Document
stringlengths
87
1.67M
Source
stringclasses
5 values
 The Science of CHEOPS          The main science goal of the CHEOPS mission will be to study the structure of exoplanets smaller than Saturn that are orbiting bright stars with revolution periods below 50 days. With an accurate measure of masses and radii for an unprecedented sample of planets, CHEOPS will set new constraints on the structure and hence on the formation and evolution of planets in the sub-Saturn mass range. In particular, CHEOPS will:  • Determine the mass-radius relation in the planetary mass range from 20 down to 1 Earth mass,  with unprecedented precision. In particular CHEOPS will be able to measure radii to a precision of 10%. By targeting stars located anywhere on the sky which are bright enough for precise radial velocity follow-up, CHEOPS will not suffer from the limitations in planet mass associated with fainter stars. CHEOPS will provide a unique and large sample of small planets, with well-measured radii, enabling the robust bulk density estimates needed to test theories of planet formation and evoluation to be made.  • Identify planets with atmospheres. CHEOPS will identify planets with significant atmopsheres with a range of massess, distances from the host star and stellar parameters. Using observations of a sample of planets with and without significaht gaseous envelopes, CHEOPS will be able to constran the critical core mass (in the case of runaway gas accretion) or the loss of primordial H/He atmospheres as a function of the distance to the star and possible stellar parameters (eg. mass and metallicity). Note in the case of planets that are extremely close to their host star, evaporation could be an issue.  • Place constraints on planet migration paths. CHEOPS will provide a sufficiently large sample of planets with accurate densities to enable discrimination to be made between common groups of migration path. In particular, CHEOPS will place constrints on possible planet migration paths followed during the formation and evolution of planets for which the clear presence of a massive gasous envelope cannot be discerned.  • Study energy transport in hot Jupiter atmospheres. CHEOPS will have the capability to detect the phase curve of hot Jupiters in the optical regime, which will provide information on planet albedos. The mission will bring new constraints on the atmospheric properties of known hot Jupiters that will help in the studies of the physical mecahnisms and efficiency of energy transport from the dayside to the night side of the planet.  • Provide unique targets for future ground- and space-based spectroscopic facilities such as  the E-ELT and JWST. In particular,  CHEOPS will be able to identify planets that are more likely to have a thin envelope, which are prime targets for future abiltability studies.  CHEOPS will have the capability to provide precise, time-differential photometric time series of a wide range of variable light sources on timescales of <= 2 days.    Further details of the CHEOPS science case can be found in the CHEOPS science requirements document, in the CHEOPS Definition Study Report ("aka" the Red Book) and in presentations given at the 4th CHEOPS Science Workshop in Geneva (2016)    
ESSENTIALAI-STEM
Glucotropaeolin Glucotropaeolin or benzyl glucosinolate is a glucosinolate found in cruciferous vegetables, particularly garden cress. Upon enzymatic activity, it is transformed into benzyl isothiocyanate, which contributes to the characteristic flavor of these brassicas. Occurrence The compound was first reported in 1899, after its isolation from Tropaeolum majus, a nasturtium species. Glucotropaeolin is now known to occur widely in other brassica families including Caricaceae, Phytolaccaceae, Resedaceae, Salvadoraceae and Tovariaceae. Structure The chemical structure of glucotropaeolin was confirmed by total synthesis in 1957. This showed that it is a glucose derivative with β- D -glucopyranose configuration. At that time it was unclear whether the C=N bond was in the Z form, with sulfur and oxygen substituents on the same side of the double bond, or the alternative E form in which they are on opposite sides. The suggestion was made that the Z form was more likely, based on the known decomposition to benzyl isothiocyanate by a mechanism analogous to the Lossen rearrangement. However, when an identical product was obtained by an alternative route in 1963, it was pointed out that the E form would be expected to rearrange in a similar way. The matter was settled by X-ray crystallography and other spectroscopic studies and it is now known that all natural glucosinolates are of Z form. Biosynthesis Glucotropaeolin is biosynthesised from the amino acid phenylalanine in a multi-step pathway. Laboratory synthesis The first laboratory syntheses served to confirm the compound's structure. Later work allowed many glucosinolates including this benzyl derivative to be made. These processes are more efficient than isolating pure materials from the plants in which they are naturally found. Function The natural role of glucosinolates are as plant defense compounds. The enzyme myrosinase removes the glucose group in glucotropaeolin to give an intermediate which spontaneously rearranges to benzyl isothiocyanate. This is a reactive material which is toxic to many insect predators and its production is triggered when the plant is damaged. This effect has been called the mustard oil bomb. At concentrations typically found in foods, the glucosinolates are not toxic to humans and can be useful flavor components.
WIKI
  You limited your search to:   Partner: UNT Libraries  Degree Discipline: Computer Science  Collection: UNT Theses and Dissertations An Integrated Architecture for Ad Hoc Grids An Integrated Architecture for Ad Hoc Grids Date: May 2006 Creator: Amin, Kaizar Abdul Husain Description: Extensive research has been conducted by the grid community to enable large-scale collaborations in pre-configured environments. grid collaborations can vary in scale and motivation resulting in a coarse classification of grids: national grid, project grid, enterprise grid, and volunteer grid. Despite the differences in scope and scale, all the traditional grids in practice share some common assumptions. They support mutually collaborative communities, adopt a centralized control for membership, and assume a well-defined non-changing collaboration. To support grid applications that do not confirm to these assumptions, we propose the concept of ad hoc grids. In the context of this research, we propose a novel architecture for ad hoc grids that integrates a suite of component frameworks. Specifically, our architecture combines the community management framework, security framework, abstraction framework, quality of service framework, and reputation framework. The overarching objective of our integrated architecture is to support a variety of grid applications in a self-controlled fashion with the help of a self-organizing ad hoc community. We introduce mechanisms in our architecture that successfully isolates malicious elements from the community, inherently improving the quality of grid services and extracting deterministic quality assurances from the underlying infrastructure. We also emphasize on the technology-independence of our ... Contributing Partner: UNT Libraries Intelligent Memory Management Heuristics Intelligent Memory Management Heuristics Date: December 2003 Creator: Panthulu, Pradeep Description: Automatic memory management is crucial in implementation of runtime systems even though it induces a significant computational overhead. In this thesis I explore the use of statistical properties of the directed graph describing the set of live data to decide between garbage collection and heap expansion in a memory management algorithm combining the dynamic array represented heaps with a mark and sweep garbage collector to enhance its performance. The sampling method predicting the density and the distribution of useful data is implemented as a partial marking algorithm. The algorithm randomly marks the nodes of the directed graph representing the live data at different depths with a variable probability factor p. Using the information gathered by the partial marking algorithm in the current step and the knowledge gathered in the previous iterations, the proposed empirical formula predicts with reasonable accuracy the density of live nodes on the heap, to decide between garbage collection and heap expansion. The resulting heuristics are tested empirically and shown to improve overall execution performance significantly in the context of the Jinni Prolog compiler's runtime system. Contributing Partner: UNT Libraries Intelligent Memory Manager: Towards improving the locality behavior of allocation-intensive applications. Intelligent Memory Manager: Towards improving the locality behavior of allocation-intensive applications. Date: May 2004 Creator: Rezaei, Mehran Description: Dynamic memory management required by allocation-intensive (i.e., Object Oriented and linked data structured) applications has led to a large number of research trends. Memory performance due to the cache misses in these applications continues to lag in terms of execution cycles as ever increasing CPU-Memory speed gap continues to grow. Sophisticated prefetcing techniques, data relocations, and multithreaded architectures have tried to address memory latency. These techniques are not completely successful since they require either extra hardware/software in the system or special properties in the applications. Software needed for prefetching and data relocation strategies, aimed to improve cache performance, pollutes the cache so that the technique itself becomes counter-productive. On the other hand, extra hardware complexity needed in multithreaded architectures decelerates CPU's clock, since "Simpler is Faster." This dissertation, directed to seek the cause of poor locality behavior of allocation--intensive applications, studies allocators and their impact on the cache performance of these applications. Our study concludes that service functions, in general, and memory management functions, in particular, entangle with application's code and become the major cause of cache pollution. In this dissertation, we present a novel technique that transfers the allocation and de-allocation functions entirely to a separate processor residing in ... Contributing Partner: UNT Libraries Intrinsic and Extrinsic Adaptation in a Simulated Combat Environment Intrinsic and Extrinsic Adaptation in a Simulated Combat Environment Date: May 1995 Creator: Dombrowsky, Steven P. (Steven Paul) Description: Genetic algorithm and artificial life techniques are applied to the development of challenging and interesting opponents in a combat-based computer game. Computer simulations are carried out against an idealized human player to gather data on the effectiveness of the computer generated opponents. Contributing Partner: UNT Libraries Investigating the Extractive Summarization of Literary Novels Investigating the Extractive Summarization of Literary Novels Date: December 2011 Creator: Ceylan, Hakan Description: Abstract Due to the vast amount of information we are faced with, summarization has become a critical necessity of everyday human life. Given that a large fraction of the electronic documents available online and elsewhere consist of short texts such as Web pages, news articles, scientific reports, and others, the focus of natural language processing techniques to date has been on the automation of methods targeting short documents. We are witnessing however a change: an increasingly larger number of books become available in electronic format. This means that the need for language processing techniques able to handle very large documents such as books is becoming increasingly important. This thesis addresses the problem of summarization of novels, which are long and complex literary narratives. While there is a significant body of research that has been carried out on the task of automatic text