Document
stringlengths
87
1.67M
Source
stringclasses
5 values
CONGENITAL TOXOPLASMOSIS: AN OVERVIEW ON TRANSMISSION, DIAGNOSIS AND TREATMENT WITH REFERENCE TO EGYPT Authors Department of Medical Parasitology, Faculty of Medicine, Cairo University Abstract Congenital toxoplasmosis is a zoonotic protozoan infection caused by the intracellular coccidian (phylum Apicomplexa) Toxoplasma gondii (T. gondii), which has a worldwide distribution. All warm-blooded animals are susceptible to infection and about 30% of the world’s population is affected. The organism is transmitted transplacentally; following initial maternal infection, vertical transmission occurs from an infected pregnant mother to her fetus, mostly in the third trimester of pregnancy. The severity of fetal infection is determined by the pregnancy stage and whether the infected mother had received an efficient treatment in the early gestational period or not. A better prognosis is expected for children whose mothers were treated with anti-Toxoplasma medications. Some factors favor infection transmission and progress of congenital toxoplasmosis as the parasite genotype, the immune status of the mother and the fetal or neonatal ability to develop an immune response against Toxoplasma. Possible outcomes of fetal infection include abortion, intrauterine growth retardation, jaundice, hepatosplenomegaly or intrauterine fetal death. Nervous system complications like intracranial calcifications or hydrocephalus as well as retinochoroiditis are all possible consequences. Commonly, there are no specific symptoms at birth and complications may appear at an older age. Congenital toxoplasmosis is treated by spiramycin in pregnant women, while, drugs were used during late gestation to benefit infected fetus and are also used to treat the newborn after birth. Keywords
ESSENTIALAI-STEM
Theories of family history can be written down in many different forms. These forms can be oral or written and they are often derived from archaeology. Archaeology is the study of ancient sites that have been discovered. They give us information about the ancient people and their lives and what their impact was on the world around them. Theories of family can be written down based on what we know about how they lived. There has to be a story that explains how the people in a family lived before hand, how they died and how their stories fit in with our current understanding of events that happened around them in the past. Theories of family history can also be written down as many people like to think that death really is inevitable. In fact, many deaths are recorded but some do not make it into the historical record because there were no written records. This is not true in many cases. Theories of family can be written down about people who lived long ago because the oral stories of many long ago people can still be heard today. Many of the oral traditions of the family can be found in museums or public libraries. They can also be found on different websites on the Internet. Oral traditions are often passed down from one generation to another. This means that the more distant back of history that we look at, the more that our ancestors’ oral stories about their lives can give us information about the lives of their forefathers. This is important because it gives us insight into the lives of those in the past and the way that families operated. In addition to the oral traditions, there can be writings in the form of paintings or inscriptions. The writings in the form of tablets, papyri and other works can provide many theories of family. These writings were used by many ancient civilizations and they can give us ideas about what life was like for different families in the past. When the stories in these tablets or papyri are analyzed carefully, they often reflect the life of different people from different regions. They can tell us who were influential and how other people lived during a certain time period. When you hear about people travelling back in time, it can sometimes help you understand more about your ancestors. This can be done in a number of ways. You can listen to oral stories, read about the oral stories of family members or search for written stories online. Many people will record their stories to share with future generations. The best way to understand the theories of family is to look back through the ages. This can help you trace the stories of ancestors back through time. You can look into how they travelled around the world and how they lived. You can look into the written records and discover what happened to them. You can see where people travelled and who influenced them throughout the ages. These are all important parts of family history.
FINEWEB-EDU
Page:The Necromancer, or, The Tale of the Black Forest Vol. 2.djvu/205 "That is nothing to thee," so saying I wanted to pursue my way." "Fairly and softly, my dear boy, why in such a hurry? What weighty business is it which makes thee run so fast?" "I mused a moment, and cannot conceive what prompted me to reply in a slow accent, "life is short and hell everlasting." "He stared at me with a ghastly look, "I will be damned," he resumed at length, if thou hast not stumbled against a gallows on thy way." "It may come to that one time, farewell, comrade." "Stay a moment longer," he exclaimed, "taking a tin bottle from his hunting pouch and offering it to me after he had swallowed a large draught: The hurry of my fright
WIKI
ASE TECHNOLOGY HOLDING CO., LTD. Files 2021 Annual Report On Form 20-F ASE Technology Holding Co., Ltd. (NYSE: ASX, TAIEX: 3711, "ASEH" or the "Company"), announces that it has filed its annual report on Form 20-F for the year ended December 31, 2021 with the U.S. Securities and Exchange Commission. The 2021 20-F is available on ASEH's website at www.aseglobal.com and on the website of the U.S. Securities and Exchange Commission at www.sec.gov. Hard copies of the audited financial statements included in the 2021 Form 20-F are available to shareholders upon request
NEWS-MULTISOURCE
Inventors list Assignees list Classification tree browser Top 100 Inventors Top 100 Assignees Thomas M. Rezachek, Cottage Grove US Thomas M. Rezachek, Cottage Grove, MN US Patent application numberDescriptionPublished 20080282765Self-calibrating sensor - Embodiments of the present invention relate to a gas sensor comprising a flow channel, a concentration modulator positioned in the flow channel, a gas generator in contact with the flow channel, one or more gas detectors positioned downstream of the concentration modulator and gas generator and a pump.11-20-2008 20090011292Electrical power generator - An improved system for generating electrical power using a fuel cell. More particularly, a system for generating hydrogen gas by reacting water vapor with a substantially non-fluid substance and transporting the generated hydrogen gas to the fuel cell which generates electrical power. Reacting water vapor with the non-fluid hydrogen generating substance rather than liquid water prevents caking of the non-fluid substance and deposition of byproducts onto the non-fluid substance that interfere with continued generation of hydrogen gas. Also, a non-electrically actuated valve for use in a hydrogen gas generating apparatus which regulates the generation of hydrogen as required by the fuel cell.01-08-2009 20090266144PHOTOACOUSTIC SENSOR - Various embodiments of the application provide a photoacoustic sensor, which includes: a gas cell having an opening; a light source to generate a radiation to radiate sample gas within the gas cell; a detector to detect the sample gas within the gas cell, and to generate electrical signals in response to acoustic signals generated by pressure fluctuations of the radiated sample gas caused by the radiation; and an active valve having a speaker aligned with the opening of the gas cell. The speaker having a voice coil and a diaphragm attached to the voice coil. A control signal is applicable for the speaker to control access of the gas cell. During sampling, the control signal causes the voice coil of the speaker to repeatedly or constantly lift the diaphragm from contact with the opening of the gas cell to allow sample gas enter the gas cell. While during detecting, the spring force of the voice coil causes the diaphragm in tight contact with the opening of gas cell to seal the gas cell.10-29-2009 20120272716Photoacoustic Sensor Diffusion Membrane Attachment Structure - A photoacoustic detector includes a sensing region for receiving atmospheric samples of a gas. A permeable membrane overlays a gas input port of the sensing region. The membrane is mechanically clamped to the sensing region by a compression force.11-01-2012 20120272717Photoacoustic Detector with Background Signal Correction - A photoacoustic detector includes a sensing region for receiving atmospheric samples. Radiant energy from a source is directed toward the sensing region. A thermal isolator and a displaced optical filter are positioned between the incoming radiant energy and the sensing region so that the radiant energy passes, at least in part, through both elements.11-01-2012 20120272718Photoacoustic Sensor with Baseline and Span Correction - A photoacoustic detector wherein a detector response transfer function can be measured at various times under predetermined conditions during the life of the detector. One or more of the time related transfer functions each can, when acquired, be compared to the stored initial transfer function established at initial manufacture and calibration of the detector. Span and baseline correction values can be determined. These values can be used to compensate detected output values during normal operation. Time related transfer functions can be compared to each other as well as to the stored initial transfer function.11-01-2012 20120272719PHOTOACOUSTIC SENSOR WITH ADAPTIVE OPERATING FREQUENCY - Some embodiments relate to a photoacoustic sensor that includes a gas cell having an opening and a detector to collect pressure fluctuations within the gas cell to determine a spectral content of the pressure fluctuations within the ambient environment. The photoacoustic sensor further includes a light source to generate radiation to radiate sample gas within the gas cell and a control that receives signals from the detector that represent the spectral content of the pressure fluctuations within the ambient environment. The control adjusts a frequency of the radiation produced by the light source to a frequency that conflicts less with the spectral content of the pressure fluctuations within the ambient environment. The detector generates output electrical signals in response to acoustic signals generated by pressure fluctuations of the radiated sample gas.11-01-2012 20120279279Photoacoustic Detector with Long Term Drift Compensation - A photoacoustic detector wherein control circuits compensate for long term variations of components therein including a light source and sensing microphones. The control circuits intermittently energize the source to evaluate changes in at least source resistance. The control circuits intermittently energize an acoustic generator to evaluate changes in one or more generator responsive microphones.11-08-2012 20120279280Apparatus and Method of Photoacoustic Sensor Signal Acquisition - A photoacoustic detector includes first and second microphones carried by an acoustic sensing chamber. Signals from the microphones are processed using lock-in detection to increase the signal-to-noise ratio. An acoustic pressure generator can be incorporated to calibrate the microphones.11-08-2012 Patent applications by Thomas M. Rezachek, Cottage Grove, MN US
ESSENTIALAI-STEM
Talk:Commodore 64/Archive 1 From stubs to articles There are several stubbish pages on the Commodore & accessories. Computers: Commodore 64, Commodore 128. Disk drives for the above: Commodore 1540, Commodore 1570, Commodore 1571. Do they stand any chance of getting longer? Would a merge into a single article on the devlopment of the Commodore home computer be better? -- Tarquin * By now I think the C64 article is OK in length (ditto for the PET, VIC-20 &c), and I (or someone else maybe) will certainly see to it that the C128 article is expanded with more info, including coverage of the C128D (or linking to a separate article on the latter). The same goes for the peripheral unit articles, more will surely come. Due to this I think a merge as such is unneccessary, but perhaps a combined 'timeline'-article with links to the specific computers could clarify things for Wikipedia-users unfamiliar with Commodore. -- Wernher 11:35, 22 Sep 2003 (UTC) * I agree. The articles are significant enough to stand on there own and don't need to be merged. -- Popsracer 11:38, 22 Sep 2003 (UTC) * (This belongs on Talk:Commodore International, but the thread is here, so...) Recently I threw in a few more disk drive model stubs, but with the first hints of technical info for each, although amusingly I botched the hard drive models -- they were 9060/9090 but I originally entered 9260/9290. I also added some model name redirects, and a few tightly knit family models are currently merged but could be split later. (4040 includes 2031/2031LP; 8050 includes 8250 and SFD-1001.) However, as of this writing there's now a CBM storage devices category, so perhaps the growing exhaustive list of models in various articles should be replaced by a link to the category? -- Todd Vierling 03:47, 17 Jun 2005 (UTC) What kind of dollars? Which currency are these $ dollar values given in: US,Canadian,Australian,etc? --SD6-Agent 21:33, 25 Oct 2003 (UTC) * Has since been fixed, I notice (still -- not much of a chance that the prices were given in AUD, though, but I see your (rhetorical) point, of course :-). --Wernher 22:26, 1 Aug 2004 (UTC) Swollen tech spec secs I'm not so sure whether the current very long/detailed tech spec section is the best way of describing the 64's greatness, as long as the VIC-II and SID is thoroughly treated in their own articles. If nobody protests, I shall therefore trim down those subsections in the present article (perhaps down to their previous contents), which should be more than enough. The VIC-II and SID articles were written for a purpose (and to make it clear, lest we get any misunderstandings: I do think the 64's video & audio specs are historically important, but I think the article gets too bloated the way it is now -- in my view, trimming it down to display the most essential parts of the specs would be much better for the readers, and it would no doubt pull the more interested ones into the VIC-II and SID articles anyway). --Wernher 22:26, 1 Aug 2004 (UTC) * I guess it could be cut down a bit, but what should be deleted? Specifications are usually long, and sometimes it's nice to have a summary in one place, without have to wade through another article. Just a thought... Pixel8 00:19, 3 Aug 2004 (UTC) * I kind of both agree and disagree... Oh well. Still, summary is an instrumental word here; I would like the summary specs of the VIC-II & SID to be just that, with the full monty to be had at the respective articles. Perhaps I'll trim the stuff down a little bit (will of course leave in the most important spec items of the two very, if not outright most important, chips of the beloved '64. I just want to keep the article nice and consise. BTW, cool (and most befitting) username. :-) --Wernher 19:08, 3 Aug 2004 (UTC) * I trimmed the VIC-II and SID specs down today, following my argument above. I think the remaining items in a nice, concise way relates the most significant features of those chips, with a lot more details to be found in their respective articles. I still do more or less insist that that's the way it's meant to be, in the grand scheme of things (life, the universe, and everything, y'know...). :-) --Wernher 22:41, 8 Aug 2004 (UTC) The Final Cartridge III Hey everyone, I added a new article about the The Final Cartridge III, which I'm sure many of you remember ;) * Great! In time, we should get articles about most of the very common carts for the '64, of which the FCIII is a prominent example (of course, I myself think that the Action Replay series of carts were the kings of '64 utility cartdom). :-) --Wernher 11:31, 17 Aug 2004 (UTC) * There was also the Super Snapshot (up to v5) Cartridge that had a button on it to freeze the state of the computer and you could do all sorts of things like ulimited lives and change sprites or even the memory as well as loading programs super fast by simply pushing the commodore+runstop keys. The designers were Ron Smith and Marcel LeBlanc. Cleo Nov 17, 2005 'CBM 64' vs 'CBM64' and 'Commodore 64' vs 'Commodore C64' I just reverted a change from 'CBM 64' to 'CBM64' in the intro para. IIRC, the former was more common than the latter, but a Google search doesn't indicate much difference in usage between the two (5780 vs 3420 hits). Comments, anyone? --Wernher 17:21, 21 Jan 2005 (UTC) * Familiar to this, it should be mentioned, that the full name is 'Commodore C64' and not 'Commodore 64'. At least, this is what I am aware of. The VIC20 was also not 'Commodore 20'. I remember even VC64 as model-name. Anyone with more info on this ? I come here from the Amiga page, where I have changed 'Commodore 64' to 'Commodore C64' and now I want to keep consistancy within the Encyclopedia. I owned a C64 and believe its model name was VC64, however, C64 is the common model name and its manufacturer behind is Commodore. I owned a model for the German market. --Anonymous * I have indeed got some more info on this, and it's as follows: The full name of the machine is 'Commodore 64', period. This is not really disputed. AFAIK, all CBM documentation uses 'Commodore 64' consistently throughout; never once have I seen the form 'Commodore C64' in any official documentation. I can't even remember to have seen it in any third-party docs that I have -- and I have quite a lot (too much to be 'normal' for one person, anyway...). Finally, while not exactly judicially authoritative, consider that a Google search for "Commodore 64" returns roughly 1,500,000 hits, compared with about 64,700 for "Commodore C64". --Wernher 02:04, 7 Feb 2005 (UTC) * This computer was very popular in Sweden but for some reason many people and even stores and magazines referred to it as VIC-64 (both with and without hyphen) in Sweden (possibly in other countries too?), maybe this should be mentioned somewhere in the article? --<IP_ADDRESS> * Now that's very interesting (and completely new info to me, for one). That said, such a name would be quite logical for a machine that succeeded the VIC-20---but perhaps CBM marketing came to the conclusion that sales of the much more feature-rich, 'new generation' C64 wouldn't be helped by having too close a connection to the VIC-20? * The VIC-64 name should be mentioned, I guess. Do you have any docs on this? --Wernher 18:37, 4 September 2005 (UTC) * I have no "official" docs but if you type in VIC-64 in Google you'll get some 1800+ hits, mostly various personal sites and auctions in Swedish. I did however find this thread in a Google newsgroup with more info about this (post number 7 being particularly interesting). --<IP_ADDRESS> * I remember seeing it written as C=64 (with the C= representing the Commodore logo). In fact, this is how it used to be typed in many BBSs, magazine articles and program sources. But the poster is right, I've never seen it used officially as C64 but 'Commodore 64'. Keep in mind that a Google search will return common and colloquial uses, not necessarily authoritative ones. DZ-Jay 16:20, 8 October 2005 (UTC) * People on a keyboard used C=64 because it was a sort of disambiguation, I think, clearly more than C64 (which sounds vaugely like short hand for "Capacitor 64" or some part), and more than C-64 (which "newbies" sometimes used).Terryeo 02:15, 20 May 2006 (UTC) * Also bear in mind that C64 is ambigious -- it happens to be the name of another fairly important computer &rarr;Raul654 16:38, 8 October 2005 (UTC) Simons' BASIC: apostrophe antics Just to make this clear once and for all: Simons' BASIC was written by David Simons (note that his name ends with an "s"), and so the apostrophe goes after the name&mdash;not before the "s". --Wernher 21:10, 7 Mar 2005 (UTC) Why BASIC 2.0? Actually the reason for putting BASIC 2.0 rather than 4.0 in the C-64 wasn't to reduce cost. Commodore had an arrangement that allowed them to use whatever implementation of Microsoft BASIC they wanted. The reason for putting it in really was to keep the C-64 from being too attractive of a competitor to the PET/CBM line. Of course, that move backfired. --Dave Farquhar 03:04, 21 May 2005 (UTC) * I don't think so. According to the "Design case history" article (see References), which directly quotes the designers, it was because it would have required more ROM (= more cost). The 64 has the same amount of ROM, 20K, as the VIC-20. Mirror Vax 17:29, 21 May 2005 (UTC) LOAD":*",8,1 vs. LOAD "*",8,1 LOAD "*" does not quite mean "load the first program on the disk". It actually means "load the last program accessed, or if none, the first program". LOAD ":*" loads the first program. Mirror Vax 16:18, 12 Apr 2005 (UTC) * OK, since this keeps coming up, how about if I explain the controversy, and then we can see what we have to do to clean it up? * LOAD"*",8,1 loads the last program accessed on the disk. If no last program has been accessed, it loads the first program on the disk. Since this command was usually issued when the computer was first turned on, it effectively loads the first program. The documentation with a lot of (if not most) commercial software specified LOAD"*",8,1. Even though it's not technically correct, the way most 64 owners used their machines, it worked. * LOAD"0:*",8,1 is the correct syntax for loading the first program on the disk. This is a holdover from the PET and its dual-drive floppies, such as the 4040. Drive 0 was the default drive in Commodore DOS, so it could usually be abbreviated LOAD":*",8,1 especially since the 1541 only has one drive in the unit. * Unfortunately I think it would detract from the article to put this whole explanation right where the example of LOAD"*",8,1 shows up. * I have one idea. We could say LOAD"0:*",8,1 (often abbreviated LOAD":*" or LOAD"*" which, when the machine is first turned on, all effectively mean the same thing)... Anyone else have any other ideas? --Dave Farquhar 12:42, 6 Jun 2005 (UTC) * LOAD anything,8 or LOAD anything,8,1 cannot be abbreviated to LOAD anything, because if no device number is supplied, the Commodore 64 defaults to device number 1, which is the cassette tape drive. &mdash; J I P | Talk 18:26, 26 December 2005 (UTC) * That was the bummer, soon as you used a 5 1/4 floppy you had to type the whole command instead of just LOAD . You had to specify "1" which meant typing the whole command and it was in ROM so you couldn't change the default device.Terryeo 02:08, 20 May 2006 (UTC) C64 Hardware Section I had hoped to add this to the hardware section, but as the article is already over the preferred 30KB limit (as of 2005/06/16) I have refrained from adding it. Is it worth adding? Probably needs trimming too. Comments please, thx. Pixel8 12:53, Jun 16, 2005 (UTC) * Looks okay to me. Add it. Mirror Vax 14:25, 16 Jun 2005 (UTC) * Looks good to me too. It's longish, sure, but it's good information. Just one minor correction: I know some models of U.S. C-64s did use the cardboard/foil shield. I have an idea for shortening the article: What about putting the 64C information in a separate article? Dave Farquhar 17:30, 16 Jun 2005 (UTC) * Thanks for the comments. About the cardboard shield, was it C64s or early pre-1987 C64Cs? I know that all HMOS based C64Cs NTSC or PAL had cardboard, because they don't require a heatsink. I had just assumed that all US C64s (using a "classic" board) would have a proper metal shield, because of stricter RF (FCC) guidelines. I don't think there would be enough information to warrant a separate C64C article, it would be a stub at best. I could however move the VIC-II and SID information to their respective articles, but I would rather keep it here, to show how the hardware developed over the years. What I wrote above is the most compact version I could come up with, without sacrificing details. So I'm wondering what (if anything) should I cut? Pixel8 22:33, Jun 16, 2005 (UTC) * This is a little shorter and I think retains virtually all of the important information. * Probably the ideal is somewhere between your version and mine, but yes, it's usually possible to trim without deleting information. Maybe now would be a good time to take a stab at doing the same type of edit to the entire article? Dave Farquhar 03:34, 17 Jun 2005 (UTC) * After looking at some other articles, (featured ones at that) which are way over 30K, I might as well just add it as is. Pixel8 12:13, Jun 18, 2005 (UTC) Wow! Guys and girls, I've just got to say that I don't often come across articles as well-written, informative and as interesting as this one! Once my tiny little FAC objection is sorted out, I'll give an Enthusiastic Support! - Ta bu shi da yu 09:46, 18 Jun 2005 (UTC) * I second the WOW! The C64 was the first computer I ever owned after using only TR(a)S(h)-80s in school. I was truly unimpressed by them the first time I saw one. They had plastic, instead of metal, cases and NO built-in monitors. 7 years later I finally got around to trading in my faithful ol 64 for an Amiga (another powerful, affordable breed near and dear to my nerd heart). Good section about the drives too. The first 1541s were so terrible they had to be recalled, the first time I know of a defective peripheral got recalled. The one I had was a noisy beast, whose heads would go out of alignment everytime my cat farted. But it did get hot enough to keep my coffee warm in the winters. Plus I discovered those rocking Epyx carts. Thanks for a fine article and the tech-nostalgia trip! Now where'd I put that old "Adore my 64!" button...--R.D.H. (Ghost In The Machine) 09:16, 6 October 2005 (UTC) Oh almost forgot Enthusiastic Support. "sys64738" ;)--R.D.H. (Ghost In The Machine) 09:18, 6 October 2005 (UTC) * Heh, I typed that sys command more than once. Terryeo 02:01, 20 May 2006 (UTC) Image Head image looks awful on a 800x600 screen res. It should really be a thumbnail with an appropriate caption. - <IP_ADDRESS> 05:49, 2 October 2005 (UTC) Capitalized or lowercase words immediately after initial numbers on a line? Does anyone know of a WKP std/policy on this? For example, which of the following is correct: * A nice children's song * Capitalized * 3 Little pigs * Lowercase * 3 little pigs We should be able to agree on how to do this. Any comments? --Wernher 21:50, 4 October 2005 (UTC) * Oh no! Not another capitalisation style issue! - Ta bu shi da yu 04:36, 6 October 2005 (UTC) * The correct answer: "Three Little Pigs" ;-) --feline1 11:42, 6 October 2005 (UTC)
WIKI
Science Unmet Medical Need: Vein Graft Failure It has been shown (PREVENT III and PREVENT IV) that Vein Graft failure (VGF) occurs in 39% and 46% of patients 12-18 months post procedure (peripheral bypass and CABG, respectively), with the VA Cooperative Study demonstrating a 39% graft failure rate at 10 years (CABG). VGF often leads to significant morbidity, which can include recurrent symptoms, myocardial infarction, limb loss and/or death. Health economic consequences, including need for expensive re-do procedures, and limb loss present a significant cost burden for health care systems. The leading cause of VGF, intimal hyperplasia, is at least partly due to vein graft injury caused by the surgical harvest/graft preparation procedure prior to implantation in the recipient site. Graft preparation typically uses a combination of vessel dilation, the use of toxic skin markers and acidic preservation solutions, resulting in endothelial and smooth muscle damage, functional vessel death and ultimately intimal hyperplasia. VasoPrep Surgical’s technology portfolio aims to address harvest- and preparation-associated injury and includes: • Proprietary, non-toxic surgical marker and ink technology to preserve endothelial function • Pressure release technology to limit vessel distention and stretch injury • Convenience items that aim to standardize and facilitate vein preparation procedures This technology has been proven in scientific preclinical (or non-clinical) studies at Vanderbilt University using human saphenous vein, porcine saphenous vein and rabbit vein graft models.   For more information, see PUBLICATIONS page.
ESSENTIALAI-STEM
Page:Fashions for Men And The Swan Two Plays (NY 1922).pdf/307 —Cæsar! You will go downstairs and ask Dr. Agi if he will be good enough to come up at once and wait in this room. Her highness, the Princess Dominica wishes to speak to him. —Very good, your highness. —What are you serving her highness for breakfast? —Tea, cold salmon, cold beef, cold chicken cold —Cæsar! Why, that is last night's supper —I beg pardon, your highness. It is this morning's breakfast. I had it put on the table at one this morning, and no one has eaten a bite of it yet. —Have you lost your senses, Cæsar? —Quite likely, your highness Another breakfast will be served. —Why are you so pale? —I didn't sleep well, your highness. I suffered agonies. Mostly on account of the tea. —On account of what tea? —On account of the terrible mistake. Father Hyacinth was served the hot tea and your highness got the cold consommé. —I am glad I did. I would have fainted away in that horrible moment if I hadn't had that sip of ice-cold soup. It revived me.
WIKI
Chess Federation of Russia The Chess Federation of Russia (Федерация шахмат России), known until 2018 as the Russian Chess Federation, (Российская Шахматная Федерация) is the governing body for chess in Russia, and the officially recognized arm of the FIDE in Russia. It was founded on 15 February 1992, following the dissolution of the USSR Chess Federation. Its headquarters are in Moscow. The president is Andrey Filatov, who was elected in 2014. The structure of the Russian Chess Federation consists of three governing bodies: the Congress, the supervisory board, and the board of management. On 25 September 2014, a chess museum opened in the Russian Chess Federation's mansion. In the 2021 World Chess Championship match between Magnus Carlsen and Ian Nepomniachtchi, Nepomniachtchi competed under the Chess Federation of Russia flag. Nepomniachtchi is Russian, but the Court of Arbitration for Sport upheld a ban on Russia competing at World Championships, and it is implemented by WADA in response to the state-sponsored doping program of Russian athletes. In 23 February 2023, with the approval from FIDE, Chess Federation of Russia has switched its regional affiliation from European Chess Union to Asian Chess Federation.
WIKI
1. Jerry-O's Avatar I an trying to link my new N1 to my exchange account and am getting the following error: This Exchange ActiveSync server requires security features your phone does not support. I am the exchange administrator on this server and know OMA is working and configured properly. It is a backend server and I have set up a second virtual directory entry for the exchange server and disabled form based authentication. I have also verified that my mobile device settings are set to Enable unsupported devices. I am still in my 14 day return period and need to make a decision so if you have any recommendations or insight I am all ears and touchdown or 3rd party apps are not an option. 02-11-2010 12:22 PM 2. imtravis's Avatar Do you require a PIN or something to enable AS on the account? 02-11-2010 10:17 PM 3. Cory Streater's Avatar I an trying to link my new N1 to my exchange account and am getting the following error: This Exchange ActiveSync server requires security features your phone does not support. Download & install NitroDesk Touchdown from the Market. Configure it to use ActiveSync to talk to Exchange. 02-11-2010 10:37 PM 4. Jerry-O's Avatar Found my problem... The security between the new echange virtual directory I created was not talking to the regular exchange directory properly (security thing). It seems to be working OK now. I hate only having a back end exchange server. 02-12-2010 09:57 AM LINK TO POST COPIED TO CLIPBOARD
ESSENTIALAI-STEM
User:Eric Winesett/hunter The Hunter Museum of American Art is an art museum in Chattanooga, Tennessee. The museum's collections include works representing the Hudson River School, 19th century genre painting, American Impressionism, the Ashcan School, early modernism, regionalism, and post World War II modern and contemporary art. The museum is situated on an 80-foot bluff overlooking the Tennessee River and downtown Chattanooga. The building itself represents three distinct architectural stages: the original 1904 classical revival mansion which has housed the museum since its opening in 1952, a brutalist addition built in 1975, and a 2005 addition which now serves as the entrance to the museum. With the 2005 expansion the Hunter extended toward downtown, and the recently completed walking bridge over Riverside Drive provides a pedestrian-friendly connection to the nearby Walnut Street Bridge.
WIKI
Page:The World as Will and Idea - Schopenhauer, tr. Haldane and Kemp - Volume 2.djvu/368 358 yet no state of happiness; it is only the patient endurance of sufferings which one has foreseen as irremediable. Yet magnanimity and worth consist in this, that one should bear silently and patiently what is irremediable, in melancholy peace, remaining always the same, while others pass from rejoicing to despair and from despair to rejoicing. Accordingly one may also conceive of Stoicism as a spiritual hygiene, in accordance with which, just as one hardens the body against the influences of wind and weather, against fatigue and exertion, one has also to harden one's mind against misfortune, danger, loss, injustice, malice, perfidy, arrogance, and the folly of men. I remark further, that the καθγκοντα of the Stoics, which Cicero translates officia, signify as nearly as possible Obliegenheiten, or that which it befits the occasion to do; English, incumbencies; Italian, quel che tocca a me di fare, o di lasciare, thus what it behoves a reasonable man to do. Cf. ''Diog. Laert.'', vii. i. 109. Finally, the pantheism of the Stoics, though absolutely inconsistent with many an exhortation of Arrian, is most distinctly expressed by Seneca: "Quid est Deus? Mens universi. Quid est Deus? Quod vides totum, et quod non vides totum. Sic demum magnitudo sua illi redditur, qua nihil majus excogitari potest: si solus est omnia, opus suum et extra et intra tenet." (Quæst. Natur. 1, præfatio 12.)
WIKI
Thursday, June 30, 2016 How Mammals Adapt to the Sea Though mammals adapted on land, a new study by Maria Chikina and Nathan Clark has shown that during three major independent evolutionary events, a number of mammals harkened back to the sea. For the manatee, walrus, dolphin, and killer whale, the return to the sea involved many evolutionary trade-offs amongst hundreds of genes: a general loss of the number of sensory genes for smell and taste, new functions for genes forming skin and connective tissue, and genes involved in muscle structure and metabolism. In a massive undertaking, they used 59 placental mammal genomes to calculate the relative rates of evolution for all branches in 18,049 gene trees. To hone in identifying key genes, they used a new approach: rather than catalog single genetic mutations from genome-wide studies, or look for candidate genes in key pathways, or catalog single amino acid changes at the protein level, they calculated a genome-wide average rate of evolution across all species. Then, they determined whether sea mammals had put the evolutionary gas pedal or brake on compared to the average rate. In the next step, they employed these relative rates to identify those genes that may have independently shifted to higher (or lower) rates for five marine species - bottlenose dolphin, orca, walrus, Weddell seal, and West Indian manatee. "By exploiting the diversity within mammals, we stand to learn much about our own genetics and physiology," said Clark. "Our new approach is poised to reveal the evolutionary adaptations for countless other environments, from the sea, high altitudes, the desert, or even underground." They identified hundreds of genes that revealed three main evolutionary themes - a burst of adaptation, followed by relaxation, and additional constraint -in response to the marine environment. No comments:
ESSENTIALAI-STEM
Page:History of Greece Vol XI.djvu/244 218 HISTORY OF GREECE. ivith triremes ? Will you not start up at once, hasten down to Peineus, and haul the triremes down to the water ?" This ani mated apostrophe, reported and doubtless heard by Demosthenea himself, was cordially responded to by the people. The force of Athens, military as well as naval, was equipped with an eagerness, and sent forth with a celerity, seldom paralleled. Such was the general enthusiasm, that the costly office of trierarchy was for the first time undertaken by volunteers, instead of awaiting the moro tardy process of singling out those rich men whose turn it was to serve, with the chance of still farther delay from the legal process called Antidosis or Exchange of property, 1 instituted by any one of the persons so chosen who might think himself hardly used by the requisition. Demosthenes himself was among the volunteer trierarchs ; he and a person named Philinus being co-trierarchs of the same ship. We are told that in three or in five days the Athenian fleet and army, under the command of Timotheus, 2 were landed in full force on Eubcea ; and that in the course of thirty days the Thebans were so completely worsted, as to be forced to 1 Sec, in illustration of these delays, Demosthenes, Philippic i. p. 50 6.42. Any citizen who thought that he had hccn called upon out of his fair turn to serve a trierarchy or other expensive duty, and that another citizen had been unduly spared, might tender to this latter an exchange of properties, offering to undertake the duty if the other's property were made over to him. The person, to whom tender was made, was compelled to do one of three things; either, 1. to show, at legal process, that it was not his turn, and that he was not liable ; 2. or to relieve the citizen tendering from the trierarchy just imposed upon him ; 3 or to accept the exchange, receiving the other's property, and making over his own property in return ; in which case the citizen tendering undertook the trierarchy. This obligatory exchange of properties, with the legal process attached to it, was called Antidosis. thenes, but may be inferred from Plutarch, De Gloria Athen. p. 350 F. ev u T(^6t?tof Evfloiav rifovtiepov, which, in the case of a military man like Timotheus, can hardly allude merely to the speech which he made in the assembly. Diokles is mentioned by Demosthenes as having concluded the convention with the Thebans ; but this does not necessarily implj that he was commander : see Demosth. cont. Meidiam, p. 570 s. 219. About Philinus as colleague of Demosthenes in the trierarchy, sec D* mcsthcn. cont. Meidiam, p. 566. s. 504. * That Timotheus was commander, is not distinctly stated by Demos-
WIKI
Wikipedia:Articles for deletion/Archduchess Dorothea of Austria The result was delete. Malcolmxl5 (talk) 02:26, 3 August 2020 (UTC) Archduchess Dorothea of Austria * – ( View AfD View log Stats ) After removing deprecated sources and the full names and birthdates of her various non-notable descendants (and their spouses, and their spouses' parents), it is clear this person has zero notability outside of being born to people who held royal titles (she herself did not legally have a title, having been born after the republic was established). Nothing on her page indicates she is known for doing anything reported by RS. JoelleJay (talk) 00:41, 27 July 2020 (UTC) * Note: This discussion has been included in the list of Women-related deletion discussions. JoelleJay (talk) 00:41, 27 July 2020 (UTC) * Note: This discussion has been included in the list of History-related deletion discussions. JoelleJay (talk) 00:41, 27 July 2020 (UTC) * Note: This discussion has been included in the list of Austria-related deletion discussions. JoelleJay (talk) 00:41, 27 July 2020 (UTC) * Keep. Wikipedia needs more biographies of prominent women, be they aristocrats or commoners. Xxanthippe (talk) 08:32, 27 July 2020 (UTC). * Delete per nom.No sources indicate that this person was in any way prominent.Smeat75 (talk) 12:12, 27 July 2020 (UTC) * Delete, this person has received no coverage whatsoever, she fails WP:GNG and the article in its current state fails WP:NOTGENEALOGY. Surely there are women more deserving of a page than someone whose only claim to significance is being born into a formerly significant family. Devonian Wombat (talk) 14:25, 27 July 2020 (UTC) * Delete the article has zero sources. Wikipedia does not exist to right great wrongs, we do not keep articles based on some unproven need, and we do not keep articles just to balance things. We keep articles following real sourcing.John Pack Lambert (talk) 20:38, 27 July 2020 (UTC) * Redirect to either her husband or her father, both of whom have articles. No independent notability, but a member of those two families. Pam D 08:33, 28 July 2020 (UTC) * Delete as unsourced and with no sign of independent notability. --Lockley (talk) 19:24, 30 July 2020 (UTC)
WIKI
7 Common Causes of Diarrhea in the Morning You may be experiencing the rapid bowel movement every morning and the urgent need to pass feces in the morning hours. Maybe, the same thing is even disrupting your sleep in the morning hours. However, when you visit the toilet to pass the feces, the discharge is watery. You need not to worry because this condition is affecting many people. While this condition is not an indicator of a particular condition, it may be associated with a number of gastrointestinal conditions. Some of the conditions include the inflammatory bowel disease (IBD) and the irritable bowel syndrome (IBS). What Causes Diarrhea Every Morning? 1. Irritable Bowel Syndrome (IBS) Being one of the most common causes of morning diarrhea, IBS is the first condition that the doctor will diagnose for if you complain of diarrhea. The condition occurs when the intestines fail to contract as they are supposed to and is mainly caused by dietary problems. IBS may also be caused by allergic reactions to certain goods. As such, a simple change in your eating habits, such as eating healthier or having your evening meals earlier, can actually solve the problem. While suffering from this condition, you should also consider including bananas and yogurts with active and live cultures in your diet. 2. Inflammatory Bowel Disease (IBD) IBD is a rather chronic infection, affecting the bowel wall. There are two main types of the IBD, the ulcerative colitis and Crohn’s disease. The infection causes the walls of the bowels to become inflamed. Some of the symptoms associated with this infection include a watery diarrhea with traces of blood or mucous. IBD normally occurs in acute episodes and may worsen at certain times. While the condition may not worsen in the morning, the diarrhea will start from the time you wake up. The diarrhea may even interrupt your sleep in the morning. 3. Bacteria and Viruses In other cases, diarrhea every morning may be a result of a bacterial or viral infection. These mainly enter the body through contaminated food. While such bacteria and viruses, such as E. coli, or even standard food poisoning may lead to both diarrhea and vomiting throughout the day, the problem is more rampant during the morning hours. This is particularly the case when the infection is mild or if you ingested the contaminated food or drink before going to bed the previous day. 4. Reactions to Medication There are certain medications, specifically antibiotics, which may be associated with morning diarrhea. Diarrhea resulting from the reaction by the body to a certain medication may occur any time of the day. However, the problem is more common in the morning. While sleeping, most of the body organs tend to go to a dormant state. After waking up, the various organs become active and may react to a medication that had been circulating in the bloodstream the whole night. This is likely to cause diarrhea in the early hours of the day. 5. Substance Misuse Abusing certain substances may also result in diarrhea every morning. Some of the substances that are known to irritate the bowel are alcohol and nicotine. Additionally, the condition may also be a result of various illicit drugs. The majority of these substances are abused at night, especially during social events. As such, diarrhea in the morning hours after drinking with your friends the previous night should not be a surprise. The cases are also isolated, unless you abuse drugs and substances regularly. 6. Pregnancy Pregnancies are known to cause morning sickness in many ladies. This is mainly because of the elevated levels of hormones, such as the human chorionic gonadotropin (HCG) and estrogen in the body. In addition to morning sickness, this elevated hormone levels may also lead to diarrhea during the early hours of the day. Again, nausea and vomiting due to a pregnancy are a common occurrence and may occur any time of the day. However, these two problems, accompanied by diarrhea, tend to be more common in the morning during the first trimester of the pregnancy. There are certain contraceptives that may lead to this condition as well. 7. Psychosocial Stress Though not a common occurrence, psychosocial stress may also lead to diarrhea every morning. While sleeping bowel movements resulting from this stress will be minimal. However, the movements may worsen in the morning, if you get up with intense emotions and may lead to diarrhea during the early hours of the day. This condition should ease once the situation leading to stress is dealt with. 8. Other Causes There are other minor causes of this condition: • Changes in the circadian rhythmThis is essentially the body clock and can lead to this condition, if interrupted. When the clock is working normally, bowel movements are minimal in the evening and more rampant starting from around 8 AM. When the rhythm is interrupted, bowel movements may occur at any, unpredicted time. • Hormone imbalance and nerve activityTo keep the body active and alert, nerve activity and hormone levels change after waking up. This change may also lead into increased bowel movement, hence diarrhea. • Eating in the morningTaking breakfast very early in the morning may stimulate defecation reflexes, also known as duodenocolic and gastrocolic reflexes in the body. This may result in diarrhea in the morning. A breakfast comprising of either fruit juice or milk may also trigger this condition. Such items will irritate the gut, especially in the lactose and fructose intolerant people. How to Deal With Diarrhea Every Morning Owing to the many causes of this condition, it may be a problem for you to tell what exactly the cause is. As such, you should visit a doctor for diagnosis. To diagnose the problem, the physician will seek to learn more about your diet, exercise patterns and stressful situations. The physician may also take stool and bowel tissue samples for testing in the laboratory. If the condition is chronic and occurs almost every morning, the physician may need to take a look at the colon and bowels by inserting a microscopic camera into the system. This procedure is known as colonoscopy. While there is no specific cure for this condition, there are certain measures that can help contain the situation, such as: • Probiotics are administered to restore the intestinal flora to its normal condition. • Moderate fiber consumption helps if you are having chronic diarrhea. • Avoid irritant drinks and foods that irritate the intestinal system, such as alcohol, spicy foods, fruit juices, dairy and caffeinated beverages. • Anti-diarrheal medications like loperamide can be taken to ease the condition until the real cause of the diarrhea is ascertained.     Current time: 04/22/2024 06:22:17 pm (America/New_York) Memory usage: 1409.11KB
ESSENTIALAI-STEM
Wikipedia:Sockpuppet investigations/え06/Archive Suspected sockpuppets Typical undisclosed PAID / covert advertising. is connected to (blocked on zhwiki) via Shaoshan Liu(zh:Shaoshan Liu). has been connected to (ducked on zhwiki; categoried as zh:Category:Gsgpiooi的維基用戶分身) via zh:于佳宁. 于佳宁 is created by. The activity interval between え06 and Gsgpiooi/66162101ddd is > 1year, so I am not sure whether they are actually controlled by a single sockfarm or the article owner just seek another sockfarm 1y+ later. Only Athena-en is fresh. え06 was CU on meta in 2020. Is it possible to check their technical connection and find possible (tons of) sleepers in such case?--虹易 (talk) 03:52, 27 May 2022 (UTC) 虹易 (talk) 03:52, 27 May 2022 (UTC) * I'd like to lend a hand to make it more clearly, but I don't understand whether you want to request a checkuser? PAVLOV (talk) 18:28, 28 May 2022 (UTC) * @虹易 please check below. PAVLOV (talk) 19:05, 28 May 2022 (UTC) * Thanks for your paraphrasing! That is what I mean. If checking sleepers is infeasible, I would suggest just banning the first account as duck. --虹易 (talk) 08:03, 29 May 2022 (UTC) * Cu requested per your request PAVLOV (talk) 08:05, 29 May 2022 (UTC) Comments by other users Let me clear this case. and both created the same article Shaoshan Liu, the former one created this article on English version on Special:Diff/1074815536, the latter one created this article on Chinese version on [] with the same tones. has been found as sockpuppet of per edit patterns on Chinese wikipedia. edited a same article and blocked for sockpuppetry on Chinese Wikipedia. was checked on meta in 2020. No user in the group found connected to. All these accounts seemed to be stale except for Athena-en who is the only fresh one connected to the group (especially ). Is it possible to check their technical connections and find sleepers in such case?--PAVLOV (talk) 18:50, 28 May 2022 (UTC) Clerk, CheckUser, and/or patrolling admin comments * CU - all accounts are stale. Closing in line with WP:BLOCKPREVENTATIVE - feel free to re-report if these accounts return to active editing. Spicy (talk) 13:33, 31 May 2022 (UTC)
WIKI
Feature Request: ColorRooms with custom data @chris, I often find myself needing to color rooms (ideally their floors) by some custom data. For example, I might run some post-processing on each room’s indoor comfort data to assess whether each individual room complies with some standard. I’d then want a quick way to visualise in the model which rooms are failing, or to what degree they are failing. The ColorRooms components is great when plugging in data collections from a sql output: …but it doesn’t allow me to input custom (meta-)data: I understand that there are workarounds but it seems that allowing the component to accept this kind of data would make the workflow much more convenient. I see that others have run into similar problems. Is there a reason why you haven’t implemented this? If not, please consider this a feature request. 2 Likes @MaxMarschall , I really think this is something that is best accomplished this using the “LB Create Legend” component. Here’s another discussion for a case where I used it to customize the coloring of face geometry: The “Create Legend” component is just much more versatile and useful compared to anything that is constrained to only rooms or faces. Sure, it takes some mastery to use but then you learn this one component and then you are set for many use cases instead of just one. If you really need a dedicated component for coloring rooms, there’s nothing stopping you from writing your own and making your own set of specialized user object using the Ladybug Tools SDK. You can use this class in honeybee and you are 90% of the way there. I take your point @chris, and I can see the reasons for learning the SDK are accumulating so will give that a shot soon!
