas or even menstrual flow and have the ability to regulate internal organs. So, when we wake up early in the morning these systems have finished their function and they're ready to expel their waste products in the form of urine, gas, feces, etc.  Ayurveda says that this urge to empty our bowels is subtle and subconscious so when we wake up early in the morning and immediately check our phones and gadgets, we shift that nerve impulse from parasympathetic to a sympathetic impulse. This slowly fades away the urge to defecate that leads to long term digestive issues, constipation, urinary issues, etc.  Hence, Ayurveda does not recommend the over stimulation of sensory organs by checking messages and scrolling through emails on mobile phones and gadgets early in the morning right after waking up. Instead, it is advised to avoid contact with any form of artificial light and let natural light seep in through your window. 1. Set an intention for the day. When you wake up early in the morning and if there isn’t an urge to use the bathroom yet, you must open your eyes slowly and set an intention for the day. The intention can be something positive and simple like hoping that your day is filled with love or looking forward to spending your day in selfless service.   Ayurveda believes that when you wake up before sunrise, you can put an application to the creator i.e. Lord Brahma to let you have complete control over your day. This helps you in achieving a positive outlook even before you begin your day. After setting an intention, rub your palms against each other briskly to make them warm and slowly rest them on your eyes without pressing the eyeballs. After opening your eyes, align the two palms together and look at them clearly from a distance. This is important because it is scientifically studied and proven that among all the activities the humans do in their awaken state, eye and hand coordination is the most commonly employed neuro activity. We look at something and our hands follow it, that's the constant sensory and the motor action that goes on. So, it is important to take a moment to stare at your hands to establish a connection between your eyes and the hands so that they function with at most ease and with positivity. Vedic sciences, which are precursors for Ayurveda, believe that the three goddesses can be visualized in the hand. The goddess of prosperity is on the tips, the goddess of knowledge is at the base of the palm near the wrists and the goddess of courage is in the center of the palms. We need prosperity, courage, and knowledge every minute of the day to lead a productive day.  1. Praise mother earth. Ayurveda believes that most patients being is Mother Earth. Hence, after waking up we ask for permission and forgiveness from Mother Earth before we start stamping on her and ask her to provide us with a powerful grounding that is unshakable. After doing so, we touch the ground, get up and attend to the rest of the routine for the day. A regular bowel movement is essential to optimal health. However, some people experience indigestion and irregular bowel movements. To tackle this, it is recommended to take Triphala the night before. Triphala is a combination of three fruits dried into powder which is great for day-to-day regulation and cleansing of the digestive system and it also helps to keep the digestive organs healthy. Hence, 2-4 capsules of Triphala are recommended to have with hot water at night to move the waste material down towards the colon, activate the digestive tract so that when you wake up in the morning, you will have a natural urge to visit the bathroom and defecate the entire waste material that was formed the previous day. Triphala also helps in reducing Pitta irritation in the colon as it can inflame the gut. People working the graveyard shift who have varying work hours often struggle to follow Dinacharya. People who travel frequently cross timezones and find it difficult to synchronize their routine with the circadian rhythm and avoid falling out of balance. They are advised to create their own self-managing routine.  For instance, if someone goes to work at 3 a.m. in the morning and returns at 12 p.m. in the afternoon, they are advised to have lunch soon after they return. They are also advised to perform oil massage as waking up in the night regularly can bear down on Vata energy and may stress their nervous system.  After having lunch and after the food is digested in the stomach it is advised to massage the body with oil, take a shower, complete with the rest of your routine work, have an early dinner and go to sleep by 7:30 p.m. When you keep repeating such a routine over and over again, your body becomes accustomed to it and the tissues which tend to be depleted by abnormal routines slowly start to adjust themselves to the self-created regimen, thereby providing nourishment & nutrition to the tissues. To conclude the morning routine in brief, remember to wake up early, set an intention for the day, avoid feeling that you have no control over your life, be grateful, thank mother earth, do not over stimulate yourself with gadgets when you wake up, and take care of your bowel movements by taking Triphala every night as it ensures that the toxins of the gut are expelled through defecation.  Athreya always wishes for good health and well-being of its users which is why we recommend that you follow Dinacharya every day regularly.  We, at Athreya, wish for your good health. However, it is advised not to take any supplements mentioned without the consultation of your health-care specialist.