summarization, most of this work has been concerned with the summarization of short documents, with a particular focus on news stories. However, novels are different in both length and genre, and consequently different summarization techniques are required. This thesis attempts to close this gap by analyzing a new domain for summarization, and by building unsupervised and supervised systems ... Contributing Partner: UNT Libraries Keywords in the mist: Automated keyword extraction for very large documents and back of the book indexing. Keywords in the mist: Automated keyword extraction for very large documents and back of the book indexing. Date: May 2008 Creator: Csomai, Andras Description: This research addresses the problem of automatic keyphrase extraction from large documents and back of the book indexing. The potential benefits of automating this process are far reaching, from improving information retrieval in digital libraries, to saving countless man-hours by helping professional indexers creating back of the book indexes. The dissertation introduces a new methodology to evaluate automated systems, which allows for a detailed, comparative analysis of several techniques for keyphrase extraction. We introduce and evaluate both supervised and unsupervised techniques, designed to balance the resource requirements of an automated system and the best achievable performance. Additionally, a number of novel features are proposed, including a statistical informativeness measure based on chi statistics; an encyclopedic feature that taps into the vast knowledge base of Wikipedia to establish the likelihood of a phrase referring to an informative concept; and a linguistic feature based on sophisticated semantic analysis of the text using current theories of discourse comprehension. The resulting keyphrase extraction system is shown to outperform the current state of the art in supervised keyphrase extraction by a large margin. Moreover, a fully automated back of the book indexing system based on the keyphrase extraction system was shown to lead to back ... Contributing Partner: UNT Libraries A Language and Visual Interface to Specify Complex Spatial Pattern Mining A Language and Visual Interface to Specify Complex Spatial Pattern Mining Access: Use of this item is restricted to the UNT Community. Date: December 2006 Creator: Li, Xiaohui Description: The emerging interests in spatial pattern mining leads to the demand for a flexible spatial pattern mining language, on which easy to use and understand visual pattern language could be built. It is worthwhile to define a pattern mining language called LCSPM to allow users to specify complex spatial patterns. I describe a proposed pattern mining language in this paper. A visual interface which allows users to specify the patterns visually is developed. Visual pattern queries are translated into the LCSPM language by a parser and data mining process can be triggered afterwards. The visual language is based on and goes beyond the visual language proposed in literature. I implemented a prototype system based on the open source JUMP framework. Contributing Partner: UNT Libraries Logic Programming Tools for Dynamic Content Generation and Internet Data Mining Logic Programming Tools for Dynamic Content Generation and Internet Data Mining Access: Use of this item is restricted to the UNT Community. Date: December 2000 Creator: Gupta, Anima Description: The phenomenal growth of Information Technology requires us to elicit, store and maintain huge volumes of data. Analyzing this data for various purposes is becoming increasingly important. Data mining consists of applying data analysis and discovery algorithms that under acceptable computational efficiency limitations, produce a particular enumeration of patterns over the data. We present two techniques based on using Logic programming tools for data mining. Data mining analyzes data by extracting patterns which describe its structure and discovers co-relations in the form of rules. We distinguish analysis methods as visual and non-visual and present one application of each. We explain that our focus on the field of Logic Programming makes some of the very complex tasks related to Web based data mining and dynamic content generation, simple and easy to implement in a uniform framework. Contributing Partner: UNT Libraries Machine Language Techniques for Conversational Agents Machine Language Techniques for Conversational Agents Date: December 2003 Creator: Sule, Manisha D. Description: Machine Learning is the ability of a machine to perform better at a given task, using its previous experience. Various algorithms like decision trees, Bayesian learning, artificial neural networks and instance-based learning algorithms are used widely in machine learning systems. Current applications of machine learning include credit card fraud detection, customer service based on history of purchased products, games and many more. The application of machine learning techniques to natural language processing (NLP) has increased tremendously in recent years. Examples are handwriting recognition and speech recognition. The problem we tackle in this Problem in Lieu of Thesis is applying machine-learning techniques to improve the performance of a conversational agent. The OpenMind repository of common sense, in the form of question-answer pairs is treated as the training data for the machine learning system. WordNet is interfaced with to capture important semantic and syntactic information about the words in the sentences. Further, k-closest neighbors algorithm, an instance based learning algorithm is used to simulate a case based learning system. The resulting system is expected to be able to answer new queries with knowledge gained from the training data it was fed with. Contributing Partner: UNT Libraries Measuring Semantic Relatedness Using Salient Encyclopedic Concepts Measuring Semantic Relatedness Using Salient Encyclopedic Concepts Date: August 2011 Creator: Hassan, Samer Description: While pragmatics, through its integration of situational awareness and real world relevant knowledge, offers a high level of analysis that is suitable for real interpretation of natural dialogue, semantics, on the other end, represents a lower yet more tractable and affordable linguistic level of analysis using current technologies. Generally, the understanding of semantic meaning in literature has revolved around the famous quote ``You shall know a word by the company it keeps''. In this thesis we investigate the role of context constituents in decoding the semantic meaning of the engulfing context; specifically we probe the role of salient concepts, defined as content-bearing expressions which afford encyclopedic definitions, as a suitable source of semantic clues to an unambiguous interpretation of context. Furthermore, we integrate this world knowledge in building a new and robust unsupervised semantic model and apply it to entail semantic relatedness between textual pairs, whether they are words, sentences or paragraphs. Moreover, we explore the abstraction of semantics across languages and utilize our findings into building a novel multi-lingual semantic relatedness model exploiting information acquired from various languages. We demonstrate the effectiveness and the superiority of our mono-lingual and multi-lingual models through a comprehensive set of evaluations on specialized ... Contributing Partner: UNT Libraries
ESSENTIALAI-STEM
Deuterocohnia brevifolia Deuterocohnia brevifolia is a species of plant in the family Bromeliaceae. This species is native to Argentina and Bolivia, but is also popular as a potted houseplant or ground cover elsewhere. A terrestrial species, it prefers sun or light shade and can grow in large dense mats of leaves given proper conditions.
WIKI
Wikipedia:Articles for deletion/Amassed The result was Speedy delete, non-admin closure. Ten Pound Hammer • (What did I screw up now?) 05:06, 7 March 2012 (UTC) Amassed * – ( View AfD View log ) Wikipedia is an encyclopedia, not a dictionary, plain and simple. The author may wish to submit this at Wiktionary, if it does not already exist there. Chris the Paleontologist (talk • contribs) 02:04, 7 March 2012 (UTC) I have also nominated the following page by the same contributor for deletion: That one seems like it belongs at Urban Dictionary instead… Chris the Paleontologist (talk • contribs) 02:08, 7 March 2012 (UTC) Author blanked both, I tagged for CSD. Chris the Paleontologist (talk • contribs) 02:10, 7 March 2012 (UTC)
WIKI
Muhammad ibn Yaqut Abu Bakr Muhammad ibn Yaqut (أبو بكر محمد بن ياقوت) was an official who played a major role in the tumultuous political affairs of the Abbasid Caliphate in 930–935, particularly during the reign of al-Qahir (932–934) and the early months of the reign of ar-Radi, when he was the most powerful man in the state. His rivals secured his dismissal and imprisonment in April 935, and he died in prison soon after. Under al-Muqtadir Muhammad's father Yaqut was serving as head chamberlain (hajib) of Caliph al-Muqtadir ((r. 908 – 932)) in 930, when Muhammad was appointed head of the security forces (sahib al-shurta) in the Abbasid capital, Baghdad, which at the time was plagued by armed clashes between rival factions in the military; during one such clash in February, Muhammad intervened on the side of the Hujariyya cavalry, forcing their opponents of the infantry to abandon the city, except for a contingent of black African troops who surrendered. The latter mutinied because of pay arrears a few months later, and were also expelled from Baghdad, after which they were attacked and destroyed near Wasit by the Abbasid commander-in-chief, Mu'nis al-Muzaffar. Soon after, however, Muhammad and Mu'nis fell out, and in June/July 931 Muhammad was dismissed. Mu'nis pressed for his banishment, and despite initial reluctance, al-Muqtadir bowed to his pressure: in July 931, July was sent to the remote province of Sijistan. When al-Muqtadir fell out with Mu'nis, Muhammad was recalled, arriving in Baghdad in January 932. He was sent at the head of an army to Takrit, but when Mu'nis set out from Mosul towards Baghdad, Muhammad and his fellow commander Sa'id ibn Hamdan withdrew without giving battle with Mu'nis' forces. Under al-Qahir and al-Radi Mu'nis was victorious and killed al-Muqtadir before Baghdad in October 932, installing al-Qahir ((r. 932 – 934)) on the throne. Muhammad, along with al-Muqtadir's son Abd al-Wahid, and others of al-Muqtadir's partisans, fled from the city to al-Mada'in and thence to Wasit. There a few of their generals defected, so that when the forces of the new regime, headed by the general Yalbaq, approached them, they fled to Tustar. Muhammad's arrogant and selfish behaviour quickly alienated his followers, who one by one began deserting him. After Abd al-Wahid too surrendered, Muhammad negotiated his surrender and pardon with Yalbaq. On his return to Baghdad, he quickly rose to great favour with al-Qahir, and remained an influential member of the court for the duration of his brief reign. Indeed, when al-Qahir was deposed and ar-Radi ((r. 934 – 940)) installed as caliph in April 934, Muhammad was appointed hajib and commander-in-chief of the army, thus rising in power above even the vizier Ibn Muqla, and becoming the de facto ruler of the state. From this position, he headed an expedition against Harun ibn Gharib, a cousin of al-Muqtadir and governor of Mah al-Kufa, who had rebelled against al-Radi. In May 934, Muhammad was defeated in battle by Harun's troops, but Harun was killed soon after by one of Muhammad's slaves, and his rebellion collapsed. Muhammad's very power earned him many enemies at court, particularly Ibn Muqla, who persuaded al-Radi to move against him: on 12 April 935, Muhammad, his brother Abu'l-Fath al-Muzaffar, and his secretary Abu Ishaq al-Qarariti, were arrested. Muhammad died in prison soon after.
WIKI
Ander Gago Ander Gago Álvarez (born 10 September 1984 in Galdakao, Biscay, Basque Country) is a Spanish former professional footballer who played as a right back.