ESSENTIALAI-STEM
On the approximability of two capacitated vehicle routing problems Adrian Bock, Laura Sanità Research output: Contribution to journalArticleAcademicpeer-review 1 Citation (Scopus) Abstract Vehicle routing is an important and active research topic in computer science and operations research. In this paper, we give some approximation results for two well-known capacitated vehicle routing problems.Our first result concerns the Capacitated Orienteering problem in Euclidean graphs. We are here given an Euclidean graph G, where each node has a profit value and a demand value, starting and end nodes s, t, a length bound D and a capacity bound C. The goal is to find an s-t-path of length at most D that collects maximum profit from nodes whose total demand does not exceed the capacity bound C. We give a PTAS for this problem, extending the corresponding known result given by Chen and Har-Peled [Chen, K., and S. Har-Peled, The Euclidean orienteering problem revisited. SIAM Journal on Computing, 2007] for the uncapacitated version.Our second result concerns the School Bus problem with regret minimization, where we are given a general metric graph, and the task is to design the routes for a given set of buses of limited capacity to transport a set of children to a school, while minimizing a certain regret threshold. Under the standard hypothesis P≠. NP, we show that this problem cannot be approximated. Original languageEnglish Pages (from-to)519-526 Number of pages8 JournalElectronic Notes in Discrete Mathematics Volume41 DOIs Publication statusPublished - 2013 Externally publishedYes Keywords • Approximation algorithms • Orienteering • Vehicle routing Fingerprint Dive into the research topics of 'On the approximability of two capacitated vehicle routing problems'. Together they form a unique fingerprint. • Cite this
ESSENTIALAI-STEM
PDA View Full Version : Forum issues gatordev 20 January 2015, 15:07 Just thought I'd pass this along as a data point and you guys can do with it what you will. The last two or three days, I've had issues where, while I'm reading the forums and basically making a thread "read" by me, I'll then hit the "What's New" button, and the same bunch of threads will be marked as unread and start me over from the beginning. What's weird is they don't ever reset during my session AND it's not all threads, but just random ones. This seems to be a new occurrence, and I can't completely discount FF being the issue, but thought I'd pass it along. WHSmithIV 20 January 2015, 15:40 If you're using a computer, run a malware scan on it first and see if that clears the problem up. Malwarebytes is what you want to download and run for that - and it's free. Just don't enable the free trial at the end of the installation. Uncheck that box. Eric 20 January 2015, 16:07 Good call. https://www.malwarebytes.org/. I've used it to salvage a couple systems that were infected with bogus anti-virus malware programs. Even if it's not the problem, it does not hurt to run it weekly. gatordev 20 January 2015, 16:32 It's not a specific computer problem, as I've had it happen at work on IE, as well. It seems to be a forum-specific issue, as it doesn't happen on other vBulletin sites. It's like it forgets I just read several threads (but not ALL the threads I've read). FortTom 20 January 2015, 16:49 It's not a specific computer problem, as I've had it happen at work on IE, as well. It seems to be a forum-specific issue, as it doesn't happen on other vBulletin sites. It's like it forgets I just read several threads (but not ALL the threads I've read). I've had exactly the same thing happen to me on this forum several times. And then the issue seems to go away, and pops up again another time. Definitely not a "malware" issue. Just seems like a glitch here.
ESSENTIALAI-STEM
User:Ken JP Stuczynski/Sandbox ARTICLE: New York Photo League Original Members Morris Engel (born 1918, New York, New York; died 2005) George Gilbert (born George Gelberg, 1922, Brooklyn, New York) Sid Grossman (born 1914, New York, New York; died 1955) Morris Huberland (born 1909, Warsaw, Poland; died 2003) Sidney Kerner (born 1920, Brooklyn, New York) Sol Libsohn (born 1914, Harlem, New York; died 2001) A self-taught photographer who originally earned his living documenting paintings, Libsohn co-founded the Photo League with Sid Grossman. Libsohn was an important teacher at the League as well as a member and leader of numerous production groups. In addition to freelance work for numerous magazines, he also was employed by Roy Stryker for the documentary project of Standard Oil Company of New Jersey (later Exxon), the Federal Art Project, and Princeton University, where he taught art and photography to disadvantaged youth in the Summer Program. Libsohn was a personal acquaintance of Romana Javitz, head of The New York Public Library’s Picture Collection from 1929 to 1968, who sought out his work for the Library. Richard A. Lyon (born 1914, New York, New York; died 1994) Jack Manning (born Jack Mendelsohn, 1920, New York, New York; died 2001) Walter Rosenblum (born 1919, New York, New York; died 2006) Arthur Rothstein (born 1915, New York, New York; died 1985) Edward Schwartz (born 1906, Brooklyn, New York; died 2005) Aaron Siskind (born 1903, New York, New York; died 1991) Lou Stoumen (born 1917, Springtown, Pennsylvania; died 1991) Weegee (born Usher Fellig, 1899, Zloczew, Poland; died 1968) Dan Weiner (born 1919, New York, New York; died 1959) Sandra Weiner (born Sandra Smith, 1921, Drohiczan, Poland) Feature Group Started and led by Aaron Siskind, 1936 The Harlem Document The Chelsea Document “Today Chelsea is by no means a suburban paradise. The figures say it is closer to an urban hell, its streets thronged with the city’s trucking, the majority of its homes guiltless of plumbing and steam heat, its children robbed of sunlight, air and play space.” —Elizabeth McCausland, Photo Notes, May 1940
WIKI
Fantastic Advice On How To Shed Excess Weight Weight loss is a difficult subject for a lot of people; losing weight isn’t as easy to do. The most important thing to know when it comes to losing weight is to learn what methods have proven successful for others. Don’t use shakes or protein bars when planning your diet menu. These items are surprisingly calorie-dense and won’t satisfy real food cravings. You are likely to find yourself just as hungry and wanting for food almost immediately after what was supposed to be your meal. Also, these things have a lot sugar, which will spike your blood sugar and make you even more unhappy. Keep track of the calories you eat daily. Always realize ways to cut down on the amount of fat you’re taking into your body. You might want to look for substitutions that contain fewer calories. TIP! Walnuts are something that can help you in your weight loss program. Research has shown that if you eat walnuts along with your normal breakfast, you are less likely to overeat during the day. Heart Rate If you are most interested in losing fat you need to focus on cardiovascular activities. Cardiovascular exercises will burn fat burning and an elevated heart rate. Any exercise that raises your heart rate and keeps it up can be considered cardio exercise, so pick something you find enjoyable and stick with it! One way to drop extra weight is to chew or suck on ice chips when you feel like snacking or binging on junk food. Sucking on ice allows you to experience the feeling of putting food in your mouth without actually eating, so it may help reduce cravings. TIP! Rather than overfocusing on the number on the scale, focus on your health. You will find it easier to stick to your plan this way. Try to have a salad before each dinner to lose weight. Salads have fiber which will help you feel full without excess calories. Focusing on making positive changes is an easy way to stay with your diet. Rather than trying to avoid stopping by your favorite candy store, get into the habit of stopping elsewhere for fruit or a healthy smoothie instead.It is far easier to begin new habits than break old habits. Develop a workout schedule. If you don’t great a schedule, you will let other things take precedence over your weight loss. Develop a set time each day for some exercise and stick with it. TIP! There are newer fad diets that talk about limiting or eliminating carbohydrates when it comes to daily dieting. This is not ideal from a nutritional point of view. You need to start recording the calories you are eating and drinking daily. You will lose weight if you consume a greater amount of calories than you burn. Consuming an excess amount of calories can thwart your weight loss efforts. This can help you reflect on your progress and will help keep you more confident. It helps keep you motivated to stay at the motivation needed to maintain your size or take off some inches off. As you attempt to lose weight, try using a pedometer. You will probably be surprised by how much you walk and how few calories you burn. If you’re aware of how many you walk on average, try challenging yourself to walk more. With every step, you are moving forward with your fitness goals and getting closer to your target weight. TIP! To facilitate weight loss, consider having oatmeal for breakfast. Oatmeal is a good trick because it is full of filling fiber and even has some protein. Find other things to do than just food. There are those who really like to cook and therefore also tend to eat a great deal. Food can be soothing and a lot of fun. Just be sure that you also have other passions and hobbies. Try looking for a hobby that will encourage you stay active. To lose weight, it is not enough to just learn how to do so. You need to integrate this knowledge into your daily routine. You can only achieve weight loss through the tips that you know about. Remember the guidelines from this article as you complete your journey. Good luck! One easy to way increase your motivation to get healthy is to join up with a weight loss buddy. Choose a family member or friend who has similar goals as you. Also, you can make working out and dieting fun with each other during the course of your diet. TIP! If weight loss programs never seem to work for you, consider drug alternatives. This drug will reduce the fat that is absorbed by the body during food intake.
ESSENTIALAI-STEM
Wikibooks:Bots/Unstable Bots are automated clients used to make repetitive edits to the wiki faster than a human would be able to perform. The bot flag is a tool that enables default hiding of edit actions, intended to avoid flooding of the logs. The flood flag is a tool to replace temporary utilization of the bot flags. Neither bots nor the flood flag may ever be used to make controversial actions. This policy pertains to all bots, including those which do not have the bot flag. Bots Bots should be given their own separate account, and should not share an account with a human operator. This is so that, in an emergency, the bot can be blocked without having to block the bot operator. Bots should be easily identifiable as a bot, by doing at least one of the following: * Having the word "Bot", or something similar, in the username. * Adding something such as "Automated" or "Bot edit" to every edit summary. (Bots must always make proper use of the edit summary) * Adding information on the bot account's user page which clearly indicated that the account is a bot account, who the owner is, and how to stop the bot from editing (such as a "block" link to be used directly by admins). The capabilities of a bot, or a reasonably complete list of them, should be easily available on the bot's userpage. Bot operators are expected to be responsive to queries regarding their bots, especially where error reports are concerned. All edits made by the bot are the responsibility of the bot operator, and they will be expected to undo any damage caused by a malfunctioning or misdirected bot. Common problems * See also: Edit assertions for bots Bots must never contribute anonymously, and care should be taken to ensure that the bot does not accidentally log out during operation. If this occurs, the bot must cease editing. Bots contributing anonymously will be blocked on sight. It is very important for fully-automated bots to, wherever possible, enable a method to stop the bot. Be it by leaving a message on the bot's talk page, or editing a subpage in the bot's userspace, since their owner may not be on hand to deal with problems. If that fails, a block will be required to limit disruption to the wiki. Once the problem is fixed, the bot will be unblocked to resume operations. Semi-automated bots Semi-automated bots are operated by a human interactively. As AutoWikiBroswer, a common tool which is often operated in a semi-automated fashion. These bots should be flagged only if they demonstrated any ability to flush non-automated edits out of the logs. Semi-automated scripts, like user scripts, which do not flood the list of recent changes do not need to be flagged. User scripts which flood RC should be used with care to limit disruption; the flood flag may be temporarily granted to cover these specific situations. Fully-automated bots Fully-automated bots operate without supervision. Automated bots usually operate continuously, and should be approved before they go into operation. Make a request at WB:RFP to ensure that the planned task is acceptable to the community. Bots will be flagged based on their ability to flush non-bot edits from the recent changes feed. Automated bots which edit intermittently and do not flood the list of recent changes do not need to be flagged. Flood flag Wikibooks administrators may temporarily give themselves a "flood flag" when doing repetitive, non-controversial edits or actions to avoid flooding RC. Administrators, as users with an additional set of maintenance tools, may often need to make repetitive edits. Bureaucrats may additionally add and remove the flag from other users. When to use the flood flag Administrators should use the flood flag to avoid flushing other edits and actions from the RC feed when doing similar, repetitive changes. Such actions must never be controversial, as using the flood flag decreases the amount of oversight they may receive. Abuse of the flood flag is treated as abuse of any other administrator tool would be. Examples of acceptable use would be deleting many spambot pages, or deleting a large number of pages after consensus has been achieved at Votes for deletion or blocking many open proxies. Unacceptable uses include attempting to circumvent legitimate oversight of any controversial action, regardless of whether it is an administrator task or not. Bureaucrats may wish to use the flag when renaming indefinitely blocked accounts with inappropriate usernames. In some cases, a bureaucrat may remove the flood flag to force an administrator's edits to appear in RC. This should be done in cases where the administrator has forgotten to remove it, or when the changes should be seen by default in RC. The flood flag is set and removed using Special:UserRights. Abuse Administrator should not make contentious edits or actions with the flood flag on. Since they already have access to a greater toolset to delete pages, block users, view deleted material, place protections on pages, etc. The necessity to log actions is greater. Granting of the flood flag is logged, and shown in recent changes. Admins who abuse their admin rights (including the flood flag) should be sanctioned. Flood flag or bot flag? The Flood Flag is intended to replace requesting temporary bot flags from bureaucrats. Administrators who would otherwise request a temp bot flag may simply flag themselves using the flood group. In those cases where a permanent bot flag should be given, procedure remains the same - the administrator should create a secondary account and request a bot flag as normal. Only temporary bot flags are replaced with this flood flag. Getting a bot flag The bot flag is simply a technical measure, no big deal. Bots which are capable of flushing non-bot edits out of the recent changes feed should be flagged, even if they do so only intermittently. * Bot operators who anticipate that their bot will flush non-bot edits from the recent changes feed must request a bot flag, and throttle the bot to avoid doing harm until the bot is flagged. Bots must not flood Special:RecentChanges while waiting for approval for a bot flag; edit at a low rate until the flag is applied. * A request from the bot operator will be made on WB:RFP. * In cases where the work of a patroller, rollbacker, admin or 'crat is hindered by a bot awaiting approval, they may request that the bot be flagged immediately. * Only bureaucrats are able to grant or revoke the bot flag to a user account, and may do so at their discretion. Bureaucrats should seek community input when the bot's edits will have a major impact on the project, but bots performing minor tasks which are obviously of net benefit may be flagged immediately. * If no significant opposition is voiced, and the bots performs a useful, non-controversial task with minimal errors, the bot will be flagged forthwith. Unwanted bots Bots which perform unwanted tasks on Wikibooks will not be flagged (or, if the bot flag was already granted, will be de-flagged). Operators who do not heed the wishes of the community in this respect will have their bot(s) blocked. Current bots These accounts are listed as bots. Some do not have the bot flag; flagged bots are listed here. Some bots operate on many wikis, however their edits are not flagged as bot edits on this Wikibooks. Bots available by request These bots are active and available to perform edits upon request. Bots functions are described on their userpages. * User:Mike's bot account
WIKI
TeX/edef Description is similar to \def in that it allows you to define new macros or replace an existing macro. The significant defining difference between and \def is that expands macros at definition time, rather than saving them for later. This difference allows to be used to append new information to a macro, for example: results in the output "ABC". Attempting to do this example with \def instead will result in the error "TeX capacity exceeded, sorry". This behavior can be useful in loops that compile a string of information, but do not end up outputting the information directly.
WIKI
Russian territory expands by 4.5 square kilometres after seismic activity RussiaAccording to scientists, the land territory of Russia has expanded by about 4.5 square kilometres within the last few years in the Far East due to seismic and volcanic activity. The gained land was recorded in the Sakhalin Peninsula. Boris Levin, head of the Institute for Sea Geology and Geophysics of the Russian Academy of Sciences, said that the increase happened primarily due to two seismic events. The first, in August of 2007, was when a heavy 6.8 earthquake near the city of Nevelsk in the Far East raised about three square kilometres of seabed above the level of the water. The second was in June of this year, when the Sarychev Peak volcano on the Matua Island erupted. GPS trackers on the Matua island were used to monitor the eruption, and the volcano changed its shape, adding 1.5 square kilometres of land, scientists said. Geologists also reported that the Kuril Islands nearby were slowly moving towards mainland Russia at an estimated rate of eighteen milimetres per year.
NEWS-MULTISOURCE
Cathode Materials Although widely used, current Lithium-ion batteries still rely on cathode materials such as LiCoO2 or LiFePO4 with relatively low theoretical specific capacities of 272 mAh g–1 and 170 mAh g–1 respectively. However, in real systems, the achievable capacities can even be considerably lower. In order to circumvent this problem and to meet the demands set for future energy storage systems, sulfur is considered a good alternative in comparison to the above mentioned state-of-the-art cathode materials in lithium-containing batteries. This instance can be mainly attributed to the high theoretical specific capacity of elemental sulfur in such systems of 1672 mAh g–1. In addition, elemental sulfur is produced annually on a multimillion ton scale worldwide and is thus a highly inexpensive material. These circumstances and the fact that sulfur is non-toxic make it very desirable for said application. However, some challenges will have to be overcome before the lithium-sulfur will be able to replace the current systems in use. On mayor issue in that respect is the formation of soluble polysulfides during the lithiation of sulfur. These compounds can diffuse through the separator, a process that is called “Polysulfide shuttle effect”. This phenomenon consequently leads to a loss of active material on the cathode side of the cell, to damages of the anode, to a reduction of coulombic efficiency and therefore ultimately to a notably reduced cycle life of the battery. Furthermore sulfur and its related lithiated species are electrically non-conducting. These issues are mainly addressed by employing porous carbon materials as hosts for the sulfur. By employing carbons with a specific, tailored porosity, sulfur is retained in the electrode, which suppresses the Polysulfide shuttle effect. In addition sulfur is electrically well-contacted, which leads to an overall improved utilization of active material and increased specific power. We are currently working on a broad range of different carbon materials for this application, whereas special attention is given to synthesis pathways that allow for an easy upscaling while requiring only a small number of process steps. Contact person: Dr. Lars Giebeler Email    Publications: M. Herklotz, F. Scheiba, R. Glaum, E. Mosymow, S. Oswald, J. Eckert, H. Ehrenberg: Electrochemical oxidation of trivalent chromium in a phosphatematrix: Li3Cr2(PO4)3 as cathode material for lithium ion batteries, Electrochimica Acta 139 (2014), S. 356-364. URL M. Klose, K. Pinkert, M. Zier, M. Uhlemann, F. Wolke, T. Jaumann, P. Jehnichen, D. Wadewitz, S. Oswald, J. Eckert, L. Giebeler, Hollow carbon nano-onions with hierarchical porosity derived from commercial metal organic framework, Carbon 79 (2014), 302-309. URL .
ESSENTIALAI-STEM
User:RIGHTWAY MEDIA Among Fuji musicians all over the world today, ALhaji Sulaimon Alao Adekunle Malaika is a force to be reckoned with. With almost 30 years exprience in the business of entertaining and educating people, Malaika, born in Lagos from parents who originally come from Abeokuta, Ogun state is known in more than 50 countries as a composer of deep, intellectual music, a singer of repute and a talented dancer/entertainer. Starting his music career at a very tender age with WERE music, he has shown today that he is a MASTER by thr caliber of albums he has released - 17 in all and the positive and rave reviews he enjoys in the print and electronic media. Crowned as the KING OF NEW GENERATION in 2004, Malaika, who has toured more than 22 countries performing his ecclectic type of Fuji is the undisputed leader when the choice is good Fuji music. With the genre creator, Alhaji Sikiru Ayinde Barrister as his role model, he has continued to carry the torch, deeply following in the footsteps of masters like Barrister, Gen Kollington ayinla and King Wasiu Ayinde Marshal.
WIKI
Page:An Encyclopædia of Cottage, Farm, and Villa Architecture and Furniture.djvu/1079 GRECIAN AND MODERN VILLA FURNITURE. 105/) is hinged at the side, and locks at the top ; the keyhole being covered by the patera, b, which slides over it in a dovetailed groove. By this means, all the boxes are secured by one lock, and they may be all opened instantly. There may be spaces left for labels in the front of each box if required, and the top may be made to rise up with a horse, like the desk, fig. 1 904, so as to serve for reading on. The top is lined with embossed leather, of the same colour as that of the eases. Castors may be concealed in the plinth. This is considered a very useful piece of furniture for keeping select papers. 2095. Library Tables. Fig. 1 904 is a pedestal library table, which may have drawers on both sides ; or doors and cupboards on one side, and drawers on the other. There is a rising flap on the top, which may be raised to any height, to write or read upon ; and, when not required, it can be let down flush with the top of the table. The ends are hinged at the bottom, and fold outwards ; remaining open in consequence of being sup- ported by a joint stay near the bottom. This forms a very convenient place for portfolios, or large drawings. The depth of the recess may be varied according to the width of the pilasters. The top is covered with embossed russia leather. For the private room of an Architect, such a table may have a drawer immediately under the top, of the same length and breadth as the table ; and of five or six inches in depth, for the purpose of holding large drawing-boards with drawings on them, T squares, &c. In this drawer, the drawing in pro- gress is kept com- ^ ^ -= ^"^^^ 1C04 pletely from the dust ; while the sightliness of the room is pre- served, at times when drawing is not going forward. A rising portable desk, with double horse and rack, may be placed on the table, and raised to any con- venient height for reading, writing, or drawing on, in a standing position, in- stead of the sinking fixed desk shown in the figure ; or a false bottom may be made to the drawer, on which the drawing-board and all the drawing materials may be placed, in such a manner as that, when the drawer is pulled out, and the false bottom is raised to the required height by a rack and horse, the artist may go to work without any previous preparation, or arrange- ment of his instruments or materials ; and he may leave oflT, lower down the false bottom and its contents, and shut up the drawer, in an instant. Fig. 1905 is a very handsome library table, on four carved legs, with four drawers and a carved moulded edge. The drawers pull out from under the rail, thus rendering knobs unnecessary, and main- taining an architectural character. 2096. Writmff- Tables, or Secretaries. Figs. 1906, 1907 represent a handsome writing-table, with numerous drawers and divisions for con- taining papers, money, &c, ; and having on the top a shelf for books. The mechanism is such, that, notwithstanding its apparent intricacy, it can be opened and its contents displayed, or shut up and locked, in an instant. 2097. A sloping Writing-Desk, such as fig. 1908, to a scale of one inch to a foot, fs frequently used for placing on a library table. A part of the top is made flat, with a small lid which turns up, and displays inside the inkbottles, pens, wafers, &c. When not in use, the flap turns down, to keep every thing clean. Tlie sloping part may b« covered with embossed leather.
WIKI
Pimelea rupestris Pimelea rupestris is a species of flowering plant in the family Thymelaeaceae and is endemic to eastern Australia. It is a shrub with hairy young stems, elliptic to egg-shaped leaves with the narrower end towards the base, and heads of white flowers that are either all male or all female. Description Pimelea rupestris is a shrub that typically grows to a height of 0.5–1 m and has hairy young stems, the hairs pressed against the stem. The leaves are arranged alternately along the stems, elliptic to egg-shaped with the narrower end towards the base, 10–29 mm long and 4.5–9 mm wide, on a petiole 1.3–2.3 mm long. The upper surface of the leaves is more or less glabrous and the lower surface sparsely hairy. The flowers are borne in leaf axils in heads of 40 to 80 on a peduncle up to 1.5 mm long, each flower on a pedicel 0.2–0.3 mm long. All the flowers on a plant are either all male or all female, the floral tube 3.0–4.4 mm long and white, the sepal lobes 1.5–2.2 mm long and densely hairy on the outside. Flowering has been observed from January to March and in September. Taxonomy Pimelea rupestris was first formally described in 2017 by Anthony Bean in the journal Austrobaileya from specimens he collected on Widgee Mountain, west of Gympie in 2009. The specific epithet (rupestris) means "of rocks" or "living in rocky places", referring to the habitat of the species. Distribution and habitat This pimelea grows in rocky outcrops with serpentinite on hills and mountainous places and is only known from the type location in Queensland, and Fine Flower and Wave Hill station in northern New South Wales.
WIKI
Raza • Member for 9 years, 2 months • Last seen this week How can I remove all comments from a file? 2 votes You can use invert match like this: #grep -v "#" filename -v, --invert-match Invert the sense of matching, to select non-matching lines. (-v is specified by POSIX.) View answer What are some practical uses of STDIN redirection? 2 votes Standard Input (stdin) Redirection In Linux, cat command is used to print the content of a file. However, if cat command is executed without any input argument then by default it tries to read from ... View answer sftp script to get a file from remote machine 2 votes Another way to automate this process is to use expect script. Here is an example: for example: #!/usr/bin/expect -f spawn sftp ftpusername@phcsftp.pearsoned.com:/dir/file.txt expect "user@... View answer Error initializing server: OC4J administrator account is not configured Accepted answer 2 votes After re-installation of OS before applying any specific configuration I was able to start oc4j service. After narrowing it down to which configuration was exactly causing this not to start was came ... View answer How to increase the memory used by Java in linux? 2 votes You will need to modify the vuze shell script. This shell script is actually a link to a file called azureus, vuze's previous name. Within this script change the line JAVA_ARGS="-Xmx128m" to JAVA_ARGS=... View answer How to monitor Memory utilization of the single process? 2 votes Try this. if you want with program name mypid=`pidof programname` ; top -p $mypid OR top -p `pidof programname` View answer multiple ffmpeg library paths, how can exclude older ffmpeg installations? Accepted answer 2 votes You need to verify $PATH and $LD_LIBRARY_PATH environment variables. make sure they are point to correct version of ffmpeg and does not include older version if LD_LIBRARY_PATH is not already setup ... View answer add server name before filename with uname -n Accepted answer 2 votes You need to use backticks (`) before and after uname -n to insert the output of this command. This should do it: mv -f -v $oldfile /infanass/dev/admin/backup/\`uname -n\`${oldfile##*/}_$(date +%F-%... View answer LibreOffice from RPM looks ugly Accepted answer 2 votes This issue is caused by new accessibility option in LibreOffice 4. This option can be disabled by: Tools > Options under LibreOffice > Accessibility, disable Automatically detect high contrast mode ... View answer Change working directory 2 votes not sure if I understand this right but -b will not change the root folder. It will put the temporary zip archive in the directory /home/cryus, copying over sql.zip to the current directory when done. ... View answer Can you create a volumegroup in LVM that all the Logical volumes created under it will be thin provisioned? 1 votes Yes, You can create a volumegroup for thin provisioning. The following are the detail steps, copied from here: # pvcreate /dev/sdd Writing physical volume data to disk "/dev/sdd" Physical volume "/... View answer Odd Cygwin netstat output Accepted answer 1 votes Make sure that you are picking the correct netstat for your platform. which netstat will give you path where it is executing it from. View answer Browsers doesn't see aliases in /etc/hosts 1 votes You need to make sure your system is configure to use host file for the dns by confirming /etc/nsswitch.conf file. It should look like #hosts: db files nisplus nis dns hosts: files nis ... View answer Debian: chgrp doesn't works properly on home folder 1 votes I think you are confusing the first 2 with your user 2. The first 2 represent total number of hard links and then second 2 is your user and then group name either bin or 34 after you changes. Here is ... View answer URL Rewrite on debian not working Accepted answer 1 votes The default installation of Apache2 comes with mod_rewrite installed. To check whether this is the case, verify the existence of /etc/apache2/mods-available/rewrite.load. $ cat /etc/apache2/... View answer How to view second hard drive with Windows 7 in Linux 1 votes You may need to install the following required packages which Centos by default does not support ntfs (Make sure you have the rpmforge repo installed) Install the following packages. ... View answer SCP Automation in production environment 1 votes Following an article from here: You should setup SSH connection without Password Using ssh-keygen then it will allow you to use scp without prompting password or any other remote task: 3 Steps to ... View answer how to get exit status from command in expect script Accepted answer 1 votes I am guessing this. I didn't try it myself. Let's see if it works. expect_ACTIVATE=`cat << EOF` set timeout -1 spawn $VPNC expect : {send Pass123\r} expect "\\$ " send "status=`... View answer Configuring Real VNC on RHEL 6.3 Command Line Accepted answer 1 votes You need to start vnc session from your Linux account to be able to connect to your session, run vncserver from your command line of your Linux system. After you issue this command it will tell you ... View answer apt config file location 1 votes If setting up the symbolic link on root is not an option in this case then here is another option for you: Since aptitude uses $HOME to store its configuration, you can temporary set HOME environment ... View answer CentOS VNC-Server Accepted answer 1 votes Here is a link for detail instruction on how to install a VNC-Server Summary: yum install vnc-server if you windows manager is not already installed then : yum groupinstall "GNOME ... View answer How do i change the password for root using webmin, where i have no more access as root? Accepted answer 1 votes you suppose to enter the password of user that you are trying to sudo from and make sure user has proper sudo access in visudo (/etc/sudoers) View answer What is the equivalent of telnet localhost 25 with ssh? 1 votes Telnet equivalent are rlogin, rexec and rsh a secure alternative is SSH View answer Delete files except n files with the "bigger" name? Accepted answer 1 votes You can search oldest files and then you can check if total number of files are more then N files then delete oldest files first in a script or you can also simply use the following example. Let's say ... View answer How would I mount a linux shared folder on another linux system? 1 votes You can use NFS export to share a folder On your Linux Server_1 where you want to share a folder do the following: echo /shared_folder *(rw,sync) >> /etc/exports /etc/init.d/nfs restart ... View answer Start and stop tomcat through ant script which is running in cygwin 1 votes I think you need to correct the path to /cygdrive/d/apache-tomcat-6.0.36/bin View answer Forget where link is to custom conf file? Accepted answer 1 votes You can have multiple domain in virtual host confirmation on httpd.conf file and each domain can have separate folder. Here is an example: Listen 80 <VirtualHost *:80> DocumentRoot /www/... View answer What is the kerberos keytab file used for in UNIX/AD kerberos authentication? 1 votes when you register a system with domain controller (net ads join), this will create a valid host principle for the system in /etc/krb5.keytab. This will create a computer object on AD. This object ... View answer Red5 can't find JAVA_HOME Accepted answer 1 votes On mine it shows cygdrive. I think you are missing "g" on cygdrive: export JAVA_HOME=/cygdrive/c/Program\ Files/Java/jdk1.6.0_32/ [edit: added the g in cygdrive path still missing] View answer How to realign a disk on logical volume with minimum to zero down time Accepted answer 1 votes Create new align partition DISK=/dev/sdd (assumed new disk is point to sdd) dd if=/dev/zero of=$DISK count=1 bs=1M parted -s -- $DISK mklabel msdos parted -s -- $DISK mkpart primary ext3 64s ... View answer  
ESSENTIALAI-STEM
To Carb or Not to Carb: How One Sugar from Peas Solves a Metabolic Riddle by BodyHealth Representatives September 21, 2017 Carbohydrates are one of the most hotly debated topics in the health world, and opinions run very strong on both sides. Some claim a strictly no carb diet will get you the best results for weight loss and muscle gain. The ketogenic and paleo diets fit in this category. Others swear that carbs play a crucial role in their nutrition and performance. Most sports drinks and muscle-gain powders contain some variant of sugar: fructose, sucrose, dextrose, or maltodextrin. To make matters more confusing, both sides can cite peer-reviewed scientific literature to support their claims. Before we can sort this out, we need to start with the fundamentals of what is actually going on in your body.   Crash Course In Carbohydrate Metabolism First of all, let’s be clear: glucose is the body’s primary fuel. Glucose is a carbohydrate. A simple sugar. Most of the time, this is what your body and brain are fueled by. This can change in states of fasting or ketogenic diets, where ketones become the primary fuel, but this is a special case that we will return to in a minute. When you eat carbohydrates, they are broken down into simple sugars. As these enter the bloodstream, your blood sugar level rises. Your body works hard to maintain a pretty narrow range of conditions for optimal functioning, like pH, for example. And temperature. Blood sugar, too. Special cells in your pancreas sense this rise and begin releasing insulin, a hormone that triggers cells to begin taking the sugar from the blood and storing it. Your blood sugar level begins to drop, which is again sensed by the pancreas, and now it starts releasing glucagon, a hormone that releases glycogen (stored sugar) from the liver.   What Does an Insulin Spike Really Do? You can see there is a bit of a back and forth between your insulin and glucagon to maintain optimal levels of blood sugar. The tricky part here is that the more your insulin levels spike, the more your blood sugar crashes. Dramatic swings in your blood sugar like this are at the root of many of the problems associated with carbohydrates: • Insulin insensitivity and type two diabetes, • Obesity, • High blood pressure • Heart disease • Some types of cancer. So what spikes insulin? The short answer is carbs, but the reality is a bit more nuanced than that. The faster the carbohydrate enters your bloodstream, the faster blood sugar levels rise. The faster your blood sugar levels rise, the stronger your insulin response. Some carbohydrates, like refined sugar, are very simple and very pure and spike your insulin levels a lot. Other carbohydrates, brown rice, for example, are larger, more complex, contain fiber, and take a while to break down. The simple sugars are released into your blood slowly and the insulin response drawn out over time. How quickly different sugars raise blood sugar is measured by the glycemic index. The higher the number, the more it raises your blood sugar. Now that we have the basics covered, let’s get into   How Carbs Improve Your Performance When you exercise, you consume both your blood sugar and your glycogen stores. If you deplete your glycogen stores, your body begins breaking down protein for energy, which is not terribly helpful for gaining muscle mass and improving performance. So having enough glycogen is important for anyone training or trying to maintain healthy weight. And this is why so many sports drinks and protein powders have sugars in them. The idea is that in order to replenish glycogen stores and maximize muscle gain, you need the carbs. This makes sense, to a degree, but because they are mostly using simple, high-glycemic sugars that spike your insulin levels, they don’t take the after-effects into account. One of the most common additives, maltodextrin, has a glycemic index 2x that of sugar! We are faced with a bit of a riddle: how can we quickly replenish our glycogen stores for energy and performance without spiking insulin?   Carb10: The Carbohydrate Solution Hidden within peas is a special carbohydrate. Isolated and purified it is called Carb10 tm. Peas are often used as a protein source for many vegan protein powders, so it often was simply overlooked by those focusing on its protein content. This is an astounding low-glycemic starch that has almost no effect on blood sugar or insulin. And yet, it’s still processed quickly by the body. Measures of gastric emptying show that it actually moves through your system faster than maltodextrin. And no blood-glucose response.  Even more unbelievable is that it has even been found to be keto-friendly. Participants in a preliminary study with people on a ketogenic diet ingesting over 20g of Carb10 maintain ketosis. So what does all this mean?  Fast energy for your body and brain. Faster recovery. Better response times. And all with none of the typical carbohydrate downside. No protein catabolism. No energy crash or brain fog. No worries. Just fuel.   Carb10 and PerfectAmino PowerMeal: The Best In Performance Nutrition This incredible advancement in performance nutrition is the perfect complement to our proven PerfectAmino formula. And that’s why we put them together as a part of our newest and most innovative performance nutrition product: PerfectAmino PowerMeal. We combine these two powerhouses of performance with ketogenic MCT oil, a full dose of vitamins and minerals, and a nutrient-packed Superfoods blend. This is the ultimate in meal replacement. Try it and experience the difference.     BodyHealth Representatives BodyHealth Representatives Leave a comment Comments will be approved before showing up. Also in BodyHealth From the zone to grinders and back again!—Part 1 From the zone to grinders and back again!—Part 1 by Brian Astell November 08, 2017 I’m a fitness and nutrition coach and a mountain-bike skills instructor. I decided to take all the things I love and start a business called TrailWorks. In a sentence, what I do is teach athletes to ride virtually anything by pairing riding technique with efficient fitness training. For my venture I sought out new and old sponsors to help jumpstart and enhance my rider’s experience. I had personally used BodyHealth’s PerfectAmino for about a year and a half before I decided it was a product I did not want to train without. It had become my recovery weapon of choice. I wrote to them firing off my out-of-the-box proposal. Read More Strive for body harmony, not specificity Strive for body harmony, not specificity by Jeff Spencer November 08, 2017 Who doesn’t want to perform at their physical potential? We all do. Why? Because of what the performance brings back to us. It can be tangible e.g. better health, sponsorship, and opportunities or intangible, e.g. enhanced well-being , prestige, and influence. These are, of course, just a few examples but think you get it. In its simplest terms we get something back for what we do that in advance we believe will enrich our lives. Read More The REAL Story Behind Whey Protein – PLUS 7 Secrets Its Marketers Don’t Want You to Know The REAL Story Behind Whey Protein – PLUS 7 Secrets Its Marketers Don’t Want You to Know by BodyHealth Representatives November 08, 2017 Whey protein is perhaps the single most-consumed supplement on the market today and now accounts for a multi-billion dollar industry. It is a staple of athletes and bodybuilders, and busy people who need some quick energy “on the go.” But where did this whole whey fad actually come from? How did this come to be? And, most importantly, what else do we need to know? Read More BodyHealth Fitness Newsletter
ESSENTIALAI-STEM
Here you will find the formulas to convert electric power in watts (W) to electric current in amps (A) and the common conversions of 110V and 240V used in most Western countries. THE FORMULA The formula for converting Watts to Amps is: Watts = Amperes x Volts The formula for converting Amps to Watts is: Amperes = Watts/Volts SAFETY WARNING! Only use 80% of the circuit breaker capacity! Common conversions North American and other 110 volt countries. [GROW] LIGHTS 110V • 1000W / 110V = 9.1 Ampere • 600W / 110V = 5.4 Ampere • 400W / 110V = 3.6 Ampere • 250W / 110V = 2.3 Ampere CIRCUITS • 10 Ampere x 110 Volt = 1100 Watts [80% safe usage is 880 Watts] • 15 Ampere x 110 Volt = 1650 Watts [80% safe usage is 1320 Watts] • 25 Ampere x 110 Volt = 2750 Watts [80% safe usage is 2200 Watts] • 30 Ampere x 110 Volt = 3300 Watts [80% safe usage is 2640 Watts] [GROW] LIGHTS 240V British Common wealth and other 240 volt countries • 1000W / 240V = 4.1 Ampere • 600W / 240V = 2.5 Ampere • 400W / 240V = 1.7 Ampere • 250W / 240V = 1.1 Ampere CIRCUITS • 10 Ampere x 240 Volt = 2400 Watts [80% safe usage is 1920 Watts] • 15 Ampere x 240 Volt = 3600 Watts [80% safe usage is 2880 Watts] • 25 Ampere x 240 Volt = 6000 Watts [80% safe usage is 4800 Watts] • 30 Ampere x 240 Volt = 7200 Watts [80% safe usage is 5760 Watts] NOTE! Remember that a circuit services more than one power outlet. A two outlet wall plug will use only one circuit. There will be more outlets on 240V systems per circuit than there will be in 110V systems. Amsterdam Marijuana Seed Bank
ESSENTIALAI-STEM
• C Call Back notification I want to write a sort of Call Back fucntion to notifiy a caller the progress of the function. Like:  main(){           callfunc();         ???some call back to notify this application about progress???        }        int callfunc(){            while{            //Do something that takes time            CallBack function() //to tell appliction it has                                //done one step            }         } This will eventually be use in MFC (Windows 95) application to display the progress bar. Help is appreciated, but please tell me how to write Call Back function or any other simpler or easier ways. Thanks a million! hshliangAsked: Who is Participating?   MithanderCommented: The easiest way I can see to do it is like this: float perDone; int isDone = 0; void main(void) {   while(!isDone)   {     callfunc();     //Display perDone here   } } callfunc() {   if(whatever your waiting for is done)   {     isDone=1;     return;   }   //Do what you need here   //Calculate % done and save it in perDone; } Another way to do it is to just display the things you want from callfunc().  Also you could do it using and MFC timer.  I've done this before, but I don't have a compiler handy, so I'll just use psudo code. double perDone; main(){ callfunc(); } callfunc() {   Start timer(10 ms);   while(....){  Update perDone, do what you want etc. } } OnTimer() {   //this will execute once everytime the clock timer runs out.  In this case 10 ms.   //that means it needs to be somewhat fast, if it runs 10 times a sec and   //redraws the whole screen, then your program will be much slower   Update perDone; } Those are the way's I can think of doing it.  Let me know if you what more help with it. 0   RONSLOWCommented: main(){   callfunc(); } void callback() {   ???some call back to notify this application about progress??? } int callfunc(){   while{     //Do something that takes time     CallBack() //to tell appliction it has                //done one step   } } If you really want main to get a look-in on every iteration, then I'd suggest putting the loop itself into main and have callfunc do a single iteration only. In windows things are quite different as it is multi-threaded and you can sent messages etc.  so this sort of thing can be a bit easier. 0   hshliangAuthor Commented: I have seen passing a function pointer to the loop, but I don't know if that is the best way. (like in Windows CallBack Function). Your first way involves the use of global variables, which may not be a good idea if I port it to C++. the second way related more to time but not percent done. I prefer the first way, but any though of avoiding global variables? As when I port it to a C++ class, it will not work. Thnaks. 0   RONSLOWCommented: have you function return a value (like a bool) rather than setting a global variable. r you can pass a pointer a function (or variable) to call (or modify) in your function. 0 Question has a verified solution. Are you are experiencing a similar issue? Get a personalized answer when you ask a related question. Have a better answer? Share it in a comment. All Courses From novice to tech pro — start learning today.