ESSENTIALAI-STEM
A Distributed Secure System John Rushby and Brian Randell IEEE Computer, Volume 16, Issue 7, pp 55-67, July 1983. Abstract We describe, in tutorial detail, the design of a distributed general-purpose computing system that enforces a multilevel security policy. The system is composed of standard UNIX systems and small trustworthy security mechanisms linked together in such a way as to provide a total system which is not only demonstrably secure, but also highly efficient and cost effective. Each UNIX system provides services to a single security partition and operates at full speed; security-critical tasks are performed by separate, specialised processors. These security processors control access to the different security partitions and mediate information flow between them. They also provide a multilevel secure file system and a facility for dynamically changing the security partition to which each UNIX system is assigned. Extensions to support controlled downgrading and multilevel objects are described as well. Despite the sophistication of the overall system, individual security processors employ only very simple, straightforward mechanisms; their construction and verification requires no more than already established technology. And despite the heterogeneity of its components, the system as a whole appears to be a single multilevel secure UNIX system, since the fact that it is actually a distributed system is completely hidden from its users and their programs. This is achieved through the use of the "Newcastle Connection", a software subsystem that links together multiple UNIX or UNIX-look-alike systems, without requiring any changes to the source code of either the operating system or any user programs. A first prototype system, providing multiple security partitions, and a multilevel secure file system, has already been successfully demonstrated--construction of a much more complete prototype is now planned. *NOTE* This was selected as a "classic paper" for ACSAC 2007; Brian Randell and I added some reminiscences and updates to the version at Distributed Secure Systems: Then and Now. Original paper: PDF only (this is a big file--3.5 MBytes--scanned from the magazine) A preliminary version of this paper was presented at the 1983 IEEE Symposium on Security and Privacy: PDF only BibTeX Entry @article{Rushby&Randell83, AUTHOR = {John Rushby and Brian Randell}, JOURNAL = {IEEE Computer}, TITLE = {A Distributed Secure System}, YEAR = 1983, MONTH = jul, PAGES = {55--67}, VOLUME = 16, NUMBER = 7 } @inproceedings{Rushby&Randell83c, AUTHOR = {John Rushby and Brian Randell}, BOOKTITLE = {Proceedings of the Symposium on Security and Privacy}, ORGANIZATION = {IEEE Computer Society}, ADDRESS = {Oakland, CA}, TITLE = {A Distributed Secure System (Extended Abstract)}, PAGES = {127--135}, MONTH = apr, YEAR = 1983 } Having trouble reading our papers? Return to the Formal Methods Program home page Return to the Computer Science Laboratory home page
ESSENTIALAI-STEM
Harriman (surname) Harriman is a surname of English origin. Notable people with the surname include: * W. Averell Harriman, Governor of New York, son of Edward * Edward Henry Harriman (1848–1909), American railroad financier * E. Roland Harriman, American railroad executive, son of Edward * Florence Jaffray Harriman, American socialite, suffragist, social reformer, organizer, and diplomat * Gladys Fries Harriman (1896–1983), American philanthropist, equestrian and big game hunter * Henry Harriman (Mormon), President of the Seventy of the Church of Jesus Christ of Latter-day Saints * Herbert M. Harriman (1873-1933), American heir, businessman and sportsman * John Emery Harriman (1869—1916), American civil engineer and inventor * John Harriman (botanist), English botanist * J. Borden Harriman (1864-1914), American financier * Oliver Harriman (1829-1904), American businessman * Oliver Harriman, Jr. (1862-1940), American stockbroker * Pamela Harriman, American socialite and diplomat * Robert Hariman (born 1951), American scholar Fictional characters: * Delos D. Harriman, businessman and space entrepreneur in Robert A. Heinlein's stories Requiem and The Man Who Sold the Moon * John Harriman (Star Trek), fictional captain of the starship Enterprise (NCC-1701-B) in the movie Star Trek Generations
WIKI
Class ShutdownHandler • All Implemented Interfaces: Handler, HandlerContainer, Container, Destroyable, Dumpable, Dumpable.DumpableContainer, LifeCycle public class ShutdownHandler extends HandlerWrapper A handler that shuts the server down on a valid request. Used to do "soft" restarts from Java. If _exitJvm is set to true a hard System.exit() call is being made. If _sendShutdownAtStart is set to true, starting the server will try to shut down an existing server at the same port. If _sendShutdownAtStart is set to true, make an http call to "http://localhost:" + port + "/shutdown?token=" + shutdownCookie in order to shut down the server. This handler is a contribution from Johannes Brodwall: https://bugs.eclipse.org/bugs/show_bug.cgi?id=357687 Usage: Server server = new Server(8080); HandlerList handlers = new HandlerList(); handlers.setHandlers(new Handler[] { someOtherHandler, new ShutdownHandler("secret password", false, true) }); server.setHandler(handlers); server.start(); public static void attemptShutdown(int