WIKI
Page:Language and the Study of Language.djvu/501 Rh Dual number, in verbs 267; in nouns 273; its loss, 274. Dutch language, 164, 211. E, the letter, derivation of, 464. Eddas, Old Norse collections, 212. Education gained in the acquisition of language, 13, 15-16, 441-5. Education, conservative influence of, upon language, 17, 149-51, 158-9. Egypt, languages of, 150, 234, 340-43. Egyptian modes of writing, 452-4. Ehkili language, 299. ēither or eīther, 43, 95. electricity, 129. English language, how acquired by its speakers, 10-22; its differences in individuals, 16-22; what, in general, it is, 22; how kept in existence, 23; its constant change, 24; causes and modes of this change, 25-31, 140-48; examples of the changes which have brought it into its present state, 55-65, 70-87, 92-5, 97, 102-34; its derivation and history, 24, 31, 99, 147, 169-70; its periods, 210; mixture of Germanic and other elements in it, 84, 144, 170, 185, 198, 373, 472-3; its fundamental structure chiefly Germanic, 170, 198; position and relations as a Germanic language, 187-9, 210-13; as an Indo-European language, 189-200; its analytical character, 279, 282, 284; prevailing monosyllabism, 264-5, 279; comparison with Chinese, 331, 471-2; its dialects, 170-71; transfer to America, 171-2; British and American forms of, 172-4; prospects as a world language, 470; merits, 470-74. English orthography, anomalies of, 94, 467-9; reform desirable, 469-70. English spoken alphabet, structure and relations of, 91. English written alphabet, derivation and character of, 466-7. Erse, or Scotch Gaelic, language, 190. Eskimo language, 330, 350, 351. Esthonia, Scythian languages in, 309. Ethiopian or Abyssinian group of Hamitic languages, 341, 343. Ethiopic or Geëz, a Semitic, language, 297, 299. Ethnology, bearing of linguistic science on, 8, 370-94. Etruscan language, 354. Etymology, the foundation of linguistic science, 54-5. 238; its uncertainties, dangers, and ill-repute, 239, 386-94; modern improvements of, 240, 244, 386-7; is not the whole science, 247; false etymologies, 388-90. Etymology of a word the explanation of its origin, not the ground of its use, 14, 128-9, 132-4. Euguvine tablets, Umbrian monuments, 220. Euphony, seat of, in the mouth, not the ear, 90. Europe, languages of, 186-91, 209-21, 309-10, 353-5. Expression, dependent upon an external inducement, not an internal impulse, 403-5, 420-21; always incomplete, 20, 109-11, 406-7; variety of expression for same idea in different languages, 407-9; the voice as means of, 421-3. eye, 101. F, the letter, derivation of, 465. Families of languages, how established, 290-92. Family languages, so called, 363. Farrar, Rev. F. W., referred to, vi. note. Farther India, languages of, 336-7. father, 179. Fellatah language, 346. Finnish language, 191, 309, 320, 361; its literature, 314. Finno-Hungarian branch of Scythian language—see Ugrian. Firdusi, Persian poet, 223, 325. five, 196. Flemish language, 211. Florida group of American languages, 350. for, 114. forehead, 56. forget, 113. forgive, 113. Formative elements, 63-7; derived from words originally independent, 66, 251-5; their production gradual and unreflective, 124; aided by phonetic corruption, 73-4; accompanying change of meaning, 117; extensibility of their application, 83-4; their distinction as primary and secondary, 255. fortnight, 56. frail, 111. Frankish dialect of Old High-German, 163, 211. Freedom of mental action restricted by acquisition of language, 445-6. French language, 164-5, 189, 218-19;
WIKI
Jonathan Randal Jonathan C. Randal was a foreign correspondent for numerous publications, including the New York Times and the Washington Post (from 1969-1998). His work as a reporter primarily focused on war zones, including reporting from Vietnam, Eritrea, Iran, and Lebanon Randal is also the author of four books which variously chronicle and apply his journalism to Middle East issues. Career Born in 1933 in Buffalo, New York, Randal was educated at Exeter and Harvard University. He spent his junior year abroad in France and served briefly as a private in the U.S. Army in Europe. Randal began as a foreign correspondent in Paris during the mid-1950s. Though Randal served as a European economic correspondent in Paris, he moved on to covering wars He worked for the United Press, the former Paris Herald, Time, The New York Times, and the Washington Post (with which he remained for almost 30 years). He reported on the Algerian War of Independence from France, and the wars and crises in Vietnam, the Congo, Iran, Lebanon, Kurdistan, Bosnia, and Liberia during his time as a war correspondent Of his decision to become a foreign correspondent, Randal has said: “Essentially I operated as a contrarian in semi-perpetual adversity characterized by an often perverse refusal to do the sensible and obvious and somehow surviving by sheer good luck what others considered sheer folly…With today’s instant communications and concomitant control, it is hard to capture the sense of freedom I enjoyed working abroad, especially in then-remote lands, many untrodden by previous generations of American correspondents.” Randal was called to testify for the International Criminal Tribunal for the former Yugoslavia in 2002. The case was regarding an interview Randal had conducted with former Bosnian-Serbian housing minister Radoslav Brdjanin in 1993. Randal, however, declined to honor the subpoena and eventually won the case on the basis of an appeal – thereby creating a precedent of (limited) immunity from involuntary testimony for war correspondents. While the Washington Post allegedly paid “in excess of $100,000” to defend Randal, the case is also considered a victory for the freedom of the press. The rationale behind the Washington Post’s defense (and Randal’s subpoena refusal) was simple: if the Red Cross or International Criminal Tribunal could force war correspondents to testify it “would limit coverage and endanger lives. Bluntly put, a warlord could refuse to meet war correspondents, lie to them or indeed kill them rather than risk prosecution for war crimes on the basis of a war correspondent’s work. In 2013, Randal won John Peter and Anna Catherine Zenger Award from the University of Arizona, School of Journalism. “Given by the School of Journalism since 1954, the award honors journalists who fight for freedom of the press and the people’s right to know.” Randal currently lives in Florida. Publications Going All the Way: Christian Warlords, Israeli Adventurers and the War in Lebanon (1989) at Amazon ''After Such Knowledge, What Forgiveness? My Encounters with Kurdistan'' (1997) at Amazon Osama: The Making of a Terrorist (2004) at Random House The Tragedy of Lebanon: Christian Warlords, Israeli Adventures, and American Bunglers (2012) at Just World Books
WIKI
Blue Whale Facts Blue Whale Facts, Information and Photos The blue whale is the largest animal on Earth. Learn how big these whales get and more facts about these huge marine mammals. Blue whales are mammals. Blue Whale, Balaenoptera musculus. Doug Perrine/Photolibrary/Getty Images Blue whales are mammals. We are mammals, too, so both humans and blue whales are endothermic (commonly called "warm-blooded"), give birth to live young, and nurse their young. Whales even have hair. Because blue whales are mammals, they breathe air through lungs, just like we do. When blue whales exhale, the air rises more than 20 feet and can be seen from quite a distance. This is called the whale's blow or spout. Blue Whales / NOAA Blue Whales. NOAA All whales, including blue whales, are cetaceans. The word cetacean comes from the Latin word cetus, which means "a large sea animal," and the Greek word ketos, which means "sea monster." Cetaceans propel themselves but undulating their tail up and down. They have blubber to help insulate their bodies. They also have excellent hearing, and adaptations for surviving in deep water, including collapsible rib cages, flexible skeletons, and a high tolerance for carbon dioxide in their blood. More » Blue whales are the largest animals on Earth. Blue Whale / NOAA Blue whale, seen from above. NOAA Blue whales are the largest animal on Earth today, and are thought to be the largest animal that has ever lived on Earth. Swimming in this ocean right now, there are blue whales who can grow to more than 90 feet in length and over 200 tons (400,000 lbs) in weight. Imagine a creature the size of 2 1/2 school buses laid end-to-end and you'll get a sense of the size of the blue whale. The maximum weight of one blue whale is the same weight as about 40 African elephants. A blue whale's heart alone is about the size of a small car and weighs about 1,000 pounds. Their mandibles are the largest single bones on Earth. Blue whales eat some of the smallest organisms on Earth. Blue whales eat krill, which average about 2 inches in length. They also eat other small organisms, such as copepods. Blue whales can consume 4 tons of prey per day. They can eat huge amounts of prey at once thanks to their baleen - 500-800 fringed plates made of keratin that allow the whale to gulp their food, but filter sea water out. Blue whales are part of the group of cetaceans called the rorquals, which means they are related to fin whales, humpback whales, sei whales and minke whales. Rorquals have grooves (the blue whale has 55-88 of these grooves) that run from their chin to behind their flippers. These grooves allow the rorquals to expand their their throat while feeding to accomodate huge amounts of prey and sea water before the water is filtered back into the ocean via the whale's baleen. A blue whale's tongue weighs about 4 tons (about 8,000 pounds). Their tongue is about 18 feet long and can weigh up to 8,000 pounds (the weight of an adult female African elephant). A 2010 study estimated that when feeding, a blue whale's mouth opens so wide, and is so large, that another blue whale could swim into it. Blue whale calves are 25 feet long when born. Blue whales give birth to a single calf, every 2-3 years after a gestation period of 10-11 months. The calf is about 20-25 feet long and weighs about 6,000 pounds at birth. Blue whale calves gain 100-200 pounds per day while nursing. Blue whale calves nurse for about 7 months. During this time, they drink about 100 gallons of milk and gain 100-200 pounds per day. When they are weaned at 7 months, they are about 50 feet long. Blue whales are one of the loudest animals in the world. A blue whale's sound repertoire includes pulses, buzzes and rasps. Their sounds are likely used for communication and navigation. They have very loud voices - their sounds can be over 180 decibels (louder than a jet engine) and at 15-40 Hz, are usually below our hearing range. Like humpback whales, male blue whales sing songs. Blue whales may live over 100 years. We don't know the true life span of blue whales, but average life span is estimated around 80-90 years. A way to tell a whale's age is to look at growth layers in their ear plug. The oldest whale estimated using this method was 110 years. Blue whales were hunted nearly to extinction. Blue whales don't have many natural predators, although they may be attacked by sharks and orcas. Their main enemy in the 1800-1900's was humans, who killed 29,410 blue whales from 1930-31 alone. It is estimated that there were more than 200,000 blue whales worldwide before whaling, and now there are about 5,000. References and Further Information American Cetacean Society. Blue Whale. Accessed August 31, 2012. Discovery of Sound in the Sea (DOSITS). Blue Whale. Accessed August 31, 2012. Gill, V. 2010. Blue Whale's Gigantic Mouthful Measured. BBC News. Accessed August 30, 2012. National Geographic. Blue Whale. Accessed August 30, 2012. NOAA Fisheries: Office of Protected Resources. 2012. Blue Whale (Balaenoptera musculus). Accessed August 31, 2012. Seymour Marine Discovery Center at Long Marine Laboratory. Ms. Blue's Measurements. Accessed August 31, 2012. Stafford, K. Blue Whale (B. musculus). Society for Marine Mammalogy. Accessed August 31, 2012. Format mla apa chicago Your Citation Kennedy, Jennifer. "Blue Whale Facts." ThoughtCo, Oct. 9, 2017, thoughtco.com/blue-whale-facts-2291368. Kennedy, Jennifer. (2017, October 9). Blue Whale Facts. Retrieved from https://www.thoughtco.com/blue-whale-facts-2291368 Kennedy, Jennifer. "Blue Whale Facts." ThoughtCo. https://www.thoughtco.com/blue-whale-facts-2291368 (accessed May 24, 2018).
