Document
stringlengths 87
1.67M
| Source
stringclasses 5
values |
|---|---|
Page:United States Statutes at Large Volume 31.djvu/485
FIFTY-SIXTH CONGRESS. SEss. I. Ch. 786. 1900. 433 and his oral examination important and desirable, may indorse upon the subpoena an order for the attendance of the witness; the service of such subpoena and order and the payment of legal fees to the witness are sufficient to— require his attendance, if he be served within the district. Sec. 631. A person present in court or before a judicial officer may €1;gg<>t%r;€$§¤t combe required to testify in the same manner as if he were in attendance P S y' before such court or officer on a subpoena. ' Sec. 632. Disobedience to a subpoena, or a refusal to be sworn, or to grjiogmisncsivsug answer as a witness, or to subscribe an aflidavit or deposition when P ’ °w wm E ` required, may be punished as a contempt by the court or officer before ° whom he is required to attend or the refusal takes place, and if the witness be a party his complaint, answer, or reply may be stricken out. · SEc. 633. A witness disobeying a subpoena duly served shall forfeit Fcrfeiture therefor. to the party reqlpiring his atten ance the sum of fifty dollars and all damages w ich e may sustain by the failure of the witness to attend, which forfeiture and damages may be recovered by an action. at law. Sec. 634. In case of the failure of a witness to attend, the court or wasn wamnt may officer before whom he is required to attend, upon proof of the due l,Q§,§§f*“‘*‘“° b’"l¤gW“# service of the subpoena and tender of his fees, may 1ssue a warrant to » the marshal requiring him to arrest the witness and bring him before the court or officer where his attendance was required. Sec. 635. Every·warrant of commitment issued by a court or officer wtnpmt trimester pursuant to this chapter shall specify therein the cause of the commit- °°”“‘“"“"“*· ment; and if it be for refusing to answer a question such question shall be stated in the warrant. Sec. 636. If the witness be a prisoner, confined in a prison within If witness bettpnsthe district, an order for his examination in the prison upon a deposi- §§‘§§,,,;‘,§’,§‘Q,d§’r°d“°€d tion, or for his temporary removal and production, before a court or oificer, for the purpose of being orally examined, may be made as follows: First. By the court or judge thereof in which the action or proceedin is pending, unless it be a court of a justice of the peace; Second. By any judge of a court of record, when the action or proceeding is pending in a justice’s court, or when the witness’s deposition, affidavit, or oral examination is required before a judge or other person out of court; Third. Such order shall only be made uppn the ailidavit of the party desiring the order, or some one on his be alf, showing the nature of · the action or roceeding, the testimony expected from the witness, and its materiaility; Fourth. If the witness be imprisoned at the place where the action or ' proceeding is pending, and for a cause other than a sentence for felony, is production may be required; in all other cases his examination shall be taken by deposition. CHAPTER SIXTY. or THE MODE OF TAKING THE TESTIMONY OF WITNESS. Sec. ‘ Sec. 637. How authenticated if taken outside640. Proof of publication by affidavit. the district. 641. Where affidavit may be filed, and 638. Aiiidavit, when may be used. effect thereof. 639. When deponent to be produced for cross-examination. Sec. 637. An aiiidavit or deposition taken in any State or Territory _ new authenticated Of the United States, the District of Columbia, or in a foreign coun- gi,§1§§“ °“'“‘°° ’h° vox. xxxi-——28
|
WIKI
|
CREATE POLICY
CREATE POLICY — define a new row level security policy for a table
Synopsis
CREATE POLICY name ON table_name
[ FOR { ALL | SELECT | INSERT | UPDATE | DELETE } ]
[ TO { role_name | PUBLIC | CURRENT_USER | SESSION_USER } [, ...] ]
[ USING ( using_expression ) ]
[ WITH CHECK ( check_expression ) ]
Description
The CREATE POLICY command defines a new row-level security policy for a table. Note that row-level security must be enabled on the table (using ALTER TABLE ... ENABLE ROW LEVEL SECURITY) in order for created policies to be applied.
A policy grants the permission to select, insert, update, or delete rows that match the relevant policy expression. Existing table rows are checked against the expression specified in USING, while new rows that would be created via INSERT or UPDATE are checked against the expression specified in WITH CHECK. When a USING expression returns true for a given row then that row is visible to the user, while if false or null is returned then the row is not visible. When a WITH CHECK expression returns true for a row then that row is inserted or updated, while if false or null is returned then an error occurs.
For INSERT and UPDATE statements, WITH CHECK expressions are enforced after BEFORE triggers are fired, and before any actual data modifications are made. Thus a BEFORE ROW trigger may modify the data to be inserted, affecting the result of the security policy check. WITH CHECK expressions are enforced before any other constraints.
Policy names are per-table. Therefore, one policy name can be used for many different tables and have a definition for each table which is appropriate to that table.
Policies can be applied for specific commands or for specific roles. The default for newly created policies is that they apply for all commands and roles, unless otherwise specified. Multiple policies may apply to a single command; see below for more details. Table 1 summarizes how the different types of policy apply to specific commands.
For policies that can have both USING and WITH CHECK expressions (ALL and UPDATE), if no WITH CHECK expression is defined, then the USING expression will be used both to determine which rows are visible (normal USING case) and which new rows will be allowed to be added (WITH CHECK case).
If row-level security is enabled for a table, but no applicable policies exist, a default deny policy is assumed, so that no rows will be visible or updatable.
Parameters
name
The name of the policy to be created. This must be distinct from the name of any other policy for the table.
table_name
The name (optionally schema-qualified) of the table the policy applies to.
command
The command to which the policy applies. Valid options are ALL, SELECT, INSERT, UPDATE, and DELETE. ALL is the default. See below for specifics regarding how these are applied.
role_name
The role(s) to which the policy is to be applied. The default is PUBLIC, which will apply the policy to all roles.
using_expression
Any SQL conditional expression (returning boolean). The conditional expression cannot contain any aggregate or window functions. This expression will be added to queries that refer to the table if row level security is enabled. Rows for which the expression returns true will be visible. Any rows for which the expression returns false or null will not be visible to the user (in a SELECT), and will not be available for modification (in an UPDATE or DELETE). Such rows are silently suppressed; no error is reported.
check_expression
Any SQL conditional expression (returning boolean). The conditional expression cannot contain any aggregate or window functions. This expression will be used in INSERT and UPDATE queries against the table if row level security is enabled. Only rows for which the expression evaluates to true will be allowed. An error will be thrown if the expression evaluates to false or null for any of the records inserted or any of the records that result from the update. Note that the check_expression is evaluated against the proposed new contents of the row, not the original contents.
Per-Command Policies
ALL
Using ALL for a policy means that it will apply to all commands, regardless of the type of command. If an ALL policy exists and more specific policies exist, then both the ALL policy and the more specific policy (or policies) will be applied. Additionally, ALL policies will be applied to both the selection side of a query and the modification side, using the USING expression for both cases if only a USING expression has been defined.
As an example, if an UPDATE is issued, then the ALL policy will be applicable both to what the UPDATE will be able to select as rows to be updated (applying the USING expression), and to the resulting updated rows, to check if they are permitted to be added to the table (applying the WITH CHECK expression, if defined, and the USING expression otherwise). If an INSERT or UPDATE command attempts to add rows to the table that do not pass the ALL policy's WITH CHECK expression, the entire command will be aborted.
SELECT
Using SELECT for a policy means that it will apply to SELECT queries and whenever SELECT permissions are required on the relation the policy is defined for. The result is that only those records from the relation that pass the SELECT policy will be returned during a SELECT query, and that queries that require SELECT permissions, such as UPDATE, will also only see those records that are allowed by the SELECT policy. A SELECT policy cannot have a WITH CHECK expression, as it only applies in cases where records are being retrieved from the relation.
INSERT
Using INSERT for a policy means that it will apply to INSERT commands. Rows being inserted that do not pass this policy will result in a policy violation error, and the entire INSERT command will be aborted. An INSERT policy cannot have a USING expression, as it only applies in cases where records are being added to the relation.
Note that INSERT with ON CONFLICT DO UPDATE checks INSERT policies' WITH CHECK expressions only for rows appended to the relation by the INSERT path.
UPDATE
Using UPDATE for a policy means that it will apply to UPDATE, SELECT FOR UPDATE and SELECT FOR SHARE commands, as well as auxiliary ON CONFLICT DO UPDATE clauses of INSERT commands. Since UPDATE involves pulling an existing record and replacing it with a new modified record, UPDATE policies accept both a USING expression and a WITH CHECK expression. The USING expression determines which records the UPDATE command will see to operate against, while the WITH CHECK expression defines which modified rows are allowed to be stored back into the relation.
Any rows whose updated values do not pass the WITH CHECK expression will cause an error, and the entire command will be aborted. If only a USING clause is specified, then that clause will be used for both USING and WITH CHECK cases.
Typically an UPDATE command also needs to read data from columns in the relation being updated (e.g., in a WHERE clause or a RETURNING clause, or in an expression on the right hand side of the SET clause). In this case, SELECT rights are also required on the relation being updated, and the appropriate SELECT or ALL policies will be applied in addition to the UPDATE policies. Thus the user must have access to the row(s) being updated through a SELECT or ALL policy in addition to being granted permission to update the row(s) via an UPDATE or ALL policy.
When an INSERT command has an auxiliary ON CONFLICT DO UPDATE clause, if the UPDATE path is taken, the row to be updated is first checked against the USING expressions of any UPDATE policies, and then the new updated row is checked against the WITH CHECK expressions. Note, however, that unlike a standalone UPDATE command, if the existing row does not pass the USING expressions, an error will be thrown (the UPDATE path will never be silently avoided).
DELETE
Using DELETE for a policy means that it will apply to DELETE commands. Only rows that pass this policy will be seen by a DELETE command. There can be rows that are visible through a SELECT that are not available for deletion, if they do not pass the USING expression for the DELETE policy.
In most cases a DELETE command also needs to read data from columns in the relation that it is deleting from (e.g., in a WHERE clause or a RETURNING clause). In this case, SELECT rights are also required on the relation, and the appropriate SELECT or ALL policies will be applied in addition to the DELETE policies. Thus the user must have access to the row(s) being deleted through a SELECT or ALL policy in addition to being granted permission to delete the row(s) via a DELETE or ALL policy.
A DELETE policy cannot have a WITH CHECK expression, as it only applies in cases where records are being deleted from the relation, so that there is no new row to check.
Table 1. Policies Applied by Command Type
CommandSELECT/ALL policyINSERT/ALL policyUPDATE/ALL policyDELETE/ALL policy
USING expressionWITH CHECK expressionUSING expressionWITH CHECK expressionUSING expression
SELECTExisting row
SELECT FOR UPDATE/SHAREExisting rowExisting row
INSERTNew row
INSERT ... RETURNING New row [a]New row
UPDATE Existing & new rows [a]Existing rowNew row
DELETE Existing row [a]Existing row
ON CONFLICT DO UPDATEExisting & new rowsExisting rowNew row
[a] If read access is required to the existing or new row (for example, a WHERE or RETURNING clause that refers to columns from the relation).
Application of Multiple Policies
When multiple policies of different command types apply to the same command (for example, SELECT and UPDATE policies applied to an UPDATE command), then the user must have both types of permissions (for example, permission to select rows from the relation as well as permission to update them). Thus the expressions for one type of policy are combined with the expressions for the other type of policy using the AND operator.
When multiple policies of the same command type apply to the same command, then at least one of the policies must grant access to the relation. Thus the expressions from all the policies of that type are combined using the OR operator. If there are no applicable policies, then access is denied.
Note that, for the purposes of combining multiple policies, ALL policies are treated as having the same type as whichever other type of policy is being applied.
For example, in an UPDATE command requiring both SELECT and UPDATE permissions, if there are multiple applicable policies of each type, they will be combined as follows:
(
expression from SELECT/ALL policy 1
OR
expression from SELECT/ALL policy 2
OR
...
)
AND
(
expression from UPDATE/ALL policy 1
OR
expression from UPDATE/ALL policy 2
OR
...
)
Notes
You must be the owner of a table to create or change policies for it.
While policies will be applied for explicit queries against tables in the database, they are not applied when the system is performing internal referential integrity checks or validating constraints. This means there are indirect ways to determine that a given value exists. An example of this is attempting to insert a duplicate value into a column that is a primary key or has a unique constraint. If the insert fails then the user can infer that the value already exists. (This example assumes that the user is permitted by policy to insert records which they are not allowed to see.) Another example is where a user is allowed to insert into a table which references another, otherwise hidden table. Existence can be determined by the user inserting values into the referencing table, where success would indicate that the value exists in the referenced table. These issues can be addressed by carefully crafting policies to prevent users from being able to insert, delete, or update records at all which might possibly indicate a value they are not otherwise able to see, or by using generated values (e.g., surrogate keys) instead of keys with external meanings.
Generally, the system will enforce filter conditions imposed using security policies prior to qualifications that appear in user queries, in order to prevent inadvertent exposure of the protected data to user-defined functions which might not be trustworthy. However, functions and operators marked by the system (or the system administrator) as LEAKPROOF may be evaluated before policy expressions, as they are assumed to be trustworthy.
Since policy expressions are added to the user's query directly, they will be run with the rights of the user running the overall query. Therefore, users who are using a given policy must be able to access any tables or functions referenced in the expression or they will simply receive a permission denied error when attempting to query the table that has row-level security enabled. This does not change how views work, however. As with normal queries and views, permission checks and policies for the tables which are referenced by a view will use the view owner's rights and any policies which apply to the view owner.
Additional discussion and practical examples can be found in Section 5.7.
Compatibility
CREATE POLICY is a Postgres Pro extension.
|
ESSENTIALAI-STEM
|
Ottaal
Ottaal (English: The Trap) is a 2015 Indian Malayalam film directed by Jayaraj, an adaptation of the short story "Vanka" by Russian author Anton Chekhov. This film stars Ashanth K Sha and Kumarakom Vasudevan, as well as actors Shine Tom Chacko, Sabitha Jayaraj and Thomas G. Kannampuzha.
It became the first movie in India to be released online on the same day as its theatrical release. The film made history, becoming the first ever Malayalam movie to have swept all the top awards in the 20-year history of the International Film Festival of Kerala. The film was one of four Malayalam films selected to be a part of the Indian Panorama at the International Film Festival of India in Goa in November 2015.
Plot
This film tells the story of a young boy (Ashanth K Sha) and his relationship with his grandfather (Kumarakom Vasudevan), his only living relative in the world. Actor Kumarakom Vasudevan is a fisherman in real life, whom Director Jayaraj found during his hunt for actors to play the role. Shine Tom Chacko’s character, Mesthri, also has a pivotal role in the story. Ottaal is an adaptation of one of Anton Chekhov’s timeless works, Vanka. A story of the 18th century, but one that has travelled the time and space to be retold in the present day at a small village in the South of India.
Cast
* Master Ashanth K Sha as Kuttappai
* Kumarakaom Vasudevan as Vallyappachayi
* Shine Tom Chacko as Mesthri
* Thomas J Kannampuzha as Betty
* Sabitha Jayaraj as Moly
* Master Hafis Muhammed as Tinku
* Vavachan as Outha
Soundtrack
The film has one song, "Aa Manathilirrunnu", composed by Padma Bhushan Kavalam Narayana Panicker. The background score composed by Sreevalsan J. Menon was praised by the jury when the film won the Crystal Bear at the Berlinale 2016.
Release and reception
The film was released in theaters in Kerala on 6 November 2015 and online on the same day through Reelmonk, making it the first Indian film to be released simultaneously in theaters and on the internet.
|
WIKI
|
Health care reform didn't die from a lack of transparency.
Click here for a guide to following the health care reform story online. See images from Obama's first year in office, as well as past presidential speeches, from Magnum Photos. Part of what I had campaigned on was changing how Washington works, opening up transparency, and I think it isI think the health care debate as it unfolded legitimately raised concerns not just among my opponents, but also amongst supporters that we just don't know what's going on. And it's an ugly process and it looks like there are a bunch of backroom deals. Now I think it's my responsibility and I'll be speaking to this at the State of the Union, to own up to the fact that the process didn't run the way I ideally would like it to and that we have to move forward in a way that recaptures that sense of opening things up more.President Barack Obama apologizing to one-time Nixon aide Diane Sawyer of ABC News for breaking his stupid campaign promise to put all health care negotiations on C-SPAN. It doesn't worry me that he said it. What worries me is that he may believe it.American politics has never been more transparent than it is today. You can watch Congress on C-SPAN. You can slice and dice political campaign contributions on the Center for Responsive Politics' Web site, OpenSecrets.org or go direct to the source on the Federal Election Commission's Web site. You can riffle through White House aides' financial disclosure forms and find out who's been visiting the White House. You can even see the newest U.S. senator in the nude. Want to follow health care reform? The hearings and markups of the House Committee on Energy and Commerce are archived here, the Senate health committee's hearings and markups are archived here, and the Senate finance committee's hearings and markups are archived here (under September 2009). Every print document relating to the House and Senate bills that you could possibly want is available here. In the ABC News interview, Sawyer said, A lot of people think you must say at the end of the day, this is not who I was in 2008, these deals with Nebraska, with Florida. That obviously irritated the president, who replied: Let's hold on a second, Diane. I mean, I think that this gets into a big mush. So let's just clarify. I didn't make a bunch of deals. There is a legislative process that is taking place in Congress, and I am happy to own up to the fact that I have not changed Congress and how it operates the way I would have liked. But the real problem isn't that Obama failed to transform Congress into a magical place where legislation is so obviously virtuous that base horse-trading is unnecessary. The problem is that Obama (if we take him at his word) wouldn't dirty his fingernails in the service of extending health insurance to somewhere between 31 million and 36 million of the 45 million people who don't have it. After defending the health care bill to Sawyer on its merits, Obama abased himself over the special deals secured by the last Senate holdouts: [T]hat doesn't excuse the stray cats and dogs that found their way into legislation. Obama probably felt he had to say that because the Cornhusker Kickback and other sweetheart deals apparently enraged the public and may have helped Republican Scott Brown win his special election in Massachusetts. But Obama surely understands that this sort of legislative deal-making has always been routine in Washington; indeed, the city itself exists as a result of such deal-making. Must we also condemn the Compromise of 1790 because it bought off Southern legislators who previously blocked the federal assumption of state debt by locating the capital on the Potomac River? The president appears to be suggesting that it wasn't good enough for the public to find out almost immediately what it was that moved Sen. Ben Nelson, D-Neb., from a nay vote to a yea. We ought to have been able to witness Senate Majority Leader Harry Reid dangling this bauble before Nelson's greedy eyes. Or, since that exchange would probably not have occurred on camera, I guess Obama is saying that C-SPAN's sunlight would have disinfected Reid's backroom deal-making to the point that the Cornhusker Kickback would never have been offered. Which would have been fine if you didn't care whether the Democrats secured Nelson's 60th vote to pass health reform. I don't mean to pooh-pooh transparency in government. Obviously it's a good thing. The pathological degree to which former Vice President Dick Cheney operated in secrecy led to government abuses that we'll probably spend years learning about. But in conducting the people's business surely there are moments when politicians need to speak frankly and sometimes unattractively to one another. The University of Virginia's Miller Center For Public Affairs features a treasure trove of secret presidential recordings that capture such moments. Here, for example, is a 1940 tape of President Franklin Roosevelt discussing with civil rights leaders various options to integrate the militarya conversation that, had it been made public, would have damaged Roosevelt's relationships with powerful Southern Democrats in Congress. (Seventy years later, we're more likely to be appalled by Roosevelt's cautiousness and by his observation, There's no reason we shouldn't have a colored band on some of these ships, because they're darned good at it.) Here is a tape of President John F. Kennedy during the 1962 Cuban Missile Crisis discussing whether to trade Russian missiles in Cuba for American missiles in Turkeya concession that, if made public, might have scuttled the peaceful resolution. And here is a 1963 tape of President Lyndon Johnson, arguably the greatest backroom deal-maker to inhabit the Oval Office, bullying Rep. Albert Thomas, D-Texas, into keeping secret a Soviet wheat deal because [i]t just publicizes that I'm pro-Russian right when Nixon's running against me. (Nixon himself would later advance a larger Soviet wheat deal of his own.) There may even exist a tape somewhere of President Richard Nixon saying something indiscreet within the privacy of the Oval Office that advanced the nation's larger interests. (For the most part, Nixon's private mutterings inside the Oval Office reveal him to be pathological and corrupt. Indeed, Nixon's abuse of power goes a long way toward explaining why today's public is too quick to judge any exercise of power at all as immoral.) The same principle holds for Congress. In their book Showdown at Gucci Gulch, Jeffrey H. Birnbaum and Alan Murray point out that in writing the 1986 tax reform bill, which eliminated scores of loopholes, the Senate finance committee was unable to move forward until it kicked the lobbyists (and everyone else) out of the hearing room and started drafting the bill in secret. By claiming that the health care bill was crafted too much in secret, Obama is ignoring this history. He is also failing to acknowledge that his own greatest failing as president is a kind of moral vanity. He is unwilling to set his virtue aside when his political goals require some private cajoling that might not play well on the evening news. Unfortunately, that's part of the job. We elected him to be president, not saint. Update, 9:40 p.m.: Fromtonight's State of the Union speech: [Health care reform] is a complex issue, and the longer it was debated, the more skeptical people became. I take my share of the blame for not explaining it more clearly to the American people. And I know that with all the lobbying and horse-trading, this process left most Americans wondering what's in it for them. This American wonders whether a little more horse-trading, especially by Obama himself, would have gotten the damned thing done by now. E-mail Timothy Noah at chatterbox@slate.com. Slate is published by The Slate Group, a Graham Holdings Company. All contents 2016 The Slate Group LLC. All rights reserved.
|
NEWS-MULTISOURCE
|
Page:Gude Wallace.pdf/2
wicht, upon a nicht,
Cam' riding ower a linn;
And he is to his leman's bouir,
And tirl'd at the pin.
"O sleep ye, or wake ye, lady?” he cried;
“ Ye'll rise and let me in.”
"O wha is this at my bouir door,
That knocks and knows my name?"
“My name is William Wallace;
Ye may my errand ken.”
"The truth to you I will rehearse-
The secret I'll unfauld;
Into your enemies' hands, this nicht,
I fairly ha'e you sauld."
"If that be true ye tell to me,
Do ye repent it sair?"
"Oh that I do," she said, "dear Wallace,
And will do evermair!
"The English did surround my house,
And forcit me theretill;
But for your sake, my dear Wallace,
I could burn on a hill."
Then he ga'e her a loving kiss;
The teir drapt frae his e'e;
|
WIKI
|
Table of Contents
OIL2 Class Standard.HTTPcreateApplicationSession
class Standard . HTTPcreateApplicationSession {
string applicationClass;
string cookieName;
string cookieRoot;
any lastSessionID;
string pageName;
oid serviceOID;
oid urlDirectory;
inherits from Object;
DESCRIPTION
The HTTPcreateApplicationSession class is intended to be inherited by applications that integrate with the FARGOS/VISTA HTTPdaemon. It implements a facility for launching HTTP-based applications that generate dynamic content that is associated with single user's current activity.
The primary function of HTTPcreateApplicationSession is to launch an HTTP-based application that will be associated with a specific user. The trigger will be registered as a logical entity within the web server's naming tree. When accessed via an HTTP GET request, the HTTPcreateApplicationSession object will dynamically allocate a unique section of the web site's naming tree and create a new instance of the desired HTTP-based application. All of the user-specific dynamically-generated content should be registered under the portion of the web site's naming tree.
If a user's browser supports cookies, the provided cookie data will be used to reassociate a user with an already active session rather than create a brand new one. Some applications make use of only the makeSessionID method of this class. By always using makeSessionID as the standard mechanism for dynamically allocating a portion of a web site's naming tree, application developers can avoid any potential name space collisions.
METHODS
Standard.HTTPcreateApplicationSession:create
HTTPcreateApplicationSession:create()
Method Description
See initialize.
Standard.HTTPcreateApplicationSession:initialize
HTTPcreateApplicationSession:initialize(any serverName, string page, string className, optional string cookieKey, optional string cookiePath)
Method Description
The initialize method takes the following arguments:
serverName
the name of the URLdirectory to which the service should be attached.
If serverName is specified as "-", the system information attribute "hostName" is retrieved and used as the value of serverName. It can also be provided as the object Id of the desired server.
page
the logical page name where the service should appear in the document tree exported by the HTTPdaemon.
className
the class of new session objects.
Return Value
A return value of 0 indicates success. If the desired URLdirectory object cannot be located, -1 is returned to indicate the service could not be initialized.
Standard.HTTPcreateApplicationSession:getRequest
HTTPcreateApplicationSession:getRequest(array requestData, assoc options, string replyMethod, oid replyDest)
Method Description
The getRequest method handles HTTP GET requests. Such references to the object are treated as requests to shift the user's browser to a new browsing session generated by the application associated with the HTTPcreateApplicationSession object.
If the user's browser supports cookies, the sessionID of the user's last session is retrieved. If the indicated session is still active, then the browser is connected to that pre-existing session. If cookies are not supported or the session indicated by the cookie data no longer exists, then a brand-new session object is created to handle the user's future interactions.
|
ESSENTIALAI-STEM
|
Page:Zawis and Kunigunde (1895).djvu/300
parted, with the one great grief that included and covered them all. And as new spring light shone, and inspiring breezes breathed on the passive suiface of the landscape, and cheered the hearts, and quickened the blood of men, young hopes peeped out again through the mass of withered feelings, and fairer prospects bloomed amid the wreck of fallen greatness; and although these evidences of reviving life contrasted with the sad evidences of death around, yet the weary eye rested thankfully on the new beauty, and loved it as the beginning of a larger and more generous joy to come.
A lighter step moved within the halls and chambers; voices recovered a tone less whispered; eyes looked forward less dimmed and shrouded; and present cares and duties assumed the mastery over thoughts and hands.
The summer came with its glories; andin the midst of the affluence of health and rejoicing, of bloom and fruitage without, the Lady Judith habitually sat gazing on the charming scene, and feeling all the more keenly for the gladness before her the abrupt and painful severance of her own heart from the love that had filled her life with similar exuberance.
Beside her stood her boy, gazing sadly into his mother’s mourning face, and wondering why she felt so sad. Gradually, and with a flowing tear, she told himthe melancholy tale. “Bad men,” she said “had taken his papa from her and him;” and as the child inquired why they had done that, she could merely reply: “My son, I can only hope that you will grow
|
WIKI
|
User:NASCARaddicted
I am already a member of the german Wikipedia, but since the english version is much bigger, I also created account in here (however, the nickname that I use there was already taken here)
My main interest is: NASCAR, Root Beer and Heavy Metal (mainly Thrash Metal) --NASCARaddicted (talk) 20:20, 26 November 2008 (UTC)
|
WIKI
|
Title:
Tool for Planetary Probe Payload Sensor System Integration
Thumbnail Image
Author(s)
Schreck, Keith
Djordjevich, Nik
Papadopoulos, Periklis
Authors
Advisor(s)
Advisor(s)
Editor(s)
Associated Organization(s)
Collections
Supplementary to
Abstract
Determination of instrumentation for interplanetary science mission is an involved, complex procedure. A final design solution is achieved at the end of this often lengthy process. The analysis methodology performed within this work investigates mission requirements and generates a mission sensor package using design engineering relations. Given the broad science goals for an interplanetary science mission, the specific scientific measurements required can be determined. From the objectives the required measurements flow down, leading to an overall mission design. The mission design drives the instrumentation requirements and influences the selection of components for the mission. Components are chosen to meet mission requirements, creating an initial sensor package design. Trade studies are performed at component levels. Designs iterate on initial concepts and options are evaluated until a final design is determined. A tool for in-situ measurements is developed using systems engineering design relations to deliver a sensor payload configuration starting from the initial mission concept and the specific measurement objectives. Design of the sensor payload package for any mission is a combination of different aspects. The final design is a result of individual case studies at the component level and design engineering studies at a system level. Human decision elements are included in the design process, and final selection between competing components is made. The decision to use one flight hardware component over another can arise from many factors - functionality, heritage, Technology Readiness Level (TRL), compatibility, etc. The objective of this work is to combine selection techniques for mission hardware, based on optimization studies with engineering judgment, into a single tool that can be used to generate a preliminary sensor package configuration for planetary missions. A tool for in-situ measurements is developed using systems engineering design relations to deliver a sensor payload configuration starting from the initial mission objectives and the specific measurement types. The In-Situ Sensor Payload Optimization Tool (ISSPO) consists of a number of individual sensor modules, based on commercially available and space-rated components, and programs to determine the required components. Information on the desired mission location and types of science data to be returned, along with payload limits, are entered into the main program. For each sensor type available within the database, a corresponding module is executed and supplied information on the planetary location and additional sensor requirements. Selection of the final sensor is made based on operational ranges and required performance limits. Logic checks determine whether the sensor package meets or exceeds the mission limits, or if another combination of components would provide a viable solution with some requirement tradeoff. The resulting sensor package represents a preliminary sensor package capable of answering the mission's science requirements.
Sponsor
Date Issued
2008-06-24
Extent
Resource Type
Text
Resource Subtype
Proceedings
Rights Statement
Rights URI
|
ESSENTIALAI-STEM
|
TY - JOUR T1 - Acute myeloid leukemia does not deplete normal hematopoietic stem cells but induces cytopenias by impeding their differentiation JF - Proceedings of the National Academy of Sciences JO - Proc Natl Acad Sci USA SP - 13576 LP - 13581 DO - 10.1073/pnas.1301891110 VL - 110 IS - 33 AU - Miraki-Moud, Farideh AU - Anjos-Afonso, Fernando AU - Hodby, Katharine A. AU - Griessinger, Emmanuel AU - Rosignoli, Guglielmo AU - Lillington, Debra AU - Jia, Li AU - Davies, Jeff K. AU - Cavenagh, Jamie AU - Smith, Matthew AU - Oakervee, Heather AU - Agrawal, Samir AU - Gribben, John G. AU - Bonnet, Dominique AU - Taussig, David C. Y1 - 2013/08/13 UR - http://www.pnas.org/content/110/33/13576.abstract N2 - Acute myeloid leukemia (AML) induces bone marrow (BM) failure in patients, predisposing them to life-threatening infections and bleeding. The mechanism by which AML mediates this complication is unknown but one widely accepted explanation is that AML depletes the BM of hematopoietic stem cells (HSCs) through displacement. We sought to investigate how AML affects hematopoiesis by quantifying residual normal hematopoietic subpopulations in the BM of immunodeficient mice transplanted with human AML cells with a range of genetic lesions. The numbers of normal mouse HSCs were preserved whereas normal progenitors and other downstream hematopoietic cells were reduced following transplantation of primary AMLs, findings consistent with a differentiation block at the HSC–progenitor transition, rather than displacement. Once removed from the leukemic environment, residual normal hematopoietic cells differentiated normally and outcompeted steady-state hematopoietic cells, indicating that this effect is reversible. We confirmed the clinical significance of this by ex vivo analysis of normal hematopoietic subpopulations from BM of 16 patients with AML. This analysis demonstrated that the numbers of normal CD34+CD38− stem-progenitor cells were similar in the BM of AML patients and controls, whereas normal CD34+CD38+ progenitors were reduced. Residual normal CD34+ cells from patients with AML were enriched in long-term culture, initiating cells and repopulating cells compared with controls. In conclusion the data do not support the idea that BM failure in AML is due to HSC depletion. Rather, AML inhibits production of downstream hematopoietic cells by impeding differentiation at the HSC–progenitor transition. ER -
|
ESSENTIALAI-STEM
|
User:1binda
✩✩..F.B.S..✩✩ FACEBOOKSYNDROME ✩✩..F.B.S..✩✩
Facebook Syndrome
How to tell if your a facebook aholic.
''Before we start you need to find out if you are an addict. Once you have admitted to yourself that you are wasted and is addicted to facebook I can go about giving you some solutions for that problem.''
Here are the symptoms of facebooksyndrome:
1: You think about it when you are offline
2: No internet at home but you still have the page up.
3: You check your accounts from your Blackberry.
4: You get stressed when a Facebook “friend” doesn’t add you.
5: Drawing a sex by asking for his or hers facebook.
6: Selecting remember me on every new pc you sign in on.
7: sign in first thing in the morning.
8: You have more then 200 friends and on average 50 people online
|
WIKI
|
Lercanidipine
Lercanidipine (trade name Zanidip, among others) is an antihypertensive (blood pressure lowering) drug. It belongs to the dihydropyridine class of calcium channel blockers, which work by relaxing and opening the blood vessels allowing the blood to circulate more freely around the body. This lowers the blood pressure and allows the heart to work more efficiently.
The drug acts more slowly than older dihydropyridines. It probably has fewer adverse effects, but a comparatively high potential for drug interactions.
It was patented in 1984 and first approved for medical use in 1997. The US FDA refused to approve the drug, and lercanidipine is not marketed in USA.
Medical uses
Lercanidipine is used for the treatment of essential hypertension (high blood pressure).
Lercanidipine seems to be a good agent in treating hypertensive patients that also have kidney issues.
Contraindications
Like other dihydropyridines, lercanidipine is contraindicated in unstable angina pectoris, uncontrolled cardiac failure, shortly after a myocardial infarction, and in patients with left ventricular outflow tract obstruction. It is also contraindicated during pregnancy and in women who may become pregnant, because data regarding safety for the unborn are lacking, as well as in patients with severe liver and renal impairment.
The drug must not be combined with strong inhibitors of the liver enzyme CYP3A4 or with the immunosuppressant drug ciclosporin.
Adverse effects
Lercanidipine is generally well tolerated; no single adverse effect has been observed in more than 1% of patients treated with this drug. Typical side effects are similar to those of other drugs of this class and include headache, dizziness, tachycardia (fast heartbeat), palpitations, flush, and oedema. Hypersensitivity reactions occur in less than one patient in 10,000.
Oedemas are significantly less common under lercanidipine when compared to first-generation dihydropyridines such as nifedipine. For other side effects, data are inconclusive: A study comparing lercanidipine to first-generation drugs found no difference in the frequency of headache and flush, but switching from amlodipine, felodipine or nitrendipine (all at least second generation) to lercanidipine significantly decreased side effects in another study.
Overdose
Overdosing of up to 80 times the usual therapeutic dose has been described. Expected symptoms include severe hypotension (low blood pressure) and reflex tachycardia. Bradycardia (slow heartbeat) can also occur due to blockage of calcium channels in the atrioventricular node of the heart. There is no treatment besides monitoring blood pressure and heart function. Dialysis is likely ineffective because most of the lercanidipine is bound to blood plasma proteins and lipid membranes of cells.
Interactions
The substance is metabolised by the liver enzyme CYP3A4. In a study, the strong CYP3A4 inhibitor ketoconazole increased the maximal blood plasma concentrations of lercanidipine by a factor of eight, and the area under the curve by a factor of 15. In another study, ciclosporin increased lercanidipine plasma levels threefold when given at the same time. Other inhibitors of this enzyme, such as itraconazole, erythromycin, and grapefruit juice, are also expected to increase plasma concentrations and thus amplify the antihypertensive effect. Conversely, CYP3A4 inductors such as carbamazepine, rifampicin, and St John's wort probably lower plasma levels and effectiveness of lercanidipine. By comparison, amlodipine has a lower potential for CYP3A4 mediated interactions.
Lercanidipine increases plasma levels of ciclosporin and digoxin.
Mechanism of action
Like other dihydropyridine class calcium channel blockers, lercanidipine blocks L-type calcium channels in the smooth muscle cells of blood vessels, relaxing them and thus lowering blood pressure. In contrast to the non-dihydropyridine calcium channel blockers verapamil and diltiazem, it does not significantly act on calcium channels in the atrioventricular node, and therefore does not decrease heart rate, in usual therapeutic doses.
Pharmacokinetics
Lercanidipine is slowly but completely absorbed from the gut. It has a total bioavailability of 10% due to an extensive first-pass effect, or up to 40% if taken after a fatty meal. Highest blood plasma levels are reached after 1.5 to 3 hours. The substance is quickly distributed into the tissues and bound to lipid membranes, where it forms a depot. The circulating fraction is almost completely (>98%) bound to plasma proteins.
It is completely metabolized in the liver, mainly via CYP3A4. Elimination half-life is 8 to 10 hours, and the drug does not accumulate. Because of the depot effect, the antihypertensive action lasts for at least 24 hours. 50% is excreted via the urine.
Chemistry
Lercanidipine is used in form of the hydrochloride, which is a slightly yellow crystalline powder and melts at 197 to 201 C in crystal form I or 207 to 211 C in crystal form II. It is readily soluble in chloroform and methanol, but practically insoluble in water. This high lipophilicity (compared to older dihydropyridines) is intentional because it causes the substance to bind to lipid membranes, allowing for a longer duration of action.
The lercanidipine molecule has one asymmetric carbon atom. While the S-enantiomer is more effective than the R-enantiomer, marketed formulations contain a 1:1 mixture of both (i.e., the racemate).
Detection in body fluids
Blood plasma concentrations of lercanidipine can be detected by liquid chromatography–mass spectrometry methods.
|
WIKI
|
SSI
SSI may refer to:
Companies
* Sahaviriya Steel Industries, Thai steel company
* Samsung Semiconductor Inc., a Korean electronics company
* Silicon Systems Inc., an American company that produced integrated circuits.
* Space Services Inc., a team of companies investigating new commercial opportunities in space
* Strategic Simulations Inc, computer gaming company that produced war and simulation games from the mid-1980s to late 1990s.
* Survey Sampling International, a global provider of sampling solutions in marketing research program
* SSI Group, a healthcare revenue cycle company; see Rosa Lavín
Science and technology
* Soil-structure interaction, the interaction between soil and structures (e.g. buildings), especially in seismic engineering
* Solid State Interlocking, the brand name of a railway signalling system developed in the 1980s in the UK
* Solid state ionics, the study of ionic-electronic and ionic conductors (solid electrolytes) and their uses
* SteadyShot Inside, a sensor-based camera image stabilization system by Sony
Computing
* Serializable snapshot isolation, a way to allow multiple concurrent transactions to see consistent information when making changes to a database
* Server Side Includes, a server-side scripting language used on the Web
* Self-sovereign identity, the user has a means of generating and controlling unique identifiers as well as some facility to store identity data.
* Shared Source Initiative, a source-available software licensing scheme by Microsoft
* Simple Sensor Interface protocol, a simple communications protocol designed for smart sensors
* Single sign-in, a specialized form of software authentication
* Single system image, a cluster dedicated operating system
* Small-scale integration, a type of integrated circuit
* Synchronous Serial Interface, a serial interface standard for industrial applications
Medicine
* Stress–strain index, a measure of bone strength
* Surgical site infection
* Sliding scale insulin, fast- or rapid-acting insulin only given subcutaneously
Economics and government
* Standing settlement instructions, payment processing and settlement information about financial institutions
* Strategic sustainable investing, an investment strategy that recognizes financial value in transitional leadership towards sustainability
* Supplemental Security Income, a United States federal government program
* Scottish statutory instrument, a form of secondary or subordinate legislation in Scotland
* Sensitive security information, a category of sensitive information under the US government's information sharing and control rules
Military and police
* Selective Service Initiative, a form of military conscription in the United States
* Senior station inspector, a rank in the Singapore Police Force
* Shoulder sleeve insignia, formation insignia used by the United States Army
* Soldier Support Institute, a U.S. Army organization
* Staff Sergeant Instructor, an appointment in the British Army
* State Security Investigations Service, former Egyptian agency
* Strategic Studies Institute, the US Army War College institute for geostrategic and national security research and analysis
* Attack Submarine (Diesel Air-Independent Propulsion) (hull classification symbol: SSI), a submarine classification type used by the US Navy
* Subsecretaria de Inteligência, the Brazilian intelligence agency until 1995
Organizations
* Sano Sansar Initiative, a global youth organization
* Scuba Schools International, a diver training organization
* Software Sustainability Institute, a UK-based, academic software organisation
* Space Science Institute, an American nonprofit organisation based in Boulder, Colorado
* Space Studies Institute, an American non-profit organization based in Mojave, California
* Spastics Society of India, former name of Able Disable All People Together
* Spatial Sciences Institute, a professional body in the Asia-Pacific region
* Statens Serum Institut, the Danish State Serum Institute
* Swedish Radiation Safety Authority (Statens strålskyddsinstitut), a Stockholm-based regulatory and research government agency
* Students Supporting Israel, a network of pro-Israel student organizations in North America and the United Kingdom
* Swedish Society for Interlingua, a society that encourages the active use of Interlingua in Sweden
Other uses
* Socio-scientific issues, controversial social issues which relate to science
* Solid State Ionics, a peer-reviewed scientific journal
* Solid State Intelligence, a malevolent entity described by John C. Lilly
* South Sandwich Islands, a chain of uninhabited volcanic islands in the South Atlantic Ocean, that is part of the South Georgia and the South Sandwich Islands British Overseas Territory
* St. Simons Island, a barrier island on the coast of Georgia, US
* Star of the Solomon Islands, the most senior award made by the government of the Solomon Islands
* Sustainable Society Index, a tool for assessing the sustainability of 151 assessed countries
|
WIKI
|
Plugins You can find out about all the publicly available Grails plugins.
Redis Flexible Cache Plugin
2 votes
Dependency:
compile ":redis-flexible-cache:0.3.4"
Documentation Source Issues
Summary
This plugin is an alternative to redis-cache-plugin. It gives the possibility to set the expire time in seconds for every cached key, and provides a service, annotations and injected methods to perform entry caching and eviction. The redis-plugin plugin also provides the possibility to set a TTL for a cached entry (using the provided @Memoize annotation), but it lacks the option to serialize any kind of Serializable objects (only object ids are cached and then hydrated from main DB). This means that potentially a lot of data will go to redis, so pay attention to memory and bandwidth consumption! This plugin is not an extension of cache-plugin plugin, it is far more simple and lighter at the same time. The cache-plugin gives a deep integration with grails Controller CoC mechanism, but i think it creates too much overhead sometimes. The cache implementation provided by this plugin is inspired by redis-cache-plugin and redis-plugin but is not based on them. This plugins depends on redis-plugin for communication with redis and therefore it uses its configuration DSL.
Installation
grails install-plugin redis-flexible-cache
|
ESSENTIALAI-STEM
|
Wikipedia:Arbitration/Requests/Case/War of the Pacific
Case opened on 01:29, 3 January 2017 (UTC)
Case closed on 17:58, 22 March 2017 (UTC)
Watchlist all case (and talk) pages: [/index.php?title=&action=watch Front], [/index.php?title=/Evidence&action=watch Ev.], [/index.php?title=/Workshop&action=watch Wshp.], [/index.php?title=/Proposed_decision&action=watch PD.]
Once the case is closed, editors should edit the as needed, but the other content of this page may not be edited except by clerks or arbitrators. Please raise any questions about this decision at Arbitration/Requests/Clarification and Amendment, any general questions at Wikipedia talk:Arbitration Committee, and report violations of the remedies passed in the decision to Arbitration/Requests/Enforcement.
Involved parties
* , filing party
Prior dispute resolution
* Arbitration/Requests/Case/Argentine_History
* Statements by MarshalN20 about his editing of articles related to the War of the Pacific
* Sockpuppet investigations/Keysanger
* Talk:Economic history of Chile (Permalink to 14-Dez-2016 page)
* Requests for mediation/War of the Pacific
* Requests for mediation/Description of the causes of a war
* Requests for mediation/Undue weight and original research in the Causes of the War of the Pacific
* Talk:Treaty of Defensive Alliance (Bolivia–Peru)
* Dispute resolution noticeboard (Permalink DRN)
* Administrators%27 noticeboard/IncidentArchive939
* Talk:Peruvian Saltpeter Monopoly
* Requests for mediation/Causes of the War of the Pacific
* Requests for mediation/Causes of the War of the Pacific (2.)
Statement by Keysanger
MarshalN20 was topic banned from all articles related to history of Latin America (Arbitration/Requests/Case/Argentine History) and the ban was released as he made statements about his editing of articles related to the War of the Pacific. (see diff)
MarshalN20's personal attacks have reached such intensity and disruptive level that I see need for action by the the ArbCom.
It achieved a preliminary climax when I invited him to resolve our disagreements before the Requests for mediation/Causes of the War of the Pacific (2.) but he refused to delete a personal attack (This is borderline user behavior diff) from his contrib. The Mediation Committee had to refuse the request after I insisted to delete the rant.