port, String shutdownCookie) { try { URL url = new URL("http://localhost:" + port + "/shutdown?token=" + shutdownCookie); HttpURLConnection connection = (HttpURLConnection)url.openConnection(); connection.setRequestMethod("POST"); connection.getResponseCode(); logger.info("Shutting down " + url + ": " + connection.getResponseMessage()); } catch (SocketException e) { logger.debug("Not running"); // Okay - the server is not running } catch (IOException e) { throw new RuntimeException(e); } } • Constructor Detail • ShutdownHandler public ShutdownHandler​(java.lang.String shutdownToken) Creates a listener that lets the server be shut down remotely (but only from localhost). Parameters: shutdownToken - a secret password to avoid unauthorized shutdown attempts • ShutdownHandler public ShutdownHandler​(java.lang.String shutdownToken, boolean exitJVM, boolean sendShutdownAtStart) Parameters: shutdownToken - a secret password to avoid unauthorized shutdown attempts exitJVM - If true, when the shutdown is executed, the handler class System.exit() sendShutdownAtStart - If true, a shutdown is sent as an HTTP post during startup, which will shutdown any previously running instances of this server with an identically configured ShutdownHandler • Method Detail • sendShutdown public void sendShutdown() throws java.io.IOException Throws: java.io.IOException • doStart protected void doStart() throws java.lang.Exception Description copied from class: ContainerLifeCycle Starts the managed lifecycle beans in the order they were added. Overrides: doStart in class AbstractHandler Throws: AbstractLifeCycle.StopException - If thrown, the lifecycle will immediately be stopped. java.lang.Exception - If there was a problem starting. Will cause a transition to FAILED state • handle public void handle​(java.lang.String target, Request baseRequest, javax.servlet.http.HttpServletRequest request, javax.servlet.http.HttpServletResponse response) throws java.io.IOException, javax.servlet.ServletException Description copied from interface: Handler Handle a request. Specified by: handle in interface Handler Overrides: handle in class HandlerWrapper Parameters: target - The target of the request - either a URI or a name. baseRequest - The original unwrapped request object. request - The request either as the Request object or a wrapper of that request. The HttpConnection.getCurrentConnection().getHttpChannel().getRequest() method can be used access the Request object if required. response - The response as the Response object or a wrapper of that request. The HttpConnection.getCurrentConnection().getHttpChannel().getResponse() method can be used access the Response object if required. Throws: java.io.IOException - if unable to handle the request or response processing javax.servlet.ServletException - if unable to handle the request or response due to underlying servlet issue • doShutdown protected void doShutdown​(Request baseRequest, javax.servlet.http.HttpServletResponse response) throws java.io.IOException Throws: java.io.IOException • setExitJvm public void setExitJvm​(boolean exitJvm) • isSendShutdownAtStart public boolean isSendShutdownAtStart() • setSendShutdownAtStart public void setSendShutdownAtStart​(boolean sendShutdownAtStart) • getShutdownToken public java.lang.String getShutdownToken() • isExitJvm public boolean isExitJvm()
ESSENTIALAI-STEM
Private equity is a driving force behind devious surprise billing | TheHill Surprise medical bills are in the news almost daily. Last Thursday, the White House called for legislation to protect patients from getting surprise doctor bills when they are rushed to the emergency room and receive care from doctors not covered by insurance at an in-network hospital. The financial burden on patients can be substantial — these doctor charges can amount to hundreds or even thousands of dollars.  What’s behind this explosion of outrageous charges and surprise medical bills? Physicians’ groups, it turns out, can opt out of a contract with insurers even if the hospital has such a contract. The doctors are then free to charge patients, who desperately need care, however much they want. This has made physicians’ practices in specialties such as emergency care, neonatal intensive care and anesthesiology attractive takeover targets for private equity firms.  As health reporter Bob Herman observed, acquisition of these health services “exemplifies private equity firms' appetite for buying health care providers that wield a lot of market power.”  Emergency rooms, neonatal intensive care units and anesthesiologists’ practices do not operate like an ordinary marketplace. Physicians’ practices in these specialties do not need to worry that they will lose patients because their prices are too high. Patients can go to a hospital in their network, but if they have an emergency, have a baby in the neonatal intensive care unit or have surgery scheduled with an in-network surgeon, they are stuck with the out-of-network doctors the hospital has outsourced these services to. This stands in stark contrast to other health-care providers, such as primary-care physicians, who will lose patients if they are not in insurers’ networks.  