Document
stringlengths
87
1.67M
Source
stringclasses
5 values
The faculty is careful not to force coding into the curriculum. They really view it as one tool of many to solve problems. There is no specific platform students must use to code. It’s really up to the student to choose the tool that makes the most sense, but Pencil Code has emerged as a popular platform for Beaver Country students. “It’s designed to be accessible enough for kids who have no coding experience at all and also powerful enough to allow kids at the high end to do some fairly sophisticated work,” MacDonald says. Teachers are coming up with some pretty creative ways to use coding in their classrooms. An English class, for example, used code to create very basic artificial intelligence. This allowed for a situation where students could have a “conversation” with a character from Macbeth, the play they were studying at the time. Students could type questions and the character answered based on what the student had typed. The students could then get a feel for which character they were talking to. Traditionally, students might take a quiz where they have to match a quote to the appropriate character to demonstrate their understanding of the play, but this assignment was far more interesting. “It still gets at that same idea of understanding the character’s motivation, but in a much more engaging way,” MacDonald says. A major benefit of Beaver Country’s coding initiative is that every girl who graduates from the school will know how to write code. Given the gender discrepancy in computer science and engineering fields, this is a point of pride for the school. “Our goal isn’t necessarily for every girl to want to go into engineering or computer science, but our goal is for every girl in the school to know she could if she wanted to,” Hutton says. Most of the teachers at Beaver Country had no programming experience prior to the coding initiative. The school has also carried out very little professional development around coding, which may seem surprising. The school offered faculty one dedicated day for technology professional development last year that featured three different sessions, but even those sessions covered very little coding. In fact, most of the professional development has been informal and has really come about through conversations between educators and peer-to-peer education. “I’d say overall the response has been very positive,” MacDonald says. “We have teachers here who are used to taking risks and trying new things. We’ve got that kind of energy among the faculty.”
FINEWEB-EDU
/*----------------------------------------------------------------------------------------- * Copyright (C) 2005 * * This file is part of DENISE. * * DENISE is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, version 2.0 of the License only. * * DENISE is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with DENISE. See file COPYING and/or . -----------------------------------------------------------------------------------------*/ /* * Model homogeneous half space * last update 11.04.02, T. Bohlen */ #include "fd.h" void model(float ** rho, float ** pi, float ** u, float ** taus, float ** taup, float * eta){ /*--------------------------------------------------------------------------*/ /* extern variables */ extern int NX, NY, NXG, NYG, POS[3], L, MYID; extern char MFILE[STRING_SIZE]; extern char INV_MODELFILE[STRING_SIZE]; extern float DH, *FL, TAU, DT; /* local variables */ float vp, vs, rhov, grad, y1, y2, ts, tp, *pts; int i, j, ii, jj, l; char modfile[STRING_SIZE]; /* gradient for Vs: parameters for velocity in m/s, depth h in meter */ const float vs1=120.0, vs2=300.0, h=12.0; /* layer over halfspace for Vp and rho: parameters parameters for velocity in m/s, depth of layer in meter*/ const float vp1=300.0, vp2=1800.0, rho1=1700.0, rho2=2000.0, layer=6.0; /*-----------------------------------------------------------------------*/ pts=vector(1,L); for (l=1;l<=L;l++) { pts[l]=1.0/(2.0*PI*FL[l]); eta[l]=DT/pts[l]; } y1=h/DH; y2=layer/DH; if(y1==NYG) declare_error(" \n y is equal NYG !! see src/model_grad.c \n "); grad=(vs2-vs1)/y1; /* loop over global grid */ for (i=1;i<=NXG;i++){ for (j=1;j<=NYG;j++){ /* gradient for Vs */ if(j<=y1){ vs=vs1+(j*grad); } else{ vs=vs2; } /* layer over halfspace for Vp and rho*/ if(j<=y2){ vp=vp1; rhov=rho1; } else{ vp=vp2; rhov=rho2; } ts=TAU; tp=TAU; /* only the PE which belongs to the current global gridpoint is saving model parameters in his local arrays */ if ((POS[1]==((i-1)/NX)) && (POS[2]==((j-1)/NY))){ ii=i-POS[1]*NX; jj=j-POS[2]*NY; u[jj][ii]=vs; rho[jj][ii]=rhov; pi[jj][ii]=vp; taus[jj][ii]=ts; taup[jj][ii]=tp; } } } sprintf(modfile,"%s_rho_it_0.bin",INV_MODELFILE); writemod(modfile,rho,3); MPI_Barrier(MPI_COMM_WORLD); if (MYID==0) mergemod(modfile,3); sprintf(modfile,"%s_vs_it_0.bin",INV_MODELFILE); writemod(modfile,u,3); MPI_Barrier(MPI_COMM_WORLD); if (MYID==0) mergemod(modfile,3); sprintf(modfile,"%s_vp_it_0.bin",INV_MODELFILE); writemod(modfile,pi,3); MPI_Barrier(MPI_COMM_WORLD); if (MYID==0) mergemod(modfile,3); free_vector(pts,1,L); }
ESSENTIALAI-STEM
Syriac Orthodox Archbishop of Jerusalem In the Syriac Orthodox Church, the Archbishop of Jerusalem (originally Bishop of Jerusalem) today bears the additional title of Patriarchal Vicar of the Holy Land and Jordan. The see is currently held by Anthimos Jack Yakoub. History The first Syriac Orthodox church in Jerusalem was probably built between the Sasanian conquest (614) and the Islamic conquest (637). The Patriarch Michael the Syrian (died 1199) implies that the church torn down by Harun al-Rashid in 806/807 predated the Islamic conquest. It was soon rebuilt by an Egyptian named Macarius of Naburwah. Since almost all of the known bishops were monks, there must also have been at least a rudimentary monastic community. The church appears to have been destroyed at the time of the destruction of the Church of the Holy Sepulchre. In 1092, Mansur of Tilbana, another Egyptian, built what was then the only Syriac Orthodox church in the city. In the first quarter of the 12th century, Bishop Ignatius II rebuilt the destroyed church and monastery. It was dedicated to Saint Mary Magdalene and later also to Simon the Pharisee. Shortly after 1125, Ignatius III constructed a hostel with a courtyard across from the church. According to John of Würzburg, writing later in the century, this church was believed to have formerly been the house of Simon the Leper. It is located near the Church of Saint Anne on the northeastern side of the city. After the Ayyyubid conquest in 1187, the church and monastery were transformed into a Muslim school. The bishops were only able again to occupy it again briefly when the city was in Christian hands between the Sixth Crusade (1229) and the Khwarazmian conquest (1244). Thereafter the Syriac Orthodox used the small church of Saint Thomas of the Germans until it was handed over to the Muslim authorities by the incumbent monk, who converted to Islam in 1451/1452. The Syriac Orthodox patriarch acquired the Monastery of Saint Mark from the Coptic Orthodox in 1472 and this has served ever since as the church of the bishops of Jerusalem. There was a deputy metropolitan bishop of Jerusalem from the early 18th century to the office's abolition in 1858, who resided at the Monastery of Saint Mark, whilst the metropolitan bishop resided at the monastery of Saint Ananias in Tur Abdin. Ecclesiastical properties The following ecclesiastical properties belong to the archdiocese: * Monastery of Saint Mark * Chapel of Saint Joseph of Arimathea and Saint Nicodemus in the Church of the Holy Sepulchre. * Church of the Mother of God, Bethlehem, Palestine. * Church of Saint Ephrem, Amman, Jordan. The archdiocese also possesses minor rights of worship at the following churches: * Church of the Nativity * Church of the Tomb of the Virgin Mary List of bishops The Syriac Orthodox Register of Episcopal Ordinations only goes back to 793. Michael the Syrian appended to his Chronicle a list of bishops of Jerusalem from James, brother of Jesus, down to his own time. It is identical to the Register for the bishops after 793. The bishops were of metropolitan rank. In the following list, a date range like 792×818 means "ordained between 792 and 818". Bishops before 793 cannot be dated at all. The list begins with the first bishop elected in opposition to the Council of Chalcedon (451), but the numbering takes into account the earlier bishops of Jerusalem. * Theodosius (451–453) * Severus (590–635) * Anastasius * Martyrius * Sallustianus * Elias * Cyril II * Jeremy I * Thomas I * John I * Philoxenus I * Timothy I (792×818) * Job (816×845) * Ignatius I (816×846) * Joseph III (816×846) * John II (845×875) * Cyril III Noah (845×875) * Cyriacus * Severus (877×884) * Joseph IV (909×924) * Theodore (909×924) * Cyril IV (922×936) * Jeremy II (935×954) * Thomas II (964×986) * John III (1006×1031) * Philoxenus II (1003×1031) * Zacharias (1041×1058) * Thomas III (1041×1058) * Timothy II (1062×1074) * John IV (1079×1083) * Cyril V (1090×1130) * David (1090×1130) * Ignatius II Hesnun (1090×1130, died 1124/1125) * Ignatius III ibn Busayr of Gadina (1123×1140) * Ignatius IV Romanus (1138×1167) * Athanasius (1167×1200) * Ignatius V Sahdo (1167×1200) * Basil (fl. 1292–1295) * Basil Simon (?–1421/1422) * Gregorius Joseph al-Gurji (c. 1510/1512–1537) * Gregorius Bahnam (c. 1530) * John of Mardin (d. 1577) * Gregorius John of Gargar (d. 1585×1587) * Gregorius Behnam of Arbo (1590–1614) * Abd al-Azal (1640) * Gregorius Abdal Jaleel (1664–1671) * Gregorius Simon II (1679–1692) * Gregorius Simon III of Salah (1693–1719) * Gregorius ‘Abd al-Ahad (1719–1731) * Gregorius Barsoum (1720–1727) * Gregorius Barsoum (1729–1737) * Gregorius Sani’a (1731–1737) * Gregorius Thomas (1737–1748) * Gregorius George (1748–1773) * Gregorius Bishara of Bitlis (1774–1789) * Athanasius Jacob (1785–1797) * Dionysius Jacob (1798) * Cyril ‘Abd al-Ahad (1799–1840) * Deputy: Gregorius Jacob (?–1847) * Deputy: Athanasius Yuhanna (1850–1864) * Gregorius Abded Sattuf (1872–1880) * George Kassab of Sadad (d. 1896) * Iyawannis Elias (1896–1908) * Gregorius Ephrem (1909–?) * Athanasius Yeshue Samuel (1946–1957) * Dionysius Behnan Jijjawi (1957–1996) * Sewerus Malki Mourad (1996–2018) * Gabriel Dahho (2019–2022) * Patriarchal delegate: Anthimos Jack Yakoub (2022–2023) * Anthimos Jack Yakoub (2023–present)
WIKI
trikotsatz günstig I thought that after two years, I knew replica handbags that Beatrice was a small gucci replica handbag in Pierre's many hermes replica handbags . I didn't expect it to be handbag replica positive result. Beatrice transformed this "night club little prince" into a happy replica handbags . Monthly Archives: February 2012 Oracle TO_CHAR and National Language Support (NLS) Some problems that ought to be trivial to fix can take an inordinate amount of time to track down and resolve. I recently spent more time than should have been necessary to identify the cause of a problem with some reasonably simple Oracle SQL within an application that I support. The application manipulates some Railway data, combining Train Crew information with some supplementary Passenger details. It is very typical to find in Train Running and Train Crew data a 7-character field of that defines which day(s) of the week are applicable, with Y and N used to indicate days that are or aren’t applicable. When used in conjunction with separate start and end date fields it is very easy to define a calendar of dates (e.g. Friday only from 1-Dec-2012 to 31-Dec-2012) The SQL in question needed to find records in the Train Crew data that were applicable to a single date in the supplementary data. Consider the following: • StartDate = 1-Dec-2012 • EndDate = 31-Dec-2012 • Days = NNNNNYN (Friday Only) • SupplementaryDate = 10-Feb-2012 (Friday) The SQL was something like this: SELECT * FROM TrainData WHERE StartDate <= SupplementaryDate AND EndDate >= SupplementaryDate AND Days LIKE ‘_____Y_’ However, it wasn’t quite that simple because the mask used in the LIKE clause had to be dynamically generated SQL based on SupplementaryDate. The position of the ‘Y’ within the string of underscore characters (the Oracle wildcard for ‘any single character) can be determined by the day number, so with Sunday being the 1st character and Saturday the last, Friday is the 6th character. Using the Oracle TO_CHAR(SupplementaryDate, ‘D’) to return the day number and DECODE to translate that into the necessary string we get: • DECODE(TO_CHAR(SupplementaryDate+1, ‘D’), ‘1’, ‘Y______’, ‘2’, ‘_Y_____’ etc. • The ‘D’ parameter of TO_CHAR returns the day of the week (1-7). • The +1 on SupplementaryDate adjusts for the fact that Monday is the first day of the week in the UK and the masks expects Sunday in the first position. The code worked fine until one day a customer reported the somewhat unhelpful unexpected results. After several attempts to pinpoint the problem, pouring over data dumps and log files, it finally became apparent that this mask was being generated incorrectly, or more precisely it was one day out, returning ‘______Y’ instead of ‘_____Y_’. Of course this actual string is not exposed in any of the data that was immediately available to me, and most of the records had a variety of other values including ‘YYYYYYY’ or ‘NNYYYYY’ which masked the problem. Having determined that the wrong mask must be getting generated I had to work out why.  Of course, the first day of the week can vary by country, that must surely be causing the problem. According to Oracle documentation the ‘nlsparam’ argument specifies the language in which month and day names and abbreviations are returned. According to other sources I found on the web this should have resolved my problem, but no amount of fiddling with the SQL gave the correct results, and further investigation suggested that it was the ‘nls_territory’ session setting that needed to be changed. Sure enough, the following commands illustrate the problem but didn’t give me a workable solution: 1. ALTER session SET nls_territory=’UNITED KINGDOM’; 2. SELECT sysdate, TO_CHAR(sysdate,’D’) FROM dual; 3. ALTER session SET nls_territory=’AMERICA’; 4. SELECT sysdate, TO_CHAR(sysdate,’D’) FROM dual; I was unsure how I could reliably execute something like this via an ODBC connection and for it to work with the various ODBC Driver and Oracle database configurations that my customers have. The solution that presented itself was a different approach to calculating the day of the week. By using the ‘J’ parameter instead of ‘D’, the TO_CHAR function calculates the number of days since January 1, 4712 BC, and this number is the same regardless of the national language settings. So now my function has become; • DECODE(MOD(TO_CHAR(SupplementaryDate+ 1,  ‘J’), 7) + 1, 1, ‘Y______’ , 2 , ‘_Y_____’  etc.
ESSENTIALAI-STEM
%A XIU Lichao;TAN Cheng;JIANG Yihan;ZHOU Renlai;CHEN Shanguang %T Effects of 45 Days -6°Head-down Bed Rest on Males’ Frontal Alpha Asymmetry and Emotion %0 Journal Article %D 2014 %J Acta Psychologica Sinica %R 10.3724/SP.J.1041.2014.00942 %P 942-950 %V 46 %N 7 %U {https://journal.psych.ac.cn/acps/CN/abstract/article_3686.shtml} %8 2014-07-25 %X Suffering from the anxiety and depression under spaceflight may impair astronauts’ cognitive performance. It is difficult to investigate human emotion changes in real space environment. Previous studies suggested that the head-down bed rest (HDBR) which simulated weightlessness environment was used to evaluate emotion changes with self-reported scales and turned out to be useful tools. In addition, scientific research suggests that emotional responses are composed of initial emotional reactivity and ongoing emotion regulation. However, it is still uncertain that whether the emotion regulation competence will be impaired or not under HDBR. Therefore, we investigated the effects of 45 day -6° HDBR on participants’ self-reported anxiety and depression as well as the frontal EEG asymmetry which represents their emotion regulation competence. Sixteen healthy non-smoking young men whose mean age was 26.33 years old (SD = 4.13) were recruited in the experiment. The participants had no history of chronic or acute diseases and normal vision. They were right-handed, non-athletes and none of them were allowed to use medication, tobacco, or caffeine-containing drinks during the experiment. They should keep lying in the bed with -6 degree for 45 days. EEG data and Beck Anxiety Inventory (BAI) as well as the Beck Depression Inventory (BDI) were assessed and analyzed on two days before HDBR, 11th, 20th, 32nd and 40th day under HDBR together with the 8th day after HDBR respectively. According to the previous studies, we mainly measured EEG alpha asymmetry in the frontal area (FP1, FP2, F3 and F4) and the EEG was referenced on-line to the left mastoid and re-referenced off-line to the Cz electrode. Throughout the EEG recording, the impedance of the electrodes was maintained under 5 kΩ. The electroencephalogram (EEG) was recorded by 40 Ag/AgCl electrodes mounted on a custom-made cap according to the extended 10-20 system and continuously sampled at 1000 Hz by a Neuroscan NuAmps amplifier. The band-pass filter range of 0.01 to 200 Hz was used during the EEG recording. The artifact-free EEG was analyzed with Discrete Fourier Transforms (DFT) which use a Hanning window of one second width and 5% overlap. Power was extracted from the 8~13 Hz frequency band and measured with mean square microvolt as its unit. The raw data of power was then transformed in the natural log (ln) in order to normalize the data distribution. The value of the frontal EEG asymmetry was calculated by subtracting the value of the left EEG power from the value of the right EEG power. Statistic analyses were performed using two-way [Time points (pre-HDBR, HDBR11, HDBR20, HDBR32, HDBR40 and post-HDBR) × electrode sites algorithm (lnFP2-lnFP1 vs. lnF4-lnF3)] repeated-measures ANOVAs with SPSS 13.0 Software. Statistically significant differences were assessed at 0.05 level and power of the effect was assessed with partial eta-squared (η2) and the correction was done by Greenhouse-Geisser coefficient. Frontal EEG asymmetry was clear to perform a linear increase curve (F (5, 75) = 2.91, p = 0.019, η2 = 0.16) across all six time points. The main effect of electrode sites algorithm was not significant (F (1, 15) = 0.03, p = 0.855, η2 < 0.001), and there was no significant interaction between time points and electrode sites algorithm (F (5, 75) = 0.45, p = 0.813, η2 = 0.03), either. The self-reported anxiety (F (5, 75) = 2.09, p = 0.076; η2 = 0.12) and depression (F (5, 75) = 0.55, p = 0.738; η2 = 0.04) showed no significant changes before, during and after the HDBR. These results indicate that under extreme environment, people who prefer to maintain the stability of their emotional state paid many efforts to regulate their negative emotions. Only in this way can they reported stable anxiety and depression feelings. Above all, their anxiety and depression symptoms did not fluctuate significantly under simulated weightlessness environment.
ESSENTIALAI-STEM
Hair falling is a very common problem among people of different ages. The reason behind it is a curiosity to develop in everyone’s mind. To get it, we have to look at the ideas behind this problem. The follicles and testosterone in the human body have a great connection between them. For consideration, testosterone should be defined first. Testosterone is a male sex hormone found in human bodies. It has numerous appearances in the growth of the human body. Here we have mentioned several tenacities for which this sex hormone is desired. These resolutions include the development of several secondary sexual characteristics in men, the growth of follicles, and the change of men's voice. Few basic deviations can be caused by the absence of this testosterone. As very low or high levels of this hormone can lead to problems. Here the interrogation arises, is it only this hormone that causes the baldness or there is something else? Hair falling can be best understood by the aspects behind it and there is a need to cover the researches behind it and the basic connection between this hormone and baldness. Hair falling is a topic that is one of the serious talks among people. It is the most searched on the internet. Many types of research have been done on the function of this hormone and its connection with baldness. Most researchers explain that this hormone at high levels can result in baldness due to a specific hormone that it produces. These purposes include the development of certain secondary sexual characteristics in men, the growth of follicles, and the change of men's voice. This hormone exists in subsequent forms in the human body. These forms should be discussed. The first form of this hormone is in its free state. This Freeform is directly connected with the hormones’ receptors and is absorbed by the cells to carry out various important functions. The second most important kind is DHT. DHT is the abbreviation of Dihydro-testosterone. It is derived from the same hormone. DHEA is more common in women. This hormone is found in the skin, follicles, and prostate. It fixes itself to the follicles that can lead them to become smaller in size. It then causes the thinning of your follicles and finally losing these strands and the strength of follicles. Hair falling makes people more curious about their future looks. Some measurements should be followed. These both low and high levels of the hormone can lead to baldness. Here, the points which have to be noticed are about the low level of this hormone. These low testosterone levels may also have a similar amount of DHT that contributes to the baldness. It has been noted that men with male pattern baldness have low hormone levels with average DHT levels in their bodies. The people have a similar amount of DHT as others have but the alteration is that their follicles are genetically programmed to be more sensitive to DHT. This thing makes their follicles more liable for reducing in size and strength. The best surgery is FUE and nearly all the doctors worldwide commend it to their patients after prescribing them medical treatment as a primary approach. Hair falling is being treated all over the world and most people are enjoying its valuable results. Hair falling can be treated in various ways. The thing that must be followed is Medication. The most important medication for this purpose is called mini doxie (Rogaine). Eating a healthy diet that is high in antioxidants and proteins can help to achieve younger, healthier, and better looks. The antioxidants are elements that can fight oxidative stress, which will give scalp strength. Fruits like blueberries, spinach, kidney beans, and walnuts are all rich in natural antioxidant ingredients. Following vitamins and minerals is a vital part of healthy growth. These ways to cover and treat thinning follicles in males may improve the looks and strength. FUT is a relatively older method which is also known as the strip excision method. Surgical methods include FUE and FUT. FUE is a very modern procedure and is preferred over other conformist methods, which for the first time took place in almost the 1990s. Hair falling solution, the best process is FUE; which is a highly proven and invasive outpatient way in which follicular unit grafts containing a small number of follicles are separately removed from the donor’s stronger areas of the skull and very professionally reinstated to the recipient’s bald areas. If you want to know more details, click https://hairtransplantt.com/ Author's Bio: 
ESSENTIALAI-STEM
Dulcie September Dulcie Evonne September (20 August 1935 – 29 March 1988) was a South African anti-apartheid political activist. Born in Athlone, Western Cape, South Africa, she was assassinated in Paris, France. Quotes about person/work * Today we meet here to honour a great South African woman who made an immense contribution to the people of South Africa, a woman who although she was taken away from us and deliberately silenced, is still loved, a woman who many of us remember and still treasure through the memories we have of her. * Remarks by the Minister Ms Lulu Xingwana MP, on the occasion of the Dulcie September Memorial Lecture at the University of the Western Cape, Cape Town19. August 2010.
WIKI
User:Tom (LT)/sandbox/Table of neurotransmitter actions in the ANS Sympathetic nervous system * In the heart, increase cardiac output (β1, β2), heart rate (β1, β2),, atrial and ventricular contractility (β1) and cardiac muscle automaticity * In blood vessels, vascular smooth muscle contract (α1) or relax (β2) . Constrict arteries, including the renal artery (α1), small and large coronary arteries (α1, α2), and arteries to skin (α), other organs (α) and the brain (α1) * Dilate small coronary arteries, the hepatic artery, and arteries to skeletal muscle (β2) * Constrict arteries to erectile tissue (α1), arteries to salivary glands (α) and veins (α1, α2) . Dilate veins (β2) * In the haematological system, aggregate platelets (α2) and inhibit histamine release from mast cells (β2) * In the respiratory system, relax the smooth muscle of bronchioles (β2), or play a minor role in contracting them (α1). Note that the bronchioles have no sympathetic innervation, but are instead affected by circulating adrenaline * Dilate the pupil dilator muscle, causing mydriasis (α1). Relax the ciliary muscle, causing long-range focus (β2). * In the digestive system, stimulates viscous, amylase secretions from salivary glands (β), stimulate potassium secretions (α1) * Stimulate protein secretion from lacrimal glands (β) * Stimulate renin secretion from the juxtaglomerular apparatus of the kidney (β1). * In the liver, stimulate glycogenolysis and gluconeogenesis (α1, β2). Stimulate lipolysis in adipose cells (β1, β3) * In the GI tract, decrease smooth muscle motility (α1, α2, β2) and cause contraction of the sphincters (α1, α2, β2) * In the pancreas, decrease insulin secretion from beta cells in the Islets of Langerhans (α2), and increases glucagon secretion from alpha cells. * In the adrenal medulla, stimulate secretion of epinephrine and norepinephrine via the N (nicotinic ACh receptor). * In the urinary system, relax the Detrusor urinae muscle of bladder wall (β2), β3: constrict the internal urethra sphincter (α1) * In the reproductive system, contract the uterus of pregnant women (α1) or relax it if not pregnant (β2). Stimulate ejaculation (α1). * In the skin, stimulate sweat gland secretions (α1, minor) and arrector pili erection (α1). Parasympathetic nervous system * In the heart, decrease cardiac output (M2), heart rate (M2), and atrial contractility * Relax vascular smooth muscle (M3) * Dilate arteries to erectile tissue and arteries to salivary glands (M3) * In the respiratory system, contract the smooth muscle of bronchioles (M3) * Contract the Iris sphincter muscle, causing miosis (M3). Contract the ciliary muscle, causing short-range focus (M3) * stimulate watery secretions from salivary glands (M3). * stimulates secretion of tears from the lacrimal glands (M3) * In the GI tract, stimulate gastric acid secretion from parietal cells (M1), increase smooth muscle motility (M3, M1), cause relaxation of the sphincters, and stimulate secretions from the glands of the tract (M3) * In the pancreas, increase secretion of insulin and glucagon (M3) * In the urinary system, contract the Detrusor urinae muscle of bladder wall (M3) contracts, relax the internal urethral sphincter (M3) * Stimulate erection (M3). * In the skin, stimulate sweat gland secretions (M)
WIKI
Hsiao Huang-chi Hsiao Huang-chi (born 22 September 1976) is a Taiwanese singer, songwriter and former judoka (2nd dan black belt). He represented Taiwan in FESPIC Games in Beijing in 1994, where he won the bronze title and placed seventh at the 1996 Atlanta Paralympics. Hsiao gained attention in the Taiwanese Hokkien pop scene after winning the Best Male Vocalist – Taiwanese award at the 19th Golden Melody Awards in 2008. Hsiao had congenital cataracts which led him to his blindness at birth, which was partially cured by surgery when he was 4. However his vision gradually deteriorated, and he completely lost his eyesight at age 15. Hsiao had also gained a license to practice as a therapeutic masseur in high school. In 2012, he opened a massage clinic in Taipei, that employs blind and deaf people. Studio album * 2002 You Are My Eyes * 2004 Black Guitar * 2006 Our Story / 我們的故事 * 2007 True Love * 2008 I am Ricky Hsiao * 2009 Man Who Loved Dreaming * 2011 Lonely Chords * 2011 Scripture of Reminiscence * 2013 Good Sir * 2014 The Most Beautiful Flower * 2016 Mysterious World * 2017 Cheers * 2019 Migratory Bird * 2021 Stage * 2022 A Storytelling Song Collaborations * Water Per Person / 一人水一項 (2015) with Selina Ren (Hokkian) * Peaceful Breakup / 和平分手 (2018) with Rachel Liang Published works * Oral autobiography published in 2002 "I saw the color of notes" (Crown Publishing Group Culture) Awards and nominations * 1991 Golden Tripod eighth disabled the first song contest * 1992 Golden Tripod disabled eighth winning singing contests * 1994 International Talent Competition singing group of people with disabilities first * 1994 Golden Lion Award for the visually impaired the first song contest * 1995 / blind school students and younger brother learn the composition of the first visually impaired Orchestra "full-band." * Special talents in 1996 the International Federation of Association of the Republic of China hosted the national selection of young musicians with disabilities second * 1996 / participation in the United States in Atlanta, 1996 Paralympics, was seventh in judo. However, his grandmother died before he returned to Taiwan. * Special talents in 1997 the International Federation of Association of the Republic of China hosted the national selection of disabled young musicians Western music group the second * 1998 Executive Yuan CCA to host "First National Literary Prize for the Physically and Mentally Handicapped," the first songs the creative team * 1998 Taipei Cultural and Educational Foundation, the visually impaired music visually impaired host the sixth group of the first vocal music competitions * 1999 Executive Yuan CCA to host "Second National Literary Award for the Physically and Mentally Handicapped" creative music and lyrics the second group * Thirty-seventh session in 1999 Ten Outstanding Young * 2000 Executive Yuan CCA to host "The Third National Award for the Physically and Mentally Handicapped Wenhui" music and lyrics create a third group * 2001 Executive Yuan CCA host, "Fourth National Award for the Physically and Mentally Handicapped Wenhui" music and lyrics the creative team first * 2002 / publishing oral autobiography "I saw the color of the notes" * 2003 / December 2002 launch of "You are my eyes", the same name by the "super-Avenue of Stars" contestants Yoga Lin covered again. * Finalist in 2003 Golden Melody Awards "the best male singing" and "the best lyricist" * 2003 Executive Yuan CCA host "physical and mental disabilities of the Fifth National Wenhui Award" music and lyrics the creative team first * Finalist in 2005 Golden Melody Awards "best pop vocal album Taiwanese" and "the best male singing Taiwanese people" * Finalist in 2008 Golden Melody Awards "the best male singing Taiwanese people," "the best Taiwanese language album," ( "true love" album) and "Best Composer" (short-listed entries: "love this song" I love songs in the album included) * Golden Melody Awards in 2008 "the best male singing Taiwanese" and "the best Taiwanese language album," Prize Winner.
WIKI
U.S. House panel chairman subpoenas Trump's tax returns WASHINGTON (Reuters) - U.S. House Ways and Means Committee Chairman Richard Neal on Friday subpoenaed President Donald Trump’s tax returns, giving the U.S. Treasury and Internal Revenue Service one week to turn over the tax records. In the latest salvo of a political battle widely expected to end in federal court, Neal issued separate subpoenas to Treasury Secretary Steven Mnuchin and IRS Commissioner Charles Rettig that seek six years of Trump’s individual and business tax returns. The officials have until 5 p.m. EDT (2100 GMT) on May 17 to produce the material. Trump is stonewalling oversight investigations by Neal and five other Democratic committee chairs in the House of Representatives, prompting Democrats to warn Trump officials that they could face contempt citations along with heavy fines and even impeachment by defying congressional subpoenas. The Democratic-led House Judiciary Committee voted to recommend a contempt of Congress citation against Attorney General William Barr this week after he defied a subpoena seeking the unredacted report on Special Counsel Robert Mueller’s Russia investigation. “While I do not take this step lightly, I believe this action gives us the best opportunity to succeed and obtain the requested material,” Neal said in a statement issued by his committee. “I sincerely hope that the Treasury Department will furnish the requested material in the next week so the committee can quickly begin its work,” he added. As House Ways and Means Committee chairman, Neal is the only House lawmaker authorized to seek Trump’s tax returns under a federal law that says the Treasury secretary “shall furnish” such documents upon request. Democrats want Trump’s returns as part of their inquiry into possible conflicts of interest posed by his continued ownership of extensive business interests, even as he serves as president. On Monday, Mnuchin denied Neal’s formal April 3 request for the returns, arguing that the committee request lacked “a legitimate legislative purpose.” Trump has broken with a decades-old precedent among recent U.S. presidents by refusing to release his tax returns while a presidential candidate in 2016 or since being elected, saying he could not do so while his taxes were being audited. His former personal lawyer, Michael Cohen, told a House panel in February that he does not believe Trump’s taxes are under audit. Cohen said the president feared releasing his returns could lead to an audit and IRS tax penalties. Trump administration officials and Republicans in Congress have condemned Democratic efforts to obtain Trump’s tax returns, saying it could “weaponize” the IRS and confidential taxpayer information for political purposes. Representative Kevin Brady, the top Ways and Means Republican, sent a letter to Neal earlier on Friday, urging the chairman not to proceed. “Such actions would be an abuse of the committee’s oversight powers and further examples of the Democrat majority’s coordinated attempt to weaponize the tax code and use Congress’s legitimate oversight authority for political gain,” Brady wrote. Reporting by David Morgan; editing by Chizu Nomiyama and James Dalgleish
NEWS-MULTISOURCE
The Link Between Alcohol and Aggression The association between alcohol and aggression is huge, according to Robert O. Pihl, professor of psychology and psychiatry at McGill University. "Alcohol is involved in half of all murders, rapes, and assaults," he said. "But the dynamics of this association are complicated, which is why any research that focuses on explaining this relationship is important for society in general." Statistics from the National Institute on Alcohol Abuse and Alcoholism from 2015 corroborate his statement, including: • 696,000 students between the ages of 18 and 24 were assaulted by another student who had been drinking. • 97,000 students between the ages of 18 and 24 reported experiencing alcohol-related sexual assault or date rape. The Basics of Anger Aggression is an outlet for anger. It's easy to think of this as the emotional state that occurs when we get mad. Often, this is a response to a provocation of some sort.  Actually, the personality trait of anger refers to your general tendency to experience chronic anger over time. If you're an angry person, you tend to seek out stimuli that activate feelings of anger. This may explain why you are angry more often compared with someone who does not have this personality trait. Trait Anger Is an Aggression Predictor Trait anger significantly predicts aggression in intoxicated men who report low levels of anger control, according to a study published in Alcoholism, Clinical and Experimental Research. To obtain these results, researchers recruited 164 male social drinkers ages 21 to 35 to express their aggression after consuming either an alcoholic or placebo beverage.  Participants were told they were going to compete against another individual on a "reaction time" task, during which they might receive electric shocks from their opponent. While engaged in this fictitious task, which included both high and low shock levels or "provocation," the participants' experience of anger was unobtrusively assessed using the Facial Action Coding System. Alcohol Brings out Aggression "Alcohol intoxication brings out people's natural tendencies to the expression of anger," said Dominic Parrott, the graduate student who conducted the study. "Our findings strengthen the notion that alcohol increases the likelihood that certain drinkers, particularly those with the tendency to be angry and to express their anger outwardly, become aggressive when provoked." "If individuals tend to express their anger outwardly," said Zeichner, "alcohol will 'turn up the volume,' so that such a person will express anger more frequently and more intensely. A heightened response will most likely occur when the provocation against the drinker is a strong one, and will less likely occur when the individual is experiencing a low provocation and is sober." Anger, Alcohol, and Domestic Violence The relationship of intimate partners is one area that is of great concern when it comes to alcohol and anger. This pertains to adults in long-term relationships such as marriages as well as dating and sexual violence. In a 2017 report, researchers shared their findings of the relationship between alcohol and dating violence. The study included 67 undergraduate men who were engaged currently dating someone. The conclusions were that alcohol increased the odds of physical aggression in those men who had high trait anger and poor anger management skills. It also noted that sexual aggression was higher with alcohol, even in men with low trait anger and reasonable anger management skills. Energy Drinks and Alcohol a Potential Risk Factor Cocktails that include energy drinks should be considered a possible factor for aggressive behavior in bars as well. In another study, researchers surveyed 175 young adults who mixed alcohol with caffeinated energy drinks about their verbal and physical aggression in bar conflicts. More research is needed, but the study did find enough escalation in people consuming these drinks to label them a "potential risk" to increased hostility. Could you be in danger? Take the Domestic Danger Assessment Quiz. Was this page helpful? Article Sources
ESSENTIALAI-STEM
The Laws of Thermodynamics Book Summary - The Laws of Thermodynamics Book explained in key points Listen to the Intro 00:00 The Laws of Thermodynamics summary Peter Atkins A Very Short Introduction 4.2 (66 ratings) 29 mins Brief summary The Laws of Thermodynamics by Peter Atkins is a concise and accessible introduction to the fundamental principles governing energy and matter. It explores how these laws shape our understanding of the universe and drive everything from chemical reactions to climate change. Topics Table of Contents The Laws of Thermodynamics Summary of 10 key ideas Audio & text in the Blinkist app Key idea 1 of 10 If two systems are in mechanical equilibrium, then a third system in equilibrium with one will also be in equilibrium with the other. Thermodynamics concerns itself with systems. What we mean by this is: anything that has boundaries. A block of steel is a system. A combustion engine and the human body are also systems. Beyond those boundaries, we find the system’s surroundings. This could be a bath of cool water in a laboratory or the atmosphere around a system. Together, a system and its surroundings make up the universe. Systems can take different forms. This depends on the nature of their boundaries. Imagine a flask without a lid. That’s an “open system.” Pop a lid on the same flask and you’ve got a “closed system.” Then there are “isolated systems.” These aren’t affected by their surroundings at all. A vacuum flask is a good approximation of such a system. Right, now that we’ve defined our terms, let’s unpack the first concept we’ll need to get to grips with to understand thermodynamics – mechanical equilibrium. Picture two metal cylinders next to one another. Both are fully sealed except for a horizontal tube joining them together like a walkway between two buildings. This tube contains two pistons held together by a rigid rod. The pistons move this rod back and forth according to the pressure in their respective cylinders. If the pressure is higher on the right than on the left, the right piston pushes the rod toward the left cylinder and vice versa. This is like a tug-of-war, but with pushing rather than pulling. If the pistons don’t move, we can infer that the pressure in both of these cylindrical systems is equal. In this case, we say that they are in mechanical equilibrium. At this stage we can give our two existing cylinder systems names – we’ll call them “A” and “B” – before adding a third, “C,” and seeing what happens. Cylinder C is connected to A with another tube containing movable pistons. Let’s say these pistons don’t move and there’s no tug-of-war between A and C. We can now conclude that the pressure in both systems is the same and that A and C are in mechanical equilibrium. But what happens if we detach C from A and connect it to B instead? In a word, nothing. There won’t be a tug-of-war here, either. If C and A and A and B are in mechanical equilibrium, then C and B will also be in mechanical equilibrium. Why is this important? Let’s find out... Want to see all full key ideas from The Laws of Thermodynamics? Key ideas in The Laws of Thermodynamics More knowledge in less time Read or listen Read or listen Get the key ideas from nonfiction bestsellers in minutes, not hours. Find your next read Find your next read Get book lists curated by experts and personalized recommendations. Shortcasts Shortcasts New We’ve teamed up with podcast creators to bring you key insights from podcasts. What is The Laws of Thermodynamics about? The Laws of Thermodynamics (2010) is a short and accessible introduction to thermodynamics, the field of physics concerned with the relationships between different forms of energy. Authored by one of the world’s preeminent authorities on the subject, Peter Atkins, it explains the four laws that govern the universe – the zeroth, first, second, and third laws. Along the way, The Laws of Thermodynamics unravels the workings of familiar-sounding concepts like temperature as well as more exotic ideas like entropy and energy states. The Laws of Thermodynamics Review The Laws of Thermodynamics (2010) is a fascinating exploration of the fundamental principles that govern energy and matter. Here's why this book is worth reading: • It provides a comprehensive overview of the laws of thermodynamics, offering insights into how energy moves and changes in various systems. • With its clever analogies and clear explanations, the book breaks down complex concepts, making it accessible and engaging for readers of all backgrounds. • Through real-world examples and thought-provoking questions, it brings the abstract concepts of thermodynamics to life, making the subject matter relatable and far from boring. Who should read The Laws of Thermodynamics? • Quizzical types who’ve always wondered how the universe works • Humanities graduates looking for a gentle introduction to physics • Folks who love a good mental workout About the Author Peter Atkins is a renowned physicist and the author of over 60 books, including Physical Chemistry, a standard textbook used by students around the globe. Atkins is a Fellow of Lincoln College, University of Oxford, and a well-known face on the international lecture circuit. He has been a visiting professor in China, France, Israel, and New Zealand. Categories with The Laws of Thermodynamics Book summaries like The Laws of Thermodynamics People ❤️ Blinkist  Sven O. It's highly addictive to get core insights on personally relevant topics without repetition or triviality. Added to that the apps ability to suggest kindred interests opens up a foundation of knowledge. Thi Viet Quynh N. Great app. Good selection of book summaries you can read or listen to while commuting. Instead of scrolling through your social media news feed, this is a much better way to spend your spare time in my opinion. Jonathan A. Life changing. The concept of being able to grasp a book's main point in such a short time truly opens multiple opportunities to grow every area of your life at a faster rate. Renee D. Great app. Addicting. Perfect for wait times, morning coffee, evening before bed. Extremely well written, thorough, easy to use. People also liked these summaries 4.7 Stars Average ratings on iOS and Google Play 30 Million Downloads on all platforms 10+ years Experience igniting personal growth Powerful ideas from top nonfiction Try Blinkist to get the key ideas from 7,000+ bestselling nonfiction titles and podcasts. Listen or read in just 15 minutes. Start your free trial The Laws of Thermodynamics FAQs  What is the main message of The Laws of Thermodynamics? The main message of The Laws of Thermodynamics is the fundamental principles that govern energy and its transformations. How long does it take to read The Laws of Thermodynamics? The reading time for The Laws of Thermodynamics varies depending on the reader's speed. However, the Blinkist summary can be read in just 15 minutes. Is The Laws of Thermodynamics a good book? Is it worth reading? The Laws of Thermodynamics is a valuable read for anyone interested in understanding the fascinating world of energy and its laws. Who is the author of The Laws of Thermodynamics? The author of The Laws of Thermodynamics is Peter Atkins. What to read after The Laws of Thermodynamics? If you're wondering what to read next after The Laws of Thermodynamics, here are some recommendations we suggest: • Antimatter by Frank Close • Stillness Is the Key by Ryan Holiday • Stem Cells by Jonathan Slack • Gravity by Nicholas Mee • A Short History of Nearly Everything by Bill Bryson • How to Talk to Anyone by Leil Lowndes • The Intelligence Trap by David Robson • Ethics by Simon Blackburn • Limitless by Jim Kwik • Future Skills by Bernard Marr
ESSENTIALAI-STEM
Hamitabat, Söğüt Hamitabat is a village in the Söğüt District, Bilecik Province, Turkey. Its population is 160 (2021).
