Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Page:Dictionary of National Biography, Second Supplement, volume 2.djvu/617
three centuries came to nothing. Yet his publications are very numerous and cover a wide range. Some of these have been already mentioned. His scholarly reputation mainly rests on his edition of Juvenal. Apart from this, his chief contributions to classical learning are an edition of Cicero's 'Second Philippic,' founded on that of Halm (1861); a bibliography of Latin literature, founded on that of Hübner (1875); and an independent edition of the 'Third Book of Pliny's Letters' (1880). In 1868 he published an excellent 'First Creek Reader,' with a vigorous preface on classical education, interspersed with interesting touches of autobiography. Of proposed editions of 'The Narrative of Odysseus' ('Odyssey,' books ix.-xii.), and of the 'Tenth Book of Quintilian,' only a small portion was published (1872). His annotated editions of Burman's and Uffenbach's visits to Cambridge, printed in 1871, were posthumously published, as part of 'Cambridge under Queen Anne,' in 1911. In 1889 he published a critical review of the 'Latin Heptateuch' of Cyprian, the sixth-century poet and bishop of Toulon. Among miscellaneous works may be reckoned Mayor's edition of Richard of Cirencester's 'Speculum Historiale de gestis Regum Angliæ' for the Rolls series (2 vols. 1863-9), devoting many pages of the preface to indicating the exact sources of all the borrowed erudition of the forger of the treatise 'De Situ Britanniæ,' which its first editor (and, indeed, author), Charles Bertram [q. v.] of Copenhagen, had falsely attributed to Richard of Cirencester. In 1874 he edited Cooper's 'Memoir of Margaret Countess of Richmond and Derby,' and in 1876 pubhshed, for the Early English Text Society, 'The English Works of Bishop Fisher.' His latest work was a 'First German Reader, with Translation and Notes,' which he had printed for himself and published at the Cambridge University Press in Jan. 1910 with the title 'Jacula Prudentium. Verse and Prose from the German.'
His annotated copies of Juvenal and Seneca are among the books presented by his executors to the library of his college, and his interleaved Latin dictionaries are among those presented to the university library, which he named as the ultimate destination of his biographical collections. Of the rest of his library more than 18,000 volumes were sold in Cambridge after his death (Catling's catalogue of sale on 14–18 March 1911).
A presentation portrait printed by (Sir) Hubert (von) Herkomer in 1891 is in the hall of St John's College. An etching by the same artist formed the frontpiece of 'Minerva' (1003-4). and is reproduced in 'The Eagle' (xxv. 129).
MEADE, RICHARD JAMES, fourth in the Irish peerage, and second in the peerage of the United Kingdom (1832–1907), admiral of the fleet, born on 3 Oct, 1832, was eldest son in the family of four sons and a daughter of Richard Charles Francis Meade [q. v.], third earl of Clanwilliam and Baron Gillford in the Irish peerage and Baron Clanwilliam in the peerage of the United Kingdom, by his wife Lady Elizabeth, eldest daughter of George Augustus Herbert, eleventh earl of Pembroke. He had his early education at Eton, and entered the navy on 17 Nov. 1845; he passed his examination in Nov. 1851 and was promoted to lieutenant on 15 Sept. 1852. In Dec. of the same year he was appointed to the Imperieuse, frigate, in which he served during the whole of the Russian war. The Imperieuse was senior officer's ship of the advanced squadron and followed up the ice and established the blockade of the Gulf of Finland as early in the spring as possible, and before the navigation was thought safe for heavy ships. In Sept. 1856 Lord Gillford was appointed to the Raleigh, Captain Keppel [see, Suppl. II], | WIKI |
Themen 35c3 - Presentations With Hugo and Reveal
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
13 KiB
reveal-hugo
A Hugo theme for Reveal.js that makes authoring and customization a breeze. With it, you can turn any properly-formatted Hugo content into a HTML presentation.
screenshot of reveal-hugo
Example
Using reveal-hugo, presentations with multiple slides can be created with just one markdown file, like so:
+++
title = "How to say hello"
+++
# English
Hello.
---
# Français
Salut.
---
# Español
Holá.
Just use --- to split content into different slides.
Tutorial
You should be able to complete this section with no prior knowledge of Hugo or Reveal.js. At the end, you'll have a working presentation with instant reloading.
Create your first presentation
To start, install Hugo and create a new Hugo site:
$ hugo new site my-presentation
Change into the directory of the new site:
$ cd my-presentation
Add the reveal-hugo theme as a submodule in the themes directory:
$ git submodule add git@github.com:dzello/reveal-hugo.git themes/reveal-hugo
Open config.toml and add the following contents:
theme = "reveal-hugo"
[outputFormats.Reveal]
baseName = "index"
mediaType = "text/html"
isHTML = true
This tells Hugo to use the reveal-hugo theme and it registers a new output format called "Reveal".
Next, create a file in content/_index.md and add the following:
+++
title = "My presentation"
outputs = ["Reveal"]
+++
# Hello world!
This is my first slide.
Back on the command line, run:
$ hugo server
Navigate to http://localhost:1313/ and you should see your presentation.
New site with reveal-hugo
To add more slides, just add content to _index.md or create new markdown files in content/home. Remember that each slide must be separated by --- with blank lines above and below.
# Hello world!
This is my first slide.
---
# Hello Mars!
This is my second slide.
Cloning an existing repository
If you have an existing repository that was setup with the above steps, you have to pull in the theme submodule after cloning your repository using the following command:
git submodule update --init
Usage
The Usage guide is contained in the example presentation that lives in this repository in the exampleSite directory. You can access a live version at reveal-hugo.dzello.com.
Root vs. section presentations
Here's what the folder structure would look like with one root presentation and one section presentation.
- content
- home # special section for appending to root presentation
- body.md # appends to the root presentation
- conclusion.md # appends to the root presentation
- _index.md # beginning of the root presentation
- ted-talk
- _index.md # beginning of the ted talk presentation
- body.md # appends to the ted talk presentation
- conclusion.md # appends to the ted talk presentation
This will create two presentations, one at / and one at /ted-talk/. The order that slides are appended to each can be controlled by the weight parameter specified in each file's front matter. The slides in _index.md will always come first, though you don't have to put any slides in there if you want to.
Shortcodes
reveal-hugo comes with a variety of shortcodes that help you take advantage of some very useful Reveal.js features.
fragment shortcode
Wrap any content in the fragment shortcode and it will appear incrementally. Great for bulleted lists where you want one bullet point at a a time to appear.
- {{% fragment %}}One{{% /fragment %}}
- {{% fragment %}}Two{{% /fragment %}}
- {{% fragment %}}Three{{% /fragment %}}
frag shortcode
Like fragment but more terse - content is placed inline in a self-closing shortcode.
- {{< frag c="One" >}}
- {{< frag c="Two" >}}
- {{< frag c="Three" >}}
slide shortcode
The slide shortcode lets you set custom HTML and Reveal.js attributes for each slide - things like id, class, transition, background just to name a few. The names are the same as Reveal.js but without the 'data-' prefix.
Add the shortcode above the slide content, below the --- separator. Do not place content inside of the shortcode.
---
{{< slide id="hello" background="#FFF" transition="zoom" transition-speed="fast" >}}
# Hello, world!
---
Here's a list of documented slide attributes from the Reveal.js docs:
• autoslide
• state
• background
• background-color
• background-image
• background-size
• background-position
• background-repeat
• background-video
• background-video-loop
• background-video-muted
• background-interactive
• background-iframe
• background-transition
• transition (can have different in and out transitions)
• transition-speed
• notes (can also use the note shortcode)
• timing
You can also pass through your own, a data- prefix will be added automatically to each one (except for id and class).
section shortcode
To create groups of slides that can be navigated vertically, surround your markdown with the section shortcode.
{{% section %}}
# Vertical slide 1
---
# Vertical slide 2
{{% /section %}}
note shortcode
Add speaker notes for each slide with the note shortcode.
{{% note %}}
Don't forget to thank the audience.
{{% /note %}}
💡 Tip: you can also add notes by adding a note attribute to the slide shortcode.
markdown shortcode
Markdown surrounded by the markdown shortcode will not be rendered by Hugo but by Reveal.js itself. This is useful if you want to use some native Reveal.js markdown syntax that isn't supported by reveal-hugo.
{{% markdown %}}
# I'm rendered...
...by Reveal.js
{{% /markdown %}}
HTML slides
If you need to create fancier HTML for a slide than you can do with markdown, just add data-noprocess to the <section> element.
<section data-noprocess>
<h1>Hello, world!</h1>
</section>
Reusable slides and sections
Sometimes you need to reuse a slide in the same presentation or across different presentations. reveal-hugo makes use of Hugo data templates to make both cases easy.
To create reusable slides, create a TOML (or JSON or YAML) file in your site's data directory. Give it a name that reflects its content or just slides.toml. In that file, add a key for each reusable slide. The name should reflect the slide's content and the value should be the slide's markdown.
thankyou = '''
# Thank you!
Any questions?
'''
💡 Tip: TOML's multiline string syntax comes in handy here, note the '''.
Each key can contain one or more slides separated by --- and newlines. That way you can create reusable sections.
thankyou = '''
# Thank you!
---
Any questions?
'''
To render a slide from a data template, use the slide shortcode with a content attribute:
{{% slide content="slides.thankyou" /%}}
The part before the "." is the name of the file in the data directory. The part after the dot is the key to look up in that file.
You can use all the additional slide shortcode attributes. They will be applied to every slide in the data template.
Configuration
Customize the Reveal.js presentation by setting these values in config.toml or the front matter of any presentation's _index.md file.
• reveal_hugo.theme: The Reveal.js theme used; defaults to "black"
• reveal_hugo.custom_theme: The path to a locally hosted Reveal.js theme in the static folder
• reveal_hugo.highlight_theme: The highlight.js theme used; defaults to "default"
• reveal_hugo.reveal_cdn: The location to load Reveal.js files from; defaults to the reveal-js folder in the static directory to support offline development. To load from a CDN instead, set this value to https://cdnjs.cloudflare.com/ajax/libs/reveal.js/3.7.0 or whatever CDN you prefer.
• reveal_hugo.highlight_cdn: The location to load highlight.js files from; defaults to https://cdnjs.cloudflare.com/ajax/libs/highlight.js/9.12.0. For local development, change this to point to a file in the static directory.
This is how parameters will look in your config.toml:
[params.reveal_hugo]
theme = "moon"
Or in the front matter of an _index.md file:
[reveal_hugo]
theme = "moon"
Include any other attributes in those sections that you'd like to be fed as arguments to Reveal.initialize in snakecase, so slide_number instead of slideNumber. Params are converted from snakecase to camelcase before passing to Reveal.js. This is necessary to maintain the proper case of the parameters.
Here's an example of configuring Reveal.js parameters alongside a theme and highlight.js theme:
[reveal_hugo]
theme = "moon"
highlight_theme = "solarized-dark"
slide_number = true
transition = "zoom"
See the extensive list of Reveal.js configuration options here.
Custom Reveal.js Themes
If you have a custom reveal theme to use (in .css form), place it somewhere in your static folder. For example, if you have:
- static
- assets
- custom-theme.css
Then you will need to have this line in config.toml
[params.reveal_hugo]
reveal_hugo.custom_theme = "assets/custom-theme.css"
Adding HTML to the layout
If you need to add something to the HTML layout, you can create partials that live at specific locations, depending on which presentation you want to customize and where you want the HTML inserted into the page.
Presentation Before </head> Before </body> Before closing </div> of div.reveal
All reveal-hugo/head.html reveal-hugo/body.html reveal-hugo/end.html
Root home/reveal-hugo/head.html home/reveal-hugo/body.html home/reveal-hugo/end.html
Section {section}/reveal-hugo/head.html {section}/reveal-hugo/body.html {section}/reveal-hugo/end.html
This is the recommended way to add custom CSS and JavaScript to each presentation.
💡 Tip: In Hugo, partials live in the layouts folder:
For example, if you have HTML that is to be placed before every presentation, this would be the structure:
- layouts
- partials
- reveal-hugo
- head.html
- body.html
- end.html
Recipes
Add a Reveal.js presentation to an existing Hugo site
If your Hugo site already has a theme but you'd like to create a presentation from some of its content, that's very easy. First, manually copy a few files out of this theme into a few of your site's directories:
cd my-hugo-site
git clone git@github.com:dzello/reveal-hugo.git themes/reveal-hugo
cd themes/reveal-hugo
cp -r layouts static ../../
Files and directories are named such that they shouldn't conflict with your existing content. Of course, you should double check before copying, especially the shortcodes which can't be put under a directory.
Next, add the Reveal output format to your site's config.toml file
[outputFormats.Reveal]
baseName = "index"
mediaType = "text/html"
isHTML = true
Now you can add outputs = ["Reveal"] to the front matter of any section's _index.md file and that section's content will be combined into a presentation and written to index.html. If you already have a index.html page for that section, just change the baseName above to reveal and the presentation will be placed in a reveal.html file instead.
Note: If you specify outputs = ["Reveal"] for a single content file, you can prevent anything being generated for that file. This is handy if you other default layouts that would have created a regular HTML file from it. Only the list file is required for the presentation.
Tip: As of Hugo 0.42, Hugo has theme inheritence. You can avoid the file copying step above by adding "reveal-hugo" to your site's array of themes.
Reveal.js tips
These are some useful Reveal.js features and shortcuts.
• 's' - type 's' to enter speaker mode, which opens a separate window with a time and speaker notes
• 'o' - type 'o' to enter overview mode and scroll through slide thumbnails
• 'f' - type 'f' to go into full-screen mode
Here are a few useful Reveal.js-related tools:
Find many more on the Reveal.js wiki: Plugins, tools and hardware.
Changelog
• 2018-08-03: The slide shortcode is now easier to use. An auto-closing version sits inside the slide instead of needing to surround its content and add a closing tag.
Contributing
Contributions are very welcome. To run the example site in this repository locally, clone this repository and run:
hugo server -s exampleSite
or simply...
npm start | ESSENTIALAI-STEM |
User:Prosperosity/Sheena
* birth_name = Yumiko Shiina
* birth_place = Urawa, Saitama
* genre = Rock, punk rock, alternative rock, experimental rock, chamber music, chanson, jazz, big band, bossa Nova, adult contemporary, funk, hip hop, electronica, kayōkyoku, enka
* notable_instruments = Duesenberg Star TV model DSR-SP
Kenshi Yonezu (米津玄師), is a Japanese musician, who began releasing Vocaloid music under the stage name Hachi (ハチ) in 2009. In 2012 he debuted under his real name, releasing music with his own voice.
Early years
Sheena considers her hometown to be Fukuoka, and her official site listed it as such during her early years.
-In 1995, her musical creativity took another new direction when, as a member of an all-girl band called the Marvelous Marbles, she earned recognition at a Teens Music Festival. In the following year, as a solo artist, she won an Award of Excellence in the finals of the annual Music Quest competitions. -A string of live performances in various semi-pro groups followed, eventually leading to her debut as a professional. Response to the release of her first single in May 1998 -her hometown Fukuoka
9.05~27 インストアライブツアー 一九七八年十一月二十五日
-used to live in Shizuoka, did ballet.
http://web.archive.org/web/20080415164045/http://www.time.com/time/asia/2003/cool_japan/rinngo.html With reporting by Yuki Oda and Michiko Toyama/Tokyo
-Growing up in Fukuoka -started taking piano lessons at age 4. -By high school, she had played in several bands and was writing and singing her own songs. -The diverse list of influences she names off the top of her head includes Ella Fitzgerald, Kurt Cobain, Edith Piaf and Japanese balladeer Eiko Shuri. -In 1998 she signed with Toshiba EMI records. -In interviews at the time, she said Honno (the word means instinct) was intended to show that women had as much right to erotic fantasies as men.
http://web.archive.org/web/20080113231856/http://www.time.com/time/asia/2003/cool_japan/rinngo2.html -"Pop in Japan means conformity, being the same as everyone else," says Atsushi Shikano, managing editor of Rockin' On Japan, one of the country's most popular music magazines. "But Sheena did exactly the opposite. Her way of singing, word choices, extreme sound, radical visual images, the bitchy way she sang—no one thought of doing that before. But she showed that people wanted something different." -'40s Big Band and swing, Indian sitar, avant-garde atonal music, trance-house psychedelia, church-organ fugues, electronic multiprocessed voice-overs and traditional Japanese koto, shamisen and flute music. -this album (which she also produced) marked the first time she had the budget and the artistic control to create exactly the kind of music she wanted.
The 5th MUSIC QUEST JAPAN FINAL 日時 1996年10月10日(祝) 開場12:00 開演13:00 グランプリ 指でさようなら 谷口 崇 谷口 崇 谷口 崇 九州 4 semi-finalists 優秀賞 ひまわりになったら AIKO AIKO AIKO 優秀賞 ここでキスして. 椎名 林檎 椎名 林檎 椎名 林檎
レコードメーカー協賛社賞 東芝EMI賞、トーラスレコード賞、 徳間ジャパンコミュニケーションズ賞、 BMGビクター賞、ビクターエンタテインメント賞、 ワーナーミュージック・ジャパングループ賞 21 record labels
Toshiba EMI debut
-went to England for three months, before her debut.
After MM, held Jisaku on 2.11. Then fell ill. -Jitsuen 2
--was constantly surprised with things when she debuted. Wanted to give up during 歌舞伎町の女王. -Exhausted after MM due to success. -next single was Gips discussed. But said she couldn't release constantly. so some time passed. -thought people who went to lives wouldn't be surprised by Gips, so chose Honno instead. -found promotion very tiring.
-first two years tired her. Didn't compromise in music on SS, but felt like she did with promotion.
Artistry
Music critic Tetsu Misaki in 2002 felt like Sheena's image was contradictory, as she acted like an underground musician at the same time as acting like a nationally popular musician. Misaki believed many aspects of her lyrics created the image of Sheena being different from normal people.
Sheena tends to use kanji not standardly found in lyrics, such as 譬え instead of たとえ in the song "Yami ni Furu Ame." (2000) Misaki believed that this strengthened her appeal, as it illustrated Sheena being different to normal people. Misaki also believed that her lyrics and titles attempted to link to poetry and literature. He saw this in her frequent usage of the words subete (全て), mattaku (全く) and zenbu (全部) were hyperbolic, similar to hyperbole found in poetry. Many of her titles follow a kanji+katakana pattern, such as "Marunouchi Sadistic" (丸の内サディスティック) (1999) and "Benkai Debussy" (弁解ドビュッシー) (2000). Misaki notes that there is no obvious link between the two nouns, and believed this linked them with surrealism. He contrasted this with similarly titled anime such as Bishojo Senshi Sailor Moon (美少女戦士セーラームーン) and Kidō Senshi Gundam (機動戦士ガンダム), where the kanji act as a description for the katakana phrase. He further linked the titles, along with noun-dense phrases in her lyrics "Honnō," "Tsumi to Batsu" and "Byōshō Public" with certain styles of haiku. He believed calling her debut song "Theory of Happiness" ("Kōfukuron") linked it to literature.
An important aspect of Sheena visually in her early career was her mole, located on her left cheek. Misaki noted that costumes were important during this period, but while her image changed, the mole was a constant feature. He noted Sheena's nurse costume in the music video for "Honnō" was visually important in her career, and linked her use of costumes with eroticism.
-records demo versions of all of her songs, (even those for other people), then goes for the real version. -Declared herself Shinjuku-kei, because she wanted the possibilities to be endless in lyrics or sound
-doesn't put in private things to her A-sides as a rule -wants people to treasure B-sides on singles, so her true self -recorded demos with Ukigumo.
In 20s, many words she stayed away from. "Onna no ko" (girl)
-Sheena goes through periods where she cannot write songs, such as Variety.
Legacy
In 2000, Billboard magazine cited the commercial success of Sheena, alongside label mate Hikaru Utada with saving record Toshiba EMI from a sales slump it experienced in the mid-1990s.
She was ranked number 36 in a list of Japan's top 100 musicians compiled by HMV in 2003.
The Duesenberg Starplayer guitar which Sheena has used recorded the historical sales of about 1000 sets in Japan in 2000.
the book by Taro Aso who is the 92nd Prime Minister of Japan Totetsumonai Nihon (as a singer representative of Jpop with Hikaru Utada).
Mika visited to Japan in 2007 and mentioned Ringo in several interviews as one of his favorite Japanese artists.. Jack Barnett of These New Puritans who was visiting Japan for the Summer Sonic 08 said in an interview that he was a great fan of Ringo Sheena and bought all her works while he was there, as they were not available in the United Kingdom.
Her third album, Kalk Samen Kuri no Hana, was ranked second in the most under-appreciated Japanese music of the last decade by CNN International Asia on December 22, 2009. Sheena got a mention in The Guardian as an artist who deserves to be seen and heard in the west in 2010.
Author Satoshi Miki listened to "KbCnJ" on repeat when writing the script for the drama 『時効警察』(じこうけいさつ)
http://ent2.excite.co.jp/music/special/angela/meiban.html アンジェラ・アキが選ぶ名盤10 -only Japanese influence she lists 1999年リリースの椎名林檎のデビュー・アルバム. その後、彼女は一気に女性アーティストのトップにまで登りつめた. 2003年に日本に戻ってきた時、アメリカにいた10年間の空白を埋める為に、邦楽を片っ端から聴きました. 中でも、椎名林檎さんの音楽に衝撃を受けました. 国境を越えたロックなアルバムですね.
Stage name
Shéna Ringö 1998-
Ringo Expo (Sheena Ringo)
She declared recently that she followed the naming of the pen name of her favorite manga artist, Sensha Yoshida. His first name is just a name of an object like Ringo ("Sensha" in this case meaning a "tank" in English). She thought that those who heard her name would be shocked by that.
Personal life
Sheena's older brother Junpei Shiina is an R&B musician, who debuted in 2000 under Sony. Since 2006, he has been managed by Kronekodow, Sheena's personal management agency. The pair have collaborated musically several times. In 2002, they covered three songs in English: Marvin Gaye's "The Onion Song" for Sheena's album Utaite Myōri, "Where Is the Love" (originally performed by Roberta Flack and Donny Hathaway) for Junpei Shiina's album Discover, and Toto's "Georgy Porgy." "Georgy Porgy" was recorded as a part of a special unit called Yokoshima, featuring Jumpei Shiina on keyboards and Ringo Sheena on chorus. In 2007, the pair sang a duet on her single "Kono Yo no Kagiri."
In November 2000, Sheena married guitarist Junji Yayoshi, who was a member of her backing band Gyakutai Glycogen. He announced her pregnancy in early 2001, and in July gave birth to a son. The pair then later divorced in January 2002.
In September 2013, gossip magazine Josei Jishin published an article about Sheena, linking her romantically with music director Yuichi Kodama and stating that she secretly giving birth to her second child. Sheena addressed these rumours publicly during her Tōtaikai concerts in November 2013, announcing that she gave birth in spring 2013 to a girl. As this was close to the release of her single "Irohanihoheto/Kodoku no Akatsuki," she did not feel it was appropriate to link the birth of her daughter with single promotions, so decided not to announce it at the time. The footage of her announcement was released her Tōtaikai DVD in March 2014.
-pregnancy had a high miscarrage chance, so announced it in January.
Discography
* Muzai Moratorium (1999)
* Shōso Strip (2000)
* Utaite Myōri (2002)
* Kalk Samen Kuri no Hana (2003)
* Heisei Fūzoku (2007)
* Sanmon Gossip (2009)
* Gyakuyunyū (2014)
* Untitled (2014)
Solo tours and residency shows
* Concert tours
* Senkō Ecstasy (先攻エクスタシー) (1999)
* Manabiya Ecstasy (学舎エクスタシー) (1999)
* Gekokujō Xstasy (2000)
* Gokiritsu Japon (2000)
* Sugoroku Ecstasy (2003)
* Chotto Shita Recohatsu 2014 (ちょっとしたレコ発 2014) (2014)
* Ringo Sheena 2014 Arena Tour (2014)
* Residency shows and single night concerts
* Zazen Extasy (2000)
* Baishō Ecstasy (賣笑エクスタシー) (2003)
* Dai Ikkai Ringo-han Taikai: Adults Only (第1回林檎班大会 アダルト・オンリー) (2005)
* (Nama) Ringo-haku '08: Jūshūnen Kinen-sai ((生)林檎博'08 ~10周年記念祭~) (2008)
* Tōtaikai: Heisei Nijūgo-nen Kaneyama-chō Taikai (党大会 平成二十五年神山町大会) (2013)
* Hantaikai: Heisei Nijūgo-nen Hamarikyū Taikai (班大会 平成二十五年浜離宮大会) (2013)
Kofukuron
-went to England for three months, before her debut.
KFR Not talking about happiness, but love on kofukuron Tries to link to literature with a title like kfr
-Kofukuron=first performed 1998. 9. 5 タワーレコード福岡店 -Etsuraku-hen 1999. 4. 1 福岡DRUM LOGOS(in 福岡) -Suberidai=first performed 1998. 9.27 金沢AZホール(in石川) -Toki ga Bososuru
Kabukicho no Joo
KBCnJ -uses the terms Kanrakugai (歓楽街 pleasure quarter) and 大遊戯場 daiyu-gijo- (great amusement area) as if she's a tourist, as if she's looking in from the outside. Making a drama for listeners about a sleepless city.. Lyrics=prostitute mum child. No fatherly influence. Loved men to the point of throwing away her children Two stories, from chijo to Tokyo, plus her becoming the new queen Feels like Taiga drama overlap stories, characters
KBCnJ =extremely rare type of popular song. About a mother, not a love song about a man.
Critic Kazuhide Nabae believe the narrative in the song was driven by a "borrowing of author's rhetoric." By mentioning places such as Kujūkuri Beach and Kanrakugai, it forces the time and place of the events to change as well. Musician Haruo Chikada believed the interaction between the "checkered lives of three generations of women, and the relationship of these three" was important to the song, in his book Kangaeru Hit 2.
Feels like KnC is her most 新宿系 song. (at 17) -Kabuki+Unconditional=first performed 1998. 9. 5 タワーレコード福岡店
1998. 9. 5 タワーレコード福岡店(in福岡) 1998. 9. 6 熊本マツモトレコード(in熊本) 1998. 9.12 WAVE池袋店→ タワーレコード町田店(in東京) 1998. 9.15 HMV新宿SOUTH(in東京) 1998. 9.19 タワーレコード心斎橋店→ タワーレコード梅田店(in大阪) 1998. 9.20 HMV横浜(in横浜) 1998. 9.21 札幌 PALS 21 (in札幌) 1998. 9.23 新星堂カルチェ5柏店 (in千葉) 1998. 9.25 フクロヤ二口店(in富山) 1998. 9.26 松木屋大宮店(in福井) 1998. 9.27 金沢AZホール(in石川)
Koko de Kiss shite
-wanted to do something entirely different to KCnC. -wrote when she was 17 about her first relationship.
-performed on MS 1999/02/05
-KokodeKiss=first performed 1998. 9. 5 タワーレコード福岡店 -Memai 2000. 7.30 飯塚嘉穂劇場 -リモートコントローラー sweet love 1999.9. 5 日比谷野外音楽堂(in 東京)
Marunouchi
1999. 1. 5 NHK505st(in 東京) NHK-FM 「LIVE BEAT '99」 イチオシ祭り@
Muzai Moratorium
-Senko Exctasy Onaji Yoru-Favourite song on MM.
-finished MM in summer 1998
_________________ MM a compilation of songs about living as a human being, based on thoughts Sheena had in her teenage years.
TM= written at 18 KCnJ=written at 18 MnUS=Because she likes Tokyo. KfR= Akane = written at 16. Her everyday in Fukuoka. StH = just before she became 19. TmKA = Song she performed with bands in Fukuoka, rearranged. KdKS - OY = Always felt like this in the night KK = About being a woman Morphine = 19
Jacket =Taken in a studio in Tokyo. Wrote the calligraphy herself. Around her stand reporters, cameramen and bodyguards = Her concept.
____________________ MM -wanted to include lots of songs she had performed at her early lives =compilation of herself in her teenage years -likes short songs. Does not like anything superfluous.
-wrote all of the songs separately, without a theme in mind. When she thought of it as an album, she wanted to make the concept a moratorium.
-the people she meets are "worring about the things you lack, but still having lots of desires" 自分の欠落に悩みながらも、そのわりには色々な欲求があったりして -unpretentious, free and innocence = her image, but all she wants is to be like that. -she is the same, but as she meets more people, she realises everyone is like this. -"a moratorium-like moment about not being able to conform to society" everyone has. って、きっと誰にでもあると思うから、自分のためにも「それは無罪なんだ!」と言ってしまおうと. でもまさか『無罪モラトリアム』というのが、そのままタイトルになるとは思わなかったですけどね(笑).
-KkdKS cover=a notion she has. -"What if there was a big scene in a corthouse or somewhere, where "innocent!" or "won!" was proclaimed, and I was standing by myself in the middle of that." -Designers went with that -was in a lot of bands. Likes the band sound, the most known sound to her. -Didn't want to be stuck with a single band's sound. -Guitarists have different characters -Declared herself Shinjuku-kei, so lyrics or sound could be anything. -Ringo at 16-18. Understanding herself. Diary-like things.
___
PROMO CONCERTS -Jitsuen promo. Longest concert to date. 2.11 -Fell ill, had to stop. -Jitsuen 2 -Gokuhi 恍惚極秘演奏会inタワーレコード渋谷イベント・レポート 300 people chosen from those who bought bouth KKdKS and MM. Recorded 性的ヒーリング~特別御奉仕編~ 丸山圭子の名曲『どうぞこのまま』 広末涼子ちゃんに提供した『プライベイト』をセルフカヴァー. 来生たかおの『マイ・ラグジュアリー・ナイト』 『カプチーノ』をグランジ風にセルカヴァー.
-Tower Records instore live -1999.6.28 クロッシングホール(in 福岡)
-Sid=first performed 1998. 9. 5 タワーレコード福岡店 -Keikoku=1998. 9.18 渋谷ON AIR WEST -Akane Sasu 1999. 1. 5 NHK505st(in 東京) NHK-FM 「LIVE BEAT '99」 イチオシ祭り@ -Morphine 自作自演生実演会 1999. 2.11 O3(OZON)(in 愛知) -Tadashii + Tsumiki + Onaji Yoru
-Exhausted after MM due to success. Found promotion difficult.
Senko Exctacy
1999. 4. 1 福岡DRUM LOGOS(in 福岡) 4. 2 心斎橋クラブクアトロ(in 大阪) 4. 5 金沢AZホール(in 石川) 4. 9 渋谷クラブクアトロ(in 東京) 4.10 渋谷クラブクアトロ(in 東京) 4.18 仙台BEEBベースメントシアター(in 宮城)
Honno
Honnō-one of most important visual aspects. Context of eroticism.
-Exhausted after MM due to success. -next single was Gips discussed. But said she couldn't release constantly. so some time passed. -thought people who went to lives wouldn't be surprised by Gips, so chose Honno instead.
-SS finished in summer 99. Planned on a gentle song, but it was Honno. She became a ヤバい女/ -SS= (MM was みんなが分かるものではないはずなのに、売れることによって誤解が生じる, so なるほど. じゃあ、好きにやったものを作ればいいのね) -SS made noisy album. Attempt to lower sales.
PROMO performances -performed on MS 1999/10/29 HONNO 1st performance -Aozora, Rinne Manabiya1999.11. 2 -虚栄ブランコ 1999.11.30 club asia(in 東京)
Gips
Gips=16.
-Gips=first performed 1998. 9. 5 タワーレコード福岡店 -Sigma, Tokyo no Hito Manabiya1999.11. 2
-Exhausted after MM due to success. -next single was Gips discussed. But said she couldn't release constantly. so some time passed. -thought people who went to lives wouldn't be surprised by Gips, so chose Honno instead.
Tsumi to Batsu
-Tsumi to Batsu first performed at Senko Exctasy -wanted to release it as a single, but was told this was a bad idea in EMI meetings. Gips=16.
-17=made when she was 17.
--performed on MS 2000/01/28
-Tsumi 1999. 4. 1 福岡DRUM LOGOS(in 福岡) -Seventeen 自作自演生実演会 1999. 6. 14 心斎橋ビッグキャット(in 大阪) -Kimi no Hitomi 2000. 4.17 栃木県総合文化センター (in 栃木)
Shoso Strip
Shoso Strip ="a risky work that regular people might find difficult to understand." SS =Linked to illness on ss titles, but not lyrics Uses kanbun kanji, her appeal is that she's different to other people Mm to ss link because of the Shoso
-SS finished in summer 99. Planned on a gentle song, but it was Honno. She became a ヤバい女/ -SS= (MM was みんなが分かるものではないはずなのに、売れることによって誤解が生じる, so なるほど. じゃあ、好きにやったものを作ればいいのね) -SS made noisy album. Attempt to lower sales.
-Identity=first performed 1998. 9.27 金沢AZホール(in石川) -Tsuki ni Makeinu, Kyogensho, Benkai, Yokushitsu, Izonsho, Byosho 2000. 4.17 栃木県総合文化センター (in 栃木) -Yami ni, 4.26 NHKホール(in 東京) -Sakana, Stoicism 2000. 7.30 飯塚嘉穂劇場
「闇に降る雨」ヴィデオ・クリップ撮影秘話 -left Yami video up to director. -used to live in Shizuoka, did ballet.
IDENTITY=June 4 2000, during Gekoku 名古屋(市公会堂:6月2日 Then Tokyo. After returned to Tokyo 「アイデンティティ」ヴィデオ・クリップ撮影秘話 Switched Gekokujo footage because she had pnemonia at NHK Hall. Shot the video anyway. But her husband showed up and took her home without warning as she was looking terrible.
Gekokujo
2000. 4.17 栃木県総合文化センター (in 栃木) 4.20 石川厚生年金会館 (in 石川) 4.24 新潟県民会館 (in 新潟) 4.26 NHKホール (in 東京) 4.28 渋谷公会堂 (in 東京) 5.03 渋谷公会堂 (in 東京) 5.13 広島郵便貯金ホール (in 広島) 5.15 鹿児島市民文化ホール第一 (in 鹿児島) 5.18 長崎ブリックホール (in 長崎) 5.22 高松市民会館 (in 高松) 5.24 大阪厚生年金会館大ホール (in 大阪) 5.27 仙台サンプラザホール (in 仙台) 5.31 福岡サンパレス (in 福岡) 6.02 名古屋市公会堂 (in 愛知) 6.05 北海道厚生年金会館 (in 北海道) 6.07 盛岡市民文化ホール (in 岩手)
4.17 栃木県総合文化センター(in 栃木) 4.20 石川厚生年金会館(in 石川) 4.24 新潟県民会館(in 新潟) 4.28 渋谷公会堂(in 東京) 5.03 渋谷公会堂(in 東京) 5.13 広島郵便貯金ホール(in 広島) 5.15 鹿児島市民文化ホール第一(in 鹿児島) setlist the same 【曲目表】 01.月に負け犬 11.弁解ドビュッシー 02.警告 12.ここでキスして. 03.君ノ瞳ニ恋シテル 13.アイデンティティ 04.本能 14.幸福論(悦楽編) 05.虚言症 15.罪と罰 06.積木遊び 16.歌舞伎町の女王 07.あおぞら 17.浴室 08.ギブス 18.依存症 09.ギャンブル 19.シドと白昼夢 10.やっつけ仕事 20.病床パブリック En 01.同じ夜 02.丸ノ内サディスティック
Yami ni, 4.26 NHKホール(in 東京)
4.26 NHKホール(in 東京) =Two sets. Strings and band.
【曲目表】 --Strings Set-- 01.闇に降る雨 03.リモートコントローラー 02.幸福論 04.正しい街with弦一徹勝ち戦記念楽団 --Band Set-- 01.本能 10.アイデンティティ 02.虚言症 11.警告 03.積木遊び 12.罪と罰 04.あおぞら 13.歌舞伎町の女王 05.ギブス 14.浴室 06.ギャンブル 15.依存症 07.やっつけ仕事 16.シドと白昼夢 08.弁解ドビュッシー 17.病床パブリック 09.ここでキスして. 18.同じ夜with弦一徹勝ち戦記念楽団 En 月に負け犬
5.18 長崎ブリックホール(in 長崎) 5.22 高松市民会館(in 高松) 5.24 大阪厚生年金会館大ホール(in 大阪)
【曲目表】 05.恋は盲目 5.27 仙台サンプラザホール(in 仙台) +Love, Keikoku Benkai reversed
5.31 福岡サンパレス(in 福岡) 6.02 名古屋市公会堂(in 愛知) 6.05 北海道厚生年金会館(in 北海道) Sendai, but 06.正しい街 instead of kyogensho 6. 7 盛岡市民文化ホール(in 岩手)+Kyogensho
Zazen
2000. 7.30 飯塚嘉穂劇場(in 福岡)
Mayonaka
-had the idea of releasing a vinyl only single single her debut. But found out that vinyls can't be mass produced in the amount she was needing. So CD also, afterwards. -SkaPara recorded very quickly.
Sid to Hakuchumu = Takayuki Hattori Hattori Had the image of Bewitched
Each song was a separate project. No pre-production, first performed in the studio.
MAYONAKA Nov, Dec 2000. First without Kameda -wanted to try to be a vocalist.
Utaite
松崎ナオ sweet love 1999.9. 5 日比谷野外音楽堂(in 東京)
2000.05.18 Love Is Blind
04. モンローのテーマ (オリジナル:マリリン・モンロー) 10. 8823 (オリジナル:スピッツ) 2000. 11.25 原宿アストロホール(in 東京) After Utaite Spica cover. 一期一会 Sweets for my SPITZ
UTAITE -to remind her about how she made music,
Stem
-Saito thought Kuki was a standard by someone.
Kalk
KALK: 輪廻 【りんね】 Shukyo and Soretsu. 林檎「ラストの曲が1曲目に戻っていくイメージは確かにあるけど、こういうこともあるよねっていう感じ、“そういう輪廻もあるけど、こういう輪廻もあるよね”っていう感じにしたかったんです. こういうことって軽率に言うことではないけれど(笑)、輪廻のなかにもう一つこういうルールがあるっていう意味ではなくて、追記に近いもので、そういう1曲になればいいな、と」
KALK -decided on what she'd do after releasing Utaite
Baisho
Torikoshi, Kuki, Ishiki, Polter, Okonomi, Meisai=Baisho, とりこし苦労 茎 意識 ポルターガイスト おこのみで 迷彩
February 23, 2003. Release date of Kalk. 「賣笑エクスタシー」公開発言 -first live in two years -斎藤ネコ 23 member band -selling smiles like McDonalds Baisho, 賣笑 -seen as more of an event instead of a performance -Ichijiku=Recorded recently, after Kalk. 浮雲 Wanted to try singing other peoples' songs. Asked people who knew her brother for songs. -Toshiba EMI asked if she had any songs to add as a bonus. -found it difficult to put words to other peoples' music.
-5 year anniversary 1st
Sugoroku
SUGOROKU -a simple band arrangement
Karisome Otome
-music station 2006/12/08
KonoYo
-music station 2007/01/19
Heisei Fuzoku
http://www.fujitv.co.jp/ourmusic/profile.html?ep=146
Ariamaru Tomi
-music station 2009/05/29
Sanmon Gossip
2009.06.01 本日より6.24ニューアルバムより新曲『旬 』『二人ぼっち時間』先行モバイル配信開始! 旬 二人ぼっち時間 着うた(R)、着うたフル
-- SANMON=Had not started recording it yet in late 2008.
---
Kameda
First performance with Kameda Seiji 1998. 9.15 HMV新宿SOUTH(in東京)
Saito Neko
19990821
Zetsurin Hecto
1998. 9.18 渋谷ON AIR WEST 1999. 1. 5 NHK505st(in 東京) NHK-FM 「LIVE BEAT '99」 イチオシ祭り@
1999. 1. 5 NHK505st(in 東京) NHK-FM 「LIVE BEAT '99」 イチオシ祭り@ 3. 茜さす 帰路照らされど… 9. 丸の内サディスティック
Shuudan
1999. 6. 14 心斎橋ビッグキャット(in 大阪) 1999. 6. 19 三省堂新宿ホール(in 東京) -1999.6.20 タワーレコード渋谷(in 東京) -1999.6.28 クロッシングホール(in 福岡)
Gyakutai
【虐待グリコゲン】 椎名林檎 :声と電気式ギター 西川 進 :電気式ギター 皆川真人 :シンセとキーボード 亀田誠治 :電気式ベース 村石雅行 :生ドラム 1999.9. 5 日比谷野外音楽堂(in 東京)
Gekokujo
Zazen
6volt Gekko
Tensai
Manabiya
虚栄ブランコ 1999.11.30 club asia(in 東京)
-Aozora, Rinne Manabiya1999.11. 2
Hatsuiku
2000. 6.27 福岡DRUMLOGOS vs ロレッタセコハン(in 福岡)
6.29 広島並木ジャンクション vs 道産子アナル(in 広島)
7. 4 神戸チキンジョージ vs エレファントモーニングコール(in 兵庫)
7. 8 新宿リキッドルーム vs ハンサム兄弟(in 東京)
【発育ステータスメンバー】
椎名林檎:声と電気式ベース 村田純子(from 八王子ガリバー) :声と電気式ベース 鳥井泰伸(from Gaji) :電気式ベース 田渕ひさ子(from NUMBER GIRL) :電気式ギター 吉村由加(from DMQB) :生ドラム 01. 発芽 02. 悪い苗善ひ萌 03. 害虫駆除 04. 生え抜き 05. 膨らんできちゃった 06. はいはい 07. たかいたかい 08. 咲かせてみて 09. 今夜だふ 10. 雌花 故 雄花 11. 光合成
解説!発育ステータス -secret live tour members 椎名林檎 村田純子 鳥井泰伸 田淵ひさ子 吉村由加
-basically wrote the songs in the order they performed them -wanted an amateur sound -Gaichuu=one of the last songs Sakasete Mite=about not forgetting the pain of losing of virginity. Konya Do=already used to sex Kogosei=4th song.
Tokyo Jihen
http://web.archive.org/web/20040702105928/http://www.toshiba-emi.co.jp/vmc/artist/ringo.htm http://web.archive.org/web/20040610184912/http://www.toshiba-emi.co.jp/ringo/ringonouta/flash/index_j.htm
-decided Sugoroku tour. Decided quickly, or else there might be scheduling difficulties. -wanted to be in a band since before her debut -parted with her band members when she debuted in 1998. -in teens: being in a band was fun, what her career was going to be was secondary. -"until I can find good members I'll do it alone." -1st~3rd=presentation for band members. -Kalk: my ego bloomed to the most -solo: all her opinions are final. Band will be different =replace narinari
"how are these songs" first song on his demo tape. Sheena felt like he wrote the song for her. -wrote the song about blue (HZM) -Hirama gave Sheena Kao during her Sugoroku tour. Thought she couldn't sing it, but then the idea of a duet came about.
-image of sugoroku=wrote the songs for Kyoiku Sonan=first song she wrote -the intro was thought up by Ukigumo when he recorded the demo with Sheena as a joke. Hirama, however, played it as it was on the demo. Love song, but not like those she has written before. A song where you can feel both man and woman. lyrics came at the same time as music. Did not revise much. did not consider it for a single at first.
-Dynamite=owned at home. HEr father =why didn't you sing this on Utaite? -Kao=recorded in a single day.
Albums are based on TV channels. Educational, adult pay TV,
________________ 30 Discovery Added dates in Aomori and Iwaki were already planned, but they weren't sure if they could be performed due to the nuclear powerplants being offline.
Ultra C=tried to remove the boundaries between songs and create a two hour single story.
72 Handsome Sugite Originally titled サタデーナイト. Originally more soulful/disco. -recorded during Dai Hakken sessions -Sheena asked Kodama to write lyrics
75 Denki no Nai= about the 2011 earthquake Nijuisseiki=Kameda wrote thinking of his son.
102=Incidents Tokyo=Bon Voyage
114=Kodama first live concert Disc= Dai Hakken as basis Concert split into four sessions, 大自然、大都会、大発明、大宇宙 Jihen's theme=channels Sora ga Natteiru=discovery channel Hata watching -feels like an additional band member.
134=Uni Inoue also feels like 6th member.
159~164 -felt like theyd done everything they could 2010/11/6 EMI ROCKS festival decided. このままいくと『縛っちゃうな』っていう事だったんです. クリエイティヴに対する反応の度数みたいなものに『満たされた』気持ちを感じていたという、そんな記憶がまずあって Saw Miyavi at the same event, and was impressed by how he'd managed to "be so cool" all by himself. Each member also had their own projects, were getting busier. Perhaps from Tengoku e Yokoso started deep down.
original SR plan was to release three solo albums. her songs were made in her teens since 2001 feltthat she had to make music again. ---何処かのニーズにお応えして音楽を作る, responding to needs/offers.
Kyoiku=still felt "taboo" other people writing music for her. writing music for the needs of projects=challenge for 2010.
Wanted to put out Carnation as a Jihen work, but drama people were wanting her to be under her own name. -Jihen name prevented the band from many commercial tie-ups due to its associations with disasters. -Could not separate from name/band members.
166~169 Ukigumo Changed name to UKIGMO name was coined by Sheena, because he was blue like a young boy, gentle like a cloud. Guitar: unique riff/phrase surrealistic painter-like songs
170~173 Izawa First talked backstage at Fuji Rock Fes, friend of HZM.
Color Bars=songs already 提出 before the album concept.
Black Out 2006.19-21 Domestic Virgin Line 2006.04.07-5.30 Domestic JCHI 2006.12.30/31 Countdown Japan
Bokoku Jocho 2005.1.15~2.16 Dynamite 2006.19-21 Domestic Virgin Line
Botomin 2007.10.18/11.21 Spa & Treatment 2008.08.23 Society 2 2010.03.26~05.23 Ultra C 2011.09.30~12.26 Discovery 2012.02.14~29 Bon Voyage | 21 Osaka 28 Budokan only
Crawl 2005.1.15~2.16 Dynamite (+sigma) 2005.12-13 Ringo-han Adults Only 2005.20-21 Ringo-han Adults Only (+kiyoshi)
Denki no Nai 2011.09.30~12.26 Discovery
Dempa Tsushin 2010.03.26~05.23 Ultra C 2011.09.30~12.26 Discovery 2012.02.14~29 Bon Voyage
Ekimae 2004.07 30 Fuji Rock Festival 2005.1.15~2.16 Dynamite
FAIR 2010.03.26~05.23 Ultra C
FOUL 2009.12.30 Countdown Japan 2010.03.26~05.23 Ultra C 2010.11.06 EMI Rocks 2012.02.14~29 Bon Voyage
Fukushu 2007.10.18/11.21 Spa & Treatment
Genjitsu ni Oite 2005.1.15~2.16 Dynamite 2006.04.07-5.30 Domestic JCHI (~Kao)
Genjitsu o Warau 2005.1.15~2.16 Dynamite 2006.04.07-5.30 Domestic JCHI
Handsome Sugite 2011.09.24 Terebi Asahi Dream Music Festival 2011.09.30~12.26 Discovery
Himitsu 2005.1.15~2.16 Dynamite 2005.12-13 Ringo-han Adults Only 2005.20-21 Ringo-han Adults Only (+kiyoshi) 2006.04.07-5.30 Domestic JCHI 2006.07.02 Society of the Citizens 1 2006.12.30/31 Countdown Japan 2011.09.30~12.26 Discovery
Honto no Tokoro 2012.02.14~29 Bon Voyage
Honno 2006.04.07-5.30 Domestic JCHI
Ikiru 2010.03.26~05.23 Ultra C 2012.02.14~29 Bon Voyage
Jusui Negai 2005.1.15~2.16 Dynamite 2005.12-13 Ringo-han Adults Only 2005.20-21 Ringo-han Adults Only (+kiyoshi) 2006.04.07-5.30 Domestic JCHI
Kabuki 2006.04.07-5.30 Domestic JCHI 2006.07.02 Society of the Citizens 1 2007.10.18/11.21 Spa & Treatment 2008.08.15 Rising Sun 2008.08.23 Society 2 2011.09.30~12.26 Discovery
Kai Horror 2012.02.14~29 Bon Voyage
Kaitei ni Sukuu 2011.09.30~12.26 Discovery 2012.02.14~29 Bon Voyage
Karisome 2011.09.30~12.26 Discovery
Kaze ni __ike 2011.09.30~12.26 Discovery
Katsute wa Onna 2011.09.30~12.26 Discovery
Kenka Joto 2005.20-21 Ringo-han Adults Only (+kiyoshi) 2006.02.19-21 Domestic Virgin Line 2006.04.07-5.30 Domestic JCHI 2006.07.02 Society of the Citizens 1 2006.12.30/31 Countdown Japan
Kesho Naoshi 2006.02.19-21 Domestic Virgin Line
Kimaru 2010.03.26~05.23 Ultra C
Kingo no Hako 2007.10.18/11.21 Spa & Treatment
Kinjirareta 2011.09.30~12.26 Discovery
Kofukuron (Etsuraku) 2004.07 30 Fuji Rock Festival 2004.09 03 SunSet Live 2004
Koko de Kiss 2005.1.15~2.16 Dynamite
Kronekodow 2007.10.18/11.21 Spa & Treatment 2008.08.15 Rising Sun 2008.08.23 Society 2 2009.12.30 Countdown Japan
Kurumayasan 2005.1.15~2.16 Dynamite
Kyoshinsho 2006.02.19-21 Domestic Virgin Line
Marunouchi 2004.07 24 Yamabikari (Kobe Chikin George) 2004.07 25 Meet the World Beat 2004.07 30 Fuji Rock Festival 2005.1.15~2.16 Dynamite 2005.12-13 Ringo-han Adults Only 2006.02.19-21 Domestic Virgin Line 2006.04.07-5.30 Domestic JCHI 2006.12.30/31 Countdown Japan 2007.10.18/11.21 Spa & Treatment 2008.08.15 Rising Sun 2008.08.23 Society 2 2010.03.26~05.23 Ultra C 2012.02.14~29 Bon Voyage
Meisai 2004.07 24 Yamabikari (Kobe Chikin George) 2004.07 30 Fuji Rock Festival 2004.09 03 SunSet Live 2004
Metro 2007.10.18/11.21 Spa & Treatment
Mirror Ball 2006.04.07-5.30 Domestic JCHI 2006.07.02 Society of the Citizens 1 2006.12.30/31 Countdown Japan 2007.10.18/11.21 Spa & Treatment 2008.08.15 Rising Sun 2008.08.23 Society 2 2011.09.30~12.26 Discovery
Nijuisseiki 2011.09.30~12.26 Discovery
Noriki 2010.03.26~05.23 Ultra C
Oiran 2006.12.30/31 Countdown Japan
Omatsuri Sawagi 2004.07 24 Yamabikari (Kobe Chikin George) 2004.07 25 Meet the World Beat 2004.07 30 Fuji Rock Festival 2004.09 03 SunSet Live 2004 2005.1.15~2.16 Dynamite 2006.07.02 Society of the Citizens 1 2012.02.14~29 Bon Voyage
Onaji Yoru 2005.1.15~2.16 Dynamite
Osorubeki 2011.09.30~12.26 Discovery
Ramp 2007.10.18/11.21 Spa & Treatment 2008.08.15 Rising Sun 2008.08.23 Society 2
Saita 2012.02.14~29 Bon Voyage
Season Sayonara 2010.03.26~05.23 Ultra C 2012.02.14~29 Bon Voyage
Sake to Geko 2007.10.18/11.21 Spa & Treatment
Service 2004.07 30 Fuji Rock Festival 2004.09 03 SunSet Live 2004 2005.1.15~2.16 Dynamite 2006.02.19-21 Domestic Virgin Line 2006.04.07-5.30 Domestic JCHI 2006.07.02 Society of the Citizens 1
Shiseikatsu 2007.10.18/11.21 Spa & Treatment
Shojo Robot 2006.04.07-5.30 Domestic JCHI 2006.07.02 Society of the Citizens 1
Sigma*Crawl) 2005.1.15~2.16 Dynamite
Soretsu 2006.02.19-21 Domestic Virgin Line
Sotai tai 2011.09.30~12.26 Discovery
SSAW 2007.10.18/11.21 Spa & Treatment
Stem 2004.07 30 Fuji Rock Festival 2004.09 03 SunSet Live 2004 2005.1.15~2.16 Dynamite (Kuki) 2006.07.02 Society of the Citizens 1 (Kuki)
Superstar 2005.1.15~2.16 Dynamite 2006.02.19-21 Domestic Virgin Line 2006.04.07-5.30 Domestic JCHI 2010.03.26~05.23 Ultra C
Sweetspot 2010.03.26~05.23 Ultra C
Tadashii Machi 2004.09 03 SunSet Live 2004
Tegami 2006.02.19-21 Domestic Virgin Line 2006.04.07-5.30 Domestic JCHI
Time Capsule 2012.02.14~29 Bon Voyage
Tomei Ningen 2005.1.15~2.16 Dynamite 2005.20-21 Ringo-han Adults Only (+kiyoshi) 2006.02.19-21 Domestic Virgin Line 2006.04.07-5.30 Domestic JCHI 2006.12.30/31 Countdown Japan 2007.10.18/11.21 Spa & Treatment 2009.12.30 Countdown Japan 2010.11.06 EMI Rocks 2012.02.14~29 Bon Voyage
Tsukigime Hime 2007.10.18/11.21 Spa & Treatment
Tsuki ni Makeinu 2005.1.15~2.16 Dynamite
Tsumiki 2004.07 24 Yamabikari (Kobe Chikin George) 2004.07 25 Meet the World Beat 2004.09 03 SunSet Live 2004
Untenkekko 2010.03.26~05.23 Ultra C
Yukiguni 2006.04.07-5.30 Domestic JCHI
Yume no Ato 2005.1.15~2.16 Dynamite 2006.19-21 Domestic Virgin Line 2006.12.30/31 Countdown Japan
Zettai Zetsumei 2010.03.26~05.23 Ultra C 2012.02.14~29 Bon Voyage _________________
Adult
-recorded Adult several days after forming. -Izawa recorded Adult one month after the other members, due to tendinitis suffered in his hands. Izawa -Adult had a very minute production due to Izawa adding his piano after everyone else had tendinitis. Variety, everyone together rough arrangement.
「喧嘩上等」MTVにて1/7より http://tower.jp/article/news/2005/10/27/100006011 http://www.barks.jp/news/?id=1000013786 フジテレビ「僕らの音楽」 1/27OA テレビ東京「JAPAN COUNTDOWN」 1/28OA MTV「MTV NEWS」 1/12OA 「東京事変特番」 1/25OA SSTV「ゴゴイチ」 1/29生出演 MUSIC ON TV!「WARP」 1/23-27OA WOWOW「MUSIC@」 1/31OA 「オリコンスタイル」 1/13発売 「CDでーた」 1/14発売 「WHAT'S IN」 1/14発売 「TVライフ」 1/18発売 「ぴあ」 1/19発売 「ROCKIN ON JAPAN」 1/20発売 「SPRING」 1/21発売 「月刊テレビジョン」 1/24発売 「スカパー110」 1/24発売 「デジタルTVガイド」 1/24発売 「TVガイド」 1/25発売 「H」 1/31発売 <店頭誌> 「ミューズクリップ」 1/10発行 TUTAYA「VA」 1/20発行 TOWER RECORDS「TOWER」 1/20発行 HMV「the music master」 1/20発行 新星堂「pause」 1/25発行 VIRGIN「V」 1/25発行 すみや「Groovin'」 1/25発行 「mellow」 1/25発行 yahoo「yahoo music」 1/19より掲載
1/10より、「ブラックアウト」、「喧嘩上等」CU
「喧嘩上等」PVフルストリーミング ニューアルバム『大人(アダルト)』から 「喧嘩上等」PVを1/21~28期間限定フルストリーミング!
-Album songs were recorded July with Shuraba songs. -Rakujitsu=originally meant to be final song on Adult. -rewrote songs after getting new members.
The single was mostly arranged by Izawa, created from scratch after listening to Sheena's demos of the songs.
http://www.fujitv.co.jp/ourmusic/profile.html?ep=091
-- VARIETY=no theme before songs were written. muted herself as a songwriter so that "the blood would not go bad" for the band. So that everyone would work together on songs. recording=easy, not tense.
---
Domestic Virgin Line
http://www.hotexpress.co.jp/live_report/tokyojihen_20060219/
Variety
-- ADULT=no theme before songs were written.
---
-Adult had a very minute production due to Izawa adding his piano after everyone else had tendinitis. Variety, everyone together rough arrangement.
http://www.fujitv.co.jp/ourmusic/profile.html?ep=175
http://web.archive.org/web/20140618145655/http://www.tokyojihen.com/vmc/artist/domestic/tokyojihen/interview_070926.php http://www.excite.co.jp/music/close_up/interview/0709_tokyojihen/ http://www.excite.co.jp/music/close_up/interview/0709_tokyojihen/?lead=2 http://www.excite.co.jp/music/close_up/interview/0912_tokyojihen/
東京事変3rdアルバム『娯楽(バラエティ)』詳細 2007.09.10
☆東京事変3rdアルバム『娯楽(バラエティ)』 9月26日発売 ◆TOCT-26350/\3,059(税込) ◆初回限定ギザギザ仕様 feat.スリープケース ◆収録内容:01.ランプ 02.ミラーボール 03.金魚の箱 04.私生活 05.OSCA 06.黒猫道 07.復讐 08.某都民 09. SSAW 10.月極姫 11.酒と下戸 12.キラーチューン 13.メトロ
・東京事変3枚目のアルバム. 今回のプロジェクトは何か違う! バンドメンバー作曲の膨大な数のデモ音源の中から今作の為に厳選し、椎名林檎が作詞と歌唱に徹するスタイルでプロジェクトがスタート!個性豊かなメンバーの作曲センスがフルに発揮されたポップ且つ弾けたトラックが盛りだくさん!ソング・ライティングはg.浮雲(7曲)、keyb.伊澤一葉(5曲)、b.亀田誠治(1曲)のバンドメンバー作曲陣. そして、新たなフォーマットを得て無限に広がった椎名林檎の歌唱と詩世界. まさに振れ幅の大きな“バラエティ”に富んだ名曲揃いの全13曲収録. 元来、椎名林檎が主宰する気鋭の音楽クリエイターが集うバンド形態を目指したプロジェクト. 3枚目にしてデビュー・アルバムとも呼べる東京事変の真意が遂に結実したニューアルバム!驚愕の全貌を体感あれ!!
2007.09.10 3rdアルバム『娯楽(バラエティ)』、から新曲4曲(「金魚の箱」「黒猫道」「月極姫」「メトロ」)の着うた先行配信、本日スタート! 3rdアルバム「娯楽(バラエティ)」9月26日発売に先行して本日9月10日(水)からアルバムよりセレクトされた新曲4曲(「金魚の箱」「黒猫道」「月極姫」「メトロ」)の着うたがレコ直(R)、他での配信スタート!!
2007.09.10 東京事変 露出状況(9月~) <TV> ☆アルバム発売直前にTV実演OA! 新曲「キラーチューン」フル演奏やツアーを予感させる「透明人間」、そして「ギブス」を貴重な事変アレンジで演奏. またスペシャル対談では椎名林檎×高田純次が実現!見所満載、必見のTV出演!お見逃しく!! ◆フジテレビ系「僕らの音楽」9月21日金曜23:30-23:58放送予定 演奏曲目:「ギプス」「透明人間」「キラーチューン」 スペシャル対談:椎名林檎×高田純次
☆インタビュー出演! ◆テレビ東京系「JAPANcountdown」9月29日土曜24:25-24:55放送予定
<CS-TV> SSTV「東京事変SPECIAL」9/21(金)22:00~23:00oa(ReOA:9/25,28,30,10/7oa) SSTV「リクエスト・カウントダウン」9/28oa(リピート有) VMC「東京事変 -and selection-」9/29oa(ReOA:10/1,7oa)
<RADIO> TOKYO-FM&JFN38局ネット「MUSIC FLAG」9/30(日曜)15:00-15:55oa
<雑誌> DAZED&CONFUSED日本版 9/12売 CUTIE 9/12売 Guitar Magazine 9/13売 WHAT'S IN 9/14売 MUSICA 9/15売 Sound&Recording Magazine 9/15売 風とロック 9/20発行/表紙 BARFOUT! 9/19売 rockin'on JAPAN 9/20売 SWITCH 9/20売/表紙 Flying Postman Press 9/20発行/表紙 月刊歌謡曲 9/22売 ZIPPER 9/24売 Great Hunting 9/25発行/表紙 Oricon style 9/28売 Keyboard Magazine 9/28売/表紙 InRed 10/7売
<レコード店・店頭誌> TOWER 9/20発行/表紙 VA 9/20発行 HMVmm 9/25発行 ミューズクリップ 9/25発行
<WEB> YAHOO! Music 9/27up“POWER PUSH” AMAZON.com 9/19-10/2up“DEEP DIVE”
09.26 3rdAL『娯楽(バラエティ)』全曲配信、本日スタート! 東京事変3rdアルバム「娯楽(バラエティ)」の全曲配信(着うたフル、PC配信)を本日9月26日(水)からスタート!!
Senko Shojo
http://web.archive.org/web/20071123150904/http://www.emimusic.jp/vmc/artist/domestic/tokyojihen/interview_071121.php
Sports
-Kachiikusa music station 2010/02/19
http://web.archive.org/web/20140617031414/http://www.tokyojihen.com/sp/notes/liner/toct26940/ http://web.archive.org/web/20140617032019/http://www.tokyojihen.com/sp/notes/interview/toct26940/ http://ent2.excite.co.jp/music/interview/2010/tokyojihen/interview01.html http://ent2.excite.co.jp/music/interview/2010/tokyojihen/interview02.html
-- SPORTS first met in late 2008 to discuss what they would like on the album. (SANMON=Had not started recording it yet in late 2008.) Album had the theme of sports before they had started creating the music. Recording felt tense, unlike Variety. -finishing touches in November/December 2009.
---
Tengoku
-music station 2010/08/27
Dai Hakken
http://web.archive.org/web/20140617031155/http://www.tokyojihen.com/sp/notes/liner/toct27070/ http://web.archive.org/web/20140617031959/http://www.tokyojihen.com/sp/notes/interview/toct27070/ http://tower.jp/article/interview/2011/06/20/79145 http://www.excite.co.jp/music/close_up/interview/1106_tokyojihen/ http://www.excite.co.jp/music/close_up/interview/1106_tokyojihen/?lead=2 http://www.excite.co.jp/music/close_up/interview/1106_tokyojihen/?lead=3
2012.03.21 このエントリーをはてなブックマークに追加 スペースシャワーTV「MUSIC VIDEO AWARDS」、大賞をサカナクション&ベスト・アーティストを東京事変が受賞 http://ro69.jp/news/detail/65544
www.hotexpress.co.jp/review/3126/ 東京事変 ニューアルバムで一際ヒカリを放つ楽曲
前作『スポーツ』はファンならずとも高評価を集め、本作を携えたツアーも絶賛の声が各方面から聞こえていた. そして『天国へようこそ』といった配信曲に加えて、シングル『空が鳴っている/女の子は誰でも』のリリース. リスナーの新アルバムに対する期待度は頂点に達していたのに、発表されたタイトルは“大発見”. 「そこまでハードルを上げていいのか!?」と勝手な心配を抱いていたのだが、再生ボタンを押した途端、流れ込んできたM-1を耳にして度肝を抜かれた. 深く深く染み渡ってくる魅惑的な言葉とダークサウンド. 新たな事変ワールド(未知の世界)に、ゆっくりゆっくり誘い込まれていくような感覚. 心地良くて抜け出せなくなりそう…………….
なんて思っていたら「東京メトロ」CM曲などアップテンポナンバーがチャキチャキと奏でられていく. そんな中で一際ヒカリを放つ楽曲がM-4だ. 今の日本の状況下を意識して制作したのでは? と思わせるほど、生命力に満ちた言葉が綴られている同曲. リスナーの隣に寄り添ってくれるような、事変側のエゴなんて一切感じさせない、真っさらで純粋なナンバーだ. 本作の中で一番“聴き手のことだけ”を想って描いた曲だからこそ、魂が震えるほどの感動を覚えるのだろう. (REVIEW:武川春奈)
CS Channel
http://web.archive.org/web/20140617031318/http://www.tokyojihen.com/sp/notes/liner/tobf5712/ http://web.archive.org/web/20140617031929/http://www.tokyojihen.com/sp/notes/interview/tobf5712/ http://www.excite.co.jp/music/close_up/interview/1109_tokyojihen/ http://www.excite.co.jp/music/close_up/interview/1109_tokyojihen/?lead=2
Ultra C
http://web.archive.org/web/20140617031704/http://www.tokyojihen.com/sp/notes/liner/tobf5678/
Discovery
http://web.archive.org/web/20140617031035/http://www.tokyojihen.com/sp/notes/liner/tobf5723/
Color Bars
-music station 2012/01/20
http://web.archive.org/web/20140617031348/http://www.tokyojihen.com/sp/notes/liner/toct22311/ http://web.archive.org/web/20140617032038/http://www.tokyojihen.com/sp/notes/interview/toct22311/ http://hatenanews.com/articles/201201/7177 color bars
Bon Voyage
http://web.archive.org/web/20140617031254/http://www.tokyojihen.com/sp/notes/liner/tobf5737/
Tokyo Collection
http://web.archive.org/web/20140617031608/http://www.tokyojihen.com/sp/notes/liner/toct28045/
Chinkoplayko
http://web.archive.org/web/20140617031111/http://www.tokyojihen.com/sp/notes/liner/tobf5750/
Hard Disk Golden Time
http://web.archive.org/web/20140617031640/http://www.tokyojihen.com/sp/notes/liner/toct29131/
***********************
http://www.fangoods.com.tw/UMG/Default.aspx?m=ProductDetail&ItemId=9585
________________________ -got her licence. Car yellow bentz http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/007/007_1.htm
-Onaji Yoru + Tadashii Machi=Fukuoka place names http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/007/007_6.htm -Radio show on Cross-FM for 9 months. 悦楽巡回 Patrol 6月27日 Kyushu Only
99.07.20発行 CROSS-FM「椎名林檎の悦楽巡回」特集 夢の共演!?「林檎 vs ベンジー」! CROSS-FM「椎名林檎の悦楽巡回」特集 「椎名林檎の悦楽巡回」ラスト・トーク!