It’s not only patients that are victimized by unscrupulous physicians’ groups. These doctors’ groups are able to coerce health insurance companies into agreeing to pay them very high fees in order to have them in their networks. They do this by threatening to charge high out-of-network bills to the insurers’ covered patients if they don’t go along with these demands. High payments to these unethical doctors raise hospitals’ costs and everyone’s insurance premiums.  That’s what happened when private equity-owned physician staffing firms took over hospital emergency rooms. A 2018 study by Yale health economists looked at what happened when the two largest emergency room outsourcing companies — EmCare and TeamHealth — took over hospital ERs. They found: “…that after EmCare took over the management of emergency services at hospitals with previously low out-of-network rates, they raised out-of-network rates by over 81 percentage points. In addition, the firm raised its charges by 96 percent relative to the charges billed by the physician groups they succeeded." TeamHealth used the threat of sending high out-of-network bills to the insurance company’s covered patients to gain high fees as in-network doctors. The researchers found: “…in most instances, several months after going out-of-network, TeamHealth physicians rejoined the network and received in-network payment rates that were 68 percent higher than previous in-network rates.” What the Yale study failed to note, however, is that EmCare has been in and out of PE hands since 2005 and is currently owned by KKR. Blackstone is the once and current owner of TeamHealth, having held it from 2005 to 2009 before buying it again in 2016.  Private equity has shaped how these companies do business. In the health-care settings where they operate, market forces do not constrain the raw pursuit of profit. People desperate for care are in no position to reject over-priced medical services or shop for in-network doctors. Private equity firms are attracted by this opportunity to reap above-market returns for themselves and their investors. Patients hate surprise medical bills, but they are very profitable for the private equity owners of companies like EmCare (now called Envision) and TeamHealth. Fixing this problem may be more difficult than the White House imagines. Eileen Appelbaum is co-director of the Center for Economic and Policy Research and coauthor of Private Equity at Work: When Wall Street Manages Main Street. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Talk:Skyrocket Bold text'''sky rocket also a street term used to define the mixing of angel dust and crack. These two drugs are mixed and rolled in a tobacco leaf also known as blunts.'''A skyrocket is not a bottle rocket. Bottle rockets are dangerous toys. A skyrocket is a method of launching PROFESSIONAL fireworks displays. Bottle rockets are small and fun to play with and do harmless inexpensive things whereas skyrockets can cause serious damage if not used correctly bottle rockets an important aerodynamic tool Intigrating bottle rockets with sky rockets will diminish the overall relevance of this form of rocketry. bottle rockets are not only "just another type of rocket"; but are the only form of rockets accessable to enthusiasts in countries like india. their being so cheap and easy to handle makes them ideal tools for aerodynamic study and simple application. reusing them as chemical engins for paper model rockets is also possible.in fact this bottle rocket technology is already being put to use for inaugral functions and decoration or ornamentation. --<IP_ADDRESS> 18:03, 8 May 2007 (UTC) Dhruv Jani.
WIKI
Talk:Trans-3-Methyl-2-hexenoic acid Rename I propose that the record be renamed to (E)-3-Methyl-2-hexenoic acid as the term trans is generally accepted as not being appropriate for a trisubstituted alkene. The chemistds (talk) 12:22, 2 November 2010 (UTC) * Argreed. It is not clear, why that name was chosen anyway, as the article(s) also speak of (E)-3-methyl-2-hexenoic acid Iridos (talk) 13:37, 22 November 2016 (UTC)
WIKI
Garlandville, Mississippi Garlandville is an unincorporated community in Jasper County, Mississippi, United States. Garlandville is 8.2 mi south-southeast of Newton along Mississippi Highway 504. Garlandville was first settled in 1833 and is one of the oldest communities in Jasper County. Garlandville was named for John Garland, a half-breed Choctaw who operated a tavern in the area. Prior to the American Civil War, Garlandville reached the most prosperous point in its history. Two companies of the Confederate States Army were raised in Garlandville: a Captain Chatfield's of the 20th Mississippi Infantry and a Captain Lopo's of the 37th Mississippi Infantry. During Grierson's Raid, the Union Army rode through Garlandville. One horse was killed and one soldier was seriously wounded when three shots were fired by home guard soldiers in Garlandville. After the Civil War ended, most of the merchants and citizens moved away from Garlandville and only a few small businesses remained. A post office operated under the name Garlandville from 1834 to 1953.
WIKI
Hego Uribe Hego Uribe (Basque for Southern Uribe) is a modern conventional subdivision of Biscay, Basque Country. Located within the comarca of Greater Bilbao, directly south of the city of Bilbao itself, the area includes the towns of Basauri, Galdakao, Etxebarri and Arrigorriaga, among others. It is noted for its production of high quality wool.