ESSENTIALAI-STEM
Network and Storage Protocols Cluster Failover on link communcation failure joostvandrenth 3,878 Views We were wondering whether a VIF failure would lead to a cluster failover. The first step would be to enable CF failure on network failure and set NFO on the appropriate interface. Our setup involves a Core switch with servers, clients and storage that connect through intermediary other switches - this means a LINK FAILURE as such might not occur on the switch the NetApp controllers are connected to, while the underlying connection between central and decentral switches will be affected. Is there a way to initiate or detect a failure of this kind? This would be more a failure of communications that a direct link failure. Same question for a multilevel VIF: multimode connection to 1 stack with single mode on top to another network stack, will it failover when there is not a direct link failure but an underlying one? 5 REPLIES 5 AdvUniMD 3,878 Views by default the filer will not take over on a multiple-link failure. To enable it, set the option "cf.takeover.on_network_interface_failure" to on. Note that this only applies to interfaces that have the "-nfo" (negotiated failover) flag set. i.e. you have to change your /etc/rc to include this flag in the ifconfig command line the other filer will take over when ALL these marked interfaces are down. to change it to take over whenever ANY of the flagged interfaces are down, set the option "cf.takeover.on_network_interface_failure.policy" to "any_nic" see the manual page for the "options" command for more info, as well as the active/active admin guide. -Michael joostvandrenth 3,878 Views Maybe the question was somewhat vague, if the switch (it being an edge device) to which the NetApp HA pair is connected does not directly suffer a failure, but other connections to the central network core do (thus resulting in loss of communications for servers and clients to the storage) am I able to 'catch' this failure and instigate a failure without manual intervention? rwelshman 3,878 Views Ok, so, is it that you are trying to determine how to deal with the problem: Server A -> Connecting to Filer A Server A still on the network and Filer A still on the network but Server A can't find a route to Filer A anymore? I don't think NetApp really plans for that kind of error as it is more of a network redundancy issue. Would Server A be able to get to Filer B in that case anyway? shaunjurr 3,878 Views Hi, Basically, if you need this kind of redundance, you simply need to have a redundant switch infrastructure.  A correctly configured and redundant core net will deal with failovers of such elements.  Assuming you are using STP in your network, new paths will be calculated.  The sort of failover you are trying to achieve via some NetApp functionality is fundamentally not a job for a host/server (a NAS unit is just an advanced server appliance) and would be far too complex for a host to resolve.  That is why there are network protocols that solve these problems transparantly for all hosts on the network at the same time.  ONTap can deal with local link failures (STP can't help here unless the hostis connected to multiple active links) and that is as much knowledge as it really needs to have about the network. Most of this is also described in the Network Configuration Guide and Best Practices "TR". WALLBREAKER 3,878 Views Note that this only applies to interfaces that have the "nfo" (negotiated failover) flag set. i.e. you have to change your /etc/rc to include this flag in the ifconfig command line Public
ESSENTIALAI-STEM
Copper Railways About: A Creative Technologies Major who is enrolled at Berry College. Copper Railways takes on the thought process of an engineer as s/he finds the best route for a train to go. It uses copper to act as the high-speed railways and resistors to simulate slower railways. It is then connected to an LED (or two) to visualize the speed of the trains on those railways. Teams will compare differing routes. This lesson gives the students experience with an engineering problem and an analogy with basic circuitry. Supplies: Step 1: Tools and Supplies Supplies Tools • Computer • Printer Step 2: Construction 1. Start by printing out a preferred map. Mine came from USHSR. 2. Tape down the LEDs to the destination and checkpoints, pointing them in such a way that positives on the LEDs connect to positives of the batteries and negatives to negative. 3. Tape down resistors (I used 5k1) on the slower tracks. My map had them in gray. 4. Put tape around the back to complete the circuit. I also folded the tape, at the battery, so that the batteries could be replaced. 5. Have your students choose the route that they believe is fastest 6. Stack two batteries on top of each other and complete the circuit 7. Show what happens when they go through the resistor 8. Dimmer LEDs = Slower routes 9. Compare different teams Share Recommendations • Gardening Contest Gardening Contest • Classroom Science Contest Classroom Science Contest • IoT Challenge IoT Challenge Discussions
ESSENTIALAI-STEM
India Raises Interest Rates More Than Estimates, Spurring Slide in Stocks India ’s central bank raised its benchmark interest rate more than forecast to quell the fastest inflation among major economies, spurring a slide in stocks and gain in the rupee. The Reserve Bank of India increased the repurchase rate to 8 percent from 7.5 percent, it said in a statement in Mumbai today. None of the 22 economists surveyed by Bloomberg News predicted today’s decision. Twenty estimated a quarter-point rise, while the remainder expected no change. Governor Duvvuri Subbarao acted as the central bank elevated its inflation forecast for the year through March by 1 percentage point, to 7 percent. With rising rural wages and a lack of corporate investment growth straining capacity, India’s price pressures mean it lacks the leeway in setting monetary policy afforded to counterparts in South Korea , Malaysia and Indonesia, which kept borrowing costs unchanged this month. “Today’s statement makes it clear that the RBI intends to take more monetary measures to get a handle over headline inflation,” said Ramya Suryanarayanan , an economist at DBS Group Holdings Ltd. in Singapore , who boosted her forecast for the repurchase rate to 8.5 percent for the end of December from 8 percent before today. “Inflation isn’t going to ease anytime soon to allow the central bank to take its eyes off a huge problem.” Worst in Asia The benchmark Bombay Stock Exchange Sensitive Index slid 1.9 percent, the day’s worst performance in Asia and the biggest drop in five weeks, at the 3:30 p.m. close in Mumbai. The rupee advanced 0.5 percent to 44.18 per dollar and the yield on the 7.8 percent government bonds due April 2021 climbed 15 basis points to 8.44 percent, an eight-week high. “Today’s policy action will reinforce the point that in the absence of complementary policy responses on both demand and supply sides, stronger monetary policy actions are required,” Subbarao said at a press conference in Mumbai today. “A change in stance will be motivated by signs of a sustainable downturn in inflation.” India’s benchmark wholesale-price inflation, which quickened to 9.44 percent in June, may remain near 10 percent until November, according to HSBC Holdings Plc and Yes Bank Ltd. By comparison, consumer prices rose 6.7 percent in Brazil , 9.4 percent in Russia , 6.4 percent in China and 5 percent in South Africa . ‘Strong Signal’ The Reserve Bank ’s action is a “strong signal” to check prices, Finance Minister Pranab Mukherjee said in a statement in New Delhi today. Policy makers have now increased rates 11 times since the start of last year, and today’s was the second half-point move in three meetings. By contrast, the U.S. Federal Reserve has kept its target rate in a range of zero to 0.25 percent since December 2008 and the Bank of England this month left its benchmark unchanged at 0.5 percent. The European Central Bank on July 7 raised borrowing costs for the second time in 2011. Today’s decision could be the last for Subbarao, 61, whose term concludes before the next scheduled rate announcement on Sept. 16. A former top bureaucrat in the Ministry of Finance, Subbarao took office in September 2008. Prime Minister Manmohan Singh ’s government hasn’t publicly indicated whether it intends to reappoint him. Fuel Costs Subbarao made today’s announcement after the government last month boosted diesel prices for the first time in a year to cut subsidies and reduce losses at state-owned refiners including Indian Oil Corp., efforts that have contributed to higher living costs. The RBI yesterday also cited a high share of production capacity in use, risk of a “wage-price spiral” and “stickiness” in food prices contributing to inflation pressures. While growth has shown signs of moderation, “there is no evidence of a sharp or broad-based slowdown as yet,” according to the statement. Even so, industrial production grew 5.6 percent in May, the least in nine months. Gross domestic product in the South Asian nation will rise 8.2 percent this year and 7.8 percent in 2012 compared with more than 9 percent each year in China, according to the International Monetary Fund . Car Sales Sales growth at carmakers including Maruti Suzuki India Ltd. (MSIL) slowed to two-year low in June, the Society of Indian Automobile Manufacturers said July 11. Commercial loans given by banks such as ICICI Bank Ltd. rose 19.61 percent as of June 24, the least since September 2010, according to the central bank. “If the domestic signs of a consumption slowdown gain further traction, the RBI might prefer to pause from here on,” Shubhada Rao, chief economist at Mumbai-based Yes Bank Ltd., said before the report. “The euro zone debt crisis and growth in the U.S. will be looked at closely by the RBI.” Subbarao blamed the government for contributing to inflation, which erodes the purchasing power of a population where more than three-quarters of the people live on less than $2 a day. A “large fiscal deficit” is stoking price pressures, the central bank said. ‘Fiscal Consolidation’ “Fiscal consolidation is, therefore, critical to managing inflation,” the statement showed. “In the absence of appropriate actions for addressing supply bottlenecks, especially in food and infrastructure, questions about the ability of the economy to sustain the current growth rate without significant inflationary pressures come to the fore.” The central bank maintained its economic growth forecast of 8 percent for the current fiscal year, even after citing dangers from Europe ’s debt crisis to the outlook for exports. With global growth prospects moderating, the Bank of Korea and Bank Indonesia kept rates unchanged this month. Malaysia’s central bank unexpectedly refrained from raising rates, choosing instead to order lenders to set aside more cash. By contrast, Thailand raised borrowing costs and China boosted rates for the third time this year. “Going forward, the monetary policy stance will depend on the evolving inflation trajectory, which in turn, will be determined by trends in domestic growth and global commodity prices,” India’s central bank said in today’s statement. To contact the reporter on this story: Kartik Goyal in Mumbai at kgoyal@bloomberg.net To contact the editor responsible for this story: Stephanie Phang at sphang@bloomberg.net
NEWS-MULTISOURCE
Page:United States Statutes at Large Volume 102 Part 1.djvu/529 PUBLIC LAW 100-322—MAY 20, 1988 102 STAT. 491 essary care as determined under section 622(a)(l)(C) of this title.". (d) HOME HEALTH SERVICES.—(1) Section 617 is amended— (A) by redesignating subsections (a) and Qoi) as subsections (b) and (c), respectively; and (B) by inserting after the section heading the following new subsection (a): "(a)(l) As part of medical services furnished to a veteran under section 612(a) of this title, the Administrator may furnish such home health services as the Administrator finds to be necessary or appropriate for the effective and economical treatment of the veteran's disability. "(2) Improvements and structural alterations may be furnished as part of such home health services only as necessary to assure the continuation of treatment for the veteran's disability or to provide access to the home or to essential lavatory and sanitary facilities. The cost of such improvements and structural alterations (or the amount of reimbursement therefor) under this subsection may not exceed— "(A) $2,500 in the case of medical services furnished under paragraph (1) of section 612(a) of this title; or "(B) $600 in the case of medical services furnished under any other provision of section 612 of this title.". (2) Subsection (k) of section 612 is transferred to section 617 (as amended by paragraph (1)), inserted at the end of subsection (a) (as added by paragraph (1)), and redesignated as paragraph (3). (3) The heading of section 617 is amended to read as follows: (e) CONFORMING AMENDMENTS.—(1) Section 612(f) is amended— (A) by striking out paragraphs (1), (2), and (3); (B) by striking out "(4)(A) The Administrator may not furnish medical services under this subsection (including home health services under paragraph (2) of this subsection)" and inserting in lieu thereof "(1) The Administrator may not furnish medical services under subsection (a) of this section (including home health services under section 617 of this title)"; (C) by striking out "subparagraph (B) of this paragraph" and inserting in lieu thereof "paragraph (2) of this subsection"; (D) by redesignating subparagraphs (B) through (G) as paragraphs (2) through (7), respectively; (E) by striking out "this paragraph" each place it appears in such paragraphs and inserting in lieu thereof "this subsection"; (F) in paragraph (2) (as so redesignated), by striking out "this subsection and who is required under subparagraph (A)" and inserting in lieu thereof "subsection (a) of this section and who is required under paragraph (1)"; (G) in paragraph (3) (as so redesignated), by striking out "furnished under this subsection" and inserting in lieu thereof "furnished under subsection (a) of this section"; and (H) in paragraph (5) (as so redesignated), by striking out "under this subsection" and inserting in lieu thereof "under section 617 of this title". (2) Section 612 is further amended— (A) in the first sentence of subsection (b)(4), by striking out "subsections (a) and (f) of this section" and inserting in lieu * '§617. Home health services; invalid lifts and other devices". �
WIKI
Semantic Relatedness Based Re-ranker for Text Spotting Ahmed Sabir1, Francesc Moreno-Noguer2, Lluís Padró1 Universitat Politècnica de Catalunya, TALP Research Center1 Institut de Robòtica i Informàtica Industrial, CSIC-UPC2 [Paper] [Code] [Colab] Abstract Applications such as textual entailment, plagiarism detection or document clustering rely on the notion of semantic similarity, and are usually approached with dimension reduction techniques like LDA or with embedding-based neural approaches. We present a scenario where semantic similarity is not enough, and we devise a neural approach to learn semantic relatedness. The scenario is text spotting in the wild, where a text in an image (e.g., street sign, advertisement or bus destination) must be identified and recognized. Our goal is to improve the performance of vision systems by leveraging semantic information. Our rationale is that the text to be spotted is often related to the image context in which it appears (word pairs such as Delta–airplane, or quarters–parking are not similar, but are clearly related). We show how learning a word-to-word or word-to-sentence relatedness score can improve the performance of text spotting systems up to 2.9 points, outperforming other measures in a benchmark dataset. Citation @inproceedings{sabir2019semantic, title={Semantic Relatedness Based Re-ranker for Text Spotting}, author={Sabir, Ahmed and Moreno, Francesc and Padr{\'o}, Llu{\'\i}s}, booktitle={Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP)}, pages={3451--3457}, year={2019} } Contact: Ahmed Sabir
ESSENTIALAI-STEM
2 I have a script that is being called by a 3rd party script, but it doesn't work. I can see in the logs that the file is in fact being called, just nothing happends. How do you debug a file called by a 3rd party? • I can't call the file from the commandline / another file, due to security checks • The 3rd party is an automated process, I can not ask them for help • I do not know if the code works properly, doesn't do a thing, or it has an error • This is an older site (or consider a less pro website), proper errorhandling does not exist Best solution thusfar: Place a bunch of file_put_contents($loc.'/a-1.txt', '') (where the 1 increments every time used) and see how many files are created/updated when you let the script excecute. This is slow, and only gives me how the code flows, not actual errors, so this isn't very efficient. I've found some topics talking about changing STDIN, STDOUT and STDERR, but I can't seem to get those to work out of the box. 5 • "proper errorhandling does not exist" - is there an error log? How are errors in the script currently handled? Are you saying you can't run the code at all - no way to actually test it? – MrWhite Dec 2 '15 at 12:02 • A log just for php errors/warnings? Not that I know of. They are currently handled in a manner it shouldn't, a bunch of die()'s. This is an older website, error handling wasnt really a thing in this version. I can't just run the code, I need it to come from the 3rd party. This is kind of a bad case scenario, I'm running very blind, even a lighter would be great. – Martijn Dec 2 '15 at 12:34 • "A bunch of die()" is not error handling. If it's not too much, I'd recommend showing your code at stackoverflow.com, there you can easily find some excellent pointers about how you can debug the script without having it called from the 3rd party site. As a first step solution, I'd recommend adding bunch of file_put_contents instead of die() and in the text going to the file, place values of all the variables you have till that point. This will give you insights about what exactly is going in the script. – Prateek Dec 3 '15 at 6:10 • This part is handling payments from a bank (it's a webshop). Posting code will not help as it's a lot of code, and only errors when the bank calls the file (so it depends on something). The file contents method is the one I used for the situation which led me to this topic, but it ain't fast. – Martijn Dec 3 '15 at 8:07 • Yes, that wouldn't be fast but if you place your file statements at correct places, you'd be closer to the cause of error with every call. – Prateek Dec 3 '15 at 11:01 1 This is one of the absolute worst case scenarios when inhereting a web project that is old, poorly designed, badly documented, and can't easily be debugged. Any code at all let alone mission critical autonomous code like this should be well documented and have thorough error reporting. Assuming this has been done in a language like PHP you can increase the error logging level to informational which will show every last error message that may be generated by the server. This will report on any errors that are being handled by the language and not the code. The next step would be to go through the code and identify anywhere that the code outputs any data to the connection (assuming a http style connection any data that is effectively "printed" to the buffer for outputting) and add logging so all the data is logged to file. If you add each instance of data output to an array with details on the line it was generated at you can push all data to to a file one time during each request to the web service to minimise file writes causing delays and then read through what is being sent back to the bank. It is going to be extremely difficult and complicated but there is not much more that can be done in the short term to identify the problem. In the long term you should absolutely be going through the code and implementing sanity checks, data validation, and error logging and reporting. Basically anything that will prevent the code from running should be logged in a manner that will let you go through and find out not just what the error was but what could have caused the error, the data being worked on, and what line the error occurred on. Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
ESSENTIALAI-STEM
Page:United States Statutes at Large Volume 119.djvu/3472 119 STAT. 3454 PUBLIC LAW 109–163—JAN. 6, 2006 (b) ELEMENTS.—The study required by subsection (a) shall include the following: (1) An examination of the personnel management authorities under statute or regulation currently being used, or available for use, at Department of Defense demonstration laboratories to assist in the management of the workforce of such laboratories. (2) A list of personnel management authorities and practices critical to successful mission execution, obtained through interviews with selected, premier government and private sector laboratory directors. (3) A comparative assessment of the effectiveness of the Department of Defense technical workforce management authorities and practices with that of other similar entities. (4) Such recommendations as are considered appropriate for the effective use of available personnel management authorities to ensure the successful personnel management of the highly technical and scientific workforce of the Department of Defense. 50 USC 403–1b note. SEC. 1124. SUPPORT BY DEPARTMENT OF DEFENSE OF PILOT PROJECT FOR CIVILIAN LINGUIST RESERVE CORPS. Subject to the availability of appropriated funds, the Secretary of Defense may support implementation of the Civilian Linguist Reserve Corps pilot project authorized by section 613 of the Intelligence Authorization Act for Fiscal Year 2005 (Public Law 108– 487; 118 Stat. 3959; 50 U.S.C. 403–1b note). SEC. 1125. INCREASE IN AUTHORIZED NUMBER OF POSITIONS IN DEFENSE INTELLIGENCE SENIOR EXECUTIVE SERVICE. Section 1606(a) of title 10, United States Code, is amended by striking ‘‘544’’ and inserting ‘‘594’’. TITLE XII—MATTERS RELATING TO FOREIGN NATIONS Sec. 1201. Sec. 1202. Sec. 1203. Sec. 1204. Sec. 1205. Sec. 1206. Sec. 1207. Sec. 1208. Sec. 1209. SUBTITLE A—ASSISTANCE AND TRAINING Extension of humanitarian and civic assistance provided to host nations in conjunction with military operations. Commanders’ Emergency Response Program. Modification of geographic restriction under bilateral and regional cooperation programs for payment of certain expenses of defense personnel of developing countries. Authority for Department of Defense to enter into acquisition and crossservicing agreements with regional organizations of which the United States is not a member. Two-year extension of authority for payment of certain administrative services and support for coalition liaison officers. Authority to build the capacity of foreign military forces. Security and stabilization assistance. Reimbursement of certain coalition nations for support provided to United States military operations. Authority to transfer defense articles and provide defense services to the military and security forces of Iraq and Afghanistan. SUBTITLE B—NONPROLIFERATION MATTERS AND COUNTRIES OF CONCERN Sec. 1211. Prohibition on procurements from Communist Chinese military companies. Sec. 1212. Report on nonstrategic nuclear weapons. SUBTITLE C—REPORTS AND SENSE OF CONGRESS PROVISIONS Sec. 1221. War-related reporting requirements. VerDate 14-DEC-2004 07:21 Oct 30, 2006 Jkt 039194 PO 00003 Frm 00922 Fmt 6580 Sfmt 6582 E:\PUBLAW\PUBL003.119 APPS06 PsN: PUBL003 �
WIKI
User:Scottie1960/sandbox Essendon Symphony Orchestra The Essendon Symphony Orchestra is a community-based music group in Moonee Valley in Melbourne, Australia. Essendon cellist Paul Green established the orchestra as the Napier Chamber Orchestra in the late 1990s. It arose from a group of musicians performing at the annual Christmas carols in Strathmore's Napier Park.
WIKI
This is the future of GE: Flannery turns sights to power, GE Capital General Electric will focus on meeting second half turnaround goals for its struggling power and GE Capital business units, the company said after its earnings report Friday. “We’ve described 2018 as a reset year and in this quarter we’ve made significant progress on that journey, " CEO John Flannery said on a conference call with investors. "This is an execution story going forward." GE's second-quarter profit was 30 percent lower than last year, dragged lower by its power business and GE Capital – with the former reporting a 58 percent lower profit and and the latter posting a 20 percent greater loss. Reorganizing GE has been Flannery's push since he was appointed chief executive last August. Shortly after taking the helm, Flannery pledged to shareholders that he would sell $20 billion in assets. He began April 2, selling GE's healthcare technology unit to private equity firm Veritas Capital for $1 billion in cash. Flannery then announced May 21 that GE would unload the bulk of its transportation business to Wabtec for $11.1 billion – a deal which included an upfront payment to GE of $2.9 billion in cash. GE sold its distributed power unit for $3.25 billion to buyout group Advent on June 25. The next day, Flannery announced the company was spinning off GE Healthcare and separating GE from its stake in oil services company Baker Hughes. GE has also now closed its $2.6 billion industrial solution unit sale to ABB, Flannery noted on Friday. "This essentially completes the announcement ... of our target of $20 billion of dispositions," Flannery said. The power business is the company's number one focus for the remainder of 2018, CFO Jamie Miller told CNBC after the report, reiterating Flannery's comments on the call. “Clearly our top priority is fixing the problems in the power business, " Flannery said. Power reported orders of of $7.4 billion, down 26 percent from a year ago. Revenues also declined 19 percent. Worst of all was the division's profit, down 58 percent from the same time last year. As it has before, GE said "softness" was the main culprit. “The short term cycle is severe, " Flannery said, adding that GE was "already working within the assumption of a very tough market.” Still, Flannery said GE's power unit is "an asset that is worth protecting." A turnaround in power is going "to be a multiyear fix," Flannery said. He told shareholders that GE sees "a very clear plan of what we need to do" in power, again emphasizing the company's focus on the business. Investors don’t seem to want to wait around, however, as GE stock dropped more than 4 percent in trading Friday, closing at $13.12 per share. "GE is only at the outset of a multi-year effort to improve its fundamental financial performance," Moody's Investors Service vice president Rene Lipsch said in a note. CFRA Research analysts expressed similar expectations, saying GE's turnaround will "take a long time to play out." GE Capital is the company's second battle after power. With $136 billion in assets, GE Capital produced a $206 million loss in the second quarter. GE is steadily decreasing the size of the business unit, planning to trim GE Capital assets by $25 billion before the end of 2019. Flannery says he is targeting GE Capital's earnings to "breakeven for the total year," after the unit reported a loss of 2 cents per share in the latest quarter. "We continue to take out structural costs" from GE Capital and "are on track to exceed our goal of $2 billion" by the end of the year, Flannery said. The risk of heavy penalties from the Department of Justice investigation of GE Capital continues to hang over the business. Miller said there was "really no change" in the second quarter from what GE has announced previously about the investigation. In the previous quarter, GE recorded reserves of $1.5 billion for potential liabilities from the DOJ investigation in connection with alleged subprime mortgage violations for GE Capital's now defunct WMC mortgage business.
NEWS-MULTISOURCE
Wikipedia:Articles for deletion/WXCU Radio The result was redirect to Capital University. (non-admin closure) - t • c 15:29, 25 July 2020 (UTC) WXCU Radio * – ( View AfD View log Stats ) Non-notable student radio station, does not meet WP:GNG and cannot be considered under WP:BCAST. Raymie (t • c) 07:45, 11 July 2020 (UTC) * Note: This discussion has been included in the list of Radio-related deletion discussions. Raymie (t • c) 07:45, 11 July 2020 (UTC) * Note: This discussion has been included in the list of Education-related deletion discussions. Raymie (t • c) 07:45, 11 July 2020 (UTC) * Note: This discussion has been included in the list of Schools-related deletion discussions. Raymie (t • c) 07:45, 11 July 2020 (UTC) * Note: This discussion has been included in the list of Ohio-related deletion discussions. Raymie (t • c) 07:45, 11 July 2020 (UTC) * Delete - I'm sorry, but this isn't a radio station, it's simply a student club that is FALSELY branding itself a radio station. Radio stations are notable due to the extensive paperwork required to have a broadcast license. Fails both WP:GNG and WP:ORG. Additional problem: simce the children behind this club have usurped a valid call sign to brand the little meaningless game they are playing, at some point, this title will be a legit radio station that has nothing whatsoever to do with this children's club. John from Idegon (talk) 17:55, 11 July 2020 (UTC) * Whether this is as it should be or not, we have no other word for internet radio stations to label them separately from terrestrial AM or FM radio stations. For an internet radio station to call itself a radio station isn't "false branding", it's just a different broadcasting platform. Bearcat (talk) 11:40, 18 July 2020 (UTC) Relisted to generate a more thorough discussion and clearer consensus. * Redirect: Let's keep the information (trim it down) and move it to the Capital University page. I think, since it does have 5 sources, it can be saved, but since it doesn't meet NMEDIA, redirect is the way to go. - Neutralhomer • Talk • 19:48 on July 11, 2020 (UTC) • #StayAtHome • #BlackLivesMatter * Update: There is a section on the Capital University page for the station itself. It needs a few sources. Add the 5 the article has and there ya go. :) Redirect complete. - Neutralhomer • Talk • 19:51 on July 11, 2020 (UTC) • #StayAtHome • #BlackLivesMatter * Redirect to Capital University: It's best to discuss the station in the target article. ASTIG😎 (ICE T • ICE CUBE) 16:00, 12 July 2020 (UTC) Please add new comments below this notice. Thanks, North America1000 09:44, 18 July 2020 (UTC) * Redirect to Capital University Devokewater @ 09:48, 18 July 2020 (UTC) * Redirect to Capital University. Internet radio stations aren't entitled to the same presumption of notability as terrestrial AM or FM radio stations, but the sources here are entirely primary sources and/or the student newspaper of the same university, which means they aren't getting this over WP:GNG. However, per WP:NMEDIA, student media which are deemed non-notable should be redirected to and discussed within the article on the university or college that they serve, rather than simply being deleted outright. Bearcat (talk) 11:40, 18 July 2020 (UTC)
WIKI
Talk:Dioxygenyl hexafluoroplatinate Dioxygen hexafluoroplatinate??? Is dioxygen hexafluoroplatinate a plausible misspelling of "dioxygenyl hexafluoroplatinate"? If not, that redirect will be a candidate for speedy deletion; if it is, then there is no reason to delete the redirect. Whoop whoop pull up Bitching Betty 00:11, 28 January 2012 (UTC)
WIKI
מלוכה Etymology Feminine passive participle of Noun * 1) Something ruled, that is, a realm: a kingdom, king's, X royal. * 2) royalty (e.g: the royal family and descent), the property of being a king or a queen, etc. Etymology From. Noun * 1) state, government
WIKI
Page:Tess of the D'Urbervilles (1891 Volume 2).pdf/257 The words of endearment, withheld so severely in his waking hours, were inexpressibly sweet to her forlorn and hungry heart. If it had been to save her weary life she would not, by moving or struggling, have put an end to the position she found herself in. Thus she lay in absolute stillness, scarcely venturing to breathe, and, wondering what he was going to do with her, suffered herself to be borne out upon the landing. ‘My wife—dead, dead!’ he said. He paused in his labours for a moment to lean with her against the bannister, over which her feet hung ominously. Was he going to throw her down? Self-solicitude was near extinction in her, and in the sickening knowledge that he had planned to depart on the morrow, possibly for always, she lay in his arms in this precarious position with a sense rather of luxury than of terror. If they could only fall together, and both be dashed to pieces, how fit, how desirable. She did not wish to save herself. However, he did not let her fall, but took advantage of the support of the handrail to imprint a kiss upon her lips—lips in the daytime scorned. Then he clasped her with a renewed
WIKI
Wikipedia:Articles for deletion/Thomas J. Wilson The result was k eep. - Mailer Diablo 10:39, 26 April 2007 (UTC) Thomas J. Wilson * – (View AfD) (View log) IMO fairly non-notable biography. Although it is sourced the source doesn't appear that useful. Do we need all the CEO's of every company there ever was?? Article created by single use account apparently for this purpose. I'm unsure whether it should stay or not so lets have the community decide :) Errant Tmorton166(Talk) 12:24, 21 April 2007 (UTC) * Unsure / Delete as per my nomination I don't know whether it should go or stay. I'd lean toward delete though. --Errant Tmorton166(Talk) 12:24, 21 April 2007 (UTC) * Keep WP:BIO well established. As CEO of a publicly traded company, he would have been the subject of numerous independent articles, press releases, etc... Google news comes up with several hits. --Infrangible 04:53, 22 April 2007 (UTC) * Keep WP:BLPs of CEOs of companies on NYSE are to be expected. John Vandenberg 07:09, 22 April 2007 (UTC) * Keep verging on speedy keep. Allstate is very notable so it's CEOs are as well. Plus Wikipedia has faced criticism, well earned criticism I might add, for doing poorly at covering the business world.--T. Anthony 04:33, 24 April 2007 (UTC)
WIKI
The Potential Divider ? Use a potential divider to get a fraction of an in Potential divider - circuit with voltage source and a couple resistors in series. P.d of voltage source is divided into ratio of resistances: V1 / V2 = R1 / R2 You can choose resistances to get desired voltage. V out = R2 / R1 + R2 X V in Circuit used for calibrating voltmeters, which have V. High resistance. Put something with relatively low resistance across R2- you start to have problems. Effectively got two resistors in parallel, which will always have a total resistance < R2. Meaning V out < you’ve calculated + depends on what’s connected across R2. 1 of 3 Add an LDR or thermistor for light or temperature V out varies with light or heat, you can make a potential divider that works as a light or heat sensor. Circuit needs to be calibrated to know how voltage across component and V out varies as external conditions change. 2 of 3 A potentiometer uses a variable resistor to give a Potentiometer has variable resistor replacing R1 + R2 but uses the same idea as a potential divider. Move a slider or turn a knob to adjust relative sizes of R1 + R2. You can vary V out from 0 V up to input voltage, V in. Handy when you want to change voltage continuously e.g. volume control of stereo. 3 of 3 Comments No comments have yet been made Similar Physics resources: See all Physics resources »See all Chapter 3: sensing resources »
ESSENTIALAI-STEM
Page:God Manifest.djvu/142 132 through the bodily frame. Thus the spirit of man is perceived to be within the material body. But to descend, now, to the lower animals. They also have a kind of soul or spiritual principle, though not, indeed, like man's, immortal. For they possess instinct, and a certain kind of perception, though limited in its range; they have feelings of pain and pleasure; they are affected with attachment and aversion, and anger, and other passions. Now these are attributes of spirit; for they certainly do not belong to mere matter, which is a thing of itself entirely unconscious and inanimate. Here, then, we have a second portion of a spiritual world, present within the material. But still further, and descending still lower, there is what is termed the "vegetative soul"—that principle which gives life to all the vegetable creation. This is indeed neither an immortal nor a conscious principle, yet it is certainly a living one, and therefore must belong to the world of spirit, taking the term in its most extensive sense. For observe, there are but two kinds of created existence, spirit and matter: all things must belong either to the one or the other. Now, life is not properly an attribute of matter: if it were, then, wherever there were matter, there would also be life. But this is not the case. We may see dead trees standing side by side with living ones, of the same genus and species: thus showing clearly that it is not to matter itself, or any particular form or arrangement of the particles of matter, that life belongs, but to something distinct from either. In the one case the "vegetative soul" is present, in the other it is absent: therefore the one tree is living, and the other dead. Since, therefore, the living principle does not belong to
WIKI
Caregiving and dementia/Topics/Diagnosing dementia This NPA focuses on diagnosing dementia and planning for the future with people who have dementia. Overview In surveys conducted by the SA & NT Dementia Training Study Centre (Dementia Needs Analysis 2008 and Training Needs Analysis 2010), people with dementia have spoken of issues concerning gaining a timely diagnosis and information from their local general practitioner (GP). Research shows that GPs are often reluctant to diagnose dementia for a variety of reasons including a fear of damaging their relationship with the person and the belief that there is no curative treatment option yet available. This project will therefore address several issues: GP attitudes, diagnostic tools, time taken for diagnosis, effectiveness of drug treatments, symptoms of dementia, and issues concerning diagnosis of younger people. Individuals who have concerns about their memory are likely to visit their GP (Quality Dementia Care: No time like the present: the importance of timely diagnosis, September 2010) and evidence from a variety of research indicates that most people who have concerns about their memory believe early intervention is necessary – particularly in order for them to properly plan their finances, lives and future care arrangements. However successful early and timely diagnosis of dementia is more infrequent than it is common place. In Australia, families first notice symptoms of dementia an average of 1.9 years before the first health professional consultation and there was an average of 3.1 years before a firm diagnosis was made, which was consistent with other overseas studies. The consequence of this delay is a lost opportunity for earlier medical and social interventions for those suffering dementia and their families (Quality Dementia Care: No time like the present: the importance of a timely dementia diagnosis) A number of barriers to timely diagnosis have been identified; particularly by Paterson and Pond who proposed the following key barriers: * GPs lack confidence or training in diagnosing dementia. GPs were found to have difficulty in differentiating normal ageing from dementia and did not perceive a need to determine a specific diagnosis. * A scarcity of specialist diagnostic services, particularly in rural areas combined with the patient’s impaired ability which reduces the accuracy of patient history and a lack of a recognised quick-to-administer screening tool * Negative attitude to dementia. There is a stigma associated with dementia that also encompasses doubts about the patient’s ability to cope with a diagnosis and the efficacy of medications. Furthermore, GPs perceptions of the barriers to a timely diagnosis of dementia have also been investigated by Paterson and Pond who highlighted that GP’s do rely upon patients to alert them to specific concerns or issues and this can delay diagnosis as people with dementia can lack insight into the problems they are experiencing. The research also indicated that GP’s may also become used to treating existing illnesses and are not always on the look out for emerging pathology. Assessment of Dementia is more than Diagnosis View this lecture here.… 22 November 2011 Professor Henry Brodaty University of New South Wales 1 hour 28 minutes 45 seconds After Diagnosis, Planning Ahead What is Advance Care Planning? According to the Advance Care Directive Association Inc it means thinking about, discussing and writing down your wish for care or treatment if at a future time you are unable to speak for yourself because of illness or injury. Advance Care Planning is not just for people with a diagnosis of dementia, it is useful for everyone. People with dementia or other chronic illness are especially well-served by making their wishes for treatment known to family or carers and formalising this with a Power of Attorney document and an Advance Health Directive. It is important to give attention to these matters before the person loses the capacity to make these decisions, as legally they cannot appoint an attorney after they lose capacity. There is some lively debate about the amount of decisional capacity a person retains well into the dementia journey, particularly if matters are explained carefully and they are able to demonstrate awareness of the consequences of their decision. At any rate, to reduce stress and conflicts, it is wise to settle these matters when a person is sound of mind. An Enduring Power of Attorney is a legal document used to give permission to someone to conduct business or financial affairs on behalf of another person. An Advance Health Directive is a legal document that enables an individual to give instructions about their healthcare, including special health matters, should they lose capacity to make their own decisions in these matters. Specific directions can be recorded about the care they would want and under what circumstances. Advance Care Planning * 1) Advance Care Directive Association Inc. website http://www.advancecaredirectives.org.au/ accessed on 15 January 2013 * 2) Queensland Health Advance Care Planning website http://apps.health.qld.gov.au/acp/HOME.aspx accessed on 15 January 2013
WIKI
Articulations Flashcards Preview Anatomy > Articulations > Flashcards Flashcards in Articulations Deck (40): 0 Bony joints Complete bone fusion 1 Ex of bony joint Metopic suture 2 Fibrous joint Held together by collagen fibers 3 Cartilaginous Similar to hyaline, but contains water 4 Synovial Has articulated capsule and fluid 5 Synarthrosis Immovable joint 6 Ex of synarthrosis Sutures Gomphoses Synchondroses Synostoses 7 Sutures Found in the skull 8 Gomphoses Teeth articulate to jaw bones 9 Synchondroses Epiphyseal plates, rib 1 to sternum 10 Synostoses Metopic suture 11 Ampiarthrosis Slightly moveable 12 Syndesmoses Distal tib/fib 13 Sympyses Pubic bones, between centra of vertebrae 14 Ampiarthrosis examples Syndesmoses and symphyses 15 Diarthrosis Highly moveable; weak joints 16 What are the 6 Diarhrosis joints Gliding, hinge, pivot, ellipsodial, saddle, and ball and socket 17 Ex of gliding joints Between articulate processes of vertebrae, intercarpal, intertarsal 18 Ex of hinge joint Elbow, knee, interphalangeal 19 Pivot joint Alanto-Axial, proximal radioulnar 20 Ellipsodial joints Radiocarpal, metatarsalphalangeal, metacarpal phalanges 21 Saddle examples Carpometacarpal 22 Ball and socket Glenohumeral, coxal 23 Articular capsule Has a synovial membrane and synovial fluid 24 Synovial membrane Connective tissue 25 Synovial fluid Cells of the membrane make this 26 Accessory structures of synovial joint 1. Menisci and fat pads 2.ligaments 27 Meniscus Fibrocartilage, channels fluid within the joint, like a sponge, shock absorber 28 Fat pad Fills space when bones move apart, insulated, prevents injury 29 Intrinsic ligaments Inside the capsule 30 Extrinsic ligament Outside of the capsule 31 Sprain Portion of lig. Torn, but entire joint maintains integrity 32 Bursa Fluid filled pockets, form where tendons/lig. Rub against other tissues 33 Bunion Most common form of bursitis, great toe, also "housemaid's knee" or "student elbow" 34 Luxation or dislocation Complete slippage of bone out of joint 35 Subluxation Partial slippage of bone out of joint 36 Ankylosis Complete bony fusion of the joints due to fibroblast activity 37 Rheumatoid arthritis Autoimmune disease, inflammation of capsule 38 Osteoarthritis Ages 60+, wear and tear of articulate cartilage cause thickening of capsule 39 Gouty arthritis Crystals form in synovial fluid, usually calcium salts
ESSENTIALAI-STEM
Causality And Quantum Physics Quantum violation of causal order As long as only the laws of classical physics are allowed, the order of events is fixed: either Bob or Alice is first to enter the room and leave a message for the. On the one hand, these quantum correlations cannot, in any way, be explained by models of classical physics. On the other hand. excluded by quantum mechanics violate relativistic causality—the. Dec 28, 2018  · Quantum optics is a branch of quantum physics that focuses primarily on the behavior of light, or photons. At the level of quantum optics, the behavior of individual photons has a bearing on the outcoming light, as opposed to classical optics, which was developed by Sir Isaac Newton. Quantum Physics. Title: Causality and quantum theory. Authors: Blake K Winter (Submitted on 19 May 2017) Abstract: We begin with a brief summary of issues encountered involving causality in quantum theory, placing careful emphasis on the assumptions involved in results such as the EPR paradox and Bell’s inequality. We critique some solutions to. Dec 28, 2018  · Quantum optics is a branch of quantum physics that focuses primarily on the behavior of light, or photons. At the level of quantum optics, the behavior of individual photons has a bearing on the outcoming light, as opposed to classical optics, which was developed by Sir Isaac Newton. Buy Quantum Physics of Time Travel: Relativity, Space Time, Black Holes, Worm Holes, Retro-Causality, Paradoxes on Amazon.com FREE SHIPPING on qualified orders Bohm’s ontological interpretation of quantum physics rejects the assumption that the wave function gives the most complete description of reality possible, and thereby avoids the need to introduce the ill-defined and unsatisfactory notion of wave-function collapse (and all the paradoxes that go with it). Quantum Physics on Indefinite Causal Structures Artistic view of indefinite causal order (J. Schmöle). One of the most fundamental concepts in science is that of causality; the idea that events in the present are caused by events in the past and, in turns, act as causes for events in the future. It had a profound impact on classical physics. character of quantum theory and the imprecision of all perception, it is possible to suggest that behind the statistical universe of perception, there. Another physicist who discussed causation in detail was Bohm, especially in Causality and Chance in Modern Physics (Bohm 1957). He took a more radical stance than Heisenberg and argued that not only is there no causal necessity to be found in quantum physics; there is no causal. This “causal asymmetry” makes it easier to determine cause and effect and thus place events in order. But it doesn’t exist in the quantum world, say Mile Gu at Nanyang. First ever picture of a black. Almanac Of Higher Education In 1833, Oberlin College in Ohio — the first truly coeducational school of higher learning in the United States — began holding classes. In 1926, English mystery writer Agatha Christie, 36, The residential market is expected to offer the best growth opportunities for the country’s window and door producers, due to a combination of favorable In quantum physics this is called a "superposition." But now Brukner and his team say that even the causal order of events could be in such a superposition. "If – in our example – Alice and Bob have a. Physicists call this causality, and it’s one of the rare physics ideas that. this measurement describes a troubling truth about quantum physics: it is fundamentally a non-local theory. There are. Recently, investigations into the role that quantum mechanics plays in causality, have intensified. Quantum theory contains a catalogue of surprising and counter-intuitive properties, and as such one can imagine far more exotic causal structures occurring in the formalism, such as superposition of causal. That’s the set order. Not so in quantum physics, Romero said. “In our experiment, both of these events can happen first," she said. "This is called ‘indefinite causal order’ and it isn’t something. Jun 10, 2014  · It depends on what you mean by causality. A philosophically-informed physicist would say Quantum Mechanics (QM) doesn’t do away with causality: “In fact, QFT[Quantum Field Theory] is constructed in such a way to explicitly preserve causality. Jun 10, 2014  · It depends on what you mean by causality. A philosophically-informed physicist would say Quantum Mechanics (QM) doesn’t do away with causality: “In fact, QFT[Quantum Field Theory] is constructed in such a way to explicitly preserve causality. Quantum mechanics wreaks even more havoc with conventional ideas of causality than some have suspected – according to a team of researchers based in Australia, with collaborators in Scotland and. What Is Thesis Statement Example The student was given some examples to help craft the essay portion of the assignment. "I noticed she was having trouble on the essay part and I was reading [the instructions] and it had this model. Generate a strong thesis statement with our application. Body Paragraph #1 of the body thesis: Find evidence – like Quantum Physics on Indefinite Causal Structures Artistic view of indefinite causal order (J. Schmöle). One of the most fundamental concepts in science is that of causality; the idea that events in the present are caused by events in the past and, in turns, act as causes for events in the future. Bohm’s ontological interpretation of quantum physics rejects the assumption that the wave function gives the most complete description of reality possible, and thereby avoids the need to introduce the ill-defined and unsatisfactory notion of wave-function collapse (and all the paradoxes that go with it). Mar 20, 2017  · Causality and Quantum Mechanics: a Cosmological Kalamity (Part 2 of 2) This is the second in a two-part series of posts about the Kalam Cosmological Argument for the existence of God. If you haven’t read the first part you should probably do that first, notwithstanding that I’m going to start with a. The New School Associate Adjunct Professor MUSIC PERFORMANCE. Brass Tom Curry Adjunct Professor of Tuba and Euphonium Daniel Grabois Associate Professor of Horn Mark Hetzler Professor of Trombone Jean Laurenz Adjunct Professor of Trumpet. Jazz. Matthew Endres Adjunct Professor of Jazz Drums & Jazz History Russ Johnson, Interim Associate Professor of Jazz Trumpet Nick Moran, Jazz Bass Instructor Louka Patenaude, Jazz. In physics, this idea is called the Many Worlds Theory. Quantum mechanics is mentioned. of killing their grandfather, breaking the causality loop. This has been simulated successfully. Oct 02, 2007  · Abstract: The conceptual definition and understanding of the nature of time, both qualitatively and quantitatively is of the utmost difficulty and importance, and plays a fundamental role in physics. Physical systems seem to evolve in paths of increasing entropy and of complexity, and thus, the arrow of time shall be explored in the context of thermodynamic irreversibility and quantum physics. These words you are reading right now had to be written before you could read them. This might seem like a fairly straightforward and safe assumption to make, given that what we know about the. Jan 16, 2015  · But the big hurdle for most people to get over is the rejection of causality. I don’t really get that, because all quantum processes seem largely random anyway. No root cause has ever been found for any probabilistic behavior, why wouldn’t you reject causality out of hand? Especially if it makes all the pieces fit together. Aug 18, 2016  · Quantum mechanics wreaks even more havoc with conventional ideas of causality than some have suspected – according to a team of researchers based in Australia, with collaborators in Scotland and Germany. They have shown that even allowing causality to be nonlocal –. Now theoretical physicists at the Université libre de Bruxelles have developed a fully time-symmetric formulation of quantum theory. causality need not be considered a fundamental principle of. Dr Jacqui Romero from the ARC Centre of Excellence for Engineered Quantum Systems said that in quantum physics, cause-and-effect is not. "This is called `indefinite causal order’ and it isn’t. Recently, investigations into the role that quantum mechanics plays in causality, have intensified. Quantum theory contains a catalogue of surprising and counter-intuitive properties, and as such one can imagine far more exotic causal structures occurring in the formalism, such as superposition of causal. Causality, Hume, and Quantum Mechanics. to take the work of David Hume and reapply it to causality using quantum mechanical theory. Introduction Quantum mechanics or also known as quantum physics is a field of science which studies the behaviour of particles at sub-atomic level. This theory tells us that short-lived pairs of particles. Jacques Pienaar is a postdoctoral researcher at the International Institute of Physics in Natal, Brazil. He received his Ph.D. from the University of Queensland, Australia, for the thesis "Causality. Quantum Physics. Title: Causality and quantum theory. Authors: Blake K Winter (Submitted on 19 May 2017) Abstract: We begin with a brief summary of issues encountered involving causality in quantum theory, placing careful emphasis on the assumptions involved in results such as the EPR paradox and Bell’s inequality. We critique some solutions to. Other teams have also been creating experimental cases of causal ambiguity by using quantum optics. For example, a group at the University of Waterloo in Canada and the nearby Perimeter Institute for. A deeply rooted concept in everyday life is causality. from the Quantum Optics, Quantum Nanophysics, Quantum Information group of the University of Vienna. University of Vienna. (2012, October 2). Ancient Philosopher Who Asked Why Philosophical Writing An Introduction Anita Silvers, a philosophy professor who was a leading voice in the interpretation. She was concerned about the way the act was being interpreted in legal rulings, and although most of her writing. Elway jokingly dubbed it "the most irrelevant press conference of the year," but actually provided some morsels on
ESSENTIALAI-STEM
Another Chance (film) Another Chance is a 1989 film co-written and directed by Jesse Vint and starring Bruce Greenwood and Vanessa Angel. Premise A womanizing soap opera star John Ripley meets the beautiful Jackie. She is a client of his agent and best friend Russ Wilder. After enjoying a great relationship with her, he cheats and then realizes that he hits rock bottom. He then tries to get back what he lost.