Obviously he is trying to break down my psychological defenses as he states in diff
* I don't think that this is healthy for neither the encyclopedia nor you. … I hope that you can understand what I am trying to tell you
He impungns my honesty
* Administrators%27 noticeboard/IncidentArchive939
He made off-wiki attacks:
* (English version here)
He advised other users to break the Wikipedia rules in order to exclude me from Wikipedia work:
* game the system
* mocks the ban
Some of us will say “it has to do with Keysanger only”. No. Others have been already “warned”:
*
*
*
In Peruvian nitrate monopoly his disruptive edits are very clear.
Instead of a pause and to talk with the other he begins frantic changes in the disputed article:
* more edits
* more edits
MarshalN20 starts his participation in a content dispute noticeboard with: He continued:
*
*
More Personal attacks User MarshalN20 stated that they became friends. Well for MarshalN20. Erebedhel never edited again.
* it's only the idiotic government of Bolivia, and several ignorants from said nation
* It seems to me that Evo Morales has brainwashed Bolivians
* but that might be one of the reasons Bolivia has such a high mortality rate.
MarshalN20 arrogate for himself the right to delete other opinions in the talk pages
*
*
*
*
*
No one can't deal with a person whose first words in every attempt to resolve differences are insults, imputations and lies. A person whose admitted intentions are gaming the system, break the rules and exclude others from the work of Wikipedia. A person whose topic ban was released explicit on his promise to avoid problems but he sparks them.
* I urge the Arbitration Committee to impose the word limit of 500 words to both parties and not only one. The current favoritism in favor of one party will confuse the issue of abide by the law (WP:OR, WP:NPOV, WP:NPA WP:CIVIL) and ruin the credibility of the Arbitration Committee. -- Keysanger (talk) 13:27, 1 January 2017 (UTC)
* The other party has been given exceptionally rights to insult me in the Formal Mediation.
* The other party has been given exceptionally rights regarding the length of his statements.
* Now the other party is asking for a reduced period of investigation for his doing.
* What is next?. No WP:OR, no WP:NPA, no WP:RS for the other party? . -- Keysanger (talk) 21:39, 1 January 2017 (UTC)
* Now the other pa
Statement by MarshalN20
I became aware of this matter December 26, 2016, and responded December 27. I replied promptly per Doug's and Callanecc's request; however, this statement is carefully crafted out of respect for myself and the committee. I am a content creator with three Wikipedia featured articles (Pisco sour, Peru national football team, Falkland Islands), and active WP:3O participant. My behavior is under scrutiny, and it is important to know my work in Wikipedia as a whole rather than narrow the analysis to some instances where I was upset or annoyed by the circumstances.
Everything Keysanger has written about me is farcical.
* Two RfMs failed because Keysanger sabotaged them. In the first, he listed many evidently inactive users in the acceptance stage, which he then falsely accused me of creating . In the second, Keysanger claimed the words "this is borderline user behavior" were a personal attack, so he altered my comments, argued with TransporterMan , then made his RfM acceptance conditional in spite of TransporterMan's advice . Keysanger then lectured TransporterMan on "civility".
* Keysanger claims Economic history of Chile is part of the problem. I've never edited it. Keysanger, however, was blocked by EdJohnston for edit warring there on May 2015 (see ). EdJohnston again warned Keysanger for his behavior there on June 2015.
* Diablada is unrelated. My content dispute with Erebedhel was resolved amicably; we became friends . In 2011, Ereb gave me an anti-vandalism barnstar.
* Recommending an editor in the Spanish Wikipedia to document all interaction with Keysanger isn't a personal attack. Keysanger's been blocked there twice for false accusations and anti-consensus editing . He also called me a big-eared donkey, which is hurtful albeit funny.😅
Keysanger joined German Wikipedia in 2006. His activities since 2009 are not newbie behavior.
* 1) May 2009: Keysanger threatens banning Arafael ; taunts and threatens Likeminas, "you want to be famous and Be bold yourself?".
* 2) July 2009: Keysanger proclaims "I don't need any proof, because I use the source of the pact. [...] I promise you, you will ignite the war again if you try to coerce my freedom to cooperate with Wikipedia".
* 3) July 2009: Likeminas writes "Keysanger: I’m afraid you do not understand how Wikipedia works. Or perhaps you do not want to understand it. [...] Finally, you should know that your interpretations, analogies and snippy remarks won’t get you anywhere here".
* 4) October 2009: Fifelfoo comments on Keysanger's tendentious editing, battleground mentality, editing others' statements, false statements, RfC manipulation, manipulation of sources . RfC manipulation refers to Keysanger blanking the article's discussion page to confuse Fifelfoo.
* 5) 2011: Alex Harvey commented negatively on Keysanger's insistence to narrow WOTP's content to three authors, making contentious edits without edit summaries , edit warring , frivolous RfC's , anti-consensus forum-shopping , refusal to get the point , tendentious editing , misrepresentation of others' views , manipulation of sources , battleground mentality.
* 6) September 10, 2011: Alex comments Keysanger operated against consensus from 6+ Wikipedians: "When there was just you & Marshal, getting outside opinions made sense. Now it seems to me that we have Marco polo, Tagishsimon, the anonymous professor, the various Peruvian editors, and myself all clearly in favour of Marshal's proposal" . September 15, 2011, Alex wrote to Keysanger: "You really seem to have no idea how Wikipedia works. You need to build a consensus. Why is this so hard to understand?" . A day prior, Keysanger had decided to "fire" Alex as mediator.
* 7) March 2012: Alex explains everyone involved in WOTP up to then was "burnt out and got sick of arguing" with Keysanger.
* 8) March 2012: Keysanger hounded me to Falkland Islands's talk page, wrote a diatribe about WOTP, reverted my deletion of the off-topic comment . Toddst then blocked Keysanger for this disruptive editing.
* 9) November 2013: Keysanger removes sourced material in WOTP claiming it was "non-referenced", because they were Peruvian sources.
* 10) August 2014: MjolnirPants and Forbidden User indicate Keysanger is Wikilawyering and made a slanted RfC.
* 11) August 2015: Keysanger taunts Dentren:
* 12) October 2015: KoshVorlon says Keysanger sees personal attacks where there are none, refuses to drop the stick, editing others' statements.
* 13) March 2016: Keysanger boasts to Robert how he has edited in War of the Pacific "for years" and how he has had many fights with multiple editors:
To conclude: This dispute involves multiple editors, not just Keysanger and me. The first users who interacted in WOTP with Keysanger were Dentren, Likeminas, and Arafael. I joined later, and many other users have also followed: Fifelfoo, Alex, Marco, Tagishsimon, Cloudaoc, Rasdar2, Darkness, etc. All of us have shared one opinion: Keysanger acts disruptively and against consensus. War of the Pacific doesn't need discretionary sanctions. What needs urgent intervention is Keysanger's behavior.
* Attempts at Resolving Dispute not Listed by Nominating Party —- Mediation 2009, 3RR September 2009, ANI September 2009, 3RR October 2009, NPOVN 2011, ANI March 2012, ANI June 2012, ANI October 2013, 3RR July 2014, ANI October 2015, ANI November 2016.
-
* Also, I would like to again graciously request from the committee an extension for the 500 word limit. I have narrowed down my statement from 1820 words to just 783 (less than 2 pages on print), not counting this request and message to Amanda. Thank you.-- MarshalN20 ✉🕊 23:02, 29 December 2016 (UTC)
* Carlos Contreras: I've responded to 's comment about Carlos Contreras at Talk:Peruvian_nitrate_monopoly (please see ). It was an honest mistake; I meant to cite Contreras' 2014 book from Colmex, not the 2012 book. I thank Keysanger for pointing this out, but find his commentary about my profession again unnecessarily insulting and taunting .-- MarshalN20 ✉🕊 19:34, 31 December 2016 (UTC)
This case was brought to my attention yesterday (26 December 2016), and I have been carefully considering the options while continuing my contributions to encyclopedia content and at WP:3O. I do not understand why Doug is requesting an immediate response from me. I am all the more concerned now that the case has been renamed "per convention" to my username. You're shining the spotlight on me, and I do not consider the provision of a rapid, thoughtless statement either useful to myself or respectful to the committee.
Since my behavior is on question, I can tell you with great pride that—since the closure of the Argentine History case—I have focused on my content creation work, producing three featured articles that have also appeared in the main page (Pisco sour, Peru national football team, and Falkland Islands). Users that can tell you more about the quality of my work and my behavior include BarrelProof, Basalisk, GiantSnowman, Kareldorado, and Wee Curry Monster. I have worked with all of these listed users in the aforementioned articles and/or subjects pertaining to those articles. To be fair, I consider all of them friends, but I trust them to be fair in their assessments of me as an editor. I am, at present, working on three more soon-to-be featured articles: Bicycle kick, Chilean expansionism, and Seven Wonders of the World.
I have also become an active participant at the WP:3O project. You can ask Robert about my behavior there. Even before the "Argentine history" case, I focused my time on helping resolve disputes. Unfortunately, my attempt at helping resolve the problems at Paraguayan War and Juan Manuel de Rosas turned out negatively for me. I understand now that I should not have been so aggressive in my participation in the Paraguayan War's move request discussion; however, I consider that the Arbitration Committee's imposed topic ban on the entirety of "Latin American history" was excessive and a punishment (rather than a remedy).
Of course, that's a different case and there is little need for me to bring it up again in this discussion. Nonetheless, I do want to make the committee aware that Keysanger has made it his duty to bring this "Argentine History" case up consistently and everywhere (some examples:, , ), which I consider to be harassment. I remember reading somewhere that it was inappropriate for ARBCOM decisions to be used as a tool to bully other users, but I do not know where to report Keysanger as he was not a party to the arbitration case (although he is certainly adamant about the case: see here). I would appreciate any advice on this matter.
As for Keysanger's accusations, I can affirm that these are all absurd. First, with regards to the Requests for Mediation, both of them were closed by TransporterMan because of Keysanger's actions. In the first one, Keysanger gave a preposterous list of 8 users (see Requests for mediation/Causes of the War of the Pacific), many inactive, and then proceeded to falsely accuse me of creating that list. In the second one, Keysanger got into an irrational argument with TransporterMan over an alleged personal attack. Keysanger then proceeded to alter my comment, and then conditioned his acceptance in spite of TransporterMan's statement. Keysanger then went on to lecture TransporterMan on his talk page. It seems evident to me that Keysanger purposefully sabotaged the mediation.
Let me re-affirm that I have not insulted Keysanger at any point during the Requests for Mediation. Please ask TransporterMan.
With regards to the claim that I advocate "gaming the system" and "mocking the ban", if you actually click on the diffs, it should be very clear that these are false accusations. In reality, in the diffs I express being mindful of my prior topic ban, and I also support the use of Wikipedia's dispute resolution systems. This is not the first time that Keysanger resorts to false accusations. As KoshVorlon wrote on October 2015, Keysanger refuses to drop the stick, consistently falsely accuses users of making personal attacks, and consistently edits other user's statements (to disrespect and intimidate others). Keysanger even "boldly" closed Wee Curry Monster's explanation that it was untrue I had filed an SPI report on Keysanger, again to intimidate another Wikipedian. Moreover, as Joe wrote in October 2015, it is utterly false that I have breached my topic ban, despite Keysanger claims otherwise. I hope that this demonstrates that Keysanger often resorts to false accusations.
With regards to my work on Peruvian nitrate monopoly, you can read the situation at the talk page. I was never sarcastic. I provided quotes from Robert N. Burr's book that demonstrated Keysanger was imposing a fringe view on the article. Keysanger is the one who replied with a one-sentence question. It seems he was upset at the successful requested move of the article, and then proceeded to announce this ArbCom discussion in the article's talk page. There seems to be an ownership problem here. Furthermore, Keysanger has demonstrated that he does not have a competent understanding of economics to properly edit this article (for example:, ).
Also, I have never edited the article on the Economic history of Chile. What I have found is that EdJohnston blocked Keysanger for edit warring in this article on May 2015 (see ). Ed again had to warn Keysanger for his behavior in this article on June 2015. Dentren was involved in this matter, but I was not involved in this discussion at all.
With regards to my interaction with Robert, DangerousPanda, and JulianColton, while I was certainly upset when I wrote to them (or about them), at no point did I use foul language nor did I ever insult them. Since then, I consider to be in good terms with Robert and Panda. As for Julian, I have not interacted with him ever since July 2014—that's over two years ago. I became upset with all of them at one point because they used the "Argentine History" case to indicate negative things about me.
Okay, so now that hopefully I have made it clear that I am not at fault here, I would like to express my support for Robert's statement. I also consider that this issue has been going on for long. However, I do not find it necessary to focus on the "War of the Pacific" in general. The behavioral issue here comes from Keysanger. Here is a brief history of Keysanger's activity in Wikipedia with diffs:
* 1) Keysanger's erratic behavior has been consistently aggressive and disruptive since 2009 . In July 2009, Likeminas wrote: "Keysanger: I’m afraid you do not understand how Wikipedia works. Or perhaps you do not want to understand it. [...] Finally, you should know that your interpretations, analogies and snippy remarks won’t get you anywhere here".
* 2) In 2011, Alex Harvey attempted to help resolve matters at the War of the Pacific article. He quickly became aware of Keysanger's nonconstructive behavior and edit warring tendencies after carefully reviewing his edits . On September 15, 2011, Alex wrote to Keysanger: "You really seem to have no idea how Wikipedia works. You need to build a consensus. Why is this so hard to understand?" . This was a day after Keysanger had decided to "fire" Alex as a mediator.
* 3) In 2012, Keysanger hounded me to the Falkland Islands article. There he again began to write a diatribe about the War of the Pacific, and even reverted my deletion of the erratic off-topic content . Toddst ultimately blocked Keysanger for his actions in the article.
* 4) In this diff from 2015, you can read how Keysanger bullies Dentren, accusing him of being a liar:
* 5) In this statement to Robert in 2016, Keysanger explains how he has edited in War of the Pacific "for years" and how he has had numerous confrontations with editors:
So, what we see here is a trend in Keysanger's unapologetic behavior that dates back to almost a decade.
To conclude: I haven't done anything wrong. Please leave me out of this case; focus on Keysanger's behavior, not mine. Please rename this case to "Keysanger" and let me go on my way. I want to have nothing to do with this case—I have done enough by providing you with all of the diffs that demonstrate my innocence and show that Keysanger is the user with the behavioral problems. Please focus your "remedies" on him and leave me alone.
Thank you very much, and best wishes for 2017. Sincerely.-- MarshalN20 ✉🕊 05:02, 28 December 2016 (UTC)
* User:The ed17 has a very nasty obsession with me, , ) and I am very much concerned at this user's constant attempts at harming my account. I don't understand why this administrator has such a strong grudge against me. Based on his past involvement in matters regarding my Wikipedia account, I would have hoped that someone at this time would have already done something to stop him from getting involved in any matters concerning me. It is unhealthy for the project.-- MarshalN20 ✉🕊 06:06, 28 December 2016 (UTC)
* User:The ed17, as you indicate, it has been two years. Why are you still hounding me? No one is forcing you to comment here. No one has contacted you for an opinion. And while you're certainly free to contribute wherever you want, it is no coincidence that you made the decision to comment in this particular case concerning me. Please end your grudge now and forever—I have no interest whatsoever to interact with you now or in the future.-- MarshalN20 ✉🕊 06:16, 28 December 2016 (UTC)
* User:The ed17. I have not made any legal threat whatsoever, and I also have no knowledge of the term "chilling effect". Look, I found this little interaction we had back in March 2013 ; it brought a smile. I'm sure that you're a swell guy with good intentions at heart. However, I don't know or understand what it is that I did to anger you to such an extent that you have a need to comment in cases related to me. Please accept my apologies, for whatever it is that I did to you in the past is not even in my memory; please move on with your long life ahead. Thank you.-- MarshalN20 ✉🕊 06:55, 28 December 2016 (UTC)
* To clarify, back in 2013, I also was very clear that Ed's actions were very uncomfortable to me. At that time, only AGK, SilkTork, and Cambalachero replied. Ed also commented, so he has been aware of this since December 4, 2013 . AGK stated: "if the problem seems to continue or worsen, you can always ask us to reevaluate." Well, it's now December 27, 2016, and I am still feeling very much aggravated by Ed's behavior towards me. I honestly hope that this is the end of it.-- MarshalN20 ✉🕊 07:18, 28 December 2016 (UTC)
* Hello Doug. I appreciate the kind message. The date confusion might certainly be related to the timezone. I read about the case on the 26th, and then wrote the statement on the 27th. Please do let me know if I can help respond any further questions.-- MarshalN20 ✉🕊 14:58, 28 December 2016 (UTC)
* Word Limit Extension Request: Dear Arbitration Committee and Clerks, I kindly ask for my statement to be given an extension to the 500 word limit. Contrary to the negative personal remarks made about me by the nominating party, I am neither attempting to game the system nor to mock Wikipedia's rules. I plead my case for extension based on that my situation has a precedent from a past arbitration case ("Argentine History"), which places my actions under greater scrutiny and, thus, requires me to explain myself in greater detail than a user without this precedent. I have also requested that the Arbitration Committee please exclude me from this case and, instead, apply remedies on the nominating party. Based on past experience, I am aware that matters here at the Arbitration Committee, although important, are also very stressful and nerve-wrecking; I don't consider my health strong enough to handle another arbitration case. I hope that the information that I have provided about the nominating party is enough to help the committee either reach their own conclusions or to serve as a starting point for further investigation. Unless the committee has any further questions for me, I do not wish to participate any further in this Arbitration concerning Keysanger's behavior.-- MarshalN20 ✉🕊 16:57, 28 December 2016 (UTC)
Statement by Robert McClenon
I urge the ArbCom to accept this case, both to look at whether there has been disruptive editing, point-of-view pushing, and battleground editing by any of the parties, and to impose ArbCom discretionary sanctions on either at least the topic of the War of the Pacific or Latin American history in general. As the list of previous attempts to resolve this shows, disputes over the coverage of this war have been going on since 2014. I ask ArbCom to change the name of this case again to War of the Pacific. Evidently this war has the same place in Peruvian and Chilean culture as the American Civil War does in the United States, in that, as William Faulkner wrote, the past isn't dead, because it isn't even past. Maybe the ArbCom should have provided discretionary sanctions for nineteenth-century South American history in the Argentine History case, but they definitely should, at least for this war, now. I don't have an opinion on who is at fault, but the fact that this has been going on for so long and efforts to mediate have failed indicates that there are conduct issues as well as content issues. ArbCom should accept this case, impose one or more topic-bans, let administrators impose topic-bans under discretionary sanctions, and let more reasonable editors work this out. Robert McClenon (talk) 03:50, 27 December 2016 (UTC)
Statement by The ed17
Marshal has been previously noted and sanctioned for battleground conduct two years ago, and he has been known to skirt the letter of past restrictions, something that has been made worse by Arbcom's overly hasty (IMHO) motions to remove remedies. Clear fences should be laid down again (including an interaction ban, at minimum) so that both editors here can be productive on this site. Ed [talk] [majestic titan] 05:23, 28 December 2016 (UTC)
* "Obsession" is an interesting way to describe not having any contact with you in two years, as near as I can recall. I do thank you for finding this, which I was unable to find on a quick search earlier. I've added it to my statement. Ed [talk] [majestic titan] 06:13, 28 December 2016 (UTC)
* On the other part of your message, my job has absolutely nothing to do with the edits I make as a volunteer and in no way informs my opinions that I hold about Wikipedia and the people who edit it. I would ask that you remove that language unless you are actively attempting to cast a chilling effect. Thanks. Ed [talk] [majestic titan] 06:13, 28 December 2016 (UTC)
* You haven't addressed the second part of my last message. Removing a link doesn't change the overall thrust of your message. Ed [talk] [majestic titan] 06:21, 28 December 2016 (UTC)
* Thanks. I took the liberty of removing the other three words; I hope you don't mind. Linking my job with my volunteer editing is a slippery slope that I'd very much rather not go down. :-) Am hatting this part of the conversation, as it's off topic for the case request here. You may want to do the same so that others focus on your main points. Regards, Ed [talk] [majestic titan] 07:13, 28 December 2016 (UTC)}}
Statement by Kareldorado
Hi, I am not going to totally dig myself into this matter as I think I have better things to spend my time to. However, there are two things I want to point out that need consideration.
* In my experience, MarshalN20 is one of the most civilised authors I encountered at Wikipedia so far. In helping to elaborate the article I gradually brought from C-class to Featured status (Belgium national football team), he has been utmost cooperative. He inspired me with clear views and handed me over copies of an interesting source. However, he remained objective and preferred meticulous, gradual adaptations over 'easily' supporting or opposing my views. He can be very critical, but leaves space for arguing, by which I mean he is reasonable. I genuinely believe that he wants other editors and other articles to 'go further' rather than stare at his own achievements. Considering his achievements, academic background and as far as I know his gentle and self-controlled behaviour, I think he deserves great respect.
* The same user has chosen various interesting yet challenging (or even controversial) subjects to work on as they can raise nationalist feelings from other editors. Most relate to South-American history, which is not surprising considering his background. Having lived in Peru for almost a year, I gained the impression that many South-American people (unfortunately) still live in the past and keep on displaying quite a negative behaviour towards other nations who they have been in a war with during last century. I think of the nations engaged in the War of the Pacific and the Falklands War. Many articles and subjects he worked or works on are prone to nationalist feelings from several sides: Pisco sour (claimed by Peruvians and Chileans to be 'theirs'), the bicycle kick (likewise), the Falklands War (still causing a bad relationship between Argentinian and British citizens) and Chilean expansionism. However, I am confident that he is enough self-controlled to let his background of historian dominate over his identity as a Peruvian citizen during his editorship at Wikipedia. I think he is wise enough to see that displaying a non-neutral point of view would tackle his reputation.
In conclusion, I have nothing bad to tell about Marshal but consider him of great value as an editor. I think it is important to realise that many of the articles he works on are simply prone to controversy. If an edit war seems to pop up, for heaven's sake don't take yourself too seriously—we are all tiny humble people—but rather try to discuss the issue on the talk page and work things out, like this section suggests. Kareldorado (talk) 09:58, 28 December 2016 (UTC)
Statement by SilkTork
I have been pinged by MarshalN20 as evidence to his concerns regarding The ed 17. My involvement in that matter was to comment at the time that I saw no cause for concern in the evidence he brought against The ed 17. The Committee may draw from this what they will - my statement here is purely factual and neutral. SilkTork ✔Tea time 21:11, 28 December 2016 (UTC)
Statement by Wee Curry Monster
I have to declare my involvement having previously attempted to mediate this dispute (at the request of Keysanger) and having reported Keysanger for sockpuppetry. I was on friendly terms with both editors before this.
The case should be renamed in my opinion to War of the Pacific. The article has long been subjected to an editing dispute between a succession of editors. One of the main reasons why there has been an intractable dispute, is Keysanger has been immovable in seeking to ensure the article reflects the Chilean POV. This is very clear from previous attempts to mediate.
There has also been sock puppetry, where Keysanger has sought to shore up his position with socks. I reported one such occasion.
I can provide links if required but much of this took place when I edited under a previous identity. Due to off-wiki harassment I no longer use my real life identity to edit.
I'm not convinced that arbcom should take on this case. IMHO the best remedy would be for community sanctions to be placed on the article e.g. a WP:1RR restriction. I don't believe this has been tried yet. WCM email 16:37, 31 December 2016 (UTC)
Clerk notes
* Renamed request to "MarshalN20" per convention. Kevin ( aka L235 ·  t ·  c) 22:16, 26 December 2016 (UTC)
* Arbcom clerks have no remit to revert changes outside of the Arbitration pages any more than any other editor. If MarshalN20 is editing pages related to this dispute then you may include it in evidence but will otherwise have to follow normal process if you disagree with the changes made.
* Also the statement length is being discussed and if an extension is granted they wil be given time to edit this to fit the extension, if they do not do so within a reasonable timescale then the clerks will trim it for them. Amortias (T)(C) 13:07, 29 December 2016 (UTC)
* The policy on word limits is being applied. Exemptions can be granted and MarshalN20 has had an exemption requested and granted and at the last count was within the new limit. If you (or any other editor) wishes to request an extension you are free to do do. Amortias (T)(C) 13:58, 1 January 2017 (UTC)
Arbitrators' opinions on hearing this matter (10/0/0)
{{cot|title=Translation of the eswiki comment}}
* I'm waiting for a comment from before voting on whether to accept or not. Just noting as well that given the time of year it's very likely that the request won't be accepted or declined until the new year. Callanecc (talk • contribs • logs) 09:08, 27 December 2016 (UTC)
* MarshalN20 was notified of this case request yesterday and deleted the notice and has made 10 edits since, 3 after your ping. I too would like a comment and if there isn't one soon I shall probably vote to accept. Doug Weller talk 16:42, 27 December 2016 (UTC)
* Got a reply on my talk page, hopefully we'll have a statement soon. Callanecc (talk • contribs • logs) 21:06, 27 December 2016 (UTC)
* Haven't had a chance to read this yet, and this is now out of date, but FWIW I don't think it's necessary for people to drop everything else they're doing on Wikipedia to deal with arbcom, especially near the holidays when we're likely to be a little slow anyway :) Opabinia regalis (talk) 06:06, 28 December 2016 (UTC)
* {{re|MarshalN20)) Thank you for your response. I should have phrased my comments a bit better, as I wasn't seeking an immediate full response, just an acknowledgement. It's always a good idea to think about a full response carefully. I'll wait for others to comment before saying anything more. One minor thing, I'm confused about your saying you learned about it yesterday the 26th. Is that a time zone thing? Doug Weller talk 09:34, 28 December 2016 (UTC)
* In fact, given the time of year, unless there are compelling reasons to speed things up, it might be better to wait another week before making any decisions, as some editors - for both this case and the one below - might not become aware of it this week. Doug Weller talk 11:41, 28 December 2016 (UTC)
* {{re|MarshalN20}}That explains it. I read it as timestamped at 5:02 this morning, which for me is the 28th! Doug Weller talk 15:20, 28 December 2016 (UTC)
* Leaning towards accepting this case, though I'd like to allow a bit of extra time for statements as OR has suggested. GorillaWarfare (talk) 19:42, 28 December 2016 (UTC)
* {{ping|Keysanger}} Hopefully someone more fluent than I can translate the eswiki comment, but in the interim here is the gist of it:
Hello Alvaro. I appreciate your comment on the 3RR noticeboard. I participate in the English project, and have interacted with Keysanger there for several years now. His attitude has been the same since the beginning; always combative, mocking, and lying (he likes to say unfounded things, hide/erase/change sources, and distort discussions). He is also stubborn and likes to write long responses to (muddle?) discussions. But out of everything, over time and unlike anyone else, (his attitude has only gotten worse?) (and because of that I have already tried to put an end to his misbehavior ). It seems, since no one wants to interact with Keysanger in the War of the Pacific article, now he is looking for fights in the Spanish article. I recommend that you document all of your their actions. {{cob}}
* Modified. Questioning two parts of the translation, corrected one. -- Amanda (aka DQ) 09:25, 29 December 2016 (UTC)
* Thanks {{emoji|1F601|theme=twitter}} GorillaWarfare (talk) 01:31, 30 December 2016 (UTC)
* Accept. Seems like arbitration is really the only next step here. I'm inclined to grant MarshalN20's request for an extension, as he has trimmed his statement considerably and it no longer seems overly verbose. If accepted we'll want to consider the case name; this has expanded to examine both MarshalN20's and Keysanger's conduct, with a few editors being mentioned tangentially. Perhaps Keysanger and MarshalN20 (alphabetical), or something more general than that. GorillaWarfare (talk) 02:55, 30 December 2016 (UTC)
* Accept It's clear that these two can not interact with each other in peace. I see issues on both sides of the line here, that are not exclusive. Letting this continue at this point would only have more users be dragged towards the timesink of drama and exasperate the situation. The one part I do question though is only having saught the assistance of an administrative noticeboard once in this long dispute. Had there of been more of that, we might not even be here right now. Despite that, the arbitration committee retains jurisdiction over cases it has previously heard. The case should examine the topic area as a whole, and not directed at one user, especially if we are considering expanding DS into this topic area, the pattern of disruption needs to be from the entire topic.
* That said, {{ping|MarshalN20}} I'm not inclined to extend your word limit at this time. I count at least 1/3 of your statement as verbose (aka about 500 words). The Arbitration Committee focuses on the behavior in the dispute at hand, not 1) The actual content dispute nor 2) a users long history of good edits nor 3) excessively spilling things out for the committee. We may not know your dispute, but we know how to interpret user behavior I'm not saying we discount good editing history, but it doesn't help your case in case request statements, especially with a word count. If after a good faith attempt at reducing your statement you still need more room, I'd be willing to consider an extension.
* I would also encourage the committee to consider an injunction for an interaction ban between the two parties for the duration of the case. If there is some support for this, I have ideas for ways to prevent the disruption during the case as exceptions to the interaction ban. -- Amanda (aka DQ) 09:25, 29 December 2016 (UTC)
* {{ping|MarshalN20}} Thank you for pointing out the previous other boards, i'll look into those in due time. Arbs are limited on knowledge of the dispute history, so corrections/new info are appreciated. Also, granted for your extension to 900 words to allow for any more replies. -- Amanda (aka DQ) 08:29, 30 December 2016 (UTC)
* Accept as I can't see another way around this. personally I think if an editor can show another editor has been misusing sources or warping NPOV editing then that is important to understanding of the case. No we don't opine on content but warping accurate NPOV content is extremely serious. Cas Liber (talk · contribs) 11:49, 29 December 2016 (UTC)
* Accept. I'm not sure this intractable, exactly, but it's also the kind of case that would really benefit from a structured inquiry in a moderated forum as opposed to the free-for-all at ANI. I agree with GW on the case title, though - either both parties, or a general descriptive name ("War of the Pacific"?). Also agree that the current statement lengths are fine. (I've already read them now anyway...) Opabinia regalis (talk) 04:42, 30 December 2016 (UTC)
* Accept --kelapstick{{sup|(bainuu) }} 11:00, 30 December 2016 (UTC)
* Accept. Kirill Lokshin (talk) 20:53, 30 December 2016 (UTC)
* Accept -- Guerillero | Parlez Moi 21:39, 31 December 2016 (UTC) Vote expired. -- Amanda (aka DQ) 10:18, 2 January 2017 (UTC)
* Accept DGG ( talk ) 00:08, 1 January 2017 (UTC)
* Accept as "War of the Pacific." Agree with OR that this is not (or should not have been) intractable, but it's here now so let's aim to get it resolved. -- Euryalus (talk) 20:39, 1 January 2017 (UTC)
* Accept I understand why this case is here given the previous ArbCom history. For me it remains to be seen as to whether this is something where a single editor is the nucleus, a dispute between two editors, or the topic area requires remedies. I'm in agreement that the title does need to be expanded to include at the very least both parties. Mkdw {{sup|talk }} 05:15, 2 January 2017 (UTC)
* Accept, echoing DeltaQuad's comments in her first paragraph. Further, I agree with OR's comments, as well. Ks0stm {{sup|(T•C•G•E)}} 13:49, 2 January 2017 (UTC)
Temporary injunction (none)
=Final decision= All tallies are based the votes at /Proposed decision, where comments and discussion from the voting phase is also available.
Purpose of Wikipedia
1) The purpose of Wikipedia is to create a high-quality, free-content encyclopedia in an atmosphere of camaraderie and mutual respect among contributors. Use of the site for other purposes, such as advocacy or propaganda or furtherance of outside conflicts is prohibited. Contributors whose actions are detrimental to that goal may be asked to refrain from them, even when these actions are undertaken in good faith.
* Passed 11 to 0 at 17:52, 22 March 2017 (UTC)
Neutral point of view
2) All Wikipedia articles must be written from a neutral point of view, with all relevant points of view represented in reasonable proportion to their importance and relevance to the subject-matter of the article. Undue weight should not be given to aspects that are peripheral to the topic. Original research and synthesized claims are prohibited. Use of a Wikipedia article for advocacy or promotion, either in favor of or against an individual, institution, or idea that is the subject of the article, is prohibited.
* Passed 11 to 0 at 17:52, 22 March 2017 (UTC)
Criticism and casting aspersions
3) An editor must not accuse another of inappropriate conduct without evidence, especially when the accusations are repeated or severe. Comments should not be personalized, but should instead be directed at content and specific actions. Disparaging an editor or casting aspersions can be considered a personal attack. If accusations are made, they should be raised, with evidence, on the user-talk page of the editor they concern or in the appropriate dispute resolution forums.
* Passed 11 to 0 at 17:52, 22 March 2017 (UTC)
Role of the Arbitration Committee
4) It is not the role of the Arbitration Committee to settle good-faith content disputes among editors.
* Passed 11 to 0 at 17:52, 22 March 2017 (UTC)
Locus of the dispute
1) The dispute centers around the conflict between and conduct of Keysanger and MarshalN20. This conflict centers around the article on the War of the Pacific, as well as other articles relating to this conflict and aspects of the histories of Peru, Bolivia, and Chile.
* Passed 11 to 0 at 17:52, 22 March 2017 (UTC)
Conflict between Keysanger and MarshalN20
2) There is ongoing conflict between Keysanger and MarshalN20, stretching over many years. The two parties have repeatedly been the subject of attempts at dispute resolution.
* Passed 11 to 0 at 17:52, 22 March 2017 (UTC)
Aspersions and battleground conduct (Keysanger)
3) Keysanger has cast aspersions and exhibited battleground conduct. This has been in the context of what has been a long-running and occasionally hotly contested dispute. . Older but indicative:- and this chronology
* Passed 10 to 0 at 17:52, 22 March 2017 (UTC)
Aspersions and battleground conduct (MarshalN20)
4) MarshalN20 cast aspersions and exhibited battleground conduct at earlier stages of the dispute. Indicative:- This behavior has moderated over time. After extensive review of the diffs and respective edit histories, there is insufficient evidence to support a formal finding that this misconduct has continued on en-Wikipedia in recent years.
* Passed 8 to 0 with 2 abstentions at 17:52, 22 March 2017 (UTC)
Remedies
Note: All remedies that refer to a period of time, for example to a ban of X months or a revert parole of Y months, are to run concurrently unless otherwise stated.
Keysanger and MarshalN20 interaction ban
1) and are indefinitely prohibited from interacting with, or commenting on, each other anywhere on Wikipedia (subject to the ordinary exceptions).
* Passed 10 to 1 at 17:52, 22 March 2017 (UTC)
Keysanger warned
2.2) is warned not to cast aspersions on other editors, or to unnecessarily perpetuate on-wiki battles.
* Passed 10 to 0 at 17:52, 22 March 2017 (UTC)
Military history sources
3.1) Where the dispute relates specifically to the interpretation of individual military history sources, the Committee recommends that these disputes in this topic area be formally raised at the Military History Wikiproject talkpage to ensure a wider audience and further expert input. Evident manipulation of sources, or disregard of a MILHIST consensus, should be considered disruptive editing and addressed via regular administrative action where appropriate.
* Passed 9 to 0 with 1 abstention at 17:52, 22 March 2017 (UTC)
Other content disputes
3.2) Where any content dispute involves both and, those editors must seek wider input by raising the matter at any one of: the Military History Wikiproject talkpage, WP:3O, or WP:RFC. Both editors must abide by any subsequent consensus that arises from this process. Disregard of consensus should be considered disruptive editing and addressed via regular administrative action where appropriate. Nothing in this remedy restricts the editing of the disputed topic area by other editors.
* Passed 7 to 0 with 1 abstention at 17:52, 22 March 2017 (UTC)
Enforcement log
Any block, restriction, ban, or sanction performed under the authorisation of a remedy (except discretionary sanctions) for this case must be logged in this section. Please specify the administrator, date and time, nature of sanction, and basis or context. All sanctions issued pursuant to a discretionary sanctions remedy must be logged at Arbitration Committee/Discretionary sanctions/Log.
|
WIKI
|
Sayed Zahid Hussain
Sayed Zahid Hussain is a former judge of the Supreme Court of Pakistan and a former chief justice of the Lahore High Court, who also held the position of being the Chairman of The Federal Service Tribunal, and until recently served as the law consultant to the President of Pakistan to hear the appeals against order of Federal Obudsman.
Life
Sayed Zahid Hussain was born on 15 December 1949 in village Chak Qazian of district Narowal. He acquired his primary education from the local village school and matriculation from G.D. Islamia High School Meingri. He obtained his LL.B degree from Punjab University.
Professional career
Hussain enrolled as an advocate on 22 September 1972. He enrolled as advocate of Lahore High Court on 22 May 1975 and as advocate of Supreme Court of Pakistan on 21 June 1986. He also enrolled as advocate of the Supreme Court of Azad Jammu & Kashmir on 11 October 1997.
He was a life member of Lahore Bar Association, Lahore High Court Bar Association and Supreme Court Bar Association of Pakistan.
Hussain mostly practised on constitutional, and civil sides of law. He also had been a visiting lecturer for some time in the Punjab Law College and City Law College. Hussain was legal advisor for various organisations, including Associated Press of Pakistan (APP). He was a member of Zafar Law Associates, a law firm established by Mr. S.M Zafar, a former law minister. He also contributed in the preparation of celebrated book titled "Understanding Statutes", The Cannons of construction (1997).
He had also been remained a company judge at the LHC, member committee for revision of High Court, member election tribunal, member LHC administration committee, chairman enrolment committee of the Punjab Bar Council and member of the Committee for Recruitment of additional District and Sessions Judges.
Hussain was appointed judge of the Lahore High Court on 21 May 1998 and was confirmed on 19 May 1999.
Hussain was made chief justice of the Lahore High Court on retirement of Justice Iftikhar Hussain Chaudhry, who retired on 31 December 2007. Justice Zahid was the 37th chief justice of LHC since its inception in 1866.
He was elevated to Supreme Court of Pakistan on 12 April 2009 and took oath on 13 April 2009.
He resigned from the Supreme Court of Pakistan on 24 February 2011.
PCO Oath 1999
Justice Syed Zahid Hussain took oath on Provisional Constitutional Order 1999 as a sitting judge of Lahore High Court.
PCO Oath 2007
On 3 November 2007, Chief of Army Staff in Pakistan declared emergency and issued a Provisional Constitutional Order. A seven-member panel of Supreme Court of Pakistan, headed by Chief Justice Chief Justice Iftikhar Mohammad Chaudhry and consisting of Justice Rana Bhagwandas, Justice Javed Iqbal, Justice Mian Shakirullah Jan, Justice Nasir-ul-Mulk, Justice Raja Muhammad Fayyaz Ahmad, and Justice Ghulam Rabbani Judge Supreme Court, issued an order that declared the declaration of emergency as illegal and prohibited all judges to take oath on any PCO.
Justice Syed Zahid Hussain took his oath on Provisional Constitutional Order 2007 as a sitting judge of Lahore High Court. He was among 13 out of 31 sitting judges of Lahore High Court who took oath on PCO. Along with him Nasim Sikandar, Mohammad Khalid Alvi, Sakhi Hussain Bokhari, Muhammad Bilal Khan, Mohammad Muzammal Khan, Syed Shabbar Raza Rizvi, Hamid Ali Shah, Tariq Shamim, Syed Asghar Haider, Hasnat Ahmad Khan and Justice Fazl-e-Miran Chohan as well as then Chief Justice of Lahore High Court Iftikhar Hussain Chaudhry took oath on PCO 2007. As on 19 April 2009, the PCO has not been given protection by any constitutional amendment. In the past, all PCO were at a later point given constitutional protection.
|
WIKI
|
Template talk:Editnotices/Page/List of musical works in unusual time signatures
I'd like this notice added to List of musical works in unusual time signatures, since the article has continually had a problem with users adding unsourced entries. Ionmars10 (talk) 22:29, 28 August 2019 (UTC)
* ✅ * Pppery * it has begun... 19:51, 31 August 2019 (UTC)
|
WIKI
|
Journal of Agricultural Science and Botany
All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Reach Us +44 1202068036
Short Communication - Journal of Agricultural Science and Botany (2020) Volume 4, Issue 5
Molecular Cytogenetics in Onion Breeding.
Ludmila Khrustaleva*1,2, Natalia Kudryavtseva1,2, Majd Mardini1, Aleksey Ermolaev1, Sergey Odintsov1, Mais Nzeha1, Ilya Kirov1,2
1Center of Molecular Biotechnology, Russian State Agrarian University-Moscow Timiryazev Agricultural Academy, Moscow, Russian Federation, Russia
2All-Russia Research Institute of Agricultural Biotechnology, Moscow, Russian Federation, Russia
Visit for more related articles at Journal of Agricultural Science and Botany
Abstract
The rapid progress in sequencing technologies and ‘big data’ analysis has opened boundless prospects for study of genome evolution and organization. However, we still have limited number of techniques allowing making a bridge between linear DNA sequence and genome structure. Molecular cytogenetics provides a toolbox of methods for DNA sequence visualization on nucleus or chromosomes bridging the gap between In Silico genome research and In Vivo genome organization. Molecular cytogenetic provides useful information for fundamental study of plant chromosome evolution and has practical application in breeding of new varieties.
From Sequences to Cytogenetic Markers
We employed the combination of sequencing, bioinformatic tools, and molecular cytogenetic methods for rapid development of cytogenetic markers for identification of individual chromosomes. Tandem repeats are often associated with important chromosomal landmarks, such as centromeres, telomeres, subtelomeric, and other heterochromatic regions, and can be good candidates for molecular cytogenetic markers. We have isolated several Tandem Repeat Sequences (TRs) from Allium Cepa and A. Fistulosum genomes which are valuable species specific cytogenetic markers associated with constitutive heterochromatin [1]. Knowledge of the chromosome organization of TRs may help to fill in sequence gaps that can arise during plant genome assembly, as TR arrays are difficult to sequence and assemble. Combining these results with CENH3 associated chromatin immune precipitation data we found that Allium centromere comprises the longest satellite monomer sequence known to date (~1250 bp).
Mapping Genes/Markers: Overcoming the Limitation of Detection Sensitivity with FISH
The ability to see a gene or marker on a physical chromosome has been the goal of many cytogeneticists. However, the FISH sensitivity for detection of single copy DNA sequences was limited, especially for highly compacted plant chromosomes. An ultra-sensitive method termed tyramide-FISH (tyr-FISH) was adapted for plant cytogenetics [2]. We used tyr-FISH to physically locate molecular markers tightly linked to the nuclear male-fertility (Ms) restoration locus of onion [3]. Relatively short genomic amplicons (846–2251 bp) and a cDNA clone (666 bp) were visualized on chromosome 2 near the centromere, a region of low recombination. This result explains why several labs have identified molecular markers tightly linked to the Ms locus after screening relatively few DNA clones or primers and segregating progenies.
Closely Related Wild species are actively used to improve the Germplasm of Cultivated Plants
. Gene collinearity is a prerequisite for the successful introduction of new traits because meiotic recombination occurs primarily within genes. Effective alien introgression strategies require high rates of homoeologous recombination between host and alien chromosomes. Using tyr-FISH we mapped members of the Alliinase multigene family on the physical chromosomes of two widely cultivated onion crops, A. cepa and A. Fistulosum, unraveling unique genome re organization events [4]. Comparative target mapping of the alliinase genes and EST markers on the A. cepa and A. Fistulosum mitotic chromosomes revealed a large ancient pericentric inversion involving the bulb Alliinase gene, the root (ALL1) Alliinase gene and the Chalcone Synthase gene (CHS-B).
Application of Molecular Cytogenetics in Interspecific Plant Breeding
Genomic In Situ Hybridization (GISH) has a huge advantage in its ability to distinguish between parental genomes in interspecific hybrids and thus allows the introgression of alien material to be monitored at the chromosome level. We used GISH in interspecific breeding of bulb onion (Allium Cepa L.) resistant to downy mildew (Peronospora destructor [Berk.] Casp.) [5]. Owing of GISH application the introgression lines that possessed an A. Roylei homozygous fragment in a pure A. cepa genetic background were produced. In interspecific breeding to monitor of the introgression of alien genetic material with molecular markers a huge number of markers should be produced in order to analyze the whole chromosomes of parental genomes. GISH allows easily selecting genotypes carrying the target locus without a wild-type background.
Another attractive aspect of the GISH is the ability to visualize the sites of recombination on the physical chromosome [6]. With GISH we studied advanced generations derived from hybrids between A. cepa x A. Fistulosum that show resistance to Stemphylium Vesicarium [7]. GISH showed spontaneous polyploidization and no evidence of backcrossing from interspecific hybrids between A. cepa and A. Fistulosum. Recombinant chromosomes between A. cepa and A. Fistulosum were identified revealing that introgression of disease resistances to bulb onion should be possible.