ESSENTIALAI-STEM
Techironed Fundamental of JavaScript How to start and learn the fundamentals of JavaScript In website development, fundamentals of JavaScript plays a vital role as it makes the websites interactive. With the knowledge of HTML, CSS, and PHP one can learn JavaScript easily as all the languages are interlinked somehow. As JavaScript is quite important, we will first start with a little introduction and then we will discuss some fundamentals of JavaScript, in that way you don’t have to switch sites while learning about JavaScript. Starting JavaScript In this era, everything is so easily accessible and it makes learning easy. If you have a gadget (mobile, laptop, or PC) and good internet then stop wasting your valuable time on anything that won’t return you a good reward. So, learn JavaScript as this won’t get old with time but give you a good future if you master it. There are thousands of articles and JavaScript tutorials, and you can hop on those but let me tell you how you can easily get the idea steps by step about this language till you go towards an advanced level. I will recommend some websites and YouTube channels and post some links for your easiness. So, don’t worry, and let’s get started!! In this article, we will learn about the basic concepts of JavaScript. We will cover topics such as • Variables • Data types • Operators • Functions basic concepts of JavaScript By the end of this article, you will have a strong understanding of how to use JavaScript to write programs that can run in your web browser. What is JavaScript JavaScript is a programming language that is used to make web pages interactive. For example, you can use JavaScript to add features such as animations, forms, and videos to your web page. JavaScript is a client-side scripting language, which means that the code is executed on the user’s computer. This is in contrast to other languages such as PHP and ASP, which are executed on the server. JavaScript is easy to learn and use. However, it can be difficult to master. This article will give you a good foundation in the basics of JavaScript so that you can start writing your programs. So, starting with its fundamentals Variables Variables of JavaScript A variable is a place to store a value. In JavaScript, there are three different types of variables: 1. Local variables 2. Global variables 3. Session Storage variables   Local variables They are only accessible within the function in which they are defined. Global variables They are accessible from anywhere in your code. Session Storage variables They are only accessible within the same session (i.e., they are not persisted across page reloads). To create a variable, you use the var keyword, followed by the name of the variable. For example: var myName = “John”; This creates a variable called myName and assigns it the value “John”. You can access the value of a variable by using the variable name. For example, the following code would display the value of myName in an alert box:   alert(myName); You can also change the value of a variable by reassigning it. For example, the following code would change the value of myName to “Jane”:   myName = “Jane”;   Data Types In JavaScript, six data types can be assigned to variables: 1. String 2. Number 3. Boolean 4. Bull 5. Undefined 6. Object String A string is a sequence of characters. For example, the following code would create a string variable called myName and assign it the value “John”: var myName = “John”; Number A number is a numeric value. For example, the following code would create a number variable called myAge and assign it the value 20:   var myAge = 20;   Boolean A boolean is a true/false value. For example, the following code would create a boolean variable called isValid and assign it the value true:   var isValid = true;   Null Null is a special value that represents an empty value. For example, the following code would create a variable called myName and assign it the value null:   var myName = null;   Undefined Undefined is a special value that represents a value that has not been set. For example, the following code would create a variable called myName and assign it the value undefined:   var myName = undefined;   Object An object is a collection of key/value pairs. Like this is an object variable called the person and assign it the values “John” and 20 for the keys “name” and “age”:   var person = { name: “John”, age: 20 };   Operators In JavaScript, there are five different types of operators: • Arithmetic Operators • Assignment Operators • Conditional Operators • Comparison Operators • Logical Operators Arithmetic Operators It is uses to perform mathematical operations Like   var s = 20, t = 8, u=5; u = s + t; //addition is done and it returns 28 s = t – u;  //subtraction is done and returns 3 t = s * u; //multiplication is done and returns 100 t = s/u; //division is done and returns 4 u = s % 2; //returns division remainder 0.1   Assignment Operators Assignment operators assign values to the variables. Like   var s = 8 , t = 20, u = 35; s = t; //s would be 20 t += 1; //s would be 21 u -= 1; //s would be 34   Conditional Operators It assigns some value to a variable based on some condition i.e True or False. ( 😕 ) is uses to express it. Syntax is Condition ? value1 : value2;   Comparison Operators Compare two operands and then tells either it is true or false. Like   var x = 7, y = 12, z = “7”; var u = x; x == z; // returns true x > z; // returns false   Logical Operators It combines two or more conditions. Like   var x = 3, y = 15; (x != y) && (x < y); // returns true.   Functions A block of code is specified to perform a certain function   You can define a function in JavaScript using the function keyword. For example, the following code defines a function named myFunction that takes two parameters and returns the sum of those parameters:   function myFunction(a, b) { return a + b;   If you want to dive in brief details on the fundamentals there are some tutorials on W3Schools. It’s the best source for online learning as it has editable tutorials. W3Schools Object Oriented JavaScript In Object-oriented JavaScript, you build classes to structure different objects that encapsulate functionality and data. It is the best scripting language for websites. JavaScript is all amount objects, so to learn object-oriented programming first you need to have a good understanding of objects. In object-oriented programming, everything revolves around objects. To create an object, we uses a constructor function. Syntax: var obj = new Object(); Object oriented javascript Here is the recommended video to learn about object oriented JavaScript https://youtu.be/PFmuCDHHpwk   Conclusion Hope I gave you all a little bit of overview of how to start and learned about some basic knowledge about JavaScript. You can also read about the best frameworks in the JavaScript. Now start learning and keep practicing all the web languages to be a freelancer in web development in the coming months. Just be patient and try learning everything that comes your way. Leave a Comment Your email address will not be published. Required fields are marked * Pinterest LinkedIn LinkedIn Share Instagram
ESSENTIALAI-STEM
Talk:Comparison of X Window System desktop environments Motif and other missing DEs Shouldn't it be fair to include Motif and Open Motif as well? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 06:56, 8 June 2008 (UTC) CDE as well as NeXTStep. And XPde! --<IP_ADDRESS> (talk) 19:11, 3 January 2010 (UTC) Rename this page should probably be called "comparison of Linux desktop environments shouldn't it? also, it would be really good to see some performance specs for each DE too. --<IP_ADDRESS> 03:14, 7 September 2006 (UTC) * In its current state, it should probable be called "Comparison of desktop environments for the X Window System". I think this article should be changed to a comparison of all notable desktop environmets, including Windows, Mac, RISCOS, Amiga etc. Ahy1 22:08, 8 September 2006 (UTC) I also think it's not particularly useful even as that - I'd expect something on how they differ for the perspective of the user, not 'here's which text editor is included if your distro is KDE-based'. Tell me how they operate: do they have a 'click here' for the menus button or do you right-click anywhere on the desktop to get the menus or are they drop-down from the top. How do you do things with them? Do you need to have two working hands to do lots of shift clicking or can you operate them with just a mouse? etc etc. I realise that they allow much customisation - even Windows does that - but, straight out of the box/download, what are they like to use? Someone also needs to find something on the computing resources necessary to run them. I know from experience that Xfce needs less CPU and graphics power, but how much? Lovingboth 08:19, 9 September 2006 (UTC) * You could list the minimum system requirements as an indication of resource usage. --sofar 15:35, 30 October 2006 (UTC) * None of these are exclusive to Linux-based OSes; misnomer much. &brvbar; Reisio 02:02, 9 November 2006 (UTC) * I agree, so I moved it to "Comparison of X Window System desktop environments". Guy Harris 02:34, 9 November 2006 (UTC) Criticism This is not a good sentence: A desktop environment (DE) can be broken up into several components that function independently and interact with one another to provide the look and feel and functionality of the desktop environment. it defines a desktop environment in terms of a desktop environment, i.e. a circular definition. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:30, 20 June 2011 (UTC) This article needs some serious work. It it not made clear what exactly the list is supposed to be of. The Desktop Environments' own projects? That can't be it, given some of the things on the list. Are they supposed to represent A Very Popular Choice? By who's reckoning? What authority is this cited on? Are they the author's own personal picks? If so I'm sure it's against some policy somewhere. Someone (not me, since I'd just delete the whole thing) needs to take a look at this. —The preceding unsigned comment was added by <IP_ADDRESS> (talk • contribs). * I took the list from this KDE site and this article. --DevastatorIIC 13:29, 25 February 2007 (UTC) This article presents window managers as if they are "minimalistic" desktop environments. That is plainly false. Window managers are one of many components that comprise desktop environments. Window managers such as Ratpoison and wmii should absolutely not be included here. They are not desktop environments, and they do not pretend to be. This entire article therefore needs a serious overhaul. k7tz52oef5y5g93r40 00:49, 11 May 2007 (UTC) +1 for removing the window managers from this article. Enlightenment, Blackbox derivatives, Ratpoison, wmii, dwm and Ion should should NOT be on this list, because they are not desktop environments, they are window managers. This article could confuse people new to linux because the information in it is wrong. Blazeix 19:16, 9 Sep 2007 (UTC) More information Look at other "comparison of" articles -- Linux distros, instant messenger programs, etc. What I'd like is information that describes the differences between desktops such as KDE and GNOME, sufficient to help distinguish them or help in a choice. Right now this article tells me nothing, or very little, about their actual comparison. Any chance of expansion? FT2 (Talk 22:58, 2 February 2007 (UTC) Include OS X and Windows I think it would be useful from a pedagogical perspective to include OS X and Windows in the comparison. That would mean moving this page to Comparison of desktop environments. Chris Pickett 22:47, 18 February 2007 (UTC) * Guy Harris, I saw your recent edits... presently Comparison_of_desktop_environments redirects to Comparison_of_X_Window_System_desktop_environments. I tried moving this page, but it requires an administrators' help. Chris Pickett 00:11, 19 February 2007 (UTC) * Yes, I know - it's "edits", plural, as in "I backed out my comment because I realized that the page just redirected". * To get the page moved, I'd suggest that you * 1. edit the page a bit so that it starts talking about non-X11 desktop environments; * 2. request the move on Requested moves, as the page you get when you click "move" for the Comparison of X Window System desktop environments page suggests. * That's what I've done for at least one rename that was blocked by an edited redirect page. Guy Harris 00:40, 19 February 2007 (UTC) * I was confused by your second edit summary, that's why I replied like that. (It's generally better to strike out text than delete from a talk page.) Thanks for documenting the process here. I've done a requested move before, but I'm focusing on Linux right now, so I'll let you or somebody else who comes along take care of it. * By the way, I think there should be just one column for each of OS X and Windows, not one for each different version. Chris Pickett 01:22, 19 February 2007 (UTC) * I think there should be just one row for each of OS X and Windows; most if not all other "Comparison of XXX" pages have, for each table, one row for each XXX and one column for each point of comparison. * Hmm, I don't know about rows vs. columns. I think that you want more rows than columns for readability, and inverting the table even with OS X and Windows added would still be 6 rows and 14 columns. * Only if there's a significant difference between version N and version M of a given desktop environment should there be separate rows for the two versions. Guy Harris 01:33, 19 February 2007 (UTC) * I also don't know about that. Certainly there are significant differences between Windows 98 and Windows Vista, but what I meant to say was that in both cases you want DirectX as the graphics API, Windows Media Player as the media player, and Microsoft Word as the de facto office suite (even though it must be paid for separately). Chris Pickett 02:44, 19 February 2007 (UTC) * I think it would be extremely difficult to include OS X and Windows to do any sensible comparison. OS X is a possibility as it is an *nix system, nevertheless difficult. Windows, imho is impossible. The Windows interface cannot be changed even to a minor extent. It can simply be "themed". The interface is knit into the system and is inseparable from the system itself. It is impossible to break up the interface into components and tell which is the file manager and which is the WM. Nobody knows what powers the interface or even how the interface works because its source is closed. The Windows interface is a unique one and cannot be compared with the other DEs in this page. I hence propose that the page not be moved, and if moved only for the purpose of simplicity of the title. -- Artagnon 10:35, 30 June 2007 (UTC) Konqueror or maybe Kaudiocreator ? In the first table, Konqueror stands for cd-ripper in KDE, maybe Kaudiocreator was meant there? —The preceding unsigned comment was added by <IP_ADDRESS> (talk) 21:58, 29 March 2007 (UTC). Large modification I modified the article to a large extent. It is by no means perfect, but I think I've atleast given the article some direction. I don't think it makes sense to include proprietary desktop environment like the one Microsoft Windows or Mac OS X gives with its OS. Some of the elements don't even have their own names. Most elements are inseparable and integral parts of the OS. The whole environment is a tangled mess and everything is written directly into the kernel. Further, since everything is proprietary, it's impossible to analyse and compare them with free software. I believe proprietary and free software are in different leagues and cannot be compared with each other expect on a superficial basis. I think the purpose and objective of the article is very clear. What it talks about is also very clear. I'm sure new GNU/Linux users will find this article very useful and informative too. I finally take take this opportunity to request permission to remove the expand and expert tags as I think my modifications have satisfied the requirements of both. Leave any messages concerning this issue on my userpage. -- Artagnon 16:21, 14 April 2007 (UTC) style concerns I added the inappropriate tone tag because I think this article could benefit from some improvement in writing style. The sentence structure generally seems repetitive and choppy; it could be more sophisticated. I know that this isn't exactly tone, but I couldn't find a tag template that dealt with this particular issue. This may be something I can try to work on later, but right now I'll just throw this out to everyone.Brad Gibbons 06:11, 25 May 2007 (UTC) Flaws In Unix, a desktop environment is not a window manager. BSD, Linux, Unix, and HURD can all run with almost no extra software from the command line. The fact that a window manager doesn't need extra software to run does not make it a desktop environment. In Unix, a desktop environment is a set of programs that the author thought was the minimum needed for end users to run the operating system. They usually have a window manager, a terminal (command line), a file manager, cd/dvd burning software, image editing software, text editing software, hypertext software, and common toolkits and libraries for other applications.Altarbo 22:16, 25 May 2007 (UTC) * Yes, a desktop environment is not a window manager. -- Artagnon 09:06, 29 May 2007 (UTC) DEs eliminated, WMs overloading a while back I added info to the (then-only) table, about Equinox and LXDE (as well as Rox); yes, very minor in terms of market share and development, but still DEs: not just WMs. (I think the "elaborate" qualifier somebody added later. But then this page isn't called "Comparison of Elaborate X Window System desktop environments", is it?) I come back notice that info is completely gone. Not even a mention But there are reams of info on things like Blackbox & Ratpoison etc, which IIRC are WMs and nothing but. Not DEs in any way shape or form. Sections, paragraphs, table columns, opinionating & more all about WMs, and info about real DEs just gone. As well as all this irrelevant stuff being levered into the page so that now it's a complete mess as opposed to a nice clear comparison. What the hell is happening to this page? end rant 9ulk 17:31, 17 June 2007 (UTC) * I personally apologise for removing LXDE, Rox and Equinox. I don't have personal experience with any of them and really couldn't integrate them into the article. I appreciate your concerns about the article tilting towards WMs instead of the original intention of DEs. Reams of info on Ratpoison and Blackbox? I'm probably to blame for that. However, I don't think it makes sense to make another page for comparison of X Windows System window managers and since WMs are an integral part of DEs, I propose that we include them. After all, WMs like fluxbox and ratpoison are capable of functioning independently of other DEs- along with some extra software, they function like full-blown DEs. * Yes, I'm also to blame for the "elaborate" qualifier. It is probably an unnecessary qualifier and the article should clearly differentiate between DEs and WMs. * Please edit the article in any way you see fit taking into consideration the comments posted on this page. I will also attempt to do the same when I find the time. If you'd like to discuss this more, you can leave a message on my talk page. -- Artagnon 10:21, 30 June 2007 (UTC) Another major edit In response to the comments, I've made another major edit to the article. I hope the major crisis of DE versus WM was addressed in this edit. -- 13:32, 30 June 2007 (UTC) * "Full Environments" and "Window managers only" split in the table is a fantastic solution to the long standing debate of DE versus WM. The article needs to be edited further to look encyclopaedic. The "five categories" is also my invention and should probably be removed. Artagnon 17:05, 8 October 2007 (UTC) Maybe tables could focus on objectively-measurable traits? This is hard to do because window managers are a religious topic; thanks for trying. This reminds me of a table very subjectively comparing the American Presidential candidates: One way to make it easier to understand is to find a few objective data points that separate the different categories of desktop environment from each other: * Installation size * Includes application launcher? * Includes configuration GUI? * Includes Web browser? * Includes visual effects? Longer explanation could go beneath the table. References should be actual links (or references to books, etc.), not just a description of where you looked for the information (which you may want to put in the prose, or may not need at all). The table of applications corresponding to each DE/WM is great. I'm not sure the topic is Wikipedian to address, because to even begin figuring it out you have to make some assumptions about the user's needs. (But again, thanks for the effort that went into writing and rewriting the thing and trying to be dispassionate.) Incidentally, I got to this article because I'll probably soon be using Xfce on an ultraportable, storage-constrained laptop (the Asus Eee) and wanted to find out more about it. Maybe that application somehow rates inclusion -- that these smaller, less-known environments are practical for old, less-powerful, or storage-limited machines. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 07:40, 19 February 2008 (UTC) merge half the (minimal) content of Comparison of X window managers is talking about metacity & kwin as part of gnome and kde, and the rest is about jr. environments like blackbox and icewm. Why not merge this artcle with "Desktop Environment"? - KitchM (talk) 04:31, 8 November 2009 (UTC) What about speed? Im doing a lot of test in my new Arch linux and i see kde very high in mem use but fster than gnome and xfce the king of speed but kde the king of visual effects. what about the speed and mem needs? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:32, 15 November 2010 (UTC) What about accessibility? This belongs in the comparison. Keyboard shortcuts? Alternatives to pointing with the mouse? Auditory cues/feedback? Support for applications which otherwise might provide such accessibility features? --<IP_ADDRESS> (talk) 03:00, 9 April 2009 (UTC) memory use "Memory comparison can be found here." That link is to a biased source and the author even admits it himself in the article. I think would be better to either discuss in more depth in the article with other sources included as well, or just delete that link... <IP_ADDRESS> (talk) 15:42, 23 February 2010 (UTC) Dolphin is the file manager not Konqueror. Dolphin is the file manager not Konqueror. <IP_ADDRESS> (talk) 04:00, 9 April 2011 (UTC) Correct. Added a few lines about the replacement of Konqueror with dolphin, but imo, information about konqueror should be deleted all together. Any thougts? — Preceding unsigned comment added by Topfenbaecker (talk • contribs) 08:08, 18 June 2013 (UTC) ETK Links to Commune of the Working People of Estonia The ETK link redirects to Commune of the Working People of Estonia. I fixed it, so now it goes to Enlightenment Foundation Libraries, but I just wanted to note it because I thought it was funny. =) --Topsfield99 (talk) 19:12, 12 April 2011 (UTC) Outdated? This article seems to need a little refresh. What about MATE (desktop environment) and Cinnamon (user interface), while I never heard of Ede and Etoile (are those country or distribution dependent?), neither with Fedora, Suse, ?Ubuntu, Mint, Magaia, EeePC-Linux (obsolete), EasyPeasy, nor Knoppix (and some others). The table should be split up in three, at the "full", "semi" and "WM" column areas.--Mideal (talk) 12:45, 29 November 2012 (UTC) Edit: Not to forget Unity (vomit).--Mideal (talk) 12:51, 29 November 2012 (UTC) I also think that some of the links should be removed as well. One of the links is to a 2007 comparison of the two? I'm not sure if any of the points are still valid. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:08, 26 March 2013 (UTC) Can additional environments be added ? The list is severely outdated, even with the minor update in 2012. See http://askubuntu.com/questions/65083/what-kinds-of-desktop-environments-and-shells-are-available <IP_ADDRESS> (talk) About "Compatibility and interoperability issues" To my knowledge this is a non-starter. There are no compatibility issues or interoperability issues with the X11 based desktop environments at all, since the interaction with the desktop and an application (from a window manager point of view) is entirely based an X11 protocol, which all the window managers have implemented (if not, nothing would work!). Any interoperability or compatibility issue is then reduced to what other libraries or managers use, but since an app would -depend- on those being present, that's a non-starter too, i.e. there are no interoperability issues and no compatibility issues since each project either implement a common protocol with no extensions or implement a unique protocol. Unless someone is able to produce an example or either a compatibility issues or an interoperability issue (swiftly) I propose to remove the section entirely. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:37, 4 January 2013 (UTC) Window Managers and Desktop Environments At various points upthread, it's mentioned that the inclusion of information about pure window managers not associated with any desktop environment in the first table is unnecessary. As there is now a page for comparison of X window managers, it seems doubly unnecessary. I propose that it is removed. Any objections? Caeciliusinhorto (talk) 21:34, 7 November 2014 (UTC) * As no one has objected over the past week, I've gone ahead and removed all the information about Window Managers which are not part of desktop environments. Other information about WMs should go in comparison of X window managers Caeciliusinhorto (talk) 08:31, 14 November 2014 (UTC) * So this subject just popped up on reddit.com/r/linux (linky). Since you have recently worked on this page, what do you think about rotating the tables to better accommodate greater numbers of DEs listed, and to visually match the table on the WM page? Maybe there's some way to get Unity in here, perhaps by labeling it as "Ubuntu/Unity", then using an asterisk and footnote to explain how it's not a true full-featured DE. I'm also a little confused by the text above the first table mentioning five groupings, was this pre-WM-removal? DraugTheWhopper (talk) 05:04, 18 November 2014 (UTC) * It was, but I don't think it can have made much sense then, either, since I don't see four obvious groupings now. I'll remove it. * As for the large number of DEs on that thread, feel free to add some of them. Beware, though: as far as I know WindowMaker and UDE (despite it's name) are only window managers; not full DEs, and I can't find any evidence that Zorin Linux actually has it's own desktop environment. All the sources I can find with a brief search say it uses Gnome. Caeciliusinhorto (talk) 12:34, 18 November 2014 (UTC) Question on adding GNOME-based and others The list mentions MATE (I guess because of it being a GNOME2 fork), but misses Cinnamon. Besides the discussions on differences between Window Managers and Desktop Environments, how do you think we should treat forks or alternatives that keep roots in the original project (Cinnamon, or Budgie for GNOME3) or inner variants such as Plasma Active for KDE? For a comparison, besides project philosophy, toolkit and estimated disk footprint some other real metrics such as memory footprint would be a good addition, and while I agree that the referenced article falls victim to the confusion between window managers and full blown desktop environment, the fact that he listed all of them hints that this article should mention and/or reference exclusions, clearly state the rules of exclusions (missing utilities or certain features to qualify as one) and mention them as alternatives to implicit window managers in the second table where applicable (I'm thinking also of Compiz and Metacity besides Openbox). Also for the GNOME column the file manager is called Nautilus (Cinnamon calls it Nemo) and the browser is called (or codenamed...) Epiphany. — Preceding unsigned comment added by Mitzampt (talk • contribs) 18:46, 7 July 2015 (UTC) External links modified Hello fellow Wikipedians, I have just modified one external link on Comparison of X Window System desktop environments. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20080226050357/http://www.desktoplinux.com/news/NS7768863113.html to http://www.desktoplinux.com/news/NS7768863113.html Cheers.— InternetArchiveBot (Report bug) 19:06, 19 September 2017 (UTC) Excessive external links Please beware of adding too many links in the external links section, per ELMIN. Usually only one of two are expected, though in my opinion it would not be unreasonable to increase this slightly in some situations. If the links are to be used in cites then temporarily commenting out in say the reflist might be acceptable very short term, otherwise I'd suggest adding them to the talk page or creating a workpage. Thankyou. Djm-leighpark (talk) 12:30, 23 September 2018 (UTC) KOffice KOffice, listed as a KDE Office package is unmaintained. That is said in KOffice. Source: https://invent.kde.org/unmaintained/koffice FlavianusEP (talk) 11:06, 25 October 2023 (UTC)
WIKI
Cramer: Trump sees China's Xi as more of a friend than Fed's Powell President Donald Trump sees Chinese President Xi Jinping as more of a friend than the chairman of the Federal Reserve, Jerome Powell, CNBC's Jim Cramer said Monday. Among Mexican President Andres Manuel Lopez Obrador, Powell and Xi, Cramer said Trump suggests, by his words, that he believes "Powell is probably the worst for the country" and "Powell is not a friend." Trump on CNBC on Monday criticized the Fed for raising interest rates too quickly, calling the four hikes last year "very, very disruptive." "It's more than just Jay Powell. We have people on the Fed that really weren't — they're not my people. But they certainly didn't listen to me because they made a big mistake: They raised interest rates far too fast," Trump told CNBC's Joe Kernen on "Squawk Box. " The president also blasted central bankers for their balance-sheet runoff program, which allows bonds in the Fed's portfolio to mature without replacing them. The balance sheet had swelled to more than $4.5 trillion in early 2015 in the wake of several rounds of quantitative easing, or bond-buying, aimed at boosting the economy after the 2008 financial crisis. The Fed — responding to CNBC's request for reaction to the Cramer and Trump remarks — said it had no comment. Trump has widely and repeatedly criticized Powell, even reportedly discussed firing the Fed chairman, whom he actually appointed. Powell responded in January to the reports, saying he would not resign if Trump were to ask. On Monday, the president also told CNBC that said Xi is "actually an incredible guy " and they have "a great relationship," despite the ongoing trade war between Washington and Beijing. WATCH the full CNBC interview with President Trump
NEWS-MULTISOURCE
CS61C Fall 2017 Lab 4 - RISC-V Functions and Pointers Hello, gorgeous. Whoa there, when's the last time you had to tell your lab instructions that they were being too forward? Welcome to Lab 4. It's been a while since you've been here, huh? Since that's the case, why don't we have a look at not one but TWO images of the day! I really hope these make you smile :) Bonus: Describe, in one sentence, what the similarity between these two images is. Goals Setup, literally copied and pasted from last time Copy the lab files from the instructional servers to your lab account with $ cp -r ~cs61c/labs/04/ ~/labs/04/ Alternatively, secure-copy (scp) them from the instructional servers to your own laptop with $ scp -r cs61c-xxx@hive10.cs.berkeley.edu:~cs61c/labs/04/ ~/YOUR_FILEPATH And if you want to secure-copy them back to your class account: $ scp -r ~/YOUR_FILEPATH/04 cs61c-xxx@hive10.cs.berkeley.edu:~/YOUR_LABACCT_FILEPATH Exercise 1: Debugging megalistmanips.s A long time ago, your TA Julian was a RISC-V rookie, and he wrote his solution to a lab exercise inside megalistmanips.s. You, a RISC-V expert, are tasked with fixing Julian's bugs. Task: Find the mistakes inside the map function in megalistmanips.s. Before you do that, familiarize yourself with what this function is trying to do. It's a little different from last time. Now, instead of having a linked list of ints, our data structure is a linked list of int arrays. Remember that when dealing with arrays in structs, we need to explicitly store the size of the array. In C code, here's what the data structure looks like: struct node { int *arr; int size; struct node *next; }; Also, here's what the new map function does: it traverses the linked list and for each element in each array of each node, it applies the passed-in function to it, and stores it back into the array. void map(struct node *head, int (*f)(int)) { if (!head) { return; } for (int i = 0; i < head->size; i++) { head->arr[i] = f(head->arr[i]); } map(head->next, f); } The task: read all of the commented lines under the map function in megalistmanips.s (before it returns with jr $ra), and make sure that the lines do what the comments say. Some hints: Checkoff [1/2] Thanks for doing that exercise! I'm sure Julian is wondering where you were to help him when he was writing his misguided RISC-V way back when... Exercise 2: Write a function without branches Consider the discrete-valued function f defined on integers in the set {-3, -2, -1, 0, 1, 2, 3}. Here's the function definition: I'm not going to lie: this is a pretty dumb function. Nonetheless, your task is to implement it in RISC-V, with the condition that your code may NOT use any branch instructions! Luckily, somebody has randomly left an array of integers in the .data section of discrete_fn.s. How can you use this to your advantage and complete this seemingly impossible task? Checkoff [2/2]
ESSENTIALAI-STEM
Conclave (film) Conclave is an upcoming psychological thriller film directed by Edward Berger and written by Peter Straughan, based on the 2016 novel of the same name by Robert Harris. It stars Ralph Fiennes, Stanley Tucci, John Lithgow, Lucian Msamati, Carlos Diehz, Sergio Castellitto, and Isabella Rossellini. The film is scheduled to be released in the United States on 1 November 2024 by Focus Features, and in the United Kingdom on 29 November by Black Bear UK. Premise Cardinal Lawrence, tasked with finding the successor to the deceased Pope, discovers the former Pope had a secret that must be uncovered. Cast * Ralph Fiennes as Cardinal Thomas Lawrence * Stanley Tucci as Cardinal Aldo Bellini * John Lithgow as Cardinal Tremblay * Isabella Rossellini as Sister Agnes * Lucian Msamati as Cardinal Adeyemi * Carlos Diehz as Cardinal Benitez * Sergio Castellitto as Cardinal Tedesco * Brían F. O'Byrne * Merab Ninidze * Thomas Loibl * Jacek Koman Production It was announced in May 2022 that Ralph Fiennes, John Lithgow, Stanley Tucci and Isabella Rossellini were set to star in the film, with Edward Berger directing. Additional casting was announced in January 2023 as production began in Rome. Filming will also occur at Cinecittà. It is due to conclude in March. Release In August 2022, it was revealed that Black Bear Pictures' newly founded British distribution arm had acquired U.K. distribution rights to the film from FilmNation Entertainment, serving as one of its first acquisitions and maiden releases in the United Kingdom; Black Bear's company Elevation Pictures also serves as Canadian distributor. In November 2023, Focus Features acquired U.S. distribution rights to the film. The film is scheduled to be released in the United States in a limited theatrical release on 1 November 2024, before expanding to a wide release the following week. It will later be released in the U.K. on 15 November.