WIKI
James U. Goodman James U. Goodman (May 11, 1872 – June 7, 1953) was an American farmer, teacher, businessman and politician. Goodman was born in Jo Daviess County, Illinois and went to public schools. He taught in schools and was a farmer. Goodman was in the real estate business and was an auctioneer. Goodman was also President of the Argyle Equity Shipping Association. Goodman served as chairman, clerk, and supervisor for the town of Lamont, Lafayette County, Wisconsin. He also served as chairman of the Argyle Town Board in Lafayette County. Goodman served in the Wisconsin State Assembly from 1921 to 1927 and was a Republican. Goodman died at St. Clare Hospital in Monroe, Wisconsin after a short illness.
WIKI
More Women Than Men Struggle To Fall Asleep In Both Europe And The US, Study Finds – CBS Baltimore (CNN) If tossing and turning in bed most nights was a contest on crummy sleep, women win. A new study comparing poor sleep among more than a million adults and children in the United Kingdom, the Netherlands and the United States found women experience more insomnia problems than men in all three countries. The trend emerges during puberty, suggesting sex hormones, among other social factors such as stress or parenting, might contribute to the development of insomnia in women, according to the study published Monday in the journal Nature Human Behavior. Women also use more sleep medications than men, the study found. Yet despite the female struggle to fall asleep and use of sleep aids, women didn't report more daytime sleepiness. The results suggest that recommendations for appropriate sleep duration and quality should be sex-specific, the study said. Another booby prize went to Americans they were 1.5 to 2.9 times more likely to have insomnia than their counterparts in the UK and the Netherlands. Across all three nations, insomnia was more frequent in people spending more than nine hours a night in bed and adults 65 years and older. Adults between 26 years and 40 years of age were the least likely to toss and turn trying to fall asleep. Besides women, smokers, people who are overweight and people of non-European origin were most likely to experiencing poor sleep, the study found. Other worrisome findings: More than half of kids between the ages of 14 and 17 reported sleeping less than the doctor-recommended eight to 10 hours per night. Teenagers were also most likely to report sleepiness than other age groups. Symptoms of insomnia, such as difficulty falling and staying asleep, increased as children grew. On the whole, poor sleep quality and insomnia problems were more prevalent than short sleep duration for all three nations. The study compared sleep studies on 1.1 million people from the US, the UK and the Netherlands. The study was not able to compare sleep quality to health conditions that might affect sleep, such as sleep apnea, substance abuse and other chronic medical conditions. While some of the research was done in sleep labs using objective measurements, most relied on what people said about their sleep habits and quality. Such research isn't as robust, the authors said, but the size and scope of the research does give doctors insights into daily functioning. Fight back against insomnia and other sleep issues by adopting some tried-and-true healthy sleep habits. The-CNN-Wire™ & 2020 Cable News Network, Inc., a WarnerMedia Company. All rights reserved.
NEWS-MULTISOURCE
Mizuki Ichimaru Mizuki Ichimaru (市丸 瑞希) is a Japanese footballer who plays as a central midfielder for FC SONHO Kawanishi. Club career Born and raised in Osaka, Ichimaru came through the youth ranks at Gamba Osaka and earned his first professional contract ahead of the 2016 season. He didn't see any game time for Gamba's first team in J1 League, however he made 21 appearances for Gamba Osaka in J3 League to help them to a 9th place finish in the final table. 2017 saw him make his J1 debut in a 2-0 home defeat to Júbilo Iwata on 13 August 2017. He started the match in central midfield and was subbed by Shun Nagasawa after 76 minutes. That was to be his only league appearance that year and coupled with 3 matches in the cups, he played a total of 4 games in 2017. In 2018 he started the first four matches of the season under new head coach Levir Culpi before injury forced him to take a spell on the sidelines and he was unable to regain his place under new manager Tsuneyasu Miyamoto, who replaced Culpi halfway through the year. He found himself spending most of the rest of 2018 playing once again for Gamba U-23 in J3 where he made 20 appearances to help them to 6th in the final standings. At the end of the 2022 season after making only four appearances for Kantō Soccer League club Vonds Ichihara, Ichimaru announced his retirement aged 25. However, his retirement was short-lived as only two weeks later it was announced that he would be joining FC SONHO Kawanishi. National team career In May 2017, Ichimaru was elected Japan U-20 national team for 2017 U-20 World Cup. At this tournament, he played 3 matches as defensive midfielder. Club statistics Last update: 1 May 2019
WIKI
Topic IC4NOTICE: developerWorks Community will be offline May 29-30, 2015 while we upgrade to the latest version of IBM Connections. For more information, read our upgrade FAQ. 5 replies Latest Post - ‏2014-02-28T12:38:51Z by smithha HishamZz HishamZz 4 Posts ACCEPTED ANSWER Pinned topic Issue with in_reference_list function ‏2014-02-21T10:58:11Z | Hi Guys,   Faced with a small predicament for which I am unable to deduce what could be the proper solution. I have this simple rule :- source_column in_reference_list reflist reflist is a placeholder for the reference values which needs to be bound to a data rule at the time of its generation. In other words, the rule definition just has a placeholder for the list of reference values rather than the values themselves.    When generating the data rule from the above rule definition, I bind the column and bind the string value 'A','B','C' to reflist.  Running the rule however results in 100% mismatch though it should be a 100% match. Looking at the output table, it shows that its trying to compare the value 'A','B','C' with the values in the column and not A, or individually. Any idea what I might be doing wrong here? Would appreciate your response :)   Hish • RobertDickson RobertDickson 72 Posts ACCEPTED ANSWER Re: Issue with in_reference_list function ‏2014-02-23T21:17:33Z  in response to HishamZz I do not think you can bind to the reference data when using in_reference_list.  Try entering 'A','B','C' as the reference data. It will end up showing as {'A','B','C'} in the Data Rule Definition. Regards, Robert • HishamZz HishamZz 4 Posts ACCEPTED ANSWER Re: Issue with in_reference_list function ‏2014-02-24T07:53:29Z  in response to RobertDickson Thanks for your reply Robert.   I was actually hoping that the reference data can actually be given at the time of rule generation as when creating the rule data definition it did not throw errors when given a placeholder.  If this is not allowed, we would need to have multiple rule definitions for separate data quality rules of similar nature. Is this a limitation of the tool by itself?   Hisham • smithha smithha 162 Posts ACCEPTED ANSWER Re: Issue with in_reference_list function ‏2014-02-24T13:41:08Z  in response to HishamZz The IN_REFERENCE_LIST evaluates a set of one or more values - the syntax structure for the reference values is { x , y , ... } The values can be input as literals or can be a variable.  The following are valid examples: field1 IN_REFERENCE_LIST { 'A', 'B', 'C' } field1 IN_REFERENCE_LIST { A, B, C } In the first case, the values are string literals in the rule definition and are set when the data rule is generated. In the second case, the values are variables and can be bound when the data rule is generated.  But you must bind each variable A, B, C  and you must set them to a specific string value.  What you can't do is include a single variable A and bind it to a variable number of values.  Whatever you input for a variable is a single string - there is no parsing done.  If you really want to bind to a variable set of values, you need to put them in a file or table and use the IN_REFERENCE_COLUMN syntax. Harald • HishamZz HishamZz 4 Posts ACCEPTED ANSWER Re: Issue with in_reference_list function ‏2014-02-28T09:22:53Z  in response to smithha Thanks for your response Robert/Smitha. It was really interesting to understand how exactly IA parses this. It is a pity though that all this is not documented :(   Thanks again! Hish • smithha smithha 162 Posts ACCEPTED ANSWER Re: Issue with in_reference_list function ‏2014-02-28T12:38:51Z  in response to HishamZz I'll pass the note on to the documentation team and see if we can add it there. Harald
ESSENTIALAI-STEM
Wikisource:Maintenance/Tasks/Language Basic These tasks are relatively straight-forward and should not take too long to complete if you are familiar with the language concerned. Scripts These tasks relate characters or passages that are not in the Latin script (the writing system based on the letters of the classical Latin alphabet; for example: English and many other European languages). Language These tasks relate to words or passages in the Latin script but not in the English language. Advanced These tasks will take more time to complete in full.
WIKI
Working with Objects Top  Previous  Next When working within FreeFlyer, you will create both objects and commands.   Objects represent both physical objects, such as a Spacecraft or Groundstation, as well as processes, such as a FiniteBurn or OrbitDetermination. Commands allow you to perform actions on the objects you have created. You might use the Step command to propagate a spacecraft state, or use the View command to create a 3D visualization of your simulation.   Some facts about objects:   Every FreeFlyer Mission Plan contains objects. Each instance of an object is defined with a unique name. Most objects can be created and edited through Object Editors and FreeForm Script Editors. Each object instance can be manipulated through the use of properties, methods, and commands within the Mission Sequence to generate output.   This guide covers the following topics:   Object Constructors - Discusses the creation of objects in FreeFlyer. Some of FreeFlyer's more complex objects may require input arguments. Constant and Global Keywords - Objects can be declared as Global to make them available to any Procedures that may be called. Type Casting - Allows you to work with base type objects, which provide sets of commonly needed properties to other objects.     Object Constructors In order to create a basic object within a FreeForm Script Editor, the simple <Object Type> <Object Name> format, or "constructor", is used, as shown here:   Variable Variable1;   However, to create some of FreeFlyer's more complex objects, you may want to specify input arguments when creating the object. The constructor format for creating an object using input arguments is <Object Type> <Object Name>(Input1, Input2, ...). For example:   Spacecraft Spacecraft1(Propagator1, AttitudeEphemeris1);   ViewWindow ViewWindow1({Spacecraft1, GroundStation1, Formation1});   Custom descriptions of objects can be created using the following syntax. The custom description will show up in the tooltip mouse-over.   Spacecraft Spacecraft1; /// estimated Spacecraft     For a complete list of objects with constructors that have input arguments, see the List of Object Constructors in the Appendix.     Constant and Global Keywords FreeFlyer supports constant Variables and Strings. The value of a String or Variable that is created using the Constant keyword can not be changed later in the Mission Plan. The value of the Variable or String is assigned in-line with the creation of the object, as seen in the examples below.   Constant Variable PI = 3.14159265; Constant String String1 = "FreeFlyer";   FreeFlyer also supports global objects, which can be accessed from a Procedure without having to be included in the list of arguments passed to the Procedure. An object that is declared as Global is available in all Procedures that are called from the scope in which the Global Object is defined.   Global Variable MU = 398600.4415; Global String String2 = "FreeFlyer Mission Plan";   The Global and Constant keywords can be used in conjunction. To specify a Variable or String as a Global Constant, the Global identifier must be declared before the Constant identifier, as seen in the example below.   Global Constant Variable MU = 398600.4415;   Global Objects in Procedures The example below demonstrates how Global objects can be accessed in Procedures without being passed in as input arguments to the Procedure. If an object is not Global, it must be passed as an argument in order to be accessible within a Procedure.   In the Mission Plan:   Global Variable Variable1; Global Array Array1[3];   Include "Procedure1.FFProcedure";   // Global objects do not need to be passed as arguments Call Procedure1(Spacecraft1);   In the Procedure:   // Global objects are automatically accessible within the Procedure Define Procedure Procedure1(Spacecraft Spacecraft1);      Array1[0] = Spacecraft1.A + Variable1;      //...      //... EndProcedure;   Note: Procedures referring to Global Objects will only work with Mission Plans that contain the required global objects.   Always Available Global Object Instances Global instances of the following objects exist in every Mission Plan. With the exception of the ConsoleWindow object and StarField object, these objects are not creatable by the user. In the case of the ConsoleWindow and StarField objects, the user can create any number of ConsoleWindows or StarFields in addition to the built-in global instances. Through these objects, you can edit FreeFlyer properties relating to display, data files, and more. The following table lists the global object types and their instance names.   Global Type Global Instance Name Additional Information ConsoleWindow Console ConsoleWindow ColorUtilities ColorTools Color Reference DebuggerLogWindow DebuggerLog Using the Debugger OutputLayoutManager OutputLayout Output Layout Control Preferences FF_Preferences FreeFlyer Configuration SolarSystem FF_SolarSystem Solar System StarField Stars Stars TimeUtilities TimeTools Parsing Dates and Times   Examples of editing these objects through script are given below.   // Set the Console color using the ColorTools object, and show the Console Console.BackColor = ColorTools.Black; Console.Show();   // Reporting to the Debugger Log Window Report mySpacecraft.A to DebuggerLog;   // Editing FF Preferences FF_Preferences.RecordUIResponses = 1; FF_Preferences.UIOutputResponsesFilename = "UserInterfaceResponses.txt";   // Editing the FF Solar System FF_SolarSystem.ComputePolarMotion = 1; FF_SolarSystem.DefaultSGFFile = "groundstations.dat";   // Accessing the built-in Stars Report Stars.CatalogFilename, Stars.Count;     Type Casting Many of the object types in FreeFlyer are base types, which can refer to several different object types when used in FreeForm script. For example, a Spacecraft's Propagator could be a Two-Body, Runge-Kutta, Ephemeris, or any other type of propagator. The AsType, IsType, and TypeOf operators allow users to interact with base types, as shown in the examples below.   While we will use the "Propagator" example to illustrate how to work with base types and the type casting operators, these concepts also apply to other object types.   Base Types FreeFlyer base object types provide sets of commonly needed properties to other objects. An object type that derives from a base type will inherit all the properties and methods of its base object type(s). For example, at the highest level, the Object base type provides a property called "ObjectId" to all objects. The inheritance tree for all the FreeFlyer objects and base types is given on the Object Hierarchy page.   Instances of base object types can not be created via the Object Browser or through FreeFlyer script, but they can be passed to a Procedure. In the following example, a Procedure called "PropType" receives a Propagator base object from a Mission Plan, and assigns a tolerance to the Propagator based on its sub-type. In this example, only two possible types are called out: RK45 and RK89. If the Propagator were a different type, its tolerance would not be changed by this script. This example uses the TypeOf, IsType, and AsType operators, which are discussed in further detail below.   Define Procedure SetTolerance(Propagator prop);        If (prop IsType RK45);            (prop AsType RK45).Tolerance = 2.0e-9;      End;        If (prop IsType RK89);            (prop AsType RK89).Tolerance = 1.0e-9;      End;   EndProcedure;     Spacecraft Spacecraft1;   // Set up Spacecraft1 to use a RK45 propagator Spacecraft1.SetPropagatorType(TypeOf(RK45));   // The propagator's tolerance will be set to 2.0e-9 Call SetTolerance(Spacecraft1.Propagator);   TypeOf Operator The TypeOf operator can be used to convert any type in FreeFlyer script into a string containing the name of that type. This allows you to use the autocomplete menu when typing the object type, and helps avoid runtime errors due to typos.   For example, the Spacecraft.SetPropagatorType method expects a string as input. The TypeOf operator can be used to convert a Propagator Type, such as RK45, to string format for use with this method, as demonstrated in the example above. This operator can be used with any object type:   Report TypeOf(Spacecraft), TypeOf(SphericalTank), TypeOf(SpiceEphemeris);   Output report:   "Spacecraft" "SphericalTank" "SpiceEphemeris"   IsType Operator The IsType operator can be used to determine the type of an object in FreeForm script. This operator returns a 1 or 0, depending on whether the condition is true or false, making it useful when working with the If and While statements. This can be useful when the type of an object is unknown, perhaps because it has been passed into a generic Procedure which is used by multiple Mission Plans. The example below demonstrates using the IsType Operator to check whether a Spacecraft is being propagated with an Ephemeris.   If (Spacecraft1.Propagator IsType Ephemeris);  Report "Spacecraft is using an ephemeris for propagation"; Else;  Report "Spacecraft is not using an ephemeris for propagation"; End;   AsType Operator The AsType operator can be used to cast an object to the desired object type in order to access properties that are only available at the sub-type level. This is especially useful when an object has been passed to a Procedure as a base type or when the object type has been set in script.   While we have thus far used the "Propagator" example to illustrate these type casting operators, the concepts also apply to other object types:   Example: Tanks   (Spacecraft1.Tanks[0] AsType SphericalTank).TankMass = 500; (Spacecraft1.Tanks[0] AsType ElectricalTank).TankPower = 0.1;   Example: Burns   Define Procedure SetBurn(Burn burn1);    If (burn1 IsType FiniteBurn);          (burn1 AsType FiniteBurn).BurnDuration = TIMESPAN(100 seconds);  ElseIf (burn1 IsType ImpulsiveBurn);          (burn1 AsType ImpulsiveBurn).BurnDirection = {2, 0, 0};  End;   EndProcedure;   The inheritance tree for all the FreeFlyer objects and base types, which shows all the objects that can be cast to other object types, is given on the Object Hierarchy page.   See Also Using Procedures Properties and Methods with a State Structs Object Presets
ESSENTIALAI-STEM
UNITED STATES of America, Plaintiff-Appellee, v. Henry Floyd BOX, Defendant-Appellant. No. 74-4195. United States Court of Appeals, Fifth Circuit. May 3, 1976. James J. Thornton, Jr., R. Perry Prin-gle, Shreveport, La., for defendant-appellant. Donald E. Walter, U. S. Atty., N. Graves Thomas, David R. Lestage, Asst. U. S. Attys., Shreveport, La., for plaintiff-appellee. Before BROWN, Chief Judge, and GOLDBERG and RONEY, Circuit Judges. GOLDBERG, Circuit Judge: Henry Floyd “Red” Box was convicted by a jury of violating 18 U.S.C. § 1955, the federal antigambling statute. On appeal, Box argues that the evidence was insufficient to support this verdict. We agree and therefore reverse the conviction. Federal agents conducted an extensive investigation of several bookmaking operations in the Shreveport-Bossier City area during the 1973 football season, culminating in simultaneous raids on the last day of the season. A one-count indictment filed on April 25, 1974, charged appellant Box and ten other persons with the operation of an illegal gambling business in violation of 18 U.S.C. § 1955. The indictment named three unindicted principals as having been involved in the same illegal gambling business. One of the defendants was granted a continuance and severance, due to the death of his counsel. Six others entered pleas of nolo contendere or guilty prior to trial. Trial of the four remaining defendants began on September 30, 1974. The guilty plea of one of these was accepted on October 4, 1974. Later the same day the jury returned a verdict of guilty as to Box and the other two. Only Box has appealed. Our review of the evidence and application of the law in this case require an understanding of the general nature of a bookmaking operation, and so we preface our consideration of the issues here with a very brief summary on that subject. THE NATURE OF A BOOKMAKING OPERATION This section might be subtitled, “How to Succeed in Gambling Without Really Gambling,” because a successful bookmaker makes his profit not from winning bets, but rather from collecting a certain percentage of the amount bet that losing bettors are required to pay for the privilege of betting. This percentage, 10% in the Shreveport area, is called “juice” or “viggerish,” and its effect is to require a bettor to risk $110 in an attempt to win $100. So that betting odds can remain even on each game, a bookmaker normally has a “line” — on each game on which he is taking bets, one team will be favored by a certain number of points, called the “point spread.” In an ideal situation, a bookmaker would have bets from bettors exactly balanced on each contest, so that no matter which team “wins” (read: beats the point spread), the bookmaker is assured a definite percentage of the amount bet. That is, he would collect 110% of the amount he would be required to pay. With a multitude of bets each week, this ideal of perfectly balanced books cannot be achieved. When the bets placed with a bookmaker on a certain contest become very unbalanced on one side, however, there are certain measures the bookmaker might take to lessen the incumbent risk. He can refuse to take further bets on that side, hoping enough bets will be placed on the other side to effect some rough balance. Alternatively, he can adjust his “line” on the contest, thus making the underbet side more attractive. Another common solution to the bookmaker’s problem of grossly unbalanced bets on a game is the “lay off” bet. By this device, a bookmaker whose customers had bet $10,000 on Dallas + 6 and only $6000 on Pittsburg —6 would himself seek to make a $4000 bet on Dallas + 6 with another individual. This bet would have the effect of “laying off” $4000 of the $10,000 the bookmaker’s customers had bet on Dallas, leaving the bookmaker in the net position of having $6000 bet with him on each side. Normally, the bookmaker would look to another bookmaker to make this bet, and would be required to give up the same favorable 11 to 10 odds which he had received from the Dallas bettors. Indeed, several cases dealing with § 1955 have in dicta defined a lay off bet as a “bet between bookmakers.” It seems clear, however, that the individual accepting a lay off bet from a bookmaker need not be another bookmaker. That individual could be part of a professional “lay off” operation, an organization dealing only with bookmakers rather than with retail customers, and having sufficient capital so that risk-taking at 11 to 10 odds posed little problem.. On the other hand, the individual could be a mere bettor who wanted to bet $4000 on Dallas + 6, but was told by his bookmaker that no more such bets were being taken and was invited by the bookmaker to accept instead a wager in which the bettor received 11 to 10 odds for agreeing to bet on Pittsburgh. The point of all this is that a “lay off” bet should be defined solely in relation to the occupation and the purpose of the person making the bet — the occupation and motives of the person accepting the bet are irrelevant to the definition. We do not warrant the foregoing as constituting all the structural information a lay person (as distinct from a lay off person) would need to organize his or her own business, but we think it sufficient for our purposes, and we turn now to the case before us. THE EVIDENCE RELATING TO BOX During this five day trial, twenty-one witnesses testified and several kilograms of evidence were introduced. The testimony of the only four witnesses who had any knowledge concerning Box may be summarized as follows: F.B.I. Agent Beinner testified that Lombardino, a bookmaker, visited the Guys & Dolls Billiard Parlor, an establishment owned by Box, on three separate Tuesdays during the 1973 football season. Beinner believed Tuesday to be “payoff day” in the bookmaking operations he had been investigating. Bein-ner had obtained and executed search warrants on the homes or places of business of eight of the defendants, but had been unsuccessful in his attempt to obtain a warrant on the home and place of business of Box. Beinner’s principal informant, whose information was the basis for the search warrant affidavit, described the other defendants who were named in the affidavit as “bookmakers” and described Box only as a “bettor.” It was through- the testimony of Agent Beinner that the government introduced the telephone toll records, discussed below. Messina, a bookmaker who had been granted immunity by the government in return for his testimony, testified that he himself had never “laid off” bets to Box, but that he had personal knowledge that Cook had done so. Cook, a bookmaker also given immunity, testified that he had occasionally “laid off” bets with Box and with several of the other defendants. Cook explained that when he lost such a bet to Box or one of the others, he would pay the winner an extra 10% in excess of the amount bet. Cook testified that Box, as a customer, also placed bets with Cook in which Cook received this 10% advantage. Cook did not consider Box a bookmaker and knew of no one who did. He related that Box had been free to take or reject bets offered by Cook, and he described Box only as a bettor. Stewart, a bookmaker, testified that Box was one of his customers, i. e., a bettor. No one asked Stewart the direct question, “Is Box a bookmaker?”, but the prosecutor asked that question of Stewart concerning every other defendant remaining on trial when Stewart testified, and received an affirmative answer in each case. Stewart testified that Box placed bets with him, and that he (Stewart) placed bets for Box with other bookmakers. It was through Stewart that the betting slip testimony was introduced. Stewart testified that he made bets with two other bookmakers in which he gave the others 11 to 10 odds— some of these were “lay off” b'ets, and some were bets Stewart made because he liked the team. Stewart did not testify that he ever made such bets with Box. The two items of documentary evidence which related to Box were as follows: The Telephone Toll Records. No wiretaps or pen registers were used in this case, but the Government introduced at trial several long distance telephone records, including those of the telephone at Box’s house and the telephone at Guys & Dolls, Box’s establishment. These records showed that during the period of the investigation (autumn, 1973), 20 calls were made from Box’s home and 223 calls were made from Guys & Dolls to one Price, a Baton Rouge bookmaker. The Betting Slips. The simultaneous raids conducted on the last day of the 1973 football season yielded, inter alia, large numbers of betting slips which had been used in the Stewart operation. Most of these slips were marked in a similar simple manner, e. g., G.B. + 14 = 200 (translated, the bettor had wagered $200 that the score of Green Bay plus fourteen points would be greater than that of Green Bay’s opponent). In the lower right hand corner a name, a set of initials, or a number would appear, indicating the individual making the bet. Finally, an indication of the result was added, e. g., “ + 200” (the bettor won), or “-220” (the bettor lost and was required to pay the additional 10%). A smaller number of these slips were marked in a second, distinct, fashion, e. g., G.B. + 14 = 330/300. On these, the results would be recorded as + 330 or -300. The testimony of Stewart on this point was quite confused, but it could be inferred that the slips marked in this second fashion represented bets in which he was giving 11 to 10 odds to the person with whom he was betting. Of the five individuals whose names or initials appeared on Stewart’s slips marked in this second fashion, four were clearly bookmakers. The fifth was Box. The seized slips represented about $230,000 of Stewart bets and approximately $3800 of this amount was comprised of slips labeled “Box” and marked “330/300”, “550/500”, or the like. STANDARDS FOR SUFFICIENCY In reviewing the evidence upon which the jury based its verdict of guilty, we of course examine the evidence in the light most favorable to the government. Glasser v. United States, 1942, 315 U.S. 60, 62 S.Ct. 457, 86 L.Ed. 680; United States v. Warner, 5 Cir. 1971, 441 F.2d 821. When the conviction is based upon circumstantial evidence, our question becomes whether the jury could reasonably conclude that the evidence excluded all reasonable hypotheses of innocence. United States v. Gomez-Rojas, 5 Cir. 1975, 507 F.2d 1213, 1221; United States v. Squella-Avendano, 5 Cir. 1973, 478 F.2d 433, 436. WAS BOX A BOOKMAKER? If we were to find that the jury could reasonably conclude that Box was a bookmaker (engaged in a business with the other defendants), our analytical task would be at an end, for the statute in express terms covers bookmakers. Even viewing the evidence most favorably to the Government, however, we are convinced that the jury could not reasonably reach such a conclusion. This evidence must be regarded as consistent with the hypothesis that Box was not a bookmaker. The only direct testimony on this matter clearly categorizes Box as a bettor rather than a bookmaker. Of course, the jury might not have credited this testimony, although we note that Cook and Stewart had no hesitation in labeling the other defendants as “bookmakers”. The fact remains that there is no evidence in this record upon which an opposite conclusion, i. e., that Box was a bookmaker, could be based. Bookmakers have customers. The names of over 150 bettors were seized during the raids, numerous bettors were interviewed by the FBI, and bettors who were customers of each of the other defendants on trial testified, but no evidence was introduced relating to any “customers” Box might have. The testimony of Cook and the betting slips of Stewart indicate that Box on occasion accepted “lay off” bets from two bookmakers. The Government argues that since a lay off bet must be defined as a bet between two bookmakers, Box was a bookmaker simply because he accepted lay off bets. As explained above, we reject the premise of this argument — a lay off bet is one placed by a bookmaker, but the individual accepting the bet need not be a bookmaker. An additional characteristic of a bookmaker is that she distributes a “line.” There is no testimony that Box ever distributed a line, either to customers or to bookmakers. Finally, we note the calls made from Box’s telephones to Price. Assuming the jury could conclude that Box himself made all 223 calls to Price from the Guys & Dolls phone, it cannot be said that this number of calls in that direction is inconsistent with the hypothesis that Box was merely a heavy bettor, placing bets with Price. § 1955 AND NONBOOKMAKERS Having established that Box cannot be labeled a bookmaker, we have not yet shown him to be within an unassailable hypothesis of innocence, because § 1955 clearly was meant to proscribe some bookmaking-related activities of individuals who were not themselves bookmakers. The legislative history indicates that § 1955 applies generally to persons who participate in the ownership, management, or conduct of an illegal gambling business. The term “conducts” refers both to high level bosses and street level employees. This reflects an intent to reach employees of large bookmaking operations, and that intent has been followed in cases affirming § 1955 convictions of runners, telephone clerks, salesmen, and watchmen. On the other hand, individuals who are only bettors or customers of bookmakers clearly are not within the scope of the statute. The case before us cannot be fit easily into either of these two categories. No evidence supports the theory that Box was an employee of other bookmakers; yet, Box’s acceptance of lay off bets arguably makes him more important to the operation of a bookmaking business than would be a mere customer. Our question, then, is in what circumstances can an individual who accepted lay off bets from bookmakers be convicted under § 1955? The language of the statute does not resolve this, so we turn again to the legislative history. Clearly, the dominant concern motivating Congress to enact § 1955 was that large-scale gambling operations in this country have been closely intertwined with large-scale organized crime, and indeed may have provided the bulk of the capital needed to finance the operations of organized crime. The target of the statute was large-scale gambling operations — local “mom and pop” bookmaking operations were to be left to state law. In this connection, the requirements of dollar volume ($2000 gross on any day) or duration (30 days or more), and number of participants (5), were drafted into the legislation. These requirements are such that relative small-fry can conceivably be ensnared in the statutory strictures, but apparently Congress was of the opinion that the size of gambling operations was often much larger than could be proved, and that law enforcement officials needed some flexibility in order effectively to combat the large-scale operations. There are indications in the legislative history of a concern that one way in which large-scale organized crime profited from bookmaking operations was to act as a regular market for lay off bets from local bookmakers. Remarks of supporters of the bill demonstrate that the Congress was aware of the general function of lay off betting. For example, Senator McClellan stated: [describing a lottery operation] The gambler thus seldom gambles. In addition he hedges his bet by a complicated layoff system. . [A bookmaker] has at least the virtue of exploiting primarily those who can afford it. Yet he seldom gambles either. He gives track odds or less without track expenses, pays no taxes, is invariably better capitalized or “lays off” a certain percentage of his bets with other gamblers Nothing in the legislative history, however, deals with the question of whether the recipient of a lay off bet, on that basis alone, should be convicted under the statute. The phenomenon of lay off betting has been a factor in a large number of cases which have construed § 1955. In almost every case, the question has been whether the exchange of lay off bets, usually in addition to the exchange of line information, could be enough to link two separate bookmaking operations into one business for the purposes of meeting the § 1955 jurisdictional requirement of five participants in one business. The answer has in every case been affirmative — the regular direct exchange of lay off bets and line information can connect otherwise independent gambling operations, which alone would be illegal under state but not federal law (because less than five participants were involved), into one business. Further, the case law supported by legislative history establishes that an individual who is in the business of providing a regular market for a large volume of lay off bets should also be considered to be part of the gambling operation he services. Finally, it seems clear that, at least in this circuit, a professional gambler who accepts bets in the nature of lay off bets and, additionally, provides line information to the same bookmaking operation can be convicted as part of that operation under § 1955. The cases establish, then, that one who accepts lay off bets can be eon-victed if any of the following factors is also present: evidence that the individual provided a regular market for a high volume of such bets, or held himself out to be available for such bets whenever bookmakers needed to make them; evidence that the individual performed any other substantial service for the bookmaker’s operation, as, for example, in the supply of line information; or evidence that the individual was conducting his own illegal gambling operation and was regularly exchanging lay off bets with the other bookmakers. Our review of the legislative history, and our adherence to the doctrine that statutes mandating penal sanctions are to be strictly construed, convinces us that one of the listed factors, or other evidence that the defendant was an integral part of the bookmaking business, is necessary before an individual who accepts lay off bets can be convicted under the statute. Evidence establishing only that a person received occasional lay off bets from bookmakers cannot be considered inconsistent with the possibility that the individual was for all practical purposes only a bettor. In these circumstances, we do not feel that the cases finding “lay off bettors” within the scope of § 1955 are disposi-tive. If dicta in these cases can be read to indicate that a “lay off bettor,” as the recipient of a lay off bet, is on that basis alone a part of an illegal gambling operation, we reject such dicta as being based on an erroneous assumption regarding the nature of lay off betting. We stress again that the recipient of a lay off bet need not be a bookmaker, but rather might be any individual willing to accept a single bet. § 1955 was directed at the professionals — the persons who avoided gambling themselves, but profited from the gambling of others. Although a heavy bettor might be a crucial source of revenue for a bookmaking operation, the statute was meant to exclude bettors. Gambling becomes a federal case only when a person is charged with more than betting, and evidence that a person accepted lay off bets, without more, is insufficient to expel that person from § 1955’s sanctuary of bet-tordom. [H] The question remaining, then, is whether the evidence relating to Box, viewed most favorably to the Government, could sustain a jury finding that one of the additional factors noted above was present in this case. Such a jury finding would in effect be a conclusion that the evidence was inconsistent with any hypothesis of innocence. In reaching this conclusion, of course, the jury is limited to evidence in the record and supportable inferences therefrom. If a conclusion that all hypotheses of innocence have been excluded by the evidence could be reached only as a result of speculation or assumptions about matters not in evidence, then the jury verdict must be overturned. The evidence against Box shows that he accepted lay off bets of undetermined amounts from Cook on a number of occasions, and that in one week he may have accepted $3800 in lay off bets from Stewart. These are the only two pieces of evidence which distinguish Box in any way from the “mere bettor” so clearly excluded from the statute’s scope. We do not find any reasonable basis in the evidence upon which the jury could conclude that Box was an integral part of these bookmaking operations. While the volume of bets with Stewart was substantial, no evidence indicates that Box regularly accepted lay off bets from Stewart. There is no evidence on amounts from Cook, and while Cook’s testimony could support a conclusion that Box accepted lay off bets on several occasions, that testimony flatly contradicts any suggestion that Box held himself out to be a regular market for such bets upon which local bookmakers could depend. As we have already noted, no evidence supports the suggestion that Box was himself a bookmaker, or that he provided line or other gambling information to bookmakers. Box may have gamboled with the gamblers, but he has not been shown to be a gaming entrepreneur. Box was a customer of bookmakers and was perhaps a bargain-seeking bettor, but the record does not permit him to be cast in a role as a necessary or integral part of a gambling operation. The testimony of admitted bookmakers, the multiplicity of phone calls and the shower of betting slips suggest only that Box bet with continuity and in magnitude, and on occasion received a discount when the professionals with whom he dealt needed to lay off a bet. We conclude, then, that the jury could not reasonably find the evidence inconsistent with the hypothesis that Box was simply a heavy bettor who on occasion received favorable odds in bets with bookmakers. For purposes of § 1955, this hypothesis is one of innocence. Since we thus have concluded that the evidence in this case was insufficient to support a verdict of guilty, we need not reach any of the other eleven points argued by appellant. The conviction of Box is reversed, the sentence is vacated, and the ease is remanded to the district court for entry of a judgment of acquittal. REVERSED. . 