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/008/008pv.htm 四発目マキシシングル「本能」PV撮影レポート! 99.09.20発行 ツダケン -recorded in August -injured herself in the glass scenes.
椎名林檎北海道上陸! 「EZO ROCK」ライヴレポート! http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/008/008ezo.htm Toki ga Boso Suru
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/008/008sweet.htm 「Sweet Love Shower '99」ライヴレポート! Identity リモートコントローラー
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/009/009honnou.htm Ken Tsuda. 四発目マキシシングル「本能」リリース! 99.10.25発行 HN: 18. Same time as Sid to Haku, Onaji Yoru. Preferred songs like Sid, had forgottena bout this song. Theme=Post-Moratorium -wanted to do a glass scene from the start -didn't intend for the nurse theme to mean anything. -Aozora=16. Second song she made. Song for a friend. 「手紙に書いても伝わらないことがあるから」って. Feels like she was more philosophical back then. Thought more about friends. -Rinne = A mix between a song she'd made herself and the lyrics of a cover song --Like on Marunouchi, it's her style to put in English-style Japanese so that it doesn't break up the melody. Wanted to prioritise the melody, so sung the English lyrics.
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/009/009video.htm 椎名林檎初のビデオクリップ集リリース! Kabukicho=her favourite PC of MM. Shot at Ho-myo-ji in Ikebukuro. -KKdK performed with her band. Had other scenes, but it was decided to just have the performance scenes. -HN = made by the people who did MM jacket. Expensive. She broke 25 panes, and got lots of cuts on her hands and legs.
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/010/010_2.htm 林檎ちゃんの音楽遍歴「椎名林檎の作り方」幼少~小学生編 99.11.25発行 Tsuda -first Debussy on the piano. Didn't like much else than the piano when she was young. Wasn't interested in music. Liked classical. Then also The Peanuts, and 風の谷のナウシカ in ES. Listened to jazz musician Sadao Watanabe, especially Rendezvous. Billy Joel, etc
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/011/011_1.htm TtB -ベンツ280 -red leather pants, red gloves, 20cm red pinheels -it was breaking down, and stopping at intersections. So she felt she should use it in a PV. But it was hard to see it cut in half.
Gips -studio covered in potting mix made from the ashed of Fuji. Wsteland set. flowers, etc. -After lunch, moved to wooden room set filling with water. A man wearing a 2m mask made from cow bones.
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/011/011_2.htm JHS=Motown, Soul train. Marvin Gay. Her brother's influence.
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/012/012_1.htm 椎名林檎「ギブス」「罪と罰」インタビュー 2000.1.25発行 -could not choose which to release. Staff couldn't decide either. -Gips-17 -Gips boy different boy to KKdKS. --Kurt & Courtney=his opinion. Not that Sheena has been influenced by Nirvana. Thought to change the lyrics, but decided to stay true to her 17 year old self. -Her dad loved The Peanuts. Feels like Tokyo no Hito, Kabukicho no Joo and Marunouchi Sadistic were influenced by this.
-wrote TtB when sick. A diary of her in her sickbed. -Sent a demo tape to Asai with her phone number. -like in Honno, wanting fame and jealousy are insticts. == sin. Same idea as Honno.
-1999 summer, listened to lots of old songs, since she could only listen to casettes in her car. -wanted to be a vocalist like Eddi Reader from Fairground Attraction -17 influenced by Janis Ian's At Seventeen. After hearing the song about Ian reflecting on herself at 17, Sheena wrote a song about her current self at 17. -Gave up high school at 17. Her most worrying time.
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/012/012_2.htm 追跡! 林檎ちゃん音楽遍歴「椎名林檎の作り方」 高校生編 2000.1.25発行
Blankey, Radiohead Finished hs mid-way through her second year. Bjork's debut. 15-16. First Sex Pistols 15-16. Influenced by their videos. Red Hot Chili Peppers, Rage Against Evil Empire, Perl Jam No Code
After giving up HS, Todd Rundgren and Led Zeppelin. Beatles' White album.
__________________________
Summer 1999 started recording Shoso Strip. Had already chosen a title when MM was released. SS=At first, made up entirely of old songs including track order, but every so often came up with a new song she wanted to include. Recording also finished in summer. -When Asai agreed to perform on Tsumi to Batsu, made it the centre song. July 13, 1999 -from teh start decided on the opening and ending songs, plus 55:55. Made it longer as MM was so short. -Was able to centre SS more around herself, her own selfish opinions -When SS, felt like MM was a "single collection" as every song could be listened to separately. Could not have a concept like in SS, as it was her debut album.
____________________________- http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/013/013_2.htm ■ 林檎ちゃん音楽遍歴「椎名林檎の作り方」デビュー編 2000.2.25発行 ブランキー Quruli (1st album) くるりのセカンドアルバム『図鑑』 Erekashi -decided to listen to Japanese music again after wanting to debut.
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/013/013_3.htm ■ 林檎ちゃんの元愛車展示&撮影会! 2000.2.25発行 Bentz in a 渋谷の某CDショップ
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/014/014_1.htm ■ 3月31日待望のセカンドアルバムリリース 林檎ちゃん「勝訴ストリップ」全曲解説 2000.3.25発行 Kyogen=her oldest song. Kimi=a dead girl who fell asleep on the train tracks 傲慢 Yokushitsu=Her favorite on SS. Summer 1999. 〈キチンと召し上がれ〉っていう詞は、男の人が聴くと「ヤッちゃっていいよ」ってことだと思うみたいなんだけど(笑)、言葉の通り「本当に食べて欲しい」ということなんです. 「生死とかを超越した融合を実現したい」って欲望と提案の曲. だから、「性行為とかよりも、もっと素晴らしいものを探そう」という話なんです. 私はよく「情念系」って言われたりするけど、この曲を見てると「そうなんだろうな」って思っちゃいますよね. だって、全然理性的じゃないもん. Benkai= Said that one of her favourite artists was Debussy when she debuted. -originally thought to release Gips after the album Yami ni=Tried to get all of her most enka parts. Is this Masako Mori? she thought after finishing. If MM didn't exist, then this wouldn't. Identity=lives. Found lyrics on the internet before she'd released them
-when it was still being decided if she was to debut, they'd say things like "I don't understand Tadashii Machi" "this arrangement is a mistake" --Identity is a response to that. So when performed in lives, was angry. -music+lyrics interconnected in her songs
TtB a song that couldn't have been released if not for MM. ST = like 積木遊び. Features Tsumi to Batsu lyrics in reverse. Promised The Turtles member https://ja.wikipedia.org/wiki/The_Turtles_(%E6%97%A5%E6%9C%AC%E3%81%AE%E3%83%AD%E3%83%83%E3%82%AF%E3%83%90%E3%83%B3%E3%83%89) to have a song wit "axel break" as the chorus.
TnMI = 18. Her only Boku song. at the time. Things she's not saying herself. About dealing with record company people. Byosho Public= written when KKdKS was released. She was sick. (along with TtB) 快感ジャガー=Asai's Jaguar. Izonsho=a song about suiside or being sick of everything.
-planned on 3 albums.
http://sp.universal-music.co.jp/ringo/15th/special/saga/rat/014/014gallery.htm ■ 林檎画廊 2000.3.25発行 -planned on recording in Germany.
■ 有難う皆んな. 2000.3.25発行 ■ Message from“RAT” 2000.3.25発行
UTAITE http://web.archive.org/web/20140509142639/http://sp.universal-music.co.jp/ringo/karaoke/text_songlist.htm [森pact disc]
自己表現と全編曲:森俊之
冒涜ヴァイタミン キーボード他:森俊之 電気式ベース他:渡辺等 生ドラム他:沼澤尚
[亀pact disc] 亀田誠治:自己表現と全編曲
虐待グリコゲン GG 亀田誠治:電気式ベース他 弥吉淳二:電気式ギター他 皆川真人:キーボード他 村石雅行:生ドラム他
two albums' tracklists are balanced
http://web.archive.org/web/20140509143414/http://sp.universal-music.co.jp/ringo/karaoke/text_toct24780.htm 【亀pact disc】 01.灰色の瞳 =a record in her home in her childhood. スピッツの『ハヤブサ』=covered in her lives 02.more In "魅惑のラブ・バラード" in a score book. 03.小さな木の実 Also score book 04.I wanna be loved by you =sung at her birthday live. Just like a breather between songs. 05.白い小鳩 =A record at home 06.love is blind 下剋上エクスタシー suddenly decided to do it half way through the tour. did it out of respect for JI. 07.木綿のハンカチーフ home tape 08.yer blues
09.野薔薇 =was used as music before band came onstage for Hatsuiku.
http://web.archive.org/web/20140509150155/http://sp.universal-music.co.jp/ringo/karaoke/text_toct24781.htm 【森pact disc】 01.君を愛す Mori had lots of Japanese, Listened to 来生たかおさんの曲 version
03.枯葉 book 「魅惑のラブ・バラード」 04.i won't last a day without you -sung together at 東芝EMIガールズ concert -figured she was busy, so went with a song she'dalready sung. -Mori had worked with Utada duringher debut.
05.黒いオルフェ「魅惑のラブ・バラード」 07.玉葱のハッピーソング -first album she'd bought had this song on it in JHS -listenedtoher brother'sCDs secretly. 08.starting over = decided to cover it after going to the John Lennon Museum in Saitama.
09.子守歌 = sampled Shopan, like making an original again. Asa-chang sanka.
Junpei=used to have a band called EVIL VIBRATION
http://web.archive.org/web/20140509152508/http://sp.universal-music.co.jp/ringo/karaoke/text_jacket.htm ジャケットについて
-drew herself. this time she just acted as a vocalist, nothing else. Wanted to do something else to show her gratitude for everyone. -took all the photos on her father's F-1 camera. -black and white theme -recorded Utaite in daytime, went home at night
http://web.archive.org/web/20140509153424/http://sp.universal-music.co.jp/ringo/karaoke/text_cover.htm 何故、カバーか...?
-having a child made the release rhythm go weird. It was unintentional -to get used to the rhythm of recording again.
http://web.archive.org/web/20140509154113/http://sp.universal-music.co.jp/ringo/karaoke/text_2cd.htm 何故、2枚組か...? Mori=only 愛妻家の朝食 before.
http://web.archive.org/web/20140509161616/http://sp.universal-music.co.jp/ringo/karaoke/text_kame.htm 【亀田誠治インタビュー】 First asked 2001 December 20. First recording in January 2002. Songs were decided early January. First meeting the 9th. Started work (1月の)13日 Did Momen first. Thought of Gekokujo members, Gokuhi members. She asked what songs they should cover. Kame thought of them.
http://web.archive.org/web/20140509161441/http://sp.universal-music.co.jp/ringo/karaoke/text_mori.htm -asked Kameda to do guitars like previous SR records. Asked Mori for no guitars. -korekara no SR -wanted symmetry. -originally was just Japanese language songs. But turned into only gaikoku songs -title at the end -took songs from her childhood -SR felt that Mori wasn't someone who did just a single genre.
http://web.archive.org/web/20140510033616/http://sp.universal-music.co.jp/ringo/15th/special/plugin/sono6/sonoroku_3.htm 「りんごのうた」クリップ映像について 2003年11月発行
http://web.archive.org/web/20140510033924/http://sp.universal-music.co.jp/ringo/15th/special/plugin/sono6/sonoroku_4.htm she made a reverse Acrostic sugoroku tour
http://web.archive.org/web/20140510035042/http://sp.universal-music.co.jp/ringo/15th/special/plugin/budokan01/budokan01_1.htm 2003年10月発行 ■ライヴレポート Already called Tokyo Jihen in tour.
http://web.archive.org/web/20140510045159/http://sp.universal-music.co.jp/ringo/15th/special/plugin/10th_02/p01.htm Zazen simulcast on internet
http://web.archive.org/web/20140510050739/http://sp.universal-music.co.jp/ringo/15th/special/plugin/10th_02/p02.htm -SR had ideas right from the start for KFR PV, such as punk rockers shopping at a convenience store
http://web.archive.org/web/20140510051509/http://sp.universal-music.co.jp/ringo/15th/special/plugin/10th_03/p02.htm 55,000人 in 3 days=Expo
http://www.tomitalab.com/info/topics/2014/0131235856/#more-260 http://natalie.mu/music/news/103313 http://ro69.jp/news/detail/90095?rtw http://www.tokyojihen.com/vmc/artist/domestic/tokyojihen/interview_071121.php
http://www.excite.co.jp/music/close_up/interview/0807_ringo/ http://deliq.jp/cart/?transactionid=9a0ce525fd0500007e2a86655f893dc7e1110a3c
KENSHI http://biz-m.oricon.co.jp/news/data/1198.shtml http://web.archive.org/web/20140521115118/http://biz-m.oricon.co.jp/news/data/1198.shtml
-SR lots of half notes when she makes songs -SR didn't want to write music for children when she debuted. Now, different.
-hints at Yumiko. Male version of songs in demos, ユミ男. Sheena singing very deep. -SR feels inspired by husband and wife writing duo Ryudo Uzaki and Yoko Aki. -learnt about how the world of JPop works after she had debuted.
-lived Shimizu, Shizuoka when little -Nippon was inspired by taking all of her experienced in Tokyo Jihen -Nippon-Kawamura Kasuke drums
http://www.oricon.co.jp/music/interview/page/1171/ 椎名林檎(しいな りんご) 1978年11月25日生まれ. 福岡市出身. 2004年、バンド・東京事変のメンバーとしても並行して活動をスタートし、アルバム『教育』などをリリース. 2006年、映画『さくらん』で音楽監督に初就任し、同映画で『日本アカデミー賞』優秀音楽賞を受賞. 2008年11月、デビュー10周年を記念したライブ『(生)林檎博’08 ~ 10周年記念祭』をさいたまスーパーアリーナで開催. 3日間でのべ55,000人を動員. 2009年3月、2008年度の際立った業績、新生面を開いた活動が高く評価され、文化庁主催『平成20年度芸術選奨』文部科学大臣新人賞(大衆芸能部門)を受賞.
Hyadain
-H felt inspired by Stem and Hyakuiro Megane. Liked the multimedia synthesis of the jacket/visuals/song. Also why liked Pizicatto Five. -H writes easy to sing songs. Writes songs with “小6理論” - songs that a grade 6 elementary school student will understand. String of notes, lyrics, worldview. Used to be a home tutor, teaching 50 students. -H has female voice for demot racks called ヒャダル子, dropping pitch “7下げ” -H inspired by Komuro family | WIKI |
Mole (Talpa Europaea)
Proving date: October 2012
Proving completed by:
Misha Norland, Mani Norland & The School of Homeopathy
Common name: Mole
Case: Read a case of Mole
Read full proving here: Mole (Talpa Europaea)
Introduction
The Source of Mole
The mole came to us gratis, up out of our lawn, and was bagged thanks to our cat’s alacrity: a sudden pounce and the deed was done. I chopped off his paws (for he was male) and pickled them in a small bottle containing absolute alcohol. There they remained in the dark and the cool for some years awaiting the day of the proving. The tincture was run up to 30c potency in the classroom (substance unknown to provers), with provers taking turns at dilution and sucussion, using Korsicovian methodology. The final potency of 30c was used as the proving dose. As is our custom at the School of Homeopathy, just one dose was taken. Proving diaries commenced from this point, as did one-to-one supervision, and continued for two months.
The Mole in Nature
The mole, because of its underground habit, is a creature we know little about, yet its very visible molehills evoke a universally negative response, “Get rid of that mole!” Until recently, and the advent of video-aided research, scientists have had limited information about the mole due to the impracticalities of studying them in vivo – the chief reason being that they gobble too much food to allow for a viable period of observation in captivity. They gather and guzzle in an almost non-stop cycle to fuel their incessant labour of tunnelling. They can excavate 25 meters a day, and continually tunnel to renovate and extend their home and larder. They are by far the most industrious of mammals! They work in a shift pattern of 4 hours at a stretch; during periods of rest, moles will either sleep or consume the food needed to keep going for the next work stint. The mole’s upper body and strong spade-like front limbs are perfectly designed for moving heavy soil and when digging, a specialised bone structure allows the mole to project a lateral force equivalent to 32 times its body weight.
The mole is a solitary creature, except in circumstances where a group are forced to co-habit in neighbouring tunnels, or when female moles are on heat. Apart from these occasions, moles are extremely territorial creatures and have been known to fight to the death. The mole is the only known mammal in which the female has been found to possess features of both female and male reproductive organs. The mole produces very high levels of testosterone, which may account for their aggressive nature and look-alike external features. High testosterone levels promote bone growth that link to the evolution and development of a sixth digit that is in fact a modified wrist bone.
The gestation period for female moles is 4-6 weeks and they will give birth to 3-6 live young each year. After just a few months of growth, adolescent moles will be totally self-sufficient and will leave the adult home to find residence elsewhere, taking over unoccupied tunnel systems or digging their own. It is during this crucial time that they venture above ground and become vulnerable to predators such as stoats, owls, foxes and badgers. Moles have been known to live to the age of 6 years provided they are not picked off by predators or killed by humans, most live for 4 years.
The physical form of the mole lives up to its Latin meaning of ‘massive heap’ or ‘large mass’. It is not that massive though, typically being a mere 12 cm long. Its fur is black and velvety allowing the mole to move both forwards and backwards through the underground passageways with ease. The mole has poor eyesight but can differentiate between light and dark. Its other senses are extremely heightened to compensate for this, for example, the mole has ultra-sensitive whiskers on its pointed pink snout, a highly accurate sense of smell and it is able to sense the slightest of underground vibrations. This allows gardeners to discourage moles from an area by submerging vibrators. Moles can tolerate higher carbon dioxide levels than other mammals, permitting them to survive underground for extended periods. They have modified red blood cells with augmented haemoglobin. Some biologists have speculated that moles have magnetic sensors in their nose, enabling them to move with precision and purpose around their underground homes. As yet there is no clear evidence in favour of this hypothesis.
The mole’s appetite is colossal; it needs to consume 70-100% of its body weight per day. Because of this, the mole needs to store enough food to keep it going. Earthworms are the main source of food, especially during the winter months, but it will eat all manner of insect larvae and grubs dependant on availability. To ensure that it has a sufficiently fresh supply of food, the mole will bite the head of a captured worm, rendering it immobile while still alive.
Moles are most commonly found in fertile soil with adequate drainage; however, they are good swimmers and can escape from flooding. The mole favours deciduous woodland as its habitat, and grassland, where its burrowing habit and molehill production, may create conflict with farmers and gardeners. Many people are unaware that molehills are created only once, while the creatures establish or extend their home. An adult mole will only come to the surface of its underground habitat to collect materials for a nest. During this time a much larger molehill (called a fortress) will be created under which the mole will rear its young. The deepest tunnels are used during times of extreme weather, for example cold or drought. If left to their own devices in a well-established tunnel system, most people would scarcely notice the many moles residing underneath their land.
At present, the mole has no legal protection in the UK. They are not protected by conservation legislation, only having basic protection from cruelty under the Wild Mammals Protection Act 1996. Moles are prone to being poisoned and trapped, a practice that is widely practiced even though in the long run, it is ineffective. New moles quickly move into old tunnels!
The Mole in Literature
The depiction of Kenneth Grahame’s industrious, initially solitary yet loveable character fits with what we know about this creature’s behaviour and habits. In the opening chapter we see mole frantically spring-cleaning his house, mention is made of his aching back and arms, which bear the brunt of most of the mole’s activities. An air of ‘discontent and longing’ is hinted at throughout the novel. Mole’s journey of discovery lies in his realisation that there is a whole other world above his dark, underground sanctuary.
The Mole in the Chinese Calendar
According to Chinese tradition, moles are born during the Chinese zodiac’s year of the sheep. It is believed that people born at this time are generally hardworking and loyal, but have a tendency to take things to heart, easily becoming offended. They will put on a front to hide this but are plagued by feelings of self-doubt. They work best when striving towards a goal or purpose, they want to ‘get it right’ all of the time. They are extremely strong both physically and mentally, often more so than anticipated by those around them.
The Mole in Mythology
The story of how the mole came to be underground is told in a Cherokee folk tale. Here the mole is depicted as a shifty, untrustworthy character who puts a deceitful plan into action and when confronted about the consequences of his actions, retreats to his underground sanctuary in fear of punishment.
The Mole in Espionage
Within the realm of espionage, the mole is somebody who works for an organisation whilst continually feeding information to a rival from within, posing as an ally to the original establishment. By his or her very nature someone who is to succeed as a mole must be deceitful and cunning. They must be well practised in the deception of others in order to gain their friendship and trust. The fact that the mole is acting mainly alone and does not care for allies can be linked to its animal counterpart, in so far as the animal works alone and has been observed to be fiercely territorial towards others of its kind.
Misam
We need cured cases to confirm, but suggest Ringworm miasm in Rajan Sankaran's schema, and stage 8 in the periodic table.
Differential Diagnosis
Considering unremitting work, “got to get it done” personality, tunnelling habit and sensation of compression, would take us to Ferrum and its salts, and row four metals in general and their respective salts.
Of course general themes of all mammals arise, especially its closest relative, as yet unproved, the shrews. We will differentiate primarily from other mammals on the uniqueness of the mole family: constant activity, huge energy, relentless pursuit of territory… and add to these concepts, the fact of high testosterone levels in both sexes, and come up with a highly industrious personality, like Nux vomica. Unlike the typical Nux vomica though, most provers felt quite calm in relation to things they needed to do that previously might have riled them – action with a Zen-like clarity rather than with a ‘must do it’, driven imperative, yet with the desire to do the work all day long until the job was complete.
Continue reading the full proving here: Mole (Talpa Europaea)
Productive/Industrious <Br> Calm/Grounded/Equanimity <Br> Detached/Apath <br> Numb/Paralyses <Br> Claustrophobia/Trapped <br> Seeks<Br> Isolation <Br> Tunnels <Br> Anger/Violence <Br> Bullied/Self loathing <Br> Time almost stopped <br> No pressure of time <Br> Carefree/Happy <Br> Decapitation/Severed <Br> Energy - Fluctuating <Br> Guilt <Br> Lack of direction <Br> Natural vs. Manmade <Br> Pregnancy/Babies/Menstruation <Br> Sexual Desire <Br>Tipsy/Giggly <Br> Water <Br>
Productive/Industrious
Calm/Grounded/Equanimity
Detached/Apath
Numb/Paralyses
Claustrophobia/Trapped
Seeks
Isolation
Tunnels
Anger/Violence
Bullied/Self loathing
Time almost stopped
No pressure of time
Carefree/Happy
Decapitation/Severed
Energy - Fluctuating
Guilt
Lack of direction
Natural vs. Manmade
Pregnancy/Babies/Menstruation
Sexual Desire
Tipsy/Giggly
Water
Proving Themes
Kingdom: Animalia
Phylum: Chordata
Class: Mammalia
Order: Soricomorpha
Family: Talpidae
Genus: Talpa
Species: Talpa Europaea
Kingdom Taxonomy
The mole produces very high levels of testosterone, which may account for their aggressive nature and look-alike external features. High testosterone levels promote bone growth that link to the evolution and development of a sixth digit that is in fact a modified wrist bone. | ESSENTIALAI-STEM |
Page:The principle of relativity (1920).djvu/178
''Remarks on the simplification of the mode of writing the expressions.'' A glance at the equations of this paragraph will show that the indices which appear twice within the sign of summation [for example ν in (5)] are those over which the summation is to be made and that only over the indices which appear twice. It is therefore possible, without loss of clearness, to leave off the summation sign; so that we introduce the rule: wherever the index in any term of an expression appears twice, it is to be summed over all of them except when it is not expressedly said to the contrary.
The difference between the co-variant and the contra-*variant four-vector lies in the transformation laws [(7) and (5)]. Both the quantities are tensors according to the above general remarks; in it lies its significance. In accordance with Ricci and Levi-civita, the contravariants and co-variants are designated by the over and under indices.
§ 6. Tensors of the second and higher ranks.
Contravariant tensor:—If we now calculate all the 16 products A^{μν} of the components A^{μ} B^{ν}, of two contravariant four-vectors
(8) A^{μν} = A^{μ}B^{ν}
A^{μν}, will according to (8) and (5 a) satisfy the following transformation law.
(9) A^{στ´} = [part]x´_{sigma}/[part]x_{mu} [part]x´_{tau}/[part]x_{nu} A^{μν}
We call a thing which, with reference to any reference system is defined by 16 quantities and fulfils the transformation relation (9), a contravariant tensor of the second | WIKI |
Paul Manafort disappointed in verdict, evaluating all his options, lawyer says
President Donald Trump's former campaign chairman Paul Manafort is evaluating all his options after he was found guilty of eight criminal counts, his lawyer Kevin Downing said Tuesday. "Mr. Manafort is disappointed of not getting acquittals all the way through or a complete hung jury on all counts," Downing said outside the courthouse in Alexandria, Virginia. He said Manafort thanked U.S. District Court Judge T.S. Ellis for a fair trial and the jury "for their very long and hard fought deliberations." A jury found Manafort guilty on five counts of tax fraud, two counts of bank fraud and one count of failing to file foreign bank account reports. Ellis declared a mistrial on the 10 remaining counts for which the jurors said they had not reached a consensus. Tuesday's verdict came after four days of deliberation, which followed a 16-day trial. It also arrived at nearly the same moment that Trump's longtime personal lawyer, Michael Cohen, pleaded guilty to tax fraud and making an excessive campaign contribution. Manafort's trial was the first borne of charges lodged by special counsel Robert Mueller's investigation into Russian interference in the 2016 campaign. Manafort, 69, faces another federal trial in September in Washington, D.C., which also stems from the Russia probe. — CNBC's Dan Mangan and Kevin Breuninger contributed to this report. | NEWS-MULTISOURCE |
Chauveau Point
Chauveau Point (-64.08333°N, -62.03333°W) is a headland on the north side of Zlogosh Passage marking the southwestern end of Liège Island, in the Palmer Archipelago.
The western point of Liège Island was first charted by the French Antarctic Expedition, 1903–05, and named by Jean-Baptiste Charcot for Monsieur Chauveau, an associate of the Central Meteorological Office at Paris. Since there is no prominent point on the central part of the west coast which can be reidentified without ambiguity, the name has been applied to the conspicuous southwest point which was also seen by Charcot.
The point was photographed from the air by FIDASE in 1956–57. | WIKI |
Little Nightmares III
Little Nightmares III is an upcoming puzzle-platform horror adventure video game developed by Supermassive Games and published by Bandai Namco Entertainment for Nintendo Switch, PlayStation 4, PlayStation 5, Windows, Xbox One and Xbox Series X/S. It serves as a stand-alone sequel to the first two Little Nightmares games. The game follows two new child protagonists, Low and Alone, as they navigate through The Nowhere and escape from a looming threat. It is scheduled for a 2025 release.
Gameplay
Like its games beforehand, Little Nightmares III takes place in a 2.5D world. The player must explore the world, occasionally encountering platformer-like situations or being blocked by puzzles that must be solved to proceed. Unlike the first two games, the player can now go solo alongside an AI companion or with another player in online co-op. The two main characters have different gameplay mechanics, with Low wielding his bow and arrow, and Alone using her wrench.
Development
In 2021, Tarsier Studios confirmed that Little Nightmares II would be its last entry as they were acquired by Embracer Group in December 2019; but since the Little Nightmares intellectual rights belong to Bandai Namco, the publisher intends to continue the series without Tarsier.
In August 2023, Little Nightmares III was unveiled at Gamescom's Opening Night Live with an initial release window of 2024. Unlike its predecessors, the game is solely developed by Supermassive Games instead of the franchise's original developer. Supermassive had prior experience on the Little Nightmares franchise for developing the enhanced PlayStation 5 and Xbox Series X/S ports of the previous game. In May 2024, the developer delayed its release to 2025.
A tie-in podcast series, titled "The Sounds of Nightmares", was also announced and released its first two episodes on Bandai Namco Europe's YouTube channel on August 22. | WIKI |
Fork me on GitHub
RSyntaxTextArea
A Syntax Highlighting Text Component
Overview
RSyntaxTextArea is a syntax highlighting, code folding text component for Java Swing. It extends JTextComponent so it integrates completely with the standard javax.swing.text package. It is fast and efficient, and can be used in any application that needs to edit or view source code.
RSTA supports syntax highlighting for 40+ programming languages out of the box, as well as code folding for many of them. But you're not limited to well-known languages. Highlighting and folding can be added for custom languages and plugged in with ease.
It can also be extended to provide an IDE-like experience. Parsers can be plugged in to listen for code modifications and denote errors or warnings with squiggle underlines. Sister libraries can be used to provide language-aware code completion and spell checking. Focusable tool tips can display relevant documentation for methods or objects while editing.
This library only requires Java 8 or greater, so it's ready to use in any application.
Jar downloads can be found on SourceForge, or you can clone the source from GitHub.
It is available under a modified BSD license.
Features
Syntax Highlighting
40+ languages supported out-of-the-box, with the possibility of dynamically adding support for more.
Code Folding
Language-aware code folding for many of the built-in languages Like syntax highlighting, custom code folding can be plugged in for other languages as well.
Code Completion
Easily added with the AutoComplete add-on library. Display context-aware completion choices via Ctrl+Space, or even automatically.
Parsing Support
Parsers can be written and installed to identify and squiggle-underline language-specific errors and warnings. These notices are automatically updated as the user types.
Find/Replace
Match case, whole word, regular expressions, mark all occurrences, and searching forward or backward.
File I/O
RSTA knows how to load and save both local and remote files (via FTP). Local files can have their dirty state checked.
Macros
User-defined macros allow you to record and play back complex sets of actions in an editor, to simplify common redundant tasks.
Code Templates
Quickly insert code snippets by typing a short identifier and typing Ctrl+Shift+Space. A more sophisticated version of this feature is available in the AutoComplete library.
Customizable Themes
Fonts and colors can be imported and exported via XML, to allow for easy customization. Themes for Eclipse, IDEA, light-on-dark and more are included out of the box.
Multiple Font Support
Many code editors only support editing with a single font, just different styles of that font. RSTA lets you use a different font for every token type. Even proportional fonts if you're into that.
Mark Occurrences
All occurrences of the identifier, variable, or function at the caret position will be highlighted to easily eyeball its scope/usage.
Much More
Everything you'd expect: line numbers, bracket matching, line highlighting, per-line decorator icons, unlimited undo/redo, drag and drop, clickable hyperlinks, etc.
Example Usage
import java.awt.*;
import javax.swing.*;
import org.fife.ui.rtextarea.*;
import org.fife.ui.rsyntaxtextarea.*;
/**
* A simple example showing how to use RSyntaxTextArea to add Java syntax
* highlighting to a Swing application.
*/
public class TextEditorDemo extends JFrame {
private static final long serialVersionUID = 1L;
public TextEditorDemo() {
JPanel cp = new JPanel(new BorderLayout());
RSyntaxTextArea textArea = new RSyntaxTextArea(20, 60);
textArea.setSyntaxEditingStyle(SyntaxConstants.SYNTAX_STYLE_JAVA);
textArea.setCodeFoldingEnabled(true);
RTextScrollPane sp = new RTextScrollPane(textArea);
cp.add(sp);
setContentPane(cp);
setTitle("Text Editor Demo");
setDefaultCloseOperation(EXIT_ON_CLOSE);
pack();
setLocationRelativeTo(null);
}
public static void main(String[] args) {
// Start all Swing applications on the EDT.
SwingUtilities.invokeLater(new Runnable() {
public void run() {
new TextEditorDemo().setVisible(true);
}
});
}
}
Screenshots
Quick Links | ESSENTIALAI-STEM |
Neuromuscular Scoliosis (Curved Spine)
The group of diseases under the category of muscular dystrophy share some common characteristics, i.e. muscular weakness, atrophy (wasting) and development of contractures of the limbs. When the same weakness affects the muscles of the spine, often with some imbalance or asymmetrical involvement, scoliosis of the spine (curved spine) can result.
Scoliosis is one of the common complications of patients with muscular dystrophy who are only able to sit (non-walkers). For Duchenne Muscular Dystrophy (DMD), the scoliosis commonly develop and progress rapidly after they become wheelchair bound. For patients with Spinal Muscular Atrophy (SMA) where there are different forms with different severity, spinal deformities develop much earlier in non-walkers than in ambulant patients. In both DMD and SMA patients, the spinal curvatures are often thoracolumbar in location. Wheelchairs adapted with a firm seat and support is useful towards delaying the onset of scoliosis. On the other hand, marked spinal curvature may also make seating impossible. Forestalling or prevention of this complication is not always possible for some patients particularly when their ability to walk is lost. Although special body braces (spinal orthoses) have been tried, these were found to be ineffective in the management of neuromuscular scoliosis.
It is important to recognize the onset of scoliosis as it hinders adequate respiratory (breathing) functions. A curved spine results in restriction in the movement of the thoracic cage and thus, adversely affects respiratory capabilities. When wheelchair bound, patients should be encouraged to use incentive spirometry to maintain their respiratory efforts for as long as possible.
The indication and the timing for the surgical/operative stabilization of the spine are dependent on the degree and progression of the scoliosis as well as the respiratory capabilities of the patient. For patients with DMD, the progression of scoliosis is rapid, and averages 10o for each year that the child is wheelchair bound. Early spinal stabilization is often indicated in patients with muscular dystrophy when the spinal curvature reaches 30o, before the onset of breathing difficulties make the surgery more risky. By 14 years of age, the functional vital capacity (breathing efforts) of patients with DMD is only about 50% of normal. The lowest safe limits for surgery requires a functional vital capacity of at least between 30 - 50%.
Pre-operatively, all patients with muscular dystrophy need to have a detailed assessment of their breathing capabilities including the determination of their blood oxygen and carbon dioxide levels. In addition, a cardiac (heart) evaluation is necessary for patients with DMD as there could be abnormalities or weakness of the cardiac muscles as well. Following a successful operation, good correction of the spinal curvature is possible, with resulting improvements in the respiratory status (breathing capabilities), sitting balance, quality of life and comfort for these patients.
Dr Ong Hian Tat
Paediatrician, National University Hospital
Donate now! Your donation can
do something purposeful do something meaningful give hope and bring joy open opportunities make a difference help fight MD | ESSENTIALAI-STEM |
Dealmaking Hits Bump as Market Slump Overshadows Cash Pile
Concerns about a declining global
stock market and slowing economic growth are taking a toll on
dealmaking, with takeovers in June tumbling to the lowest level
in eight months. The total value of takeovers announced so far this month
fell 22 percent from May to about $178 billion, leaving second-
quarter volume little changed from the previous three months,
according to data compiled by Bloomberg. At least two banks went
for a week or more without a new mandate starting at the end of
May, said senior advisers who declined to be identified.
Business has been sluggish since then, they said. The global recovery that spurred companies to pursue
takeovers earlier in the quarter stumbled in June with Greece
seeking to avoid a default and the U.S. Federal Reserve lowering
growth forecasts. That has led to a dip in stock markets
worldwide and may be temporarily overshadowing companies’ plans
to expand their businesses and spend stockpiled cash. “The market has taken a bit of a breather,” said Jack MacDonald, co-head of Americas M&A at Bank of America Corp. in
Palo Alto , California . “Given economic headwinds and market
volatility, CEOs seem to be taking a brief pause before pulling
the trigger on transformational transactions.” Fewer Purchases U.S. central bankers said the economy will expand as much
as 2.9 percent this year, down from a maximum forecast of 3.3
percent in April. Gross domestic product slowed to 1.9 percent
in the first quarter from 3.1 percent in the previous period,
according to Commerce Department figures released June 24. Out of the 20 largest acquisitions in the second quarter,
four were announced in June, the data show. Capital One
Financial Corp. agreed to purchase online bank ING Direct USA
for $9.1 billion on June 16, and gas distributor Southern Union
Co. (SUG) received competing takeover bids of more than $4 billion
from Williams Cos. and Energy Transfer Equity LP this month.
Carrefour SA said yesterday it’s considering a proposal to merge
its Brazilian assets with a local retailer. Other deals were scuttled during the period. Smithfield
Foods Inc. (SFD) this month halted a $700 million purchase of a 50
percent stake in Spain ’s Campofrio Food Group SA, citing
weakness in Europe and in Smithfield’s own share price. The
stock has dropped more than 7 percent in the past two months. The MSCI World (MXWO) Index has declined similarly after the
benchmark hit an almost three-year high in May. The index
climbed 1.5 percent to 1,315.38 at 4:30 p.m. New York time. Deals Derailed At the same time, corporate debt sales are falling
globally, while yields relative to government bonds widen,
partly on investor concern that Greece won’t be able to meet
debt obligations. High-yield loans used to finance buyouts are
headed for their first monthly loss of the year, led by Europe,
according to Credit Suisse Group AG’s Leveraged Loan Index. “Macro factors, which have caused volatility in the stock
markets and the recent pullback in leveraged finance, can derail
certain deals,” said Ehren Stenzler, co-head of U.S. M&A at UBS
AG in New York. “We tend to think it is temporary, but those
factors could cause companies to push the pause button for a bit
on certain deals.” Retailer Big Lots Inc. (BIG) abandoned plans for a sale in May
after bids from leveraged buyout firms came in lower than
anticipated, according to a person with knowledge of the matter. In an auction for Gen-Probe Inc. (GPRO) , a maker of disease-
testing diagnostics, bidders Life Technologies Corp. and Thermo
Fisher Scientific Inc. dropped out of the process when the
asking price neared $80 a share, another person said. Novartis
AG (NOVN) may still be interested, the person said. Shares of San
Diego-based Gen-Probe have since fallen to $68.41. Price Concern Henkel AG Chief Executive Officer Kasper Rorsted said in an
interview this week that deal price has been a roadblock for
companies looking to make acquisitions, rather than the broader
macroeconomic environment. He said he sees attractive assets in
the U.S. and Europe. Executives are getting more accustomed to the ups and downs
of the market, according to Henrik Aslaksen, global head of M&A
at Deutsche Bank AG in London . “Volatility in today’s world does not stop a healthy
company making important strategic decisions and acting on
them,” Aslaksen said. “The cost of capital remains relatively
low on a historic basis, and corporates have strong balance
sheets.” ‘Still Rallying’ The top 1,000 non-financial companies are still sitting on
more than $3.4 trillion in cash, and shareholders are rewarding
strategic acquisitions by pushing up acquirers’ stock prices,
Bloomberg data show. Apparel maker VF Corp. surged 10 percent on
June 13 when it announced a deal to buy Timberland Co. for about
$1.8 billion. As global stock markets gained in April, Johnson & Johnson
agreed to pay $21.3 billion for medical device maker Synthes
Inc. and Exelon Corp. (EXC) , the largest operator of U.S. nuclear
power plants, said it would buy Constellation Energy Group Inc. (CEG)
for about $7.9 billion in stock. “Investors are still rallying around a deal that looks to
grow the top line,” said Michael Boublik, chairman of M&A,
Americas at Morgan Stanley. The market for takeovers in North America held up better
than other regions in June, with announced deals rising 14
percent from May to more than $82 billion. The dollar volume of
transactions fell by more than 60 percent in Western Europe and
more than 40 percent in Asia Pacific in that same period. “We still see much greater confidence in the U.S., and we
are having many more conversations with U.S. buyers of European
companies,” said Giuseppe Monarchi, head of Europe , Middle East
and Africa M&A for Credit Suisse Group AG. “But there is less
visibility on large transactions than we had several weeks ago,
partly because of Greece.” Active Buyers Hernan Cristerna, head of M&A for Europe, Middle East and
Africa, at JPMorgan Chase & Co. in London, also said that U.S.
acquirers have been active in Europe, while European companies
are targeting growth in emerging markets. “Companies are not just looking for cost synergies, but
real growth,” he said. Worldwide, announced deals in the second quarter rose to
almost $620 billion, or less than 1 percent from the first three
months of the year, according to data through June 28. Year to date, JPMorgan is leading financial advisers in
global M&A transactions at $269.2 billion in deal volume, just
ahead of Morgan Stanley and Goldman Sachs Group Inc., according
to Bloomberg data. Rounding out the top five are Credit Suisse
and Citigroup Inc. To contact the reporters on this story:
Jeffrey McCracken in New York at
jmccracken3@bloomberg.net ;
Brett Foley in London at
bfoley8@bloomberg.net To contact the editor responsible for this story:
Jennifer Sondag at
jsondag@bloomberg.net | NEWS-MULTISOURCE |
Shine: The Best of Annie Crummer
"Shine: The Best of Annie Crummer" is a greatest hits album by New Zealand singer, Annie Crummer released in 2002.
Track listing
* 1) See What Love Can Do with Herbs
* 2) Language
* 3) State of Grace
* 4) U Soul Me
* 5) Asian Paradise with When The Cat's Away
* 6) Melting Pot with When The Cat's Away
* 7) For Today with Netherworld Dancing Toys
* 8) Keeping Up The Love Thing as the Katene Sisters
* 9) You Oughta Be in Love
* 10) Love Not War
* 11) Surrender
* 12) Seven Waters
* 13) Make Up
* 14) Guilty
* 15) Once Or Twice
* 16) I Hope I Never as part of ENZSO
* 17) Let It Shine | WIKI |
Talk:Alawites/Archive 2
Change from "Alawite" to "Alawi"
This change was recently made throughout the article, but it should be changed back, since Alawite is the English word, and this is the English Wikipedia, not Arabic. FunkMonk (talk) 02:33, 14 September 2008 (UTC)
* We call the Sunnis "Sunni", not "Sunnites"; we call them "the Shi'ah", not "Shi'ites", "Ismailis" not "Ismailites", "Alevis" not "Alevites", "Hanbalis" not "Hanbalites", "Shafi'is" not "Shafi'ites".
* We should move the article instead if it's an issue, because the English translation "Alid" is not used as such (although the Persian pronunciation of Alavi does, in fact, refer to a decendant of 'Ali - an Alid). ناهد/(Nåhed) speak! 04:03, 14 September 2008 (UTC)
* Well yeh but the sect is more known as "Alawites" ,with "Alawi" being an adjective in Arabic and if used its used as "Alawi sect" if we are going to use the exact Arabic term its “Alawiyoon” (when used by itself and not followed by “Sect” or “school of thought” ), so if we are going to use the exact Arabic words then Sunni should be Sunnah and Ismailis as Ismailiah and that might be confusing for those who don’t know Arabic .You do have a point but I think we should use the most common English name. « Hiram 111 Δ TalK Δ 10:21, 14 September 2008 (UTC)
* Yeah, according to Wikipedia policies we have to use the most common English name, and that's "Alawites" with no question. Let's not over-exotify Muslims with all sorts of weird signs either. FunkMonk (talk) 12:35, 14 September 2008 (UTC)
* Out of curiosity, could you run the numbers for Alawite, Nusayri/Nosairi, and Alawi? I don't know how to run the search properly (the parameters) and I was frankly surprised Wikipedia didn't use Nusairi. Perhaps it's because I'm used to reading about them in French. ناهد/(Nåhed) speak! 19:04, 14 September 2008 (UTC)
* What does "run the numbers" mean in this context? Sorry, English isn't my first language. Alawites don't use the word Nusayri for self-identification. FunkMonk (talk) 19:17, 14 September 2008 (UTC)
* I guess she meant that we should use a search engine to see the occurrence of each word ??? If that what she meant, well I did that and yes "Alawi" is widely used though its hard to narrow down the search results to the Alawi (sect).Even though English is my second language and I'm not that good in linguistics but "Alawi" is in singular and if used it should be used as "Alawis" for example the phrase "‘Alawī practice religious secrecy" is similar to the phrase "Christian practice religious secrecy".Though many websites did use it in this way but it might sound weird for people who use Arabic as their native language.
* I think a good Arabic comparison is Maronite since they are called after Saint John Maron as the Alawites are called after Imam Ali. But in English its more adequate to say Maronites rather than Maronis or Maroni.I guess the other names should be mentioned at the introduction as alternative names because they are not widely used as the name "Ash'ari" isn't widely used by Sunnis. « Hiram 111 Δ TalK Δ 22:19, 14 September 2008 (UTC)
* Yeah, search results would be misleading, since Alawi is also a last-name among other things. Alawites are sometimes referred to as "Alawis" in English, but mostly as Alawites. I haven't seen them referred to as "the Alawi" until now. FunkMonk (talk) 23:06, 14 September 2008 (UTC)
* Yeah, I meant "check the search engines" because it also is a surname, used for the Alevis and Alavis, etc. Personally, I've only seen "the Alawi" and "Nosairis/Nusayris". It might be because I've encountered them in specialist literature, as I noticed in a few other places the use of "Alawite" (though not "Alawites"). I guess it just struck me as weird and unusual... as a native English speaker, it sounds wrong where something like "Alawism" sounds okay. ناهد/(Nåhed) speak! 23:19, 14 September 2008 (UTC)
* Maybe you're reading older literature? Personally I don't really give a damn what word is used throughout, as long as it isn't Nusayri, but Wikipedia policy is to use the most frequent English word I believe. FunkMonk (talk) 23:24, 14 September 2008 (UTC)
* Another thing, Emily, I'm not sure it's a particularly good idea to have this talk page automatically archived, it's not a particularly active page, in fact it hardly ever changes, so a new section might not get a reply for several months, and by that time, it will already have been archived, and thus harder to find, and people won't be able to reply directly to it. But archiving manually is fine enough, of course, and most which was here already was old. FunkMonk (talk) 14:40, 26 September 2008 (UTC)
* I am alawi and this page is full of LIES! and most of what you have tired to explain, is wrong, we believe Ali is the true successor but however you have to VERIFY~!! we do not believe he is the true successor in PROPHETHOOD!! only as chief of the aincent tribe back then .. and many other things are VERY wrong is this article .. all the Alawites i know hate this page because it tells lies! —Preceding unsigned comment added by <IP_ADDRESS> (talk) 22:18, 30 September 2008 (UTC)
* Well, then help improve the article and find some sources. My paternal family are Alawites, so I'm not exactly motivated to "spread lies" about them, if that's what you think. I just looked through the article, and a lot of the more unusual claims had no sources or had bad sources. I have removed those. Whether those claims were true or not is irrelevant, as long as they are not backed up by valid sources. FunkMonk (talk) 22:24, 30 September 2008 (UTC)
* Not only is the spelling style changing, I think that it shows more respect to use the -i ending instead of the -id or -ite endings. The former endings sound contrived. Furthermore, they lend themselves to an air of objectification. In the case of the word "Shiite," it does not even look nice. By the way, it is a nice tip of the hat to use the accent mark ` to indicate the consonant `ayn, but since the articles are in English and are not translations of Arabic texts, it is not necessary to use the mark. —Preceding unsigned comment added by PinkWorld (talk • contribs) 03:28, 17 December 2008 (UTC)
* Could the sign before the word, which doesn't really add anything to normal people, at least be removed? FunkMonk (talk) 18:35, 24 February 2009 (UTC)
* I agree that it should be Alawi and not ‘Alawi, although at least the current form is typable with a regular keyboard. There is a terrible problem with Wikipedia Islam pages that keep getting renamed to forms using the technical Arabic transliteration - when a page is moved to, say, ‘Alawī, there's not a keyboard around that can type a macron. Ogress smash! 00:14, 25 February 2009 (UTC)
I'm also Alawi and I refute %80 of what's written there, *sigh* I can't really do anything about it since we're hated for all the wrong reasons. We DON'T have a trinity, we pray, fast and some of us do pilgrimage! What more proof do you want other than myself and my friends/family!? — Preceding unsigned comment added by Maxjabbour (talk • contribs) 13:43, 18 February 2012 (UTC)
Requested move 1
* The following discussion is archived. Please do not modify it. Subsequent comments should be made in a new section.
This has already been discussed, "Alawite" is the most widely used term by far, so that's what the article should be called. FunkMonk (talk) 22:27, 6 December 2008 (UTC)
* I'm sorry, but I beg to differ for several reasons. First of all, while you and at least one other person have asserted that this is the "most widely used term", no specific convention or other proof of this is offered to back up this claim; therefore, this is merely your own subjective, personal understanding of how commonly a term is used. While I can understand why you would state this, in actual fact, even a cursory examination of the prevailing, current peer-reviewed academic literature will demonstrate that this particular usage is not only antiquated, it is no longer employed by most prominent scholars today. While it may persist (much as the term Shiite persists, which if enetered into Wiki, is automatically redirected to Shia Islam) there is no specific Wiki policy that demands that an antiquated English usage be the standard for a Wiki article. As I pointed out in my preliminary edits, the peer-reviewed Encyclopedia of Islam and Encyclopædia Iranica do not employ "Alawite" except in passing, but 'Alawī (or 'Alawi without the final accent mark on the letter "i", although admittedly, the articles in question do appear under the heading of "Nusayri": I fully agree with you that this latter should not be used for this article ). The current convention is also readily observed in most current academic articles and publications on this sect, for example those published in the Journal of the Middle East Studies Association and the Journal of Arabic and Islamic Studies. Finally, the move is in no way an attempt to "over-exotify" this term (as you mentioned above), but simply an effort to term bring it in line with the proposed ALA-LC Arabic transliteration standard for ALL Arabic terms in articles in Wikipedia, which "is based on the ALA-LC Transliteration method, with a few simple changes that make it easier to manage and read". I might concede that the accent on the "i' could be dropped, but as it is now being used for Arabic terms in other articles, I think it's perfectly fine to employ it. Manual of Style (Arabic)Jemiljan (talk) 03:35, 7 December 2008 (UTC)
* Wikipedia prohibits the use of SPECIAL CHARACTERS. This page must be moved immediately to Alawi. ‘Alawī uses disallowed characters. Ogress smash! 05:29, 7 December 2008 (UTC)
* Perhaps I'm mistaken, but I have never read that Unicode UTF-8 characters characters are specifically prohibited in Wiki naming conventions. Please refer to Naming conventions (technical restrictions) for a list of prohibited characters. I do not find the accent used here listed among the prohibited characters, but perhaps I am overlooking it? If so, can you point this specific prohibition out? The fact that the ALA-LC transliteration standard for Arabic has been proposed for consistency in transliteration only would seem to support my point.Jemiljan (talk) 08:41, 7 December 2008 (UTC)
* I think I just found it: Naming conventions (Arabic)"Avoid diacritics, dots, lines, or other unprintable character in page names for content pages (e.g. "ḍ"): page names should always be usable as hyperlinks, so, depending on browser/operating system/font/stylesheet combination the sign under the letter gets crossed and would be indiscernable". Thanks for alerting me to this issue.Jemiljan (talk) 09:03, 7 December 2008 (UTC)
* That page has been historic for almost two years. The browser problems which made those characters unprintable have mostly been worked around. Septentrionalis PMAnderson 17:05, 8 December 2008 (UTC)
* Wikipedia uses the most commonly used terms, so there's no real argument here. The article should be moved back to "Alawites", which is the term almost exclusively used today in English. The Druze article isn't named "Durzi" either. FunkMonk (talk) 13:28, 7 December 2008 (UTC)
* Funk Monk, You keep reiterating that "Alawite" is most commonly used, yet your provide no support whatsoever for this claim. Simply citing this as a vernacular precedent without supporting your position is not a very strong argument. It would also appear that I am not the first to argue this position here either. I have pointed to several to preeminent English-language publications in which the term 'Alawi is actually the more current, commonly accepted usage, which effectively contradicts your position that "Alawite" is "almost exclusively used today in English". As to your point about the Druze, you will find it used in most English language academic publications I referred employ that term, not "Daruzi" or "Durzi". I have pointed to several preeminent English-language publications that employ the term 'Alawi. Part of Wiki's goal is to cite credible sources. Would you like me to provide more? Some of the reasons that this usage persists is due to a combination of European colonial influence, as the French adopted the term, and the English continued using it. Secondly, Christian sects are often distinguished by the suffix ending "ite", e.g. Maronite, Malkite, etc etc, but these are official usages by the churches in question; that is not at all the case by Muslim sects. Yet when discussing Islamic sects and schools of jurisprudence in English, this antiquated style of usage has been long abandoned in favor of a more accurate transliteration, even though it may persist in vernacular usage in the former English and French colonies. For example, I mentioned the usage of the term Shiite, and similarly the terms "Shafite", "Hanafite", "Hanbalite", and "Malikite", or even "Jafarite" and "Wahhabite" have all fallen out of current use in favor of Shafi'i, Hanafi, Maliki, and Ja'afari jurisprudence. If you enter Wahhabi, you are redirected to a page on Wahhabism. Note that the use of the suffix "ism" to designate a sect or school of though (e.g. Sufism) is still an accepted convention, but the practitioner of the sect is no longer commonly written with the suffix "ite" (e.g. a follower of Sufism is a Sufi, not a "Sufiite", nor is a followr of Wahhabism a "Wahhabite", but a Wahhabi) . It is for this reason that I oppose moving the article back to 'Alawite. Jemiljan (talk) 16:30, 7 December 2008 (UTC)
* Alawite is the term used in common English. The term is always used by news sources and similar. Wikipedia uses common terms. Britannica uses Alawite as well: http://www.britannica.com/EBchecked/topic/12399/Alawite That is more commonly used as a standard here than say, some Iranian lexicon. FunkMonk (talk) 19:13, 7 December 2008 (UTC)
* The Encyclopædia Iranica is not "some Iranian Lexicon", but a leading, primary reference source on the Persianate world for the last 35 years! Alawite is an antiquated term for an adherent of teh sect, along with the term Alawism for the sect itself. These are not at all uniformly practiced contemporary, common usage. The fact that Britannica uses the term "Alawite" is due to the fact that the article in question was first published in the late 19th century, and is simply an example of a holdover of an antiquated Victorian usage. Then it occurred to me, that this issue may be due to American and British English spelling differences. So, I checked the AP Stylebook, and sure enough, it only contains the term 'Alawi, not "Alawite", although it doesn't explicitly state that the latter cannot be used. While the latter may be an accepted usage in British media such as the BBC, and in Commonwealth countries, it is not an American standard by any means, and therefore not at all "common", "universal", or "correct" in English. It certainly is NOT the current usage favored by scholars on the topic as published in the Encyclopaedia of Islam (both the 2nd ed. and the initial entries in which it is mentioned that have been published so far in the 3rd ed.), Encyclopædia Iranica, the JAIS, the International Journal of Middle East Studies published by MESA, the Middle East Studies Association of North America, the Middle East Report published by MERIP, nor the Middle East Quarterly). In light of this, I will stick to my argument that Wiki articles should be updated to reflect current usage by scholars in the field, as well as current media usage, just as Shiite has been similarly updated to Shia, and anyone who types the former in Wiki is redirected to the latter. This view is supported in turn by the fact that it is the transliteration of the term that is primarily used in common Arabic to refer to the sect in question.Jemiljan (talk) 20:33, 7 December 2008 (UTC)
* Let's wait for a third opinion. FunkMonk (talk) 20:36, 7 December 2008 (UTC)
* Support a move (return) to Alawites first because this move should not have been made without consensus and the threshold for a move should be attained by those favouring ‘Alawi. Furthermore, as noted above, ‘Alawi, even in English, is an adjective form and we need a noun here. More importantly, a perfectly good English noun already exists for the subject (Alawites) so use it per WP:UE. The current title a half-aʃʃed transliteration; either use ‘Alawī or Alawi but not a mixture of both. — AjaxSmack 22:24, 7 December 2008 (UTC)
* 'Alawi is not adjective, as it is clearly refers to those who practice the 'Alawi faith. Used as noun in contemporary usage by scholars, just as the terms Shafi'i, Hanafi, Maliki refer to schools of jurisprudence. Shall those be reverted too? Furthermore, the acceptance of the term in all of the sources that I mentioned is as a noun, not an adjective. I have at least provided numerous sources to support my position. I cannot help it if others make unsupported statements that the term is an adjective. While I may have acted unilaterally in moving the article (for which I apologize), I would also point out that there was no real broad consensus reached in the previous comments above. Funk monk merely asserted that Alawite is the common usage, but provided no support for that position.Jemiljan (talk) 00:06, 8 December 2008 (UTC)
* I support 'Alawi. I never liked Alawites, it's exceedingly awkward and I've read quite a bit about the group and they rarely are known by that name by specialists. I note the most prominent book on the subject in English, Meʾir Mikhaʾel Bar-Asher & Aryeh Kofsky's 2002 The Nuṣayrī-ʻAlawī religion : an enquiry into its theology and liturgy, calls them "'Alawis". However, the move was made without consensus or even inquiry; moves often happen on smaller articles without inquiry but in this case, it was clearly unwarrented. The issue has even been discussed in the past! I say park it here for now until we get a new consensus, but I prefer a form without the -ites ending. "'Alawites" sucks IMHO. Ogress smash! 02:58, 8 December 2008 (UTC)
* Not liking a word is not an argument. FunkMonk (talk) 16:22, 8 December 2008 (UTC)
* How about Ogress' observation that "they rarely are known by that name by specialists" followed by specific examples? Is there a specific Wikipedia precedent that says that we must use the suffix "ite" as it was once common usage? Again, I refer the example of how Shia has beomce current parlance instead of Shiite, which is also a more correct transliteration of Arabic.Jemiljan (talk) 08:50, 11 December 2008 (UTC)
* Keep Alawi but lose the single quote to fit with naming conventions. I know jack-crap about this topic, but a cursory overview with webtools supports the argument that "Alawite" is an old Victorian-era term, with diminishing currency. The AP style book is what cinches it for me, with no mention of Alawite. This means no self-respecting news organization in the world uses "Alawite" except by rookie mistake or old custom. In fact, a Google News search reveals 2,220 hits for "Alawite" but 7,620 for "Alawi", more than three times the mention. Google Scholar is more impressive in the pro-Alawi sense: 1,250 "Alawite" vs 6,150 "Alawi", almost five times the mention. Before anyone protest using google in an argument, remember this is a quantitative, not a qualitative discussion, based on notability, and that I am not using the general search, but one that targets pre-approved news organizations, and peer-reviewed academic and scholarly articles. I do want to hear on what evidence does FunkMonk base his assertion of "Alawite" being more used, because it certainly doesn't seem to be the case. Thanks!--Cerejota (talk) 13:27, 8 December 2008 (UTC)
* Cerejota, thanks. Is the use of the single quote as an accent acceptable according to naming conventions, as it is not outside of the parameters for naming conventions, as it falls within the ASCII set? Ex. Isma'il PashaJemiljan (talk) 08:50, 11 December 2008 (UTC).
* Support a move to Alawites: Though Jemiljan ,Ogress and Cerejota supplied valid reasons why Alawi should be used but also Funkmonk did supply good reasons why to keep “Alawites”. And both names are used interchangeably. But I’m still convinced that Alawi is an adjective rather than a noun. Alawi alone without being followed by “sect” or “school” seems awkward if we want to consider the Arab usage of the word. So if we are going to use the Arab term then Sunni should be moved to Sunna to be similar to Shia because the adjacent term to Sunni is Shi’ii. And probably some Arab language enthusiast would get so pumped up about translating exact Arab names and move the Sunni page to “Ahl Al-Sunnah wal Jama’aa” the official name of the Sunni sect.
* Yes, but Arabs also do use the term Sunni quite commonly, as well as the terms Shia. Tune into any Arabic language news report out of Iraq today, and you will hear them both.Jemiljan (talk) 08:50, 11 December 2008 (UTC)
* The –ite means the follower of and the Alawites are the followers of Imam Ali. So I don’t think it’s a big issue if we use the term Alawites. As for the terms Shafi'i, Hanafi, Maliki well yes that’s a valid usage because they refer to schools of jurisprudence. But Alawism is a religious sect rather than a school and the term Alawites can be used by itself rather than being followed by school or sect.
* As for a prove that it’s widely used well this is one of the websites for the Alawite sect : http://www.alawites.org/
* And Cerejota yes Alawi has more search results because it’s also related to the Alawi family which is a large one and its the family name of the Iraqi PM
* Anyway I have no problem if Alawi is used ,but in the article it should be used with the word sect.
« Hiram 111 Δ TalK Δ 15:15, 8 December 2008 (UTC)
* Hiram, I'm fine with using Alawi sect and then Alawi for the adherent of the sect.
* * Secondly, just to reiterate that the suffix "ite" was used for "Shiite" sect as well, and is also falling out of currency in favor of Shi'a, and Shi'i as an adjective describing the for an adherent of the Shia sect. There was no particular reason why the term was applied to both sect and schools of juriprudence. An Alawite is an adherent of the sect, NOT a term for the sect, which would be Alawism- a term that is used in the article right now.
* * Thirdly, 'Alawi is any strictly adjective, but a nisba or Nesbat; a locative specifier, used not only for adherents of sects and schools, but also places. For example Urduni is Jordanian, Masri is Egyptian. These terms can refer to a dialect spoken in those countries, or a person whose origin is from that country. By comparison, when using the older terminology, an Alawite is a follower of Alawism. See the usage of Ismailism Therefore, your own argument that the term 'Alawi is an adjective, describing an adherent, then the article should be moved to Alawism, and not back Alawite. That said, I do agree with you that it is better to delineate the term 'Alawi sect" versus an Alawi(Arabic plural العلويين Alawiyeen) as someone who is an adherent of the sect. So if a move to 'Alawi sect you prove to be a satisfactory, compromise, I'm all for it, along with a disambiguation page for the surname, as well as the Yemeni dynasty. The Arabic Wiki does have a redirection page from ṭā'ifatul 'alawiya الطائفة العلوية literally means "Alawi sect" (although the main article in Arabic is actually Nuṣayriya نصيرية).
* *Fourthly,the alawite.org link is not working for me. Just because one web site uses it, doesn't mean that it's "widely used" at all.
* Finally, is there some compelling reason to not rely on the pervasive, contemporary scholarly usage, the same usage found in current sources cited as references for this article?. Wikipedia may state that articles be named for common usage, but there is also an emphasis on INFORMED, i.e. current scholarly usage. Again, I have cited numerous examples of primary sources that could be used for this article on this very topic, which do not employ the terms Alawism and Alawite.Jemiljan (talk) 16:37, 11 December 2008 (UTC)
Septentrionalis PMAnderson 15:25, 8 December 2008 (UTC)
* Support move to Alawite as common usage.
* Based on which precedent, exactly? Like I've asked of Funk Monk, we need to cite a precedent for this, not simply state that it is "common". You also need to show that this usage is common not only in conventional language, but primary sources on this topic. Is the common, predominant usage of 'Alawi among Western scholars and specialists in the region somehow inapplicable for some particular reason? Secondly, should the article be about the adherents of the sect, or the sect itself? If the latter, then the antiquated usage was 'Alawism, whereas the adherent was referred to as an 'AlawiteJemiljan (talk) 08:50, 11 December 2008 (UTC)
* Alawites are almost exclusively referred to as such in recent English-language news. That should be easy to research. Also, see the Britannica article, which uses "Alawites". FunkMonk (talk) 20:51, 11 December 2008 (UTC)
* I honestly don't beleive you for the simple fact that the AP Stylebook lists the term as `Alawi, not Alawite. As I previously pointed out, US media in no way exclusively uses Alawite, as they follow AP. While specifically British news services (i.e. BBC) do employ the term Alawite, it is neither universal, nor is it any longer "exclusive", much less "most common". Also, as Hiram has pointed out, the term should describe the sect, not the adherents. As an Alawite is a term for the adherents of the sect, not the name of the sect itself, then it should either be entitled "`Alawi sect" or "Alawism"Jemiljan (talk) 23:57, 12 December 2008 (UTC)
* The above discussion is preserved as an archive. Please do not modify it. Subsequent comments should be made in a new section.
<IP_ADDRESS> (talk) 18:09, 24 April 2009 (UTC) i agree i think we should leave it as Alawi. There is no such thing as an "english" for the word alawi. The word is 3alawi people should stop having a sook and deal with it.
FunkMonk that is the problem i dont know if you know how to speak internet arabic? bas ma 7a hie l din l 3alawi sir, w l 3alem lezem efarjona e7tiram b nesbit 7al article, fi aghlat ktir. In other words, the Alawi deligion is secret, you should respect that and if you say your parternal parents are alawi well i am sure that your father, your grandfather, and your great great great grandfather would be very very upset, in concern to this artilce. If have to understand we are not liked very much, and other muslims on the internet sometimes create websites if information that is allegedly meant to be about the "alawi faith" when in actual fact its what THEY think we believe, and dislike us so much, then wikipedia uses there websites as "sources" to apparently justify that what is written here is right, and then as a result you end up with a lot of upset alawi people when they see this page. Thus you must source your information from Shia orientate websites. Translate it from arabic to english if you can. Take care In my opinon i think the article should just be deleted because there is no way you will be able to find sources on the net that are correct. I have looked myself in arabic and english.