WIKI
Gloves and Socks Syndrome Defined What is Gloves And Socks Syndrome? Gloves and Socks Syndrome Defined Dr. Greene’s Answer: This condition was unheard of until 1990 when Harms et al. first reported it in the Journal of the American Academy of Dermatology. They described five young Swiss adults who had swelling of the hands and feet with borders at the wrists and ankles. Some of these people also had involvement of the lips or mouth. Some had a fever. All of them broke out in a rash. The authors called it Papular-Purpuric (for the rash) Gloves and Socks Syndrome, or PPGSS. They felt that this peculiar set of symptoms was the result of a virus (I should mention that all of the subjects had been taking medications, so an allergic reaction was also considered). After this initial paper, sporadic cases began to appear in the dermatology literature. All the cases involved people between 16 and 36 years old. All of them occurred between April and September (I would suspect that in the Southern Hemisphere they would appear in the local spring and summer). The swelling and rash always lasted longer than one week, but usually resolved by two weeks. Sometimes peeling of the hands and feet followed the resolution of the swelling. Sometimes the patients became fatigued for 4-6 weeks following the resolution of other symptoms. In 1993, reports of Gloves and Socks Syndrome began to appear in the pediatric literature, beginning with the story of a 9-year-old girl from Iowa. By this time evidence was beginning to mount for at least one virus that might cause the syndrome — parvovirus B19. Parvovirus B19 is the same virus responsible for erythema infectiosum (more commonly known as Slap Cheek or Fifth Disease). In otherwise healthy people, it seems to be a benign, self-limited disease. However, parvovirus B19 (whether Gloves and Socks Syndrome or Slap Cheek) can cause significant short-term anemia. This is important for people who already have anemia for some other reason and for pregnant women. Print or email this post: Dr. Alan Greene Dr. Greene is the founder of DrGreene.com (cited by the AMA as “the pioneer physician Web site”), a practicing pediatrician, father of four, & author of Raising Baby Green & Feeding Baby Green. He appears frequently in the media including such venues as the The New York Times, the TODAY Show, Good Morning America, & the Dr. Oz Show. Sign-up for DrGreene's Newsletter About once a month we send updates with most popular content, childrens' health alerts and other information about raising healthy children. We will not share your email address and never spam. Enter your message. Your email address will not be published. Required fields are marked *
ESSENTIALAI-STEM
Scott Bolzan Scott Louis Bolzan (born July 25, 1962) is an American author, entrepreneur, and former NFL and USFL football player. In December 2008, he incurred a brain injury which he claims has left him with profound retrograde amnesia. Scott, along with Joan Bolzan and Caitlin Rother, has written a book titled My Life: Deleted, which was published by HarperCollins on October 4, 2011. Early life and football career Scott Bolzan attended Northern Illinois University from 1980 to 1984 on a full athletic scholarship; there, he played football for the Northern Illinois Huskies. Bolzan was drafted in May 1984 by the New England Patriots in the 9th round. He was waived by the Patriots in August of that year. He went on to play for the Memphis Showboats in the USFL in 1985. Afterwards, Bolzan was picked up by the Cleveland Browns in May 1985 and later waived in September 1985. He was re-signed later in the month and cut in October. Bolzan was signed by the Browns again in May 1986. He was injured in August 1986 and retired soon after. Entrepreneurship After his football career ended due to an injury, Bolzan entered the financial services field where he owned his own financial planning firm specializing in insurance and investments. After moving to Arizona in 1993, he took up aviation, and later developed West Jet Aircraft (no relation to WestJet Express or to Canadian airline WestJet) as a charter company specializing in the charter of Lear Jets and King Airs in the Scottsdale area of Arizona. He sold West Jet aircraft in February 2008 and founded another company named Legendary Jets shortly thereafter. Brain injury On December 17, 2008, Scott Bolzan slipped in the men's bathroom at his place of work. He says his last "actual memory" was "my feet going above my head". The fall caused a severe concussion. Bolzan was initially told his memory loss was normal and temporary, but as months passed by and he still did not remember any part of his life before the fall, he revealed his condition to his wife and they sought help from neurologists. A SPECT scan of Bolzan's brain showed that he had no blood flow to his right temporal lobe&mdash;the part of the brain that stores long-term memory. Blood flow to the front of his brain on both sides was also dramatically reduced. He had brain atrophy, which killed brain cells and damaged connections between them. The loss of blood flow caused Bolzan to have an unusually severe case of retrograde amnesia. Dr. Teresa Lanier, Bolzan's primary physician, has said "It would basically have to be a miracle for him to one day wake up and have complete and intact memory of everything he has lost. That's probably just never going to happen." Bolzan's wife has tried to help him remember parts of his life since his fall, showing him photographs of key events in his life in hopes of jogging his memory. Along with memories of his personal life, he has lost memories of historical events and basic interpersonal relationship concepts. He did not understand birthdays or the relationship between a husband and wife. He had no reference points. He did, however, remember basic life tasks, like using eating utensils and how to drive a car. Bolzan has appeared on talk shows such as Dr. Phil, The View, Fox & Friends, Good Morning America, Huckabee, The Doctors, Nightline, and a guest appearance on Couples Therapy. Bolzan has also been a guest on numerous syndicated radio shows and local news stations. The New York Post published an article on October 9, 2011, reporting that a doctor who examined Bolzan after his fall stated that Bolzan was possibly "feigning his alleged memory deficits", explaining that it is questionable that an injury to one part of the brain could affect all the different memories distributed among the organ, while not damaging his cognitive abilities or his ability to form new memories. The article also cited other neurologists who, while having not examined Bolzan, stated that his amnesia violates fundamental knowledge of neurobiology, in that old memories are more resistant to brain damage than recent ones, in contrast to Bolzan's case.
WIKI
Trump struggles to win back Iowa farmers with new ethanol plan | TheHill ARLINGTON, Iowa – President TrumpDonald John TrumpTrump says he doesn't want NYT in the White House Veterans group backs lawsuits to halt Trump's use of military funding for border wall Schiff punches back after GOP censure resolution fails MORE faces an uphill battle in his effort to win back Iowa farmers who have been hit hard by his trade and energy policies. After months of promises, a betrayal, and then a renewed vow to revise a federal ethanol program, the Trump administration last week unveiled its proposal for ensuring corn-based ethanol gets blended into the nation’s fuel supply. The proposal earned high praise from corn and ethanol groups that spent months pressuring the White House for a more favorable policy. But farmers here say they are still angry at Trump for destabilizing agriculture markets, a move they say cost some farms hundreds of thousands of dollars. “President Trump has irritated me and cost me so much money with all of these policies,” said Tim Burrack, who farms 2,000 aces near Arlington, population 402. “This is not what we signed up for when we voted Trump in."  Last week’s announcement was designed to appease farmers like Burrack who have been fuming for months after the Environmental Protection Agency (EPA) in August exempted 31 small refineries from adding the biofuel to their product — an order that came directly from Trump. The August news was a catalyzing moment for Iowa farmers, who were promised by Trump just two months earlier that he would reevaluate the waivers — something farmers hoped would stem the tide of waivers that had increased under the Trump administration. The exemptions were viewed as betrayal in the corn belt, prompting a backlash among farmers, though perhaps none were as vocal as those in Iowa, who were not shy about exerting political pressure in a crucial 2020 state. At a press conference later that month, numerous corn farmers said that while they voted for Trump in 2016, they were unsure if they would do so again. Trump’s trade wars drove down profits from corn and soybeans, they said, and then the waivers diminished demand for ethanol and biodiesel. Trump is now trying to blunt that damage, telling reporters Monday, “They should like me out in Iowa.”  But there’s a divide between the trade groups and farmers on the ground. Many Iowa farmers say Trump’s proposal from last week is short on details of how it will ensure larger refineries blend in the ethanol others were exempted from adding — something the EPA has failed to do in the past. The new thresholds also won’t kick in until next year, meaning they won’t undo the 31 waivers affecting 1.4 billion gallons of ethanol. Things were differing during the Obama years on the waiver front. The Trump administration has given 85 waivers to small refineries since January 2017, while the Obama administration gave out under 10 such waivers over eight years. When Sen. Amy KlobucharAmy Jean KlobucharPoll: Biden holds 10-point lead nationally over Warren Robert Reich sees Democratic race as Warren, Sanders and Biden: 'Everyone else is irrelevant' Democrats lead Trump by wide margins in Minnesota MORE (D-Minn.) made a presidential campaign stop at an Iowa biodiesel plant the day Trump made his announcement, she slammed the proposal as “too little too late.” James Broghammer, CEO of Homeland Energy Solutions, shared half of that sentiment. “It may not be too little, but it might be too late for some ethanol plants,” said Broghammer, whose ethanol plant is the largest in Iowa. Trump’s proposal in many ways mirrors a rule already on the books from the George W. Bush administration. It calls for blending a minimum of 15 billion gallons of ethanol into fuel annually, one of the escalating targets laid out in current law that has never been met. “We’re just resetting the table,” said Broghammer, adding that while he hopes to see the law enforced, he wishes Trump would have laid out a more ambitious goal. Like many others, his plant has lost money this year. But he's weathering the storm. At least 15 ethanol plants have closed nationwide, according to the Des Moines Register. “I don’t think [Trump] is going to win the farm vote this year, I really don’t,” said Jeff Samuelson, whose family farm is near Tipton, Iowa. “This gets pretty personal when this affects our bottom line.”  