18 U.S.C. § 1955 provides in part as follows: (a) Whoever conducts, finances, manages, supervises, directs, or owns all or part of an illegal gambling business shall be fined not more than $20,000 or imprisoned not more than five years, or both. (b) As used in this section— (1) “illegal gambling business” means a gambling business which— (1) is a violation of the law of a State or political subdivision in which it is conducted; (ii) involves five or more persons who conduct, finance, manage, supervise, direct, or own all or part of such business; and (iii) has been or remains in substantially continuous operation for a period in excess of thirty days or has a gross revenue of $2,000 in any single day. (2) “gambling” includes but is not limited to pool-selling, bookmaking, maintaining slot machines, roulette wheels or dice tables, and conducting lotteries, policy, bo-lita or numbers games, or selling chances therein. Louisiana Revised Statutes, § 14:90, provides as follows: Gambling is the intentional conducting, or directly assisting in the conducting, as a business, of any game, contest, lottery, or contrivance whereby a person risks the loss of anything of value in order to realize a profit. Whoever commits the crime of gambling shall be fined not more than five hundred dollars, or imprisoned for not more than six months, or both. . This discussion is limited to the type of bookmaking operation, specializing on football or other sporting events, which was the subject of the 1973 Shreveport-Bossier City investigation. Sources of authority for this discussion are the testimony of several “experts,” including admitted bookmakers, at this trial, and opinions in other cases dealing with similar bookmaking operations. . For further explanations of the concepts of “line” and “point spread,” see United States v. Joseph, 5 Cir. 1975, 519 F.2d 1068, 1070 n. 2, cert. denied, 1976, - U.S. -, 96 S.Ct. 1103, 47 L.Ed.2d 312 [44 U.S.L.W. 3471, 1976]; United States v. Thomas, 8 Cir. 1975, 508 F.2d 1200, 1202 n. 2, cert. denied, 1975, 421 U.S. 947, 95 S.Ct. 1677, 44 L.Ed.2d 100. See generally United States v. Pepe, 3 Cir. 1975, 512 F.2d 1129; United States v. Bobo, 4 Cir. 1973, 477 F.2d 974, cert. denied, 1975, 421 U.S. 909, 95 S.Ct. 1557, 43 L.Ed.2d 774. . The ever-present possibility that the individual in the adjacent booth of the restaurant is Agent Beinner, see infra, prevents this risk-minimizing enterprise from becoming tediously dull. . See United States v. Schaefer, 8 Cir. 1975, 510 F.2d 1307, 1312 n. 7, cert. denied, 1975, 421 U.S. 978, 95 S.Ct. 1980, 44 L.Ed.2d 470; Thomas, supra note 3, 508 F.2d at 1202 n. 2. The adjustment of line is apparently disfavored as a solution, because it may result in two local bookmakers offering a significantly different point spread on an event. This would offer local bettors an opportunity for a “middle” — two bets placed on different teams with two bookmakers which together could not lose more than 10% of one of the bets, and, if the actual point difference were in the middle, might both be won. See id.; United States v. Schullo, D.Minn.1973, 363 F.Supp. 246, 250, aff’d in Thomas, supra. Avoiding possibilities for “middles” is one reason for the constant exchange of line information among bookmakers. . Apparently, Dallas + 6 was the most common point spread on the 1976 Super Bowl. For a number of Dallas supporters, then, the closing touchdown which brought the Cowboys within four points represented more than a last futile hope. Other explanations and illustrations of layoff betting are given in the cases cited in note 23, infra. . See, e. g., United States v. Guzek, 8 Cir. 1975, 527 F.2d 552, 555 n. 5; Thomas, supra note 3, 508 F.2d at 1202 n. 2; Schaefer, supra note 5, 510 F.2d at 1311 n. 5; United States v. Sacco, 9 Cir. 1974, 491 F.2d 995, 998 & n. 1 (en banc). . The cases cited in note 7 all involved bookmakers making lay off bets, with other bookmakers, so the possibility that a bookmaker might make a lay off bet with someone else was never considered. . Several separate warrants were issued, but all were based on a single lengthy affidavit by Agent Beinner in which he described information he had obtained from his surveillance and his confidential sources. . See 18 U.S.C. § 1955(b)(2), quoted in note 1, supra. A bookmaker is not in violation of the statute, of course, unless the jurisdictional requisites in § 1955(b)(1) are met. . Although Stewart did not so testify, the similarity of the Box slips marked “330/300” or the like with those which probably represented Stewart’s lay off bets with other bookmakers could indicate that Box accepted $3800 in bets from Stewart in which Box received 11 to 10 odds. An explanation more consistent, perhaps, with Stewart’s testimony would be that these slips represented the bets Stewart made for Box with Cook. Under Glasser, however, we must take the view most favorable to the Government, so we assume that Stewart was giving favorable odds to Box. . See H.R.Rep. No. 1549, 91st Cong., 2d Sess. (1970), 1970 U.S.Code Cong. & Admin.News at p. 4029 (“House Report”). The language refers specifically to § 1911, but it has been held to apply as well to § 1955. See United States v. Becker, 2 Cir. 1972, 461 F.2d 230, 232, vacated and remanded on other grounds, 1974, 417 U.S. 903, 94 S.Ct. 2597, 41 L.Ed.2d 208. . See Becker, supra; United States v. Hunter, 7 Cir. 1973, 478 F.2d 1019. See also United States v. Harris, 5 Cir. 1972, 460 F.2d 1041, cert. denied, 1972, 409 U.S. 877, 93 S.Ct. 128, 34 L.Ed.2d 130; United States v. Ceraso, 3 Cir. 1972, 467 F.2d 653. . See House Report at p. 4029; S.Rep. No. 91-617, 91st Cong., 1st Sess. 70-75, 155-56 (1969) (“Senate Report”); United States v. Curry, 5 Cir. 1976, 530 F.2d 636; Thomas, supra note 3, 508 F.2d at 1205 (explaining a change in the wording of the original bill made so that customers clearly would be excluded). . See House Report, supra note 12; Senate Report, supra note 14; 115 Cong.Rec. 5873 (1969) (remarks of Sen. McClellan); 116 Cong. Rec. 603 (remarks of Sen. Allot), and 35294-95 (remarks of Rep. Poff) (1970). . See Hearings on S. 30 and related proposals before Subcomm. No. 5 of the House Comm, on the Judiciary, 91st Cong., 2d Sess., ser. 27 at 325-26 (“House Hearings”) (Report of Committee on Federal legislation of New York City Bar Association); 116 Cong.Rec. 589-91 (1970) (remarks of Sen. McClellan); Thomas, supra note 3. 508 F.2d at 1205. . See 18 U.S.C. § 1955(b)(1), quoted in note 1, supra; 116 Cong.Rec. 603 (1970) (remarks of Sen. Allot); House Hearings at 84 (testimony of Sen. McClellan); United States v. Bridges, 5 Cir. 1974, 493 F.2d 918. . See House Hearings at 325-26. . See Senate Report at 73; 116 Cong.Rec. 603 (1970) (remarks of Sen. Allot); Sacco, supra note 7, 491 F.2d at 1000. For our purposes, of course, the question is whether Box falls within the statutory terms. If he does, the absence of a showing that he was connected with a truly large-scale gambling operation or with organized crime avails him not. Our review of the general purposes of the Act as expressed in the legislative history is intended only to provide guidance in this situation for which the application of the statutory terms is not immediately apparent. . See Thomas, supra note 3, 508 F.2d at 1205, quoting testimony of Attorney General Mitchell at House Hearings and The President’s Commission Report on The Challenge of Crime in a Free Society at 189 (1967). . 115 Cong.Rec. 5873 (1969). . The silence of the statute and the legislative history on this matter can be contrasted with § 1831(a)(2) of President Nixon’s proposed Revised Criminal Code, not accepted by Congress, under which one who received a lay off bet would be in violation of an express statutory provision. See 13 Crim.L.Rep. 3015 (1973). . See, e. g., Guzek, supra note 7; Joseph, supra note 3; Schaefer, supra note 5; Thomas, supra note 3; United States v. Bohn, 8 Cir. 1975, 508 F.2d 1145, cert. denied, 1975, 421 U.S. 947, 95 S.Ct. 1676, 44 L.Ed.2d 100; United States v. DeCesaro, 7 Cir. 1974, 502 F.2d 604; United States v. McHale, 7 Cir. 1974, 495 F.2d 15; Sacco, supra note 7; Schullo, supra note 5; United States v. Ciamacco, W.D.Pa. 1973, 362 F.Supp. 107, aff’d 3 Cir., 491 F.2d 751. . Of the ten cases cited in note 23, six (Guz-ek, Schaefer, Thomas, Bohn, McHale, and Schullo) fall into the category of a bookmaker exchanging lay off bets and line information with another bookmaker. In Joseph, the recipients of the bets (which, although the Court did not term them “lay off bets,” were used “as a means by which the . . . bookmakers could increase, decrease or eliminate their risk on a particular event,” 519 F.2d at 1071) were characterized as “professional gamblers” and did indeed supply line and other gambling information to the bookmakers. In Sacco, the “lay off bettor” was said to be a bookmaker who placed bets with the other bookmaker, but there was no mention of the exchange of line information. DeCesaro held that an affidavit alleging, inter alia, that several bookmakers had laid off bets with the head of a “lay-off bookmaking operation” was sufficient to support a finding of probable cause in a wiretap application. Ciamacco involved a “numbers” racket (where no line information is used), in which the central figure was clearly in the business of accepting lay off bets at special rates from other numbers bet-takers. . See United States v. Thomas, supra note 7, at 1206: Petrangelo aided the Wolk operation by providing a regular and consistent market for Wolk’s lay off betting. . . . . a jury could conclude that in providing a regular market for Wolk’s lay off bets, Schullo assisted the Wolk operation in the balancing of its books .... . . . [I]so!ated and casual lay off bets and an occasional exchange of line information may not be sufficient to establish that one bookmaker is conducting or financing the business of a second bookmaker, (emphasis added). See also Schaefer, supra note 5, 510 F.2d at 1315-16 & n. 4 (Lay, J., dissenting) (arguing that the exchange of layoff bets and line information should be insufficient to connect two bookmakers under § 1955 unless proof of an agreement or regular market is adduced); Ciamacco, supra note 23 (evidence showed that the central figure had an agreement with several bookmakers who laid off bets with him whereby he would rebate a percentage of his profits from handling their accounts); DeCesaro, supra note 23. . See Joseph, supra note 3. . See Iannelli v. United States, 1975, 420 U.S. 770, 798, 95 S.Ct. 1284, 1300, 43 L.Ed.2d 616, 635 (Brennan, J., dissenting): In Bell v. United States, 349 U.S. 81, 75 S.Ct. 620, 99 L.Ed. 965 (1955), this Court held that in criminal cases, “When Congress leaves to the Judiciary the task of imputing to Congress an undeclared will, the ambiguity should be resolved in favor of lenity.” Iannelli was a 5-4 decision in which the majority held that Wharton’s Rule did not preclude separate convictions for 1) conspiracy to violate § 1955 and 2) a substantive violation of § 1955, growing out of the same circumstances. The majority found a clear congressional intent that prosecutors should retain the option of prosecuting under either or both counts. — i. e., the majority felt that Congress had declared its will. For other cases discussing the doctrine that penal statutes are to be read strictly, see Bridges, supra, note 17, 493 F.2d at 922-23 and cases there cited; Simpson v. Simpson, 5 Cir. 1974, 490 F.2d 803, 809, cert. denied, 1974, 419 U.S. 897, 95 S.Ct. 176, 42 L.Ed.2d 141 (“. . [C]riminal statutes must be strictly construed, to avoid ensnaring behavior that is not clearly proscribed.”) . Cf. Joseph, supra note 3, 519 F.2d at 1071: A person who performs a necessary function other than as a mere customer or bettor in the operation of illegal gambling “conducts an illegal gambling business.” United States v. Jones, 9 Cir. 1974, 491 F.2d 1382, 1384. . Cf. Joseph, supra note 3, 519 F.2d at 1068; DeCesaro, supra note 23, 502 F.2d at 611; McHale, supra note 23, 495 F.2d at 18; Sacco, supra note 7, 491 F.2d at 998, 1004. . Assistant Attorney General Mark Wilson, who was primarily responsible for drafting the section of the bill which became § 1955, testified before the House Subcommittee as follows: The whole intent and purpose of this bill is aimed át the proprietor, the professional, and not the bettors. House Hearings at 191. . The only evidence on this point is the testimony of Cook, who indicated that when he bet with Box, it was a “free and voluntary thing” and that Box was “free to take the bet or not take the bet” (the phrases are from questions posed by defense counsel.) Again, the jury need not have credited Cook on this issue, but there was no evidence on which to base an opposite conclusion. . Perhaps Box was a valued customer who was occasionally given a “right of first refusal” when his bookmakers needed to make a lay off bet. Alternatively, the bookmakers may have on occasion turned to Box when other bookmakers had bets unbalanced in the same direction on a certain event, and thus were unwilling to accept lay of^ bets. In any event, no evidence could support an inference that Box ever placed lay off bets himself — indeed, the evidence indicates that if Box were to place lay off bets, he would simply be negating the only 11 to 10 action he received. As we have noted, § 1955 places sanctions on those in the gambling business, and not on mere gamblers. Nothing in the evidence contradicts the proposition that Box was an inveterate gambler. . Several of these eleven points are clearly meritless, but others would warrant serious consideration. Particularly troublesome is the nature of the Government’s theory through which the eight separate bookmaking operations (that includes the “Box operation”) are said to constitute a single business for the purposes of § 1955. Although the exchange of lay off bets and line information has frequently been held sufficient to connect two bookmaking operations into one business, see note 23 supra, no case has been called to our attention in which the connections were nearly so indirect as in the case at bar. For example, to connect Box and co-defendant Skrnich, a bookmaker in Opelousas, Louisiana, one has to go through the Cook operation, with which Box was said to be connected, to the Bonomo-Glorioso operation, with which the Cook operation was said to be connected, to Skrnich, with whom the Bonomo-Glorioso operation was said to be connected. That Box and Skrnich were engaged together in a single business is open to serious question. When asked whether, under the Government’s theory in this case, every bookmaker in the country might be charged in one single-count indictment, counsel for the Government responded, “That’s an intriguing possibility.”
CASELAW
errshajë Etymology . Maybe from a combination of, meaning the dark slanderer. Proper noun * 1) in Albanian mythology
WIKI
REAL ID delayed by at least one year due to coronavirus Washington (CNN)The deadline to obtain a REAL ID, federally mandated identification that will be needed for passengers to board aircraft, will be extended until October 1, 2021 -- a year past the current deadline, according to the Department of Homeland Security. The Senate stimulus bill also requires the deadline be pushed until at least the end of September 2021. Before the coronavirus pandemic swept across the US, states were preparing to issue residents "REAL ID-compliant" driver's licenses or identification by the October 1, 2020 deadline. As of last month, only about 35% of US IDs complied with the REAL ID Act, a post-9/11 law that establishes security standards for licenses. Once in effect, travelers flying commercially in the US will need to have a REAL ID, which is marked by a star on the top of the card. Even before the outbreak, it was unlikely that all states would meet the deadline. Last month, acting Homeland Security Secretary Chad Wolf told lawmakers that the prospect of all states being able to issue their constituents a REAL ID by October 2020 was "probably fairly small." The Department of Homeland Security, which is responsible for the identification program, is delaying the deadline to allow state and local authorities to focus on the coronavirus response. States across the country have temporarily closed or restricted access to DMVs, keeping millions of people from applying for their new IDs, according to DHS. "Extending the deadline will also allow the Department to work with Congress to implement needed changes to expedite the issuance of REAL IDs once the current health crisis concludes," Wolf said in a statement Thursday. President Donald Trump said Monday the fall deadline for states to comply with REAL ID requirements would be extended. This story has been updated to reflect the Department of Homeland Security announcement. Priscilla Alvarez and Maegan Vazquez contributed to this story.
NEWS-MULTISOURCE
Bottle House Block The Bottle House Block is a brick rowhouse in Cambridge, Massachusetts. It was built in 1826 as a tavern by Deming Jarves, owner of the New England Glass Company, and was identified as the "Bottle House Block" from its earliest days. The building is the third oldest in East Cambridge and one of a few surviving brick buildings in Cambridge from that period. At the time of its construction it stood on the main road from the West Boston Bridge to Old Cambridge (roughly Harvard Square). The building was listed on the National Register of Historic Places in 1982.
WIKI
Comments API The comments API allows for the following functionality files and folders stored in ownCloud: It provides all of the functionality available through the UI, from the command-line. List Comments Request Path Method Content Type remote.php/dav/comments/files/<fileid> PROPFIND text/xml To retrieve a list of all comments, whether, for a file or folder, you need to make an authenticated PROPFIND request, and supply it with the path to the file or folder that you want to retrieve the comments of, as in the example below. curl --silent -u username:password \ -X PROPFIND \ -H "Content-Type: text/xml" \ 'http://localhost/remote.php/dav/comments/files/4' | xmllint --format - The response payload will look similar to the example below. It will contain a list of d:response elements, one for each comment attached to the file specified. The example above uses xmllint, available in the libxml2 package to make the response easier to read. <?xml version="1.0"?> <d:multistatus xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns" xmlns:cal="urn:ietf:params:xml:ns:caldav" xmlns:cs="http://calendarserver.org/ns/" xmlns:card="urn:ietf:params:xml:ns:carddav" xmlns:oc="http://owncloud.org/ns"> <d:response> <d:href>/remote.php/dav/comments/files/4/4</d:href> <d:propstat> <d:prop> <d:resourcetype/> <oc:id>1</oc:id> <oc:parentId>0</oc:parentId> <oc:topmostParentId>0</oc:topmostParentId> <oc:childrenCount>0</oc:childrenCount> <oc:message>Here is a comment.</oc:message> <oc:verb>comment</oc:verb> <oc:actorType>users</oc:actorType> <oc:actorId>admin</oc:actorId> <oc:creationDateTime>Tue, 16 May 2017 12:34:10 GMT</oc:creationDateTime> <oc:latestChildDateTime/> <oc:objectType>files</oc:objectType> <oc:objectId>4</oc:objectId> <oc:actorDisplayName>admin</oc:actorDisplayName> <oc:isUnread>false</oc:isUnread> </d:prop> <d:status>HTTP/1.1 200 OK</d:status> </d:propstat> </d:response> </d:multistatus> If you want to filter the information returned in the d:prop element of the XML response, you can supply a PROPFIND XML element in the body of the request method. The example below shows how to filter the information returned to just the oc:message element. <?xml version="1.0" encoding="utf-8" ?> <a:propfind xmlns:a="DAV:" xmlns:oc="http://owncloud.org/ns"> <a:prop><oc:message/></a:prop> </a:propfind> To use it in the request, add the --data-binary switch, passing in the name of the file containing the PROPFIND XML element. I’ve called it report-propfind.xml in the example below. curl --silent -u username:password \ -X PROPFIND \ -H "Content-Type: text/xml" \ --data-binary "@report-propfind.xml" \ 'http://localhost/remote.php/dav/comments/files/4' | xmllint --format - Create Comments Request Path Method Content Type remote.php/dav/comments/files/<fileid> POST application/json To create a comment, you need to send an authenticated POST request with a JSON body containing the details of the comment to create. The example below shows how to create a comment on the file with the file id 4. curl -u username:password \ -X POST \ -H "Content-Type: application/json" \ --data-binary '{"message":"this is my message","actorType":"users","verb":"comment"}' \ "http://localhost/remote.php/dav/comments/files/4" The available options are: Parameter Type Description actorType String The type of user who’s adding the comment. message String The comment’s message text. It can be up to 1,000 characters in length. verb String The type of comment to create, typically comment. The comment is attributed to the user making the request. To retrieve a file id, refer to the relevant section of the documentation. Response If the request is successful, there will be no response body returned. However, it will have an HTTP/1.1 201 Created status. Update Comments Request Path Method Content Type remote.php/dav/comments/files/<fileid>/<commentid> PROPPATCH text/xml To update an existing comment, you need to send an authenticated PROPPATCH request and provide a PROPFIND XML element in the body. As with creating comments, we encourage you to store this in a separate file and use the --data-binary switch to include it in the request. This makes the information more maintainable. Below is an example request, which will change the comment with the id of 4, on the file with the file id of 4. curl -u username:password \ -X PROPPATCH \ -H "Content-Type: text/xml" \ --data-binary "@update-comment.xml" \ 'http://localhost/remote.php/dav/comments/files/4/4' | xmllint --format - Below is an example PROPPATCH element, which changes the message text but leaves the rest of the message unchanged. <?xml version="1.0" encoding="utf-8" ?> <a:propertyupdate xmlns:a="DAV:" xmlns:oc="http://owncloud.org/ns"> <a:set> <a:prop> <oc:message>This is an updated message.</oc:message> </a:prop> </a:set> </a:propertyupdate> Response Update comment requests will return the status: HTTP/1.1 207 Multi-Status, and an XML response similar to the example below. In it, you can see, in the d:href element the comment which was changed. In the d:status element, you can see if the update was successful or not. <?xml version="1.0"?> <d:multistatus xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns" xmlns:cal="urn:ietf:params:xml:ns:caldav" xmlns:cs="http://calendarserver.org/ns/" xmlns:card="urn:ietf:params:xml:ns:carddav" xmlns:oc="http://owncloud.org/ns"> <d:response> <d:href>/remote.php/dav/comments/files/4/4</d:href> <d:propstat> <d:prop> <oc:message/> </d:prop> <d:status>HTTP/1.1 200 OK</d:status> </d:propstat> </d:response> </d:multistatus> If something goes wrong, you should receive a response similar to the following <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DAV\Exception\BadRequest</s:exception> <s:message>This should never happen (famous last words)</s:message> </d:error> If the tag is not available, then you will receive the following response, along with an HTTP/1.1 404 Not Found status code. <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DAV\Exception\NotFound</s:exception> <s:message/> </d:error> Delete Comments Request Path Method Content Type remote.php/dav/comments/files/<fileid>/<commentid> DELETE text/plain To delete a comment, send an authenticated DELETE request, specifying the path to the comment that you want to delete. curl -u username:password -X DELETE 'http://localhost/remote.php/dav/comments/files/4/5' If the comment was successfully deleted, no response body would be returned, but an HTTP/1.1 204 No Content status code will be returned. However, if the comment does not exist, then the following response will be returned, along with an HTTP/1.1 404 Not Found status code. <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DAV\Exception\NotFound</s:exception> <s:message/> </d:error>
ESSENTIALAI-STEM
Consumer giants spurn risks to chase online subscribers LONDON (Reuters) - Major consumer companies including Unilever (ULVR.L), Procter & Gamble (PG.N) and Nestle (NESN.S) are chasing consumers who want food and household goods delivered automatically, even though this kind of business has not always worked. The companies are pitching new online subscription services, which promise stable revenues, lower delivery costs and valuable data about customers. The world’s biggest packaged food company, Nestle, whose Nespresso coffee is already a sizeable subscription business, recently launched a subscription program for nutritional drinks in Japan and expanded ReadyRefresh, an online bottled water service, in the United States. It also wants to expand the Tails.com subscription pet food from Britain to continental Europe, one of its executives told Reuters. It is testing the service in France for a possible launch this year. Unilever on Monday will launch its Skinsei brand in the United States after testing, offering “personalized” skincare by subscription. Unilever expanded its Dollar Shave Club subscription razor service to include cologne and beard oil in 2018 and toothpaste in 2017. Meanwhile, Procter & Gamble (PG.N), the world’s largest home and personal care company, expanded its Gillette on Demand razor subscription service to Canada. Subscribers can text when they are ready for their next shipment. Selling directly lets manufacturers skirt retailers, giving them more profit and control over pricing, promotions and merchandising. This helps when retailers such as Amazon (AMZN.O) and Sainsbury’s (SBRY.L) are pressing consumer product companies for discounts and pouring resources into own-label products. Subscription selling gives them guaranteed revenues, a better picture of customers and can make goods cheaper to deliver. “They’re getting it to you on a specific date, but they don’t have to get it to you in one or two days,” said retail analyst Scott Mushkin at Wolfe Research. “It’s a way for them to manage down their logistics and distribution costs.” Amazon has offered discounts since 2006 with its Subscribe and Save program, which gives people up to 15 percent off when they sign up for repeat deliveries of household items. It is now “a multi-billion dollar business inside Amazon”, said Tom Furphy, CEO of venture capital firm Consumer Equity Partners and former vice president of Amazon’s consumables unit, which launched the service. Liz Cadman, founder of mysubscriptionaddiction.com, said children’s educational boxes were the U.S. website’s hottest category in 2018, followed by grooming, make-up and beauty. Biggest losers were snacks, clothing and pet goods, she said. The trouble with subscriptions, analysts say, is high cancellation rates as consumers get bored, high marketing costs, costly delivery and the fact that people often end up with goods they don’t want. Mondelez International (MDLZ.O) has suspended its Oreo Cookie Club, a program rolled out last year. For $20 per month, subscribers got a box containing Oreos in different flavors, with recipe cards, candy and merchandise such as Oreo-branded socks, sunglasses or cups. After three months, Ruby Scarbrough canceled her subscription, saying in an online review that she could buy the cookies more cheaply at a store. Jeff Jarrett, global head of e-commerce at Mondelez, pointed to the challenges of delivering mass-market snacks economically and keeping customers interested. Nobody has “cracked the code” for snack subscriptions, he said, though Mondelez may give its Oreo club another shot, likely with more flavors, better merchandise or a better online experience. General Mills (GIS.N) axed its Nibblr subscription snack business in 2015 after 18 months. A similar project from Kellogg (K.N), reportedly planned for that year, never materialized. Walmart shut its Goodies subscription snack business in 2013 after a year. While subscriptions delight some consumers, they frustrate others because “you end up with too much of the product or too little”, Procter & Gamble CFO Jon Moeller told Reuters. Subscriptions represent about 10 percent of all U.S. online sales, and more than 1 percent of all retail sales, said Burt Flickinger, managing director of consumer consulting firm Strategic Resources Group. He said subscriptions are the hottest part of the industry, growing more than 17 percent a year and outpacing overall online sales, which are growing more than 12 percent. He said subscriptions may exceed 10 percent of the US retail market in five years and 15 percent in 10 years. Euromonitor International says subscription shaving clubs, including Dollar Shave and Harry’s, took about 12 percent of the $2.1 billion U.S. market for men’s razors and blades in 2017, up from 6.4 percent two years earlier. But Dollar Shave’s sales have slowed dramatically, with Unilever in October citing growth of around 10 percent year-to-date, compared to more than 50 percent in 2016, the year it bought the brand. Unilever said a slowdown was not unusual but it was “pleased with performance” at Dollar Shave, whose North American business would be close to breakeven this year. Unilever’s global brand vice president of skincare, Valentina Ciobanu, told Reuters the company wants to make its subscriptions more flexible, because consumers demand options when they buy. “We don’t force you to subscribe at the beginning,” Ciobanu said about the Skinsei brand, which she created inside the company. Skinsei aimed to keep shoppers loyal in part by making changes to the products it recommends based on the season of the year and other factors, she said. Ciobanu said Skinsei’s products could be combined into more than one million skincare regimens. She declined to give sales projections. However, she and other executives said it was unclear whether subscription brands would take off or remain niche. “For now it’s still early adopters. The question mark is how long will it take to become more mass, and I think nobody has the answer to that question,” said Bernard Meunier, who runs Nestle’s Purina Petcare business in Europe, Middle East and North Africa. Reporting by Martinne Geller; Additional reporting by Richa Naidu in Chicago; Editing by Giles Elgood
NEWS-MULTISOURCE
Rendering the audio captured by a Windows Phone device This small app displays the audio captured by the microphone of a Windows Phone device and displays it as a continous waveform on the screen using the XNA framework. A slightly modified version of the app (changing color when touching the screen) can be found in the Windows Phone Marketplace. Background In order to capture the audio on a Windows Phone device, you need an instance to the default microphone (Microphone.Default), decide how often you want samples using the BufferDuration-property and hook up the BufferReady-event. Then you control the capturing with the Start() and Stop() methods. The microphone is giving you samples at a fixed rate of 16 000 Hz, i.e. 16 000 samples per second. There is a property SampleRate that will tell this value. This means that you won’t be able to capture audio of higher frequency than 8000 Hz (without distortion) according to the sampling theorem. You are also limited when it comes to choose the value for the BufferDuration-property; it must be between 0.1 and 1 seconds (100 – 1000 ms) in 10ms-steps. This means that you must choose a value of 100, 110, 120, …, 990, 1000 milliseconds. When the microphone event BufferReady is fired, you should call the microphone.GetData(myBuffer)-method, in order to copy the samples from the microphone’s internal buffer to a buffer that belongs to you. The recorded audio comes in the form of a byte-array, but since the samples are actually signed 16-bits integers (i.e. an integer in the range of -32’768 … 32’767), you will probably need to do some convertion before you can process them. How this application works The way this application works is keeping a fixed number of narrow images, here called “(image) slices”, arranged in a linked list. The images are rendered on the screen and smoothly moved from the right to the left. When the left-most slice has gone off the screen, it is moved to the far right (still outside the screen) in order to create the illusion of an unlimited number of images. Each slice holds the rendered samples from the content of one microphone buffer. When the buffer is filled by the microphone mechanism, the rightmost slice (outside of the screen) is rendered with these new samples and started to be moved inwards the screen. The speed of how fast the slices are moving across the screen is correlated to the duration of the buffer in such a way that the slices are moved a total of “one slice width” during the time the microphone is capturing the next buffer. Since the buffer of captured audio is rendered as graphic on a texture as soon it is received, there is no reason to keep any old buffer data. Therefore the application only keeps one buffer in memory which is reused over and over. A flag is set each time the microphone buffer is ready. Since the BufferReady event is fired on the main thread, there is no need for any lock-mechanism. In the Update()-method of the XNA app, the flag is checked whether new data has arrived, and if so, the slice in line is drawn. In the Draw()-method, the slices are drawn on the screen and slightly moved as time goes by. The complete Visual Studio solution file can be downloaded from here. Here’s a description of the structure of the main “Game”-class. Some constants: Fields regarding the microphone and the captured data: Choose a color that is almost transparent (the last of the four parameters; it’s the red, green, blue and alpha-component of the color). The reason is that many samples are drawn on top of each other, and keeping each individual sample almost see-through makes an interesting visual effect. The drawing classes. The white pixel texture is doing all the drawing. The size of each image slice. There’s no need to keep a reference to the linked list itself; just the first and last link. These links keeps references to their neighbors. The currentImageSlice is the one to draw on the next time. The speed of the slices moving across the screen. In order to know how far the current samples should be moved, the application must keep track of when they appeared.  The signal that tells the Update()-method that there is new data to handle.  The density of samples per pixel. Here’s the constructor. In it the graphics mode is set and the microphone is wired up and asked to start listening. In the XNA’s LoadContent nothing is actually loaded since the app is not dependent on any predrawn images. The SpriteBatch is created, the white pixel texture is generated and the image slices are initialized (as black images). The CreateSliceImages is calculating how many slices that are needed to cover the entire screen (plus two so there’s room for movement). In the end of the method the regular RenderSamples-method is called in order to initial all the images. Since there is no data yet (all samples are zero) it will generate black images. The XNA’s UnloadContent is just cleaning up what the LoadContent created. The event handler to the microphone’s BufferReady-event. It copies the data from the microphone buffer and raises the flag that new data has arrived. The XNA’s Update method checks the phone’s Back-button to see if it’s time to quit. After that it checks the flag to see if new data has been recorded. If so, the new samples are rendered by calling the RenderSamles-method. The XNA’s Draw-method takes care of drawing the rendered slices. It handles the two screen orientation modes; landscape and portrait, by scaling the images accordingly. If it is landscape mode the height of the images are squeezed and if it is portrait mode the width of the images are squeezed. When all is setup, the method iterates through the images and render them one-by-one on the screen, adjusted a bit along the X-axis to make up for the time that has passed. The RenderSamples is taking a RenderTarget2D as an argument, which is the texture to be drawn on. The routine iterates through the samples and render them one by one. Author: Mattias Senior .NET software consultant. Leave a Reply
ESSENTIALAI-STEM
Emir (singer) Emir Sevinç (born 7 September 1980) is a Turkish singer and songwriter. Born in Istanbul, he is a graduate of radio and television studies of Marmara University communication faculty. Emir released his first album Ben Sen Olamam in 2009. He made his debut with the album's lead single "Ben Sen Olamam", written and composed by Tarkan. The songs "Ben Sen Olamam", "Tornistan", "Eline Düştüm", "Şiki Şiki", and "Aşk mı Savaş mı?" from the album were all made into music videos. In 2012, he released his second album Ateşten Bi' Rüzgar. Separate music videos were later released for the songs "Sudan Sebep", "Veda Gecesi", and "Makina". In 2013, Emir released his first single "Tutuşmayan Kalmasın". In 2015, his first extended play Kendimden was released. The songs "Bi' Ağla", and "Yaylı Yatak" were both accompanied by music videos. In 2009, his song "Eline Düştüm" was awarded the "Most Requested Song" award at the Istanbul FM Music Awards. In 2014, his song "Tutuşmayan Kalmasın" was chosen as the Best Single at Düzce University's 2nd Media Awards. The same single was also chosen as the Best Song at Ege University's 3rd Media Awards. In November 2016, Emir released his new single "Mevsim Sonbahar" on digital platforms under the label Sony Music. 2009–2012: Ben Sen Olamam Emir's first album was produced by HITT Production. The album contained 14 songs in total. The first music video for the album was released for the song "Ben Sen Olamam". The song soon found a place in many radio and television channels, and ranked 5th on Türkçe Top 20. Its music video was directed by famous video director Murad Küçük and was shot at Gebze Industrial Area. Ceyda Balaban provided the costumes for the video. Dennis Madden, who had the experience of working with Prince, was invited to Turkey to serve as the image director. The second song that was made into music video was "Eline Düştüm", written by Yıldız Tilbe and composed by Phoebus. Murad Küçük again served as the music video director and Robert Benavides took the role of image director. The song proved to be more successful than its predecessor, and ranked 2nd on Türkçe Top 20. Emir worked with a number of famous managers in Turkey for Ben Sen Olamam and collaborated with Haluk Şentürk who served as the record producer. After composing two of the songs from the album, Emir gave the composition of the remaining songs to Ozan Çolakoğlu. Artists such as Nazan Öncel, Yıldız Tilbe, Aysel Gürel and Gülşen were the songwriters whose songs appeared on the album. 2012–2013: Ateşten Bi' Rüzgar and "Tutuşmayan Kalmasın" Emir's second album Ateşten Bi' Rüzgar was produced by Kaya Müzik. The album contained 3 songs in total. The first music video for the album was released for the song "Sudan Sebep". It was written by Yıldız Tilbe and composed by Gülşen and Ozan Çolakoğlu. Gülşen also worked as a backing vocalist on this song, which was produced by Haluk Şentürk. The video clip was directed by Murad Küçük. The song rose to the top of many music lists. The second music video was released for the song "Veda Gecesi". It was written and composed by Yıldız Tilbe, and Emir's brother Erdi Sevinç shot the video clip in Amsterdam. The video tells the sad story of a separation story. Veli Kuzlu served as the image director. The last song from the album to be made into a music video was "Makina". It was written by Alper Narman and Onur Özdemir. The music video was again directed by his brother Erdi Sevinç and Veli Kuzlu. Emir's single "Tutuşmayan Kalmasın" was produced by DAO Grup. It was his first single, which was written by Gökhan Şahin and composed by Emrah Karaduman. Its music video was directed by Veli Kuzlu and Murad Küçük, and a number of actors appeared alongside Emir on the video. 2015: Kendimden The producer of his extended play Kendimden was Sony Music and it contained 4 songs. Erdem Kınay, Emrah Karaduman and Turaç Berkay Özer served as the arrangers of the album. The first music video for this EP was made for the song "Bi' Ağla", which was written by Emir himself, and composed by Ceyhun Çelikten and Erdem Kınay. Gülşen again worked as a backing vocalist on the song. Its music video was directed by Murad Küçük and Veli Kuzlu. The shooting took place in the early hours of the morning in Kilyos Kısırkaya Beach began shooting with a technical team of about 35 people. Argentinian Cora Lichtschein appeared alongside Emir in the video. "Bi' Ağla" reached to the top of a number of music charts and was viewed over 3 million times on YouTube. He worked with photographer Emre Ünal for the cartonboard. Other songs on the EP, "Yaylı Yatak" and "Ya Rab", were written by Emir as well. Yıldız Tilbe worked as a backing vocalist on "Yaylı Yatak". It was composed by Turaç Berkay Özer. Another version of the song "Bi' Ağla" was also said to be under development by Ceyhun Çelikten. The second song from the extended play that was made into music video was "Yaylı Yatak". The video was directed by his brother Erdi Sevinç. Eren Yıldız served as director. The video was made with an orchestra made up of cheerful old women, as well as a beautiful Ukrainian model. It was shot in Tophane and Karaköy. Recording the music video lasted about a day. Studio albums * 2009: Ben Sen Olamam EPs * 2012: Ateşten Bir Rüzgar * 2014: Kendimden Singles * 2013: "Tutuşmayan Kalmasın" * 2016: "Mevsim Sonbahar" * 2017: "Sıkıntı Yok" * 2018: "Gri" * 2018: "N'aptın Sevgilim" * 2019: "Aynen Devam" * 2020: "Ben Unutmayı Bilmem" * 2021: "Aklımı Oynatıcam" * 2022: "Gecenin Yarısı" * 2022: "Gelme Yanıma" * 2023: "Nerdesin Aşk" * 2023: "Gecenin Üçünde" * 2024: "Çat"
WIKI
Talk:Rettet den Regenwald Renaming the page I propose to rename this Page to "Rainforest Rescue", as this is the English name and URL for Rettet den Regenwald. See http://www.rainforest-rescue.org/ Tucano11 (talk) 06:05, 11 December 2012 (UTC) NGO evaluation "In November 2002 the journal Öko-Test investigated its handling of donations and awarded Rainforest Rescue with the grade “very good“ " is contrary to the negative review cited in the German Wikipedia. Kdammers (talk) 14:20, 8 June 2020 (UTC)
WIKI
Package-level declarations Types Link copied to clipboard Describes a device. Link copied to clipboard data class LicensingConfig(var delay: Int = 0) : Parcelable Configures the behaviour of the license evaluation. Link copied to clipboard data class PlaybackConfig(var isAutoplayEnabled: Boolean = false, var isMuted: Boolean = false, var isTimeShiftEnabled: Boolean = true, var videoCodecPriority: List<String> = listOf("av1", "hevc", "hvc", "vp9", "avc"), var audioCodecPriority: List<String> = listOf("ec-3", "mp4a.a6", "ac-3", "mp4a.a5", "mp4a.40"), var isTunneledPlaybackEnabled: Boolean = false, var seekMode: SeekMode = SeekMode.Exact, var forcedSubtitleCallback: ForcedSubtitleCallback? = null, var audioFilter: MediaFilter = MediaFilter.Loose, var videoFilter: MediaFilter = MediaFilter.Loose, var handleAudioFocus: Boolean = false, var handleAudioBecomingNoisy: Boolean = false) : Parcelable Configures the playback behaviour of the player. Link copied to clipboard Loads, controls and renders audio and video content represented through Sources. A player instance can be created via the Player() function and will idle until one or more Sources are loaded. Once load is called, the player starts a playback session and initiates necessary downloads to start playback of the loaded source(s). Link copied to clipboard data class PlayerConfig(val key: String? = null, var styleConfig: StyleConfig = com.bitmovin.player.api.ui.StyleConfig(), var playbackConfig: PlaybackConfig = PlaybackConfig(), var licensingConfig: LicensingConfig = LicensingConfig(), var advertisingConfig: AdvertisingConfig = AdvertisingConfig(), var remoteControlConfig: RemoteControlConfig = RemoteControlConfig(), var adaptationConfig: AdaptationConfig = AdaptationConfig(), var networkConfig: NetworkConfig = NetworkConfig(), var liveConfig: LiveConfig = LiveConfig(), var tweaksConfig: TweaksConfig = TweaksConfig(), var bufferConfig: BufferConfig = BufferConfig()) : Parcelable Configures a new Player instance. Must not be modified after it was used to create a Player instance. Link copied to clipboard Represents the mode the player uses to seek. Link copied to clipboard data class TimeRange(val start: Double, val end: Double) A time range in seconds. Link copied to clipboard data class TweaksConfig(var timeChangedInterval: Double = DEFAULT_TIME_CHANGED_EVENT_INTERVAL, var bandwidthEstimateWeightLimit: Int = DEFAULT_BANDWIDTH_ESTIMATE_WEIGHT_LIMIT, var languagePropertyNormalization: Boolean = true, var localDynamicDashWindowUpdateInterval: Double? = null, var useFiletypeExtractorFallbackForHls: Boolean = false, var useDrmSessionForClearPeriods: Boolean = false, var useDrmSessionForClearSources: Boolean = false, var shouldApplyTtmlRegionWorkaround: Boolean = true, var devicesThatRequireSurfaceWorkaround: List<DeviceDescription> = emptyList(), var enableImageMediaPlaylistThumbnailParsingForLive: Boolean = false, var enableExoPlayerDebugLogging: Boolean = false, var discardAdsWhileCasting: Boolean = false, var preferSoftwareDecodingForAds: Boolean = false, var preferSoftwareDecoding: Boolean = false, var allowChunklessPreparationForHls: Boolean = false, var enableFrameAboutToBeRenderedEvent: Boolean = false, var minForwardBufferLevelForQualityIncrease: Double? = null) : Parcelable This configuration is used as an incubator for experimental features. Tweaks are not officially supported and are not guaranteed to be stable, i.e. their naming, functionality and API can change at any time within the tweaks or when being promoted to an official feature and moved into its final configuration namespace.