+++I'm "Alawi" and I take offence to being called an "Alawite" don't you people have morals or at least some respect for how we want a page that talks about us to be!? — Preceding unsigned comment added by Maxjabbour (talk • contribs) 13:46, 18 February 2012 (UTC)
* Other Alawites (Padrinio of the Eid family for example) supported "Alawite" here as well before, so there is no agreement among Alawites. Most Alawites in English speaking countries live in Australia, and Alawite seems to be the common name there. FunkMonk (talk) 20:14, 16 December 2012 (UTC)
Notation of ibn Saba as an 'Alawi founder
The inclusion of ibn Saba is very charged... while Nusayr is a known historical figure after whom the 'Alawi are named (they are called Nusayri after him), ibn Saba is one of those historically unclear personages who has been used by Sunnis for sectarian reasons. In fact, Wikipedia's article on ibn Saba notes that Shi'ah and indeed many modern Sunni scholars deny he even existed. He is blamed for "Judaising" the faith (he was a convert from Judaism) by claiming 'Ali was the Messiah. I don't believe his addition here is warranted without significant citation. Ogress <sub style="color:#BA55D3;">smash! 16:12, 19 December 2008 (UTC)
Requested move 2
<div class="boilerplate" style="background-color: #efe; margin: 2em 0 0 0; padding: 0 10px 0 10px; border: 1px dotted #aaa;">
The result of the move request was no consensus on whether or where to move this article. -- Aervanath (talk) 05:08, 4 April 2009 (UTC)
* From ‘Alawi to Alawi. FunkMonk (talk) 13:40, 29 March 2009 (UTC)d
* would you care to indicate why you propose this move? This would make discussion much easier Jasy jatere (talk) 14:02, 29 March 2009 (UTC)
* ‘Alawi → Alawi — No odd sign in article name. FunkMonk (talk) 13:43, 29 March 2009 (UTC) --FunkMonk (talk) 13:43, 29 March 2009 (UTC)
* I'll add ‘Alawī in Turkey → Alawis in Turkey if it's OK. — AjaxSmack 22:10, 29 March 2009 (UTC)
* if that is the reason, oppose. From WP:UE "Wikipedia does not decide what characters are to be used in the name of an article's subject; English usage does. Wikipedia has no rule that titles must be written in certain characters, or that certain characters may not be used." Seems pretty clear and unambiguous to me... Jasy jatere (talk) 16:23, 29 March 2009 (UTC)
* Because the sign is not used when the name is commonly spelled. FunkMonk (talk) 16:57, 29 March 2009 (UTC)
* Support Alawi over the current title but prefer the English name, Alawites per WP:UE. None of the sources/external links cited in the article use an apostrophe with "Alawi" and many use "Alawites." Strictly speaking. Alawi is an adjective and shouldn't be a title anyway (even the Arabic article doesn't use it). — AjaxSmack 22:10, 29 March 2009 (UTC)
* I agree Alawites should be used, but the former vote ended against that. FunkMonk (talk) 23:29, 29 March 2009 (UTC)
* That's not what WP:CCC says. There was merely no consensus for a move at that time. And the prior move from Alawites to ‘Alawi was done without seeking consensus so I see any title as legitimate fodder for discussion. — AjaxSmack 23:34, 29 March 2009 (UTC)
* Then I support a move back to Alawites, but at the very least to "Alawi" or "Alawis". FunkMonk (talk) 23:54, 29 March 2009 (UTC)
* Then please weigh in below. — AjaxSmack 00:38, 31 March 2009 (UTC)
Modified request
* ‘Alawi → ?
* ‘Alawī in Turkey → ?
Please review the discussion above and participate in further discussion in favor of options below.
‘Alawi (current title)
* keep for the moment until someone addresses the arguments brought forward by Jemiljan in the last discussion. We cannot have the same discussion every three months and ignore what has been said in previous discussions. I am likely to change my vote if someone brings forward sources for their claims that "Alawite" is more common nowadays. As it is now, it seems that "Alawite" is a Victorian term, which has little current usage in the relevant literature. As such, it is a bad title for a wp article. Claims "Alawite is the most common term" need to be substantiated by reliable sources. For the current name, we have the AP stylebook, for "Alawites", we have nothing Jasy jatere (talk) 07:39, 31 March 2009 (UTC)
* Thank you Jasy, but I will say that the BBC does use the term ""Alawite", and other English media that follows the BBC standard does the same, but the AP, and news agencies who follow the AP style, do not. this boils down to a Brit v. US convention. That said, an overwhelming amount of current prevailing literature ranging from peer-reviewed journals on Middle East Studies, Encyclopædia references, and the general trend of favoring a transliterated form of 'Alawi over the older Franco- Anglicized form of "Alawite" leads me to think that the former is more acceptable today. You almost never hear anyone refer to a Sunni Muslim as a "Sunnite" today. While the Melkite church uses the -ite suffix today, but I do not see any official 'Alawi body stipulating that the term "alawite" be used in English.Jemiljan (talk) 03:10, 9 April 2009 (UTC)
Alawites
* 1) — AjaxSmack 00:38, 31 March 2009 (UTC) per WP:UE and WP:UCN.
* comment please see prior move request above, which was closed as "No consensus It seems that the arguments are waited slightly towards keeping the article at 'Alawi," I feel that the arguments made in the above discussion should at least be considered before making the same request again (and before voting, of course).
* Again, whenever Alawites are mentioned in the news, they're referred to as such. That's their common name, what they're called in literature should be irrelevant, as it is not what they are called commonly. I can't prove it to someone who doesn't follow news related to Alawites, such as I do. In any case, the current name should be changed, even if only the ' is removed, since the saign is cetainly not part of any common spelling of the word. FunkMonk (talk) 15:46, 31 March 2009 (UTC)
* FunkMonk, if "Alawites are mentioned in the news, they're referred to as such", then why have you routinely been unable to support your claim with a shred of evidence? In contrast, I showed before how the BBC seems to prefer "Alawite", but another standard news reference, the AP Stylebook, specifically stipulates the usage of 'Alawi in US media (and those who follow the style, such as CNN International). As I noted before, "Alawite" is in no way universally accepted as the only correct common English spelling, nor is there any stated preference for British English spellings on WP.
* Previously, I also pointed to many examples by other scholars and encyclopedias. This is not irrelevant as you say, but rather, quite the opposite, as WP promotes the verification of information in peer-reviewed scholarly literature. While spelling choices in Wikipedia should generally be made accessible in common English, the fact that an overwhelming number of CURRENT encyclopedias, scholarly journals, and media references in use today employ the term 'Alawi, and not 'Alawite, which is something that should be acknowledged when editing articles in WP.Jemiljan (talk) 03:00, 9 April 2009 (UTC)
Alawi
Support Ogress <sub style="color:#BA55D3;">smash! 01:34, 31 March 2009 (UTC)
* since wikipedia is not a democracy, substantiating your vote with arguments would surely improve the discussion. Jasy jatere (talk) 07:42, 31 March 2009 (UTC)
Other (Alawis, etc.)
* Comment: I do not think our article names should be decided solely on the basis of academic usage: we are optimized for lay readers, not for specialists. Hiram has answered the arguments for the present name in detail above. I therefore do not find the arguments for the present name convincing, and think the unilateral move which brought the article here should be reversed, and we can then relax into "no consensus" if necessary. Septentrionalis PMAnderson 18:07, 4 April 2009 (UTC)
* I agree but it requires an admin to do it. The current setup rewards undiscussed moves and the unaccountable admins are unwilling to institute any type of oversight or appeals process. I will ask for an overturning of the original undiscussed move here but I don't expect any action on it. — AjaxSmack 02:00, 7 April 2009 (UTC)
* I agree, the article was moved without even a notice on the talk page, without any form of consenus, so it should be moved back to "Alawites" in any case, until a new consensus is reached. FunkMonk (talk) 17:49, 8 April 2009 (UTC)
* I respectfully disagree. Septentrionalis, the usage of the spelling `Alawi is not solely an academic usage at all, but also a media usage as specifically stipulated in the AP Stylebook used in all US news media. Secondly, it also follows both the standards as outlined under the Naming_conventions, and also the proposed Manual_of_Style_(Arabic). Are these merely "academic usages"? Or are they standards empployed for editing WP articles? Note that in this regard, the usage of the term `Alawi- together with the apostrophe to represent the letter `ayn- is perfectly allowable, as it is listed on the chart comparing standard and strict transliteration standards. By way of comparison, note that English articles with Spanish terms using the letter ñ can be found; for example, El Niño, or the letter ç with a cedilla as can be seen in an article on the Provençal (dialect), so the use of special characters to represent these sounds is in no way entirely banned in WP articles.
* On the other hand, if there is a consensus that the apostrophe is too cumbersome, I would be OK with removing it. That said, I would not support the move back to 'Alawite" based solely on the current usage by the BBC and a small handful of associated news agencies, and Funk Monk's oft-repeated, albeit unsubstantiated claim that it is "used all the time". If current encyclopedias, peer-reviewed academic journals on Middle Eastern Studies of the last 30 years, and US media, and even this recent United Nations publication all employ the term Alawi, and do not use the term "Alawite", then it seems there is in fact a very strong case for keeping it the article the way it currently is.
* Interestingly enough, just now, I checked the Oxford English Dictionary online and found that it uses BOTH terms, citing various sources for both usages (though it shows that "Alawi" has been used by The Times of London since the 1920's and it also appears in more recent literature and news reports). The two terms then redirect to each other. Britannica uses the term `Alawite -with the apostrophe- but then, confusingly enough, then uses the term 'Alawi in the body of the article: "Though well established in Syria since the 12th century, the 'Alawites were not able to fully adopt the name 'Alawi until 1920, the time of French occupation of the area..." I suspect that the usage of `Alawite in this instance is a holdover from earlier editions. Just now I also checked the Grolier and Worldbook encyclopedias, but they only employ the term Alawite in a passing reference to the late Hafez al-Assad, but have no actual articles devoted to the sect in question. In contrast, the Encyclopedia Judaica uses Alawi in their entry about him. Finally, should we just overlook all of the articles cited as the sources for this WP entry, the majority of which clearly use Alawi?Jemiljan (talk) 04:01, 9 April 2009 (UTC)
I think Jemiljan has done quite thorough work on sourcing. Would the proponents of "Alawites" please do the same, in a similarly rigid fashion? Then we can compare the usage of verifiable and reliable sources. Jasy jatere (talk) 07:34, 9 April 2009 (UTC)
* Again, even if we didn't find other sources, it should still be moved back, because it was moved without consensus in the first place. Why can't this article be moved over redirects?
* The word "Alawite" is used most frequently on websistes where the group is commonly mentioned, such as Syriacomment and other Middle East related sites in English. When it comes to general news, writers are much less consequential. FunkMonk (talk) 18:45, 10 June 2009 (UTC)
* FunkMonk, for the umpteenth time, you insist that in your view, the term "Alawite is the most common usage", but despite repeated requests over the many months, you have yet to do any thorough sourcing, despite having been repeatedly asked to do so. Once again, I reply that as per my previous message, I have found quite otherwise, and the use "Alawite" is NOT as pervasive or commonly accepted as you insist on claiming. For proof of this, please refer to my previous message, esp. concerning the Manual_of_Style_(Arabic), Oxford English Dictionary, Naming_conventions, AP Stylebook, and The Times of London (including their Middle East edition) for commonly accepted written usage of the term 'Alawi in English. In addition, Jasy jatere has also asked you to provide thorough sourcing for your assertion. So please, before you take the time to post your sassertion again, take a few minutes and provide us with sources that support your assertion.Jemiljan (talk) 20:08, 12 August 2009 (UTC)
<IP_ADDRESS> (talk) 18:13, 24 April 2009 (UTC) i request that we make a chat area to allow fellow alawiyeh to be able to chat with one another :) <IP_ADDRESS> (talk) 18:13, 24 April 2009 (UTC)
I dont think so founders of the alawi faith were Al Imam Hassan l A3skari (3alyo bl salam) and Imam Mohummad Nysari (3alyo bl Salam) "Alawite" is consistently used when talking about their seat in the Lebanese governemnt. FunkMonk (talk) 14:11, 11 November 2009 (UTC)
* At the very least, move this to "Alawis" without the '. FunkMonk (talk) 22:00, 30 August 2009 (UTC)
* Throughout this whole Syrian revolution period, "Alawite" has been used in every article I've read on the subject. FunkMonk (talk) 18:09, 10 May 2011 (UTC)
Alawis allegedly Ismailis
The cite from that military info site is just so wrong... Alawis, as cited elsewhere in our article, are 12ers, are accepted by Allamahs as 12ers, and any resemblance to Ismailism is accidental. Not to mention that Ismailis don't believe in "reincarnation".
Specific Alawis beliefs should be added and cited, but the idea that they are Ismailis is just nuts. In fact, they and the Ismaili communities have long been at each other's neck for religious reasons, as Ismailis don't accept the "12 Infalliables" who are at the very centre of the Alawi faith.
I'll see if I can find a reliable scholarly work, because in this case a random military website appears to be insufficient and totally at odds with the cites in the rest of the article. Ogress <sub style="color:#BA55D3;">smash! 12:19, 23 April 2009 (UTC)
Khasibi Alawi the followers of Alsayed Abi Abedallah Alhussein Ibin Hamdan Alkhasibi.
As known alawi are found all over the world even though they are considred one of the least numbered religious sects.
Alawi believe in the only one God and his Prophet Muhammad. Alawi believe in all the messengers sent by God from Adam to Imam Muhammad Almahdi and they are 124000 messenger.
Alawi were named after Imam Al A'ima Ali Bin Abi Taleb and they are loyal to Ahil Albayt and the 12 Imams.
Imam Ali Bin Abi Taleb Imam Hassan Imam Hussein Imam Ali Zein Alabideen Imam Muhammad Albaker Imam Jafar Alsadek Imam Musa Alkazzem Imam Ali Alrida Imam Mouhamad Aljawad Imam Ali Alhadi Imam Hassan Alaskari Imam Muhammad Almahdi
Alawit are Muslims and they believe in the 5 Pillars of Islam.
Belief in one God and Prophet Muhammad Establishment of the daily prayers Concern for and almsgiving to the needy Self-purification through fasting The pilgrimage to Makkah for those who are able.
We implore peace all over the world, we discard violence, and we want to live in peace with all people in the world.
There is few hundred alawi in Iraq There is few hundred alawi in Iran There is few hundred alawi in Africa There is few hundred alawi in Brazil There is few hundred alawi in Argentina There is few hundred alawi everywhere There is about 15000 alawi in Australia There is about 50000 alawi in Bulgaria There is about 100000 alawi in Lebanon There is 2 million alawi in Turkey There is 3 million alawi in Syria
La Saifa ila Zoualficar wala Fata ila Ali لا سيف إلا ذوالفقار و لا فتى إلا علي
>> Extra info (that is well known in the middle east) They live in Syria, mainly in the mountains near the city of Latakia, but many also live in the cities of Hama and Homs, and in recent decades there has been a migration to Damascus & there is around 50,000 Alawi living in north Lebanon in a Place Named Jabal Muhsen Alawi are often referred to as Nusayris. Their exact number is not known, but estimated to be between 1.5 and 2.5 million. Most of them live from agriculture, but the Alawi are also central in the leadership of Syria, President Bashar al-Assad being an Alawi (similar to his late father, Hafez). Their name is a recent one — earlier they were known as Nusairis, Namiriya or Ansariyya. The names 'Nusairi' and 'Namiriya' came from their first theologian, Muhammadu bni Nusairi n-Namiri. The name 'Ansariyya' came from the mountain region in Syria where this sect lived.
Of doctrine Flyover Many believe that Alnasirih Task separate from the rest of Islamic sects, and classifies some of such Atntmi of Islam because of the beliefs and prayers have different, and the Alawis remnants Arab tribes that fought with Imam Ali bin Abi Talib in the battle grades, which migrated with time, until their case awarded riverain In rugged mountains. And consider others in the religious origins to the development of BC. Only Nasreh themselves consider themselves of Shia Ali bin Abi Talib, the first that does not distinguish on the front and Shia branches anything. Talked about them a lot of researchers such as: Sheikh Mohammad Reza Shams al-Din in writing (Alawis in Syria) - Dr. Mustafa Al in writing (in reconciling Islam between Sunnis and Shia) - Professor Adham of the soldier in his book on the history of revolutions Mandatory Syrian-French writer Munir Sharif Damascus Latakia former governor-Professor Mohamed response to the plans in writing-Sham ... Etc. and many others ...
Tags added June 2009
I will attempt to add reliable sources in the near future to provide more accurate information about the alawites. The flat statement that they are "a sect of shia islam" with no qualification is pretty much inaccurate. --BoogaLouie (talk) 23:25, 4 June 2009 (UTC)
Shows how much you know about AL ALawi ... you know jack shit. I am alawi and strongly offended by the summary of the beliefs you have attempted to make about my religion. My friends and i and my people from the alawi community are FED UP WITH IT and demand changes to be made. Alawi come from shia thank you very much, how do we know this? Well because the founders of the sect were "SHIA IMAMS" hence we come from the shia, even shia people themselves tell others that thank you very much. This is disgusting the amount of disrespect being shown on this page. People from the alawi community demand that changes be made to this page in concern with the summary of our beliefs.
Plural
Is it erroneous to use "Alawi" in English as the plural of "Alawi"? Unfree (talk) 17:12, 3 August 2009 (UTC)
* I see now that Hiram111 has already answered my question. It is erroneous. Unfree (talk) 17:23, 3 August 2009 (UTC)
Connection not evident
"The Alawis take their name from ‘Alī ibn Abī Ṭālib..." The sentence leaves one wondering What's the connection between "Alawi" and "Alī ibn Abī Ṭālib"? Unfree (talk) 17:34, 3 August 2009 (UTC)
Edit button
Shouldn't the "[edit]" button for "History" appear on the same line as the word, rather than beneath the box on the right? Unfree (talk) 17:53, 3 August 2009 (UTC)
Contesting edit
This edit by FunkMonk removed a large amount of text with the explanation that "Not sure this is a good idea, the sources are not exactly scholarly, so it is equal to adding controversial rumours to a biography."
The deletion was:
* According to some sources, Alawis have integrated doctrines from other religions, in particular from Christianity. It is thought that when Christianity flourished in the Fertile Crescent, the Alawis, isolated in their little communities, clung to their own preIslamic religion. Contacts with the Crusaders may also have added Christian elements to the Alawis' new beliefs and practices. Alawites celebrate many Christian festivals, including Christmas, Easter, and Palm Sunday, and their religious ceremonies make use of bread and wine. Alawis also share Ismaili Shias' belief in divine incarnation. Nusairis also have much more in common with the Ismailis in terms of overall beliefs, and they are sometimes regarded as "an offshoot of this group." Like the Ismailis and related groups, Alawis believe that the Shariah has both an esoteric, allegorical (Batin (Islam)|Batini) meaning and an exoteric, literal (zahiri'') meaning and that only the hidden meaning is intended. Alawis believe the exoteric meaning is known only to the Imams and later to the Bab and was hidden even to the Islamic prophet Muhammad himself. Only the Bab has access to this esoteric meaning in the absence of the Imam,
* Alawites believe in a holy trinity of `Ain-Mim-Sin, which stands for the three persons of the trinity: `Ali, Muhammad, and Salman al-Farsi, the Persian Companion of Muhammad. Each of these three is said to have been an incarnation of God. Ali, however, constitutes the most important part of this trinity. The Alawi testimony of faith is: `I have borne witness that there is no God but He, the most High, the object of worship [al-'Ali al-Ma'bud] and that there is no concealing veil (hijab'') except the lord Muhammad, the object of praise, (as-Sayyid Muhmmad al-Mahmud), and there is not Bab except the lord Salman al-Farisi` The Nusairis believe in the subsequent incarnation of God in other persons after the passing of `Ali, Muhammad, and Salman al-Farisi...
to be continued --BoogaLouie (talk) 23:58, 15 December 2009 (UTC)
* Yes, much of this is possibly just outdated hearsay, andd unless some more credible sources that state the same are found, including such rumours that are largely believed by anti-Alawite radicals would be quite damaging. FunkMonk (talk) 22:52, 16 December 2009 (UTC)
* There are three sources for the deleted text.
* Kaplan, Robert (1993-02). "Syria: Identity Crisis". TheAtlantic.com. http://www.theatlantic.com/doc/199302/kaplan.
* Abd-Allah, Umar F., Islamic Struggle in Syria, Berkeley : Mizan Press, c1983, p.43-48
* www.globalsecurity.org
* global secruity may be a bit dicy, but I put it to you that Atlantic monthly is a very credible source, a venerable magazine employing factcheckers, and The Islamic Struggle in Syria has a preface and notes by noted Islamist academic Hamid Algar, i.e. a scholar of Islam, (you might not want to take his word for it on the wonders of the Islamic Republic but he certainly has no reason to slander the leadership of Iran's close ally).
* Yes, "rumours that are largely believed by anti-Alawite radicals would be quite damaging," and have been (Hama uprising)! But would wikipedia be the place that Salafi jihadis or future Salafi jihadis would use to find out about apostasy of alawi? Would they care what a secular, non-salafi source has to say? Would censoring wikipedia of text based on reliable sources do anything to eliminate jihadi websites calling alawi murtad?
* I propose we keep the text while qualifying it with the phrase "some sources" more thoroughly. --BoogaLouie (talk) 20:32, 19 December 2009 (UTC)
* Here is another source: The New Encyclpedia of Islam by Cyril Glasse, Altamira,, 2001, p.37
* The Alawis are often called Shiites but, despite the referrences to Ali in their preferred name today, their doctrines do not correspond in any way to Shiism as such. Their doctrine bears an unmistakable resemblance to Ismaili teachings with their characteristic Gnostic, or dualist ideas. Their peculiar schema of Muhammad as ism, or "name", Ali as bab, or "door", and Salman al-Farsi as ma'na, or "meaning", with both Muhammad and Ali considered to be emanations of Salman al-Farsi, point to roots in the earliest stirrings of the Sevener movement, proto-Islamilism as found in the book umm al-Kitab, which dates from the 2nd/8th century. ...
* ''"The beliefs and practices of the Alawis, ... are extremely heteroclite, and vary from group to group. .. The eclecticism of their doctrines goes far back in time; besides theories of Divine emanations, they include elements of astral religion which are ultimately of Babylonian origin .... They also have elements of Christianity; the Alawis use certain Christian names and mark, in their own way, certain Christian holidays; it is reported that the religious services of the khassah... include a mass-like ceremony, with a blessing ... of the species of communion, and even includes reference to `body and blood` which are `eternal life`.
* They also practice a religious feast called by the Persian name naw ruz ..... The mixture sugggests that, as a small, historically beleaguered ethnic group living in remote mountain regions, with a strong feeling of clan solidarity .. they have absorbed elements from all the religions which have passed by them since Hellenistic times, .... whilst maintaining their own beliefs, they have pretended to adhere to the dominant religion of the age in order to escape persecution, in the style of Shi'ite taqiyyah ..." --BoogaLouie (talk) 20:59, 19 December 2009 (UTC)
Proposed rewrite
* in progress
* According to some sources, Alawis (or Nusairis) have integrated doctrines from other religions, in particular from Ismaili Islam and Christianity. It is thought that "as a small, historically beleaguered ethnic group", the Alawi "absorbed elements" from the different religions that influenced their area from Hellenistic times onward, while maintaining their own beliefs, and "pretended to adhere to the dominant religion of the age." Alawites are reported to celebrate certain Christian festivals, in their own way, including Christmas, Easter, and Palm Sunday, and their religious ceremonies make use of bread and wine. They also practice a religious feast called by the Persian name naw ruz.'' Nusairis have much in common with the Ismailis in terms of overall beliefs, and they are sometimes regarded as "an offshoot of this group."
* Like the Ismailis and related groups, Alawis believe that the Shariah has both an esoteric, allegorical (Batini) meaning and an exoteric, literal (zahiri) meaning and that only the hidden meaning is intended. Alawis believe the exoteric meaning is known only to the Imams and later to the Bab and was hidden even to the Islamic prophet Muhammad himself. Only the Bab has access to this esoteric meaning in the absence of the Imam.
* Alawites believe in a trinity of `Ain-Mim-Sin, which stands for `Ali, Muhammad, and Salman al-Farsi, the Persian Companion of Muhammad. Muhammad is known as ism, or "name", Ali as bab, or "door", and Salman al-Farsi as ma'na, or "meaning", with both Muhammad and Ali considered to be emanations of Salman al-Farsi. Each of these three is said to have been an incarnation of God. Ali, however, constitutes the most important part of this trinity. The Alawi testimony of faith is: `I have borne witness that there is no God but He, the most High, the object of worship [al-'Ali al-Ma'bud] and that there is no concealing veil (hijab) except the lord Muhammad, the object of praise, (as-Sayyid Muhmmad al-Mahmud), and there is not Bab except the lord Salman al-Farisi` The Nusairis believe in the subsequent incarnation of God in other persons after the passing of `Ali, Muhammad, and Salman al-Farisi...
--BoogaLouie (talk) 21:59, 19 December 2009 (UTC)
* Looks good, but for each individual controversial claim, it would be nice with at least two separate reliable sources. FunkMonk (talk) 10:26, 4 January 2010 (UTC)
Rewritten proposed rewrite
added some sources and qualified statements giving sources
* According to some sources, Alawis (or Nusairis) have integrated doctrines from other religions, in particular from Ismaili Islam and Christianity. According to scholar Cyril Glasse, it is thought that "as a small, historically beleaguered ethnic group", the Alawi "absorbed elements" from the different religions that influenced their area from Hellenistic times onward, while maintaining their own beliefs, and "pretended to adhere to the dominant religion of the age." Alawites are reported to celebrate certain Christian festivals, "in their own way", including Christmas, Easter, and Palm Sunday, and their religious ceremonies make use of bread and wine. Glasse writes that they also practice a religious feast called by the Persian name naw ruz.''
* ''Nusairis have much in common with the Ismailis in terms of overall beliefs, and they are sometimes regarded as "an offshoot of this group."
* According to scholar Umar F. Abd-Allah, a Alawite named Sulaiman al-Adni converted to Christianity and in 1863 compiled a book called Al-Bakurah as-Suliamaniya fi Kashf Asrar ad-Diyanah an-Nusairiyah or The First Fruits of Sulaiman in Revealing the Secrets of the Nusairi Religion. From this and other sources Abd-Allah concludes that Alawis, like the Ismailis and related groups, believe that the Shariah has both an esoteric, allegorical (Batini) meaning and an exoteric, literal (zahiri) meaning and that only the hidden meaning is intended. Alawis believe the exoteric meaning is known only to the Imams and later to the Bab and was hidden even to the Islamic prophet Muhammad himself. Only the Bab has access to this esoteric meaning in the absence of the Imam.
* Alawites believe in a "trinity" or "schema" of `Ain-Mim-Sin, which stands for `Ali, Muhammad, and Salman al-Farsi, the Persian Companion of Muhammad. Muhammad is known as ism, or "name", Ali as bab, or "door", and Salman al-Farsi as ma'na, or "meaning", with both Muhammad and Ali considered to be emanations of Salman al-Farsi. According to Abd-Allah, each of these three is said to have been an incarnation of God. Ali, however, constitutes the most important part of this trinity. The Alawi testimony of faith is: `I have borne witness that there is no God but He, the most High, the object of worship [al-'Ali al-Ma'bud] and that there is no concealing veil (hijab) except the lord Muhammad, the object of praise, (as-Sayyid Muhmmad al-Mahmud), and there is not Bab except the lord Salman al-Farisi` The Nusairis believe in the subsequent incarnation of God in other persons after the passing of `Ali, Muhammad, and Salman al-Farisi... -21 January 2010 BoogaLouie BoogaLouie (talk) 22:32, 30 January 2010 (UTC)
Section "Heterodox" devoid of actual content.
Are the (current or former) "heterodox" beliefs of this group still so secret that they can't be written down here? -- <IP_ADDRESS> (talk) 21:28, 11 March 2010 (UTC)
Australia
Australia has been in the infobox for a long time and has never been sourced, it should be removed if no one can provide sources for it. --Supreme Deliciousness (talk) 23:12, 24 March 2010 (UTC)
* I think there was a source, which broke. Anyway, I know for a fact that there is an Alawite community, and this I only say to encourage searching for proper sources, not as original research. FunkMonk (talk) 16:54, 25 March 2010 (UTC)
* In 2008 and 2007 it was unsourced: In 2006, 2005 and 2004 it wasn't in the article: In fact, it was you who added it, and it was unsourced from the beginning: I'm sure there are ‘Alawis in many countries around the world just like other Syrian sects but I don't think Australia is any different from any other country in this issue where Syrians have immigrated. --Supreme Deliciousness (talk) 17:14, 25 March 2010 (UTC)
* As I said, I thought there was one. And no, Australia is exceptional in having a very large population of recently arrived Lebanese, among them many Alawites. I dobn't care whether them mention stays, all I'm saying, as I made clear earlier, is that looking for sources wouldn't be in vain. There is an "Alawi Islamic Association Of Victoria", they might have some numbers. FunkMonk (talk) 17:32, 25 March 2010 (UTC)
* I have found two sources: Arab-Australians today: citizenship and belonging p40, - this book says ‘Alawis are 2% of the lebanese in Australia. And The Australian People: An Encyclopedia of the Nation, its People and their Origins p564, "The Alawi are a very small community". --Supreme Deliciousness (talk) 19:46, 25 March 2010 (UTC)
* If you feel that is too insignificant, remove it. But keep in mind how small the worldwide Alawite population is. FunkMonk (talk) 15:13, 26 March 2010 (UTC)
* No it shouldn't be removed but it should be sourced. If someone has the number for Lebanese in Australia, and we calculate 2% of that, we would have a number for the alawi population there. --Supreme Deliciousness (talk) 23:47, 26 March 2010 (UTC)
* This source from the 2006 census: says lebanese born in Australia are 74 848 people. The first book I mentioned from 2002 says 2% of lebanese born Australians, so that would be around 1497 people. --Supreme Deliciousness (talk) 23:58, 26 March 2010 (UTC)
* That's only by birth, by ancestry it's 181,751, according to the source on the Lebanese Australian page. FunkMonk (talk) 00:02, 27 March 2010 (UTC)
* In your edit: You should have written 2% of Lebanese born Australians, instead of Lebanese Australians. The book says Lebanese born, if you count all Lebanese Australians its maybe not 2%. --Supreme Deliciousness (talk) 00:16, 27 March 2010 (UTC)
Requested move 3
<div class="boilerplate" style="background-color: #efe; margin: 2em 0 0 0; padding: 0 10px 0 10px; border: 1px dotted #aaa;">
The result of the move request was: page moved. Vegaswikian (talk) 01:43, 15 April 2010 (UTC)
‘Alawi → Alawi — Relisted.-- Peter <b style="color:#02b;">Symonds</b> ( talk ) 12:00, 7 April 2010 (UTC)
The most problematic thing about this article is that it was moved to the current, non-consensus title. If "Alawi" is the way to go, please at least move it there, don't keep it at ‘Alawi, which is hardly used by anyone. FunkMonk (talk) 18:24, 29 March 2010 (UTC)
* I would support that move. Yazan (talk) 15:22, 26 March 2010 (UTC)
* Oppose No case has been made that overrides the decision in 2009. Verifiable evidence was then produced of the use of 'Alawi in recent prose. No such case has been made for the proposed move. Whining about the original move being made without discussion is not an argument to revert. Editors are encouraged to be bold, and make the move unless they think it will be controversial. If you want it moving back, produce evidence of the use of Alawi in recent English prose. Skinsmoke (talk) 02:24, 7 April 2010 (UTC)
* You're confusing it. Yes, it was argued that Alawi was common use, not 'Alawi (notice the sign in front of it). This is not about moving the article back to Alawite, but to Alawi. The ' sign is not commonly used. FunkMonk (talk) 14:13, 7 April 2010 (UTC)
* So produce some examples then. Skinsmoke (talk) 15:27, 11 April 2010 (UTC)
* Are you paying attention?! Do I really have to summaris the old discussion? Ok, first, this article was moved to 'Alawi (notice the sign in front of it) from Alawite. Then we had a discussion about whether Alawite of Alawi (notice that there is no sign in front of the word) was the most common name. After that discussion, even the editor who moved the article to 'Alawi agreed that Alawi (without the sign) was more common. So you're completely missing the point.
* 'Alawi is less common than Alawi (hardly used by anyone who are not specifically trying to convey how the word is pronounced), just like 'Ali is less common than Ali. In fact, if you search for 'Alawi on Google, only sites the spelling Alawi comes up, apart from this site of course. FunkMonk (talk) 15:45, 11 April 2010 (UTC)
* Comment Shouting louder and being a patronising git is never a good way of convincing people. If what you say is true, then it shouldn't be too hard for you to produce examples of use in English prose. You are the one proposing the change: it is up to you to convince other users. Constantly repeating that something is the case, without producing a shred of evidence to back up your assertion, is just not good enough. Go on, convince me. I am quite open to a reasoned argument, you know. Skinsmoke (talk) 17:35, 13 April 2010 (UTC)
* Evidence (of Alawi without the character ') is provided in the former discussions, that's why I get annoyed. There is no reason to repeat them. Anyway: http://www.google.dk/#hl=da&safe=off&q=%27alawi+syria&meta=&aq=f&aqi=g1&aql=&oq=&gs_rfai=&fp=bb0346e080fe6bae No '. And see below when it comes to special characters. FunkMonk (talk) 19:01, 13 April 2010 (UTC)
* Support. Please, if WP:UE is going to be ignored as in previous discussions then at least begin the title with a letter of the alphabet per WP:TITLE: Special characters and formatting. — AjaxSmack 08:10, 13 April 2010 (UTC)
Alawis and women
I have heard that some Alawis, most notably the Syrian president, believe that women have no souls. Could this be put into the article? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 04:03, 30 December 2010 (UTC)
* What you "have heard" is irrelevant. FunkMonk (talk) 21:10, 25 April 2011 (UTC)
There are sources for that they don't believe women have souls:
* "The 'Alawi woman who, according to their religion, does not possess a soul, has a lower status than the women of most of the communities of the Arab countries."
* "more peculiar Alawite beliefs is that women do not possess souls"
* "Their women are not admitted to religious rites and are not regarded as possessing souls." --Supreme Deliciousness (talk) 08:45, 8 May 2011 (UTC)
* Most info like this is based on research done in the early 20th century when an Alawite published some holy texts. Alawite women are by no means treated badly today, they're arguably treated better than other Arab women. FunkMonk (talk) 11:29, 8 May 2011 (UTC)
* Their treatment has nothing to do with that they don't believe women have souls.--Supreme Deliciousness (talk) 13:55, 8 May 2011 (UTC)
* But that's what's stated in at least one those sources. FunkMonk (talk) 13:59, 8 May 2011 (UTC)
* The "lower status" the first source speaks about could be about something else not related to souls.--Supreme Deliciousness (talk) 17:33, 8 May 2011 (UTC)
Sorry, but is it Wiki policy to leave something out of an article because the editor of the article feels it is embarrassing towards his self-admitted sect? What does the treatment of women have anything to do with what is being discussed here? The sources, one of which dates back less than 10 years, tell us that the Alawi faith believes women do not have souls. What exactly is your reason for refusing to add this to the article, other than personal feelings and motives? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:37, 4 October 2012 (UTC)
Syncretic
are Alawis syncretic? -- নাফী ম. সাধ nafSadh talk 07:41, 25 April 2011 (UTC)
* To some extend, but what is the source for them being "mystical"? FunkMonk (talk) 21:12, 25 April 2011 (UTC)
Alevis
Speaking as a completely uninformed lay reader, could someone please clean up the references to Alevis in the first two sections (Population and Name)? They're a mess. Pdronsard (talk) 02:48, 23 July 2011 (UTC)
* Problem is someone keeps writing they're the same, which they are not. FunkMonk (talk) 09:35, 30 July 2011 (UTC)
Lede
Avaya1g, why wont you discuss changes to the lede? Per WP:LEAD, we should cover the most important aspects in the lede, but you keep adding its possible origins. The origins of Alawi is already discussed in the history section. By the way, that very source you presented says "Alawis present themselves as normal Shias". That in itself makes your reference also supports my version. Wikipedia should present religions how they present themselves, not how others represent them. Pass a Method talk 12:36, 10 February 2012 (UTC)
* Hi Pass a Method - why did you put the 3RR warning on my page? The lead can mention that, I don't object to it. The important point that I was reverting in the last edit was the deletion of 'esoteric'. The Alawi's esoteric hermeneutics of the Quran is one of the most distinguishing features of the religion, as noted by all the sources or books about the subject. So it is included at the top by WP:VNT. Avaya1 (talk) 01:51, 11 February 2012 (UTC)
* I asked you to discuss the edit, but you did not, even though you've been reverted by two editors. That behavior is counter to wikipedia policy. Since you changed a long-standing version of the lede, the onus is on you to explain yourself - which you didn't. I would like you to self-revert, but i dont mind the esoteric part in the lede. Pass a Method talk 07:49, 11 February 2012 (UTC)
* I said feel free to edit constructively. I don't see why you would blanket revert the multiply-sourced material from the lead, but why not add to it, for example the quote "Today in Turkey and Syria, the Alawis try to present themselves to their Sunni compatriots as "normal" Shiites, not as some special sect". Also could mention some distinguishing features, as per WP:Lead. Avaya1 (talk) 01:04, 12 February 2012 (UTC)
* The first paragraph is supposed to contain the most important material. You removed the most important material and replaced it with the history of Alawis. Are you going to self-revert or not? because you have been reported to WP:AN3 Pass a Method talk 02:09, 12 February 2012 (UTC)
Blogs
The label on the top is not what determines whether or not an item is RS. The question is whether or not the writing is under the editorial of a publisher: ''"Blogs" in this context refers to personal and group blogs. Some news outlets host interactive columns they call blogs, and these may be acceptable as sources so long as the writers are professional journalists or are professionals in the field on which they write and the blog is subject to the news outlet's full editorial control.'' (WP:SPS). The fact that this group was once considered non-Muslim, but is now Shiite, certainly seems lead-worthy. Kauffner (talk) 13:41, 14 February 2012 (UTC)
* There are 2 other problems with your edit
* 1) You spelled it shiite, even though WP consensus decided to spell it as Shia (see Shia talk page)
* 2) Its repetitive. The information you added was already mostly covered in the previous edit. Pass a Method talk 14:12, 14 February 2012 (UTC)
Orphaned references in Alawi
I check pages listed in Category:Pages with incorrect ref formatting to try to fix reference errors. One of the things I do is look for content for orphaned references in wikilinked articles. I have found content for some of Alawi's orphans, the problem is that I found more than one version. I can't determine which (if any) is correct for this article, so I am asking for a sentient editor to look it over and copy the correct ref content into this article.
Reference named "Moubayed":<ul> <li>From Saleh al-Ali: </li> <li>From Ali Aslan: </li> </ul>
I apologize if any of the above are effectively identical; I am just a simple computer program, so I can't determine whether minor differences are significant or not. AnomieBOT ⚡ 08:19, 9 May 2012 (UTC)
Source?
http://www.jewishideasdaily.com/content/module/2012/1/20/main-feature/1/whither-the-alawites/r I read most of the above (JID) and skimmed the current WP article. The author (whom I personally know to be thorough and reliable,) brings some points I don't see here. It may be worthwhile sifting through JID and finding other verifiable sources to back them up, for inclusion here.
* Many misconceptions stemming from early Western literature basically based on hearsay is still circulated today. Therefore controversial claims need exceptional, scholarly sourcing, not just news articles. FunkMonk (talk) 10:25, 10 June 2012 (UTC)
Edit request: Lebanon/Golan Heights (in Infobox)
Although there is "Lebanon" in the infobox, what about the other "Lebanon/Golan Heights" section? Where is Israil? Is Golan not Israeli occupied Syrian territory? Please edit (correct) or explain... --E4024 (talk) 13:52, 29 July 2012 (UTC)
* Then it should be Lebanon/Syria, not Israel. It is much less controversial as is. FunkMonk (talk) 14:36, 29 July 2012 (UTC)
"Where is Israil" ??.. Nowhere, as Ghajar is not located in Israel. --Supreme Deliciousness (talk) 16:37, 29 July 2012 (UTC)
* I took the below text ("Al-Ghajar" section) from the Golan Heights article. The text made me think, "Where is Israel in this, Alawi article?" (Dark letters in the below quoted text are mine.)
Quote "Al-Ghajar Overlooking Al Ghajar village Al Ghajar village is another complex border issue west of Shebaa farms. Before the 1967 war this Allawite village was in Syria. It is divided by an international boundary, with the northern part of the village on the Lebanese side since 2000. Residents of both parts hold Israeli citizenship, and in the northern part often a Lebanese passport as well. Today the entire village is surrounded by a fence, with no division between the Israeli and Lebanese sides. There is an Israeli army checkpoint at the entrance to the village from Israel." Unquote --E4024 (talk) 17:17, 29 July 2012 (UTC)
* The quote contained inaccuracy's and it has now been corrected by me at the Golan Heights article. --Supreme Deliciousness (talk) 17:51, 29 July 2012 (UTC)
* Therefore my Edit Request served something. It makes me happy... --E4024 (talk) 17:54, 29 July 2012 (UTC)
Alawite map
for the map, please see File:Alawite distribution explained.png and http://commons.wikimedia.org/wiki/File_talk:Alawite_distribution_explained.png Moester101 (talk) 23:06, 21 August 2012 (UTC)
* That is not a "source", that is original research. FunkMonk (talk) 23:19, 21 August 2012 (UTC)
* What do you mean "original research"? I clearly posted all my sources on the link on the right. Apparently you only bothered to look at the first link. And besides, your image is extremely inaccurate, for example it shows Afrin district (kurdish) and Qusair district (sunni) as being alawite, not to mention a lot of other places!! lol are you kidding me bro? If you don't like my image, then at least don't show any images at all b/c yours is misleading to make it look like all northwestern Syria is somehow Alawi, and its not! Moester101 (talk) 23:27, 21 August 2012 (UTC)
* You've used Wikipedia as source for Wikipedia, are you kidding? Read WP:OR and WP:SYNTH. The map I created at least reflects the sources used in its creation. FunkMonk (talk) 23:35, 21 August 2012 (UTC)
* You keep claiming that my sources don't match my map, but if that was true then I wouldn't bother making the map in first place. Not my fault you can't see how my map draws from my sources, which are far more numerous and accurate than yours. My map is not original research, it has a lot more sources than yours. And WP articles used are sourced themselves. Your map is inaccurate, it overexaggetes Alawi distribution. Cheers Moester101 (talk) 00:14, 22 August 2012 (UTC)
* As mentioned elsewhere, text should not be used as source for such maps, only other published maps. Furthermore, there is no excuse at all for using Wikipedia as a source. Your map is simply unreliable. The map I made does not exaggerate anything it simply reflects the published maps. FunkMonk (talk) 00:19, 22 August 2012 (UTC)
* Most published maps I've see about Syria's demography are produced by journalists or outside observers who base their map on a statement they've heard such as "northwestern Syria is alawite" which is very vague and only half true. Few maps are actually based on studies and research. You yourself should know that a lot of the places on your map that are labeled as alawi are actually not, and you know that. Not to mention, your map makes it look like the green area is 100% Alawi, whereas my map is more specific by saying when they have a simple majority versus when they are a significant minority in a certain area (this is another reason why I think that my map is more accurate on the micro-level) Moester101 (talk) 01:06, 22 August 2012 (UTC)
Both maps are inaccurate although Moester101's is nicer looking. Mouester, you have Hatay province as predominantly Alawi and it's not. 1.5 million residents (the majority over the Greek Orthodox minority) are Muslim of which about half are Alawi. According to your own legend the Hatay province should be cross-hatched green as an Alawi significant minority not solid green as a dominant population. Why a minority? Because if you add the numbers of Sunni and Greek Orthodox population together they outnumber Alawi. With the flood of another 30k Sunni refugees and more on their way the disparity grows. If this civil war resolves itself into a Alawite State emerging and migration of Alawites out of Damascus and other regions of Syria then your map will again have to change. <IP_ADDRESS> (talk) 02:32, 23 August 2012 (UTC) Funkmonk's concept is simpler to maintain as just a shaded region of Alawites in significant numbers (1 or 2% or greater) but the boundaries of the map are obviously inaccurate. Neither of you own this page so put your egos aside and work together on a single map and give credit to both of you. I'd go with the single distribution concept because over the next couple years it will be easier to maintain. <IP_ADDRESS> (talk) 02:36, 23 August 2012 (UTC)
* Here is another map that doesn't show the weird holes: http://online.wsj.com/article/SB10000872396390444506004577617420413468652.html FunkMonk (talk) 22:50, 29 August 2012 (UTC)
* This gives some insight into how the Moester map was created, which is somewhat iffy. Too much original research. FunkMonk (talk) 19:13, 14 October 2012 (UTC)
Alevis are not Alawis
Just for the record. Any equation of the two is erroneous and will be reverted. FunkMonk (talk) 22:04, 1 October 2012 (UTC)
Alawi or Alawite?
This article was moved to "Alawi" some time back for some shaky reasons. Now with all the media attention, what is actually most commonly used? If "Alawite", it should be moved back. FunkMonk (talk) 19:16, 14 October 2012 (UTC) | WIKI |
Moderate-severe primary graft dysfunction after pediatric heart transplantation
Katie L. Mowers, Kathleen E. Simpson, Avihu Z. Gazit, Pirooz Eghtesady, Charles E. Canter, Chesney D. Castleberry
Research output: Contribution to journalArticlepeer-review
4 Scopus citations
Abstract
Background: PGD is a complication after heart transplantation (OHT) and a significant cause of mortality, particularly in infant recipients. Lack of standardized definition of PGD in the pediatric population makes the prevalence and magnitude of impact unclear. Methods: ISHLT PGD consensus guidelines, which include inotrope scores and need for MCS, were applied retrospectively to 208 pediatric OHT recipients from a single institution from 1/2005-5/2016. PGD was defined as: moderate PGD—inotrope score >10 on postoperative day 1 (24-48 hours), and severe PGD—MCS within 24 hours (in the absence of detectable rejection). Results: PGD occurred in 34 patients (16.3%); 14 of which had severe PGD (6.7%). Multivariate risk factors for PGD included CPB time (OR 10.3/10 min, 95% 10.05, 10.2, P = 0.03), Fontan palliation (OR 1.9, 95% 1.2, 3.97), and PCM (OR 5.65, 95% 1.52, 22.4); but not age, weight, ischemic time, or donor characteristics. Upon sub-analysis excluding patients with PCM, increased CPB was a significant multivariate risk factor (OR 10.09, 95% 9.89, 10.12, P = 0.003). Patients with PGD had decreased discharge survival compared to those without PGD (85% vs 96%, P < 0.01). Severe PGD was associated with the poorest 1-year survival (57% vs 91% without PGD, P = 0.04). Conclusion: Patients with prolonged CPB are potentially at risk for developing PGD. Neither infant recipients nor donor characteristics were associated with an increased risk of PGD in the current era.
Original languageEnglish
Article numbere13340
JournalPediatric transplantation
Volume23
Issue number2
DOIs
StatePublished - Mar 2019
Keywords
• PGD
• pediatric heart transplantation
Fingerprint
Dive into the research topics of 'Moderate-severe primary graft dysfunction after pediatric heart transplantation'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
How much do rack and pinions cost?
How much do rack and pinions cost?
The average cost for rack and pinion replacement is between $1,571 and $1,657. Labor costs are estimated between $331 and $417 while parts are priced at $1,240. This range does not include taxes and fees, and does not factor in your specific vehicle or unique location.
How much does a steering rack replacement cost?
You will pay anywhere from $640 to $1,200 for steering rack replacement. The labor will likely be between $280 and $360, while parts should be between $350 and $830. The wide range of prices on parts comes down to the different types of cars this replacement could be performed on.
Do rack and pinions go bad?
Rack & Pinion units can be broken, but they can wear out too. The gears are constantly engaged while steering and the wear and tear on metal leads to loose fittings. Bushings and bearings wear out which allows more slippage and looser engagement. Power steering may begin to loose fluid through leaks.
How much does it cost to replace a rack and pinion seal?
The average cost for pinion seal replacement is between $229 and $276. Labor costs are estimated between $170 and $214 while parts are priced between $60 and $62. This range does not include taxes and fees, and does not factor in your specific vehicle or unique location. Related repairs may also be needed.
Can you drive with a broken steering rack?
It is definitely not safe to drive with a bad rack and pinion because you no longer can control your vehicle and keep it in a straight line. There would be so much free play and your vehicle would just wander on the road. This could be very dangerous for you and the other drivers.
How much does a rack and pinion replacement cost?
“ Rack and Pinion Steering ” (CC BY 2.0) by Ryan Frost How much does the typical rack and pinion replacement cost? The price of the repair can be anywhere from $350 to $1,800, depending on the cost of the new rack and pinion, the car’s make/model, and the time spent by the mechanic to do the repair.
How much does it cost to replace a rear pinion seal?
On average for most vehicles, it costs about $120 to replace a rear pinion seal. The cost does vary depending on the type of vehicle and model, the type of parts to be used, and the labor charge which is dependent on the location and skills of the auto shops.
Which is better to replace rack or pinion steering?
The benefit of replacing rack and pinion steering over having it repaired is that it’s more cost effective and a far easier job. If there’s an option to replace a damaged rack rather than have it repaired, most mechanics will recommend the replacement over the repair.
What to do about a rack and pinion leak?
You can simply and quickly restore the seals in your rack and pinion without ever removing it. Adding BlueDevil Power Steering Stop Leak to your power steering reservoir today will start to seal your power steering leaks immediately and is guaranteed to permanently seal your rack and pinion leak within a few days of driving.
“ Rack and Pinion Steering ” (CC BY 2.0) by Ryan Frost How much does the typical rack and pinion replacement cost? The price of the repair can be anywhere from $350 to $1,800, depending on the cost of the new rack and pinion, the car’s make/model, and the time spent by the mechanic to do the repair.
The benefit of replacing rack and pinion steering over having it repaired is that it’s more cost effective and a far easier job. If there’s an option to replace a damaged rack rather than have it repaired, most mechanics will recommend the replacement over the repair.
How much does it cost to replace a Toyota steering rack?
A factory rack costs about $751, and a Maval remanufactured rack costs about $440. This makes the job about $1200 using OE parts, or about $890 using aftermarket parts. For a 2004 Toyota Sienna with a 3.3 liter engine, the labor time to replace the rack and pinion is 3.6 hours. A factory rack costs about $702, or a new AAE rack costs about $381.
How to know if your rack and pinion has gone bad?
Tips to know: If you find the steering is jerky or it’s hard to maneuver, there’s a good chance this part has gone bad. Other symptoms may include a reduced ability to turn or a lot of noise when turning the wheel. Most drivers are able to feel a difference as they turn in opposite direction. | ESSENTIALAI-STEM |
Cell transplantation preserves matrix homeostasis: a novel paracrine mechanism
J Thorac Cardiovasc Surg. 2005 Nov;130(5):1430-9. doi: 10.1016/j.jtcvs.2005.05.055. Epub 2005 Oct 13.
Abstract
Objectives: Cell transplantation prevents chamber dilatation, but the underlying molecular mechanisms remain undefined. Structural cardiac remodeling involves matrix degradation from an imbalance of matrix metalloproteinases (MMP) relative to endogenous tissue inhibitors of metalloproteinases (TIMP). We aimed to determine the capacity of cell transplantation to alter extracellular matrix in the failing heart and, in so doing, identify novel paracrine molecular mediators underlying the beneficial effects of cell transplantation on chamber dilatation.
Methods: Smooth muscle cells were transplanted to the dilating left ventricle of cardiomyopathic hamsters (CTX, n = 15) compared with age-matched media-injected cardiomyopathic (CON, n = 15) and normal hamsters (n = 7). After 5 weeks, left ventricular volume was measured by computerized planimetry. Fibrillar collagen was examined by confocal microscopy. Matrix homeostasis was quantified by measuring MMP/TIMP expression/activity relative to myocardial collagen synthesis (14C-proline uptake).
Results: Left ventricular dilatation was attenuated in CTX hearts (P = .02). CTX restored perimysial collagen fiber content and architecture to normal levels. TIMP-2 and TIMP-3 expression were enhanced in CTX (TIMP-2, 195% +/- 42% of CON, P = .02; TIMP-3, 118% +/- 3% of CON, P = .002), and correspondingly, gelatinase MMP-2 activity was reduced (P < .05). The TIMP:MMP ratio was increased in CTX hearts (TIMP-2 to MMP-2, 410% +/- 134% of CON, P = .04, and TIMP-3 to MMP-9, 205% +/- 47% of CON, P = .03), reflecting a reduced capacity for matrix degradation. Collagen synthesis was equivalent (CTX vs CON), suggesting that restored matrix architecture was a function of attenuated matrix degradation.
Conclusions: These data provide the first evidence that cell transplantation limits ventricular dilatation in the failing heart through a paracrine-mediated mechanism that preserves extracellular matrix homeostasis.
Publication types
• Research Support, Non-U.S. Gov't
MeSH terms
• Animals
• Cardiomyopathies / surgery*
• Cell Transplantation*
• Cricetinae
• Extracellular Matrix / physiology*
• Homeostasis
• Matrix Metalloproteinases / biosynthesis
• Muscle, Smooth / cytology*
• Paracrine Communication*
Substances
• Matrix Metalloproteinases | ESSENTIALAI-STEM |
TypeError: can’t concat str to bytes
Have you ever encountered a TypeError: can’t concat str to bytes error?
If so, you’re not alone. This is a common error that occurs when you try to concatenate a string with a byte object. In this article, we’ll take a look at what this error means and how you can fix it.
We’ll start by discussing what strings and bytes are, and how they’re different. Then, we’ll look at the specific error message that you might see when you try to concatenate a string with a byte object. Finally, we’ll show you how to fix this error by converting the byte object to a string.
By the end of this article, you’ll have a solid understanding of what this error means and how to fix it. So let’s get started!
| Column 1 | Column 2 | Column 3 |
|—|—|—|
| Error message | TypeError: can’t concat str to bytes | The error occurs when you try to concatenate a string with a byte object. |
| Cause | The cause of the error is that strings and bytes are different data types. Strings are made up of characters, while bytes are made up of binary data. When you try to concatenate a string with a byte object, the Python interpreter cannot convert the byte object to a string, and the error is raised. |
| Solution | The solution to the error is to convert the byte object to a string before concatenating it with the string. You can do this using the `str()` function. For example, the following code would work:
>>> str(byte_object) + “string”
‘string’
In Python, a TypeError occurs when an operation is attempted between two objects of incompatible types. For example, you cannot add a string to a number, or a list to a dictionary.
The error message for a TypeError typically includes the following information:
• The type of the first object
• The type of the second object
• The operation that was attempted
For example, the following code will generate a TypeError:
python
>>> ‘hello’ + 123
TypeError: can’t concat str to int
What is the cause of the TypeError “can’t concat str to bytes”?
The TypeError “can’t concat str to bytes” occurs when you try to concatenate a string to a bytes object. This is because strings and bytes are two different data types in Python. Strings are sequences of characters, while bytes are sequences of bytes.
When you try to concatenate a string to a bytes object, Python will attempt to convert the string to bytes. However, if the string contains any characters that are not valid bytes, the conversion will fail and a TypeError will be raised.
For example, the following code will generate a TypeError:
python
>>> b’hello’ + ‘world’
TypeError: can’t concat str to bytes
The reason for this error is that the string ‘world’ contains the character ‘w’, which is not a valid byte.
How to avoid the TypeError “can’t concat str to bytes”?
There are a few ways to avoid the TypeError “can’t concat str to bytes”.
* **Use the `str.encode()` method to convert the string to bytes.** This method will convert the string to a byte string using the specified encoding.
* **Use the `bytes.decode()` method to convert the bytes object to a string.** This method will convert the bytes object to a string using the specified encoding.
* **Use the `+=` operator to concatenate the string and bytes object.** This operator will automatically convert the string to bytes if necessary.
For example, the following code will avoid the TypeError:
python
>>> b’hello’ + b’world’
b’helloworld’
python
>>> ‘hello’.encode(‘utf-8′) + b’world’
b’helloworld’
python
b’hello’ += ‘world’
b’helloworld’
The TypeError “can’t concat str to bytes” occurs when you try to concatenate a string to a bytes object. This is because strings and bytes are two different data types in Python. To avoid this error, you can use the `str.encode()` method to convert the string to bytes, the `bytes.decode()` method to convert the bytes object to a string, or the `+=` operator to concatenate the string and bytes object.
3. How can you fix the TypeError “can’t concat str to bytes”?
The TypeError “can’t concat str to bytes” occurs when you try to concatenate a string (str) to a bytes object (bytes). This is because strings and bytes are different data types and cannot be combined.
To fix this error, you can either convert the string to bytes or the bytes object to a string.
To convert a string to bytes, you can use the `bytes()` function. For example:
python
>>> str = “hello world”
>>> bytes = bytes(str, “utf-8”)
>>> print(bytes)
b’hello world’
To convert a bytes object to a string, you can use the `str()` function. For example:
python
>>> bytes = b’hello world’
>>> str = str(bytes, “utf-8”)
>>> print(str)
hello world
Once you have converted the data types, you can concatenate them together without any errors.
Here is an example of how to fix the TypeError “can’t concat str to bytes”:
python
>>> str = “hello world”
>>> bytes = b’hello world’
>>> str_bytes = bytes + str.encode(“utf-8”)
>>> print(str_bytes)
b’hello worldhello world’
4. Examples of the TypeError “can’t concat str to bytes”
Here are some examples of the TypeError “can’t concat str to bytes”:
• `str + bytes`: This will cause a TypeError because you cannot concatenate a string to a bytes object.
• `bytes + str`: This will also cause a TypeError because you cannot concatenate a bytes object to a string.
• `str.join(bytes)`: This will cause a TypeError because you cannot use the `join()` method on a bytes object.
• `bytes.join(str)`: This will also cause a TypeError because you cannot use the `join()` method on a string.
Here is an example of how to fix these errors:
python
>>> str = “hello world”
>>> bytes = b’hello world’
>>> str_bytes = bytes + str.encode(“utf-8”)
>>> print(str_bytes)
b’hello worldhello world’
In this example, we first convert the string to bytes using the `bytes()` function. Then, we concatenate the bytes object to the string using the `+` operator. This results in a bytes object that contains the contents of both the string and the bytes object.
You can also use the `str()` function to convert a bytes object to a string. This will allow you to concatenate the bytes object to a string without any errors.
Here is an example of how to do this:
python
>>> bytes = b’hello world’
>>> str = str(bytes, “utf-8”)
>>> print(str)
hello world
In this example, we first convert the bytes object to a string using the `str()` function. Then, we print the string. This results in the output “hello world”.
Q: What does the error “TypeError: can’t concat str to bytes” mean?
A: This error occurs when you try to concatenate a string with a byte object. Strings and bytes are two different data types, and they cannot be combined. To fix this error, you need to convert one of the values to the other data type.
Q: How can I convert a string to bytes?
A: You can convert a string to bytes using the `bytes()` function. The `bytes()` function takes a string as its argument and returns a byte object. For example:
>>> bytes(“hello world”)
b’hello world’
Q: How can I convert a byte object to a string?
A: You can convert a byte object to a string using the `str()` function. The `str()` function takes a byte object as its argument and returns a string. For example:
>>> str(b’hello world’)
‘hello world’
Q: What are some common causes of the “TypeError: can’t concat str to bytes” error?
A: There are a few common causes of the “TypeError: can’t concat str to bytes” error.
• Misusing the `+` operator. The `+` operator can be used to concatenate strings, but it cannot be used to concatenate strings and bytes. To concatenate a string with a byte object, you need to use the `bytes()` function or the `str()` function.
• Using the wrong data type. When you are working with strings and bytes, it is important to make sure that you are using the correct data type. Strings are represented by the `str` type, and bytes are represented by the `bytes` type. If you try to use a string where a byte object is expected, or vice versa, you will get the “TypeError: can’t concat str to bytes” error.
• Invalid input. The `bytes()` function can only be used to convert strings that contain valid characters. If you try to convert a string that contains invalid characters, you will get the “TypeError: can’t concat str to bytes” error.
Q: How can I avoid the “TypeError: can’t concat str to bytes” error?
A: To avoid the “TypeError: can’t concat str to bytes” error, you can follow these tips:
• Use the `bytes()` function or the `str()` function to convert strings and bytes to the correct data type.
• Make sure that you are using the correct data type for your variables.
• Validate your input before using the `bytes()` function.
By following these tips, you can avoid the “TypeError: can’t concat str to bytes” error and ensure that your code is running correctly.
In this blog post, we discussed the TypeError: can’t concat str to bytes error. We first explained what this error is and what causes it. Then, we provided some tips on how to avoid this error. Finally, we concluded by summarizing the key takeaways from this blog post.
Key takeaways:
• The TypeError: can’t concat str to bytes error occurs when you try to concatenate a string with a byte object.
• This error can be avoided by casting the byte object to a string before concatenating it with the string.
• You can also avoid this error by using the `io.BytesIO()` object to create a byte stream.
We hope that this blog post has been helpful in understanding the TypeError: can’t concat str to bytes error. If you have any other questions, please feel free to leave a comment below.
Author Profile
Marcus Greenwood
Marcus Greenwood
Hatch, established in 2011 by Marcus Greenwood, has evolved significantly over the years. Marcus, a seasoned developer, brought a rich background in developing both B2B and consumer software for a diverse range of organizations, including hedge funds and web agencies.
Originally, Hatch was designed to seamlessly merge content management with social networking. We observed that social functionalities were often an afterthought in CMS-driven websites and set out to change that. Hatch was built to be inherently social, ensuring a fully integrated experience for users.
Now, Hatch embarks on a new chapter. While our past was rooted in bridging technical gaps and fostering open-source collaboration, our present and future are focused on unraveling mysteries and answering a myriad of questions. We have expanded our horizons to cover an extensive array of topics and inquiries, delving into the unknown and the unexplored.
Similar Posts | ESSENTIALAI-STEM |
If you have ever looked at the Task Manage, then there is a high chance that you have noticed something called “Windows Audio Device Graph Isolation”. And in case if you are wondering what is windows audio device graph isolation, then I am here to help you out.
In this article, I will be talking about what is windows audio device graph isolation what it does. So you can get a clear idea about it. So let’s just head into the topic without wasting much of the time:
What is windows audio device graph isolation?
windows audio device graph isolation
Well, Windows Audio device graph isolation high cpu is an official part of the Windows components. The process serves as the primary audio engine in Windows 10. And it handles all the digital signal process. It also includes the advanced audio enhancements effects provided by Windows.
Windows Audio Device Graph Isolation is separated from the standard Windows Audio service. And isolating the service just like this, allows the developers of hardware and audio products to include their own audio enhancement service without having to replace the Windows audio serve. Even, it leads to better stability.
Windows audio is deeply installed within the Windows ecosystem. And a crash can often take down the whole system. Instead of the just sound part. But by isolating the digital signal processing the part more likely to experience a crash to a separate service.
Also, this type of isolation ensures that Windows is always providing you a way to turn off audio enhancement in the OS. And it does not matter what type of hardware you are using.
Also, you should note that with some audio hardware, manufactures may actually replace the “Windows Audio Graph Isolation” with their own digital signal processing service. Also, if you do not have the Windows Audio Device Graph Isolation running on your system, you won’t have much need to troubleshoot it.
Why Does It Sometimes Consume So Many System Resources?
One of the main reasons why it consumes so many system resources is because of the poorly written audio enhancements. Drivers can cause more than just the occasional crash. Also, some people have faced issues with enhancements causing significantly higher use of system resources. As a result, it consumes more of your CPU or memory power, even your hard drive too.
windows audio device graph isolation high cpu
Also, under normal conditions, you should see “Windows Audio Device Graph Isolation” using 0% of your CPU, minimal memory, and no disk activity. However, the numbers might get changed when audio effects are being applied. But not that much, and they should return to the baseline quickly.
If you see the Windows Audio device graph, isolation routinely is using too much CPU memory or disk space. And there is a high chance that there is a problem. However, the good part is that it is easy to resolve.
And you can do it by using the software your hardware manufacturer is providing you. And see if you get any option to disable some of the advanced audio effects. You can also do it right in Windows for devices that support it.
For this, you will have to open up the sound properties from your computer by right-clicking the speaker icon in your Notification area.
And then click on the sound option. Even, you can also access sound properties from the Control Panel and run the Sound applet there.
Once the sound option pops up, simply go to Playback. And then select the device that you think is causing the issue. And then go to the properties.
On the Enhancements tab of the device’s Properties dialog, you will get to see a list of enhancement supported by the device. Also, what you see depends entirely on the device you’re using.
Also, if disabling all the enhancements does not fix the problem for you. Then you can know you are on the right track. And you can now try disabling each specific enhancement to narrow down the cause. If disabling all the enhancements for a device doesn’t solve your problem, then you should re-enable them and move on to test another device.
Can I Disable It?
Well, you cannot really disable the Windows Audio Graph Isolation option. As it is an integrated part of Windows. And in case if you disable it, you might not even get sound coming out from your computer. Also, you cannot temporarily disable it and end the task.