Future Directions
Future work involves the creation of more molecular cytogenetic markers based oSn mapping chromosome specific repeats and genes/markers with the subsequent integration of genetic and chromosomal maps. The resulting integrated maps can be further applied in onion breeding and genome assembly at chromosome level. Further analysis of the tandem repeats will clarify their role in speciation, heterochromatin formation, and function of a high packaged Allium chromosome. We expect a significant expansion of FISH applications in plants with developing of new technologies as oligo-FISH mapping, CAS-FISH for living cells, a haplotype-specific FISH for crossing over visualization, RNA-FISH for measuring gene transcription. In spite of the great progress in bioinformatic and genomic approaches, FISH remains a ‘gold standard’ method for mapping physical chromosomes and detection their organization. These researches were mainly funded by the Russian Science Foundation (grants number: 16-16-10031 and 20-46-07005).
This work is partly presented at 3rd International Conference on PLANT SCIENCE on May 5-6, 2021, held in Czech Republic, Prague
References
|
ESSENTIALAI-STEM
|
Page:Debates in the Several State Conventions, v5.djvu/315
1787.] Mr. WILLIAMSON thought it would be necessary to return to the rule of numbers, but that the Western States stood on different footing. If their property should be rated as high as that of the Atlantic States, then their representation ought to hold a like proportion; otherwise, if their property was not to be equally rated.
Mr. GOUVERNEUR MORRIS. The report is little more than a guess. Wealth was not altogether disregarded by the committee. Where it was apparently in favor of one state, whose numbers were superior to the numbers of another by a fraction only, a member extraordinary was allowed to the former, and so vice versa. The committee meant little more than to bring the matter to a point for the consideration of the House.
Mr. READ asked why Georgia was allowed two members, when her number of inhabitants had stood below that of Delaware.
Mr. GOUVERNEUR MORRIS. Such is the rapidity of the population of that state, that, before the plan takes effect, it will probably be entitled to two representatives.
Mr. RANDOLPH disliked the report of the committee, but had been unwilling to object to it. He was apprehensive that, as the number was not to be changed till the national legislature should please, a pretext would never be wanting to postpone alterations, and keep the power in the hands of those possessed of it. He was in favor of the commitment to a member from each state.
Mr. PATTERSON considered the proposed estimate for the future, according to the combined rules of numbers and wealth, as too vague. For this reason New Jersey was against it. He could regard negro slaves in no light but as property. They are no free agents, have no personal liberty, no faculty of acquiring property, but on the contrary are themselves property, and, like other property, entirely at the will of the master. Has a man in Virginia a number of votes in proportion to the number of his slaves? and if negroes are not represented in the states to which they belong, why should they be represented in the general government? What is the true principle of representation? It is an expedient by which an assembly of certain individuals, chosen by the people, is substituted in place of the inconvenient meeting of the people themselves. If such a meeting of the people was actually to take place, would the slaves vote? They would not. Why then should they be represented? He was also against such an indirect encouragement of the slave trade, observing, that Congress, in their act relating to the change of the eighth article of Confederation, had been ashamed to use the term "slaves," and had substituted a description.
Mr. MADISON reminded Mr. Patterson that his doctrine of representation, which was, in its principle, the genuine one, must forever silence the pretensions of the small states to an equality of votes with the large ones. They ought to vote in the same proportion in which their citizens would do if the people of all the states were collectively met. He suggested, as a proper ground of compromise, that, in the 3725
|
WIKI
|
Using the Garmin GPSMAP 66 in the Field
I have a GPSMAP 66s, but what I have to say here applies to the 66st as well- the only difference between the models is that the 66st adds Garmin Topo maps. I prefer to load my own maps from gpsfiledepot.com, which are more detailed than Garmin's 100K maps and are free. So, when I refer to the GPSMAP 66 below, I mean both models.
Before I get started, let me say that the positives in this unit far outweigh the negatives, at least for my use. The core function, that of locking onto satellites and determining your position, is significantly improved over the already excellent GPSMAP 64 series.
First, the negatives- the synchronization feature, which uses the Garmin Connect and Explore smartphone apps to send data from the GPSMAP 66 to and from your phone and the Garmin Explore website, are unnecessarily complex and fiddly. I was hoping for something as simple as Gaia GPS's sync from their phone app to their website, which takes place automatically in the background. All I have to do is record waypoints and tracks with the Gaia app on my Android phone as I hike, and as long as my phone has a data connection at some point, all my data is there on GaiaGPS.com then I log in.
The GPSMAP 66, however, records your track as something it calls an "activity". Activities are not automatically synced to the phone and website, unless they are saved as a track on the GPSMAP 66. Activities are clearly aimed at the fitness market, because that data is recorded in FIT and GPX format by default. However, it adds an unnecessary step if you just want to record a track log. For example, let's say that you want to map a trail. First, you have to make sure the GPSMAP 66 is set to record the activity. For hiking, I've found the best settings are the default, including auto pause (this means recording will stop when you stop, and resume when you start to move again.) As you hike, save waypoints at trail junctions and other important landmarks as usual. Back at the trailhead, go to the Recording Controls page and save the activity. Then go to the the Recorded Activities menu item, open the activity you just saved, and save it as a track.
To get a track log onto your computer, open Garmin Explore, go to Devices, and touch the Sync icon next to the GPSMAP 66s (this assumes you've already paired the 66s with your phone. You'll need the Garmin Connect app to do this.) Now, open explore.garmin.com on your computer and go to the map tab. After a few minutes, the Library pane on the left synchronizes and you should see all of your data from the GPSMAP 66.
I happen to prefer working with CalTopo (CalTopo.com) for trail mapping- I've invested a fair amount of time in learning to use it's tools, so I need to export track and waypoint data from Garmin Explore and import it into CalTopo. To export the data you want, you have to set up map filters in Garmin Explore so that only the data you want is shown on the map. Then you can export it as a GPX or KML file. In my case, I export to GPX and import into CalTopo. Whew!
Ir's much easier to do it the old-fashioned way, by connecting the GPSMAP 66 to the computer with a micro USB cable (yes, Garmin's finally stopped using the totally outdated mini USB- now if they'd only gone straight to USB-C. Oh well.) As soon as the receiver senses the connection, it saves all of it's waypoint, track, and route data as GPX files. The internal storage on the unit shows up on your computer as the Garmin drive. Now all you have to do is navigate to the Garmin/GPX folder, and there's the data. Waypoints are saved in a Waypoints file with the current date, and track and route files are date and time stamped (unless you renamed them on the unit while saving them.) Now you can import any of the GPX files directly into your mapping application- any mapping app worth bothering with can import GPX.
It's also easy to import GPX files to the GPSMAP 66. This is useful for trip planning- you can enter and name waypoints and routes much easier on the computer than by using the keypad on the GPS unit. In CalTopo, start a new map (the default when you log in), then create all the waypoints and tracks (shapes in CalTopo)you'd like. Then export to GPX. The export function presents you with a popup dialog with all the data on the map- just check off the items you want to export. The GPX file will have the same name as the current CalTopo map. Then copy the GPX file to the Garmin/GPX folder on the GPSMAP 66.
Even better- use a micro SD card in your GPSMAP 66. If present in the unit when you connect it to your computer, it will show up as a second drive. Any GPX file you copy to the Garmin/GPX folder on the card will be recognized by the unit. This also saves space in the internal storage. And of course, you can install third party maps from sources such as GPSFileDepot.com on the card.
Another problem is that the battery life indicator seems to indicate low batteries when they aren't. I normally use lithium AA batteries because they have a longer life than alkalines, they work better in cold, and they are much lighter. In my previous Garmin units, an indication of less than 4 bars meant that the batteries were about done. The GPSMAP 66 drops to 3 or 2 bars within a hour or two of installing fresh batteries, yet the batteries test as good on a battery tester. This is minor and will probably be fixed in a firmware update.
Expedition mode should extend battery life to many days by letting the unit sleep much of the time, but it doesn't work on my 66s. Pressing the power but brings the unit to life but it never gets a satellite fix. I assume this means it's not recording track points while in Expedition mode. Again, this should be fixed in a firmware update.
And now for the positives- The big one is the vast improvement in the receiver over even the 64s, as noted above. I haven't used the unit in dense forest or narrow canyons yet, but under open sky, on the front seat of my car, or inside the house, it picks up the satellites and locks on more quickly. Part of this is perception- the GPSMAP 64 takes longer to go through the startup screens than the 66, but by the time the satellite status page comes up, the 64 has a satellite fix. In GPS/GLONASS mode, it typically picks up 8 or more GPS satellites and 3 or 4 GLONASS satellites, and the accuracy is usually 10 to 15 feet, sometimes better. The receiver also picks up EGNOS/WAAS satellites for differential correction to an accuracy of a few feet, but these systems are designed for airborne use and the unit doesn't usually pick up those signals except in an area with a clear, low horizon.
The unit can also use the ESA Galileo satellites when they come online in a year or so. Note that the satellite modes are GPS only, GPS and GLONASS, or GPS and Galileo. There's no way to use all three satellite systems at once.
The GPSMAP 66 series has WiFi, in addition to the Bluetooth of earlier models. This lets the unit check for and automatically download firmware updates whenever it's connected to the Internet through WiFi. You no longer have to use the Garmin Express app on a Windows or Mac computer. As a Linux user, I really appreciate that.
Another benefit of WiFi is that the 66 series downloads the GPS satellite ephemeris from the Internet, which means the next startup will be a warm start. Of course, this doesn't work in the field, but it may be worthwhile to turn the unit on at home, or another place with public WiFi, and let it run for a bit before heading out.
A word about accuracy- civilian GPS receivers, even the cheaper chips in smartphones, are as accurate as the most accurate maps published- the USGS 7.5-minute topographic series. This has basically been true since Selective Availability was turned off in 2000. The most important difference between GPS receivers is how many satellites they can receive simultaneously, which in turn affects how well the unit keeps it's position fix under partial sky conditions, such as deep forest or narrow canyons.
And finally, Garmin has now made their excellent BirdsEye satellite imagery available for free. You can download imagery for a defined radius around your present location, or pan to a different area on the map. And you can optionally store the imagery on a micro SD card- which is good, because high res imagery takes up a lot of space.
So I like the GPSMAP 66s. The fast satellite fixes alone are worth the upgrade from the 64s. And the advent of Galileo should improve that even further. Not that I'm of fan of touchscreen GPS's anyway, but even the latest Garmin Montana and Oregon units don't offer everything that the 66s has. Galileo reception is missing, strangely enough.
|
ESSENTIALAI-STEM
|
Talk:Europium(III) chloride
Structure
(1) Should maybe the structure type be mentioned before the coordination number/geometry? In solution, I guess its coordination will depend strongly on the solvent.
(2) Trigonal prismatic geometry leads to a coordination number of six, not nine, so I guess that should be "capped trigonal prismatic", could that be the case? <IP_ADDRESS> 12:30, 27 July 2007 (UTC)
Chembox problem
Something is wrong with the chembox in this article. I don't see what it is. --Chemicalinterest (talk) 12:55, 24 May 2011 (UTC)
* Double use of one section .. it only uses the last one then .. --Dirk Beetstra T C 13:50, 24 May 2011 (UTC)
|
WIKI
|
1530s in music
The decade of the 1530s in music (years 1530–1539) involved some significant events, publications, compositions, births, and deaths.
Events
* 1532: Thomas Tallis takes his first known musical appointment, as organist at Dover Priory.
* 1533: Claudin de Sermisy appointed a canon at Sainte-Chapelle in Paris
* 1534: Nicolas Gombert appointed a canon of Notre-Dame in Tournai
* 1535: Cristobal Morales joins the papal choir at St Peter's basilica, Rome
* 1536: Pierre Certon appointed Master of the Choristers at Sainte Chapelle in Paris.
* 1538: Tallis moves from Dover to Waltham Abbey.
* Thomas Appleby appointed organist and choirmaster at Lincoln Cathedral
* 1539: Joan Brudieu appointed maestro di capilla at la Seu d'Urgell Cathedral in Catalonia, a position he held until his death (bar a couple of gaps) until his death in 1591.
1530
* Madrigali de diversi musici: libro primo de la Serena (Rome: Valerio Dorico). The first book of madrigals to be identified by that name. The majority of pieces are by Philippe Verdelot.
1532
* Carpentras
* First book of masses (Avignon: Jean de Channay)
* Lamentations for five voices (Avignon: Jean de Channay)
* Hans Gerle – Musica Teusch (Nuremberg: Hieronymous Formschneider), an instructional book for playing and arranging for the viola, rebec, and lute
* Sebald Heyden – De arte canendi: Rudimenta, first installment of an important treatise on singing
1533
* Hans Gerle - 2nd collection of lute music Tabulatur auff die Laudten published in Nuremberg. It included arrangements of pieces by Jean Mouton, Josquin and Jacob Obrecht
* Clement Janequin – Vingt et quatre chansons musicales...composes par maistre CL Janequin published by Pierre Attaignant in Paris
* Philippe Verdelot – First book of madrigals for four voices, published by Ottaviano Scotto in Venice
1534
* Philippe Verdelot – Second book of madrigals for four voices, published by Scotto in Venice
1535
* Silvestro Ganassi dal Fontego – Opera intitulata Fontegara, a treatise on recorder playing, published in Venice
* Philippe Verdelot – First book of madrigals for five voices, published by Scotto in Venice
1536
* Sebastian z Felsztyna – treatise 'De Musica Dialogi VI'
* Luis de Milán – El Maestro (Valencia: Francisco Diaz Romano), the first collection of music for the vihuela
* Francesco da Milano – Five volumes of lute music published in Milan
* Hans Neusidler – Two books of lute music, Ein newgeordent künstlich Lautenbuch and Der ander Theil des Lautenbuchs.
1537
* Carpentras – August 25: Libro de canti a tre (Book of songs for three voices) (Rome: Valerio & Luigi Dorico)
* Sebald Heyden – De arte canendi, second installment, important treatise on singing
* Clement Janequin – Les Chansons de la Guerre, La Chasse, Le Chant des Oyseaux, L'Alouette, Le Rossignol, published by Pierre Attaignment in Paris
* Philippe Verdelot – Second book of madrigals for five voices published by Scotto in Venice
1538
* Luis de Narváez – Los seys libros del Delphin (Valladolid: Diego Hernandez), a large collection of lute music
* Philippe Verdelot – Le dotte, et eccellente compositioni...
* Ein Hubsch new Gesangbuch, the first Protestant hymn-book, published in Ulm.
1539
* Jacques Arcadelt
* First book of madrigals for four voices (Venice: Antonio Gardano), the most reprinted madrigal book of the sixteenth century
* Second book of madrigals for four voices (Venice: Antonio Gardano)
* Third book of madrigals for four voices (Venice: Girolamo Scotto)
* Fourth book of madrigals for four voices (Venice: Antonio Gardano)
* Noel Bauldeweyn – Missa da Pacem (Nuremberg: Ott, RISM 15392). Published under the name of Josquin des Prez.
* Jean Calvin – First edition of 'The Geneva Psalter'
* Alfonso dalla Viola – First book of madrigals for four voices (Ferrara: Henrico De Campis & Antonio Hucher for Giovanni De Buglhat)
* Georg Forster – First volume of his 'Fresh German Songs' published in Nuremberg
* Nicolas Gombert
* First book of motets for four voices (Venice: Girolamo Scotto)
* First book of motets for five voices (Venice: Girolamo Scotto)
* Paul Hofhaimer – collection of musical settings of the odes of Horace 'Harmoniae Poeticae', published in Nuremberg
* Jacquet of Mantua
* First book of motets for five voices (Venice: Girolamo Scotto)
* First book of motets for four voices (Venice: Girolamo Scotto)
* Pierre de Manchicourt – Book 14: 19 Motets for four voices (Paris: Pierre Attaingnant & Hubert Jullet), the last volume in Attaingnant's motet series and the only one dedicated to a single composer
1530
* We-Liang-Hu composed music for a play by 14th-century poet Gao Ming.
1533
* Nicolas Gombert – Cuis colis Ausoniam, motet for six voices to a text by Nicolaus Grudius, celebrating the treaty signed in Bologna by Emperor Charles V, Pope Clement VII, and several other Italian rulers
1539
* Johannes Heugel – Consolamini, popule meus, for eight voices, probably the earliest German composition for double choir
* Costanzo Festa – Hyntni per totum annum
Births
* c.1530: Juan Navarro, Spanish composer (d. 1580)
* c.1530: Nicolas de La Grotte, French composer and keyboard player (d. c. 1600)
* c.1530: Richard Farrant, English composer of church music, choirmaster, playwright and theatre producer (d.1580)
* c.1530: Guillaume Costeley, French composer and organist (d. 1606)
* 1530: Teodora Ginés, Dominican musician and composer (d. 1598)
* 1531: Ercole Bottrigari, Italian scholar, mathematician, poet, music theorist, architect and composer (d. 1612)
* c.1520/31: Guillaume Costeley, French composer (d. 1606)
* c.1531/32: Jacobus de Kerle, Flemish composer, organist, choirmaster and priest (d.1591)
* 1532: Hernando Franco, Spanish composer and choirmaster. The earliest known composer of music in Guatemala (d.1585)
* December 5 – Nikolaus Selnecker, German theologian, hymn-writer, organist and cleric (d.1592)
* February 19 – Jean-Antonie de Baif, French poet, co-founder of the Academie de Poesie et de Musique in Paris (d. 1589)
* January 21 – Ludwig Hembold, German poet and hymn writer (d. 1598)
* March 25 – Pietro Pontio, Italian theorist and composer (d. 1596)
* date unknown – Giammateo Asola, Italian composer (d. 1609)
* probable – Orlando de Lassus aka Roland de Latre, Franco-Flemish composer of late Renaissance music (d. 1594)
* Adam Puschmann, German poet, songwriter and Meistersinger (d. 1600)
* c.1532 David Koler, German composer and Kapellmeister (d. 1565)
* c. 1530–40: Giorgio Mainerio, Italian composer (d. 1582)
* 1533:
* c.1533 Laurent de Vos, Flemish composer, singer and musician (d. 1580)
* October 16 – Gallus Dressler, German composer, theorist and cantor. (d. 1580s)
* April 8 – Claudio Merulo, Italian organist, composer and publisher (d. 1604)
* date unknown - Andrea Gabrieli, Italian composer and organist (d. 1585)
* 1534: Lodovico Agostini, Italian composer (d. 1590)
* Giovanni De' Bardi, Italian writer, composer and soldier. Host and patron of the Florentine Camerata.
* Lucas Osiander, German Protestant theologian and hymn composer. Born Nuremberg. (d. 1604)
* Fernando de Las Infantas, Spanish composer, theologian, priest and philanthropist. Born Cordoba. (d. c. 1610)
* c.1534 Christian Ameyden, Flemish composer, tenor and choirmaster. Born Aerschot, Belgium. (d. 1605)
* 1535 Annibale Stabile, Italian composer, singer, choirmaster and priest. Born Naples. (d. 1595)
* c.1535
* c.1535 Cesare Negri, Italian dancing master (d. c. 1604)
* c.1535 Marc'Antonio Ingegneri, Italian composer, teacher and choirmaster (d. 1592).
* Antoine de Bertrand, French composer (d. 1581)
* Bernhard Schmid the Elder, German organist and music editor (d. 1592)
* Giaches de Wert, Flemish composer of Italian madrigals (d. 1596)
* probable – Innocentio Alberti, Italian instrumentalist and composer (d. 1615)
* 1536: Zhu Zaiyu, Chinese prince, music theorist, scholar and writer (d. 1611)
* Alessandro Striggio, Italian composer, viol player and diplomat (d. 1592)
* 1537: Johann Wanning, Dutch-born composer, kapellmeister and alto singer (d. 1603)
* Annibale Zoilo, Italian composer, singer and choirmaster (d. 1592)
* 1538 Stefano Felis, Italian composer, singer and choirmaster (d. 1603)
* c.1538 Johannes Matelart, Flemish composer and choirmaster (d. 1607)
* c.1538 Robert White, English composer and choirmaster (d. 1574)
* 1539
* December 20 – Paulus Melissus, writer and composer (d. 1602)
* c.1539 Paschal de L'Estocart, French composer (d. c. 1587)
* c.1539 Ippolito Tartaglino, Italian composer (d. c. 1580)
Deaths
* c.1530 Noel Bauldewijn, Flemish composer (b. c. 1480).
* c.1530 Antonius Divitis, court composer of Louis XII of France (b. 1470).
* 1533:
* September 20 - Nicolas Champion, composer and singer, (b. c. 1475).
* c.1535:
* Pedro de Escobar (b. 1465).
* Bartolomeo Tromboncino (b. 1470).
* 1536:
* May 17 – Mark Smeaton, English court musician (b. c. 1512; executed for alleged adultery with Anne Boleyn)
* June 26 – Pierre Alamire, German-Dutch music copyist, composer, instrumentalist, mining engineer, merchant, diplomat and spy (b. c. 1470)
* 1537: Paul Hofhaimer, Austrian composer and organist (b. 1459).
* 1538:
* March – Hans Buchner, organist and composer (b. 1483).
* October – Maistre Jhan, composer (b. c. 1485)
* Richard Davy, composer (b. c. 1465).
* 1539:
* December 12 – Bartolomeo degli Organi, composer, singer and organist (b. 1474).
* December 20 – Johannes Lupi, composer (b. c. 1506; chronic illness)
* Ottaviano Petrucci – printer and publisher (b. 1466)
* c.1539 Andrea Antico – publisher, editor and composer (b. c. 1480)
* c.1539 Dionisio Memmo – Italian organist and choirmaster. Worked in the court of Henry VIII
|
WIKI
|
List of bishops of Macau
Portuguese Jesuit priest Melchior Miguel Carniero Leitão was appointed Titular Bishop of Nicaea Pope Gregory XIII issued an edict for the establishment of the Roman Catholic Diocese of Macau, where Leitão served—he was appointed the first bishop of Macau, a position he occupied till 1581.
No bishop of the diocese had been appointed archbishop or cardinal until Eugénio de Trigueiros and José da Costa Nunes were appointed as archbishops, following a re-designation by the Pope.
Symbol
All Catholic bishops are appointed by the Pope, and are considered to be messengers (successors of the Apostles) as defined in the catechism of the Catholic Church;.
Responsibilities
The Bishop of Macau is appointed as the spokesman of the Pope. He is the leader of the Roman Catholic Church in Macau, which he administers on behalf of the Pope. He is also responsible for the pastoral and charitable work that is carried out within the Diocese.
Initially, the jurisdiction of the Bishop of Macau included China, Japan, Hong Kong, the Korean Peninsula and neighbouring areas. However, with development and the increasing need for pastoral work, the Vatican has since established more than 600 other Roman Catholic dioceses in the region. Presently, the diocese has jurisdiction over six parishes and three quasi-parishes in the Macau Peninsula, Taipa and Coloane.
Remarks
* 1) appointed as auxiliary bishop
* 2) appointed as Assisting Bishop
* 3) possessed, as taking the responsibility of the position
* 4) date of assumption of office
* 5) due to resignation
* 6) due to his decease
* 7) date of acting or assuming office
* 8) resignation accepted by Pope due to retirement
* 9) transferred to Portugal
* 10) appointed as Acting Bishop in 1623
* 11) as Bishop of Japan
* 12) inaugurated in 1738
* 13) appointed Archbishop of Diocese of Goa
* 14) transferred to Brasil and left Macau in 1765
* 15) arrived Macau in 1791
* 16) appointed Assistant Archbishop of Goa
* 17) transferred to Azores
* 18) appointed Archbishop of the Diocese of Goa and Dammam
* 19) baptized as Auxiliary Bishop of Diocese of Porto
* 20) Acting Bishop in 1963 and 1965, he was elected as Acting Bishop on June 14, 1975
* 21) Emeritus Bishop of Macau
|
WIKI
|
PXE boot issue on E6410
• Not sure if this is a FOG issue or a hardware problem. Please excuse this if it is in the wrong topic.
Our old FOG server crashed, so we decided to update it. Since then, we have been having an issue imaging the E6410 model. We are using FOG 1.2.0 and the latest undionly.kpxe file.
When booting to the NIC, the process hangs at the “iPXE initialising devices…” message. OK never appears. We have tried to upgrade the BIOS, but the process still hangs.
Any help or suggestions is greatly appreciated!!
• Moderator
I can say for sure that the e6410 pxe boots just fine using the trunk (dev) build of 1.2.0.
The e6410 is a bios only system that does boot with the undionly.kpxe. Since you said that you had an older version of FOG installed, can you tell me what you have defined for dhcp option 67?
When iPXE boots, there is a series if hex values that indicate the build beyond the version number. What is the build number.
• Developer
@kfoster Did those machines properly PXE boot with the old server? What version was the old server, I guess pre 1.2.0, maybe 0.32?
Try using undionly.kkpxe (note the double ‘k’) to see if it boots the E6410. Although our hardware list states it as working with the normal PXE binary.
the latest undionly.kpxe file
What exactly do you mean by that?
Log in to reply
Looks like your connection to FOG Project was lost, please wait while we try to reconnect.
|
ESSENTIALAI-STEM
|
Geline Fuko
Adv. Geline Alfred Fuko is a Tanzanian lawyer, (Attorney) and human rights activist who is a graduate of the Joint European Master in Comparative Local Development This is an Erasmus Mundus Joint Master's programme at the University of Trento Italy, Financed by the European Union Commission Geline is a 2022 Draper Hills fellow at Stanford University with the Centre on Democracy, Development and the Rule of Law, Freeman Spogli Institute. She has helped to promote democracy in Tanzania in organisations such as Tangible Initiatives For Local Development Tanzania (TIFLD) She was instrumental in designing and managing the first and the only Online Public Database on constitutional resources. In 2016, she was granted a Mandela Washington Fellowship. Her achievements were specifically highlighted by President Obama at the YALI Presidential Summit in Washington, D.C. on 3 August 2016.
Early life
Born in Iringa Region of southern Tanzania, her early education was partly in rural Tanzania in the following regions Ruvuma, Tanga and few months in Singida. Later, she moved to Dar Es salaam for secondary education before joining a law school at the University of Dar Es Salaam, graduating in 2007. In 2010, she embarked on an Erasmus Mundus master's degree, spending most of her study time in Trento, Trentino Alto Adige Province in Northern Italy, and shorter periods at Corvinus University in Budapest, Hungary, and with United Nations Volunteers in Bonn, Germany. She then returned to Italy where earned double master’s degree certificates from the University of Trento and Corvinus University of Budapest in 2012. Prior to Italy, Geline attended courses for credit; Human Rights course at the University of Strasbourg France coordinated by the Institut International des Droits de l’Homme. In 2014 She attended a course for credit at Central European University in Budapest Hungary where she studied the Constitution making in Africa.
Career
As a graduate lawyer, and an advocate of the High Court and Subordinate Courts Tanzania, thanks to her interest in human rights, Fuko first worked with Legal and Human Rights Centre, a non-governmental and human rights organisation in Tanzania where she followed parliament sessions and emerging legislation, providing information services for the public. On returning from her Erasmus studies, she worked with various human rights organisations including Media Institute of Southern Africa, Tanzania chapter (Misa Tan), SIKIKA, Open Society Initiatives for Eastern Africa (managing two portfolios; Freedom of Expression and Anti -corruption) for six Eastern African countries. In 2014 -2016 Geline went back to work with Legal and Human Rights Centre headed the Online Public Database on Constitutional Resources, supporting public with information on how the constitution is written, translated and implemented Tanzania's constitution She designed digital management system for administration of public engagement with the resource centre. Geline worked with Tanzania Civil Society Consortium for Election Observation (TACCEO), she head the election observation centre, the centre that coordinated information flows from long and short term election observers and data clerks 2015 Tanzanian general election.
In 2016, Fuko was selected for a Mandela Washington Fellowship which provided her with academic and leadership training in the United States. During the fellowship, she was placed with Presidential Precinct in Charlottesville Virginia and hosted by the University of Virginia, the College of William and Mary, Morven Farm, and three presidential homes, Thomas Jefferson, James Monroe and James Madison. Those who had participated in the courses attended a reception in the Omni Shoreham Hotel in Washington DC. In his address to over 1,000 people and media who attended the event, President Obama specifically highlighted the achievements of Fuko:
"'Geline is a lawyer, and human rights activist. A few years ago, she thought people in Tanzania should be able to use their mobile phones to read their constitution, so she went out and designed Tanzania’s first database of constitutional resources, opening up her government to more of her people so they could understand their law and their rights and their responsibilities. So thank you so much, Geline, for the great work.'"
Fuko later commented that she never remotely imagined that her contribution to Tanzanian society would be acknowledged by someone as famous as President Obama.
She says that she enjoys being a music producer and performing hip hop.
When interviewed by Salima Hamisi of Hamasa Magazine in 2018, Geline Fuko concluded: "I have a burning desire to see a better Tanzania and I believe there are youth who can make it happen with a combination of efforts, will, determination, coordination and support. She is a recipient of multiple local and international awards for her engagement in community work in Tanzania"
Adv. Geline is the Founder and the Executive Director of Tangible Initiatives for Local Development Tanzania (TIFLD). It is a tech driven NGO registered in Tanzania. TIFLD’s mission is to contribute to the development of policies and laws that promotes democratic principles, strengthening institutions, mainstream the marginalised and build resilient communities. They work to promote sustainable development through participatory approach and innovative tools.”.
|
WIKI
|
American Football Women's League
The American Football Women's League (AFWL) is a defunct league that had eight teams.
It debuted on May 15, 2002, was one of the first women's football leagues formed, originally using the name WAFL, or Women's American Football League in 2001. The AFWL officially disbanded in March 2003, due to money and attendance problems.
AFWL teams
* Arizona Titans
* Long Beach Aftershock
* Los Angeles Lasers
* Sacramento Gold Rush
* San Diego Sunfire
* San Francisco Tsunami
|
WIKI
|
Wikipedia:Articles for deletion/The Shanxy and Noto Show
The result was delete.-- Kubigula (talk) 01:13, 24 November 2007 (UTC)
The Shanxy and Noto Show
* – (View AfD) (View log)
No indication of notability via significant coverage in reliable secondary sources per WP:N. Google returns zero hits outside of Wikipedia and mirrors making it extremely unlikely notability can be established or any claims in the article can be verified. -- Doctorfluffy (talk) 19:49, 16 November 2007 (UTC)
* Delete. A student radio programme is unlikely to be notable, and the article doesn't give any indication that this one is. About half the article seems to consist of in-jokes. -- EALacey (talk) 21:01, 16 November 2007 (UTC)
* Delete Newcastle Student Radio says it allBalloonman (talk) 08:12, 18 November 2007 (UTC)
|
WIKI
|
How to Unlock the Envy If I Forgot the Lock Code
by Randall Blackburn
The LG Envy requires the user to enter a “lock code” to perform certain functions on the phone. For example, to perform a factory reset, the user must enter the four-digit lock code twice during the process. If you have forgotten the lock code for your Envy, no need to worry. Just remember that the default lock code is always the last four numbers of your phone number. If you phone number is 312-123-4567, entering "4567" when prompted unlocks the phone. Enter your lock code to perform tasks, such as a master reset on the phone.
1. Tap the “Menu” button from the Home screen on the LG Envy.
2. Tap the “Settings & Tools” option, and then tap “Phone Settings.” The Phone Settings menu displays.
3. Tap the “Security” option to view the Security Settings menu. The Enter Phone Lock Code prompt displays.
4. Type the last four digits of your phone number. The Security Settings screen displays.
5. Tap “Restore Phone.” A warning message displays. Tap “OK.” The Phone Lock Code prompt displays once again.
6. Type the last four digits of your phone number into the input box. The phone powers down, and then boots back up. Factory default settings are restored.
Tip
• The lock code is always the last four digits of the phone's number. If the phone is second-hand, or the device is not yet activated, you will not have access to the phone's locked security features until the phone is assigned a number by a cellular carrier. Once the number is assigned, use the last four digits of the phone number to access the Restore feature and other locked security functions.
About the Author
Randall Blackburn has worked for several Fortune 1000 companies as a technical writer over the past seven years. He has produced a wide variety of technical documentation, including detailed programming specifications and research papers. Randall has also acquired several years' experience writing web content. Randall lives and works in Austin, TX.
Photo Credits
• Creatas Images/Creatas/Getty Images
bibliography-icon icon for annotation tool Cite this Article
|
ESSENTIALAI-STEM
|
Melissa THRASHER-LYON, on behalf of herself and a class of others similarly situated, Plaintiffs, v. ILLINOIS FARMERS INSURANCE COMPANY and CCS Commercial LLC d/b/a Credit Collection Services Commercial, Defendants.
No. 11 C 04473.
United States District Court, N.D. Illinois, Eastern Division.
March 20, 2012.
Michael I. Kanovitz, Anand Swaminathan, Arthur R. Loevy, Jonathan I. Loevy, Loevy & Loevy, Chicago, IL, for Plaintiffs.
Randall Allan Hack, Brian Ignatius Hays, Nathan W. Lamb, Locke Lord Bis-sell & Liddell LLP, David M. Schultz, Clifford E. Yuknis, Matthew Thomas Glavin, Hinshaw & Culbertson, Chicago, IL, for Defendants.
MEMORANDUM OPINION AND ORDER
RUBEN CASTILLO, District Judge.
Melissa Thrasher-Lyon (“Plaintiff’), brings this putative class action pursuant to the Telephone Consumer Protection Act (“TCPA”), 47 U.S.C. § 227, the Illinois Automatic Telephone Dialers Act (“ITA”), 815 111. Comp. Stat. 305/1 et seq., and the Illinois Consumer Fraud and Deceptive Business Practices Act (“ICFA”), 815 111. Comp. Stat. 505/1 et seq., against Illinois Fanners Insurance Company (“Fanners”) and CCS Commercial LLC, d/b/a Credit Collection Services Commercial (“CCS”), (collectively, “Defendants”). (R. 1, Compl. at 1.) Presently before the Court are Defendants’ motions to dismiss pursuant to Federal Rules of Civil Procedure 12(b)(1) and 12(b)(6). (R. 21, CCS’s Mot.; R. 25, Farmers’ Mot.) For the reasons discussed below, CCS’s motion to dismiss is denied in part and granted in part, and Farmers’ motion to dismiss is granted.
RELEVANT FACTS
On April 8, 2011, while riding her bicycle, Plaintiff was involved in an accident with a motorist at the corner of Racine Avenue and Belmont Avenue in Chicago, Illinois. (R. 1, Compl. ¶ 6.) According to Plaintiff, the motorist suffered no injuries, and there was only minor damage to the motorist’s vehicle. (Id.) Plaintiff suffered minor physical injuries. (Id.) The motorist was insured by Farmers. (Id. ¶ 7.)
On April 11, 2011, Farmers sent Plaintiff a letter stating that Plaintiff “was responsible for the damages in the amount of $3,240.19” and characterizing $3,240.19 as the “Amount Owed.” (Id. ¶ 8a.) The letter threatened to take “further action” against Plaintiff if she did not pay. (Id.) On May 2, 2011, Farmers sent Plaintiff a second letter, again characterizing $3,240.19 as the “Amount Owed,” threatening to take “further action” if Plaintiff failed to pay, and stating that a failure to pay would result in the claim being forwarded to a collection agency or attorney. (Id. ¶ 8b.) On May 11, 2011, Farmers sent Plaintiff a third letter similar to the April 11, 2011 letter. (Id. ¶ 8c.) According to Plaintiff, the $3,240.19 Farmers claimed Plaintiff owed was subject to dispute. (Id. ¶ 9.)
A little over one month after the accident, on May 16, 2011, CCS sent Plaintiff a “WARNING NOTICE” asserting that Farmers had subrogation rights for $3,240.19. (Id. ¶ 10a.) The notice stated that the matter had been referred to CCS “for recovery,” threatened that a failure to pay $3,240.19 “could result in a law suit [sic] being filed against [Plaintiff] and/or license suspension,” and included a box stating, “PAY IMMEDIATELY, $3,240.19.” (Id.) The notice further asserted that Farmers had paid the $3,240.19. (Id. ¶ 11.) According to Plaintiff, Farmers only paid $740.19 because the motorist’s policy included a $2,500 deductible. (Id.) On June 6, 2011, CCS sent Plaintiff another “WARNING NOTICE” again asserting that Farmers had subrogation rights for $3,240.19, stating that the matter had been referred to CCS for recovery, and threatening that failure to pay could result in a lawsuit or license suspension. (Id. ¶ 10b.) The June 6, 2011 letter also contained a box stating, “PAY IMMEDIATELY, $3,240.19.” (Id.) Both “WARNING NOTICES” directed Plaintiff to make a payment at the following website: “www. warningnotice.com.” (Id. ¶ 10.)
On June 27, 2011, Plaintiff alleges that she received a “SETTLEMENT NOTICE” notifying Plaintiff that if she paid a “reduced amount,” CCS would treat the claim for $3,240.19 as “settled-in-full.” (Id. ¶ 13.) This letter referenced the following website: “www.settlementnotice.com.” (Id. ¶ 14.)
In addition to the letters, Plaintiff avers that she received a series of telephone calls on her cellular telephone from CCS. (Id. ¶¶ 16-17.) According to Plaintiff, CCS placed the calls from an automatic telephone dialing system, and when Plaintiff was unable to answer the calls, CCS left a voicemail message on her phone using a machine or prerecorded voice. (Id. ¶ 16.) When Plaintiff was able to answer her phone, “there was silence; [and] no person was waiting on the other end.” (Id.) Finally, Plaintiff alleges that she never consented for CCS to call her at her cellular telephone number. (Id. ¶ 17.)
PROCEDURAL HISTORY
Plaintiff initiated this action on July 1, 2011. (R. 1, Compl.) In her complaint, Plaintiff alleges multiple counts against CCS and Farmers. Count I is a TCPA claim asserted against CCS. (Id. ¶¶ 45-48.) In Count II Plaintiff alleges that CCS violated the ITA. (Id. ¶¶ 49-50.) Counts III and IV are ICFA claims asserted against CCS and Farmers, respectively. (Id. ¶¶ 51-62.)
On August 25, 2011, CCS filed a motion to dismiss Plaintiffs complaint pursuant to Rule 12(b)(6). (R. 21, CCS’s Mot.) That same day, Fanners filed a motion to dismiss Plaintiffs complaint under Rules 12(b)(1) and 12(b)(6). (R. 25, Farmers’ Mot.) On August 30, 2011, CCS sought leave to supplement its memorandum in support of its motion to dismiss, (R. 30, CCS’s Mot. Supp.), which the Court granted on August 31, 2011. (R. 32, Min. Entry.)
In its motion to dismiss, CCS seeks dismissal of Plaintiffs TCPA, ITA, and ICFA claims against it for failure to state a claim and because Plaintiff lacks standing to bring her ICFA claim. (R. 21, CCS’s Mot. ¶ 2.) Farmers seeks dismissal of Plaintiff s ICFA claim against it for the same reasons. (R. 25, Farmers’ Mot. ¶ 2.)
LEGAL STANDARDS
A motion to dismiss pursuant to Rule 12(b)(1) asks the court to dismiss an action over which it allegedly lacks subject matter jurisdiction. Fed.R.Civ.P. 12(b)(1). The party asserting jurisdiction bears the burden of proof. See Glaser v. Wound Care Consultants, Inc., 570 F.3d 907, 913 (7th Cir.2009). All reasonable inferences are drawn in favor of the plaintiff, and all well-pleaded allegations are accepted as true. Long v. Shorebank Dev. Corp., 182 F.3d 548, 554 (7th Cir.1999). Additionally, when considering a motion to dismiss under Rule 12(b)(1), a court may look beyond the allegations of the complaint and may consider other submitted evidence. Johnson v. Apna Ghar, Inc., 330 F.3d 999, 1001 (7th Cir.2003); Capitol Leasing Co. v. FDIC, 999 F.2d 188, 191 (7th Cir.1993).
A motion under Rule 12(b)(6) “challenges the sufficiency of the complaint to state a claim upon which relief may be granted.” Hallinan v. Fraternal Order of Police of Chi. Lodge No. 7, 570 F.3d 811, 820 (7th Cir.2009). When reviewing a motion to dismiss, the Court accepts as true all factual allegations in the complaint and draws all reasonable inferences in the nonmovant’s favor. Id. Pursuant to Rule 8(a)(2), a complaint must contain “a ‘short and plain statement of the claim showing that the pleader is entitled to relief,’ sufficient to provide the defendant with ‘fair notice’ of the claim and its basis.” Tamayo v. Blagojevich, 526 F.3d 1074, 1081 (7th Cir.2008) (quoting Fed.R.Civ.P. 8(a)(2) and Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007)). “To survive a motion to dismiss, a complaint must contain sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’ A claim has facial plausibility when the plaintiff pleads factual content that allows the court to draw the reasonable inference that the defendant is liable for the misconduct alleged.” Ashcroft v. Iqbal, 556 U.S. 662, 129 S.Ct. 1937, 1949, 173 L.Ed.2d 868 (2009) (internal citations omitted).
Finally, affirmative defenses are generally not an appropriate grounds for dismissal at the complaint stage because plaintiffs are not required to plead facts in the complaint to anticipate and defeat affirmative defenses. United States v. Lewis, 411 F.3d 838, 842 (7th Cir.2005) (citing Gomez v. Toledo, 446 U.S. 635, 640, 100 S.Ct. 1920, 64 L.Ed.2d 572 (1980)); see also Indep. Trust Corp. v. Stewart Info. Serv. Corp., 665 F.3d 930, 935 (7th Cir.2012). Nonetheless, where a plaintiffs complaint “sets out all of the elements of an affirmative defense, dismissal under Rule 12(b)(6) is appropriate.” Indep. Trust Corp., 665 F.3d at 935 (citing Brooks v. Ross, 578 F.3d 574, 579 (7th Cir.2009)).
ANALYSIS
I. Count I: Plaintiffs TCPA claim against CCS
CCS first argues that Plaintiffs TCPA claim should be dismissed for failure to state a claim. The TCPA and its implementing rules and regulations make it unlawful “to make any call (other than a call ... made with the prior express consent of the called party) using any automatic telephone dialing system or an artificial or prerecorded voice-to any telephone number assigned to ... cellular telephone service.” 47 U.S.C. § 227(b)(1)(A)(iii); see also 47 C.F.R. § 64.1200(a)(l)(iii). The TCPA provides for a private right of action, based on violations of the TCPA or its regulations, “to recover for actual monetary loss from such a violation, or to receive $500 in damages for each such violation, whichever is greater[.]” 47 U.S.C. § 227(b)(3)(B). To state a TCPA cause of action, a plaintiff must allege: (1) that a call was made; (2) using an automatic telephone dialing system or artificial or prerecorded voice; (3) the number called was assigned to cellular telephone service; and (4) the call was not made with the prior express consent of the recipient. See Pimental v. Google Inc., No. 11-2585, 2012 WL 691784, at *2 (N.D.Cal. Mar. 2, 2012).
CCS argues that Plaintiff fails to state a TCPA claim because she gave prior express consent to be called on her cellular telephone. (R. 23, CCS’s Mem. at 3.) According to CCS, Plaintiffs provision of her cellular telephone number to the police, who recorded her telephone number on the accident report, constitutes express consent to call her on that number. (Id.) In response, Plaintiff argues that CCS never received Plaintiffs express consent; rather, CCS “skimmed her phone number” from the accident report. (R. 36, Pl.’s Resp. at 10.) According to Plaintiff, “[h]er act in giving her phone number to a police officer would at best amount to implied consent” and “has none of the hallmarks of the ‘prior express consent’” contemplated by the Federal Communications Commission. (Id. at 10-11.)
Although neither of the parties raise the issue, the Court notes that “ ‘express consent’ is not an element of a TCPA plaintiffs prima facie case, but rather is an affirmative defense for which the defendant bears the burden of proof.” Grant v. Capital Mgmt. Servs., L.P., 449 Fed.Appx. 598, 600 n. 1 (9th Cir.2011) (unpublished); see also D.G. v. Diversified Adjustment Serv., Inc., No. 11-2062, 2011 WL 5506078, at *3 (N.D.Ill. Oct. 18, 2011) (noting that the TCPA “sets forth the affirmative defense of express consent”); Martin v. Bureau of Collection Recovery, No. 10-7725, 2011 WL 2311869, at *1 (N.D.Ill. June 13, 2011) (classifying “prior express consent” as an affirmative defense). Granting a motion to dismiss on the basis of an affirmative defense is only appropriate where a plaintiff has alleged all elements of the affirmative defense in her complaint. Lewis, 411 F.3d at 842. Here, Plaintiff alleges that CCS placed telephone calls from an automatic telephone dialing system to her cellular telephone number, even though she “never consented for CCS to call her at that telephone number.” (R. 1, Compl. ¶¶ 16-17.) Because the four corners of Plaintiff s complaint allege that CCS did not have her prior express consent to contact her, the Court denies CCS’s motion to dismiss for failure to state a claim on this basis. See Greene v. DirecTV, Inc., No. 10-117, 2010 WL 1506730, at *2 (N.D.Ill. Apr. 14, 2010) (denying motion to dismiss where the four corners of Plaintiff s complaint alleged that defendant contacted her without first obtaining express consent).