WIKI
Shipping container door locked How to secure containers: Actions every enterprise should take While working with developers to bring containers to production, security operations (SecOps) often faces conflicting requirements: They must balance agility and time-to-market demands from the development side of the house against the visibility and control mandated on the security side.  Fortunately, there are best practices you can fall back on to help ensure that you have an acceptable level of security and control in place when enabling containers. These are tried-and-true methods used by customers who are actively bringing containers to production. Previously I discussed three of my seven recommended best practices for securing enterprise container environments, including: • Proactively eliminating vulnerabilities before you deploy containers • Asserting control over the source and content of images, and • Hardening your container images, daemons, and your host environment . This time, I wrap up with integrating security into CI/CD tooling, enforcing role-based access control, automating runtime threat-detection and -defense, as well as performing regular security audits. Hybrid Cloud: New Challenge For Monitoring Solutions Integrate security into your CI/CD tooling If you use containers, you are probably using continuous integration (CI) or continuous delivery (CD) pipeline tools such as Jenkins, TeamCity, or CircleCI. One of the best places to detect and fix security vulnerabilities and configuration errors is as part of your CI/CD workflow. When you are building a new container image, you use the CI tool to initiate a security scan. The scan results are then imported into the native CI tool's console. Using CI tooling for security is not a novel concept, but it is a developer-friendly way to incorporate security into your development lifecycle. But note that security scanning, while important, does not take away from the importance of writing secure code and having a secure development lifecycle practice in the first place.  Enforce proper role segregation and access control for your container production environment Many organizations that use containers in production have a hard time enforcing fine-grained, role-based policies, which are used to regulate user access to container APIs. This is in large part due to the fact that the most popular container platform, Docker, has no native, fine-grained access control. Once you have access to one Docker command, you have access to all of them. That means your developers, testers, and operations personnel can have access to your production servers, and there is no way to limit what they can and cannot do. That's not a very comforting situation for most enterprises. You need a policy layer that can express constraints, such as dictating that developers can deploy containers (“docker –run”) but not list them (“docker –ps”); or that testers can deploy and delete containers, but not change the Docker daemon.  This policy layer should integrate with organization identity directories to allow role-based access control. To control access to a small number of Docker hosts, you can build your own authorization plugin and add that to your Docker daemon configuration. But to enforce role-based access control at scale in an enterprise environment, you need a management layer that enforces policies, integrates with enterprise identity management systems, and produces user access audit trails. Automate anomaly detection and threat defense in the container runtime Containers are minimal, declarative, and immutable. These characteristics mean that it is possible to build a reliable baseline for the containerized application. By using this baseline at runtime, you can detect possible anomalies and active threats targeting the application. However, building the baseline is not a trivial task, especially when you have many containers spinning up and down dynamically. The only way to do this is to automate the baselining process, including determining which ports are open in runtime, which processes will be spawned, which set of system calls will be initiated, and so on. This level of automation is possible with containerized applications because the nature of being declarative and immutable. You can determine runtime characteristics statically and be assured that they do not change throughout the lifetime of the container. Once you've built the baseline, you can use capabilities like secure computing mode (SecComp) to detect, for instance, syscall anomalies and block calls that do not fit the baseline. Central management of SecComp policies and the baseline profiles are also extremely important here, and this will be the topic of a future article. Perform regular security audits to prevent image and container sprawl Containers are flexible and easy to use. Anytime you want to change, you just make a new image. But this flexibility brings with it the risk of image and container sprawl. It's easy to end up with too many instances of images or containers, some of which may be obsolete and vulnerable. If you don’t manage them carefully, vulnerable images or containers could be put into production, putting your business at risk. Perform regular audits to identify unused, obsolete containers and image,  and eliminate them from your systems. So how do you do that? You can use commands such as Docker ps, and Docker images to list the containers or the images on the host. You can also use Docker logs to inspect which containers have been used recently, and so on.  Other commercially available tools offer automatic reporting and auditing capabilities. Using these tools, you can easily see if sprawl starts to consume too many system resources, and if so, eliminate unused images and containers from your registries and hosts. Nothing can ensure total security, but if you follow these 7 best practices you can feel confident about deploying containers for production use in the enterprise. Do you have additional suggestions? Feel free to post your opinions and suggestions below. Hybrid Cloud: New Challenge For Monitoring Solutions
ESSENTIALAI-STEM
Talk:W. Edwards Deming/to do Some editors of this article would like to bring it up to Featured article status. An action plan is required. Feel free to add to this list and cross out each item when completed. Sunray 22:10, 17 June 2006 (UTC) * 1) Refine the format for references and other style issues in line with the MoS done * 2) Determine overall format for article and any additional info or sections needed done * 3) Edit the entire article to make it more concise and readable done * 4) Footnote quotes. * 5) Create sub-articles with concise summaries in the main article. * 6) Add pictures and other graphics. * 7) Devise checklist for good article/featured article status. * 8) Evaluate against checklist. * 9) Final copyediting and submission. * 10) Add citations to some of the extensive quotes, such as the system of profound knowledge--which book is this from?
WIKI
Biodontics Biodontics dentistry was founded by Dr. Edward Rossomando in 2001 as an area of oral health. Biodontics is funded by the United States National Institute of Dental and Craniofacial Research (NIDCR). The purpose of Biodontics is to expand the dental profession in its research capacity, skill sets, and entrepreneurship. An educational program known as the Biodontics Educational Program is held at the University of Connecticut School of Dental Medicine every July and assembles business leaders, entrepreneurs, management executives, scientists, architects, and dental manufacturers to give presentations and lectures to students from all dental schools. NIDCR funding and dental educational reform New technologies and new educational models are believed by many to have disrupted and made obsolete the traditional models of dental education. The 1995 Institute of Medicine’s report, Dental Education at the Crossroads, suggested that dental schools must “continue efforts to increase the productivity of the dental work force, including appropriately credentialed and trained allied dental personnel”; and, “avoid policies to increase or decrease overall dental school enrollments.” The report’s recommendations stemmed from the fact that in 1993 six private dental schools closed; and many schools were plagued with inefficiencies which resulted in “gross wastes of student time [that added] to the student’s overcrowded week, squandering [of] patient time, and provided an inappropriate model of patient care.” Revisions in the process of accrediting dental schools was also recommended. In 2002 the NIDCR began an initiative to fund experimental educational programs in dental schools across the country. The Biodontics Educational Program is one such program. Biodontics Educational Program The Biodontics Educational Program (BEP) is held annually in July. The first class was made up of nine students from UConn; while the 2006 class was made up of 24 students from the Howard University, Marquette University, UConn, and New York University (NYU) dental schools. The program consisted of lectures and presentations from business leaders, entrepreneurs, management executives, scientists, architects, and dental manufacturers. New technologies, such as probiotics, dental lasers, as well as business practices including Kaizen training, were included in the program to offer students a wide range of experience. The rationale in exposing dental students to a wide range of fields is to prepare them for owning their own businesses and managing these businesses, and incorporating new technologies at a faster rate. The American Biodontics Society The American Biodontics Society was formed in 2005 with the mission to promote an active, expanding profession that is adaptable and accountable to new technologies and procedures, thereby improving the general oral health of the United States and enhancing its accessibility. The ABS acts as a forum for the detailed evaluation, discussion, and analysis of innovations in dentistry. The ABS has chapters developed or developing at New York University (NYU), Howard University, UConn, and Marquette University. Dental Hypotheses(ISSN: 2155-8213) is the official publication of the American Biodontics Society.
WIKI
Audio Sensor to Measure Rain Intensity 1,356 26 5 Published Introduction: Audio Sensor to Measure Rain Intensity For an assignment for the TU Delft we (Irene and Philippine) have made an audio sensor that measures rain intensity. This is also known as a disdrometer. Step 1: Materials We have used the following materials for this device: - A photon - A breadboard - SparkFun sound detector - 3 header pins - 3 female wires - A petri dish - Material to elevate the device (in our case a plastic lid) - A plastic cup - Duct tape - Wires (to extend the female wires) - Ruler And the following tools: - Soldering gear Step 2: Placement of the Wires First, solder the three header pins onto the GND, VCC and Envelope circles of the SparkleFun sound detector. Make sure to attach them to back side of the sound detector (the side that is completely flat), this is better for the placement of the sound detector in the petri dish. If you want the wires to be longer, like we wanted (to prevent water coming near the photon), cut the female wires somewhere. Attach an extra wire to the now open ends of the female by soldering the two parts together. Cover the attachments with duct tape. Then you need to connect wires to the sound detector and the photon. Connect a wire from the GND on the sound detector to the GND on the photon (red wire in the picture), another wire from VCC on the sound detector to 3V3 on the photon (green wire) and the last wire from ENVELOPE on the sound detector to A0 on the photon (blue wire). Step 3: Assemble the Device Using duct tape, attach the sound detector to the upper part of the petri dish with the front facing upward. Hold the upperpart of the petri dish at an angle and fill the inside with cotton pads. Duct tape the upper and lower part of the petri dish together and place it on top of something to elevate it (in our case a plastic lid). We have simulated rain by making a hole in the bottom of a plastic cup: if you fill the cup with water, the water will leave the cup in the form of rain drops. Step 4: Write a Code We have written the code that is shown in the image. We have set the threshold for our code on 850, to distinguish a raindrop from background noise. An amplitude higher than 850 indicates a raindrop and make the count go up by one. The device measures the sound per one tenth of a second and counts the number of raindrops per minute. This number is then printed in a google spreadsheet. If you want to know which value for a threshold will be the best in your situation, leave out the slashes in the 17th and 18th line and test what amplitude you get when you let it rain on your device. Step 5: Calculate the Depth of the Rainfall With this code, you measure the number of raindrops per minute. If you want to know the depth per minute, you should first measure the radius of your petri dish with a ruler. The area of the surface of the petri dish is A = π * r^2. Then you should measure the volume of a rain drop. We did that by filling our plastic cup by an amount of water, and counting the number of raindrops that fell out of it. Dividing the amount of water by the number of raindrops, you have the volume of one raindrop. If you divide the volume of one raindrop by the area of the petri dish, the outcome will be the depth of the rain per raindrop. If you multiply the number of raindrops per minute by the depth per raindrop, you have calculated the depth of the water that has fallen on your device in one minute. Share Recommendations • Water Contest Water Contest • Clocks Contest Clocks Contest • Creative Misuse Contest Creative Misuse Contest 5 Discussions They probably don't, however for the purpose of our research we have assumed they do. We didn't include it in our project, but it is possible to measure the size of the rain drops with this disdrometer. The amplitude is higher for a larger rain drop than for a smaller one. If the disdrometer is calibrated right, you can measure the difference between the size of the rain drops as well! ok. makes sense. Just curious will thunder be interpreted as rain drops? Interesting question, I think it will if it's close enough to the sensor. If the sensor measures an amplitude that is higher than the threshold (850), it will think that it's a raindrop. But it will measure only one raindrop (per tenth of a second), even if the amplitude of thunder is a lot higher than the amplitude of a raindrop. This would have been really cool to have when we lived in Okinawa :)
ESSENTIALAI-STEM
Page:Poet Lore, volume 28, 1917.djvu/493 Rh She wandered in the woods All day, by starshine, too, Her pale face disconsolate, Her eyes sad to view; She wrung her hands with sorrow As for death to sue. Why does sadness mar the grace Of one so fair as she? Why greets she not the flowers, Singing joyfully? —He has been drowned, her lover, In the sea. He has been drownèd in the sea Whom she has loved always; No joy, Nor lovely thing to praise, Nor peace, will ever come to her Through her nights and days. "I must find my love, My lover in the sea; I cannot live so far away From him," wept she. Sinking down upon the grass, "May death come to me." The stars came out... like a slender thread Upon the grasses green Her long white robe lay motionless Like a silver seam. But in the morning it was gone — And there appeared a stream! A silver stream flowed in the wood Where she had wandered through, And if you listened to its voice It sang to you,— Every stream meets the sea, The sea that is deep and blue.
WIKI
Visible to the public Biblio Filters: Keyword is electrical vehicles  [Clear All Filters] Conference Paper de Oliveira Saraiva, F., Nobuhiro Asada, E..  2014.  Multi-agent systems applied to topological reconfiguration of smart power distribution systems. Neural Networks (IJCNN), 2014 International Joint Conference on. :2812-2819. One of the various features expected for a smart power distribution system - a smart grid in the power distribution level - is the possibility of the fully automated operation for certain control actions. Although this is very expected, it requires various logic, sensor and actuator technologies in a system which, historically, has a low level of automation. One of the most analyzed problems for the distribution system is the topology reconfiguration. The reconfiguration has been applied to various objectives: minimization of power losses, voltage regulation, load balancing, to name a few. The solution method in most cases is centralized and its application is not in real-time. From the new perspectives of advanced distribution systems, fast and adaptive response of the control actions are required, specially in the presence of alternative generation sources and electrical vehicles. In this context, the multi-agent system, which embeds the necessary control actions and decision making is proposed for the topology reconfiguration aiming the loss reduction. The concept of multi-agent system for distribution system is proposed and two case studies with 11-Bus and 16-Bus system are presented.   Rudolph, Hendryk, Lan, Tian, Strehl, Konrad, He, Qinwei, Lan, Yuanliang.  2019.  Simulating the Efficiency of Thermoelectrical Generators for Sensor Nodes. 2019 4th IEEE Workshop on the Electronic Grid (eGRID). :1—6. In order to be more environmentally friendly, a lot of parts and aspects of life become electrified to reduce the usage of fossil fuels. This can be seen in the increased number of electrical vehicles in everyday life. This of course only makes a positive impact on the environment, if the electricity is produced environmentally friendly and comes from renewable sources. But when the green electrical power is produced, it still needs to be transported to where it's needed, which is not necessarily near the production site. In China, one of the ways to do this transport is to use High Voltage Direct Current (HVDC) technology. This of course means, that the current has to be converted to DC before being transported to the end user. That implies that the converter stations are of great importance for the grid security. Therefore, a precise monitoring of the stations is necessary. Ideally, this could be accomplished with wireless sensor nodes with an autarkic energy supply. A role in this energy supply could be played by a thermoelectrical generator (TEG). But to assess the power generated in the specific environment, a simulation would be highly desirable, to evaluate the power gained from the temperature difference in the converter station. This paper proposes a method to simulate the generated power by combining a model for the generator with a Computational Fluid Dynamics (CFD) model converter.
ESSENTIALAI-STEM
Foreign U.S. bond holdings at Fed steady despite strong dollar July 26 (Reuters) - Foreign central banks’ holdings of U.S. Treasuries at the Federal Reserve held firm in the latest week even as the dollar hovered at its strongest level in over a year, Fed data released on Thursday showed. The U.S. central bank’s custody holdings of U.S. government debt securities for overseas central banks totaled $3.036 trillion on July 25, little changed from $3.035 trillion the week before, according to Fed data. Back on March 14, foreign official ownership of Treasuries at the Fed reached $3.109 trillion, which was the most on record. On July 19, the dollar reached its highest level against a basket of currencies since July 14, 2017 on signs of solid economic growth and safe-haven demand due to worries about trade frictions between the United States and its major trade partners. Asian currencies have been hard hit the past two weeks as the Trump administration has ratcheted up its call for more tariffs against China. The Chinese yuan has weakened about 1.48 percent in the past two weeks. The Korean won and Indonesian rupiah also have fallen against the dollar. Overseas central banks could pare their U.S. Treasuries holdings when the dollar strengthens to defend their currencies in a bid to stem capital outflows. On the other hand, they could buy more Treasuries to help lower the value of their currencies against the dollar. A Reuters poll released on Thursday showed investors raised bearish bets on all emerging Asian currencies. Foreign central banks can keep their U.S. bond holdings outside the Fed. Reporting by Richard Leong; editing by Diane Craft
NEWS-MULTISOURCE
Telegram Bots - what are they and how to create your own bot for telegram messenger Alice bot Today all smartphone users can be divided in two groups. The first (and the largest) one yet does not realised what the telegram bot is and what is it for. The second one uses the smart virtual assistants (called bots) with pleasure. Furthermore some of the second group users even think about telegram bot development of their own. Lets try to understand what is going on and what are the main significant features of this great technology. Telegram messenger is a recent creation of famous Pavel Durov (for those who are really in the tank - Pavel is the founder of the popular Russian social network VKontakte). The main features of the messenger are increased messaging privacy and performance. In addition, the Telegram has open API and the Bot API. This allows anyone to create alternative clients and special helper programs, called robots or just bots. This opportunity is especially liked by programmers, enthusiasts and professional developers of different services. hyip demo bot Those who still does not understand what telegram bot is, they probably just never used either the Telegram messenger, or the bot. Or they were just out of luck and got a low quality telegram bot. Indeed, because of the relatively low entry level into the community of telegram bot developers, many bots are entry-level creatures and spoil the overall impression. But there are different catalogs of bots, which present Telegram Bot Top or best bots for telegram. Interesting and useful bots for telegram messenger. Here are the most popular search queries connected with telegram bot (according to google data on 01.02.2017): ⚡ telegram chat bot ⚡ Telegram Stickers bot ⚡ telegram bot list ⚡ telegram channels list ⚡ telegram bot store ⚡ telegram robot ⚡ create robot telegram ⚡ telegram gruppi ⚡ telegram hot bot ⚡ telegram app download ⚡ best telegram bots ⚡ telegram bot php ⚡ create bot telegram ⚡ telegram channels bot ⚡ sticker bot telegram ⚡ telegram bot search ⚡ telegram id search ⚡ bot whatsapp ⚡ telegram hack app ⚡ telegram chat id ⚡ telegram gif bot ⚡ come creare un bot su telegram ⚡ telegram add bot to channel ⚡ bot video telegram ⚡ make telegram bot Cool Face - Selfie editor In general bot is the service similar to many of the services that we use in the Web. For example, consider the web-site of the library. The user comes to the library site via a web browser, makes a login, inputs the necessary keywords to find the book, downloads the book (paid or free) in a specific format, opens the reader and reads the book. Thus the purpose of the library service is to get the user a request and then search the book and provide query results in a certain form of answer. Also, there are applications for mobile devices. In fact, they are the same services presented in the form of applications for the operating system IOS (iPhone, iPad) or Android. But what is the difference between the telegram bot and a traditional website or a mobile application? Let's make it more clear. 1. Contrary to web-site, the bot does not require user registration. The bot already knows and identifies the user in the Telegram messenger. Sometimes registration can be a significant problem for the site user. Typically, the site can not provide service w/o registration because in this case, the service will be used by automatic systems and web-bots that (with few exceptions) will suck out the service data and set the the site worth to zero. On the other hand, not every user wants to register on the site and give their personal (or not very) data to the service. For telegrams bot this problem does not exist. Once you started telegram bot from your contact list, the bot identifies you and works with you personally. 2. The Bot has a simplified interface. Casual bot interface is the small number of buttons and input text string. Thus, the robot does not overload the user's mind with a bunch of buttons, menus, submenus, etc. Generally, the interaction with the user interface is the most important for robot or any other services, including Web sites. When you create a bot for telegram it is hard to overload interface functionality, as in this case there will be no place for necessary functions. Furthermore, the user interface (in terms of the position of functional elements) looks exactly the same, regardless of the screen size and operating system. And this is a very important point. Indeed, in the past few years, each of us have faced with the problem of displaying web sites on a mobile devices. In pursuit of versatility webmasters constantly modify the design of their sites, without testing on all different devices. As a result, user suffers: correct site view can only be achieved on a desktop computer. Thus, in terms of UI (user interface) bots for Telegram are much simpler and therefore more reliable. 3. Unlike a website, telegram bot can send a push notifications to the user. Of course, as in a mobile application, the user can turn off notifications for a particular bot. But if we talk about the difference between a website and the bot, providing feedback to the user is a very important and fundamental difference in favor of telegram bot. 4. Easy (and therefore cheaper) development. Actually the telegram bot developer creates only ONE bot. After that it is guaranteed worked on ALL devices and operating systems that support the Telegram messenger. And now remember the pain in the ass during developing mobile apps for a minimum of 3 OS (IOS, Android, Windows) + many problems with placing the applications in AppStore, Google Play, etc. pool info bot We just have found four huge and fundamental differences between traditional technology in favor of the Telegram bot. Of course, there are also negative aspects. Telegram is mostly a text messenger and is not good with dynamic graphics. Telegram team offer a solution for this problem: graphics apps can be embedded into messenger through HTML5. But it is rather crude technology, with its pros and cons. Honestly, Telegram is okay without it. It is not always the person needs to work with graphics. For implementing text services Telegram bots fit best. To be the best in its class, probably, is the task of the maximum, which Telegram solves just fine. We have just come to knowledge what the Telegram bot really is. Lets proceed to the aspects of the Telegram bot development. Let's talk about the development of chat bots and developing bot for Telegram. As discerning reader may guess, this SEO-article is written primarily for the search engine robots. But if you are still reading, lets continue. Generally speaking to make the bot for Telegram is quite simple. But is it so simple to make the really good and useful bot? If that were the case, the world would be much better than one we have. In reality, to do something useful, one must have a long time study, then a long time work, then bring to production about one or ten projects. And after that, having a luggage of useful knowledge, one should start creating something really worthwhile. Of course, finally, it also will result in some kind of garbage, but nevermind, it's ok. What is inside the bot? Nothing special. Really. Artificial intelligence or Terminator is still not there. It is the same web service. In fact, what it is called a telegram bot is a web service + some simple interface to work with information messages. The service itself can be implemented in almost any programming language (Java, JS, PHP, Python, etc.). Also one needs an application server supporting protocol https. Thus, to develop and stert a bot for Telegram to you need a web server with an external IP (or domain name) and the SSL-certificate that provides data transfer between your server and the Telegram server via a secure https protocol. If you already have experience with hosting providers, installing and running a bot for Telegram will be easier for you. If no such experience, try to install any CMS on the hosting, or just order ready for use Telegram bot. There are a bunch of manuals on creating a telegram bot php or telegram bot python. We will not repost it. We hope you catched the point. In terms of service Telegram bot is similar to the website service. You must pay the IP or domain name, web hosting and SSL-certificate. Fortunately you can host an unlimited number of bots on the one site. The amount of payment depends on the number of clients served by the bot, and the number of user requests. In practice, Telegram bots are not the most highly loaded systems. Nevertheless, large integrated systems can be quite difficult to develop and support, thus require fairly significant investment. Next time we'll talk about the integration of modern payment systems with Telegram bot. For example, bitcoin bot for Telegram. Also we reveal some secrets about Telegram bot promotion and other interesting and useful features. Such as bot constructor and Telegram search bot. Stay with us! The article is written special for telega.ga. Copying without permission of the owner is illegal and will be prosecuted. Or it will not. Anyway it is better to make a link. Create custom Bot for Telegram The most simple way to create your best Telegram bot is to start our @tgprobot The bot accepts orders for Telegram bot developing and consulting. Also it is a good idea to read the FAQ. If for some reason you can not use @tgprobot, please use the feedback form below. Feedback kaptcha
ESSENTIALAI-STEM
pandour Etymology From, from , a follower of a banner. Noun * 1) One of a class of Croatian skirmishers serving in the Austrian army. * 2) A robber. * 1) A robber.
WIKI
Page:The leopard's spots - a romance of the white man's burden-1865-1900 (IA leopardsspotsrom00dixo).pdf/182 "Haven't smelled a coward anywhere have you, deacon?" "I've seen one or two a little fidgety, I thought. Cheer 'em up with a word, Preacher." Springing on the platform of the judge's desk he looked over the crowd for a moment, and a cheer shook the building. "Boys, I don't believe there's a single coward in our ranks." Another cheer. "Just keep cool now and let our enemies do the talking. In ten days every man of you will be back at home at his work." "How will we get out with the writ suspended?" asked a man standing near. "That's the richest thing of all. A United States judge has just decided that the Governor of the state cannot suspend the rights of a citizen of the United States under the new Fourteenth Amendment to the Constitution so recently rammed down our throats. Hogg is hoisted on his own petard. Our lawyers are now serving out writs of Habeas Corpus before this Federal judge under the Fourteenth Amendment, and you will be discharged in less than ten days unless there's a skunk among you. And I don't smell one anywhere." Again a cheer shook the building. An orderly walked up to the Preacher and handed him a note. "What is it?" "Read it!" The men crowded around. "Read it, Major Dameron, I'm dumb," said the Preacher. "A military order from the dirty rascal. Berry, commanding the mountain bummers, forbidding the Rev. John Durham to speak during his imprisonment!" A roar of laughter followed this announcement.
WIKI
Manic depression is an illness that affects how people think, feel, and act. These people have really extreme episodes of mania (highs) and depression (lows. ) It happens to about 1% of the population, both equally in men and women. When the person is going through a manic episode they have lots of energy, talk fast, jumping from topic to topic. Also, their thoughts are racing, they have a higher self-esteem, and have more enthusiasm. They also may not need as much sleep. During this time, the person feels normal and they are not aware that they " re behaviors may not be normal. They almost feel if the are 'on top of the world.' ; A depression episode on the other hand is almost opposite of a manic one. During a depressive episode, the person is sad, irritable, has low self-esteem, negative thoughts, and loss of interest in usual activities. They feel like they " re worthless and hopeless. They also have negative thoughts towards the past and future. Many people go through guilt, crying, or having suicidal thoughts. Unlike a manic episode, the person has lack of energy, and either an appetite loss or gain. Manic depression is a recurrent illness, so a person usually has more than one episode. These episodes can last from weeks to months. They occur whenever and have no certain pattern. Sometimes a stressful life event can trigger an episode, and sometimes they just happen. If a person has more than four episodes a year they are known as 'rapid cycles'; . This is more common in women. There is no exact reason for what causes manic depression, but some doctors say that it may be from imbalances of certain kinds of brain chemicals. Heredity also has a little part to do with it. Manic depression is treatable though. Medication, such as lithium can be given. Counseling can also help the person lead a more normal and productive life. Manic depression is a serious illness but it can be treated, so the person can get back to a healthy lifestyle.
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Rufus Pudens Pudentianna The result of the debate was Merge per Zordrac. &mdash; F REAK OF N URxTURE ( [ TALK ] ) 21:06, Dec. 25, 2005 Rufus Pudens Pudentianna An entirely unhistorical character made up by arbitrarily combining a Rufus described in Romans as sharing a mother with Paul with a Pudens mentioned in 2 Timothy, assuming this is the same Pudens mentioned by Martial, and equally arbitrarily adding the (mis-spelled) name of a probably apocryphal female saint. There is also a page for St. Pudens, supposedly an early Roman Christian, so any verifiable information about him can go there. Nicknack009 22:49, 30 November 2005 (UTC) * Merge into Pudens as article stubs suggest. Zordrac 01:13, 2 December 2005 (UTC) '''Relisting this AfD discussion in hopes of attaining a more thorough consensus. Please place new discussion below this line.''' → Ξxtreme Unction {yak ł blah } 17:08, 6 December 2005 (UTC) * Merge per User:Zordrac. Pilatus 17:18, 6 December 2005 (UTC) * Merge per above Just zis Guy, you know? [T]/[C] (W) AfD? 21:06, 6 December 2005 (UTC) * Keep However, Aulus Aemilius Pudens and Pudens seem to need a Merge - Otus 21:16, 6 December 2005 (UTC)
WIKI
Talk:UK RFD discussion: July–August 2021 Adjective: * British; related to the United Kingdom. Removed by DanTrent yesterday; added on 30 September 2011 by Mglovesfun (“adjective, perhaps a questionable one”). J3133 (talk) 18:16, 1 July 2021 (UTC) * Keep Deleted. Occurrences as seen in “UK towns and cities” are simply attributive uses of the proper noun. --Lambiam 18:38, 1 July 2021 (UTC) * I agree with Lambiam; DanTrent may have been unaware of RFD procedure. DonnanZ (talk) 23:25, 1 July 2021 (UTC) * Keep deleted per above. ←₰-→ Lingo Bingo Dingo (talk) 13:50, 3 July 2021 (UTC) * Remains deleted. Plainly a case of not grasping or maintaining the distinction between adjectives and attributive nouns; cf the recent RFV discussion of "smoke" in "smoke particles". - -sche (discuss) 21:32, 5 August 2021 (UTC)
WIKI
Rimavské Zalužany Rimavské Zalužany (Rimazsaluzsány) is a village and municipality in the Rimavská Sobota District of the Banská Bystrica Region of southern Slovakia. In the village are public library, kindergarten, train stop, foodstuff store and a pub. The most important sightseeing is neogothic belfry from the half of 19 th century.
WIKI
Gyeong Bok Jung, Jeong-Eun Huh, Hyo-Jung Lee, Dohyun Kim, Gi-Ja Lee, Hun-Kuk Park, and Jae-Dong Lee  November 2018 Abstract We demonstrated the apoptotic effect of bee venom (BV) on human MDA-MB-231 breast cancer cells using Raman spectroscopy and principal component analysis (PCA). Biochemical changes in cancer cells were monitored following BV treatment; the results for different concentrations and treatment durations differed markedly. Significantly decreased Raman vibrations for DNA and proteins were observed for cells treated with 3.0 µg/mL BV for 48 h compared with those of control cells. These results suggest denaturation and degradation of proteins and DNA fragmentation (all cell death-related processes). The Raman spectroscopy results agreed with those of atomic force microscopy and conventional biological tests such as viability, TUNEL, and western blot assays. Therefore, Raman spectroscopy, with PCA, provides a noninvasive, label-free tool for assessment of cellular changes on the anti-cancer effect of BV. 1. Introduction Bee venom (BV) extracted from honey bees is commonly used in Korean medicine to treat diseases, including pain, arthritis, tumor, and skin diseases [1–3]. It is composed of a complex mixture of biologically active peptides, including melittin (a major component of BV), apamin, adolapin, mast-cell-degranulating (MCD) peptide; enzymes (phospholipase A2, and hyaluronidase), and non-peptide components (histamine, dopamine, and norepinephrine), which have a variety of pharmaceutical properties [2–5]. Recent studies have shown that BV has anti-cancer effects, including induction of apoptosis and inhibition of proliferation in various cancer cells, such as prostate, breast, lung, liver, ovarian, and bladder [3,6–9]. The efficacy of BV appears to be due to the synergistic effect and selective cytotoxicity of melittin, and this anti-cancer peptide might be a better choice than the native form of BV [10,11]. The interaction of anti-cancer agents with the affected cells is considered to be very important for the selection and optimization of a drug to attain the most effective cancer treatment. It is well known that the function of an anti-cancer agent is to induce apoptosis of the target cancer cells. Apoptosis is characterized by cellular morphological changes, such as shrinkage, membrane blebbing, DNA cleavage, caspase activation, and mitochondrial dysfunction [12–14]. Assays for apoptosis, such as MTT and western blot that measure enzymatic activity and protein synthesis as endpoints and are associated with cell viability, have been investigated for chemosensitivity testing [15]. These assays are invasive, destructive, time-consuming, labor-intensive, and involve complicated procedures. Furthermore, it requires large amounts of material, while the product yield is low. The dynamics of the interactions cannot be examined directly with these assays as the introduction of fluorescent labels during measurement can change the biological conditions. Therefore, a non-invasive, label-free analytical technique is needed for the real-time monitoring of live cells. Raman spectroscopy is a non-invasive and rapid detection technique that requires no sample labeling prior to analysis [16–19]. Thus, this technique is being explored extensively for the analysis of biological systems. Raman spectroscopy provides quantitative information about the molecular structure, chemical composition, and molecular interactions within the cells, with high sensitivity and selectivity. The intracellular information about nucleic acids, proteins, lipids, and other components can be explored using variations in spectral shape or intensity [20–23]. Raman spectroscopy has been applied for the analysis of the effect of external agents on the cells, causing specific time-dependent biochemical changes associated with the process of cell death [24–29]. Notingher et al. used Raman spectroscopy to measure the time-dependent molecular changes in cells during apoptosis [28]. Byrne et al. evaluated the effect of the chemotherapeutic drug Actinomycin D in A549 lung cancer cell line using Raman spectroscopy [30]. However, the anti-cancer effect of BV on breast cancer cells has not been evaluated by Raman spectroscopy. In this study, we investigated the biochemical changes at the molecular level in human MDA-MB-231 breast cancer cells using Raman spectroscopy following exposure to BV. In addition, we examined the correlation between the Raman data and the results from conventional cytotoxicity assays and apoptotic DNA damage. We also investigated the morphological characteristics of MDA-MB-231 cells following BV treatment using atomic force microscopy (AFM). 4. Conclusion In this study, we demonstrated the effects of concentration- and time-dependent BV treatment using Raman spectroscopy along with multivariate analysis. The Raman spectrum for the cells treated with 3.0 µg/mL of BV for 48 h corresponded to the Raman bands assigned to DNA and protein, and demonstrated a decrease in signal intensity, which was attributed to nuclear fragmentation and protein degradation. Differences in Raman spectra between the control and BV-treated cells correlated with the cellular events during apoptosis. The results of Raman spectroscopy showed good agreement with AFM and the conventional biological assays, such as viability, TUNEL, and western blot assays performed on the same types of cells. This study provides a new method to monitor the concentration- and time-dependent multi-molecular events via measurement of the vibrations of various biomolecules in living cells. Therefore, Raman spectroscopy along with multivariate analysis might be a useful tool for a label-free and noninvasive investigation of the anti-cancer effect of BV on human breast cancer cells.
ESSENTIALAI-STEM
FC Benkovski Byala FC Benkovski (ФК Бенковски) is a football club based in Byala, Bulgaria. Its home stadium Georgi Benkovski has a capacity of 3000 seats. Club colors are blue and red. Current squad For recent transfers, see List of Bulgarian football transfers summer 2014.