WIKI
Techno-economic feasibility analysis on carbon membranes for hydrogen purification Research output: Contribution to journalArticlepeer-review 30 Scopus citations Abstract H2 production from a biomass fermentation process provides a great opportunity for green and sustainability economy compared to use fossil fuels (e.g., steam methane reforming process), but the process usually produces a humidified gas containing 35–65 (vol.%) H2 and 40–50 (vol.%) CO2. A novel, energy efficient two-stage carbon membrane system for H2 purification based on the combination of H2 selective carbon molecular sieve membranes in the first stage and CO2 selective carbon membranes in the second stage was proposed. The concept is the first unique technology providing a low H2 purification cost <1 $/kg H2 produced at a feed pressure of 20 bara based on process simulation and cost estimation. The produced high purity CO2 (>95 vol.%) and H2 (>99.5 vol.%) can be integrated into a gasification reformer and Fischer-Tropsch reactors to improve the biodiesel productivity from biomass. Original languageEnglish Pages (from-to)117-124 Number of pages8 JournalSeparation and Purification Technology Volume186 DOIs StatePublished - 2017 Externally publishedYes Keywords • Biomass • Carbon membranes • Cost estimation • Hydrogen purification • Process simulation Fingerprint Dive into the research topics of 'Techno-economic feasibility analysis on carbon membranes for hydrogen purification'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
List of Best Selling Rhythm & Blues Singles number ones of 1968 In 1968, Billboard published a weekly chart ranking the top-performing singles in the United States in rhythm and blues (R&B) and related African American-oriented music genres; the chart has undergone various name changes over the decades to reflect the evolution of such genres and since 2005 has been published as Hot R&B/Hip-Hop Songs. It was published under the title Top Selling R&B Singles in the issue dated January 6, 1968, Best Selling R&B Singles through the issue dated March 30, and Best Selling Rhythm & Blues Singles thereafter; during the year, 20 different singles topped the chart. Unusually, the year started and ended with different versions of the same song at number one. In the issue of Billboard dated January 6, Gladys Knight & the Pips were at number one with "I Heard It Through the Grapevine", the song's sixth week in the top spot. In December, Marvin Gaye's version of the song reached number one and held the peak position for the final three weeks of the year. Gaye had actually recorded his version before Knight recorded hers, but Berry Gordy, owner of the Motown record label, refused to allow it to be released. After Knight's version became a success, Gaye's version was included on his album In the Groove and was released as a single by popular demand. It ultimately outperformed Knight's version, becoming Motown's biggest-selling single to date, and has come to be regarded as the definitive version of the song. It was Gaye's third chart-topper of 1968, following "Ain't Nothing Like the Real Thing" and "You're All I Need to Get By", both duets with Tammi Terrell. In March, Otis Redding reached number one with his song "(Sittin' on) the Dock of the Bay", which spent three weeks in the top spot. Redding had died in a plane crash in December of the previous year just days after recording the track, which in addition to topping the R&B listing became the first posthumous number one on the all-genre Hot 100 chart. "Tighten Up" by Archie Bell & the Drells, "Grazing in the Grass" by Hugh Masekela and Gaye's version of "I Heard It Through the Grapevine" also topped both charts in 1968. Redding, Bell & the Drells and Masekela all topped the R&B chart in 1968 for the first time, as did Tammi Terell, the Intruders, the Dells and Johnnie Taylor. The Dells were inducted into the Rock and Roll Hall of Fame in recognition of their long and successful career, and the Intruders are considered to have been an early influence on the Philadelphia soul sound, which grew in prominence in the 1970s.
WIKI
Summary of abnormal use The concept of abnormality • An exception is a mechanism by which a program notifies the caller of an error at run time. • The runtime refers to the errors that occur during the process of compiling the class file and executing it by the JVM. There are many kinds of exceptions. Different kinds of exceptions have different meanings and different handling methods. Here's a chestnut: public class Test { public static void main(String[] args) { int[] arr = {1,2,3,4}; System.out.println(arr[4]); } } //results of enforcement Exception in thread "main" java.lang.ArrayIndexOutOfBoundsException: 4 at Test.main(Test.java:4) Basic usage of exceptions • Capture exception • Basic grammar try{ Statements with potential exceptions; }catch (exception type exception object){ } finally { Abnormal exit } try blocks of code contain code that may have exceptions. The catch code block contains the handling behavior after an exception. The code in the finally code block is used to handle the aftermath work and will be executed at the end. catch finally add or not according to the situation 1. If an exception occurs in try, the program in the try code block will not continue to execute, but will be handed over to the code in catch for execution, and will continue to execute after the completion of catch execution. public class Test { public static void main(String[] args) { int[] arr = {1,2,3,4}; try { System.out.println("before"); System.out.println(arr[4]); System.out.println("after"); } catch (ArrayIndexOutOfBoundsException e) { //Call stack for printing exceptions e.printStackTrace(); } System.out.println("after try catch"); } } //results of enforcement before java.lang.ArrayIndexOutOfBoundsException: 4 after try catch 1. catch can only handle exceptions of the corresponding type public class Test { public static void main(String[] args) { int[] arr = null; try { System.out.println("before"); System.out.println(arr[4]); System.out.println("after"); } catch (ArrayIndexOutOfBoundsException e) { e.printStackTrace(); } System.out.println("after try catch"); } } //results