II. Count II: Plaintiffs ITA claim against CCS
CCS next contends that Plaintiffs ITA claim fails to state a claim. The ITA’s “recorded messages provision” makes it unlawful “to play a prerecorded message placed by an autodialer without the consent of the called party.” 815 111. Comp. Stat. 305/30(b). The ITA also allows “[a]ny customer injured by a violation of this Act [to] bring an action for the recovery of damages.” 815 111. Comp. Stat. 305/30(c). Accordingly, to state a claim under the ITA, a plaintiff must allege that (1) she is a telephone customer; (2) the defendant placed a call using an autodialer; (3) the defendant played a prerecorded message; (4) the call was not made with her consent; and (5) she was injured by the defendant’s alleged violation. 815 111. Comp. Stat. 305/30(b)-(c).
CCS argues that Plaintiff fails to plead sufficient factual allegations to support her ITA claim for three reasons. First, CCS argues that Plaintiff fails to plead a claim because the ITA “enumerates four specific acts that can be the basis for a violation,” but Plaintiff has failed to make “any factual allegations plausibly supporting that CCS violated the [ITA] in any of the four enumerated ways.” (R. 23, CCS’s Mem. at 6.) Second, CCS argues that Plaintiff fails to sufficiently allege that she suffered an injury or damages. (Id. at 7.) Third, CCS argues that Plaintiff fails to make factual allegations that CCS played any “recorded messages” by an “autodialer,” as those terms are defined in the ITA, and furthermore, that Plaintiff provided her consent to receive the telephone calls. (R. 33, CCS’s Supp. at 1-2.)
With respect to CCS’s first argument, Plaintiff concedes that she “has not alleged a violation of the [ITA’s] restrictions on the methods of using autodialers,” but that instead “she brings her claim only under the recorded messages provision.” (R. 36, PL’s Resp. at 15.) Accordingly, the Court focuses on the ITA’s recorded messages provision.
Regarding CCS’s second argument, where actual injury or damages are an element of a claim, as they are here, a plaintiff must state sufficient facts alleging that she has suffered an injury or damages. See Yu v. Int’l Bus. Machs. Corp., 314 Ill.App.3d 892, 247 Ill.Dec. 841, 732 N.E.2d 1173, 1177 (1st Dist.2000) (affirming district court’s dismissal of plaintiff s complaint and holding that plaintiffs claims, which required actual injury or damage, constituted mere “conjecture and speculation,” because plaintiff failed to allege any actual harm). In her complaint, Plaintiff alleges that pursuant to the ITA, she “seeks to recover statutorily set damages” from CCS, (R. 1, Compl. ¶ 1), that she “is entitled to recover treble damages,” (Id. ¶ 19, 50), and that she was “damaged as a direct and proximate result” of CCS’s alleged violations of the ITA. (Id. ¶ 50.) Based on these allegations, Plaintiff argues that she has pleaded that she was damaged and further, that Defendants have not pointed to anything to make this allegation implausible. (R. 36, PL’s Resp. at 15.) Nowhére in her complaint, however, does she detail the precise injury she suffered or how she was damaged or injured by CCS’s alleged violations of the ITA’s recorded messages provision. The Court finds that Plaintiff has only alleged injury or damages in a most conclusory manner as her complaint lacks any facts about how precisely she was damaged. Accordingly, Plaintiffs damages allegations are insufficient to state a claim for relief.
Even if Plaintiff had sufficiently alleged an injury, however, the Court finds that Plaintiff also fails to allege that CCS placed telephone calls using a “recorded message,” as that term is defined in the ITA. Specifically, Plaintiff alleges that CCS placed the calls “from an automatic telephone dialing system!,]” and that “[w]hen Plaintiff was not available to answer the calls, each time a voicemail message was left on her phone using a machine or prerecorded voice.” (R. 1, Compl. ¶ 16.) She also alleges that, “[w]hen Plaintiff was able to answer her cellular phone, there was silence; no person was waiting on the other end.” (Id.) Under the ITA, “recorded messages” are “taped communications soliciting the sale of goods or services without live voice interaction.” 815 111. Comp. Stat. 305/5(e). Nowhere in her complaint does Plaintiff allege that the messages she received were communications soliciting the sale of goods or services. Indeed, nowhere in her complaint does Plaintiff set forth any details about the contents of the messages.
CCS also complains that Plaintiff fails to allege that it used “autodialer” equipment when placing the telephone calls. The ITA defines “autodialers” as “any telephone dialing ... system ... programmed to sequentially or randomly access the stored telephone numbers in order to automatically connect a telephone with a recorded message[.]” 815 111. Comp. Stat. 305/5(a). According to CCS, because Plaintiff failed to state that an automatic telephone dialing system was used “in order to automatically connect a telephone with a recorded message,” Plaintiff has not sufficiently alleged that autodialer equipment was used. (R. 33, CCS’s Supp. at 2.) While the Court is inclined to disagree with CCS’s hyper-technical argument because Plaintiffs allegation that CCS used an automatic telephone dialing system places CCS on notice as to the type of equipment used, Plaintiff is advised to amend her complaint in this respect so as to avoid this type of challenge to any amended complaint she may file.
Finally, CCS argues that as with her TCPA claim, Plaintiff fails to state an ITA claim because she provided her consent. (R. 23, CCS’s Mem. at 7; R. 33, CCS’s Supp. at 2.) Although this Court’s research has not found any case law analyzing the ITA’s consent provision and whether the ITA requires express or implied consent, the Court finds that like the TCPA, consent is an affirmative defense. Plaintiff has not set forth any facts in her complaint to definitively conclude that she provided CCS consent to call her cellular telephone number, and instead alleges that she never consented for CCS to call her at her cellular telephone number. (R. 1, Compl. ¶ 17.) Because the four corners of Plaintiff s complaint allege that CCS did not have her consent to contact her, the Court declines to grant CCS’s motion to dismiss her ITA claim on this basis.
Accordingly, Plaintiff’s ITA claim against CCS is dismissed because Plaintiff fails to sufficiently allege that she suffered any damages or that CCS placed telephone calls using a “recorded message” or an “autodialer” as those terms are defined in the ITA.
III. Counts III and IV: Plaintiffs ICFA claims against CCS and Farmers
Both CCS and Farmers move to dismiss Plaintiffs ICFA claims in Counts III and IV of her complaint. The ICFA makes it unlawful to engage in “unfair or deceptive acts or practices, including ... fraud, false pretense, false promise, misrepresentation or the concealment, suppression or omission of any material fact, with intent that others rely upon the concealment, suppression or omission of such material fact ... in the conduct of any trade or commerce.” 815 111. Comp. Stat. 505/2. The ICFA creates a private cause of action for “[a]ny person who suffers actual damage as a result of a violation of [the ICFA.]” 815 111. Comp. Stat. 505/10a(a).
Defendants posit several grounds for the dismissal of Plaintiff s ICFA claims. Defendants first argue that Plaintiffs claims should be dismissed because she fails to allege facts plausibly supporting any deceptive or unfair acts in trade or commerce, and that she lacks standing under the ICFA because she is not a consumer. (R. 23, CCS’s Mem. at 7-9; R. 26, Farmers’ Mem. at 5-7; R. 37, Farmers’ Reply at 7-9.) Second, Defendants argue that Plaintiffs ICFA claims should be dismissed because she fails to allege that she has been “harmed in a concrete, tangible way,’ ” and therefore she lacks Article III standing and has failed to state an ICFA claim. (R. 23, CCS’s Mem. at 10; R. 26, Farmers’ Mem. at 8; R. 38, CCS’s Reply at 12-13; R. 37, Farmers’ Reply at 2-7.) Third, Defendants argue that the letters Plaintiff received were proper because Farmers and CCS were entitled to collect the full $3,240.19. (R. 23, CCS’s Mem. at 10-11; R. 37, Farmers’ Reply at 10-11.)
A. Whether Plaintiff has sufficiently alleged that she has Article III Standing
The Court first addresses Defendants’ standing arguments. As an initial matter, the Court notes that in responding to Defendants’ arguments, Plaintiff conflates the concepts of statutory standing with Article III standing, and in so doing fails to address Defendants’ arguments that she lacks Article III standing to pursue her claims. (R. 36, Pl.’s Resp. at 21-23.) Whereas “Article III standing enforces the Constitution’s case-or-controversy requirement!,]” in determining whether a plaintiff has statutory standing, “a court considers whether Congress, via a statutory provision, ‘has accorded this injured plaintiff the right to sue the defendant to redress his injury.’ ” George v. Kraft Foods Global, Inc., 270 F.R.D. 355, 364 (N.D.Ill.2010) (citing Winkler v. Gates, 481 F.3d 977, 979 (7th Cir.2007); quoting Graden v. Conexant Sys. Inc., 496 F.3d 291, 296 (3d Cir.2007)). “[Satisfying Article Ill’s requirements does not automatically confer statutory standing!,]” nor is statutory standing “a substitute for Article III standing.” Id. (citing Kohen v. Pacific Inv. Mgmt. Co., LLC, 571 F.3d 672, 677 (7th Cir.2009); Raines v. Byrd, 521 U.S. 811, 820 n. 3, 117 S.Ct. 2312, 138 L.Ed.2d 849 (1997)).
To establish Article III standing, a plaintiff must allege (1) an injury in fact; (2) a causal connection between the injury and the conduct complained of; and (3) a likelihood that the injury will be “redressed by a favorable decision.” Lujan v. Defenders of Wildlife, 504 U.S. 555, 560-61, 112 S.Ct. 2130, 119 L.Ed.2d 351 (1992) (quoting Simon v. Eastern Ky. Welfare Rights Org., 426 U.S. 26, 41-42, 96 S.Ct. 1917, 48 L.Ed.2d 450 (1976)). The Supreme Court has cautioned that “[a]t the pleading stage, general factual allegations of injury resulting from the defendant’s conduct may suffice, for on a motion to dismiss we ‘presum[e] that general allegations embrace those specific facts that are necessary to support the claim.’ ” Lujan, 504 U.S. at 561, 112 S.Ct. 2130 (1992) (quoting Lujan v. Nat’l Wildlife Fed’n, 497 U.S. 871, 889, 110 S.Ct. 3177, 111 L.Ed.2d 695 (1990)). Here, Plaintiff fails to allege even general factual allegations that she suffered an injury-in-fact, that there is a causal connection between her injury and Defendants’ conduct, or that there is a likelihood that her injury will be redressed by a favorable decision. For instance, nowhere in her complaint does Plaintiff allege that she was injured or harmed. Plaintiff asserts in quite conclusory terms that she “was damaged as a direct and proximate result” of Defendants’ violations of the ICFA. (R. 1, Compl. ¶¶ 55, 61.) The only factual allegations she makes to support her ICFA claims are that she received misleading letters and written notices. (Id. ¶¶ 8-14.) Therefore, the Court finds that Plaintiff has not sufficiently alleged that she has Article III standing to proceed on her ICFA claims.
B. Whether Plaintiff has statutory standing under the ICFA to pursue her claim
Next, Defendants argue that Plaintiffs ICFA claims also fail because: (1) Plaintiffs claims against them do not involve trade or commerce, and (2) because she is not a consumer under the ICFA, she therefore lacks standing. (R. 23, CCS’s Mem. at 7-9; R. 26, Farmers’ Mem. at 5-7; R. 37, Farmers’ Reply at 7-9.) To adequately plead a private cause of action under the ICFA, a plaintiff must allege: (1) an unfair or deceptive act or practice by the defendant; (2) the defendant’s intent that the plaintiff rely on the deception; (3) that the deception occurred in the course of conduct involving trade or commerce; (4) actual damage to the plaintiff; and (5) that such damages were proximately caused by the defendant’s deception. Coy Chiropractic Health Ctr., Inc. v. Travelers Cas. and Sur. Co., 409 Ill.App.3d 1114, 354 Ill.Dec. 381, 957 N.E.2d 1174, 1181 (5th Dist.2011) (quoting Avery v. State Farm Mut. Auto. Ins. Co., 216 Ill.2d 100, 296 Ill.Dec. 448, 835 N.E.2d 801, 850 (2005)); see also Oliveira v. Amoco Oil, Co., 201 Ill.2d 134, 267 Ill.Dec. 14, 776 N.E.2d 151, 160 (2002). Furthermore, an ICFA action must be pled with particularity. Global Total Office Ltd. Partnership v. Global Allies, LLC, No. 10-1896, 2011 WL 3205487, at *2 (N.D.Ill. July 28, 2011); Connick v. Suzuki Motor Co., Ltd., 174 Ill.2d 482, 221 Ill.Dec. 389, 675 N.E.2d 584, 593 (1996) (“[A] complaint alleging a violation of consumer fraud must be pled with the same particularity and specificity as that required under common law fraud.”). Therefore, a plaintiff “must allege with particularity the ‘who, what, when, where, and how’ of the fraud or misrepresentation.” Id. (quoting DiLeo v. Ernst & Young, 901 F.2d 624, 627 (7th Cir.1990)).
1. Whether Defendants’ conduct falls within the purview of the ICFA
Defendants first argue that Plaintiffs ICFA claims do not involve trade or commerce. (R. 23, CCS’s Mem. at 7-8; R. 26, Farmers’ Mem. at 5-6.) Under the ICFA, the terms “trade” and “commerce” mean “the advertising, offering for sale, sale, or distribution of any services and any property, tangible or intangible, real, personal or mixed, and any other article, commodity, or thing of value wherever situated, and shall include any trade or commerce directly or indirectly affecting the people of [Illinois].” 815 111. Comp. Stat. 505/l(f). Additionally, the ICFA provides that it “shall be liberally construed to effect the purposes thereof.” ' 815 111. Comp. Stat. 505/lla. According to Defendants, their acts of pursuing Farmers’ subrogation rights by seeking to recover damages caused by Plaintiff are not “trade or commerce” because they did not sell, offer to sell, or advertise anything to Plaintiff nor did Plaintiff purchase anything from them. (R. 23, CCS’s Mem. at 7-8; R. 26, Farmers’ Mem. at 5-6.)
Contrary to Defendants’ argument, the Illinois Supreme Court has found that debt collection practices are embraced by the ICFA. People ex rel. Daley v. Datacom Sys. Corp., 146 Ill.2d 1, 165 Ill.Dec. 655, 585 N.E.2d 51, 64 (1991). In Daley, the Cook County State’s Attorney brought an action against the City of Chicago and Datacom, a debt collector, hired by the City of Chicago to collect fines owed on city parking tickets. Id., 165 Ill.Dec. 655, 585 N.E.2d at 54-55. The State’s Attorney alleged that Datacom’s actions with regards to the collection of parking ticket fines violated the Illinois Collection Agency Act and the ICFA. Id. Datacom argued that the ICFA did not apply to its conduct “because the [ICFA] protects only consumers, the alleged parking violators are not consumers, and therefore the alleged parking violators do not have standing under the [ICFA].” Id., 165 Ill.Dec. 655, 585 N.E.2d at 64. The Illinois Supreme Court rejected this “restrictive construction of the ICFA” and reasoned that “the definition of ‘trade’ and ‘commerce’ in the [ICFA] includes the ‘distribution of any services ... directly or indirectly affecting the people of this State.’ ” Id. (emphasis in original). The Illinois Supreme Court noted that Datacom sold and provided full collection services to the City of Chicago, and as a result, Datacom “mailed several demand notices to, and collected money from, hundreds of thousands of people in [Illinois].” Id. These actions, the court found, “constituted the sale and distribution of services which directly or indirectly affected the people of Illinois, namely the alleged parking violators, and thus amounted to conduct of trade or commerce as defined by the [ICFA].” Id.
Similarly, Plaintiff alleges that CCS provided services to Farmers, specifically debt collection services. (R. 1, Compl. ¶ 5.) Plaintiff further alleges that in providing these services to Fanners, CCS “uses the mails and interstate telephony to collect disputed claims and debts[.]” (Id.) Daley suggests that Defendants’ actions, like those of Datacom, constitute the sale or distribution of services that directly or indirectly affect residents of Illinois, and therefore Defendants’ actions constitute trade or commerce as liberally construed under the ICFA. A subsequent case, Norton v. City of Chicago, 267 Ill.App.3d 507, 204 Ill.Dec. 938, 642 N.E.2d 839 (1st Dist.1994), casts doubt on whether Plaintiff may bring an action against Defendants for their debt collection practices, however, based on Defendants’ second argument that Plaintiff, is not a consumer under the ICFA.
2. Whether Plaintiff must be a consumer or satisfy the consumer nexus test to pursue her ICFA claim
In Norton, a case arising from the litigation in Daley, plaintiffs brought suit against Datacom, the City of Chicago, and Cook County, alleging, inter alia, violations of the ICFA. 204 Ill.Dec. 938, 642 N.E.2d at 840. The Illinois appellate court, relying on an earlier Illinois Supreme Court case, Steinberg v. Chicago Medical School, 69 Ill.2d 320, 13 Ill.Dec. 699, 371 N.E.2d 634, 638 (1977), held that plaintiffs lacked standing to bring their ICFA action because unlike the plaintiff in Daley, the Norton plaintiffs were “a group of private citizens who allegedly committed parking violations” and were not consumers. 204 Ill.Dec. 938, 642 N.E.2d at 841. The Norton court distinguished Daley on the basis that the plaintiff in Daley was the State’s Attorney, and accordingly, the State’s Attorney status as a consumer was irrelevant. Norton suggests, and Defendants argue, that only consumers may bring actions pursuant to the ICFA. (R. 23, CCS’s Mem. at 8; R. 26, Farmers’ Mem. at 6.)
Under the ICFA, a consumer is “any person who purchases or contracts for the purchase of merchandise not for resale in the ordinary course of his trade or business but for his use or that of a member of his household.” 815 Ill. Comp. Stat. 505/l(e). Here, Plaintiff has not alleged that she purchased or contracted for the purchase of anything from Defendants. Accordingly, it is clear that she is not a consumer under section 505/1(e) of the ICFA. Section 10(a) of the ICFA, however, provides that “[ajny person who suffers actual damage as a result of a violation of [the ICFA] committed by any other person may bring an action against such person.” 815 111. Comp. Stat. 505/10a(a) (emphasis added). By its terms, therefore, the ICFA does not appear to limit the private right of action to “consumers.” Nonetheless, Defendants assert that Illinois courts have consistently dismissed ICFA claims brought by non-consumers. (R. 37, Farmers’ Reply at 7.)
Contrary to Defendants’ assertions, Illinois courts are split on this issue. See Bank One Milwaukee v. Sanchez, 336 Ill. App.3d 319, 270 Ill.Dec. 642, 783 N.E.2d 217, 220 (2d Dist.2003). In Bank One Milwaukee, an Illinois appellate court recognized that there is “a line of cases denying standing to plaintiffs where it was determined that they were not consumers.” 270 Ill.Dec. 642, 783 N.E.2d at 220 (citing Norton, 204 Ill.Dec. 938, 642 N.E.2d at 841; McCarter v. State Farm Mutual Auto. Ins. Co., 130 Ill.App.3d 97, 85 Ill. Dec. 416, 473 N.E.2d 1015, 1018 (3d Dist. 1985); Steinberg, 13 Ill.Dec. 699, 371 N.E.2d at 638). The court noted, “however, that another line of cases exists that allows a plaintiff to maintain a cause of action under the [ICFA] despite the fact that the plaintiff is not a consumer as defined by the Act.” Id. (citing Sullivan’s Wholesale Drug Co. v. Faryl’s Pharmacy, Inc., 214 Ill.App.3d 1073, 158 Ill.Dec. 185, 573 N.E.2d 1370, 1376 (5th Dist.1991); Downers Grove Volkswagen, Inc. v. Wigglesworth Imports, Inc., 190 Ill.App.3d 524, 137 Ill.Dec. 409, 546 N.E.2d 33, 40-41 (2d Dist.1989)). Indeed, courts in this District have also noted the split in authority and have rejected arguments that ICFA actions are limited to consumers. Wiegel v. Stork Craft Mfg., Inc., 780 F.Supp.2d 691, 693-94 (N.D.Ill.2011) (“[T]here is nothing in the [ICFA] that suggests that it applies only to ‘consumers[.]’ ”); P.I.A. Michigan City, Inc. v. Nat’l Porges Radiator Corp., 789 F.Supp. 1421, 1427 (N.D.Ill.1992) (denying defendant’s motion to dismiss plaintiffs ICFA claims on the basis that plaintiff was not a consumer and therefore lacked standing and noting that although Steinberg “does not expressly limit consumer fraud claims to being brought by consumers, Steinberg has subsequently been cited for that proposition” by some Illinois cases, none of which were cases from the Illinois Supreme Court). The Seventh Circuit has also noted that section 10(a) of the ICFA “does not protect just consumers, but any person.” Williams Elecs. Games, Inc. v. Garrity, 366 F.3d 569, 579 (7th Cir.2004) (noting that the courts have “glossed this provision to require that the fraud be of sufficient magnitude to be likely to affect the market generally, ... and thus be likely to harm consumers in the colloquial sense of the ultimate buyers of the finished product”) (citing Bank One Milwaukee, 270 Ill.Dec. 642, 783 N.E.2d at 221; Speakers of Sport, Inc. v. ProServ, Inc., 178 F.3d 862, 868 (7th Cir.1999)).
Considering the split of authority, the Illinois appellate court in Bank One Milwaukee held that the “consumer nexus test” test articulated in Downers Grove Volkswagen, Inc., which allows a business to maintain-a cause of action under the ICFA even though the business is not a consumer of the defendant’s goods, should apply equally to nonbusiness plaintiffs. 270 IlLDec. 642, 783 N.E.2d at 221. The court reasoned that “[a] contrary holding, that businesses have standing to vindicate such concerns while natural persons do not, would be anomalous ... and [there is] no basis in the [ICFA] itself or elsewhere for drawing such a distinction.” Id. Under the consumer nexus test, “if a natural person ... alleges ‘conduct [that] involves trade practices addressed to the market generally or otherwise implicates consumer protection concerns’ that person has standing to sue under the [ICFA].” Id.; see also CustomGuide v. CareerBuilder, LLC, 813 F.Supp.2d 990, 1001 (N.D.Ill. 2011) (noting that consumer nexus test requires plaintiff to plead that the conduct complained of “ ‘involves trade practices directed to the market generally or otherwise implicates consumer protection concerns.’ ”) (quoting Vulcan Golf, LLC v. Google Inc., 552 F.Supp.2d 752, 777 (N.D.Ill.2008)). Thus, as Defendants argue, the consumer nexus test applies to determine whether a non-consumer Plaintiff has standing to pursue an ICFA claim.
The Court therefore turns to whether Plaintiff, a non-consumer, has met the consumer nexus test. To establish an implication of consumer concerns, a plaintiff must plead the following: “(1) that [its] actions were akin to a consumer’s actions to establish a link between [it] and consumers; (2) how defendant’s representations ... concerned consumers other than [plaintiff]; (3) how defendant’s particular [action] involved consumer protection concerns; and (4) how the requested relief would serve the interests of consumers.” Global Total Office Ltd. P’ship, 2011 WL 3205487, at *2 (quoting Brody v. Finch Univ. of Health Scis./Chi. Med. Sch., 298 Ill.App.3d 146, 232 Ill.Dec. 419, 698 N.E.2d 257, 269 (2d Dist.1998)). Here, Plaintiff fails to set forth any factual allegations plausibly supporting any consumer concerns to satisfy the consumer nexus test. For instance, Plaintiff fails to allege how Defendants’ actions or representations concerned consumers other than Plaintiff or how their actions involved consumer protection concerns. See Harris v. JAT Trucking of Illinois, Inc., No. 07-2210, 2009 WL 2222740, at *9 (C.D.Ill. July 24, 2009) (plaintiff failed to meet consumer nexus test where he did not allege that defendants’ deceptive practices were “directed to the market generally.”) Additionally, Plaintiff fails to allege that the letters and written notices she received concerned anyone other than her or that Defendants made misrepresentations to the general public. Accordingly, Plaintiff has not set forth sufficient allegations to demonstrate that she has standing to pursue her ICFA claims and the Court dismisses her ICFA claims on this basis.
C. Whether Plaintiff sufficiently alleged that she suffered actual damages
Even if Plaintiff had sufficiently set forth factual allegations satisfying the consumer nexus test, the Court finds that Plaintiffs ICFA claims would still fail because she has failed to allege that she was damaged. To bring an action pursuant to the ICFA, a plaintiff must allege “actual damages” and the “actual damages must arise from ‘purely economic injuries.’ ” Cooney v. Chi. Pub. Schs., 407 Ill.App.3d 358, 347 Ill.Dec. 733, 943 N.E.2d 23, 31(lst Dist.2010) (quoting Morris v. Harvey Cycle & Camper, Inc., 392 Ill. App.3d 399, 331 Ill.Dec. 819, 911 N.E.2d 1049, 1053 (1st Dist.2009), and affirming circuit court’s dismissal of plaintiff s claims where plaintiff alleged that the harm suffered was an increased risk of harm). “Actual damages must be calculable and ‘measured by the plaintiff[’]s loss.’ ” Morris, 331 Ill.Dec. 819, 911 N.E.2d at 1053; see also Price v. Philip Morris, Inc., 219 Ill.2d 182, 302 Ill.Dec. 1, 848 N.E.2d 1, 55(2005) (Karmeier, J. concurring) (noting that a plaintiff must allege that she was harmed “in a concrete, ascertainable way[,]” meaning that the defendant’s deception made plaintiff tangibly worse off). Additionally, emotional damages do not constitute actual damages under the ICFA. Morris, 331 Ill.Dec. 819, 911 N.E.2d at 1053 (affirming trial court’s dismissal of plaintiffs claim for relief under the ICFA where plaintiff “alleged only emotional damages”).
Plaintiff argues that “[u]nder Iqbal, [she] need only make an allegation of damages that is factual ... and the allegation must not be ‘implausible’ under the circumstances.” (R. 36, Pl.’s Resp. at 23.) In her complaint, Plaintiff alleges only that she “seeks to recover statutorily set damages” from Defendants (R. 1, Compl. ¶ 1), she “is entitled to recover actual and punitive damages” (Id. ¶¶ 14, 56, 62), and she was “damaged as a direct and proximate result” of Defendants’ alleged violations of the ICFA. (Id. ¶¶ 55, 61.) Contrary to Plaintiffs argument, these allegations are mere legal conclusions. Such allegations fail to provide Defendants with any notice about the amount and extent of harm Plaintiff has allegedly suffered or how exactly she was damaged or injured. Such allegations are not factual in nature and they cannot save Plaintiffs complaint.
Plaintiff also argues that she has alleged that she suffered damages as a result of Defendants’ “deceptive letters” and while she may not have alleged that she acted on the letters, the case law is well-established that “actual damages may include emotional distressf.]” (R. 36, PL’s Resp. at 23-24) (citing Hill v. Sisters of St. Francis Health Servs., Inc., No. 06-1488, 2006 WL 3783415, at *5 (N.D.Ill. Dec. 20, 2006) and Greisz v. Household Bank (Ill.), 8 F.Supp.2d 1031, 1043 (N.D.Ill.1998).) This argument fails for two reasons. First, nowhere in her complaint does Plaintiff allege she suffered emotional damages. Second, even if she had alleged such damages, it is now well-established that where a plaintiff only alleges that she suffered emotional damages in an ICFA claim, such allegations are not sufficient to survive a motion to dismiss. As articulated in Morris, to state a claim under the ICFA a plaintiff must allege that she suffered specific, actual damages and an allegation of only emotional damages precludes a claim under the ICFA. 331 Ill.Dee. 819, 911 N.E.2d at 1053. The cases Plaintiff relies upon in support of her argument are cases interpreting the ICFA that were decided prior to, and without the benefit of, Morris. Accordingly, the Court finds that Plaintiff has failed to state a plausible claim for relief under the ICFA.
D. Whether the letters and notices Defendants sent Plaintiff were deceptive
Finally, CCS and Farmers both argue that the letters they sent were not deceptive. (R. 23, CCS’s Mem. at 10-11; R. 37, Farmers’ Reply at 10-11.) The Illinois Supreme Court has cautioned, however, that whether a defendant’s notices were deceptive and violated the ICFA “is a factual issue which must be decided by the trier of fact[.]” Daley, 165 Ill.Dee. 655, 585 N.E.2d at 66. As a matter of law and for purposes of deciding a motion to dismiss, the Court cannot say that the notices were or were not deceptive in violation of the ICFA. See id. Accordingly, the Court declines to dismiss Plaintiffs complaint on this basis.
CONCLUSION
For the foregoing reasons, CCS’s motion to dismiss (R. 21) is DENIED as to Count I and GRANTED as to Counts II and III. Farmers’ motion to dismiss (R. 25) is GRANTED. Plaintiff is given leave to file an amended complaint that conforms to this opinion within 30 days. The parties shall appear for a status hearing on April 26, 2012 at 9:45 A.M. In the meantime, the parties are requested to exhaust all remaining settlement possibilities in light of this opinion.
. Subrogation is simply “[t]he substitution of one party for another whose debt the party pays, entitling the paying party to rights, remedies, or securities that would otherwise belong to the debtor.” Black's Law Dictionary (9th ed.2009). In the insurance context, subrogation is “[t]he principle under which an insurer that has paid a loss under an insurance policy is entitled to all the rights and remedies belonging to the insured against a third party with respect to any loss covered by the policy.” Id.
. The ICFA also provides that ”[i]n construing this section consideration shall be given to the interpretations of the Federal Trade Commission and the federal courts relating to Section 5(a) of the Federal Trade Commission Act ['FTCA'].” 815 111. Comp. Slat. 505/2. In Daley, the Illinois Supreme Court separately relied on the FTC regulation concerning the collection of debts to support its conclusion that Datacom’s debt collection activities involved trade or commerce. 165 Ill.Dec. 655, 585 N.E.2d at 64. Although, those regulations have since been rescinded, Perperas v. United Recovery Sys., Inc., No. 96-7693, 1997 WL 136326, at *3 (N.D.Ill. Mar. 19, 1997), at least one circuit since the rescission has continued to recognize that the "[t]he deceptive acts or practices forbidden by the [FTCA] include those used in the collection of debts.” FTC v. Check Investors, Inc., 502 F.3d 159, 166-67 (3d Cir.2007) (quoting Trans World Accounts, Inc. v. FTC, 594 F.2d 212, 214 (9th Cir.1979)).
. Plaintiff relies heavily on a Washington Supreme Court case, Panag v. Farmers Ins. Co. of Washington, 166 Wash.2d 27, 204 P.3d 885, 895-96 (2009), to argue that the Washington Supreme Court previously considered Farmers’ "very same subrogation collections practices” to fall within the purview of Washington’s Consumer Fraud Act. (R. 36, Pl.'s Resp. at 19.) Plaintiff further argues that this Court should follow the Washington Supreme Court in denouncing a consumer nexus requirement. {Id.) Because Illinois courts have interpreted the ICFA quite differently, the Court declines to consider Panag.
|
CASELAW
|
Anton Filippov
Anton Filippov (born 6 December 1986 in Tashkent ) is an Uzbekistani chess Grandmaster (2008).
Career
He won the Asian Under 16 Chess Championship 2001 in Doha, and the Asian U18 Athletics Championship in 2004. In 2007 he tied for 1st–3rd with Vladimir Egin and Timur Gareev in the Uzbekistani Chess Championship. In 2008 he won the first Kuala Lumpur Open Championship and tied for 4–8th with Tamaz Gelashvili, Constantin Lupulescu, Nidjat Mamedov and Alexander Zubarev in the Open Romgaz Tournament in Bucharest 2008. In 2009, he won the fourth President Gloria Macapagal Arroyo Cup in Manila, tied for second with Shakhriyar Mamedyarov in the fourth Kolkata Open, tied for 3rd–8th with Vadim Malakhatko, Elshan Moradiabadi, Merab Gagunashvili, Alexander Shabalov and Niaz Murshed in the Ravana Challenge Tournament in Colombo. He qualified for the Chess World Cup 2009 and was knocked out by Surya Shekhar Ganguly in the first round. In 2010 he tied for 3rd–6th with Ding Liren, Zhou Jianchao and Merab Gagunashvili in the first Florencio Campomanes Memorial in Manila and came first in the First Safin Memorial in Tashkent. In 2011, he tied for 1st–3rd with Tigran L. Petrosian and Marat Dzhumaev in the Georgy Agzamov Memorial in Tashkent.
Filippov played for Uzbekistan in the Chess Olympiads of 2004, 2006, 2010, 2012 and 2014.
Filippov recorded his career best performance of 2820 at the 40th Chess Olympiad in Istanbul 2012, where he won the individual silver medal on board two.
|
WIKI
|
helm kubernetes
Helm – Configuration Management for Kubernetes Resources
Developer ships application in Docker container, so it can eventually hosted in Kubernetes cluster. However, there are still some installation steps, before the application can operate online in production. In this post, we use the container image of Orthanc application as a starting point. We first build services in Kubernetes to go through these steps. Then, to automate the steps, we build a helm chart. The code is kept in Korthweb project, in which the manual directory has the files requirement for manual deployment, and the helm directory is the helm chart.
Manual Deployment
The manual deployment steps include different kinds of activities, such as creating X.509 certificates, apply config map, create Kubernetes deployment using the YAML declarations, and use helm to install dependency. The steps need to take place in a particular sequence. Some step requires pulling information from secrets created in the previous step. This is why the deployment is not portable.
In order to automate the steps, one might think of wrapper script, which is very limited. A configuration management tool is needed in this scenario. Two common options are Kustomize, and Helm. Kustomize is a native tool which can be run by kubectl. It is also driven by declarative statement in YAML, which is simple to grasp. However, in lack of a templating mechanism, Kustomize may require wordy statements. Helm, on the other hand, comes with a templating mechanism which greatly increase reusability, making it more suitable for complex steps required in installation.
Helm Repo and Chart
Helm is known as package manager for applications running on Kubernetes. Helm defines an application as a collection of related Kubernetes resources, and it manages application deployment through a templated approach. An installation workbook is called a chart. Charts are kept in repositories. There are some well-known repositories, such as Bitnami, Helm stable. You need to add a repostory before using the Helm Charts in it. To add a repo, run:
helm repo add bitnami https://charts.bitnami.com/bitnami
You can host your own repo (public or private) as well. To search for charts across repositories, the best place is artifact hub, which indexes charts from a lot of public repositories. To search for charts from the repositories added, run:
helm search repo postgres
Template is the soul of Helm chart. A Helm chart consists of a directory of files following specific pattern so Helm can understand how to deploy the application. For example, the chart name is the name of the working directory. Under the directory, the values.yaml and chart.yaml defines variables and constants, both serving as template inputs. The template directory is the most important part of the directory where the installation logics are defined. Helm runs the entire directory hierarchy (except for paths specified in .helmignore file) through a Go template rendering engine. The template result spec out the detailed steps.
A great example of using Helm chart to simplify installation is the wordpress chart by Bitnami. You can install all the required components in a single command:
helm install my-release bitnami/wordpress
The helm chart in Korthweb project is also an evolving helm chart I created for installing Orthanc application.
Helm V3 (released in late 2019) includes an important architectural change – the removal of tiller. This means Helm can operate on the client-side – a significant simplification. Helm graduated from CNCF project in 2020. There are also a few changes in V3, as outlined here, including the consolidation of requirements.yaml into Charts.yaml.
Template and Function
As discussed, templating is the key towards reusability and flexibility in configuration management. We’ve worked with Jinja2 template engine in Ansible and Python. Here in Helm, we use Go templates with some enhancement. The syntax is mostly based on Go template, which is somewhat similar to Jinja2. Helm also added all functions from the Sprig library, making it more powerful and flexible than Jinja2. Helm chart developer should be very familiar with these functions, as well as the best practices. For example, the cryptographic and security functions in Sprig library gives us the ability to create self-signed X509 certificates during installation.
Since template introduces another layer of abstraction, to help troubleshooting we should be able to preview rendered template with the template command:
helm template orthanc | less
The command above simply renders template without attempting to execute the chart. To go one step further, you can dry-run the installation with:
helm install orthweb ./orthanc --debug --dry-run | less
Although Jinja2 (using {% … %} to express template control) and Go (using {{ … }} to express template control) have different syntaxes, one aspect that is similar between them, is chomping whitespace with minus sign (-). This is pretty common in templating language. The documentation of both Jinja2 and Helm have a section on whitespace control. Not paying attention to this nuance may cause pesky errors.
Dependency
The Orthanc application relies on Postgres database, which itself is deployed by a separate helm chart. This can be specified in Chart.yaml (Helm V3), like this:
dependencies:
- condition: postgresql-ha.enabled
name: postgresql-ha
repository: https://charts.bitnami.com/bitnami
version: 7.8.x
The values of variables of the dependency chart can be specified in values.yaml of the root chart. They can also be imperatively specified as a parameter of helm install command.
The section above also requires the dependency chart to be downloaded into the charts sub-directory. This can be done with:
helm dependency update
Then you will notice a file with tgz extension in the charts sub-directory. Note that when you change the version of the dependency package in Chart.yaml, then you will need to run the command again. Alternatively, this command can be automatically executed before helm install if you specify the switch –dependency-update with helm install.
The main chart (e.g. wordpress) is referred to as parent chart, and the charts it depends on are referred to as sub-chart (e.g. mariadb, memcached). When it comes to managing property values, values from parent chart can override those from sub-chart, as explained here. On the other hand, values from sub-chart can override those from parent chart in two formats: export format (keyword exports) and child-parent format (keyword import-values). This is something to be careful and we can use the aforementioned template command to display the rendered values.
Hooks
Helm does a great job in figuring out the dependency relationship between kubernetes objects defined in the chart, and create them in order. So typically you do not need hooks for objects in the chart. However, in certain circumstances, such as cleaning up after uninstallation, we may need hooks. Here is a list of available hooks.
It is worth-noting that hook is not tied to an action. Instead it is tied to a kubernetes resource. The resource could be a job, a config map, etc. The resource is tied to a hook simply by resource annotation.
Moving to GUI
Helm is a command-line tool. For a team with varying levels of familiarity with command-line, GUI-based tool is a better option. For that, some enterprises adopt Rancher, a comprehensive Kubernetes cluster management platform. Rancher manages many aspects of Kubernetes cluster through web portal. One aspect is the support of helm chart. Rancher can be install on a cluster of its own. For demo, it can also be installed on docker desktop, a single-node Kubernetes cluster by Docker. In both cases, Nginx ingress controller needs to be configured.
|
ESSENTIALAI-STEM
|
Research Watch: VOC analysis - Environmental Science
Research Watch: VOC analysis - Environmental Science...
0 downloads 82 Views 5MB Size
RESEARCH WATCH
AIR QUALITY
Impact of surfactants on remediation
Reacclimating biofilters
Surfactant flushing has been used to remediate subsurface environments contaminated with persistent nonaqueous-phase liquids. Surfactants can have a major impact on hydrocarbon dissolution and transport in contaminated sites. S. J. Grimberg and colleagues previously developed a mechanistic model to describe dissolution of solid phenanthrene into water solutions containing nonionic surfactants. Now they have confirmed the validity of the model by comparing predictions with data collected from a flow-through system with well-defined hydrodynamics. Effluent concentrations of phenanthrene were predicted and observed to be lower than saturation (equilibrium) concentrations. {Environ. Sci. Technol..,his issue, 2967-74)
Biofiltration is an increasingly popular technique for controlling the emission of VOCs from gas streams. It uses microbes to degrade the pollutant VOC to carbon dioxide and water. F. J. Martin and R. C. Loehr have studied the time required to reacclimate the biofilter after periods of nonuse. This time factor is important, because the biofilter does not work efficiently during the acclimation period and thus VOCs escape into the atmosphere. They studied the degradation of benzene, toluene, and xylene in biofilters made from a. 1 5-month-old and a 6-month-old compost Their results showed that the aged compost took longer to acclimate to benzene but an equivalent time to acclimate to toluene The longer the period of nonuse thf» longer the time required for acclimation 17 Air Waste Manage Assoc 1996 4f> 539-46)
DRINKING WATER U.K. radon levels Elevated radon levels in drinking water are an environmental concern because radon is a contributor to human radiation exposure, and the gas dissolves easily in water. There is a risk associated with radon ingested with the water and inhaled from boiling or aeration. D. Clapham and N. J. Horan report on radon in private water supplies in the United Kingdom. Most local authorities in the United Kingdom do not monitor radon in water. In some cases, the levels are more than 10 times the rec~ ommended U.S. levels. Households dependent on such supplies are there ~ fore at risk The efficiency and costeffectiveness of granular activated carbon filtration is recommended for private supplies (Water Environ Management 1996 10 211-14)
New coliform method Accurate monitoring of public drinking-water supplies for the presence of fecal contamination is critical for safeguarding public health. Adherence to Safe Drinking Water Act regulations requires that samples be monitored for total coliforms, an indicator of potential fecal contamination. Positive samples are further monitored to confirm the presence of fecal coliforms. K. P. Brenner and colleagues compared the present EPA-approved methodology for these tests with 3. newly developed method Both methods use membrane filtration technology but the new method uses IVII agar with cific additives for the simultaneous detection of total coliforms and Escherichia coli Results indicate that recoveries of total coliforms and E coli with the new technique are significantly better those using the current method (Avvl Environ Microbiol 1996 62 203-08)
GREEN
CHEMISTRY
Polysaccharide packaging Cellulose and other polysaccharides have great potential for use in biodegradable packaging and other materials. The challenge comes in modifying polysaccharides to improve their physical properties without diminishing biodegradability. D. S. Roessner and colleagues synthesized
4 2 4 A • VOL. 30, NO. 10, 1996 / ENVIRONMENTAL SCIENCE & TECHNOLOGY / NEWS
(6-0)- and (2-0/3-0)-acetyl amylose polymers (substituted at the primary and secondary hydroxyls, respectively), which retained the water solubility of the original polysaccharide. These polymers were then tested for biodegradability by various bacteria. The (2-0/3-0)-acetyl amylose polymers were degraded more rapidly and to a greater extent than their (6-0)-counterparts, thus illustrating the importance of the substitution site in conjunction with biodegradability in these polysaccharides. (Macromolecules 1996 29,19)
MEASUREMENTS VOC analysis Recent developments in membrane introduction mass spectrometry (MIMS) make it an attractive technique for the direct analysis of VOCs in air samples. P. H. Hemberger and colleagues report that by combining charge exchange ionization with MIMS, they can produce a 4- to 20fold improvement in the sensitivity of the technique as compared with conventional electron ionization (EI). In their technique, a hollow fiber polymeric silicone membrane is interfaced to an ion trap mass spectrometer through a jet separator. Membrane-transported oxygen provides the charge exchange reagent gas Results are shown for several oxygenated VOCs and several hydrophobic VOCs with the greatest en-
0013-936X/96/0930-424AS12.00/0 © 1996 American Chemical Society
hancements as compared with EI seen for alcohols. The resulting mass spectra also had greater amounts of the molecular ion and less fragmentation as compared with EI. (Anal. Chem. 1996, 68, 2097-2101)
PESTICIDES Drift damage Several factors are encouraging replacement of older herbicides such as atrazine and 2,4-D with newer compounds from the sulfonylurea and other chemical families. J. S. Fletcher and colleagues studied the sulfonylurea compound, chlorsulfuron, to assess the effect of drift onto nontarget plants. Chlorsulfuron was applied at low rates (0.1-0.8% of the recommended field rate) to four nontarget plants (canola, soybean, smartweed, and sunflower) at different stages of growth. Low-level application of the herbicide depressed the yield of all plants. The application of glyphosphate atrazine or 2 4-D at the same rate did not affect plant growth The authors reported that chlorsulfuron may be as much as 10 000 times more toxic to soybean yields than other conventional herbicides (Environ Toxicol Chem 1996 15 1189-96)
RADIOACTIVITY Chernobyl effects The 1986 Chernobyl nuclear power plant explosion resulted in some of the most intense radioactive contamination on Earth. D. W. Sugg and colleagues studied radiocesium (137Cs) concentrations and genetic damage in catfish (Ictalurus punctatus) living in a cooling pond at the reactor site. Assessments of genetic damage were made by analyzing the percentage of DNA strand breaks in gills, liver, and red blood cells and the number of micronuclei in red blood cells. This research indicated significant genetic damage and radiocesium concentrations in the catfish The authors note that such studies provide an extraordinary chance to observe long-term adaptation and evolutionary changes in wildlife exposed to highlv polluted environments (Environ Toxicol Chem 1996 15 1057-63)
Sampling colloids Colloids are often involved in transport of contaminants through aquifers. N. Weisbrod and co-workers describe a new method for passive sampling of groundwater colloids. The sampler uses dialysis cells with large-pore membranes in dynamic equilibrium with the mobile colloid and liquid phases. In laboratory tests using a suspension of latex microspheres, the dialysis cells reached equibrillium in 44-100 h. It took BO180 h with a suspension of kaolinite. Field profiles under natural flow con ditions in a sand and sandstone aquifer showed large variability in colloid content within and between the profiles The authors describe the systern as suitable for long-term sampling of groundwater colloids under very turbiri conditions IFnviron 9f7 Tprhnnl ,his issnp nn .30,94-31011
sediments. But previous studies suggested that PAHs are degraded only in the presence of oxygen or nitrate, not in sulfate or under methanogenic conditions. J. D. Coates and colleagues studied the oxidation of PAHs in sediment from San Diego Bay under sulfate-reducing conditions. Oxidation occurred with no detectable lag period. This research is significant because oxygen and nitrate are present in only a thin surface layer of sediment. Sulfate reduction is the primary mechanism for organic biodegradation in sediments The results siifyppst that natural PAH degradation in sediments by sulfate-reducing organisms may impact remediation (Awl Environ Microbiol 1996 62 1099-1101)
WASTEWATER
TCDD reductions REMEDIATION
TCE biodegradation Trichloroethylene (TCE) is a suspected carcinogen and the most commonly reported VOC in groundwater. Degradation of TCE by microorganisms using toluene as the primary growth substrate has been extensively studied. There is a need, however, to better characterize the environmental and physiological conditions under which individual bacterial strains degrade TCE. J. G. Leahy and colleagues studied and compared factors influencing TCE degradation for a number of bacterial strains under aerobic and hypoxic conditions Results for aerobic conditions indicated that organisms expressing toluene dioxygenases degraded TCE at lower rates than those expressing toluene monooxygenases Degradation rates were generally lower under hypoxic conditions using nitrate as an electron accentor or lactate as an electron donor (Awl Environ Microbiol 1996 62 825-33)
PAH biodegradation Polycyclic aromatic hydrocarbons (PAHs) from shipping activities, fuel spills, runoff, and sewage plant effluents often contaminate harbor sediments. Natural microbial degradation may remove PAHs from
There has been much concern about the presence of 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD) in wastewater discharges from pulp mills using chlorine bleach. The forest products industry has responded with process changes that have resulted in a 90% reduction in discharges since 1988. J. D. Abbott and S. W. Hinton assembled a database of TCDD concentration in fish tissues at sites downstream of 39 pulp mills and examined this database to determine temporal trends in the TCDD concentration. Their results show a median rate of 0 36 annual fractional decrease in the lipid normalized concentration of TCDD in fish tissues This annual fractional decrease in fish tissue concentrations is consistent with the reduction in TCDD discharges (Environ Toxicol Chem .996 ,1 1163-65)
Contributors: Brian Eitzer, Connecticut Agricultural Experiment Station, New Haven, Conn.; Stephen Geiger, Remediation Technologies, Inc., King of Prussia, Pa.; Vincent Hand, Miami University, Institute eo Environmental Sciences, Oxford, Ohio; Richard Hurst, CHEMPET Research Corp., Moorpark, Calif; Louis Kovach, Ecollfe Associates, Wilmington, Del.; Raewyn Town, Queen's University yf Belfast, Northern Ireland; and Margaret Whittakeri NSF Internationall Ann Arbor, Mich.