WIKI
Black Men Arrested at Starbucks Speak Out After Settlement The two black men arrested at a Philadelphia Starbucks last month spoke out after reaching a settlement with the city for a symbolic $1 each and a $200,000 pledge from Philadelphia to fund a program for young entrepreneurs. “We took a negative and turned it into a positive… we can keep moving forward like we truly want to,” Donte Robinson told Robin Roberts on Good Morning America (GMA) Thursday, alongside his friend who was also arrested, Rashon Nelson. Robinson said the city-funded foundation will focus on teaching students not only about entrepreneurship, but also etiquette and financial literacy. "We took a negative and turned it into a positive… we can keep moving forward like we truly want to." ABC NEWS EXCLUSIVE: @RobinRoberts sits down with the two men arrested in that Philadelphia Starbucks; how they hope to turn this "moment into a movement" pic.twitter.com/nwQKDvPrvh — Good Morning America (@GMA) May 3, 2018 “The most important thing is the foundation,” Nelson said. “The fact that we have a seat at the table, to work on reforms to be included in racial bias training. And hopefully other companies will take what Starbucks is putting into perspective, and [they’ll] follow.” The two men said they will participate in Starbucks’ company-wide racial bias training happening later this month alongside former Attorney General Eric Holder, who has been an advocate for Robinson and Nelson. Additionally, Robinson said Starbucks offered to help the men pay for classes needed to finish the remainder of their Bachelor’s degrees. “They did [this] through dialogue and cooperation,” Robinson and Nelson’s attorney, Stewart Cohen, said on GMA . “The CEO of Starbucks is going to personally mentor these two young men going forward. “After they met, he was so impressed, and they were so impressed with one another, that they’re going to have a continuing relationship,” Cohen added. “So not only do they have a seat at the table, and not only do we have this settlement, but we have the beginning of a relationship.” Cohen noted that the $200,000 grant from Philadelphia will likely only last for a year, but Robinson and Nelson are committed to extending their program beyond that. “The goal is to bring people together so we can continue this for generation after generation,” Nelson said. “This is not something that we just want to do for a year with the grant that we are blessed with. This is something we want to bring people together and get commitments so that people can come together and we can raise money and we can continue this program not just in Philadelphia, but in cities worldwide.”
NEWS-MULTISOURCE
BPH Pain July 17, 2023 The prostate is an important component of the male reproductive system. It sits just below the bladder, lays in front of the rectum, and straddles the urethra. When a man is in his prime, the prostate gland is about the size of a walnut, but as a man ages, the prostate continues to grow. BPH, or benign prostatic hyperplasia, is a condition unique to men and becomes more prevalent as a man grows older. BPH’s cause isn’t completely known, but it is thought to stem from hormonal changes as men age. Also known as prostatic hyperplasia or an enlarged prostate, BPH is the medical term for the excessive enlargement of prostate tissue that is common in men once they reach the fourth to sixth decades of their life and beyond. BPH is not prostate cancer and doesn’t lead to it or increase the risk of developing prostate cancer, but BPH can cause a variety of lower urinary tract symptoms, or LUTS, including possible discomfort and pain. While BPH pain isn’t typically a prominent symptom, some men may experience tenderness or some pain as the enlarged prostate begins pressing up against the urethra, bladder, and surrounding tissues. Even though benign prostatic hyperplasia is the cause of many lower urinary tract symptoms, and erectile dysfunction and ejaculatory issues can be experienced by men at the same time as other BPH symptoms, BPH does not cause these two issues. However, some medications taken to help relieve BPH symptoms can cause erectile dysfunction and ejaculatory issues. LUTS, brought on by BPH, can present a multitude of symptoms, including pain, which can become increasingly bothersome to men as they grow older. When these symptoms begin to become problematic it’s a good idea to schedule a checkup with a healthcare professional. Benign prostatic hyperplasia is typically diagnosed by a urologist, but a primary care physician familiar with BPH symptoms and who can order the proper tests can also provide a diagnosis. Unfortunately, benign prostatic hyperplasia is common in aging men and eventually nearly every man will experience BPH if they live long enough. BPH Symptoms that Can Cause Pain BPH pain can occur due to certain lower urinary tract symptoms, or LUTS. However, prostate tenderness and pain can also be caused by acute prostatitis (bacterial infection of the prostate). In addition, BPH can contribute to the possibility of getting prostatitis, but the two are completely separate issues.1 The enlarged prostate can cause LUTS by putting pressure on the urethra, which is the tube that carries urine from the bladder out of the body. It can also put pressure on the bladder. This pressure can cause some symptoms that could be painful, including: • Urinary retention • Difficulty starting urination • Pushing to urinate • Urinary urgency • Urge incontinence • Blood in the urine In some cases, benign prostatic hyperplasia can lead to more serious complications, such as urinary tract infections, prostatitis, kidney stones, bladder decompensation, or kidney failure. While it may be prudent to take a watchful waiting approach if BPH symptoms are mild and responsive to lifestyle changes, once BPH symptoms become more moderate or severe, it is a good idea to begin more aggressive treatment by employing BPH medication, a minimally invasive BPH procedure or surgery to address LUTS brought on by BPH. There is no absolute cure for BPH, aside from completely removing the prostate, but there are many treatments that can shrink prostate tissue and greatly relieve symptoms both temporarily and long-term. Treatment options include: • Lifestyle Changes: Good lifestyle modifications to head off or address benign prostatic hyperplasia include losing weight, exercising regularly, reducing stress, Kegel exercises, eating more fruits, vegetables, whole grains, nuts, seeds, fish, and vegetables, controlling the amount of dietary fat, possibly drinking alcohol in moderation and completely emptying the bladder each time. • Medications: Several medications can help shrink the prostate gland (5-alpha-reductase inhibitors) or relax the muscles around the urethra (alpha-blockers). • Surgery: If lifestyle changes and medications are not effective, surgery may be an option. Some good surgical procedures exist which are minimally invasive and can be utilized to treat BPH. BPH Pain Treatment Pain is not an overly common symptom when describing the effects of benign prostatic hyperplasia, but some men may describe pain or discomfort in the groin, lower abdomen, or pelvic area. Often, this pain is due to the enlarged prostate putting pressure on surrounding tissue or causing a urinary obstruction. If pain or discomfort is experienced with BPH, it is important to contact a doctor so the doctor can perform an examination, assess the symptoms and perform any additional tests such as a prostate-specific antigen (PSA) test, blood test, or any imaging to rule in/out possible pain causes. Treatment options for BPH-related pain often center on managing the underlying condition. Suggestions such as lifestyle changes that allow for the avoidance of caffeine and fatty foods, limiting the intake of fluids before bedtime, logging enough sleep, getting regular exercise and maintaining a healthy weight can help with managing benign prostatic hyperplasia and any pain that may be experienced. Trying to empty the bladder as much as possible each time, without straining, is another way to minimize any fluid retention discomfort. Anyone who has experienced bladder pain when unable to find a bathroom when the urge hits, or not being able to urinate at all because of acute urinary retention, knows that the pain can be severe due to the pressure the confined urine places on the bladder. Both chronic and acute urinary retention can cause life-changing and life-threatening issues respectively, so it is a matter of importance to address. Managing BPH Pain If experiencing any lower urinary tract symptoms due to benign prostatic hyperplasia, or BPH, discomfort, or pain, it is important to schedule a visit with a doctor. Early diagnosis and treatment of benign prostatic hyperplasia can help prevent complications and improve the quality of life. Here are some tips for managing BPH pain: • Drink plenty of fluids: This will help to keep the urine flowing and reduce the risk of urinary tract infections. Moderate consumption of alcohol may help with BPH2 • Avoid caffeine: Sodas, energy drinks, and coffee can irritate the bladder and worsen symptoms. • Empty the bladder fully: This will help prevent the bladder from becoming overfull and causing pain. • Avoid straining when urinating: This can put pressure on prostate tissue, the urethra, and the bladder, thus worsening symptoms. • See a doctor: If symptoms are not getting better or if they are causing significant discomfort, a diagnosis should be sought from a urologist or primary care physician. If experiencing pain or discomfort from benign prostatic hyperplasia, it is important to speak with a doctor about the best way to manage lower urinary tract symptoms, or LUTS, associated with BPH. Lifestyle changes for addressing prostatic hyperplasia can be successful in mild cases. With moderate BPH symptoms, medications could be a solution for addressing LUTS brought on by BPH if surgery is not desired. However, some BPH medications can come with potentially unwanted side effects such as ejaculatory or erectile dysfunction. With more severe BPH cases minimally invasive procedures or surgery may be needed to get true relief. Even though BPH is not prostate cancer, and doesn’t lead to cancer, prostate cancer can present concurrently with BPH, so a digital rectal exam (DRE) and a PSA test that includes a Free PSA component are appropriate ways to initially investigate all possibilities. Some men can be diagnosed with BPH yet show no symptoms. Other men will only have minor LUTS with BPH, while others will have moderate to severe LUTS because of BPH. Family history can determine the odds of being diagnosed with BPH, as can lifestyle choices and environmental conditions. However, if pain or discomfort is ever part of the equation, consultation with a healthcare professional should be a priority.   References: 1) https://www.healthymale.org.au/news/prostate-enlargement-vs-prostatitis-vs-prostate-cancer-whats- difference#:~:text=Recurring%20bacterial%20prostatitis%20can%20be,type%20of%20prostatitis%20is%20unknown. 2) https://www.urologyhealth.org/healthy-living/care-blog/2017/crucial-advice-to-help-reduce-the-risk-and-growth-of-bph All surgical treatments have inherent and associated side effects. Individual’s outcomes may depend on a number of factors, including but not limited to patient characteristics, disease characteristics and/or surgeon experience. The most common side effects are mild and transient and may include mild pain or difficulty when urinating, discomfort in the pelvis, blood in the urine, inability to empty the bladder or a frequent and/or urgent need to urinate, and bladder or urinary tract infection. Other risks include ejaculatory dysfunction and a low risk of injury to the urethra or rectum where the devices gain access to the body for treatment. Further, there may be other risks as in other urological surgery, such as anesthesia risk or the risk of infection, including the potential transmission of blood borne pathogens. For more information about potential side effects and risks associated with Aquablation therapy for Benign Prostatic Hyperplasia (BPH) treatment, speak with your urologist or surgeon. Prior to using our products, please review the Instructions for Use, Operator’s Manual or User Manual, as applicable, and any accompanying documentation for a complete listing of indications, contraindications, warnings, precautions and potential adverse events. No claim is made that the AquaBeam Robotic System will cure any medical condition, or entirely eliminate the diseased entity. Repeated treatment or alternative therapies may sometimes be required. Rx Only
ESSENTIALAI-STEM
3 Things to Watch in the Stock Market This Week Stocks posted significant gains last week, as both the S&P 500 (SNPINDEX: ^GSPC) and the Dow Jones Industrial Average (DJINDICES: ^DJI) gained more than 1% to march closer toward record territory, up over 11% so far in 2019. ^SPX data by YCharts Fourth-quarter earnings results are still in full swing, and retailers will take their turn in the spotlight over the next few days. In fact, holiday-season reports from Home Depot (NYSE: HD) , Best Buy (NYSE: BBY) and Foot Locker (NYSE: FL) each have the potential to spark volatility in the respective stocks. Here's what investors might expect to see from these companies. Home Depot's dividend increase Home Depot on Wednesday will close out a fiscal year that will push its annual sales further above $100 billion. Rival Lowe's announces its results the following day, but there's little question in investors' minds about who won the 2018 matchup. Home Depot's market share expanded through the year even as operating margin ticked up to a new high of 14.5% of sales. The comparable figure at Lowe's is stuck in the single digits and has been worsening thanks to the chain's struggles to keep its shelves well stocked in recent quarters. Wednesday's report is likely to show more evidence of that performance gap, but investors will be more interested in Home Depot's outlook for the new year. Management hinted last quarter that profitability might soon stabilize or decline after years of expanding, which might hurt the stock. Yet income investors should still receive a significan t dividend payout increase, given the robus t earnings growth Home Depot managed through the year. Best Buy's sales growth Consumer-electronics retailer Best Buy announces its fourth-quarter results on Wednesday, and investors are eager to find out how well the chain did over the critical holiday season. There's no shortage of worries about a potential growth slowdown as consumers reduce their upgrade pace for core products such as TVs and smartphones. Best Buy has a flexible selling model, though, which has helped it steadily increase sales through the first nine months of the year while protecting gross profitability. We'll find out on Wednesday whether those encouraging trends held up during the company's most important sales period. For its part, management predicted in late November that sales growth would slow to between 0% and 3%, from 4% in the prior quarter. That prediction occurred before the peak selling weeks around the Thanksgiving and Christmas holidays, though, and so actual results may differ significantly from the projected figures. Foot Locker's 2019 outlook Foot Locker's las t quarterly report showed gathering momentum for the retailer's growth rebound. Sales gains sped up for the second consecutive quarter and profitability ticked higher as the chain cut back on its level of promotions. That success has raised the bar for the fourth-quarter report due out on Friday, March 1. CEO Dick Johnson said in late November that executives were optimistic about a further strengthening of sales and profits thanks to a few positive trends, including an influx of innovative sneaker releases from Nike and healthy inventory levels in the broader industry. If things play out about as management expects, then comparable-store sales should rise by around 4% for the full year as gross profit margin expands by a bit more than a full percentage point. The actual results will go a long way toward informing Foot Locker's outlook for 2019. Another moderate growth year would be further evidence that 2017's sales and profitability declines were outliers in a broader trend of steady gains for the footwear specialist. 10 stocks we like better than Home Depot When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor , has quadrupled the market.* David and Tom just revealed what they believe are the 10 best stocks for investors to buy right now... and Home Depot wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of January 31, 2019 Demitrios Kalogeropoulos owns shares of Home Depot and Nike. The Motley Fool has the following options: long January 2020 $110 calls on Home Depot. The Motley Fool recommends Home Depot, Lowe's, and Nike. The Motley Fool has a disclosure policy . The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Purge (song) "Purge" is a song written and performed by American singer Willow featuring fellow American singer Siiickbrain. Produced by No Love for the Middle Child, it was released on April 1, 2022, through Roc Nation. Composition "Purge" is a pop-punk and rock song which has been described as an aggressive, high-energy, "screamo-tinged" track. It reminded journalist Emily Zemler of the 2000s. Several publications noted that the song was Willow's most heavy song to date. Music video The music video for "Purge", self-directed by Willow, was uploaded to YouTube a week prior to the song's release on other music streaming platforms. Synopsis In the clip, the two artists move around a warehouse with low light levels. Willow applies a tattoo to Siiickbrain's face. The two sing and yell into each others' faces, and kiss in a car. After kissing, the duo destroys the car they were inside of using baseball bats. Reception Zemler remarked that, though the clip was most likely filmed prior to the Chris Rock–Will Smith slapping incident, where the latter was slapped by the former, the clip felt like a "pointed statement" directed at Rock due to the two singers "showcas[ing their] shaven heads", as if it was meant to be a response to Rock's jokes about Jada Pinkett Smith's baldness. Brenton Blanchet called the music video a "good time". Credits Credits are adapted from Spotify. * Willow Smith – performer, songwriter * Siiickbrain – performer, songwriter * No Love for the Middle Child – producer
WIKI
Mon. Sep 25th, 2023 Introduction to MXNet for Natural Language Processing Natural Language Processing (NLP) is a field of Artificial Intelligence (AI) that deals with the interaction between computers and human language. It is a rapidly growing field that has gained a lot of attention in recent years due to its potential to revolutionize the way we interact with technology. One of the key challenges in NLP is to develop algorithms that can understand the nuances of human language, which is a complex and ever-evolving system. MXNet is a deep learning framework that has gained popularity in recent years due to its scalability, flexibility, and ease of use. It is an open-source framework that supports a wide range of programming languages, including Python, R, and Julia. MXNet is particularly well-suited for NLP tasks due to its ability to handle large datasets and complex models. One of the key benefits of using MXNet for NLP is its ability to handle large datasets. NLP tasks often involve processing large amounts of text data, which can be challenging for traditional machine learning algorithms. MXNet is designed to handle large datasets efficiently, which makes it an ideal choice for NLP tasks. Another benefit of using MXNet for NLP is its flexibility. MXNet supports a wide range of neural network architectures, including convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformer models. This flexibility allows researchers and developers to experiment with different models and architectures to find the best solution for their specific NLP task. MXNet also has a number of built-in features that make it well-suited for NLP tasks. For example, MXNet has a built-in tokenizer that can split text into words and sentences, which is a crucial step in many NLP tasks. MXNet also has a number of pre-trained models that can be used for common NLP tasks, such as sentiment analysis and named entity recognition. MXNet is also designed to be easy to use, which makes it accessible to researchers and developers with varying levels of experience. MXNet has a user-friendly interface that allows users to define and train models using a few lines of code. MXNet also has a number of tutorials and documentation that make it easy for users to get started with the framework. In addition to its technical benefits, MXNet is also supported by a vibrant community of developers and researchers. The MXNet community is constantly developing new models and tools for NLP tasks, which makes it a valuable resource for anyone working in the field. In conclusion, MXNet is a powerful and flexible deep learning framework that is well-suited for NLP tasks. Its ability to handle large datasets, support for a wide range of neural network architectures, built-in features, and ease of use make it an ideal choice for researchers and developers working in the field of NLP. With its growing community and continued development, MXNet is poised to play a key role in the future of NLP and AI.
ESSENTIALAI-STEM
Part 2: Managing Local Administrator Passwords Overview This is Part 2 of a multi-part series on managing local admin passwords. In case you missed it, you can view Part 1 here The Problem One of the challenges associated with generating a random local admin password is how to make the generated password as random as possible. In many of the example PowerShell random password generation scripts that I have seen, the system.random object is used as the random character generator. The problem with this is that that particular object, while random, is not as good as using the System.Security.Cryptography.RNGCryptoServiceProvider. This object generates a cryptographically random number and is documented on MSDN here. The Solution The following function relies on a cryptographic random character generation function to create a random password of configurable complexity and length using cryptographically randomly generated characters. If the function is called without any parameters then the function will generate a 16 character password with 2 lowercase and 2 upper case characters, 2 numbers, 2 special characters, and no ambiguous characters. #================================================================================== # Generate Random Password #================================================================================== function fnGeneratePassword {Param ([int]$PassLength=16,[int]$iLCaseNeeded=2,[int]$iUCaseNeeded=2,[int]$iNumNeeded=2,[int]$iSpecNeeded=2,[int]$AvoidAmbiguous=$true)     #Calculates minimum password length required to meet complexity     $MinPwdLength = $iLCaseNeeded + $iUCaseNeeded + $iNumNeeded + $iSpecNeeded     #Feedback if password is too short     if($PassLength -lt $MinPwdLength){       #Convert Integer to String       $MinPwdLength = [string]$MinPwdLength       #Log Output       #fnLog -LogPath $LogDir -LogFileName $LogFileName -Data "ERROR: Requested password length must be $MinPwdLength or more characters"       #Exit       return "ERROR"     }     #NonAmbiguous Characters     $sLCase = "abcdefghijkmnpqrstuvwxyz"     $sUCase = "ABCDEFGHJKLMNPQRSTUVWXYZ"     $sNum = "23456789"     $sSpec = "!#$%&()*+,-./:;<=>?@[\]^_{}~"     #Adds Ambiguous Characters if desired     if($AvoidAmbiguous -eq $false){         $sLCase += "lo";$sUCase += "IO";$sNum += "01";$sSpec += "`"'“|"     }     #Creates Character Arrays     $sLCase = $sLCase.ToCharArray();$sUCase = $sUCase.ToCharArray();$sNum = $sNum.ToCharArray();$sSpec = $sSpec.ToCharArray()     $sFullSet = $sLCase + $sUCase + $sNum + $sSpec; $aCharacters = @{}     #Selects Lower Case Characters     for($i =0;$i -lt $iLCaseNeeded;$i++){         $aCharacters.Add((fnRandom),$sLCase[(fnRandom) % $sLCase.Count])     }     #Selects Upper Case Characters     for($i =0;$i -lt $iUCaseNeeded;$i++){         $aCharacters.Add((fnRandom),$sUCase[(fnRandom) % $sUCase.Count])     }     #Selects Numerical Characters     for($i =0;$i -lt $iNumNeeded;$i++){         $aCharacters.Add((fnRandom),$sNum[(fnRandom) % $sNum.Count])     }     #Selects Special Characters     for($i =0;$i -lt $iSpecNeeded;$i++){         $aCharacters.Add((fnRandom),$sSpec[(fnRandom) % $sSpec.Count])     }     #Selects from all characters until password length is met     for($i=$aCharacters.Count;$i -lt $PassLength;$i++){         $aCharacters.Add((fnRandom),$sFullSet[(fnRandom) % $sFullSet.Count])     }     #Sorts Characters     $aCharacters = $aCharacters.GetEnumerator() | Sort-Object Name     return New-Object System.String(($aCharacters | % {$_.value}),0,$aCharacters.Length) } The function above calls the fnRandom function which is what actually creates the random characters. fnRandom is below. #================================================================================== # Returns random number #================================================================================== function fnRandom{     #Crypto Random Number Generator     $rng = New-Object System.Security.Cryptography.RNGCryptoServiceProvider     #Byte Storage     [byte[]]$byte = New-Object byte[] 4     #Generate Random Value     $rng.GetBytes($byte)     #Convert to Integer     return [system.bitconverter]::touint32($byte,0) } After loading both functions into memory using PowerShell ISE, you can then call fnGeneratePassword without any parameters to see some of the sample random passwords as shown below. The keen observer may have noticed that I commented out the fnLog function in the examples above. Both functions above are a part of a larger local administrator password management solution which I will reveal in greater detail in the 3rd part of this series. What you have so far is a configurable random password generator which can be integrated into pretty much any random password script, and a cryptographically random character generator which can also be used for many different purposes. The upcoming parts in this series will explain how to do the following: • Connect to Active Directory using a Kerberos secured connection • Set the local administrator password based on fnGeneratePassword • Write a log file that logs the success and failure of each function • Create a confidential attribute to store the local admin password • Create fnMain to control the order in which all of the functions are called • Create a XAML based secure password viewer to retrieve the local admin password Each portion of the solution is modularized using functions which allows the IT administrator to make use of all or just parts of the solution and allows the IT administrator to easily integrate any portion they wish into a larger script or even a different solution entirely. So stay tuned as Part 3 discusses how to create a Kerberos encrypted and signed connection to Active Directory.         Comments (9) 1. Anonymous says: Looking forward to part3 2. Anonymous says: Overview In this multi part series I will walk you through how to manage the local admin password 3. Anonymous says: This is Part 4 of a multi-part series on managing local admin passwords. In this part I will discuss how to update the password of a local user account using PowerShell 4. Anonymous says: Overview This is Part 5 of a multi-part series on managing local admin passwords. In this part I will 5. Anonymous says: This is Part 6 of a multi-part series on managing local admin passwords. In this part I will discuss how to extend the Active Directory schema to create a new confidential attribute which is where the workstation's local administrator password will 6. Anonymous says: This is Part 7 of a multi-part series on managing local admin passwords. In this part I will provide 7. Anonymous says: Pingback from Manage Local Admin Passwords – Additional Comments | JohanPersson.nu 8. Anonymous says: This is Part 8 and the final part of a multi-part series on managing local admin passwords. In this part Skip to main content
ESSENTIALAI-STEM
Page:The Net of Faith.pdf/415 103* only corporeally, paying their taxes and performing other physical services until the days of Constantine. When Emperor Constantine was received into the fold of faith with his pagan rule and rights and offices, then the innocence of the true Christians was saddened and defiled. It was as if ruffians and abductors established friendship with honest and chaste maidens, got themselves invited into their house overnight, introducing their own ruffian laws and declaring that they would protect the maidens' chastity by virtue of their laws. The honest and chaste maidens would soon be very much disappointed upon discovering that they could not defend for long – and with great difficulty at that – their purity and faithfulness which they took upon themselves to keep till death. They could not preserve it among these ruffians who live domestically with them, who rule over them and who can even order them how to preserve to God their purity very few true maidens would remain there indeed! It was similar when the Emperor slipped under the skin of faith with his pagan rule, rights and offices, and obtained full membership rights of participation with the Christians in their faith and in all things pertaining to God. Having been thus united, they shared among themselves: he their Christian things
WIKI
DERIVATIVES-Euronext agrees clearing terms with ICE after LCH SA bid fails LONDON, April 3 (IFR) - Pan-European stock exchange Euronext, has signed a binding agreement of terms with ICE Clear Netherlands for the provision of derivatives and commodities clearing services. The deal, which is expected to be formalised in the coming weeks, comes days after Euronext’s attempts to gain control of LCH.Clearnet SA were thwarted. The agreement will see the exchange sever ties with the Paris-based clearing firm for the purpose of derivatives clearing when an agreement with LCH comes to an end in December 2018. Euronext was due to take control of LCH’s French clearing arm for €510m, contingent on the successful US$14bn acquisition of LCH’s parent, London Stock Exchange Group, by Deutsche Boerse. A merger between the two exchange giants was blocked by EU antitrust commissioners last week on the grounds that it would created a monopoly in fixed income markets. Under the new agreement, customers would begin to migrate to the ICE CCP during the second half of 2018, ahead of the expiration of an existing agreement with LCH.Clearnet SA. The agreement with ICE Clear Netherlands, which covers clearing for financial and commodity derivatives over a 10-year period, will see Euronext make an upfront investment of €10m in the clearing firm. Euronext will also appoint one representative to the CCP’s risk committee as well as chairing a product committee dedicated to the exchange’s clearing service. According to Euronext, the deal will deliver a 15% reduction in client costs through lower headline clearing fees, treasury management fees and further capital efficiencies. Clearing operations will be run from Amsterdam, while a new asset financing, inventory management and physical delivery platform for commodities will be built by Euronext and operated from Paris. For cash equity markets, Euronext has launched its own Preferred Clearing service offering trading participants a choice of central counterparties from Clearnet and EuroCCP, in which it holds a 20% equity stake. Stephane Boujnah, Euronext CEO and chairman of the managing board, said the exchange remained a willing buyer of LCH’s Paris-based clearing business at the agreed terms, irrespective of the merger’s demise. “Euronext has reaffirmed to both LSE and LCH Group its willingness to proceed with the acquisition of Clearnet for €510m, and Euronext continues to remain a willing buyer of Clearnet,” said Boujnah in a statement. “In the absence of obtaining an agreement to complete this acquisition, Euronext is fully committed to securing the best long-term solution for its post-trade activities, in the interests of clients and shareholders.” (Reporting by Helen Bartholomew)
NEWS-MULTISOURCE
User:Natalia K. Grace Natalia K. Grace (born Natalia Kucharina) is an actress, stand-up comedian and a contemporary performer. Raised in Ryazan, Russia, she has been performing on stage as a contemporary visual artist and a dancer since the age of 5. After High School she moved to Moscow to attend National Research University - Higher School of Economics where she secured her degree in Financial Management. Upon graduation she worked as a successful business executive in Moscow before deciding to change careers and pursue her acting passion as a professional. She won a talent based scholarship to study acting for film in New York Film Academy and moved to Los Angeles. Having graduated in Winter 2015, She performed as a lead on the Los Angeles theatre scene. Collaborated with many talented directors. Among others she worked with Mary McGuckian on A Girl From Mogadishu (2019-2020) and Dennis Dugan on Love, Weddings & Other Disasters (2020). She played the leading part of Ms. Verdez in the horror film Play With Me (dir. by Rob Lee, 2016). She practices her comedy and improv skills at The Groundlings, UCB, Westside Comedy Theatre and performs stand-up in Los Angeles.
WIKI
Page:Popular Science Monthly Volume 68.djvu/170 166 N these days of evolutionary theories and dominance of biology it has become fashionable to apply the analogies and language of biology in other fields—for the geographer to speak of mature rivers, and youthful drainage, and the sociologist and historian to speak of society and nations as organisms. So, without going so far as to assume that there are units of consciousness apart from brains, and that there is an American or Michigan consciousness standing in somewhat the same relation to your consciousness and my consciousness as ours may be supposed to stand in relation to the sensitiveness which may belong to each individual cell of the body, we may still accept the comparison of the nation or state to that of an organism so far as it may help to remember and connect real facts. The youth of a people is in reality like that of a man, full of hope, extravagant, feeling boundless resources and inclined recklessly to squander them in attaining the objects of desire. If it is wisely guided, age may bring riches which are not merely in prospect, but in possession, which are the fruits of useful industry and the relics and mementoes of a noble ancestry. Unwisely guided, age may bring the exhaustion of the resources thought to be boundless, with nothing worth while to show for them; and as the individual man may be found bankrupt in purse and pride, so the nation or community may suddenly find its supposedly inexhaustible supplies exhausted, the fabulous fertility of its fields failing, its hills once clad in forests naked and seamed and gashed by gullies until they remind one of the beggar's clothes whose spendthrift habits have dragged him down to like depths of destitution. Mill says that 'looking on the world as not only the home of man, but as subservient in all its phenomena to the welfare of the human race, we may consider the development of any region to mean such treatment of its natural resources as will enable the land to continue to support an increasing number of inhabitants,' and ventures the suggestion that, "fortune hunting is inimical to development in its true sense. A fortune acquired through production or speculation can usually be made by only a few individuals and almost always entails the exhaustion of natural resources or the lowering of wages; a
WIKI
Canadian Sport Parachuting Association The Canadian Sport Parachuting Association (CSPA), through affiliation with the Aero Club of Canada (ACC), is Canada's representative to the Fédération Aéronautique Internationale (FAI) and the International Parachuting Commission (IPC). Thus, the CSPA is the official sport organization for sport parachuting in Canada. Objectives The stated objective of the CSPA is to "promote safe and enjoyable sport parachuting through cooperation, adherence to self-imposed rules, and recommendations". Skydivers and skydiving companies that wish to be members of the CSPA must adhere to the established Basic Safety Rules throughout their parachuting career. Such rules include minimum opening altitudes for certain levels of experience, mandatory equipment, clear weather conditions for jumping, reserve repack due dates, general operational requirements, etc. These Basic Safety Rules significantly reduce the risk of accidents for individual skydivers, skydiving companies, and the sport. A Canadian Drop Zone must adhere to all of these safety rules to be a member of the CSPA. The CSPA also has recommended procedures and instructor qualification requirements. A Canadian skydiver starts with a solo license and then progresses to the A, B, C, and D licenses. The CSPA requires that skydivers keep a log of every jump signed by another jumper and submit that logbook to acquire these qualifications. The CSPA constantly updates all programs and initiatives to adapt to increasing incidents and changes in technology. Every member (skydiver or skydiving company) must implement all changes to remain members. CanPara The CSPA publishes CanPara, a bimonthly bilingual publication devoted to informing the Canadian skydiving community of important activities and events in Canadian and worldwide skydiving. CanPara is produced by Annaleah McAvoy and Vic Lefrançois. Organization The CSPA comprises Registered Participants and Member Groups. The Board of Directors will consist of no less than three and no more than seven Directors. National Office Staff: * Executive Director: Michelle Matte-Stotyn * Executive Secretary: Judy Renaud There are several committees and officers that assist the BoD: * Three Standing Committees: * Technical & Safety Committee * Coaching Working Committee * Competition & National Teams Committee. * Ad-hoc committees (a sampling): * CanPara - Bi-Monthly, bilingual Magazine * Comp./Dev - Competition Development * GRC - Government Regulatory Committee * IT - Information Technology * LTAD - Long Term Athlete Development
WIKI
Ukrainians made their choice for freedom, but now need US help | TheHill Three years ago, Ukrainians made their choice. The vast majority of my people today support our country's development in the direction of the West. While we were once part of the Soviet Union — by force, not of our own volition — today we share the values of modern democratic societies: personal liberty, democracy and the rule of law. This is why hundreds of thousands of us stood on the Maidan (the central square of the capital, Kyiv) demanding that the dictatorial regime of then-President Viktor Yanukovych resign. Even now, we are fighting against Russian aggression and its attempts to destabilize our sovereign nation. In the cold Ukrainian February of 2014, a hundred innocent people — men, women, young boys — gave their lives to wrest control from a completely corrupt president and create a just and democratic country. But before we were able to reorganize our invigorated society after the revolution, the Kremlin, with the help of local and foreign mercenaries, literally stole Crimea from us and has since occupied nearly 10 percent of our territory. In spite of these challenges and external attempts to destabilize our movement toward Western values, Ukrainians have made great strides in transforming our country into an open and transparent democracy. As a participant in the revolution, I feel a great need to work to make these changes. I took the position of deputy governor and then chief of the Odessa Region customs service on the Black Sea, one of the most notorious enclaves of corruption in my country. Others across the country, inspired as I have been, have taken positions in local and national government, civil society, the military and as volunteers. And people have come from all over the world to help transform Ukraine. Our reforms to date are not yet as successful as we have hoped, in great part because there are still many old post-Soviet elites holding levers of power. But our vibrant civil society and the vast number of young professionals who have entered the government are dedicated to changing the country. The positive changes that have been achieved would not be possible without international support. And we will not give up until we have a true and transparent democracy, free from corruption. Until this is achieved, though, it is critical to have an international shield from Russia while we are rebuilding our country. The European Union, Canada and the United States placed sanctions on Russia for its aggression and violation of international law. These sanctions have not only put economic pressure on Russia, but stand as a symbolic gesture that the world does not accept the imperialistic behavior of Russian President Vladimir Putin and his cronies. We deeply appreciate the commitment of the U.S. government to these values. Now, however, during the American presidential transition and the general state of turbulence in the world, it is even more important for Ukrainians to know that we are not alone against one of the largest, most well-armed Mafia states in the world. Among all the various ways the United States has assisted Ukraine, solidarity on economic sanctions against Russia have helped enormously. Continuing these sanctions will be one of the greatest ways the U.S. can show its continued support for my country in the face of increased international uncertainty. For this reason, the STAND (Stability and Democracy) for Ukraine Act, H.R. 5094, is an important legal pillar of defense against further Russian aggression toward my country. It requires no taxpayer dollars, its provisions are noncontroversial and it formalizes the United States' moral promise to support Ukrainian territorial integrity and continue to apply economic pressure on Russia. Today, the U.S. Senate has a unique opportunity to help defend Ukrainian sovereignty against Russian aggression before concluding the current Congress. The House has already passed the bill; and I'm very grateful for those senators who support it, among them John McCainJohn Sidney McCainFighter pilot vs. astronaut match-up in Arizona could determine control of Senate The Hill's Morning Report — Recession fears climb and markets dive — now what? Trump makes rare trip to Clinton state, hoping to win back New Hampshire MORE (R-Ariz.), Chris MurphyChristopher (Chris) Scott MurphyOvernight Defense: US, Russia tensions grow over nuclear arms | Highlights from Esper's Asia trip | Trump strikes neutral tone on Hong Kong protests | General orders ethics review of special forces White House eyes September action plan for gun proposals Trump phoned Democratic senator to talk gun control MORE (D-Conn.) and many others. Today, the Senate Foreign Relations Committee Chairman Bob CorkerRobert (Bob) Phillips CorkerTrump announces, endorses ambassador to Japan's Tennessee Senate bid Meet the key Senate player in GOP fight over Saudi Arabia Trump says he's 'very happy' some GOP senators have 'gone on to greener pastures' MORE (R-Tenn.) — who has previously given a great deal of support to Ukraine — unfortunately appears to be withholding support for the STAND for Ukraine Act. This legislation is very important to my country and I hope Corker will ultimately continue his great support of Ukraine. Doing so not only affirms the shared values of humanity with the Ukrainian people who gave their lives for a better future, but also continues the defense against Russia's imperial ambitions. Why is this important? Because when a petty thief is not punished for small transgressions, it allows him to believe that he can get away with anything. I am grateful that our two countries have stood together over the past three years, and I know that this steadfast relationship will continue, however the political winds may blow. Yulia Marushevska is a Euromaidan activist and the former chief of the Odessa Region customs service. Follow her on Twitter @MarushevskaY or on Facebook here. The views expressed by contributors are their own and not the views of The Hill. View the discussion thread. Contributor's Signup The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Infantile neuroaxonal dystrophy Infantile neuroaxonal dystrophy (INAD) is a rare pervasive developmental disorder that primarily affects the nervous system. Individuals with infantile neuroaxonal dystrophy typically do not have any symptoms at birth, but between the ages of about 6 and 18 months they begin to experience delays in acquiring new motor and intellectual skills, such as crawling or beginning to speak. Eventually they lose previously acquired skills. Cause This condition is inherited in an autosomal recessive pattern, which means two copies of the gene (PLA2G6) in each cell are altered. Most often, the parents of an individual with an autosomal recessive disorder each carry one copy of the altered gene but do not show signs and symptoms of the disorder. Pathophysiology Mutations in the PLA2G6 gene have been identified in most individuals with infantile neuroaxonal dystrophy. The PLA2G6 gene provides instructions for making an enzyme called an A2 phospholipase. This enzyme family is involved in metabolizing phospholipids. Phospholipid metabolism is important for many body processes, including helping to keep the cell membrane intact and functioning properly. Specifically, the A2 phospholipase produced from the PLA2G6 gene, sometimes called PLA2 group VI, helps to regulate the levels of a compound called phosphatidylcholine, which is abundant in the cell membrane. Mutations in the PLA2G6 gene impair the function of the PLA2 group VI enzyme. This impairment of enzyme function may disrupt cell membrane maintenance and contribute to the development of spheroid bodies in the nerve axons. Although it is unknown how changes in this enzyme's function lead to the signs and symptoms of infantile neuroaxonal dystrophy, phospholipid metabolism problems have been seen in both this disorder and a related disorder called pantothenate kinase-associated neurodegeneration. These disorders, as well as the more common Alzheimer disease and Parkinson disease, also are associated with changes in brain iron metabolism. Researchers are studying the links between phospholipid defects, brain iron, and damage to nerve cells, but have not determined how the iron accumulation that occurs in some individuals with infantile neuroaxonal dystrophy may contribute to the features of this disorder. A few individuals with infantile neuroaxonal dystrophy have not been found to have mutations in the PLA2G6 gene. The genetic cause of the condition in these cases is unknown; there is evidence that at least one other gene may be involved. Mutations in the NAGA gene, resulting in alpha-N-acetylgalactosaminidase deficiency, cause an infantile neuroaxonal dystrophy known as Schindler disease. Diagnosis In some cases, signs and symptoms of infantile neuroaxonal dystrophy first appear later in childhood or during the teenage years and progress more slowly. Children with infantile neuroaxonal dystrophy experience progressive difficulties with movement. Generally they have muscles that are at first weak and "floppy" (hypotonic), and then gradually become very stiff (spastic). Eventually, affected children lose the ability to move independently. Lack of muscle strength causes difficulty with feeding and breathing problems that can lead to frequent infections, such as pneumonia. Seizures occur in some affected children. Rapid, involuntary eye movements (nystagmus), eyes that do not look in the same direction (strabismus), and vision loss due to deterioration (atrophy) of the optic nerve are characteristic of infantile neuroaxonal dystrophy. Hearing loss may also develop. Children with this disorder experience progressive deterioration of cognitive functions (dementia), and eventually lose awareness of their surroundings. Infantile neuroaxonal dystrophy is characterized by the development of swellings called spheroid bodies in the axons, the fibers that extend from nerve cells (neurons) and transmit impulses to muscles and other neurons. A part of the brain called the cerebellum, which helps to control movements, may also be damaged. In some individuals with infantile neuroaxonal dystrophy, abnormal amounts of iron accumulate in a specific region of the brain called the basal ganglia. Management Currently, only palliative treatment is available: alleviation of spasticity and seizures, baclofen for relieving dystonia, physiotherapeutic treatment and measures such as gastric feeding tube or tracheostomy to prevent aspirational pneumonia. Research An open-label clinical study for long-term evaluation of efficacy, safety, tolerability, and pharmacokinetics of a deuterium-enhanced polyunsaturated fatty acid RT001, which, when taken with food, can protect the neuronal cells from degeneration, started in the Summer 2018. The loss of iPLA2-VIA, the fly homolog of PLA2G6, reduces lifespan, impairs synaptic transmission, and causes neurodegeneration. Phospholipases typically hydrolyze glycerol phospholipids, but loss of iPLA2-VIA does not affect the phospholipid composition of brain tissue but rather causes an elevation in ceramides. Reducing ceramides with drugs, including myriocin or desipramine, alleviates lysosomal stress and suppresses neurodegeneration.