ESSENTIALAI-STEM
Talk:Summed-area table This article needs a lot of clearing up. Although the formulas are correct its notation is unclear for people who don't know the Viola/Jones paper. What is A, B, C, D? A sum, area or a point? What is the function A(x)? What is i(x,y)? What is the one argumented function I(X) opposed to I(x, y)? All these are essential points missing. --<IP_ADDRESS> (talk) 13:41, 26 January 2013 (UTC) The formula seems to be incorrect, the sum I(C)+I(A)-I(B)-I(D) calculates rectangle NOT including A, that is x0<(!)<=x1 and y0<=y<(!)y1.--<IP_ADDRESS> (talk) 12:08, 26 January 2014 (UTC) Actually, the sum I(C)+I(A)-I(B)-I(D) calculates rectangle not including (A, B) and (A, D) edges, that is x0 < x and y0 < y. I tested that one in my c++ project. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 06:48, 11 April 2014 (UTC) Popularization The statement "In computer vision it was first prominently used within the Viola–Jones object detection framework in 2001" is not correct. I recall publications by Lewis (and others e.g. Sun) in the 1990s that used this technique. Checking, I see two 1995 publications by Lewis (Fast Normalized Cross Correlation and Fast Template Matching) that have 970 and 600 citations respectively on google scholar. The computer vision conference they appeared in (Vision Interface) is obscure now, but with the publications themselves were well known. — Preceding unsigned comment added by <IP_ADDRESS> (talk • contribs) See the textbook Concise Computer Vision, by Reinhard Klette, Springer, 2014. On p.52, a section The Introduction of Integral Images into Computer Vision: "Integral images have been introduced in the Computer Graphics literature in [F.C. Crow. Summed-area tables for texture mapping. Computer Graphics, vol. 18, pp. 207–212, 1984] and then popularized by [J.P. Lewis. Fast template matching. In Proc. Vision Interface, pp. 120–123, 1995] and [P. Viola and M. Jones. Robust real-time object detection. Int. J. Computer Vision, pp. 137–154, 2001] in the Computer Vision literature." The current wording of the page highlights only Viola&Jones while ignoring the earlier popularization by Lewis. I may try to edit the page <IP_ADDRESS> (talk) 05:46, 15 February 2016 (UTC) * The Frank Crow paper has over 1200 citations. Why isn't that considered the popularization of this idea? Dicklyon (talk) 06:49, 15 February 2016 (UTC) * Oh, I see, it's "in computer vision"; missed your point. Dicklyon (talk) 06:50, 15 February 2016 (UTC) Relationship to mip-maps Sorry can't investigate it right now (I'd have to find the original papers but don't have access to them), but I don't think summed-area tables were introduced "for use with mip-maps". I seem to recall that summed-area tables and mip-maps were alternative methods. Raichu2 (talk) 02:32, 25 October 2018 (UTC) 2D prefix sum Surely someone has mentioned this is just a 2D version of prefix sum array (with a little inclusion-exclusion thrown in)? No OR but it really should be sourced and added to article. Wqwt (talk) 00:37, 22 May 2019 (UTC)
WIKI
Daven Vanderpool Daven "Prestige" Vanderpool is an American rap and R&B record producer. He was once a member of Bad Boy's in-house production team, "The Hitmen", and has also produced on many Bad Boy-related projects. His usual sound is a distinctive combination of funk and more heavily, electronica influences, promoted through his use of samples from Gary Numan, Dominatrix and Duran Duran. This sound is particularly heard on his productions for Jay-Z, Puff Daddy, Sauce Money, Mase, Mic Geronimo and Shyne. Solo * 1994: O.C. - "Point o Viewz" (with Buckwild); Word...Life * 1996: Lil' Kim - "Dreams" (Featuring Adilah); Hard Core * 1996: Yo-Yo - "Thank You, Boo"; Total Control * 1997: LL Cool J - "Wanna Get Paid" (Featuring The Lost Boyz); Phenomenon * 1997: Heavy D - "Waterbed Hev" (Featuring Vinia Mojica); Waterbed Hev * 1997: Jay-Z - "Imaginary Player", "(Always Be My) Sunshine" (Featuring Babyface & Foxy Brown); In My Lifetime, Vol. 1 * 1998: Cam'Ron - "Me, My Moms & Jimmy"; Confessions of Fire * 1998: McGruff - "What You Want"; Destined To Be * 1999: Mase - "No Matter What", "Do It Again" (Featuring Puff Daddy); Double Up'' * 1999: The Notorious B.I.G. - "Big Booty Hoes" (Featuring Too Short); Born Again * 2000: Shyne - "It's Okay"; Shyne * 2000: Beanie Sigel - "Die"; The Truth With Puff Daddy * 1998: Mic Geronimo - "Nothin' Move But The Money" (Featuring Kelly Price); Vendetta * 1998: Total - "Sitting Home (Waiting For You Remix)" (Featuring Shyne); "Sitting Home" (Single) * 1999: Mase - "If You Want To Party" (Featuring Cheri Dennis); Double Up' * 1999: Faith Evans - "Love Like This" (Bad Boy Remix) (Featuring Black Rob); "All Night Long" (Single) * 1999: Lil' Cease - "Don't Stop" (Featuring Puff Daddy), "My Niggaz" (Featuring Jay-Z, Bristal & Blake C.); The Wonderful World Of Cease-a-Leo * 1999: Puff Daddy - "Victory" (Hip Hop Remix) (Featuring The Notorious B.I.G. & Busta Rhymes); "P.E. 2000" (Single) * 1999: Puff Daddy - "Do You Like It... Do You Want It..." (Featuring Jay-Z); Forever * 1999: The Notorious B.I.G. - "Notorious B.I.G." (Featuring Puff Daddy & Lil' Kim); "Would You Die 4 Me?" (Featuring Puff Daddy & Lil' Kim); Born Again * 2000: Sauce Money - "Do You See?" (Featuring Puff Daddy & Pam Long from Total); Middle Finger U.
WIKI
[No. C011614. Third Dist. July 20, 1992.] RIDEOUT HOSPITAL FOUNDATION, INC., Plaintiff and Respondent, v. COUNTY OF YUBA et al., Defendants and Appellants. Counsel Daniel G. Montgomery, County Counsel, and James W. Calkins, Chief Deputy County Counsel, for Defendants and Appellants. McCutchen, Doyle, Brown & Enersen, John R. Reese and Gerald R. Peters for Plaintiff and Respondent. Opinion DAVIS, J. In this action to recover property taxes paid under protest, County of Yuba (County) appeals from a decision in favor of the taxpayer, Rideout Memorial Hospital (Rideout). There is but one issue on appeal: can a nonprofit hospital that earned surplus revenue in excess of 10 percent (for a given year) still qualify for the “welfare exemption” from property taxation in light of Revenue and Taxation Code section 214, subdivision (a)(1)? We hold that it can. Background Revenue and Taxation Code section 214 (section 214) sets forth the “welfare exemption” from property taxation. For the tax years in question here, the section provided in pertinent part: “(a) Property used exclusively for religious, hospital, scientific, or charitable purposes owned and operated by community chests, funds, foundations or corporations organized and operated for religious, hospital, scientific, or charitable purposes is exempt from taxation if: “(1) The owner is not organized or operated for profit; provided, that in the case of hospitals, such organization shall not be deemed to be organized or operated for profit, if during the immediate preceding fiscal year the excess of operating revenues, exclusive of gifts, endowments and grants-in-aid, over operating expenses shall not have exceeded a sum equivalent to 10 percent of such operating expenses. As used herein, operating expenses shall include depreciation based on cost of replacement and amortization of, and interest on, indebtedness. “(2) No part of the net earnings of the owner inures to the benefit of any private shareholder or individual. “(3) The property is used for the actual operation of the exempt activity, and does not exceed an amount of property reasonably necessary to the accomplishment of the exempt purpose. “(4) The property is not used or operated by the owner or by any other person so as to benefit any officer, trustee, director, shareholder, member, employee, contributor, or bondholder of the owner or operator, or any other person, through the distribution of profits, payment of excessive charges or compensations or the more advantageous pursuit of their business or profession. “(5) The property is not used by the owner or members thereof for fraternal or lodge purposes, or for social club purposes except where such use is clearly incidental to a primary religious, hospital, scientific, or charitable purpose. “(6) The property is irrevocably dedicated to religious, charitable, scientific, or hospital purposes and upon the liquidation, dissolution or abandonment of the owner will not inure to the benefit of any private person except a fund, foundation or corporation organized and operated for religious, hospital, scientific, or charitable purposes. . . . “The exemption provided for herein shall be known as the ‘welfare exemption.’ ” Our concern centers on section 214, subdivision (a)(1) (hereafter, section 214(a)(1)). County denied Rideout’s applications for the welfare exemption for the tax years 1986-1987 and 1987-1988. Rideout paid the taxes under protest and applied for a refund. After County denied the refund, Rideout sued County. County contends that Rideout had excess revenues, under section 214, of 24 and 21 percent for the two years in question. Rideout concedes that its net operating revenues under section 214 exceeded 10 percent in each of those two years. In summary judgment proceedings, the parties narrowed the issues to the single issue stated above and the trial court ruled in favor of Rideout, County argues that Rideout is automatically ineligible for the welfare exemption for the years in question because its net revenues exceeded the 10 percent limitation of section 214(a)(1). Rideout counters that the 10 percent provision constitutes a “safe harbor” for nonprofit hospitals by which the hospital can be deemed to satisfy section 214(a)(1), but that a nonprofit hospital with revenues over 10 percent can still meet the condition of section 214(a)(1) by showing, pursuant to the general rule, that it is not organized or operated for profit. We conclude that Rideout’s position is essentially correct. Discussion The issue in this case presents a question of law that we consider independently. (See Rudd v. California Casualty Gen. Ins. Co. (1990) 219 Cal.App.3d 948, 951-952 [268 Cal.Rptr. 624]; Burke Concrete Accessories, Inc. v. Superior Court (1970) 8 Cal.App.3d 773, 774-775 [87 Cal.Rptr. 619].) All property in California is subject to taxation unless exempted under federal or California law. (Cal. Const., art. XIII, § 1; Rev. & Tax. Code, § 201; all further references to undesignated sections are to the Revenue and Taxation Code unless otherwise specified.) The constitutional basis for the “welfare exemption” was added to the California Constitution in 1944; as revised nonsubstantively in 1974, it now provides: “The Legislature may exempt from property taxation in whole or in part: [f] . . . Property used exclusively for religious, hospital, or charitable purposes and owned or held in trust by corporations or other entities (1) that are organized and operating for those purposes, (2) that are nonprofit, and (3) no part of whose net earnings inures to the benefit of any private shareholder or individual.” (Cal. Const., art. XIII, § 4, subd. (b); formerly art. XIII, § 1c.) The rationale for the welfare exemption is that the exempt property is being used either to provide a government-like service or to accomplish some desired social objective. (Ehrman & Flavin, Taxing Cal. Property (3d ed. 1989) Exempt Property, § 6.05, p. 9.) Pursuant to this constitutional authorization, the Legislature in 1945 enacted section 214 and labeled that exemption the “welfare exemption.” In this appeal, we are asked to interpret subdivision (a)(1) of section 214. Certain general principles guide our interpretation. “Our function is to ascertain the intent of the Legislature so as to effectuate the purpose of the law. (California Teachers Assn. v. San Diego Community College Dist. (1981) 28 Cal.3d 692, 698 [170 Cal.Rptr. 817, 621 P.2d 856].) To ascertain such intent, courts turn first to the words of the statute itself (ibid..), and seek to give the words employed by the Legislature their usual and ordinary meaning. (Lungren v. Deukmejian (1988) 45 Cal.3d 727, 735 [248 Cal.Rptr. 115, 755 P.2d 299].) When interpreting statutory language, we may neither insert language which has been omitted nor ignore language which has been inserted. (Code Civ. Proc., § 1858.) The language must be construed in the context of the statutory framework as a whole, keeping in mind the policies and purposes of the statute (West Pico Furniture Co. v. Pacific Finance Loans (1970) 2 Cal.3d 594, 608 [86 Cal.Rptr. 793, 469 P.2d 665]), and where possible the language should be read so as to conform to the spirit of the enactment. (Lungren v. Deukmejian, supra, 45 Cal.3d at p. 735.)” (Rudd v. California Casualty Gen. Ins. Co., supra, 219 Cal.App.3d at p. 952.) If the statute is ambiguous or uncertain, courts employ various rules of construction to assist in the interpretation. (See 58 Cal.Jur.3d, Statutes, §§ 82-118, pp. 430-508.) Finally, “[t]he welfare exemption, like all tax exemption statutes, is to be strictly construed to the end that the exemption allowed is not extended beyond the plain meaning of the language employed. However, the rule of strict construction does not mean that the narrowest possible interpretation be given; 1 “strict construction must still be a reasonable construction.” ’ (Cedars of Lebanon Hosp. v. County of L.A. (1950) 35 Cal.2d 729, 734-735 [221 P.2d 31, 15 A.L.R.2d 1045]; English v. County of Alameda (1977) 70 Cal.App.3d 226, 234 [138 Cal.Rptr. 634].)” (Peninsula Covenant Church v. County of San Mateo (1979) 94 Cal.App.3d 382, 392 [156 Cal.Rptr. 431].) We therefore first consider the language of section 214(a)(1), which stated at the relevant times herein: “(a) Property used exclusively for religious, hospital, scientific, or charitable purposes owned and operated by community chests, funds, foundations or corporations organized and operated for religious, hospital, scientific, or charitable purposes is exempt from taxation if: [f] (1) The owner is not organized or operated for profit; provided, that in the case of hospitals, such organization shall not be deemed to be organized or operated for profit, if during the immediate preceding fiscal year the excess of operating revenues, exclusive of gifts, endowments and grants-in-aid, over operating expenses shall not have exceeded a sum equivalent to 10 percent of such operating expenses. As used herein, operating expenses shall include depreciation based on cost of replacement and amortization of, and interest on, indebtedness.” (See fn. 1, ante.) As we immediately see, the proviso presents somewhat of a “knotty” problem, being cast as a double negative—if revenues did not exceed 10 percent, the hospital shall not be deemed to be organized or operated for profit. Under the language of section 214(a)(1), the Legislature did not automatically exclude nonprofit hospitals earning more than 10 percent surplus revenues from the welfare exemption. The proviso does not address this situation on its face; it concerns only the hospital earning 10 percent or under. In fact, the automatic exclusion would have been a simple matter to accomplish—a mere untying of the two “knots” from the proviso would have done it. We note that in other sections of the Revenue and Taxation Code, when the Legislature wishes to exclude certain entities from a taxation exemption it can do so in clear terms. (See, e.g., § 201.2, subd. (c): “(c) This section shall not be construed to exempt any profit-making organization or concessionaire from any property tax, . . .”) Nevertheless, there is that double negative. Does that double negative make a positive? In other words, is the converse of the proviso to be implied—as County argues—so that a hospital which exceeded the 10 percent figure is deemed unable to satisfy section 214(a)(1)? These questions raise ambiguities that call for the employment of certain rules of construction. A fundamental rule of construction is that we must assume the Legislature knew what it was saying and meant what it said. (Blew v. Horner (1986) 187 Cal.App.3d 1380, 1388 [232 Cal.Rptr. 660]; Tracy v. Municipal Court (1978) 22 Cal.3d 760, 764 [150 Cal.Rptr. 785, 587 P.2d 227]; Rich v. State Board of Optometry (1965) 235 Cal.App.2d 591, 604 [45 Cal.Rptr. 512].) In related fashion, courts will not presume an intent to legislate by implication. (People v. Welch (1971) 20 Cal.App.3d 997, 1002 [98 Cal.Rptr. 113]; First M. E. Church v. Los Angeles Co. (1928) 204 Cal. 201, 204 [267 P. 703].) County has constructed section 214 on a foundation of implication which does not fare well under the weight of these rules. Another important rule is that when the Legislature has expressly declared its intent, the courts must accept that declaration. (Tyrone v. Kelley (1973) 9 Cal.3d 1, 11 [106 Cal.Rptr. 761, 507 P.2d 65]; see California Assn. of Psychology Providers v. Rank (1990) 51 Cal.3d 1, 15 [270 Cal.Rptr. 796, 793 P2d 2].) Here, the application of this rule requires us to consider section 214’s legislative history. (See 51 Cal.3d at pp. 14-16.) As originally enacted in 1945, section 214 did not contain the proviso found in subdivision (a)(1), and the condition stated by subdivision (a)(3) was different. The section originally read in pertinent part as follows: “[a] Property used exclusively for religious, hospital, scientific, or charitable purposes owned and operated by community chests, funds, foundations or corporations organized and operated for religious, hospital, scientific, or charitable purposes is exempt from taxation if: “(1) The owner is not organized or operated for profit; “(2) No part of the net earnings of the owner inures to the benefit of any private shareholder or individual; “(3) The property is not used or operated by the owner or by any other person for profit regardless of the purposes to which the profit is devoted; . . .” (Stats. 1945, ch. 241, § 1, p. 706.) In Sutter Hospital v. City of Sacramento (1952) 39 Cal.2d 33 [244 P.2d 390], the California Supreme Court was asked whether a nonprofit hospital which had deliberately earned an 8 percent surplus of income over expenses to be used for debt retirement and facility expansion could qualify for the welfare exemption of section 214. Relying on subdivision (a)(3) as stated above, the court said no. (39 Cal.2d at pp. 39-41.) The court acknowledged that its holding made it difficult for modern hospitals to operate in a financially sound manner to reduce indebtedness and expand their facilities, but said that matter should be addressed to the Legislature rather than the courts because subdivision (a)(3) compelled the court’s holding. (39 Cal.2d at pp. 40-41.) Responding to the challenge raised by the Sutter decision, the Legislature in 1953 amended section 214. (Stats. 1953, ch. 730, § 1-4, pp. 1994-1996; Christ The Good Shepherd Lutheran Church v. Mathiesen (1978) 81 Cal.App.3d 355, 365 [146 Cal.Rptr. 321].) This amendment was proposed in Assembly Bill No. 1023 (A.B. 1023). As originally introduced, A.B. 1023 rewrote subdivision (a)(3) to require simply that the property be “used for the actual operation of the exempt activity,” and contained an urgency clause setting forth the Legislature’s intent as follows: “This act is an urgency measure necessary for the immediate preservation of the public peace, health or safety within the meaning of Article IV of the Constitution, and shall go into immediate effect. The facts constituting such necessity are: Continuously since the adoption of the ‘welfare exemption’ it has been understood by the administrators of the law, as well as by the public generally, that it was the purpose and the intent of Legislature in the adoption of subdivision [a](3) of Section 214 of the Revenue and Taxation Code to disqualify for tax exemption any property of a tax exempt organization which was not used for the actual operation of the exempt activity, but that such organization could rightfully use the income from the property devoted to the exempt activity for the purposes of debt retirement, expansion of plant and facilities or reserve for operating contingencies without losing the tax exempt status of its property. “Recently, doubt has been cast upon the foregoing interpretation by a decision of the State Supreme Court involving the tax exemption of a hospital. This decision was broad in its application and has caused the postponement or actual abandonment of plans for urgently needed hospital construction and expansion at a time when there are insufficient hospital facilities in this State to properly care for the health needs of its citizens, and virtually no surplus facilities for use in case of serious epidemic or disaster. This Legislature has recognized that in addition to gifts and bequests the traditional method for the financing of the expansion and construction of voluntary religious and community nonprofit hospital facilities is through the use of receipts from the actual operating facilities. In its decision the Supreme Court indicated that this was a matter for legislative clarification. “It has never been the intention of the Legislature that the property of nonprofit religious, hospital or charitable organizations otherwise qualifying for the welfare exemption should be denied exemption if the income from the actual operation of the property for the exempt activity be devoted to the purposes of debt retirement, expansion of plant and facilities or reserve for operating contingencies, it having been the intent of the Legislature in adopting subsection [a](3) of Section 214 to deny exemption to property not used for exempt purposes even though the income from the property was used to support an exempt activity. “Therefore, in order to clarify the legislative intent and to remove any doubt with respect to the status of property actually used for exempt purposes, it is necessary to amend subdivision [a](3) of Section 214 of the Revenue and Taxation Code. It is essential that this be done at the earliest possible moment to avoid further delays in the construction and expansion of needed hospital facilities.” (Stats. 1953, ch. 730, § 4, pp. 1995-1996.) About three months after this urgency clause and amendment to subdivision (a)(3) were proposed in A.B. 1023, A.B. 1023 was amended to include the proviso in subdivision (a)(1) at issue here. (Stats. 1953, ch. 730, § 1, p. 1994.) Thereafter, A.B. 1023—with the urgency clause and the noted changes to subdivisions (a)(1) and (a)(3)—was enacted into law. (Stats. 1953, ch. 730, § 1, pp. 1994-1996.) In the urgency clause, the Legislature expressly stated its intent that a section 214 organization “could rightfully use the income from the property devoted to the exempt activity for the purposes of debt retirement, expansion of plant and facilities or reserve for operating contingencies without losing the tax exempt status of its property,” and that “[i]t has never been the intention of the Legislature that the property of nonprofit . . . hospital . . . organizations otherwise qualifying for the welfare exemption should be denied exemption if the income from the actual operation of the property for the exempt activity be devoted to the purposes of debt retirement, expansion of plant and facilities or reserve for operating contingencies, . . .” (Stats. 1953, ch. 730, § 4, pp. 1995-1996.) Where the Legislature has expressly declared its intent, we must accept that declaration. (Tyrone v. Kelley, supra, 9 Cal.3d at p. 11; see California Assn. of Psychology Providers v. Rank, supra, 51 Cal.3d at p. 15.) Pursuant to the legislative expression here, there is no limitation on earned revenue that automatically disqualifies a nonprofit hospital from obtaining the welfare exemption; the concern is whether that revenue is devoted to furthering the exempt purpose by retiring debt, expanding facilities or saving for contingencies. It is true that the urgency clause containing the Legislature’s expressed intent was made a part of A.B. 1023 before the proviso in section 214(a)(1) was added to that bill, and that the clause refers to section 214(a)(3). Regardless of timing, however, both the section 214(a)(1) proviso and the urgency clause were enacted into law as part of A.B. 1023. (Stats. 1953, ch. 730, §§ 1, 4, pp. 1995-1996.) More importantly, the urgency clause focuses on the issues of tax exemptions for hospitals, the urgent need for hospital construction and expansion, and the ways of financing that construction and expansion for nonprofit hospitals. It is in this context—a context fundamentally implicated by a hospital earning above the 10 percent figure in section 214(a)(1)—that the Legislature declares “[i]t has never been the intention of the Legislature that the property of nonprofit . . . hospital . . . organizations otherwise qualifying for the welfare exemption should be denied exemption if the income from the actual operation of the property for the exempt activity be devoted to the purposes of debt retirement, expansion of plant and facilities or reserve for operating contingencies, . . .” (Stats. 1953, ch. 730, § 4, p. 1996.) In a related vein, the reference in the urgency clause to section 214(a)(3) concerns the issue of how the use of income from exempted property affects welfare exemption eligibility; this issue is also fundamentally implicated in the context of a nonprofit hospital earning a surplus revenue greater than 10 percent. County contends the section 214 (a)(1) proviso is rendered meaningless if interpreted to allow a nonprofit hospital that earns more than 10 percent the welfare exemption; under such an interpretation, County maintains, it makes no difference whether a nonprofit hospital earns below or above the 10 percent figure—the exemption can be claimed in either instance. We think the 10 percent figure in section 214(a)(1) is meaningful even if nonprofit hospitals that earn over that figure can still qualify for the welfare exemption. The 10 percent figure provides a clear guideline by which nonprofit hospitals can engage in sound financial practices to further the exempt activity without jeopardizing their tax exempt status, assuming they otherwise qualify for the welfare exemption. The proviso in section 214(a)(1) recognizes the complex financial and functional realities of the modern hospital operation, an operation that often requires deliberately designed surplus revenues to ensure adequate levels of service and resources. (See Sutter Hospital v. City of Sacramento, supra, 39 Cal.2d at pp. 36, 39-40; see also St. Francis Hosp. v. City & County of S. F. (1955) 137 Cal.App.2d 321, 323-326 [290 P.2d 275]; Cedars of Lebanon Hosp. v. County of L. A. (1950) 35 Cal.2d 729, 735-736 [221 P.2d 31, 15 A.L.R.2d 1045].) The modern hospital is an extremely complex entity—essentially, it is a minicity. (See Cedars of Lebanon Hosp. v. County of L. A., supra, 35 Cal.2d at pp. 735-745.) A modern hospital generates significant revenue but spends considerable amounts for labor, equipment, facilities and capital outlay; large and complex annual budgets are commonplace in this setting. (See St. Francis Hosp. v. City & County ofS. F., supra, 137 Cal.App.2d at p. 325.) And in this setting, a surplus might be accidental rather than designed; or a particular surplus might be designed but the fate of fortuity intervenes and the budget forecasters have sleepless nights. (Ibid.) Recall, section 214 was amended in light of the Sutter Hospital court’s request for legislative intervention after the court acknowledged that its holding made it difficult for modern hospitals to operate in a financially sound manner to reduce indebtedness and expand their facilities. In that case, the nonprofit hospital purposely earned surplus revenue to retire its debt and expand its facilities. (39 Cal.2d at pp. 36, 40.) Accordingly, § 214(a)(1) provides a clear guideline by which nonprofit hospitals can deliberately design surplus revenues and not risk losing their tax exempt status (provided the other conditions of section 214 are satisfied and the revenues are used for proper purposes). The very complexity just described and recognized in the cited cases runs counter to an interpretation that an earned surplus revenue above 10 percent automatically disqualifies a nonprofit hospital from the welfare exemption. To say, as County does with its interpretation of automatic ineligibility, that a nonprofit hospital which earned 10 percent is eligible for the exemption while the nonprofit hospital which earned 10.01 percent is automatically excluded from it, is to say that these complex realities are irrelevant. Rather, the nonprofit hospital earning over 10 percent is outside the clear guideline offered by section 214(a)(1) and thereby subject to an increased scrutiny by tax authorities and an increased burden in showing it is not organized or operated for profit. Such a nonprofit hospital is no longer “deemed” to meet the condition of section 214(a)(1). In short, the proviso of section 214(a)(1) provides no protection for the nonprofit hospital earning over 10 percent; that hospital must prove it is not organized or operated for profit under the general rule of section 214(a)(1). Contrary to County’s argument, therefore, the section 214(a)(1) 10 percent proviso is meaningful even if not construed as a point of automatic disqualification. County also relies on a 1954 opinion of the Attorney General and a 1967 opinion from the First District. The Attorney General’s opinion considered whether the 1953 amendments to subdivisions (a)(1) and (a)(3) of section 214 were valid and effective in a general sense. (Welfare Exemptions, 23 Ops.Cal.Atty.Gen. 136 (1954).) In passing, the Attorney General noted that “[t]he Legislature might well determine that hospitals as distinguished from other organizations entitled to the welfare exemption usually operate on a schedule of rates more comparable to a schedule of rates by a commercial organization and therefore their net earnings should be restricted in order for them to have the benefit of the welfare exemption (see Sutter Hospital case pp. 39-40).” (Id. at p. 139.) The First District opinion—San Francisco Boys' Club, Inc. v. County of Mendocino (1967) 254 Cal.App.2d 548 [62 Cal.Rptr. 294]—involved profitmaking logging operations on land owned by and used for a nonprofit, charitable club for boys. Referring to the section 214(a)(1) proviso at issue here, the court noted that “the Legislature amended section 214 to permit nonprofit hospitals to have excess operating revenues in a sum equivalent to 10 percent of operating expenses.” (254 Cal.App.2d at p. 557.) Against the Attorney General’s passing reference of 1954 and the First District’s dicta of 1967 stands an Attorney General opinion from 1988 on the identical issue in this case. (Welfare Exemption Qualification, 71 Ops.Cal.Atty.Gen. 106 (1988).) In fact, it was County that requested this 1988 opinion. In that opinion, the Attorney General concluded that “[a] non-profit hospital which had earned surplus revenue in excess of ten percent during the preceding fiscal year might still qualify for the ‘welfare exemption’ from taxation under section 214 of the Revenue and Taxation Code.” (Id. at p. 107.) Although it was not used as pivotal support, the 1954 Attorney General opinion was cited twice in the 1988 opinion. (Id. at p. 112.) The First District’s opinion in San Francisco Boys' Club concerned an issue relating to a charitable social organization rather than a hospital. For that reason, the analysis there is not germane to the hospital-specific provision before us. Although opinions of the Attorney General, while not binding, are entitled to great weight (Napa Valley Educators' Assn. v. Napa Valley Unified School Dist. (1987) 194 Cal.App.3d 243, 251 [239 Cal.Rptr. 395]; Henderson v. Board of Education (1978) 78 Cal.App.3d 875, 883 [144 Cal.Rptr. 568]), it is unclear how to apply this principle to the two published Attorney General opinions noted above. This principle applies because the Legislature is presumed to know of the Attorney General’s formal interpretation of the statute. (Ibid.) But the two Attorney General opinions seem to be at odds. And while the 1954 opinion is a contemporaneous construction of long duration, the 1988 opinion involves the identical issue in this case and the Legislature amended section 214(a)(1) nonsubstantively about one and one-half years after the 1988 opinion was published. (Welfare Exemption Qualification, supra, 71 Ops.Cal.Atty.Gen. 106; Stats. 1989, ch. 1292, § 1.) So we return, as we must, to the words used by the Legislature in the statute and in the urgency clause’s declaration of intent. That return also provides the answer to County’s final argument. County argues that its interpretation of the 10 percent figure in section 214 as a point of automatic ineligibility is supported by the language in section 214(a)(1) that qualifies the terms “operating revenues” and “operating expenses.” Under section 214(a)(1), gifts, endowments and grants-in-aid are excluded from “operating revenues” while depreciation based on cost of replacement and amortization of, and interest on, indebtedness are included in “operating expenses.” Basically, County argues that the Legislature has provided certain financial advantages for facility improvement, debt retirement and nonoperating revenues in section 214(a)(1), thereby intending to place a cap on what nonprofit hospitals can earn for welfare exemption eligibility. The problem with this argument is that it is difficult to define automatic ineligibility in a more roundabout way than that suggested by County’s interpretation. If the section 214(a)(1) proviso accounts favorably to nonprofit hospitals for all of the uses of net earnings that do not defeat welfare exemption eligibility, why did the Legislature include that double negative? In such a situation, the proviso would be tailor-made for dispensing with the double negative because the statute has the sound financial management practices and the allowed uses for net earnings built into it. But the section 214(a)(1) proviso, by its terms, applies only to the nonprofit hospital whose operating revenues have not exceeded 10 percent of operating expenses; in that situation, the proviso deems the nonprofit hospital in compliance with section 214(a)(1). The proviso, by its terms, does not cover the nonprofit hospital which has earned over 10 percent; in that situation, the nonprofit hospital must show it is not organized or operated for profit. And the Legislature stated in the urgency clause that it has never been the Legislature’s intent “that the property of nonprofit . . . hospital . . . organizations otherwise qualifying for the welfare exemption should be denied exemption if the income from the actual operation of the property for the exempt activity be devoted to the purposes of debt retirement, expansion of plant and facilities or reserve for operating contingencies . . . .” Nor does our construction of section 214(a)(1) violate the rule of strict construction by extending the tax exemption allowed beyond the plain meaning of the language employed. (Peninsula Covenant Church v. County of San Mateo, supra, 94 Cal.App.3d at p. 392.) If we have attempted to do anything in this opinion, we have attempted to adhere to the plain meaning of the language employed in section 214(a)(1). For all of these reasons, we conclude that a nonprofit hospital that earned surplus revenue in excess of 10 percent during the relevant fiscal year can still qualify for the “welfare exemption” from taxation under section 214. Disposition The judgment is affirmed. Each party to bear its own costs on appeal. Sparks, Acting P. J. and Nicholson, J., concurred. A petition for a rehearing was denied August 17, 1992. Section 214(a)(1) was amended nonsubstantively in 1989 and now provides: “(a) Property used exclusively for religious, hospital, scientific, or charitable purposes owned and operated by community chests, funds, foundations or corporations organized and operated for religious, hospital, scientific, or charitable purposes is exempt from taxation if: [1|] (1) The owner is not organized or operated for profit. However, in the case of hospitals, the organization shall not be deemed to be organized or operated for profit, if during the immediate preceding fiscal year the excess of operating revenues, exclusive of gifts, endowments and grants-in-aid, over operating expenses has not exceeded a sum equivalent to 10 percent of those operating expenses. As used herein, operating expenses shall include depreciation based on cost of replacement and amortization of, and interest on, indebtedness.” (Stats. 1989, ch. 1292, § 1.) In 1985, the previously undesignated introductory paragraph of section 214 was lettered “(a).” (Stats. 1985, ch. 542, § 2, p. 2026.) This change redesignated section 214(1) as 214(a)(1), section 214(2) as 214(a)(2), and so on. For the sake of simplicity we will use the terms “section 214(a)(1)” “section 214(a)(2)” and the like when referring to the pre- or the post-1985 section 214. Of course, if a hospital satisfies this proviso it must still actually be nonprofit because the welfare exemption does not apply to profitmaking hospitals regardless of their earnings (Cal. Const., art. XIII, § 4, subd. (b)); moreover, to claim the exemption, the nonprofit hospital must satisfy all of the other conditions set forth in section 214(a) (i.e., subds. (2) through (6)). This is not to say that a nonprofit hospital can earn any amount above 10 percent and still qualify for the welfare exemption. The hospital must show that indeed it is not organized or operated for profit and that it meets all of the other conditions in section 214. One of these other conditions, section 214 (a)(3), now mandates in pertinent part that the “property [be] used for the actual operation of the exempt activity, and. . . not exceed an amount of property reasonably necessary to the accomplishment of the exempt purpose(Italics added.) County also relies on cryptic passages in certain letters written in 1953 to then Governor Earl Warren. These letters were from the attorney for the California Hospital Association, which sponsored A.B. 1023, and from the Attorney General. In deciding whether to sign A.B. 1023 amending subdivisions (a)(1) and (a)(3), Governor Warren requested the views of these two entities. These unpublished and informal expressions to the Governor—especially the letter from the hospital association attorney—are not the type of extrinsic aids that courts can meaningfully use in discerning legislative intent. (See 58 Cal.Jur.3d, Statutes, §§ 160-172, pp. 558-582.) Our opinion and conclusion are limited to this single question of law. Accordingly, we express no views on whether Rideout actually was or was not organized or operated for profit or whether Rideout can obtain the welfare exemption for the specific years in question, aside from concluding that earnings in excess of 10 percent do not automatically disqualify Rideout from the exemption.
CASELAW
User:Soserene420/sandbox Horace William "Bill" Sargent (April 17, 1927 - October 19, 2003) was a producer of films, a prolific inventor with over 400 patents to his name, including the father of High Definition television, and patented and introduced Pay-Per-View television in 1962 by showing a live boxing match between Cassius Clay (Muhammad Ali) and George Logan.