VOL. 30, NO. 10, 1996/ENVIRONMENTAL SCIENCE & TECHNOLOGY / NEWS • 4 2 5 A
|
ESSENTIALAI-STEM
|
Wikipedia:Articles for deletion/Transparent Machines
The result was speedy Delete. Jimfbleak has already speedy deleted this page (G11: Unambiguous advertising or promotion) (non-admin closure) Vipinhari || talk 16:23, 3 March 2016 (UTC)
Transparent Machines
* – ( View AfD View log Stats )
WP:CRYSTAL. The notability of this game that hasn't been released can't be known now. —Largo Plazo (talk) 20:51, 2 March 2016 (UTC)
* Note: This debate has been included in the list of Video games-related deletion discussions. /wiae /tlk 20:58, 2 March 2016 (UTC)
|
WIKI
|
372nd Engineer Brigade (United States)
The 372nd Engineer Brigade is a combat engineer brigade of the United States Army based in Fort Snelling, Minnesota. Recently converted from the 372nd Engineer Group which traces its lineage back to World War II, the brigade was activated on 16 September 2008. It is a United States Army Reserve formation and is subordinate to the 416th Theater Engineer Command out of Darien, Illinois.
Organization
The brigade is a subordinate unit of the 416th Theater Engineer Command (Darien, Illinois). The brigade contains three subordinate battalions:
* 367th Engineer Battalion, in St. Cloud, Minnesota
* 863rd Engineer Battalion, in Darien, Illinois
* 983rd Engineer Battalion, in Monclova, Ohio.
Lineage
Constituted 5 September 1928 in the Organized Reserves as Headquarters and Headquarters and Service Company, 337th Engineer Regiment
Organized by July 1931 at Huntington, West Virginia
Ordered into active military service 20 July 1942 at Camp Swift, Texas
Redesignated 1 August 1942 as Headquarters and Headquarters and Service Company, 337th Engineer General Service Regiment
Disbanded 16 September 1944 in Italy
Reconstituted 19 November 1946 in the Organized Reserves as Headquarters and Headquarters and Service Company, 337th Engineer General Service Regiment
Activated 2 December 1946 at Baltimore, Maryland
(Organized Reserves redesignated 25 March 1948 as the Organized Reserve Corps; redesignated 9 July 1952 as the Army Reserve)
Inactivated 9 February 1949 at Baltimore, Maryland
Redesignated 8 June 1949 as Headquarters and Headquarters Company, 372d Engineer Construction Group
Activated 25 July 1949 at Des Moines, Iowa
Reorganized and redesignated 1 February 1954 as Headquarters and Headquarters Company, 372d Engineer Group
Inactivated 28 May 1959 at Des Moines, Iowa
Activated 15 March 1963 at Des Moines, Iowa
Ordered into active military service 7 December 2003 at Des Moines, Iowa; released from active military service 3 June 2005 and reverted to reserve status
Location changed 17 April 2007 to Fort Snelling, Minnesota
Reorganized and redesignated 16 September 2008 as Headquarters and Headquarters Company, 372d Engineer Brigade
Unit Decorations
Meritorious Unit Citation, Citation awarded to the 372nd Engineer Brigade for actions in Afghanistan from November 2009 to September 2010.
|
WIKI
|
Wikipedia:Articles for deletion/List of educational institutions in Indore
The result was keep. Ron Ritzman (talk) 02:34, 23 June 2012 (UTC)
List of educational institutions in Indore
* – ( View AfD View log • Stats )
The list in question does not have Notability and is in violation of WP:NOTDIR Harsh Mujhse baat kijiye(Talk)(Contribs) 07:47, 16 June 2012 (UTC)
* Note: This debate has been included in the list of India-related deletion discussions. Harsh Mujhse baat kijiye(Talk)(Contribs) 07:51, 16 June 2012 (UTC)
* Note: This debate has been included in the list of Schools-related deletion discussions. • Gene93k (talk) 19:15, 16 June 2012 (UTC)
* Note: This debate has been included in the list of Lists-related deletion discussions. • Gene93k (talk) 19:16, 16 June 2012 (UTC)
* Keep - lists of educational institutions are both normal and helpful, and this looks more useful than many such lists. Most of the institutions are notable so better linking is needed but that is an editorial matter. Such lists also form a useful repository for nn establishments such as elementary schools. TerriersFan (talk) 19:22, 16 June 2012 (UTC)
* Being from Indore, I can with confidence say that most schools mentioned would not pass national standards leave alone international ones. That is the reason I nominated it for deletion. If these not notable names were to be removed, the list would come down to ~10 names across all categories. -- Harsh Mujhse baat kijiye(Talk)(Contribs) 06:35, 17 June 2012 (UTC)
* Sorry, but I disagree. Degree-awarding institutions and senior high schools are generally considered notable. If some institutions are not notable, then this page would be a convenient repository for information about them rather than creating perma-stubs. This is normal practice. TerriersFan (talk) 16:54, 17 June 2012 (UTC)
* Keep: Criterion of notability of stand-alone article and that of inclusion in a list are different. The "List of X" just requires it's entries to be "X". And the topic "List of education institutes in a major city" is itself notable. §§AnimeshKulkarni (talk) 18:34, 17 June 2012 (UTC)
* Keep per TerriersFan. This sort of article is almost always kept. Bearian (talk) 23:20, 18 June 2012 (UTC)
|
WIKI
|
Talk:LaVern W. Parmley
Occupation
Was LaVern herself a physics professor, or was that her husband? The text of the article states she married a physics professor, but the info box says she herself was a physics professor.<IP_ADDRESS> (talk) 16:50, 28 May 2022 (UTC)
|
WIKI
|
%A Doarn, Charles %A Polk, J %A Shepanek, Marc %T Health challenges including behavioral problems in long-duration spaceflight %9 Review Article %D 2019 %J Neurology India %R 10.4103/0028-3886.259116 %P 190-195 %V 67 %N 8 %U https://www.neurologyindia.com/article.asp?issn=0028-3886;year=2019;volume=67;issue=8;spage=190;epage=195;aulast=Doarn %8 May 1, 2019 %X Over the past 60 years, our ability to live and work in space has evolved. From short sojourns in small spacecraft to landing on the moon and residing in an orbiting international space station, we have learned to adapt to an extreme environment and safely return home. Human missions to the Moon, Mars, and exploration of deep space are different. This paper summarizes the challenges of providing medical care, specifically mental health care during long-duration flights. Considerable information about challenges that crews bound for Mars will face is available. Literature regarding this issue is summarized. This manuscript provides a short historical summary of long-duration spaceflight to date; the challenges including limited communication with mission controllers on Earth; and, a summary of the behavioral impacts space flight has had on humans. A look at how the future autonomous systems might support physical and mental health when definitive care is millions of miles away, is also provided. Human spaceflight to Mars or other distant sites will require new approaches to mission preparedness and inflight medical support systems. Exploration class missions will be more autonomous than anything deployed until now. The concepts of telemedicine that have aptly supported crews from the 1960s to the present will no longer be in real-time. While communication between Earth and Mars is possible, it will be characterized by significant time delays. Mars-based crews will need to have systems onboard and on Mars to support all health and performance issues. %0 Journal Article %I Wolters Kluwer Medknow Publications %@ 0028-3886
|
ESSENTIALAI-STEM
|
Ladder logic 104: Memory organization
Memory allocation varies from platform to platform. All platforms have input and output (I/O) memory and it is assigned and labeled in different ways depending on the platform.
02/26/2016
One of the first decisions that needs to be made when designing a programmable logic controller (PLC) system is memory allocation and organization. In the early years of the PLC, memory came at a premium. 1K (one kilobyte) of memory for the program and data may have been all that was available for the programmer to use in a particular PLC. It was not unusual for programmers to assign unused I/O memory as data registers if the program grew to the point where the rest of the data registers had been assigned.
Memory allocation varies from platform to platform. All platforms have input and output (I/O) memory; this is because rather than accessing I/O directly, programs read the inputs at the beginning of the scan, writing them to a memory table. The program then processes the logic, using the saved input values and updating memory and the output table. At the end of the scan the output table is written to the physical outputs.
I/O memory is assigned and labeled in different ways. For this post, I am going to use three platforms as an example.
Memory allocation varies from platform to platform. All platforms have input and output (I/O) memory and it is assigned and labeled in different ways depending on the platform, as demonstrated in this table. Courtesy: Frank Lamb, Automation Primer
The letter designators for I/O differ as do the way they are assigned to physical points. This is even further complicated by the fact that for Siemens, analog I/O starts at different points depending on the platform (example: PIW256 or PIW800 designates Process Input Word.) Allen-Bradley still follows the slot number, (i.e. I:6.0) while AutomationDirect's Koyo platform uses V-Memory locations for analog, i.e. V7630-V7633 may hold four analog values from an I/O card.
Timers and counters also need to have memory assigned to them. Since they have special data types such as presets, accumulated values and "done" bits, they are generally assigned special areas reserved for them. T0 or C2 (Siemens) or CT5 (Koyo) are examples. Allen-Bradley has registers pre-assigned for timers and counters, T4 and C5. Examples of AB addresses for these might be T4:1 or C5:3. These are then appended with /DN for the "done" bit or .pre for a preset value.
Allen-Bradley also pre-assigns registers for bits (B3), integers (N7) and REALs (F8). New registers can be opened up as required for timers, counters, bits, integers, REALs or floating point values, and strings. Examples might look like N14, B33, F27, T88 and so on.
For both Siemens and Koyo special areas are assigned for discrete bits. Siemens uses M bits or words for general programming use; bits may have addresses such as M10.2 while words, double words and bytes may be assigned as MW42, MD60 or MB16. Floating point values are placed in double word locations.
Koyo's control relays are discrete only and use the designation "C". They are also octal, and have addresses such as C10 or C217.
All of Koyo's addresses, even the I/O, is overlaid with the "V" designation. V0 starts with timer current values, I/O may land somewhere in the V40000 range, while user data words of the volatile (non-retentive) and non-volatile (retentive) types fall somewhere in between. The system parameters are also located here. Locations also vary across the 200, 300 and 400 platforms.
Siemens PLCs also allow data to be organized into data blocks (DBs). These are structured by the programmer and can contain mixed data types. Most memory usage is placed here rather than in the "M" or marker memory. This allows for more application specific data organization. User-defined types (UDTs) can be used to further define data.
The previous descriptions apply to the older original platforms for these three types of PLCs. For Allen-Bradley this includes the PLC5, SLC500 and Micrologix families. For AutomationDirect/Koyo, it covers the 200, 300 and 400 families and for Siemens the S5 and S7 series, 200, 300 and 400s.
All three of these companies also have newer tag-based systems. For Allen-Bradley the ControlLogix and CompactLogix platforms allow users to add memory in the form of tags, or text-based addresses that are added as needed. Since these are readable by the programmer and usually descriptive, tag-based programming allows programs to be uploaded and read easier without the requirement of descriptions.
Siemens TIA Portal platform is tag-based, however it is still important to have the program since data structures are not as easily correlated when uploaded. The S7-1200 and S7-1500 are Siemens' tag-based PLCs.
Koyo's Productivity 3000 platform is their tag-based PLC. Tag-based programming is more efficient than the previously mentioned register-based systems and much easier to organize.
All of the previously mentioned platforms also allow for import and export of tags or descriptions by address. This enables programmers to manage and organize memory in an efficient way using Microsoft Excel.
Planning memory usage and assignment before starting to program is useful and can save the user a lot of time.
Frank Lamb is the founder of Automation Consulting Services Inc. This article originally appeared on the Automation Primer blog. Automation Primer is a CFE Media content partner. Edited by Chris Vavra, production editor, Control Engineering, CFE Media, cvavra@cfemedia.com.
ONLINE extra
For more articles on PLCs and programming, see related articles below.
No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Integrated mobility; Artificial intelligence; Predictive motion control; Sensors and control system inputs; Asset Management; Cybersecurity
Big Data and IIoT value; Monitoring Big Data; Robotics safety standards and programming; Learning about PID
Motor specification guidelines; Understanding multivariable control; Improving a safety instrumented system; 2017 Engineers' Choice Award Winners
This digital report will explore several aspects of how IIoT will transform manufacturing in the coming years.
Motion control advances and solutions can help with machine control, automated control on assembly lines, integration of robotics and automation, and machine safety.
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.
Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!
Mobility as the means to offshore innovation; Preventing another Deepwater Horizon; ROVs as subsea robots; SCADA and the radio spectrum
Future of oil and gas projects; Reservoir models; The importance of SCADA to oil and gas
Big Data and bigger solutions; Tablet technologies; SCADA developments
Automation Engineer; Wood Group
System Integrator; Cross Integrated Systems Group
Jose S. Vasquez, Jr.
Fire & Life Safety Engineer; Technip USA Inc.
click me
|
ESSENTIALAI-STEM
|
Paul King (VJ)
Paul King (born 20 November 1960) is a British-Irish singer, musician, VJ and TV presenter. King was the lead singer of the eponymous 1980s band King and has released five albums in his musical career.
Biography
Paul King was born in Galway, County Galway, Ireland and moved to Coventry, England, with his parents at a young age. After graduating from Coventry Drama School, King joined the West Midlands Police Cadets and stayed in for 2 years then joined rock-ska band the Reluctant Stereotypes. King's line up of the band – which also contained record producer Paul Sampson – released an album The Label and three singles Confused Action, Plans For Today and Nightmares in the early 1980s on the back of Coventry's vibrant 2 Tone ska scene.
After the demise of the Reluctant Stereotypes, King formed the Raw Screens who perfected their act and style to what King and his manager Perry Haines called 'multi-tone', and then in 1983 relaunched the group as self-named 1980s band King. As lead singer, King was famed for his cockatoo haircut and spray painted Doc Marten's Boots – a look described "like the Child Catcher from Chitty Chitty Bang Bang. But, hell, the girls loved him," while Richard James Burgess produced and drummed on most of the band's songs.
The band lasted just a couple of years, though both of their albums, Steps in Time and Bitter Sweet, went Gold, and they had two Top 10 singles with "Love & Pride" and "Alone Without You". Paul King then went solo with a 1987 album entitled Joy, produced by American musician Dan Hartman. It produced a minor hit single on the UK Singles Chart, "I Know".
After an unsuccessful solo career, King became a VJ on MTV in 1989, before moving over to VH1 in 1994, and then became known for his infomercials on 1980s collection albums. He is mostly remembered for the programmes MTV's Greatest Hits, 120 Minutes and XPO, later renamed First Look. First Look, programmed by Richard Godfrey, Peter Good, Peter Ruppert, showed new singles and album releases and it was presented by VJ Paul King until 30 July 1994. In 1998, a joint King & Paul King 18-track collection, entitled The Best of King – Love & Pride, was eventually released, with hit singles, stand-out tracks, B-sides and remixes. Paul King still works for MTV Networks Europe where he has produced shows for VH1 and MTV.
Albums
* 1980 - The Label (Reluctant Stereotypes album)
* Feb 1985 – Steps in Time (King's debut album – UK No. 6)
* Nov 1985 – Bitter Sweet (King's second album – UK No. 16)
* 1987 – Joy (Paul King's solo album)
* 1998 – The Best of King – Love & Pride (King and Paul King's joint collection)
Singles
Except where otherwise stated, all are releases by the band King.
* 1980 - "Confused Action" (first Reluctant Stereotypes single featuring King)
* 1980 - "Plans for Today" (second Reluctant Stereotypes single featuring King)
* 1980 - "Nightmares" (third Reluctant Stereotypes single featuring King)
* 1984 – "Love & Pride" (UK No. 84)
* July 1984 "Soul On My Boots" (UK No. 158)
* 8 October 1984 – "Won't You Hold My Hand Now" (UK no. 112)
* Jan 1985 – "Love & Pride" (re-release – UK No. 2, US No. 55)
* Mar 1985 – "Won't You Hold My Hand Now" (re-release – UK No. 24)
* Aug 1985 – "Alone Without You" (UK No. 8)
* Oct 1985 – "The Taste of Your Tears" (UK No. 11)
* Jan 1986 – "Torture" (UK No. 23)
* May 1987 – "I Know" (Paul King solo – UK No. 59)
* 1987 – "Follow My Heart" (Paul King solo – UK no,. 126)
|
WIKI
|
User:Raven2099
Raven2099 Official titles of Ordination include: Abbot, Angel, Apostle of Humility, Apostolic Scribe, Arch Deacon, Arch Priest, Archbishop, Arch Cardinal, Ascetic, Gnostic, Bible Historian, Bishop Brahman, Brother, Canon, Cantor, Cardinal, Channel, Prince, Chaplain, Colonel, Cure, Deacon, Dervish, Disciple, Druid, Elder, Emissary, Evangelist, Faith Healer, Father, Field Missionary, Free Thinker, Friar, Sexton, Sorcerer, Grand Master, Guru, Healing Minister, High Priest, Imam, Lama, Jedi Master, Doctor of Space & Time, Master, Magus, Martyr, Messenger, Metropolitan, Minister of Music Rock, Minister of Peace, Missionary, Missionary Doctor, Missionary Healer, Missionary of Music Missionary, Priest, Monk, Monsignor, Most Reverend, Pope, Mystical Philosopher, Rock, Parochial Educator, Saint, Padre, Patriarch, Peace, Counselor, Preacher, Preceptor, Priest, Prophet, Psychic Healer, Rabbi, Rector, Religious, Preacher, Reverend, Reverend Father, Pastor, Right Reverend, Saintly Healer, Time Lord, Scribe, Child of the Universe, Seer, Sifu or Shifu, Shaman, Wizard, Soul, Therapist, Spiritual Counselor, Spiritual Healer, Spiritual Warrior, Swami, Teller, Lord of Time, The Very Esteemed, Universal Rabbi, Universal Philosopher of Absolute Reality, Universal Religious Philosopher, Vicar
|
WIKI
|
Moscow asks Italy to drop charges against Russian in Nigeria graft case
MILAN, Dec 5 (Reuters) - The Russian government has asked Italy to be “reasonable” over a Russian citizen caught up in a Nigerian graft case in Milan and drop the charges against him, according to legal documents seen by Reuters. Ednan Tofik ogly Agaev, a former Russian ambassador in Colombia, is charged with international corruption in a case revolving around the 2011 purchase by oil majors Eni and Shell of Nigeria’s OPL 245 oilfield. Milan prosecutors allege bribes totalling around $1.1 billion were paid to win the licence to explore the field. Agaev and all the parties involved in the case have denied any wrongdoing. In documents filed by prosecutors with the Milan court on Wednesday, it emerged that Russia’s Foreign Minister Sergei Lavrov handed over a letter to his Italian counterpart in Moscow at a meeting on Oct. 8, calling on Italian authorities to be “reasonable” in the case. The letter said Russia was convinced Agaev had committed no wrongdoing. “We hope the Italian authorities adopt a reasonable approach and after respective checks find a way to change the status of E.T. Agaev from accused to witness,” the letter said. The Italian and Russian foreign ministries did not respond to requests for comment. During the hearing on Wednesday Italian prosecutor Sergio Spadaro described the request as “at the very least surprising”. (Reporting by Emilio Parodi, writing by Stephen Jewkes, editing by Susan Fenton)
|
NEWS-MULTISOURCE
|
User:Helenmarie
This is Helen's user page. I don't really know that much about all this Wiki malarky - but as baby sister to a wiki-holic, I felt it was my duty to find out what the hype was about, and to see why she never answers her phone!
So here I am, all grown up with my own user page now. I'd like to edit things -although I'm not overly sure how useful my contributions might be.
Love
Me x
|
WIKI
|
Customizing HP
There are three ways to customize HousePanel
• Tile Editor
• Tile Customizer
• Manual “hmoptions.cfg” and CSS Editing
The Tile Editor is used to change how tiles and pages look, including background images, colors, fonts, and alignment. The first section describes the main functionality of the Tile Editor. The Tile Customizer changes the actual content of each tile. Tile Customizer can be used to add user text and images to a tile, add clickable hyperlinks, and even add fields from one tile into another. The next section describes how to use this powerful feature. Finally, all styling in HousePanel is done using industry standard CSS settings, so maximum flexibility can be obtained by manually editing certain files. Powerful macros can also be created by editing the hmoptions.cfg file directly. The last section below describes the macro format and the CSS files for power users who wish to do deep customization.
Tile Editor
Some amazing work done by @nitwit in the SmartThings community inspired the development of a robust tile editor in HousePanel that can be used to modify the look of just about every element of every tile. To use the editor, select “Edit” mode in the radio buttons near the bottom of the page. Each tile will then show a green, blue, and red dot. Red will delete the tile, Blue will open the Tile Customizer described in the next section, and Green will open the following Tile Editor page.
This window can be dragged around on the screen such that you can see the effects of edits made on the main screen immediately. Tile editor use is self-explanatory as it uses standard dialog box features. To style a particular item, first click on it in the tile display or you can select the item from the drop down list below the tile. Some items are hidden and can only be selected from the drop down list. For those items you can select them and then unhide them and style them however you like. The icon background will style the entire tile. So if you want an image background on a tile, select “whole tile” and then pick the image you want. The on or off state of some tiles can be toggled by clicking on the main icon. Some tiles have multi-state icons such as thermostats. Each click rotates to the next state.
There is even a gradient background feature to add some flair to your tiles. The icon can be selected from your local subdirectory or it can be taken from a library of standard Android icons. There is also a directory called “media” where you can load any custom images. By default this directory contains a number of interesting backgrounds you can use. This is how I used my photo in the presence tile.
I think you will enjoy tinkering with this feature. If you are more of a power user and want to fully control your own destiny, keep reading for how one would style the page using custom written CSS. One other thing is worth noting — if you use the tile editor feature, HousePanel will create a file named “customtiles.css” containing the styling information specified. This file should not be edited directly. You can save this file and create a library of profiles for later use. There are lots of options here. If you want to customize your setup, you should make those custom edits in the housepanel.css file in your skins directory following the instructions below.
Tile Customizer
Tile content can also be altered using the built in Tile Customizer in HousePanel. To use the customizer, select “Edit” mode in the radio buttons near the bottom of the page. Clicking on the blue circle will open the Tile Customizer page that looks as follows:
The Custom Type option in the upper left is used to pick what type of customization you are performing. Seven options are available: TEXT, POST, GET, PUT, URL, LINK, and RULE.
TEXT Customization Type
TEXT links are used to add any user provided text to the tile. When adding anything to the tile, you must name the field in the User Field Name area on the left. You can also select an existing field, in which case your text will show up instead of the default behavior that this tile normally shows. Be careful with this feature because it can remove important functionality. Then again, this flexibility means you can make all sorts of creative effects.
TEXT Passwords
TEXT custom fields can be used to add a password to any tile. To do this create a new TEXT field named password, all lowercase. Then enter the password in the text box in the upper right. Click “Add” and the password will be converted to a hash. This hash is the value stored in the TEXT field. When this tile is clicked, the password must be given to
POST, GET, and PUT Customization Type
POST, GET, and PUT types are used to add a user-specified web service to the tile being customized using the method selected. In the top of the right column, enter a valid URL to the web service. You must also either pick the field this will override OR give a new user-defined field name using the entry box on the left. Click the “Add” button and this field will be added to the list of “Existing Fields” shown on the left side of this dialog box. You can mix and match this with any other addition.
URL Customization Type
URL types are similar to POST, GET, and PUT except it opens the given URL in a new window. The text entered must begin with http for this to work. TEXT fields will behave like URL fields when a valid URL is provided.
LINK Customization Type
LINK types enable you to add any other field from any other tile in your smart home to the tile being customized. This will be a virtual link in that the state will stay in sync with the original. The customize page will look different in this mode:
In the top of the right column, select the tile to link to, and then select which field of this tile to link into the customized tile using the “Available Fields” list above on the right. Once you are happy with your selection, click the “Add” button and this field will be added to the list of “Existing Fields” shown on the left side of this dialog box. You can mix and match this with any other addition. In the above example I added a light switch to a temperature tile, followed by two user text fields.
Note that with LINK customizations the field name must be taken from the linked tile. If you link in a switch field from another tile, it will replace the existing switch field. If you attempt to link in another switch field, it will overwrite any existing one unless you alter the field name by adding some custom text after the word switch. For example, you could make this field name switchtwo. This only works if there is already a linked field named switch.
RULE Customization Type
RULE types provide a simple automation capability. The rule is provided as a single line of text representing the tile number you want to control, the field, and the type of action you want to take. These three values are separated by an equal sign. Any number of rules can be entered separated by a comma or semicolon. For example, to turn on tiles 42 and 60 that are both switches you would enter:
42=switch=on, 60=switch=on
More complex rules are allowed such as setting level and mixing on and off. For example, the following will open a garage door, turn off a light, and set the level of a dimmer. Any number of commands can be strung together using this RULE feature.
16=door=open, 60=switch=off, 51=level=30
To use this rule feature you need to have the tile numbers that you want to control. Tile numbers can be obtained from the Info page. RULE can only contain single word commands like on, off, open, close. Macros do not have this limitation, but they can only be created manually by editing the hmoptions.cfg file.
The Tile Customizer is a powerful tool for making custom panels. All fields added by the customizer are subsequently available to the Tile Editor so they can be styled. By default added fields take on the style of their parent, but that can be modified using the Tile Editor.
Macros
Macros are a more powerful alternative to automation than the RULE system provided by the Tile Customizer described in the previous section. With Macros you can string together any number of action calls that HousePanel supports and connect it to any field on any tile. The catch is there is no GUI for defining Macros. Macros must be hand-written and saved in your hmoptions.cfg file, so this is a feature only for power users. Macros are defined in a section of the hmoptions.cfg file called “macros”. That section looks something like:
"macros":{
"custom|custom_4|test":
[
["-","adcd1-12345-4a33-c111-11223ea123","switch","switch","toggle"],
["-","dcba9-54321-4cda-a222-223344abcd","switch","switch","off"],
["-","dcba9-26371-5cda-b333-65432abcda","switchlevel","level","on","60"]
]
}
The keys are a string composed of the type, the id, and the field, separated by the “|” symbol. The type|id pair is the “connected tile” that is used to trigger the macro. This should be one of the tiles listed in the “index” section of the hmoptions.cfg file. The field specified is the field that is clicked on to invoke the macro. An array of arrays follow. Each array entry has up to 6 fields. The first array element is the hub id. If “-” is entered, the hubid of the connected tile is used. The second element is the id of the thing to automate. The third element is the type of thing. The fourth element is the field to control. The fifth element is the command or value to pass to HP. For example, it could be “on”, “off”, “open”, or “close”. A sixth element is attribute that is sent for some tiles to be controlled. For example, level can be sent this way.
Any number of macros can be defined and they can be tied to anything, including custom fields as is shown in the above example. The only restriction is they cannot be mixed with RULE custom fields.
|
ESSENTIALAI-STEM
|
Petraeus - Betray Us? - CNN iReport
CNN PRODUCER NOTE k3vsDad told me he followed this story all weekend: 'The fact that Petraeus recently went to Libya and Senate Intelligence Committee Chairwoman Dianne Feinstein is concerned about what Petraeus learned just adds to the questions.'- hhanks, CNN iReport producer With the shocking news Friday that CIA Director General David Petraeus was resigning effective immediately from his position at the agency over a love affair, the rumor mill has been running non-stop. Almost immediately I began receiving messages from different people across the country wanting to know my take on the surprise resignation and what it means. I had just returned home from getting my medicine when I received the 1st message and had not yet heard the news. Now after the weekend has passed and more and more information is coming out, I can safely say at this point there are questions unanswered and not enough to form a clear opinion on the whole situation. Many on the right are already seeing the demons of conspiracy and cover-up. Many on the left are saying nothing to see here, move along. The majority in the middle are questioning what gives and how the resignation came about. Petraeus recently returned from a fact-finding trip to Libya over the Benghazi situation which left 4 Americans, including the US Ambassador, murdered. Some are thinking the resignation came to keep Petraeus from appearing before either of the committees in Congress investigating the attack on the diplomatic mission in Benghazi. But as House Homeland Security Committee Chair Congressman Peter King pointed out, the resignation of Petraeus does not preclude the Congress from having Petraeus testify. King added that Petraeus would be called no matter what. Others are looking at the timing of the resignation. One concern is over the Benghazi hearings this week, but the other has to do with the information coming to light of an investigation into Petraeus' email accounts by the FBI after the election though the inquiry began months ago. This may be the most troubling question. Reports are coming out that Attorney General Eric Holder may have known about the investigation, in which Petraeus was not a target, as far back as June. If not Holder himself, the Justice Department was notified by the FBI of the investigation. Yet published reports indicate the President was not made aware until Petraeus submitted his letter of resignation on Thursday. Also troubling is the reason for the FBI probe. It is reported that the probe began after one woman, allegedly a State Department employee, complained of harassing emails from Petraeus' alleged mistress, author Paula Broadwell. Harassing emails is not something the FBI investigates. This leads to questions about what prompted the investigation. If the FBI does in fact probe harassing emails, the agency would be overloaded with investigations as almost every American receives their share of harassing emails. There must be something more as to why the FBI began looking into the email exchanges which lead to discovering the affair in Petraeus' personal email account. Questions, questions and more questions. What we do know for sure is that there was a betrayal. Not a betrayal that affects national security, but the betrayal of a vow and commitment by Petraeus to his wife of over 37 years, Holly. There was also a betrayal of the high standard expected of a person who oversees the operations of the nation's top spy agency. Members of the media may also be feeling a sense of betrayal that they were caught off guard by the resignation. Petraeus has had a long and healthy affair with the press for a number of years. I am sure national reporters who have covered the General are feeling cheated and betrayed to discover they were not the only other woman. At this time, other than the question of timing and a question of why the FBI became involved to begin with, I think the resignation is exactly what Petraeus said it was on Friday. While Petraeus did not betray us, he did betray his wife, his family and his agency. From the Cornfield, conspiracy theorists need to chill out. Answers will come in time as Congress continues to look into not only Benghazi, but also the timing and why the FBI began its investigation. For now, we all need to just let the events play out and let Congress do its job. Log in now. Enter your e-mail address below and we will send you an e-mail with a link and reset code to reset your password. Grab the reset code we e-mailed to you.Type it in, and create your new password. Create your new password Providing your contact information helps us verify your stories to include in CNN coverage. By clicking on sign up you agree with CNN's Terms of Service, CNN iReport's Terms of Service, and CNN's Privacy Policy and consent to the collection, storage and use of this information in the U.S. subject to U.S. laws and regulations. (learn more) For our international users, please be aware that the information you submit when registering for our services is collected in the United States of America. In addition to being subject to our Privacy Policy, the collection, storage, and use of your data will be subject to U.S. laws and regulations, which may be different from the laws and regulations of your home country. By registering for this service, you are consenting to this collection, storage, and use. Please create a screen name. This screen name will be associated with youriReport stories and comments on this site.It cannot be changed once you make a selection. Select one with 3-12 characters, numbers and letters only
|
NEWS-MULTISOURCE
|
Closed Bug 1722112 Opened 2 years ago Closed 2 years ago
[Experiment] Pref-Flip Experiment: Fission Process Count Fx 92.0 to 94.0 Nightly
Categories
(Shield :: Shield Study, task, P3)
Tracking
(firefox90 disabled, firefox91 disabled, firefox92 affected)
RESOLVED FIXED
Tracking Status
firefox90 --- disabled
firefox91 --- disabled
firefox92 --- affected
People
(Reporter: experimenter, Assigned: cpeterson)
References
()
Details
(Whiteboard: [fission:m8])
User Story
Delivery Type: Pref Flip Experiment
What is the preference we will be changing
dom.ipc.processCount.webIsolated
What are the branches of the experiment and what values should
each branch be set to?
- Treatment process-count-4 50%:
Value: 4
This treatment branch uses up to four content processes per site.
- Control process-count-1 50%:
Value: 1
The control branch uses one content process per site.
What version and channel do you intend to ship to?
100% of Nightly Firefox 92.0 to 94.0
Are there specific criteria for participants?
* Require telemetry environment's "fissionEnabled" == true so we only draw from the ~65% of Nightly users who are already using Fission.
NOTE: We want this experiment to run for all Fission Nightly users (so 50% of them are treatment, 50% are control). Therefore we need to target 100% of Nightly because the fissionEnabled filter will select just the Fission users.
Countries: all
Locales: all
What is your intended go live date and how long will the experiment run?
Aug 03, 2021 - Aug 31, 2021 (28 days)
What is the main effect you are looking for and what data will you use to
make these decisions?
What is the main effect you are looking for and what data will you use to make these decisions? What metrics are you using to measure success?
Same as all of our Fission Beta experiments, the most recent being https://experimenter.services.mozilla.com/experiments/fission-beta-91-experiment/
We want to be able to monitor the difference in stability and performance metrics between clients with and without Fission enabled. The Fission Experiment Plan (https://docs.google.com/document/d/1ZXAHep4v1lW-ZpLMtnTXAtbXSNP8Q-gr-RjUha2Yb14/edit#heading=h.asctkf7cbxa7) has a detailed list of telemetry probes (and expectations for each probe: up, down, or flat).
We plan to monitor these metrics:
Memory metrics:
- `MEMORY_TOTAL`
- `MEMORY_UNIQUE_CONTENT_STARTUP`
- `CYCLE_COLLECTOR_MAX_PAUSE`
- `CYCLE_COLLECTOR_MAX_PAUSE_CONTENT`
- `GC_MAX_PAUSE_MS_2`
- `GC_MAX_PAUSE_MS_2_CONTENT`
- `GC_MS`
- `GC_MS_CONTENT`
- `GC_SLICE_DURING_IDLE`
- `GC_SLICE_DURING_IDLE_CONTENT`
Performance metrics:
- `CHECKERBOARDING_SEVERITY`
- `CHILD_PROCESS_LAUNCH_MS`
- `CONTENT_FRAME_TIME_VSYNC`
- `FX_NEW_WINDOW_MS`
- `FX_TAB_SWITCH_COMPOSITE_E10S_MS`
- `KEYPRESS_PRESENT_LATENCY_MS`
- `INPUT_EVENT_RESPONSE_MS`
- `TIME_TO_FIRST_CONTENTFUL_PAINT_MS`
- `TIME_TO_FIRST_INTERACTION_MS`
- `PERF_PAGE_LOAD_TIME_MS`
Engagement metrics:
- Number of users submitting pings
- `browser.engagement.total_uri_count`
- `browser.engagement.tab_open_event_count`
- `browser.engagement.max_concurrent_tab_count`
- `SUBSESSION_LENGTH`
- `CONTENT_PROCESS_COUNT`
- `CONTENT_PROCESS_MAX`
- `LOADED_TAB_COUNT`
Stability metrics:
- Main process crash rate (per 1000 usage hours), 32-bit and 64-bit
- Content process crashes (per 1000 usage hours) (excluding ShutDownKills), 32-bit and 64-bit
- `crash_tab_ui_presented`
- `crash_subframe_ui_presented`
- `oom_crashes` (per 1000 usage hours), 32-bit and 64-bit
- `shutdown_crashes` (per 1000 usage hours)
Do you plan on surveying users at the end of the delivery? No.
Estimated Total Enrolled Clients: 360,000 (assuming we enroll 15% of 1.2M Beta + Dev Edition users running Windows or macOS)
Who is the owner of the data analysis for this experiment?
cdowhygelund@mozilla.com
Will this experiment require uplift?
False
QA Status of your code:
TBD? This experiment is not much different from our Fission Beta experiments like https://experimenter.services.mozilla.com/experiments/fission-beta-91-experiment/
Link to more information about this experiment:
https://experimenter.services.mozilla.com/experiments/fission-process-count/
Fission Process Count
Track the stability and performance effects of increasing the number of Fission content processes.
Experimenter is the source of truth for details and delivery. Changes to Bugzilla are not reflected in Experimenter and will not change delivery configuration.
Data Science Issue: https://jira.mozilla.com/browse/DS-1674
More information: https://experimenter.services.mozilla.com/experiments/fission-process-count/
Whiteboard: [fission:m8]
User Story: (updated)
Summary: [Experiment]: Pref-Flip Experiment: Fission Process Count → [Experiment] Pref-Flip Experiment: Fission Process Count Fx 92.0 to 94.0 Nightly
Start Date: 2021-08-03 End Date: 2021-08-31
Status: NEW → RESOLVED
Closed: 2 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.
|
ESSENTIALAI-STEM
|
Publication
Algorithmica
Paper
Connectivity Graphs of Uncertainty Regions
Download paper
Abstract
We study connectivity relations among points, where the precise location of each input point lies in a region of uncertainty. We distinguish two fundamental scenarios under which uncertainty arises. In the favorable Best-Case Uncertainty, each input point can be chosen from a given set to yield the best possible objective value. In the unfavorable Worst-Case Uncertainty, the input set has worst possible objective value among all possible point locations, which are uncertain due, for example, to imprecise data. We consider these notions of uncertainty for the bottleneck spanning tree problem, giving rise to the following Best-Case Connectivity with Uncertainty problem: given a family of geometric regions, choose one point per region, such that the longest edge length of an associated geometric spanning tree is minimized. We show that this problem is NP-hard even for very simple scenarios in which the regions are line segments or squares. On the other hand, we give an exact solution for the case in which there are n+ k regions, where k of the regions are line segments and n of the regions are fixed points. We then give approximation algorithms for cases where the regions are either all line segments or all unit discs. We also provide approximation methods for the corresponding Worst-Case Connectivity with Uncertainty problem: Given a set of uncertainty regions, find the minimal distance r such that for any choice of points, one per region, there is a spanning tree among the points with edge length at most r.
Date
03 Aug 2016
Publication
Algorithmica
Authors
Resources
Share
|
ESSENTIALAI-STEM
|
Donatus of Fiesole, Irish teacher and poet, Bishop of Fiesole about 829-876. In an ancient collection of the “Vitae Patrum”, of which an eleventh-century copy exists in the Laurentian library of Florence, there is an account of the life of Donatus, from which we glean the following facts. Donatus was born in Ireland, of a noble family. About 816 he visited the tombs of the Apostles in Rome. On his journey northwards he was led by Divine Providence to the city of Fiesole, which he entered at the moment when the people were grouped around their altars praying for a bishop to deliver them from the evils, temporal and spiritual, which afflicted them. Raised by popular acclaim to the See of Fiesole, Donatus instituted a revival of piety and learning in the Church over which he was placed. He himself did not disdain to teach “the art of metrical composition”. The “Life” is interspersed with short poems written by the saintly bishop. The best known of these is the twelve-line poem in which he describes the beauty and fertility of his native land, and the prowess and piety of its inhabitants. Donatus also composed an epitaph in which he alludes to his birth in Ireland, his years in the service of the princes of Italy (Lothair and Louis), his episcopate at Fiesole, and his activity as a teacher of grammar and poetry.
|
FINEWEB-EDU
|
Page:United States Statutes at Large Volume 92 Part 1.djvu/250
PUBLIC LAW 95-259—APR. 17, 1978
92 STAT. 1%
Public Law 95-259 95th Congress An Act At>r. 17, 1978 [H.R, 5981]
AmeHcan Folklife Center. Appropriation authorization.
To amend the American B'olklife Preservation Act to extend the iuithoriziitinns of appropriations contained in such Act.
Be it enacted by the Senate and House of Representatives of the United States of Amerlca in Congress assembled, That section 8 of the American Folklife Preservation Act (20 U.S.C. 2107) is amended by striking out "and" immediately after "1977," and inserting immediately before the period at the end thereof the following: "$G85,000 for the fiscal year ending September 30, 1979, $1,065,000 for the fiscal year eliding September 30, 1980, and $1,355,000 for the fiscal year ending September 30, 1981". SEC. 2. Section 4(c) of such Act (20 U.S.C. 2103(c)) is amended by adding at the end thereof the following new sentence: "Members appointed by the President under clause (1) of subsection (b) shall serve only during the time they are officials of Federal departments and agencies concerned with some aspect of American folklife traditions and arts." Approved April 17, 1978.
{.1" •
'i
/
•lil.
'V
\
''•
li".
LEGISLATIVE HISTORY: HOUSE REPORT No. 95-865 (Coram, on House Administration). SENATE REPORT No. 95-712 (Coram, on Rules and Administration). CONGRESSIONAL RECORD, Vol. 124 (1978): Feb. 28, considered and passed House. ~, 'Apr. 4, considered and passed Senate.
�
|
WIKI
|
bibless
Adjective
* 1) Without a bib.
* However, she persisted in dishing the dinner as well as cooking it, and then sat down, bibless and apronless, to partake of it as an illustrious guest
* However, she persisted in dishing the dinner as well as cooking it, and then sat down, bibless and apronless, to partake of it as an illustrious guest
|
WIKI
|
User:Randykitty/PROD log/Archive 5
January 2017
* 1) Geohumanities: PROD; notified 11:55, 1 January 2017 (UTC)
* 2) * Reason: Non-notable relatively new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 3) Vanderbilt Historical Review: PROD; notified 12:02, 1 January 2017 (UTC)
* 4) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG. Article creation too soon.
* 5) Norwegian Journal of Sociology: PROD; notified 17:41, 1 January 2017 (UTC)
* 6) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 7) Tetrahedron Computer Methodology: PROD; notified 09:22, 2 January 2017 (UTC)
* 8) * Reason: Failed journal that existed only for a brief time. Not indexed anywhere, no independent sources. Does not meet WP:NJournaols or WP:GNG.