If you try to do so, Windows will pop up a notification asking if you’d like to open the Audio Troubleshooter instead. And as you already know that, troubleshooting in most of the cases does not work at all.
windows audio device graph isolation
Could This Process Be a Virus?
Could the Windows Audio Device Graph Isolation be a virus? As I have mentioned before that it is an official Windows component. So there is no chance that the Windows Audio Graph Isolation is a virus.
However, in case if you like to be sure, then you can go to Task Manager and then right click on Windows Audio Graph Isolation. After that, choose the File Location option.
And if you see that the file is stored in the Windows\System32 folder, then you should know that it is a genuine file and not a virus.
Final Words:
So that was all for your question what is Windows Audio Device Graph Isolation. I hope this has answered your question. Also, if you have any more questions to ask. Then do feel free to comment below.
Author | ESSENTIALAI-STEM |
Talk:Ethcathinone
Changed the number of carbon atoms in the 'chemical formula'.
The chemical formula written here implies that there are 13 carbon atoms, but I'm fairly certain it should be 11, so I changed it. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 09:24, 26 May 2010 (UTC) | WIKI |
Advanced Database Management System: Normalization Chapter 6 Quiz
ValuableRealism avatar
ValuableRealism
·
Start Quiz
Study Flashcards
10 Questions
What is the purpose of normalization in the context of database design?
To evaluate table structures and reorganize them to produce well-structured relations
Which property of a relation corresponds to the requirement that each row is unique?
The sequence of rows is insignificant
What type of anomaly occurs if a new course cannot be added to the table until at least one employee has enrolled for the course?
Insertion Anomaly
What type of constraint defines the type, length, format, and allowable values for individual data items?
Domain Constraints
What is the purpose of a foreign key in a relational database?
To establish a link between two tables based on a related field
Which of the following is NOT an objective of Chapter 6?
Explain the process of creating database tables.
What is a key reason for ensuring data normalization in database design?
To minimize the risk of inconsistent data and reduce unnecessary data redundancy.
What is the main purpose of describing individual attributes in greater detail in the conceptual design process?
To capture specific domain restrictions and changes over time for each attribute.
What is a common challenge in the design of databases related to business organizations?
Handling computed and summary data, and attributes with changing values over time.
Which concept is considered an important element of conceptual design in database management?
Data normalization
Study Notes
Database Design
• Normalization is a process in database design that ensures each piece of data is stored in one place and one place only to avoid data redundancy and inconsistencies.
Database Constraints
• The property that corresponds to the requirement that each row is unique is called entity integrity.
Anomalies in Database Design
• If a new course cannot be added to the table until at least one employee has enrolled for the course, it is an example of an insert anomaly.
Data Constraints
• Domain constraints define the type, length, format, and allowable values for individual data items.
Foreign Keys in Relational Databases
• A foreign key in a relational database is a field in a table that refers to the primary key of another table, creating a relationship between the two tables.
Objectives of Database Design
• One objective that is NOT an objective of Chapter 6 is minimizing data redundancy, as this is already achieved through normalization.
Importance of Data Normalization
• Ensuring data normalization in database design is crucial to minimize data redundancy and avoid data inconsistencies.
Conceptual Design Process
• Describing individual attributes in greater detail in the conceptual design process helps to clarify the meaning and scope of each attribute.
Database Design Challenges
• A common challenge in the design of databases related to business organizations is ensuring data accuracy and consistency.
Conceptual Design Elements
• Entity-relationship modeling is an important element of conceptual design in database management.
Test your knowledge of database normalization with this quiz covering Chapter 6 of the Advanced Database Management System. Assess your understanding of various normal forms, anomalies, and attribute domains.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free
More Quizzes Like This
Use Quizgecko on...
Browser
Browser | ESSENTIALAI-STEM |
College of Natural Sciences and Mathematics
BS Chemistry
Student Learning Outcomes
• Recognize that all matter is composed of atoms whose inherent periodic properties determine their interactions and combinations into compounds with specific molecular structure, chemical function and physical properties
• Explain the various ways that chemists represent and test chemical knowledge in models, theories, mathematical relationships and symbolic notations.
• Illustrate the principles of safe practices and ethical use of scientific knowledge, materials and procedures, and explain their impact on a diverse society.
• Demonstrate literacy in concepts underlying fundamental analytical instrumentation and instrumentation techniques used in chemistry and biochemistry.
• Discriminate between equlibrium and nonequilibrium systems using fundamental thermodynamic laws and kinetics.
• Demonstrate the ability to generate and collect data and information through designing and safely implementing hypothesis-driven experiments using contemporary methods and techniques.
• Analyze, interpret, and retrieve data and appropriate literature, to develop critical thinking and problem solving skills.
• Work effectively, independently and cooperatively to communicate data, concepts, skills and processes to experts and nonexperts in the field.
*Retrieved from Compliance Assist January 2, 2019. For the most up-to-date information, please contact the program. | ESSENTIALAI-STEM |
Crashtor Crashtor - 1 month ago 16
jQuery Question
Generate unique id for localstorage
I have built a expanding tree-list using bootstrap collapse. My first problem was having the browser remember the open/closed position of each item on page reload, and I went for storing each state in local storage.
This gave me the problem of each tree-item remembering each other's position so when I stored it as "open" and then refreshed - ALL tree's would expand to open state.
I am now trying to figure out how to generate a unique id for each item so that each collapsible tree-item will only remember the position of itself and not all.
But I'm not getting local storage to retrieve the right id for each item.
$(document).ready(function () {
$('.expand').click(function() {
//store the id of the collapsible element
var uniqueid = { 'one': 1, 'two': 2, 'three': 3 };
localStorage.setItem('uniqueid', JSON.stringify(uniqueid)); $(this).attr('href');
});
var collapseItem = localStorage.getItem('uniqueid');
if (collapseItem) {
$(collapseExample).collapse('show')
$('.expand').click(function() {
localStorage.removeItem('uniqueid' );
});
}
})
Here's the HTML
<div class="expand" data-toggle="collapse" href="#collapseExample" >
BUTTON</div>
<div class="collapse" id="collapseExample">
<div class="well">
SUB-TREE
</div>
</div>
JSfiddle
https://jsfiddle.net/g8y4xvf8/26/
Answer
Try below code on document ready
var getUniqueID = localStorage.getItem('uniqueid');
if( typeof getUniqueID == "string" )
{
var parsedUID = JSON.parse(getUniqueID);
if( parsedUID != "" && typeof parsedUID == "object" )
{
for( item in parsedUID )
{
if(parsedUID[item])
$( "#"+item+).collapse('show');
else
$( "#"+item+).collapse('hide');
}
}
}
$('.expand').click(function() {
//store the id of the collapsible element
var uniqueid = {};
$('.expand').each(function(){
var getID = $(this).attr('href').replace(/#/g,'');
uniqueid[getID] = $(this).hasClass('collapsed');
});
localStorage.setItem('uniqueid', JSON.stringify(uniqueid));
});
Comments | ESSENTIALAI-STEM |
Publishing return good (1) but not appear in webinterface in Dashboard
Hello yesterday everything work fine. Today events not appear in wen interface. It is some service problem?
I need a slightly more detailed explanation of the problem. What do you mean by “return good”? Is the device completely absent from the Console/Dashboard or is it simply offline?
device in deep sleep then wake up make sent = Particle.publish(“M”, stringOne); and it is return true.
if ( sent == true) Serial.println(“Publish good”);
I have in console Publish good. But event to appear in web dashboard.
Do you send your device back to sleep or disconnect from the cloud after that publish?
If so, you need to wait a few seconds after the publish to actually get delivered.
The return value of the call only tells you that the event was successfully queued but doesn’t tell you if it was already sent.
i can do this with delay(5000) in loop function after publish function calling. It is will be enough time to send in cloud?
5 sec should be enough.
Any other way to get ACK from cloud and be sure that it event delivered?
You could subscribe to your own event :slight_smile:
Currently self-subscribing seems to be the only way, but AFAIK there will be an enhancement in some future release where you can get some feedback about the delivery.
yes subscribe on my own will be good enough . Thank you. And another question why i can’t see event history in dashboard?
The dashboard only subscribes to your events and stores them on your machine while you are running it, there is no event store in the cloud yet.
i couldn’t help but notice the magic word ‘yet’!
are there plans to store event history in your cloud? currently i do this by pushing my events to pushbullet and processing from there.
Yes, there are plans. No, there’s no timeschedule for that yet, unfortunately. | ESSENTIALAI-STEM |
The 7 Best Growth Stocks for the Next 10 Years
InvestorPlace - Stock Market News, Stock Advice & Trading Tips
After a rough outing in 2022, many of the best growth stocks are trading at bargain valuations. In fact, some are offering what some would consider a once-in-a-lifetime opportunity. The S&P 500 currently sits at a price-earnings ratio just above 19 after peaking around 40. Furthermore, many companies are reporting better-than-expected profits and are increasing their bottom line through layoffs and improved headcount efficiency. Easing inflation should also help profits as consumers will be able to spend more on discretionary products. Thus, there’s limited downside to the market right now, even during a recession. With that in mind, the following seven growth stocks are bargains that won’t disappoint if you hold them for the next 10 years:
TSLA Tesla $189.98
FVRR Fiverr $43.98
NET Cloudflare $59.43
SQ Block $84.71
SHOP Shopify $52.93
ABNB Airbnb $118.70
PYPL PayPal $85.52
Best Growth Stocks: Tesla (TSLA)
Source: Khairil Azhar Junos/Shutterstock.com
Tesla (NASDAQ:TSLA) is growing so fast, it should carry a higher valuation. At the time of this writing, Tesla had a P/E ratio of 44.3x after bottoming out at $113. Despite this slight recovery, there is undoubtedly a long way to go for Tesla. The stock is a bargain at its current price, with solid earnings to boot.
In fact, the company saw a net income of $1.19, which was far better than expectations for $1.13 a share. All thanks to growing demand. Better, the company plans to produce about 1.8 million cars this year, up from about 1.37 million last year. CEO Elon Musk even said that orders were outpacing production two to one. Helping, analysts at Mizuho have a buy rating on the stock, with a price target of $252.
Best Growth Stocks: Fiverr (FVRR)
Source: TierneyMJ / Shutterstock
Next up on our list of best growth stocks is Fiverr (NYSE:FVRR). Sure, the company did have a bad downturn since early 2021 but is set to come back stronger as the burgeoning freelance market recovers. We also have to consider Fiverr’s customer retention is very impressive. The losses they are making now from their high marketing spend will pay off massively in the long run as these customers start spending more on the platform, something which the Fiverr business model is successfully achieving.
Finally, while there are competitors to Fiverr, such as Upwork (NASDAQ:UPWK), their businesses use a different model. On Upwork, you need to make a post, and freelancers can apply, whereas Fiverr offers you a portfolio of specialized freelancers you can choose from. The latter is more compelling and efficient.
Best Growth Stocks: Cloudflare (NET)
Source: Shutterstock
With cybersecurity needs on the rise, keep an eye on growth stocks, such as Cloudflare (NYSE:NET). The company offers a range of products and features that make it the perfect choice for businesses looking to increase their website’s security, performance, and reliability. Many websites use Cloudflare’s security protection against DDoS attacks, and the company’s Content Delivery Network (or CDN) to ensure fast loading times, which is essential for search engine optimization.
At one time, I was bearish on the NET stock, post-pandemic. However, the consistency of the business intrigues me, especially as it has consistently grown its top line by around 50% year-on-year, even as many companies took a sharp downturn as monetary policy changed. Cloudflare’s losses are also slowly narrowing, and once the business turns profitable, I see a solid upside.
Block (SQ)
Source: Wright Studio / Shutterstock.com
Block (NYSE:SQ) is a rapidly growing technology company with a portfolio of innovative products and services transforming fintech. The company’s stock is starting to see a steady increase in value, as revenues recover. Moreover, Block’s Cash App and Square are growing rapidly due to their functionalities. These digital payment solutions have seen a remarkable surge in popularity for both small and large businesses in recent years. With the rise of digital transactions, companies, and individuals are increasingly turning to these payment solutions, which are much more efficient than traditional methods.
As the world moves towards a more digital future, the demand for secure and efficient payment solutions will keep growing, making Block’s platforms an essential part of many businesses’ operations. Thus, we will likely see SQ stock trading at a much higher premium.
Shopify (SHOP)
Source: Burdun Iliya / Shutterstock.com
E-commerce stocks are also among the best growth stocks to consider. In fact, one of the top ones is Shopify (NYSE:SHOP). Most recently, the company grew its sales by 21.6% in Q3, and losses have narrowed substantially on a quarterly basis. Better, the business is turning a corner, and the sooner investors realize the potential, the better. Undoubtedly, e-commerce businesses will be worth much more in the future. Shopify is among the most established ones, and holding it for the next 10 years will be very rewarding. SHOP stock has already been on a sustained uptrend for the past couple of weeks. If its Q4 earnings surprise analysts again, it will likely surge.
Airbnb (ABNB)
Source: BigTunaOnline / Shutterstock.com
Airbnb (NASDAQ:ABNB) has been growing rapidly since its inception in 2008. Despite short-term hiccups, its potential for growth and profitability makes Airbnb a compelling investment option. The company is already present in 200+ countries and has millions of listings, and there is potential for even more growth and expansion.
Better, with its peer-to-peer model, the company also has a high customer lifetime value and a low customer acquisition cost, making it a very attractive option for investors. This explains why Airbnb did not decline after the post-pandemic boom ended and retained profits. Furthermore, despite slower growth, Airbnb is still growing its revenue at 28.9% and net income at 45.6%. However, the most important metric to pay attention to is its remarkable 42.1% net margin, which grew by nearly 13% in Q3 2022. A profitable company with such margins should compel a much higher premium in the current environment.
PayPal (PYPL)
Source: Michael Vi / Shutterstock.com
PayPal (NASDAQ:PYPL) was on an impressive run in 2020, with its stock rising by over 256% from trough to peak. However, the selloffs over the last two years have PYPL stock down 35.3% from pre-pandemic prices.
The company is consistently growing its top line near a 10% clip while its bottom line is almost double what it was in 2019 and is now accelerating after turning a corner. It is arguably the most established fintech company and is a household name worldwide. It also means that PayPal will be the biggest beneficiary of the burgeoning fintech industry, expected to be worth $699.5 billion by 2023. With that in mind, its current price is a bargain you should take advantage of.
On the date of publication, Omor Ibne Ehsan did not have (either directly or indirectly) any positions in the securities mentioned in this article. The opinions expressed in this article are those of the writer, subject to the InvestorPlace.com Publishing Guidelines.
Omor Ibne Ehsan is a writer at InvestorPlace. He is also an active contributor to a variety of finance and crypto-related websites. He has a strong background in economics and finance and is a self taught investor. You can follow him on LinkedIn.
The post The 7 Best Growth Stocks for the Next 10 Years appeared first on InvestorPlace.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
The Development of the KJVIn the early part of Henry’s reign, William Tyndale began work on translating the Bible into English using Erasmus’ work as a foundation. He worked with the original languages rather than the Latin Bible then still in use. In 1525-6 he published his New Testament and began work on the Old Testament, completing the 1st five books of the Bible (known as the Pentateuch) the following year. Most of his work was completed abroad rather than in England owing to Henry’s then defence of the Catholic Church until his divorce from Queen Katherine.
The English Reformation, following his re-marriage to Anne Boleyn (who appears to have played a significant role in the development and interest of the Protestant cause) allowed English to flourish as the language of services and the Bible in England from that time except for the period during his daughter Queen Mary’s reign.
A number of mainstream Bible translations came into being, each building upon its predecessor as well as other works. In 1535 the Coverdale Bible was published, which used Luther’s German translation, extant Latin Bible and Tyndale’s work.
Only 2 years later, Matthew’s Bible used this same material and a further revision followed only 2 years further on.
1537 also saw the publishing of the Great Bible referred to above, for use in parish churches; essentially a revision of Matthew’s Bible. This was itself the subject of various revisions over later years.
By Elizabeth’s time, further English translations had come into being – notably the Geneva Bible (1557 New Testament and full Bible in 1560) which was a great innovation – a “pocket book” Bible that people could carry with them much more easily that the traditional large volumes. This Bible had a strong slant in its interpretation but became very popular. It was a good scholarly work, using original texts, smaller fonts, the familiar verse format of todays’ Bibles and highlighted particular words to show that they had been added for emphasis to the original.
This particular version was in general use for over 60 years and was probably the version that people such as Shakespeare and other playwrights, writers and notables used.
1568 and 1572 saw the issue and revision of the “Bishops” Bible, a revision of the Great Bible, seeking to correct errors in translation that were identifiable by comparing other versions; and this remained in use until the King James Bible was published in 1611.
In 1604, King James I convened the Hampton Court conference and a decision was made to provide an entirely new translation from the original scriptural languages, to take advantage of yet more available manuscripts and increased scholarship over the years. The work started properly in 1607 and the first draft was available in 1609, to be redrafted the following year and finally completed for publication in 1611 – an incredible achievement really!
It was a work that effectively had been in development in various guises for nearly 100 years, building upon previous work and research. No further revision was made to it for an amazing 270 years although it was realised that there were translation errors, so some amendments were introduced in the 1700s.
A full revision, known as the Revised Version, was published in 1881. Since that time many, different versions have come into being. A number of them can be seen as milestones in the further development of the English Bible, each having their own nuances or slant depending on the objectives and make-up of their project groups. Many are in use in some form and will continue to be revised themselves as language develops, research emerges etc. The New English Bible and Revised Standard Bibles (and subsequent revisions) are good examples, and of course the New King James Version itself.
But our celebration is that of the King James Version of 1611 and we will content ourselves in these pages in that version that has so affected and remained in our language for so long.
The KJV of 1611 became an enduring work in an age when religion mattered to almost everyone in a way that is difficult to appreciate today. When people believed in God and what the scriptures taught, Christian beliefs were part and parcel of daily life. It mattered what was taught and understood. It mattered what people really believed. It influenced their lives, their attitudes their actions – from the highest in the land to the lowliest man or woman. The KJV had an enormous effect on peoples’ lives; its language and terminology may seem archaic today but it was the everyday parlance of ordinary people and its language became entwined into English literature over many generations, not just in England but wherever the Bible was carried into what has become the English-speaking world and is with us today.
Future updates will develop thoughts on different aspects of the KJV, looking at its history, its characters and the effect and understanding of the Bible. We hope that you will enjoy reading these pages, but more importantly, enjoy the riches of the Bible itself! | FINEWEB-EDU |
Opened 8 weeks ago
Closed 5 weeks ago
#250 closed defect (wontfix)
wrong settings of variables related to ISP
Reported by: LiZhang Owned by:
Priority: minor Milestone:
Component: spec Version: VVC D5 v5
Keywords: Cc: ksuehring, bbross, XiangLi, fbossen, jvet@…
Description
In sub-clause 8.4.4.2.7, the setting of nW and nH is wrong.
The variables nW and nH are derived as follows:
– If IntraSubPartitionsSplitType is equal to ISP_NO_SPLIT or cIdx is not equal to 0, the following applies:
nW = nTbW (8-125)
nH = nTbH (8-126)
– Otherwise ( IntraSubPartitionsSplitType is not equal to ISP_NO_SPLIT and cIdx is equal to 0 ), the following applies:
nW = nCbW (8-127)
nH = nCbH (8-128)
The two cases should be reversed, i.e.,
The variables nW and nH are derived as follows:
– If IntraSubPartitionsSplitType is equal to ISP_NO_SPLIT or cIdx is not equal to 0, the following applies:
nW = nCbW (8-125)
nH = nCbH (8-126)
– Otherwise ( IntraSubPartitionsSplitType is not equal to ISP_NO_SPLIT and cIdx is equal to 0 ), the following applies:
nW = nTbW (8-127)
nH = nTbH (8-128)
Change history (3)
comment:1 Changed 7 weeks ago by bbross
• Version changed from VVC D5 v3 to VVC D5 v4
comment:2 Changed 6 weeks ago by bbross
• Version changed from VVC D5 v4 to VVC D5 v5
comment:3 Changed 5 weeks ago by bbross
• Resolution set to wontfix
• Status changed from new to closed
It is correct since wide angle mode derivation:
• for ISP is based on the unpartioned TB sizes which correspond always to the CB sizes because ISP is not allowed for large blocks withg implicit TU split. Please note that nTbW and nTbH in the ISP case correspond to the subpartition width and height which are not used in this case
• for all other intra blocks, it is based on the TB sizes including implicit splits that's why it cannot be nCbW and nCbH in this case
Note: See TracTickets for help on using tickets. | ESSENTIALAI-STEM |
scispace - formally typeset
Book ChapterDOI
Coupled Flow and Geomechanics Model for CO 2 Storage in Tight Gas Reservoir
01 Jan 2019-pp 955-967
TL;DR: In this article, a fully coupled fully implicit flow and geomechanics simulator is introduced to describe the physics associated with the injection of CO2 into tight shales, and assess and mitigate the risks associated with reservoir overpressure.
AbstractThe process of injection and withdrawal from tight gas reservoirs is a multiphysics and multicomponent problem. The aim of the present work is to capture the physics associated with the injection of CO2 into tight shales, and assess and mitigate the risks associated with reservoir overpressure. The overpressure caused by CO2 injection usually triggers the onset of formation–deformation, which inadvertently affects the state of the stress in the target geological formations and its surroundings, the monitoring of which is critical to understand the risks in conjunction with CO2 storage. In the present work, a novel fully coupled fully implicit flow and geomechanics simulator is introduced to describe the physics in conjunction with an extended injection phase of CO2. The developed model solves for pressure saturation and porosity and permeability changes considering a multicomponent system while principally focusing on the adsorption and diffusion of CO2 and stress-dependent reservoir deformation employing cell-centred finite volume method. It is envisaged that the injection of CO2, while with the primary purpose of storage, will parallelly enhance the recovery from shale gas due to lateral sweep effects. Based on these mechanisms, for the case study of a tight gas field, the applicability of the simulation model is tested for formations with varied rock and fluid moduli in a 20-year simulation period.
...read more
Citations
More filters
Journal ArticleDOI
TL;DR: An overview of pore-scale modeling and micro-CT scan imaging technique for CO2 sequestration including a background of basic concepts related to storage, CO2 enhanced oil recovery, simulators used, and storage estimation is provided in this paper.
Abstract: Global warming is increasing at a perpetual rate due to the emission of greenhouse gases in recent years. This spectacle has been mainly caused by the increase of carbon dioxide (CO2) in the environment. It is in need to find a path to reduce the greenhouse gases along with the additional benefit of energy demand in a sustainable way. A favorable long-term way out to mitigate global warming is to inject CO2 into geological formations of oil fields to achieve a goal of a combination of CO2 sequestration and enhanced oil recovery by CO2 flooding. Understanding the mechanism of CO2 sequestration under impermeable rock formation requires the knowledge of the pore-scale modeling concept. This review article provides an overview of pore-scale modeling and micro-CT scan imaging technique for CO2 sequestration including a background of basic concepts related to storage, CO2 enhanced oil recovery, simulators used, and storage estimation. Trapping mechanisms, geological description of the formation for CO2 sequestration, and reactions that have taken place during the trapping in underground formation are also discussed elaborately. Macro-scale and pore-scale modeling are depicted based on the current literature available. This review also presents petrophysical data that comes from the pore network modeling of CO2-brine pore structure for the formation of carbon-containing sandstone reservoirs. A discussion on the challenges of CO2 sequestration and modeling in pore-scale is also furnished to point out the problems and solutions in near future. Finally, the prospect of CO2 sequestration and pore-scale modeling are described for its uncountable value in greenhouse gas reduction from the environment.
7 citations
References
More filters
Journal ArticleDOI
TL;DR: In this article, a theory is presented that develops the functional relationships among saturation, pressure difference, and permeabilities of air and liquid in terms of hydraulic properties of partially saturated porous media, based only on the capillary pressure-desaturation relationships for porous media.
Abstract: Following the Burdine approach, based on a model developed by Wyllie and Spangler, a theory is presented that develops the functional relationships among saturation, pressure difference, and permeabilities of air and liquid in terms of hydraulic properties of partially saturated porous media. The theory is based only on the capillary pressure-desaturation relationships for porous media. Procedures for determining these hydraulic properties from capillary pressure-desaturation curves are described. Permeabilities to the wetting and nonwetting phases as a function of capillary pressure and saturation are predicted from the experimentally determined hydraulic properties. The results for all media studied are in close agreement with the theory.
1,789 citations
Journal ArticleDOI
TL;DR: In this paper, various aspects of CCS are reviewed and discussed including the state of the art technologies for CO2 capture, separation, transport, storage, leakage, monitoring, and life cycle analysis.
Abstract: Global warming and climate change concerns have triggered global efforts to reduce the concentration of atmospheric carbon dioxide (CO2). Carbon dioxide capture and storage (CCS) is considered a crucial strategy for meeting CO2 emission reduction targets. In this paper, various aspects of CCS are reviewed and discussed including the state of the art technologies for CO2 capture, separation, transport, storage, leakage, monitoring, and life cycle analysis. The selection of specific CO2 capture technology heavily depends on the type of CO2 generating plant and fuel used. Among those CO2 separation processes, absorption is the most mature and commonly adopted due to its higher efficiency and lower cost. Pipeline is considered to be the most viable solution for large volume of CO2 transport. Among those geological formations for CO2 storage, enhanced oil recovery is mature and has been practiced for many years but its economical viability for anthropogenic sources needs to be demonstrated. There are growing interests in CO2 storage in saline aquifers due to their enormous potential storage capacity and several projects are in the pipeline for demonstration of its viability. There are multiple hurdles to CCS deployment including the absence of a clear business case for CCS investment and the absence of robust economic incentives to support the additional high capital and operating costs of the whole CCS process.
1,606 citations
Book
01 Jan 1998
TL;DR: In this paper, the Methode des elements finis finis was used to define sols non satures, and a reference record was created on 2004-09-07, modified on 2016-08-08.
Abstract: Keywords: Methode des elements finis ; Sols non satures ; Consolidation Reference Record created on 2004-09-07, modified on 2016-08-08
1,297 citations
Journal ArticleDOI
TL;DR: In this article, the authors developed a methodology for estimating the ultimate CO2 sequestration capacity in solution in aquifers and applied it to the Viking aquifer in the Alberta basin in western Canada.
Abstract: Geological sequestration is a means of reducing anthropogenic atmospheric emissions of CO2 that is immediately available and technologically feasible. Among various options, CO2 can be sequestered in deep aquifers by dissolution in the formation water. The ultimate CO2 sequestration capacity in solution (UCSCS) of an aquifer is the difference between the total capacity for CO2 at saturation and the total inorganic carbon currently in solution in that aquifer, and depends on the pressure, temperature and salinity of the formation water. Assuming non-reactive aquifer conditions, the current carbon content is calculated using standard chemical analyses of the formation waters collected by the energy industry on the basis of the concentration of carbonate and bicarbonate ions. Formation water analyses performed at laboratory conditions are brought to in situ conditions using a geochemical speciation model to account for dissolved gasses that are lost from the water sample. To account for the decrease in CO2 solubility with increasing water salinity, the maximum CO2 content in formation water is calculated by applying an empirical correction to the CO2 content at saturation in pure water. The UCSCS in an aquifer is calculated by considering the effect of dissolved CO2 on the formation water density, the aquifer thickness and porosity to account for the volume of water in the aquifer pore space and for the mass of CO2 dissolved in the water currently and at saturation. The methodology developed for estimating the ultimate CO2 sequestration capacity in solution in aquifers has been applied to the Viking aquifer in the Alberta basin in western Canada. Considering only the region where the injected CO2 would be a dense fluid, the capacity of the Viking aquifer to sequester CO2 in solution in the formation water is calculated to be 100 Gt. Simple estimates then indicate that the capacity of the Alberta basin to sequester CO2 dissolved in the formation waters at depths greater than 1000 m is on the order of 4000 Gt CO2. The results also show that using geochemical models to bring the analyses of the formation waters to in situ conditions is not warranted when the current total inorganic carbon (TIC) in the aquifer water is very small by comparison with the CO2 solubility at saturation. Furthermore, in such cases, the current TIC may even be neglected.
611 citations
Journal ArticleDOI
TL;DR: In this article, a new theoretical model for calculating pore volume compressibility and permeability in coals as a function of effective stress and matrix shrinkage, using a single equation is presented.
Abstract: In naturally fractured formations, such as coal, permeability is sensitive to changes in stress or pore pressure (i.e., effective stress). This paper presents a new theoretical model for calculating pore volume compressibility and permeability in coals as a function of effective stress and matrix shrinkage, using a single equation. The equation is appropriate for uniaxial strain conditions, as expected in a reservoir. The model predicts how permeability changes as pressure is decreased (i.e., drawdown). Pore volume compressibility is derived in this theory from fundamental reservoir parameters. It is not constant, as often assumed. Pore volume compressibility is high in coals because porosity is so small. A rebound in permeability can occur at lower drawdown pressures for the highest modulus and matrix shrinkage values. We have also history matched rates from a {open_quotes}boomer{close_quotes} well in the fairway of the San Juan basin using various stress-dependent permeability functions. The best fit stress-permeability function is then compared with the new theory.
600 citations | ESSENTIALAI-STEM |
Capcom Rises Most in Three Weeks in Tokyo Trading on $37 Million Buyback
Capcom Co., publisher of the
“Resident Evil” and “Monster Hunter” video-game series, rose
the most in three weeks in Tokyo trading after announcing plans
to buy back as much as 2.2 percent of its shares. Capcom advanced as much as 4.5 percent, the biggest
intraday gain since May 18, and traded 3 percent higher at 1,766
yen as of 9:53 a.m. on the Tokyo stock exchange. The benchmark
Topix index fell 0.5 percent. The Osaka-based company plans spend as much as 3 billion
yen ($37 million) to buy back 1.5 million shares from today
until July 20, it said in a statement yesterday after the market
closed. Capcom owned 8.6 million shares, or 12.8 percent of its
outstanding stock, as of May 31, according to the statement. To contact the reporters on this story:
Kazuyo Sawa in Tokyo at
ksawa3@bloomberg.net ; To contact the editor responsible for this story:
Young-Sam Cho at
ycho2@bloomberg.net . | NEWS-MULTISOURCE |
Improve your Liver Health
0 comments
Most people who feel well, never bother to do a check up on their internal organs health. They often accidentally find out some organic dysregulation after blood tests. One of the organs that may be functioning improperly without any sign is the liver.
What is the liver?
Liver is the largest internal organ of your body located under your rib cage on the right side. It weighs about three pounds. (1) It participates in many body functions among which is detoxification of the body, converting food into nutrients, controlling the amount of cholesterol, storing energy, controlling your hormone levels and many others. (2)
The liver is the main organ that metabolizes foods and drugs to maintain metabolic stability in the organism. Thus, it is considered as a target of many insults that result in dysregulated hepatic functioning and lead to hepatic diseases. (3)
How liver disease develops
1. Liver disease is the third commonest cause of premature death in the UK. (4)
2. Liver damage develops over time. The inflammation of the liver is called hepatitis and in case it is sudden it’s known as acute hepatitis. Inflammatory conditions of the liver that last longer than six months are known as chronic hepatitis.
3. Fibrosis is another condition of the liver where scar tissue is formed in the inflamed liver. Fibrosis can develop progressively or quite fast. Scar tissue does not impede liver on functioning quite well. The elimination of the inflammation and its causal factors may prevent the formation of further liver damage and may reverse some of the scarring.
4. Cirrhosis is a condition developed because of the spread of inflammation and fibrosis throughout the liver and disrupts the shape and function of the liver. Cirrhosis can lead to liver failure or even liver cancer. (5)
Alcohol and consumption and liver disease
The main causal factor for the increase in liver deaths is an alcoholic liver disease. Alcohol is responsible for 84% of liver deaths in the UK and there is a close relation between liver deaths and alcohol consumption within the UK population. (6)
Non-alcoholic fatty liver disease
According to a study up to 1 in 20 of the UK population will have non-alcoholic fatty liver disease. (5) It is related to hepatic fat deposition. Although it possesses similar findings when compared to the alcohol-induced lesion, it is not related to alcohol consumption. Nowadays, it is considered as one of the more frequent causes of liver disease with a prevalence between 20 and 30% in the western countries. Its incidence has significantly increased due to the sedentary lifestyle, the eating habits of western societies and the obesity epidemic. (7)
It is estimated that in developed countries 1 patient in 3 is expected to have non-alcoholic fatty liver disease, which can potentially progress to cirrhosis and advanced liver failure. (8)
Dietary and lifestyle changes to improve liver health
Exercise
Exercise has proven to be beneficial in the prevention and treatment of non-alcoholic fatty liver disease as it acts in different pathways involved in the development and progression of such condition. Current recommendations for treatment of the disease indicate regular, moderate-intensity aerobic and resistance exercise. (7)
Weight Loss
Weight loss is one of the essential lifestyle modifications to treat liver disease. The guidelines of the American Gastroenterological Association indicate that loss of about 5% of baseline weight is necessary to improve fatty liver disease.
Carbohydrate consumption
High carbohydrate consumption is related to the inflammatory state and progression of non- alcoholic liver disease. It has been shown that low carbohydrates diets<45% of carbohydrates /day lead to weight loss, reduction of triglyceride levels and improved of metabolic parameters in obese individuals. (7)
Fats
Studies have shown that high-fat diets induce non- alcoholic liver disease. In obese individuals, a diet with 55% fat increases the liver’s triglyceride levels in 35%. The recommended total amount of fat intake is between 20 and 35% of total daily caloric intake and distributed as indicated: Saturated fats should be 7 to 10%, Polyunsaturated fats should be 5 to 10% and Monounsaturated fats should be 15 to 20% of total caloric intake. (7)
Fluid and Salt
As liver disease progresses, fluid can be stored around your stomach resulting to a condition known as ascites. Therefore, it is important to limit the amount of salt you consume. Moreover, depending on the liver disease you might also need to limit your fluid consumption. (9)
Alcohol Consumption
Because alcohol is processed by your liver, alcohol consumption can be dangerous in case you have liver disease. (5)
Dietary supplements to improve liver health
Milk Thistle
Milk Thistle or Silymarin is a natural substance. According to studies Silymarin has hepatoprotective properties against several hepato-toxins. Additionally, Milk Thistle prevents against liver fibrosis, oxidative stress and cirrhosis by improving liver enzyme activities and protecting against the increases in cholesterol and phospholipids which are harmful for the liver. (10)
Turmeric
Turmeric is a spice derived from the turmeric plant and it is the main spice in curry. It contains a yellow-coloured chemical called curcumin. (11) Researchers found that curcumin possesses hepatoprotective properties on acute and chronic liver injury. (10)
Green tea
Studies have shown that the major antioxidant and anti-inflammatory agents of the green tea- catechins, ameliorate liver inflammation, necrosis and fibrosis. Additionally, green tea extract suppresses the oxidative stress. (10)
Fibre
Liver diseases and especially non-alcoholic are most common in patients with dyslipidaemia, metabolic syndrome and type 2 diabetes. Therefore, a high fibre intake could be used as a therapeutic strategy for glycaemic, lipid, and weight controls in subjects with fatty liver disease. Recommendations about daily fibre intake vary from 20 to 40 grams /day. (7)
Good fibre choices are supplements of acai berry (44.2g of fibre /100g of content) and psyllium husk which is non-calorific and provides 30% insoluble fibre and 70% soluble fibre. (12-13)
Omega 3 fatty acids
According to a study published in 2013, omega-3 fatty acid treatment may affect beneficially the hepatic lipid metabolism, adipose tissue function, and inflammation. Additionally, there are studies suggesting omega-3 fatty acids intake to treat non-alcoholic fatty liver disease. (14)
Vitamin E
Several studies have proved the antioxidant capacity of Vitamin E. Since oxidative stress is considered as one of the causal factors of liver injury and fatty liver disease, Vitamin E, has been proposed as part of the treatment of non-alcoholic fatty liver disease. (7)
Selenium
According to a study among Europeans, there is evidence that suboptimal selenium levels in Europeans may be associated with an appreciably increased risk of liver cancer. Thus, selenium supplementation can be part of a preventive strategy against liver cancer. (15)
Liver is one of the most important and hard- working organs of the human body. Liver’s health is directly associated with alcohol consumption, body weight and eating habits. Consuming foods that protect the liver is vital. In case your diet doesn’t include plenty of fruits and vegetables, you should get specific food supplements to meet your nutrient requirements and protect your liver.
Don't Miss Out!
Sign up now to receive our offers, news and weekly articles right to your inbox!
1) http://www.liverfoundation.org/downloads/alf_download_29.pdf
2)https://my.clevelandclinic.org/ccf/media/files/Digestive_Disease/DDC_Liver_Brochure.pdf
3) http://www.projectinform.org/pdf/liver.pdf
4) http://thelancet.com/pdfs/journals/lancet/PIIS0140-6736(14)61838-9.pdf
5) https://www.britishlivertrust.org.uk/wp-content/uploads/LWL0109.pdf
6) http://www.bsg.org.uk/attachments/1004_National%20Liver%20Plan%202009.pdf
7) http://www.ppgcardiologia.com.br/wp-content/uploads/2016/06/Nutrition-and-phasical-activity-in-nonalcoholic-fatty-livrer-disease.pdf
8) https://www.ncbi.nlm.nih.gov/pubmed/18098321
9) https://www.health.qld.gov.au/__data/assets/pdf_file/0031/145948/gastro_cld.pdf
10) https://www.researchgate.net/publication/280967198_Antioxidants_in_liver_health
11)http://www.webmd.com/vitamins-supplements/ingredientmono-662-turmeric.aspx?activeingredientid=662
12) https://www.oxfordvitality.co.uk/acai-berry-tablets
13) https://www.oxfordvitality.co.uk/psyllium-husk-powder
14) https://www.ncbi.nlm.nih.gov/pubmed/23862644
15) http://ajcn.nutrition.org/content/early/2016/06/29/ajcn.116.131672.abstract
Leave a comment
All blog comments are checked prior to publishing
You have successfully subscribed! | ESSENTIALAI-STEM |
Trump Data Firm Suspended from Facebook for Harvesting User Data | Fortune
Cambridge Analytica, a data research firm closely linked to the campaign of President Donald Trump, has been suspended from Facebook . The firm was suspended along with its parent company, Strategic Communication Laboratories, and two individual collaborators.
According to multiple sources, a researcher working with the firm broke Facebook's rules to harvest data from more than 50 million user profiles in 2014. That stolen data, according to reports, became the foundation for Cambridge Analytica's efforts to target voters for Donald Trump's 2016 Presidential campaign.
Facebook's Friday announcement of the suspension appeared timed to pre-empt reports about the breach in the New York Times and The Guardian .
Cambridge Analytica's goal, starting in 2013, was to use data modeling to influence voters based on their emotional makeup. Data scientist and former Cambridge Analytica employee Christopher Wylie, speaking to The Guardian, described this as an effort to "target their inner demons."
Get Data Sheet , Fortune's technology newsletter.
But the firm did not initially have access to the vast amount of data needed to achieve its goals. It got it using a Facebook personality quiz called "thisisyourdigitallife," created for Cambridge Analytica by Cambridge University psychographics professor Aleksandr Kogan in 2014. About 270,000 users of the quiz granted permission for their data to be collected for research purposes.
But according to the Times, the app also collected the data of those quiz-takers' Facebook friends, without permission. About 30 million of those profiles, mostly of U.S. voters, contained enough information to connect them to other data sources and build detailed profiles. According to Facebook, Kogan violated its policies by passing data on to Cambridge Analytica and another firm, Eunoia Technologies. Kogan and Wylie have been suspended from Facebook along with SCL and Cambridge Analytica.
In a statement sent to Fortune, Cambridge Analytica claimed it had contracted Kogan and his company, Global Science Research, to obtain data only in line with Facebook’s rules.
The event is being described as a data breach of the social media platform, though Facebook disputes that characterization, saying Kogan "gained access to this information in a legitimate way and through the proper channels" before misusing it.
Facebook became aware of the activity by late 2015, and ordered the data destroyed by everyone Kogan had shared it with. According to Facebook, Cambridge Analytica claimed to have complied, but Facebook says it became aware this week that "not all data was deleted." Cambridge Analytica claims it did delete the data according to Facebook’s request.
Facebook has not commented on why it did not publicly disclose the initial abuse. According to the Guardian , a Facebook official testified in hearings before British Parliament last month that Cambridge Analytica did not have Facebook user data.
The potential impact of the suspension on Trump's reelection campaign is unclear. Cambridge Analytica will no longer be able to buy advertising on Facebook, but according to the Times , the organization still possesses "most or all" of the data it illicitly collected. That data, or systems trained using it, could still be used to direct campaign efforts by clients.
Update: This article has been updated to reflect a statement from Cambridge Analytica. | NEWS-MULTISOURCE |
Canglang Subdistrict
Canglang Subdistrict is a subdistrict of Gusu District, Suzhou, Jiangsu, China. The subdistrict spans an area of 6.17 km2, and has a population of 80,111 as of 2017.
History
On March 24, 2017, the subdistrict of Xujiang Subdistrict was merged into Canglang Subdistrict.
Administrative divisions
As of 2020, the subdistrict administers 21 residential communities.
* Guihua Community
* Yulan Community
* Yangcanli First Community
* Yangcanli Second Community
* Zhuhui Community
* Ruiguang Community
* East Avenue Community
* West Avenue Community
* Jia'an Community
* Jiqing Community
* Jinshi Community
* Daoqian Community
* Ximei Community
* Wannian Community
* Sanxiang Community
* Tongjing First Community
* Tongjing Second Community
* Xincang Community
* Xuhong Community
* Xujiang Community
* Tainan Community | WIKI |
Page:Anneofgreengables-rbsc.djvu/43
“Well now, I dunno. There’s something dreadful heathenish about it, seems to me. I’d ruther Jane or Mary or some sensible name like that. But when Diana was born there was a schoolmaster boarding there and they gave him the naming of her and he called her Diana.”
“I wish there had been a schoolmaster like that around when I was born, then. Oh, here we are at the bridge. I’m going to shut my eyes tight. I’m always afraid going over bridges. I can’t help imagining that perhaps, just as we get to the middle, they’ll crumple up like a jack-knife and nip us. So I shut my eyes. But I always have to open them for all when I think we’re getting near the middle. Because, you see, if the bridge did crumple up I’d want to see it crumple. What a jolly rumble it makes! I always like the rumble part of it. Isn’t it splendid there are so many things to like in this world? There, we’re over. Now I’ll look back. Good night, dear Lake of Shining Waters. I always say good night to the things I love, just as I would to people. I think they like it. That water looks as if it was smiling at me.”
When they had driven up the further hill and around a corner Matthew said:
“We’re pretty near home now. That’s Green Gables over—”
“Oh, don’t tell me,” she interrupted breathlessly, catching at his partially raised arm and shutting her | WIKI |
The Community for Technology Leaders
Green Image
Issue No. 11 - November (2003 vol. 52)
ISSN: 0018-9340
pp: 1391-1398
Berk Sunar , IEEE
ABSTRACT
<p><b>Abstract</b>—This paper describes a method of construction of a composite field representation from a given binary field representation. We derive the conversion (change of basis) matrix. The special case of when the degree of the ground field is relatively prime to the extension degree, where the irreducible polynomial generating the composite field has its coefficients from the binary prime field rather than the ground field, is also treated. Furthermore, certain generalizations of the proposed construction method, e.g., the use of nonprimitive elements and the construction of composite fields with special irreducible polynomials, are also discussed. Finally, we give storage-efficient conversion algorithms between the binary and composite fields when the degree of the ground field is relatively prime to the extension degree.</p>
INDEX TERMS
Composite and binary fields, primitive element, change of basis, AES.
CITATION
E. Savas, B. Sunar and &. K. Ko?, "Constructing Composite Field Representations for Efficient Conversion," in IEEE Transactions on Computers, vol. 52, no. , pp. 1391-1398, 2003.
doi:10.1109/TC.2003.1244937
94 ms
(Ver 3.3 (11022016)) | ESSENTIALAI-STEM |
Weather Stationay
Weather gadgets and instruments to learn about your world
weather-instruments-pictures-for-kids | weatherstationary.com
In this section we will discuss weather instruments:
• Instrument calibration
• Temperature Gauges
• Wind Gauges
• Pressure Gauges
• Humidity Indicators
• Rain Gauges
The best way to know what the weather is doing is to step outside and feel it for yourself. Weather Measuring Instruments by themselves cannot tell us if it is a nice day, but they will measure the things that make the weather enjoyable or miserable. In this discussion, we will explore how both digital/electronic and traditional analog instruments function.
Calibration is an important concept to understand with any weather measuring instruments.
If an weather instrument is calibrated we know that whatever it is measuring will be the same as the measurements taken by other instruments. If the thermometer outside your window says the temperature is 72°F, then another thermometer in the same spot should read the same if both instruments are calibrated to the same standard.
This is very important if weather data is being shared over a weather station network like WeatherUnderground or the National Weather Service, but it is also reassuring to know that the instruments in your home weather station are accurate. Highest quality weather instruments are calibrated to NIST (National Institute of Standards and Technology) and the calibration can be tracked for the life of the instrument.
Temperature Gauges (weather instrument)
Thermometers are probably the most familiar weather instruments. Many homes have a thermometer or two mounted outside, and it is not uncommon for public buildings to have a temperature display incorporated into their signs.
Thermometers measure temperature, of course, but they do not always tell the full story when it comes to “how hot is it today?”
Measuring comfort seems subjective, but heat index and wind chill can be very useful for understanding human performance as well as comfort. Air temperature is just one element of these measurements, but it is a very important one.
If you are looking for simple and reliable temperature gauge that also show the comfort check our top pick from ThermoPro TP50 . Any gauge from your local store will also do a decent work, however the accuracy depends form brand to brand and instrument to instrument.
ThermoPro TP50 – Temperature Gauge – also indicates comfort level
Thermo Pro | WeatherStationary.com
Liquid thermometers are traditionally the most common. They are traditionally referred to as mercury thermometers, even though real mercury is difficult to find due to its expense and the danger of accidental mercury poisoning.
Liquid thermometers take advantage of the fact that liquid expands at a known and measurable rate in response to temperature changes. The warmer the temperature, the higher the level of liquid in the thermometer tube and the level is compared to a scale built into the thermometer case, or sometimes etched into the tube itself.
ETA hand2hand – Simple Liquid Thermometer
Liquid Thermometer | WeatherStationary.com
The other common form of analog thermometer is the dial type. These work on the principle that different metals expand at different rates in response to temperature change. Strips of two different metals are bound together and then formed into a coil spring. As the temperature changes, the different expansion rates will force the coil to tighten or straighten. The coil is attached to a simple clockwork mechanism attached to a dial where we can read the temperature.
Digital temperature gauges include thermocouplesand thermistors. A thermocouple is similar to the bimetallic element of a dial thermometer, except that rather than turning a dial as a result of temperature changes, the two metals in the element create an electrical charge that changes according to temperature.
Thermocouple | WeatherStationary.com
Thermistors are a type of electronic resistor made of metal oxides encased in epoxy or glass. As temperature changes, so do the electrical resistance of the device, which can be measured and displayed.
Thermistor | WeatherStationary.com
Wind Gauges – Weather instruments
Wind direction and speed are measured by wind vanes and anemometers. Knowing the direction the wind is coming from is important in predicting the sort of weather it will bring with it.
Traditional wind vanes are a common sight commonly seen on barn-tops and chimneys. They are mounted on the highest spot available so as to read wind direction without interference.
Wind vane for kids | weatherstationary.com
They consist of a pointer and a flat vertical material mounted behind a pivot point. As the wind acts on the flat element, the pointer points in the direction the wind is coming from. When mounting a wind vane, especially an electronic one, it is important to use a compass to ensure the instrument is mounted in relation to true north.
Mechanical Anemometers are instruments that measure wind speed. They take their measurement by counting the rotations of the shaft over a period of time. Cup anemometers have a vertical shaft with three or four hemispherical cups mounted on arms perpendicular to the shaft. Three cup anemometers are considered more accurate because there is less interference.
American Educational – Cup Anemometer
Mechanical Anemometer | WeatherStationary.com
If you don’t want to buy, you can make a DIY anemometer at home. Check the procedure here and watch the video on how to make an anemometer at home.
Propeller or vane anemometers have horizontal shafts with a propeller mounted on the end. The propeller itself is intrinsically more accurate at sensing wind speed, but must be held directly into the wind, so the unit is often incorporated into a wind vane. The advantage of the cup type anemometer is that it will sense wind strength from any direction.
Kestrel 5500 one of the best Wind Meters on the market
Electronic Wind Meter | WeatherStationary.com
You can also teach your kids how to make a DIY Anemometer at home. It’s really fun and easy. Watch this “How to make Anemometer” video.
Also check: 5 Wind Meters for Long Range Shooting Worth Checking Out in 2018
Wind-chill is a measurement of relative comfort. Cold weather “feels” colder since moving air removes heat from a body faster than still air. There are charts and formulas for measuring wind chill at various temperatures and wind speeds, but most electronic weather stations which have an anemometer and a temperature gage will derive wind-chill from installed software.
Pressure Gauges
Atmospheric or barometric pressure measurements are helpful in predicting weather. Generally steady or rising pressure indicates fair weather while a falling pressure means a storm or foul weather is approaching.
Barometers are the instruments used to measure atmospheric pressure.
The earliest type of barometers were the liquid type. This instruments air made by drawing liquid up into a clear (glass) tube and sealing the top of the tube. The liquid is held in the tube by the vacuum created in the top portion. The open bottom is placed below the surface of an open reservoir. As air pressure increases, the liquid in the tube rises.
A more common mechanical barometer is the aneroid type. These operate by comparing pressure between the inside and outside of a sealed “can”. The can has a flexible top that will flex in or out as the outside pressure changes. A very simple aneroid barometer can be made at home by placing a rubber diaphragm over a jar.
1. Pull a piece of a balloon over the mouth of the jar and seal it with a rubber band.
2. Tape a long pencil to the diaphragm as a pointer.
3. As pressure drops, the diaphragm will swell out and the point of the pencil will point lower, and pressure rises the diaphragm will be forced inward and the pencil will point higher.
Ambient Weather WS-152B 6″ – Barometer
Ambient Weather WS 152B Contemporary Barometer | weatherstationary.com
Electronic pressure readings used by most home weather stations (and some Smartphones) are taken by a piezoresistive strain gauge. These devices have the advantage of being extremely sensitive and accurate in a small size.
Humidity Indicators
Is a measurement of the amount of moisture in the air. At specific temperatures and pressures, air can only hold a certain amount of water vapor. Relative humidity measures the amount of water vapor present compared to the amount air at the local temperature can hold. When relative humidity is 100% the air is said to be saturated.
At high relative humidity levels, liquid water cannot evaporate, and when humidity passes 100% water vapor condenses into liquid. As the temperature falls, the air will reach its saturation point, also called the “dew point”.
Humans regulate their body temperature with the evaporation of sweat. As humidity increases, evaporation of the sweat on the skin is less effective. This is the basis for the “heat index”, which measures how hot it “feels” at different temperature and humidity levels. Human performance, health, and comfort can be compromised at high heat index levels.
Measuring humidity is done with an instrument called a hygrometer. One type of analog hygrometer is a psychrometer, which consists of two thermometers. One thermometer is kept dry while the other has a moist fabric over the bulb. A
s the moisture in the fabric evaporates it cools the thermometer relative to the dry temperature and comparing the two readings give relative humidity.
Western Humidor – Analog Hygrometer
Analog Hygrometer | WeatherStationary.com
Electronic hygrometers are usually of the capacitance type. The sensor has a polymer layer which absorbs moisture from the surrounding air, which changes the device’s capacitance. Most electronic weather stations mount the temperature gauge and the humidity gage near each other and use software to calculate heat index and dew point.
Qooltek Super – Mini Hygrometer
Electronic Hygrometer | WeatherStationary.com
Rain Gauges
Analog Rain Gauges are among the most simple of all weather instruments to understand. Rainfall is measured by the amount of participation to fall over a certain area. Thus, all a rain gauge needs is a straight walled vessel with an open top. It can be as simple as a tin can placed on level ground. The disadvantage to such a simple instrument is that the observer needs to check it personally on occasion, measure the amount of liquid inside, and then dump out the water.
Status Precision – Analog Rain Gauge
Analog Rain Gauge | WeatherStationary.com
Electronic rain gauges measure rainfall amounts using a self-emptying tipping bucket sensor. The device consists of a funnel which directs rainfall into the bucket assembly. The bucket is divided into two chambers on either side of a teeter-totter mechanism. As the upper chamber fills, the bucket tips and that chamber spills its contents while the next chamber fills.
Every time the bucket tips, an electric switch is closed, and rainfall is measured by counting the number of times the connection is made.
Oregon Scientific 126n – Electronic Rain Gauge
Oregon Scientific Wireless Weather Station | weatherstationary.com
Review Quiz
Teaching Kids About Weather | WeatherStationary.com
• Q1: What is the functional difference between a thermocouple and a thermistor?
• Q2: What is the advantage of a cup type anemometer over a propeller type?
• Q3: The cup type anemometer can read wind speed regardless of wind direction.
• Q4: What does a falling barometer generally indicate?
• Q5: Falling barometric pressure usually indicates an approaching storm or foul weather.
• Q6: How does a psychrometer measure relative humidity?
• Q7: How is rainfall measured?
Answers:
• A1: thermocouple measures the voltage generated by two dissimilar metals at different temperatures while a thermistor changes electrical resistance as temperature changes.
• A2: The cup type anemometer can read wind speed regardless of wind direction.
• A3: Falling barometric pressure usually indicates an approaching storm or foul weather.
• A4: The psychrometer measures the difference between a wet-bulb and a dry-bulb thermometer. As greater evaporation will lower the wet-bulb temperature, there will be less temperature difference at high humidity levels.
• A5: The amount of rain falling over a specific area. | ESSENTIALAI-STEM |
Hassan Idrissi
Hassan Idrissi (15 July 1976 – 7 May 2023) was a Belgian politician. A member of the Socialist Party, he concurrently served in the Parliament of Wallonia and the Parliament of the French Community from 2018 to 2019.
Idrissi died by suicide on 7 May 2023, at the age of 46. | WIKI |
An adult male cares for his senior father, who suffers with dementia. Many caregivers struggle to manage the unpredictable behaviors of dementia.
How to Manage the Unpredictable Behaviors of Dementia
Bethesda Health | March 13, 2018
Dementia can be as challenging for the senior’s caregiver as it is for someone living with the disorder. Unpredictable and sometimes dangerous behaviors can try the patience and understanding of the most devoted loved one or friend.
Dementia is a group of symptoms involving a decline in mental abilities, such as reasoning and remembering, that significantly interferes with daily life. Alzheimer’s is the most common form of dementia.
It is important to remember that a person with dementia is not trying to be difficult when they exhibit behaviors as a side effect of dementia. They may be extremely frustrated as they live their lives in a confusing and uncertain world.
However, there are ways that caregivers can cope with the unpredictable behaviors of seniors with dementia and help diminish some of the conflict and frustration the senior is experiencing.
Examine the Behaviors Dementia Can Cause
Because dementia is progressive, caregivers will need to continually evaluate the behavior of the person for whom they are caring. The Alzheimer’s Association offers some basic questions to put the behaviors in context:
Grace LeRoux, RN, Nurse Manager of the Memory Support neighborhood at Bethesda Meadow, a skilled nursing community in Ellisville, MO, also has some suggestions tips for dealing with these changing behaviors.
1. Anger and Aggression
Aggressive behavior can be verbal or physical. People who have never been physically abusive or used profanity in their lives may employ both at unexpected moments when suffering from dementia. According to Grace, most aggressive behaviors are a way of communicating pain. “What we perceive as a negative behavior may be the person’s way of expressing a need,” she says.
2. Anxiety and Agitation
Many things can trigger anxiety and agitation in people with dementia, including confusion over the time of day. Pain, hunger, and the need for sleep also can contribute. Grace suggests a change of scenery or an activity (offered daily in the Memory Support communities throughout Bethesda) can provide a distraction.
“Anxiety is a constant struggle for seniors with dementia,” she says. “Their brains always try to find context for what is going on around them.” Routine and a calm approach help to relieve symptoms.
3. Forgetfulness and Confusion
Early on, people with dementia may be able to compensate for some forgetfulness with lists and calendars. As the disease progresses, even once familiar people and items may be unrecognizable. A person’s home may become foreign to them, and the town they knew so well becomes a confusing maze. Even the purpose of basic household items like silverware may be forgotten.
According to Grace, even in these later stages of dementia, caregivers may be able tap into memories to provide assistance and comfort. For example, a person living with dementia who has forgotten how to brush his or her teeth may be able to recall that basic skill if the toothbrush is placed in their hand or the brush is placed to their lips.
4. Repetitive Actions
Caregivers must be prepared to repeatedly answer the same questions or provide the same information to their senior loved ones living with dementia. It does no good to tell them that you just answered the question a few minutes ago.
“Patience is so important,” says Grace. “If someone can still read, sometimes notes to refer to can help.” She also says it might be necessary to “read between the lines” to determine intent. “If someone is repeatedly asking to ‘go home,’ it may mean they want or need something they would find at home, like rest, comfort, or food.”
5. New Suspicions
A person with dementia may be suspicious of others and accuse them of wrongdoing. Also, they may misinterpret what they have heard. “These suspicions are often a way to compensate for missing memories,” Grace says. “They may believe an item has been stolen from them, when in reality they’ve misplaced it.” She encourages caregivers to consider the person’s life history, because past trauma also can be a factor.
6. Wandering and Getting Lost
One of the most frightening dementia-related behaviors for caregivers is wandering and/or getting lost. “Understanding when a person is most at risk for wandering is vital,” Grace says. “When a person is traveling, in the hospital, or newly admitted to a nursing home, they are at the highest risk of wandering.” She suggests familiar surroundings and exercise for managing wandering behaviors.
7. Trouble with Sleep
People with dementia may experience sleep pattern changes or the inability to fall asleep. Grace stresses the importance of exercise during the day and peaceful surroundings at night. It might help to open the curtains during the day and encourage the person to spend some time outdoors. Understanding past sleep routines is also important. “A person who worked night shift may fall back on old habits,” Grace says.
8. Changes in Ability to Communicate
Dementia also diminishes a person’s ability to communicate. They may struggle to find the right words, describing familiar objects, completing a thought, or organizing their words logically. They may also use more gestures and fewer words to communicate. Again, patience is key for the caregiver: “Be comfortable with periods of silence,” says Grace. She notes that a person with dementia may take 20 to 30 seconds to process a question and create a response.
How to Respond to the Unpredictable Behaviors of Dementia
It is important to for caregivers and loved ones to respond to these challenging behaviors as follows:
The Alzheimer’s Association provides more specific responses that address the individual dementia behaviors listed above, along with resources for caregivers of seniors with dementia.
One other important thing for caregivers to remember: take care of yourself. Caring for someone with dementia can take its toll. You may need to seek help from a professional or reach out to your support system.
If you need assistance caring for a senior with dementia, Alzheimer’s, or any form of memory loss, contact Bethesda. Our Memory Support neighborhoods in the St. Louis area provide support to caregivers and families of seniors. Contact us or schedule a tour to learn more.
Related Articles
A senior man showing symptoms of delirium sits in a hospital bed.
Delirium Isn’t ‘Just Part of Getting Older’
As many as half of hospital patients age 65 and older develop delirium. Once thought of as something ordinary — something that “just happens” to… Read More
Adult child hugs elderly parent after receiving dementia diagnosis.
What to Do After a Dementia Diagnosis in Your Loved One
Your 68-year-old father has just been diagnosed with Alzheimer’s disease, the most common form of dementia, and suddenly you are a caregiver. He and… Read More
Confused older man looking at camera with fur hat and coat on while wandering with dementia.
Cold Weather Precautions for Seniors with Memory Loss or Dementia
Cold weather can be particularly dangerous for senior adults with memory loss or dementia, with preventing hypothermia as a major concern. Whether they have dementia… Read More
• This field is for validation purposes and should be left unchanged. | ESSENTIALAI-STEM |
Bjerkandera fumosa
Bjerkandera fumosa is a species of poroid fungus in the family Meruliaceae.
Taxonomy
It was first described to science as Boletus fumosus by Christiaan Hendrik Persoon in 1801. Petter Adolf Karsten transferred the species to the genus Bjerkandera in 1879.
Description
The form of Bjerkandera fumosa fruit bodies ranges from effused-reflexed (spread out over the substrate and turned back at the margin to form a cap) or cap-like, but attached directly to the substrate without a stipe. These caps can be solitary or closely overlapping, and are often fused with neighbouring caps. The caps typically measure 5 – wide by 2 cm wide, and a buff-coloured upper surface with a texture ranging from finely hairy (tomentose) to smooth. The pores on the cap underside are circular to angular, numbering 2–5 per millimetre.
Bjerkandera fumosa has a monomitic hyphal system, containing only generative hyphae. The basidia are club-shaped, measuring 20–22 μm. Spores have the shape of short cylinders, and measure 5.5–7 by 2.5–3.5 μm. They are smooth, hyaline, and do not react with Melzer's reagent.
Habitat and distribution
Bjerkandera fumosa causes a white rot in various hardwood species. It has a circumboreal distribution in the Northern Hemisphere. | WIKI |
Home > Spring Core
Spring Task Scheduler
By Arvind Rai, June 23, 2019
On this page we will provide Spring task scheduler example with @Scheduled annotation using XML and JavaConfig. Method can be scheduled using XML configuration as well as JavaConfig. In case of XML, the method to be scheduled should be configured in XML configuration. Method can also be scheduled using @Scheduled annotation using task:annotation-driven tag in XML configuration. In case of JavaConfig, there should be class level annotation @EnableScheduling and method is scheduled using @Scheduled annotated. We can also write @Scheduled annotated method in JavaConfig file, too. Find the example.
Software Used
Find the software used in demo.
1. Java 8
2. Spring 4.1.8.RELEASE
3. Gradle
4. Eclipse
build.gradle
apply plugin: 'java'
apply plugin: 'eclipse'
archivesBaseName = 'SpringDemo'
version = '1'
repositories {
mavenCentral()
}
dependencies {
compile 'org.springframework.boot:spring-boot-starter:1.2.7.RELEASE'
}
1. Spring Task Scheduler using XML Configuration
BookApp.java
package com.concretepage;
import org.springframework.scheduling.annotation.Scheduled;
public class BookApp {
public void cleanDustOne() {
System.out.println("Executing cleanDustOne method...");
}
public void cleanDustTwo() {
System.out.println("Executing cleanDustTwo method...");
}
@Scheduled(fixedRate=1000)
public void arrangeBook(){
System.out.println("Arranging Book...");
}
}
application-context.xml
<?xml version="1.0" encoding="UTF-8"?>
<beans xmlns="http://www.springframework.org/schema/beans" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:context="http://www.springframework.org/schema/context" xmlns:task="http://www.springframework.org/schema/task"
xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-4.1.xsd
http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context-4.1.xsd
http://www.springframework.org/schema/task http://www.springframework.org/schema/task/spring-task-4.1.xsd">
<beans>
<task:scheduler id="taskScheduler" pool-size="10"/>
<task:annotation-driven scheduler="taskScheduler"/>
<bean id="bookApp" class="com.concretepage.BookApp"/>
<task:scheduled-tasks scheduler="taskScheduler">
<task:scheduled ref="bookApp" method="cleanDustOne" fixed-rate="2000"/>
<task:scheduled ref="bookApp" method="cleanDustTwo" fixed-rate="3000"/>
</task:scheduled-tasks>
</beans>
</beans>
Only with XML Configuration
<beans>
<task:scheduler id="taskScheduler" pool-size="10"/>
<bean id="bookApp" class="com.concretepage.BookApp"/>
<task:scheduled-tasks scheduler="taskScheduler">
<task:scheduled ref="bookApp" method="cleanDustOne" fixed-rate="2000"/>
<task:scheduled ref="bookApp" method="cleanDustTwo" fixed-rate="3000"/>
</task:scheduled-tasks>
</beans>
<task:scheduler> : It defines ThreadPoolTaskScheduler with a given pool size.
<task:scheduled>: It defines method which is scheduled on fixed rate.
<task:scheduled-tasks>: It groups <task:scheduled> tags.
@Scheduled Annotation with XML Configuration
<beans>
<task:scheduler id="taskScheduler" pool-size="10"/>
<task:annotation-driven scheduler="taskScheduler"/>
<bean id="bookApp" class="com.concretepage.BookApp"/>
</beans>
<task:annotation-driven> : It enables @Scheduled methods to be scheduled on fixed rate.
Now run the demo.
XMLConfigSpringDemo.java
package com.concretepage;
import org.springframework.context.support.AbstractApplicationContext;
import org.springframework.context.support.ClassPathXmlApplicationContext;
public class XMLConfigSpringDemo {
public static void main(String[] args) {
AbstractApplicationContext context = new ClassPathXmlApplicationContext("application-context.xml");
}
}
Find the output.
Arranging Book...
Executing cleanDustOne method...
Arranging Book...
Executing cleanDustTwo method...
Arranging Book...
2. Spring Task Scheduler with @Scheduled Annotation using JavaConfig
We can also schedule @Scheduled methods using JavaConfig with the help of @EnableScheduling annotation. Method can be defined in JavaConfig file also.