WIKI
User:ChangeWithUs Starting my Wikipedia editing at HerStory conference at the United Nations International Youth Day on August 12th 2016. My name is Mike, and I am a currently studying in the City University of New York and Gordon Conwell Theological Seminary. Projects * WP: LGWA - Koch Scholarship Research on HIV/AIDS. Current Religion contributor to the project
WIKI
Program to convert HEX to BCD in 8085 Microprocessor MicroprocessorMicrocontroller Here we will see one 8085 program that will convert binary numbers (HEX) to its BCD equivalent. Problem Statement A binary number is stored at location 800H. Convert the number into its BCD equivalent and store it to the memory location 8050H. Discussion Here we are taking a number from the memory, and initializing it as a counter. Now in each step of this counter we are incrementing the number by 1, and adjust the decimal value. By this process we are finding the BCD value of binary number or hexadecimal number. We can use INR instruction to increment the counter in this case but this instruction will not affect carry flag, so for that reason we have used ADI 10H Input Address Data 8000 34   Flow Diagram   Program Address HEX Codes Labels Mnemonics Comments F000 21, 00, 80 LXI H,8000H Initialize memory pointer F003 16, 00 MVI D,00H Clear D- reg for Most significant Byte F005 AF XRA A Clear Accumulator F006 4E MOV C,M Get HEX data F007  C6, 01 LOOP ADI 01H Count the number one by one F009  27 DAA Adjust for BCD count F00A D2, 0E, F0 JNC SKIP Jump to SKIP F00D  14 INR D Increase D F00E 0D SKIP DCR C Decrease C register F00F C2, 07, F0 JNZ LOOP Jump to LOOP F012 6F MOV L,A Load the Least Significant Byte F013 62 MOV H,D Load the Most Significant Byte F014 22, 50, 80 SHLD 8050H Store the BCD F017 76 HLT Terminate the program   Output Address Data 8050 52 raja Published on 09-Oct-2019 11:03:14 Advertisements
ESSENTIALAI-STEM
Create an Element with Style attribute using JavaScript avatar Borislav Hadzhiev Fri Jan 07 20222 min read banner Photo by João Ferrão Create an Element with Style attribute using JavaScript # To create an element with a style attribute: 1. Use the document.createElement() method to create the element. 2. Use the setAttribute() method to set the style attribute on the element. 3. Add the element to the page using the appendChild() method. Here is the HTML for the examples in this article. index.html <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8" /> </head> <body> <div id="box"></div> <script src="index.js"></script> </body> </html> And here is the related JavaScript code. index.js // ✅ Create element const el = document.createElement('div'); // ✅ Set Style Attributes on Element el.setAttribute( 'style', 'background-color: salmon; color: white; width: 150px; height: 150px;', ); // ✅ Alternatively, Set styles on Element // el.style.backgroundColor = 'salmon'; // el.style.color = 'white'; // el.style.width = '150px'; // el.style.height = '150px'; // ✅ Add text content to element el.textContent = 'Hello world'; // ✅ Or set the innerHTML of the element // el.innerHTML = `<span>Hello world</span>`; // ✅ add element to DOM const box = document.getElementById('box'); box.appendChild(el); We used the document.createElement method to create the element. The only parameter we passed to the method is the type of element to be created (div in the example). The createElement method returns the newly created element. We used the setAttribute method to set the style attribute on the element. The setAttribute method takes 2 parameters: 1. name - the name of the attribute whose value is to be set. 2. value - the value to assign to the attribute. If the attribute already exists, the value is updated, otherwise a new attribute is added with the specified name and value. You can alternatively set styles on the element using the style object. index.js const el = document.createElement('div'); el.style.backgroundColor = 'salmon'; el.style.color = 'white'; el.style.width = '150px'; el.style.height = '150px'; Note that when setting styles using the style property, multi-name words are camel-cased. You can use the textContent property to set the element's text content or the innerHTML property to set the element's inner HTML markup. You shouldn't use the innerHTML property with user provided data without escaping it. This would leave your application open to cross-site scripting attacks. You can use the appendChild method to add the element to the page. The method adds a node to the end of the list of children of the element it was called on. If I load the page from the example above, I can see that the style attribute is successfully set on the element. style attribute successfully set Use the search field on my Home Page to filter through my more than 1,000 articles.
ESSENTIALAI-STEM
This Revolutionary Growth Stock Is Down 36% Since Its IPO. Here's Why It's Time to Buy Now An initial public offering (IPO) is when a private company looks for funding from the public and lists its shares on an exchange like the Nasdaq or the New York Stock Exchange. Its stock is then traded freely between investors, with its price determined by market forces. Confluent (NASDAQ: CFLT) is a revolutionary data streaming company that hit the public markets on June 24, 2021, priced at $36 per share. It soared to an all-time high of $93.60 in the same year, but it has since fallen to just $23.03 amid the broader sell-off in the tech sector. That means IPO investors would be sitting on a loss of 36%. But that result isn't necessarily reflective of the company's impressive progress. Here's why Confluent stock is a buy now. Confluent: The past, present, and future In 2008, a team of employees working for professional networking platform LinkedIn (now owned by Microsoft) developed a new tool called Apache Kafka. It was designed to help LinkedIn process and act on data coming from its user feed in real time, which was becoming much easier thanks to the onset of cloud computing. Historically, data was warehoused on-premises and analyzed after the fact, but the cloud had the potential to make that process practically instant. Apache Kafka introduced LinkedIn (and the rest of the corporate world) to data streaming for the first time. But the list of use cases continued to grow rapidly as more organizations moved into the cloud, so the team departed LinkedIn to launch Confluent in 2014, which enabled them to commercialize data streaming and offer a whole host of related solutions. Confluent has since gone from strength-to-strength, and now serves thousands of customers, including some of America's largest companies. Retail giant Walmart, for example, uses Confluent to manage inventory. Confluent connects all of Walmart's physical stores and its online channels to monitor sales across the entire ecosystem in real time, so whenever a product is sold, it's replenished as necessary. Put simply, Confluent is the reason Walmart is almost always fully stocked across its locations -- but why is that so important, and what's the end result? Trust, and customer satisfaction. People know they can walk into any Walmart store and find what they're looking for, so they do. $1 billion in revenue might be around the corner Confluent's financial progress has been remarkable. It delivered $585.9 million in revenue during 2022, up 51% compared to 2021. It has now increased more than threefold since 2019, cementing a compound annual growth rate of 57.6%. The company just issued guidance suggesting it could generate up to $765 million in revenue during 2023, which would represent below-trend growth of 31% amid tough economic conditions. But even at that rate, it would be on track to cross $1 billion in revenue by 2025. Large organizations could help drive Confluent to that target. At the end of 2022, it had 991 customers spending at least $100,000 annually, up 35% from 743 customers at the end of 2021. But retention will also be key. Confluent has a net dollar retention rate of almost 130%, which suggests existing customers are spending 30% more money now than they were a year ago. Image source: Getty Images. Confluent has a substantial opportunity ahead Confluent's best years are still to come. The company estimates its addressable market is worth $60 billion, and it wants to remain the dominant player over the long term. International Data Corporation (IDC) predicts that 90% of the Global 1,000 companies will be using data and event streaming technologies by 2025 to improve outcomes across their businesses. Similarly, the IDC recently found that of the organizations currently using data streaming, 80% of them plan to invest in new capabilities over the next 12 to 18 months. It emphasizes the increasingly essential nature of this industry. Confluent does face some short-term challenges, though. It has always focused on growth at the expense of profitability. However, in the current economic climate, investors have shunned companies making net losses, which is why Confluent stock has tumbled. But the company is now adjusting its strategy to improve its bottom line, including by trimming costs; it's laying off 8% of its workforce and shrinking its office space as part of those plans. But there's no denying the long-term potential of the data streaming industry. Investors who buy Confluent stock today are getting in at a 36% discount to its IPO price, yet the company's revenue is substantially higher than it was back then, plus it's serving more customers than ever. Now, Confluent is working to achieve profitability by the end of this year. All signs point to upside, especially over the long term. 10 stocks we like better than Confluent When our award-winning analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* They just revealed what they believe are the ten best stocks for investors to buy right now... and Confluent wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of January 9, 2023 Anthony Di Pizio has no position in any of the stocks mentioned. The Motley Fool has positions in and recommends Confluent, Microsoft, and Walmart. The Motley Fool recommends Nasdaq. The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Wikipedia:Articles for deletion/Averasboro Township, Harnett County, North Carolina The result was delete‎__EXPECTED_UNCONNECTED_PAGE__. A close call, but after several relists, consensus has emerged that it doesn't seem possible to write an article on this. Ritchie333 (talk) (cont) 10:00, 24 October 2023 (UTC) Averasboro Township, Harnett County, North Carolina * – ( View AfD View log | edits since nomination) Fails WP:GNG. Additionally I would argue that while this nominally passes WP:NGEO as a "Populated, legally recognized place" it substantively fails it as it is functionally similar to an "area in an irrigation district", as townships in NC have been politcally defunct (though technically legally extant) since 1880. We might as well be having articles on rural fire districts or polling precincts, these are not like the self-governing entities of the same name in the northern US but administrative divisions which counties use or ignore at their pleasure. This article has been unsourced for 16 years for a reason. I can find some evidence the boundaries have been used to inform the drawing of a special lodging/tourism tax district and use in raw stats collections (since the US census collects population figures on townships) but no significant coverage of any kind. -Indy beetle (talk) 04:41, 23 September 2023 (UTC) * Automated comment: This AfD was not correctly transcluded to the log (step 3). I have transcluded it to Articles for deletion/Log/2023 September 23. —cyberbot I Talk to my owner :Online 05:03, 23 September 2023 (UTC) * Note: This discussion has been included in the deletion sorting lists for the following topics: Geography and North Carolina. Eastmain (talk • contribs) 07:22, 23 September 2023 (UTC) * Keep. As the nominator mentions, "... the boundaries have been used to inform the drawing of a special lodging/tourism tax district and use in raw stats collections (since the US census collects population figures on townships) ..." Eastmain (talk • contribs) 07:23, 23 September 2023 (UTC) * So are local tax districts notable? -Indy beetle (talk) 21:41, 23 September 2023 (UTC) * Redirect to List of townships in Harnett County, North Carolina or the like. In Delaware we have a similar situation, where the subdivisions of the counties ("hundreds") have not been meaningful since the late 19th Century or thereabouts. However, they were widely used as geographical designations until the 20th century, and probably have meaningful, substantial early histories. Given the much greater number of townships presumably present in North Carolina, I'm doubtful adequate material exists for an article on all of them; redirect to a list and they can be broken out as sufficient information is found. Choess (talk) 21:00, 24 September 2023 (UTC) * Redirect to Harnett_County,_North_Carolina. Townships are functionally irrelevant in NC, stripped of their governments in 1877, just 9 years after creation ; most all articles in List of townships in North Carolina (which has populations that may be added to the list in the county article) should also be redirected unless there is more substantive content than statistics regarding meaningless lines. Reywas92Talk 03:51, 25 September 2023 (UTC) * ●Keep- https://northcarolinahistory.org/encyclopedia/averasboro-town-of/, https://www.carolana.com/NC/Towns/Averysboro_NC.html, https://censusreporter.org/profiles/06000US3708590104-averasboro-township-harnett-county-nc/, http://gis.harnett.org/mapgallery/pdf/Townships_Large.pdf. PaulGamerBoy360 (talk) 17:40, 25 September 2023 (UTC) * @PaulGamerBoy360 To be clear, the first two links here are about a town of Averasboro, not the township. This is mentioned in the article as Averasboro being the site of the Battle of Averasborough. I would support creation of an Averasboro, North Carolina article and redirection of this one. Unclear what the map links are suppose to prove...yes the township technically has borders and statistics, but that doesn't mean they have practical significance or that it's a notable entity that needs a stand-alone article. Reywas92Talk 18:33, 25 September 2023 (UTC) * On top of that, Carolana.com is a blog. -Indy beetle (talk) 04:36, 26 September 2023 (UTC) Please add new comments below this notice. Thanks, Liz Read! Talk! 05:04, 30 September 2023 (UTC) * delete This is just "increase article count" crap, and I don't understand why people are fighting so hard against the apparent reality that these political divisions are long obsolete and were made meaningless shortly after their creation. The most we need is the list and a map for each county; a redirect is actually a nuisance because it distracts from the actual town in searching. Mangoe (talk) 05:02, 26 September 2023 (UTC) * Delete, per the nom, Reywas, and Mangoe. This is only a "place" by virtue of a long-defunct and short-lived statistical designation. We have zero sources that suggest it could be expanded to anything beyond some coordinates and infobox parameters. Good grief. * JoelleJay (talk) 05:06, 28 September 2023 (UTC) * Relisted to generate a more thorough discussion and clearer consensus. Please add new comments below this notice. Thanks, signed,Rosguill talk 14:33, 8 October 2023 (UTC) * Redirect to List of townships in North Carolina for now, as there is more there than in Harnett County, North Carolina. If this township had its own government in the 19th century there could be an article about that, but there are currently no references. Peter James (talk) 09:00, 7 October 2023 (UTC) * Relisted to generate a more thorough discussion and clearer consensus. * Note: Averasboro, North Carolina was created yesterday, I stumbled across it via Category:All uncategorized pages and began editing, then stumbled across this deletion discussion. Gjs238 (talk) 09:47, 9 October 2023 (UTC) * Averasboro, North Carolina covers both the township and the former town, the reson being the history of the township links to the former town. PaulGamerBoy360 (talk) 14:08, 9 October 2023 (UTC) * Using Kernville (former town), California as a model, I am considering moving the article to Averasboro (former town), North Carolina and opening the article with that section and making the current opening the secondary section. I suspect that is more in line with what Reywas92 envisioned when he/she said "I would support creation of an Averasboro, North Carolina article and redirection of this one." Gjs238 (talk) 15:18, 9 October 2023 (UTC) * Question: Would the other 12 townships in Harnett County, North Carolina be deleted as well? Category:Townships in Harnett County, North Carolina Gjs238 (talk) 10:58, 9 October 2023 (UTC) * I would say yes, I can't find SIGCOV on any of them. PaulGamerBoy360 (talk) 04:12, 10 October 2023 (UTC) * Strongest possible Delete - townships are not "a thing" in North Carolina since the 19th century. Here's the current version of the Constitution of North Carolina as amended: * https://www.ncleg.gov/EnactedLegislation/Constitution/NCConstitution.html * Section 24 mentions townships in passing but does not describe their role - just that the Legislature can rename them and can draw new lines. That's it - there are no powers granted and no township governments authorized. There are no other mentions of townships. They are vestigial from the 1868 NC constitution (which has since been replaced in its entirety with a different constitution). See List of townships in North Carolina. * 9 out of 10 North Carolinians probably don't know townships even exist. * NC has 100 counties. It has 1035 townships. Do we really need 1035 articles on these useless things? Who would put them on their watchlist and maintain them against vandalism and errant robots? * -- A. B. (talk • contribs • global count) 05:09, 10 October 2023 (UTC) * many townships have significant roles in history, besides this discussion is just for the townships in Harnett County. PaulGamerBoy360 (talk) 14:24, 10 October 2023 (UTC) * Paul, can you show some reliable sources that any of these Harnett County townships have anything historically important about them prior to 1880? Thanks! * — A. B. (talk • contribs • global count) 14:42, 10 October 2023 (UTC) * Regardless of that(i don't have time t the moment) what we should do is merge the townships to their respective towns. PaulGamerBoy360 (talk) 19:11, 10 October 2023 (UTC) * Paul, it’s probably infeasible to merge NC townships to NC towns. NC cities and towns have grown over 150-200 years such that city lines cut across township lines and vice versa. There’s no relationship that I’ve seen other than for one township overlapping with the original county seat. Usually when townships were drawn, there was just one municipality. Now there may be 5-10 in some counties. Some municipalities such as Kannapolis and Locust spread across 2 counties. These townships lines have little connection to contemporary geographic reality. Call some North Carolinians if you know any. Or raise the question at the NC Wikipedia (that’s probably easier). * — A. B. (talk • contribs • global count) 21:13, 10 October 2023 (UTC) * I largely agree with A.B.. To put a finer point on it, the townships were devised as divisions of counties, not as provincial outskirts of municipalities. Some were also drawn to encompass areas that had no towns and still have no towns (there is no "town of Sixpound" in Warren County's Sixpound Township), because many counties were and still are very rural places. Your merge suggestion seems to confuse these places' purpose at their inception. -Indy beetle (talk) 03:40, 11 October 2023 (UTC) * These are the Townships & Towns that I feel should be merged: * {| class="wikitable" !Township !Respective Town/Community * Averasboro Township * Averasboro(Allready Merged) * Anderson Creek Township * Anderson Creek, NC * Barbecue Township * Barbecue, NC * Johnsonville Township * Johnsonville, NC * Lillington Township * Lillington, North Carolina * } * PaulGamerBoy360 (talk) 03:59, 11 October 2023 (UTC) * Lillington Township * Lillington, North Carolina * } * PaulGamerBoy360 (talk) 03:59, 11 October 2023 (UTC) * PaulGamerBoy360 (talk) 03:59, 11 October 2023 (UTC) Relisting comment: Final relist. Please add new comments below this notice. Thanks, Liz Read! Talk! 21:12, 15 October 2023 (UTC) * If anything, it would make more sense to merge the townships to the parent county article. I would stress two that there is zero inherent legal relationship between a municipality and a township. This is not the Northeast US. Selectively merging townships to community articles simply because they share a name seems a little arbitrary. And what exactly is there to merge? "Here is a bigger place which is not the place you are reading about, though the place you are reading about happens to fall inside of it. Here is how big it is and how many people it had in the 2010 census." We don't merge articles on non-notable political constituencies or fire districts downwards into the communities that fall within them simply because the larger districts exist. And that is why !votes are leading toward redirect and delete. -Indy beetle (talk) 04:23, 11 October 2023 (UTC) * Relisted to generate a more thorough discussion and clearer consensus. * Delete - This is a ridiculous but natural result of the "legal recognition" requirement in GEOLAND - we have to play at being lawyers (and not just any lawyer: 19th century North Carolina lawyers) to work out what the status these places had, which is definitely not notable in any other sense or under any other standard, means in terms of notability on Wikipedia. There is nothing to say about these places, most people in them don't know what they are. GEOLAND was only ever supposed to give a presumption of notability, and in this case the presumption has been decisively rebutted by simply referring to the total lack of coverage for them. FOARP (talk) 11:11, 17 October 2023 (UTC) * Delete presumption of notability is not borne out by sources that exist. Fails GNG (sources above are not reliable nor establish notability for our purposes.) Der Wohltemperierte Fuchs talk 18:16, 23 October 2023 (UTC)
WIKI
Promotion versus suppression of rat colon carcinogenesis by chlorophyllin and chlorophyll: Modulation of apoptosis, cell proliferation, and β-catenin/Tcf signaling Carmen A. Blum, Meirong Xu, Gayle A. Orner, G. Darío Díaz, Qingjie Li, Wan Mohaiza Dashwood, George S. Bailey, Roderick H. Dashwood Research output: Contribution to journalArticlepeer-review 22 Scopus citations Abstract The carcinogens 2-amino-3-methylimidazo[4,5-f]quinoline (IQ) and 1,2-dimethylhydrazine (DMH) induce colon tumors in the rat that contain mutations in β-catenin, but the mutation pattern can be influenced by exposure to dietary phytochemicals, such as the water-soluble derivative of chlorophyll called chlorophyllin. Whereas chlorophyllin is an effective blocking agent during the initiation phase, post-initiation responses depend upon the exposure protocol, and can be influenced by the initiating agent and the concentration of chlorophyllin. Post-initiation treatment with 0.001% chlorophyllin (w/v) in the drinking water promoted colon carcinogenesis in the rat, but much higher concentrations (1.0% chlorophyllin) led to suppression. Bromodeoxyuridine and terminal deoxynucleotidyl transferase-mediated nick end labeling (TUNEL) indices revealed that the promotional concentration of 0.001% chlorophyllin increased the ratio of cell proliferation to apoptosis in the colonic crypts, whereas concentrations in the range 0.0l-1.0% chlorophyllin modestly reduced this ratio. Molecular studies showed that the spectrum of β-catenin mutations was markedly different in chlorophyllin-promoted colon tumors - many of the mutations led to direct substitutions of critical Ser/Thr residues within the glycogen synthase kinase-3β (GSK-3β) region, whereas in all other groups, including DMH and IQ controls, the mutations typically affected amino acids adjacent to Ser33. Substitution of critical Ser/Thr residues caused β-catenin and c-Jun proteins to be markedly over-expressed compared with tumors in which the mutations substituted amino acid residues flanking these critical Ser/Thr sites. In a separate study, rats were exposed to IQ or azoxymethane (AOM), a metabolite of DMH, and they were treated post-initiation with chlorophyllin, chlorophyll, copper, or phytol in the diet. Natural chlorophyll (0.08%) suppressed AOM- and IQ-induced aberrant crypt foci (ACF), whereas chlorophyllin had no effect and copper promoted the number of small ACF induced by IQ. The results suggest that further investigation of the dose-response for suppression versus promotion by chlorophyll and chlorophyllin is warranted, including studies of the β-catenin/Tcf signaling pathway and its influence on cell proliferation and apoptosis in the colonic crypt. Original languageEnglish (US) Pages (from-to)217-223 Number of pages7 JournalMutation Research - Fundamental and Molecular Mechanisms of Mutagenesis Volume523-524 DOIs StatePublished - 2003 Externally publishedYes Keywords • 1,2-Dimethylhydrazine • 2-Amino-3-methylimidazo [4,5-f]quinoline (IQ) • Aberrant crypt foci • Apoptosis • Azoxymethane • Colon tumors • β-Catenin ASJC Scopus subject areas • Molecular Biology • Genetics • Health, Toxicology and Mutagenesis Fingerprint Dive into the research topics of 'Promotion versus suppression of rat colon carcinogenesis by chlorophyllin and chlorophyll: Modulation of apoptosis, cell proliferation, and β-catenin/Tcf signaling'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Portal:Anarchism/Anniversaries/September/September 1 * 1846 – Italian anarchist revolutionary and theorist Carlo Cafiero is born in Barletta, Apulia * 1873 - The Anarchist International begins its second congress in Geneva, Switzerland * 1880 – The Oneida Community, a utopian communalist settlement in Oneida, New York, dissolves after thirty-two years * 1911 – A failed attempt to arrest Mexican revolutionary Emiliano Zapata (pictured) during the Mexican Revolution provokes the Liberation Army of the South to revolt * 1917 – The first issue of anarchist periodical Der Ziegelbrenner is published by Ret Marut in Germany * 1920 – Italian metalworkers begin a four day occupation of their factories * 1927 – Emma Goldman addresses a memorial meeting for Sacco and Vanzetti in Canada. * 1936 – Spanish Civil War: The anarchist Isaac Puente is arrested and executed by the nationalists
WIKI
Ezhuthapurangal Ezhuthapurangal is a 1987 Indian Malayalam-language film directed by Sibi Malayil and produced by Mathew George. The film stars Suhasini Maniratnam, Ambika, Parvathy Jayaram and Murali in the lead roles. The film has musical score by Johnson and Vidyadharan. Suhasini Mani Ratnam won the Kerala State Film Award For Best Actress for this film. Plot The story deals with three socially forward women, their friendship and the troubles they face in a male-dominated society. Rajalakshmi is a college lecturer and writer whose fiancée is not able to accept her ideals. Vimala is a divorced advocate bringing up a child on her own. Seetha is a college teacher, who is leading an unhappy married life with her husband. Cast * Suhasini as Rajalakshmi (voice by aanadavally) * Ambika as Vimala Jacob (voice by bhagyalekshmi) * Parvathy Jayaram as Seetha (voice by sreeja) * Murali as Raveendranath * Nedumudi Venu as Balakrishna Menon * Babu Namboothiri as Binoy Chandy * Sreenath as Sreenivasan * Balachandran Chullikad as Balan * K. P. A. C. Sunny as Advocate * Kollam Thulasi as Judge * Kothuku Nanappan as Gopalan Nair * Ranjith as Ramanandan Soundtrack The music was composed by Nedumudi Venu, Vidyadharan and Balachandran Chullikkad and the lyrics were written by O. N. V. Kurup, Balachandran Chullikkad and Nedumudi Venu.
WIKI
The quadriceps are located above the front of your knee while the hamstrings are located on the back side of your leg above the knee. Both muscles are responsible for stabilizing your knee. Regular strengthening exercises performed every other day should have you noticing results within weeks. Knee Extensions Knee extensions require a weight machine. Position the foot pad on the top of your ankles and ensure the seat of the machine allows you to sit with your back straight so you maintain proper posture during the workout. Choose a weight that causes muscle fatigue by your eighth repetition and perform three sets of eight. Use your ankles to push the padding upward toward the ceiling in a slow and controlled motion. Hold this position for one to two seconds and then slowly lower your ankles to a starting position. The weights should barely hit each other as you resume the starting position. If the weights make a loud bang, the quadriceps are not controlling the weight. Hamstring Curls Hamstring curls require a weight machine. Lie on your stomach and place your achilles tendon under the foot pad. Reach under the machine and grasp the handle bars under the bench to ensure your upper body does not help with the hamstring curls. In a slow and controlled motion, lift your legs up so the foot padding moves toward your buttocks. Hold this position for one to two seconds and then slowly lower your ankles to the starting position. Again, the weights should barely touch as you resume the starting position. Choose a weight that causes muscle fatigue by your eighth repetition and perform three sets of eight. Dumbbell Squats Hold dumbbells in each hand with your palms facing inward. Stand with your feet shoulder-width apart and carry your weight evenly on both feet. Keep your neck aligned with your spine by looking at the wall in front of you during the entire squat. Tighten your abdominal muscles to help support your spine during the squat. Simultaneously bend your knees and hips while moving your buttocks backward as if trying to sit in an invisible chair. Do not round your spine. Once your thighs are almost parallel with the floor, exhale and push your heels into the floor as you return to the starting position. Complete 15 repetitions of squats. Considerations Perform these exercises every other day so your muscles have at least 24 hours to recover. These exercises can result in injury if performed incorrectly, so it's best to consult with a personal trainer before attempting exercises unsupervised. Consult with your doctor before starting a new exercise program, especially if you've had an injury in the past or have an underlying health condition. SHARE
ESSENTIALAI-STEM
River Camcor The River Camcor is a tributary of the Little Brosna River in central Ireland. It joins the Little Brosna in the Birr Castle Desmesne, Birr, County Offaly. The Little Brosna, in turn, joins the River Shannon close to Victoria Lock at Meelick.
WIKI
react-horizontal-timeline-view 0.1.4 • Public • Published React Horizontal Timeline npm version Build Status Coverage Status Code Climate Dependency Status devDependency Status A react port of the horizontal time-line developed by CodyHouse. Here is a demo I hope you too are a fan of the elder scrolls. This is a fork from https://github.com/jckdrpr/react-horizontal-timeline. The timeline has titles here along with the date string HorizontalTimeline It will just render a timeline with the dates that you provided and it is upto you what to do when a date is selected. i.e. it will give you the index of the date that was clicked and you can do anything with it. Property Type Default Description values array undefind sorted array of dates (required) indexCLick function undefind function that takes the index of the array as argument (required) index number 0 the index of the selected date (useful if you want to control the selected date from outside like in case of react-swipeable-views) eventsMinDistance number 80 The minimum distance between consecutive events fillingMotion object { stiffness: 150, damping: 25 } Sets the animation style of how filling motion will look slidingMotion object { stiffness: 150, damping: 25 } Sets the animation style of how sliding motion will look styles object { background: '#f8f8f8', foreground: '#7b9d6f', outline: '#dfdfdf', maxSize: 800 } object containging the styles for the timeline currently outline (the color of the boundries of the thimeline and the buttons on it's either side), foreground (the filling color, active color) and background (the background color of your page) colors along with the max length of the timeline can be changed. This is how it can be used. const VALUES = [ {date: '10/01/2016', title: 'Title'}, ... ]; export default class App extends React.Component { state = { value: 0, previous: 0 }; render() { return ( <div> <HorizontalTimeline indexClick={(index) => { this.setState({ value: index, previous: this.state.value }); }} values={ VALUES } /> <div className='text-center'> {/* any arbitrary component can go here */} {this.state.value} </div> </div> ); } } For more advanced usage take a look at the demos directory. Todo • Start using react-motion to simplify code a bit. • Arrows on the buttons on either side. • Start using some solution for css (e.g. ReactCSS, ReactStyle, etc..). • Make it more customizable. • Improve the structure. • Keyboard movement controls • Touch controls • Make someone use it. :D Running the developmnt version • Just clone the repo and do an npm install followed by an npm run start. • Then go to localhost:5000/demos/<demo_name>/index.html to see the fruits of your labor. Here is the information provided by the original author. An easy to customize, horizontal timeline powered by CSS and jQuery. Article on CodyHouse Demo Terms Install npm i react-horizontal-timeline-view DownloadsWeekly Downloads 9 Version 0.1.4 License MIT Last publish Collaborators • raghavi92
ESSENTIALAI-STEM
Deleting specific instances of a flex repeater - keeping "for" loop in sync with instances I'm using a button script to use system.perspective.sendMessage() to iterate through a flex repeater component and delete specific instances contained therein. Each instance has a property called "Factory", which can be north, east, or west. For example, the below code is roughly what I have written -- I would like this to delete any instance of the "west" factory from the flex repeater: selectedFactories = ["north","east"] for j in range(len(self.props.instances)): factory = self.props.instances[j].Factory' if factory not in selectedFactories: del self.props.instances[j] But I can't get the indexing to work correctly in the "for" loop. I need the index of the loop to be synchronized with the instance number, but these fall out of sync as soon as any of the instances are deleted. If my first instance is no longer instance[0] but instead instance[12], this will be treated as instance[0] in the "for" loop. Hopefully I am making sense... is there a simple workaround? A saw another post on here that uses something like this within the "for" loop instead: self.props.instances[{0}].format(j) ...but this seems to break my "del" command at the end, as the script thinks I'm trying to delete a function. I feel like there has to be a weird syntax thing I can use here that will fix all my problems. Any thoughts? In most languages, like Java, you'd use an iterator. Iterators in java let you remove the current element from the collection without losing your place. In python, the simplest solution is to iterate backwards, so the shortened list hasn't lost the indices you haven't reached yet. If the list isn't too large, you could simply reconstruct the list with list comprehension, using its if clause to omit the ones you would have deleted. selectedFactories = ["north","east"] prunedInstances = [inst for inst in self.props.instances if inst.Factory in selectedFactories] 4 Likes That's way more elegant, I like it! It is working great now. I have run into another issue (I'll make another thread if I can't figure this out) where every time this script runs, the first thing I want it to do is refresh the flex repeater's instances binding such that the full list comes through before I run through and prune it, like so: self.refreshBinding("props.instances") ...but the refresh always happens after the rest of the script is completed, so when the script runs, the instances go away like they should, but then they all come back again in a flash due to the refresh delay. :thinking: Ideally the refresh would happen, the script would wait for this to occur successfully, and then move on with the rest of the code. Thanks again Phil!! The final code is: selectedFactories = ["north","east"] prunedInstances = [inst for inst in self.props.instances if inst.Factory in selectedFactories] self.props.instances = prunedInstances Wishful thinking. Most bindings, and particularly bindings in Perspective, are fundamentally asynchronous. Using .refreshBinding() is a request, not an instantaneous mandate. Consider moving the original binding to a custom property, and running this script when that changes. Writing to a property from multiple directions (binding + script) is a recipe for race conditions. (With the explicit exception of bidirectional bindings to user entry components.)
ESSENTIALAI-STEM
blob: f82c05dc82de0e87567f124ed555208cf38946d0 [file] [log] [blame] //===-- llvm/CodeGen/TargetCallingConv.h - Calling Convention ---*- C++ -*-===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // // This file defines types for working with calling-convention information. // //===----------------------------------------------------------------------===// #ifndef LLVM_CODEGEN_TARGETCALLINGCONV_H #define LLVM_CODEGEN_TARGETCALLINGCONV_H #include "llvm/CodeGen/ValueTypes.h" #include "llvm/Support/MachineValueType.h" #include "llvm/Support/MathExtras.h" #include <cassert> #include <climits> #include <cstdint> namespace llvm { namespace ISD { struct ArgFlagsTy { private: unsigned IsZExt : 1; ///< Zero extended unsigned IsSExt : 1; ///< Sign extended unsigned IsInReg : 1; ///< Passed in register unsigned IsSRet : 1; ///< Hidden struct-ret ptr unsigned IsByVal : 1; ///< Struct passed by value unsigned IsNest : 1; ///< Nested fn static chain unsigned IsReturned : 1; ///< Always returned unsigned IsSplit : 1; unsigned IsInAlloca : 1; ///< Passed with inalloca unsigned IsSplitEnd : 1; ///< Last part of a split unsigned IsSwiftSelf : 1; ///< Swift self parameter unsigned IsSwiftError : 1; ///< Swift error parameter unsigned IsHva : 1; ///< HVA field for unsigned IsHvaStart : 1; ///< HVA structure start unsigned IsSecArgPass : 1; ///< Second argument unsigned ByValAlign : 4; ///< Log 2 of byval alignment unsigned OrigAlign : 5; ///< Log 2 of original alignment unsigned IsInConsecutiveRegsLast : 1; unsigned IsInConsecutiveRegs : 1; unsigned IsCopyElisionCandidate : 1; ///< Argument copy elision candidate unsigned ByValSize; ///< Byval struct size public: ArgFlagsTy() : IsZExt(0), IsSExt(0), IsInReg(0), IsSRet(0), IsByVal(0), IsNest(0), IsReturned(0), IsSplit(0), IsInAlloca(0), IsSplitEnd(0), IsSwiftSelf(0), IsSwiftError(0), IsHva(0), IsHvaStart(0), IsSecArgPass(0), ByValAlign(0), OrigAlign(0), IsInConsecutiveRegsLast(0), IsInConsecutiveRegs(0), IsCopyElisionCandidate(0), ByValSize(0) { static_assert(sizeof(*this) == 2 * sizeof(unsigned), "flags are too big"); } bool isZExt() const { return IsZExt; } void setZExt() { IsZExt = 1; } bool isSExt() const { return IsSExt; } void setSExt() { IsSExt = 1; } bool isInReg() const { return IsInReg; } void setInReg() { IsInReg = 1; } bool isSRet() const { return IsSRet; } void setSRet() { IsSRet = 1; } bool isByVal() const { return IsByVal; } void setByVal() { IsByVal = 1; } bool isInAlloca() const { return IsInAlloca; } void setInAlloca() { IsInAlloca = 1; } bool isSwiftSelf() const { return IsSwiftSelf; } void setSwiftSelf() { IsSwiftSelf = 1; } bool isSwiftError() const { return IsSwiftError; } void setSwiftError() { IsSwiftError = 1; } bool isHva() const { return IsHva; } void setHva() { IsHva = 1; } bool isHvaStart() const { return IsHvaStart; } void setHvaStart() { IsHvaStart = 1; } bool isSecArgPass() const { return IsSecArgPass; } void setSecArgPass() { IsSecArgPass = 1; } bool isNest() const { return IsNest; } void setNest() { IsNest = 1; } bool isReturned() const { return IsReturned; } void setReturned() { IsReturned = 1; } bool isInConsecutiveRegs() const { return IsInConsecutiveRegs; } void setInConsecutiveRegs() { IsInConsecutiveRegs = 1; } bool isInConsecutiveRegsLast() const { return IsInConsecutiveRegsLast; } void setInConsecutiveRegsLast() { IsInConsecutiveRegsLast = 1; } bool isSplit() const { return IsSplit; } void setSplit() { IsSplit = 1; } bool isSplitEnd() const { return IsSplitEnd; } void setSplitEnd() { IsSplitEnd = 1; } bool isCopyElisionCandidate() const { return IsCopyElisionCandidate; } void setCopyElisionCandidate() { IsCopyElisionCandidate = 1; } unsigned getByValAlign() const { return (1U << ByValAlign) / 2; } void setByValAlign(unsigned A) { ByValAlign = Log2_32(A) + 1; assert(getByValAlign() == A && "bitfield overflow"); } unsigned getOrigAlign() const { return (1U << OrigAlign) / 2; } void setOrigAlign(unsigned A) { OrigAlign = Log2_32(A) + 1; assert(getOrigAlign() == A && "bitfield overflow"); } unsigned getByValSize() const { return ByValSize; } void setByValSize(unsigned S) { ByValSize = S; } }; /// InputArg - This struct carries flags and type information about a /// single incoming (formal) argument or incoming (from the perspective /// of the caller) return value virtual register. /// struct InputArg { ArgFlagsTy Flags; MVT VT = MVT::Other; EVT ArgVT; bool Used = false; /// Index original Function's argument. unsigned OrigArgIndex; /// Sentinel value for implicit machine-level input arguments. static const unsigned NoArgIndex = UINT_MAX; /// Offset in bytes of current input value relative to the beginning of /// original argument. E.g. if argument was splitted into four 32 bit /// registers, we got 4 InputArgs with PartOffsets 0, 4, 8 and 12. unsigned PartOffset; InputArg() = default; InputArg(ArgFlagsTy flags, EVT vt, EVT argvt, bool used, unsigned origIdx, unsigned partOffs) : Flags(flags), Used(used), OrigArgIndex(origIdx), PartOffset(partOffs) { VT = vt.getSimpleVT(); ArgVT = argvt; } bool isOrigArg() const { return OrigArgIndex != NoArgIndex; } unsigned getOrigArgIndex() const { assert(OrigArgIndex != NoArgIndex && "Implicit machine-level argument"); return OrigArgIndex; } }; /// OutputArg - This struct carries flags and a value for a /// single outgoing (actual) argument or outgoing (from the perspective /// of the caller) return value virtual register. /// struct OutputArg { ArgFlagsTy Flags; MVT VT; EVT ArgVT; /// IsFixed - Is this a "fixed" value, ie not passed through a vararg "...". bool IsFixed = false; /// Index original Function's argument. unsigned OrigArgIndex; /// Offset in bytes of current output value relative to the beginning of /// original argument. E.g. if argument was splitted into four 32 bit /// registers, we got 4 OutputArgs with PartOffsets 0, 4, 8 and 12. unsigned PartOffset; OutputArg() = default; OutputArg(ArgFlagsTy flags, EVT vt, EVT argvt, bool isfixed, unsigned origIdx, unsigned partOffs) : Flags(flags), IsFixed(isfixed), OrigArgIndex(origIdx), PartOffset(partOffs) { VT = vt.getSimpleVT(); ArgVT = argvt; } }; } // end namespace ISD } // end namespace llvm #endif // LLVM_CODEGEN_TARGETCALLINGCONV_H
ESSENTIALAI-STEM
Variant effects Main function: predict_snvs predict_snvs(model, dataloader, vcf_fpath, batch_size, num_workers=0, dataloader_args=None, vcf_to_region=None, vcf_id_generator_fn=<function default_vcf_id_gen at 0x7fc0d953cc80>, evaluation_function=<function analyse_model_preds at 0x7fc0d9ac7400>, evaluation_function_kwargs={'diff_types': {'logit': <kipoi.postprocessing.variant_effects.scores.Logit object at 0x7fc0d9ab9b70>}}, sync_pred_writer=None, use_dataloader_example_data=False, return_predictions=False, generated_seq_writer=None) Predict the effect of SNVs Prediction of effects of SNV based on a VCF. If desired the VCF can be stored with the predicted values as annotation. For a detailed description of the requirements in the yaml files please take a look at kipoi/nbs/variant_effect_prediction.ipynb. Arguments - __model__: A kipoi model handle generated by e.g.: kipoi.get_model() - __dataloader__: Dataloader factory generated by e.g.: kipoi.get_dataloader_factory() - __vcf_fpath__: Path of the VCF defining the positions that shall be assessed. Only SNVs will be tested. - __batch_size__: Prediction batch size used for calling the data loader. Each batch will be generated in 4 mutated states yielding a system RAM consumption of >= 4x batch size. - __num_workers__: Number of parallel workers for loading the dataset. - __dataloader_args__: arguments passed on to the dataloader for sequence generation, arguments mentioned in dataloader.yaml > postprocessing > variant_effects > bed_input will be overwritten by the methods here. - __vcf_to_region__: Callable that generates a region compatible with dataloader/model from a cyvcf2 record - __vcf_id_generator_fn__: Callable that generates a unique ID from a cyvcf2 record - __evaluation_function__: effect evaluation function. Default is `analyse_model_preds`, which will get arguments defined in `evaluation_function_kwargs` - __evaluation_function_kwargs__: kwargs passed on to `evaluation_function`. - __sync_pred_writer__: Single writer or list of writer objects like instances of `VcfWriter`. This object will be called after effect prediction of a batch is done. - __use_dataloader_example_data__: Fill out the missing dataloader arguments with the example values given in the dataloader.yaml. - __return_predictions__: Return all variant effect predictions as a dictionary. Setting this to False will help maintain a low memory profile and is faster as it avoids concatenating batches after prediction. - __generated_seq_writer__: Single writer or list of writer objects like instances of `SyncHdf5SeqWriter`. This object will be called after the DNA sequence sets have been generated. If this parameter is not None, no prediction will be performed and only DNA sequence will be written!! This is relevant if you want to use the `predict_snvs` to generate appropriate input DNA sequences for your model. Returns If return_predictions: Dictionary which contains a pandas DataFrame containing the calculated values for each model output (target) column VCF SNV line. If return_predictions == False, returns None.