* 9) Stanford Journal of East Asian Affairs: PROD; notified 09:48, 2 January 2017 (UTC)
* 10) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 11) Hans Nel: PROD; notified 10:35, 4 January 2017 (UTC)
* 12) * Reason: None of the "references" given checks out. A Google search confirms that this person exists, but does not render any significant sources either. Fails WP:GNG, WP:MUSIC, and WP:ANYBIO.
* 13) Journal of Geriatric Care and Research: PROD; notified 12:50, 8 January 2017 (UTC)
* 14) * Reason: Non-notable, relatively new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 15) Notre Dame Philosophical Reviews: PROD; notified 13:49, 8 January 2017 (UTC)
* 16) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 17) Brian Hioe: PROD; notified 10:10, 9 January 2017 (UTC)
* 18) * Reason: Several references written by Hioe, not a single one about him. Does not meet WP:GNG or WP:ANYBIO.
* 19) Norbert Noehrbass (businessman): BLP PROD; notified 10:16, 9 January 2017 (UTC)
* 20) M. Ramkumar: BLP PROD; notified 10:30, 9 January 2017 (UTC)
* 21) Canvas Literary Journal: PROD; notified 15:58, 12 January 2017 (UTC)
* 22) * Reason: No independent sources, does not meet WP:GNG.
* 23) Journal Economics and Culture: PROD; notified 10:30, 20 January 2017 (UTC)
* 24) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 25) Kia Ora (Inflight Magazine): PROD; notified 10:37, 20 January 2017 (UTC)
* 26) * Reason: No indication of any notability.
* 27) Limnofish: PROD; notified 09:12, 21 January 2017 (UTC)
* 28) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 29) Centro Agrícola Journal: PROD; notified 09:50, 21 January 2017 (UTC)
* 30) * Reason: Rather promotional article copied mostly from journal homepage (but nnot copyvio as published under a CC license). Non-notable journal not indexed in many inclusive databases, but not any selective ones, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 31) List of online map services: PROD; notified 12:49, 21 January 2017 (UTC)
* 32) * Reason: Indiscriminate collection of external links violating WP:ISNOT (especially WP:LINKFARM).
* 33) University of Bologna Law Review: PROD; notified 19:16, 25 January 2017 (UTC)
* 34) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG. Article creation too soon.
* 35) List of members of the European Academy of Sciences and Arts: PROD; notified 19:35, 26 January 2017 (UTC)
* 36) * Reason: WP is the place to post a membership directory.
* 37) Medical journal of Zambia: PROD; notified 16:33, 30 January 2017 (UTC)
* 38) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 39) Medical journal of Babylon: PROD; notified 16:37, 30 January 2017 (UTC)
* 40) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
February 2017
* 1) Auburn Avenue (publication): PROD; notified 10:18, 3 February 2017 (UTC)
* 2) * Reason: No independent references discussing the magazine in depth. Article creation too soon, does not meet WP:GNG.
* 3) Muhammad Hanif Sulthoni: PROD; notified 12:39, 4 February 2017 (UTC)
* 4) * Reason: Drummed up bio about an author of some self-published books. No indication of any notability, does not meet WP:ANYBIO or WP:GNG.
* 5) Creation and Criticism: PROD; notified 18:30, 17 February 2017 (UTC)
* 6) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 7) The Journal of Academic Social Science: PROD; notified 15:55, 21 February 2017 (UTC)
* 8) * Reason: Non-notable relatively new journal. Not indexed in any selective databases, no independent sources.Most "databases" listed are fake/predatory indexing services (CiteFactor, Index Copernicus, etc). Does not meet WP:NJournals or WP:GNG.
March 2017
* 1) Michigan Journal of Public Affairs: PROD; notified 10:37, 6 March 2017 (UTC)
* 2) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 3) Omkar Shetty: PROD; notified 12:24, 7 March 2017 (UTC)
* 4) * Reason: One minor role in a movie doesn't make notability....
* 5) Jason malachi: BLP PROD; notified 13:32, 10 March 2017 (UTC)
* 6) SYN (Journal): PROD; notified 12:41, 13 March 2017 (UTC)
* 7) * Reason: No indication of any notability.
* 8) The Schola: PROD; notified 09:59, 17 March 2017 (UTC)
* 9) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 10) Solidarity: The Journal of Catholic Social Thought and Secular Ethics: PROD; notified 08:00, 24 March 2017 (UTC)
* 11) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 12) Journal of Dynamics and Games: PROD; notified 08:08, 24 March 2017 (UTC)
* 13) * Reason: Non-notable, relatively new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 14) National Journal of Research In Community Medicine: PROD; notified 09:31, 28 March 2017 (UTC)
* 15) * Reason: Non-notable relatively new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
April 2017
* 1) Journal of Graphic Engineering and Design: PROD; notified 10:20, 1 April 2017 (UTC)
* 2) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 3) Oikofobie. De angst voor het eigene: PROD; notified 11:38, 2 April 2017 (UTC)
* 4) * Reason: Non-notable book. Neither of the two references provided even mentions the book.
* 5) Bangabandhu Sheikh Mujib Medical University Journal: PROD; notified 07:03, 3 April 2017 (UTC)
* 6) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* 7) The Journal of Specialised Translation: PROD; notified 10:32, 11 April 2017 (UTC)
* 8) * Reason: Non-notable journal. None of the databases in which the journal claims to be indexed are selective, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Microbial Genomics (journal): PROD; notified 13:51, 12 April 2017 (UTC)
* 1) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Fuzön: PROD; notified 16:11, 12 April 2017 (UTC)
* 1) * Reason: No evidence of meeting WP:BAND.
June 2017
* Catalyst (journal): PROD; notified 19:41, 11 June 2017 (UTC)
* 1) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG. Too soon.
* Jirga Bannu: PROD; notified 08:51, 19 June 2017 (UTC)
* 1) * Reason: Weekly newspaper that was published briefly. No indication of any notability.
* Caribbean Journal of International Relations & Diplomacy: PROD; notified 08:15, 26 June 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Stanley Aronowitz bibliography: PROD; notified 08:27, 29 June 2017 (UTC)
* 1) * Reason: WP is not for posting lists of publications except of the most notable people (like Einstein). A short bibliography (with, say, 5 entries) with the most important selected works (as substantiated by independent sources) can be included in the article on this academic. All academics publish, but we don't need a completely list of publications for every one of them.
July 2017
* Journal of paramedic practice: PROD; notified 09:19, 4 July 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Zeeshan Khatri: PROD; notified 14:39, 8 July 2017 (UTC)
* 1) * Reason: Does not meet WP:PROF.
* Genocide Studies International: PROD; notified 08:30, 11 July 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* International Journal of Canadian Studies: PROD; notified 08:32, 11 July 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Journal of Military, Veteran and Family Health: PROD; notified 08:35, 11 July 2017 (UTC)
* 1) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Mouseion: PROD; notified 11:44, 11 July 2017 (UTC)
* 1) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Arizona State Sports and Entertainment Law Journal: PROD; notified 19:02, 13 July 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Ra nked at the very bottom of the Washington and Lee rankings with a combined score of 0. Does not meet WP:NJournals or WP:GNG.
* Outbreak, Surveillance and Investigation Reports (OSIR) Journal: PROD; notified 18:00, 14 July 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* K. Venkatesh: BLP PROD; notified 10:24, 20 July 2017 (UTC)
August 2017
* The Drake Foundation: PROD; notified 02:46, 2 August 2017 (UTC)
* 1) * Reason: Only in-passing mentions of foundation in third-party sources listed, no in-depth coverage. Does not meet WP:NORG or WP:GNG. (Note that some references do not mention this foundation.)
* Journal of Applied Mathematics and Computational Mechanics: PROD; notified 17:31, 4 August 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Australasian Journal of Logic: PROD; notified 17:39, 4 August 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Manuscript Studies: PROD; notified 10:10, 5 August 2017 (UTC)
* 1) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Journal of Computing Sciences in Colleges: PROD; notified 06:42, 7 August 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Prague Papers on the History of International Relations: PROD; notified 08:34, 19 August 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Indian Hydrobiology: PROD; notified 16:55, 22 August 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Nature Ecology and Evolution: PROD; notified 22:08, 27 August 2017 (UTC)
* 1) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Cogent Biology: PROD; notified 18:26, 29 August 2017 (UTC)
* 1) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
September 2017
* Africa Dialogue: PROD; notified 21:12, 3 September 2017 (UTC)
* 1) * Reason: Non-notable new journal. Doesn't seem to have published even a single article yet, article creation way too soon. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Chris Redhage: BLP PROD; notified 19:37, 16 September 2017 (UTC)
* Eleven International Publishing: PROD; notified 18:43, 17 September 2017 (UTC)
* 1) * Reason: Non-notable imprint. No independent sources.
* Frontiers of Astrobiology: PROD; notified 18:46, 17 September 2017 (UTC)
* 1) * Reason: Deceptively sourced article. None of the many sources are actually about this book... Does not meet WP:NBOOK or WP:GNG.
* Dreams of Other Worlds: PROD; notified 18:47, 17 September 2017 (UTC)
* 1) * Reason: Deceptively sourced article. None of the many sources are actually about this book... Does not meet WP:NBOOK or WP:GNG.
* How It Ends: From You to the Universe: PROD; notified 18:50, 17 September 2017 (UTC)
* 1) * Reason: Deceptively sourced article. None of the many sources are actually about this book (except for one snippet in The Independent)... Does not meet WP:NBOOK or WP:GNG.
* The Living Cosmos: PROD; notified 19:00, 17 September 2017 (UTC)
* 1) * Reason: Deceptively sourced article. None of the many sources are actually about this book (except some snippets that are likely not independent)... Does not meet WP:NBOOK or WP:GNG.
* Talking About Life: PROD; notified 19:02, 17 September 2017 (UTC)
* 1) * Reason: Deceptively sourced article. None of the many sources are actually about this book... Does not meet WP:NBOOK or WP:GNG.
* Humble before the Void: PROD; notified 19:05, 17 September 2017 (UTC)
* 1) * Reason: Three sources: the publisher, an announcement of a lecture followed by a book signing, and Goodreads... Oh, and an EL to the author's own website. Does not meet WP:NBOOK or WP:GNG.
* Beyond (book): PROD; notified 19:09, 17 September 2017 (UTC)
* 1) * Reason: Deceptively sourced article. None of the many sources are actually about this book (except for some -likely not independent- snippets)... Does not meet WP:NBOOK or WP:GNG.
* How It Began: PROD; notified 19:14, 17 September 2017 (UTC)
* 1) * Reason: Deceptively sourced article. Most of the sources are actually not about this book (or even mention it)... There's a review in the Wall St J, but it's behind a paywall and probably not very substantial. Does not meet WP:NBOOK or WP:GNG.
* European Journal of Law Reform: PROD; notified 19:14, 17 September 2017 (UTC)
* 1) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Encountering Life in the Universe: PROD; notified 19:16, 17 September 2017 (UTC)
* 1) * Reason: Does not meet WP:NBOOKS or WP:GNG.
* Water Research and Management: PROD; notified 18:18, 28 September 2017 (UTC)
* 1) * Reason: Non-notable journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
October 2017
* Saskia Cohen Tanugi: BLP PROD; notified 12:01, 1 October 2017 (UTC)
* Akropolis: Journal of Hellenic Studies: PROD; notified 10:51, 2 October 2017 (UTC)
* 1) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG. Article creation way too soon.
* Open Agriculture: PROD; notified 10:54, 3 October 2017 (UTC)
* 1) * Reason: Non-notable new journal. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Contemporary Organic Synthesis: PROD; notified 21:15, 7 October 2017 (UTC)
* 1) * Reason: Non-notable ephemeral journal that existed for only a few years. Not indexed in any selective databases, no independent sources. Does not meet WP:NJournals or WP:GNG.
* Hwebul: PROD; notified 13:25, 8 October 2017 (UTC)
* 1) * Reason: Dictionary definition, violates WP:DICDEF.
* Yousaf Tahir: PROD; notified 08:15, 10 October 2017 (UTC)
* 1) * Reason: Rather chaotic article that seems to discuss different people. Only references are 2 blogsposts and a book review. Does not meet WP:ANYBIO, WP:AUTHOR, or WP:GNG.
|
WIKI
|
Screen
From ConShell
Jump to navigation Jump to search
The screen command is like job control on steroids. You can create a screen session which will persist after you log out, allowing you to return to it hours or even days later. It has a scroll back feature, and you can bring up multiple windows in a single session.
Quite nifty.
Getting started
The commands C-a L shown below mean to press the Control key and then the a key together, release then press the final (letter) key to issue the command. It is also possible to change the C-a sequence in the .screenrc file.
• (re)attach to screen session, create if necessary
screen -DR
• Create a new window in current screen
C-a d
• Detach from current screen
C-a c Detach from current screen
• Enter copy/scrollback mode.
C-a esc
Create or join a shared screen session. This is incredibly useful if you want to walk someone through an install when they're in a different physical location and have logged in as same user on a different tty
screen -xR
|
ESSENTIALAI-STEM
|
User:Lmarthur/sandbox
This is a sandbox test.
Definition
A sandbox is a place to experiment and explore.
|
WIKI
|
open access publication
Article, 2023
Direct electrochemical dissolution of metallic uranium into deep eutectic solvent
In: Journal of Nuclear Materials, ISSN 1873-4820, 0022-3115, Volume 575, Page 154229, 10.1016/j.jnucmat.2022.154229
Contributors (10)
Yang, Wonseok [1] [2] Jung, Chanyong [3] Cha, Han Lim (0000-0001-9045-3414) [1] Park, Jun Woo [1] Foster, Richard Ian (0000-0002-5807-6062) [2] Amphlett, James T M (0000-0002-0135-587X) [1] [4] Liu, Shuang [2] Bae, Sang-Eun (0000-0003-2668-8950) [3] Yun, Jong-Il (0000-0001-8629-2259) [1] Choi, Sungyeol (Corresponding author) [2]
Affiliations
1. [1] Korea Advanced Institute of Science and Technology
2. [NORA names: South Korea; Asia, East; OECD]
3. [2] Seoul National University
4. [NORA names: South Korea; Asia, East; OECD]
5. [3] Korea Atomic Energy Research Institute
6. [NORA names: South Korea; Asia, East; OECD]
7. [4] Seaborg Technologies, Titangade 11, 2200 Copenhagen N, Denmark
Abstract
Deep eutectic solvents (DESs) could make uranium recycling processes greener than using conventional solvents, owing to their inherent advantages such as being biodegradable and non-toxic. However, the chemistry of uranium ions in DES systems, particularly the mechanism of direct anodic dissolution of uranium metal, remains unclear. The anodic dissolution of uranium metal in choline chloride (ChCl)–ethylene glycol (EG) DES was conducted by applying a constant current. The oxidation state of uranium in ChCl-EG DES was uranium(IV) when compared to concentration and applied charge. Absorption spectra showed 8 coordinated U(IV) centered complexes formed in the ChCl-EG DES, regardless of the uranium source (i.e. uranium chloride or metallic uranium anodic dissolution). The in situ spectroelectrochemistry during potentiostatic electrolysis, cyclic voltammograms, and absorption spectra of different times of potentiostatic electrolysis showed U(IV) oxidized to U(V), and then the U(V) disproportionated into U(IV) and U(VI) species. Understanding fundamental uranium speciation in DES systems and electrochemical properties could facilitate the development of an eco-friendly nuclear fuel cycle and nuclear uranium recycling process using green DESs.
Keywords
CHCl, DES systems, absorption spectra, advantages, anodic dissolution, charge, chemistry, chloride, choline chloride, complexes, concentration, constant current, conventional solvents, current, cycle, cyclic voltammograms, deep eutectic solvents, development, different times, direct electrochemical dissolution, dissolution, electrochemical dissolution, electrochemical properties, electrolysis, eutectic solvents, fuel cycle, green deep eutectic solvent, inherent advantages, ions, mechanism, metallic uranium, metals, nuclear fuel cycle, oxidation state, potentiostatic electrolysis, process, properties, recycling process, situ spectroelectrochemistry, solvent, source, speciation, species, spectra, spectroelectrochemistry, state, system, time, uranium, uranium ions, uranium metal, uranium source, uranium speciation, voltammograms
Funders
• Korea Institute of Materials Science
• National Research Foundation of Korea
• Ministry of Science and ICT
|
ESSENTIALAI-STEM
|
79th Rifle Corps
The 79th Rifle Corps (79-й стрелковый корпус) was a rifle corps of the Red Army in World War II that became part of the Soviet Army during the Cold War.
World War II
The corps was formed in July 1943 as a headquarters with no troops assigned, and subordinated to the Ural Military District. The headquarters was subsequently transferred to the 21st Army of the Western Front in August, and the 20th Army of the Reserve of the Supreme High Command in September. The 79th joined the 3rd Shock Army of the 2nd Baltic Front in October, with which it remained for the rest of the war, and was assigned the 146th and 326th Rifle Divisions under the command of Major General Fyodor Zuyev from 15 October. The 146th and 326th were replaced by the 28th, 171st, and 219th Rifle Divisions in November.
On May 1, 1945, the 79th Rifle Corps was the superior headquarters for the 150th, 171st, and 207th Rifle Divisions. The 150th Rifle Division was among those units that stormed the Reichstag.
In recognition of its actions, the corps received the Berlin honorific shortly after the end of the war.
Postwar
Postwar, it remained part of the 3rd Shock Army (redesignated as the 3rd Army in 1954) in the Group of Soviet Occupation Forces in Germany (renamed the Group of Soviet Forces in Germany in 1954), stationed at Stendal. The 171st Rifle Division was converted into the 16th Mechanized Division by the end of 1945, but was withdrawn to the Moscow Military District and disbanded there in 1946. The 150th Rifle Division was disbanded in Germany later that year, and was replaced by the 19th Guards Mechanized Division, transferred from the 8th Guards Army; the corps consisted of the 207th and the 19th Guards for the rest of its existence. In accordance with a General Staff directive of 4 March 1955 and a Ministry of Defense order of 13 June, the corps was renumbered as the 23rd Rifle Corps. The headquarters of the latter was disbanded on 4 July 1956, with its divisions directly subordinated to the army headquarters.
Commanders
The following officers commanded the corps during its existence:
* Major General Fyodor Zuyev (15 October 1943–23 May 1944)
* Colonel Semyon Perevyortkin (promoted to Major General 29 July 1944 and Lieutenant General 11 July 1945; 24 May 1944–May 1946)
* Colonel General Yakov Cherevichenko (6 June 1946–June 1948)
* Lieutenant General Nikolay Nikitin (June 1948–March 1951)
* Lieutenant General Boris Shulgin (March 1951–24 November 1953)
* Lieutenant General Vladimir Janjgava (25 November 1953–4 July 1956)
|
WIKI
|
Page:20th annual meet- League of American Wheelmen, Aug. 14th to 19th '99, Boston, Massachusetts.djvu/67
9.00 P.M. "Stag smoker" in the immense Mechanics' Hall, capable of seating thousands.
Bass Point, Nahant, Winthrop, Plymouth, Salem Willows, Gloucester, Cape Ann and Provincetown. See Monday's program for details.
8.30 a. m. Leave Copley Square for an all-day run to Brockton. The route takes one over Massachusetts avenue to Boston street, Columbia Road, Upham's Corner, through Dorchester to Milton Lower Mills, up Milton Hill, from the top of which a most beautiful view can be had. From here to Quincy are a good many down grades and some good coasting; from Quincy we go through Braintree and Holbrook, and then direct to Brockton; dinner at the Belmont Hotel, where a fine dinner can be had. The afternoon trip takes one home via Stoughton, across the Canton Meadows to Endicott, to Dedham, the streets of which are beautifully shaded, passing en route the famous Fairbanks House, with long, low sides and sweeping roof. This is the oldest house in Dedham, built, according to the best authorities, about 1650, although some say earlier. Before coming to the Fairbanks House, we pass the famous Avery Oak. It measures sixteen feet in circumference five feet from the ground. When the builders of the frigate Constitution, "Grand Old Ironsides," were seeking ship's timbers for it, they coveted this old oak, but the owner would not sell, declining an offer of seventy dollars, a large sum for that time. The route from here takes one over the famous Charles River to West Roxbury, Roslindale, Forest Hills, and through the Park System to starting point. Distance for the day about forty-seven miles.
8.30 a. m. Leave Art Museum, Copley Square, for an all day run to Wayside Inn, taking dinner at this famous hostelry. The route takes us out through Longwood, Brookline, up Beacon street boulevard to Chestnut Hill Reservoir, where we wheel over the famous Newton boulevard direct to Riverside, and on to Weston, Wayland, South Sudbury to Wayside Inn, and return over same route to Weston, where we go by Stony Brook Station direct to Waltham, then over to Norumbega, where supper can be had, and stop over to attend the outdoor theatre in the evening, arriving back in Boston late that night. Those that do not care to stop at the Park can go directly into Boston from Waltham.
9.00 a. m. Run to Cambridge, passing Harvard College grounds, Washington Elm, to North Cambridge, Arlington, where we take Pleasant street through a grand farming district to Belmont, to Waverley, visiting the Waverley Oaks, and on to Waltham. Passing the Common, we take Moody street over the river, and turn left Crafts street, direct for Newtonville and Newton, Oak Square, Allston, and into Boston. This run is about twenty-two miles.
12.00 M. Pioneers' Clam-Bake at Squantum. By invitation of the Boston Bicycle Club the members of "The Pioneers" will partake of a clam-bake at Squantum. Start will be made from Erikson statue at 12 M. sharp. Distance 7 miles.
A regulation New England clam-bake will be held on the beach at 1.80 P. M. Return will be made in full time to attend the banquet in the evening.
2.00 p. m. Ladies' run, under the auspices of the members of the Bostonian Cycle Club (a ladies' club), through the Park System, Mattapan, and Blue Hills.
2.30 p. m. Leave Copley Square for a run to Revere Beach and Point of Pines, via East Boston, Winthrop Junction, to State Bath House and Revere, where bathing can be indulged in, and on to the Point of Pines, so called from the grove of rugged trees here. It is a favorite picnic place, and a good shore dinner can be obtained here. This will be a stag picnic and clam-bake run, and the "Milwaukee 1900 Club" will assist in making merry.
6.45 p. m. Those that were unable to go on the run to the Point of Pines in the afternoon can do so now, and take in the vaudeville show at the theatre and return home with the afternoon party.
7.00 P.M. Banquet of "The Pioneers" at the American House. Dinner served at 7.00 P. M. sharp. Reception 6 to 7. Dress suits barred. Dinner tickets $1.00, to be had of Abbot Bassett, secretary. Desk at The Brunswick.
Any member of the L. A. W. who joined the organization previous to Dec, 31, 1889, is eligible to join "The Pioneers." Those who hold numbers below 2483 are included in this class. Make application for membership at The Brunswick.
7.00 p. m. Leave Copley Square for moonlight run through Brookline Woodlands and Newtons.
7.00 P. M. Run to Electric Light Races, Charles River Park.
8.00 P. M. National Championship Races at Charles River Park. Band concert by Cambridge Manual Training School Band.
Five Mile National Championship. L. A. W. Medals, Gold $25, Silver $15, Bronze $5.
Half Mile Handicap. Diamond $25, Camera $15, Training Robe $5.
One-Third Mile Championship. L. A. W. Medals, Gold $25, Silver $15, Bronze $5.
Half Mile National Championship. $150, $50, $25.
Third Heat 20 Mile Middle-Distance National Championship. Winner to qualify for final. $150, $75.
Special Amateur and Professional Races to be announced.
Bass Point, Nahant, Winthrop, Plymouth, Salem Willows, Gloucester, Cape Ann and Provincetown. See Monday's program for details.
|
WIKI
|
Position angle explained
Position angle, usually abbreviated PA, is the convention for measuring angles on the sky in astronomy. The International Astronomical Union defines it as the angle measured relative to the north celestial pole (NCP), turning positive into the direction of the right ascension. In the standard (non-flipped) images this is a counterclockwise measure relative to the axis into the direction of positive declination.
In the case of observed visual binary stars, it is defined as the angular offset of the secondary star from the primary relative to the north celestial pole.
As the example illustrates, if one were observing a hypothetical binary star with a PA of 135 degrees, that means an imaginary line in the eyepiece drawn from the north celestial pole to the primary (P) would be offset from the secondary (S) such that the NCP-P-S angle would be 135 degrees.
When graphing visual binary orbits, the NCP line is traditionally drawn downward—that is, with north at bottom—and PA is measured counterclockwise.
Also the direction of the proper motion can for example be given by its position angle.
The definition of position angle is also applied to extended objects like galaxies, where it refers to the angle made by the major axis of the object with the NCP line.
Nautics
The concept of the position angle is inherited from nautical navigation on the oceans, where the optimum compass course is the course from a known position to a target position with minimum effort. Setting aside the influence of winds and ocean currents, the optimum course is the course of smallest distance between the two positions on the ocean surface. Computing the compass course is known as the inverse problem of geodesics.
This article considers only the abstraction of minimizing the distance between and traveling on the surface of a sphere with some radius . In which direction angle relative to North should the ship steer to reach the target position?
Global geocentric coordinate system
Detailed evaluation of the optimum direction is possible if the sea surface is approximated by a sphere surface. The standard computation places the ship at a geodetic latitude and geodetic longitude, where is considered positive if north of the equator, and where is considered positive if east of Greenwich. In the global coordinate system centered at the center of the sphere, the Cartesian components are
{s}=R\left(\begin{array}{c}\cos\varphis\cosλs\\ \cos\varphis\sinλs\\ \sin\varphis \end{array}\right)
and the target position is
{t}=R\left(\begin{array}{c}\cos\varphit\cosλt\\ \cos\varphit\sinλt\\ \sin\varphit \end{array}\right).
The North Pole is at
{N}=R\left(\begin{array}{c}0\\ 0\\ 1 \end{array}\right).
The minimum distance is the distance along a great circle that runs through and . It is calculated in a plane that contains the sphere center and the great circle,
ds,t=R\thetas,t
where is the angular distance of two points viewed from the center of the sphere, measured in radians. The cosine of the angle is calculated by the dot product of the two vectors
st=R2\cos\thetas,t=
2(\sin\varphi
R
s\sin\varphi
t+\cos\varphis\cos\varphit\cos(λts))
If the ship steers straight to the North Pole, the travel distance is
ds,N=R\thetas,N=R(\pi/2-\varphis)
If a ship starts at and swims straight to the North Pole, the travel distance is
dt,N=R\thetat,n=R(\pi/2-\varphit)
Brief Derivation
The cosine formula of spherical trigonometry yields for the angle between the great circles through that point to the North on one hand and to on the other hand
\cos\thetat,N=\cos\thetas,t\cos\thetas,N+\sin\thetas,t\sin\thetas,N\cosp.
\sin\varphit=\cos\thetas,t\sin\varphis+\sin\thetas,t\cos\varphis\cosp.
The sine formula yields
\sinp
\sin\thetat,N
=
\sin(λts)
\sin\thetas,t
.
Solving this for and insertion in the previous formula gives an expression for the tangent of the position angle,
\sin\varphit=\cos\thetas,t\sin\varphis+
\sin(λts)
\sinp
\cos\varphit\cos\varphis\cosp;
\tanp=
\sin(λts)\cos\varphit\cos\varphis
\sin\varphit-\cos\thetas,t\sin\varphis
.
Long Derivation
Because the brief derivation gives an angle between 0 and which does not reveal the sign (west or east of north ?), a more explicit derivation is desirable which yields separately the sine and the cosine of such that use of the correct branch of the inverse tangent allows to produce an angle in the full range .
The computation starts from a construction of the great circle between and . It lies in the plane that contains the sphere center, and and is constructed rotating by the angle around an axis . The axis is perpendicular to the plane of the great circle and computed by the normalized vector cross product of the two positions:
\omega=
1
R2\sin\thetas,t
s x t=
1
\sin\thetas,t
\left(\begin{array}{c} \cos\varphis\sinλs\sin\varphit-\sin\varphis\cos\varphit\sinλt \\ \sin\varphis\cosλt\cos\varphit-\cos\varphis\sin\varphit\cosλs \\ \cos\varphis\cos\varphit\sin(λts) \end{array}\right).
A right-handed tilted coordinate system with the center at the center of the sphere is given by thefollowing three axes: theaxis, the axis
s\perp=\omega x
1
R
s=
1
\sin\thetas,t
\left(\begin{array}{c} \cos\varphit\cosλ
s)-\cosλ
s(\sin\varphis\cos\varphis\sin\varphi
2\varphi
s\sinλ
s\cos\varphit\sinλt)\\ \cos\varphit\sinλ
s)-\sinλ
s(\sin\varphis\cos\varphis\sin\varphi
2\varphi
s\cosλ
s\cos\varphit\cosλt)\\ \cos\varphis[\cos\varphis\sin\varphit-\sin\varphis\cos\varphit\cos(λts)] \end{array}\right)
and the axis .A position along the great circle is
s(\theta)=\cos\thetas+\sin\thetas\perp,0\le\theta\le2\pi.
The compass direction is given by inserting the two vectors and and computing the gradient of the vector with respect to at .
\partial
\partial\theta
s\mid=s\perp.
The angle is given by splitting this direction along two orthogonal directions in the plane tangential to the sphere at the point . The two directions are given by the partial derivatives of with respect to and with respect to, normalized to unit length:
uN=\left(\begin{array}{c} -\sin\varphis\cosλs\\ -\sin\varphis\sinλs\\ \cos\varphis \end{array}\right);
uE=\left(\begin{array}{c} -\sinλs\\ \cosλs\\ 0 \end{array} \right);
uNs=uEuN=0
points north and points east at the position .The position angle projects into these two directions,
s\perp=\cospuN+\sinpuE
,where the positive sign means the positive position angles are defined to be north over east. The values of the cosine and sine of are computed by multiplying this equation on both sides with the two unit vectors,
\cosp=s\perp
u
N =1
\sin\thetas,t
[\cos\varphis\sin\varphit-\sin\varphis\cos\varphit\cos(λts)];
\sinp=s\perp
u
E =1
\sin\thetas,t
[\cos\varphit\sin(λts)].
Instead of inserting the convoluted expression of, the evaluation may employ that the triple product is invariant under a circular shiftof the arguments:
\cosp=(\omega x
1
R
s)uN =\omega(
1
R
s x uN).
If atan2 is used to compute the value, one can reduce both expressions by division through and multiplication by,because these values are always positive and that operation does not change signs; then effectively
\tanp=
\sin(λts)
\cos\varphis\tan\varphit-\sin\varphis\cos(λts)
.
See also
Further reading
External links
|
ESSENTIALAI-STEM
|
Hurricane Lane churns toward Hawaii, residents stock up
HONOLULU (Reuters) - Hurricane Lane churned slowly toward Hawaii late on Wednesday as schools, government offices and business closed and residents stocked up on supplies and boarded up homes. A direct hit could bring the U.S. Pacific island state’s worst storm in a quarter century, forecasters said. Lane packed sustained winds of up to 145 miles per hour (230 km/h) and could dump as much as 20 inches of rain that could trigger flash floods and landslides, the National Weather Service said. “Preparations to protect life and property should be rushed to completion,” the service added. “Life threatening impacts are likely in some areas as the hurricane makes its closest approach.” Lane - classified as a powerful Category 4 storm on the five-step Saffir-Simpson scale of hurricane strength - was expected to hit the Big Island overnight and slam the island of Maui on Thursday, according to the service. To the north, Oahu was under a hurricane warning while Kauai remained on hurricane watch meaning it could face similar conditions starting Friday morning. Governor David Ige urged residents to prepare for the worst by setting aside a 14-day supply of water, food and medicines. “I urge our residents and visitors to take this threat seriously and prepare for a significant impact,” the governor said at a news conference in the state capital, Honolulu. He also announced that all public schools, University of Hawaii campuses and non-essential government offices on the islands of Oahu and Kauai would be closed for at least two days starting on Thursday. The shelves of a downtown Honolulu Walmart were stripped of items ranging from canned tuna to dog food. Shoppers jostled with one another to get the last boxes of ramen noodles. “There’s nothing in there,” said one shopper leaving the store. City residents used carts to push cases of bottled water and coolers full of ice, after warnings of possible power outages and evacuations. Cars waited in long lines at gasoline stations in Honolulu and people could be seen pulling small boats from the water ahead of Lane’s expected storm surge. “I went to Safeway last night for regular groceries, everyone was in a panic,” said Thao Nguyen, 35, an employee at a Honolulu branch of Hawaiian shirt retailer Roberta Oaks. “People were buying cases of tiny water bottles.” U.S. President Donald Trump directed FEMA and administration officials to remain in close coordination with the state, White House spokeswoman Sarah Sanders told reporters. “The president is deeply concerned for the well-being of all Hawaiians,” she said. U.S. Navy ships and submarines based in Hawaii were instructed to leave port, a common practice as a hurricane approaches to avoid damage. As of 11 p.m. (0900 GMT Thursday), the storm was centered 235 miles (380 km) south-southwest of Kailua-Kona, the weather service said. The outer bands of the storm were already dumping 1 to 3 inches an hour of rain on parts of the Big Island as the eastern side of the island was under a flash flood warning, said Gavin Shigesato, a NWS meteorologist said. The most powerful storm on record to hit Hawaii was Hurricane Iniki, a Category 4 storm that made landfall on Kauai island on Sept. 11, 1992, according to the National Oceanic and Atmospheric Administration. It killed six people and damaged or destroyed more than 14,000 homes. Additional reporting by Gina Cherelus in New York, Brendan O'Brien in Milwaukee and Steve Gorman and Dan Whitcomb in Los Angeles; Writing by Andrew Hay; Editing by Tom Brown, Sandra Maler and Andrew Heavens
|
NEWS-MULTISOURCE
|
Read This Solid Advice On Back Discomfort
By | 21 August 2019
Advertisements
Read This Solid Advice On Back Discomfort
A lot of all back pain is cause by injuring your muscles. Damage to ligaments or muscle strain can have a lot of the back. This article will provide you with some effective ways to cope with back pain and how to deal with it. Although back pain is tough on you at times, it is a treatable condition that does not need to take over your life.
Many fitness programs are available that can have a positive impact on the back pain you might experience after an injury. Yoga, for example, is a great way to stretch out your back muscles, while also increasing flexibility. Also, exercises that work your core will strengthen your back and help you get through your daily tasks more comfortably. TIP! There are exercises you can do that will reduce the likelihood of you suffering a back injury. Yoga is just one of the low impact exercises programs that can strengthen muscles, improve flexibility and prevent future strained muscles.
Find a firm mattress that has enough firmness to prevent back discomfort. Most people believe that a soft mattresses work against those who suffer from back pain. Firm mattresses are better, if one is too firm it could also add to back discomfort. You may need to try out several different mattresses before finding one that is right for you. Gets Worse
To prevent some back pain from getting worse, always attempt to avoid putting stress on the muscles that cause you pain. This stress can occur in any sitting or standing position, so make sure to stay mindful of it. Be especially mindful of this when completing repetitive tasks, such as house cleaning or work related projects. If you’re sitting, get up and stretch your legs and if you’re standing, move around periodically. TIP! To prevent some back pain from getting worse, always attempt to avoid putting stress on the muscles that cause you pain. This stress can occur in any sitting or standing position, so make sure to stay mindful of it.
To determine how tough your injury is and avoid making it worse, you should rest your back for one to two days after experiencing pain. If the pain subsides in that time, it’s alright to assume it’s a minor injury. If the pain does not go away or gets worse, or if it gets worse, it is time to consult a physician for further evaluation. Resting for more than 48 hours usually won’t do any good, as the supporting muscles will weaken even more.
Avoid repeated stress on the same muscles, regardless of the physical position your body is in.
An important piece of advice regarding back pain is to avoid lifting boxes or packages before you know what is inside. The box could be very heavy, and this could hurt your back. Don’t risk your back health by assuming you know how heavy something is according to the picture or label on the box. TIP! You should never attempt to lift a box if you do not know what it contains. The contents may be heavy, and may cause an unexpected strain on your back.
You could seriously injure your back if you want to lift. The content of the box may weigh more than you expect and can put unexpected strains on your back. Don’t assume that the box weighs.
You can protect your back while you have to sit at a desk by taking walks on your breaks.
Protect your back during the day by walking around on breaks. When you stretch your leg muscles via standing and walking, you are also stretching out your back muscles. This can help alleviate any compression issues and back pain that occur from sitting too long. TIP! If you spend your days chained to a desk at an office job, make sure that you take a walk during your breaks. Regularly standing up and moving your body and legs stretches the muscles around your spine.
Stressing out about back discomfort is only going to complicate it further. You need to learn how to properly relax so you do not increase your chances of developing muscle spasms.
Back surgery is one option to discuss with your doctor in order to relieve back discomfort. Surgery should be your last resort if all other treatment methods.
When you are in the throes of back pain, you have to attempt to quiet muscle spasms. One quick and simple method is to put a heat pack on these muscles and lay down for a while. You should also drink plenty of fluids and keep your sodium intake to a minimum until your pain subsides. If you are dehydrated, it can actually make your muscle spasms worse. TIP! Muscle spasms must be calmed to help with back pain. The fastest, easiest way to accomplish this is by laying down and applying some heat directily to the tense, spasming muscles.
A terrific method of relaxing is to allow your body to fall limp while laying in bed. This is a good method to help relax the muscles of neglected muscles.
Avoid back pain during breastfeeding by making sure to sit properly on your chair instead of a couch. The position you nurse in while breastfeeding could trigger back pain unless you sit incorrectly. A good tip here is to place a therapeutic pad or just a regular pillow behind your back can also soothe your back while you nursing.
Many times when people have back pain, it is in their lower back. This is also the 2nd most popular reason that many people have to visit the doctor. There are lots of daily things you do that could be done in a different way to ease lower back pain; however, you must follow proper precautions. Because lower back pain is quite common, you will want to take precautions to reduce your chances of suffering from it. Drinking Coffee
Drinking coffee may help relieve back discomfort that’s chronic. Recent studies have shown caffeine helps to block the chemical adenosine. Adenosine contributes to back stiffness and the caffeine in coffee blocks it, so drinking coffee will stretch out your back muscles and prevent pain.
Severe back pain should be reported to your physician. Your doctor will runs tests and take them into account along with medical history and other factors he may deem relevant to your condition. TIP! Go see your doctor to get a proper diagnosis. Your doctor can run some diagnostic tests and give you a full physical.
Make sure you sit up straight. Having a bad posture leads to unnecessary strain on back and spine joints. If you need to sit down for long periods due to work or other obligations, make sure you have a comfortable, comfortable chair to sit in. Sitting on an exercise balls can better your posture and strengthen your back.
One way to alleviate back spasms is to cut down or omitting drinks containing caffeine from your daily diet. Caffeine has actually been proven to enhance the likelihood of back spasms and make your muscles inflamed if they are already sensitive. Try to drink less caffeine and it can help your back discomfort.
If you are 10 pounds or more overweight, you may want to consider a weight-loss plan. Carrying additional weight, especially in your abdominal area, can shift your body’s center of gravity. That puts a strain on your lower back, and as time passes can result in chronic lower back pain. TIP! If you are 10 pounds or more overweight, you may want to consider a weight-loss plan. The added weight, especially around the tummy, will cause your body’s center of gravity to shift.
The majority of folks alive know what back discomfort is like. They are experiencing it right now, or they remember what it’s like. The wisdom you need for your back pain was in the preceding paragraphs, and now the time for their application has come. Take some time for your yourself, and focus on your back pains. Related Posts
2 thoughts on “Read This Solid Advice On Back Discomfort
1. sEvenbites
continuously i used to read smaller articles or reviews which as well
clear their motive, and that is also happening with this article which I am reading
now.
Reply
2. Danny
We stumbled over here different web page and thought I might check
things out. I like what I see so now i am following
you. Look forward to looking at your web page repeatedly.
Reply
Leave a Reply
Your email address will not be published. Required fields are marked *
This site uses Akismet to reduce spam. Learn how your comment data is processed.
|
ESSENTIALAI-STEM
|
Page:Reminisences of Captain Gronow.djvu/197
Rh hostile to the court were invited; and among these were Casimir Perier, the Dupins, Lafitte, Benjamin Constant, and a host of others who a few years afterwards drove out the eldest branch that occupied the throne to make way for Louis Philippe.
—The late Lord Thanet, celebrated for having been imprisoned in the Tower for his supposed predilection for republicanism, passed much of his time in Paris, particularly at the Salon des Etrangers. His lordship's infatuation for play was such, that when the gambling-tables were closed, he invited those who remained to play at chicken-hazard and ecarté; the consequence was that, one night, he left off a loser of 120,000l. When told of his folly and the probability of his having been cheated, he exclaimed, "Then I consider myself lucky in not having lost twice that sum!"
—Soon after Lord Granville's appointment, a strange occurrence took place at one of the public gambling-houses. A colonel, on half-pay, in the British service, having lost every farthing that
|
WIKI
|
Over the past 50 years, the construction industry has been a slow adopter of processes and technology innovation. The industry still relies heavily on manual labor, mechanical technology, and an established operating model. Hence, construction productivity has declined in some markets since the 1990’s
Key construction technologies that are on the rise, Digital Twins and Building Information Management (BIM). These two technologies play different roles but they work together to create the digital platform for operational excellence. Gartner defines a digital twin as “a digital representation of a real-world entity or system. The implementation of a digital twin is an encapsulated software object or model that mirrors a unique physical object, process, organization, person, or other abstraction”. Data can be centralized from multiple digital twins across multiple real-world entities and their related processes, such as a power plant, city, or organization.
Digital Twins are evolving beyond virtual replicas of assets to include a virtual replica of entire organizations known as the Digital Twin of an Organization (DTO).
According to the Gartner What to Expect When You’re Expecting Digital Twins report, there are three types of digital twins:
1. “Discrete digital twins — To optimize individual assets, people and other physical resources. advanced electronic drilling recorder that has predictive maintenance capability, or a PLC system
2. Composite digital twins — Applied to operations involving a combination of discrete digital twins and resources (for example, from external data sources). asset performance management where it monitors plant assets from multiple discrete digital twins
3. Digital twins of organizations (DTOs) — To maximize value across specific commercial processes such as manufacturing, or across entire business operations.”
Advancing Building Information Management (BIM) with Digital Twins
BIM is used to create a building model while it is being built, to visualize the physical and functional aspect of the building and help architect and construct the building , not to create a living breathing model of an operational building.
A DTO models the living model of a real-time operational building. It models how individuals interact with the building including people and process. A DTO will provide knowledge on people and processes: on the state of built subsystems, how systems are impacted by occupant behavior, and when assets (lighting, HVAC) might fail.
Design and build is moving beyond things to including people, experiences and flexibility in mind, this is how the future of DTO is superseding BIM. BIM is a key data input to any digital twin but it will not answer operational questions like how to improve building efficiencies or reduce GHG emissions.
At Thynkli, we build a Digital Twin of Organization (DTO) and integrate it with Building Information Management (BIM) to maximize the value of your investments and build a transparent sustainable operations fed by real- time data. Contact us today to learn how we can help you
To discover more about the Thynkli process using Enterprise Architecture see HERE.
Let’s talk
|
ESSENTIALAI-STEM
|
Page:Rebecca of Sunnybrook Farm (1903).djvu/39
Rh in your lap, an' open your little red parasol, an' we 'll jest make the natives stare!"
The child's face was radiant for a moment, but the glow faded just as quickly as she said, "I forgot—mother put me inside, and maybe she 'd want me to be there when I got to aunt Mirandy's. Maybe I 'd be more genteel inside, and then I would n't have to be jumped down and my clothes fly up, but could open the door and step down like a lady passenger. Would you please stop a minute, Mr. Cobb, and let me change?"
The stage driver good-naturedly pulled up his horses, lifted the excited little creature down, opened the door, and helped her in, putting the lilacs and the pink sunshade beside her.
"We 've had a great trip," he said, "and we 've got real well acquainted, have n't we?—You won't forget about Milltown?"
"Never!" she exclaimed fervently; "and you're sure you won't, either?"
"Never! Cross my heart!" vowed Mr. Cobb solemnly, as he remounted his perch; and as the stage rumbled down the village street between the green maples, those who looked from their windows saw a little brown elf in buff calico sitting primly on the back seat holding a great bouquet tightly in one hand and a pink parasol in the other. Had they been farsighted enough they might have seen, when the stage turned into the side dooryard of the old
|
WIKI
|
Skip to main content
ABC News
Can You Capture The Invisible Kings?
Welcome to The Riddler. Every week, I offer up problems related to the things we hold dear around here: math, logic and probability. Two puzzles are presented each week: the Riddler Express for those of you who want something bite-size and the Riddler Classic for those of you in the slow-puzzle movement. Submit a correct answer for either,1 and you may get a shoutout in the next column. Please wait until Monday to publicly share your answers! If you need a hint or have a favorite puzzle collecting dust in your attic, find me on Twitter.