AppConfig.java
package com.concretepage;
import org.springframework.context.annotation.ComponentScan;
import org.springframework.context.annotation.Configuration;
import org.springframework.scheduling.annotation.EnableScheduling;
import org.springframework.scheduling.annotation.Scheduled;
@Configuration
@ComponentScan(basePackages="com.concretepage")
@EnableScheduling
public class AppConfig {
@Scheduled(fixedRate=1000)
public void doTask() {
System.out.println("Do Task...");
}
}
StudentUtil.java
package com.concretepage;
import org.springframework.scheduling.annotation.Scheduled;
import org.springframework.stereotype.Service;
@Service
public class StudentUtil {
@Scheduled(fixedRate=2000)
public void countStudent(){
System.out.println("Count Student...");
}
}
JavaConfigSpringDemo.java
package com.concretepage;
import org.springframework.boot.SpringApplication;
import org.springframework.context.ApplicationContext;
public class JavaConfigSpringDemo {
public static void main(String[] args) {
ApplicationContext context = SpringApplication.run(AppConfig.class);
}
}
Find the output.
Do Task...
Do Task...
Count Student...
Do Task...
Download Source Code
POSTED BY
ARVIND RAI
ARVIND RAI
FIND MORE TUTORILAS
©2019 concretepage.com | Privacy Policy | Contact Us | ESSENTIALAI-STEM |
Designing the instruction format, Computer Engineering
Assignment Help:
Q. Designing the instruction format is a complex art?
Instruction Length
Significance: It's the fundamental issue of the format design. It concludes the richness and flexibility of a machine.
Related Discussions:- Designing the instruction format
Explain implementation of circuits from boolean expression, Explain Impleme...
Explain Implementation of the Circuits From the Boolean Expression? If the operation of the circuit is defined by a Boolean expression, a logic-circuit diagram can he implement
Explain the potential role of information technology, Question 1: Descr...
Question 1: Describe the five maturity levels of KM that an organization faces when adopting the Frid's KM framework. Question 2: (a) Describe three major issues that
Find resolution and output voltage of D/A convertor, A 6-bit R-2R ladder D/...
A 6-bit R-2R ladder D/A converter has a reference voltage of 6.5V. It meets standard linearity.Find (i) The Resolution in Percent. (ii) The output voltage for the word 011100.
Explain multithreading in a programming language, Multithreading is the pro...
Multithreading is the process in which more than single thread run independent of each other within the process in any programming language such as C, C++, etc.
Describe all elements of a state-chart diagram, a. Initial State: The first...
a. Initial State: The first or the default state the object is in. It is indicated by a solid circle. b. State: All the states an object can go in are mentioned in this. It is
Dynamic configuration of parallel virtual machine, Q. Dynamic Configuration...
Q. Dynamic Configuration of parallel virtual machine? int pvm_addhosts( char **hosts, int nhost, int *infos ) Add hosts to virtual machine. hosts is an arra
Explain about truth table and logic diagram, Q. Explain about truth table a...
Q. Explain about truth table and logic diagram? A Boolean function can be realized in a logic circuit employing the basic gates: - AND, OR & NOT. Concern here for illustration
Explain the main tags of wireless markup language, Discuss the main tags of...
Discuss the main tags of WML. Tag Definition of Wireless Markup Language: This defines the starting and the ending of the page, as . this explains
Subsequent statements set every element of matrix, Q. Subsequent statements...
Q. Subsequent statements set every element of matrix? Let a= [2,4,6,8,10], b=[1,3,5,7,9], c=[0,0,0,0,0] Consider the subsequent program section FORALL (i = 2:4) a(i)
What do you mean by communication traffic, Q. What do you mean by Communica...
Q. What do you mean by Communication Traffic? Communication Traffic offers a pictorial view of communication traffic in interconnection network with respect to time in progress
Write Your Message!
Captcha
Free Assignment Quote
Assured A++ Grade
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd | ESSENTIALAI-STEM |
Wikipedia talk:WikiProject Oregon/Transportation
Purpose
Just starting up the discussion page. Please post any transportation-related tasks here! Ajbenj 05:37, 11 June 2006 (UTC)
WikiProject Oregon State Highways
Northenglish started up this WikiProject, so I thought I would promote it here. There's lots to do. Katr67 03:01, 28 September 2006 (UTC)
WikiProject Oregon State Rail
I think we should start an article about passenger rail transportation in Oregon. Anyone else in favor?
I'd also be interested in helping out with the Salem station's article. Joseph 01:27, 9 October 2006 (UTC)
Bicycling
Portland leads American cities by providing riders with hundreds of miles of on-street Bike Routes. Portland bicycle and pedestrian advocates have been active for years, hosting Walkable City Workshops, Rails to Trails, and the current 40-Mile Loop, as part of local neighborhood and community-planning processes. The City of Portland, Metro Regional Transportation Planning Committees, and the Oregon Dept of Transportation, Tri-Met cooperate to design multi-modal transit route improvements. Multnomah County has pledged Pedestrian and Bicycle improvements as part of each bridge renovation projects it conducts. At least 3,000 Bike Commuters per day use the east-west Hawthorne street and bridge to downtown.
Portland alone holds a large collection of bicycle-only infrastructure, such as the bike path along the length of I-205 from Oregon City to the Columbia River and Vancouver, Washington.
Thousands of riders participate in organized rides in the Pacific Northwest. Annual major events include the Bus/Bike/Car Challenge, daily Bike Month events, the Seattle to Portland (STP) ride, a mountain to coast ride, the worst day of the year ride, dozens of club events, and over 10,000 Bike Portland's scenic Bridges, in the Providence Bridge Pedal each August.
All Tri-Met Buses amd MAX Light Rail Cars can carry bikes. Free Bike Lockers are also available. Riders may contact the BTA for a Locker Key, route maps, and additional information. This website: http://www.bta4bikes.org is provided by Oregon's statewide advocacy group, The Bicyce Transportaton Alliance to assist riders to improve safety, and provide legal support and enjoyment for Bicyclists.
This large network of bike paths may deserve articles, and additional links to Maps. —the preceding comment is by <IP_ADDRESS> (talk • contribs) 2007-02-05T07:25:40 PST: Please sign your posts!.
* This appears to be a call for creating some articles. I looked to see if some were already written, but few are. Here are a few ideas for article names, and some external links to help create them:
* 40 Mile Loop
* Bicycling in Portland, Oregon: currently lightly addressed in Transportation in Portland, Oregon; additional sources:
* List of bicycling events and clubs in Portland, Oregon:
* Bicycling in Oregon:
* Oregon bicycling law
* Bicycle Transportation Alliance: this unique organization probably deserves an article
* Seattle to Portland Bicycle Classic: article started; could use more references, history and photos
* Cycle Oregon: this highly sought-after event probably deserves an article
* Worst day of the year ride
* Portland Bridge Pedal:
* The Hood to Coast ride, but can't find the name of it. Anyone know?
—EncMstr 18:45, 5 February 2007 (UTC)
Trails
Public trails may fall into the realm of parks, as there are many deserving of articles inside the Portland city limits maintained by the parks bureau. Large trails, such as the Pacific Crest Trail, or hiking trail networks would fall into this category. Portland's 40 Mile Loop planning and restoration process is a notable current project that deserves coverage and a link.
Long-distance bus service
An Oregon sustainable travel development group, Mass Tram America, has designed what might be described as a rapid air-bus alternative. The overhead Mass Tram addresses the problems and hazards faced by more expensive road and rail-based systems, and is emission and fuel-free, powered by 100% renewable energy. The Inter-city Tram will be silent and fast, with cost savings captured by adapting retired Jet airliners to travel at high-speeds overhead. An Oregon sustainable travel development group, Mass Tram America, has designed what might be described as a rapid air-bus alternative. It is an adjunct to existing systems that is to be powered by 100% renewable energy that is built into the transit system. Inter-city Tram cars will be silent and fuel-free, with cost savings provided by adapting retired Jet airliners, to travel at high-speeds overhead, powered by electric motors and renewabe energy, and suspended overhead in a design informed by suspension bridges proven to survive storms and earthquakes. The air Tram is proected to be less expensive to build than rail or roads, and offers to open new scenic travel routes, and a way to eliminate winter travel hazards, an option for holiday travel when air travel is halted by weather, and will reduce rush-hour congestion and rail slow-downs due to freight schedules and accidents. for more information. Mass Tram developers invite partnerships to build a prototype high-speed transit alternative that can offer an excellent view of the American countryside. Readers may assist the Public-benefit company in community planning for the prototype, cross-country route siting, Rights of Way permissions, and leveraging federal help to revitalize communities with economic develpment support along proposed routes. The Mass Tram transit alternative is offered as an enjoyable inter-city solution for routine business travel, a way to bring tourism and a diesel-free freight shipping, to benefit communities along new travel routes.
Oregon Road Reference
Came accross this and this, but wasn't sure if anyone here had seen them. Good for Oregon routes. Aboutmovies 19:57, 1 April 2007 (UTC)
Oregon Airports
Good day all, I have started a List of private-use airports in Oregon. In addition, I will be updating the List of Airports in Oregon soon as I get it completed. (I have not segregated them into types or added IATA/ICAO data). Feel free to take a look and pitch in all you like. Any advice or input would be appreciated -Trashbag 19:37, 27 April 2007 (UTC)
* Greetings again everyone, Oregon now has an article for every active public use and private use airport/heliport/seaplane base within the state (I believe we are the first). Please take a moment to review a few articles and pitch in on anything you may know. Also, feel free to create links to individual articles so the don't appear orphaned. If anything it's fun to check out the airfields near you may live. Some fun tidbits:
* Oregon has 358 private use airports and 98 public use airports - a ratio of approximately 4 to 1.
* Of the 450+ airports in Oregon only 10 are certified for scheduled airline service.
* Ever see an airport that had a dirt runway and a water runway?
* --Trashbag (talk) 23:41, 16 January 2008 (UTC)
* Nice work. I appreciate how much work that was, since I've done that with similar series of articles which obtain information from the gum mint. Dirt runway? Looks paved.... —EncMstr 00:16, 17 January 2008 (UTC)
* Thanks for the kudos. I pulled all of my data from the FAA so according to them it's "Gravel". I found quite a few errors in their database. I believe the public airports are inspected every three years but the private airports are only inspected one time so things may have changed at the site. Either way, looks like a fun place! --Trashbag (talk) 00:36, 17 January 2008 (UTC) | WIKI |
Boot Service Discovery Protocol
Boot Service Discovery Protocol (BSDP) is an Apple-developed, standards-conforming extension of DHCP. It allows Macintosh computers to boot from bootable images on a network instead of local storage media such as CD, DVD, or hard disk. The DHCP options used are the "vendor-specific information" option (number 43) and the "vendor class identifier" option (number 60). There are three versions of BSDP, though usually version 1.0 is used. All versions enable a client to choose from several bootable images offered by a server. The reference implementation of BSDP is Darwin's BOOTP server, which is part of Mac OS's NetBoot feature.
Contents of DHCP Vendor Class Identifier
The DHCP server and client send a vendor class option that contains an ASCII-encoded string with three parts delimited by a / character. The first part is AAPLBSDPC, which advertises BSDP capability. The second part is the client's architecture ("ppc" or "i386"). The third part is a system identifier. For example, an Intel-based iMac sends AAPLBSDPC/i386/iMac4,1 as its vendor class. A list of Microsoft vendor classes can be found here.
Contents of DHCP Vendor Specific Information Options
DHCP Option 43 is reserved for vendor specific information. This information is stored in the following format: Code Len Vendor-specific information +-+-+-+-+--- | 43 | n | i1 | i2 | ... +-+-+-+-+--- If the vendor wants to convey multiple options within this option field, this is done with encapsulated vendor-specific extensions. Vendor encapsulated extensions contain one or more concatenated fields. Each field consists of:
The following table describes the possible field types. All numeric fields are interpreted as unsigned and Big Endian integers.
Example
The following example illustrates the construction of the Vendor Encapsulated Option:
The first field here, 01 01 02, means that the packet is a BSDP "SELECT" message. The 01 declares that field specifies the BSDP Message Type. The next 01 indicates that the field contents are one byte long — 02 is the code for "SELECT".
The following 08 04 81 00 07 e5 means that the boot image with the ID<PHONE_NUMBER> is selected.
Finally, 82 0a 4e 65 74 42 6f 6f 74 30 30 31 means that a string with 0x0a = 10 characters, namely "NetBoot001", is the name of the system to boot. | WIKI |
Janney v. Columbian Insurance Company/Opinion of the Court
This case varies somewhat in form, but nothing in principle, from the case of Dorr v. The Pacific Insurance Company, (7 Wheat. Rep. 582.) The material point of distinction is this; in that case the discharge of the underwriters was made to depend on a regular survey alone; the stipulation was, 'that if the vessel, upon a regular survey, should be thereby declared unseaworthy by reason of her being unsound or rotten,' the policy should be discharged. And hence, although a condemnation in the Vice Admiralty Court of the Bahamas was produced in evidence in that cause, the Court makes no other use of it, than as the means of authenticating the survey upon which the decree was made.
The terms of the present stipulation are these: 'if the above mentioned brig, after a regular survey should be condemned for being unsound or rotten,' the insurers are to be discharged. From which it is obvious, that both a regular survey and a condemnation are in contemplation of the parties. And the question is, whether the bill of exceptions makes out the casus faederis.
This gives rise to three questions: Was the survey regular? was the condemnation conformable to the contract? and does the one or the other bring the case within the terms of the stipulation? With regard to the survey, the case is a very clear one. The laws of Louisiana contain ample and judicious provisions on this subject. The Master and Wardens of the Port of Orleans are vested with various powers, and required to keep an office and a book of record open to all the world; they possess in fact, some of the attributes of a municipal Court. With regard to damaged vessels, and vessels deemed unfit to proceed to sea, they, or any two of them, with one or more skilful carpenters, are constituted surveyors; and the laws enjoin, 'that they shall, upon every such survey, certify under their hands, how the vessels so surveyed appeared to them, and shall cause entries to be made in a book to be kept for that purpose in their office.' A survey, therefore, made by them, pursuant to this law, and at the call of the captain of this vessel, was emphatically a regular survey.
The difficulty in the cause arises upon the next member of the clause under consideration, to wit, that which requires a condemnation. The certificate of the survey purports, that there was, in fact, a condemnation of the vessel; but there is nothing in the laws of Louisiana which vests the power expressly in the Master and Wardens of the Port to condemn a vessel as unfit for sea or unworthy of repair. As to damaged merchandise, the power is expressly given; but as to ships, it appears to be exercised as incidental to the surveying power. In other parts of the world, it is very generally exercised as an incident to the admiralty power; and the admiralty jurisdiction under our system, can only be exercised under the laws of the United States.
These considerations are only thrown out to preclude the supposition that the Court has not had them in mind whilst considering this subject. We do not mean to intimate that the power is one which cannot be exercised under municipal regulations. On the contrary, there are many reasons for maintaining that it may be so exercised until Congress may think proper to establish some general rule upon the subject, either as one appertaining to trade and commerce, or within the admiralty jurisdiction. If, therefore, there had been express provision on the subject in the laws of Louisiana, or it had been shown to be recognised as a power known and habitually exercised in that port, as an incident to the surveying power, we should have felt no difficulty on this point. As it is, we must place our opinion on another ground, one, however, which is also noticed in Dorr's case. It is this, that the condemnation, such as it is, was obtained through the instrumentality of the master, who, as such, represented his employers, and who was, in fact, in this instance, also a part owner. In this condemnation he acquiesced, broke up the voyage, and sold the vessel; and the certificates now before this Court were transmitted to the underwriters, and actually in a former trial between the same parties, made evidence to prove the fact which they ascertain. It is then too late for the plaintiffs to dispute the validity or verity of the act of condemnation. They have recognised the jurisdiction of the tribunal they appealed to, to obtain the survey, as sufficient also to make the condemnation, and must be held to abide by it as such. All further and other investigation in a more competent tribunal, if there was such, was rendered impossible by their act.
It only remains, then, to determine, whether the facts ascertained by the survey are such as bring the case within the terms of the stipulation.
We are of opinion they are. It would be difficult to find a shade of difference in this respect, between the present case and that of Dorr. The terms of this certificate are, 'we found the timbers and bottom plank so much decayed, that we are unanimously of opinion her repairs would cost more than she would be worth afterwards; and that it would be for the interest of all concerned she should be condemned as unworthy of repairs on that ground. We did, therefore, condemn her as not seaworthy, and as unworthy of repairs.' Now it cannot be questioned that the ground of condemnation here stated does not stand single and unconnected with the estimated cost of repairs. But does this vary the case? We are of opinion it does not, since the condemnation of a vessel, on account of decay, can never, in its nature, stand single and unconnected with the expense of repairs. It is the common place to which the question of condemnation must always have reference. It is hardly possible to conceive a case where a survey would be called in which a vessel might not be repaired or renovated, and still leave enough of the hull to maintain her identity. A state of hopeless and absolute decay, therefore, is never in the contemplation of the contract. And whether expressed or not, the consideration whether the value when repaired would exceed the expense, invariably enters into the decision of surveyors upon a question of seaworthiness.
As, then, her being decayed, so as to be unworthy of repairs, is equivalent to, and in fact the technical meaning of unseaworthiness, we are of opinion, that the certificate brings the case within the words of the stipulation.
It follows, that the Court were correct in refusing the evidence offered by the plaintiff.
Judgment affirmed. | WIKI |
Page:Guy Boothby--A Bid for Fortune.djvu/157
Rh "Possibly, but there's another drawback to that. I haven't the necessary piece of stick."
"Here is a stiff piece of straw; try that."
He harpooned a piece of straw about eight inches long, across the room towards me, and, when I had received it, I thrust it carefully into the pipe. A disappointment, however, was in store for us.
"It's no use," I reported sorrowfully, as I threw the straw away. "It has an elbow halfway down, and that would prevent any message from being pushed through."
"Then we must try to discover some other plan. Don't lose heart!"
"Hush! I hear somebody coming."
True enough a heavy footfall was approaching down the passage. It stopped at the door of the room in which we were confined, and a key was inserted in the lock. Next moment the door swung open and a tall man entered the room. A ray of sunlight, penetrating between the boards that covered the window, fell upon him and showed me that his hair was white and that his face was deeply pitted with small-pox marks. Now where had I met or heard of a man with those peculiarities before! Ah! I remembered!
He stood for a moment in the doorway looking about him, and then strolled into the centre of the room.
"Good morning, gentlemen," he said, with an airy condescension that stung like an insult, "I trust you have no fault to find with the lodging our poor hospitality is able to afford you."
"Mr. Prendergast," I answered, determining to try him with the name of the man mentioned by my sweetheart in her letter. "What does this mean? Why have we been made prisoners like this? I demand to | WIKI |
Should I Be Worried About Asbestos Exposure?
Dangerous asbestos roof. The word asbestos written with letters whose graphic resembles the shape of the asbestos particles.
I grew up in an old house that was built in the 40s or 50s, and I am always worried that I may have been exposed to asbestos. I know that asbestos can lead to mesothelioma, but I also know that it can take decades for the cancer to actually form.
My concern is that I may have been exposed to asbestos when I was growing up. My parents still live in the home, and I would like to limit their exposure as much as I can.
Do you have any recommendations on what I can do to help my parents?
Your home may have asbestos in it, or someone may have removed the asbestos once news of the dangers was released to the public. If you’ve been exposed to asbestos, there’s nothing you can do to remove the fibers from your lungs. It’s really a wait-and-see scenario.
“Sources of asbestos in the home include tiles, insulation, and other building materials. These were often made with asbestos. In fact, many buildings made before 1980 have a higher risk of asbestos. The material was frequently used in roofing shingles, pipes, boilers, cement, and more. If a home contains asbestos, it is important to contact an abatement professional to remove the material safely,” explains Vogelzang Law.
The good news is that if you haven’t disturbed the asbestos, it’s not going to cause you any serious health issues.
The fibers are usually kept tucked away in the walls of the home, so unless you start any major renovations, there’s little risk that you have been exposed to these fibers.
What you can do is have someone come out to the home and test the air quality. These tests will check for asbestos in the air, and if there is no asbestos floating around, that’s a good thing.
But that doesn’t mean that you shouldn’t call for asbestos abatement. When abatement is performed, a professional will come to the home, using all of the latest techniques, and remove the asbestos. The person will use techniques, which often include soaking the asbestos material, so that the fibers do not enter the air during removal.
The professional will also test the air quality to determine if any asbestos fibers have entered the air after abatement. If fibers are present, additional services may be needed to clear the air of all asbestos fibers.
It’s a costly process, but it’s the best way to ensure that the home is completely free of asbestos.
If you notice that any insulation is coming off of pipes or plan on renovating the home, call in a professional to assess the situation. Even sanding of tiles that were created using asbestos can lead to the fibers entering the air and eventually into your lungs.
Past asbestos exposure led to 40,000 deaths in the US alone in 2016 and over 2,700 in the UK. You should make the dangers of the material known to your family, and you should know that short-term exposure isn’t an immediate death sentence. Exposure is cumulative, so unless extreme exposure occurs, your risks of serious health issues in the future are minimal.
Previous Story How Can I Bike Safely to Work? article thumbnail mt-3
How Can I Bike Safely to Work?
Next Story Fresno State reaches settlement with former athletic director article thumbnail mt-3
Fresno State reaches settlement with former athletic director | ESSENTIALAI-STEM |
Noam Chomsky was born on February 7, 1928, in Philadelphia, Pennsylvania, United States to the family of Zeev "William" Chomsky and Elsie Simonofsky, Ashkenazi Jewish immigrants born in modern-day Ukraine and Belarus respectively. His mother, Elsie, was a teacher and was active in the radical politics of the 1930s. His father, William was a respected professor of Hebrew at Gratz College, an institution for teacher’s training. Chomsky felt the weight of America's Great Depression. He was raised with a younger brother, David, and although his own family was middle class, he witnessed injustices all around him. One of his earliest memories consisted of watching security officers beat women strikers outside a textile plant.
Chomsky's parents had an enormous impact on their son. He was introduced to linguistics by his father. From an early age Noam and his brother were immersed in the revival of the Jewish culture and the Hebrew language. Young Noam studied Hebrew literature with his father. He spent time in Hebrew school and later became a Hebrew teacher himself.
By the age of 13, Chomsky was traveling from Philadelphia to New York, spending much of his time listening to the disparate perspectives hashed out among adults over cigarettes and magazines at his uncle’s newsstand at the back of a 72nd Street subway exit. Chomsky greatly admired his uncle, a man of little formal education, but someone who was wildly smart about the world around him. Chomsky’s current political views spring from this type of lived-experience stance, positing that all people can understand politics and economics and make their own decisions, and that authority ought to be tested before being deemed legitimate and worthy of power. | FINEWEB-EDU |
kewl's gallery
[1]
SELECT @@SESSION.sql_mode
(this query time : 0.000 s)
(total SQL time : 0.000 s)
(total time : 0.002 s)
(num rows : 1 )
[2]
SELECT param, value
FROM g_config
;
(this query time : 0.000 s)
(total SQL time : 0.000 s)
(total time : 0.002 s)
(num rows : 92 )
[3]
SELECT data
FROM g_sessions
WHERE id = '365171ebceaeca41p89l1fqq6483j1'
;
(this query time : 0.000 s)
(total SQL time : 0.001 s)
(total time : 0.003 s)
(num rows : 0 )
[4]
SELECT * FROM g_plugins
WHERE state='active'
(this query time : 0.000 s)
(total SQL time : 0.001 s)
(total time : 0.003 s)
(num rows : 15 )
[5]
SELECT id AS id
, username AS username
, password AS password
, mail_address AS email
FROM g_users
WHERE id = '2'
(this query time : 0.000 s)
(total SQL time : 0.001 s)
(total time : 0.004 s)
(num rows : 1 )
[6]
SELECT
ui.*,
uc.*,
t.name AS theme_name
FROM g_user_infos AS ui
LEFT JOIN g_user_cache AS uc ON ui.user_id = uc.user_id
LEFT JOIN g_themes AS t ON t.id = ui.theme
WHERE ui.user_id = 2
;
(this query time : 0.000 s)
(total SQL time : 0.001 s)
(total time : 0.004 s)
(num rows : 1 )
[7]
SELECT id, name
FROM g_languages
ORDER BY name ASC
;
(this query time : 0.000 s)
(total SQL time : 0.001 s)
(total time : 0.005 s)
(num rows : 69 )
[8]
SELECT *
FROM g_user_infos
WHERE user_id = 2
;
(this query time : 0.000 s)
(total SQL time : 0.002 s)
(total time : 0.005 s)
(num rows : 1 )
[9]
SELECT *
FROM g_tags
WHERE id IN (946)
(this query time : 0.000 s)
(total SQL time : 0.002 s)
(total time : 0.007 s)
(num rows : 1 )
[9]
SELECT id
FROM g_images i
INNER JOIN g_image_category ic ON id=ic.image_id
INNER JOIN g_image_tag it ON id=it.image_id
WHERE tag_id IN (946)
AND (category_id NOT IN (188,201,198,200,182,212) AND level<=0)
GROUP BY id
ORDER BY date_creation DESC, file ASC, id ASC
(this query time : 0.001 s)
(total SQL time : 0.002 s)
(total time : 0.007 s)
(num rows : 40 )
[10]
SELECT
id, name, permalink, nb_images, global_rank,
date_last, max_date_last, count_images, count_categories
FROM g_categories INNER JOIN g_user_cache_categories
ON id = cat_id and user_id = 2
WHERE
1 = 1
;
(this query time : 0.000 s)
(total SQL time : 0.002 s)
(total time : 0.008 s)
(num rows : 102 )
[11]
SELECT SUBDATE(CURRENT_DATE,INTERVAL 30 DAY)
(this query time : 0.000 s)
(total SQL time : 0.003 s)
(total time : 0.008 s)
(num rows : 1 )
[12]
SELECT t.*, count(*) AS counter
FROM g_image_tag
INNER JOIN g_tags t ON tag_id = id
WHERE image_id IN (6114,5915,5722,5767,5793,5812,5817,5818,5672,5271,5061,5058,5475,4957,4958,4955,4954,5051,5048,5041,5170,5226,5238,5254,5311,5351,5344,5362,5369,5367,5871,4743,4744,4752,4599,5326,4538,4240,3998,4825)
AND tag_id NOT IN (946)
GROUP BY t.id
ORDER BY counter DESC
LIMIT 20
(this query time : 0.002 s)
(total SQL time : 0.005 s)
(total time : 0.013 s)
(num rows : 20 )
[13]
SELECT *
FROM g_images
WHERE id IN (6114,5915,5722,5767,5793,5812,5817,5818,5672,5271,5061,5058,5475,4957,4958,4955,4954,5051,5048,5041,5170,5226,5238,5254,5311,5351,5344,5362,5369,5367,5871,4743,4744,4752,4599,5326,4538,4240,3998,4825)
;
(this query time : 0.001 s)
(total SQL time : 0.006 s)
(total time : 0.015 s)
(num rows : 40 )
[0.019 s, 13 queries] : end include/category_default.inc.php
[14]
SELECT id FROM g_images
WHERE latitude IS NOT NULL
AND id IN (6114,5915,5722,5767,5793,5812,5817,5818,5672,5271,5061,5058,5475,4957,4958,4955,4954,5051,5048,5041,5170,5226,5238,5254,5311,5351,5344,5362,5369,5367,5871,4743,4744,4752,4599,5326,4538,4240,3998,4825)
ORDER BY NULL
LIMIT 0,1
(this query time : 0.000 s)
(total SQL time : 0.006 s)
(total time : 0.020 s)
(num rows : 1 )
[15]
INSERT INTO g_history
(
date,
time,
user_id,
IP,
section,
category_id,
image_id,
image_type,
format_id,
auth_key_id,
tag_ids
)
VALUES
(
CURRENT_DATE,
CURRENT_TIME,
2,
'54.81.150.27',
'tags',
NULL,
NULL,
NULL,
NULL,
NULL,
'946'
)
;
(this query time : 0.000 s)
(total SQL time : 0.006 s)
(total time : 0.021 s)
(affected rows : 1 ) | ESSENTIALAI-STEM |
Ostrybór
Ostrybór is a village in the administrative district of Gmina Wilga, within Garwolin County, Masovian Voivodeship, in east-central Poland.
In 1975-1998 the town administratively belonged to the province of Siedlce. | WIKI |
Punjab Public Service Commission (Pakistan)
The Punjab Public Service Commission (PPSC) is a government agency responsible for hiring and administering the provincial civil services and management services in the Punjab Province of Pakistan.
History
The Punjab Public Service Commission, established in April 1937, is the oldest Provincial Public Service Commission in Pakistan. It was established under the Punjab Public Service Commission Ordinance, of 1978. It functions in accordance with the ambit of the Punjab Public Service Commission Ordinance, 1978, and Punjab Public Service Commission (Functions) Rules, 1979. | WIKI |
Microsoft is working on its own Linux-style package manager to make software installation go considerably faster. Here’s how you can get started right away.
You can install software on Linux by downloading installers from the internet, but the more popular method is to utilize a package manager. This allows you to install software quickly and quietly from the command line by simply typing a command to install whatever you want. You can add as many repositories as you like, but the method is the same.
On Windows, you can already do something similar with Chocolatey, a community-supported package repository and companion installer that lets you manage your software. PowerShell or Command Prompt is used to install Windows apps. However, Microsoft is developing its own, the Windows Package Manager, which is now in preview.
What is the procedure for installing the Windows Package Manager Client?
If you match the aforementioned requirements, the Windows Package Manager Client (also known as winget-cli) will be distributed through the Microsoft Store through an updated version of the App Installer. If you joined up for the Insiders Program, make sure your Microsoft Account there is the same as the one you use to access the Store.
You should now have access to the Client and be able to use winget to install packages.
There are other options, and despite being a member of the Insiders Program, I haven’t been able to get the latest App Installer through the Store. But don’t worry, you can also download it from GitHub and install it manually. This is the same version as the Microsoft Store version, but you won’t get automatic updates; you’ll have to do it manually.
To install manually, follow these steps:
1. Go to the GitHub website for the Windows Package Manager Client releases.
2. For the most recent release, download the appxbundle.
3. Open the file you just downloaded.
4. To begin the installation, click Update.
For you to utilize on your PC, the winget-cli update will now be uploaded to the already installed App Installer. It’s a good idea to bookmark the releases page because you’ll need to repeat the steps above to upgrade winget-cli when a new version is available.
If you’re bold or familiar with Visual Studio 2019, you can also build it yourself. Check out the GitHub page for further information. You’re ready to start downloading packages once you’ve installed them. To communicate with winget-cli, you can use the old-school Command Prompt, Windows PowerShell, or the modern PowerShell 7.
To make sure it’s all working, open any of the shells indicated above and execute winget —info. If everything went properly, you should see a paragraph about the version you installed.
When it comes to packages, you can find a large selection on the winget-pkgs GitHub repository, or you can use the wonderful third-party resource winstall.app. You only need to know one command: winget install nameofpackage>, and you’re ready to go. | ESSENTIALAI-STEM |
Memorial Bend, Houston
Memorial Bend is a historic neighborhood on the west side of Houston, Texas.
It is made up of 1950s and early 1960s homes built in the modern (contemporary), ranch, and traditional styles. Memorial Bend is considered to have the highest concentration of mid-century modern homes in Houston. Modern architects who designed homes in this neighborhood include: William Norman Floyd, William R. Jenkins, William F. Wortham and Lars Bang. Many of these homes were featured in national magazines for architecture and design such as American Builder, House & Home, Practical Builder, Better Homes & Gardens and House Beautiful.
Memorial Bend is located in the 77024 zip code area just south of Memorial Drive and straddles the Sam Houston Tollway (built through the middle of the neighborhood in 1992). Memorial Bend is within the Spring Branch Independent School District (SBISD). The schools zoned to Memorial Bend are Rummel Creek Elementary, Memorial Middle, and Memorial and Stratford Highs. | WIKI |
At 100, Woody Guthrie Still Resonates
Even though Guthrie died almost 45 years ago, his lyrics and message continue to appeal to new generations of Americans.
Woodrow Wilson Guthrie grew up rough and poor and wild in a family scarred by tragedy. His older sister died in a fire when he was 6. His mother was eventually committed to a mental hospital, where she died when Woody was 18. By then, the Guthries' native Oklahoma was reeling from the one-two punch of the Great Depression and the Dust Bowl of the 1930s — and the westward migration it spawned.
A song Guthrie wrote in 1938, " I Ain't Got No Home in This World Anymore," describes his family's plight:
My brothers and sisters are traveling on this road
A hot and dusty road that a million feet have trod
Rich man took my home and drove me from my door
And I ain't got no home in this world anymore
Joe Klein, a journalist for Time magazine and the author of the political novel Primary Colors, wrote a biography of Woody Guthrie in 1980.
"The further we get away from Woody's birth and death, and take a look at his influence, [the more] it helps us learn about ourselves as Americans," Klein says. "There's a wild-ass quality to this country that he personified. I go around the country. The greatest fear is that we're losing that — we're losing our creativity, our individualism. Woody was an individual, and a militantly individual individual."
Guthrie blew out of Oklahoma on the winds of the Dust Bowl, along with hundreds of thousands of displaced Americans. He was in his 20s when he landed in the California farmlands. But another Guthrie biographer, Elizabeth Partridge, says Woody just didn't have a knack for farm work.
"Woody was not a physical worker — he was not out in those fields picking like everybody else in California," Partridge says. "But he was the first one to show up and have his guitar and lead a cotton strike. If he could be there doing the music, he was happy."
Guthrie found his place in the world as a troubadour supporting farmworkers and union movements. He was too independent to be a card-carrying communist, but his sympathies were always with the poor and the powerless. His politics veered far to the left.
"Society was also gaining such a strong leftist position, because there were so many people in his same shoes," Partridge says.
Guthrie's songs connected with those people, and he headed east to make his first recordings at the advent of WWII. By 1943, he'd written an autobiography that led The New York Times to call Guthrie a national treasure — "part of the best stuff this country has to show the world."
But Guthrie's politics stayed far to the left even as the political climate shifted during the Cold War. For the most part, he wound up playing to small audiences.
As the 1950s turned to the '60s, interest in folk music picked up — and Guthrie's politics resonated once again. Bob Dylan, Ramblin' Jack Elliott and Pete Seeger championed his songs, introducing him to a new generation. But by then, Guthrie's health was failing as a result of Huntington's disease, a neurological disorder he inherited from his mother.
Woody Guthrie died on Oct. 3, 1967. But that's not the end of his story.
Guthrie's daughter, Nora, has largely written the latest chapter. She runs the Woody Guthrie Foundation, which curates her father's artistic legacy. It's hard to exaggerate the sheer volume of his output. Many thousands of pages of drawings, paintings, writings and lyrics fill floor-to-ceiling shelves. Guthrie seems to have written about every place he ever went to — and every person he ever met.
"He loved writing — he loved it," Nora Guthrie says. "My mother would say, 'He loved the feeling of a pen on paper' — just that visceral experience. He loved that. It was his energy coming out of his fingertips."
Nora Guthrie has opened this archive not only to researchers and biographers, but also to musicians like Jeff Tweedy of the band Wilco. He went there and held the battered journal that contains Woody's handwritten lyrics to "This Land Is Your Land."
"I remember it feeling like I was getting to hold the Declaration of Independence," Tweedy says.
But most of the archive is made up of unpublished writings. They reflect the full range of Guthrie's interests.
"He was everything I thought he was, and an enormous amount more," Tweedy says. "I wasn't expecting there to be ribald songs about prostitutes, or Jewish songs. And I was thrilled to have that in there, because that felt like the Woody Guthrie I'd like to imagine or invent if it wasn't real."
Among the songs that Tweedy found in the archive, and later recorded, was one called "California Stars."
"It's on a yellow piece of paper in blue ballpoint," Nora Guthrie says. "He hadn't been to California in 10 years at least. He probably already knew he had Huntington's, and he wished he could go back in time — stop the progress of an illness."
Tweedy says that as he sifted through the archive, he started to a get a sense of the "genuineness" that was part of Woody's appeal in the 1930s — and that still resonates today.
"He was very welcoming. There was this generosity of spirit and openness to experience, experiencing the world and the people of the world, an almost childlike embrace of whatever happens," Tweedy says. "I think that's always going to be inspiring, when you can find someone that has such a gift for being themself."
About 300 of Woody Guthrie's unpublished song lyrics have now been set to music and recorded by a new generation — that's more than he recorded himself in his lifetime. Nora Guthrie says musicians are still finding new material.
"It's been 20 years, and I still haven't read all the lyrics," she says. "Just watching each of the artists turn the pages, I realized what happens is they find themselves in Woody's lyrics. Every artist finds something different."
Copyright 2020 NPR. To see more, visit https://www.npr.org. | FINEWEB-EDU |
Charles Olson
Charles Olson (27 December 1910 – 10 January 1970) was a second generation modernist American poet who was a link between earlier modernist figures such as Ezra Pound and William Carlos Williams and the third generation modernist New American poets. The latter includes the New York School, the Black Mountain School, and some of the artists and poets associated with the Beat generation and the San Francisco Renaissance.
Today, Olson remains a central figure of the Black Mountain Poetry school and is generally considered a key figure in moving American poetry from modernism to postmodernism. In these endeavors, Olson described himself not so much as a poet or a historian but as "an archeologist of morning."
Life
Olson was born to Karl Joseph and Mary (Hines) Olson and grew up in Worcester, Massachusetts, where his father worked as a mail carrier. He spent summers in Gloucester, Massachusetts, which was to become his adopted hometown and the focus of his writing. At high school he was a champion orator, winning a tour of Europe (including a meeting with William Butler Yeats) as a prize. He studied English literature at Wesleyan University, where he graduated Phi Beta Kappa in 1932 before earning an M.A. in the discipline (with a thesis on the oeuvre of Herman Melville) in 1933. After completing his M.A., Olson continued his Melville research at Wesleyan during the 1933–1934 academic year with partial fellowship support. For two years thereafter, he taught English as an instructor at Clark University in Worcester, Massachusetts.
Olson entered Harvard University as a doctoral student in English in 1936. He eventually joined the newly-formed doctoral program in American Civilization as one of its first three candidates. Throughout his studies, he worked at Winthrop House and Radcliffe College as an instructor and tutor in English. Although he completed his coursework by the spring of 1939, he failed to finish his dissertation and take the degree. He then received the first of two Guggenheim Fellowships for his studies of Melville; a monograph derived from his master's thesis and subsequent research, Call Me Ishmael, was published in 1947. His first poems were written in 1940.
In 1941, Olson moved to New York City's Greenwich Village and began living with Constance "Connie" Wilcock in a common-law marriage; they had one child, Katherine. During this period, he was employed as the publicity director for the American Civil Liberties Union (May 1941 – July 1941) and as chief of the Common Council for American Unity's Foreign Language Information Service (November 1941 – September 1942). At that point, they moved to Washington, D.C., where he worked in the Foreign Language Division of the Office of War Information, eventually rising to associate chief under Alan Cranston.
Upset about the increasing censorship of his news releases, Olson went to work for the Democratic National Committee as director of the Foreign Nationalities Division in May 1944. In this capacity, he participated in Franklin Roosevelt's 1944 presidential campaign, organizing "Everyone for Roosevelt", a large campaign rally at New York's Madison Square Garden. Following Roosevelt's re-election to an unprecedented fourth term, he wintered in Key West, Florida. In January 1945, he was offered his choice of two positions (including Assistant Secretary of the Treasury and the Cabinet-rank Postmaster General) in the Roosevelt administration. Increasingly disenchanted with politics, he turned down both posts.
The death of Roosevelt and concomitant ascendancy of Harry Truman in April 1945 inspired Olson to dedicate himself to a literary career. From 1946 to 1948, Olson visited Ezra Pound at St. Elizabeths Hospital, drawn to the poet and his work though repelled by some of his political ideas.
In September 1948, Olson became a visiting professor at Black Mountain College in North Carolina, replacing longtime friend Edward Dahlberg for the academic year. There, he would work and study beside such artists as the composer John Cage and the poet Robert Creeley. He subsequently joined the permanent faculty at the invitation of the student body in 1951 and became Rector shortly thereafter. While at Black Mountain, he had a second child, Charles Peter Olson, with one of his students, Betty Kaiser. Kaiser became Olson's second common-law wife following his separation from Wilcock in 1956.
Despite financial difficulties and Olson's eccentric administrative style, Black Mountain College continued to support work by Cage, Creeley, Allen Ginsberg, Robert Duncan, Fielding Dawson, Cy Twombly, Jonathan Williams, Ed Dorn, Stan Brakhage, and many other members of the 1950s American avant-garde throughout Olson's rectorship. Olson's influence has been cited by artists in other media, including Carolee Schneemann and James Tenney.
Olson's ideas came to influence a generation of poets, including writers Duncan, Dorn, Denise Levertov, and Paul Blackburn. At 204 cm (6'8"), Olson was described as "a bear of a man", his stature possibly influencing the title of his Maximus work. Olson wrote copious personal letters and helped and encouraged many young writers. His transdisciplinary poetics were informed by a range of disparate and learned sources, including Mayan writing, Sumerian religion, classical mythology, Alfred North Whitehead's process philosophy (as exemplified by Process and Reality [1929]) and cybernetics. Shortly before his death, he examined the possibility that Chinese and Indo-European languages derived from a common source.
When Black Mountain College closed in 1956, Olson oversaw the resolution of the institution's debts over the next five years and settled in Gloucester. He participated in early psilocybin experiments under the aegis of Timothy Leary in 1961 and Henry Murray and served as a distinguished professor at the State University of New York at Buffalo (1963-1965) and visiting professor at the University of Connecticut (1969). From 1965 until his death, Olson received a generous, informal annuity (nominally rendered for his services as editorial consultant to Frontier Press) from philanthropist and publisher Harvey Brown, a former graduate student at Buffalo; this enabled him to take an indefinite leave of absence from his Buffalo professorship and return to Gloucester.
In January 1964, Kaiser was killed by a drunk driver in a head-on automobile accident, although a grieving Olson incorrectly theorized her death as a potential suicide because of her dissatisfaction with her life in the Buffalo area. Her death precipitated Olson into an existential mixture of extreme isolation, romantic longing, and frenzied work. Much of his life was affected by his heavy smoking and drinking, which contributed to his early death from liver cancer. Following his diagnosis, he was transferred to New York Hospital for a liver operation, which never occurred. He died there in 1970, two weeks past his fifty-ninth birthday, while in the process of completing his epic, The Maximus Poems.
Early writings
Olson's first book, Call Me Ishmael (1947), a study of Herman Melville's novel Moby Dick, was a continuation of his M.A. thesis at Wesleyan University.
In Projective Verse (1950), Olson called for a poetic meter based on the poet's breathing and an open construction based on sound and the linking of perceptions rather than syntax and logic. He favored metre not based on syllable, stress, foot or line but using only the unit of the breath. In this respect Olson was foreshadowed by Ralph Waldo Emerson's poetic theory on breath. The presentation of the poem on the page was for him central to the work becoming at once fully aural and fully visual The poem "The Kingfishers" is an application of the manifesto. It was first published in 1949 and collected in his first book of poetry, In Cold Hell, in Thicket (1953). His second collection, The Distances, was published in 1960.
Olson's reputation rests in the main on his complex, sometimes difficult poems such as "The Kingfishers", "In Cold Hell, in Thicket", and The Maximus Poems, work that tends to explore social, historical, and political concerns. His shorter verse, poems such as "Only The Red Fox, Only The Crow", "Other Than", "An Ode on Nativity", "Love", and "The Ring Of" are more immediately accessible and manifest a sincere, original, emotionally powerful voice. "Letter 27 [withheld]" from The Maximus Poems weds Olson's lyric, historic, and aesthetic concerns. Olson coined the term postmodern in a letter of August 1951 to Robert Creeley.
The Maximus Poems
In 1950, inspired by the example of Pound's Cantos (though Olson denied any direct relation between the two epics), Olson began writing The Maximus Poems. An exploration of American history in the broadest sense, Maximus is also an epic of place, situated in Massachusetts and specifically the city of Gloucester where Olson had settled. Dogtown, the wild, rock-strewn centre of Cape Ann, next to Gloucester, is an important place in The Maximus Poems. (Olson used to write outside while sitting on a tree-stump in Dogtown.)
The whole work is also mediated through the voice of Maximus, based partly on Maximus of Tyre, an itinerant Greek philosopher, and partly on Olson himself. The last of the three volumes imagines an ideal Gloucester in which communal values have replaced commercial ones. When Olson knew he was dying of cancer, he instructed his literary executor Charles Boer and others to organize and produce the final book in the sequence following Olson's death.
Selected bibliography
* Call Me Ishmael. (1947; reprint, Baltimore: The Johns Hopkins University Press, 1997)
* Projective Verse Poetry New York #3 (1950; frequently reprinted)
* The Distances. (New York: Grove Press Inc., 1960)
* Human Universe and Other Essays, ed. Donald Allen (San Francisco: Auerhahn Society, 1965; Rpt. New York: Grove, 1967)
* Selected Writings, ed. Robert Creeley (New York: New Directions, 1966).
* The Maximus Poems 1-10 (Stuttgart: Jargon, 1953).
* The Maximus Poems 11-22 (Stuttgart: Jargon, 1956).
* The Maximus Poems [Volume I] (New York: Corinth Books/Jargon 24, 1960; London: Cape Goliard, 1960).
* Maximus Poems IV, V, VI (London: Cape Goliard, 1968).
* The Special View of History, ed. Ann Charters (Berkeley: Oyez, 1970).
* Archaeologist of Morning (London and New York: Cape Goliard, 1970).
* The Maximus Poems: Volume Three (New York: Viking/Grossman, 1975).
* Charles Olson and Ezra Pound: An Encounter at St. Elizabeths, ed. Catherine Seelye. New York: Viking, 1975 ISBN 0-670-52400-X
* The Fiery Hunt and Other Plays (Bolinas: Four Seasons Foundation, 1977).
* The Maximus Poems, ed. George Butternick (Berkeley: U of California Press, 1983).
* The Collected Poems of Charles Olson: Excluding The Maximus Poems, ed. George Butternick (Berkeley: U of California Press, 1987).
* A Nation of Nothing but Poetry: Supplementary Poems, ed. George Butternick (Santa Rosa: Black Sparrow Press, 1989).
* Collected Prose, eds. Donald Allen & Benjamin Friedlander (Berkeley: U of California Press, 1997).
* Muthologos: Lectures and Interviews, ed. Ralph Maud (Talonbooks, 2010).
Correspondence
* Mayan Letters, ed. Robert Creeley (Mallorca: Divers Press, 1953; London: Jonathan Cape, 1968).
* Letters for Origin 1950-1956, ed. Albert Glover (New York: Cape Goliard, 1970).
* Charles Olson and Robert Creeley: The Complete Correspondence, eds. George F. Butterick & Richard Blevins, 10 vols. (Black Sparrow Press, 1980–96).
* Charles Olson & Cid Corman: Complete Correspondence 1950-1964, ed. George Evans, 2 vols. (Orono, ME: National Poetry Foundation, 1987, 1991).
* In Love, In Sorrow: The Complete Correspondence of Charles Olson and Edward Dahlberg, ed. Paul Christensen (New York: Paragon House, 1990).
* Charles Olson and Frances Boldereff: A Modern Correspondence, eds. Ralph Maud & Sharon Thesen (Wesleyan University Press, 1999).
* Selected Letters, ed. Ralph Maud (Berkeley: U of California Press, 2001).
* After Completion: The Later Letters of Charles Olson and Frances Boldereff, eds. Sharon Thesen & Ralph Maud (Talonbooks, 2014).
* An Open Map: The Correspondence of Robert Duncan and Charles Olson, eds. Robert J. Bertholf & Dale M. Smith (Albuquerque: University of New Mexico Press, 2017).
* The Collected Letters of Charles Olson and J.H. Prynne, ed. Ryan Dobran (Albuquerque: University of New Mexico Press, 2017). | WIKI |
User:Jmsaqib/sandbox
Roshan Bhait Pakistan / Punjab / Sadiqabad / World / Pakistan / Punjab / Sadiqabad / Pakistan / Punjab / Bahawalpur village Roshan Bhait is modern village. Literacy rate of this village is 100%. Situated at KLP (Karachi Lahore Peshawer) Road Between Sadiq Abad and Chowk Bahadar Pur, Rahim Yar Khan. This location is only Residential Area. | WIKI |
Meeting Venus
Meeting Venus is a 1991 British–American-Japanese film directed by the Hungarian director István Szabó and starring Glenn Close and Niels Arestrup. The movie was filmed in Budapest, Hungary.
This fictional story follows misadventures in making a modern Parisian production of the Wagner opera Tannhäuser, which in itself tells of the production of a singing contest. "Here you can be misunderstood in six different languages." The singing contest, the opera and the film explore the tension between sexuality and spirituality, punctuated by emotionally gripping vocal, choral and orchestral music. "Without hard work, there are no miracles," and in spite of committed, passionate people, the results are in doubt to the final moment in each performance.
Cast
Many of the characters in this movie have the same name and family name as director István Szabó, but in different languages. The Hungarian name István in English corresponds with Stephen. Surname Szabó means "tailor"; some persons in the film are: Stephen Taylor (English), Stefan Schneider (German), Stefano Sarto (Italian), Etienne Tailleur (French). There are also Maria Krawiecki (from the Polish word krawiec which means tailor) and Isaac Partnoi (from Russian word портной [portnoy] = ''tailor").
Voice on singing scenes
The version of Tannhäuser that can be heard in the movie is performed by Kiri Te Kanawa as Elisabeth, René Kollo as Tannhäuser, Håkan Hagegård as Wolfram von Eschenbach and Waltraud Meier as Venus with the London Philharmonia Orchestra conducted by Marek Janowski. The composer David Bedford provided extra orchestrations and music for the film. | WIKI |
Page:Ideas of Good and Evil, Yeats, 1903.djvu/246
Ideas of Good and Evil. and one night a year ago, I asked him questions which he answered by showing me flowers and precious stones, of whose meaning I had no knowledge, and he seemed too perfected a soul for any knowledge that cannot be spoken in symbol or metaphor.
Are he and his blue-robed companions, and their like, 'the Eternal realities' of which we are the reflection 'in the vegetable glass of nature,' or a momentary dream? To answer is to take sides in the only controversy in which it is greatly worth taking sides, and in the only controversy which may never be decided.
1898. 236 | WIKI |
Joachim Fickert
Joachim Fickert is a German football coach and instructor who has coached in a myriad of countries. As an itinerant football coach, he has had experience in Germany, Rwanda, Mauritania, Benin, Congo, Eritrea, Cambodia, Togo, Laos, Vietnam, Mali, and Ethiopia and has the English, French, and Khmer languages listed on his CV.
Cambodia
Taking over the Cambodia national team as part of a development project in aid of the country by the German government, Fickert guided the Kouprey Blue to 4-0 and 3-1 group stage triumphs over Brunei and Myanmar at the 1997 Southeast Asian Games. Trusted by public to bring good results, he steered Cambodia to its highest-ever FIFA ranking, 162nd place, in 1998 and was in charge of the team for the 2002 FIFA World Cup qualifying campaign. Took the helm of the Cambodian League's Nagaworld in 2006 where they had two friendlies in Vietnam, which they were beaten 5-1 and 5-0 by Hoàng Anh Gia Lai's A and B teams.
Vietnam
Roped in by An Giang in December 2003 with two Cambodians, the German was dismissed from his post by mid-February 2004 following five games with unsatisfactory results.
Mali
Announced as Mali technical director in 2008, the German was tasked with making a system for work within the Malian Football Federation as well as overseeing the national selection. However, he soon was forced to leave the country in 2012 as rebels were closing in on the Malian capital, Bamako. Overall, he held seminars for over 1400 participants, got 44 coaches internships, and helped develop Malian grassroots football as a whole.
Ethiopia
Tasked to develop football in Ethiopia for four years in 2012 based on the German model as part of a project between Germany and Ethiopia, Fickert helped Ethiopian youngsters secure contracts with European clubs and has said that the main problem with African football is lack of funds, facilities, as well as medical care. | WIKI |
glib2.0 2.56.4-0ubuntu0.18.04.2 source package in Ubuntu
Changelog
glib2.0 (2.56.4-0ubuntu0.18.04.2) bionic; urgency=medium
* Backport upstream patches to fix GVariant alignment tests
d/p/gvariant-test-Also-force-alignment-for-tuple-test-data.patch,
d/p/tests-Allocate-gvariant-data-from-the-heap-to-guarantee-a.patch:
Cherry-pick.
glib2.0 (2.56.4-0ubuntu0.18.04.1) bionic; urgency=medium
* New upstream release (LP: #1816547)
+ Various buffer overflow fixes in GMarkup/GVariant/GDBus
+ Fix "Moving a bookmark item to the same URI causes a crash" (LP:
#1760569)
* debian/libglib2.0-0.symbols: New symbols
-- Iain Lane <email address hidden> Fri, 22 Mar 2019 12:17:34 +0000
Upload details
Uploaded by:
Iain Lane
Uploaded to:
Bionic
Original maintainer:
Ubuntu Developers
Architectures:
any all
Section:
libs
Urgency:
Medium Urgency
See full publishing history Publishing
Series Pocket Published Component Section
Downloads
File Size SHA-256 Checksum
glib2.0_2.56.4.orig.tar.xz 6.7 MiB 27f703d125efb07f8a743666b580df0b4095c59fc8750e8890132c91d437504c
glib2.0_2.56.4-0ubuntu0.18.04.2.debian.tar.xz 78.3 KiB fea03bc8b1631b708aaba7151831b8d2ba749b832440d0ba3fffe07e6e1f8d12
glib2.0_2.56.4-0ubuntu0.18.04.2.dsc 3.5 KiB 5e500ed9a33e8fa14f884bd041b879b1b248b3992181d9f266bb75b6de38d264
View changes file
Binary packages built by this source
libglib2.0-0: GLib library of C routines
GLib is a library containing many useful C routines for things such
as trees, hashes, lists, and strings. It is a useful general-purpose
C library used by projects such as GTK+, GIMP, and GNOME.
.
This package contains the shared libraries.
libglib2.0-0-dbgsym: debug symbols for libglib2.0-0
libglib2.0-bin: Programs for the GLib library
GLib is a library containing many useful C routines for things such
as trees, hashes, lists, and strings. It is a useful general-purpose
C library used by projects such as GTK+, GIMP, and GNOME.
.
This package contains the program files which is used for the libraries
and others.
libglib2.0-bin-dbgsym: debug symbols for libglib2.0-bin
libglib2.0-data: Common files for GLib library
GLib is a library containing many useful C routines for things such
as trees, hashes, lists, and strings. It is a useful general-purpose
C library used by projects such as GTK+, GIMP, and GNOME.
.
This package is needed for the runtime libraries to display messages in
languages other than English.
libglib2.0-dev: Development files for the GLib library
GLib is a library containing many useful C routines for things such
as trees, hashes, lists, and strings. It is a useful general-purpose
C library used by projects such as GTK+, GIMP, and GNOME.
.
This package is needed to compile programs against libglib2.0-0,
as only it includes the header files and static libraries (optionally)
needed for compiling.
libglib2.0-dev-bin: Development utilities for the GLib library
GLib is a library containing many useful C routines for things such
as trees, hashes, lists, and strings. It is a useful general-purpose
C library used by projects such as GTK+, GIMP, and GNOME.
.
This package is needed to compile programs against libglib2.0-0. It contains
development utilities typically run during compilation and should not be
installed directly. Use libglib2.0-dev instead.
libglib2.0-dev-bin-dbgsym: debug symbols for libglib2.0-dev-bin
libglib2.0-doc: Documentation files for the GLib library
GLib is a library containing many useful C routines for things such
as trees, hashes, lists, and strings. It is a useful general-purpose
C library used by projects such as GTK+, GIMP, and GNOME.
.
This package contains the HTML documentation for the GLib library
in /usr/share/doc/libglib2.0-doc/ .
libglib2.0-tests: GLib library of C routines - installed tests
GLib is a library containing many useful C routines for things such
as trees, hashes, lists, and strings. It is a useful general-purpose
C library used by projects such as GTK+, GIMP, and GNOME.
.
This package contains test programs, designed to be run as part of a
regression testsuite.
libglib2.0-tests-dbgsym: debug symbols for libglib2.0-tests
libglib2.0-udeb: GLib library of C routines - minimal runtime
This is a udeb, or a microdeb, for the debian-installer.
.
GLib is a library containing many useful C routines for things such
as trees, hashes, lists, and strings. It is a useful general-purpose
C library used by projects such as GTK+, GIMP, and GNOME.
.
This package contains the minimal runtime library needed by the Debian
installer. | ESSENTIALAI-STEM |
Perrie
Perrie is both a surname and given name, and may refer to:
Surname
* Ian Perrie (born 1979), Australian rules footballer
* Lynne Perrie (1931–2006), English actress
* Maureen Perrie (born 1946), lecturer in Russian History
Given name
* Perrie Mans (born 1940), retired professional snooker player
* Perrie Edwards (born 1993), English singer | WIKI |
An official website of the United States government
The Modification of Maternal Smoking (M.O.M.S.) Project
Program Synopsis
Designed to promote smoking cessation and prevent smoking relapse among mothers of newborns, this intervention delivered by pediatric practices during the first four well-baby visits emphasizes the adverse health effects of secondhand tobacco smoke on newborns through materials tailored to the mother’s current smoking status and brief discussions with the pediatrician. The study showed higher rates of nonsmoking and lower relapse rate.
Program Highlights
Purpose: Designed to promote smoking cessation and prevent smoking relapse among pregnant women (1995).
Age: 19-39 Years (Young Adults), 40-65 Years (Adults)
Sex: Female
Race/Ethnicity: American Indian, Asian, Black (not of Hispanic or Latino Origin), Hispanic or Latino, White (not of Hispanic or Latino Origin)
Program Focus: Awareness Building and Behavior Modification
Population Focus: Pregnant Women
Program Area: Tobacco Control
Delivery Location: Clinical
Community Type: Urban/Inner City
Program Materials
Preview, download, or order free materials on a CD
Program Scores
EBCCP Scores
(1.0 = low, 5.0 = high)
RE-AIM Scores
Exposure to secondhand smoke causes health problems in infants and children, including increased risk of SIDS (sudden, unexplained, unexpected death in an otherwise healthy infant in the first year of life), severe asthma attacks, and increased respiratory and ear infections. Consequently, smoking cessation and relapse prevention programs that emphasize the adverse health effects of newborn exposure to secondhand smoke in the home are important for new mothers.
The Modification of Maternal Smoking (M.O.M.S.) Project is a brief pediatrician-delivered intervention to encourage new mothers who smoke to stop smoking and mothers who are abstinent from smoking not to relapse. The program emphasizes the adverse health effects of secondhand, environmental tobacco smoke on newborns. Each encounter of the M.O.M.S. project is designed to be about 2 minutes long and incorporated into each of the first four, well-baby visits postpartum (2 weeks, 2 months, 4 months, and 6 months). M.O.M.S. starts with the new mother's smoking status at the time of the visit; that is, "smoker", reporting current use of cigarettes, or "quitter", not currently smoking, but having smoked in the month prior to pregnancy. Babies' charts are tagged with a label denoting the mother's smoking status and a checklist that prompts the pediatrician to deliver the M.O.M.S. program.
At each doctor's visit, a nurse or receptionist inserts a set of written materials, tailored to the mother's current smoking status, into the chart. Pediatricians are trained to engage smoking mothers in a brief discussion about how much they smoke, barriers to quitting, and the results of past attempts to quit. Smoking mothers are then asked whether they are willing to set a quit date, and if so, are encouraged to follow through with the help of materials developed by the American Lung Association and a list of local resources for assistance in quitting. Written materials received by the mother include pamphlets on adverse health effects of passive smoking, quitting strategies, role modeling, and a letter to fathers advising them of the adverse health effects of secondhand smoke and encouraging them to support a smoke-free home environment for the baby.
This program uses the following intervention approach for which the Community Preventive Services Task Force finds insufficient evidence: community education interventions to reduce secondhand smoke exposure in the home (Tobacco Control). Insufficient evidence means the available studies do not provide sufficient evidence to determine if the intervention is or is not effective. This does not mean that the intervention does not work. It means that additional research is needed to determine whether the intervention is effective.
The program includes a 23-minute instructional video for training health care providers called "Modifying Maternal Smoking: A Pediatric Office Program". It is recommended that 45 minutes of training be held as part of a regularly scheduled, office business meeting. Training covers modern concepts of smoking intervention and the practical aspects of program implementation (i.e., tagging a baby's medical chart with the mother's current smoking status and using the right set of M.O.M.S. program materials in the chart for each visit). Implementation of the M.O.M.S. program should take about 2 minutes and occurs in the context of usual care during each of the first four postpartum, well-baby visits.
The intervention targets new mothers aged 13 and older who are smoking or are currently tobacco-abstinent but report smoking in the month prior to pregnancy.
The intervention is suitable for implementation in community-based private pediatric practices.
The following materials are required:
-- M.O.M.S. Protocol
-- Patient Handouts Overview
-- Clinician Program Overview
-- QUITTERS Materials, Patient Handouts
-- SMOKERS Materials, Patient Handouts
-- M.O.M.S. Checklist
-- M.O.M.S.: A Healthy Start: Smoke-Free Babies (video)
-- M.O.M.S.: Modifying Maternal Smoking, A Pediatric Office Program (video)
A randomized clinical study evaluated the effects of a pediatrician-delivered smoking cessation/relapse prevention program (M.O.M.S.) to new mothers who smoke or were recently tobacco-abstinent. The program was delivered at each of the first four well-baby care visits postpartum (2 weeks, 2 months, 4 months, and 6 months). Forty-nine private pediatric practices with 128 consenting pediatricians were block randomized to either a minimal or extended (minimal plus M.O.M.S.) intervention after matching for practice location (metropolitan vs. other) and number of pediatricians in the practice.
The minimal intervention consisted of a set of materials added to a routine hospital packet distributed to all mothers with newborns. The added materials included a brochure describing the adverse health effects of passive smoking, a letter to the mother from the pediatrician about the consequences of passive smoking, and a nonsmoking sign to hang above the newborn's crib. All new mothers receiving care from pediatricians in study-enrolled practices received added materials in their hospital packet (minimal intervention). A mother was eligible to be in the study at the first pediatrician visit (baseline) if she completed a general health questionnaire and answered "yes" to the question, "Did you smoke in the month prior to becoming pregnant?" Additional questionnaire items permitted a breakdown of mothers into "smokers" (currently smoking) and "quitters" (currently not smoking). A total of 13,495 mothers of newborns (86.5% Caucasian, 3.7% Native American Indian, 2.9% Asian, 2.8% Hispanic, and 1% African American) completed the questionnaire at baseline. Their mean age was 28.21 years (range=13 to 51 years old). Of these, 2,901 mothers reported smoking in the month prior to becoming pregnant and agreed to respond to a further survey, which constituted formal study enrollment. After the 6-month well-baby office visit, mothers in both interventions were mailed a follow-up survey. The follow-up survey assessed current smoking status defined by whether the mother had smoked at all in the prior 7 days and, if so, how many cigarettes she smoked daily (1-4, 5-10, 11-20, and >20 cigarettes); smoking habits in the household; intention to quit status if the mother was still smoking; and the mother's knowledge and attitudes on passive smoking. Knowledge of the health effects of passive smoking was measured by seven "true/false" items (a perfect score was 7). Attitudes toward passive smoking were measured by four items rated on a 5-point Likert type scale that varied from "strongly agree" (1) to "strongly disagree" (5), with low ratings indicating a more positive health-conscious attitude. Six-month follow-up survey data were available on 2,336 mothers (1,356 mothers assigned to the extended-M.O.M.S. intervention and 980 mothers assigned to the minimal intervention). Small, but significant condition differences in age and education at baseline were factored into all outcome analyses.
Graph of Study Results
• A higher percentage of extended-M.O.M.S. intervention mothers were nonsmokers than minimal intervention mothers at 6 months postpartum (5.9% vs. 2.7%, p<.01). Mothers in the M.O.M.S. intervention were almost twice as likely to be nonsmokers at the 6-month postpartum follow-up compared with mothers in the minimal intervention (odds ratio=1.82, p<.05).
Graph of Study Results
• Mothers in the extended-M.O.M.S. intervention had a lower relapse rate compared with mothers in the minimal intervention at 6 months postpartum (45% vs. 55%, p<.01). Mothers in the extended-M.O.M.S. intervention were less likely than mothers in the minimal intervention to have relapsed at the 6-month postpartum follow-up (odds ratio=1.56, p<.01).
• Mothers in the extended-M.O.M.S. intervention scored higher on passive smoking knowledge than mothers in the minimal intervention (5.12 vs. 4.65, p<.001) and had more positive health-conscious attitudes towards passive smoking than mothers in the minimal intervention (7.32 vs. 8.28, p<.001) at the 6-month postpartum follow-up. A smaller percentage of smoking mothers at 6 months postpartum assigned to the extended-M.O.M.S. compared with the minimal intervention reported ever allowing smoking in the house (29% vs. 39%, p<.05 for relapsed M.O.M.S. vs. minimal intervention mothers and 58% vs. 66%, p<.01 for continuous smoking M.O.M.S. vs. minimal intervention mothers).
More Related Programs
NCI does not endorse nor recommend any commercial products, processes, or services, nor do they guarantee the success of programs made available on the site. The views and opinions of authors expressed on this website do not necessarily state or reflect those of the NCI, and may not be used for advertising or product endorsement purposes. Rather, the information is provided to help you make an informed decision about the best program options to meet your cancer control needs. Please see the disclaimer for further information.