ESSENTIALAI-STEM
Drug-induced immune hemolytic anemia (DIIHA) is a rare cause of anemia. It is often difficult to distinguish from other causes of hemolytic anemia, thereby delaying diagnosis and treatment. Antibiotics, including penicillins and cephalosporins, are the drugs most often implicated in the development of DIIHA. Discontinuation of the offending agent is often sufficient for treatment. Here, we review the case of a 25-year-old Caucasian female who presented with jaundice and generalized weakness in the setting of outpatient treatment with amoxicillin-clavulanate due to sinus infection. Laboratory testing revealed transaminitis and hemolytic anemia. Direct antiglobulin test (DAT) revealed negative IgG and positive anti-C3. Cold agglutinin titer and Donath-Landsteiner test were negative. The patient was diagnosed with DIIHA most likely due to amoxicillin. She improved with drug cessation and a short course of glucocorticoids. Mechanism of DIIHA, workup, and management are subsequently reviewed. Copyright © 2020, Chan Gomez et al. References PubMed
ESSENTIALAI-STEM
Transactions in Zealand Pharma shares and/or related securities by persons discharging managerial responsibilities and/or their closely associated persons Company announcement – No. 15 / 2021 Transactions in Zealand Pharma shares and/or related securities by persons discharging managerial responsibilities and/or their closely associated persons Copenhagen, March 22, 2021 – Zealand Pharma A/S (“Zealand”) (Nasdaq: ZEAL) (CVR-no. 20045078) has received information on transactions in Zealand's shares or related securities conducted by persons discharging managerial responsibilities and/or their closely associated persons and hereby publishes the information on such transactions. Please see the attached file. # # # About Zealand Pharma A/S Zealand Pharma A/S (Nasdaq: ZEAL) ("Zealand") is a biotechnology company focused on the discovery, development and commercialization of innovative peptide-based medicines. More than 10 drug candidates invented by Zealand Pharma have advanced into clinical development, of which two have reached the market. Zealand Pharma’s robust pipeline of investigational medicines includes three candidates in late stage development, and one candidate being reviewed for regulatory approval in the United States. Zealand Pharma markets V-Go®, an all-in-one basal-bolus insulin delivery option for people with diabetes. License collaborations with Boehringer Ingelheim and Alexion Pharmaceuticals create opportunity for more patients to potentially benefit from Zealand Pharma-invented peptide therapeutics. Zealand Pharma was founded in 1998 in Copenhagen, Denmark, and has presence throughout the U.S. that includes key locations in New York, Boston, and Marlborough (MA). For more information about Zealand Pharma’s business and activities, please visit www.zealandpharma.com. Forward-Looking Statement The above information contains forward-looking statements that provide Zealand Pharma’s expectations or forecasts of future events. Such forward-looking statements are subject to risks, uncertainties and inaccurate assumptions, which may cause actual results to differ materially from expectations set forth herein and may cause any or all of such forward-looking statements to be incorrect. If any or all of such forward-looking statements prove to be incorrect, our actual results could differ materially and adversely from those anticipated or implied by such statements. All such forward-looking statements speak only as of the date of this release and are based on information available to Zealand Pharma as of the date of this release. For further information, please contact: Zealand Pharma Investor Relations Maeve Conneighton Argot Partners investors@zealandpharma.comZealand Pharma Media Relations David Rosen Argot Partners media@zealandpharma.com Attachment 25_210319_Notification_AST_w[3.22.21]
NEWS-MULTISOURCE
Justin Trudeau sent Trump smiley face to describe US-Canada trade: report Canadian Prime Minister Justin Trudeau once sent President Donald Trump a note which included a smiley face he drew next to a report on the US-Canada trade surplus, Axios reported on Sunday.In December of 2017, Trump incorrectly claimed at a Florida campaign rally that the US had a trade deficit with Canada and further sent Trudeau a letter to that effect.In response, Trudeau wrote Trump a letter in which he corrected the US president's previous comments on the US-Canada trade relationship.Sources told Axios that Trudeau circled a line from a report from the US Trade Representative that showed the US held a $12.5 billion surplus in goods and services and drew a smiley face on the page.Visit Business Insider's homepage for more stories.Canadian Prime Minister Justin Trudeau once sent President Donald Trump a note which included a smiley face he drew next to a report on the US-Canada trade surplus, Axios reported Sunday. Sources familiar with their exchanges told Axios that Trudeau and Trump have sent each other letters and reports on trade policy — with Trump writing notes to Trudeau in his trademark Sharpie marker on at least two separate occasions. Trudeau reportedly wrote Trump to correct public statements the US president had made on trade with Canada, which has emerged as a sore source of tension between the two countries since Trump took office and imposed tariffs on Canadian products. In December of 2017, Trump incorrectly claimed at a Florida campaign rally that the US had a trade deficit with Canada and further sent Trudeau a letter to that effect.A source with direct knowledge of the matter told Axios that Trump wrote something along the lines of "not good!" on a letter about the purported trade deficit in silver Sharpie. Read more: Trudeau slams Trump's racist remarks to progressive congresswomen: 'That is not how we do things in Canada'In response, Trudeau wrote Trump a letter wishing him a merry Christmas and correcting his previous comments on the US-Canada trade relationship. Axios reported that Trudeau also included a document from the office of the US Trade Representative, which is part of Trump's own administration, reportedly writing, "ygreat speech in PensacolaRead more:11 mind-blowing facts about Canada's economyTrump's new Mexico tariffs threaten to derail a major trade agreement that took more than a year of bitter negotiation, and they're even drawing the ire of a Republican allyOpinion: Trump's trade deal with Canada and Mexico is a huge win for Americans, and it's time for Congress to pass it
NEWS-MULTISOURCE
Junya Eguchi – Abstract P17  The topography of hypertrophy: how muscle architecture changes with strength training. Eguchi J, Bolsterlee B, Thom JM and Herbert RD 1. NeuRA, Sydney, New South Wales, Australia 2. University of New South Wales, Sydney, New South Wales, Australia Background. Progressive resistance training (PRT) changes muscle architecture [1]. Training-induced changes in muscle architecture have been measured previously using two-dimensional ultrasound imaging, which is prone to projection errors [2]. We used diffusion tensor imaging (DTI; an MRI technique) to investigate three-dimensional architectural changes in the human quadriceps following PRT. Methods. Eleven healthy young adults completed eight weeks of PRT (leg press and leg extension). Anatomical MRI and DTI scans were obtained before and after training. Mean fascicle lengths, pennation angles, volume and physiological cross-sectional area (PCSA) were obtained from the rectus femoris (RF), vastus lateralis (VL), vastus intermedius (VI) and vastus medialis (VM) muscles using procedures described elsewhere [3].  Results. Mean isometric strength increased by 11.8 ± 14.2% (p<0.05). Volume increased (p<0.01) in all muscles, ranging from 11.1% in VI to 14.1% in VL. Fascicle length increased (p<0.01) by 13.3% in VM, by 18.6% in VI and by 22.1% in RF, and did not change significantly in VL. Only the VL changed its PCSA (13.1% increase, p<0.05). Pennation angles and summed PCSA did not change significantly. Isometric strength change did not correlate with summed PCSA change (r=0.33; p=0.32).  Discussion. This is the first DTI-based study on PRT-induced changes in muscle architecture. The data corroborate previous findings made with ultrasound that fascicles increase in length following PRT. Surprisingly, PCSA change was not related to isometric strength change. Muscle volume increased by a similar amount to fascicle length. 1. Timmins, R. G., Shield, A. J., Williams, M. D., Lorenzen, C., and Opar, D. A. (2016b) Architectural adaptations of muscle to training and injury: a narrative review outlining the contributions by fascicle length, pennation angle and muscle thickness. Br. J. Sports Med. 50:1467 – 1472 2. Bolsterlee B, Veeger HEJ, van der Helm FCT, Gandevia SC, Herbert RD (2015) Comparison of measurements of medial gastrocnemius architectural parameters from ultrasound and diffusion tensor images. J Biomech 48 (6):1133-1140 3. Bolsterlee B, D’Souza A, Gandevia SC, Herbert RD (2017) How does passive lengthening change the architecture of the human medial gastrocnemius muscle? J Appl Physiol 122(4):727-738
ESSENTIALAI-STEM
Creating a regex pattern set - Amazon WAF, Amazon Firewall Manager, and Amazon Shield Advanced Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF). Creating a regex pattern set Follow the procedure in this section to create a new regex pattern set. To create a regex pattern set 1. Sign in to the Amazon Web Services Management Console and open the Amazon WAF console at https://console.amazonaws.cn/wafv2/. 2. In the navigation pane, choose Regex pattern sets and then Create regex pattern set. 3. Enter a name and description for the regex pattern set. You'll use these to identify it when you want to use the set. Note You can't change the name after you create the regex pattern set. 4. For Region, choose Global (CloudFront) or choose the Region where you want to store the regex pattern set. You can use regional regex pattern sets only in web ACLs that protect regional resources. To use a regex pattern set in web ACLs that protect Amazon CloudFront distributions, you must use Global (CloudFront). 5. In the Regular expressions text box, enter one regex pattern per line. For example, the regular expression I[a@]mAB[a@]dRequest matches the following strings: IamABadRequest, IamAB@dRequest, I@mABadRequest, and I@mAB@dRequest. Amazon WAF supports the pattern syntax used by the PCRE library libpcre with some exceptions. The library is documented at PCRE - Perl Compatible Regular Expressions. For information about Amazon WAF support, see Regular expression pattern matching in Amazon WAF. 6. Review the settings for the regex pattern set, and choose Create regex pattern set.
ESSENTIALAI-STEM
Introduction to API Blueprint Introduction to API Blueprint API blueprint is a powerful high-level API design language for web APIs. In this tutorial, we want to dive deeper into it and learn more about how it works, the differences between API blueprint and Swagger, and what makes it unique that leads to its extensive use. But before we dig into API Blueprint, we must ensure a solid base of information about the “API first approach” concepts. Table of Contents API-First Approach One of the many software developments approaches is the “API-First Approach”. API-First Approach indicates that we must treat our APIs as “first-class citizens” and build our whole project based upon them. In this method, we must first clarify our project’s general behavior, such as gathering data from clients, processing them, and displaying them on different devices. For developing a project with the mentioned details, we need to have solid, reusable, and consistent APIs to respond to the clients. This approach has a lot of benefits as we are going to mention some of them below: • We are reducing the cost of developing the software and also maintaining the project in the future. • More flexibility to our business as developers and stakeholders have implemented the project’s logic together. • More scalable systems to grow • We can develop our project at a higher pace, leading our product to reach the market sooner. Therefore, it would be best to consider using an API description language to establish a contract for how the API is supposed to behave. Here, tools like Swagger and API Blueprint are coming in handy. What is an API description language? API description languages are DSL (domain-specific languages), and they are both human-readable and machine-readable languages, much like programming languages. We use these kinds of languages for describing our APIs for both developers and machines. It is indeed excellent documentation for our software as well. In addition, API description languages have a well-defined syntax, making it possible to process them automatically. Unlike programming languages or API implementation languages, API description languages use a higher level of abstraction and a declarative paradigm, leading to express the “what” instead of the “how”. We can use tools like API Blueprint or Swagger to describe our APIs and then implement our product. What is API Blueprint? The official website describes API Blueprint as the following: A powerful high-level API design language for web APIs. Here we want to learn more about it. With the help of API Blueprint, we can achieve our goal, which is building a product with the API-first approach. We can quickly prototype and describe our APIs with API Blueprint’s concise yet expressive syntax. It also allows us to create models for the APIs that have been developed and deployed. Since the API Blueprint is an API Description Language, it makes developers' and stakeholders' lives easier by creating a space for them to collaborate easily and help each other manufacture and edit the APIs much faster and more accurately. Better APIs lead to happier customers, and that indeed is the primary goal of every business. The API Blueprint has a complete set of tools to work. Some of them are: Tool Examples Editors Such as Apiary, sublime, atom and so on Testing Such as Dredd, RSpec API Blueprint, CCLRequestReplay, and so on Parsers Such as Drafter, Protagonist, Snowboard, and so on Mock Servers Such as Drakov, API-Mock, API Blueprint Mock Server, and so on Renderers Such as Snowboard, Agilo, Blueprint docify, and so on Converters Such as Blueman, Postman2apiary, Apiary2postman, Swagger2blueprint, and so on Lexers Such as Pygments-apiblueprint and Rouge You can find and learn more about each unique tool on the official documentation here. API Blueprint VS Swagger According to the Swagger official documentation, we can find the following as the description of Swagger. Swagger allows you to describe the structure of your APIs so that machines can read them. Pretty much the same with API Blueprint, isn’t it? Well, not. Swagger & API Blueprint both serve the same goal: better and more straightforward implementation of the API-First Approach. However, there are slight differences between them. The primary difference between them is that, unlike API Blueprint (which uses Markdown/MSON), Swagger uses YAML/JSON. Swagger focused more on designing, developing, and testing APIs rather than documenting the APIs. Do not worry about writing an enormous amount of code either, and you can generate them with the mock service tool. Swagger is open source, and the Open API Initiative governs its specification. API Blueprint is also open-source, but it focuses primarily on writing excellent documents for your applications. You can use Apiary to set up mocked services and Github integration, which is a paid service. So which one should you decide on for your project? Choosing between Swagger and API Blueprint mainly deepened the taste of the team or the limitation of tools for the sake of the project. If you are new to the API Description world, I recommend choosing API Blueprint to begin with the API-First Approach. It helps you gain a better mindset of the API description world, and it benefits you to learn concepts like documenting an application and REST concepts deeply. It is also easy to use since it uses MSON. Now that we have established some ground knowledge about API Blueprint, let’s see how we can work with API Blueprint in action. API Blueprint Implementation To start writing API Blueprint documentation, create a folder on your hard disk. Then, in the root directory of the folder, create a file with the extension of .apib. This extension indicates that the file is an API Blueprint file. First, we need to specify the API Name and metadata as the following: API Name and Metadata FORMAT: 1A # users users is a simple API for viewing a list of users, creating a new one, updating an existing user, or deleting a user. Every API Blueprint file starts with a metadata section. Metadata is a Key-value pair separated by a colon (:)—one pair per line. As soon as the first Markdown element is not a key-value pair, the metadata ends. For example, in the above code snippet, we have indicated that the version of our API is 1. The next part is #users. Since it is the first expression that is not metadata, we will call it API Name, and after that, we will describe it in a few words like the one in the snippet. Note that we can split the description into as many headings as we want as long as we do not interfere with other building blocks of API Blueprint. Before moving on to the next step, we must make sure that we are entirely familiar with some core concepts of REST APIs. So let’s take a look at the following image: How to add a health check test in Testfully The above image indicates all the building blocks of a URL and now that we have taken a look at it, let’s continue the API Blueprint implementation by creating a Group. Resource Groups, Resource and Actions With the Group heading, we define a group of resources that are related to each other. This group is known as Path in Rest. # Group Users Resources related to users in the API. Getting Users, updating and so on Within the Users resource group, we have a resource called “User Collection”. We use this resource to get a list of all the users we have. The heading specifies the URI used to access the help inside square brackets at the end of the heading. ## Users Collection [/users] In REST terminology, we use the phrase Verb for our actions on a resource, such as GET, POST, PUT, DELETE, etc. Here we have the Action keyword specified with a sub-heading inside a resource with the name of the action followed by the HTTP method. ### List All Users [GET] All the Actions should include at least one response consisting of a status code and sometimes a body. A Response is a list item created by preceding list items with either a +, * or — Within an action. Here is an example of a response with a status code of 200 and a list of users: + Response 200 (application/json) [ { "firstName": "Hossein", "lastName": "Mousavi", "age": 24, "id": 1, }, { "firstName": "Anders", "lastName": "Hejlsberg", "age": 60, "id": 2, }, { "firstName": "Brendan", "lastName": "Eich", "age": 60, "id": 3, }, ] As you can see, the response’s header is also determined, and there is no need to write down Content-Type explicitly. Sending A POST Request We use a POST request to send data to a server to create a resource. The data is available in the body of the request. Let’s check how we can do it with API Blueprint: ### Create a New User [POST] You may create your user using this action. It takes a JSON object containing a firstName, lastName and age. + firstName (string) - First Name + lastName (string) - Last Name + age (number) - Age The body accepts a JSON like the following: + Request (application/json) { "firstName": "Bjarne", "lastName": "Stroustrup", "age": 70, } A successful POST request returns a response with 201 as its status code: + Response 201 (application/json) + Headers Location: /users/4 + Body { "firstName": "Bjarne", "lastName": "Stroustrup", "age": 70, "id": 4, } Getting a specific user with its ID For this purpose, we usually use a GET request, and at the end of the resource part of the URL, we add the user’s ID like the diagram below: How to add a health check test in Testfully Implementing this is not much different from a regular GET request. However, we need to add something at the end of our actions: ## Users [/users/{user_id}] Deleting a User After a successful DELETE request, the resource should return a response with a status code of 204 ### Delete [DELETE] + Response 204 Summary API Blueprint, alongside Swagger, is an excellent tool for helping developers to adhere API-First Approach. It eases developers to have a healthy collaboration with managers and gather all the necessary information about the product and its business logic at a high pace. In the long-term, developers can reduce the number of meetings using these tools as they have gathered all the information to process them and write high-quality documentation to refer to in the future. API Blueprint uses MSON (Markdown) language to work, and its files have .apib extensions. We usually have metadata at the beginning. Then, with the help of MSON with different heading titles, we indicate our desires and needs by creating group resources, groups, actions, etc. FAQ What language does API Blueprint use? The API Blueprint powers by markdown (MSON) and uses its heading tags. What are the primary powers of API Blueprint? First, it provides us with excellent documentation. It helps developers have a better mindset for developing and growing the application, and we have also wrapped the whole project in a schema for better development in the future. Is API Blueprint Open Source? Yes, it is open-source, whilst it has some tools that require a business licence as well. What is the central concept of the API-First approach? The main idea is that we first need to prepare our APIs prototypes based on our business logic and then implement the other building blocks of the application based on our APIs. Recent Articles blog-image Top 7 Free & Paid mock API tools (2022 Review) Sometimes called a fake API, A Mock API is when you build an API that returns the desired data. Still, it is not your actual API, and it all has been simulated for some use cases. This article covers best free & paid mock API tools in the market. blog-image Top 10 GraphQL clients GraphQL is one of the hottest topics in the API development world, and that’s for good reasons: GraphQL APIs address many of the issues that we had with Restful and SOAP APIs. This article goes through the Top 10 GraphQL clients you can use today to develop and use GraphQL API. blog-image Why your Website is giving an HTTP 405 Method Not Allowed message and how to fix it When a response has the status code 405, the client attempted to access a resource using an HTTP method that is not permitted by the server for that resource. Websites, Restful APIs, and web applications tend to return this error. This article provides a more detailed explanation of this status code’s meaning and how to handle it in your applications.
ESSENTIALAI-STEM
Creating a Login Script for a PHP/MySQL Blogging System In this three-part tutorial we are going to be creating an open blogging system. We are also going to provide scripts that will make it possible to switch to a closed blogging system. This article, which is the first part, will cover the creation of the login scripts for a closed system. The file for the login script can be downloaded here. • An open blogging system is a system that allows anyone to contribute to a blog without having to register. In many cases, it also allows any user to start a new topic that will then have its own replies,  as opposed to just commenting on a topic that the blog owner started. This kind of blog is suitable for people who have just created a website and do not have a lot of web traffic. • A closed blogging system is one that requires registration and allows most users to contribute to a topic instead of creating their own. This kind of blog is suitable for people that have a lot of traffic on their websites. In the first part of this article, we will create a login script for those of you who prefer a closed blogging system. You can skip this part if you wish and come back next week to check out the next part in this series, which will deal with creating a blog if you are not interested in a closed system. The login script will have a MYSQL table which it will reference to verify the existence of a user at login. It will also have various scripts that will help register a new user and retrieve forgotten passwords. Login Script The login script will have the following pages: • Login.php – Enables users to log in. • Logout.php – Enables logging out. • Register.php – Creates new users. • Password.php – Password recovery. • Messages.php – Handles error messages. Let’s create a table that will gather the following information about a user: • Username • Password> • Level •  Admin – This will be the moderator of the system •  Normal – Normal access rights •  Date_joined • IP Address – Enables us to identify and ban users. • Email – Used for password recovery. • Isbanned – Enable us to ban users Here’s the table: CREATE TABLE `user` (   `id` int(5) NOT NULL auto_increment,   `uname` varchar(98) NOT NULL default ”,   `pw` varchar(98) NOT NULL default ”,   `email` varchar(100) NOT NULL default ”,   `date_joined` datetime NOT NULL default ’0000-00-00 00:00:00′,   `ip` varchar(20) NOT NULL default ”,   `level` varchar(10) NOT NULL default ”,   `isbanned` enum(‘yes’,'no’) NOT NULL default ‘no’,   PRIMARY KEY  (`id`) ) TYPE=MyISAM AUTO_INCREMENT=11 ; As you can see from the table layout, the table gathers a lot of information about a user. The most significant item of them all is the “isbanned” field. This field is responsible for checking whether or not a user is banned. The “ip” field stores the IP address of the user, which will be used to reinforce the isbanned status of a user. Simply copy and paste the code into your PHP admin and run the SQL. {mospagebreak title=Login.php} This file displays a form that requests your username and password and also gives you the options to register as a new user or recover your password if you’ve forgotten it.  Once you’ve  pressed the submit button the following code gets executed: <? session_start(); if(isset($_GET['reg'])){ $reg=$_GET['reg']; }else{ $reg=”"; } if($reg==1){ $msg1=”<font color=”#FF0000″><b>Your details have been added, please login</b></font>”; }elseif($reg==2){ $msg1=”<font color=”#FF0000″><b>You have been successfully logged out.</b></font>”; }elseif($reg==3){ $msg1=”<font color=”#FF0000″><b>You have been redirected because you need to be logged on as administrator.</b></font>”; } if(isset($_POST['submit'])){ if( empty($_POST['uname']) && (empty($_POST['upass']))){ header( “Location:Messages.php?msg=1″ ); exit(); } //transfer to shorter var $n=$_POST['uname']; $p=$_POST['upass']; //connect to db include(‘config.php’); $query=”select * from user where uname=’$n’ and pw=’$p’”; if($result=mysql_query($query)){ $row=mysql_fetch_assoc($result); //check each var if($n !=$row['uname']){ header( “Location:Messages.php?msg=2″ ); exit(); } if($p !=$row['pw']){ header( “Location:Messages.php?msg=11″ ); exit(); } if($row['isbanned']==’yes’){ header( “Location:Messages.php?msg=12″ ); exit(); } }//ifresult //put in session vars $_SESSION['level'] = $row['level']; $_SESSION['status'] = ‘logged’; $_SESSION['username'] = $n; //This takes you to the admin pages; change this to take you to wherever you want it //to go. header(“location:../admin/main.php”); exit; }?> Ignore the first part that falls under “if(isset($_GET['reg'])){}” since it concerns another script; we will come to it later. The next part does the following things: • Checks to see whether a user exists. If so, the username and password is compared with the information in the database. It also checks to see whether the user is banned. If all the checks are okay, the script puts the username in a session variable and then sends the user through to the blog. • If the user does not exist, the program goes to the messages page and displays an error message. The script also checks the user’s banned status. If a user is banned, then the script directs you to the Messages page. The submitted username and password is checked individually and then the appropriate action is taken. This enables the user to know exactly which of the two, username or password, is wrong. You will also notice that some session variables are created. These are going to be used by the blog system to identify the user and by the admin script to identify whether a user indeed has admin level clearance. {mospagebreak title=Logout.php} Logs a user out with the following code: <? session_start(); if($_SESSION["status"]=”logged”) { session_unset(); session_destroy(); header( “Location:login.php?reg=2″ ); exit(); } else{ if ($_SESSION["status"]=”not logged”) { //the session variable isn’t registered, the user shouldn’t even be on this page header( “Location:login.php” ); exit(); } } ?>   The ‘header( “Location:login.php?reg=2″ ); ‘ code sends a reg value of 2 to the login.php page, which informs the user that he/she has been logged out. To log out a user, we simply empty the session variables that have been filled at login. This is done by the session_unset() and session_destroy() functions. Register.php This script registers or adds a new user. Example output of the register.php The following code does the job: <? if(isset($_POST['Submit'])){ //NEED TO CHECK IF FIELDS ARE FILLED IN if( empty($_POST['name']) && (empty($_POST['email']))){ header(“Location:Messages.php?msg=3″); exit(); } if( empty($_POST['pw1']) && (empty($_POST['pw2']))){ header( “Location:Messages.php?msg=4″ ); exit(); } $name=$_POST['name']; $email=$_POST['email']; $pw1=$_POST['pw1']; $pw2=$_POST['pw2']; if(“$pw1″ !== “$pw2″  ){ header( “Location:Messages.php?msg=5″ ); exit(); } $ip = $_SERVER['REMOTE_ADDR']; if(empty($ip)){ header(“location:Messages.php?msg=13″); exit(); } if(isset($_POST['select'])){ $level=$_POST['select']; }else{ $level=”Normal”; } //connect to the db server , check if uname exist include(‘config.php’); $query=(“Select * from user where uname=’$name’”); $result= mysql_query($query); $num=mysql_num_rows($result); if ($num > 0) {//Username already exist header( “Location:Messages.php?msg=6″ ); exit(); }else{ //if username does not exist insert user details $query=( “INSERT INTO user (uname, pw,email,date_joined,ip,level,isbanned) VALUES (‘$name’,password (‘$pw1′),’$email’,NOW(),’$ip’,'$level’,'no’)”); if(!@mysql_query ($query)) { echo mysql_error(); }else{ if(empty($_POST['select'])){ header(“location:login.php?reg=1″); exit; }else{ header(“location:../admin/main.php”); exit; } } } mysql_close(); }?> The script does three things: • Checks whether all the fields are filled in.  If not, the program goes to the messages page where the appropriate error is displayed. • Checks whether the username already exists. If so, the program goes to the messages page where the appropriate error is displayed. • If the username does not exist, the script adds the user details and goes straight to the login page. Where the user can now login. Because this login system is designed for a closed blogging system, it is very important that we have the IP address of a user. For this reason I’ve  included the following code: $ip = $_SERVER['REMOTE_ADDR']; if(empty($ip)){ header(“location:Messages.php?msg=13″); exit(); } This code checks to see whether the users’ IP address is empty. If so, it simply sends the user to the messages page. This will stop anyone who does not have an IP address from registering. You can of course remove this piece of code if your security needs are limited. {mospagebreak title=Password.php} This script sends the password that the user has forgotten to his/her email address. Example output of the password script. Here’s the password code: <? include(“fns.php”); include “config.php”; if(isset($_POST['Submit'])){ //1. Check if form fields are filled in if(!filledin($_POST)){ header( “Location:Messages.php?msg=7″ ); exit(); } $name=$_POST['name']; $em=$_POST['mail']; //2. Check if entered name exist $query=”Select pw from user where uname=’$name’” or die(mysql_error()); $result= mysql_query($query); if(mysql_num_rows($result)>0){ for ($i=0; $i<mysql_num_rows($result); $i++) { $row = mysql_fetch_assoc($result); $pass=$row['pw']; $to=”$emrn”; $from=”From: Admin@jacquesnoah.co.ukrn”; $msg=”Password:$passrn”; $msg .=”Username:$namern”; $msg .=”Please change your password as soon as you logonrn”; $subject=”From Admin re:Your Login Passwordrn”; } }else{ header( “Location:Messages.php?msg=8″ ); exit(); } //3. Send password to user if(mail($to,$subject,$msg,$from)){ header( “Location:Messages.php?msg=9&email=<?php echo $em; ?>” ); exit(); //echo “Please click here to log”; }else{ header( “Location:Messages.php?msg=10″); exit(); } } ?> This code does three things: • Checks to see if all fields are filled in. Notice the use of the function called ‘filledin()’ in the line “if(!filledin($_POST)){}“>. That function is declared in the functions script called “fns.php” which is included in at the top of the code. It just checks whether all posted variables contain something. • Checks to see if entered name exists. This provides us with extra security, by checking whether the username and email address exist. • Once all security checks have been passed, it sends the password. Conclusion These are all the pages that we need to run a effective login script. It can of course always be improved, but for now it is adequate, security wise, for a low security application such as a web log. Don’t forget to change the contents of the config.php script. Next week we will create the actual blog. Google+ Comments Google+ Comments
ESSENTIALAI-STEM
Hooton (surname) Hooton is a surname. Notable people with the surname include: * Burt Hooton (born 1950), American baseball player * Charles Hooton (1810–1847), English novelist and journalist * Earnest Hooton (1887–1954), American anthropologist * Elizabeth Hooton (1600–1672), Quaker preacher * Florence Hooton (1912–1988), English cellist * Harriet Hooton (1875–1960), Australian editor and activist * Harry Hooton (1908–1961), Australian poet * James Hooton (born 1973), English actor * Mott Hooton (1838–1920), American soldier * Peter Hooton (born 1962), English vocalist
WIKI
Penny Marshall (journalist) Penelope Jane Clucas Marshall (born 7 November 1962) is a British journalist, working for ITV News as Africa correspondent since September 2019, before that as ITV News social affairs editor. Early life and career Marshall is the daughter of Alan Marshall, a managing director at Unilever, and Mary Sylvia Clucas, daughter of Dr T. S. Hanlin. Her brother is the businessman and entrepreneur Paul Marshall, father of Winston Marshall, formerly of the band Mumford & Sons. She is a graduate of the London School of Economics where she was active as a student journalist. Whilst at LSE she worked as a stringer for national newspapers and after graduating she became indentured as a trainee reporter on the Wimbledon News. In 1985 she joined ITN as a production trainee. Marshall established herself as a television news foreign correspondent during the 1980s and 90s, when she was based in Eastern Europe and the Soviet Union. This work won awards, including an RTS, an EMMY, and a BAFTA. Following the birth of her children, she chose to work part-time and also took a career break to bring up the family for 5 years. Marshall is an advocate of better and more flexible working arrangements for parents. Detention camps in Bosnia, 1992 In the summer of 1992, Marshall, together with Channel 4 News' Ian Williams, were the first television journalists to uncover the Serb-run detention camps in Bosnia. Ed Vulliamy of The Guardian was also with the ITN teams. Their subsequent reports shown throughout the world, generated an international outcry. However, a witness for the defence at a subsequent war crimes trial in the Hague accused the team of faking their footage. The false accusations were reprinted in the British LM magazine (formerly Living Marxism) in an article by Thomas Deichmann and ITN sued. In March 2000 ITN won their case against the magazine in a High Court libel action. An examination of the case by a professor of cultural and political geography at Durham University argued that the key claims made by the magazine were "erroneous and flawed". In April 2012, journalist John Simpson apologised for supporting LM magazine and questioning ITN's reporting of the camps. Later career In March 2014 she was appointed Education Editor for the BBC but decided not to take up the post after a diagnosis of breast cancer. She has presented and written documentaries for BBC Radio 4 and received an honorary doctorate from City University in January 2015. She has written for the Times, Guardian and the Daily Mail. She is a regular volunteer at a Pupil Referral Unit for children excluded from mainstream school in West London and is now a Founding Trustee of a charity to help raise funds and awareness to support them. In the autumn of 2015 Marshall gave evidence to the House of Lords Select Committee investigating women in TV and current affairs and described herself as one of the "last women standing". She said "newsrooms had been built 'by men for men'" and called for broadcasters to collect more data to establish why so many women quit newsrooms. Private life and other activities Marshall is married to fellow ITN reporter Tim Ewart and has three daughters, a step daughter and step son. She is also a Visiting Professor at City University London. and the founding trustee of a charity for children excluded from school in London, the Tbap Foundation.
WIKI
Wikipedia:Articles for deletion/2009 Never Sleep Again tour The result was redirect to Hawthorne Heights. Stifle (talk) 10:36, 2 November 2010 (UTC) 2009 Never Sleep Again tour * – ( View AfD View log • ) Non notable concert tour. Fails WP:GNG and WP:MUSIC. Nouse4aname (talk) 11:02, 18 October 2010 (UTC) Please add new comments below this notice. Thanks, Ron Ritzman (talk) 00:10, 25 October 2010 (UTC) * Note: This debate has been included in the list of Music-related deletion discussions. -- • Gene93k (talk) 23:54, 18 October 2010 (UTC) * Relisted to generate a more thorough discussion so a clearer consensus may be reached. * Merge into Hawthorne Heights. The band, Hawthorne Heights, is notable, the concert tour is not, thus a merge would be most approriate.--hkr Laozi speak 00:17, 25 October 2010 (UTC) * Redirect to Hawthorne Heights. All of the referenced information in this article is already mentioned in the last sub-section of the History section on the Hawthorne Heights page. The only information that exists at 2009 Never Sleep Again tour and does not exist at Hawthorne Heights is information that cannot be proven and has no references. -- ♫ Chris-B-Koolio ♫ ... (Talk) 16:27, 26 October 2010 (UTC) * Keep Google news search shows results . The New York Times reviewed the tour itself. D r e a m Focus 10:52, 1 November 2010 (UTC) * Redirect Look at the publication date for that article in The New York Times; it was published in 2005! It was refering to the first Never Sleep Again tour, held in 2005, not the 2009 Never Sleep Again tour. The New York Times can't tell the future... that article clearly has nothing to do with the 2009 tour. And those news results from google likewise refer to the 2005 Never Sleep Again tour with fellow Victory Records bands: Bayside, Aiden and Silverstein. I suggest you create the page Never Sleep Again (2005 tour) if enough information can be found at those news sources, but THIS TOUR simply isn't notable. -- ♫ Chris-B-Koolio ♫ ... (Talk) 17:20, 1 November 2010 (UTC)
WIKI
Page:Augusta Seaman--Jacqueline of the carrier pigeons.djvu/141 Rh usual sleeping camp lay all about him. The usual challenge from drowsy sentinels arrested his progress, but thanks to the magic countersign, “Don Carlos,” which he had learned from the gatekeeper, he was no where [sic] detained. He accomplished the passage of the camp with absolutely no molestation or exciting incident, thinking that the feat was becoming very, very easy. On the road to Delft he looked along the canal to see if he might spy Joris Fruytiers and his bulky craft. But the canal was deserted, and he was obliged to make up his mind that his own two feet must carry him most of the way. As he trudged along, he could not but notice the exceeding muddiness of the road, and the farther he proceeded, the worse did it become, till at length he found himself plowing through a veritable bog. “This is singular!” was his first thought, and then, “Why, no it isn’t either! This is the result of the broken down dykes. How
WIKI
USBHostKeyboard Table of Contents 1. Hello World 2. API 3. Related Mbed OS 2 and Mbed OS 5 This is the handbook for Mbed OS 2. If you’re working with Mbed OS 5, please see the Mbed OS 5 documentation. The USBHostKeyboard interface is used to communicate with a USB keyboard. Library in Beta! This library is in Beta. If you have any problems using the USBHost library, please send a bug report at support@mbed.org The USB Host connector should be attached to • p31 (D+), p32 (D-) and GND for the LPC1768 • add two 15k resistors tied to GND on D+ and D- Hello World Import program 00001 #include "mbed.h" 00002 #include "USBHostKeyboard.h" 00003 00004 DigitalOut led(LED1); 00005 00006 void onKey(uint8_t key) { 00007 printf("Key: %c\r\n", key); 00008 } 00009 00010 void keyboard_task(void const *) { 00011 00012 USBHostKeyboard keyboard; 00013 00014 while(1) { 00015 // try to connect a USB keyboard 00016 while(!keyboard.connect()) 00017 Thread::wait(500); 00018 00019 // when connected, attach handler called on keyboard event 00020 keyboard.attach(onKey); 00021 00022 // wait until the keyboard is disconnected 00023 while(keyboard.connected()) 00024 Thread::wait(500); 00025 } 00026 } 00027 00028 int main() { 00029 Thread keyboardTask(keyboard_task, NULL, osPriorityNormal, 256 * 4); 00030 while(1) { 00031 led=!led; 00032 Thread::wait(500); 00033 } 00034 } API Import library Public Member Functions   USBHostKeyboard ()   Constructor. bool  connect ()   Try to connect a keyboard device. bool  connected ()   Check if a keyboard is connected. void  attach (void(*ptr)(uint8_t key))   Attach a callback called when a keyboard event is received. void  attach (void(*ptr)(uint8_t keyCode, uint8_t modifier))   Attach a callback called when a keyboard event is received. Troobleshooting If your mbed board is automatically resetted when you plug a USB device, you should consider to use an external power supply
ESSENTIALAI-STEM
Neuropathy How many of us have ever had the sensation of pins and needles poking under your skin? Have you ever sat in the same position for so long that maybe your leg or foot went numb? You may have experienced neuropathy. "Neuropathy?" you say. Yes, this is the term used when there is some kind of short or long-term damage or injury to a nerve. There are many causes of neuropathy and depending on the cause and extent of injury, the damage may or may not be reversible. In this article, we will review some of the different types of neuropathy, some causes of neuropathy, and various recommended treatments. Nerve injury can be classified into three main categories using the Seddon system. This classification system is based on the type of damage done to the nerve and its ability to heal. • Neuropraxia is the mildest form of nerve damage. The wrapping around the nerve (myelin) is damaged by some type of compression or direct hit trauma. Usually vibratory sensation and fine point touch is lost when this happens. Neuropraxia is usually healed anywhere from days to months as long as the myelin around the nerve heals. • Axontmesis is a disruption to the fibers in the nerve (axons) and the wrapping around the nerve (myelin). A special term has been given when the axons are damaged but not severed - Wallerian degeneration. Axontmesis can be caused by stoppage of blood flow (ischemia), toxins, or prolonged compression. Recovery is possible with axontmesis, but chances of healing decreases if the injury to the nerve is far from the organ that the nerve supplies. • Neurotmesis is the worst type of nerve injury. Not only are the wrapping (myelin) and axons disrupted, the supporting tissue is injured as well. You would see neurotmesis in gunshot wounds, lacerations, puncture wounds, and open fractures. The nerve is usually severed in neurotmesis and the chances for healing are basically little to none. Nervous System A healthy lifestyle can lessen the chances of developing neuropathy. Vitamin B-12 deficiency has been linked to myelin decay. Vitamin B-12 can be found in many sources such as seaweed, soy, dairy products, and eggs. If you are diabetic, glucose is key to controlling the symptoms of neuropathy. Studies have shown that excess sugar in the blood produces an alcohol, which destroys the nerves. Prevention of neuropathy is one reason why nutritional guidelines have been established for diabetics. Surgical procedures can be a cause of neuropathy. Avoidance of nerves is a top priority during surgery; however, sometimes they cannot be avoided. Usually the nerve injury is temporary and subsides with active range of motion and healing of the surgical site. Depending on your specific cause of neuropathy, there are many treatments available. • One treatment would be to protect the already damaged nerve from further damage by wearing protective gear that the doctor may give you. • Medications such as gabapentin or preglabin can be prescribed by your doctor to help alleviate the symptoms of neuropathy. • Cryoderm, available on footDrHorsley.com, has been proven to be effective in the treatment of neurological pain. • Your doctor may choose to have you use capsaicin. Capsaicin is a topical agent that helps reduce the pain and tingling associated with neuropathy. • Surgical treatment, external neurolysis, also exists for certain types of neuropathy depending on the location of the nerve. If you or someone you know has existing neuropathy, please know there is help and options available. Visit FootDrHorsley.com to schedule your appointment with a podiatrist to review your specific treatment plan and other possible remedies available. Cold Feet Brrrr it's not winter but it sure makes me shiver. What is Cold Feet you might ask? Well, Cold Feet is a common condition that affects many patients from all walks of life. The body responds to cold temperatures by reducing the blood flow to the extremities leaving the feet vulnerable. Chronic cold feet are often a result of impaired circulation (peripheral neuropathy) and lack of mobility. Patients with Muscular Dystrophy, Multiple Sclerosis, Diabetes, Arthritis and Cerebral Palsy are at risk of this condition. One of the major causes of cold feet is peripheral neuropathy which can affect the feet and hands trying to protect core temperature.   Peripheral Neuropathy The most common type of peripheral neuropathy damages the nerves of the limbs, especially the feet. Nerves on both sides of the body are affected. Common symptoms of this kind of neuropathy are: • Numbness or insensitivity to pain or temperature • Tingling, burning, or prickling • Sharp pains or cramps • Extreme sensitivity to touch, even light touch • Extremely hot or COLD feet These symptoms are often worse at night. Wow that's amazing! Now that I know what it is, are there any complications? Why yes, there are. The following are some of the complications that can occur: • Abcess and Celulitis: Localized pockets of infection under the skin. • Dry Skin or Cracked Skin: As a result of cold feet, dry skin or cracks in the skin can lead to severe infection when inadequate blood flow is present. Individuals who are affected by peripheral neuropathy are particularly vulnerable to cold and are at risk of serious complications due to poor circulation to the feet and legs. It is extremely important to keep the patients feet warm and to keep the skin moisturized. • Loss of Sensation: Chronic cold feet can result in a loss of soft and sharp touch to the feet. • Loss of Sleep: Recent studies have found that cold feet can result in disrupted sleep patterns. • Gangrene: In severe cases gangrene can occur. Gangrene is death of tissues (necrosis) which usually requires surgery. Golly, I'm sure glad I know about this "illness", -its serious stuff. Now how is it treated? Well, lucky for you there isn't any surgery required. You should purchase Lamb's wool insoles for your feet. They fit in just about any closed-toe shoe and turn your feet from shivering Sherry's to party time Pete's! They're comfortable and warm, and specifically treat cold feet! So get ready to treat those cold feet to a summer vacation! Can't wait to see YOU back next week with more on the latest Foot 411.
ESSENTIALAI-STEM