of enforcement //Because it is a null pointer exception, the catch catches an exception type mismatch, which is thrown by the jvm and interrupted by the program. before Exception in thread "main" java.lang.NullPointerException at Test.main(Test.java:6) 1. There can be more than one catch. ` public class Test { public static void main(String[] args) { int[] arr = null; try { System.out.println("before"); System.out.println(arr[4]); System.out.println("after"); } catch (ArrayIndexOutOfBoundsException e) { e.printStackTrace(); } catch (NullPointerException e) { e.printStackTrace(); } System.out.println("after try catch"); } } //results of enforcement before java.lang.NullPointerException after try catch You can also write as follows: catch (ArrayIndexOutOfBoundsException | NullPointerException e) { ... } 1. You can also use a catch to catch all exceptions public class Test { public static void main(String[] args) { int[] arr = null; try { System.out.println("before"); System.out.println(arr[4]); System.out.println("after"); } catch (Exception e) { e.printStackTrace(); } System.out.println("after try catch"); } } //Execution results before after try catch java.lang.NullPointerException at Test.main(Test.java:6) The Exception class is the parent of all Exception classes, so you can use this type to represent the catch All exceptions. Note: when a catch is used for type matching, it does not only match the same type of exception objects. It also catches subclass objects of the target exception type. Like the code just now, NullPointerException and ArrayIndexOutOfBoundsException Are subclasses of Exception, so they can be caught. 1. finally indicates the final rehabilitation work, such as releasing resources. No matter whether there is an exception or not, the code in finally will execute to. To ensure that it will eventually execute to the close method of Scanner. public class Test { public static void main(String[] args) { int[] arr = null; try { System.out.println("before"); System.out.println(arr[4]); System.out.println("after"); } catch (Exception e) { e.printStackTrace(); } finally { System.out.println("fianlly code"); } System.out.println("after try catch"); } } //results of enforcement java.lang.NullPointerException before at Test.main(Test.java:6) fianlly code after try catch 1. Use try to recycle resources. try (Scanner sc = new Scanner(System.in)) { int num = sc.nextInt(); System.out.println("num = " + num); } catch (Exception e) { e.printStackTrace(); } • Throw exception In addition to java's built-in classes throwing some exceptions, we can also throw an exception manually. Some descriptive languages can be formulated in the construction of abnormal objects. public class Test { public static void main(String[] args) { invide(4,0); } public static int invide(int x, int y) { if (y == 0) { throw new ArithmeticException("Divisor is zero."); } return x / y; } } //results of enforcement Exception in thread "main" java.lang.ArithmeticException: Divisor is zero. at Test.invide(Test.java:9) at Test.main(Test.java:5) • Exception description We can use the throws keyword to explicitly mark the exceptions that may be thrown at the location of the method definition, so as to remind the caller to pay attention to catching these exceptions. public static int invide(int x, int y) throws ArithmeticException { if (y == 0) { throw new ArithmeticException("Divisor is zero."); } return x / y; } • finally notes The time to finally execute is before the method returns (if there is a return in try or catch, it will execute finally before the return). However, if there is a return statement in finally, the return in finally will be executed, so that the original return in try will not be executed. public static void main(String[] args) { System.out.println(func()); } public static int func() { try { return 10; } finally { return 20; } } // results of enforcement 20 Custom exception class Declare a custom exception class Inherit custom class from Exception Write two constructors, one empty and one with parameters public class NewException extends Exception{ public NewException(String s) {//s according to your own needs super(s); } } public class Test { private static String userName = "admin"; private static String password = "123456"; static class UserError extends Exception { public UserError(String message) { super(message); } } static class PasswordError extends Exception { public PasswordError(String message) { super(message); } } public static void main(String[] args) { try { login("in", "123456"); } catch (UserError userError) { userError.printStackTrace(); } catch (PasswordError passwordError) { passwordError.printStackTrace(); } } public static void login(String userName, String password) throws UserError, PasswordError { if (!Test.userName.equals(userName)) { throw new UserError("User name error"); } if (!Test.password.equals(password)) { throw new PasswordError("Password error"); } System.out.println("Landing successfully"); } } //results of enforcement Test$UserError: User name error at Test.login(Test.java:29) at Test.main(Test.java:19) Keywords: Java jvm Added by kwilder on Sun, 27 Oct 2019 06:39:57 +0200
ESSENTIALAI-STEM
Demolition Records Demolition Records was a British record label based in Jarrow, England, specialising in heavy metal and rock, with many international artists. It was founded in 2000 by brothers Ged and Eric Cook. There were also distribution offices in Frankfurt, Manhattan, and Tokyo. In 2007, the label was later rumoured to be signing ZZ Top and Whitesnake, which would greatly increase their sales, but the rumours were quickly dismissed. They also operated the sublabel DR2. Roster * Hanoi Rocks * Lauren Harris * Glenn Hughes * McQueen * Painmuseum * Quiet Riot * The Quireboys * David Lee Roth * Sacred Sin * Skyclad * The Sound Ex * Spike * Temple of Brutality * Tigertailz (from 2006) * Therapy? * Twisted Sister * Vixen * W.A.S.P. * Y&T
WIKI
Atacama Proper noun * 1) The Atacama Desert, a long desert in Chile, and the driest desert on Earth according to various sources. Translations * Greek: * Polish: Atakama * Spanish: Atacama * Spanish: Atacama Proper noun * 1) until 1976. * 1) until 1976. * 1) until 1976.