Updated: 07/21/2020 | ESSENTIALAI-STEM |
User:Designer Sewing by Jyoti
“Designer Sewing by Jyoti” is for those who are passionate about learning sewing of new designer dresses, baby frock design, kids frock design, baby dress design, stylish baby frocks & fancy baby frocks design. Here you find easy tutorial about cutting and stitching a new designer dress. Currently channel upload the video of baby frock cutting and stitching, baby girl frock design, children frock design, bachchon ki frock, fancy baby frock & baby girls dress design on channel. | WIKI |
Coopers Square
Coopers Square (originally called Burton Shopping Centre) is an indoor shopping centre located in Burton-upon-Trent, Staffordshire, England. It is owned by the Grosvenor Group. The total retail area for the shopping centre is 35,766 sqm. The shopping centre has 800 car parking spaces, with a ground car park as well as a rooftop car park.
History
The site was opened in 1970 by HRH Princess Alexandra as Burton Shopping Centre. The centre underwent a large refurbishment which was completed in 1994, which included the addition of a roof on the centre and a change of name to Coopers Square Shopping Centre.
Prior to the 1994 redevelopment of Coopers Square, Dame Paulet Walk was formerly known as 'Fennel Walk'. Dame Paulet's Almshouses occupied the site where Primark now stands; the original doorway is installed into the side of the building. Also, The Burton Cooper statue stood in the entrance of Saint Modwens Walk on High Street and the rubbish bins resembled beer casks.
In 1996 Sainsbury's moved to a new unit that had been built across the road. The former unit was split up and became a BHS (closed in 2016), JJB Sports, and the now defunct retailer, Au Naturale. The former BHS store was redeveloped as a new Next at Home store, which opened in October 2017.
Malls
Coopers Square consists of five 'malls'. These are:
* Underhill Walk
* Swan Walk
* St Modwens Walk
* Dame Paulet Walk
* Cooper's Square
Stores
Below is a partial list of stores in the centre as of July 2020:
* Superdrug
* WH Smith
* Card Factory
* Clarks
* Early Learning Centre
* EE
* GAME
* Boots
* Marks & Spencer
* The Carphone Warehouse
* Next at Home
* Primark
* JD Sports
* Greggs
* Thorntons
* H&M
* Waterstones
* New Look
* River Island
* Vodafone
* O2 Store
* Three
* Vision Express
* Timpson
* Smiggle
* Peacocks
* Pandora
* Holland & Barrett
Facilities
The centre's facilities include toilets and a cafe called Ronnie's Patisserie, which replaced Patisserie Valerie when it closed after the company went into administration in 2019. | WIKI |
Talk:Mountain Meadows Massacre/GA2
GA Review
The edit link for this section can be used to add comments to the review.''
Reviewer: Lee Vilenski (talk · contribs) 13:44, 27 August 2021 (UTC)
Hello, I am planning on reviewing this article for GA Status, over the next couple of days. Thank you for nominating the article for GA status. I hope I will learn some new information, and that my feedback is helpful.
If nominators or editors could refrain from updating the particular section that I am updating until it is complete, I would appreciate it to remove a edit conflict. Please address concerns in the section that has been completed above (If I've raised concerns up to references, feel free to comment on things like the lede.)
I generally provide an overview of things I read through the article on a first glance. Then do a thorough sweep of the article after the feedback is addressed. After this, I will present the pass/failure. I may use strikethrough tags when concerns are met. Even if something is obvious why my concern is met, please leave a message as courtesy.
Best of luck! you can also use the ✅ tag to state when something is addressed. Lee Vilenski (talk • contribs)
Please let me know after the review is done, if you were happy with the review! Obviously this is regarding the article's quality, however, I want to be happy and civil to all, so let me know if I have done a good job, regardless of the article's outcome.
Lede
* MOS:LEDE usually recommends a max lede of four paragraphs. Any reason we can't condense this? Best Wishes, Lee Vilenski (talk • contribs) 13:50, 27 August 2021 (UTC)
* Adjusted the lead but it is so hard to condense...take a look and tell me what you think. Shearonink (talk) 15:03, 27 August 2021 (UTC)
* made plans to attack the wagon train. - why? Best Wishes, Lee Vilenski (talk • contribs) 13:50, 27 August 2021 (UTC)
* Adjusted - should be clearer now. Shearonink (talk) 15:03, 27 August 2021 (UTC)
* hasty fortification. - their what? Best Wishes, Lee Vilenski (talk • contribs) 13:50, 27 August 2021 (UTC)
* The wagons were drawn up into a circle and a trench dug into the center for the women & children to seek cover in. This is mentioned "down thread" but have adjusted and I think it is easier to understand now. Shearonink (talk) 15:03, 27 August 2021 (UTC)
* Today - MOS:CURRENT Best Wishes, Lee Vilenski (talk • contribs) 13:50, 27 August 2021 (UTC)
* Yeah...deleted. Thanks. Shearonink (talk) 15:03, 27 August 2021 (UTC)
General
* The group was relatively wealthy, and planned to restock its supplies in Salt Lake City, as did most wagon trains at the time. - uncited Best Wishes, Lee Vilenski (talk • contribs) 13:57, 27 August 2021 (UTC)
* Well, it's true but trying to find a specific cite that supports that atm is beyond my brain at the moment. I'll try to circle back within the next few days and get a cite. Shearonink (talk) 15:54, 27 August 2021 (UTC)
* Mormon apostle George A. Smith - can we reword to avoid link together like this? Best Wishes, Lee Vilenski (talk • contribs) 13:57, 27 August 2021 (UTC)
* Deleted one of the links but I think it is important to mention how far up the chain of command George A Smith was. Shearonink (talk) 15:54, 27 August 2021 (UTC)
* Parowan, Utah, traveled throughout southern Utah - do we need to say Utah this much? Best Wishes, Lee Vilenski (talk • contribs) 13:57, 27 August 2021 (UTC)
* Nope, you're right, adjusted. Shearonink (talk) 15:54, 27 August 2021 (UTC)
* (near present-day Kanosh) - CURRENT Best Wishes, Lee Vilenski (talk • contribs) 13:57, 27 August 2021 (UTC)
* Adjusted. Shearonink (talk) 15:54, 27 August 2021 (UTC)
* Why do we have a panorama? Best Wishes, Lee Vilenski (talk • contribs) 13:57, 27 August 2021 (UTC)
* Sigh. That was a loooooooong negotiation between myself and the person who took the image. I think it's the only photo WP has of the area as it appears now., I think it's important to give readers a sense of what this place looks like, not just linotypes from 19th century newspapers and so on. I seem to remember the photog originally posted it with an unassociated person present and this present image has the person removed? Shearonink (talk) 15:54, 27 August 2021 (UTC)
* Found the discussions in the talk page archives, see February 2019/Archive 20 and December 2018 Archive 20. I misremembered the discussion as being loooooong, it actually wasn't, but the point being that there was an editorial consensus established about the size and placement of the photo. The photo did used to be bigger and originally had extraneous modern people in it. Shearonink (talk) 17:01, 27 August 2021 (UTC)
- I think we could probably merge some of these paragraphs, they are quite short. Best Wishes, Lee Vilenski (talk • contribs) 13:57, 27 August 2021 (UTC)
* Merged. Shearonink (talk) 15:54, 27 August 2021 (UTC)
* The U.S. posted bounties of $500 ($10233[38] in present-day funds) each for the capture of Haight, Higbee, and Stewart, while prosecutors chose not to pursue their cases against Dame, Willden and Adair. - uncited Best Wishes, Lee Vilenski (talk • contribs) 13:57, 27 August 2021 (UTC)
* Cited and corrected. It was actually $5,000. Shearonink (talk) 15:54, 27 August 2021 (UTC)
* National newspapers covered the Lee trials closely from 1874 to 1876, and his execution in 1877 was widely covered. - uncited. Best Wishes, Lee Vilenski (talk • contribs) 13:57, 27 August 2021 (UTC)
* I'll have to circle back to this...I mean, Mark Twain wrote about it in one of his books and Lee's trial got a lot of "press" in the contemporary media (newspapers) but getting this cited...will get back to it. Shearonink (talk) 15:54, 27 August 2021 (UTC)
* Historians have ascribed the massacre to a number of factors, including strident Mormon teachings in the years prior to the massacre, war hysteria, and alleged involvement of Brigham Young. - feels out of place as a single sentence, and is uncited. Best Wishes, Lee Vilenski (talk • contribs) 13:57, 27 August 2021 (UTC)
* This is an artifact resulting from the way the article was originally set-up. The entire next three sections cite the statement and I haven't been able to figure out how to make it more clear. Shearonink (talk) 15:54, 27 August 2021 (UTC)
* ..[70][71][72][73][74] - two punctuation marks, and could we WP:BUNDLING these? Best Wishes, Lee Vilenski (talk • contribs) 13:57, 27 August 2021 (UTC)
* Nothing personal but the help page for bundling? Yikes, kind of obtuse...I'm working on it, want to keep them all, hate to lose any of the info these cites provide, especially since I don't have access to some of the specialized sources some past editors have had. Will update here when I get the coding & structure solved. Please let me work on it myself, I'll ask for help if I get completely stumped. I've done nesting/bundling before but not lately... Shearonink (talk) 15:54, 27 August 2021 (UTC)
* Fixed. Shearonink (talk) 16:11, 27 August 2021 (UTC)
Review meta comments
* I'll begin the review as soon as I can! If you fancy returning the favour, I have a list of nominations for review at WP:GAN and WP:FAC, respectively. I'd be very grateful if you were to complete one of these if you get time. Best Wishes, Lee Vilenski (talk • contribs) Best Wishes, Lee Vilenski (talk • contribs) 13:44, 27 August 2021 (UTC) | WIKI |
Sari van Veenendaal
Sari van Veenendaal (born 3 April 1990) is a Dutch former professional footballer. She was part of the Netherlands squad that won UEFA Women's Euro 2017.
The Netherlands
Born in Nieuwegein, the Netherlands, Van Veenendaal firstly played as a professional footballer in 2007 for FC Utrecht, as an understudy to Angela Christ. In 2010, she moved to FC Twente. Whilst featuring for the Tukkers, Van Veenendaal won the Eredivisie of the 2010–11 season. She was also successful in picking up the BeNe League titles of 2013, 2014 and 2015 in all.
Arsenal
Van Veenendaal signed for the English club Arsenal in 2015. In her first season there, Arsenal won the 2015 FA WSL Cup. Next season, Arsenal won the 2016 FA Women's Cup with the club beating Chelsea 1–0 in the final. Another FA WSL cup was conquered in the 2017–18 season, when the club defeated Manchester City Women in the final and Van Veenendaal posted a clean sheet.
Atlético Madrid
In July 2019, Van Veenendaal left Arsenal upon the expiry of her contract and joined Atlético Madrid.
PSV
In May 2020, Van Veenendaal joined PSV on a free transfer. In July 2022, Van Veenendaal announced her immediate retirement.
International career
Van Veenendaal won her first cap for the senior national team on 7 March 2011, a 6–0 win over Switzerland at the Cyprus Cup.
She was called up to be part of the national team for the UEFA Women's Euro 2013 and the FIFA Women's World Cup 2015.
Van Veenendaal was part of the national team for the UEFA Women's Euro 2017. The Netherlands won the tournament. Van Veenendaal started in all six matches in the competition, and allowed just three goals, helping them to win each of the Netherlands' matches. She was named to the Best XI of the tournament. After the tournament, the whole team was honoured by the Prime Minister Mark Rutte and Minister of Sport Edith Schippers and made Knights of the Order of Orange-Nassau.
Honours
FC Utrecht
* KNVB Women's Cup: 2009–10
FC Twente
* BeNe League: 2012–13, 2013–14
* Eredivisie: 2010–11
* KNVB Women's Cup: 2014–15
Arsenal Netherlands Individual Orders
* FA Women's Super League: 2018–19
* FA Women's Cup: 2015–16
* FA WSL Cup: 2015, 2017–18
* UEFA European Women's Championship: 2017
* Algarve Cup: 2018
* FIFA Women's World Cup: runner-up 2019
* Tournoi de France: runner-up 2020
* UEFA European Women's Championship Team of the Tournament: 2017
* FIFA Women's World Cup Golden Glove: 2019
* The Best FIFA Women's Goalkeeper: 2019
* IFFHS World's Best Woman Goalkeeper: 2019
* IFFHS Women's World Team: 2019
* Knight of the Order of Orange-Nassau: 2017 | WIKI |
Parkinson's Disease In The Elderly: Symptoms & Care
Parkinsons Disease In The Elderly
Parkinson’s disease (PD) is a neurological disorder that occurs when certain neurons in the brain die or become impaired. These nerve cells, located in a midbrain structure that controls muscle movement, produce dopamine, the chemical responsible for coordinated muscle function. Symptoms of Parkinson’s disease begin to appear when 80% of these neurons become damaged.
According to the National Institute of Health (NIH), Parkinson’s affects 50% more men then women, but impacts people of all ethnicity and socio-economic backgrounds. According to the National Parkinson Foundation (NPF), approximately 60,000 new cases of PD are diagnosed each year, joining the 1.5 million Americans who have the disease. The condition usually affects those over age 65. Approximately 1% of seniors have some form of the disease.
PARKINSON’S DISEASE SYMPTOMS
Persistent body tremor is the most common symptom of Parkinson’s disease in the elderly. Sluggish movement, stiffness and challenges with balance are also indicators, as are hand cramps, shuffling, frozen facial expressions, muffled speech patterns, and depression.
Parkinson’s disease in the elderly is not easily diagnosed, as neither x-rays nor blood tests reveal the condition, though blood tests and magnetic resonance imaging (MRI) can be used to eliminate other conditions.
Usually the early symptoms are quite mild, affecting one side of the body. These early symptoms often do not require medication. Though tremors are often the first symptom and the least disabling, they often cause the most embarrassment for the patient.
Like Alzheimer’s disease, the most common neurodegenerative condition in America, symptoms of Parkinson’s patients progress and worsen over time. Increased tremors affect dexterity, while movement slows considerably (called bradykinesia). These physical changes impact the most routine habits like getting dressed or rising from a chair. Posture begins to stoop, as the head and shoulders press forward to compensate for the apparent lack of balance. Symptoms may occur on one or both sides of the body, but typically begin on one side and eventually spread to the other side as well. Some Parkinson’s patients may also develop dementia late in the process, although it’s still unclear how likely this symptom is.
Because there is so much variability among patients in how the disease progresses, doctors are not able to accurately predict how quickly symptoms will worsen, or even which specific symptoms will develop for each patient. This makes Parkinson’s disease in the elderly a difficult disease to diagnose properly.
PARKINSON’S DIAGNOSIS
According to the NPF, profiles of Parkinson’s disease patients vary significantly. For example, even though, 5 to 10% of those affected have a family history of PD, the remaining 90% of those affected have no family history of the disease. Environmental toxins are also potentially influential in the onset of PD, yet only a small percentage of patients have been exposed to these toxins.
“How one person displays symptoms may be quite different from another patient,” explains Ruth Hagestuen, director of field studies at the NPF. “However, the sooner a patient visits a neurologist the better. That way, a treatment regimen can be implemented, because this is a chronic illness, and will require many modes of treatment over time to maintain life quality.”
In order to properly diagnose Parkinson’s disease in the elderly, a neurologist or other qualified physician must make the appropriate neurological examination and evaluate the patient’s complete medical history. During the visit the doctor may also be able to personally observe some of the symptoms affecting the patient.
To further complicate diagnosis, onset of PD symptoms does not definitively mean the patient has the disease.Parkinsonism,the term for displaying symptoms without actually having Parkinson’s disease, was found in 35% of those patients monitored in a recent study. Parkinsonism is often the result of medication, blocked blood vessels in the brain, and other chronic conditions like dementia.
Several conditions mimic PD symptoms. These diseases can obscure early diagnosis of PD, another significant reason why a neurology appointment should be scheduled early in the diagnosis process. According to the NPF, the conditions that are most similar to PD display a wide range of familiar symptoms:
• Progressive Supranuclear Palsy
This condition, affecting people after the age of 50, typically worsens more rapidly than PD, and results in imbalance, falling, stiffening of the midsection and difficulty with eye movement.
• Corticobasal Degenerationis
This uncommon condition affects speech, balance, and posture and also leads to slowness of movement. Limbs affected by this condition often become severely or completely disabled as it progresses.
• Multiple System Atrophy
The most difficult disease to distinguish from PD, earlier onset (mid 50’s) and rapid progression are two characteristics of this neurodegenerative disease. Other symptoms arise as this condition intensifies, symptoms that suggest other compromised systems of the body.
• Vascular Parkinsonism
Caused by a series of small strokes, usually leading to mobility challenges and is located more often in the legs than the arms. Though treatment is the same for vascular parkinsonism as for PD, it is much less successful.
• Lewy Body Dementia (LBD)
Lewy bodies are round protein structures that develop among brain cells, displacing them and disrupting their functioning. Patients with LBD will typically exhibit parkinsonism in addition to cognitive impairment similar to Alzheimer’s disease and vivid hallucinations.
Parkinson’s Disease & Lewy Body Dementia:
LBD is a disease that is now recognized as the second leading cause of dementia after Alzheimer’s disease (AD), accounting for anywhere from 20 to 35 percent of all dementia cases, according to the Lewy Body Dementia Association. Most people, and even many doctors, have never heard of it, but the disease has garnered increasing public attention as recent research continues to establish links between PD, LBD, and AD.
Lewy bodies, the round protein structures that are found in LBD, are also present in the brains of PD patients. However, in PD, the Lewy bodies form only in the midbrain, whereas in LBD the Lewy bodies occur in both the brainstem and the cerebral cortex. And LBD and AD have often been found to coexist in the same patient, which can make proper diagnosis extremely difficult.
PARKINSON’S DISEASE TREATMENT
While Parkinson’s disease in the elderly remains an irreversible and progressive disease, several medications are now used to treat and control its symptoms. These medications have been so effective at helping people live with PD that surgery is usually only considered after medications have been tried and given time to work. Because symptoms will vary with each patient, the choice and dosage regimens of medications needs to be customized and adjusted as the disease progresses.
Levodopain combination withcarbidopais usually tried first, and its effectiveness revolutionized PD treatments when it was introduced in the 1960s. Essentially a building block of dopamine, levodopa is converted into dopamine in the brain. The resulting increase in dopamine levels helps to relieve the slowness, rigidity, and tremor symptoms caused by the destruction of dopamine-producing brain cells in PD. Carbidopa aids in the absorption of levodopa in the body and also helps to reduce some of its side effects, which may include hallucinations, drops in blood pressure, nausea, and involuntary muscle movements (called dyskinesia). Brand names include Sinemet® and Atamet®.
Dopamine agonistsare a type of medications that mimic dopamine, and unlike levodopa these drugs are not converted into dopamine. So instead of replenishing the depleted dopamine, they are able to induce the affected brain cells to behave “normally,” as dopamine would be able to do. Although dopamine agonists tend to have fewer motor side effects than levodopa, they appear more likely to cause hallucinations as well as compulsive behaviors. And, because the various dopamine agonists all differ somewhat, doctors may need to try different ones before finding one that works most effectively with the fewest side effects. Brand names include Mirapex®, Requip®, and Apokyn®.
In addition to the dopamine-producing and -mimicking drugs described above, doctors may prescribe other drugs to be used in conjunction or as alternatives in case they become less effective. Selegilineworks by inhibiting the breakdown of dopamine and is often used in conjunction with levodopa/carbidopa therapy. Amantadineis an antiviral that has been found to alleviate some of the symptoms of PD. Andanticholinergicsare an older class of drugs that are now less frequently prescribed because of potentially serious mental and cognitive problems they can cause.
Levodopa and the other medications described above have been very successful at controlling the symptoms of PD, but over time these drugs become less effective as the disease progresses in a patient. This can take many years, as patients experience more frequent periods where there is an increase in symptoms as the effects of the medications wear off. They may also increasingly experience dyskinesia (involuntary muscle movements) as a side effect. When medication adjustments can no longer control these symptoms or episodes, doctors may consider surgery as an option.
Several surgical techniques have been developed for PD, although it’s important to emphasize that none of them offers a true cure, and that there are risks:
Thalamotomyandpallidotomyare brain lesioning procedures that destroy different regions of brain tissue involved in PD. This permanent effect on the brain is not recommended for both sides of the brain, and the improvements don’t always last. Thalamotomy is only effective at reducing tremor, while pallidotomy may also help to reduce the dyskinesia side effects of drug therapy.
Deep brain stimulation(DBS) is considered an alternative treatment to lesioning surgery. A metal electrode is placed in the targeted area of the brain and a pulse is generated to alter the abnormal function of that region. No brain tissue is destroyed in this procedure. The patient’s general health often determines the success of surgical treatment. DBS may be conducted in both sides of the brain if symptoms warrant it and only if the patient is in good health.
“Parkinson’s disease will definitely impact every facet of a person’s life,” Hagestuen explains. “But a closely monitored treatment regimen including medication, exercise, and therapy proves tremendously beneficial in most cases.”
The patient with Parkinson’s disease benefits from a multidisciplinary approach to therapy, including physical, occupational, and speech, as well as psychological counseling. Creating an exercise plan, improving diet, and redesigning daily routines usually improves one’s wellbeing significantly.
Hagestuen recommends water exercise, Pilates, tai chi, even dance therapy as ways to stay active and keep the muscles moving. Walking is also essential. “Many people become much more physically activeafterthey have received a Parkinson’s diagnosis,” she says. “And many people live healthier lives and function quite well.”
Hagestuen cites cooperative partners and family members as instrumental in the patient’s successful life with the disease. “Those with Parkinson’s disease must maintain good communication with family members, who might also consider working with a psychologist to cope with the day-to-day challenges of the disease.”
Patients with PD often feel a great deal of anxiety, knowing that the progression of the disease is irreversible. This fear often causes patients to turn inward and avoid others with the disease, shielding themselves from what they perceive to be their future state. This obstinacy can make it difficult for family and supporters to persuade the patient to join Parkinson’s support groups and other activities with peers.
Various support groups are available for patients and care partners alike. There are also several national organizations available to provide Parkinson’s disease information and suggest strategies for coping with the disease. Establishing an “advisory team” is essential as well, including a neurologist, family physician, and also advanced practice nurses.
PD is a twenty-four hour condition, though days can vary significantly. The same medicinal combination that worked fine yesterday can appear ineffective today. Anger and depression, the result of physical frustration, the loss of independence, and hypersensitivity, surfaces for everybody.
The NPF suggests that a favorite physical hobby such as playing a musical instrument be replaced with another, more cognitive activity, like attending concerts. In addition, many patients report that they have continued to work successfully in their jobs, pursue their careers, and maintain their social and cultural lives.
“It is easy to get discouraged,” observes Hagestuen. “Seeing oneself as a victim of a disease can be your own worst enemy. Attitude makes a huge difference “
The first step a recently diagnosed patient should take, according to Hagestuen, is to talk with someone who really understands the disease. “Often people don’t hear what they want to hear and so continue onward in less than beneficial ways,” she explains. “Finding a care team that really listens and provides good feedback will really help the patient maintain a good quality of life.”
“Quality of life” is a recurring theme to Hagestuen, who originally joined the NPF because she was frustrated with the institutional response to the disease. “My mother and brother-in-law have advanced cases of the disease. As a nurse I was always very concerned about our healthcare system, which is designed for acute care and not chronic care.”
Hagestuen became part of an interdisciplinary team, an approach now strongly endorsed by the NPF. The team covers all facets of treatment, and should include a psychologist as well. “It’s not a one-size-fits-all but it is important to find out what you can really engage in,” she says. “The benefits are enormous when people who are diagnosed decide to maximize their health and lives.”
Update: January 2018
Related Articles | ESSENTIALAI-STEM |
Don Bosco Higher Secondary School, Dimapur
Don Bosco School is a school located in Dimapur, Nagaland, India. It is a Catholic school founded on the teachings of Saint John Bosco and is run by the Salesians of Don Bosco.
History
Don Bosco School Dimapur opened on 19 March 1985. The property for the school was purchased in 1983. | WIKI |
Zamagiria
Zamagiria is a genus of small moths belonging to the snout moth family (Pyralidae). They are part of the huge snout moth subfamily Phycitinae, but their exact relationships are obscure, and they are currently not assigned to a particular tribe of Phycitinae.
This genus is almost exclusively found in the Neotropics. One species (Z. laidion) ranges north up to Florida, and one other (Z. exedra) was described from a specimen collected on Nuku Hiva in the Marquesas Islands. But the latter may simply have been accidentally introduced, being in reality a Neotropical species whose native range has not yet been discovered.
Zamagiria moths can usually be recognized in the field by their wing veins; the forewing has 11 veins (vein 7 is missing), and veins 4 and 5 almost connect at the base in the forewings, while on the hindwings veins 4 and 5 are connected along half of their entire length.
Species of Zamagiria include:
* Zamagiria australella (Hulst, 1900)
* Zamagiria dixolophella Dyar, 1914
* Zamagiria exedra Clarke, 1986
* Zamagiria kendalli Blanchard, 1970
* Zamagiria laidion (Zeller, 1881) | WIKI |
Ozirhincus
Ozirhincus is a Palearctic genus of gall midges, whose larval stages feed predominantly on the seeds of Asteraceae. | WIKI |
International Geological Journal - Official Journal of the Carpathian-Balkan Geological Association
SEMIDUCTILE DEFORMATION IN PELAGIC LIMESTONES AT DIAGENETIC CONDITIONS
Pages: 361 - 370
Authors: JOACHIM SCHWEIGL, FRANZ NEUBAUER
Abstract: Semiductile to ductile deformation phenomena within unmetamorphic, fine-grained, pelagic limestones of the Northern Calcareous Alps (NCA) in the Eastern Alps were studied. The investigated pelagic limestones include the Triassic Hallstatt Limestone, the Liassic Adnet Limestone, the Middle Jurassic Strubberg Marl and the Upper Jurassic Oberalm Limestone. These pelagic limestones and marls display structures related to semiductile to ductile deformation, including shear planes, solution seams, stylolites and dynamic recrystallisation similar to structures in protomylonites due to strata-parallel simple shear. The structures preferentially developed along clay-rich layers and along boundaries between more competent marly limestones showing a protomylonitic appearence due to disjunctive anastomosing foliation. Along the boundaries aragonite and fine-grained calcite were dissolved and insoluble clay minerals were concentrated. Increasing strain resulted in the development of a penetrative foliation, generating S-C fabrics even within competent limestone layers. Furthermore, mesoscale out-of-sequence shear planes caused decomposition of competent limestone layers into clasts and nodules. These clasts acted as rigid objects within a more viscous, argillaceous matrix. When ideally oriented, asymmetric pressure shadows were generated around these nodules and σ-clasts were developed. The transition from massive limestone beds to nodular layers depends on silt and clay contents. While limestones with low clay content were structurally resistant to deformation, clay-rich limestones were easily deformed. The Adnet and Hallstatt limestones formed decollement horizons accomodating high strain during Cretaceous nappe stacking and thrusting within the NCA, while the Strubberg and Oberalm limestones were involved during Tertiary transpressive overprint in large strike-slip faults and thrusting within an associated triangle structure.
Keywords: Eastern Alps, pelagic limestone, plasticity, deformation mechanisms, deformation partitioning
Download PDF document Show Text Version | ESSENTIALAI-STEM |
Page:Poems, Volume 1, Coates, 1916.djvu/243
Rh Of mysteries beneficently bright.
The vivifying glory of the East,
The Spring, in vesture of transparent dyes
'Broidered with blossoms and with butterflies,
The door that leads from gloomy vasts of Death,—
I resurrection am!—new life! new breath! | WIKI |
Wild Combination: A Portrait of Arthur Russell
Wild Combination: A Portrait of Arthur Russell is a documentary film about musician Arthur Russell, directed by Matt Wolf. Released theatrically in 2008, the film was generally well received by critics, winning various awards at international film festivals. Its world premiere was at the Berlin International Film Festival (Panorama), and its theatrical premieres were at the IFC Center in New York and the ICA in London.
Production
The title, Wild Combination, refers to one of Russell's songs by the same name.
Due to the lack of actual interview footage of Russell, the film uses artificial archival materials of an actor wearing Russell's clothes, filmed around Iowa and New York City, filmed using the outmoded VHS and Super8 formats.
Plot summary
Wild Combination begins with interviews of Russell's parents discussing their youngest offspring's childhood. The film describes how Russell as a young boy is obsessed with Timothy Leary and insecure about his acne. Leaving Iowa for San Francisco in the late sixties, he joins a Buddhist collective and befriends Allen Ginsberg. Russell decides to move to New York in the early seventies, where he starts working as the musical director of the Kitchen and becomes part of the downtown scene of artists, sharing an apartment building with Allen Ginsberg and Richard Hell. Russell engages in nearly every music scene the city has to offer: disco at David Mancuso's Loft, rock at CBGB, minimal composition at the Kitchen, and Allen Ginsberg's poetry recitations. In 1978, Russell begins dating Tom Lee, whom he stays with until his AIDS-related death in 1992.
Other footage shows Russell later in life, ravaged by AIDS, but still able to play his cello and sing. Russell eventually succumbs to dementia and throat cancer. The film ends with Emily Russell, Arthur's mother, speculating that had Arthur continued to live past forty, "He would have made it, he would have gone far".
Reviews
Overall, critics enjoyed the film. The New York Times called it a "Tender, fascinating documentary that will delight the cult and instantly convert new members." Screen International said it was a "moving, celebratory documentary that will turn many viewers onto its subject's strange, compelling sounds". The Village Voice referred to it as, "resonating on an emotional level, much like Russell's most profound music does". The San Francisco Bay Guardian says the film is like "an audiovisual kiss from Russell to those who loved him, and to a greater audience who has yet to discover him". TimeOut London: "Matt Wolf's absorbing and often poignant profile of Arthur Russell is a treat for fans and neophytes alike." Artforum calls it "an intuitive, remarkably personal love letter".
Awards
The film premiered at the Berlin International Film Festival. The Kitchen (where Russell was once the director) screened the film during the summer of 2008 and held a weekend devoted to Russell and his music.
The film won an award for Artistic Achievement at the Outfest festival in Los Angeles, as well as Best Documentary at the Gaze Film festival in Dublin, Ireland and Best Documentary at the In-Edit film festival in Barcelona, Spain.
DVD release
The film was released by Plexifilm in 2008.
The DVD also includes rare archival footage of two full-length performances, "Soon to be Innocent Fun / Let's See" (1985) and "Calling All Kids" (1989); as well as Allen Ginsberg reading at Arthur's memorial; a 1970 recording of an audio cassette letter sent from Arthur in San Francisco to his parents; an "anti-music video" referred to as "Arthur's Sneakers"; and tribute performances of Arthur's songs by Jens Lekman, Verity Susman (of Electrelane), and Joel Gibb (of The Hidden Cameras). | WIKI |
Talk:Tribal colleges and universities
Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 19 January 2021 and 7 May 2021. Further details are available on the course page. Student editor(s): Borobbins22.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 11:43, 17 January 2022 (UTC)
Possible Additions
* Al-Asfour, A., & Young, S. (2017). Faculty professional development needs and career advancement at tribal colleges and universities. Journal Of Faculty Development, 31(1), 41-48.
* DeLong, L. M., Monette, G. E., & Casey Ozaki, C. (2016). Nurturing student success in tribal colleges. New Directions For Community Colleges, 2016(174), 65-74.
* Gavit, J. L. (2016). Psychological adjustment: A comparative study of tribal and non-tribal college students. Indian Journal Of Health & Wellbeing, 7(11), 1074-1078.
* Ward, C. c., Jones, K. W., Coles, R., Rich, L., Knapp, S., & Madsen, R. (2014). Mentored research in a tribal college setting: The northern cheyenne case. Journal Of Research In Rural Education, 29(3), 1-17.
* Paskus, L. (2013). More than words, a way of life: Language restoration programs reach beyond tribal colleges and universities. Tribal College Journal Of American Indian Higher Education, 24(4),
* Toth, C. (2013). Beyond assimilation: Tribal colleges, basic writing, and the exigencies of settler colonialism. Journal Of Basic Writing, 32(1), 4-36.
* Schmidt, J. J., & Akande, Y. (2011). Faculty perceptions of the first-generation student experience and programs at tribal colleges. New Directions For Teaching & Learning, 2011(127), 41-54. doi:10.1002/tl.456
* Ortiz, A. M., & Boyer, P. (2003). Student assessment in tribal colleges. New Directions For Institutional Research, 2003(118), 41. — Preceding unsigned comment added by Mdleone (talk • contribs) 15:54, 31 July 2017 (UTC) | WIKI |
Jennifer Roos
Jennifer Roos (born July 17, 1971) was the head women's basketball coach for the Bowling Green Falcons women's basketball team from 2012 through 2018.
Early life
Roos is from Louisville, Kentucky. She played basketball, field hockey, and lacrosse for Davidson. She earned her degree in history from Davidson University in 1993.
Coaching career
Early in her career Roos was an assistant at Davidson. Roos was a long time assistant at Bowling Green under Curt Miller from 2001 through 2012. Miller's teams were very successful winning eight MAC titles. On April 16, 2012, she was named Bowling Green's head coach when Miller accepted the head coach position at Indiana. Her initial teams were successful. Bowling Green won 24 games in 2012–13. In her second season in 2013–14 the Falcons won 30 games and won the MAC regular season title and she was MAC coach of the year. Her later teams were not as successful. She was fired by BGSU on March 8, 2018. | WIKI |
HEALTH : Parkinsonism
Parkinsonism is a state of tremor and rigidity in the limbs, with reduced flexibility of limbs and retarded movements. It is present worldwide and can be due to several causes. Parkinsonism occurs due to degeneration of the cerebellum (part of brain responsible for equilibrium and coordination) and cells of midbrain due to aging. As life expectancy is increasing, the problem of Parkinsonism is also increasing.
Parkinsonism is a state of tremor and rigidity in the limbs, with reduced flexibility of limbs and retarded movements. It is present worldwide and can be due to several causes.
Parkinsonism occurs due to degeneration of the cerebellum (part of brain responsible for equilibrium and coordination) and cells of midbrain due to aging. As life expectancy is increasing, the problem of Parkinsonism is also increasing.
This degeneration is said to occur due to generation of free radicals and oxidative stress, a process which causes degeneration of other body cells as well. Apart from this, chronic use of alcohol and tobacco also causes degeneration of cells of cerebellum. Trauma to brain stem is another cause for Parkinson’s disease.
The onset of symptoms depends on the intensity and duration of injury. A classic example is of world famous boxers like Mohammed Ali who are now suffering from Parkinson’s disease due to repetitive injury to brain stem caused by the punches to the jaw.
Stiffness and difficulty in speaking and movements can be induced by drugs like chlorpromazine, metoclopramide and promethazine but the effect is totally reversible once the drug is stopped.
Early characteristic sign of Parkinsonism is the rigidity coming over the limbs and difficulty to walk straight. A person walks stooping forwards and shuffling his feet because the normal flexibility is lost.
This is accompanied by tremors of the hand which are known as pill rolling tremors because of resemblance to the action of rolling a pill between a finger and thumb.
There is also difficulty in speaking producing a stammering and then an “explosive” speech. The affected person finds it difficult to articulate words and thus speaks forcibly.
The facial expression is lost due to rigidity of the facial muscles leading to a fixed expressionless gaze.
As the disease progresses, these problems are aggravated. An individual finds it difficult to carry out simple chores like buttoning a dress. Walking gets more difficult and then one finds it difficult to even stand straight. Speaking clearly becomes impossible and feeding also gets problematic.
In advanced cases the unfortunate individual becomes a total cripple. An elderly person affected by Parkinsonism may have a stroke at sometime thus adding to the disability.
Sad part is that with all this happening, mentally the person remains clear in majority of the cases. One has to see an individual suffering from Parkinsonism to understand the misery inflicted. The disease is diagnosed by excluding tumours, strokes or infections affecting the brain by appropriate tests.
Unfortunately, once it develops there is no total cure for this condition. Once it starts it is progressive. Drugs which are available for Parkinsonism only retard the progress. All the care giver can do is to take good care of the patient, feed him/her well, keep him/her clean and try to avoid infections and bed sores.
The person also needs company otherwise loneliness engulfs these individuals and they feel more miserable. Though they are not able to articulate but they understand very well. Therefore it is useful for family members to see that they are not left alone.
Parkinsonism can be prevented if one takes preventive measures from a young age. Onion, carrot, guavas, oranges, germinated grains are rich in antioxidants and keep away degeneration of body cells including those of the brain.
Therefore one’s diet should include fresh fruits, vegetables and whole grains. Regular physical exercise is very beneficial in many ways including keeping limbs and body in a flexible condition even in old age.
Thus even if Parkinson’s disease affects someone doing physical exercise, the limbs and body will not become stiff to the extent of being incapacitated. Avoiding alcohol and tobacco is useful to prevent Parkinsonism.
It is prudent to avoid such degenerative diseases. Even on getting early signs, a person should become alert and try retarding the progress.
The author is a specialist in Internal Medicine
E-mail – rachna212002@yahoo.co.uk
ADVERTISEMENT
| ESSENTIALAI-STEM |
Page:Rhodes Will (Groote Schuur Devolution) Act 1910.pdf/3
Rh
called the Groote Schuur Estates) upon being released from their trust in that behalf under the said Will and on being indemnified in manner hereinafter appearing:
And whereas during his lifetime the testator granted certain tenancies, servitudes, rights, privileges, and concessions, in respect of certain portions of the Groote Schuur Estates, more particularly specified in the Second Schedule to this Act:
And whereas the trustees acting in accordance with the known wishes of the testator have preserved and, in certain cases, have extended such servitudes and privileges;
And whereas the trustees are prepared (subject to the deductions hereinafter mentioned), to pay to the Union Government the sum of twenty-five thousand pounds (being ample and sufficient to yield the clear annual income of one thousand pounds) to be applied and expended by the Union Government in manner provided by the Clause 14 of the said Will and by this Act;
And whereas it is expedient that the said surrender and transfer should be effected, the said payments made, and the said release granted, and that all the said existing tenancies, servitudes, rights, privileges, and concessions shall remain unimpaired and of full force and effect notwithstanding the transfer of the Groote Schuur Estates to the Union Government;
Be it enacted by the King's Most Excellent Majesty, the Senate, and the House of Assembly of the Union of South Africa as follows:—
1. (1) From the commencement of this Act the Groote Schuur Estates (comprising the properties specified in the First Schedule thereto; together with all furniture, plate, and other articles belonging to the said Estate shall be transferred to the Union Government and shall vest in the Governor-General, subject to the conditions and directions contained in Clauses 13 and 15 of the Will of the testator, hereinbefore recited, and as if the Union Government were the Federal Government mentioned or referred to in those clauses.
(2) The trustees shall hand over to the Union Government all documents of title in their possession or control of or relating to the Groote Schuur Estates or any part thereof, and the Registrar of Deeds of the Province of the Cape of Good Hope shall endorse thereon, and on the counterparts thereof in his office, memoranda denoting the transfer of the property specified therein to the said Union Government.
(3) If at any time hereafter it be discovered that any property described in Clause 13 of the Will of the testator has been omitted from the First Schedule to this Act such property shall, notwithstanding the omission, be transferred to and shall vest in the Governor-General as if it had been included in the said Schedule.
(4) No transfer duty, stamp duty, or any registration fees or charges shall be payable in respect of any transfer or vesting under this section.
2. The Groote Schuur Estates shall be held and enjoyed by the Union Government subject to and under reservation of the tenancies, servitudes, rights, privileges and concessions (whether created by parole grant or otherwise) affecting those estates and more particularly specified in the Second Schedule to this Act, and to no others.
3. At the commencement of this Act the trustees shall pay to the Union Government the sum of twenty-five thousand pounds sterling in lieu of the annual sum of one thousand pounds sterling, provided for in Clause 14 of the Will of the testator, and thereupon the Union Government shall provide for, in the Estimates of Expenditure annually submitted to Parliament, and shall expend annually a sum of not less than one thousand pounds sterling upon the services specified in the said Clause 14; provided that the trustees may deduct from the said sum of twenty-five thousand pounds the sum of two thousand three hundred pounds, nine shillings and twopence being the amount expended by them since the thirty-first day of May 1910 upon the upkeep of the said Estates.
4. The trustees shall be absolutely released and discharged from the obligation to perform, or to see to the performance of, the conditions and trusts contained in Clauses 13, 14, and 15 of the Will of the testator and shall be indemnified against all claims, demands, actions, and proceedings on the part of any person or persons in respect of or concerning anything done or suffered by the trustees in or in connection with the performance or execution of the conditions and trusts aforesaid or any of them. | WIKI |
User:Iheartsteelydan/Evaluate an Article
Which article are you evaluating?
Grace After Midnight
Why you have chosen this article to evaluate?
I got this article through the random article generator on Wikipedia. It matters because it's an article about Felicia Pearson's memoir, who is a minority as a black woman and a member of the LGBTQ+ community. It's a relatively short article, but it has lots of links to other articles in it.
Evaluate the article
All content seems relevant and up to date. The article is neutral, and heavily represents Pearson's voice through quotes. All source links work, and seem to be unbiased articles. All of the sources are magazine/news sites, but this makes sense as they are used to give quotes from Pearson's interviews about the book. No conversations in the Talk page. | WIKI |
Talk:WorkKeys
COI, Plagiarism
This article was written by user ACTUpdate - since the ACT is the vendor behind the WorkKeys test, this seems to be a major conflict of interest. In addition, sentences like "The higher the skill levels, the more jobs for which the applicant qualifies." are plagiarized from ACT materials available on the web. Given that almost the entire article was drafted by ACTUpdate, perhaps the article should be deleted. If the subject is notable enough for an encyclopedia, it can be built back up from a stub, with appropriate sources. Greenth (talk) 03:44, 29 December 2010 (UTC)
* No. The information is factual - I have experience with the process and systems. The article can certainly always be IMPROVED with more information properly sourced, but I see no COI here whatsoever. <IP_ADDRESS> (talk) 11:02, 19 August 2014 (UTC)
Litigation, Labor Department Issues
Certain employers' use of the WorkKeys tests have been investigated by the US Department of Labor, which found on several occasions that the way the employers used the tests unfairly discriminated against as many as 1,000 applicants.
From Reveal News:
Take the popular job tests called WorkKeys. They’re timed multiple-choice exams like the ones students take in school, developed by the well-known testing company ACT Inc. and promoted across the country with taxpayer money. Major employers, including the Campbell Soup Co., Unilever, Mars Inc., Siemens and Medtronic, make applicants take the tests to get hired for some positions. Millions of people have taken them to get a “career readiness” certificate that they hope will give them a leg up in the job hunt.
But federal officials have blamed employers for using the WorkKeys tests in illegally discriminatory ways in six cases over the past decade, affecting more than 1,000 people of color and women, according to Labor Department records obtained under the Freedom of Information Act.
At a California factory for Leprino Foods Co., the world’s largest producer of mozzarella cheese, WorkKeys put 253 Latino, black and Asian applicants at a disadvantage, the department found. Leprino Foods eventually agreed to pay $550,000 and hire 13 of the rejected job seekers.
At a chemical plant in Virginia, an auto parts factory in upstate New York and an engine plant in Alabama, the tests also illegally screened out minority applicants, according to Labor Department records. At a General Electric Lighting plant in Ohio and an aluminum factory near Spokane, Washington, the employers' inappropriate use of the WorkKeys tests unfairly hurt the chances of female applicants, officials found.
The way the employers used the tests didn’t adequately measure whether an applicant would be good at the job, violating civil rights protections, according to the government. The employers paid a settlement to unsuccessful applicants and scrapped the tests.
PaleoLiberal (talk) 14:31, 1 June 2017 (UTC)
Country?
This is an American program, but the lead jumps right in without stating that it is. <IP_ADDRESS> (talk) 09:56, 18 December 2017 (UTC) | WIKI |
Laissez-nous respirer (song)
"Laissez-nous respirer" is a song by French singer Ilona Mitrecey from her second album Laissez-nous respirer. It was the album's opening track and it was released as its first single. The single came out simultaneously with the album in December 2006 and debuted at number 20 in France, then peaking at number 16 for two weeks. | WIKI |
Page:Footfalls of Indian History.djvu/242
194 FOOTFALLS OF INDIAN HISTORY or Krishna. There is, on the other hand, a serpent possessed of mysterious knowledge. And the Brahmans are represented as servants, not as governors, of kings. One of the next stories, in that wonderful Vana Parva in which Nala and Damayanti occurs, is the tale of Sita and Rama. And third and last of the series is Savitri. This sequence is undoubtedly true to the order of their evolution. Sita is the woman of sorrow, the Madonna of serenity. And Savitri, which is late Vedic, and referred to in the Ramayana—showing little or no trace of Saivite or Vaishnavite influence, save perhaps in the mention of Narada—is the fully Hinduised conception of the faithful wife. Her birth as the incarnation of the national prayer is an instance of the highest poetry. And the three heroines together—Damayanti, Sita, Savitri—constitute an idealisation of woman to which I doubt whether any other race can show a parallel.
That such tales as the Kirat-Arjuniya, again, belong to the Saivite recension, there can be no question. Equally certain is it, that some incidents, such as that of Draupadi's cry to Krishna for protection, and Bhishma's absorption in Krishna on his death-bed, must belong to the Gupta version. The rude vigour of the gambling scene, however, and the old warrior's death on the bed of arrows, as well as the marriage of five Pandavas to one queen, would appear to come straight out of the heroic age itself.
It would greatly aid us in our conception of | WIKI |
A newer version of this documentation is available.
View Latest
cbimport json
Imports JSON data into Couchbase
SYNOPSIS
cbimport json [--cluster <url>] [--bucket <bucket_name>] [--dataset <path>]
[--format <data_format>][--username <username>] [--password <password>]
[--generate-key <key_expr>][--cacert <path>][--no-ssl-verify]
[--threads <num>] [--error-log <path>][--log-file <path>] [--verbose]
DESCRIPTION
Imports JSON data into Couchbase. The cbimport command supports files that have a JSON document on each line, files that contain a JSON list where each element is a document, and the Couchbase Samples format. The file format can be specified with the --format flag. See the DATASET FORMATS section below for more details on the supported file formats.
The cbimport command also supports custom key-generation for each document in the imported file. Key generation is done with a combination of pre-existing fields in a document and custom generator functions supplied by cbimport. See the KEY GENERATION section below for details about key generators.
OPTIONS
Below are a list of required and optional parameters for the cbimport command.
Required
-c,--cluster <url>
The hostname of a node in the cluster to import data into. See the HOST FORMATS section below for details about hostname specification formats.
-u,--username <username>
The username for cluster authentication. The user must have the appropriate privileges to write to the bucket in which data will be loaded to.
-p,--password <password>
The password for cluster authentication. The user must have the appropriate privileges to write to the bucket in which data will be loaded to. Specifying this option without a value will allow the user to type a non-echoed password to stdin.
-b,--bucket <bucket_name>
The name of the bucket to import data into.
-d,--dataset <uri>
The URI of the dataset to be loaded. cbimport supports loading data from a local files only. When importing data from a local file the path must be prefixed with file://.
-f,--format <format>
The format of the dataset specified (lines, list, sample). See the DATASET FORMATS section below for more details on the formats supported by cbimport.
Optional
-g,--generate-key <key_expr>
Specifies a key expression used for generating a key for each document imported. This parameter is required for list and lines formats, but not for the sample format. See the KEY GENERATION section below for more information on specifying key generators.
--no-ssl-verify
Skips the SSL verification phase. Specifying this flag will allow a connection using SSL encryption, but will not verify the identity of the server you connect to. You are vulnerable to a man-in-the-middle attack if you use this flag. Either this flag or the --cacert flag must be specified when using an SSL encrypted connection.
--cacert <cert_path>
Specifies a CA certificate that will be used to verify the identity of the server being connecting to. Either this flag or the --no-ssl-verify flag must be specified when using an SSL encrypted connection.
--limit-docs <num>
Specifies that the utility should stop loading data after reading a certain amount of docs from the dataset. This option is useful when you have a large dataset and only want to partially load it.
--skip-docs <num>
Specifies that the utility should skip some docs before we start importing data. If this flag is used together with the --limit-rows flag then we will import the number of rows specified by --limit-rows after we ave skipped the rows specified by --skip-rows.
-t,--threads <num>
Specifies the number of concurrent clients to use when importing data. Fewer clients means imports will take longer, but there will be less cluster resources used to complete the import. More clients means faster imports, but at the cost of more cluster resource usage. This parameter defaults to 1 if it is not specified and it is recommended that this parameter is not set to be higher than the number of CPUs on the machine where the import is taking place.
-e,--errors-log <path>
Specifies a log file where JSON documents that could not be loaded are written to. A document might not be loaded if a key could not be generated for the document or if the document is not valid JSON. The errors file is written in the "lines" format (one document per line).
-l,--log-file <path>
Specifies a log file for writing debugging information about cbimport execution.
-v,--verbose
Specifies that logging should be sent to stdout. If this flag is specified along with the -l/--log-file option then the verbose option is ignored.
HOST FORMATS
When specifying a host for the couchbase-cli command the following formats are expected:
• couchbase://<addr>
• <addr>:<port>
• http://<addr>:<port>
It is recommended to use the couchbase://<addr> format for standard installations. The other two formats allow an option to take a port number which is needed for non-default installations where the admin port has been set up on a port other that 8091.
DATASET FORMATS
The cbimport command supports the formats listed below.
LINES
The lines format specifies a file that contains one JSON document on every line in the file. This format is specified by setting the --format option to "lines". Below is an example of a file in lines format.
{"key": "mykey1", "value": "myvalue1"}
{"key": "mykey2", "value": "myvalue2"}
{"key": "mykey3", "value": "myvalue3"}
{"key": "mykey4", "value": "myvalue4"}
LIST
The list format specifies a file which contains a JSON list where each element in the list is a JSON document. The file may only contain a single list, but the list may be specified over multiple lines. This format is specified by setting the --format option to "list". Below is an example of a file in list format.
[
{
"key": "mykey1",
"value": "myvalue1"
},
{"key": "mykey2", "value": "myvalue2"},
{"key": "mykey3", "value": "myvalue3"},
{"key": "mykey4", "value": "myvalue4"}
]
SAMPLE
The sample format specifies a ZIP file or folder containing multiple documents. This format is intended to load Couchbase sample data sets. Unlike the lines and list formats the sample format may also contains index, view, and full-text index definitions. The folder structure is specified below.
+ (root folder)
+ docs
key1.json
key2.json
...
+ design_docs
indexes.json
views.json
All documents in the samples format are contained in the docs folder and there is one file per document. Each filename in the docs folder is the key name for the JSON document contained in the file. If the filename contains a .json extension then the extension is excluded from the key name during the import. This name can be overridden if the --generate-key option is specified. The docs folder may also contain sub-folders of documents to be imported. Sub-folders can be used to organize large amounts of documents into a more readable catagorized form.
The design_docs folder contains index definitions. The filename indexes.json is reserved for secondary indexes. All other file names are used for view indexes.
KEY GENERATORS
Key generators are used in order to generate a key for each document loaded. Keys can be generated by using a combination of characters, the values of a given field in a document, and custom generators. Field substitutions are done by wrapping the field name in "%" and custom generators are wrapped in "#". Below is an example of a key generation expression.
Given the document:
{
"name": "alice",
"age": 40
}
Key Generator Expression:
--generate-key key::%name%::#MONO_INCR#
The following key would be generated:
key::alice::1
In the example above we generate a key using both the value of a field in the document and a custom generator. We use the "name" field to use the value of the name field as part of the key. This is specified by "%name%" which tells the key generator to substitute the value of the field "name" into the key.
This example also contains a generator function MONO_INCR which will increment by 1 each time the key generator is called. Since this is the first time this key generator was executed it returns 1. If we executed the key generator again it would return 2 and so on. The starting value of the MONO_INCR generator is 1 by default, but it can be changed by specifying a number in brackets after the MONO_INCR generator name. To start generating monotonically incrementing values starting at 100 for example, the generator MONO_INCR[100] would be specified. The cbimport command current contains a monotonic increment generator (MONO_INCR) and a UUID generator (UUID).
Any text that isn’t wrapped in "%" or "" is static text and will be in the result of all generated keys. If a key needs to contain a "%" or "" in static text then they need to be escaped by providing a double "%" or "" (ex. "%%" or "#").
If a key cannot be generated because the field specified in the key generator is not present in the document then the key will be skipped. To see a list of document that were not imported due to failed key generation users can specify the --errors-log <path> parameter to dump a list of all documents that could not be imported to a file.
EXAMPLES
In the examples below we will show examples for importing data from the files below.
/data/lines.json
{"name": "alice", "age": 37}
{"name": "bob", "age": 39}
/data/list.json
[
{"name": "candice", "age": 42},
{"name": "daniel", "age": 38}
]
To import data from /data/lines.json using a key containing the "name" field and utilizing 4 threads the following command can be run.
$ cbimport json -c couchbase://127.0.0.1 -u Administrator -p password \
-b default -d file:///data/lines.json -f lines -g key::%name% -t 4
To import data from /data/list.json using a key containing the "name" field and the UUID generator the following command would be run.
$ cbimport json -c couchbase://127.0.0.1 -u Administrator -p password \
-b default -d file:///data/list.json -f list -g key::%name%::#UUID# -t 4
If the dataset in not available on the local machine where the command is run, but is available via an HTTP URL we can still import the data using cbimport. If we assume that the data is located at http://data.org/list.json and that the dataset is in the JSON list format then we can import the data with the command below.
$ cbimport json -c couchbase://127.0.0.1 -u Administrator -p password \
-b default -d http://data.org/list.json -f list -g key::%name%::#UUID# -t 4
DISCUSSION
The cbimport-json command is used to quickly import data from various files containing JSON data. While importing JSON the cbimport command only utilizes a single reader. As a result importing large dataset may benefit from being paritioned into multiple files and running a separate cbimport process on each file.
ENVIRONMENT AND CONFIGURATION VARIABLES
(None)
SEE ALSO
CBIMPORT
Part of the cbimport suite | ESSENTIALAI-STEM |
Iceland boreal birch forests and alpine tundra
The Iceland boreal birch forests and alpine tundra ecoregion (WWF ID: PA0602) covers the island of Iceland in the North Atlantic. The island is volcanic in origin with basaltic soils, and the cold northerly climate prevents any significant crop agriculture. Because the island is young and isolated from larger land masses, species biodiversity is relatively low. Forest cover has been reduced to about 1% of the original birch forest by a long history of timber extraction and soil erosion caused by sheep grazing. Blanket bogs (areas of high rainfall and peat accumulation) are common.
Location and description
Iceland is a volcanic plateau rising out of the Atlantic 290 km east of Greenland. Three quarters of the island is above 200 m in elevation, with steep fjords and cliffs along much of its coast. Approximately 20% of the island is bare rock or glacier, with the highest elevation being 2119 m.
Climate
Because the Gulf Stream has a moderating effect, portions of Iceland have an Oceanic climate (subpolar variety) (Koppen Cfc). But most of the ecoregion is Tundra climate (Köppen climate classification ET), a local climate in which at least one month has an average temperature high enough to melt snow (0 °C (32 °F)), but no month with an average temperature in excess of 10 °C (50 °F). Precipitation is lowest in the north, as little as 500 mm/year, and highest in the south with up to 3,500 mm/year in places.
Flora and fauna
Continuous vegetation covers approximately 25% of the island, 16,000 km2 of which is dryland vegetation and 10,000 km2 of wetlands. About 1,360 km2 is employed in crop agriculture, and about 1,250 km2 of the original white birch (Betula pubescens) forest remains. Another 60,000 km2 is sparsely or very sparsely covered in vegetation. Most of the birch is shrub-like and under 2 meters tall. About 2% of the forest features trees 8-12 meters tall, mostly in valleys in the north, east and south. Besides birch, there are some stands of rowan (Sorbus aucuparia) and tea-leaved willow (Salix phylicifolia). There are 483 species of vascular plants recorded in Iceland. The largest families are the sedges (Cyperaceae), with 53 species, and grasses (Poaceae), with 47 species. There are 560 species of bryophytes (liverworts, hornworts, and mosses). The most common mosses are Racomitrium lanuginosum and Racomitrium canescens. There are more than 550 species of lichens, and over 1200 species of fungi. There are no reptiles or amphibians in Iceland.
Only one species of mammal is indigenous to Iceland, the Arctic fox (Alopex lagopus). Polar bears (Ursus maritimus) visit occasionally on drifting sea ice, and there are introduced species such as the American mink (Neogale vison), which was brought in for fur farming but have escaped and formed a significant population. Another introduced species is the wood mouse (Apodemus sylvaticus) which is now widespread in wooded areas.
The greatest ecological threat facing the island is soil erosion. While 50-60% of the island was covered in vegetation at the time of human arrival, the decline to the current 25% has been the result of soil loss caused by deforestation for firewood and timber, and overgrazing by sheep. In recent years, however, the nation has pursued afforestation and soil conservation programs that have stopped and reversed the decline.
Protected areas
Over 12% of the ecoregion is officially protected. These protected areas include:
* Hornstrandir Nature Reserve
* Jökulsárgljúfur National Park (now part of Vatnajökull)
* Lónsöræfi Nature Reserve
* Þingvellir National Park
* Skaftafell National Park (now part of Vatnajökull)
* Snæfellsjökull National Park
* Vatnsmýrin Nature Reserve
* Vatnajökull National Park National Park | WIKI |
2
I am getting the following error when image styles are being created on my Drupal 7.24 site:
mod_fcgid: stderr: PHP Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 73834563 bytes) in modules/system/image.gd.inc on line 237"
My style is doing a scale and crop down to 300x200.
I know this could be a problem with my memory limit, which is currently 128M. As this is high, this doesn't seem like an issue.
Could it be from the use of the File (Field) Paths" module for my image names?
2
• 2
Can you tell us what some min/avg/max memory usages are on your site? The Performance will give you an idea. – mpdonadio Jan 4 '14 at 16:43
• Statistics from the start page, where the images are supposed to show up: 11.25M (max), 10.25M (avg), 990ms (max), 777.1ms (avg) – ReBa Jan 4 '14 at 16:58
5
What's the size of your image? For scale you may need roughly:
X * Y * 4 (bytes per pixel) * 2 (for source and destination image) * 2 ( to make sure there is enough RAM for computation).
Now, core can require up to 32 MB, and modules can easily double or even quadruple this. So, let's optimistically assume your core + modules only use 64MB. That leaves other 64MB. It means you can safely scale images up to 4194304px. It seems you have enough memory for 4Mpx input images. Anything larger can cause this error and it will not be anything surprising.
8
• My images are of the size around 400kb, so nothing to really get close to the 64M. The size I want is 300x200px – ReBa Jan 4 '14 at 16:23
• 2
@ReBa there is a huge difference between the size of a file, and the size of an image itself. What are the dimensions of the source image? If 800 x 600 px then yes, it probably should work. If it's 400kB jpg file, then it may be too big pretty easily. And as far as my experience goes, target size does not significantly affect memory used to resize. Can't say exactly how GD implementation is doing it, but anyway. – Mołot Jan 4 '14 at 16:27
• I agree with @Mołot here. The error message you are getting is when GD is trying to load the image. – mpdonadio Jan 4 '14 at 16:36
• 1
@ReBa And note that I made some bold assumptions. It's pretty possible that Drupal & other modules use almost all of your 128MB, leaving even less than what I assumed for my calculations. As official documentation says: "Typically 128 MB or 256 MB are found in production systems. Some installations may require much more, especially with media-rich implementations." – Mołot Jan 4 '14 at 16:44
• I haven't had any problems with my memory limit before, and it was a 64M. So I suppose (although I can't say "know") that it shouldn't be the memory usage itself. My images are originaly around 1200x1200px (or 1200x1600px max) so in fact it's not size that's relevant. Could it be that the images are somewhat corrupt, and he's not able to track this? – ReBa Jan 4 '14 at 16:51
Not the answer you're looking for? Browse other questions tagged or ask your own question. | ESSENTIALAI-STEM |
Page:LA2-NSRW-2-0460.jpg
HUNT
899
HUNT
crossed the Rhine, the Moselle and the Seine. But at the battle of Chalons (451) he was utterly defeated by an army of Romans, Franks and Visigoths under Theodoric and Ae"tius, in one of the bloodiest as well as most important battles of European history. Yet the next year he had strength enough to overrun Italy and would have taken Rome, had it not been for the visit to his camp of Pope Leo I, who is said, to have overawed him by his sacred character. But the battle of Chalons was the real deathblow to the Hunnish empire, which quickly fell to pieces after the death of Attila in 453. Another defeat in Pannonia by the Goths, Gepidae, Suevi, Heru-lians and others scattered them for good. Some settled in Dobrudja, others in Dacia, while the main body seem to have gone back to the land from which they came — the region about the Ural.
The Huns were of a dark complexion, deformed in appearance, uncouth in their movements and with shrill voices. Gibbon speaks of their "broad shoulders, flat noses and small, black eyes deeply buried in the head." According to an early fable they were sprung from witches and imps. Like the Mongols, they were a race of horsemen. They fought with bone-tipped javelins, sabers and slings or lassoes. They ate herbs and half-raw meat, which they first used as saddles; and they clothed themselves with the skins of wild animals. See Gibbon's Decline and Fall of the Roman "Empire and Miss Yonge's Young Folks' History of Rome.
Hunt, Helen ("H. H.") See JACKSON, MRS. WILLIAM S.
Hunt, James Henry Leigh, English poet and essayist, was born at Southgate, close to London, Oct. 19, 1784. Hunt spent eight years at Christ's Hospital School in London. After some time as lawyer's clerk for one brother and four years in the war office with another brother, he set up a newspaper, The Examiner, in 1809. On Shelley's invitation to help him and Byron to found a quarterly magazine, The Liberal, he set sail for Leghorn in 1821, but arrived only a week before Shelley's death. The Liberal lived only for four issues, and soon Hunt was back in England. The remainder of his life was one of never-ending activity and never-ending money troubles, for, as he said, "he never knew his multiplication table." The critics called Hunt and Keats the Cockney poets. Leigh Hunt's poetry is now little read, but is witty and clever. His translations are among the choicest of their kind. Among his writings are The Story of Rimini, The Palfrey, Lord Byron and His Contemporaries, Imagination and Fancy, The Old Court Suburb. He died on Aug. 28, 1859. See his Autobiography and Leigh Hunt by Professor Dowden in Ward's English Poets.
Hunt, Richard Morris, an American architect, brother of William Morris Hunt, was born in 18 2 8. At an early age he studied
and traveled in Europe, Egypt and As!a Minor, afterward working on the buildings that connect the Louvre and the Tuilerks. After 1855 he distinguished himself in the United States by the extension of the Capitol at Washington, Lenox Library in New York City, the pedestal for Liberty Enlightening the World, magnificent and palatial private houses and Yorktown Monument. American architecture was and still is deeply influenced by him. He had many distinguished pupils, and was a founder of the Institute of Architects. He died in 1895.
Hunt, William Holman, English painter, was born at London in April, 1827, He first tried business life, but in 1845 be-camean art-student at the Royal Academy. In 1848 Hunt shared his studio with Dante Gabriel Rossetti; and the two, with Millais and other young painters, started the pre-Raphaelite Brotherhood, whose members aimed at truth to nature in their work. Our English Coasts, The Light of the World and The Awakened Conscience are some of the pictures painted in this part of his life. In 1854 Hunt set out for Palestine to study eastern life and the local coloring and surroundings of Bible story. As a result of several visits he painted The Scapegoat, The Shadow of Death, The Triumph of the Innocents and The Finding of Christ in the Temple. His Afterglow in Egypt has been called "that modern masterpiece of technical art/' and Isabella is his finest work in respect of coloring. He died Sept. 7, 1910.