Riddler Express
You are playing a game of chess, but the enemy king is invisible! You have no idea where he is on the chessboard, while your opponent knows precisely where his king is at all times. Nevertheless, you take turns making one move at a time. If at any point you checkmate the enemy king, he reveals himself and you win the game.
However, if your king ever moves to a square that is adjacent to the enemy king, then be warned, for he will capture your king and win the game. Meanwhile, the enemy king will never move into check or checkmate. (If a stalemate is available, he may very well go for it.)
Your king begins in the bottom left corner of the board, flanked by a rook on either side, as shown below. You also know the enemy king is not currently in check.
Chess board. King is in the bottom left corner. One rook is immediately to the right of the king. The other rook is immediately above the king.
It’s your move. How can you guarantee a victory for yourself without losing a piece?
The solution to this Riddler Express can be found in the following column.
Riddler Classic
The enemy king has gone missing again, but this time he is no chess piece. He is somewhere in his castle’s square courtyard. It’s poorly lit, so you carry around a lantern that will help you spot him as long as he is within 10 meters of your current position in any direction.
The king is wily and tries to avoid detection. Both you and he move at the exact same speed at all times.
You find yourself in the center of the courtyard. Since you cannot see the king, you know he is somewhere outside your 10-meter circle of visibility, but beyond that you have no idea where he is. After some mental math, you realize that you have no hope of ever finding him, no matter where he starts from.
What is the smallest possible side length of the square courtyard?
The solution to this Riddler Classic can be found in the following column.
Solution to last week’s Riddler Express
Congratulations to ÐÐÐЯСÐÐÑ Steve Schaefer ÐÐÐЯСÐÐÑ of Carlsbad, California, winner of last week’s Riddler Express.
Last week, Amare the ant was trying to escape from a spider web.
Starting at the very center of the web, he then crawled 1 inch radially away in a random direction. From there, he randomly chose between crawling in the radial or tangential directions, with a 50 percent chance of each. When he crawled radially, he moved another inch from his current position directly away from the center of the web. When he crawled tangentially, he moved another inch in one of the two directions perpendicular to the radial direction. (To be clear, when Amare moved tangentially, he was still moving farther away from the center of the web, at least a little bit.)
After Amare had crawled a total of 4 inches, how far away from the center of the web was he, on average?
Suppose Amare was currently a distance x from the center of the web. After a radial move, he would then be a distance x+1 from the center. But after a tangential move (in either of the two directions), his distance from the center would be √(x2+1) thanks to the Pythagorean theorem. For larger values of x, these tangential moves had less of an effect on Amare’s distance.
Now for this problem, you knew that Amare’s first move was radial. After that, solver Harshil Mehta recognized that there were eight equally likely possibilities. Let’s list them out in descending order of distance from the center of the web, with an R for radial and a T for tangential moves:
• RRR: 4
• TRR: 2+√2, or about 3.414
• RTR: 1+√5, or about 3.236
• RRT: √10, or about 3.162
• TTR: 1+√3, or about 2.732
• TRT: √(4+2√2), or about 2.613
• RTT: √6, or about 2.449
• TTT: 2
The average of these eight values was approximately 2.951, which meant Amare was, on average, 2.951 inches from the center of the web.
Solver Joao Coelho plotted the distribution of Amare’s final distances if he had moved a total of 7 inches:
A colorful circle with many trajectories emanating from the center of the web. There is a distribution of final distances for Amare the ant.
Solver Rohan Lewis further animated Amare’s possible positions over the course of 10 moves. As Amare got farther away from the center of the web, his tangential moves had less of an effect on his distance from the center. So after N moves, for sufficiently large values of N, his average distance was approximately N/2, since about half his moves were in the radial direction.
In any case, I hope Amare successfully evaded any spiders.
Solution to last week’s Riddler Classic
Congratulations to ÐÐÐЯСÐÐÑ Tom Knief ÐÐÐЯСÐÐÑ of Des Moines, Iowa, winner of last week’s Riddler Classic.
Last week, you (hopefully) marveled at the never-before-seen image of the black hole — Sagittarius A* — at the center of our galaxy:
This image was generated using data from the Event Horizon Telescope. One of the most striking things about the image was how clearly we could make out the black hole’s shadow. That was because the plane of its accretion disk was nearly perpendicular to the vector between us and the black hole. Was this likely to occur, or was it just a cosmic coincidence?
Assuming the accretion disk was equally likely to be in any plane, what was the probability of it being within 10 degrees of perpendicular to us, thereby resulting in a spectacular image?
Instead of thinking about the angle of the plane of the accretion disk, solver Mari Fujioka instead focused on a vector that was normal (i.e., perpendicular) to the plane. If this vector pointed within 10 degrees of Earth, then it was within 10 degrees of being perpendicular.
At this point, the problem was more or less an exercise in multivariable calculus. What fraction of a sphere’s surface area is within 10 degrees of a single point? Many solvers computed this by integrating the surface element of a unit sphere — sinÐÐÐÐЬÐÐâdÐÐÐÐЬÐÐâdÐÐÐÐЬЩ, where ÐÐÐÐЬÐÐâ is the polar angle and ÐÐÐÐЬЩ is the azimuthal angle — for polar angles between 80 and 90 degrees and azimuthal angles between 0 and 360 degrees.
If the maximum angle of the normal vector is ÐÐÐÐЫâÐâ¢ÐÑ, then the area of the region on the unit sphere within angle ÐÐÐÐЫâÐâ¢ÐÑ of a single point is given by the formula 2ÐÐÐÐЬÐÐâº(1−cosÐÐÐÐЫâÐâ¢ÐÑ). Meanwhile, the surface area of a unit sphere is 4ÐÐÐÐЬÐÐâº. And so the fraction of the surface that is within the region of interest is (1−cosÐÐÐÐЫâÐâ¢ÐÑ)/2. Plugging in 10 degrees for ÐÐÐÐЫâÐâ¢ÐÑ gave you a value of about 0.0076, meaning there was a 0.76 percent chance of generating a spectacular image of the black hole.
But wait a minute, that wasn’t right! Because of the symmetry in the problem, a similar image would have been generated had the normal vector been pointing 180 degrees away from you. This meant you had to double the previous answer, and that there was a 1.52 percent chance of generating a spectacular image.
While a 10 degree difference makes for beautiful galactic artwork, what if we had relaxed this constraint so that the plane was merely within 30 degrees of being perpendicular? If the orientation of the accretion disk had truly been random, then there was still just a 13.4 percent chance of this happening.
That’s all pretty remarkable, especially when you consider that the previously imaged black hole at the center of the supergiant galaxy Messier 87 was similarly spectacular.
Want more puzzles?
Well, aren’t you lucky? There’s a whole book full of the best puzzles from this column and some never-before-seen head-scratchers. It’s called “The Riddler,” and it’s in stores now!
Want to submit a riddle?
Email Zach Wissner-Gross at riddlercolumn@gmail.com.
Footnotes
1. Important small print: In order to 👏 win 👏, I need to receive your correct answer before 11:59 p.m. Eastern time on Monday. Have a great weekend!
Zach Wissner-Gross leads development of math curriculum at Amplify Education and is FiveThirtyEight’s Riddler editor.
Comments
Related Interactives
|
ESSENTIALAI-STEM
|
Brexit Trounces Shares of American Airlines, Delta Air Lines, and United Continental
Even before U.K. voters opted to leave the EU, shares of the top three U.S. airlines were trading near their 52-week lows. After the vote results were announced, American Airlines (NASDAQ: AAL) , Delta Air Lines (NYSE: DAL) , and United Continental (NYSE: UAL) shares all plunged to levels not seen since 2014 or earlier.
American Airlines, Delta Air Lines, and United Continental Stock Performance, data by YCharts
"Brexit" will undoubtedly have a negative impact on American, Delta, and United. Nevertheless, investors appear to be overreacting to this news by sending all three stocks down by double digits over the course of the past two trading days.
Brexit will cause trouble
The U.K. is an important market for all three U.S. legacy carriers. Flights to the U.K. account for 6.2% of capacity at American Airlines, 5.3% at United Continental, and 2.7% at Delta Air Lines, according to a Buckingham Research analysis .
This actually understates the U.K. exposure of American and Delta. American Airlines has a joint venture with U.K. flag carrier British Airways, while Delta has a joint venture with -- and also owns 49% of -- Virgin Atlantic. As a result, profit declines on U.S.-U.K. routes at British Airways and Virgin Atlantic would reduce the earnings of American and Delta, respectively.
American Airlines has the largest U.K. exposure of any U.S. airline. Image source: American Airlines.
The International Air Transport Association estimates that Brexit could reduce U.K. air travel passenger volume by 3%-5% by 2020, due to a 2.5%-3.5% decline in GDP that will never be recovered. The falling British pound will have an additional impact on outbound travel from the U.K., but the IATA believes that this will be offset by more tourists flying to the U.K. to take advantage of the favorable exchange rate.
Brexit's impact on legacy carrier profitability would extend beyond lower passenger volumes, though. London has a high concentration of premium demand from business travelers. A fall in business confidence could reduce demand for pricey business class tickets between the U.S. and London, having a disproportionate negative impact on unit revenue and earnings.
Airlines can react
The good news for investors is that airlines can adapt to changing demand trends. In this case, American, Delta, and United are likely to start reducing their capacity in the U.K. at the first sign of unit revenue weakness there.
In a worst case scenario, airlines would have to ground some planes. Even that wouldn't be the end of the world, as they would presumably remove their least cost-efficient planes from service first. However, they may also be able to redeploy some capacity from the U.K. to domestic routes or better-performing international markets.
These stocks are too cheap
By the end of the day on Monday, American Airlines and United Continental both traded for less than five times their projected 2016 earnings. Delta's valuation was only slightly higher, at 5.3 times the average 2016 analyst earnings estimate.
Airline stock valuations may have fallen too far. Image source: The Motley Fool.
While the airlines' profit margins will probably decline a bit from their 2015-2016 highs in the next year or two, the stocks are currently pricing in extremely severe margin contraction. As long as airlines remain willing to cut capacity in underperforming markets when necessary, the probability of this "doomsday" scenario occurring is remote.
For example, a downturn in Europe may be offset by improvements in Brazil and Japan. These markets have been trouble spots in recent years due in part to currency weakness, but the Brazilian real and Japanese yen have appreciated against the dollar recently.
Longer-term, if Brexit causes multinational corporations to shift jobs from London to the rest of Europe, it could boost travel from the U.S. to major business centers like Amsterdam, Frankfurt, Paris, Rome, and Zurich. That would play into the hands of Delta and United, whose joint venture partners have hubs in those cities.
Legacy carrier airline stocks may not be worth as much today as they were one week ago. But after markdowns ranging from 13% (Delta Air Lines) to 17% (American Airlines) they are even better buying opportunities for long-term investors willing to ride out heavy volatility in the months and years ahead.
A secret billion-dollar stock opportunity
The world's biggest tech company forgot to show you something, but a few Wall Street analysts and the Fool didn't miss a beat: There's a small company that's powering their brand-new gadgets and the coming revolution in technology. And we think its stock price has nearly unlimited room to run for early in-the-know investors! To be one of them, just click here .
Adam Levine-Weinberg owns shares of United Continental Holdings and is long January 2017 $40 calls on Delta Air Lines and long January 2017 $30 calls on American Airlines Group. The Motley Fool has no position in any of the stocks mentioned. Try any of our Foolish newsletter services free for 30 days . We Fools may not all hold the same opinions, but we all believe that considering a diverse range of insights makes us better investors. The Motley Fool has a disclosure policy .
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
|
NEWS-MULTISOURCE
|
Wendell B. Harris Jr.
Wendell B. Harris Jr. (born March 5, 1954), is a Juilliard- and Interlochen-trained American filmmaker and actor.
Career
He is known as the writer, director and lead actor of Chameleon Street, which won the Dramatic Grand Jury Prize at the 1990 Sundance Film Festival.
Harris and Prismatic Images went on to produce a radio series entitled Black Biography, which showcased black icons from the spheres of art, history, and politics. He has appeared as an actor in the films Out of Sight (1998) and Road Trip (2000). Harris is currently in post-production for the forthcoming documentary Arbiter Roswell, a 14-year project chronicling the relationship between public opinion, the media, and the military-industrial complex.
|
WIKI
|
John Stasko
John Thomas Stasko III (born August 28, 1961) is a Regents Professor in the School of Interactive Computing in the College of Computing at Georgia Tech, where he joined the faculty in 1989. He also is one of the founding members of the Graphics, Visualization, and Usability (GVU) Center there. Stasko is best known for his extensive research in information visualization and visual analytics, including his earlier work in software visualization and algorithm animation.
Early life and education
John Stasko was born on August 28, 1961, in Miami, Florida. As a youngster, he lived in Pennsylvania (Lancaster and Reading) and south Florida (Miami, Boca Raton, and Deerfield Beach). Stasko attended Bucknell University and graduated summa cum laude with a B.S. in Mathematics in 1983. He went directly to graduate school and earned an Sc.M. and Ph.D. in Computer Science at Brown University in 1985 and 1989, respectively. His doctoral thesis, "TANGO: A Framework and System for Algorithm Animation," is a highly cited project in the area of Software Visualization. Stasko joined the faculty of the College of Computing at Georgia Tech in 1989. He and his wife Christine have three children, John IV (Tommy), Mitchell, and Audrey. Stasko is an avid golfer and was winner of the 1996 Bobby Jones Memorial Tournament at East Lake Golf Club in Atlanta.
Professional career
Upon joining the faculty at Georgia Tech, Stasko continued his research in algorithm animation and software visualization. He was the lead editor on the 1998 MIT Press book Software Visualization: Programming as a Multimedia Experience, generally considered the lead reference for that field. Stasko also was one of the founding faculty for the GVU Center at Georgia Tech.
In the late 1990s, his research broadened into other areas of human-computer interaction and he developed a specific focus on information visualization. He formed the Information Interfaces Research Group which he still directs. More recently, Stasko has been a pioneering researcher in the new field of visual analytics, and was a contributor to the 2005 book, Illuminating the Path, that laid out a research agenda for this field.
Stasko has published extensively in these fields, including over 125 conference papers (two Best Papers Awards), journal articles, and book chapters. His research in information visualization spans a spectrum from theoretical work on interaction, evaluation, and the conceptual foundations of visualization to more applied work creating new techniques and systems (such as TANGO, POLKA, SunBurst, InfoCanvas, Jigsaw) for people in a variety of domains. He was Papers Co-Chair for the IEEE Information Visualization (InfoVis) Symposium in 2005 and 2006 and for the IEEE Visual Analytics Science and Technology (VAST) Symposium in 2009. He is currently on Steering Committee of the IEEE InfoVis Conference, the ACM Symposium on Software Visualization, and is an At Large member of the IEEE Visualization and Graphics Technical Committee.
In 2007 Stasko was appointed Associate Chair of the newly created School of Interactive Computing at Georgia Tech. In addition to this role, he leads the Information Interfaces Research Group where he advises undergraduate, master's, and doctoral students. He traditionally teaches CS 1331, an introductory object-oriented programming course and CS 7450, Information Visualization, which originated in 1999 and is one of the first courses on this topic in the world.
Recognition
Stasko was named to the 2014 class of IEEE Fellows, "for contributions to information visualization, visual analytics and human-computer interaction."
He was inducted into the CHI Academy in 2016 for making significant, cumulative contributions to the development of the field of human–computer interaction.
Finally, Stasko was named to the 2022 class of ACM Fellows, "for contributions to the design, analysis, usage, and evaluation of software and information visualization".
Selected bibliography
* John Stasko, Carsten Gorg, and Zhicheng Liu, "Jigsaw: Supporting Investigative Analysis through Interactive Visualization", Information Visualization, Vol. 7, No. 2, Summer 2008, pp. 118–132.
* Zachary Pousman, John T. Stasko and Michael Mateas, "Casual Information Visualization: Depictions of Data in Everyday Life", IEEE Transactions on Visualization and Computer Graphics, (Paper presented at InfoVis '07), Vol. 13, No. 6, November/December 2007, pp. 1145–1152.
* Ji Soo Yi, Youn ah Kang, John T. Stasko and Julie A. Jacko, "Toward a Deeper Understanding of the Role of Interaction in Information Visualization", IEEE Transactions on Visualization and Computer Graphics, (Paper presented at InfoVis '07), Vol. 13, No. 6, November/December 2007, pp. 1224–1231.
* Zach Pousman and John Stasko, "A Taxonomy of Ambient Information Systems: Four Patterns of Design", Proceedings of Advanced Visual Interfaces (AVI 2006), Venice, Italy, May 2006, pp. 67–74.
* Robert Amar, and John Stasko, "Knowledge Precepts for Design and Evaluation of Information Visualizations," IEEE Transactions on Visualization and Computer Graphics, Vol. 11, No. 4, July/August 2005, pp. 432–442.
* John Stasko, Todd Miller, Zachary Pousman, Christopher Plaue, and Osman Ullah, "Personalized Peripheral Information Awareness through Information Art", Proceedings of UbiComp '04, Nottingham, U.K., September 2004, pp. 18–35.
* Christopher Hundhausen, Sarah Douglas, and John Stasko, "A Meta-Study of Algorithm Visualization Effectiveness", Journal of Visual Languages and Computing, Vol. 13, No. 3, June 2002, pp. 259–290.
* Stasko, John T. and Zhang, Eugene, "Focus+Context Display and Navigation Techniques for Enhancing Radial, Space-Filling Hierarchy Visualizations", Proceedings of IEEE Information Visualization 2000, Salt Lake City, UT, October 2000, pp. 57–65.
* John Stasko, John Domingue, Marc H. Brown, Marc and Blaine Price,(editors), Software Visualization: Programming as a Multimedia Experience, MIT Press, Cambridge, MA, 1998.
* Stasko, John T., "TANGO: A Framework and System for Algorithm Animation", IEEE Computer, Vol. 23, No. 9, September 1990, pp. 27–39.
|
WIKI
|
Page:Wonder Book.djvu/279
fast by the bridle. Meeting his eyes, however, he was so affected by the gentleness of his aspect, and by the thought of the free life which Pegasus had heretofore lived, that he could not bear to keep him a prisoner, if he really desired his liberty.
Obeying this generous impulse he slipped the enchanted bridle off the head of Pegasus, and look the bit from his mouth.
‘Leave me, Pegasus!’ said he. ‘Either leave me, or love me.’
In an instant, the winged horse shot almost out of sight, soaring straight upward from the summit of Mount Helicon. Being long after sunset, it was now twilight on the mountain-top, and dusky evening over all the country round about. But Pegasus flew so high that he overtook the departed day, and was bathed in the upper radiance of the sun. Ascending higher and higher, he looked like a bright speck, and, at last, could no longer be seen in the hollow waste of the sky. And Bellerophon was afraid that he should never behold him more. But, while he was lamenting his own folly, the bright speck reappeared, and drew nearer and nearer, until it descended lower than the sunshine; and, behold, Pegasus had come back! After this trial there was no more fear of the winged horse’s making his escape. He and Bellerophon were friends, and put loving faith in one another.
That night they lay down and slept together, with Bellerophon’s arm about the neck of Pegasus, not as a caution, but for kindness. And they awoke at peep of day, and bade one another good morning each in his own language.
|
WIKI
|
Page:Popular Science Monthly Volume 51.djvu/50
42 in any movement that may please a portion of his constituency," "would obviate all such trouble. . . . Such laws would be enforced by the State and local boards of health, and, in case of their failure or neglect, such attention and assistance from the national powers should be given as the circumstances of the case may require." That is to say, again, a defective principle inoperative on a small scale can be made a success on a large one. Although a despotic local law can not be enforced, a despotic national law will be scrupulously observed. If local officials can be blinded in "one hundred and one ways," national officials are subject to no such impairment of vision.
But this is only a fresh illustration of the pathetic faith of the chronic invalid, ever on the search for a new pill or a new tonic. A change from one despotism to another, or from one set of officials to another, will not deliver society from the defects of human nature. Much less will that blessing come from the increase of despotism and the multiplication of officials. Such quackery has been tried from the dawn of Greek democracy down to the latest product of popular sovereignty—the Brazilian Republic. It has failed; it must inevitably fail. It violates a law of social development as immutable as the law of gravitation, one that punishes those that fail to heed it with equal certainty and severity. I refer to the law set forth by Mr. Spencer that the more peaceful and industrious a nation becomes, the less is its need of the restraints of either custom or legislation. But of this matchless induction of modern science the social reformers of to-day have no conception. They act upon the assumption that the world has made no headway in a thousand years; that men are still barbarians and require the shackles of an age of disorder; that there must be the official mechanism of an old French or Prussian despotism, which had no other use than to recruit and drill troops and to wring taxes from despised and impoverished toilers. But since the days of feudal chaos humanity, despite the obstacles thrown in its path by ignorance and interest, has gained ground. Men have outlived the rules and regulations of a military despotism. They do not pay homage to the occupant of a throne, surrounded by courtiers as intent on the plunder of subjects as soldiers on the plunder of enemies. Their allegiance is to another ruler, which, though less regal, is not less powerful; it is conscience, the embodied restraints that come of peace, sympathy, and culture.
|
WIKI
|
Page:Manual of the New Zealand Flora.djvu/107
Colobanthus.] over ½ in. long, upper often very small, $1⁄8$–$1⁄4$ in., narrow-linear or linear-subulate, acute or mucronate but not acicular at the tip, connate at the base, flat or concave above, convex beneath; texture soft. Peduncles short, stout, terminal. Flowers $1⁄8$–$1⁄6$ in. long. Sepals 4, ovate, broad at the base, obtuse at the tip, rather thick. Capsule ⅓ shorter than the sepals.—''Hook. f. Handb. N.Z. Fl. 24; Kirk, Students' Fl.'' 60.
3. C. Billardieri, ''Fenzl. in Ann. Wien Mus.'' i. 49.—A small densely tufted perennial ½–1½ in. high, rarely more. Leaves in crowded tufts, usually grassy, often flaccid, very variable in length, sometimes 1 in. long, very narrow linear or filiform, at other times shorter, ¼ in., linear-subulate; broad and membranous at the base and sheathing the stem, gradually narrowed upwards, acute or acicular at the tip. Peduncles springing from the centre of the leaf-tufts, longer or shorter than the leaves, usually elongating in the fruiting stage. Sepals 5, ovate, acute or acuminate, as long as or rather longer than the capsule. Capsule broadly ovoid, obtuse.—''Hook. f. Fl. Antarct. i. 14; Fl. Nov. Zel. i. 27; Fl. Tasm. i. 45; Handb. N.Z. Fl. 25; Benth. Fl. Austral. i. 161; Kirk, Students' Fl.'' 60.
4. C. Muelleri, ''T. Kirk in Trans. N.Z. Inst.'' xxvii. (1895) 356.—A small densely tufted perfectly glabrous plant, ¼–1½ in. high. Leaves rigid, cartilaginous, spreading, often recurved, ¼–¾ in. long, linear-subulate, broadly channelled above, convex below, narrowed into short acicular tips. Peduncles terminal or lateral, ¼–¾ in. long, stout, often hidden among the leaves. Sepals 5, ovate or ovate-lanceolate, suddenly narrowed into cartilaginous points with acicular tips, about ⅓ longer than the capsule.—Students' Fl. 60. C. Billardieri var. brachypoda, ''F. Muell. Veg. Chath. Is.'' 11.
|
WIKI
|
Advantages of Shift Registers over DLLs for Flexible Low Jitter Multiphase Clock Generation
Share/Save/Bookmark
Gao, Xiang and Klumperink, Eric A.M. and Nauta, Bram (2008) Advantages of Shift Registers over DLLs for Flexible Low Jitter Multiphase Clock Generation. IEEE Transactions on Circuits and Systems II - Express Briefs, 55 (3). pp. 244-248. ISSN 1549-7747
[img]PDF
Restricted to UT campus only
: Request a copy
309Kb
Abstract:In this paper, we compare a shift register (SR) to a delay-locked loop (DLL) for flexible multiphase clock generation, and motivate why a SR is not only more flexible but often also better. For a given power budget, we show that a SR almost always generates less jitter than a DLL, assuming both are realized with current-mode logic. This is due to differences in jitter accumulation and the possibility to choose latch delays in a SR much smaller than the delays of DLL elements. For N-phase clock generation, a SR also functions as a divide-by-N and requires a voltage-controlled oscillator with N-times higher frequency. However, this does not necessary lead to more power consumption and can even have advantages like higher Q and less area for the inductors.
Item Type:Article
Copyright:© 2008 IEEE
Faculty:
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/62381
Official URL:http://dx.doi.org/10.1109/TCSII.2008.918972
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager
Repository Staff Only: item control page
Metis ID: 255946
|
ESSENTIALAI-STEM
|
TestProject Forum
Powered by leading experts in the test automation community
Secret Project Parameter in Java code
How do you set up a secret parameter in a java project? When I generated the code the ProjectParameters.java file it shows as:
public static String testPassword = "";
But when I upload it to TestProject and run it it looks like it does not type in the entire password and then it fails. I tried putting a pause before it and the same error occurred. Is there something I am doing wrong in my code? Other Test parameters work fine. Only one failing is the secret project parameter I have set up.
Hello @daniela and thanks for reaching out.
When you generate code using secret parameters you have set up through the UI, their values will be removed from the code itself:
@Parameter(
description = "This was a SECRET parameter and therefore its value is empty",
direction = ParameterDirection.INPUT )
public String MY_SECRET_PARAM;
If you’d like your values to remain hidden when uploading your code to the platform, you can opt out on reporting them explicitly when writing your code and using the TestProject reporter from the SDK, so they won’t appear in your test execution reports.
How about for a parameter that is set up as a project parameter?
On my ProjectParameter.java file this is how my project parameter is set up. How do I get this to connect to the project parameter in TestProject?
A generated coded test is static code.
It will not communicate with parameters in your projects.
So if I generate code for a test and add more code in there. When I upload it and run it it will not be able to interact with the project parameters? I have to just create a regular parameter in the code for it to work?
That’s one approach.
You can also create input parameters for your test using the syntax at the start of this thread, and then use input parameters from your project/test when calling these coded tests as nested tests in recorded tests:
2
3
Another possible approach is to use the TestProject API to retrieve/edit the values of projects parameters from your code (for non-secret parameters).
https://api.testproject.io/docs/v2/#/ProjectParameters/ProjectParameters_GetProjectParameterAsync
I see so you’re saying make a separate test just for logins. Then include that test in the test I’m coding so that I don’t need to worry about affecting the secret password. Is that correct?
But when I upload it won’t I run into the same issue with it not saving the parameter value and then it won’t pick up the project parameter? Can you just explain that resolution a bit further?
Hi @daniela,
What I meant was, you can code your test with input and output parameters, and upload that test onto the platform.
From there, you can use your coded test inside recorded tests, and pass into that coded test, parameters you have defined in your project through the UI.
In the example above, I uploaded my coded test, and defined that test to have an input parameter, and when I use it in my recorded tests as a nested test, I can pass as the input to it, my secret project parameter, same as I would be able to for any other action.
If you would like to change project parameter values, you can create output parameters in your coded test and select the output of the step to be stored in your project parameter.
1 Like
|
ESSENTIALAI-STEM
|
0
I'm in the process of upgrading Magento and encountering the following error. I'm unsure how to resolve it. Here's the error message.
Deprecated: Return type of phpseclib_mcrypt_filter::filter($in, $out, &$consumed, $closing) should either be compatible with php_user_filter::filter($in, $out, &$consumed, bool $closing): int, or the #[\ReturnTypeWillChange] attribute should be used to temporarily suppress the notice in /home/mindtree/public_html/dev/vendor/phpseclib/mcrypt_compat/lib/mcrypt.php on line 1107
1 Answer 1
0
mcrypt module is depricated from php 8.1
Check if mcrypt module is there
Run command from terminal : php -m
If mcrypt module is listed, disable it in php8.1
Restart php
4
• I already checked it mcrypt is not there.
– user92141
Oct 4, 2023 at 4:52
• Verify once from phpinfo.php
– MP Raj
Oct 4, 2023 at 5:00
• I used the command php -m to list the modules, but I couldn't find mcrypt in the list.
– user92141
Oct 4, 2023 at 5:35
Your Answer
By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.
|
ESSENTIALAI-STEM
|
Page:United States Statutes at Large Volume 63 Part 2.djvu/328
63 STAT.] MULTILATERAL-TELECOMMUNICATIONS-OCT. 2, 1947 (Chapter Il, art. 5 RR) (119-125) Allocation to Services Frequency Band and (Budwidth) Regional kes World-Wide Region 1 Region 2 Region 3 160-285 160-255 160-200 160-200 (125) (95) (40) (40) Broad- Fixed Fixed casting -) 10) 200-285 200-285 (85) (85) 255-285 (30) a) Aero- a) Aero- a) Aero- nautical nautical nautical mobile mobile radio- b) Aero- b) Aero- navigation nautical nautical b) Broad- radio- radio- casting navigation navigation c) Maritime mobile '} 10 II 10) Iu) 119 "' In the Union of South Africa, the territory under mandate of Southwest Africa, Northern Rhodesia and Southern Rhodesia, the band 160-200 kc/s is allocated for the fixed service and the band 200-285 kc/s is allocated for the aero- nautical radionavigation and aeronautical mobile services. 120 "' The necessary special arrangements which will be made by an Adminis- trative Conference for the European Area of Region 1 will take into account the following considerations: 121 a) In the western part of the European Area, the band 255-285 kc/s will be used for the aeronautical radionavigation service. Additionally the United Kingdom will share portions of the band with the mari- time mobile service. 122 b) In the U.S.S.R., the band 255-285 kc/s will be shared between the broadcasting and maritime mobile services. 123 c) The Norwegian broadcasting stations at present working in the band 255-285 kc/s may continue to do so if authorized by the above men- tioned Conference. 124 " Priority is given to the aeronautical fixed service in northern areas which are subject to auroral disturbances. 125 "' Priority is given to the aeronautical radionavigation service in Region 2, China, India, and Pakistan. 1625
�
|
WIKI
|
[ODE] GIMPACT with doubles
Jon Watte (ODE) hplus-ode at mindcontrol.org
Mon Nov 6 13:30:16 MST 2006
If you author in floats, then there is no gain in storing in doubles.
However, if you author in doubles, or more likely, generate in doubles,
then you can get a totally seamless, earth-size planet, without having
to worry about pinholes where the local reference frames meet up.
You could then convert to a float reference frame when rendering, but
the point is that that's a single reference frame (thus, seamless,
pinhole free) rather than a number of separate reference frames.
Cheers,
/ h+
Pierre Terdiman wrote:
> I don't see why the "all doubles" version is better for this. As far as I
> can see using 3 doubles for the world position and keeping all vertices in
> floats (*relative to the mesh position in doubles*) is just as accurate.
>
> It's likely that the meshes are authored (and exported) using floats, so
> converting them to doubles doesn't buy you more accuracy. It just adds
> noise...
>
> - Pierre
>
More information about the ODE mailing list
|
ESSENTIALAI-STEM
|
Ten Count
Ten Count may refer to:
* Ten Count (manga), a Japanese Boys-Love manga by Rihito Takarai
* Ten Count, the 18th episode of the 7th season of the American police procedural drama Law & Order: Criminal Intent
|
WIKI
|
Motor FLA Calculator
This motor full-load amperage (FLA) calculator allows you to calculate the full-load current of the AC electric motor.
Instructions:
1. Select the number of phases from the drop-down list
2. Enter the motor rated voltage in volts (V)
3. Enter the motor power rating and select the appropriate unit (HP or kW)
4. Enter the power factor and efficiency of the motor
5. Click on the "Calculate" button to see the results.
Note: Please note that this calculator is provided for information purposes only. Typically, the FLA value is shown on the motor nameplate.
Motor Full Load Amperage Calculator
V
%
Formulas
The motor FLA calculator uses the following formulas:
Single Phase AC Motor FLA (Amperes) = (P [kW] × 1000) / (V × cos ϕ)
Single Phase AC Motor FLA (Amperes) = (P [HP] × 746) / (V × cos ϕ × η)
Three Phase AC Motor FLA (Amperes) = (P [kW] × 1000) / (V × 1.732 × cos ϕ)
Three Phase AC Motor FLA (Amperes) = (P [HP] × 746) / (V × 1.732 × cos ϕ × η)
Where:
P [HP] , P [kW] = Motor power rating (HP or kW),
V = Motor rated voltage (Volts),
η = Motor efficiency in decimal form,
cos ϕ = Motor power factor,
1000 = Conversion factor to convert kW to W,
746 = Conversion factor to convert HP to W.
You may also be interested in our Transformer Calculator
Rating: 4.3/5 (175 votes)
|
ESSENTIALAI-STEM
|
WMI Repair
(imported topic written by MBARTOSH)
Has anyone written a fixlet to repair WMI?
(imported comment written by milhouse91)
We use the following, which is basically a batch file distributed and run using TEM. Its quick to run but can take a while for all the properties to update depending on the evaluation cycle. Its also important to note that this script wont restart services that depend on WMI. I’ve been meaning to add this piece but just havn’t had time.
Also i have removed some extra “house keeping” code from the below but it still should work.
delete wmifix.bat
delete __createfile
createfile until
end
@ECHO OFF
if not exist “c:\temp” md “c:\temp”
cd /d c:\temp
if not exist c:\windows\system32\wbem goto TryInstall
cd /d c:\windows\system32\wbem
net stop winmgmt /y
winmgmt /kill
if exist Rep_bak rd Rep_bak /s /q
rename Repository Rep_bak
for %%i in (*.dll) do RegSvr32 -s %%i
for %%i in (*.exe) do call :FixSrv %%i
for %%i in (.mof,.mfl) do Mofcomp %%i
net start winmgmt
goto End
:FixSrv
if /I (%1) == (wbemcntl.exe) goto SkipSrv
if /I (%1) == (wbemtest.exe) goto SkipSrv
if /I (%1) == (mofcomp.exe) goto SkipSrv
%1 /RegServer
:SkipSrv
goto End
:TryInstall
if not exist wmicore.exe goto End
wmicore /s
net start winmgmt
:End
end
move __createfile wmifix.bat
waithidden wmifix.bat
(imported comment written by MBARTOSH)
This is great. Thank you. Have you come up with any relevance to determine whether or not wmi is broken?
(imported comment written by milhouse91)
We check for wmi
“exists wmi”
and also run a wmi query to see if it works. On this occassion we use the domain check
“not exists string values of selects “Domain from Win32_ComputerSystem” of wmi”
Seems to work well for us.
(imported comment written by SystemAdmin)
Based on this discussion, i’ve combined it all into a downloadable fixlet.
http://bigfix.me/cdb/fixlet/676
(imported comment written by MBARTOSH)
Here is the relevance for checking for broken WMI. "not exists wmi | true’
|
ESSENTIALAI-STEM
|
Cohn-Vossen's inequality
In differential geometry, Cohn-Vossen's inequality, named after Stefan Cohn-Vossen, relates the integral of Gaussian curvature of a non-compact surface to the Euler characteristic. It is akin to the Gauss–Bonnet theorem for a compact surface.
A divergent path within a Riemannian manifold is a smooth curve in the manifold that is not contained within any compact subset of the manifold. A complete manifold is one in which every divergent path has infinite length with respect to the Riemannian metric on the manifold. Cohn-Vossen's inequality states that in every complete Riemannian 2-manifold S with finite total curvature and finite Euler characteristic, we have
* $$ \iint_S K \, dA \le 2\pi\chi(S), $$
where K is the Gaussian curvature, dA is the element of area, and χ is the Euler characteristic.
Examples
* If S is a compact surface (without boundary), then the inequality is an equality by the usual Gauss–Bonnet theorem for compact manifolds.
* If S has a boundary, then the Gauss–Bonnet theorem gives
* $$\iint_S K\, dA = 2\pi\chi(S) - \int_{\partial S}k_g\,ds$$
* where $$k_g$$ is the geodesic curvature of the boundary, and its integral the total curvature which is necessarily positive for a boundary curve, and the inequality is strict. (A similar result holds when the boundary of S is piecewise smooth.)
* If S is the plane R2, then the curvature of S is zero, and χ(S) = 1, so the inequality is strict: 0 < 2$\pi$.
|
WIKI
|
Amazon's big profit miss spooks investors, but analysts stay bullish
(Reuters) - A steeper-than-expected drop in quarterly profit rattled some Amazon.com (AMZN.O) investors, but Wall Street analysts remained largely bullish about the company’s aggressive spending plans. Shares of the e-commerce juggernaut, which have risen 40 percent this year, were down 4.3 percent at $1,001 in early trading on Friday, wiping out $21 billion from its market value. The stock touched a record high on Thursday, helping CEO Jeff Bezos briefly unseat Microsoft Inc (MSFT.O) co-founder Bill Gates as the world’s richest person. “The overall story coming out of Amazon’s second quarter print feels a lot like it did three months ago — accelerating growth, stepped-up investments, lower near-term profitability,” J.P. Morgan analyst Doug Anmuth said. “But will anyone care about profit when Amazon is taking bigger chunks of market share?” The world’s largest online retailer reported a better-than-expected rise in revenue, but operating profit came in well short of analysts’ estimate as the company continued to pump in money to expand in international markets such as India. The company also guided to a possible operating loss for the current quarter. Amazon, which started as an online bookseller, has forayed into areas that historically had barriers to e-commerce. The company’s recent $13.7 billion acquisition of Whole Foods Markets Inc WFM.O is testimony to Bezos’ far-reaching ambition. At least four brokerages, including J.P. Morgan, raised their price targets on the stock. Morgan Stanley, however, trimmed its price target by $50 to $1,150 based on valuation. The median price target is $1,150, indicating a 9.9 percent upside to Thursday’s close. Amazon currently trades 115.8 times its 12-months forward earnings. This compares with Microsoft’s 22.43 and Alphabet Inc’s (GOOGL.O) 26.45. The two compete with Amazon’s market leading cloud computing business, Amazon Web Services (AWS). PE is widely used on Wall Street to gauge the relative value of stocks although it is not the only such metric. AWS continued to be the company’s cash cow, bringing in $4.1 billion in sales, a 42 percent jump. Chief Financial Officer Brian Olsavsky said on a post-earnings call that the AWS unit would expand in France, Sweden and China in the near future. “We believe the company’s ongoing heavy investments in fulfillment capacity, video content, and AWS are to match with its substantial growth rates, and should not be viewed negatively,” Needham & Co analyst Kerry Rice said, who views the pullback in the stock as a “buying opportunity.” (This version of the story has been refiled to remove apostrophe from headline) Reporting by Sweta Singh and Ankur Banerjee in Bengaluru; Editing by Sriraj Kalluvila
|
NEWS-MULTISOURCE
|
Wikipedia:Articles for deletion/Allameh Tabatabai Management School
The result was redirect to Allameh Tabataba'i University. The history is still available, so if anybody wants to mine this for material to merge, they can. That's something that can be sorted out by normal editorial action and doesn't need AfD input. -- RoySmith (talk) 17:39, 15 March 2015 (UTC)
Allameh Tabatabai Management School
* – ( View AfD View log Stats )
It does not meet Wikipedia's notability guidelines. I was unable to find a reliable third-party source or significant coverage of this Management School. According to WP:N and WP:ORG, if no reliable third party sources are found then it should not have an article. Mbcap (talk) 13:54, 20 February 2015 (UTC)
* Note: This debate has been included in the list of Schools-related deletion discussions. N ORTH A MERICA 1000 22:52, 20 February 2015 (UTC)
* Note: This debate has been included in the list of Iran-related deletion discussions. N ORTH A MERICA 1000 22:52, 20 February 2015 (UTC)
Relisted to generate a more thorough discussion so a clearer consensus may be reached.
Please add new comments below this notice. Thanks, -- Sam Sailor Talk! 08:13, 27 February 2015 (UTC) Relisted to generate a more thorough discussion so a clearer consensus may be reached.
* Merge to Allameh Tabatabai University of which this is a constituant part. --Samuel J. Howard (talk) 17:25, 27 February 2015 (UTC)
* WP:TNT "This merger caused that the Allameh Tabatabai University evolved as the most eminent university..." The whole article consists of poor ESL grammar and puffery. Article also serving as obvious WP:COATRACK for section named "Notable Alumni" (overwhelmingly red-links at present, with the three "blue" names all apparently receiving their degrees before the 1979 Iranian Revolution, i.e., pre-school-merger). Pax 01:59, 4 March 2015 (UTC)
Please add new comments below this notice. Thanks, — Coffee // have a cup // beans // 04:36, 7 March 2015 (UTC)
|
WIKI
|
Ringworm: Symptoms, Causes, and Treatment
Ringworms or ringworm refer to fungal infections that occur on your skin’s surface. The condition derives its name from the early belief that the disease is triggered by a worm. Regardless of its creepy-crawly name, Tinea or ringworm is not caused by any type of worm. The real culprit behind it is a group of fungi referred to as dermatophytes, which lead to skin infections.
This fungal skin infection causes distinctive ring-like patterns and red spots on the skin. Some of these fungi also produce a rash.
Its medical term, Tinea, is the Latin name for a growing worm. Other names are added to this term to indicate the body parts where the fungus is located. For instance, tinea corporis indicates fungus of the body whereas tinea capitis points to scalp ringworm.
Other types of ringworm infections include tinea pedis or fungus of the feet and tinea cruris (commonly known as a jock itch) which is the fungus of the groin.
How Do We Get Ringworms?
Since ringworms are highly contagious, anyone can easily get the infection from a nearby patient. Some of the most common ways include:
• By grooming or rubbing your pets. Make sure you wash your hands when you are finished.
• It is also acquired from soil. Don’t work or stand barefoot in infected soil.
• The infection also spreads by skin to skin contact.
• You can also get ringworms by sharing clothes, towels, brushes and combs.
Even though ringworm appears on the skin or the scalp, it can also show on an individual’s toenails or fingernails. However, it doesn’t produce a ring-like pattern on the nails. But the affected nail becomes yellow, brittle and thick.
People who have this infection notice bumpy or red patches around the affected skin. If you get the infection on scalp, it may appear more or less like a red pimple. Even though children are more susceptible to ringworms, people of all ages can get infected with the fungus.
Ringworm is commonly spread in communal areas. For instance, if you swim in your local pool or share lockers in a gym, you can get infected. You don’t even have to touch an affected person’s hands. It is important that you don’t share towels or shirts with your friends, especially after a workout or game.
The fungus also lingers in brushes, hats and room floors.
Ringworm is cured with appropriate treatment. Skin ringworms are usually resolved in two to three weeks. However, it takes a few months to cure the ringworm of the scalp. There are fewer cases of complications where the infection is accompanied by a secondary bacterial infection. People who have weak immune systems are vulnerable to a widespread fungal infection.
Symptoms of Ringworm
The most obvious signs and symptoms of a ringworm infection include a scaly and red patch. Some people also experience an itchy bump on the skin’s surface. If left untreated, this bump takes the shape of a circle or ring shaped patch which branches into several other rings. The patch’s inside is usually scaly or clear. But the outside is bumpy or slightly raised.
Ringworm on the scalp generally starts out as a small sore or bump. But it soon turns scaly or flaky. The scalp feels sore and tender to the touch. The patient also notices that he/she begins to lose hair in patches.
Treatments of Ringworm
The type of treatment you need to cure a ringworm infection depends on the location of the infection and its severity. In some cases, your doctor may prescribe a drug. Sometimes, an over the counter drug is enough to treat the infection.
However, in case of jock itch or athlete’s foot, your doctor will recommend an anti-fungal lotion, cream or powder. Some popular ones include:
• Miconazole Terbinafine
• Clotrimazole
• Ketoconazole
Some patients need to apply the medications on the skin for at least a month. Two to four weeks are enough to kill the fungus completely and lowers the risk of it coming back.
But OTC creams and lotions are not enough if you have ringworm on your scalp. Generally, patients need to take an anti-fungal medication by mouth for up to 2 to 3 months. Using an anti-fungal shampoo also helps cure the disease.
Terbinafine, Griseofulvin and Itraconazole are common oral medicines that doctors usually prescribe to their patients.
Terbinafine: These tablets work in most cases and patients have to take them once a day for at least a month. Some patients also experience a few side-effects including rashes, diarrhea and indigestion. However, if you have lupus or suffer from a liver disease, your doctor will not prescribe you this medication.
Griseofulvin: This medication is also available in the form of a spray. You will have to consume it for at least 10 weeks to get noticeable results. Common side-effects include nausea, headache and indigestion.
Avoid the medication if you are pregnant or are breastfeeding since it can lead to birth defects. It is also important for men to use condoms for up to 6 months after the treatment is over.
Griseofulvin may also interfere with birth control pills. Avoid drinking alcohol or driving when you are on this medication.