WIKI
File:WinifredCopperwheat.jpg A promotional photograph of a performing artist, found at http://www.authorpictures.co.uk/search?s=Winifred%20Copperwheat
WIKI
Processing Frequent 4D Land Seismic Data with Buried Sensors for CO2 Monitoring Al Ramadhan, Abdullah (EXPEC Advanced Research Center, Saudi Aramco) | Hemyari, Emad (EXPEC Advanced Research Center, Saudi Aramco) | Bakulin, Andrey (EXPEC Advanced Research Center, Saudi Aramco) | Erickson, Kevin (EXPEC Advanced Research Center, Saudi Aramco) | Smith, Robert (EXPEC Advanced Research Center, Saudi Aramco) | Jervis, Michael A. (EXPEC Advanced Research Center, Saudi Aramco) OnePetro  Abstract In 2015, Saudi Aramco started a CO2 Water-Alternating-Gas (WAG) EOR pilot project in an onshore carbonate reservoir. To monitor lateral expansion of the CO2 plume, the area was instrumented with a hybrid surface/downhole permanent seismic monitoring system. This system consists of over 1000 buried seismic sensors at a depth of around 70 m, below the the depth of expected weathering layer to mitigate the time-lapse noise. Despite receiver burial, seismic data still suffers from numerous challenges including: significant amounts of high-amplitude coherent noise such as guided waves, mode conversions, and scattered energy; amplitude variations over space and time caused by source and receiver coupling; variability of wavelet shape and arrival times due to seasonal near-surface variations; and low signal-to-noise ratio (SNR). A novel processing workflow was designed for 4D processing of such data. The workflow involves five critical processes. First, the high-amplitude coherent noise is eliminated using FK-based techniques that are 4D compliant to preserve the reservoir changes between repeated seismic surveys. Second, a four-term joint surface-consistent amplitude-scaling algorithm resolves the amplitude variations. The algorithm allows both source and receiver terms to have different scalars for the same positions, but it restricts the other two terms to be position-invariant over different time-lapse surveys, as the window of analysis does not include the reservoir. This is to guarantee that the source and receiver terms are survey-dependent while the other two terms are survey-independent. Thus, the amplitude variability is linked to source and receiver positions over space and time. It also assures that the reservoir changes are not affected by changes in the overburden. Third, wavelet shape variations are addressed using a four-term joint surface-consistent spiking deconvolution algorithm that applies similar principle as the scaling algorithm. Fourth, the small variations in reflection times between different surveys (4D statics) caused by seasonal variations are corrected by a specialized surface-consistent residual statics algorithm using a common pilot derived from the base survey. Fifth, the pre-stack data is supergrouped to enhance the signal-to-noise ratio and repeatability. The processing workflow has been applied to frequent land 3D seismic data acquired over a CO2 WAG EOR pilot project in Saudi Arabia. As a result, we obtained very repeatable seismic images that may successfully detect small CO2-related changes in a stiff carbonate reservoir.
ESSENTIALAI-STEM
Hot Flashes Headaches and Hot Flashes Headaches – The Perfect Combination Hot flashes can induce dehydration. To begin with, know there are things that could trigger hot flashes. They are a common symptom of menopause, which can be difficult to overcome. They are notorious for making it difficult to get a good night of rest, so avoid things such as spicy foods or large meals before bed. They are due to a decrease in estrogen levels. Both hot flashes and headaches may be caused by hormonal fluctuations. Hormonal changes within your body are believed to cause hot flashes. Otherwise, deciding the cause of an allergic reaction would not be possible. The issue tends to resolve spontaneously within a couple weeks of the man or woman coming off the drug. If you believe it’s a critical problem, it would be far better consult a health professional. A lot of people never believe that health issues” can be due to malnutrition. Whenever your mind and body doesn’t get enough deep sleep you may begin to feel anxious or tense. Simply take a while to choose which will be most suitable for you. The next day I’d have to work out the way to get there without the aid of my phone’s GPS. The outset of post menopause demonstrates that a woman cannot become pregnant anymore. Irregular periods are among the most frequent signs you’re entering menopause. If you are afflicted with painful periods an easy procedure might be able to aid. Therefore using the proper PMS herbal remedies delivers the outcomes you would like and less painful period. There are many reasons why a woman might need to have her uterus removed before she has a pure menopause. It can be extremely daunting for a woman to have the tell-tale indications of perimenopauselike hot flashesin a work atmosphere. Clearly, middle-aged ladies need something better than a device made for another purpose. Lots of women wear the incorrect bra size, and for large-breasted ladies, that may be an expensive and painful mistake. You need to let your doctor know whether you begin to suffer from migraine later in life or whether you notice any change in the normal pattern of migraine symptoms or develop new symptoms. If your physician doesn’t have a lot of details about perimenopause and midlife development, locate a menopause specialist who can support you. Unfortunately doctors are starting to understand that women have a distinctive hormone profile. Most doctors advise that you start HRT around the right time of the menopause and take it only for a couple years. The Upside to Hot Flashes Headaches Managing stress through yoga and everyday breathing exercises can enable you to decrease stress. Yes, anxiety can result in a huge number of symptoms. If you don’t understand when you ovulated, you will discover that it’s much harder to follow your symptoms! Remember, however, that it’s very likely you will not