Hunt, William Morris, an American artist, was born in 1829 in Vermont, and became the one important figure-painter among the American artists of his time. He studied at Duesseldorf and -with Couture and Millet, bringing the latter's influence into American art. He always was a forceful technician, and many of his smaller pictures have great charm, fine color and masterly execution. His chief works include The Prodigal Son, A Peasant of Brittany, Portrait of Chief-Justice Waite, Seacoast at Magnolia ana, above all, the mural decorations in the Capitol at Albany. His portraits are exceptionally expressive of character; his landscapes large in style and vigorously executed; his wall-pictures the first large ones painted by an American that possessed artistic importance. The Capitol's new ceilings and
W. HOLMAN HUNT | WIKI |
Clinton, Sanders agree to four more debates | TheHill
White House contenders Hillary ClintonHillary Diane Rodham ClintonLewandowski on potential NH Senate run: If I run, 'I'm going to win' Fighter pilot vs. astronaut match-up in Arizona could determine control of Senate Progressive Democrats' turnout plans simply don't add up MORE and Bernie SandersBernie SandersJoe Biden faces an uncertain path Bernie Sanders vows to go to 'war with white nationalism and racism' as president Biden: 'There's an awful lot of really good Republicans out there' MORE have agreed to four more debates, beginning with a Thursday night showdown in New Hampshire, the Democratic National Committee confirmed to The Hill. After Thursday's debate, the campaigns will next square off in Flint, Mich., the city facing a public health crisis due to contaminated water, in March. The DNC adds that there will be two other debates, one in April and one in May, but did not specify the locations. The Washington Post reports that the April debate will take place in Pennsylvania and the May debate will be in California. The party’s decision to sanction the debates allows the candidates to appear without triggering a party provision that bars candidates who appear in unsanctioned debates from appearing in future official contests. MSNBC and the New Hampshire Union Leader announced last week they would sponsor the Thursday debate and hoped it would be sanctioned. But at the time, DNC Chairwoman Debbie Wasserman Schultz threw cold water on the prospect, saying the party had “no plans” to sanction any debate prior to the New Hampshire primary. The new agreement triples the number of remaining debates left on the calendar after Sanders posted a strong showing in the Iowa caucuses. While Clinton edged out a victory, she did so by a margin of just 0.2 percent, which translates to two national party delegates more than the Vermont senator will get. The original schedule called for just two more debates, on Thursday Feb. 11 and one on Sunday March 6. Sanders has been calling for more debates for months. While the former secretary of State had said she'd be open to additional sanctioned debate, her campaign did not make a push for more events until recently. The campaigns had previously agreed to three of the four debates, but the Clinton camp reportedly wouldn't agree to a debate in New York. On Tuesday, Sanders's campaign had said that it wouldn't participate unless the Clinton camp agreed to the additional debates, including the one in New York. But the two appear to have met an agreement without that venue. Wasserman Schultz has faced criticism over the party’s debate schedule from opponents who believed having fewer debates would limit exposure to the candidates on a national stage. Some also noted that the number and timing of those debates, many of which were held on weekends, limited visibility and helped cement Clinton’s front-runner status. But Wasserman Schultz, who also serves as a Florida lawmaker, has repeatedly pushed back on those accusations. “Our debates have set viewership records because of our candidates’ ideas, energy, and the strength of their vision to build on the progress we’ve made over the last seven years,” she said in a Wednesday statement. “We look forward to seeing them continuing to share Democrats' vision for the country.” —This story was updated at 3:57 p.m. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
OpenStack Networking (Neutron)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
neutron/neutron/openstack/common/middleware/notifier.py
126 lines
3.9 KiB
# Copyright (c) 2013 eNovance
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
"""
Send notifications on request
"""
import os.path
import sys
import traceback as tb
import six
import webob.dec
from neutron.openstack.common import context
from neutron.openstack.common.gettextutils import _LE
from neutron.openstack.common import log as logging
from neutron.openstack.common.middleware import base
from neutron.openstack.common.notifier import api
LOG = logging.getLogger(__name__)
def log_and_ignore_error(fn):
def wrapped(*args, **kwargs):
try:
return fn(*args, **kwargs)
except Exception as e:
LOG.exception(_LE('An exception occurred processing '
'the API call: %s ') % e)
return wrapped
class RequestNotifier(base.Middleware):
"""Send notification on request."""
@classmethod
def factory(cls, global_conf, **local_conf):
"""Factory method for paste.deploy."""
conf = global_conf.copy()
conf.update(local_conf)
def _factory(app):
return cls(app, **conf)
return _factory
def __init__(self, app, **conf):
self.service_name = conf.get('service_name')
self.ignore_req_list = [x.upper().strip() for x in
conf.get('ignore_req_list', '').split(',')]
super(RequestNotifier, self).__init__(app)
@staticmethod
def environ_to_dict(environ):
"""Following PEP 333, server variables are lower case, so don't
include them.
"""
return dict((k, v) for k, v in six.iteritems(environ)
if k.isupper() and k != 'HTTP_X_AUTH_TOKEN')
@log_and_ignore_error
def process_request(self, request):
request.environ['HTTP_X_SERVICE_NAME'] = \
self.service_name or request.host
payload = {
'request': self.environ_to_dict(request.environ),
}
api.notify(context.get_admin_context(),
api.publisher_id(os.path.basename(sys.argv[0])),
'http.request',
api.INFO,
payload)
@log_and_ignore_error
def process_response(self, request, response,
exception=None, traceback=None):
payload = {
'request': self.environ_to_dict(request.environ),
}
if response:
payload['response'] = {
'status': response.status,
'headers': response.headers,
}
if exception:
payload['exception'] = {
'value': repr(exception),
'traceback': tb.format_tb(traceback)
}
api.notify(context.get_admin_context(),
api.publisher_id(os.path.basename(sys.argv[0])),
'http.response',
api.INFO,
payload)
@webob.dec.wsgify
def __call__(self, req):
if req.method in self.ignore_req_list:
return req.get_response(self.application)
else:
self.process_request(req)
try:
response = req.get_response(self.application)
except Exception:
exc_type, value, traceback = sys.exc_info()
self.process_response(req, None, value, traceback)
raise
else:
self.process_response(req, response)
return response | ESSENTIALAI-STEM |
Capitol Theatre (Wheeling, West Virginia)
The Capitol Theatre (formerly the Capitol Music Hall) is the largest theatre in West Virginia and a landmark building in the national historic district of downtown Wheeling. For many years, it has served as the home of Jamboree USA and the Wheeling Symphony Orchestra. Jamboree USA, a Saturday night live country music show broadcast on WWVA 1170 AM from 1926 until 2007, was the second-longest running radio show in the United States, second only to the Grand Ole Opry. The live music show annually drew hundreds of thousands of country music fans to Wheeling, where both local acts and nationally known celebrities such as Johnny Cash, Loretta Lynn, Merle Haggard and Charley Pride would perform.
History
The Capitol Theatre, designed by architect Charles W. Bates of Wheeling, was built by general contractor R. R. Kitchen at a cost of $1,000,000 and first opened on Thanksgiving day 1928. The theater initially presented movies and stage shows and later concerts by the Wheeling Symphony Society, which moved into the building in 1929. The radio station WWVA staged its first Jamboree show production at the Capitol in 1933. However, the Jamboree moved the venue to the Victoria Theatre after a year at the Capitol and the symphony followed thereafter, feeling that showing movies detracted from the musical performance. After the theater stopped showing movies, the symphony returned to the Capitol in 1961, followed years later in 1969 by the Jamboree, which had tried several different venues since the Capitol, the longest venue being the Virginia Theater. In the subsequent years, the Capitol experienced major success as the Capitol Music Hall. In 1969, WWVA moved its studio to the Capitol building, where it produced and broadcast its Jamboree music shows. The Jamboree, the show later recast as Jamboree USA, and the theater was renamed the Capitol Music Hall; it experienced major success and drew supporters from throughout the tri-state area.
In 2006, Clear Channel, which purchased WWVA and had cut the station's budget and locally originated programming to its corporate minimum (and even attempted an unsuccessful city of license move to the Akron market in 2004), ended the series to carry more syndicated programming, and later closed the theater after the building failed an annual safety inspection in the spring of 2007 and was assessed with a list of fire code violations. In addition to the theater, the Capitol Building included a ballroom, shop and recording studio, and also housed Clear Channel's other five radio stations in the region (including WWVA) which continued to use the building after the theater was closed. The Wheeling Symphony has also been playing in various other venues during this time. To address the code requirements, it was estimated that the building needed a minimum of two million dollars in repairs and renovation. As part of the spin-off of its concert business into Live Nation in 2005, Clear Channel also sold off the theater to Live Nation; Live Nation itself put the building up for sale for $850,000 in May 2007. On February 5, 2009, the Wheeling Convention and Visitors Bureau (CVB) announced that it would purchase the then-Capitol Music Hall from Live Nation at a cost of $615,000. The purchase was finalized on April 3, 2009.
Restoration
In early 2009, after the 81-year-old, 2,400-seat theater had been closed for nearly two years, a group of local organizations partnered together and purchased the theater from concert promoter Live Nation for $615,000. Initially, the Ohio Valley Area Development Corporation will take title of the property. The coalition of local groups, which includes the Wheeling-Ohio County Convention and Visitors Bureau, Wheeling National Heritage Area Corporation, Regional Economic Development Partnership and the City of Wheeling, has undertaken to raise $8 million to restore the building, which is seen as a central piece of revitalizing the downtown entertainment district. The Greater Wheeling Sports and Entertainment Authority, which now operates the theater, has seen tremendous success in its first year of operation. Numerous shows have played to sold-out crowds over its first eight months since its re-opening. By the end of 2010, theater will offer new expanded concessions and lounge area (mid-May 2010), new larger handicap-accessible restrooms (mid-May 2010) an elevator, and a remodeled ballroom. The newly remodeled ballroom will be easily accessible by the new elevator and will be open before many events as a restaurant. This area will also be available for rentals for receptions. This area may also feature smaller concerts, dances, and comedy acts.In June of 2019,the theatre's mortgage through Community Bank was retired. The Wheeling/Ohio County Convention and Visitors Bureau under the direction of Frank O'Brien satisfied loans for the theatre's purchase and safety upgrades. The CVB is the sole owner of the theatre and has an operating agreement with the city's of Wheeling's Sports and Entertainment Authority. An average of 52-thousand patrons attend concerts, shows and special community activities each year at the historic theatre generating an estimated positive economic impact between $3 and $5-million per year. | WIKI |
blob: 166854d18a39f7daac0799ee855398d2a62ff9a1 [file] [log] [blame]
# Copyright © 2010 Guillem Jover <guillem@debian.org>
# DPKG_WITH_PROG(PROG)
# --------------
# Allow disabling compilation and usage of specific programs.
AC_DEFUN([DPKG_WITH_PROG], [
AC_ARG_WITH([$1],
AS_HELP_STRING([--without-$1], [do not build or use $1]),
[build_]AS_TR_SH([$1])[=$with_]AS_TR_SH([$1]),
[build_]AS_TR_SH([$1])[=yes]
)
AM_CONDITIONAL([WITH_]AS_TR_CPP([$1]),
[test "x$build_]AS_TR_SH([$1])[" = "xyes"])
AS_IF([test "x$build_]AS_TR_SH([$1])[" = "xyes"], [
AC_DEFINE([WITH_]AS_TR_CPP([$1]), 1, [Define to 1 if $1 is compiled.])
], [
AC_DEFINE([WITH_]AS_TR_CPP([$1]), 0)
])
])# DPKG_WITH_PROG
# DPKG_WITH_DIR(DIR, DEFAULT, DESCRIPTION)
# -------------
# Allow specifying alternate directories.
AC_DEFUN([DPKG_WITH_DIR], [
$1="$2"
AC_ARG_WITH([$1],
AS_HELP_STRING([--with-$1=DIR], [$3]),
AS_CASE([$with_$1],
[""], [AC_MSG_ERROR([invalid $1 specified])],
[$1="$with_$1"])
)
AC_SUBST([$1])
])# DPKG_WITH_DIR | ESSENTIALAI-STEM |
User:Alex B4
Hello there
Welcome to my user page. My main interests on Wikipedia are politics and theology, although I may edit other pages as and when I see fit.
Created pages
* Jeremy Hunt's tenure as Health Secretary
* Iain Duncan Smith's tenure as Work and Pensions Secretary
* Protests by Westboro Baptist Church | WIKI |
Meen (surname)
Meen is a surname. Notable people with the surname include:
* Arthur Meen (1924–2008), Canadian politician
* Margaret Meen (died 1824), English watercolour painter
* Reggie Meen (1907–1984), British boxer
* Sally Meen (born 1965), English television presenter | WIKI |
/ SEKAICTF ALGO
Gluttonous Sheep
This sheep needs to chill out with the apples, I’m sure there’s plenty to go around.
Problem Setup
The setup for this problem is quite elaborate, but I’ll summarize briefly as best I can.
The setting for this challenge is a kingdom (aptly named Appleshire) consisting of \(N\) towns, which will be connected by \(N-1\) unique bi-directional roads. We are also told that one can travel between any two towns in this kingdom using these roads.
Hence, we naturally interpret a problem instance as a graph \(G=(V, E)\), where \(V=\{1, \dots, N\}\) is the set of nodes (towns) and \(E \subset V \times V\) is a set of undirected edges such that \(\lvert E \rvert =N-1\). Since we are also told that \(G\) must be connected, \(G\) is a tree.
A town is considered to be abandonded if there is only 1 other town that it is connected to, and otherwise it is considered non-abandonded (i.e. it will have more than 1 neighbor since there are no isolated nodes). Thus, abandonded towns are simply the leaf nodes in \(V\) and non-abandonded towns will be internal nodes.
For a given node \(v\in V\), if \(v\) is a leaf node, we are told that there will be \(L_v \geq 1\) golden apples hidden at that node. Golden apples are only hidden at leaf nodes.
If \(v\) is instead a internal node, then one can instead buy a travel pass from the respective town for the cost of 1 apple. The value of the travel pass available at internal node \(v\) is \(L_v \geq 1\), and one must always have exactly 1 travel pass to travel between towns (if you buy a new one then you discard your previous travel pass). When any given edge in the graph is traversed, you must pay \(L_v\) apples, where \(L_v\) is the value of the travel pass that was last purchased (the edge traversed need not be inident to \(v\)).
Objective
Ok, now that we got all of that setup out of the way, we can discuss what we’re actually trying to accomplish here. Suppose we (by we I mean a sheep named Momo who has purple skin for some reason) start at a node \(u\in V\). From this given node, we are interested in finding a path to a leaf node in \(G\) such that traversing this path maximizes the net number of apples gained (or equivalently, minimizes the net number of apples spent).
This path must end the moment we reach a leaf node. Thus, we must strategically choose what our final destination is. We cannot collect the apples hidden at multiple leaf nodes.
If the minimum number of apples that we can spend if we start at \(u\) is \(c_u\), then we are interested in computing \(c_u\) for all possible starting \(u \in V\).
Note that by the given problem constraints, if our starting \(u\) is already a leaf node, then there is no work to be done, as we will immediately collect \(L_u\) and there is no traversal to be considered. Thus, we really only need to consider \(u \in V\setminus A\), where \(A\) is the set of leaf (abandoned) nodes. I will use the notation \(V\setminus A\) throughout the remainder of this writeup to emphasize this fact.
A Failed Attempt
My first thought for this problem was that the problem creator likely wanted us to leverage the fact that there is a unique path between any two nodes in a tree, and a given problem instance for this challenge is always a tree. Thus, my initial idea involved simply finding this unique path from our starting node to all possible leaf nodes, and determine which is optimal using the observation that during any traversal, if the value of our current travel pass is \(L_{v_1}\), then we should always greedily buy any travel pass that satisfies \(L_{v_2} \leq L_{v_1}\).
This observation comes from the fact that a travel pass only costs 1 apple, and we can only buy them from internal nodes. Since must find a path that ends with a leaf node, we will always end up using any travel pass that is bought, so as long as \(L_{v_2} \leq L_{v_1}\) (note that \(L_v \in\mathbb{N} \;\; \forall v\in V\)) then we will always make up for the 1 apple spent to buy the new travel pass on the very next edge we take.
Unfortunately, it was pretty easy to construct a counterexample for why this would fail. However, I thought it would still be useful to discuss why it fails to get a better grasp of the problem and help motivate the actual solution I came up with.
Take the following example, where we are starting at \(u\) and need to end at \(L_{v_4}\) (we can asssume that this is the best leaf node to end at by simply letting \(L_{v_4} \to \infty\)). I’m using dotted lines to simply indicate that \(u\) and \(v_2\) are internal nodes. By this approach, if we simply let \(L_u\to\infty\), \(L_{v_1} \to \infty\), \(L_{v_3} \to \infty\), while \(L_{v_2} = 1\), then it becomes immediately clear that we shouldn’t be taking a direct path to \(v_4\). Instead, it is clearly better to take a detour to get a significantly better travel pass to reduce the number of apples spent along the traversal.
Image of counterexample
In fact, one can come up with increasingly elaborate example for optimal traversals, where one must make detours during other detours to pick up intermediary travel passes that make it easier to get other intermediary travel passes to then go to the desired leaf node.
Ok, So What Now?
From here, there are two key questions that can be answered to come up with a viable solution.
1. How can we determine when we should take a detour to go get a better travel pass?
2. If we know \(c_{v_1}\) for a given \(v_1 \in V\setminus A\) (recall that \(c_{v_1}\) is the optimal cost if we start at \(v_1\)), can we somehow leverage that result when we need to compute \(c_{v_2}\) for some other \(v_2 \in V\setminus A\)?
Question 1 (Answer: Sort the Nodes)
Let’s tackle question 1 first. Instead of thinking when we should take a detour, we can instead think of when we should not take a detour. The answer to this question is pretty clear: if there is no better travel pass! If
\[L_u = \min_{v\in V\setminus A} L_v\]
then there is no better travel pass in the entire graph! Finding \(c_u\) thus simply entails a BFS from \(u\) to all leaf nodes and choosing the traversal that yields the most apples, and at no point do we need to worry about travel passes (since we already have the best one).
Thus, we will ultimately sort all possible \(u\in V\setminus A\) by \(L_u\), and compute \(c_u\) in this order. This is a good segue to the next question, as we will see how doing this leads us to the correct solution.
Question 2 (Answer: Optimal Substructure)
The key observation to answer question 2 is that this problem exhibits optimal substructure (as many graph path finding problems do). Let’s discuss why this is the case.
Lets index the nodes in \(V\setminus A\) as follows,
\[V\setminus A = \{u_1, u_2, \dots, u_{N-\alpha} \}\]
such that \(L_{u_1} \leq L_{u_2} \leq \dots \leq L_{u_{N-\alpha}}\) and \(\alpha := \lvert A \rvert\). We’ve already discussed how we can compute \(c_{u_1}\), so let’s suppose we’ve done that already.
Now, suppose we start a BFS traversal starting from \(u_2\), and along the way our BFS reaches \(u_1\). We can observe that once we reach \(u_1\), nothing has changed from when the traversal originated from \(u_1\)! We already know what the optimal path from \(u_1\) is and all decisions to get to \(u_1\) from \(u_2\) are completely independent and don’t change that!
This is precisely optimal substructure. We can more generally state this result as follows. If during the BFS originating at \(u_m\) we encounter node \(u_n\) for \(n < m\), then we can end that branch of the BFS with cost
\[c_{u_n} + c_{u_m \to u_n} + 1\]
where \(c_{u_m \to u_n}\) is the cost of getting to \(u_n\) from \(u_m\). Note we drop the \(+1\) term if it so happens that \(L_{u_m} = L_{u_n}\).
And that’s it! Let’s look at what the solution looks like!
Solution
from collections import defaultdict
N = int(input())
# Note that in the arrays below, we keep a dummy placeholder in index 0 to make indexing easier
# vals will store each L_v
vals = [0] + [int(x) for x in input().split()]
degree = [0] * (N+1)
leaf = [True] * (N+1)
adj_list = defaultdict(list)
for _ in range(N-1):
u, v = [int(x) for x in input().split()]
adj_list[u].append(v)
adj_list[v].append(u)
degree[u] += 1
degree[v] += 1
if degree[u] > 1:
leaf[u] = False
if degree[v] > 1:
leaf[v] = False
# Can automatically compute c_u if u is a leaf node - leave all others at 0 for now.
spending = [-x if leaf[i] else 0 for i, x in enumerate(vals)]
# Order nodes by L_u
order = [i[0] for i in sorted(enumerate(vals), key=lambda x: x[1]) if not leaf[i[0]]]
visited = set()
def bfs(root, c):
queue = [(root, 1)]
tmp_visited = set()
tmp_visited.add(root)
best = None
while queue:
node, cost = queue.pop(0)
if leaf[node]:
if best is None or vals[node] - cost > best:
best = vals[node] - cost
continue
for child in adj_list[node]:
if child not in tmp_visited:
if child in visited:
# Add back 1 to account for case of equal travel passes
d = 1 if vals[child] == c else 0
if best is None or -spending[child] - cost - c + d > best:
# Note: the -c term is the cost of getting from current node to next
best = -spending[child] - cost - c + d
else:
queue.append((child, cost + c))
tmp_visited.add(child)
# best tracks apples gained, but we want to store apples spent
spending[root] = -best
visited.add(root)
for node in order:
bfs(node, vals[node])
print(' '.join([str(x) for x in spending[1:]]))
Since we are now also computing each \(c_u\) in ascending order of \(L_u\), we now do not have to worry about making decisions of whether or not we should buy travel passes. From here, the code is a relatively straightforward implementation of exactly the logic discussed in this writeup. I’ve done my best to leave a few comments in the code to explain what I’m doing.
And with that Momo can now optimally hoard his golden apples like the glutton he is!
abi-kothapalli
Abi Kothapalli
Abi is a junior studying Computer Science and Mathematics at Vanderbilt. He is interested in some useless stuff like algorithms, combinatorial optimization, mathematical ML, and some other random junk too. He also has over half a dozen social media accounts but has not and never will post anything.
Read More | ESSENTIALAI-STEM |
FORMOSA PLASTICS CORPORATION USA and Formosa Plastic Corporation, Texas, Petitioners, v. PRESIDIO ENGINEERS AND CONTRACTORS, INC., Respondent.
No. 95-1291.
Supreme Court of Texas.
Argued Oct. 1, 1996.
Decided Jan. 16, 1998.
Dissenting Opinion to Original Opinion of July 9,1997.
Rehearing Overruled March 13, 1998.
Molly H. Hatchell, Andy G. Navarro, Michael A. Hatchell, Tyler, Joe R. Greenhill, Bob E. Shannon, Joseph R. Knight, Austin, for petitioners.
Robert P. Houston, Cynthia T. Sheppard, John Griffin, Jr., Victoria, William Powers, Jr., for respondent.
ABBOTT, Justice,
delivered the opinion of the Court,
in which PHILLIPS, Chief Justice, GONZALEZ, HECHT, ENOCH, OWEN and HANKINSON, Justices, join.
We overrule Respondent’s motion for rehearing and motion for voluntary remittitur. We withdraw our opinion of July 9,1997, and substitute the following in its place.
In Southwestern Bell Telephone Co. v. DeLanney, 809 S.W.2d 493, 494-95 (Tex.1991), this Court held that a cause of action for negligence could not be based on an allegation that a party had negligently failed to perform a contract because such a claim sounded in contract, not in tort. Today we are requested to apply a similar analysis to preclude a recovery in tort for a fraudulent inducement of contract claim. We decline to do so, holding instead that our DeLcmney analysis is not applicable to such a claim. However, because there is no probative evidence to support the entire amount of damages awarded by the trial court, we reverse the judgment of the court of appeals and remand the case to the trial court for a new trial.
I
In 1989, Formosa Plastics Corporation began a large construction “expansion project” at its facility in Point Comfort, Texas. Presi-dio Engineers and Contractors, Inc. received an “Invitation to Bid” from Formosa on that part of the project requiring the construction of 300 concrete foundations. The invitation was accompanied by a bid package containing technical drawings, specifications, general information, and a sample contract. The bid package also contained certain representations about the foundation job. These representations included that (1) Presidio would arrange and be responsible for the scheduling, ordering, and delivery of all materials, including those paid for by Formosa; (2) work was to progress continually from commencement to completion; and (3) the job was scheduled to commence on July 16,1990, and be completed 90 days later, on October 15,1990.
Presidio’s president, Bob Burnette, testified that he relied on these representations in preparing Presidio’s bid. Because the bid package provided that the contractor would be responsible for all weather and other unknown delays, he added another 30 days to his estimate of the job’s scheduled completion date. He submitted a bid on behalf of Presidio in the amount of $600,000. Because Presidio submitted the lowest bid, Formosa awarded Presidio the contract.
The job was not completed in 120 days. Rather, the job took over eight months to complete, more than twice Burnette’s estimate and almost three times the scheduled time provided in the bid package. The delays caused Presidio to incur substantial additional costs that were not anticipated when Presidio submitted its bid.
Presidio asserted a claim under paragraph 17 of the parties’ contract, which provided that Formosa was liable for all delay damages within the “control of the owner.” Formosa countered that, while it may have been liable for some of the delays, it was not responsible for all of the delays and losses asserted by Presidio. Because the parties were not able to resolve their dispute, Presidio sued Formosa for breach of contract and breach of a duty of good faith and fair dealing. Presidio also brought fraudulent inducement of contract and fraudulent performance of contract claims based on representations made by Formosa that Presidio discovered were false after commencing performance of the contract. Formosa counterclaimed for breach of contract, urging that Presidio had not properly completed some of its work.
Presidio presented evidence to the jury that Formosa had an intentional, premeditated scheme to defraud the contractors working on its expansion project. Under this scheme, Formosa enticed contractors to make low bids by making misrepresentations in the bid package regarding scheduling, delivery of materials, and responsibility for delay damages. Jack Lin, the director of Formosa’s civil department, admitted that Formosa acted deceptively by representing in the bid package that the contractors would have the ability to schedule the delivery of concrete when in truth Formosa had secretly decided to set up its own delivery schedule in order to save money. Formosa also scheduled multiple contractors, doing mutually exclusive work, to be in the same area at the same time. For instance, Formosa scheduled another contractor to install underground pipe in Presidio’s work area at the same time that Presidio was supposed to be pouring foundations. Thomas Pena, Formosa’s inspector, admitted that Formosa knew that contractors would be working right on top of each other, but this information was not passed on to the contractors. Of course, once the contractors were on the job, they would realize that, due to such unexpected delays caused by Formosa, their bids were inadequate. But when the contractors requested delay damages under the contract, Formosa would rely on its superior economic position and offer the contractors far less than the full and fair value of the delay damages. In fact, Ron Robiehaux, head of Formosa’s contract administration division, testified that Formosa, in an effort to lower costs, would utilize its economic superiority to string contractors along and force them to settle. Robiehaux added that “if [a contractor] continued to complain then [Formosa] would take the contract from him and make sure he loses his money.” Under this scheme, Formosa allegedly stood to save millions of dollars on its $1.5 billion expansion project.
The jury found that Formosa defrauded Presidio and awarded Presidio $1.5 million. The jury also found that Formosa breached a duty of good faith and fair dealing and awarded Presidio $1.5 million as a result. Based on its findings that Formosa’s fraud and breach of a duty of good faith and fair dealing were done willfully, wantonly, intentionally, or with conscious indifference to the rights of Presidio, the jury further awarded Presidio $10 million as exemplary damages. Additionally, the jury found that Formosa breached its contract with Presidio, causing $1,267 million in damages. On the other hand, the jury also concluded that Presidio did not fully comply with the contract, causing Formosa $107,000 in damages.
The trial court suggested a remittitur reducing the tort damages to $700,000 and the contract damages to $467,000, which Presidio accepted. Based on Presidio’s election to recover tort rather than contract damages, the trial court rendered a judgment in favor of Presidio for $700,000 in actual damages, $10 million in punitive damages, prejudgment interest, attorney’s fees, and costs. ' The damages caused by Presidio’s breach of contract were offset against the judgment.
Formosa appealed the judgment to the court of appeals, which affirmed the judgment of the trial court. 941 S.W.2d 138. We granted Formosa’s application for writ of error to consider, among other things, whether Presidio has a viable fraud claim when it suffered only economic losses related to the performance and subject matter of the párties’ contract, whether there was legally sufficient evidence of fraud, and whether there was legally sufficient evidence to support the entire amount of damages awarded. We conclude that, while Presidio has a viable fraud claim, it failed to present legally sufficient evidence to support the entire amount of damages awarded. Accordingly, we reverse the judgment of the court of appeals and remand the cause for a new trial.
II
Formosa asserts that Presidio’s fraud claim cannot be maintained because “Presi-dio’s losses were purely economic losses related to performance and the subject matter of the contract.” Formosa contends that our decision in Southwestern Bell Telephone Co. v. DeLanney, 809 S.W.2d 493 (Tex.1991), compels us to examine the substance of Pre-sidio’s tort claim to determine whether the claim is, in reality, a re-packaged breach of contract claim. Formosa urges that, in making this determination, we should analyze the nature of the alleged injury, the source of the breached duty, and whether the loss or risk of loss is contractually contemplated by the parties. Presidio counters that a DeLanney-type analysis does not apply to fraud claims. For the reasons discussed below, we agree with Presidio.
A
Over the last fifty years, this Court has analyzed the distinction between torts and contracts from two different perspectives. At first, we merely analyzed the source of the duty in determining whether an action sounded in tort or contract. For instance, in International Printing Pressmen & Assistants’ Union v. Smith, 145 Tex. 399, 198 S.W.2d 729, 735 (1946), this Court held that “ ‘an action in contract is for the breach of a duty arising out of a contract either express or implied, while an action in tort is for a breach of duty imposed by law.’ ” Id. (quoting 1 C.J.S. Actions § 44).
Later, we overlaid an analysis of the nature of the remedy sought by the plaintiff. In Jim Walter Homes, Inc. v. Reed, 711 S.W.2d 617 (Tex.1986), we recognized that, while the contractual relationship of the parties could create duties under both contract law and tort law, the “nature of the injury most often determines which duty or duties are breached. When the injury is only the economic loss to the subject of a contract itself, the action sounds in contract alone.” Id, at 618. Because a mere breach of contract cannot support recovery of exemplary damages, and because the plaintiffs did not “prove a distinct tortious injury with actual damages,” we rendered judgment that the plaintiffs take nothing on their exemplary damages claim. Id.
We analyzed both the source of the duty and the nature of the remedy in DeLanney. DeLanney asserted that Bell was negligent in failing to publish his Yellow Pages advertisement as promised. The trial court rendered judgment for DeLanney, and the court of appeals affirmed. This Court, however, held that the claim sounded in contract, not negligence, and accordingly rendered judgment in favor of Bell. We provided the following guidelines on distinguishing contract and tort causes of action:
If the defendant’s conduct — such as negligently burning down a house — would give rise to liability independent of the fact that a contract exists between the parties, the plaintiff’s claim may also sound in tort. Conversely, if the defendant’s conduct— such as failing to publish an advertisement — would give rise to liability only because it breaches the parties’ agreement, the plaintiff’s claim ordinarily sounds only in contract. In determining whether the plaintiff may recover on a tort theory, it is also instructive to examine the nature of the plaintiff’s loss. When the only loss or damage is to the subject matter of the contract, the plaintiff’s action is ordinarily on the contract.
DeLanney, 809 S.W.2d at 494. In applying these guidelines, we first determined that Bell’s duty to publish DeLanney’s advertisement arose solely from the contract. We then concluded that DeLanney’s damages, lost profits, were only for the economic loss caused by Bell’s failure to perform the contract. Thus, while DeLanney pleaded his action as one in negligence, he clearly sought to recover the benefit of his bargain with Bell such that Bell’s failure to publish the advertisement was not a tort. Id. at 495.
Most recently, in Crawford v. Ace Sign, Inc., 917 S.W.2d 12, 13-14 (Tex.1996), we considered the intersection of the Deceptive Trade Practices Act and contract law. Ace Sign sued Bell for omission of a yellow pages advertisement, alleging negligence, DTPA misrepresentation, and breach of contract. Bell stipulated the contract breach, and was granted summary judgment on Ace Sign’s DTPA and negligence claims. The court of appeals reversed the trial court’s judgment on the DTPA claim, but this Court then reversed the court of appeals. We noted that, under DeLanney, we were to consider “both the source of the defendant’s duly to act (whether it arose solely out of the contract or from some common-law duty) and the nature of the remedy sought by the plaintiff.” Id. at 12. We then examined the relationship of the DTPA and contract law, concluding that an allegation of mere breach of contract, without more, does not violate the DTPA. We held that, because the alleged representations of Bell were simply representations that it would fulfill its contractual duty to publish the advertisement, and a mere failure to later perform a promise does not constitute misrepresentation, Crawford could only recover in contract.
B
Several appellate courts have considered the application of our decisions in DeLanney and Reed to fraudulent inducement claims. Some of these courts have concluded that these decisions mandate that tort damages are not recoverable for a fraudulent inducement claim unless the plaintiff suffers an injury that is distinct, separate, and independent from the economic losses recoverable under a breach of contract claim. Grace Petroleum Corp. v. Williamson, 906 S.W.2d 66, 68-69 (Tex.App.-Tyler 1995, no writ); Parker v. Parker, 897 S.W.2d 918, 924 (Tex. App.-Fort Worth 1995, writ denied); Barbouti v. Munden, 866 S.W.2d 288, 293-94 (Tex.App.-Houston [14th Dist.] 1993, writ denied); River Consulting, Inc. v. Sullivan, 848 S.W.2d 165, 170 (Tex.App.-Houston [1st Dist.] 1992, writ denied); C & C Partners v. Sun Exploration & Prod. Co., 783 S.W.2d 707, 719-20 (Tex.App.-Dallas 1989, writ denied); Hebisen v. Nassau Dev. Co., 754 S.W.2d 345, 348 (Tex.App.-Houston [14th Dist.] 1988, writ denied); Allen v. Allen, 751 S.W.2d 567, 574-75 (Tex.App.—Houston [14th Dist.] 1988, writ denied). The United States Court of Appeals for the Fifth Circuit has also adopted this view of Texas law. See, e.g., Heller Fin., Inc. v. Grammco Computer Sales, Inc., 71 F.3d 518, 527-28 (5th Cir.1996); but see Olney Sav. & Loan Ass’n v. Trinity Banc Sav. Ass’n, 885 F.2d 266, 276 (5th Cir.1989). Other Texas appellate decisions, however, have rejected the application of DeLanney and Reed to preclude the recovery of tort damages for fraudulent inducement claims. American Nat’l Ins. Co. v. International Bus. Mach. Corp., 933 S.W.2d 685, 687 (Tex.App.—San Antonio 1996, writ denied); Beneficial Personnel Servs. v. Rey, 927 S.W.2d 157, 167-68 (Tex.App.—El Paso 1996), vacated pursuant to settlement without reference to the merits, 938 S.W.2d 717 (Tex.1997); Peco Constr. Co. v. Guajardo, 919 S.W.2d 736, 738-39 (Tex.App.—San Antonio 1996, writ denied); Prudential Ins. Co. v. Jefferson Assocs., Ltd., 839 S.W.2d 866, 875-76 (Tex.App.—Austin 1992), rev’d on other grounds, 896 S.W.2d 156 (Tex.1995); Schindler v. Austwell Farmers Coop., 829 S.W.2d 283, 286, 289-91 (Tex.App.—Corpus Christi), affd as modified on other grounds, 841 S.W.2d 853 (Tex.1992); Matthews v. AmWest Sav. Ass’n, 825 S.W.2d 552, 554 (Tex.App.-Beaumont 1992, writ denied).
We too reject the application of DeLanney to preclude tort damages in fraud cases. Texas law has long imposed a duty to abstain from inducing another to enter into a contract through the use of fraudulent misrepresentations. As a rule, a party is not bound by a contract procured by fraud. E.g., Prudential Ins. Co. v. Jefferson Assocs., Ltd., 896 S.W.2d 156, 162 (Tex.1995); Weitzel v. Barnes, 691 S.W.2d 598, 601 (Tex.1985); Town North Nat’l Bank v. Broaddus, 569 S.W.2d 489, 491 (Tex.1978); Dallas Farm Mach. Co. v. Reaves, 158 Tex. 1, 307 S.W.2d 233, 239 (1957). Moreover, it is well established that the legal duty not to fraudulently procure a contract is separate and independent from the duties established by the contract itself. See Dallas Farm Mach., 307 S.W.2d at 239 (“‘[T]helaw long ago abandoned the position that a contract must be held sacred regardless of the fraud of one of the parties in procuring it.’ ”) (quoting Bates v. Southgate, 308 Mass. 170, 31 N.E.2d 551, 558 (1941)).
This Court has also repeatedly recognized that a fraud claim can be based on a promise made with no intention of performing, irrespective of whether the promise is later subsumed within a contract. For example, in Crim Truck & Tractor Co. v. Navistar Int'l Transp. Corp., 823 S.W.2d 591, 597 (Tex.1992), we noted: “As a general rule, the failure to perform the terms of a contract is a breach of contract, not a tort. However, when one party enters into a contract with no intention of performing, that misrepresentation may give rise to an -action in fraud.” Similarly, in Spoljaric v. Percival Tours, Inc., 708 S.W.2d 432, 434 (Tex.1986), we held that a fraud claim could be maintained, under the particular facts of that case, for the breach of an oral agreement to pay a bonus because a “promise to do an act in the future is actionable fraud when made with the intention, design and purpose of deceiving, and with no intention of performing the act.” Accord T.O. Stanley Boot Co. v. Bank of El Paso, 847 S.W.2d 218, 222 (Tex.1992); Stanfield v. O’Boyle, 462 S.W.2d 270, 272 (Tex.1971).
Our prior decisions also clearly establish that tort damages are not precluded simply because a fraudulent representation causes only an economic loss. Almost 150 years ago, this Court held in Graham v. Roder, 5 Tex. 141, 149 (1849), that tort damages were recoverable based on the plaintiff’s claim that he was fraudulently induced to exchange a promissory note for a tract of land. Although the damages sustained by the plaintiff were purely economic, we held that tort damages, including exemplary damages, were recoverable. Since Graham, this Court has continued to recognize the propriety of fraud claims sounding in tort despite the fact that the aggrieved party’s losses were only economic losses. See, e.g., Spoljaric, 708 S.W.2d at 436; International Bankers Life Ins. Co. v. Holloway, 368 S.W.2d 567, 583 (Tex.1963); cf. Tex.Civ.PRAc. & Rem.Code § 41.003(a)(1) (expressly authorizing exemplary damages for fraud without making any exception based on the type of loss sustained by the injured party). Moreover, we have held in a similar context that tort damages were not precluded for a tortious interference with contract claim, notwithstanding the fact that the damages for the tort claim compensated for the same economic losses that were recoverable under a breach of contract claim. American Nat’l Petroleum Co. v. Transcontinental Gas Pipe Line Corp., 798 S.W.2d 274, 278 (Tex.1990).
Accordingly, tort damages are recoverable for a fraudulent inducement claim irrespective of whether the fraudulent representations are later subsumed in a contract or whether the plaintiff only suffers an economic loss related to the subject matter of the contract. Allowing the recovery of fraud damages sounding in tort only when a plaintiff suffers an injury that is distinct from the economic losses recoverable under a breach of contract claim is inconsistent with this well-established law, and also ignores the fact that an independent legal duty, separate from the existence of the contract itself, precludes the use of fraud to induce a binding agreement. We therefore disapprove of the following appellate court opinions to the extent that they hold that tort damages cannot be recovered for a fraudulent inducement claim absent an injury that is distinct from any permissible contractual damages: Grace Petroleum Corp. v. Williamson, 906 S.W.2d 66, 68-69 (Tex.App.-Tyler 1995, no writ); Parker v. Parker, 897 S.W.2d 918, 924 (Tex.App.—Fort Worth 1995, writ denied); Barbouti v. Munden, 866 S.W.2d 288, 293-94 (Tex.App.—Houston [14th Dist.] 1993, writ denied); River Consulting, Inc. v. Sullivan, 848 S.W.2d 165,170 (Tex.App.-Houston [1st Dist.] 1992, writ denied); C & C Partners v. Sun Exploration & Prod. Co., 783 S.W.2d 707, 719-20 (Tex.App.—Dallas 1989, writ denied); Hebisen v. Nassau Dev. Co., 754 S.W.2d 345, 348 (Tex.App.-Houston [14th Dist.] 1988, writ denied); Allen v. Allen, 751 S.W.2d 567, 574-75 (Tex.App.-Houston [14th Dist.] 1988, writ denied). We instead conclude that, if a plaintiff presents legally sufficient evidence on each of the elements of a fraudulent inducement claim, any damages suffered as a result of the fraud sound in tort.
We thus conclude that Presidio has a viable fraud claim that it can assert against Formosa. However, this conclusion does not end our inquiry. We must also determine whether legally sufficient evidence supports the jury’s fraud and damage findings.
Ill
A fraud cause of action requires “a material misrepresentation, which was false, and which was either known to be false when made or was asserted without knowledge of its truth, which was intended to be acted upon, which was relied upon, and which caused injury.” Sears, Roebuck & Co. v. Meadows, 877 S.W.2d 281, 282 (Tex.1994); DeSantis v. Wackenhut Corp., 793 S.W.2d 670, 688 (Tex.1990), cert. denied, 498 U.S. 1048, 111 S.Ct. 765, 112 L.Ed.2d 775 (1991); see also Stone v. Lawyers Title Ins. Corp., 554 S.W.2d 183, 185 (Tex.1977). A promise of future performance constitutes an actionable misrepresentation if the promise was made with no intention of performing at the time it was made. Schindler v. Austwell Farmers Coop., 841 S.W.2d 858, 854 (Tex.1992). However, the mere failure to perform a contract is not evidence of fraud. See id. Rather, Presidio had to present evidence that Formosa made representations with the intent to deceive and with no intention of performing as represented. See Spoljaric, 708 S.W.2d at 434; Stanfield, 462 S.W.2d at 272; see also T.O. Stanley Boot Co., 847 S.W.2d at 222; Crim Truck & Tractor, 823 S.W.2d at 597. Moreover, the evidence presented must be relevant to Formosa’s intent at the time the representation was made. Spoljaric, 708 S.W.2d at 434.
Presidio alleges that Formosa made three representations- that it never intended to keep in order to induce Presidio to enter into the contract. First, the bid package and contract represented that Presidio would “arrange the delivery schedule of [Formosa]supplied material and be responsible for the delivery ... of all materials (this includes material supplied by [Formosa]).” Second, the bid package and the contract provided the job was scheduled to begin on July 16, 1990, and be completed on October 15, 1990, 90 days later. Third, paragraph 17 of the contract represented that Formosa would be responsible for the payment of any delay damages within its control.
The jury agreed with Presidio and found that Formosa committed fraud. In our review of this finding, all of the record evidence must be considered in a light most favorable to the party in whose favor the verdict has been rendered, and every reasonable inference deducible from the evidence is to be indulged in that party’s favor. Harbin v. Seale, 461 S.W.2d 591, 592 (Tex.1970). Anything more than a scintilla of evidence is legally sufficient to support the finding. See Continental Coffee Prods. Co. v. Cazarez, 937 S.W.2d 444, 450 (Tex.1996); Browning-Ferris, Inc. v. Reyna, 865 S.W.2d 925, 928 (Tex.1993).
We conclude that Presidio presented legally sufficient evidence that Formosa made representations with no intention of performing as represented in order to induce Presidio to enter into this contract at a low bid price. In the bid package and the contract, Formosa represented that Presidio would have control of the delivery of the concrete necessary for the project. While Formosa argues that other more general provisions contained in the contract refute this representation, the contract and the bid package specifically and unequivocally provide that Presidio would “arrange the delivery schedule of [Formosa]-supplied material and be responsible for the delivery ... of all materials.” Further, even Formosa’s own witnesses admitted that, under the plain language of the contract, Presidio had control over the scheduling and delivery of concrete. Accordingly, there is clearly sufficient evidence that this representation was in fact made by Formosa.
In contravention of this representation, Formosa decided, two weeks before the contract was signed, to take over the delivery of the concrete without informing Presidio. Jack Lin, Formosa’s civil department director, testified that Formosa, in an effort to save money, decided to take over the concrete delivery and set up its own delivery schedule. However, Presidio was not informed of this change until after the contract was signed. Lin admitted' that Formosa acted deceptively by taking over the concrete delivery and scheduling when the bid package expressly provided that the contractor would have control. He further admitted that Formosa knew that Presidio would rely on this representation in preparing its bid.
Presidio’s president, Bob Burnette, testified that Presidio did in fact rely on this representation in preparing its bid. Bur-nette further testified that every concrete pour was delayed one-to-two days while Pre-sidio waited for Formosa to obtain the requested concrete. Because Burnette did not calculate such delays into his bid, the actual cost of the project exceeded the contract price.
This testimony provides more than a scintilla of evidence supporting Presidio’s contention that Formosa intentionally made representations that it never intended to keep in order to induce Presidio to enter into the contract at a low bid price and that Presidio relied on these misrepresentations to its detriment. Thus, legally sufficient evidence supports the jury’s fraud finding. We need not consider whether any other representations Formosa allegedly made were fraudulent.
Formosa contends, however, that the award of $700,000 in fraud damages to Presi-dio is excessive as a matter of law. Presidio counters that the damage award is supported by Burnette’s testimony that, if he had been told the truth about the project, he “would have bid in the neighborhood of $1,300,000” to perform the contract, and that that amount was a reasonable and necessary cost for doing the work. Presidio maintains that, by subtracting the amount they were paid on the contract, $600,000, from the $1,300,000 reasonable and necessary cost for doing the work, there is legally sufficient evidence to support the damage award of $700,000. But Formosa objected at trial to this testimony on the basis that it was both speculative and an improper measure of damages. Formosa argued again in its motion for new trial that the damages awarded were excessive because Burnette’s testimony was speculative and based on an improper measure of damages. Formosa re-urges these complaints to this Court.
Texas recognizes two measures of direct damages for common-law fraud: the out-of-pocket measure and the benefit-of-the-bargain measure. Arthur Andersen & Co. v. Perry Equip. Corp., 945 S.W.2d 812, 817 (Tex.1997); W.O. Bankston Nissan, Inc. v. Walters, 754 S.W.2d 127, 128 (Tex.1988); Leyendecker & Assocs., Inc. v. Wechter, 683 S.W.2d 369, 373 (Tex.1984). The out-of-pocket measure computes the difference between the value paid and the value received, while the benefit-of-the-bargain measure computes the difference between the value as represented and the value received. Arthur Andersen, 945 S.W.2d at 817; Leyendecker, 683 S.W.2d at 373.
The out-of-pocket measure allows the injured party “to recover the actual injury suffered measured by ‘the difference between the value of that which he has parted with, and the value of that which he has received.’ ” Leyendecker, 683 S.W.2d at 373 (quoting George v. Hesse, 100 Tex. 44, 93 S.W. 107 (1906) (emphasis added)); see also Morriss-Buick Co. v. Pondrom, 131 Tex. 98, 113 S.W.2d 889, 890 (1938) (because out-of-pocket fraud damages are intended to provide actual compensation for the injury rather than profit, the proper measure of damages is the difference between the value of what was parted with and what was received). Burnette’s testimony regarding what he would have bid if he had known the truth is not the proper measure of out-of-pocket damages. Burnette computed his $1.3 million bid by taking the total amount Presidio spent on the labor, materials, supplies, and equipment used on the job, $831,-000, divided by the original expected cost of the job, $370,000, multiplied by his actual bid of $600,000. He also performed an alternative calculation that reached a similar result by dividing the 264 days the job actually took by the 134 days the job should have taken multiplied by his actual bid of $600,-000. Basically, both of these methods multiplied the actual bid price of $600,000, which included a profit margin on the job, by a ratio comparing what actually occurred to what was anticipated. Thus, both of these calculations incorporated expected lost profits on a bargain that was never made. But the out-of-pocket measure only compensates for actual injuries a party sustains through parting with something, not loss of profits on a bid not made, and a profit never realized, in a hypothetical bargain never struck. Thus, the $1.3 million hypothetical bid less the $600,000 actually received is not probative of Presidio’s out-of-pócket loss. The proper out-of-pocket calculation of damages, based on Burnette’s testimony, was $831,000 less the amount he actually received, $600,-000, for damages of $231,000.
Burnette’s testimony regarding the $1.3 million hypothetical bid is also not probative evidence of benefit-of-the-bargain damages. Under the benefit-of-the bargain measure, lost profits on the bargain may be recovered if such damages are proved with reasonable certainty. See Restatement (Second) of ToRTS § 549(2) (1977) (“The recipient of a fraudulent misrepresentation in a business transaction is also entitled to recover additional damages sufficient to give him the benefit of his contract with the maker, if these damages are proved with reasonable certainty.”). But, while a benefit-of-the-bargain measure can include lost profits, it only compensates for the profits that would have been made if the bargain had been performed as promised. Accordingly, the proper calculation of benefit-of-the-bargain damages is Presidio’s anticipated profit on the $600,000 bid plus the actual cost of the job less the amount actually paid by Formosa. Based on Burnette’s testimony, Presidio’s benefit-of-the-bargain damages are not $700,-000, but rather $461,000 (bid price of $600,-000 less original expected cost of $370,000 for profit of $230,000, plus $831,000 actual cost less $600,000 actually paid).
Burnette calculated his hypothetical $1.3 million bid by multiplying his $600,000 bid, including his anticipated profit, by a factor of about 2.2. However, this doubling of Presidio’s bid is entirely speculative because there is no evidence that Presidio would have been awarded the project if it had made a $1.3 million bid. In fact, if any inference could be drawn, it would lead to the opposite conclusion because two of the three other bids Formosa received were lower than $1.3 million. Burnette’s testimony as to what he would have bid had he known the truth simply does not establish the benefit of any bargain made with Formosa. It is not based on the expenses incurred and profits lost on this contract because of Formosa’s representations, but rather is based on an entirely hypothetical, speculative bargain that was never struck and would not have been consummated. This testimony is therefore not legally sufficient evidence supporting an award of $700,000 in damages.
We accordingly hold that there is no probative evidence supporting the entire amount of damages awarded by the judgment. There is, however, clearly legally sufficient evidence that Presidio suffered some damages as a result of Formosa’s fraud; in fact, Burnette’s testimony, while it does not support a damage award of $700,000, does support an out-of-pocket damage award of $231,-000 or a benefit-of-the-bargain damage award of $461,000. But, because the issue of damages was contested by Formosa, we cannot render judgment in favor of Presidio for a lesser dollar amount. Instead, because there is no legally sufficient evidence to support the entire amount of damages, but there is some evidence of the correct measure of damages, we reverse the judgment of the court of appeals and remand the cause for a new trial. See Texarkana Mem’l Hosp. v. Murdock, 946 S.W.2d 836, 841 (Tex.1997).
In conjunction with its motion for rehearing, Presidio has also filed a motion for voluntary remittitur, offering to remit $239,-000 plus interest to comport with our determination that its evidence could support a benefit-of-the-bargain damage award of $461,000. We conclude that we cannot grant Presidio this relief.
Texas Rule of Appellate Procedure 46 delineates two means by which remittitur may be effectuated on appeal. First, the court of appeals may suggest a remittitur in lieu of ordering a new trial. Tex.R.App.P. 46.3. Second, a party may voluntarily remit if a court of appeals reverses the trial court’s judgment because of a legal error that affects only part of the damages awarded by the judgment. Tex.R.App.P. 46.5. The Texas Rules of Appellate Procedure do not expressly authorize a party to remit to this Court, although the Court has accepted re-mittitur in the past, prior to the adoption of the rules. See Redman Homes, Inc. v. Ivy, 920 S.W.2d 664, 669 (Tex.1996) (listing cases).
We were faced with an almost identical offer of voluntary remittitur in Redman Homes, Inc. v. Ivy, 920 S.W.2d 664 (Tex.1996). In that case, Mr. Ivy presented testimony regarding the damages he suffered as a result of a fire that destroyed his mobile home and his personal items in the home. Id. at 668. His testimony included inadmissible statements regarding the cost of his mobile home that were offered to establish its market value at the time of loss. Id. Recognizing that his statements were not probative of the market value of the home, the Ivys attempted to remit the difference between the jury’s verdict and the legally sufficient evidence he presented regarding the damages to the personal items in his home. Id. at 669. However, this Court rejected the Ivys’ offer of remittitur. We concluded that, because we are limited to considering questions of law, we could only consider a remitti-tur under such circumstances if the damages to the personal property had been established as a matter of law. Id.
Similarly, in this case, Burnette presented the only testimony on Presidio’s behalf regarding the damages suffered as a result of Formosa’s fraud. We have concluded that parts of his testimony were not probative of the damages awarded by the jury. Presidio has attempted to remit the difference between the jury’s verdict and the legally sufficient evidence it presented regarding damages. However, under our precedent in Redman Homes, we cannot even consider such an offer unless Presidio established as a matter of law that it suffered $461,000 in damages. But Presidio does not make any claim that it proved $461,000 in damages as a matter of law, nor could it do so under the record in this ease. Formosa clearly contested the amount of damages at both the trial and appellate level. Accordingly, because Presidio’s motion for voluntary remitti-tur does not present us with a question of law, it must be overruled.
IV
We finally consider Formosa’s argument that the submission of the good faith and fair dealing question was erroneous. The trial court submitted a jury charge question on whether Formosa failed “to comply with its duty of good faith and fair dealing to Presi-dio, if any.” The jury found that Formosa had failed to comply with this duty and awarded Presidio damages of $1.5 million.
Formosa contends that the submission of this question was erroneous. We agree. There is no general duty of good faith and fair dealing in ordinary, arms-length commercial transactions. See English v. Fischer, 660 S.W.2d 521, 522 (Tex.1983); Electro Assocs., Inc. v. Harrop Constr. Co., 908 S.W.2d 21, 22-23 (Tex.App.-Houston [1st Dist.] 1995, writ denied); Adolph Coors Co. v. Rodriguez, 780 S.W.2d 477, 481 (Tex.App.-Corpus Christi 1989, writ denied). We find no basis for the submission of a good faith and fair dealing question to the jury in this case. Accordingly, the jury’s affirmative answer to this question cannot support the judgment. On remand, this question should not be submitted.
‡ ‡ ‡ ‡ ‡ ‡
In conclusion, we hold that, when a party fraudulently procures a contract by making a promise without any intent of keeping the promise in order to induce another into executing the contract, a tort cause of action for that fraud exists. Accordingly, Presidio has a viable fraud claim against Formosa even though it only seeks damages for economic losses related to the subject matter and performance of the contract between the parties. We cannot affirm the court of appeals’ judgment, however, because there is no evidence to support the entire damage award. We therefore reverse the judgment of the court of appeals and remand this ease for a new trial.
BAKER, J., filed a dissenting opinion in which SPECTOR, J., joins.
BAKER, Justice,
joined by SPECTOR, Justice, dissenting.
Because the Court conducts an improper factual sufficiency review of the evidence supporting Presidio’s actual damages for Formosa’s fraud, I dissent.
I. LOST PROFITS
A. No Evidence Review
As the Court holds, the victim of common law fraud in the inducement can recover benefit-of-the bargain damages. This measure of damages allows recovery for lost profits. In reviewing damage awards for lost profits, this Court must conduct only a traditional no evidence review. See Texas Instruments, Inc. v. Teletron Energy Management, 877 S.W.2d 276, 281 (Tex.1994) (holding that there was no evidence to prove reasonable certainty of lost profits); Holt Atherton Indus. v. Heine, 835 S.W.2d 80, 84 (Tex.1992) (holding that the evidence was legally insufficient to prove lost profits); Southwest Battery Corp. v. Owen, 131 Tex. 423, 115 S.W.2d 1097, 1099 (1938) (court determined that it could not decide, as a matter of law, that facts required judgment against plaintiffs lost profits claim).
We cannot weigh the factual sufficiency of the evidence supporting the jury’s verdict. See Havner v. E-Z Mart Stores, Inc., 825 S.W.2d 456, 458 (Tex.1992). It is only when reasonable minds cannot differ that evidence lacks probative force that it is “no evidence.” See Kindred v. Con/Chem, Inc., 650 S.W.2d 61, 63 (Tex.1983). Like all cases where this Court considers the legal sufficiency of the evidence, we must consider only the evidence and inferences that tend to support the lost profits finding, and disregard all evidence and inferences to the contrary. Holt Atherton, 835 S.W.2d at 84.
B. The NatuRE of Lost Profits Evidence
Recovery of lost profits is allowed where a business relationship is established on the strength of a contract but is adversely effected by a contracting party’s misconduct under the contract. See Pace Corp. v. Jackson, 155 Tex. 179, 284 S.W.2d 340, 348 (1955). We have held that “recovery for lost profits does not require that the loss be susceptible of exact calculation.” Holt Atherton, 835 S.W.2d at 84. In fact, “[i]n their nature, profits are more or less conjectural or speculative.” Pace Corp., 284 S.W.2d at 348. Nevertheless, a party must prove lost profits by some competent evidence with “reasonable certainty.” Holt Atherton, 835 S.W.2d at 84; Southwest Battery, 115 S.W.2d at 1098. To withstand no evidence review, “[a]t a minimum, opinions or estimates of lost profits must be based on objective facts, figures, or data ... [and] [r]ecovery of lost profits must be predicated on one complete calculation.” See Szczepanik v. First S. Trust Co., 883 S.W.2d 648, 649 (Tex.1994).
Before today, this Court had held that “[i]t is impossible to announce with exact certainty any rule measuring” a party’s lost profits. Southwest Battery, 115 S.W.2d at 1099. In fact, until today, this Court hastened to “sanction any one method for determining lost profits.” Holt Atherton, 835 S.W.2d at 85. Nevertheless, today the Court conducts an improper factual sufficiency review of Presidio’s lost profits evidence by weighing Presidio’s testimony against what the Court calls “the proper calculation” of lost profits. 960 S.W.2d at 50 (emphasis added). I would affirm the jury’s verdict because Presidio presented some evidence, by providing an objective and complete calculation, to support its loss with reasonable certainty. Holt Atherton, 835 S.W.2d at 84-85.
II. PRESIDIO’S LOST PROFITS EVIDENCE
A.Peesidio’s Witness
Bob Burnette has been Presidio’s president since its formation in 1984. Burnette has a bachelors degree and a masters degree in civil engineering. He is a licensed professional engineer in California and in Texas. Burnette has negotiated contracts for Presi-dio since 1984. The contracts have ranged from a quarter million dollars to two million dollars. Before bidding jobs for Presidio he participated in other large contract bids including one for a pipeline in Iran for over $100 million.
Burnette prepared Presidio’s bid package, in reliance on Formosa’s representations about the job, and negotiated the contract with Formosa’s representatives. During the project, Burnette dealt with Formosa about the contract’s terms and handled contract disputes for Presidio. At trial, Burnette testified as an expert.
B.Presidio’s Evidence
Based on his expertise and personal knowledge, Burnette testified about how he calculated Presidio’s lost profits caused by Formosa’s fraud. Specifically, Burnette testified that had Formosa truthfully represented the project’s details, Presidio would have bid about $1.3 million. Burnette calculated the $1.3 million bid by comparing his original estimated cost to Presidio’s actual cost to obtain a ratio, and then multiplying by the original bid. After deducting what Formosa paid Presidio, this results in a figure of $700,-000, which includes lost profits. The percentage of lost profits in the $1.3 million bid is identical to the percentage of estimated profit in the original bid that Formosa fraudulently induced. In other words, Burnette’s calculation multiplied Presidio’s actual bid, which included a specific profit margin, by a ratio comparing what it took to complete the job because of Formosa’s fraudulent scheme to what Presidio relied upon under the contract.
C.Application of Law to The Evidence
Of course, Burnette’s opinions are “hypothetical” and somewhat “speculative” — he didn’t expect Formosa to commit fraud when he bid the job and won the contract for Presidio. Moreover, as we have recognized, by their nature, lost profits are “more or less conjectural or speculative.” Pace Corp., 284 S.W.2d at 348. Indeed, just over three years ago, this Court reaffirmed the rule that the “reasonable certainty” requirement for proof of lost profits “is intended to be flexible enough to accommodate the myriad circumstances in which claims of lost profits arise.” Texas Instruments, 877 S.W.2d at 279.
Here, Burnette’s “hypothetical” calculation or “speculation”, as the Court calls it, was not “remote” or based on the “mere hope of success” or some “untried enterprise.” Texas Instruments, 877 S.W.2d at 279-80. Instead, Burnette based Ms calculation on Pre-sidio’s contract with Formosa, the contract’s built in profit margin, and Presidio’s actual cost to complete the contract given Formosa’s fraudulent conduct. Burnette’s calculation was objective and complete. See Szczepanik, 883 S.W.2d at 649. Presidio presented at least the “minimum” evidence to establish lost profits with reasonable certainty. See Szczepanik, 883 S.W.2d at 649. Accordingly, there is legally sufficient evidence to support the judgment for Presidio. The Court can only find otherwise by conducting a Constitutionally proMbited factual sufficiency review of Presidio’s evidence.
III. CONCLUSION
To hold as the Court does today, allows Formosa, a proven fraud feasor, to escape liability simply because Presidio cannot “prove a perfect measure of damages.” See Southwest Battery, 115 S.W.2d at 1099. Besides improperly weighing in on the facts and crunching the numbers to determine the “proper calculation” of damages, the Court also ignores its rule against sanctioning any one method for determining lost profits. See Holt Atherton, 835 S.W.2d at 85. An injured party, like Presidio, “must not be deprived of [its] remedy because of the difficulties lying in the way of proving [loss profits].” Pace Corp., 284 S.W.2d at 348.
Because Presidio provided some evidence, based on an objective and complete calculation with reasonable certainty, I would affirm the court of appeals’ judgment for Presidio.
BAKER, Justice,
joined by SPECTOR, Justice, dissenting to Order Overruling Motions for Rehearing and Voluntary Remittitur.
Today the Court overrules Presidio’s motions for rehearing and voluntary remittitur. I respectfully dissent to the Court’s order. Studying the Court’s opinion again after it issued, I write to . say some things I wish I had said in my original dissent. I also write to discuss the merits of Presidio’s motions, wMch the Court overrules without comment.
I believe that the Court’s entire discussion of the damages and the conclusions the Court reaches are fundamentally flawed. First, the Court calculates Presidio’s damages based on the contract Presidio and Formosa actually made, rather than the contract they would have made but for Formosa’s fraudulent inducement. Second, although the Court recognizes that the correct criteria for measuring damages in a fraudulent inducement case is ‘Value,” the Court calculates the damages it concludes are available to Presidio based only on “costs.”
Fraud in the Inducement versus Breach of Contract
In tMs case the Court holds that a party may recover tort damages for fraudulent inducement irrespective of whether the fraudulent representations are later subsumed in a contract or whether the party oMy suffers an economic loss related to the contract’s subject matter. To allow recovery of tort fraud damages oMy when a plaintiff suffers an injury distinct from the economic losses recoverable under a breach of contract claim is inconsistent with tMs well established law. To so limit the recovery ignores the fact that an independent legal duty, separate from the contract’s existence, precludes the use of fraud to induce a binding agreement. 960 S.W.2d at 47.
The Court acknowledges that Texas recognizes two measures of direct damages for common-law fraud: (1) the out-of-pocket measure and the (2) benefit-of-the-bargain measure. See Arthur Andersen & Co. v. Perry Equip. Corp., 945 S.W.2d 812, 817 (Tex.1997); W.O. Bankston Nissan, Inc. v. Walters, 754 S.W.2d 127, 128 (Tex.1988). The Court recognizes that the out-of-pocket measure is the difference between the value paid and the value received while the benefit of the bargain measure is the difference between the value as represented and the value received. See Arthur Andersen, 945 S.W.2d at 817; Leyendecker & Assocs., Inc. v. Wechter, 683 S.W.2d 369, 373 (Tex.1984). The Court states that the out-of-pocket measure allows the injured party to recover the actual injury suffered measured by the difference between the value of that with which he has parted with, and the value of that which he received. See Arthur Andersen, 945 S.W.2d at 817. The Court also concludes that while the benefit-of-the-bargain measure can include lost profits, it only compensates for the profits that would have been made if the bargain had been performed as promised.
Despite recognizing that fraudulent- inducement to enter a contract is a breach of an independent legal duty separate from the contract itself, the Court calculates both measures of damages based on Presidio’s damages as if the contract made had been performed as promised.
Costs v. Value
Presidio’s argument in its motion for rehearing is that the Court improperly computed damages based upon costs rather than value. See Leyendecker, 683 S.W.2d at 373. Presidio contends that the way the Court calculated damages, Formosa does not have to pay the full ‘Value” of what Presidio furnished Formosa. Instead, Presidio asserts Formosa will receive what Presidio furnished at “cost.” Presidio contends that Presidio will not be paid the full value of what it. gave, and thus will not be made whole.
Formosa responds that Presidio’s theory is wrong because it measures the damages after the contract is complete by striking a completely new bargain. Formosa argues that the proper measure of damages is computed as of the time of the sale, or as in this ease at the point of contract. See Leyendecker, 683 S.W.2d at 372. Formosa contends that the policy underlying fraud law is to redress actual losses. See Morriss-Buick Co. v. Pondrom, 131 Tex. 98, 113 S.W.2d 889, 890 (1938).
It is true that damages in a fraudulent inducement case are computed as of the time of the fraud. In this case, at the point of contract. However, Formosa essentially adopts the Court’s rationale; therefore, Formosa’s arguments suffer from the same fundamental flaws as those of the Court. That is, the damage calculation should be based upon the contract actually made, rather than the contract the parties would have made but for Formosa’s fraudulent inducements.
Here, Presidio was entitled to show and did show the value of its loss based upon what actually happened because of Formosa’s fraudulent inducements when the parties made the contract. Taking the known facts when Presidio completed the project, and applying Presidio’s regular calculations of costs plus profit margin as of the time the parties negotiated the fraudulently induced contract, produces a damages result based upon objective facts, figures or data, and predicated on one complete calculation. See Szczepanik v. First S. Trust Co., 883 S.W.2d 648, 649 (Tex.1994).
The Court’s new writing reinforces my view, as expressed in my original dissent, that the Court has engaged in an improper factual sufficiency review. Despite its protestations, the Court weighs the evidence, which it cannot do. See Havner v. E-Z Mart Stores, Inc., 825 S.W.2d 456, 458 (Tex.1992). The Court asserts that Presidio’s damage evidence was entirely speculative because there is no evidence that Presidio would have been awarded the project if it had made a 1.3 million dollar bid. The Court then states that the evidence indicates that Presidio would not have been awarded the project because two of the three other bids Formosa received were lower than 1.3 million. The Court concludes that Presidio’s evidence is not based on expenses incurred and profits lost on this contract because of Formosa’s representations, but rather is based upon an entirely hypothetical, speculative bargain that was never struck and would never have been consummated. If this is not weighing the evidence, I do not know what is.