Itraconazole: Doctors do not prescribe this pill to children, old patients and individuals with severe liver diseases. If it’s prescribed to you, you will have to take it for a week or two to cure the infection. Common side-effects include indigestion, nausea, vomiting and headache.
If your symptoms don’t get better or you experience severe side-effects, get in touch with your doctor to seek an alternative.
How Can I Prevent Ringworm?
Unfortunately, ringworm is a contagious disease. It is easier to get the infection if you get in touch with an affected surface or piece of clothing.
But you can take a few measures to prevent the infection. Here are a few tips to follow:
• Keep flip-flops in your locker rooms to use in gym showers
• Do not share towels or clothes with other people
• Wear washed socks and underwear every day
• Keep your sports gear and uniform clean and don’t share it with your team members
• Make sure you wash your hands with water and soap after playing with your pets. Contact a vet if your pet is infected with ringworm
• Keep your skin dry and clean
Final Thoughts
If you suspect you have having ringworms on any part of your body, check with your doctor who will conduct a physical examination of the affected area. The doctor may also evaluate skin scrapings under the microscope and order culture tests to make the appropriate diagnosis. Do not start any medication before getting a proper diagnosis.
|
ESSENTIALAI-STEM
|
User:Jaeha24
I am in Dr. Burdo's Introduction to Neuroscience class of BI481 of Fall 2012 in Boston College. Each of the groups were assigned to write articles in Wikipedia Activity pertaining to Neuroscience and the topic of Extinction (Neurology) for our Group 11.
|
WIKI
|
How to create PDFs in Glide - and use them in your App
In this video, we take a look at how to generate PDFs from Google Doc/Slides templates using Glide webhook actions and Portant
Hello everyone, we have recently built an integration that enables you to create PDFs from a Glide webhook action. We can generate a PDF and then send the document link back to a Glide table so you can use the document in your app. Essentially the process works like this:
1. Connect your Glide App to Portant via a webhook action.
2. Format your PDF using a Google Docs/Slides template
3. Save the PDF link back to the Glide Table using the Glide API
4. Then every time you trigger the Glide Webhook action a PDF will be generated and saved in your Glide Table so it can be used in the rest of your App.
Why would you use it?
• PDFs are great for lots of different business critical documents like invoices, purchase orders, proposals, product catalogues, contracts, certificates and more.
• Formatting the PDF’s in Google Docs/Slides means that you can make the PDF’s look exactly the way you imagine them.
What else can the integration do?
Portant also enables you to share the documents via email or request eSignatures. So it can replace tools like Hellosign, Pandadoc, Docusign etc
Guide
:page_facing_up: I’ve also written a guide, which you can read here: www.portant.co/guide-article/how-to-connect-a-glide-data-source
Please give me a shout if you have any questions or suggestions.
Cheers,
James
7 Likes
Never heard of Portant. Neat!
2 Likes
Glad you like it Robert!
We’re aiming to build Portant into document automation tool that’s a combination of Docusign and Zapier (the power of Docusign with the openness of Zapier)
Thanks for sharing!
1 Like
No worries mate!
1 Like
This is what I need! Thanks bro!
Brilliant. Interesting to learn about Google docs and the power of those fields. Is there a version that would work with MS Word?
How can I generate PDF documents with tables that have multiple rows as many as the related fields in other Glide tables? @James_Fyfe
Awesome! I’m glad to hear that Hendrik!
Hi Simon, unfortunaltey not at the moment. But Google Doc’s can import Microsoft Word files and the conversion is pretty dam good.
Hi Antonino, If you can send the data in one webhook then Portant can process it.
1 Like
How should these data be?
Comma separated…etc
Great Work, though its not clear how you handle line items when we send an array of rows and how to place it?
1 Like
Hi Antonio, for our Webhook data needs to be sent in key value pairs. For example we also have the same functionality in Zapier: How to use Webhooks and Zapier to connect Portant to almost anything!
Hi Yassin, Thanks mate!
At the moment data can only be sent one line at a time. I didn’t realise you could send an array via Webhook using Glide? Interesting. Do you have an example you can show me? you can send it to james@portant.co if that’s easier. Cheers!
Did you ever get something figured out for this? I love the fact that it uses google docs, I got something up and running pretty quickly, but just need the ability to send it many rows from a relation in glide and have the ability to place those specifically in the google doc.
Have you checked this?
2 Likes
Thanks @ThinhDinh :pray:
Seems to be exactly what I need for a project I’m working on. I’ll be reaching out soon.
1 Like
It seems like this requires either a pro account or a non-classic app. I’m still paying for a legacy account on a classic app…doesn’t quite work for me unfortunately.
|
ESSENTIALAI-STEM
|
Paul Benson
Paul Andrew Benson (born 12 October 1979) is an English former professional footballer and coach who played as a striker; he last played for club Bedford Town.
Dagenham & Redbridge
Born in Southend, Essex, Benson was on the books of Southend United as a youth player. He was signed by Dagenham & Redbridge manager John Still on 1 July 2005 after Still saw him play for White Ensign of the Essex Olympian League, where he scored 96 goals in 59 league matches (107 goals in 65 matches in all competitions) in just two seasons with the club. Benson's first season with Dagenham was frustrating as he was not a regular first-team player, scoring only one Conference National goal, and was out for three months with a broken leg. However, the 2006–07 season saw a complete reversal, as he earned a spot in Dagenham's first-team and finished the season as both the team and Conference National top scorer with 28 goals, leading the club's successful campaign for promotion to League Two. The following year, Dagenham's first in the Football League, Benson scored nine goals, though was injured for half the season.
The 2008–09 season saw Benson end in the top five goal scorers in League Two and come second in the player of the season poll for Dagenham. At the end of the 2009–10 season, Benson scored a goal at Wembley Stadium as Dagenham defeated Rotherham United in the play-off final to clinch a place in League One for the 2010–11 season.
Charlton Athletic
On 31 August 2010, Benson completed a move to League One club Charlton Athletic. After making 27 appearances and scoring 10 goals for Charlton in his first season, Benson's first-team chances were limited behind Charlton strikers Paul Hayes, Bradley Wright-Phillips, Jason Euell and Yann Kermorgant. Notts County made a bid to sign him, which Charlton accepted, although the move collapsed after they failed to agree personal terms. On 2 January 2012, Benson transferred to Swindon Town as part of a swap deal in exchange for Leon Clarke.
Swindon Town
Benson joined a Swindon team chasing promotion to League One. His arrival coincided with a 10-match winning run which was the platform from which the Robins' won the title under the guidance of Paolo Di Canio. Benson's first goal for Swindon came when he scored the winner in their FA Cup third-round victory over Premier League team Wigan Athletic, although replays showed he was in an offside position. Benson's goalscoring form was rewarded on 9 March 2012 when he was named League Two Player of the Month for February after scoring five goals in five matches and being widely praised by manager Paolo Di Canio. Di Canio, in a post-match press conference, was quoted as saying that "Paul Benson at 70% is better than any other striker in this league at 150%". On 28 April 2012, he scored twice as Swindon beat Port Vale 5–0 and were crowned champions of League Two in the process.
On 15 November 2012, Benson joined League One club Portsmouth on an initial one-month loan. His first goal came in a Boxing Day home league match against Crawley Town. In the following match he netted again, against Yeovil Town. He returned to Swindon in January 2013.
Benson then joined League Two club Cheltenham Town on 29 January 2013 in a loan move until the end of the 2012–13 season. He made his debut four days later in a 2–1 victory over Torquay United. Benson scored his first goal for the club on 12 February, tapping the ball past goalkeeper Paul Smith in another 2–1 victory, this time against Southend United. He ended the season with four goals in 18 appearances for the club.
Luton Town
On 26 August 2013, Benson signed for Conference Premier club Luton Town on a season-long loan, with the possibility of a permanent transfer taking place in the summer of 2014. This move saw him link back up with his former Dagenham & Redbridge manager John Still, now in charge of Luton. Benson made his debut for the club on 31 August 2013, winning a penalty in a 2–0 away win over Kidderminster Harriers. He was named as the Conference Premier Player of the Month in December 2013 after scoring four goals in four matches and contributing to numerous other goals with his hold-up play. Benson played a key role as Luton won promotion to League Two, scoring 17 league goals and assisting 14 others throughout the 2013–14 season. His strike partnership with Andre Gray resulted in the two scoring 47 goals between them – almost half of Luton's total league goals.
After his successful loan spell at Luton during the 2013–14 season, Benson signed a permanent two-year contract with the club on 22 July 2014. Benson scored his only league goal of the season in a 3–0 win over Mansfield Town on 29 November 2014, but also broke his leg during the match. He returned to the squad later in the season and made a total of 24 appearances in all competitions.
On 10 May 2016, it was announced that Benson would not have his contract renewed. He left the club upon the expiry of his contract.
Return to Dagenham & Redbridge
Benson re-signed for Dagenham & Redbridge who were newly relegated into the National League, on an initial one-year contract on 6 August 2016. He made his second debut three days later as a 77th-minute substitute in a 3–0 defeat away to Chester. His first goal came in a 2–1 win away to Dover Athletic on 3 December, and this was followed up with a goal in the following match, a 2–1 defeat at home to Worthing in the FA Trophy first round. Benson played in both legs of the play-off semi-final defeat to Forest Green Rovers, losing 3–1 on aggregate, and finished the season with 37 appearances and six goals. He was released by Dagenham & Redbridge when his contract expired at the end of 2016–17.
Boreham Wood and Bedford Town
On 13 June 2017, Benson signed for National League club Boreham Wood on a one-year contract, with the option of a one-year extension. He joined Southern League Division One East club Bedford Town on 26 January 2018 on loan until the end of 2017–18. Benson finished the loan with eight goals from 13 appearances. He was not retained by Boreham Wood after the end of the season. Benson re-signed for Bedford Town as a player-coach on 26 June. Since Benson arrived to Bedford until the summer of 2019, he worked at the club's academy, coaching the U13 squad. From the summer 2019, he was hired as assistant to professional development phase lead coach, Dan Walder, helping with the U16s and U18s on a daily basis.
Honours
Dagenham & Redbridge
* Conference National: 2006–07
* Football League Two play-offs: 2010
Swindon Town
* Football League Trophy runner-up: 2011–12
* Football League Two: 2011–12
Luton Town
* Conference Premier: 2013–14
Individual
* Football League Two Team of the Week: 20–26 February 2012
* Football League Two Player of the Month: February 2012
* Conference Premier Player of the Month: December 2013
|
WIKI
|
Indira Ganesan
Indira Ganesan (born 1960, in Srirangam) is an American novelist and essayist, best known for her novels The Journey (1990), Inheritance (1998), and As Sweet As Honey (2013). A graduate of Vassar College and the University of Iowa, she was granted a Mary Ingraham Bunting Fellowship at Radcliffe College in 1998 as well as a fellowship of the Paden Institute for Writers of Color in 2004. Her essays have featured in the magazines Antaeus, Glamour and Mississippi Review, as well as in Newsday. She was a judge for the Hemingway Foundation/PEN Award in 2014.
|
WIKI
|
Talk:Amami thrush
Still valid?
IIRC, it is no longer recognized as a distinct species. Dysmorodrepanis 05:51, 11 November 2006 (UTC)
|
WIKI
|
Quo Vadis, Captain Chandler?
"Quo Vadis, Captain Chandler?" was the 81st episode of the M*A*S*H television series, and the ninth of season four. The episode aired on November 7, 1975. "Quo Vadis" is Latin for "Where are you going?" and is a reference to a conversation recounted in the apocryphal Acts of Peter in which Peter, fleeing his ministry and the threat of crucifixion in Rome, meets Jesus on the road, who has risen. Peter asks Jesus "Quo Vadis?," to which Jesus responds that he is going to Rome to be crucified again. This gives Peter the courage to return to his ministry in Rome, where he ultimately ends up crucified upside down.
The scriptwriter, Burt Prelutsky, credited the episode with revitalizing his career. The episode was nominated for a Humanitas Prize, but lost to another M*A*S*H episode.
Plot
Among the latest batch of wounded brought to the 4077th is a pilot, Captain Arnold Chandler (Alan Fudge), who believes himself to be Jesus Christ. Majors Burns and Houlihan believe he is faking battle fatigue to earn a medical discharge, and set to prove this with the help of Army intelligence officer Colonel Flagg (Edward Winter). With Colonel Potter's approval, Hawkeye and B.J. call on Dr. Sidney Freedman (Allan Arbus) to evaluate Chandler. Both Potter and Freedman smack down Flagg's bullying.
Freedman concludes that Chandler's delusion is an internal response to his guilt over killing people who had never harmed or even met him. Freedman believes that while prolonged psychiatric therapy may restore Chandler's sense of self, he will never again be an effective member of the military.
Near the end of the episode, company clerk Radar O'Reilly asks Chandler to bless his teddy bear. Chandler blesses the bear and also blesses Radar, who reveals for the first time in the series that his first name is actually Walter.
|
WIKI
|
Evaluation of potential breath biomarkers for active smoking: assessment of smoking habits
Compartir
Different compounds have been reported as biomarkers of a smoking habit, but, to date, there is no appropriate biomarker for tobacco-related exposure because the proposed chemicals seem to be nonspecific or they are only appropriate for short-term exposure. Moreover, conventional sampling methodologies require an invasive method because blood or urine samples are required. The use of a microtrap system coupled to gas chromatography–mass spectrometry analysis has been found to be very effective for the noninvasive analysis of volatile organic compounds in breath samples. The levels of benzene, 2,5-dimethylfuran, toluene, o-xylene, and m- p-xylene have been analyzed in breath samples obtained from 204 volunteers (100 smokers, 104 nonsmokers; 147 females, 57 males; ages 16 to 53 years). 2,5-Dimethylfuran was always below the limit of detection (0.005 ppbv) in the nonsmoker population and always detected in smokers independently of the smoking habits. Benzene was only an effective biomarker for medium and heavy smokers, and its level was affected by smoking habits. Regarding the levels of xylenes and toluene, they were only different in heavy smokers and after short-term exposure. The results obtained suggest that 2,5-dimethylfuran is a specific breath biomarker of smoking status independently of the smoking habits (e.g., short- and long-term exposure, light and heavy consumption), and so this compound might be useful as a biomarker of smoking exposure
Tots els drets reservats
|
ESSENTIALAI-STEM
|
Understanding ARKit’s Plane Detection Technology: How it works and how to optimize it
Estimated read time 3 min read
Introduction:
AR (Augmented Reality) has revolutionized the way we interact with digital content in our daily lives. One of the most important aspects of AR is its ability to detect planes, which enables us to create realistic and immersive experiences. In this article, we will explore how ARKit detects planes, how it works, and how you can optimize it for your next project.
Understanding Plane Detection:
ARKit uses computer vision algorithms to detect planes in the real world. These algorithms analyze images captured by the device’s camera to identify flat surfaces, such as walls, floors, and tables. Once a plane is detected, ARKit can use this information to create a 3D model that appears to be anchored to the surface.
Case Study:
Let’s take an example of an AR app that allows users to place virtual furniture in their homes. The app uses ARKit’s plane detection technology to ensure that the furniture is placed on flat surfaces, such as tables and floors. This creates a realistic and immersive experience for the user, who can see how the furniture will look in their home before making a purchase decision.
How it works:
ARKit’s plane detection algorithm works by analyzing images captured by the device’s camera. The algorithm identifies edges and corners in the image and uses this information to determine if there is a flat surface present. If a flat surface is detected, ARKit creates a 3D model that appears to be anchored to the surface.
Optimizing Plane Detection:
There are several ways you can optimize ARKit’s plane detection technology for your project. One of the most important factors is lighting. ARKit uses the camera’s flash to detect planes, so if there is not enough light in the room, the algorithm may not be able to detect the surface.
Another way to optimize plane detection is to use high-resolution images. The higher the resolution of the image, the more information the algorithm has to work with, which can improve its accuracy.
Expert Opinion:
According to John Hanke, CEO of Niantic (the company behind Pokemon Go), "ARKit’s plane detection technology is one of the most powerful tools in the AR developer’s toolbox. With this technology, developers can create incredibly realistic and immersive experiences that will transport users into new worlds."
Real-life examples:
ARKit’s plane detection technology has been used in a variety of real-life applications. For example, it is used in interior design apps to allow users to see how furniture will look in their homes before making a purchase decision. It is also used in education apps to create interactive 3D models that can help students visualize complex concepts.
Thought-provoking ending:
ARKit’s plane detection technology has the potential to revolutionize the way we interact with digital content in our daily lives. As developers, it is up to us to harness this power and create innovative applications that will transport users into new worlds. With the right tools and techniques, there is no limit to what we can achieve.
You May Also Like
More From Author
|
ESSENTIALAI-STEM
|
Physics with Calculus/Mechanics/Gravitational Potential Energy
From Wikibooks, open books for an open world
< Physics with Calculus
Jump to navigation Jump to search
The Basic Equation[edit | edit source]
To establish a basic equation for the gravitational potential energy of a small object above a planet, let us assume that the height displacement, h, is small compared to the radius of the planet involved. We shall also assume that the potential energy (PE) is 0 at the surface of the planet. From this, we get:
Definition: Basic Gravitational Potential Energy Equation
Since energy is force times distance, the potential energy is force times the height distance:
where PE is the potential energy, Fg is the gravitational force, g is the acceleration due to gravity, h is the height difference between the start and finish, and m is the mass of the object being moved.
Since gravity is a conservative force, the potential energy gain or loss is independent of the path taken to get there.
The Real Equation[edit | edit source]
Sometimes, the above equation isn't enough. Though it is a convenient shortcut when h is much smaller than the planet's radius, there exists an equation which is accurate regardless of the height involved or the change of the acceleration due to gravity.
Suppose an object moves, starting at a distance r1 from the center of a planet and moving to a further distance r2 from the center of the planet. The work done by the gravitational force is:
Since potential energy is the opposite of work,
The change in potential energy can also be written as the potential energy at the start minus the potential energy at the finish.
The only possible universal reference point for gravitational potential energy is at infinity. In other words:
This means that the equation simplifies a bit, since 1 over infinity is 0:
Definition: The True Equation for Gravitational Potential Energy
This equation is universal, regardless of how long or short the distance is. However, it is still often more convenient to use the simpler equation, as it requires neither the distance from the object to the core of the planet involved nor the mass of the planet involved.
Another proof[edit | edit source]
Because the gravitational force changes over the displacement in the example above, the work done by this force is a definite integral:
Since the inward gravitational force is the opposite direction of the displacement, we get:
Putting that into the original equation:
Recognize that last step? (If not, scroll up slightly) This leads back to the true equation for Gravitational Potential Energy.
Escape velocity[edit | edit source]
To get an object permanently far away from the Earth, we want the final gravitational potential energy to become zero. However, to find its minimum launch speed, we want the objects speed when the gravitational potential energy becomes zero to also be zero. This means that the final kinetic energy and gravitational potential energy should both be zero. Due to Conservation of Energy:
Isolating v:
And that's the formula for escape velocity. Plugging in values for G, ME, and rE:
|
ESSENTIALAI-STEM
|
Page:United States Statutes at Large Volume 14.djvu/372
342 THIRTY—-NINTH CONGRESS. Sess. I. Ch. 303, 304, 305, 306. 1866. Sergeant Boston Corbett, 16th New York cavalry; Sergeant An·- drew Wendell, 16th New York cavakiy; Corgmd Charles Zimmer, 16th New York caval ; Co oral ichael niac, 16th New York YP cavalry; Corporal Jblm Winter, 16th New York cavalry; Cor= ral Herman Newgarteu, 16th New York cavaliy; Corporal John Wdz, 16th New York cavalry}; Ccgporal Oliver onpay, 16th New York cavalry; Co1§>rul Mic ael ormsley, 16th New York cavalr ; Private John yers, 16th New York cavalry; Private John Iiyan, 16th New York cavallz-H1; Private William yrne, 16th New York calyialry; Private Ph' H<¥t,l:6th New 1Y‘oirkwcaE1lry; Pi te arti ele 16th ew or cavary· va en Pi-iliiilann, l6thnNew Yidrk cavalry 5 Private Frank, McDaniel, 16lh ii?" °i?"k i2“$fL’ H.P"'é°° L°`i’3.»?‘i¥“g°r£$§h.1i.Zl.yY°’ii‘.i$2l§ Enie Parody, 16th New Yoik cavalry; Private David Barker, ltithbew York cavalry; Private William McQuade, 16th New York cavalry; Private John Millington, 16th New York cavalry; Private Frederick Delta, 16th New York cavalry; Private Jo n H. Singer, 16th New York cavalr ; Private Carl Steinbrugge, 16th New York cavalry; Private .k>sepl1 Zisgen, 16th New York cavalry, one thplusand six hundred and fifty-three dollars eighty- 43 000 four, eight tent cents each .., $ 75,000 00 Pnymcutnto Sec. 2. And be it further enacted, That the said several sums shall b°m°d°*° °"' be aid to the several ersous above named, respective] , ersonall , or sons themes ves P P _Y P Y or, Gro. i in case oF their decease, to the persons who would be entitled to the same under the bounty laws of the United States in case of a deceased soldier. Approved, July 28, 1866. July zs, 1s0c. CHAP. CCCIV.—An A4 direezging aflgmu Sloan to be held at the Oily to the “‘”""_""‘ tale o ennsg vania. I Be it enactedlby the Senate and House of Representatives of the United _'I`¢¤-¤ of dll- States of America en Congress assembled, That, besides the terms of the QQ g:`},';? b° district court of the United States, directed by law to be held at Pitts- Pennsylvania. burgh, in the county of Allegheny, and at Williamsport, in the county of Lycoming, for the western district of the State of Pennsylvania, the judge of said western district shall hold two terms in every year, at the city of Erie, in the count of Erie which shall commence the first Monda of X ·. . . Y July and January m each and every year, beginning in the. July or January which shall first immediately follow the passage of this act, and be continued and adjourned from time to time, as the court may deem expedient, for the despatch of the business thereoil Approved, July 28, 1866. July 28, 1866. CHAP. CCCV.—An Act to authonbe the Secretary of War tojirrnish Transportatlbn to Discharged Soldiers to whom Artificial Limbs are furnished by the Government. Be it enacted by the Senate and House ty' Representatives of the United ‘°T*‘3P¤%$*;¤*i°? States of America in Congress assembled, That the Secretary of War is dlzmlai wimao- authorized and directed to furnish to discharged soldiers of the United artificial limbs States, who have been disabled in the service, as well as to those not yet "`°f“"“l'h°d• discharged, transportation to and from their homes and the place where they may be required to go to obtain artificial limbs provided for them under authority of law. Approved, July 28, 1866. Jrlly.28, 1868. CHAP. CCCVI. -An Act su to the Act to appropriate Monez; for the Pow! 1866, ch. 85. ervices. A. 8. Mc, P 4 Bs it enacted by the Senate and House of Representatives of the United Supplemental States of America in Congress assembled, That there be, and hereby i5, '¥’P"° "'°*{°”f°' appropriated, out of an mone in the treasur not otherwise a ropcsts. service. P? P. y. y y. pp prlated, for carrying the mail upon the post roads established by acts of
* nva ra am cna, ew a ;
|
WIKI
|
linslus
Etymology
, used at least since 1973, probably a loan from. The word looks very similar to, but refers to the person being in the photo, not the avid amateur photographer.
Noun
* 1) a lens louse; a person who frequently and happily appears in photos
Usage notes
* SAOL doesn't give any plural form. For lus, the plural would be -löss, but here -lusar is far more common. A similar case is with the plural either or, both in English and Swedish.
|
WIKI
|
Trump says U.S. wooing other motorcycle cos. amid Harley spat
WASHINGTON, July 3 (Reuters) - The Trump administration is working to lure other motorcycle companies to the United States following Harley-Davidson Inc’s decision to move some production for European customers overseas, President Donald Trump said on Tuesday. “Now that Harley-Davidson is moving part of its operation out of the U.S., my Administration is working with other Motor Cycle companies who want to move into the U.S. Harley customers are not happy with their move - sales are down 7% in 2017. The U.S. is where the Action is!” Trump wrote on Twitter. (Reporting by Susan Heavey; Editing by Doina Chiacu)
|
NEWS-MULTISOURCE
|
Frank Gaziano
Frank M. Gaziano (born September 8, 1963) is an associate justice of the Massachusetts Supreme Judicial Court.
Early life and education
Born in Quincy, Massachusetts, Gaziano received his Bachelor of Arts from Lafayette College in 1986 and his Juris Doctor from Suffolk University Law School in 1989.
He began his legal career at the Boston law firm of Foley Hoag as a litigation associate. In 1991, he entered public service as an assistant district attorney with the Plymouth County District Attorney's Office in Brockton.
In 2001, he was appointed the First Assistant United States Attorney for the District of Massachusetts, where he was a member of the Organized Crime Strike Force.
Judicial service
Gaziano was previously an associate justice for the Massachusetts Superior Court. He was nominated to the court by Governor Mitt Romney in 2004. He served as the Regional Administrative Justice for Plymouth County and for Criminal Business in Suffolk County. He also chaired the Supreme Judicial Court's Standing Committee on Criminal Rules and was a member of the Supreme Judicial Court's Model Homicide Jury Instruction Committee.
Supreme Judicial Court
Gaziano was nominated to the Supreme Judicial Court by Governor Charlie Baker on June 14, 2016, and confirmed by the Governor's Council on July 13, 2016. He succeeded Justice Francis X. Spina, who retired on August 12, 2016.
Notable Cases
In April 2020, Gaziano wrote for the unanimous court when it found that warrantless use of automatic number-plate recognition cameras to surveil a suspected heroin distributor's bridge crossings to Cape Cod was not an unconstitutional search because of the limited time and scope of the observations.
In February 2022, the Supreme Judicial Court ruled that a criminal defendant lacked a reasonable expectation of privacy in a Snapchat story he shared with an undercover Boston police officer, who friended the defendant using a pseudonym and then used the clip to charge him in an illegal gun case. Writing for the court, Gaziano said that requiring police officers to always identify themselves would render "virtually all undercover work" unconstitutional.
|
WIKI
|
Trump vows to appeal against travel ban ruling to Supreme Court
A defiant Donald Trump has pledged to appeal against a federal judge's order placing an immediate halt on his revised travel ban, describing the ruling as judicial overreach that made the United States look weak. In granting the temporary restraining order in response to a lawsuit by the state of Hawaii, U.S. District Judge Derrick Watson found on Wednesday that "a reasonable, objective observer ... would conclude that the executive order was issued with a purpose to disfavor a particular religion." Early on Thursday, U.S. District Judge Theodore Chuang issued a nationwide preliminary injunction in a similar case in Maryland brought by refugee resettlement agencies represented by the American Civil Liberties Union and the National Immigration Law Center. Chuang ruled that the agencies were likely to succeed in proving that the travel ban portion of the executive order was intended to be a ban on Muslims and, as a result, violates the U.S. Constitution's religious freedom protection. "To avoid sowing seeds of division in our nation, upholding this fundamental constitutional principle at the core of our nation's identity plainly serves a significant public interest," Chuang wrote in his ruling. The actions were the latest legal blow to the administration's efforts to temporarily ban refugees as well as travelers from six predominantly Muslim countries. The president has said the ban is needed for national security. However, the orders, while a victory for the plaintiffs, are only a first step and the government could ultimately win its underlying case. Watson and Chuang were appointed to the bench by former Democratic President Barack Obama. Trump, speaking after the Hawaii ruling at a rally in Nashville, called his revised executive order a "watered-down version" of his first. The president said he would take the case "as far as it needs to go," including to the Supreme Court, in order to get a ruling that the ban is legal. The likely next stop if the administration decides to contest the Hawaii judge's ruling would be the United States Court of Appeals for the Ninth Circuit. Three judges on the Ninth Circuit upheld a restraining order on the first travel ban issued by a Washington state judge. At that point, the government's legal options were to ask for a hearing by a larger panel of judges or petition the Supreme Court to hear the case. Instead, the administration withdrew the ban, promising to retool it in ways that would address the legal issues. If the Ninth Circuit were to uphold the Hawaii court's ruling, an appeal to the Supreme Court would be complicated by its current makeup of four conservative and four liberal judges, with no ninth justice since the death of Antonin Scalia more than a year ago. The travel ban has deeply divided the country on liberal and conservative lines, and it is unlikely that a ninth Supreme Court justice would be seated in time to hear an appeal in this case. Trump signed the new ban on March 6 in a bid to overcome legal problems with his January executive order, which caused chaos at airports and sparked mass protests before a Washington judge stopped its enforcement in February. Watson's order is only temporary until the broader arguments in the case can be heard. He set an expedited hearing schedule to determine if his ruling should be extended. Trump's first travel order was more sweeping than the second revised order. Like the current one, it barred citizens of Iran, Libya, Syria, Somalia, Sudan, and Yemen from entering the United States for 90 days, but it also included Iraq, which was subsequently taken off the list. The revised ban also excluded legal permanent residents and existing visa holders and provided waivers for various categories of immigrants with ties to the United States. Hawaii and other opponents of the ban claimed that the motivation behind it was Trump's campaign promise of "a total and complete shutdown of Muslims entering the United States." In Washington state, a group of plaintiffs applying for immigrant visas asked U.S. District Judge James Robart in Seattle — who suspended the first ban — to stop the new order. Robart was appointed to the bench by Republican former President George W. Bush. Judge Robart said he would issue a written ruling, but did not specify a time line.
|
NEWS-MULTISOURCE
|
Letters: Blending religion and politics - latimes
Re Neither party owns faith, Opinion, Sept. 6 Perhaps it's true for Roman Catholics like Rick Cole that the country has maintained a healthy balance in which faith and politics can interact. It certainly isn't for those of us who have different values and beliefs than those imposed by the church. The church-state separation not only benefits the religious by allowing them their beliefs, but it also protects the non-religious from the tyranny of the majority. With respect to the civil rights movement, which Cole says could have been far more violent without the Rev. Martin Luther King Jr.'s appeal to Americans' Judeo-Christian values, it was more bloody than Cole remembers. I would also suggest that charity and morality are not the exclusive domains of the religious. Many religious people continually try to invoke God in public discourse. Have your faith, if you must, but leave this notion of a God out of politics. Dave Dolnick Thousand Oaks Cole claims that those who forget history have goals of driving Democrats out of the Roman Catholic Church and Catholics out of the Democratic Party. I question whether people of faith who are engaged in political action have this goal. As Sister Simone Campbell stated at the Democratic National Convention, we must evaluate public policy on the basis of conscience and, for Catholics, on the social teachings of the church. For her, to cite Paul Ryan's budget as counter to caring for the most vulnerable in society is, in Cole's words, to bring transcendent values to both public debate and courageous social action. This election offers Catholics who are Democrats or Democrats who are Catholic the opportunity to examine and vote for political positions that align with the church's teaching on the preferential option for the poor, without leaving either the party or the church. Lenore Navarro Dowling Los Angeles Cole may think that his views are his own, as indicated by the tag line that ran beneath his piece, but I believe they are the thoughts of many, especially in this election year. As a Catholic, a woman, a union retiree and a pro-life Democrat, I feel great hope knowing that people like Cole are living and working somewhere in the vineyards of this great nation. Kathleen Rapport Orange ALSO: Letters: Not just skid row Letters: Fellini and Facebook Letters: Truancy isn't a gray area
|
NEWS-MULTISOURCE
|
Talk:Product placement/Archives/2021
US Currency auto placement
There has been some debate about the automobile that appeared prominently in front of the Treasury Building on the US $10 bill throughout the second half of the twentieth century. Did the engravers and artists make the car's features deliberately generic and inconsistent so as to avoid promotion of a real automobile make? Is this worth a mention? 19:41, 5 July 2021 (UTC) — Preceding unsigned comment added by <IP_ADDRESS> (talk)
|
WIKI
|
Leigo Lake Music Festival
Leigo Lake Music Festival (Leigo Järvemuusika Festival) is Estonian music festival which is held in Lutike, Valga County. Besides music, light and fire performances are shown. The festival is named after Leigo Tourism Farm.
Near the festival are located Leigo Lakes and these lakes are essential components of festival's light and fire performances.
First festival took place in 1998. The festival's key person is Tõnu Tamm.
Since 2015, the festival focuses on classical music.
|
WIKI
|
Skip to main content
A ckan extension to showcase datasets in use
Project description
.. You should enable this project on travis-ci.org and coveralls.io to make
these badges work. The necessary Travis and Coverage config files have been
generated for you.
.. image:: https://travis-ci.org/ckan/ckanext-showcase.svg?branch=master
:target: https://travis-ci.org/ckan/ckanext-showcase
.. image:: https://coveralls.io/repos/ckan/ckanext-showcase/badge.svg
:target: https://coveralls.io/r/ckan/ckanext-showcase
================
ckanext-showcase
================
Showcase and link to datasets in use. Datasets used in an app, website or
visualization, or featured in an article, report or blog post can be showcased
within the CKAN website. Showcases can include an image, description, tags and
external link. Showcases may contain several datasets, helping users discover
related datasets being used together. Showcases can be discovered by searching
and filtered by tag.
Site sysadmins can promote selected users to become 'Showcase Admins' to help
create, populate and maintain showcases.
ckanext-showcase is intended to be a more powerful replacement for the
'Related Item' feature.
------------
Requirements
------------
Compatible with CKAN 2.3+.
N.B. The ``migrate`` command, detailed below, requires the Related Item models
and actions, which have been removed in CKAN 2.6. If you wish to migrate your
Related Items, please first upgrade CKAN to 2.5, do the migration, then
continue upgrading to CKAN 2.6+.
------------
Installation
------------
.. Add any additional install steps to the list below.
For example installing any non-Python dependencies or adding any required
config settings.
To install ckanext-showcase:
1. Activate your CKAN virtual environment, for example::
. /usr/lib/ckan/default/bin/activate
2. Install the ckanext-showcase Python package into your virtual environment::
pip install ckanext-showcase
3. Add ``showcase`` to the ``ckan.plugins`` setting in your CKAN
config file (by default the config file is located at
``/etc/ckan/default/production.ini``).
4. Restart CKAN. For example if you've deployed CKAN with Apache on Ubuntu::
sudo service apache2 reload
------------------------
Development Installation
------------------------
To install ckanext-showcase for development, activate your CKAN virtualenv and
do::
git clone https://github.com/ckan/ckanext-showcase.git
cd ckanext-showcase
python setup.py develop
pip install -r dev-requirements.txt
---
API
---
All actions in the Showcase extension are available in the CKAN Action API.
Showcase actions::
- create a new showcase (sysadmins and showcase admins only)
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_showcase_create -H "Authorization:{YOUR-API-KEY}" -d '{"name": "my-new-showcase"}'
- delete a showcase (sysadmins and showcase admins only)
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_showcase_delete -H "Authorization:{YOUR-API-KEY}" -d '{"name": "my-new-showcase"}'
- show a showcase
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_showcase_show -d '{"id": "my-new-showcase"}'
- list showcases
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_showcase_list -d ''
Dataset actions::
- add a dataset to a showcase (sysadmins and showcase admins only)
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_showcase_package_association_create -H "Authorization:{YOUR-API-KEY}" -d '{"showcase_id": "my-showcase", "package_id": "my-package"}'
- remove a dataset from a showcase (sysadmins and showcase admins only)
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_showcase_package_association_delete -H "Authorization:{YOUR-API-KEY}" -d '{"showcase_id": "my-showcase", "package_id": "my-package"}'
- list datasets in a showcase
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_showcase_package_list -d '{"showcase_id": "my-showcase"}'
- list showcases featuring a given dataset
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_package_showcase_list -d '{"package_id": "my-package"}'
Showcase admin actions::
- add showcase admin (sysadmins only)
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_showcase_admin_add -H "Authorization:{YOUR-API-KEY}" -d '{"username": "bert"}'
- remove showcase admin (sysadmins only)
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_showcase_admin_remove -H "Authorization:{YOUR-API-KEY}" -d '{"username": "bert"}'
- list showcase admins (sysadmins only)
curl -X POST http://127.0.0.1:5000/api/3/action/ckanext_showcase_admin_list -H "Authorization:{YOUR-API-KEY}" -d ''
----------------------------
Migrating from Related Items
----------------------------
If you already have Related Items in your database, you can use the ``showcase
migrate`` command to create Showcases from Related Items.
From the ``ckanext-showcase`` directory::
paster showcase migrate -c {path to production.ini}
Note that each Related Item must have a unique title before migration can
proceed. If you prefer resolving duplicates as showcases, you can use the --allow-duplicates
option to migrate them anyways. Duplicate Relations will be created as
'duplicate_' + original_related_title + '_' + related_id
paster showcase migrate -c {path to production.ini} --allow-duplicates
The Related Item property ``type`` will become a Showcase tag. The Related Item
properties ``created``, ``owner_id``, ``view_count``, and ``featured`` have no
equivalent in Showcases and will not be migrated.
Related Item data is not removed from the database by this command.
-----------------
Running the Tests
-----------------
To run the tests, do::
nosetests --ckan --nologcapture --with-pylons=test.ini
To run the tests and produce a coverage report, first make sure you have
coverage installed in your virtualenv (``pip install coverage``) then run::
nosetests --ckan --nologcapture --with-pylons=test.ini --with-coverage --cover-package=ckanext.showcase --cover-inclusive --cover-erase --cover-tests
------------------------------------
Registering ckanext-showcase on PyPI
------------------------------------
ckanext-showcase should be availabe on PyPI as
https://pypi.python.org/pypi/ckanext-showcase. If that link doesn't work, then
you can register the project on PyPI for the first time by following these
steps:
1. Create a source distribution of the project::
python setup.py sdist
2. Register the project::
python setup.py register
3. Upload the source distribution to PyPI::
python setup.py sdist upload
4. Tag the first release of the project on GitHub with the version number from
the ``setup.py`` file. For example if the version number in ``setup.py`` is
0.0.1 then do::
git tag 0.0.1
git push --tags
-------------------------------------------
Releasing a New Version of ckanext-showcase
-------------------------------------------
ckanext-showcase is availabe on PyPI as https://pypi.python.org/pypi/ckanext-showcase.
To publish a new version to PyPI follow these steps:
1. Update the version number in the ``setup.py`` file.
See `PEP 440 <http://legacy.python.org/dev/peps/pep-0440/#public-version-identifiers>`_
for how to choose version numbers.
2. Create a source distribution of the new version::
python setup.py sdist
3. Upload the source distribution to PyPI::
python setup.py sdist upload
4. Tag the new release of the project on GitHub with the version number from
the ``setup.py`` file. For example if the version number in ``setup.py`` is
0.0.2 then do::
git tag 0.0.2
git push --tags
-------------------------------------------
i18n
-------------------------------------------
See: "Internationalizing strings in extensions" : http://docs.ckan.org/en/latest/extensions/translating-extensions.html
1. Install babel
pip install Babel
2. Init Catalog for your language
python setup.py init_catalog -l es
3. Compile your language catalog ( You can force pybabel compile to compile messages marked as fuzzy with the -f)
python setup.py compile_catalog -f -l es
Project details
Release history Release notifications
This version
History Node
1.0.3
History Node
1.0.2
History Node
1.0.0
History Node
1.0.0b1
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Filename, size & hash SHA256 hash help File type Python version Upload date
ckanext-showcase-1.0.3.tar.gz (44.5 kB) Copy SHA256 hash SHA256 Source None May 26, 2017
Supported by
Elastic Elastic Search Pingdom Pingdom Monitoring Google Google BigQuery Sentry Sentry Error logging CloudAMQP CloudAMQP RabbitMQ AWS AWS Cloud computing Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page
|
ESSENTIALAI-STEM
|
Charter Communications shares soar after revenue beat
Charter Communications Inc.'s shares rose 7% in premarket trade Thursday, after the broadband and cable operator posted stronger-than-expected revenue for the fourth quarter. The company said it had net income of $296 million, or $1.29 a share, in the quarter, down from $9.53 billion, or $34.56 a share, in the year-earlier period. The huge decline in earnings was mostly due to the absence of a GAAP tax benefit from reduction in the deferred tax liability as a result of the late 2017 tax revamp. Revenue rose 5.9% to $11.2 billion. The FactSet consensus was for EPS of $1.47 and revenue of $11.1 billion. The company added 289,000 residential Internet customers in the quarter, bringing the total to 23.6 million. It added 207,000 residential customers in the quarter. But residential video customers fell by 36,000 to 16.1 million. Residential voice customers fell by 83,000 to 10.1 million. Shares have fallen 23% in the last 12 months, while the S&P 500 has fallen 5%.
|
NEWS-MULTISOURCE
|
Let me introduce a package I recently wrote: RandomBasedArrays.jl, a hassle-free package in the Julia programming language for dealing with arrays. Every time you access an element of an array, the first index is random, so this package relieves you from having to remember whether Julia uses 0- or 1-based indexing: you simply cannot ever know what the initial element will be. As an additional benefit, you can use any Int to index a RandomBasedArray.
image
Image credit: “xkcd: Donald Knuth” (CC-BY-NC 2.5)
Motivation
This package takes a new stance in the longstanding debate whether arrays should have 0-based or 1-based indexing.
The main motivation for this package is that I’m sick of reading about this debate. It is incredibly hard to convince people that there is no “one size fits all” indexing in programming, both alternatives have their merits:
• 0-based indexing is natural every time you deal with offsets, e.g. when referencing memory addresses, or when doing modular arithmetic
• 1-based indexing is natural when you are counting elements: the 1st element is “1”, the 2nd element is “2”, etc…
It is pointless to claim the superiority of one indexing over the other one, as they’re useful in different situations.
As a matter of fact, many “math-oriented” languages (e.g., Fortran, Julia, Mathematica, MATLAB, R), that are less likely to fiddle with pointers’ addresses, default to 1-based indexing, even though probably the majority of the programming languages nowadays uses 0-based indexing.
Many people claim superiority of 0-based indexing over 1-based indexing because of a popular note by Edsger W. Dijkstra: “Why numbering should start at zero”. However, I personally find this note unconvincing and partial, mainly based on subjective arguments (like elegance and ugliness) rather than really compelling reasons. That said, 0-based indexing is certainly useful in many situations.
A good programming language, whatever indexing convention it uses, should provide an abstraction layer to let users forget which is the initial index. For example, Fortran has lbound to reference the first element of an array. Besides the first function to reference the first element of a collection, the Julia programming language has different utilities to iterate over collections:
• arrays are iterables, this means that you can write a for loop like
for element in my_array
# do things with the `element`...
end
without using indices at all
• the length function gives you the length of a collection, so that Dijkstra’s argument about the length of a sequence remains aesthetic rather than practical
• eachindex is a function that returns an iterable object with all the indices of the array.
Some times you need to use the indices of an array and know which is the first one. In this case, the abstraction layer above is not useful. Thus, I think it is important for a programming language to provide also a way to easily switch to the most appropriate indexing for the task at hand. In Fortran you can set a different initial index for an array with the dimension statement. Julia allows you to define custom indices for you new array-like type, as described in the documentation. The most notable application of custom indices is probably the OffsetArrays.jl package. Other use cases of custom indices are shown in this blog post.
Usage
Let’s come to RandomBasedArrays.jl. You can install it with Julia built-in package manager. In a Julia session, after entering the package manager mode with ], run the command
pkg> add RandomBasedArrays
After that, just run using RandomBasedArrays in the REPL to load the package. It defines a new AbstractArray type, RandomBasedArray, which is a thin wrapper around any other AbstractArray.
julia> using RandomBasedArrays
julia> A = RandomBasedArray(reshape(collect(1:12), 3, 4))
3×4 Array{Int64,2}:
10 2 6 6
8 9 1 11
7 8 8 7
Every time you access an element, you conveniently get a random element of the parent array, making any doubt about first index go away. This means that you can use any Int as index, including negative numbers:
julia> A[-35]
6
julia> A[-35]
9
julia> A[-35]
4
You can also set elements of the array in the usual way, just remember that you’ll set a random element of the parent array:
julia> A[28,-19] = 42
42
julia> A
5×5 Array{Int64,2}:
13 16 3 25 9
23 20 16 18 1
5 17 21 6 8
5 3 42 10 13
25 6 23 4 11
julia> A
5×5 Array{Int64,2}:
9 25 25 3 3
4 14 9 7 18
22 14 13 21 2
11 12 19 14 19
19 2 21 2 21
There are other Julia packages that play with different indexing of arrays, e.g.:
• OffsetArrays.jl: Fortran-like arrays with arbitrary, zero or negative starting indices
• StarWarsArrays.jl: array indexing based on numbering of Star Wars episode. Also Machete order is accepted
• TwoBasedIndexing.jl: Two-based indexing (note: this is currently out-of-date and doesn’t work in Julia 1.0)
|
ESSENTIALAI-STEM
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.