WIKI
Programmatically Enumerating Installations of the FrontPage Server Extensions I had a great question from a customer the other day: "How do you programmatically enumerate how many web sites on a server have the FrontPage Server Extensions installed?" Of course, that's one of those questions that sounds so simple at first, and then you start to think about how to actually go about it and it gets a little more complicated. The first thought that came to mind was to just look for all the "W3SVCnnnn" subfolders that are located in the "%ALLUSERSPROFILE%\Application Data\Microsoft\Web Server Extensions\50" folder. (These folders contain the "ROLES.INI" files for each installation.) The trouble with this solution is that some folders and files do not get cleaned up when the server extensions are uninstalled, so you'd get erroneous results. The next thought that came to mind was to check the registry, because each installation of the server extensions will create a string value and subkey named "Port /LM/W3SVC/nnnn:" under the "[HKLM\SOFTWARE\Microsoft\Shared Tools\Web Server Extensions\Ports]" key. Enumerating these keys will give you the list of web sites that have the server extensions or SharePoint installed. The string values that are located under the subkey contain some additional useful information, so I thought that as long as I was enumerating the keys, I might as well enumerate those values. The resulting script is listed below, and when run it will create a log file that lists all of the web sites that have the server extensions or SharePoint installed on the server that is specified by the "strComputer" constant. Option Explicit Const strComputer = "localhost" Dim objFSO, objFile Dim objRegistry Dim strRootKeyPath, strSubKeyPath, strValue Dim arrRootValueTypes, arrRootValueNames Dim arrSubValueTypes, arrSubValueNames Dim intLoopA, intLoopB Const HKEY_LOCAL_MACHINE = &H80000002 Const REG_SZ = 1 strRootKeyPath = "Software\Microsoft\" & _ "Shared Tools\Web Server Extensions\Ports" Set objFSO = WScript.CreateObject("Scripting.FileSystemObject") Set objFile = objFSO.CreateTextFile("ServerExtensions.Log") objFile.WriteLine String(40,"-") objFile.WriteLine "Report for server: " & UCase(strComputer) objFile.WriteLine String(40,"-") Set objRegistry = GetObject(_ "winmgmts:{impersonationLevel=impersonate}!\\" & _ strComputer & "\root\default:StdRegProv") objRegistry.EnumValues HKEY_LOCAL_MACHINE, strRootKeyPath, _ arrRootValueNames, arrRootValueTypes For intLoopA = 0 To UBound(arrRootValueTypes) If arrRootValueTypes(intLoopA) = REG_SZ Then objFile.WriteLine arrRootValueNames(intLoopA) strSubKeyPath = strRootKeyPath & _ "\" & arrRootValueNames(intLoopA) objRegistry.EnumValues HKEY_LOCAL_MACHINE, _ strSubKeyPath, arrSubValueNames, arrSubValueTypes For intLoopB = 0 To UBound(arrSubValueTypes) If arrSubValueTypes(intLoopB) = REG_SZ Then objRegistry.GetStringValue HKEY_LOCAL_MACHINE, _ strSubKeyPath, arrSubValueNames(intLoopB), strValue objFile.WriteLine vbTab & _ arrSubValueNames(intLoopB) & "=" & strValue End If Next objFile.WriteLine String(40,"-") End If Next objFile.Close The script should be fairly easy to understand, and you can customize it to suit your needs. For example, you could change the "strComputer" constant to a string array and loop through an array of servers. Note: More information about the WMI objects used in the script can be found on the following pages: Hope this helps! Comments are closed
ESSENTIALAI-STEM
Interfacing sensors with the Bus Pirate Spring has come and with it, storm season.  In light of the recent historic multi-day tornado outbreak I’ve decided it was time to replace my initial Arduino weather station with something a bit more capable.  The Arduino is a decent platform for a quick prototype, but I’ve been interested in PIC’s for some time and really would like some more experience with them.  I recently picked up a Web Platform by Dangerous Prototypes and was impressed with its features, thought it would make a great platform for my new weather station.  A quick order from SparkFun provided me with a few I²C sensors to experiment with. Sidenote: The only downsides I thought of so far will be the inability to toss lots of sensors all on one bus.  The 1-wire protocol provides each sensor with a unique address, somewhat similar to a MAC.  However a basic weather station would only need a very few of these at the most (indoor/outdoor?) and this likely could easily be accomplished.  Most sensors I’ve seen are configurable to allow at least 2-4 devices per bus and if needed more then one I²C bus could always be implemented on the PIC. I figured some tinkering with my Bus Pirate to interface the sensors first would be a good start.  This is a quick reference/demo for a few of SparkFun’s breakout sensors.  Some of this is adapted from the example code provided on their website. TMP102 – Digital Temperature Sensor Breakout (SEN-09418) This is a tiny I²C sensor which provides a great resolution (12 bits), accuracy (0.5° 2° C), and nice features including programmable high/low alerting temperatures and low power consumption. The ADDR/A0 pin allows for configuring the slave address to allow up to 4 devices on the same bus.  It can be connected to either GND, V+, SDA or SCL; in my example here I’ve tied it to GND (using the AUX output of the Bus Pirate and setting it to low)  I must state that it’s important to tie it to something, left floating the sensor did not seem to operate correctly.  If using a different address reference the datasheet to see the necessary changes (Table 12).  Also keep in mind this sensor needs 3.6V MAX, not 5V!  Pullup resistors do not need to be enabled as they are already provided on the breakout board. Set mode to I2C, set AUX low and turn on the power supplies: HiZ> m 1. HiZ 2. 1-WIRE 3. UART 4. I2C 5. SPI 6. 2WIRE 7. 3WIRE 8. KEYB 9. LCD x. exit(without change) (1)> 4 Set speed: 1. ~5KHz 2. ~50KHz 3. ~100KHz 4. ~400KHz (1)> 3 Ready I2C> W Power supplies ON I2C> c a/A/@ controls AUX pin I2C> a AUX LOW I2C> (1) Searching I2C address space. Found devices at: 0x00(0x00 W) 0x90(0x48 W) 0x91(0x48 R) To read the temperature you need to generate a start bit, send the device address, then specify the register to read (temperature read-only): I2C> [0x90 0x00 I2C START BIT WRITE: 0x90 ACK WRITE: 0x00 ACK I2C> [0x91 r r I2C START BIT WRITE: 0x91 ACK READ: 0x19 READ:  ACK 0x60 Our temperature data is 0×1960.  The first byte is the MSB and the second LSB does not need to be read if not needed, in this case for a test it can be ignored – our temperature is 25°C (0×19).  After pressing my finger on the sensor for a few seconds taking a second reading results in a MSB of 0x1F – 31°C, it indeed seems to work just fine.   If you enjoyed this post, make sure you subscribe to my RSS feed!
ESSENTIALAI-STEM
Schema merging Consolidate the schema definitions and resolvers from multiple subschema instances into a single, stitched schema. In Gloo Gateway, you can surface multiple APIs into one unified service by creating a Gloo GraphQLStitchedSchema custom resource. Gloo Gateway uses this resource to generate a stitched schema, which incorporates all the types and fields from each subschema. When clients query the route for the stitched schema, Gloo Gateway creates requests to the individual services, and then stitches the responses back together into one response to the client. For more information, see What is GraphQL stitching?. Merge GraphQL schema For each API, define schema and select resolver services in your Gloo environment. Then, you can merge the GraphQL APIs together in a GraphQLStitchedSchema, and set up routing to this merged resolver. 1. For each subschema, use the following guides to create individual CRs for each API that define its schema and resolvers. 1. Define subschema in separate ApiDoc CRs. For the Bookinfo example, you might define three CRs for the product, reviews, and ratings services. 2. Choose how GraphQL requests are executed, and follow the guides to either proxy requests to existing GraphQL backends or define REST, gRPC, or mock resolvers for each schema. 2. Create one GraphQLStitchedSchema CR that references each GraphQL subschema. This example stitched schema for Bookinfo merges the GraphQL schema for each of the three APIs: apiVersion: apimanagement.gloo.solo.io/v2 kind: GraphQLStitchedSchema metadata: name: bookinfo-stitched-schema namespace: bookinfo spec: subschemas: - schema: clusterName: $CLUSTER_NAME name: products-graphql-schema namespace: bookinfo - schema: clusterName: $CLUSTER_NAME name: ratings-graphql-schema namespace: bookinfo - schema: clusterName: $CLUSTER_NAME name: reviews-graphql-schema namespace: bookinfo 3. Create a route table that routes to a graphql.stitchedSchema destination. Specify your stitched schema resoure name in the graphql.stitchedSchema.name field, such as stitched-graphql-schema in the following examples. To route requests from clients that are external to your Gloo Gateway setup, you can use the following example route table. apiVersion: networking.gloo.solo.io/v2 kind: RouteTable metadata: name: graphql-bookinfo namespace: bookinfo spec: hosts: - www.example.com http: - name: graphql-bookinfo labels: route: graphql-bookinfo graphql: "true" graphql: stitchedSchema: clusterName: $CLUSTER_NAME name: stitched-graphql-schema namespace: bookinfo matchers: - uri: prefix: /graphql virtualGateways: - name: istio-ingressgateway To route requests from clients that are internal to your setup, such as if you use Gloo Mesh, you can use the following example route table. Note that because the GraphQL destination references the stitched schema resource instead of a service, the value of hosts is arbitrary, as long as the request from the client app matches the host. apiVersion: networking.gloo.solo.io/v2 kind: RouteTable metadata: name: graphql-bookinfo namespace: bookinfo spec: hosts: - graphql-bookinfo.internal.com workloadSelectors: - selector: labels: app: client-app http: - name: graphql-bookinfo labels: route: graphql-bookinfo graphql: "true" graphql: stitchedSchema: clusterName: $CLUSTER_NAME name: bookinfo-stitched-schema namespace: bookinfo matchers: - uri: prefix: /graphql 4. Test routing to your stitched resolver setup. 1. Get the external IP address of your ingress gateway. • GKE LoadBalancer IP address: export INGRESS_GW_IP=$(kubectl get svc -n gloo-mesh-gateways istio-ingressgateway -o jsonpath='{.status.loadBalancer.ingress[0].ip}') echo $INGRESS_GW_IP • EKS LoadBalancer hostname: export INGRESS_GW_IP=$(kubectl get svc -n gloo-mesh-gateways istio-ingressgateway -o jsonpath='{.status.loadBalancer.ingress[0].hostname}') echo $INGRESS_GW_IP 2. Send a request with a query to the GraphQL endpoint to verify that the request is successfully resolved by the gateway. This example command sends the request to the /graphql path and includes a query for the Bookinfo example. curl -vik --resolve www.example.com:443:${INGRESS_GW_IP} https://www.example.com:443/graphql \ -d '{"query":"query { productsForHome { title ratings {reviewer numStars}} }"}' To test routing to the server, choose one of the following options: • Log in to your client app and send a query to the host and path to verify that the GraphQL server is reachable through the route. For the example route table, you might use this curl command: curl http://graphql-bookinfo.internal.com/graphql -d '{"query":"query { productsForHome { title ratings {reviewer numStars}} }"}' • Create a temporary curl pod in the bookinfo namespace and send a request to the GraphQL server from your local machine. 1. Create the curl pod. kubectl run -it -n bookinfo curl --image=curlimages/curl:7.73.0 --rm -- sh 2. Send a request with a query to the GraphQL endpoint to verify that the request is successfully resolved by the gateway. This example command sends the request to the /graphql path and includes a query for the Bookinfo example. curl http://graphql-bookinfo.internal.com/graphql -d '{"query":"query { productsForHome { title ratings {reviewer numStars}} }"}' 3. Exit the temporary pod. The pod deletes itself. exit Reference For more information, see the Gloo Gateway API reference for the GraphQLStitchedSchema CR.
ESSENTIALAI-STEM
Page:The House of Souls.djvu/320 'Apparently a gold coin of some antiquity,' said Dyson coolly. 'Quite so, a gold Tiberius. No, that is wrong. You have found the gold Tiberius. Look at the reverse.' Dyson looked and saw the coin was stamped with the figure of a faun standing amidst reeds and flowing water. The features, minute as they were, stood out in delicate outline; it was a face lovely and yet terrible, and Dyson thought of the well-known passage of the lad's playmate, gradually growing with his growth and increasing with his stature, till the air was filled with the rank fume of the goat. 'Yes,' he said; 'it is a curious coin. Do you know it?' 'I know about it. It is one of the comparatively few historical objects in existence; it is all storied like those jewels we have read of. A whole cycle of legend has gathered round the thing; the tale goes that it formed part of an issue struck by Tiberius to commemorate an infamous excess. You see the legend on the reverse: "Victoria." It is said that by an extraordinary accident the whole issue was thrown into the melting-pot, and that only this one coin escaped. It glints through history and legend, appearing and disappearing, with intervals of a hundred years in time, and continents in place. It was "discovered" by an Italian humanist, and lost and rediscovered. It has not been heard of since 1727, when Sir Joshua Byrde, a Turkey merchant, brought it home from Aleppo, and vanished with it a month after he had shown it to the virtuosi, no man knew or knows where. And here it is!' 'Put it into your pocket, Dyson,' he said, after a
WIKI
Willyan (footballer) Willyan da Silva Barbosa (born 17 February 1994) is a Brazilian footballer who plays for K League 1 club FC Seoul. He also holds Italian nationality. Career Willyan played youth football in homeland Brazil with Bahia and Leme. In January 2011, he was signed by Italian Serie B club Torino, where he played for their youth team until 2013. On 10 August 2013, Willyan was signed by Portuguese Segunda Liga club Beira-Mar in a temporary deal. He was signed permanently on 29 January 2014 on a three-and-a-half-year contract.
WIKI
Destructuring considered harmful A language is said to feature destructuring if it provides a syntax for quickly declaring multiple local variables and assigning their values from the attributes of some complex object. For example, in Ceylon, we let you write: for (k->v in map) { ... } This is a simple kind of destructuring where the key and item attributes of the map Entry are assigned to the locals k and v. Let's see a couple more examples of destructuring, written in a hypothetical Ceylon-like language, before we get to the main point of this post. A number of languages support a kind of parallel assignment syntax for destructuring tuples. In our hypothetical language, it might look like this: String name, Value val = namedValues[i]; Some languages support a kind of destructuring that is so powerful that it's referred to as pattern matching. In our language we might support pattern matching in switch statements, using a syntax something like this: Person|Org identity = getIdentityFromSomewhere(); switch (identity) case (Person(name, age, ...)) { print("Person"); print("Name: " + name); print("Age: " + age); } case (Org(legalName, ...)) { print("Organization"); print("Name: " + legalName); } Now, I've always had a bit of a soft spot for destructuring—it's a minor convenience, but there are certainly cases (like iterating the entries of a map) where I think it improves the code. A future version of Ceylon might feature a lot more support for destructuring, but there are several reasons why I'm not especially enthusiastic about the idea. I'm going to describe just one of them. Let's start with the "pattern matching" example above. And let's stipulate that I—perhaps more than most developers—rely almost completely on my IDE to write my code for me. I use Extract Value, Extract Function, Assign To Local, Rename, ⌘1, etc, in Ceylon IDE like it's a nervous tic. So of course the first thing I want to do when I see code like the above is to run Extract Function on the two branches, resulting in: Person|Org identity = getIdentityFromSomewhere(); switch (identity) case (Person(name, age, ...)) { printPerson(name, age); } case (Org(legalName, ...)) { printOrg(legalName); } ... void printPerson(String name, Integer age) { print("Person"); print("Name: " + name); print("Age: " + age); } void printOrg(String legalName) { print("Organization"); print("Name: " + legalName); } Ooops. Immediately we have a problem. The schema of Person and Org is smeared out over the signatures of printPerson() and printOrg(). This makes the code much more vulnerable to changes to the schema of Person or Org, makes the code more vulnerable to changes to the internal implementation of these methods (if we want to also print the Person's address, we need to add a parameter), and it even makes the code less typesafe. The problem gets worse and worse as I recursively run Extract Value and Extract Function on the implementation of printPerson() and printOrg(). Now consider what we would get without the use of destructuring, as we would do in Ceylon today. We would have started with: Person|Org identity = getIdentityFromSomewhere(); switch (identity) case (is Person) { print("Person"); print("Name: " + identity.name); print("Age: " + identity.age); } case (is Org) { print("Organization"); print("Name: " + identity.legalName); } Whether this is better or worse than the code using of pattern matching is somewhat in the eye of the beholder, but clearly it's not much worse and is arguably even a little cleaner. Now let's run Extract Function on it. We get: Person|Org identity = getIdentityFromSomewhere(); switch (identity) case (is Person) { printPerson(identity); } case (is Org) { printOrg(identity); } ... void printPerson(Person identity) { print("Person"); print("Name: " + identity.name); print("Age: " + identity.age); } void printOrg(Organization identity) { print("Organization"); print("Name: " + identity.legalName); } I think it's very clear that this a much better end result. And I hope it's also clear that this is in no way a contrived example. The arguments I'm making here scale to most uses of pattern matching. The problem here is that introducing local variables too "early" screws things up for refactoring tools. Essentially the same argument applies to tuples: a tuple seems like a convenient thing to use when you "just" have a quick helper function that returns two values. But after a few iterations of Extract Function/Extract Value, you wind up with five functions with the tuple type (String, Value) smeared out all over the place, resulting in code that is significantly more brittle than it would have been with a NamedValue class. I've repeatedly heard the complain that "oh but sometimes it's just not worth writing a whole class to represent the return value of one function". I think this overlooks the effect of code growing and evolving and being refactored. And it also presupposes that writing a class is a pain, as it is in Java. But in Ceylon writing a class is easy—indeed, it looks just like a function! Instead of this: (String, Value) getNamedValue(String name) { return (name, findValueForName(name)); } we can just write this: class NamedValue(name) { shared String name; shared Value val = findValueForName(name); } No constructor, no getters/setters, and if this is a member of another class, you can just annotate it shared default, and it's even polymorphic, meaning that there is not even a need to write a factory method. And this solution comes with the huge advantage that the schema of a NamedValue is localized in just one place, and won't start to "smear out" as your codebase grows and evolves.
ESSENTIALAI-STEM
Liquidmetal Technologies Reports First Results LAKE FOREST, Calif.--(BUSINESS WIRE)-- Liquidmetal® Technologies, Inc. (OTCQB: LQMT), the leading developer of amorphous alloys and composites, reported results for its first quarter ended March 31, 2018. Management Commentary Regarding the Company’s results for the first quarter of 2018, Paul Hauck, the Company’s Executive Vice President of Sales and Marketing noted “The Liquidmetal sales and marketing team increased it’s go-to-market and sales intensity during the first quarter of 2018, stimulating customer interest. The Company’s successful biocompatibility testing results have helped generate medical device manufacturer interests and new prototype orders during the first quarter. Several key prototype programs from the medical and automotive markets are in testing with customers, and some are anticipated to yield production tooling orders before the end of 2018. Additionally, changes in pricing strategies have helped generate the largest number of key opportunities the Company has observed in the past two years.” Mr. Hauck went on to note that “The Company received production orders from Zyris/Isolite and C.F. Martin during the first quarter. Both customer orders provide the Company with the opportunity to demonstrate ongoing production capabilities to new customers. Liquidmetal also passed its first detailed customer quality audit recently, which increases the Company’s confidence in meeting demanding customer requirements.” Q1 2018 Financial Summary During the first quarter of 2018, the Company generated $80 thousand in revenue as it continued to focus on the development and manufacturing of prototype and commercial parts for its customers and partnering with licensees on the development of the Company’s technology and production processes. Selling, marketing, general and administrative expense was $1.6 million in Q1 2018, as compared to $1.7 million in Q1 2017. The decrease was primarily due to reductions in overall headcount, and associated salary expense. Research and development expense was $0.6 million in Q1 2018, as compared to $0.4 million in Q1 2017. The increase from the prior year was mainly due to additional expenses associated with alloy and application development. Cash and restricted cash totaled $39.9 million at March 31, 2018, as compared to $41.3 million at December 31, 2017. For a more detailed and complete analysis of the Company’s financial results, please refer to the Company’s March 31, 2018 Form 10Q, which was filed earlier today. About Liquidmetal Technologies Lake Forest, California-based Liquidmetal Technologies, Inc. is the leading producer of parts made with amorphous alloys, also known scientifically as Bulk Metallic Glasses or BMGs. The non-crystalline atomic structure of these materials imparts unique performance properties, including the ability to injection-mold with micron-level precision, lustrous finishes, high strength, hardness and corrosion resistance, and remarkable elasticity. Liquidmetal Technologies is the first company to produce amorphous alloy parts commercially, enabling significant improvements in products across a wide array of industries. For more information, go to www.liquidmetal.com . Forward-Looking Statement This press release contains "forward-looking statements," including but not limited to statements regarding the advantages of Liquidmetal's amorphous alloy technology, scheduled manufacturing of customer parts and other statements associated with Liquidmetal's technology and operations. These statements are based on current expectations of future events. If underlying assumptions prove inaccurate or unknown risks or uncertainties materialize, actual results could vary materially from Liquidmetal's expectations and projections. Risks and uncertainties include, among other things; customer adoption of Liquidmetal's technologies and successful integration of those technologies into customer products; potential difficulties or delays in manufacturing products incorporating Liquidmetal's technologies; Liquidmetal's ability to fund its current and anticipated operations; the ability of third party suppliers and manufacturers to meet customer product requirements; general industry conditions; general economic conditions; and governmental laws and regulations affecting Liquidmetal's operations. Additional information concerning these and other risk factors can be found in Liquidmetal's public periodic filings with the U.S. Securities and Exchange Commission, including the discussion under the heading "Risk Factors" in Liquidmetal's 2017 Annual Report on Form 10-K. LIQUIDMETAL TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED BALANCE SHEETS (in thousands, except par value and share data) March 31, December 31, 2018 2017 (Unaudited) (Audited) ASSETS Current assets: Cash $ 39,873 $ 41,309 Restricted cash 5 5 Trade accounts receivable 37 157 Inventory 467 391 Prepaid expenses and other current assets 232 326 Total current assets $ 40,614 $ 42,188 Property and equipment, net 12,281 12,465 Patents and trademarks, net 387 408 Other assets 14 14 Total assets $ 53,296 $ 55,075 LIABILITIES AND SHAREHOLDERS' EQUITY Current liabilities: Accounts payable 163 92 Accrued liabilities 361 365 Deferred revenue 1 7 Total current liabilities $ 525 $ 464 Long-term liabilities: Warrant liabilities, long-term 2,467 2,192 Other long-term liabilities 856 856 Total liabilities $ 3,848 $ 3,512 Shareholders' equity: Preferred Stock, $0.001 par value; 10,000,000 shares authorized; 0 shares issued and outstanding at March 31, 2018 and December 31, 2017, respectively - - Common stock, $0.001 par value; 1,100,000,000 shares authorized; 909,183,592 and 908,768,116 shares issued and outstanding at March 31, 2018 and December 31, 2017, respectively 909 909 Warrants 18,179 18,179 Additional paid-in capital 278,247 277,924 Accumulated deficit (247,814 ) (245,376 ) Non-controlling interest in subsidiary (73 ) (73 ) Total shareholders' equity 49,448 51,563 Total liabilities and shareholders' equity $ 53,296 $ 55,075 LIQUIDMETAL TECHNOLOGIES, INC. AND SUBSIDIARIES CONSOLIDATED STATEMENTS OF OPERATIONS AND COMPREHENSIVE LOSS (in thousands, except share and per share data) (unaudited) For the Three Months Ended March 31, 2018 2017 Revenue Products $ 80 $ 48 Licensing and royalties - - Total revenue 80 48 Cost of sales 81 62 Gross loss (1 ) (14 ) Operating expenses Selling, marketing, general and administrative 1,585 1,703 Research and development 610 392 Total operating expenses 2,195 2,095 Operating loss (2,196 ) (2,109 ) Change in value of warrant liabilities, gain (loss) (275 ) 1,150 Interest income 33 14 Net loss and comprehensive loss (2,438 ) (945 ) Net loss attributable to non-controlling interest - 2 Net loss and comprehensive loss attributable to Liquidmetal Technologies shareholders $ (2,438 ) $ (943 ) Net loss per common share attributable to Liquidmetal Technologies shareholders, basic and diluted $ (0.00 ) $ (0.00 ) Number of weighted average shares - basic and diluted 908,912,441 888,053,138 View source version on businesswire.com : https://www.businesswire.com/news/home/20180508006656/en/ Liquidmetal Technologies, Inc. Bryce Van Media Relations 949-635-2107 bryce.van@liquidmetal.com Source: Liquidmetal Technologies
NEWS-MULTISOURCE
Search • Richard Doran-Sherlock Persistant Pain Management Persistent pain – pain which lasts more than three months following the initial injury – is a very common occurrence in Ireland. Some research suggests that over a third of Irish adults may be impacted by the condition1 and up to half of those may be people suffering with low back pain.  Pain is as unique as the person experiencing it, but increasing numbers of studies show that understanding the condition is a key step in learning to overcome it2. There is a lot of information available about pain online, and it can be sometimes challenging to sort the wheat from the chaff. An excellent non-technical guide to the topic has been published by the Tasmanian Health Service3. This guide follows the best available evidence, and shows how we as osteopaths can help you on your journey, by following these steps: 1. Taking your case history and conducting a thorough examination; this allows us to rule out certain health conditions which can present as musculoskeletal pain. 2. Education: we can help you to understand how and why pain may be occurring, and most importantly, what can be done to overcome it. 3. Goal setting: helping you to identify goals which are important to you, and developing a progressive programme to get you there. 4. Introducing movement: through hands-on treatment and exercise prescription, we can reintroduce patterns of movement which may have been reduced by pain 5. Listening: everything we do is based on your values. We’re there to listen to you explore them. References: 1. Slattery et al. (2011). Prevalence, impact and cost of multimorbidity in a cohort of people with chronic pain in Ireland: a study protocol. BMJ Open, 7:e012131, 1-8. 2. Foster et al. (2018). Prevention and treatment of low back pain: evidence, challenges and promising directions. The Lancet, 391(10137), 2368-2383. 3. Tasmanian Health Service. (2014). Understanding Persistent Pain: How to turn down the volume on Persistent Pain. Available from: https://outpatients.tas.gov.au/__data/assets/pdf_file/0003/172578/CSS_-_Physiotherapy_-_Understanding_Persistent_Pain_Booklet.pdf 11 views0 comments Recent Posts See All Pain and Osteopathy Pain is a fundamental part of life, but defining it can be slightly tricky. The International Association for the Study of Pain describes “an unpleasant sensory and emotional experience associated wit Are we sitting to our detriment? If people have been sitting down at their desks in the office for 100 years or more, why are we now seeing so many postural induced injuries? The advent of increased computer use, Wi-Fi and delayed pr VISIT US Suite 12 Morrison Chambers 32 Nassau St Dublin 2 Call to schedule your initial consultation today! 01 679 8589 CALL 01 679 8589   EMAIL info@dublinosteopathy.com   • YouTube • Instagram • Wix Facebook page • Wix Twitter page FOLLOW US @2021 Dublin Osteopathy
ESSENTIALAI-STEM
Why Should You Get Enough Sleep? Why Should You Get Enough Sleep? How many hours of sleep do you get each night? Do you have any trouble falling asleep or sleeping soundly? How do you feel in the morning after sleepi 7 Things You Should Stop Doing to Achieve a Healthy Self Image 9 Ways to Keep Your Heart Healthy as You Age UltraCore Power Review – The Practical Choice How many hours of sleep do you get each night? Do you have any trouble falling asleep or sleeping soundly? How do you feel in the morning after sleeping only a couple of hours? Just like a healthy diet and regular exercise, a good night’s sleep is key to good health. People who get enough sleep have better physical health, mental health, and quality of life than those who lack sleep. If you do not get enough sleep, your body will not be able to rest and recharge, leaving you exhausted and groggy the next day. Your brain will also be a mess, making it difficult to efficiently process information, concentrate on tasks at hand, and be in a good mood. How much sleep should you get? The amount of sleep that a person has to have per day varies over his or her lifetime. During the early years, he or she needs a lot more sleep than when she reaches his or her teenage and adult years. According to the American Academy of Sleep Medicine or AASM, below are the recommended numbers of hours of sleep per age group: • From age 0 to 1 year – Between 12 and 16 hours per day (including multiple nap times) • 1 year to 2 years – Between 11 and 14 hours per day (including multiple nap times) • 3 years to 5 years – Between 10 and 13 hours per day (including multiple nap times) • 6 years to 12 years – Between 9 and 12 hours per day • 13 years to 18 years – Between 8 and 10 hours per day • 19 years or older – Between 7 and 8 hours per day What will happen if you do not get enough sleep? Sleep deprivation is not good for your health. If you fail to get the recommended amount of sleep, you will be tired the entire day, and not have the energy to do the things that you usually do. You will lose focus and not be alert, which can be very dangerous if you are driving or doing things that require precision and attention. To know if you need more sleep, watch out for the following symptoms: • You doze off while watching TV or reading a book. • You doze off while stuck in traffic for even just a few minutes. • You doze off while in class, a meeting, or a movie theater. • You doze off while driving. If your sleep deficiency is not addressed at the earliest opportunity, you will encounter more severe learning, reacting, and focusing problems. You will have difficulties remembering information, finding solutions to problems, making decisions, managing your behavior and emotions, and socializing. What tips and tricks can you try to sleep better? Sufficient sleep is crucial to the proper functioning of your vital organs and systems. Therefore, you have to fix the problem as soon as possible, before your condition gets worse. Below are some sleeping techniques and strategies you can use to improve your sleeping habits: Have a consistent sleeping and waking up schedule comfortable cozy bedYou should try to go to bed at the same time every day and wake up at the same time every day so as not to mess up your internal body clock. For example, on workdays, you can set 10 pm as your bedtime and 6 am as your wake up time, and on weekends, try not to sleep or wake up much later than usual. If you can stick to that routine every day, it will be easier for you to get sufficient sleep. Avoid exercising before going to bed You should spend the hour before your bedtime doing relaxing activities, such as listening to mellow music, doing some light reading, or soaking in the tub, which can help your body fall asleep. Do not do your workout session so close to your sleep, because the increase in physical activity will make your brain think that it is time to be awake and active, making it difficult to sleep. Do not eat a large meal shortly before bedtime If you usually go to sleep at 10 pm, you should not have a large dinner feast at 8 pm or later, because your body will need more time to digest so much food, and that can keep you awake way past your bedtime. It is best that you eat a large meal much earlier or eat less. Do not drink coffee so late in the day Coffee contains caffeine, a stimulant that increases the activity of the central nervous system. If you drink even just a cup late in the afternoon, you will not be able to fall asleep right away because the effects can take as many as 8 hours to wear off. If you really want to drink coffee, make sure to do it early in the day so that the caffeine will not interfere with your sleep. Keep your bedroom dark, cool, and quiet It is important that the place where you sleep is comfortable and cozy. You can use blackout curtains for the windows to keep out the bright lights from the streetlamps or billboards outside. Then, set your air conditioner to a not-so-cold-but-not-so-warm temperature, so you do not freeze or get all sweaty and wake up in the middle of the night. Also, make sure that your windows and doors are shut to keep the noise out. Be more physically active morning exerciseRegular exercise offers a lot of health benefits, including good sleep. When you workout, your body releases hormones that can lower your stress levels, improve your mood, and strengthen your heart and other vital organs, making it much easier for you to fall asleep. Limit your nap times Many adults take naps during the day to avail of quick energy boosts to help them get through the day. However, if these naps are longer than 20 minutes or are taken late in the afternoon, falling asleep at night will become difficult. To avoid having sleeping problems, limit naps to a maximum of 20 minutes and make sure to take them not later than early in the afternoon.
ESSENTIALAI-STEM
Talk:Kenneth Lutchen Incorrect information * * “Measurement of intra-individual airway tone heterogeneity and its importance in asthma”, Journal of Applied Physiology, 2016 This study is not written by K Lutchen, see doi: 10.1152/japplphysiol.00545.2015 Editors should be careful about such sensitive topics. Egeymi (talk) 06:45, 26 October 2023 (UTC)
WIKI
Rising Aluminium Prices to Drive Alcoa's Value Alcoa ( AA ) is the world leader in the production and management of primary aluminum, fabricated aluminum and alumina. The company has a significant presence in all segments of the aluminum industry and operates in more than 31 countries worldwide. The company competes with other international metals and mining giants like Rusal, Rio Tinto ( RIO ), BHP Billiton ( BHP ) and Chalco ( ACH ). The company recently released its Q4 2010 earnings, and we have updated our price estimate to $17.28 based on a reduction in total debt, an increase in revenues from better product pricing and better cash management leading to cost savings. Primary Metals the Biggest Driver of Value The primary metals division produces primary aluminum used by Alcoa's fabricating businesses, and it is sold to external customers, aluminum traders and on commodity markets. While our analysis shows that it was Alcoa's most valuable division in terms of contributor to shareholder's income, we have further increased our estimates for the overall value of the division going forward. Aluminum prices have increased over the last 2 years since their sudden decline from peak prices in mid-2008. The 13% increase in global aluminum prices in 2010 has been directly responsible for the observed increase in the division's revenue. We capture the impact of the aluminum prices on Alcoa's revenues in our forecast for the yearly average price of primary metals. With demand for aluminum predicted to increase from 10-15% in developing countries like China, South Korea, Thailand and India, Alcoa's estimate of a 12% growth rate for 2011 is well justified. We believe that the demand growth will increase Alcoa's revenue per ton of aluminum sold to as high as $3,400 in coming years from its current value of about $2,500. See the complete $17.28 Trefis Price estimate for Alcoa's stock . The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
1985–86 Cypriot Fourth Division The 1985–86 Cypriot Fourth Division was the first season of the Cypriot fourth-level football league. The championship was split into three geographical groups, representing the Districts of Cyprus. The winners were: * Nicosia-Keryneia Group: OXEN Peristeronas * Larnaca-Famagusta Group: Dynamo Pervolion * Limassol-Paphos Group: APEI Ipsona The three winners were promoted to the 1986–87 Cypriot Third Division. No team were relegated to regional leagues.