VOLUNTARY REMITTITUR
Alternatively, Presidio asserts that it is entitled to a remittitur of the damages the Court found excessive. Because the Court did not affirm the court of appeal’s judgment, Presidio offers a voluntary remittitur of the amount of the actual fraud damages the Court found to be excessive. Presidio requests the court of appeals judgment be reformed and affirmed as reformed. Alternatively, Presidio requests the judgment be reformed and remanded to the court of appeals. Presidio argues that the Court, for many years, has accepted voluntary remitti-turs from plaintiffs. See Redman Homes, Inc. v. Ivy, 920 S.W.2d 664, 669 (Tex.1996).
Formosa responds that the Court should not grant Presidio a voluntaiy remittitur because that relief from error in awarding damages unsupported by legally sufficient evidence is unavailable through' the office of voluntary remittitur. Formosa relies on Redman Homes in support of its argument.
In Redman Homes, a unanimous Court recognized that the Court has accepted re-mittiturs from plaintiffs in the past. See Redman Homes, 920 S.W.2d at 669. In Red-man Homes, the Court also said that our decisions involving voluntary remittiturs are limited by the rule that this Court can consider only questions of law. The Court observed that the plaintiffs offer in Redman Homes presumed that the Court could conclusively ascertain from the record the amount of damages untainted by what the Ivys conceded was inadmissible testimony about market value. In Redman Homes the Court concluded it was unable to ascertain the damages untainted by inadmissible testimony. Redman Homes, 920 S.W.2d at 669. I submit that such is not the case here. First, in its response to Presidio’s request for voluntary remittitur, Formosa neglects to state, but Presidio points out that in Formosa’s application for writ of error to this Court, Formosa asserted: “Presidio’s actual damages are excessive as a matter of law to the extent they exceed $467,000. The minimum relief to which Formosa is entitled for that error is excision of the excess and rendition of judgment for only $467,000. Larson v. Cactus Util. Co., 730 S.W.2d 640 (Tex.1987).” In my view, asserting to this Court that the actual damages are excessive as a matter of law to the extent that they exceed $467,000 is an express concession that Presi-dio’s actual damages are proven as a matter of law in the amount of $467,000.
Be that as it may, the facts here are distinguishable from those in Redman Homes. Here, the Court could and did conclusively ascertain from the record the damages untainted by inadmissible testimony. The substance of the Court’s damages finding in this case is that Presidio’s evidence about profits it might have earned is inadmissible testimony because it is hypothetical and speculative. The Court held that Presidio’s damages testimony does support an out-of-pocket damage award of $231,000 or a benefit-of-the-bargain damage award of $461,000. What the Court concludes amounts to a conclusive finding of damages under either measure that the court holds is permissible for a fraud in the inducement claim. However, the Gourt declines to render judgment for Presidio for a lesser dollar amount because Formosa contests the damages issue.
Based upon the Court’s finding of specific damages under either measure of damages that applies in a fraudulent inducement ease, my question is what is there left to be tried? It seems to me that the Court has conclusively ascertained the damages untainted by what it holds is the inadmissible testimony and that Presidio’s offer of a voluntary remittance is entirely in order. See Redman Homes, 920 S.W.2d at 669; see also Larson, 730 S.W.2d at 641; Texas Employers’ Ins. Ass’n v. White, 129 Tex. 659, 107 S.W.2d 360, 361 (1937); Baldwin v. Haskell Nat’l Bank, 104 Tex. 122, 134 S.W. 1178 (1911).
Conclusion
Based on my original dissent, I still believe that the Court erred in how it disposes of the damages issue. The Court should have affirmed the court of appeals’ judgment for Presidio. However, based upon the Court’s holding and Presidio’s motion for voluntary remittitur, Presidio is at least entitled to have the Court grant that remittitur. The Court should modify the court of appeals’ judgment to that extent and otherwise affirm the court of appeals’ judgment.
. When properly pleaded and proved, consequential damages that are foreseeable and directly traceable to the fraud and result from it might be recoverable. Arthur Andersen, 945 S.W.2d at 817. It is possible that, in the proper case, consequential damages could include foreseeable profits from other business opportunities lost as a result of the fraudulent misrepresentation. Presidio makes no argument in this case that the $700,000 damage award is supported by legally sufficient evidence of any consequential damages it suffered as a result of Formosa’s fraud.
. The supplemental dissenting opinion issued today urges that out-of-pocket damages include the expected loss profits on a bargain never made without explaining how Presidio "parted with” such non-existent, hypothetical profits. 960 S.W.2d at 55.
. Remarkably, the supplemental dissenting opinion repeats the charge that the Court has engaged in an improper factual sufficiency review, despite the fact that Presidio never made such a complaint in its motion for rehearing. In fact, in its motion for rehearing, rather than contending that we had conducted a factual sufficiency review, Presidio actually admitted that the Court properly calculated benefit-of-the-bargain damages. Contrary to the dissent’s rhetoric, we are simply not conducting a factual sufficiency review, but instead are concluding that there is no legally sufficient evidence supporting the entire damage award because, based on Burnette’s own testimony, the damage award is speculative and based on an improper legal measure of damages. This Court has repeatedly recognized that determining whether lost profits have been proved with reasonable certainty is a fact-intensive determination dependent upon the circumstances of a particular case. Texas Instruments, Inc. v. Teletron Energy Management, Inc., 877 S.W.2d 276, 279 (Tex.1994); Holt Atherton Indus., Inc. v. Heine, 835 S.W.2d 80, 84 (Tex.1992); Whiteside v. Trentman, 141 Tex. 46, 170 S.W.2d 195, 197 (1943). When a review of the surrounding circumstances establishes that the profits are not reasonably certain, there is no evidence to support the lost profits award. See Texas Instruments, 877 S.W.2d at 279-81 (reviewing the circumstances to determine that lost profits had not been established with reasonable certainty). In this case, we are merely considering all of Bur-nette’s testimony, while indulging all reasonable inferences in Presidio’s favor, to conclude that it does not constitute legally sufficient evidence of $700,000 in actual damages because it is speculative and based on an improper measure of damages.
Moreover, we are not retreating from our refusal to endorse one method for determining lost profits. See, e.g., Holt Atherton, 835 S.W.2d at 85. Instead, we merely conclude that this particular method, testifying what the bid "would have been,” is an improper method and constitutes no legally sufficient evidence of the damages awarded. This conclusion is logically consistent with our holding in Holt Atherton that the plaintiffs’ testimony as to what two bulldozers working half of the time earned was legally insufficient evidence of what one bulldozer working full time could earn. See id.
. The Court observes that if Presidio would have bid based on Burnette’s calculation, Presidio might not have won the contract in the first place. 960 S.W.2d 49. Maybe not. On the other hand. Presidio might not have wanted to bid on the contract to begin with if it had known about Formosa’s fraudulent scheme.
. Formosa not only escapes liability for actual damages, but also avoids a $10 million punitive damage verdict punishing Formosa for its fraud.
| CASELAW |
User:Argigriego/sandbox
Spyros (Spyridon) Varthis (B. April 29) is a New York City based celebrity dentist specialising in Prosthetic dentistry, esthetic dentistry, dental implants, teeth whitening, porcelain veneers, dental bonding, smile makeovers and special needs patients. His PhD is focused on Science Education.
Dr. Varthis’ name is included in top celebrities U.S. doctors. He has given interviews in several social media channels. Regularly publishes his original scholarship in leading medical journals as well as he presents at major international symposia where he has been repeatedly invited as a Speaker.
Dr. Varthis is rare in the entire field of dentistry nationally, and globally, based on his stellar educational credentials at top tier medical institutions, his highly specialised training in Prosthodontics, Maxillofacial - Dental Oncology, Stomatology and as a Science Educator.
Early Years and Education
Spyridon Varthis was born and raised in Athens, Greece. He received his Doctor of Dental Surgery (D.D.S.) degree in Cluj-Napoca, Ro. Soon after he continued his education in a three-year postdoctoral program at the Columbia University College of Dental Medicine that lead to a certificate in Prosthodontics and a Masters of Science (M.S.) degree. In addition, he completed a 2-year General Practice Residency program under Oral Surgery department at Columbia University College of Dental Medicine where he became an expert treating special needs patients such as those with dementia, mental retardation (ex. down syndrome), other cognitive impairments or trauma from sports or car accidents, among other conditions. These patients may need special treatments under general anaesthesia in the Operation Room. Dr. Varthis also completed a MPhil and a Ph.D. degree in Science Education at Columbia University.
Career
Dr. Varthis has served NATO forces as a leading dentist in the flagship of NATO and as a Naval Dental Inspector for the Pentagon in Greece, where he treated all ranks from Ensign to Fleet Admiral. Furthermore, for years Dr. Varthis served as a Volunteer Dentist to refugees in Europe and those suffering from PTSD, domestic abuse and sex trafficking. He worked as an Assistant Clinical Professor at New York University College of Dentistry, as a Clinical Instructor at the Columbia University College of Dental Medicine and as a research investigator at Memorial Sloan Kettering Cancer Center. His current areas of interest in the pedagogical level include blended learning, curriculum development, and neurocognitive theory applied to the learning sciences. He is a member in multiple prestige dental organizations. He has used his extensive academic and clinical expertise to regularly publish pioneering scholarship in the field. He has lectured nationally and internationally in various conferences and published in journals such as JOMI, EJDE, Journal of Oral Oncology etc. He is a peer reviewer for several dental journals. Dr. Varthis currently works in a private dental office providing smile makeovers designed not just to restore esthetics and beauty but also function and health.
Personal Life
Dr. Varthis is focusing in a healthy life style. He is practicing several sports. Often appears in fashion shows/galas with other celebrities.
References[edit source]
1. http://dental.nyu.edu/content/dam/nyudental/documents/Nexus_S2014.pdf
2. https://worldwidescience.org/topicpages/b/blended+learning+model.html
3. [http://www.ada.org/en/publications/jada/jada-+specialty+scans/prosthodontics/prosthodontics_032417#one]http://www.ada.org/en/publications/jada/jada- specialty scans/prosthodontics/prosthodontics_032417#one
4. [http://dx.doi.org/10.1016/j.jcms.2017.01.020 2017. Journal of Cranio-Maxillo-facial Surgery. “The role of parotid gland irradiation in the development of severe hyposalivation (xerostomia) after Intensity-Modulated Radiation Therapy for head and neck cancer: Temporal patterns, risk factors, and testing the QUANTEC guidelines”.]
5. [http://dx.doi.org/10.11607/jomi.4432 2016. International Journal of Oral & Maxillofacial Implants. “Prevalence of interproximal open contacts between single implant restorations and adjacent teeth”]
6. [http://dx.doi.org/10.1016/j.oraloncology.2016.11.015 2016. Journal of Oral Oncology: “The prevalence and risk factors associated with osteoradionecrosis of the jaw in oral and oropharyngeal cancer patients treated with intensity-modulated radiation therapy (IMRT): The Memorial Sloan Kettering Cancer Center experience”.]
7. [http://dx.doi.org/10.1111/eje.12253 2016. European Journal of Dental Education. “Students’ perceptions of a blended learning experience in dental education”.] | WIKI |
Wikipedia:Articles for deletion/Erector (Transformers)
The result was redirect to List of Autobots. Whether to merge something from the history is up to editors. Despite the somewhat flaccid discussion, editors agree that we do not need to erect a monument in the form of an article to this particular toy. Sandstein 12:11, 18 September 2019 (UTC)
Erector (Transformers)
* – ( View AfD View log Stats )
PROD contested by for reason "famous for unfortunate name". Of course, this must still pass GNG.,, FoxyGrampa75 (talk) 00:34, 2 September 2019 (UTC)
* Note: This discussion has been included in the list of Fictional elements-related deletion discussions. FoxyGrampa75 (talk) 00:34, 2 September 2019 (UTC)
* Note: This discussion has been included in the list of Comics and animation-related deletion discussions. FoxyGrampa75 (talk) 00:34, 2 September 2019 (UTC)
Relisted to generate a more thorough discussion and clearer consensus.
* Redirect to List of Autobots. This article attempts to make a GNG claim with the Topless Robot source, but that notability ones comes from being a part of this group. Making into the Transformers Hall of Fame might confer some notability, but I'm unconvinced it's enough to sustain an article on its own. Argento Surfer (talk) 20:11, 6 September 2019 (UTC)
* Delete - Hoist (Transformers) and Pipes (Transformers) were both recently deleted although a Redirect to List of Autobots was suggested - by the same rationale, Erector (Transformers) should be deleted as well - Epinoia (talk) 03:36, 9 September 2019 (UTC)
Please add new comments below this notice. Thanks, North America1000 01:50, 10 September 2019 (UTC)
* Merge into List of autobots, either with or without redirect. We have several articles on rather unfortunate names, so this doesn't get a freebie in that respect. See also the Pokemon test, which I think this fails. – John M Wolfson (talk • contribs) 02:19, 10 September 2019 (UTC)
* Delete as per my PROD. TTN (talk) 02:36, 14 September 2019 (UTC)
| WIKI |
Adriatic–Ionian motorway
Adriatic–Ionian motorway (Autostrada Adriatiko-Joniane; Bosnian and Jadransko-jonska autocesta; Montenegrin and Јадранско-јонски ауто-пут) or Trieste-Kalamata Highway or the Blue Corridor, is a future motorway that will stretch along the entire eastern shore of the Adriatic and Ionian seas, spanning the western coast of the Balkan peninsula from Italy in the north through Slovenia, Croatia, Montenegro, Albania to Greece in the south.
Overview
The road is planned to be built to full motorway standards. It will start in Trieste, Italy, pass through Slovenia, enter Croatia near Rijeka, and continue through Croatia as part of A1 motorway. The road will be connected to Montenegro through Croatia if via Pelješac Bridge. Passing Ulcinj, the motorway will enter Albania south of Lake Skadar, and continue south, passing Shkodër, Tirana, Rrogozhinë, Fier and Gjirokastër. Exiting Albania, the motorway will follow the A5 Motorway in Greece, ending at Kalamata.
The road is seen as a matter of national importance to Croatia, Montenegro and Albania. Those countries have launched an initiative to list the motorway with Pan-European corridors in order to be able to secure foreign funding.
Italy
With starting of Adriatic–Ionian motorway at Trieste, the already existing feeder road RA 13 to the Slovenian border is used. The RA 13 is connected to the Slovenian A3 highway.
Slovenia
The Slovenian section starts with the already existing A3 from the Italian border at Sežana to the interconnection with the A1. The further route is not planned yet, but will lead to the Croatian border near Jelšane where it will be connected with the Croatian A7 highway. Until construction of that part, the traffic is passed over a national road.
Croatia
In Croatia, the Adriatic–Ionian motorway is planned to follow routes of the A7 motorway along its entire length, and the A1 motorway from the Žuta Lokva interchange to the Border crossing Nova Sela.
So far, Croatia has made the biggest progress on its section by completing significant parts of the A7 motorway and the A1 motorway.
The A7 is completed from the Slovenian border at Rupa, bypassing Rijeka and connecting to the A6. Construction of the part from this junction to a planned interchange with the A1 at Žuta Lokva is currently slowed down and planned as a long-term project. Until completion of this sector, the traffic may either use an indirect route to the A1 via the A6 motorway (to the junction of the A1 and A6 motorways at Bosiljevo 2 interchange) or a more direct route to the A1 via the D8 state road (also known as Adriatic Highway).
Adriatic-Ionian motorway follows the route of the A1 motorway from the Žuta Lokva interchange to the Border crossing Nova Sela where it connects to the A1 motorway in Bosnia and Herzegovina.
Bosnia and Herzegovina
It has not yet been defined whether a motorway will pass through southern Bosnia and Herzegovina near Trebinje. A route passing through the Trebinje field would require approval of both the Herzegovina-Neretva Canton and Republika Srpska.
Montenegro
In the Spatial Plan of Montenegro, route of the Adriatic – Ionian motorway is currently defined as following:
* Nudo (border with Bosnia and Herzegovina) - Grahovo - Čevo - (Podgorica) Mareza - (Podgorica) Smokovac - Dinoša - Božaj (Border with Albania)
Thus, Government of Montenegro has considered only the option of motorway crossing southern Bosnia and Herzegovina near Trebinje. A parallel expressway along the coast is also planned, that will connect directly to Croatian road network at Debeli Brijeg, however, this is not considered a part of Adriatic – Ionian route, and will not be built to full motorway standard. This route is intended to relieve Adriatic Highway, and will follow the Montenegrin coastline closely, with Verige bridge included in its route.
Approximate length of motorway through Montenegro is 100 km, of which 10 km between Mareza and Smokovac is shared with Belgrade–Bar motorway.
Building of the Belgrade–Bar motorway is currently a priority for Montenegro, and concrete activities on building Adriatic – Ionian motorway are yet to begin.
Albania
Albania has mostly completed its north-south corridor (SH1 and SH4) connecting Montenegro with Greece. Remaining parts of the corridor are planned to be expanded to full motorway standard like building new sections between Muriqan/Sukobin border crossing to SH1 at Bushat south of Shkodër, Thumane-Kashar-Rrogozhinë highway part of Milot-Fier upgrade to motorway standard linking with Fier Bypass, and expanding SH4 south of Fier with slight deviation at Pocem near Memaliaj. The motorway in Albania will pass on the current stretch along the western lowland, bypass Tirana through newly planned Thumane-Kashar-Rrogozhine motorway, continue south on the existing SH4, and enter inland at Fier towards Tepelene and Gjirokaster. Less than half of the above segments are single carriageways known as superstradë, while segments SH4 Rrogozhine-Fier and A1 Milot-Thumanë have been widened to dual carriageways known as autostradë.
Greece
In Greece the Adriatic-Ionian motorway follows the GR-5 from the Albanian Border at Kakavia up to Ioannina, a section planned to be upgraded to a motorway. From there it follows the A5 motorway (Ionia Odos) up until Antirrio where it crosses the Corinthian Gulf via the Rio-Antirrio bridge to meet the A8 motorway (Olympia Odos) at Rio.
From Rio to Pyrgos, another motorway (which is going to be the extension of the Olympia Odos-A5), is under construction to replace that section of the existing national road GR-9. The other section from Pyrgos to Kalo Nero is delayed due to environmental concerns about the Kaiafas Lake. The Kalo Nero - Tsakona road is a branch of the GR-9 and it leads to the intersection with the A7 motorway, near the city of Kalamata. | WIKI |
Onondaga General Term,
March, 1849.
Pratt, Gridley, and Allen, Justices.
Schroeppel vs. Shaw.
A dealing, by a creditor, with the principal debtor, in respect to a second or collateral security, will not, at law, discharge the surety from the payment of the principal debt; although he might have been discharged had the creditor dealt with the principal in the same manner, with respect to the original security.
A surety seeking to be relieved from the payment of a debt on the ground of the creditor’s delay in enforcing collateral securities must establish the fact that he has lost the benefit of such securities by some act of the creditor inconsistent with his rights as surety, and not by any act or default of his own.
A surety will not be discharged by the delay of the creditor in the prosecution of the principal debtor, or mere inaction on his part in the collection of collateral securities, unaccompanied by an actual binding agreement with the principal for delay, or by fraud, or wilful neglect.
In order to effect the discharge of a surety on the ground of delay in proceeding against the principal, it must be shown that there was a valid agreement, upon a sufficient consideration, to forbear and give time for payment.
From such an agreement the law presumes injury to the surety, and holds him ' discharged, irrespective of actual damage.
A note given by a mortgagor, to the holder of the mortgage, as a consideration for the postponement of a sale under a decree of foreclosure obtained thereon, is void, and will not support an agreement by the payee to postpone the sale.
In Equity. The bill in this cause stated that on the 4th day of April, 1837, the plaintiff and Charles A. Baker, Theodore Wood and Gardner Lawrence made their promissory note for $2000, payable one year from date with interest, to Daniel J. Shaw, the defendant, or bearer, and on the 24th of the same month delivered the same to the payee; the plaintiff signing the same “ as security” for the other makers. That on the 30th of May, 1836, Joseph I. Bradley and William Jackson gave to Charles A. Baker their bond conditioned for the payment of $3000 in five equal annual instalments with annual interest; and that as collateral security for the payment of that sum they, at the same time, executed and delivered to Baker a mortgage upon a part of farm lot No. 241 in the city of Syracuse, which was afterwards duly recorded. That the promissory note above mentioned was given for a loan of money made by Shaw to Baker, Wood, and Lawrence, or some or one of them; and that the plaintiff was in fact, as the note on its face imports, a mere surety for the other parties thereto; which fact was known to Shaw. That it was a part of the agreement respecting such loan, that Baker should assign and transfer the said bond and mortgage to Shaw as a further security for the repayment of the money borrowed ; and that previous to the giving of the note, it was known to the plaintiff that such loan was to be secured by an assignment of said bond and mortgage, and but for that understanding he would not have joined in the note. That in pursuance of such agreement, Baker, at the same time the note was delivered, executed and delivered to Shaw an assignment of the bond and mortgage, and delivered the bond and mortgage to him : which assignment had not been recorded. That Shaw thereupon executed, under his hand and seal, and delivered back to Baker a receipt in these words: “ This is to certify that I have this day received of Charles A. Baker, of Syracuse, a bond and mortgage executed by J. I. .Bradley and William Jackson, duly assigned" to me; said bond and mortgage is dated May the 30th, 1836, given to secure the payment of $3000, in five equal annual instalments with annual interest, with said Baker’s endorsement upon the same of the receipt of the first payment having been paid to him : said mortgage appears to have been recorded in the clerk’s office of Onondaga county, in book No. 32, page 363, &c. that said assignment is made as collateral security to secure to me the payment of a certain promissory note for $2000, dated April 14, 1837, due in one year, and signed by the said Charles A. Baker, T. Wood, Gardner Lawrence and H. W. Schroeppel, which when paid I am to reassign said bond and mortgage to said Baker; but in case of default in payment of said note, I am to reassign the residue of said bond and mortgage after I shall have received the amount due upon said note. April 24, 1837. Daniel I. Shaw.” That default was made in the payment of the said note given to Shaw, but that there was paid thereon, on the 21st day of April, 1838, $140, and on the 18th of May, 1839, $141; and that the plaintiff believed no other payment had been made on such note when Shaw commenced a foreclosure of the mortgage as afterwards mentioned. That on the 3d of November, 1840, Shaw filed a bill in bis own name, and for his own benefit, against the mortgagors and their wives, before the vice chancellor of the seventh circuit, to foreclose the mortgage. That the first payment, of $600 and interest, which fell due on the 30th of May, 1837, was paid to Baker before the bond and mortgage were assigned to Shaw; that on the 30th of May, 1838, there fell due upon said bond and mortgage the further sum of $600 besides interest; on the 30th of May, 1839, the sum of $600 and interest; and on the 30th of May, 1840, the further sum of $600 and interest. That the three last mentioned instalments were not paid by the mortgagors, nor any part of such instalments, except a part of the accruing interest ; and that Shaw, until he commenced the foreclosure suit, took no proceedings whatever, either at law or in equity, to collect those instalments, or either- of them; but on the contrary, during all that time, negligently suffered and permitted the same to remain unpaid and uncollected, without the knowledge, or consent, or approbation of the plaintiff. The plaintiff alleged that during all tha.t time Bradley and Jackson, the mortgagors, were perfectly responsible for the amount unpaid upon their bond and mortgage; and if Shaw had used reasonable diligence in enforcing the bond and mortgage against them he might and would have collected from them, before he instituted the foreclosure suit, moneys enough, or nearly enough, to have fully paid up the note signed by the plaintiff. And the plaintiff insisted that inasmuch as the said note lay in the defendant’s hands, overdue, from and after the 4th of April, 1838, and inasmuch as during all the period aforesaid he held as collateral security the bond and mortgage, it was his duty to the plaintiff, as the surety in the note, to have taken earlier proceedings for the enforcement of the bond and mortgage. That after the suit for the foreclosure of the mortgage was instituted, the defendant so negligently and tardily conducted the proceedings therein that no decree of foreclosure and sale was obtained until the 10th of March, 1841, although no defence was interposed by the defendants in that suit. That the plaintiff was advised and believed that Shaw might have enrolled and docketed his decree within 30 days after the same was obtained. That the mortgagors owned a considerable amount of other real estate in Onondaga county, which fact was known to Shaw ; and that had the decree been enrolled and docketed he might have acquired a lien on some other real estate, which would have secured the debt. That the master’s report was made on the 13th of Feb. 1841, finding $3022,24 to be due and unpaid upon the bond and mortgage; for which amount the decree was obtained. That Shaw caused the mortgaged premises to be advertised for sale, under the decree, on the 8th of May, 1841, but instead of permitting the sale to take place on that day, he wrongfully and negligently caused the same to be postponed, first to the 15th of June then .next, then to the 1st day of July then next, and then to be further postponed until the 15th of July; which several postponements were without the knowledge or consent of the plaintiff. That the first postponement was in consideration of Bradley’s giving his note to the defendant for $200; and that such note was given upon no other consideration. That the premises were sold, under the decree, on the 15th of July, 1841, and were purchased by Shaw, the defendant, for $375; leaving a deficiency of $2851,22, for which the mortgagors were personally liable. That the mortgagors were able tó pay the deficiency, for several months after the sale, and it could have been collected out of their real and personal property, and would have been collected had the defendant docketed his decree, and issued execution with reasonable diligence. That he did not enrol such decree, nor docket it in the court of chancery until April 30th$ nor in the clerk’s office of Onondaga county until May 9,1842. That this delay was without the knowledge or consent of the plaintiff. That no execution for the deficiency was ever issued. That when the decree was at length docketed Bradley and Jackson had both failed, so that the decree was of no value, and had remained so ever since. That Bradley did not fail until shortly before that time. That Jackson was discharged as a bankrupt, on the 17th of June, 1842, and Bradley on the 20th of Feb. 1843. That on the 14th of September, 1842, Shaw sued the plaidtiff and the other makers of the note, in the supreme court, and in August, 1843, recovered a verdict for the full amount of the note, and interest, on which verdict judgment was rendered on the 29th of August thereafter, for $2814,64 damages and costs, and said judgment was docketed in the clerk’s office of Onondaga county on the 1st of September,! 843. That when said judgment was obtained Lawrence and Baker were both insolvent, and still remain so. That there had been paid on the note $140 on the 21st of April, 1838', $141 on the' 18th of May, 1839, and $275,29 on the 15th of July, 1840 ;■ which last sum’ was so much of the sum of $375 bid by Straw at the sale urider the decree, the costs of suit and expense's of sale being first deducted. That before the verdict was taken Shaw agreed with: Lawrence to deduct those payments when • he should take the verdict: in consequence of which Understanding the plaintiff did not appear at the circuit; and the defendant took a verdict for the whole amount of the note, or nearly so, and entered his judgment accordingly, and claims a right to collect it. That the mortgaged premises were worth $2500, and were worth nearly that when Shaw bid them off for $375. That the plaintiff is interested in a large amount of real estate in Onondaga and Oswego counties,' on which the judgment is a cloud. And the plaintiff insisted that as' the bond and mortgage were lost throtigh the gross neglect and misconduct of the defendant, the loss should fall upon him,' and that the plaintiff ought in equity to be relieved against the note, and against the judgment recovered upon the same. That -this ground of defence was not set up in the suit at law. And the plaintiff claimed that the defendant was accountable forth e value of the premises bid off by him’, irrespective of his bid and that inasmuch as he held the bond and mortgage as a security, and not absolutely, but in trust to collect and apply the avails thereof upon the note, he should be deemed to hold the mortgaged premises in the same way. The plaintiff therefore claimed that the premises should be sold under the decree of this court, and the proceeds of the sale applied upon the judgment : and that Shaw should be charged with the fair cash value of the premises after allowing him whatever sums of money it had cost him to acquire a title to the same. The plaintiff also claimed that the payments agreed by Shaw to be deducted before taking a verdict in the action upon the note, should be allowed him. The bill prayed for an answer, without oath, from the defendant; that the plaintiff might be discharged from the payment of the judgment; and the defendant might be decreed to execute to him a discharge of such judgment, so far as it affected the plaintiff; and that the defendant miglit be perpetually enjoined from issuing an execution upon such judgment as against the plaintiff, and from instituting or prosecuting any action or proceeding against him, for the collection of the said judgment; and for general relief.
The defendant put in an answer, in which he admitted most of the facts set forth in the bill. He denied, however, that the plaintiff was a mere surety, and insisted that he was interested in the note, or the consideration thereof, as principal. And he insisted that if he had suffered the bond and mortgage to remain unpaid and uncollected without the knowledge or consent of the plaintiff, still he would not be justly chargeable with negligence for so doing. He denied that the mortgagors, or either of them, were responsible to pay the amount unpaid upon the bond and mortgage, at any time, as the instalments became due, after the assignment to him ; or that he could have collected the same, or any part thereof, but on the contrary he was informed and believed that the mortgagors were, during all that time, and still are, insolvent. And the defendant alleged that on the 30th of May, 1836, Bradley and Jackson gave a bond and mortgage on the same premises to J. H. Colvin for $2000 payable in six equal annual instalments, with interest. That this mortgage was given for the purchase money, and was delivered before the mortgage to Baker was executed, and was the first lien; which was known to Baker. That the whole amount secured by the Colvin mortgage, except $473,33, was unpaid at the time the Baker mortgage was assigned to the defendant, and that Baker knew that fact, and that the Colvin mortgage was a prior lien. The defendant denied that at the time of obtaining the decree of foreclosure the mortgagors had other real estate; that if they had, it was incumbered to its full value. He also denied the charges in the bill respecting the postponements of the sale under the decree; and as to the solvency of the mortgagors, alleging, on the contrary, that they had been insolvent for several years. And the answer alleged that an execution was issued for the deficiency, on the 30th of April, 1842, and no property could be found. That at the time of the sale the premises were not worth over $1200, and, subject to Colvin’s lien, they were not worth $375, the sum bid by him. That after the sale, the defendant, in order to protect his title, purchased the Colvin bond and mortgage for $1179,17, and took an assignment thereof. That, at the time of making the loan, the defendant did not know of the Colvin bond and mortgage, but that the plaintiff knew of their existence. That the plaintiff never offered to pay the note, nor requested the defendant to collect it of the makers, nor to foreclose the mortgage, or to collect the balance of the decree, nor to indemnify the plaintiff for any costs or expenses. And the defendant insisted that the plaintiff should have made such a request; and that his omission to do so was a full defence. That on the 15th of August, 1840, Colvin obtained a judgment against Bradley and Jackson, on their bond, for $4000 of debt and costs, which judgment was assigned to the defendant Aug. 17, 1841, and the sum then due was $1179,07. That execution was issued on this judgment soon after it was docketed, and no property could be found, except what was incumbered for niore than what it was worth. The defendant insisted that all the grounds of relief set up in the bill might have been set up as a defence to the suit at law, upon the note, and that therefore the judgment was a bar to this suit. He denied the making of the agreement relative to deducting the payments made upon the note, from the verdict, or that he had ever been requested to make any deduction. He also denied that the mortgaged premises were worth over $1200 at the time he bid them off; or that the bond and mortgage were lost through his negligence; or that he was accountable to the plaintiff for any thing more than the amount of his bid. And he alleged that he had been at all times ready to re-assign the bond and mortgage on being paid his debt, &c. A replication was filed, and a great mass of testimony was taken, before one of the justices of this court, at his chambers, in pursuance of a stipulation between the solicitors for the respective parties. This evidence it is not deemed necessary to detail, at length j the most important portions being mentioned in the opinion of the court.
G. F. Comstock, for the plaintiff.
I. The grounds of relief set up by the plaintiff in this case could not be set up as a defence to the action at law upon the note. (15 Wend. 155. 10 East, 369. 2 Russ. 81. 3 Cond. Ch. Rep. 89.) II. It is therefore no defence to this suit that it is brought after trial and judgment at law. On the contrary, it is a well settled ground of jurisdiction in this court that the defendant has proceeded to judgment at law, and now threatens to enforce the judgment contrary to equity. (1.) The power of a court of equity to restrain legal proceedings, whether before or after judgment, is as well settled as the existence of the court itself. And originally the relief was usually granted after judgment. (2 Story’s Eq. § 874. 2 R. S. 189.) (2.) The cases where the court refuse to interfere, are where the defence was available at law, and no sufficient excuse is shown for not setting it up. (2 Story’s Eq. 894, 895.) (3.) Another class of cases is where the defence is a legal one, but the facts upon which it rests are solely within the knowledge of the opposite party. It is not necessary now to determine whether the defendant at law in such a case should file a bill of discovery purely, before trial at law, so as to use the answer as evidence on the trial, dr whether he may safely wait until after trial and judgment, and then file his bill for discovery and relief. (See 2 Story’s Eq. § 881; Norton v. Wood, 5 Paige, 245.) (4.) Another class of cases is where the defence is a legal one, but the party could not avail himself of it through some fraud, accident, mistake, or other special circumstances. In those cases, after trial, and judgment, courts of equity grant relief with caution and circumspection ; but in a case of this kind, free from negligence or fault, relief is never denied. (2 Story’s Eq, §§ 887, 894, 896. 7 Cranch, 332, per Marshall, J. 17 John. 384. 2 Story’s Eq. 885, 886. 1 Paige, 451.) (5.) But wh,en the defence is purely equitable in its nature, and could not, under any circumstances, be made available at law, the right to resort to a court of equity for. relief after judgment, has never been in any case denied'or doubted. (See authorities already cited.) (6.) If the defence at law be embarrassed by doubts and difficulties, that of itself is good ground of jurisdiction in this court. So if the defence be. erroneously overruled by a court of law. (2 Russ. 81. 17 John. 384.) III. The facts in this case show that the bond and mortgage of Bradley and Jackson were lost through the negligence and misconduct of the defendant. This entitles the plaintiff, as surety upon the note, to relief. (1 Story’s Eq. § 326. Mayhew v. Crickett, 1 Swanst, 185, 191, and note (a.) 8 Pick. 122. 4 Ves. jr. 824, 833. Id. 540. Williams v. Price, 1 Sim. & Stu. 581. S. C. 1 Eng. Cond. Ch. Rep. 582.) IV. The defendant is accountable for the value of the premises bid in by him at the mortgage sale, and not for the amount of his bid merely. The foreclosure suit was against Bradley and Jackson, and the sale only foreclosed their equity of redemption. But the assignment of the bond and mortgage to the defendant Was itself a mere mortgage, and that has never been foreclosed. (Slee v. The Manhattan Co. 1 Paige, 48, 78, 79.) Y. Besides the value of the land, the payments made to Shaw on the note, before verdict, should be allowed, pursuant to his agreement. (2 Story’s Eq. § 880.)
D. D. Hillis, for the defendant.
The facts charged and proved ip this case constitute no ground of relief from the judgment against the plaintiff. The plaintiff was a joint maker of the promissory note upon which the judgment was obtained. No time, was given to the makers of this note; or to the principal debtors; nor was any act done in regard to the note, to discharge them. What was done in regard to the collateral securities cannot here be taken advantage of by the principal debtor. There was no agreem.ent to proceed on the collateral securities, or to make the amount of the note out of it, as in the case in 15th Wend. 155. There was no request on the part of the plaintiff, or of any of the other makers, to proceed to the collection of the mortgage. The grounds of relief set up by the plaintiff could have been set up as a defence (if they are a defence) to the action at law upon the note. If they could not, and are only a defence in equity, a bill for relief should have been filed, pending the suit at law. By allowing four years to elapse after judgment, the plaintiff was guilty of laches, and ought not now to have relief.
By the Court, Allen, J.
It is well settled that the plaintiff could not have successfully defended the suit at law mentioned in the pleadings, upon the grounds relied upon for relief in this action. A dealing by the creditor with the principal in respect of a second or collateral security, will not at law discharge the surety from the payment of the principal debt, although he might have been discharged had the creditor dealt with the principal in the same manner with respect to the original security. (Pitman’s Pr. & Surety, 203. Twopenny v. Young, 3 Barn. & Cress. 208. Taggard v. Curtenius, 15 Wend. 155.) The plaintiff, as surety for Baker, for the payment of the original debt to the defendant, had rights well established in principle, and by authority, and which, enforced at a proper time, would in the view now taken by his counsel of the pecuniary ability of Jackson and Bradley, have fully protected him from any possibility of loss. (1.) He was at liberty at any time to pay the principal debt and be subrogated to all the rights of the creditor and to all securities in his hands. (Story’s Eq. Jur. § 499, and cases cited in notes 1 and 2, § 502. Hodgson v. Shaw, 3 Mylne & Keene, 190.) (2.) He could have filed his bill in a court of equity to compel the creditor to seek his remedy first out of the collateral security and to enforce his remedy against the mortgaged premises and the mortgage debtors at once. (Story’s Eq. Jur. §§ 237, 499. Ex parte Rushforth, 10 Vesey, 409. Hayes v. Ward, 4 John. Ch. Rep. 123. King v. Baldwin, 2 Id. 554. Huffman v. Hurlbut, 13 Wend. 375.) It is incumbent upon the plaintiff to establish the fact that he has lost the benefit of the collateral securities by some act of the defendant inconsistent with his rights as surety, and not by any act or default of his own. It is settled by an unbroken line of authorities, that mere delay on the part of the creditor to enforce his remedy against the principal debtor will not discharge the surety; but tq effect such discharge there must be a valid agreement, upon a sufficient consideration, to forbear and give day of payment. From such an agreement the law presumes injury to the surety, and holds him discharged. (Wright v. Simpson, 6 Vesey, 714. Boulton v. Stutts, 18 Id. 20. Commercial Bank v. French, 21 Pick. 489. United States v. Kirkpatrick, 9 Wheaton, 760. Fulton v. Matthews, 15 John, 433. Crealth v. Sims, 5 Howard, 192. United States v. Hunt, 1 Gall. 42.) In the language of Lord Eldon in Wright v. Simpson, adopted by Chancellor Kent in King v. Baldwin, the surety is a guarantor, and it is his business to see whether the principal pays, and not that of the creditor. The reason of the rule which governs the rights and determines the liability of the surety, in case of a delay by the creditor to prosecute his remedy against the principal debtor, applies with full force to the action of the creditor in respect to collateral securities in his hands. In both cases the surety is in default. He has omitted to perform his part of the agreement. In the case now under consideration the plaintiff undertook to pay the defendant the full amount of his debt before the first instalment became due upon the bond and mortgage against Bradley and Jackson; and had he performed his agreement he would have been entitled to an assignment of that security, and would have, had the actual possession and full control of it at the time the first instalment became due. How, then, can it be said that the plaintiff has lost the benefit of the securities by the act of the defendant in omitting to prosecute, when it is only by the viola-lion of the positive agreement of the plaintiff that the defendant retained or had them in his possession at a time when they might have been enforced ? If in the one case it is the .duty of the surety, as a guarantor, to see that the principal pays, why is it not in the other case equally his duty to see that ,the principal pays the original debt and redeems the collaterals ? A different rule would make the collaterals the principal securities, and then apply to them a law more stringént as against .the creditor than would be applied if they were in fact the principal and not collateral securities. It would enable the plaintiff to take advantage of his own laches and default. It would establish a rule dangerous to creditors, and difficult of execution and application. The rules of law which govern the dealing of the creditor with the principal debtor are plain, reasonable and easy of application. Mere inaction, unaccompanied with a binding agreement for delay, will not discharge the surety; and a delay in pursuance of a valid contract for that purpose, will operate as a discharge of the surety, irrespective of actual damage. But if the rule contended for by the counsel for the plaintiff is the true rule, then each case of dealing with collaterals must be decided upon its peculiar circumstances, and not unfrequently by the fluctuating and uncertain discretion of an individual judge or of a jury. I should have great difficulty in determining, from the evidence, that Bradley was solvent, within the true meaning of that term, at any time after the first instalment became due upon the bond and mortgage, (Huffman v. Hulbert, 13 Wend. 377;) and that the amount of the first instalment would, with certainty, have been collected upon an immediate prosecution of the demand; and if that should have been collected the doubt is increased as to the next, and each subsequent instalment. It is true that from the evidence I should think it probable the first and perhaps the second instalment might have been collected. But in his own language Bradley was “ hard pressed.” There were judgments and executions against him, and although he paid them until 1843, it is impossible to say that the attempt to enforce the collection of this bond would not have been the cause of his failure at that time.
The law requires good faith on the part of the creditor towards the surety; and hence he is discharged from liability if the-creditor does any act injurious to the surety, or inconsistent with his rights, or if he omits to do any act when required by the surety which his duty requires him to do, and the omissions proves injurious to the surety. (Story's Eq. Jur. § 325.) An omission to sue the principal is not a breach of faith to the surety, and it is difficult to perceive how an omission to prosectite collateral securities can be a breach of faith, unless there is an express agreement on the part of the creditor to use reasonable diligence in their collection, or do some act in respect to them necessary to their validity as securities, or such agreement can be inferred from the circumstances of the case, or from the character and situation of the securities. Justice Story, in treating of constructive frauds which will discharge a surety, says, “ if the creditor has any security from the debtor and he parts with it without communication with the surety, or by his gross negligence it is lost, that will operate at least to the value of the security, to discharge the surety.” (Story’s Eq. Jur. § 326.) And for authority he refers in note (1) to Mayhew v. Crickett, (2 Swanst. 185,191, and note a.) Law v. East India Company, (4 Vesey, 833,) and Capel v. Butler, (2 Sim. & Stu. 457.) By referring to those cases it will be seen that “ gross negligence” is something beyond, ail'd entirely distinct from, mere delay. Indeed, Judge Story, in the same section and in the paragraph immediately preceding that quoted, asserts the principle that there is no positive duty incumbent on the creditor, to prosecute measures of active diligence—evidently treating delay as one thing and negligence or omission of duty as another and quite distinct matter. In Mayhew v. Crickett a debt was secured by two promissory notes, each for half the amount, of two sureties, and also by a warrant of attorney of the principal debtor upon which the creditor had entered up judgment and taken the goods of the debtor in execution, but he afterwards .withdrew the execution. Here there was something more than mere omission to enforce the judgment. There was a parting with the security ; the' goods of the principal debtor were released from execution without communication with the surety. There was an act of the creditor which, as he was trustee for the sureties, was a fraud upon them. In Law v. East India Company, the creditors had settled with the principal debtor and paid him a balance found due upon that settlement and suffered him to remove with his property over which they had control, and the court held the sureties for the settlement of the account and payment of any balance discharged by such settlement and payment; although it was erroneous in fact, the principal debtor after-wards becoming insolvent, In Capel v. Butler the principal debtor assigned two vessels as collateral security for the payment of an annuity also secured by the joint bond of the plaintiff and the principal debtor, and the creditor neglected to perfect the assignment of the vessels in the mode required by acts of parliament for the registry of vessels and the transfer of property therein, by means of which omission the debtor was enabled to and did actually sell the vessels to other persons, and the surety had lost the benefit of the assignments. The nature of the security required something to be done at once by the creditor to make it a valid security, and hence the law should, as it doubtless did imply an agreement on his part to perform that act without which the security was invalid. An omission to do this would be gross neglect in an agent, bailee or' trustee, and would be a breach of good faith on the part of the’ creditor toward the surety. Judge Story, in the section quoted, doubtless had in view neglect of the character of that in the case last cited as the gross neglect which should discharge the surety, that is, the omission of an act agreed to be done by him, or evidently imposed upon him by the .situation and character of the securities in his hands. Indeed, a request from the surety to do this act might be implied, so necessary was it to his indemnity to bring the case within the principle discharging a surety “ by the omission of the creditor to do an act when, required by the surety which his duty enjoins him to do, and the omission to do which proves injurious to the surety.” The other cases relied upon by Judge Story are instances of the parting with the securities by the creditor, to the prejudice of the surety.
Ex parte Muir, (2 Cox, 63,) and Williams v. Pierce, (1 Sim. & Stuart, 581,) are relied upon by the counsel for the plaintiff in support of the principle contended for by him, that delay in the prosecution of the collateral securities, when by reason of such delay they become less available, discharges the surety. In the first case, J. T. gave his bond and warrant of attorney to D., conditioned for the payment of a certain debt by instalments, and D. assigned the bond and warrant of attorney to C. his creditor, and the latter failed to enter up the judgment, in consequence of which, upon the obligor’s decease, other creditors obtained a priority which by perfecting the judgment and thereby making the debt of a higher nature he might have prevented, and secured the debt upon the real and personal estate of the obligor. It was held that the creditor was chargeable for his default, to the amount of the loss incurred by the forbearance. This case is distinguishable from the one now under consideration. (1.) The bond and warrant of attorney in their nature required further action to make them valid securities of the character and degree contemplated by the parties, and the debtor put it out of his power to perform this act by placing the papers in the hands of his creditor, and making that creditor his attorney in respect to them and the debt secured by them. There was therefore, as in the case of Capel v. Butler, a duty imposed upon the creditor in respect to the securities, by their character and condition. The correctness of the decision in the particular cause may be conceded; but the opinion of the lord chancellor goes farther than was necessary to decide the case, and his reasoning has not at all times been fully acquiesced in. The case is not even cited or referred to by Justice Story in his treatise on equity jurisprudence, when treating of the relative rights and duties of principal and surety. And while in Williams v. Price the decision was followed, the Vice Chancellor, Sir John Leach, takes especial care to withhold his assent from the argument of the lord chancellor, and the principles advanced by him. (2.) In Ex parte Muir, the lord chancellor held that the bond which was the subject of the controversy had been assigned absolutely to the creditor and to its full amount, in discharge of the debt of the assignor. If the bond was assigned in payment of the principal debt, to be applied when collected, it might well be that the creditor was bound to use ordinary diligence in its collection, and to apply as payment upon the original debt what was actually collected or what might with reasonable diligence have been collected. This would be so within Dayton v. Trull, (23 Wend. 345.) But in the case before us, the assignment of the bond and mortgage of Bradley and Jackson was in pursuance of and a part of the contract by which the principal debt originated and was conceded to be as collateral to it, and the principal debt was to become due and payable before any part of the amount secured by the bond and mortgage became due. In Williams v. Price, a debtor had assigned to his creditor as collateral security for his debt, a judgment which he had recovered by confession against a third person, and the creditor had sued out two or more executions upon the judgment, but had not put them in the sheriff’s hands, or having placed them in the sheriff’s hands had withdrawn them, and after that had negotiated with the judgment debtor and had given him time for payment, and had taken from him acceptances which were dishonored, until finally the judgment was lost. The Vice Chancellor, Sir John Leach, refrained from expressing an opinion upon the question whether the creditor was bound to use legal diligence to give effect to the judgment, or whether he might remain passive until required by the assignee to resort to legal diligence, and said it was not necessary to determine those questions, but based his decision upon that of Ex parte Muir, and upon the fact that the creditor, by suing out execution, assumed the possession or control of the judgment in exclusion of the assignee, and that it was within the principle which charges the creditor in possession of property held by him as a security not only with what he actually rec.eives but with what he might have received but for his wilful default or neglect. Many of the features of this case, and which by the vice chancellor were held to control the decision, are wanting in the one before us ; and it would be an unwarrantable extension of the principles of any decided case to hold the surety discharged by mere delay of the creditor in the prosecution of the principal debtor, or in the collection of collateral securities, unaccompanied by an actual agreement, fraud of wilful neglect. In the note to Paine v. Packard, and King v. Baldwin, (2 Am. Lead. Cases, 127,) it is attempted to reconcile the cases of Ex parte Muir and Williams v. Price with the decisions which hold that mere delay or omission to prosecute, on the part of the creditor, will not discharge a surety, by making a distinction between .cases in which the creditor has received collateral securities directly from and by the voluntary act of his debtor, and those in which he has acquired them by legal or coercive measures, and by his own acts. But I find no case in which this distinction is taken, and there appears to be no distinction upon principle. The rights of the surety are the same whether the collateral security is taken at the time or after he has incurred his obligation, and whether he knew the fact or not; and it would seem to follow that it was immaterial by what means it was acquired. His creditor is alike the trustee of the surety in every case. (Pitman on Pr. & Surety, 114.) If the decisions referred to are put upon fhe grounds on which they may be put, and indeed upon the grounds upon which they were placed by the courts by which they were pronounced, then there are no circumstances to be reconciled, and the law will be harmonious. The same duties and the same liabilities will result from this quasi relation of trustee and cestui que trust, as to securities jn the hands of the creditor, which exist between the creditor and the surety of the debtor as to the principal obligation, subject to be varied only by the express or implied contract of the parties.
Baker v. Briggs, (8 Pick. 122,) merely decides that a creditor who has his debt secured by a surety and has also property pledged to him by his principal debtor, may not sunender the property without the knowledge and consent of the surety; and if he does so he .thereby discharges the surety to the amount of the property given up. In Taggart v. Jones, (15 Wend. 155,) there was .an agreement that the creditor should use due -diligence in disposing of the property pledged, (stock in a bridge company,) at the highest price, and this was omitted for some four years and until after the bridge was carried off and the value of the stock greatly depreciated. And it is of such a case that Bronson, J. says “ whether the matters pleaded would entitle the defendants to relief in a court of equity need not be considered.”
Up to November, 1840, the defendant took no action in respect to the bond and mortgage. He had merely delayed the commencement of proceedings to enforce their collection ; and for mere delay we think he is not under the circumstances chargeable for any loss which may have ensued. He then undertook the foreclosure, and there is no evidence that there was any unnecessary delay in the proceedings up to the time of the decree and the advertisement of the mortgaged premises for sale ; at least, no evidence of such delay as would amount to wilful default or negligence, or be evidence of fraud. The postponements of the sale appear not to have been unreasonable. They were for short periods, and with a view to procure an enhanced price for the premises, or to enable the mortgagees to ,do so. In the language of the vice chancellor, in Williams v. Price, “ I think it would be difficult to find a principle for charging such a creditor simply upon the ground that he gave time to the debtor, .upon the judgment; for it may be that the giving of time is a provident act, and affords the best chance of securing the d.ebt.” But it is said that the postponement upon one occasion was at the request of the mortgagor, and in consideration of his note for two hundred dollars, and that the case is therefore one of giving time in pursuance of a valid contract for that purpose. But the note itself in that case would be void, and could not avail as a consideration to support the agreement to give time. (Pitman’s Pr. and Surety, 168. 2 Am. Lead. Cases, 171. Tudor v. Goodlow, 1 B. Monroe, 322. Pyle v. Clark, 3 Id. 262, and Scott v. Hull, 6 Id. 285, cited 2 Am. Lead. Cases, 173. 1 Comstock, 274.) In this case, the usurious character of the note forming the consideration of this agreement, appears by the plaintiff’s showing, and is not set up and proved by the defendant to invalidate an agreement apparently valid. We may add that the postponements of the sale were with the knowledge and assent of Gardner Lawrence, one of the co-sureties with the plaintiff in this suit and a joint debtor with him. We then come to the delay in docketing the decree for the deficiency, so as to make it a lien upon the real property of the mortgagor, and in enforcing the collection thereof by execution, from the last of July, 1841, until about the 1st of May, 1842.
During all this time, the defendant did no act inconsistent with the rights of the plaintiff as a surety. He was merely inactive. He did not, as in Williams v. Price, sue out executions, and then withhold them from the proper officer ; or negotiate with the mortgagor to give- him further time, by agreement, and take bills for the amount of the debt on time, which in that case the vice chancellor held to be such an interference and assumption of control over the judgment as operated to discharge the surety. In this case, the plaintiff might at any time have paid the debt,, and been subrogated to the rights of the defendant to the bond and mortgage and decree thereon, and have received the" same unembarrassed by any agreement or negotiation by the defendant, and in a situation to be immediately enforced. The defendant had foreclosed the mortgage and sold the mortgagéd premises, and then remained passive, as we think he might safely do, without prejudicing his claims,, upon the surety. If Jackson and Bradley had been the principal debtors, and he had commenced proceedings against them, he could have stopped at any stage, and the surety could not complain. (Lenox v. Prout, 3 Wheaton, 520. Com. of Berks Co. v. Ross, 3 Binney, 520. United States v. Simpson, 3 Penn. 457. Minerdorff v. Snyder, 5 Watts, 179.) The most that can be claimed, is that by the assignment of the bond and mortgage to the defendant, the obligors and mortgagors,. Jackson and Bradley, became quasi principal debtors, not only so far as the sureties for Baker are concerned, but that Baker, so far as these securities were concerned, became a quasi surety or entitled to all the rights of a surety; and in that view mere delay could not in any case vitiate the claim as against Baker and his sureties. There is no claim for relief made in the case peculiar to the plaintiff as a surety ; and all the defendants in the judgment should have been parties to the suit. (Beggs v. Butler, 9 Paige, 226. Boughton v. Allen, 11 Id. 321.) But this point was not made in the answer, nor upon the argument, and the decision is not therefore put upon the ground of a want of parties.
The next claim is, that certain payments should be allowed which might have been allowed upon the trial of the suit at law. The plaintiff had a perfect remedy in respect to these payments, in the action at law, and should have sought it there. But this point is not taken in the answer as distinctly as it should have been; and there is equity in the claim of the plaintiff to have them allowed at this time. The agreement of the defendant was to make certain admissions upon the trial, and the attorney for the plaintiff testifies, that in consideration of that agreement he agreed not to defend the suit, and relying upon it, omitted to attend upon the trial; and the defendant in pleading admits this to be true, by denying in his answer that he ever attempted or intended to enforce the judgment for the full amount. It is true, that after verdict, the plaintiff and his co-debtors might and should have sought relief in the court in which the suit was pending. He, by his attorney, had notice very shortly after the verdict, that the payments had not been allowed, and addressed the defendant upon the subject. (Story’s Eq. Jur. §§ 894, 895. Marine Ins. Co. v. Hodgson, 7 Cranch, 332.) But the defendant says he never claimed the full amount of the judgment, and does not very distinctly take the ground that the remedy was at law, and we therefore though with some hesitation, allow the payments_ at this time. The plaintiff next claims that the defendant should be decreed to have taken the title to the premises purchased by him upon the foreclosure of the Jackson and Bradley mortgage in trust as security for the payment of the debt, and for the benefit of the debtors. There is a difficulty in making such decree, for want of parties. Lawrence, Baker, and the representatives of Wood will not be bound by the decree. After the sale of the premises and an accounting with the present plaintiff in respect to the trust property, they may call upon him to account with them; of they may repudiate the trust and insist that he purchased the property for himself atvthe price bid, and that that sum was absolutely paid upon the judgment at that time ; and the defendant may be called to litigate that question. But inasmuch as the defendant did not, in fact, credit the amount of his bid upon the note, and thus give color to the claim that he had bought the premises as trustee to apply the avails, whatever they might be, upon a resale, to the payment of the debt, and as bis counsel upon the argument conceded that such decree might be entered, a decree may be entered declaring that the defendant holds the premises upon the same trusts, and for the same purposes, that he held the bond and mortgage, and directing a reference to Peter Out water, jun. to ascertain and compute the amount paid to the plaintiff upon the verdict in the suit at law, and which should then have been credited and allowed to the plaintiff and his co-debtors, and directing the allowance of said sum with interest, in part payment of the judgments; and also to ascertain and compute the amount due to him for the amount paid to acquire the Colvin mortgage, and for taxes, insurances, agencies and other expenses in and about the property and its preservation, with interest to the date of the report, deducting what he may have received for rents and profits, and directing a sale thereof, at public auction, upon the notice required for the sale of real es-tate on an execution at law; and that out of the proceeds thereof be paid, 1, the amount which shall be reported due to the defendant for said payments, with interest to the time of payment; and 2d, the residue to the defendant, to apply in payment of his judgment mentioned in the pleadings, and that' said judgment be deemed satisfied, to the amount so paid.
Neither party is to have costs against the other. For although the plaintiff has succeeded in part he had made no call upon the defendant for the relief now obtained, before filing the bill; and the defendant, although he has succeeded on the principal grounds, should have demurred to the bill. He has increased the costs by his defence, unnecessarily, and therefore should not recover them as against the plaintiff. | CASELAW |
Talk:Cocoa production in Ghana/to do
* Possible link to look at for information
https://ac.els-cdn.com/S0959652607002429/1-s2.0-S0959652607002429-main.pdf?_tid=c75ca23e-fa52-45bc-b000-71fc250d0a21&acdnat=1551570416_6c6f8895ded9fbdbc3bf1c08bd5c51c8StephBephh (talk) 23:55, 2 March 2019 (UTC) | WIKI |
List of tallest structures in Portugal
This is a list of buildings and nonbuilding structures in Portugal with a confirmed minimum height of 100 m (328 ft). | WIKI |
Page:Crhist (sic) on the cross suffering for sinners, or, The sinners redemption, sanctification and exaltation by the death and bitter passion of our Lord and Saviour Jesus Christ.pdf/5
Rh higheſt thrones of felicity, joy, and glory, which is the moſt infinite and unſpeakable, wearing crowns of gold, bedeckt with princely diamonds, to illuſtrate their happineſs with more glory.
O my beloved friend, heaven itſelf is lovely, beautiful, rich, full of pleaſure, joy and felicity: it is a manſion of virtue, a paradiſe of pleaſure, the kingdom of God and the crown of glory. Then ſince Chriſt was born to redeem us, let us run that we may obtain, let us lay hold on Chriſt by faith, and follow the ſteps of the apoſtles, and follow the due and true worſhip of God; but let us not follow every whimſical brain which diſturbs both the church and the ſtate. One ſays, Here is Chriſt; another ſays, Lo there is Chriſt; but believe them not, but ſearch the ſcriptures, and there you ſhall find where our bleſſed Lord and Saviour Jeſus Chriſt is, ſitting at the right hand of God in power and glory.
Alſo take our bleſſed Saviour's words for a teſtimony of this truth. Read Math. xxiv. quite thro', which foretelleth of falſe Chriſts and falſe prophets: And ſo in the epiſtle of Jude, you ſhall find that the prophefies of old are now come to paſs; for how many new Chriſts and new prophets, and ſtrange confuſed opinions have we had in this latter age? And ſure enough there is but one God, one faith, one baptiſm, and one entire commandment, which is according to the words of our bleſſed Redeemer, Matth. xxii. 27. And Jeſus ſaid unto them, Thou ſhalt love the Lord thy God with all thy ſoul, with all thy heart, and with all thy mind. I know no purer religion than this is, firſt to love God above all, and your neighbour as yourſelf, and according to the words of our bleſſed Lord and Saviour Jeſus Chriſt, for every one to do unto ano- ther | WIKI |
Page:Principles of Psychology (1890) v1.djvu/46
26 through the mind. The effect on the child's conduct when the candle-flame is next presented is easy to imagine. Of course the sight of it arouses the grasping reflex; but it arouses simultaneously the idea thereof, together with that of the consequent pain, and of the final retraction of the hand; and if these cerebral processes prevail in strength over the immediate sensation in the centres below, the last idea will be the cue by which the final action is discharged. The grasping will be arrested in mid-career, the hand drawn back, and the child's fingers saved.
In all this we assume that the hemispheres do not natively couple any particular sense-impression with any special motor discharge. They only register, and preserve traces of, such couplings as are already organized in the reflex centres below. But this brings it inevitably about that, when a chain of experiences has been already registered and the first link is impressed once again from without, the last link will often be awakened in idea long before it can exist in fact. And if this last link were previously coupled with a motion, that motion may now come from the mere ideal suggestion without waiting for the actual impression to arise. Thus an animal with hemispheres acts in anticipation of future things; or, to use our previous formula, he acts from considerations of distant good and ill. If we give the name of partners to the original couplings of impressions with motions in a reflex way, then we may say that the function of the hemispheres is simply to bring about exchanges among the partners. Movement mn, which natively is sensation sn's partner, becomes through the hemispheres the partner of sensation s1, s2 or s3. It is like the great commutating switch-board at a central telephone station. No new elementary process is involved; no impression nor any motion peculiar to the hemispheres; but any number of combinations impossible to the lower machinery taken alone, and an endless consequent increase in the possibilities of behavior on the creature's part.
All this, as a mere scheme, is so clear and so concordant | WIKI |
Page:Ovid's Metamorphoses (Vol. 1) - tr Garth, Dryden, et. al. (1727).djvu/75
Book He adds the running Springs, and standing Lakes; And bounding Banks for winding Rivers makes. Some part, in Earth are swallow'd up, the most In ample Oceans, disembogu'd, are lost. He shades the Woods, the Vallies he restrains With rocky Mountains, and extends the Plains. And as five Zones th' Ætherial Regions bind, Five, Correspondent, are to Earth assign'd: The Sun with Rays, directly darting down, Fires all beneath, and fries the middle Zone: The two beneath the distant Poles, complain Of endless Winter, and perpetual Rain. Betwixt th' Extreams, two happier Climates hold The Temper that partakes of Hot, and Cold. The Fields of liquid Air, inclosing all, Surround the Compass of this earthly Ball: The lighter parts lye next the Fires above; The grosser near the watry Surface move: Thick clouds are spread, and Storms engender there, And Thunder's Voice, which wretched Mortals fear, And Winds that on their Wings cold Winter bear. Nor were those blustring Brethren left at large, On Seas, and Shores, their Fury to discharge: Bound as they are, and circumscrib'd in place, They rend the World, resistless, where they pass; And mighty Marks of Mischief leave behind; Such is the Rage of their tempestuous kind. First Eurus to the rising Morn is sent, (The Regions of the balmy Continent;) And Eastern Realms, where early Persians run, To greet the blest appearance of the Sun. Westward, the wanton Zephyr wings his Flight; Pleas'd with the Remnants of departing Light: Fierce Boreas, with his Off-spring, issues forth T' invade the frozen Waggon of the North. Rh | WIKI |
loading
Lifestyle changes for a healthier menopause
Lifestyle changes for a healthier menopause
There are several lifestyle changes that can help alleviate the symptoms of menopause and improve overall health during this time. These include:
1. Maintaining a healthy diet: Eating a diet rich in fruits, vegetables, and whole grains, and low in processed and high-fat foods, can help reduce hot flashes and improve overall health.
2. Staying active: Regular physical activity can help manage menopausal symptoms such as weight gain, hot flashes, and sleep problems, as well as improve overall health.
3. Reducing stress: Stress can exacerbate menopausal symptoms, so finding ways to manage stress through relaxation techniques such as deep breathing or yoga, or seeking support from friends and family, can be helpful.
4. Getting enough sleep: As mentioned earlier, sleep disturbances are common during menopause. Establishing a regular sleep schedule and creating a cool and comfortable sleep environment can help improve sleep quality.
5. Limiting alcohol and caffeine: Alcohol and caffeine can interfere with sleep and exacerbate hot flashes, so it may be helpful to limit consumption of these substances during menopause.
6. Quit smoking: Smoking can increase the risk of menopausal symptoms such as hot flashes, as well as many other health problems. Quitting smoking can help improve overall health during menopause.
MENOPAUSE: JOINTS
It is not uncommon for women to experience joint pain or stiffness during menopause. This can be due to the hormonal changes that occur during this time, as well as the natural aging process. Estrogen plays a role in maintaining bone density and joint health, and the decline of estrogen during menopause can lead to an increased risk of osteoporosis and joint problems. In addition, menopause can also be associated with weight gain, which can put added strain on the joints. To help manage joint pain during menopause, it is important to maintain a healthy weight through diet and exercise, and to engage in regular physical activity to strengthen the muscles around the joints. It may also be helpful to try low-impact exercises such as swimming or cycling, and to use heat or cold therapy to alleviate joint pain. If joint pain is severe or persists despite self-care measures, it is good to speak with a healthcare provider for further evaluation..
MENOPAUSE SKIN AND HAIR
During menopause, some women may experience changes in their skin and hair. These changes can be due to the hormonal changes that occur during menopause, as well as the natural aging process.
Changes in the skin during menopause can include:
• Dryness: Estrogen helps keep the skin moisturized and elastic, and the decline of estrogen during menopause can lead to dry, itchy skin.
• Wrinkles: The loss of collagen and elastin, which give the skin its structure and elasticity, can lead to the development of wrinkles.
• Thin skin: The thinning of the skin, which can occur with age, can make it more prone to bruising and irritation.
• Acne: Hormonal changes during menopause can lead to an increase in androgens, which can cause acne.
To help manage changes in the skin during menopause, it is important to:
• Use a moisturizer: Moisturizing the skin can help alleviate dryness and itching.
• Protect the skin from the sun: Using a broad-spectrum sunscreen with an SPF of at least 30 can help prevent sun damage and reduce the risk of skin cancer.
• Avoid hot showers: Hot water can strip the skin of its natural oils, so it is important to use lukewarm water when showering.
• Quit smoking: Smoking can cause the skin to age prematurely and may worsen menopausal skin changes.
Changes in the hair during menopause can include:
• Thinning hair: The decline of estrogen during menopause can lead to hair loss or thinning.
• Dry hair: Menopause can also cause the hair to become dry and brittle.
To help manage changes in the hair during menopause, it is important to:
• Use a gentle shampoo: Avoid using harsh shampoos that can strip the hair of its natural oils.
• Use a conditioner: Conditioning the hair can help add moisture and improve its appearance.
• Avoid heat styling: Heat styling can damage the hair, so it is important to use heat-protective products when styling and to avoid using hot rollers, curling irons, and flat irons too frequently.
• Eat a healthy diet: A diet rich in protein, iron, and other nutrients is important for maintaining healthy hair.
If changes in the skin or hair persist or are severe, it is good to speak with a healthcare provider for further evaluation and know the treatment options.
Leave your thought here | ESSENTIALAI-STEM |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.