have an indicators. The symptoms come on very fast. For example, pregnant women reeling below a sinus infection often utilize antibiotics to find relief. The flu is a nasty bug that could last anywhere between one or two weeks, and in the majority of cases you must bear through it. Some headaches are due to tension and anxiety. If this headache or migraine receives a grip, you are going to be out of action, however busy you’re. It’s rare for migraine to begin later in life. Migraines are extremely complicated and may have a number of distinct symptoms for each person. If you’re a woman who deals with migraines, there are a couple of things which you ought to know about as you approach menopause. Generally, migraine becomes less severe and frequent, and might even disappear, by around the time of 50. Hot Flashes Headaches for Dummies There are many ways you are able to practice yoga and bring it in your routine with ease. Acupuncture is a quality instance of an alternate medicine practice that strays from the path a significant bit. Hormone therapy is quite controversial with regard to its long-term consequences. There are lots of therapies to deal with menopause symptoms. The treatments are different for every kind of tumor. Other folks utilize alternative treatments for hot flashes, although you ought to talk to your physician prior to taking any herbs or supplements. You may use the herbal remedies to take care of calcium deficiency. A wholesome diet ought to be supplemented with foods and vegetables full of phytoestrogens. Contemplating the greater nutrient needs of the body when pregnant, a nutritious diet alone may not serve the objective. Adding prenatal vitamins in the diet may also lead to defecation of green poop while pregnant. The very best prenatal vitamins during pregnancy are often encouraged to make sure proper fetal improvement. As you discover the hormone waning, the skin gets very much dry and not as supple. Lots of people who suffer from unbalanced hormones have libido difficulties, weight gain and loss issues, etc. Estrogen is a rather considerable hormone that may help determine the physiological and mental well-being of women. Menopause might be a natural part of aging, but it doesn’t indicate you have to accept its unpleasant symptoms as inevitable. Menopause and pre-menopause differs for everybody.
ESSENTIALAI-STEM
Association between the presence of sperm in the vasal fluid during vasectomy reversal and postoperative patency: A systematic review and meta-analysis - Abstract OBJECTIVE: To investigate the association between the presence of sperm in the vasal fluid during vasectomy reversal (VR) and postoperative patency. METHODS: We performed a systematic review and meta-analysis of the English-language literature reporting on the association between the presence of sperm in the intraoperative vasal fluid (ie, whole or parts vs none) and patency (ie, patent or not) after microsurgical vasovasostomy for men with obstructive azoospermia due to vasectomy. Odds ratios (OR) and 95% confidence intervals were calculated to quantify the strength of the association reported by each study. Meta-analysis was performed using a random-effects model. RESULTS: Four case series and 2 retrospective cohort studies of a total of 1293 eligible patients were identified. The mean age at VR was 37.8 years, and the mean obstructive interval was 7.1 years. The unadjusted OR of postoperative patency was 4.1 times higher (95% confidence interval, 2.3-7.3) given the presence of intravasal sperm or sperm parts as opposed to their absence at the time of VR (Q = 3.4; df = 5; P = .6; I2 = 22%). The pooled OR should be interpreted with caution as only the 2 retrospective cohort studies reported meaningful data on this association. Because of inconsistent reporting, analysis of other vasal fluid characteristics (eg, consistency) and outcomes (eg, pregnancy) was not possible. CONCLUSION: The presence of whole sperm or sperm parts in the vasal fluid during VR is positively associated with postoperative patency. Our review highlights the poor methodological quality of existing evidence and underscores the need for more thorough follow up and higher standards of reporting in future studies. Written by: Scovell JM, Mata DA, Ramasamy R, Herrel LA, Hsiao W, Lipshultz LI.   Are you the author? Scott Department of Urology, Baylor College of Medicine, Houston, TX; Department of Pathology, Brigham and Women's Hospital, Boston, MA; Department of Urology, Emory University School of Medicine, Atlanta, GA; Department of Urology, Kaiser Permanente, Oakland, CA.   Reference: Urology. 2015 Feb 16. pii: S0090-4295(14)00981-9. doi: 10.1016/j.urology.2014.09.005 PubMed Abstract PMID: 25697786 UroToday.com Vasectomy Section E-Newsletters Newsletter subscription Free Daily and Weekly newsletters offered by content of interest The fields of GU Oncology and Urology are rapidly advancing. Sign up today for articles, videos, conference highlights and abstracts from peer-review publications by disease and condition delivered to your inbox and read on the go. Subscribe
ESSENTIALAI-STEM
Skip to main content Turbolift Counter When changing the standard extraction criteria of a related list, for example using another method or redefining it by extending the class that contains it, the counter of the number of the linked records visible in the Turbolift (the right column with the list of modules in record detail) may no longer be valid. In this case, therefore, a method that returns the correct count must be defined through the following API. SDK::setTurboliftCount($relation_id, $method); $relation_id : relation id (table vte_relatedlists) $method : the method name that returns the correct count The method must be implemented in the class that contains the relation (e.g. in the Contact relationship connected to a Company we mean the Accounts class or any extensions to it) To remove the customization: SDK::unsetTurboliftCount($relation_id); The defined method can be the related list method (column name in vte_relatedlists) or a custom method that returns an integer.
ESSENTIALAI-STEM