WIKI
SG Lucense Sociedad Gimnástica Lucense was a Spanish football club based in Lugo, in the autonomous community of Galicia. History Founded in 1943, the club immediately started to play in Tercera División, achieving promotion in 1949. After finishing 16th in the 1951–52 season, the club was dissolved. It happened on July 29, 1952, due to the unpaid debt. One year later, Gimnástica merged with CD Polvorín and created CD Lugo. Season to season * 3 season in Segunda División * 6 seasons in Tercera División
WIKI
Trump risks nuclear crisis in Iran | TheHill President TrumpDonald John TrumpPence: Intelligence shows Iran directing militias not to attack U.S. targets Mnuchin aims to wait until end of 2020 to disclose Secret Service costs for Trump's travel: report Pressure building on Pelosi over articles of impeachment MORE is increasingly facing the possibility of a nuclear crisis with Iran, as Tehran takes its biggest step back from the 2015 nuclear deal. Iran’s decision to stop adhering to limits in the Obama-era nuclear agreement comes just days after Trump authorized a drone strike that killed Gen. Qassem Soleimani, posing a major test of the Trump administration’s gambit to withdraw from the international accord. While Iran hasn’t kicked out nuclear inspectors, and has even left open the possibility of coming back into compliance, experts say Sunday’s announcement by Tehran brings the deal closer to collapse than ever before. “For all practical purposes, they have pulled out of the agreement, or whatever was left of the agreement they hadn’t pulled out of,” said Ray Takeyh, a senior fellow at the Council on Foreign Relations. “The nuclear deal … had already been attenuated through a series of steps that Iran has taken. This is certainly the culminating step.” Iran has been gradually stepping back since last spring in a bid to pressure Trump to relax sanctions, or to encourage Europe to find a viable workaround to the harsh U.S. sanctions that were imposed after Trump withdrew from the deal in 2018. Three years earlier, the agreement between Iran and other world powers gave Tehran sanctions relief in exchange for curbs on its nuclear program. But after the U.S. withdrawal, new sanctions have crippled Iran’s economy. Iran had set an early January deadline for its next step away from the deal, even before last week’s U.S. strike in Baghdad killed Soleimani, the Quds Force leader. But his unexpected death has ratcheted up tensions between the United States and Iran, stoking fears about a military confrontation and making any step away from the nuclear deal now that much more fraught. “The degree of their abandonment of the JCPOA may have come about as a result” of Soleimani’s death, Takeyh said, using the acronym for the official name of the deal. On Sunday, Iran announced it would no longer adhere to the deal’s limits on uranium enrichment. Trump responded to the news Monday by tweeting in all caps that “Iran will never have a nuclear weapon!” Asked if Trump still believes it’s possible to renegotiate the nuclear deal, White House counselor Kellyanne ConwayKellyanne Elizabeth ConwayTrump campaign planning Iowa rally ahead of Democratic caucuses: report The Hill's 12:30 Report: Schumer to force votes on impeachment witnesses Pompeo pushes back on NBC's Mitchell: 'You're not really wondering, Andrea' MORE reiterated Trump’s willingness to meet with Iranian officials. “He said he’s open to meet,” Conway told reporters. “If Iran wants to start behaving like a normal country ... sure, absolutely.” Despite saying it was no longer bound by the deal’s limits, Iran did not immediately announce actions to increase its uranium enrichment and reiterated its pledge to come back into compliance with the deal if it gets sanctions relief. Iran also maintained that its nuclear program is not a weapons program. Iran also said it would continue cooperating with International Atomic Energy Agency (IAEA) inspectors. The IAEA said Monday its “inspectors continue to verify and monitor activities in the country.” The nuclear deal was intended to keep Iran’s so-called breakout time — or the time it would take to produce enough highly enriched uranium for one nuclear weapon — at roughly a year. The decision not to follow the agreement’s limits will significantly reduce that time, though by how much depends on exactly what action Iran takes. Takeyh predicted Iran could begin enriching uranium up to 20 percent, which is still below weapons-grade but speeds up the time it takes to get there. France’s foreign minister said Monday that European powers would decide in the coming days whether to trigger the agreement’s dispute mechanism, a move that could lead to renewed United Nations sanctions on Iran. “The latest decisions mean that the Iranians can now enrich uranium without any constraints, with the quantities they want, in the areas they want, and with the number of centrifuges they want,” French Foreign Minister Jean-Yves Le Drian told BFM TV. “The repeated violations leave us today asking about the long-term validity of this accord.” The European Union is scheduled to hold an emergency meeting Friday afternoon to discuss the matter. “Deeply regret Iran’s latest announcement on #JCPOA,” EU foreign policy chief Josep Borrell Fontelles tweeted Monday. “As ever we will rely on @iaeaorg verification. Full implementation of #NuclearDeal by all is now more important than ever, for regional stability & global security. I will continue working with all participants on way forward.” Iran hawks framed Tehran’s announcement as vindication of their arguments that it never intended to adhere to the nuclear deal. “Another good day,” former national security adviser John BoltonJohn BoltonPressure building on Pelosi over articles of impeachment The Bill Clinton trial cannot serve as the model for the Donald Trump trial Hoyer: House Democrats reserving option to subpoena Bolton MORE tweeted Sunday. “Iran rips the mask off the idea it ever fully complied with the nuclear deal, or that it made a strategic decision to forswear nuclear weapons. Now, it’s on to the real job: effectively preventing the ayatollahs from getting such a capability.” But others argued Trump’s so-called maximum pressure campaign against Iran is to blame. “President Trump foolishly set the collapse of the multilateral agreement in motion in 2018 when he unilaterally pulled the United States out of the agreement and reimposed crippling sanctions on Iran, despite repeated confirmation by the International Atomic Energy Agency that Iran was complying with its terms,” Edwin Lyman, a senior scientist in the Union of Concerned Scientists’ Global Security Program, said in a statement Monday. Lyman added that Trump should take diplomatic steps, including recommitting to the nuclear deal, “instead of ratcheting up pressure, which would give Iranian hard-liners the upper hand and could prod Iran to develop nuclear weapons.” In an opinion piece for The New York Times, former Obama administration official Philip Gordon and RAND Corporation associate political scientist Ariane Tabatabai warned Iran’s decision on the nuclear deal means the costs of Soleimani’s death are “mounting beyond the already significant risks of Iranian retaliation and subsequent military confrontation.” “If the Trump administration does not move to reduce tensions, it will soon find itself facing the very dilemma the nuclear deal was designed to avoid,” they wrote, “the choice between a nuclear Iran or the need to start a war to prevent one.” View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2020 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
clang  7.0.0svn Public Member Functions | Public Attributes | List of all members clang::format::ParenState Struct Reference #include "/opt/doxygen-docs/src/llvm/tools/clang/lib/Format/ContinuationIndenter.h" Collaboration diagram for clang::format::ParenState: Collaboration graph [legend] Public Member Functions  ParenState (const FormatToken *Tok, unsigned Indent, unsigned LastSpace, bool AvoidBinPacking, bool NoLineBreak)   bool operator< (const ParenState &Other) const   Public Attributes const FormatTokenTok  The token opening this parenthesis level, or nullptr if this level is opened by fake parenthesis. More...   unsigned Indent  The position to which a specific parenthesis level needs to be indented. More...   unsigned LastSpace  The position of the last space on each level. More...   unsigned NestedBlockIndent  If a block relative to this parenthesis level gets wrapped, indent it this much. More...   unsigned FirstLessLess = 0  The position the first "<<" operator encountered on each level. More...   unsigned QuestionColumn = 0  The column of a ? in a conditional expression;. More...   unsigned ColonPos = 0  The position of the colon in an ObjC method declaration/call. More...   unsigned StartOfFunctionCall = 0  The start of the most recent function in a builder-type call. More...   unsigned StartOfArraySubscripts = 0  Contains the start of array subscript expressions, so that they can be aligned. More...   unsigned NestedNameSpecifierContinuation = 0  If a nested name specifier was broken over multiple lines, this contains the start column of the second line. More...   unsigned CallContinuation = 0  If a call expression was broken over multiple lines, this contains the start column of the second line. More...   unsigned VariablePos = 0  The column of the first variable name in a variable declaration. More...   bool BreakBeforeClosingBrace: 1  Whether a newline needs to be inserted before the block's closing brace. More...   bool AvoidBinPacking: 1  Avoid bin packing, i.e. More...   bool BreakBeforeParameter: 1  Break after the next comma (or all the commas in this context if AvoidBinPacking is true). More...   bool NoLineBreak: 1  Line breaking in this context would break a formatting rule. More...   bool NoLineBreakInOperand: 1  Same as NoLineBreak, but is restricted until the end of the operand (including the next ","). More...   bool LastOperatorWrapped: 1  True if the last binary operator on this level was wrapped to the next line. More...   bool ContainsLineBreak: 1  true if this ParenState already contains a line-break. More...   bool ContainsUnwrappedBuilder: 1  true if this ParenState contains multiple segments of a builder-type call on one line. More...   bool AlignColons: 1  true if the colons of the curren ObjC method expression should be aligned. More...   bool ObjCSelectorNameFound: 1  true if at least one selector name was found in the current ObjC method expression. More...   bool HasMultipleNestedBlocks: 1  true if there are multiple nested blocks inside these parens. More...   bool NestedBlockInlined: 1  The start of a nested block (e.g. More...   bool IsInsideObjCArrayLiteral: 1  true if the current ParenState represents an Objective-C array literal. More...   Detailed Description Definition at line 202 of file ContinuationIndenter.h. Constructor & Destructor Documentation ◆ ParenState() clang::format::ParenState::ParenState ( const FormatToken Tok, unsigned  Indent, unsigned  LastSpace, bool  AvoidBinPacking, bool  NoLineBreak  ) inline Definition at line 203 of file ContinuationIndenter.h. Member Function Documentation ◆ operator<() bool clang::format::ParenState::operator< ( const ParenState Other) const inline Member Data Documentation ◆ AlignColons bool clang::format::ParenState::AlignColons true if the colons of the curren ObjC method expression should be aligned. Not considered for memoization as it will always have the same value at the same token. Definition at line 310 of file ContinuationIndenter.h. ◆ AvoidBinPacking bool clang::format::ParenState::AvoidBinPacking Avoid bin packing, i.e. multiple parameters/elements on multiple lines, in this context. Definition at line 277 of file ContinuationIndenter.h. Referenced by operator<(). ◆ BreakBeforeClosingBrace bool clang::format::ParenState::BreakBeforeClosingBrace Whether a newline needs to be inserted before the block's closing brace. We only want to insert a newline before the closing brace if there also was a newline after the beginning left brace. Definition at line 273 of file ContinuationIndenter.h. Referenced by operator<(). ◆ BreakBeforeParameter bool clang::format::ParenState::BreakBeforeParameter Break after the next comma (or all the commas in this context if AvoidBinPacking is true). Definition at line 281 of file ContinuationIndenter.h. Referenced by operator<(). ◆ CallContinuation unsigned clang::format::ParenState::CallContinuation = 0 If a call expression was broken over multiple lines, this contains the start column of the second line. Otherwise 0. Definition at line 261 of file ContinuationIndenter.h. Referenced by operator<(). ◆ ColonPos unsigned clang::format::ParenState::ColonPos = 0 The position of the colon in an ObjC method declaration/call. Definition at line 246 of file ContinuationIndenter.h. Referenced by operator<(). ◆ ContainsLineBreak bool clang::format::ParenState::ContainsLineBreak true if this ParenState already contains a line-break. The first line break in a certain ParenState causes extra penalty so that clang-format prefers similar breaks, i.e. breaks in the same parenthesis. Definition at line 299 of file ContinuationIndenter.h. Referenced by operator<(). ◆ ContainsUnwrappedBuilder bool clang::format::ParenState::ContainsUnwrappedBuilder true if this ParenState contains multiple segments of a builder-type call on one line. Definition at line 303 of file ContinuationIndenter.h. Referenced by operator<(). ◆ FirstLessLess unsigned clang::format::ParenState::FirstLessLess = 0 The position the first "<<" operator encountered on each level. Used to align "<<" operators. 0 if no such operator has been encountered on a level. Definition at line 240 of file ContinuationIndenter.h. Referenced by operator<(). ◆ HasMultipleNestedBlocks bool clang::format::ParenState::HasMultipleNestedBlocks true if there are multiple nested blocks inside these parens. Not considered for memoization as it will always have the same value at the same token. Definition at line 323 of file ContinuationIndenter.h. ◆ Indent unsigned clang::format::ParenState::Indent The position to which a specific parenthesis level needs to be indented. Definition at line 223 of file ContinuationIndenter.h. Referenced by operator<(). ◆ IsInsideObjCArrayLiteral bool clang::format::ParenState::IsInsideObjCArrayLiteral true if the current ParenState represents an Objective-C array literal. Definition at line 331 of file ContinuationIndenter.h. ◆ LastOperatorWrapped bool clang::format::ParenState::LastOperatorWrapped True if the last binary operator on this level was wrapped to the next line. Definition at line 292 of file ContinuationIndenter.h. Referenced by operator<(). ◆ LastSpace unsigned clang::format::ParenState::LastSpace The position of the last space on each level. Used e.g. to break like: functionCall(Parameter, otherCall( OtherParameter)); Definition at line 230 of file ContinuationIndenter.h. Referenced by operator<(). ◆ NestedBlockIndent unsigned clang::format::ParenState::NestedBlockIndent If a block relative to this parenthesis level gets wrapped, indent it this much. Definition at line 234 of file ContinuationIndenter.h. Referenced by operator<(). ◆ NestedBlockInlined bool clang::format::ParenState::NestedBlockInlined The start of a nested block (e.g. lambda introducer in C++ or "function" in JavaScript) is not wrapped to a new line. Definition at line 327 of file ContinuationIndenter.h. Referenced by operator<(). ◆ NestedNameSpecifierContinuation unsigned clang::format::ParenState::NestedNameSpecifierContinuation = 0 If a nested name specifier was broken over multiple lines, this contains the start column of the second line. Otherwise 0. Definition at line 257 of file ContinuationIndenter.h. ◆ NoLineBreak bool clang::format::ParenState::NoLineBreak Line breaking in this context would break a formatting rule. Definition at line 284 of file ContinuationIndenter.h. Referenced by operator<(). ◆ NoLineBreakInOperand bool clang::format::ParenState::NoLineBreakInOperand Same as NoLineBreak, but is restricted until the end of the operand (including the next ","). Definition at line 288 of file ContinuationIndenter.h. ◆ ObjCSelectorNameFound bool clang::format::ParenState::ObjCSelectorNameFound true if at least one selector name was found in the current ObjC method expression. Not considered for memoization as it will always have the same value at the same token. Definition at line 317 of file ContinuationIndenter.h. ◆ QuestionColumn unsigned clang::format::ParenState::QuestionColumn = 0 The column of a ? in a conditional expression;. Definition at line 243 of file ContinuationIndenter.h. Referenced by operator<(). ◆ StartOfArraySubscripts unsigned clang::format::ParenState::StartOfArraySubscripts = 0 Contains the start of array subscript expressions, so that they can be aligned. Definition at line 253 of file ContinuationIndenter.h. Referenced by operator<(). ◆ StartOfFunctionCall unsigned clang::format::ParenState::StartOfFunctionCall = 0 The start of the most recent function in a builder-type call. Definition at line 249 of file ContinuationIndenter.h. Referenced by operator<(). ◆ Tok const FormatToken* clang::format::ParenState::Tok The token opening this parenthesis level, or nullptr if this level is opened by fake parenthesis. Not considered for memoization as it will always have the same value at the same token. Definition at line 219 of file ContinuationIndenter.h. ◆ VariablePos unsigned clang::format::ParenState::VariablePos = 0 The column of the first variable name in a variable declaration. Used to align further variables if necessary. Definition at line 266 of file ContinuationIndenter.h. Referenced by operator<(). The documentation for this struct was generated from the following file:
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Pentastar Alignment The result was no consensus. Yamamoto Ichiro 会話 03:09, 21 January 2008 (UTC) Pentastar Alignment * – (View AfD) (View log) In-universe plot summary with no assertion of notability or even context for non-fans. --EEMIV (talk) 14:23, 14 January 2008 (UTC) * Delete per nom. No assertion of notability per WP:N. Mh29255 (talk) 14:42, 14 January 2008 (UTC) * Delete. This fails WP:FICT. -- Mikeblas (talk) 15:19, 14 January 2008 (UTC) * There does not appear to be any evidence in any of the above rationales that editors have checked any of the three sources cited in the article (at the time of nomination), to see how in-depth their coverage of this subject actually is. As such, the rationales about notability are flawed. I suggest that editors familiarize themselves with the criteria set out in Notability, and then actually make the effort to examine the provenances and depths of the sources cited. Uncle G (talk) 17:03, 14 January 2008 (UTC) * Comment - I'm familiar with the sources. All they do is substantiate plot summary. There are no sources -- or even claims -- about this topic's real-world notability, development, critical response etc. I know WP:N -- how about you take a look at WP:FICT and WP:WAF. --EEMIV (talk) 17:20, 14 January 2008 (UTC) * WP:WAF began life as an essay that I wrote in January 2005. By arguing that the source substantiates the summary, you have argued that it is verifiable from a secondary source, rather than verifiable solely through reading the works of fiction themselves, and not original research. Uncle G (talk) 18:20, 14 January 2008 (UTC) * The origins of WAF don't particularly matter. Consensus in January 2008 is that articles about fictional topics need to demonstrate real-world significance, and not simply regurgitate the plot. This article does not do this. The article does not even assert that the topic matters in the real world, let alone why it matters or where that evidence is found. --EEMIV (talk) 18:24, 14 January 2008 (UTC) * Delete- As there is no assertion of notability through reliable sourcing. Judgesurreal777 (talk) 17:15, 14 January 2008 (UTC) * The book by Kevin J. Anderson, the very first source cited, would seem to be a reliable source. After all he, of all people, would seem to be an expert in this area. Uncle G (talk) 18:20, 14 January 2008 (UTC) * Note: This debate has been included in the list of Science fiction-related deletion discussions. —• Gene93k (talk) 08:17, 15 January 2008 (UTC) * Notability is established through multiple reliable secondary sources, so that would be a start. Judgesurreal777 (talk) 22:42, 15 January 2008 (UTC) * Weak keep because a more generally understandable article can be written since there are sources. As is, just as EEMIV says, it takes an expert to figure it out. DGG (talk) 17:54, 16 January 2008 (UTC) * Weak keep I'm certainly not an expert here, but I did find an article on the topic from 1994. Really I don't have a clue how important the topic is, but it does seem sourced. Hobit (talk) 22:41, 17 January 2008 (UTC) * Should have mentioned I added the source. It is an entire article on the topic. I don't have access to the article, but I'm still guessing that what looks like a ~15 page article in a published magazine is a reasonable source. But I honestly don't know, thus the weak keep. Hobit (talk) 20:29, 18 January 2008 (UTC)
WIKI
Morgan Rogers Morgan Elliot Rogers (born 26 July 2002) is an English professional footballer who plays as a midfielder or forward for club Aston Villa. Rogers is a product of the West Bromwich Albion academy. He has represented England at all youth levels up to U21. West Bromwich Albion Born in Halesowen, Rogers joined West Bromwich Albion at under-9 level. He made his professional debut for West Brom on 6 February 2019, coming on as an 82nd minute substitute for Wes Hoolahan against Brighton & Hove Albion in the FA Cup. Manchester City Rogers signed for Manchester City on 1 August 2019, after playing against them for West Bromwich Albion in the FA Youth Cup semi-final. Lincoln City (loan) On 4 January 2021, Rogers signed for Lincoln City on loan until the end of the season. He would make his debut for the club against Peterborough United a few days later, coming off the bench and he would score his first professional goal against Portsmouth in a 1–0 win on 26 January. Three goals from seven games during the month of March would see him pick up the EFL Young Player of the Month award during his loan spell. Bournemouth (loan) On 23 August 2021, Rogers signed for AFC Bournemouth on loan until the end of the season. He scored his only goal for the club on 15 January 2022, in a 3–2 Championship defeat against Luton Town. Blackpool (loan) On 4 January 2023, Rogers joined Blackpool on loan for the remainder of the season. Rogers scored his only goal for the club in a 1–0 win against Norwich City on 8 May 2023. Middlesbrough On 7 July 2023, Rogers signed for Championship club Middlesbrough for an undisclosed fee. Rogers scored his first goal for the club on 29 July, scoring a late equaliser to make it 2–2 in a pre-season friendly against Auxerre. Rogers scored his first competitive goal for the club on 29 August in a 3–1 EFL Cup win against Bolton Wanderers. He scored five times during Middlesbrough's run to the EFL Cup semi-finals, making him the competition's top goalscorer for the season. Aston Villa On 1 February 2024, Rogers signed for Premier League club Aston Villa for an undisclosed fee, reported to be £8m, potentially rising to £15m with performance-related add-ons. Manchester City were entitled to 25% of the fee, due to a sell-on clause in the original transfer to Middlesbrough. On 3 February, Rogers made his Premier League debut as a late substitute in a 5–0 victory away at Sheffield United. On 6 April 2024, Rogers scored his first goal for Aston Villa in a 3–3 draw against Brentford. International career Rogers has represented England at under-15, under-16, under-17 and under-18 level. He represented the England under-16 team at the 2018 Montaigu Tournament. In September 2018, Rogers scored a hat-trick for the England under-17 team in a game against Belgium. The following month saw him score against the United States as well as scoring the final goal in a 3–1 victory against Brazil. In March 2019, Rogers scored twice in an elite qualifier against Switzerland. In April 2019, Rogers was included in the England squad for the 2019 UEFA European Under-17 Championship. Rogers made his England under-18 debut as a 64th minute substitute during a 3–2 win over Australia on 6 September 2019. On 6 September 2021, Rogers made his debut for the England U20s during a 6–1 victory over Romania U20s at St. George's Park. On 22 March 2024, Rogers made his debut for the England U21s during a 5–1 victory over Azerbaijan in Baku during 2025 UEFA European Under-21 Championship qualification. Honours Manchester City U18 * FA Youth Cup: 2019–20 Individual * EFL League One Young Player of the Month: March 2021 * EFL Cup top scorer: 2023–24
WIKI
Wikipedia:Templates for deletion/Log/2008 March 29 Template:Horde The result of the debate was Delete Zzyzx11 (Talk) 04:52, 6 April 2008 (UTC) Template only contains a very, very small bit of information. Not a helpful template, and not a good template for a band. — Undeath (talk) 00:29, 29 March 2008 (UTC) * Delete Template is useless, doesn't add to navigation and contains small information. – Jerry teps 06:17, 29 March 2008 (UTC) * Delete Template is entirely too obtrusive, supplies a pittance of information, and is quite unnecessary. Wisdom89 ( T |undefined / C ) 22:06, 29 March 2008 (UTC) * Delete per nom and the other comments above. --- RepublicanJacobite The'FortyFive' 22:26, 29 March 2008 (UTC) * Delete I agree as well. The template only contains a small amount of information. Midorihana ~いいですね? はい! 01:42, 30 March 2008 (UTC) * Delete per above. Elfits FOR GREAT JUSTICE (klat) 11:27, 1 April 2008 (UTC)
WIKI
Identifier etd-1018102-094954 Degree Doctor of Philosophy (PhD) Department Plant, Environmental Management and Soil Sciences Document Type Dissertation Abstract Bacillus anthracis, the etiological agent of the disease anthrax, is a bacteria of great importance, both in the past and today. Despite this importance, many questions remain regarding defending against its use as a biological weapon, the bacteria's variation in virulence, and its epidemiology in nature. Using Etest strips (AB BIODISK, Solna, Sweden) to measure the MICs, 25 genetically diverse isolates of B. anthracis were tested to determine their susceptibility to seven clinically relevant antimicrobial agents. Using the NCCLS MIC breakpoints for staphylococci, three isolates were found to be resistant to penicillin and negative for beta-lactamase production. From a group of investigations, results indicated B. anthracis virulence is related to clonality and the copy numbers per cell of the virulence plasmids, pXO1 and pXO2. Isolates were characterized with respect to their plasmid copy number (pXO1/2) using a novel method of quantitative PCR and the numbers differ greatly from previous reports. Anthrax Vaccine with Adjuvant (AVA) vaccinated guinea pigs were challenged with 20 B. anthracis strains representative of worldwide genetic diversity. A virulence model was constructed by combining the survival, plasmid copy number, and genotyping (based on multilocus variable number tandem repeat analysis typing) data of each isolate. The model obtained was validated using a randomly chosen set of 12 B. anthracis isolates and verified model robustness. Carcass disposal methods, incineration and burial, are recommended to decrease or prevent environmental spore contamination. The extent of contamination from an anthrax carcass is almost totally unknown despite the method of disposal. Studies of environmental contamination by spores of B. anthracis from infected carcasses have only recently been possible because of new technologies. A method utilizing real-time quantitative PCR was developed to quantitate B. anthracis in environmental samples. Absolute quantitation was made possible by the use of clones. This method has allowed the evaluation of the environmental contamination by the different carcass disposal methods and by scavenging of the carcass. The results support the complete burning of a carcass soon after death as the method choice to decrease environmental contamination for the disposal of anthrax affected carcasses. Date 2002 Document Availability at the Time of Submission Release the entire work immediately for access worldwide. Committee Chair Martin Hugh-Jones Share COinS  
ESSENTIALAI-STEM
India's Tata Steel to shut some operations in UK, 400 jobs at stake BENGALURU (Reuters) - India’s Tata Steel Ltd (TISC.NS) said on Monday it would shut parts of its non-core businesses in the United Kingdom, a move that could cost about 400 jobs. The steelmaker proposed to close its loss-making Orb Electrical Steels site in South Wales, potentially affecting up to 380 jobs, as it was "unable to find a way forward" for the business, it said in a filing here to Indian stock exchanges. Tata put up five of its non-core businesses in Europe on sale in May 2018 as it looked to focus on its strip products business. Orb is part of one of these businesses, Cogent, which makes electrical steels. “Continuing to fund substantial losses at Orb Electrical Steels is not sustainable at a time when the European steel industry is facing considerable challenges,” said Henrik Adam, chief executive officer of Tata Steel’s European operations. The company saw no prospects of the business returning to profitability in the coming years, Adam said. Tata Steel said it would cost the company more than 50 million pounds ($61.39 million) to upgrade the site to produce steel for electric vehicle production. Unite, UK's largest trade union, said in a statement here it has sought assurances that there would be no compulsory redundancies from Tata Steel after the steelmaker announced Orb's closure. Tata added it had signed a deal to sell Cogent Power, another division of Cogent, to Japan’s JFE Shoji Trade Corp. It also plans to close another non-core business, Wolverhampton Engineering Steels Service Centre, as it did not find a buyer. This could cost up to 26 jobs, it said. The news comes weeks after Turkey’s military pension fund OYAK reached a provisional agreement to take over British Steel, which Greybull Capital bought for one pound from Tata Steel three years ago, potentially saving thousands of jobs. British Steel was put into compulsory liquidation on May 22 after Greybull Capital failed to secure funding to continue its operations. Reporting by Chris Thomas in Bengaluru; Editing by Subhranshu Sahu
NEWS-MULTISOURCE
Intel beats on Q2 revenue, plans to cut 15% of workforce, cancels factory plans Intel (INTC) reported its second quarter earnings after the bell on Thursday, beating on revenue but missing on earnings per share (EPS) due to impairment charges. The company said it is cutting its headcount by 15% and expects to have approximately 75,000 employees by the end of the year. Intel also offered an upbeat Q3 revenue forecast of between $12.6 billion and $13.6 billion. Wall Street was expecting $12.6 billion. The chipmaker's stock fell almost 5% in premarket trading on Friday, having initially risen more than 2% soon after the report before turning negative. Shares of Intel are off 28% over the last 12 months, though up 13% year to date. Intel's market capitalization as of Thursday was $98 billion. Rival AMD’s (AMD) market cap tops out at $262 billion. AI leader Nvidia (NVDA) dwarfs both companies with a market cap north of $4 trillion. For the quarter, Intel saw an adjusted loss per share of $0.10 on revenue of $12.8 billion. Wall Street was anticipating adjusted EPS of $0.01 on revenue of $11.8 billion, based on Bloomberg’s analyst consensus data. The company reported adjusted EPS of $0.02 and $12.8 billion in revenue in the same period last year. Intel said it took an $800 million non-cash impairment and accelerated depreciation charges related to "excess tools with no identified re-use" and roughly $200 million one-time period costs for Q2. The company has also canceled planned projects in Germany and Poland and is slowing construction of its facility in Ohio. Read more: Live coverage of corporate earnings Intel's Products business, which includes sales of its laptop and desktop CPUs and data center and AI chips, brought in $11.8 billion versus expectations of $10.9 billion. Intel is dealing with increased competition from AMD (AMD) and the rising threat from Qualcomm (QCOM), which is pushing further into the PC chip space with its Snapdragon X Plus and X Elite chips. Intel’s still-nascent Foundry business generated $4.4 billion in revenue versus expectations of $4.3 billion, up 2%. The division, which is meant to produce chips for third-party customers using Intel’s processor technology, is still struggling to make meaningful headway. Intel previously announced it reached agreements to build chips for Microsoft and Amazon using its 18A technology, which former CEO Pat Gelsinger championed to help grow the company’s manufacturing segment. And while earlier reports cast doubt on whether the company would continue offering 18A to third-party customers. But Tan said he plans to build out the company's capacity for the technology for its internal chips, which will then allow it to attract customers to the product in the future. Email Daniel Howley at dhowley@yahoofinance.com. Follow him on X/Twitter at @DanielHowley. For the latest earnings reports and analysis, earnings whispers and expectations, and company earnings news, click here Read the latest financial and business news from Yahoo Finance
NEWS-MULTISOURCE
Page:EB1911 - Volume 09.djvu/804 He might easily have avoided the English if he had kept well out in the Channel. But he relied on the size and strength of his 40 large ships, and in expectation of an encounter had recruited a body of mercenaries—mostly crossbowmen—in the Flemish ports. In the afternoon of the 29th of August he bore down boldly on King Edward’s ships at anchor at Winchelsea. When the Spaniards hove in sight, the king was sitting on the deck of his ship, with his knights and nobles, listening to his minstrels who played German airs, and to the singing of Sir John Chandos. When the look-out in the tops reported the enemy in sight, the king and his company drank to one another’s health, the trumpet was sounded, and the whole line stood out. All battles at that time, whether on land or sea, were finally settled by stroke of sword. The English steered to board the Spaniards. The king’s own ship was run into by one of the enemy with such violence that both were damaged, and she began to sink. The Spaniard stood on, and the “Cog Thomas” was laid alongside another, which was carried by boarding. It was high time, for the king and his following had barely reached the deck of the Spaniard before the “Cog Thomas” went to the bottom. Other Spaniards were taken, but the fight was hot. La Cerda’s crossbowmen did much execution, and the higher-built Spaniards were able to drop bars of iron or other weights on the lighter English vessels, by which they were damaged. The conflict was continued till twilight. At the close the large English vessel called “La Salle du Roi,” which carried the king’s household, and was commanded by the Fleming, Robert of Namur, afterwards a knight of the Garter, was grappled by a big Spaniard, and was being dragged off by him. The crew called loudly for a rescue, but were either not heard or, if heard, could not be helped. The “Salle du Roi” would have been taken if a Flemish squire of Robert of Namur, named Hannequin, had not performed a great feat of arms. He boarded the Spaniard and cut the halyards of her mainsail with his sword. The Spanish ship was taken. King Edward is said to have captured 14 of the enemy. What his own loss was is not stated, but as his own vessel, and also the vessel carrying the Black Prince, were sunk, and from the peril of “La Salle du Roi,” we may conclude that the English fleet suffered heavily. There was no pursuit, and a truce was made with the Basque towns the next year. The battle with “the Spaniards on the sea” is a very typical example of a medieval sea-fight, when the ships were of the size of a small coaster or a fishing smack, were crowded with men, and when the personal prowess of a single knight or squire was an important element of strength. The only real authority for the battle is Froissart, who was at different times in the service of King Edward or of his wife, Philippa of Hainaut, and of the counts of Namur. He repeated what was told him by men who had been present, and dwells as usual on the “chivalry” of his patrons. See his Chroniques, iv. 91. ESPALIER (a French word, derived from the Ital. spalliera, something to rest the spalla or shoulder against; the word is ultimately the same as épaulière, a shoulder-piece), a lattice-work or row of stakes, originally shoulder high, on which fruit trees, shrubs and flowers, particularly roses and creepers, are trained. Espaliers are usually made of larch or other wood, iron and metal rails being too great conductors of heat and cold. The advantage of this method of training is that the fruit, &c, is more easily got at, and while protected from wind, is freely exposed to sun and air, and not so open to extreme changes of temperature as when trained on a wall. (See .) ESPARTERO, BALDOMERO (1792–1879), duke of Vitoria, duke of Morella, prince of Vergara, Count Luchana, knight of the Toison d’Or, &c. &c., Spanish soldier and statesman, was born at Granatulu, a town of the province of Ciudad Real, on the 27th of February 1792. He was the ninth child of a carter, who wanted to make him a priest, but the lad at fifteen enlisted in a battalion of students to fight against the armies of Napoleon I. In 1811 Espartero was appointed a lieutenant of Engineers in Cadiz, but having failed to pass his examination he entered a line regiment. In 1815 he went to America as a captain under General Morillo, who had been made commander-in-chief to quell the risings of the colonies on the Spanish Main. For eight years Espartero distinguished himself in the struggle against the colonists. He was several times wounded, and was made major and colonel on the battlefields of Cochabamba and Sapachni. He had to surrender to Sucre at the final battle of Ayacucho, which put an end to Castilian rule. He returned to Spain, and, like most of his companions in arms, remained under a cloud for some time. He was sent to the garrison town of Logroño, where he married the daughter of a rich landowner, Doña Jacinta Santa Cruz, who eventually survived him. Henceforth Logroño became the home of the most prominent of the Spanish political generals of the 19th century. Espartero became in 1832, on the death of King Ferdinand VII., one of the most ardent defenders of the rights of his daughter, Isabella II. The government sent him to the front, directly the Carlist War broke out, as commandant of the province of Biscay, where he severely defeated the Carlists in many encounters. He was quickly promoted to a divisional command, and then made a lieutenant-general. At times he showed qualities as a guerillero quite equal to those of the Carlists, like Zumalacarregui and Cabrera, by his daring marches and surprises. When he had to move large forces he was greatly superior to them as an organizer and strategist, and he never disgraced his successes by cruelty or needless severity. Twice he obliged the Carlists to raise the siege of Bilbao before he was appointed commander-in-chief of the northern army on the 17th of September 1836, when the tide of war seemed to be setting in favour of the pretender in the Basque provinces and Navarre, though Don Carlos had lost his ablest lieutenant, the Basque Zumalacarregui. His military duties at the head of the principal national army did not prevent Espartero from showing for the first time his political ambition. He displayed such radical and reforming inclinations that he laid the foundations of his popularity among the lower and middle classes, which lasted more than a quarter of a century, during which time the Progressists, Democrats and advanced Liberals ever looked to him as a leader and adviser. In November 1836 he again forced the Carlists to raise the siege of Bilbao. His troops included the British legion under Sir de Lacy Evans. This success turned the tide of war against Don Carlos, who vainly attempted a raid towards Madrid. Espartero was soon at his heels, and obliged him to hurry northwards, after several defeats. In 1839 Espartero carefully opened up negotiations with Maroto and the principal Carlist chiefs of the Basque provinces. These ended in their accepting his terms under the famous convention of Vergara, which secured the recognition of their ranks and titles for nearly 1000 Carlist officers. Twenty thousand Carlist volunteers laid down their arms at Vergara; only the irreconcilables led by Cabrera held out for a while in the central provinces of Spain. Espartero soon, however, in 1840, stamped out the last embers of the rising, which had lasted seven years. He was styled “El pacificador de España,” was made a grandee of the first class, and received two dukedoms. During the last three years of the war Espartero, who had been elected a deputy, exercised from his distant headquarters such influence over Madrid politics that he twice hastened the fall of the cabinet, and obtained office for his own friends. At the close of the war the queen regent and her ministers attempted to elbow out Espartero and his followers, but a pronunciamiento ensued in Madrid and other large towns which culminated in the marshal’s accepting the post of prime minister. He soon became virtually a dictator, as Queen Christina took offence at his popularity and resigned, leaving the kingdom very soon afterwards. Directly the Cortes met they elected Espartero regent by 179 votes to 103 in favour of Arguelles, who was appointed guardian of the young queen. For two years Espartero ruled Spain in accordance with his Radical and conciliatory dispositions, giving special attention to the reorganization of the administration, taxation and finances, declaring all the estates of the church, congregations and religious orders to be national property, and suppressing the diezma, or tenths. He suppressed the Republican risings with as much severity as he did the military pronunciamientos of
WIKI
Carl Zeiss AG Carl Zeiss AG, branded as ZEISS, is a German manufacturer of optical systems and optoelectronics, founded in Jena, Germany in 1846 by optician Carl Zeiss. Together with Ernst Abbe (joined 1866) and Otto Schott (joined 1884) he laid the foundation for today's multinational company. The current company emerged from a reunification of Carl Zeiss companies in East and West Germany with a consolidation phase in the 1990s. ZEISS is active in four business segments with approximately equal revenue (Industrial Quality and Research, Medical Technology, Consumer Markets and Semiconductor Manufacturing Technology) in almost 50 countries, has 30 production sites and around 25 development sites worldwide. Carl Zeiss AG is the holding of all subsidiaries within Zeiss Group, of which Carl Zeiss Meditec AG is the only one that is traded at the stock market. Carl Zeiss AG is owned by the foundation Carl-Zeiss-Stiftung. The Zeiss Group has its headquarters in southern Germany, in the small town of Oberkochen, with its second largest, and founding site, being Jena in eastern Germany. Also controlled by the Carl-Zeiss-Stiftung is the glass manufacturer Schott AG, located in Mainz and Jena. Carl Zeiss is one of the oldest existing optics manufacturers in the world. Corporate history Carl Zeiss opened an optics workshop in Jena in 1846. By 1847 he was making microscopes full-time. In 1861 the rapidly growing company had a staff of about 20 and won a gold medal at the Thuringian Industrial Exposition. By 1866 Zeiss sold their 1,000th microscope. In 1872 physicist Ernst Abbe joined Zeiss, and along with Otto Schott designed greatly improved lenses for the optical instruments they were producing. After Carl Zeiss's death in 1888, the business was incorporated as the Carl-Zeiss-Stiftung in 1889. By World War I, Zeiss was the world's largest camera-production company. Zeiss Ikon represented a significant part of the production, along with dozens of other brands and factories, including a major works at Dresden. In 1928 the Zeiss company acquired Hensoldt AG, which has produced Zeiss binoculars and rifle-scopes since 1964 - this has occasionally resulted in twin products being offered under both the "Hensoldt" and "Zeiss" brand-names. The Hensoldt System Technology division (resulting from a merger of the military-optics operations of Leica and Hensoldt) was continued by Zeiss under the "Hensoldt" name until 2006. As part of Nazi Germany's Zwangsarbeiter program, Zeiss used forced labour, including Jews and other minorities during World War II. The destruction of the war caused many companies to divide into smaller subcompanies and others to merge. There was great respect for the engineering innovation that came out of Dresden—before the war the world's first 35 mm single-lens reflex camera, the Kine Exakta, and the first miniature camera with good picture-quality were developed there. At the end of the war, Jena was initially occupied by the United States Army. When Jena and Dresden were incorporated into the Soviet occupation zone, later East Germany, the US Army relocated some parts of Zeiss Jena to the Contessa manufacturing facility in Stuttgart, West Germany, while the remainder of Zeiss Jena was reestablished by the (eastern) German Democratic Republic as Kombinat VEB Zeiss Jena. The Soviet Army relocated most of the existing Zeiss factories and tooling to the Soviet Union, establishing the Kiev camera-works. In the West, business activity restarted in Oberkochen in present-day Baden-Württemberg (southwestern Germany) as Opton Optische Werke Oberkochen GmbH in 1946, which became Zeiss-Opton Optische Werke Oberkochen GmbH in 1947, but was soon renamed to "Carl Zeiss". West-German Zeiss products were labelled "Opton" for sale in the Eastern bloc, while East German Zeiss products were labelled "Zeiss Jena" or simply "Jena" for sale in Western countries. In 1973, the Western Carl Zeiss AG entered into a licensing agreement with the Japanese camera-company Yashica to produce a series of high-quality 35 mm film-cameras and lenses bearing the Contax and Zeiss brand names. This collaboration continued under Yashica's successor, Kyocera, until the latter ceased all camera production in 2005. Zeiss later produced lenses for the space industry and, more recently, has again produced high-quality 35 mm camera-lenses. The eastern Zeiss Jena was also well known for producing high-quality products. Following the German reunification of 1989–1991, VEB Zeiss Jena — reckoned as one of the few East-German firms that was even potentially able to compete on a global basis — became Zeiss Jena GmbH, which became Jenoptik Carl Zeiss Jena GmbH in 1990. In 1991, Jenoptik Carl Zeiss Jena was split in two, with Carl Zeiss AG (Oberkochen) taking over the company's divisions for microscopy and other precision optics (effectively reuniting the pre-war Carl Zeiss enterprise) and moving its microscopy and planetarium divisions back to Jena. Jenoptik GmbH was split off as a specialty company in the areas of photonics, optoelectronics, and mechatronics. The Hensoldt AG was renamed "Carl Zeiss Sports Optics GmbH" on 1 October 2006. The companies of the Zeiss Gruppe in and around Dresden have branched into new technologies: screens and products for the automotive industry, for example. there are arguably three companies with primarily "Zeiss Ikon" heritage: Zeiss Germany, the Finnish/Swedish Ikon (which bought the West German Zeiss Ikon AG), and the independent eastern Zeiss Ikon. A division called "Carl Zeiss Vision" produces lenses for eyeglasses. In 2005, the eyeglass division merged with U.S. company SOLA, which included the former American Optical Company. On 28 June 2013, Carl Zeiss officially announced its plan to rename the brand from "Carl Zeiss" to simply "Zeiss". All the products will be standardized under the "Zeiss" brand. In April 2019, Zeiss announced the acquisition of Brunswick-based GOM. Innovations The Zeiss company was responsible for many innovations in optical design and engineering in each of their major fields of business. Today this becomes exemplarily visible in the latest EUV lithography systems, the equipment needed to produce the latest generations of semiconductor components. It also includes early high-performance optical microscopes up to today's electron and ion microscopes, which reach a sub-nanometers resolution. It includes technology leadership in the first surgical microscopes and ophthalmic devices. It also includes high-performance contact metrology systems. For many years Zeiss showed innovations in fields as astronomical telescopes, photographic and cinematic lenses. Early on, Carl Zeiss realised that he needed a competent scientist so as to take the firm beyond just being another optical workshop. In 1866, the service of Dr. Ernst Abbe was enlisted. From then on novel products appeared in rapid succession which brought the Zeiss company to the forefront of optical technology. Abbe was instrumental in the development of the famous Jena optical glass. When he was trying to eliminate stigmatism from microscopes, he realized that the range of optical glasses available was insufficient. After some calculations, he realised that performance of optical instruments would dramatically improve if optical glasses of appropriate properties were available. His challenge to glass manufacturers was finally answered by Dr. Otto Schott, who established the famous glassworks at Jena from which new types of optical glass began to appear from 1888 to be employed by Zeiss and other makers. The new Jena optical glass also opened up the possibility of increased performance of photographic lenses. The first use of Jena glass in a photographic lens was by Voigtländer, but as the lens was an old design its performance was not greatly improved. Subsequently, the new glasses would demonstrate their value in correcting astigmatism, and in the production of apochromatic lenses. Abbe started the design of a photographic lens of symmetrical design with five elements, but went no further. Zeiss' domination of photographic lens innovation was due to Dr Paul Rudolph. In 1890, Rudolph designed an asymmetrical lens with a cemented group at each side of the diaphragm, appropriately named "Anastigmat". This lens was made in three series: Series III, IV and V, with maximum apertures of f/7.2, f/12.5, and f/18 respectively. In 1891, Series I, II and IIIa appeared with respective maximum apertures of f/4.5, f/6.3, and f/9 and in 1893 came Series IIa of f/8 maximum aperture. These lenses are now better known by the trademark "Protar", which was first used in 1900. At the time, single combination lenses, which occupy one side of the diaphragm only, were still popular. Rudolph designed one with three cemented elements in 1893, with the option of fitting two of them together in a lens barrel as a compound lens, but it was found to be the same as the Dagor by C.P. Goerz, designed by Emil von Hoegh. Rudolph then came up with a single combination with four cemented elements, which can be considered as having all the elements of the Protar stuck together in one piece. Marketed in 1894, it was called the Protarlinse Series VII, the most highly corrected single combination lens with maximum apertures between f/11 and f/12.5, depending on its focal length. But the important thing about this Protarlinse is that two of these lens units can be mounted in the same lens barrel to form a compound lens of even greater performance and a larger aperture, between f/6.3 and f/7.7. In this configuration, it was called the Double Protar Series VIIa. An immense range of focal lengths can thus be obtained by the various combination of Protarlinse units. Rudolph also investigated the Double-Gauss concept of a symmetrical design with thin positive menisci enclosing negative elements. The result was the Planar Series Ia of 1896, with maximum apertures up to f/3.5, one of the fastest lenses of its time. Whilst it was very sharp, it suffered from coma which limited its popularity. However, further developments of this configuration made it the design of choice for high-speed lenses of standard coverage. Probably inspired by the Stigmatic lenses designed by Hugh Aldis for Dallmeyer of London, Rudolph designed a new asymmetrical lens with four thin elements, the Unar Series Ib, with apertures up to f/4.5. Due to its high speed, it was used extensively on hand cameras. The most important Zeiss lens by Rudolph was the Tessar, first sold in 1902 in its Series IIb f/6.3 form. It can be said as a combination of the front half of the Unar with the rear half of the Protar. This proved to be the most valuable and flexible design, with tremendous development potential. Its maximum aperture was increased to f/4.7 in 1917 and reached f/2.7 in 1930. It is probable that every lens manufacturer has produced lenses of the Tessar configurations. Rudolph left Zeiss after World War I, but many other competent designers such as Merté, Wandersleb, etc. kept the firm at the leading edge of photographic lens innovations. One of the most significant designers was the ex-Ernemann man Dr Ludwig Bertele, famed for his Ernostar high-speed lens. With the advent of the Contax by Zeiss-Ikon, the first professional 35mm system camera became available. At this stage the Leica was no more than a convenient and portable snapshot camera. However Leitz could see the potential offered by the Contax and rapidly developed a coupled rangefinder and started to introduce additional lenses. As a system camera there was a need for a range of lenses for the Contax. Bertele's Sonnar series of lenses designed for the Contax was the match in every respect for the Leica for at least two decades. Other lenses for the Contax included the Biotar, Biogon, Orthometar, and various Tessars and Triotars. The last important Zeiss innovation before World War II was the technique of applying an anti-reflective coating to lens surfaces invented by Olexander Smakula in 1935. A lens so treated was marked with a red "T", short for "Transparent". The technique of applying multiple layers of coatings was developed from this basis after the war, and known as "T✻" (T-star). After the partitioning of Germany, a new Carl Zeiss optical company was established in Oberkochen, while the original Zeiss firm in Jena continued to operate. At first, both firms produced very similar lines of products, and extensively cooperated in product-sharing, but they drifted apart as time progressed. Jena's new direction was to concentrate on developing lenses for 35 mm single-lens reflex cameras, and many achievements were made, especially in ultra-wide angle designs. In addition to that, Oberkochen also worked on designing lenses for the 35 mm single-lens reflex camera Contarex, for the medium format camera Hasselblad, for large format cameras like the Linhof Technika, interchangeable front element lenses such as for the 35 mm single-lens reflex Contaflex and other types of cameras. Since the beginning of Zeiss as a photographic lens manufacturer, it has had a licensing programme, allowing other manufacturers to produce its lenses. Over the years its licensees included Voigtländer, Bausch & Lomb, Ross, Koristka, Krauss, Kodak. etc. In the 1970s, the western operation of Zeiss-Ikon collaborated with Yashica to produce the new Contax cameras, and many of the Zeiss lenses for this camera, among others, were produced by Yashica's optical arm, Tomioka. As Yashica's owner Kyocera ended camera production in 2006, and Yashica lenses were then made by Cosina, who also manufactured most of the new Zeiss designs for the new Zeiss Ikon coupled rangefinder camera. Another licensee active today is Sony who uses the Zeiss name on lenses on its video and digital still cameras. Business relationships Zeiss has licensed its name or technology to various other companies including Hasselblad, Rollei, Yashica, Sony, Logitech and Alpa. The nature of the collaboration varies, from co-branding optics designed by another firm (e.g., Sony) to complete optical design and manufacturing (e.g., Hasselblad). On 27 April 2005, the company announced a collaboration with Nokia in the camera phone market, with Zeiss providing camera optics. The first smartphone to be co-engineered with Zeiss optics was the Nokia N90, Zeiss will again provide optics for Nokia products through a collaboration with HMD Global announced on 6 July 2017. On 17 December 2020, Vivo and Zeiss announced a long-term strategic partnership to jointly promote and develop breakthrough innovations in mobile imaging technology. The first “Vivo Zeiss co-engineered imaging system” will be featured in the Vivo X60 series. As part of the collaboration agreement, Vivo and Zeiss will establish the Vivo Zeiss Imaging Lab, a joint R&D program to innovate mobile imaging technology for Vivo’s flagship smartphones. Zeiss Ikon film cameras Zeiss Ikon was an independent camera company related to Carl Zeiss, formed by the merger of four camera makers (Contessa-Nettel, Ernemann, Goerz and ICA) in Dresden on September 15, 1926. Much of the capital came from Zeiss which also provided components for the cameras, including lenses and shutters through its subsidiaries such as Deckel. One of the four merged companies, Internationale Camera Actiengesellschaft (ICA AG), had been founded in 1909 shortly after Carl Zeiss Palmos, which had been co-founded by Zeiss lens designer Paul Rudolph and Curt Bentzin from Görlitz in 1899, went out of business. Another founding company, Contessa-Nettel, was operated by August Nagel, who left the company in 1928 to form the Nagel Works; in 1932, his company was bought by Kodak, which continued to produce cameras in Germany under the Retina brand. The earliest Zeiss Ikon cameras were a range of medium and large format folding cameras badged as Nettar, Ikonta, and Super Ikonta, for film and glass plate photography. The most expensive was the Universal Juwel (Jewel), a glass plate camera originally designed by ICA in 1909. This was a favorite of both Ansel Adams and Dorothea Lange. Other models produced by Zeiss Ikon prior to World War II included the Baldur, named for Baldur von Schirach; the Contaflex, a twin-lens reflex; and the Tengor, a box camera derived from an earlier Goerz design. Despite German production, the folding Super Ikonta was among the mainstays of British Army photographers during World War II. In 1932 Zeiss Ikon introduced the Contax line of 35mm rangefinder cameras, having recognised the potential for a system camera using 35mm film. The Contax I was introduced with a wide range of lenses and accessories for scientific and professional use. In 1936, an improved model, the Contax II, was introduced and became the favorite of many renowned photographers and journalists, including Robert Capa and Margaret Bourke-White. A second 35mm camera, the Contax III, was mechanically identical with a light meter grafted to the top of the camera. After World War II, the Dresden factory was dismantled and the Soviet Union forcibly relocated the Contax factory to Kiev as war reparations, where the pre-war Contax II and III camera designs were produced under the Kiev brand. The first Kiev cameras were identical except for logos. The United States also relocated Zeiss from Jena to Heidenheim (Oberkochen) in 1945, but Zeiss Ikon were without designs or facilities for making the Contax and set about producing an improved replacement. These were named the Contax IIa and IIIa, and were smaller and lighter than the original designs. But by the time the IIa and IIIa hit the market, they faced strong competition from many European and Asian brands, notably the visually similar Nikon produced by Nippon Kogaku, which was a high quality camera sharing the same lens-mount and most of the features. Zeiss Ikon prevented some European distribution under the theory that "Nikon" was an infringement on their brand name. Starting in the mid-1950s, Zeiss Ikon shifted its focus to market single-lens reflex cameras in three distinct lines: the Contaflex line (1953) for amateurs with leaf shutters, the high-end Contarex line (1959) with film magazine backs and superb optics, and the mid-range Icarex line (1967) with focal plane shutters and either the popular M42 lens mount or a proprietary bayonet mount. While these designs were initially competitive with SLRs produced by Japanese brands including Canon, Yashica, Minolta, and Nikon, Zeiss Ikon failed to keep pace by adding features and Zeiss Ikon camera production ceased in 1971. Voigtländer Zeiss also acquired the Voigtländer brand in 1956, putting it in the curious position of offering competing cameras in the same market segments, including professional rangefinders (Prominent (135), in competition with the Contax), amateur SLRs (Bessamatic/Ultramatic, competing with the Contaflex), and numerous compact and folding cameras through at least 1967, when the Icarex, a Voigtländer design released under the Zeiss Ikon brand, was released to consolidate the competing SLR lines. After Zeiss Ikon stopped producing cameras, the Voigtländer brand and Icarex designs were acquired by Rollei, which released variations of the Icarex under both Voigtländer and Rollei as the Rolleiflex SL35 M. Cameras produced under Zeiss licenses Since 1972, some 35mm cameras have been marketed under the "Contax" and "Zeiss Ikon" brands. The "Contax" brand was licensed to Yashica in 1974, which later was acquired by Kyocera; Contax marketed several lines of SLR, rangefinder, compact, and digital cameras with Zeiss lenses and Japanese-built bodies. The most recent "Zeiss Ikon" rangefinder camera was an M mount camera with automatic exposure, introduced by Zeiss in 2004 and manufactured in Japan by Cosina; it was discontinued in 2012. ZX1 digital The Zeiss ZX1 full-frame 35mm F/2 large-sensor compact camera was announced during Photokina 2018 with the slogan 'Shoot – Edit – Share'. The camera incorporates Adobe Lightroom Mobile editing capacities, and an internal 512GB SSD affording 6,800 DNG-format RAW images or 50,000 JPEG-format compressed images. The ZX1, which was one of only a few cameras to use the Android operating system, was discontinued in 2023. Cinema lenses Carl Zeiss AG has long been renowned for its motion picture lenses. Zeiss manufactures prime and zoom lenses for 35mm, 16mm, and 65mm film production. They also make lenses for digital cinema and high definition video. Zeiss is mainly known in the trade for their association with the German camera manufacturer Arri for whom they currently produce lenses. Current models of Zeiss cinema lenses are: * Master Prime T✻XP Distagon 14 mm T1.3 * Master Prime T✻XP Distagon 16 mm T1.3 * Master Prime T✻XP Distagon 18 mm T1.3 * Master Prime T✻XP Distagon 21 mm T1.3 * Master Prime T✻XP Distagon 25 mm T1.3 * Master Prime T✻XP Distagon 27 mm T1.3 * Master Prime T✻XP Distagon 32 mm T1.3 * Master Prime T✻XP Distagon 35 mm T1.3 * Master Prime T✻XP Distagon 40 mm T1.3 * Master Prime T✻XP Planar 50 mm T1.3 * Master Prime T✻XP Planar 65 mm T1.3 * Master Prime T✻XP Sonnar 75 mm T1.3 * Master Prime T✻XP Sonnar 100 mm T1.3 * Master Prime T✻XP Sonnar 150 mm T1.3 * Master Zoom T✻XP 16.5–110 mm T2.6 * Master Macro T✻XP Makro-Planar 100 mm T2.0/T4.3 * Lightweight Zoom LWZ.2 T✻XP Vario-Sonnar 15.5–45 mm T2.6 * Ultra Prime 8R T✻ Distagon 8 mm T2.8 * Ultra Prime T✻ Distagon 10 mm T2.1 * Ultra Prime T✻ Distagon 12 mm T1.9 * Ultra Prime T✻ Distagon 14 mm T1.9 * Ultra Prime T✻ Distagon 16 mm T1.9 * Ultra Prime T✻ Distagon 20 mm T1.9 * Ultra Prime T✻ Distagon 24 mm T1.9 * Ultra Prime T✻ Distagon 28 mm T1.9 * Ultra Prime T✻ Distagon 32 mm T1.9 * Ultra Prime T✻ Distagon 40 mm T1.9 * Ultra Prime T✻ Planar 50 mm T1.9 * Ultra Prime T✻ Planar 65 mm T1.9 * Ultra Prime T✻ Planar 85 mm T1.9 * Ultra Prime T✻ Sonnar 100 mm T1.9 * Ultra Prime T✻ Sonnar 135 mm T1.9 * Ultra Prime T✻ Sonnar 180 mm T1.9 * Compact Prime CP.2 T✻ Distagon 18 mm T3.6 * Compact Prime CP.2 T✻XP Distagon 21 mm T2.9 * Compact Prime CP.2 T✻XP Distagon 25 mm T2.9 * Compact Prime CP.2 T✻XP Distagon 28 mm T2.1 * Compact Prime CP.2 T✻XP Distagon 35 mm T2.1 * Compact Prime CP.2 T✻XP Distagon 50 mm T2.1 * Compact Prime CP.2 T✻ Planar 50 mm T2.1 Macro * Compact Prime CP.2 T✻ Planar 85 mm T2.1 * Compact Prime CP.2 T✻ Makro-Planar 100 mm T2.1 CF * Ultra 16 T✻XP Distagon 6 mm T1.3 * Ultra 16 T✻XP Distagon 8 mm T1.3 * Ultra 16 T✻XP Distagon 9.5 mm T1.3 * Ultra 16 T✻XP Distagon 12 mm T1.3 * Ultra 16 T✻XP Distagon 14 mm T1.3 * Ultra 16 T✻XP Distagon 18 mm T1.3 * Ultra 16 T✻XP Distagon 25 mm T1.3 * Ultra 16 T✻XP Planar 35 mm T1.3 * Ultra 16 T✻XP Planar 50 mm T1.3 * DigiPrime T✻ 3.9 mm T1.9 * DigiPrime T✻ 5 mm T1.9 * DigiPrime T✻ 7 mm T1.6 * DigiPrime T✻ 10 mm T1.6 * DigiPrime T✻ 14 mm T1.6 * DigiPrime T✻ 20 mm T1.6 * DigiPrime T✻ 28 mm T1.6 * DigiPrime T✻ 40 mm T1.6 * DigiPrime T✻ 52 mm T1.6 * DigiPrime T✻ 70 mm T1.6 * DigiPrime T✻ 135 mm T1.9 * DigiZoom T✻ Vario-Sonnar 6–24 mm T1.9 * DigiZoom T✻ Vario-Sonnar 17–112 mm T1.9 Medium-format lenses Carl Zeiss AG has produced lenses for Hasselblad and Rollei cameras, including: * CFi/CFE-Lenses for Hasselblad 500 (V System) * F-Distagon T✻ 30mm ƒ/3.5 * Distagon T✻ 40mm ƒ/4 * Distagon T✻ 50mm ƒ/4 * Distagon T✻ 50mm ƒ/4 ZV * Distagon T✻ 60mm ƒ/3.5 * Planar T✻ 80mm ƒ/2,8 * Planar T✻ 100mm ƒ/3.5 * Makro-Planar T✻ 120mm ƒ/4 * Makro-Planar T✻ 120mm ƒ/4 ZV * Sonnar T✻ 150mm ƒ/4 * Sonnar T✻ 180mm ƒ/4 * Sonnar T✻ 250mm ƒ/5.6 * Tele-Superachromat T✻ 350mm ƒ/5,6 * FE-Lenses for Hasselblad 200 * Distagon T✻ 50mm ƒ/2,8 FE * Planar T✻ 110mm ƒ/2 FE * Hasselblad SWC Biogon 38mm ƒ/4.5 * Rollei 6000 system * F-Distagon 30mm ƒ/3.5 HFT PQ * Distagon 40mm ƒ/4 FLE HFT * Distagon 50mm ƒ/4 FLE HFT * Distagon 60mm ƒ/3.5 HFT PQ * Planar 80mm ƒ/2.8 HFT PQS * Planar 110mm ƒ/2 HFT PQ * Sonnar 150mm ƒ/4 HFT PQS * Sonnar 250mm ƒ/5.6 HFT PQS * Makro-Planar 120mm ƒ/4 HFT PQS * Rolleiflex TLR * Tessar 75mm ƒ/3.5 * Planar 80mm ƒ/2.8 * Distagon 55mm ƒ/4 Large-format lenses Zeiss has produced lenses for large format and press cameras, including: * Tessar lenses (4 elements in 3 groups) * Tessar 100mm ƒ/3.5 (6.5×9 cm format) * Tessar 105mm ƒ/3.5 (6.5×9 cm fmt) * Tessar 150mm ƒ/4.5 (9×12 cm fmt) * Planar lenses (5 elements in 4 groups) * Planar 80mm ƒ/2.8 (6×7 cm fmt) * Planar 100mm ƒ/2.8 (6.5×9 cm fmt) * Planar 135mm ƒ/3.5 * Planar 135mm ƒ/3.5 T✻ * Planar 150mm ƒ/2.8 * Sonnar lenses * Sonnar 180mm ƒ/4.8 * Sonnar 250mm ƒ/5.6 * Biogon lenses * Biogon 45mm ƒ/4.5 (6×7 cm fmt) * Biogon 53mm ƒ/4.5 (6.5×9 cm fmt) * Biogon 75mm ƒ/4.5 (9×12 cm fmt) * Lenses for Linhof cameras * Biogon 53mm ƒ/4.5 * Hologon 110mm ƒ/8 * Planar 135mm ƒ/3.5 * Sonnar 250mm ƒ/5.6 Zeiss has departed the large-format optics field along with Nikon, leaving Schneider and Rodenstock as the primary makers of such lenses today. ZM lenses Zeiss ZM lenses fit Leica M mount cameras, including Leica M series, the Ricoh GXR A12, and many mirrorless interchangeable-lens cameras through the use of adapters. Some ZM lenses are manufactured in Germany by Zeiss, others in Japan by Cosina. Lenses designated "C" are considered compact or classic lenses. * Distagon T✻ 15mm ƒ/2.8 (Made in Germany) * Distagon T✻ 18mm ƒ/4 * Distagon T✻ 21mm ƒ/2.8 * C Biogon T✻ 21mm ƒ/4.5 * Biogon T✻ 25mm ƒ/2.8 * Biogon T✻ 28mm ƒ/2.8 * Distagon T✻ 35mm ƒ/1.4 * Biogon T✻ 35mm ƒ/2 * C Biogon T✻ 35mm ƒ/2.8 * C Sonnar T✻ 50mm ƒ/1.5 * Planar T✻ 50mm ƒ/2 * Tele-Tessar T✻ 85mm ƒ/4 * Sonnar T✻ 85mm ƒ/2 (Made in Germany) Zeiss claims that the 25mm ƒ/2.8 ZM achieves a resolution of 400 lp/mm in the center of the image at ƒ/4, which is equal to the calculated diffraction limit for this aperture. Z-series SLR lenses Zeiss produces optically identical manual-focus lenses for multiple SLR lens mounts under the ZE, ZF, ZK, and ZS lines, manufactured in Japan by Cosina to Zeiss specifications. ZE lenses fit the Canon EF lens mount. They feature electronic contacts allowing for focus-confirmation, and electric aperture operation as with standard Canon EF lenses. ZF series lenses fit the Nikon F-mount. Four design variations are designated ZF, ZF.2, ZF-I, and ZF-IR. All are manual-focus designs with Nikon AI-S type aperture indexing. * ZF lenses have AI-S aperture indexing, half-stop aperture ring detents, and no electronic features. * ZF.2 lenses are like ZF lenses, with the addition CPU functionality, similar to Nikon AI-P lenses. They allow electronic focus confirmation, full metering compatibility, and electronic aperture control with Nikon SLR cameras which require CPU lenses. * ZF-I lenses feature mechanical locks for focus and aperture, and additional environmental sealing, for industrial applications. * ZF-IR lenses are adapted to infrared imaging, with coatings that transmit wavelengths up to 1100 nm, and focus scales marked for infrared. ZK lenses fit the Pentax K-mount. They have no electronics, are manual focus only, KA couplers. Zeiss announced the discontinuation of the ZK line in September 2010. ZS lenses fit the M42 lens mount (Pentacon/Practica/Pentax screw mount). By use of mount adapters they can be adapted to most 35 mm bayonet camera mounts including Canon FD and EF, Pentax K, Minolta SR and Sony/Konica Minolta/Minolta A mounts (with the exception of Nikon F mount), usually losing open-aperture-metering, multi-segment metering, focus confirmation, automatic flash zoom capabilities as well as some built-in shake reduction performance and Exif data accuracy. Otus lenses Zeiss produces manual focus Otus lenses for the Nikon F-mount and Canon EF mount, with electronic features equivalent to Zeiss ZF.2 and ZE lenses respectively. Otus lenses are complex no-compromise designs which Zeiss refers to as the "best in the world" in the normal lens and short telephoto categories. They cover the 35 mm format. * Otus APO-Distagon T✻ 28mm ƒ/1.4 * Otus APO-Distagon T✻ 55mm ƒ/1.4 * Otus APO-Planar T✻ 85mm ƒ/1.4 * Otus APO-Sonnar T✻ 100mm ƒ/1.4 Batis lenses Zeiss produces autofocus Batis lenses for the Sony E-mount. Like Sony "FE" lenses, they cover the 35mm format. * Batis Distagon T✻ 18mm f/2.8 * Batis Distagon T✻ 25mm f/2 * Batis Distagon T✻ 40mm f/2 Close-Focus * Batis Sonnar T✻ 85mm f/1.8 * Batis Sonnar T✻ 135mm f/2.8 Loxia lenses Zeiss produces manual focus Loxia lenses for the Sony E-mount. Like Sony "FE" lenses, they cover the 35mm format. The 35/2 and 50/2 are carried over from the existing ZM line. * Loxia Distagon T✻ 21mm f/2.8 * Loxia Distagon T✻ 25mm f/2.4 * Loxia Biogon T✻ 35mm f/2.0 * Loxia Planar T✻ 50mm f/2.0 * Loxia Sonnar T✻ 85mm f/2.4 Touit lenses Zeiss produces autofocus Touit lenses for the Fujifilm X-mount and Sony E-mount. They cover the APS-C format. * Touit 1.8/32 * Touit Distagon T✻ 12mm f/2.8 * Touit Planar T✻ 32mm f/1.8 * Touit Makro Planar T✻ 50mm f/2.8 Macro Milvus lenses Zeiss produces manual focus Milvus lenses for the Nikon F-mount (ZF.2) and Canon EF lens mount (ZE), covering the 35mm format. The 15/2.8, 21/2.8, 35/2, 50/2, 100/2, and 135/2 are carried over from the previous Z-series (now referred to as Zeiss Classic). * Milvus Distagon T✻ 15mm ƒ/2.8 * Milvus Distagon T✻ 18mm ƒ/2.8 * Milvus Distagon T✻ 21mm ƒ/2.8 * Milvus Distagon T✻ 25mm ƒ/1.4 * Milvus Distagon T✻ 35mm ƒ/1.4 * Milvus Distagon T✻ 35mm ƒ/2 * Milvus Distagon T✻ 50mm ƒ/1.4 * Milvus Makro-Planar T✻ 50mm ƒ/2 * Milvus Planar T✻ 85mm ƒ/1.4 * Milvus Makro-Planar T✻ 100mm ƒ/2 * Milvus APO-Sonnar T✻ 135mm ƒ/2 Super-rotator lenses These are 360° tilt/shift lenses (based on Zeiss medium format lens designs) for 35 mm format including full-frame digital. Available mounts: Canon EF, Nikon F, Sony Alpha/Konica Minolta/Minolta A mount. Other mounts on request. Manual focus only, no electronics. Manufactured in Germany and Ukraine. * Hartblei Superrotator Carl Zeiss Distagon T✻ IF 1:4.0 40 mm * Hartblei Superrotator Carl Zeiss Planar T✻ 1:2.8 80 mm * Hartblei Superrotator Carl Zeiss Makro-Planar T✻ 1:4.0 120 mm NASA Zeiss designed the optical components for the James Webb Space Telescope. A unique triplet of ultra-fast 50 mm lenses originally created by Zeiss for NASA's lunar program had the distinction of being reused by Stanley Kubrick in the filming of his historical drama Barry Lyndon. The period atmosphere of the film demanded that several indoor scenes be filmed by candlelight. To facilitate this, Kubrick had the lenses modified to mount onto a cinema camera and two of them subsequently further modified in separate ways to give wider angles of view. Smartphone lenses Zeiss worked with Nokia, and later with Microsoft Mobile as they continued production of the Lumia series. The Nokia 808 PureView features a lens custom-developed by Zeiss for its 1/1.2 inch sensor; as did its successor, the Nokia Lumia 1020. The Nokia N90 and Nokia N8 also used Zeiss optics. In 2017, Zeiss again provided optics for Nokia products through a collaboration with HMD Global, beginning with the Nokia 8. ZA lenses ZA ("Zeiss Alpha") lenses are designed and manufactured by Sony in Japan, and co-branded with the Zeiss name. Sony and Zeiss collaboratively set design and quality parameters for ZA lenses. * A-mount ZA-lenses fit the Sony Alpha/Konica Minolta/Minolta A-mount system. They are fully dedicated autofocus lenses with eight electrical contacts, ROM-IC, and distance encoder ("(D)-function" to support ADI flash). All except for the DT lens are full-frame lenses. * Sony α Carl Zeiss Distagon T✻ 1:2 24 mm ZA SSM (SAL-24F20Z) * Sony α Carl Zeiss Planar T✻ 1:1.4 50 mm ZA SSM (SAL-50F14Z) * Sony α Carl Zeiss Planar T✻ 1:1.4 85 mm ZA (SAL-85F14Z) * Sony α Carl Zeiss Sonnar T✻ 1:1.8 135 mm ZA (SAL-135F18Z) * Sony α Carl Zeiss Vario-Sonnar T✻ 1:2.8 16–35 mm ZA SSM (SAL-1635Z) * Sony α Zeiss Vario-Sonnar T✻ 1:2.8 16–35 mm ZA SSM II (SAL-1635Z2) * Sony α Carl Zeiss Vario-Sonnar T✻ DT 1:3.5–1:4.5 16–80 mm ZA (SAL-1680Z) * Sony α Carl Zeiss Vario-Sonnar T✻ 1:2.8 24–70 mm ZA SSM (SAL-2470Z) * Sony α Zeiss Vario-Sonnar T✻ 1:2.8 24–70 mm ZA SSM II (SAL-2470Z2) * E-mount ZA-lenses are fully dedicated Sony E-mount autofocus lenses. Lenses carrying the E designation cover the APS-C format, while lenses designated FE cover 35mm format. * Sony α Carl Zeiss Sonnar T✻ E 1:1.8 24 mm ZA (SEL-24F18Z) * Sony α Zeiss Distagon T✻ FE 1:1.4 35 mm ZA (SEL-35F14Z) * Sony α Carl Zeiss Sonnar T✻ FE 1:2.8 35 mm ZA (SEL-35F28Z) * Sony α Zeiss Planar T✻ FE 1:1.4 50 mm ZA (SEL-50F14Z) * Sony α Carl Zeiss Sonnar T✻ FE 1:1.8 55 mm ZA (SEL-55F18Z) * Sony α Zeiss Vario-Tessar T✻ FE 1:4 16–35 mm ZA OSS (SEL-1635Z) * Sony α Carl Zeiss Vario-Tessar T✻ E 1:4 16–70 mm ZA OSS (SEL-1670Z) * Sony α Carl Zeiss Vario-Tessar T✻ FE 1:4 24–70 mm ZA OSS (SEL-2470Z) In addition to these Sony collaboration lenses, Zeiss offers Touit (APS-C format), Loxia (35mm format) and Batis (35mm format) lenses for E-mount. Other products Zeiss offers a wide range of products related to optics and vision. These include camera and cine lenses, microscopes and microscopy software, binoculars and spotting scopes, eyeglasses and lenses, planetariums and dome video-systems, optical sensors, industrial metrology systems and ophthalmology products. Even video glasses belong to the product range. In the summer of 2012, the new video glasses Cinemizer OLED were to come on the market. In addition to the viewing of 2D and 3D movies, it will be possible to play computer games when fitted with the equipment. The largest part of Carl Zeiss AG's revenue is generated by its Semiconductor Manufacturing Technologies division, which produces lithographic systems for the semiconductor industry, as well as process control solutions (electron microscopes, mask repair tools, helium ion microscopes). Sports optics Carl Zeiss Sports Optics division produces rifle telescopic sights, spotting scopes, binoculars, and distance measuring devices for outdoors enthusiasts. The three main product lines are the Conquest line, which is manufactured in Germany and assembled in the United States, and Victory line, which is produced entirely in Germany, and the Terra line, which is made in Asia. Since 2019 the following Zeiss sport optics products series are in production: Binoculars * Terra * Conquest HD * SFL * Victory HT * Victory SF * Victory RF range finding binoculars * 20 x 60 T* S Spotting scopes * Dialyt * Conquest Gavia * Victory Harpia Rifle scopes * Conquest V4 * Conquest V6 * Victory HT * Victory V8 Medical solutions This branch of Carl Zeiss is managed by Carl Zeiss Meditec. It is divided in Ophthalmology/Optometry, Neurosurgery, ENT, Spine, P&R, Dentistry, Radiotherapy and Gynecology. Vision care Carl Zeiss Vision Care division develops, manufactures and distributes ophthalmic lenses, optical coatings, and dispensary technologies and services. Zeiss is known for ophthalmic lenses made from high refractive index glass, allowing stronger prescription lenses to be thinner. Their progressive lens ZEISS Progressive Individual has won multiple awards including the OLA awards in 2009 presented at Washington, D.C., and the VisionPlus or VP Awards in 2014 at Mumbai, India. Virtual reality Sold through VR Optician (previously vr-lens.eu) as 'Virtual Reality Headset Prescription Lens Adapters', Carl Zeiss Vision is the lens provider for VR Optician's aftermarket prescription lens adaptors. These lens adaptors are sold for a wide variety of Virtual Reality headsets, allowing those with visual impairments to use them without wearing glasses or contact lenses. Industrial metrology Zeiss Industrial Metrology specializes in high-accuracy measurement systems, including coordinate-measuring machines (CMMs), computed tomography measurement machines (non-medical), optical measuring equipment, metrology software and measurement sensor systems. The Industrial Metrology subsidiary provides this equipment to a wide range of manufacturing facilities worldwide. Zeiss has manufactured coordinate measuring machines since 1919, offering very basic manually operated CMMs. In 1973, Zeiss introduced the UMM 500, using a Zeiss sensor system and Hewlett-Packard computer. Zeiss has since vastly improved and diversified their product line and now feature many high accuracy CMMs, the Metrotom, a CT x-ray scanning measuring machine, with the ability to quickly and completely measure a part in 3 dimensions without ever touching the part, and the O-INSPECT, a combination optical-tactile measurement machine. Zeiss is currently a member of the International Association of CMM Manufacturers (IACMM). Many of the sensor systems produced by Zeiss are proprietary technologies, using technologies exclusively patented by Zeiss, and therefore can offer better accuracy and repeatability than its competitors. Zeiss was the first manufacturer of coordinate measurement machines to introduce computer numerical control (CNC) technology to a coordinate measurement machine and was the first company to offer CNC stylus changer capability for these machines. Semiconductor manufacturing technology Carl Zeiss SMT systems for DUV and EUV electromagnetic radiation are used in chip-lithography machines for focusing the extremely short wavelengths. Together with the company ASML and its subsidiaries and partners Zeiss is the sole supplier of the lithography systems that are able to manufacture core layers of the latest semiconductor chips. Microscopes Zeiss offers different types of microscopes: * Optical microscopes (LMs) * Laser scanning microscopes (LSMs) * Scanning electron microscopes (SEMs) * Scanning helium ion microscopes (SHIMs) * X-ray Microscopes (XRMs) Fire doors The name Zeiss Ikon can also be found in old cinemas, on fire shutters on the projection windows. These had heat fuses that melted and dropped the shutter over the hole if the film caught fire in the projection booth.
WIKI
PR_NetAddrToString by 2 contributors: Converts a character string to a network address. Syntax #include <prnetdb.h> PRStatus PR_NetAddrToString( const PRNetAddr *addr, char *string, PRUint32 size); Parameters The function has the following parameters: addr A pointer to the network address to be converted. string A buffer that will hold the converted string on output. size The size of the result buffer (string). Returns The function returns one of the following values: • If successful, PR_SUCCESS. • If unsuccessful, PR_FAILURE. You can retrieve the reason for the failure by calling PR_GetError. Description The network address to be converted (addr) may be either an IPv4 or IPv6 address structure, assuming that the NSPR library and the host system are both configured to utilize IPv6 addressing. If addr is an IPv4 address, size needs to be at least 16. If addr is an IPv6 address, size needs to be at least 46. Document Tags and Contributors Contributors to this page: teoli, Rappo Last updated by: teoli, Hide Sidebar
ESSENTIALAI-STEM
Does Anxiety Run In Families? Does Anxiety Run In Families? - Aurora Health in St. Cloud Does Anxiety Run In Families? Anxiety disorders have long been a topic of interest for researchers and mental health professionals. One question that frequently arises is whether anxiety has a hereditary component. In other words, does anxiety run in families? In this article, we will explore the relationship between genetics and anxiety, the impact of environmental factors, and the ongoing debate surrounding nature versus nurture. Understanding Anxiety: A Brief Overview Defining Anxiety Anxiety disorders encompass a range of conditions, including generalized anxiety disorder (GAD), panic disorder, social anxiety disorder (SAD), and specific phobias. Each disorder has its own set of symptoms, but they all share an excessive and persistent sense of worry or fear. It is estimated that around 30% of adults will experience an anxiety disorder at some point in their lives. Common Types of Anxiety Disorders Generalized anxiety disorder (GAD) is characterized by excessive and uncontrollable worry about various aspects of life, such as work, health, or relationships. Panic disorder involves recurring panic attacks, which are sudden and intense episodes of fear accompanied by physical symptoms like rapid heartbeat and shortness of breath. Social anxiety disorder (SAD) is characterized by an intense fear of social situations and the fear of being judged or humiliated. Specific phobias involve an irrational and overwhelming fear of a specific object, situation, or activity, such as heights, spiders, or flying. While anxiety disorders are often thought of as purely psychological, there is growing evidence to suggest a genetic component to their development. Research has shown that individuals with a family history of anxiety disorders are more likely to develop one themselves. This suggests that there may be certain genetic factors that predispose individuals to anxiety. However, it is important to note that genetics alone do not determine the development of anxiety disorders. Environmental factors, such as traumatic experiences or chronic stress, also play a significant role. Furthermore, the impact of anxiety disorders extends beyond the individual experiencing them. Family members and loved ones of those with anxiety disorders can also be affected. Living with someone who has an anxiety disorder can be challenging, as it often requires understanding, patience, and support. It is critical for family members to educate themselves about anxiety disorders and seek professional help if needed. The Role of Genetics in Anxiety The Science Behind Genetic Transmission Genetic transmission involves the passing down of genes from parents to their offspring. Genes are segments of DNA that determine our traits and characteristics. Anxiety is believed to have a polygenic inheritance, meaning it is influenced by multiple genes, each with a small effect. The interplay between these genes and the environment can impact the expression of anxiety-related traits. Furthermore, genetic transmission is not a straightforward process. Genes can be turned on or off based on environmental cues, a phenomenon known as epigenetics. This means that even individuals with a genetic predisposition to anxiety may not develop the disorder if they are not exposed to triggering environmental factors. Anxiety and Heredity: What Research Says Research has consistently shown a higher prevalence of anxiety disorders among individuals with a family history of anxiety. Twin studies have indicated a heritability rate of 30-50%, meaning that genetics explains approximately 30-50% of the variance in anxiety. Moreover, studies involving adopted individuals have suggested that genetic factors play a more significant role than environmental factors in the development of anxiety disorders. It is important to note that while genetics can predispose individuals to anxiety, it is not the sole determining factor. Environmental influences such as childhood experiences, stress levels, and social support also play a crucial role in the manifestation of anxiety disorders. Understanding the complex interplay between genetics and the environment is key to developing effective prevention and treatment strategies for anxiety. Environmental Factors and Anxiety The Impact of Family Environment on Anxiety Children growing up in families with high levels of anxiety may learn maladaptive coping mechanisms or develop exaggerated fears and anxieties themselves. Parental modeling of anxious behaviors can contribute to the development of anxiety in children. Additionally, adverse childhood experiences, such as abuse or neglect, can increase the risk of developing anxiety disorders later in life. Furthermore, the quality of familial relationships plays a significant role in the development of anxiety. Supportive and nurturing family environments can help buffer individuals against the negative impact of stressors, reducing their likelihood of developing anxiety disorders. On the other hand, dysfunctional family dynamics characterized by conflict, instability, or lack of emotional support can contribute to heightened anxiety levels. Socioeconomic Factors and Anxiety Socioeconomic factors, such as poverty, unemployment, and limited access to healthcare, can also contribute to the development of anxiety disorders. Individuals facing economic hardship may experience chronic stress and a lack of resources, which increases their vulnerability to anxiety. These factors can interact with genetic predispositions to further exacerbate anxiety symptoms. Moreover, the stigma associated with mental health issues in low-income communities can act as a barrier to seeking help for anxiety disorders. Limited access to mental health services and treatment options can perpetuate the cycle of anxiety in individuals from disadvantaged socioeconomic backgrounds. Addressing these systemic inequalities is crucial in providing equitable mental health support for all individuals affected by anxiety disorders. Nature vs. Nurture: The Ongoing Debate The Influence of Genetics vs. Environment Genetics provides a blueprint that influences an individual’s baseline vulnerability to anxiety. Certain genetic variations may make individuals more or less prone to anxiety disorders. However, environmental factors can modify the expression of these genes and influence the likelihood of developing an anxiety disorder. For example, a person with a genetic predisposition to anxiety may never develop the disorder if they grow up in a supportive and nurturing environment. Current Perspectives in Psychology The field of psychology recognizes that genetics and environment both play a significant role in the development of anxiety disorders. Consequently, research efforts have shifted towards exploring gene-environment interactions. Understanding how specific genetic variations interact with environmental factors can lead to more personalized treatments and prevention strategies for individuals at risk for anxiety. Coping Strategies for Families with Anxiety Recognizing and Addressing Anxiety in Family Members Open communication and education about anxiety can help family members recognize the signs and symptoms of anxiety disorders. Encouraging individuals to seek professional help is vital for effective management and treatment. Creating a supportive and understanding environment can reduce the stigma around anxiety and encourage individuals to access the necessary resources. Therapy and Treatment Options for Anxiety Various therapeutic approaches, such as cognitive-behavioral therapy (CBT), ketamine infusion therapy, medication, and self-help strategies, can be effective in managing anxiety. Therapy can provide individuals with the tools to identify and challenge anxious thoughts, develop coping strategies, and gradually face feared situations. Support groups and online resources can also be valuable sources of information and support for families dealing with anxiety disorders. Parting Words In conclusion, anxiety disorders often have a familial component, with a higher prevalence among individuals with a family history of anxiety. While genetics contribute to an individual’s vulnerability, environmental factors such as family environment and socioeconomic factors also play a significant role. Recognizing the interplay between genetics and environment is essential in developing effective prevention and treatment strategies for individuals and families dealing with anxiety disorders. To learn about the anxiety treatment options we offer in St. Cloud, MN, contact Aurora Mental Health & Wellness today to schedule a mental health consultation. Request A Consultation Treatments CALL US CONSULTATION
ESSENTIALAI-STEM
pqsk pqsk - 3 months ago 16 SQL Question T-SQL: Using a CASE in an UPDATE statement to update certain columns depending on a condition I am wondering if this is possible at all. I want to update column x if a condition is true, otherwise column y would be updated UPDATE table SET (CASE (CONDITION) WHEN TRUE THEN columnx ELSE columny END) = 25 I have searched all over, tried out some things and am unable to find a solution. I think it's not possible, but I thought I would ask here and see if anyone has done it before. Thanks in advance. Answer You can't use a condition to change the structure of your query, just the data involved. You could do this: update table set columnx = (case when condition then 25 else columnx end), columny = (case when condition then columny else 25 end) This is semantically the same, but just bear in mind that both columns will always be updated. This probably won't cause you any problems, but if you have a high transactional volume, then this could cause concurrency issues. The only way to do specifically what you're asking is to use dynamic SQL. This is, however, something I'd encourage you to stay away from. The solution above will almost certainly be sufficient for what you're after.
ESSENTIALAI-STEM
Andy Malakov software blog Thursday, June 12, 2008 Ant task for IKVMC Submitted Ant task for IKVMC - ant-ikvmc. I found multiple FileSet elements in Ant more convenient in defining source classes than -recurse:mask command line argument provided by IKVMC. Example of task: <ikvmc target="library" out="${dotnet.out}/uhfclient.dll" home="${ikvm.home}" version="1.0.0.0" debug="true" verbose="true"> <reference path="${dotnet.out}/uhfc-3rd-party.dll"/> <fileset dir="${classes}" includes="${uhfdll.resources}"> <exclude name="**/*.vpp"/> <exclude name="**/*.txt"/> </fileset> <fileset dir="${jars}"> <include name="**/*.jar"/> <exclude name="foo.jar"/> </fileset> </ikvmc> Bonus: Java doclet that generates IKVMC mapping file. Among other things mapping file can specify parameter names in methods and constructors translated by IKVMC. Since Java parameter names are not available from Java class files, IKVMC needs this hint to preserve original Java names. This is handy if you generate API libraries that will be used by .NET developers. Here is an example of javadoc task to generate IKVM mapping file for selected packages:  <javadoc sourcepath="${src}" classpath="${javac.classpath}" defaultexcludes="yes">    <doclet name="deltix.tools.ikvmc.ant.IkvmcMapDoclet" path="${classes}">      <param name="-out" value="${mapfile}"/>    </doclet>    <package name="com.acme.api"/>    <package name="com.acme.util"/>  </javadoc> IKVM for Java - .NET interoperability Front-end to our Java-based server is written on C#/.NET. Interoperability is achieved using XML/WS-based server API (as well as some custom binary format for high volume data responses). Typical architecture. Well, this is going to change now, after we discovered IKVM project. IKVM translates Java byte code into MSIL. The lack of Microsoft Java implementation for .NET platform has obvious commercial reason. But what cannot be done by the largest software company was done by single developer - Jeroen Frijters (the man behind IKVM). Amazing. JAXB 2.1 is now in Java 6 (almost) Looks like Sun folks silently updated Java 6 to use JAXB 2.1 API. The fact that Java 6 was shipped with old version of JAXB used to be a lot of pain. Hopefully we don't need to mess with endorsed directory workaround anymore. I run a diff and it turns out that JAXB API shipped with JDK 1.6 is almost identical to 2.1. It has only one significant difference from 2.1.6: Class javax.xml.bind.ContextFinder refers to a different location of Context Factory. In com.sun.xml.internal.bind.* became com.sun.xml.bind.* Bottom line: if you want to use JAXB 2.1 with 1.6, simply add JAXB implementation in your classpath. No need to use Java endorsed mechanism anymore. P.S. Also the following frequent error is now a history: "java.lang.LinkageError: JAXB 2.0 API is being loaded from the bootstrap classloader, but this RI requires 2.1". If you still see it with JAXB 2.1 in classpath simply update your Java 6 to the latest version (I tested it with 1.6.0_04-b12+ which was released in Spring 2008). Monday, June 2, 2008 JAXB error "java.lang.StackTraceElement does not have a no-arg default constructor" Our Java-based XML service responds with exceptions in case of errors, so naturally it serializes subclasses of java.lang.Exception to XML. Unfortunately JAXB 2.1.x fails when someone attempts to marshal a subclass of Exception:java.lang.StackTraceElement does not have a no-arg default constructor. This can be fixed using mechanism of JAXB Introductions. I just posted a fix here.
ESSENTIALAI-STEM
Chagai Hills The Chagai Hills is a granite mountain range located in the Chagai District in Balochistan, Pakistan. The Chagai Hills are located by facing the border wall at the Durand Line– the official name of Afghanistan–Pakistan border. The highest peak, Malik Naru, at the Chagai Hills is measured at 7915 ft and is a site of volcanic Koh-i-Sultan. Location and topography During its time as part of the India under the British Queen Victoria, the British Geological Survey conducted the geological survey of the Chagai Hills, which was able to provide its coordinates lies between 28.76667°N, 63.3°W in 1908. The more precise coordinates were provided by the extensive geological survey by the Geological Survey of Pakistan (GSP) which provided the coordinates at 29.0099°N, 64.00479°W in 1983. The Chagai Hills terrain is mostly consists of dry desert and located in the northernmost area of Chagai District at the international Durand Line– the official name of Afghanistan–Pakistan border. The region where Chagai Hills are located is reported by the extremely dry with no prospect of water, which the GSP conducted a survey in search of water in 1975. The Chagai Hills are stretched over an area that is approximately 130 km and 95 km wide. The highest peak, Malik Naru, at the Chagai Hills is measured at 7915 ft and is a site of volcanic Koh-i-Sultan. Geology Since 1901, the geology of Chagai Hills have been studied first by the European geologists and later by Pakistani geologists since 1960. The Chagai Hills are mostly granite mountains, some with average height of 200 m The Pakistani investigations discovered the occurrences of copper, iron, zinc, molybdenum, sulfur, and limestones, the travertine, which is an interest of economic importance. The geological survey to explore uranium was also conducted in the region in 1957. The Chagai Hills are continuous subject of interest of Volcanology which the Geological Survey of Pakistan (GSP) has commissioned its studies in a joint venture with the United States since 1997. The Koh-i-Sultan (lit. Mountain of the King) is a prominent site where its activity has provided scientific opportunity to the Pakistani seismologists and volcanologists. The fission carbon dating studies were first conducted on rocks and geological structure in 1997, which provided the age of Chagai Hills in Miocene-Late Pleistocene period. Climate The Chagai Hills lie in an arid dry zone, which is outside the main monsoon belt, and lies in a very remote area since the absence of the water. The Chagai Hills receives only an average of 4 in of rain annually. The temperature in Chagai Hills is noted to be extreme with summer being very hot and very cold winter. In 2019, the Pakistan Meteorological Department (PMD) reported the average minimum temperature 2 C in January, and the average maximum temperature is 45 C in July. Prominence The Chagai Hills were relatively unknown area of interests where only scientific studies on its geological structure was carried out by the Pakistan government until 1994. The Chagai Hills received its prominence and significant attention when it was incorrectly mentioned as nuclear test site in a text, Critical Mass, published by American authors William E. Burrows and Robert Windrem in 1994. With Pakistani administrations following the policy of deliberate ambiguity, the Chagai Hills were continuously suspected as a nuclear test site by the Western media outlets. Despite widely international media reporting and the local anti–nuclear protests being staged, there has been no radioactivity nor any nuclear weapon test activity that has ever taken place in the Chagai Hills albeit scientific studies on volcanology and hydrology. The Ras Koh Range is the official Ministry of Defense range and designated nuclear test site where the nuclear weapon testing took place in 1998. A structural depression actually separates the Ras Koh Hills from the Chagai Hills— the Ras Koh Hills are actually located on the border of Chagai District and the Kharan District. The confusion is attributed in reporting due to the Pakistan's MoD codenamed the tests as Chagai to maintain secrecy at the actual weapon testing venues.
WIKI
Page:Popular Science Monthly Volume 20.djvu/190 178 in groups of two or three, and animated by special movements. A section of the chain along its axis of revolution gives the forms represented in Fig. 2, A. The superposed forms of the figure, A, are evidently only the successive phases of a single drop as emitted at each pulsation; and all our efforts should be directed to isolating the drops and retarding their descent, so as to make them more visible under their different aspects. This is easily done. A variety of colored liquids are at our disposal, and, with a little alcohol, or a trace of glycerine or sugar, we may modify insensibly the density of the liquids, reduce the action of gravity to a minimum, and have at will ascending or descending currents. The last are generally easiest to obtain. Fig. 3 represents a simple apparatus for the experiment, the operation of which is dependent on the familiar principle of the siphon: we have only to raise the level of the colored liquid in the glass to change the rate of flow as we may wish. Certain manual difficulties in handling this apparatus may be obviated by using a system of communicating vessels, such as may be made by taking a common lamp-chimney, corking up the lower part and putting it in communication, by means of a pipe inserted in the cork and an India-rubber tube, with the bottom of a similar vessel or the nozzle of a vertical funnel. A string around the tube, or a pair of nippers, may serve to regulate the flow of the colored liquid, which should be only a little less dense than the other; and by inclosing a bubble of air above this Liquid and covering the. top of the chimney with a membrane, we may vary the pressure without changing the level of the liquid. If we have
WIKI
Registration Dossier Administrative data First-aid measures Description of first aid measures In case of skin contact: immediately take off all contaminated clothing. Wash immediately with running water and soap if areas of the body that have come in contact with the product, even if only suspected. Wash thoroughly the body (shower or bath). In case of eyes contact: after contact with the eyes, rinse with water with the eyelids open for a sufficient length of time, then consult an opthalmologist immediately. Protect uninjured eye. In case of Ingestion: do not under any circumstances induce vomiting. OBTAIN A MEDICAL EXAMINATION IMMEDIATELY. In case of Inhalation: in case of inhalation, consult a doctor immediately and show him packing or label. After contact with skin, wash immediately with soap and plenty of water. Most important symptoms and effects, both acute and delayed None Indication of any immediate medical attention and special treatment needed In case of accident or unwellness, seek medical advice immediately (show directions for use or safety data sheet if possible). Treatment: none Fire-fighting measures Extinguishing media Suitable extinguishing media: carbon dioxide (CO2). Extinguishing media which must not be used for safety reasons: avoid water jets to disperse the product. None in particular. Special hazards arising from the substance or mixture Do not inhale explosion and combustion gases. Burning produces heavy smoke. Substance that can sustain combustion when exposed to heat and ignition sources. Thermal decomposition produces toxic fumes of oxides of nitrogen and carbon. In the absence of oxygen may generate other toxic gases. Like most organic powders, may cause an explosion if the powder is dispersed into the air and set off. Advice for fire-fighters Use suitable breathing apparatus. Wear respirator, gloves, protective footwear. CAUTION: Pressurized containers may explode when exposed to fire. And 'recommended the use of breathing apparatus and full protection for fire fighting, since the combustion of this substance may generate toxic fumes, corrosive and flammable. If possible contain water used for fire fighting and collect for later disposal Collect contaminated fire extinguishing water separately. This must not be discharged into drains. Move undamaged containers from immediate hazard area if it can be done safely. Accidental release measures Personal precautions, protective equipment and emergency procedures Wear personal protection equipment. Wear breathing apparatus if exposed to vapours/dusts/aerosols. Provide adequate ventilation. Use appropriate respiratory protection. See protective measures under point handling and storage and Protective controls/personal protection. Environmental precautions Circumscribe the area of the spill and prevent the staff will come into contact if not properly protected. Avoid flames, sparks and prevent static buildup. Avoid generation of dust. Do not allow to enter into soil/subsoil. Do not allow to enter into surface water or drains. Retain contaminated washing water and dispose it. In case of gas escape or of entry into waterways, soil or drains, inform the responsible authorities. Suitable material for taking up: absorbing material, organic, sand Methods and material for containment and cleaning up Wash with plenty of water. Handling and storage Precautions for safe handling Avoid contact with skin and eyes, inhaltion of vapours and mists. Use localized ventilation system. Don't use empty container before they have been cleaned. Before making transfer operations, assure that there aren't any incompatible material residuals in the containers. Contamined clothing should be changed before entering eating areas. Do not eat or drink while working. See also section Protective controls/personal protection for recomened protective equipment. Conditions for safe storage, including any incompatibilities Always keep the containers tightly closed. Keep away from food, drink and feed. Incompatible materials: none in particular. Instructions as regards storage premises: adequately ventilated premises. Specific end use(s) None in particular Transport information Land transport (UN RTDG/ADR/RID) UN number: Not classified Shippingopen allclose all SpecialProvisionsopen allclose all Inland waterway transport (UN RTDG/ADN(R)) UN number: Not classified Shippingopen allclose all Remarksopen allclose all Marine transport (UN RTDG/IMDG) UN number: Not classified Shippingopen allclose all Remarksopen allclose all Air transport (UN RTDG/ICAO/IATA) UN number: Not classified Shippingopen allclose all Remarksopen allclose all SpecialProvisionsopen allclose all Exposure controls / personal protection Control parameters (4S,4aS,5aS,6S,12aS)-4-(dimethylamino)-3,6,10,12,12a-pentahydroxy-6-methyl-1,11-dioxo-1,4,4a,5,5a,6,11,12a-octahydrotetracene-2-carboxamide hydrochloride (1:1) Index: NA, CAS: 64-75-5, EC No: 200-593-8 TLV TWA - TLV STEL- OEL 8h- OEL short: none. Exposure controls Eye protection: safety glasses with side protection or estate or visor. Must be available eye wash station. Work, however, according to good working practices. Use close fitting safety goggles, don't use eye lens. Protection for skin: use clothing that provides comprehensive protection to the skin, e.g. cotton, rubber, PVC or viton. Protection for hands: use protective gloves that provides comprehensive protection, e.g. P.V.C., neoprene or rubber. Respiratory protection: are to be preferred closed-loop systems like Glovebox. Provide exhaust systems in the workplace. Avoid inhalation of vapors and dust. Adequate ventilation to the premises where the product is stored and / or manipulated, however, avoid excessive ventilation and dust dispersed generation. Change clothes at the end of shift. Use respiratory protection where ventilation is insufficient or exposure is prolonged, e.g. CEN/FFP-2(S) or CEN/FFP-3(S). Thermal Hazards: none Environmental exposure controls: none Stability and reactivity Reactivity: stable under normal conditions Chemical stability: stable under normal conditions Possibility of hazardous reactions: N.D. Conditions to avoid: stable under normal conditions. Incompatible materials: N.D. Hazardous decomposition products: N.D. Disposal considerations Waste treatment methods: recover if possible. In so doing, comply with the local and national regulations currently in force.
ESSENTIALAI-STEM
Page:Southern Historical Society Papers volume 37.djvu/299 and curiously locates the color guards "close by at the N. W. corner of the barn." Why the color guards should be posted at the N. W. corner of the barn, (south of the pike), while the colors were north of the pike,, is a question that would puzzle a Philadelphia lawyer. They could not have been "close by" the colors, for the barn is 50 yards away from the pike in a direct line, and how could the color guards protect the colors 100 to 120 yards away? In this version of H's story, the recapture must have taken place south of the pike; and, strange as it seems, he now believes that it was our color guards who got the flag; which flag, whether State or National, he does not say. It is strange that the enemy should take only one flag when they could just as easily have picked up both; strange, that if it was my men who recaptured "the flag," as H. now believes, that they should bring it to him; strange, that when ordered to take it to Col. Dwight with H's compliments, that they were sent back to the rail pile again, for there is where they were an hour or so after, as is proved by affidavits, corroborated by Confederate reports; strange, that not one man of the Color Company (nor of the regiment as far as I could ever learn), knows anything personally about such a capture, recapture and return of the colors; strange, that the force of the enemy that stole down on our left, (as H. says), struck our colors and carried them along south across the pike, is not mentioned in any official report on either side, not even in that of his own; strange, that in the spring of 1906, H. should consider this flag question so profitless that he resolved not again to make mention of it in anything he said or wrote, but that in the following fall we find him down in Porto Rico, revamping the recapture claim with added emphasis to Capt. Gamble, and giving it a sort of a stage setting to make it more impressive. Strange it is, that H. wants my brave boys turned down—they, who were so faithful to their trust, and who, after being so shamefully left to their fate, gave such a splendid account of themselves, exhibiting the highest qualities of the American soldier, and adding renown to their regiment; strange, indeed, that it did not strike H. how unreasonable was such advice, which,
WIKI
Trump's tariffs prompting some U.S. fund managers to look overseas NEW YORK (Reuters) - President Donald Trump’s announcement of import tariffs, and the prospect of retaliation by other countries, is prompting some fund managers to pare their holdings of U.S. stocks and look for opportunities overseas. The high turnover of key staff in the White House, including the exit of Gary Cohn, the director of the National Economic Council this week is undermining confidence in policy making also. President Trump said Thursday that he would begin imposing import tariffs of 25 percent on steel and 10 percent on aluminum in 15 days, sparking fears of a global trade war. Gary Cohn, the chief economic adviser to Trump, who argued against trade protectionism, resigned late Tuesday after Trump first announced the tariff plan and his successor has yet to be named. Fund managers from Oppenheimer, Federated, and Wells Fargo are among those that now see international and emerging market equities as more attractive than the U.S., where the prospect of higher interest rates contributed to a slump in stocks in February, leaving the benchmark S&P 500 stock index up about 2.0 percent for the year-to-date, after turning in a 7.0 percent gain in January. Overseas stocks, by comparison, are benefiting from synchronized economic growth in both Europe, Asia and the Americas, but offer lower valuations. The gross domestic product of countries in the eurozone, for example, expanded at a 2.7 percent annual rate in the fourth quarter, outpacing the 2.5 percent gain in the U.S. economy over the same time. The Stoxx 600, an index of companies in the eurozone, trades at a trailing price to earnings ratio of 14.9, compared with a 22.7 P/E ratio for the S&P 500, according to Thomson Reuters data. “You’re still seeing an earlier stage of an expansion cycle overseas versus the United States, which is likely to bounce between expansion and slowdown in the year ahead,” said Brian Levitt, senior investment strategist at OppenheimerFunds. Emerging markets such as China and Russia also look attractive given their prospects for economic growth and low equity valuations, he said. In the U.S., meanwhile, a Democratic party takeover of at least one branch of Congress in elections in November would bring more stability to Washington by curbing President Trump’s ability to expand protectionist policies, he said. “History suggests markets do better with divided government because there is less uncertainty with policy because it becomes harder to get anything enacted,” he said. The prospect of import tariffs could damage the U.S. economy by raising costs for U.S. manufacturers and consumers, while prompting its trading partners to impose their own levies on U.S. exporters, increasing their costs also and sapping overseas demand. Daniel Pinto, a co-president at JPMorgan Chase & Co (JPM.N), said in an interview with Bloomberg on Thursday that the U.S. equities could fall by between 20 and 40 percent over the next three years if a global trade war breaks out. Brian Jacobsen, multi-asset strategist at Wells Fargo Asset Management, said that the risks of retaliatory tariffs is prompting him to add to emerging markets and international stocks but at a slow pace, despite the fact that they look more attractive on a fundamental basis. “Strategically, we still really like international and emerging markets, but when you have asymmetric risks, that makes us a little cautious on non-U.S. assets for now”, given that markets have not yet priced in the possibility of more protectionist policies, he said. Overall, U.S. fund managers have been reducing their stake in domestic stocks as interest rates rise, making bonds more attractive. U.S. balanced funds, which hold both equities and bonds, now have an average of 55 percent of their assets in stocks, a 4.0 percent decline from 2014, and nearly 41 percent of their assets in bonds, according to Lipper data. Yet Ashwin Alankar, head of global asset allocation at Janus Henderson Investors, said that he remains a fan of large-capitalization U.S. stocks despite the likelihood of higher trade costs and inflation. The recently-passed U.S. corporate tax cuts provide on-going fiscal stimulus that should balance out higher interest rates, he said, a boost to stock prices that is not found in other markets. As a result, he is moving more of his portfolio in large-cap U.S. stocks, he said. “Europe isn’t talking about fiscal spending, Japan isn’t,” he said. “The U.S. is the only market in the world right now that could have the tailwind of fiscal spending.” Reporting by David Randall; Editing by Jennifer Ablan and Clive McKeef
NEWS-MULTISOURCE
Page:Crawford - Love in idleness.djvu/112 she used with such apparent precision, was more than Lawrence could guess. Brinsley did not answer at once, and Fanny pressed him. "Do you even know what club-hauling means?" she asked, mercilessly. "Well—no—really, I think the term must be obsolete." "Not at sea," retorted Fanny. This was crushing, and Brinsley, who was really a very good hand at ordinary sailing, grew angry. "Of course you've had some experience in catboats," Fanny continued. "That isn't serious sailing, you know. It's about equivalent, in horsemanship, to riding a donkey—a degree less dignified than walking, and a little less trouble." "I won't say anything about myself, Miss Trehearne," said Brinsley, "but you might treat the catboat a little less roughly. I didn't know you'd ever sailed anything else." Here the Miss Miners interposed, one after the other, protesting that it was not fair to use up the opportunities of conversation in such nautical jargon.
WIKI
Page:United States Statutes at Large Volume 80 Part 1.djvu/760 724 PUBLIC LAW 89-563-SEPT. 9, 1966 [80 STAT. (c) Actions under subsection (a) of this section and section 109(a) of this title may be brought in the district wherein any act or transaction constituting the violation occurred, or in the district wherein the defendant is found or is an inhabitant or transacts business, and process in such cases may be served in any other district of which the defendant is an inliabitant or wherever the defendant may be found. (d) In any actions brought under subsection (a) of this section and section 109(a) of this title, subpoenas for witnesses who are required to attend a United States district court may run into any other district. importatiw''^' (e) I t shall be the duty of every manufacturer offering a motor Service of proc- veliicle or item of motor vehicle equipment for importation into the of a' ^^j'^^'^°" United States to designate in writing an agent upon whom service of all administrative and judicial processes, notices, orders, decisions and requirements may be made for and on behalf of said manufacturer, and to file such designation with the Secretary, which designation may from time to time be changed by like writing, similarly filed. Service of all administrative and judicial processes, notices, orders, decisions and requirements may be made upon said manufacturer by service upon such designated agent at his office or usual place of residence with like effect as if made personally upon said manufacturer, and in default of such designation of such agent, service of process, notice, order, I'equirement or decision in any proceeding before the Secretary or in any judicial proceeding for enforcement of this title or any standards prescribed pursuant to this title may be made by posting such process, notice, order, requirement or decision in the Office of the Secretary. Noncompliance. ^^c. 111. (a) If ally motor vehicle or item of motor vehicle equipment is determined not to conform to applicable Federal motor vehicle safety standards, or contains a defect which relates to motor vehicle safety, after the sale of such vehicle or item of equipment by a manufacturer or a distributor to a distributor or a dealer and prior to the sale of such veliicle or item of equipment by such distributor or dealer: (1) The manufacturer or distributor, as the case may be, shall immediately repurchase such vehicle or item of motor vehicle equipment from such distributor or dealer at the price paid by such distributor or dealer, plus all transportation charges involved and a reasonable reimbursement of not less than 1 per centum per month of svicli price paid prorated from the date of notice of such nonconformance to the date of repurchase by the manufacturer or distributor; or (2) In the case of motor vehicles, the manufacturer or distributor, as the case may be, at his own expense, shall immediately furnish the purchasing distributor or dealer the required conforming part or parts or equipment for installation by the distributor or dealer on or in such vehicle and for the installation involved the manufacturer shall reimburse such distributor or dealer for the reasonable value of such installation plus a reasonable reimbursement of not less than 1 per centum per month of the manufacturer's or distributor's selling price prorated from the date of notice of such nonconformance to the date such vehicle is brought into conformance with applicable Federal standards: Provided, however, That the distributor or dealer proceeds with reasonable diligence with the installation after the required part, parts or equipment are received. (b) In the event any manufacturer or distributor shall refuse to comply with the requirements of paragraphs (1) and (2) of subsection (a), then the distributor or dealer, as the case may be, to whom such nonconforming vehicle or equipment has been sold may bring suit against such manufacturer or distributor in any district court of the �
WIKI
15.7.4.8 Manipulating Results with read_query_result() The read_query_result() is called for each result set returned by the server only if you have manually injected queries into the query queue. If you have not manipulated the query queue, this function is not called. The function supports a single argument, the result packet, which provides a number of properties: By accessing the result information from the MySQL server, you can extract the results that match the queries that you injected, return different result sets (for example, from a modified query), and even create your own result sets. The following Lua script, for example, will output the query, followed by the query time and response time (that is, the time to execute the query and the time to return the data for the query) for each query sent to the server: function read_query( packet ) if packet:byte() == proxy.COM_QUERY then print("we got a normal query: " .. packet:sub(2)) proxy.queries:append(1, packet ) return proxy.PROXY_SEND_QUERY end end function read_query_result(inj) print("query-time: " .. (inj.query_time / 1000) .. "ms") print("response-time: " .. (inj.response_time / 1000) .. "ms") end You can access the rows of returned results from the result set by accessing the rows property of the resultset property of the result that is exposed through read_query_result(). For example, you can iterate over the results showing the first column from each row using this Lua fragment: for row in inj.resultset.rows do print("injected query returned: " .. row[1]) end Just like read_query(), read_query_result() can return different values for each result according to the result returned. If you have injected additional queries into the query queue, for example, remove the results returned from those additional queries and return only the results from the query originally submitted by the client. The following example injects additional SELECT NOW() statements into the query queue, giving them a different ID to the ID of the original query. Within read_query_result(), if the ID for the injected queries is identified, we display the result row, and return the proxy.PROXY_IGNORE_RESULT from the function so that the result is not returned to the client. If the result is from any other query, we print out the query time information for the query and return the default, which passes on the result set unchanged. We could also have explicitly returned proxy.PROXY_IGNORE_RESULT to the MySQL client. function read_query( packet ) if packet:byte() == proxy.COM_QUERY then proxy.queries:append(2, string.char(proxy.COM_QUERY) .. "SELECT NOW()", {resultset_is_needed = true} ) proxy.queries:append(1, packet, {resultset_is_needed = true}) proxy.queries:append(2, string.char(proxy.COM_QUERY) .. "SELECT NOW()", {resultset_is_needed = true} ) return proxy.PROXY_SEND_QUERY end end function read_query_result(inj) if inj.id == 2 then for row in inj.resultset.rows do print("injected query returned: " .. row[1]) end return proxy.PROXY_IGNORE_RESULT else print("query-time: " .. (inj.query_time / 1000) .. "ms") print("response-time: " .. (inj.response_time / 1000) .. "ms") end end For further examples, see Section 15.7.5, “Using MySQL Proxy”.
ESSENTIALAI-STEM
Page:Ancient India as described by Megasthenês and Arrian.djvu/76 # 57 Fragm. XIII. t iElian, Hist. Anim. XVII. 39. Conf. Fragm. XII. 2. Of hidian A^es, In the country of the P r a x i i,§ who are an Indian people, Megasthenes says there are apes not inferior in size to the largest dogs. They I Peagm. XIII. B. iElian, Hist Anim. XVI. 10. Oflndmn Apes. Among the P r a s i i in India there is found, they say, a species of apes of human-like intelligence, and which are to appearance about the size of Hurkanian dogs. Nature has furnished them with forelocks, which one ignorant of the reality would take to be artificial. Their chin, like that of a satyr, turns upward, and their tail is like the potent one of the lion. Their body is white all over except the face and the tip of the tail, which are of a reddish colour. They are very intelligent, and naturally tame. They are bred in the woods, where also they Uve, subsist- ing on the fruits which they find growing wild on the hills. They resort in great numbers to the suburbs of L a t a g e, an Indian city, where they eat rice which has been laid down for them by the king's orders. In fact, every day a ready-prepared meal is set out for their use. It is said that when they have satisfied their appetite they retire in an orderly manner to their haunts in the woods, without injuring a single .thing that comes in their way. § The PrAchyas {i.e. Easterns) are called by Strabo, Arrian, and Pliny Ilpocrtoi, Pra^ii ; by Plutarch {Alex. 62) Upaitrioi, a name often used by ^lian also ; by Nikolaiis Damas. (ap. Stob. Floril. 37, 38) Upavtrioi ; by Diodorus (xvii. 93) Bprja-ioi; by Ourtius (IX. 2, 3) Pha/rrasii ; by Justin (xii. 8, 9) Proesides. Megasthenes attempted to approximate more closely to the Sanskpt PrAckyafior here he uses JIpa^iaKos. And it appears that Upd^ioi should be substituted for Upda-Loi in Stephan. Bjrzant., since it comes between the words Upd^iKos and npaa-. — Schwanbeck, p. 82, not. 6. Digitized by Google
WIKI
SOME OF OUR MOST FREQUENTLY ASKED QUESTIONS • What are head lice? Head lice are tiny wingless insects that live in hair. They are grey-brown in colour and about 2.5 mm long, which is the size of a sesame seed, when fully grown. Head lice cling to hair and are usually found on or near to the scalp. Find out more on the What are head lice? page. • How common are head lice? Head lice are a common problem, especially for children aged 5–11 years old. Approximately 8% of children in the UK have head lice at any one time. • How do head lice spread? Head lice spread through direct head-to-head contact. Find out more on the What are head lice? page. • What is the life cycle of head lice? There are three different stages to the life cycle of head lice: 1. Eggs (nits) 2. Nymph 3. Adult louse Find out more on the What are head lice? page. • What are the differences between head lice and nits? Nits are the eggs of head lice. Head lice are the fully developed adult louse. Find out more on the What are head lice? page. • What are the symptoms of head lice? The most common symptom of head lice is usually itching. Find out more on the Signs of head lice page. • How do you detect head lice? It’s not always easy to see head lice, as it can be difficult to distinguish between eggs and nits that are dead and alive. Head lice eggs (nits) are easier to spot, because after hatching, the shell looks white and stays attached to the hair shaft. Read our guide on how to check for head lice. • Can head lice be prevented? Realistically, it’s very difficult to prevent head lice. Children often wrestle, cuddle and play in close contact with each other. Find out more on the Protecting against head lice page. • How are head lice treated? There are many options for treating head lice, but to get rid of head lice you need to focus on two important aspects: 1. Killing the head lice that are living 2. Killing the head lice eggs waiting to hatch. Find out more about treating head lice. • My child has head lice. Should I keep them off school? There’s no need to keep your child off school if they have head lice. In most cases, children should stay at school until the end of the day, go home and get treatment, and return to school the next day.
ESSENTIALAI-STEM
Trait anxiety and salivary cortisol during free living and military stress Marcus K. Taylor, Jared P. Reis, Kenneth P. Sausen, Genieleah A. Padilla, Amanda E. Markham, Eric G. Potterat, Sean P A Drummond Research output: Contribution to journalArticleResearchpeer-review 15 Citations (Scopus) Abstract Introduction: Accumulating evidence suggests that negative affect is associated with elevated cortisol. Limited research has investigated this association in young, highly functioning, and stress-resilient populations. Methods: We examined the relation of trait anxiety with total and diurnal salivary cortisol during free-living conditions and during a stressful military exercise in 26 military men ages 19-30 yr (M = 21.6, SD = 2.3). Salivary cortisol was assessed at five time points over 2 consecutive days of free-living measurement, and three time points during a stressful military experience. Trait anxiety was measured with the trait portion of the Spielberger State-Trait Anxiety Inventory 1-3 wk prior to the military exercise. Results: Total cortisol concentrations were similar between men reporting high or low anxiety during free-living conditions (8.6 ± 3.2 vs. 7.4 ± 2.8 nmol·L-1, respectively, P > 0.05), and military stress (21.3 ± 7.3 vs. 19.0 ± 7.0 nmol·L-1, respectively, P > 0.05). The diurnal cortisol profile differed significantly (P = 0.04) between these men during the free-living condition, but not the stressful military experience (P > 0.05). Specifically, during free living, men with low anxiety exhibited a diurnal cortisol pattern that peaked in the early morning, decreased precipitously during the midmorning, and continued to decrease throughout the day, reaching a nadir in the evening. By contrast, tre cortisol pattern of high-anxiety men remained elevated and significantly higher than their low-anxiety counterparts during the midmorni ng, decreased more slowly throughout the day, and reached its lowest level in the evening. Results were not substantially altered following adjustment for sleep duration or wake time. Conclusion: These findings suggest that trait anxiety influences the diurnal cortisol pattern in young, apparently healthy men during free-living conditions, but does not predict the cortisol response to uncontrollable military stress. Reprint & Original languageEnglish Pages (from-to)129-135 Number of pages7 JournalAviation Space and Environmental Medicine Volume79 Issue number2 DOIs Publication statusPublished - 1 Feb 2008 Externally publishedYes Keywords • Diurnal patterns • Hormones • Stress Cite this
ESSENTIALAI-STEM
Obeah! Obeah! is a 1935 American horror film directed by F. Herrick Herrick and starring Jean Brooks and Phillips Lord. In the United Kingdom, the film was released under the title The Mystery Ship. It is believed to be a lost film, as no copies of it are known to exist. Plot A sailor, known as "The Adventurer," searching for a lost American explorer discovers him being held hostage on a remote island in the South Sea. The man is held captive by the island's natives, who have placed him under a voodoo spell known as "obeah." The Adventurer attempts to halt a death ritual but fails, and the explorer dies. The Adventurer is forced to flee the island, taking with him a native woman and the daughter of the dead explorer. With the help of a map taken from the explorer, the three attempt to locate a chest of gold that has been sunk off the island shore. Meanwhile, the high priest of the island people casts a curse on the three, and a love triangle ensues between those on the ship. Cast * Jean Brooks * Phillips H. Lord as the Adventurer * Alice Wessler * Alexander McCatty Production The film was produced by the New York City-based production company Arcturus Pictures. Based on a story by director F. Herrick Herrick, the film's script was written by Robert Carse, the film's production began in June 1934 and lasted several weeks. The film was shot on location in Kingston, Jamaica. An additional article published in Film Daily claimed the film's shoot lasted a total of eleven months, shot on a worldwide cruise that stopped in over twenty countries. Later trade reports reported the shoot had only lasted four months. The ship's crew as well as various unknown performers appear in the film. Scenes were filmed at Papine and Port Royal, alongside interior shots in downtown Kingston bars.
WIKI
Talk:Termagant [Untitled] Could it not be a corrupted form of al-Rahman? Zsigri 23:35, 4 January 2007 (UTC) * Who knows? Paul B 00:08, 5 January 2007 (UTC) * That doesn't seem likely. Considering that the Christians also thought that "Allahu Akbar" referred to Muslim worship of twin goddesses Allat and Akbar, I suppose anything is possible. The question is, what can be established as true (and then reported in a secondary source, so I can be added here uncontroversially), and the answer is, probably, nothing. --<IP_ADDRESS> (talk) 19:51, 22 February 2008 (UTC) I didn't know that! --Bluejay Young 10:38, 25 May 2004 (UTC) - Should this article mention that in Games Workshop's game, Warhammer 40k, the Tyranids have an unit called Termagant ? --Acolyte of Discord 22:14, 6 May 2006 (UTC) * Since the're NOT called that...probably not, no. So, I changed it.<IP_ADDRESS> (talk) 16:43, 2 July 2008 (UTC) Walter W. Skeat In the article: "W. W. Skeat in the 19th century, speculated that the name was originally "Trivagante", meaning 'thrice wandering'" I think this refers to Skeat's notes to Chaucer's Tale of Sir Thopas. If anyone can find the note, and improve the reference, that would be a useful tweak.--Wetman (talk) 10:09, 11 May 2009 (UTC) A mystery Yes, Mahound is mentioned in the English mystery plays. But I challenge anybody to provide evidence of the use of Termagant. I have done some searches of the texts listed here and can find nothing. &mdash; RHaworth (talk · contribs) 20:40, 21 November 2017 (UTC)
WIKI
Wikipedia:Articles for deletion/Slow Revival The result was keep. (non-admin closure) Armbrust The Homunculus 07:42, 29 June 2014 (UTC) Slow Revival * – ( View AfD View log Stats ) Article's subject fails to meet WP:NALBUMS. Multiple reliable secondary sources with more than trivial coverage not available, record label not notable. KDS 4444 Talk 00:49, 22 June 2014 (UTC) * Note: This debate has been included in the list of United States of America-related deletion discussions. • Gene93k (talk) 03:12, 22 June 2014 (UTC) * Note: This debate has been included in the list of Albums and songs-related deletion discussions. • Gene93k (talk) 03:12, 22 June 2014 (UTC) * Keep. Coverage found via Google newspapers, Google Books, and Highbeam. I've added sources to the article; subject meets WP:GNG and WP:NALBUMS. Gongshow talk 06:39, 22 June 2014 (UTC) * Keep The album has charted and so clearly meets WP:NALBUMS. Must do WP:BEFORE. Walter Görlitz (talk) 06:58, 22 June 2014 (UTC) * Keep - Appears to meet WP:NALBUMS/WP:GNG per sources in the article. NorthAmerica1000 05:53, 29 June 2014 (UTC)
WIKI
54 Lythraceæ The Loosestrife Tribe Tap or the illustration to highlight plants. Lythraceæ Lythraceæ Key characteristics Almost all herbaceous plants, a few only shrubs. The branches are frequently quadrangular. Leaves opposite, seldom alternate, entire, without either stipules or glands, sometimes with glandular dots. Flowers solitary, or in clusters, regular, or irregular, growing from the base of the leaf-stalk, or in terminal spikes or racemes as the upper leaves diminish. The calyx is tubular, ribbed and plaited, often oblique; some of the lobes are in many cases longer than the rest. The petals are inserted between the outer lobes of the calyx, very soon falling off, sometimes wanting. The stamens are fixed in the tube of the calyx, below the petals, to which they are either equal in number, or twice, or even four times as many; the anthers are two-celled opening longitudinally. The style is slender; the stigma usually capitate. The capsule is membranous, covered by the calyx, gaping when ripe, containing numerous small seeds. This order has most affinity with the Saxifrage tribe. Select plants in this order Not all plants listed are illustrated and not all plants illustrated are listed. • Lythrum Salicaria (1) is esteemed one of the most elegant of British plants; it grows frequently on the banks of rivers and streams, the tall spikes of bright purple flowers rising to the height of four or five feet; in dry situations, the plant becomes more downy and of shorter stature. The whole plant has astringent properties, which have rendered it useful in medicine and in tanning. • Lythrum hyssopifolium is not so common a species, being found only in a few places in England, and is of smaller growth and less beautiful aspect. • Peplis Portula (2) grows generally in watery places, on heaths, on sandy soils, with a prostrate stem, creeping within the bell-shaped plaited calyx. • Lagerstrœmia (3) was so named by Linnæus, after Lagerstrœm of Gottenberg, who obtained many rare plants from the East. It forms, with a few other plants, a division of this tribe distinguished by having the seeds winged. All the species are fine shrubs of the East Indies, China, and South America. • Lagerstrœmia reginæ is a very beautiful evergreen shrub, bearing long panicles of rose-coloured flowers, which deepen in hue during the day till they become purple by evening; the bark and leaves are considered medicinal, and the seeds are narcotic. • Cuphea (4) is a genus of South America; several species are now cultivated in English gardens as ornamental flowers. • Cuphea Balsamona is found to be a valuable remedy in the intermittent fevers of Brazil. • Heimia salicifolia, a Mexican plant, is remarkable for having yellow flowers in the midst of this usually purple-flowered tribe. • Lawsonia inermis, the Hinna of Egypt, yields an orange dye, employed by the women of Oriental countries to stain their fingers and feet; it is also used for dyeing morocco leather, and various other purposes. In India, it is much cultivated north of the Jumna river. • The bright red flowers of Grislea tomentosa yield a dye to the natives of India. • The wood of Physocalymma floribunda is of a fine rose colour, and forms the favourite Rosewood of Germany and Portugal. • The leaves of Ammannia vesicatoria are so extremely acrid as to be used for blisters in India. • Pemphis acidula inhabits exclusively the coasts of tropical Asia; where the leaves are said to be cooked and eaten by the inhabitatnts. Locations This Tribe is dispersed in various countries. Lythrum, like many other plants which grow in watery situations, extends over a wide range of the globe, being found in Europe, America, Asia, and Australia. L. Cashmerianum inhabits the shores of the Lake of Cashmere. L. Salicaria is found in New Holland, although at present no other species of this tribe has been discovered there. Grislea belongs to India, China, and South America; Ammannia to the hot countries of both hemispheres. Rotala, Pemphis, and Ameletia are spread over the peninsula of India and the islands of the Indian Ocean. Lagerstrœmia and its allies are all natives of India or South America. Legend 1. Lythrum Salicaria, Purple Loosestrife. River banks, England. 1. Calyx and Pistil. 2. Calyx and Stamens. 3. Pistil. 4. Section of Seed-vessel. 2. Peplis Portula, Water Purslane. England. 1. Flower. 2. Flower, magnified. 3. Section of Seed-vessel. 3. Lagerstrœmia indica. Indian Lagerstrœmia. East Indies. 4. Cuphea tubiflora, Tubular-flowered Cuphea. South America. Explore more Browse all plants » Posters Decorate your walls with colorful detailed posters based on Elizabeth Twining’s beautiful two-volume set from 1868. Order posters » Puzzles Challenge yourself or someone else to assemble a puzzle of all 160 botanical illustrations. Order puzzles »
ESSENTIALAI-STEM
Talk:Motivation and emotion/Assessment/Multimedia Comments Hi, there are tools now available for free that are even better then the ones mentioned in the recommendation section ("If you're not sure and want to keep it simple, the recommended approach is a screencast using http://screenr.com" etc). For example the better quality of screen recording can be achieved if you use the following free tool that is mentioned in the video I created it with, see http://www.youtube.com/user/kinestheticlearning?feature=mhee#p/c/039ABF3351606F24/0/Nh_caz2ziJY Prezi, that is mentioned in the video is another tool that can be recommended for making slideshows that look much better then the ones made by Powerpoint or Slideshare. My two cents only :) Best regards Youtuniverity 15:00, 1 December 2011 (UTC) * Great suggestions, thank-you. I've added these links and will try the tools. -- Jtneill - Talk - c 20:36, 1 December 2011 (UTC) * Hi again, I just found out you and Leigh wrote the general articles (Wikiversity "resources") about Screencasting and Session recording, but I haven't seen them being linked by you from the "Emotion and Motivation" Assessment Multimedia. Youtuniverity 12:25, 8 December 2011 (UTC) Grammar I think there might be a minor grammar or spelling error in the multimedia marking criteria under HD "An excellent multimedia presentation which effectively how key concepts from motivation or emotion theory and research can be applied to a specific problem" -omitting the word 'shows' ? --Can Rogerthat (discuss • contribs) 02:49, 28 October 2014 (UTC) * Thanks, fixed. -- Jtneill - Talk - c 03:10, 28 October 2014 (UTC)
WIKI
Windows apps Collapse the table of content Expand the table of content Information The topic you requested is included in another documentation set. For convenience, it's displayed below. Choose Switch to see the topic in its original location. CoDisconnectObject function Disconnects all remote process connections being maintained on behalf of all the interface pointers that point to a specified object. Only the process that actually manages the object should call CoDisconnectObject. Syntax HRESULT CoDisconnectObject( _In_ LPUNKNOWN pUnk, _In_ DWORD     dwReserved ); Parameters pUnk [in] A pointer to any interface derived from IUnknown on the object to be disconnected. dwReserved [in] This parameter is reserved and must be 0. Return value This function returns S_OK to indicate that all connections to remote processes were successfully deleted. Remarks The CoDisconnectObject function enables a server to correctly disconnect all external clients to the object specified by pUnk. It performs the following tasks: 1. Checks to see whether the object to be disconnected implements the IMarshal interface. If so, it gets the pointer to that interface; if not, it gets a pointer to the standard marshaler's (i.e., COM's) IMarshal implementation. 2. Using whichever IMarshal interface pointer it has acquired, the function then calls IMarshal::DisconnectObject to disconnect all out-of-process clients. An object's client does not call CoDisconnectObject to disconnect itself from the server (clients should use IUnknown::Release for this purpose). Rather, an OLE server calls CoDisconnectObject to forcibly disconnect an object's clients, usually in response to a user closing the server application. Similarly, an OLE container that supports external links to its embedded objects can call CoDisconnectObject to destroy those links. Again, this call is normally made in response to a user closing the application. The container should first call IOleObject::Close for all its OLE objects, each of which should send IAdviseSink::OnClose notifications to their various clients. Then the container can call CoDisconnectObject to close any existing connections. CoDisconnectObject does not necessarily disconnect out-of-process clients immediately. If any marshaled calls are pending on the server object, CoDisconnectObject disconnects the object only when those calls have returned. In the meantime, CoDisconnectObject sets a flag that causes any new marshaled calls to return CO_E_OBJNOTCONNECTED. Requirements Minimum supported client Windows 2000 Professional [desktop apps | UWP apps] Minimum supported server Windows 2000 Server [desktop apps | UWP apps] Minimum supported phone Windows Phone 8 Header Objbase.h Library Ole32.lib DLL Ole32.dll See also IAdviseSink::OnClose IMarshal::DisconnectObject IOleObject::Close     Show: © 2018 Microsoft
ESSENTIALAI-STEM
Fazlallah Khunji Isfahani Fazlallah Khunji Isfahani, was a Persian religious scholar, historian and political writer. He was born in 1455 in Shiraz, a city in Fars, a region in southern Iran. His father belonged to the Ruzbihan family, which was descended from the Sufi author Ruzbihan Baqli (died 1209), while his mother belonged to the Sa'idi family. Through both his parents, Khunji belonged to the affluent and influential ulama (clergical class) of Fars, who were respected and protected by the Turkmen Aq Qoyunlu. In 1487, Khunji left Shiraz for the third time for a Hajj. He met Sultan Ya'qub of Aq Qoyunlu near the Sahand mountain and agreed to write the history of Aq Qoyunlu dynasty. When the Safavid shah Ismail I started the Shi'ification of Iran and the persecution of Sunni Muslims, Khunji fled to Transoxiana, where he lived for the rest of his life under the patronage of Timurids and Shaybanids. Works * Tarikh-i Alam-ara-yi Amini * Mihman-Nama-i Bukhara * Suluk al-Muluk
WIKI
Wikipedia:Peer review/La Masia/archive3 La Masia This peer review discussion has been closed. If anyone could give this a quick copyedit, I think it would helps it's way to GA. Cheers, Sandman888 (talk) 13:55, 1 September 2010 (UTC) * Previous peer review * The rules say to wait 14 days after a peer review before opening a new one. You waited one day. This is PR 3 and PR 2 waited 5 days. I am archiving this. PR is a place to point out problems with articles like the need for a copyedit, but is not the place to get a copyedit. Ruhrfisch &gt;&lt;&gt; &deg; &deg; 17:46, 3 September 2010 (UTC)
WIKI
truama exam FOR EMT's The flashcards below were created by user Anonymous on FreezingBlue Flashcards. 1. what are the three sighns and symptoms of a pneumothorax 1. diminshed or absent sighns of breathing from the affected side of the injurey. 2. Sighns of shock my be present. • 3. difficulty breathing  •      2. sighns and symptoms of a Tention Pneumothorax 1. Low Blood Pressure  2. Difficulty Breathing      3. Jugular vain Distortion  3. what is a Hemothorax when the chest cavity fills with blood. 4. What is a hemopneumothorax when the chest cavity fills with blood and air. 5. what is the three signs and symptoms of a hemothorax. 1. loss of blood 2. shock 3. calapsed lung     6. what are th three signs of a hemopneumothorax. 1.collapsed lung 2. shock 3.loss of bleeding.      7. what is a cardiac tamponade when an injurey to the heart causes blood to flow in to the surrounding pericardial sac. 8. what are the signs and symptoms of Cardiac Tamponade 1. extended neck veins. 2.sighns of shock 3. low blood pressure     9. what is AORTIC INJURY AND DISSECTION Damage to this large, high pressure vessel causes massive, often fatal bleeding (can be damaged without trauma)   10. sighns and symptoms 1. pain in the chest or abdominal area 2. sighns of shock 3.difernces in bp and pulse on right &lift side    11. what is evisceration when a open wound lets out the organs of the body. 12. the liver is one of the most commonly injured organ              Why  1. large size and position in the upper right quadrant. 2.when injured it bleed perfusively. 13. what are some signs and symptoms of abdominal injuries. • 1. pain • 2. cramps  • 3.nausea  • 4.wekneas & thurst • 5.laceration, puncture wounds • 6.coughing up or vomiting blood • 7.Distended abdomin • 8. Rigid or tinder Abdomin      14. what is a hemotoma A pooling from blood in in the body 15. what are two reasons why bleeding is a good thing 1. bleeding is good because it cleans out the wound from infection and other harmful bacteria 2.Blood also cotts witch also stops bleeding, and the blood itself has enough nutrients to start the healing proces.  16. What is compartment syndrom With crush injuries some times the injured body part will swell and prevent cicrculation through that spacific part. 17. what do you do with all abrassions. cover with dressing for the patients comfort and because of infiction. Author: Anonymous ID: 162352 Card Set: truama exam FOR EMT's Updated: 2012-07-13 04:38:29 Tags: TRAUMA EMTS Folders: Description: trauma questions for trauma exam at the st paul ems academy Show Answers:
ESSENTIALAI-STEM
Page:Æsop's fables- (IA aesopfables00aesoiala).pdf/158 THE OXEN AND THE BUTCHERS NCE upon a time the Oxen determined to be revenged upon the Butchers for the havoc they wrought in their ranks, and plotted to put them to death on a given day. They were all gathered together discussing how best to carry out the plan, and the more violent of them were engaged in sharpening their horns for the fray, when an old Ox got up upon his feet and said, “My brothers, you have good reason, I know, to hate these Butchers, but, at any rate, they understand their trade and do what they have to do without causing unnecessary pain. But if we kill them, others, who have no experience, will be set to slaughter us, and will by their bungling inflict great sufferings upon us. For you may be sure that, even though all the Butchers perish, mankind will never go without their beef.” THE WOLF AND THE LION WOLF stole a lamb from the flock and was carrying it off to devour it at his leisure when he met a Lion, who took his prey away from him and walked off with it. He dared not resist, but when the Lion had gone some distance he said, “It is most unjust of you to take what’s mine away from me like that.” The Lion laughed and called out in reply, “It was justly yours, no doubt! The gift of a friend, perhaps, eh?” 96
WIKI
Talk:Don Quijote (spacecraft) Redirect This is ridiculous! Don Quijote should be a redirect to Don Quixote - or, arguably, the other way around. A space probe is not what people expect to see when they look up "Don Quijote". <IP_ADDRESS> 22:22, 21 February 2006 (UTC) * agree —Preceding unsigned comment added by <IP_ADDRESS> (talk) 13:40, 9 May 2008 (UTC) No, what's ridiculous is that the article still says that the launch date will be sometime between 2013 and 2015 when clearly the mission is still in its conceptual phase (and with the current economical climate in europe it will probably not be realized in the near future). Maybe somebody can update the time schedule here?<IP_ADDRESS> (talk) 20:49, 16 November 2012 (UTC) Hi people, Just one remark to set the title fine: the European Space Agency calls its mission concept Don Quijote in English (and Don Quichotte in French). https://www.esa.int/ESA_Multimedia/Images/2008/01/Don_Quijote_mission (https://www.esa.int/Space_in_Member_States/Switzerland_-_Francais/Don_Quichotte) --MANARAJu (talk) 15:11, 21 February 2023 (UTC) External links modified Hello fellow Wikipedians, I have just modified 2 one external links on Don Quijote (spacecraft). Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20150630102849/http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Don_Quijote_concept to http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Don_Quijote_concept * Added archive https://web.archive.org/web/20150630102849/http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Don_Quijote_concept to http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Don_Quijote_concept Cheers.— InternetArchiveBot (Report bug) 09:10, 15 December 2016 (UTC) External links modified Hello fellow Wikipedians, I have just modified 7 external links on Don Quijote (spacecraft). Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20150515025652/http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Sancho_study_designing_the_minimum_Earth_escape_spacecraft to http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Sancho_study_designing_the_minimum_Earth_escape_spacecraft * Added archive https://web.archive.org/web/20150515025652/http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Sancho_study_designing_the_minimum_Earth_escape_spacecraft to http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Sancho_study_designing_the_minimum_Earth_escape_spacecraft * Added archive https://web.archive.org/web/20150515025652/http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Sancho_study_designing_the_minimum_Earth_escape_spacecraft to http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Sancho_study_designing_the_minimum_Earth_escape_spacecraft * Added tag to http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Past_studies_Don_Quijote * Added archive https://web.archive.org/web/20150607004922/http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/NEO_precursor_studies to http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/NEO_precursor_studies * Added archive https://web.archive.org/web/20150607004851/http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Asteroid_Impact_Deflection_Assessment_AIDA_study to http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Asteroid_Impact_Deflection_Assessment_AIDA_study * Added archive https://web.archive.org/web/20150621202033/http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Asteroid_deflection_mission_seeks_smashing_ideas to http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Asteroid_deflection_mission_seeks_smashing_ideas * Added archive https://web.archive.org/web/20150630102849/http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Don_Quijote_concept to http://www.esa.int/Our_Activities/Space_Engineering_Technology/NEO/Don_Quijote_concept Cheers.— InternetArchiveBot (Report bug) 14:40, 12 September 2017 (UTC) Naming Conventions Is Don Quijote the name of the complete assembly of the three crafts, the name of the proposed mission, or the name of the Study to consider the feasibility of the proposed mission? Are there two or three vehicles: Orbiter (Sancho), Impactor (Hidalgo), Lander (Autonamous Surface Package)? Were they intended to travel together as an assembly to the asteroid, then split, or travel as separate flights? Refer to: "The craft would have been launched by a Vega launcher ..." implying a single launch vehicle. There are multiple references to the naming convention of the vehicles throughout the article, that seem inconsistent, and cause confusion, in light of the fact that there are two/three vehicles involved in the system. The terms in question are, in order of appearance: "Space Craft"; "Space Probe"; "Orbiter"; "lander"; "Impactor" "Craft". Names section: The comparisons are confusing: "Like Quijote, the Hildaldo spacecraft ... " OR "Hidaldo was a minor Spanish title ... ". The article seems incomplete: Propulsion section for all four vehicles; Instrumentation section for three vehicles. SquashEngineer (talk) 17:05, 6 August 2021 (UTC)
WIKI
Norm NEN-EN 16836-1:2016 en Communication systems for meters - Wireless mesh networking for meter data exchange - Part 1: Introduction and standardization framework 50,04 60,55 Incl BTW Over deze norm Status Definitief Aantal pagina's 21 Gepubliceerd op 01-11-2016 Taal Engels NEN-EN 16836-1 gives provisions on the standardization framework of communication systems applicable to the exchange of data from metering devices to other devices within a mesh network. It includes information on the application process functions, layered protocols and metering architecture. This European Standard also specifies how to interpret Parts 2 and 3 of EN 16836 which give a list of references to the ZigBee documents. This standard is applicable to communications systems that involve messages and networking between a meter or multiple meters and other devices in a mesh network, such as in home displays (IHDs) and communications hubs. This standard allows routing between devices and also allows channel agility to avoid contention with other networks of the same type, or networks of other types operating in the same frequency bands. This standard is designed to support low power communications for devices such as gas and water meters which can make data from such devices available on the mesh network at any time through a proxy capability within a permanently powered device. Details ICS-code 33.200 35.100.10 Engelse titel Communication systems for meters - Wireless mesh networking for meter data exchange - Part 1: Introduction and standardization framework Vervangt Winkelwagen Subtotaal: Ga naar winkelwagen
ESSENTIALAI-STEM
Results 1 to 3 of 3 Thread: kde 4.2 google gadget 1. #1 Default kde 4.2 google gadget I'm on openSUSE 11.1 x86_64 running KDE 4.2 from the Unstable repo (had same issue under x86 also; but had other performance issues leading to a x86_64 install). I add the photos widget from Google and get the widget with a black screen. In my .xsession-errors file I get: kwin: X Error (error: <unknown>[DAMAGE+0], request: XDamageDestroy[DAMAGE+2], resource: 0x181f156) Not a regular file: / Register default_framework extension. Register qtwebkit_browser_element extension, using name "_browser". Register qt_system_framework extension. Register qt_edit_element extension. Register gst_audio_framework extension. Register gst_video_element extension. Register linux_system_framework extension. Register dbus_script_class extension. No permissions to access D-Bus. slide_shower.js:355: add new feed nature - Google Image Search fetchs.js:364: fetch http feed url=http://images.google.com/images?q=nature&imgsz=xxlarge fetchs.js:365: No permission to access network. fetchs.js:365: ReferenceError: Failed to construct native object of class XMLHttpRequest main.js:161: TypeError: kSlideShower is undefined However, if I launch ggl-qt and then add the photos widget it works fine. The same also happens with the rss reader widget (fails when adding via Add Widgets but works fine from ggl-qt. Also, first launching ggl-qt and then adding the widget via Add Widgets does not resolve the issue either. Now, is this by design (I must first launch ggl-qt before any Google gadget can access the network) OR is there a buried setting I need to change? If it's by design, what is the point of having Google gadgets show up in Add Widgets. Any help much appreciated. 2. #2 Default Re: kde 4.2 google gadget Hi, How do you run your Google Gadgets? I also have a similar problem with the widgets. I have always to run it like sudo, otherwise I can't see all the widgets. 3. #3 Default Re: kde 4.2 google gadget I created a symlink to the google gadget app in my KDE4 Autostart directory (ran this in a terminal [only works if KDE4] ln -s /usr/bin/ggl-qt ~/.kde4/Autostart/). Some google gadgets work fine while others seem to fail miserably (the games I've tried so far fail). And since the gadgets also only run on 1 virtual display, they're pretty much useless to me. Posting Permissions • You may not post new threads • You may not post replies • You may not post attachments • You may not edit your posts •  
ESSENTIALAI-STEM
Talk:Health care provider Wikipedia is not a dictionary This article belies the idea that Wikipedia is not a dictionary. No, sometimes it is! laughing out loud, wbm1058 (talk) 17:56, 28 April 2020 (UTC) Blacklisted reference link [// www.verywellhealth.com/what-is-a-provider-1738759 "What Is a Health Care Provider?"] – feel free to run through the bureaucracy to get it whitelisted. – wbm1058 (talk) 22:43, 28 April 2020 (UTC) * This close doesn't sit well with me. – wbm1058 (talk) 19:52, 17 May 2020 (UTC)
WIKI
Astrophysics is a fascinating scientific discipline that explores the mysteries of the universe. Over the years, astrophysicists have made significant contributions towards our understanding of celestial objects and the nature of the universe itself. Today, several new discoveries have been made that have helped us unravel some of the longstanding questions about the universe. One of the most significant advances in astrophysics is the discovery of gravitational waves. These ripples in space-time were first predicted by Albert Einstein’s general theory of relativity over a century ago, but it was only in 2015 that scientists were able to detect them. Since then, numerous detections have been made, allowing astrophysicists to investigate the properties of black holes and other celestial objects in unprecedented detail. Another area of astrophysics that has seen recent progress is the search for exoplanets – planets that orbit stars outside our solar system. In recent years, the number of confirmed exoplanets has exploded, largely due to the use of sophisticated telescope arrays like NASA’s Kepler telescope. These discoveries have helped us better understand the formation and distribution of planets in the universe and provided insights into the potential for extraterrestrial life. In addition to these groundbreaking discoveries, astrophysicists have also been working to solve some of the long-standing mysteries of the universe, such as the nature of dark matter and dark energy. These phenomena, which are thought to make up the majority of the matter in the universe, cannot be observed directly but can be inferred through their effects on celestial objects. Recent advances in technology, such as the development of high-energy particle accelerators and sensitive detectors, have enabled astrophysicists to study these phenomena in more detail than ever before. Astrophysics also involves the study of the Big Bang and the evolution of the universe from its earliest moments. Thanks to advances in cosmology, astrophysicists have been able to construct detailed models of the universe’s evolution, from its origins to its eventual fate. These models have been confirmed by observations of cosmic microwave background radiation, the afterglow of the Big Bang, and have provided us with a comprehensive understanding of the universe’s history. In conclusion, advances in astrophysics have allowed us to better understand the universe and its many mysteries. From the discovery of gravitational waves to the search for exoplanets and the study of dark matter and dark energy, astrophysicists have made significant contributions towards our understanding of the universe. As technology continues to advance, we can only imagine what additional discoveries await us in the future.
ESSENTIALAI-STEM
Specificity of Ca2+-dependent protein interactions mediated by the C2A domains of synaptotagmins. Biochemistry PubMedID: 10715114 Sugita S, Südhof TC. Specificity of Ca2+-dependent protein interactions mediated by the C2A domains of synaptotagmins. Biochemistry. 2000;39(11):2940-9. Synaptotagmins represent a family of neuronal proteins thought to function in membrane traffic. The best characterized synaptotagmin, synaptotagmin I, is essential for fast Ca2+-dependent synaptic vesicle exocytosis, indicating a role in the Ca2+ triggering of membrane fusion. Synaptotagmins contain two C2 domains, the C2A and C2B domains, which bind Ca2+ and may mediate their functions by binding to specific targets. For synaptotagmin I, several putative targets have been identified, including the SNARE proteins syntaxin and SNAP-25. However, it is unclear which of the many binding proteins are physiologically relevant. Furthermore, more than 10 highly homologous synaptotagmins are expressed in brain, but it is unknown if they execute similar binding reactions. To address these questions, we have performed a systematic, unbiased study of proteins which bind to the C2A domains of synaptotagmins I-VII. Although the various C2A domains exhibit similar binding activities for phospholipids and syntaxin, we found that they differ greatly in their protein binding patterns. Surprisingly, none of the previously characterized binding proteins for synaptotagmin I are among the major interacting proteins identified. Instead, several proteins that were not known to interact with synaptotagmin I were bound tightly and stoichiometrically, most prominently the NSF homologue VCP, which is thought to be involved in membrane fusion, and an unknown protein of 40 kDa. Point mutations in the Ca2+ binding loops of the C2A domain revealed that the interactions of these proteins with synaptotagmin I were highly specific. Furthermore, a synaptotagmin I/VCP complex could be immunoprecipitated from brain homogenates in a Ca2+-dependent manner, and GST-VCP fusion proteins efficiently captured synaptotagmin I from brain. However, when we investigated the tissue distribution of VCP, we found that, different from synaptic proteins, VCP was not enriched in brain and exhibited no developmental increase paralleling synaptogenesis. Moreover, binding of VCP, which is an ATPase, to synaptotagmin I was inhibited by both ATP and ADP, indicating that the native, nucleotide-occupied state of VCP does not bind to synaptotagmin. Together our findings suggest that the C2A-domains of different synaptotagmins, despite their homology, exhibit a high degree of specificity in their protein interactions. This is direct evidence for diverse roles of the various synaptotagmins in brain, consistent with their differential subcellular localizations. Furthermore, our results indicate that traditional approaches, such as affinity chromatography and immunoprecipitations, are useful tools to evaluate the overall spectrum of binding activity for a protein but are not sufficient to estimate physiological relevance.
ESSENTIALAI-STEM
Cyfarthfa Cyfarthfa is a community and electoral ward in the west of the town of Merthyr Tydfil in Merthyr Tydfil County Borough, Wales. Community Cyfarthfa mainly consists of the settlements of Gellideg and Heolgerrig and Rhyd-y-car area just west of Merthyr Tydfil town. It is mostly bordered to the east by the A470 trunk road and to the north by the 'Heads of the Valleys' A465. Cyfarthfa Castle is located just to the east in the neighbouring community of Park. Cyfarthfa has strong historical ties to the industrial past of Merthyr Tydfil, the site of Cyfarthfa Ironworks was just to the east, by the River Taff. At the 2001 census, it had a population of 6141, increasing to 6,869 at the 2011 Census. Electoral ward Prior to 1995 Cyfarthfa was an electoral ward to Mid Glamorgan County Council (electing one councillor) and Merthyr Tydfil Borough Council. Subsequent to 1995 Cyfarthfa became an electoral ward to Merthyr Tydfil County Borough Council, electing three councillors. Since 1995 the ward has largely elected Independent councillors standing under a variety of tickets, with the occasional Labour Party councillor. At the May 2017 elections the vote in Cyfarthfa was delayed until 8 June, because of the death of one of the candidates, Ieuan Harris. The result was seats being won by Geraint Thomas (Independent), Paul Brown (Merthyr Independents) and David Chaplin (Labour). The turnout was the highest in the borough, at 64%. Following the May 2012 elections Cyfarthfa was represented by two Merthyr Independents. Councillor Les Elliott resigned only two months later on health grounds, triggering a by-election which took place on 15 November 2012. The by-election was won by Labour's Margaret Davies, who beat the replacement Merthyr Independents candidate by 21 votes. Sitting Independent councillor, Paul Brown, died in February 2019, leading to a by-election being held on 11 April 2019.
WIKI
User:Chickstarr404/Gather lists/15993 – "The Counterfeiters" by Andre Gide Image information: * André Gide.jpg
WIKI
User:Rohan Malik Rohan Rohan Malik Official Born in Karachi on 9 March 1999 Then he come khushab His father is An Army Retired He get early education from Khushab He qualifcation is F.A He is also a web designer
WIKI
Talk:BT Alphabetical versus "common first" I've just reverted an edit where someone pulled three of the items to the top of the list, which is otherwise in alphabetical order. I think it was me who put it in that order in the first place, because I think a list of that length needs some logical order so as not to be a mess. However, I can see that if we can agree what are the most important / most common meanings of the term, it would be useful to pull them out, preferably into a separate list at the top of the page. Something like: "The abbreviation BT is most commonly used to refer to ... It can also mean ... " I'm only reluctant to go ahead and do this, because some of the things I've never heard of on this list are probably the most common uses of it in other contexts/places. So for me, the main contender for special treatment is British Telecom (which is in fact officially "BT"), but clearly somebody else thought Bluetooth and BitTorrent were right up there too - I can't say I'd think of either. And logically B.T. (tabloid) ought to be right up there, because it doesn't appear to be called anything else. And the Canadian editor who added Breakfast Television clearly thought that was a "pretty obvious" expansion... I don't know if I'm making too big a deal of this (it has been known), but it doesn't seem to me as straight-forward to split this into a "common" list and an "others" one as it might at first seem. Anybody have any thoughts? - IMSoP 21:51, 21 July 2005 (UTC) I've been bold and made the change. I've removed a non-notable company with no wiki articel. However I' not sure about the Tabloid, as I don't know what sort of circulation it has. The pedia article is negligable. Rich Farmbrough 16:06, 26 August 2005 (UTC) * I went and reformatted this according to Manual of Style (disambiguation pages). First "B.T. (disambig)", then "BT something", then all the expanded abbreviations in alphabetical order. —Michael Z. 2005-09-10 05:53 Z * All this just goes to show the "most common first" guideline is a nice thought, but very often undecidable in practice. Alphabetical doesn't suffer from that drawback. * Urhixidur 03:21, 2 December 2005 (UTC) * Most common first is rarely obvious, so I rarely use it. The MOS recommends exact matches to the title first (e.g.,"BT"), then matches with disambiguation (e.g., "B.T. (tabloid)"), then matches that are part of the term (e.g., "BT tank"), then non-matching synonyms (e.g., "Bankers Trust"), then finally terms that link to a different article or section (no examples on this page). Within each group, use alphabetical order. * Disambiguation pages should also have just enough information to disambiguate, and avoid unnecessary discussion, and especially avoid non-disambiguating links. For example, since "IATA airline designator" is not a synonym that can be confused for "BT", it must not be linked. —Michael Z. 2005-12-2 07:13 Z * All these arguments have merit, but I'm going with the suggestion on Mos:DP to group the list into categories, because I found this particular list very difficult to scan and some kind of classification might help. If you disagree, I won't be upset if someone reverts. -- Slowmover 20:33, 16 June 2006 (UTC) * I also agree that British Telecom is the appropriate headliner, since it is known worldwide. -- Slowmover 20:35, 16 June 2006 (UTC) On reflection, I'm going to sit on this a while before categorizing. I deleted some entries where "BT" is not mentioned in the linked article. Apparently "BT" is not something you type when you're looking for "bull terrier", "big time" or "binary tree", which makes perfect sense. And nobody is going to type BT if they're looking for Belfast, but they might be looking for the meaning of the post code, so it should probably link to Northern Ireland. I'll wait a while before doing any more. Slowmover 21:25, 16 June 2006 (UTC) * Have deleted a few that were not obvious (to me anyway) and created another sub header (places). AIR corn (talk) 02:37, 20 October 2010 (UTC) Could someone please find a way to bump Brian Transeau ( BT ) higher up this list? Mr. Transeau is a well known musical composer, electronic music artist, software seller and soundtrack artist. Not to mention the only artist known simply as BT. <IP_ADDRESS> (talk) 04:15, 8 August 2015 (UTC)
WIKI