Samuelson estimates he’s lost between $75,000 and $100,000 due to a decrease in demand for his corn.  That number is even higher for Burrack, who says he’s lost about $265,000 between the effects of the trade war with China and the refinery waivers. “I had to borrow a lot of money to keep going,” Burrack said. “That was a horrible, horrible thing I had to do.” Payouts to farmers from the administration were meant to soften some of the financial blow of the trade war, but Burrack said they are a fraction of what he would normally earn.  Trump’s ethanol proposal also requires the EPA to ensure the same number of gallons of ethanol is blended into fuel, regardless of how many waivers are granted. But that’s already required under law, and critics say there’s little to assure farmers that this time around will be different, particularly in an administration known for reversing major policy decisions. “Iowans should be careful about taking another [renewable fuel standard] promise at face value. It is very much in question whether this gets done by 2020,” Tim Gannon, an Iowa farmer and former USDA official, said in an email to The Hill. “Every time the president makes a promise on the RFS, his EPA administrator manages to roll it back for Big Oil, and a lot of the important details will be determined by EPA,” he said, referring to the renewable fuel standard. “The question now is: Will this time be any different?”  The proposal still has to go through a public comment period, and the fossil fuel industry has made clear they aim to sway the president. “Next week [Trump will] talk to the oil people and give them what they want, I’m afraid. His track record isn’t good,” Samuelson said.  Even with all the skepticism, some say it’s important to recognize Trump’s efforts to fix a problem of his own making. “If you make him mad, you don’t have access,” Burrack said. “Once you get your door closed, it's hard to get back in. Most of these organizations still need his help. And now that he's finally done something positive, we're going to praise him, because they may need to continue to go in to make sure that what he said was going to happen, will happen.”  Still, Burrack said, it’s taken too long to get here.  “It is so sad that we've got to go through this much political effort; spend this much political capital; make people lose so much money out of their business, out of their lives, out of their retirement; have people lose their jobs, just to get back to the law,” he said. “It's frustrating.” View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
 Definition of Uroscopy. Meaning of Uroscopy. Synonyms of Uroscopy Definition of Uroscopy. Meaning of Uroscopy. Synonyms of Uroscopy Here you will find one or more explanations in English for the word Uroscopy. Also in the bottom left of the page several parts of wikipedia pages related to the word Uroscopy and, of course, Uroscopy synonyms and on the right images related to the word Uroscopy. Definition of Uroscopy Uroscopy Uroscopy U*ros"co*py, n. [1st uro- + -scopy: cf. F. uroscopie.] The diagnosis of diseases by inspection of urine. --Sir T. Browne. Meaning of Uroscopy from wikipedia - Uroscopy is the historical medical practice of visually examining a patient's urine for pus, blood, or other symptoms of disease. The first records of... - Christian charity, rather than merely a place to die. Although the concept of uroscopy was known to Galen, he did not see the importance of using it to diagnose... - place to die, appeared in the Byzantine Empire. Although the concept of uroscopy was known to Galen, he did not see the importance of using it to localize... - mellitus got its name because the urine is plentiful and sweet. The name uroscopy refers to any visual examination of the urine, including microscopy, although... - Matula may refer to any of the following: Matula (surname) Matula, uroscopy flask Matula, a 1941 film by Tan Tjoei Hock Josef Matula, a character from... - pregnancy. Avicenna and many physicians after him in the Middle Ages performed uroscopy, a nonscientific method to evaluate urine. Selmar Aschheim and Bernhard... - Relief on the Campanile representing Medicine, depicting the practice of uroscopy.... - in the urinary system, which cause hemoglobin to appear in the urine. Uroscopy, the ancient form of this analysis Urinary casts Proteinuria Urine test... - on semi-precious stones, ores and minerals. As appendix a treatise on uroscopy and several detailed registers. Set in two columns, each chapter is headed... - the police station, and Ge was suspected of using narcotics based on a uroscopy. Beijing News reported Ge had been detained for several days for drug use... Loading...
ESSENTIALAI-STEM
Safari (web browser) Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and visionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML. Safari was introduced in Mac OS X Panther in January 2003. It has been included with the iPhone since the first generation iPhone in 2007. At that time, Safari was the fastest browser on the Mac. Between 2007 and 2012, Apple maintained a Windows version, but abandoned it due to low market share. In 2010, Safari 5 introduced a reader mode, extensions, and developer tools. Safari 11, released in 2017, added Intelligent Tracking Prevention, which uses artificial intelligence to block web tracking. Safari 13 added support for Apple Pay, and authentication with FIDO2 security keys. Its interface was redesigned in Safari 15. Background Netscape Navigator rapidly became the dominant Mac browser after its 1994 release, and eventually came bundled with Mac OS. In 1996, Microsoft released Internet Explorer for Mac, and Apple released the Cyberdog internet suite, which included a web browser. In 1997, Apple shelved Cyberdog, and reached a five-year agreement with Microsoft to make IE the default browser on the Mac, starting with Mac OS 8.1. Netscape continued to be preinstalled on all Macintoshes. Microsoft continued to update IE for Mac, which was ported to Mac OS X DP4 in May 2000. Conception During development, several codenames were used including "Freedom", "iBrowse" and "Alexander" (a reference to conqueror Alexander the Great, an homage to the Konqueror web browser). Safari 1 On January 7, 2003, at Macworld San Francisco, Apple CEO Steve Jobs announced Safari that was based on WebKit, the company's internal fork of the KHTML browser engine. Apple released the first beta version exclusively on Mac OS X the same day. Later that date, several official and unofficial beta versions followed until version 1.0 was released on June 23, 2003. On Mac OS X v10.3, Safari was pre-installed as the system's default browser, rather than requiring a manual download, as was the case with the previous Mac OS X versions. Safari's predecessor, the Internet Explorer for Mac, was then included in 10.3 as an alternative. Safari 2 In April 2005, Engineer Dave Hyatt fixed several bugs in Safari. His experimental beta passed the Acid2 rendering test on April 27, 2005, marking it the first browser to do so. Safari 2.0 which was released on April 29, 2005, was the sole browser Mac OS X 10.4 offered by default. Apple touted this version as it was capable of running a 1.8x speed boost compared to version 1.2.4 but it did not yet feature the Acid2 bug fixes. These major changes were initially unavailable for end-users unless they privately installed and compiled the WebKit source code or ran one of the nightly automated builds available at OpenDarwin. Version 2.0.2, released on October 31, 2005, finally included the Acid2 bug fixes. In June 2005 in efforts of KHTML criticisms over the lack of access to change logs, Apple moved the development source code and bug tracking of WebCore and JavaScriptCore to OpenDarwin. They have also open-sourced WebKit. The source code is for non-renderer aspects of the browser such as its GUI elements and the remaining proprietary. The final stable version of Safari 2 and the last version released exclusively with Mac OS X, Safari 2.0.4, was updated on January 10, 2006, for Mac OS X. It was only available within Mac OS X Update 10.4.4, and it delivered fixes to layout and CPU usage issues among other improvements. Safari 3 On January 9, 2007, at Macworld San Francisco, Jobs unveiled that Safari 3 was ported to the newly-introduced iPhone within iPhone OS (later called iOS). The mobile version was capable of displaying full, desktop-class websites. At WWDC 2007, Jobs announced Safari 3 for Mac OS X 10.5, Windows XP, and Windows Vista. He ran a benchmark based on the iBench browser test suite comparing the most popular Windows browsers to the browser, and claimed that Safari had the fastest performance. His claim was later examined by a third-party site called Web Performance over HTTP load times. They verified that Safari 3 was indeed the fastest browser on the Windows platform in terms of initial data loading over the Internet, though it was only negligibly faster than Internet Explorer 7 and Mozilla Firefox when it came to static content from the local cache. The initial Safari 3 beta version for Windows, released on the same day as its announcement at WWDC 2007, contained several bugs and a zero day exploit that allowed remote code executions. The issues were then fixed by Apple three days later on June 14, 2007, in version 3.0.1. On June 22, 2007, Apple released Safari 3.0.2 to address some bugs, performance problems, and other security issues. Safari 3.0.2 for Windows handled some fonts that were missing in the browser but already installed on Windows computers such as Tahoma, Trebuchet MS, and others. The iPhone was previously released on June 29, 2007, with a version of Safari based on the same WebKit rendering engine as the desktop version but with a modified feature set better suited for a mobile device. The version number of Safari as reported in its user agent string is 3.0 was in line along with the contemporary desktop editions. The first stable, non-beta version of Safari for Windows, Safari 3.1, was offered as a free download on March 18, 2008. In June 2008, Apple released version 3.1.2, which addressed a security vulnerability in the Windows version where visiting a malicious web site could force a download of executable files and execute them on the user's desktop. Safari 3.2, released on November 13, 2008, introduced anti-phishing features using Google Safe Browsing and Extended Validation Certificate support. The final version of Safari 3 was version 3.2.3, which was released on May 12, 2009, with security improvements. Safari 4 Safari 4 was released on June 8, 2009. It was the first version that had completely passed the Acid3 rendering test, as well as the first version to support HTML5. It incorporated WebKit JavaScript engine SquirrelFish that significantly enhanced the browser's script interpretation performances by 29.9x. SquirrelFish was later evolved to SquirrelFish Extreme, later also marketed as Nitro, which had 63.6x faster performances. A public beta of Safari 4 was experimented in February 24, 2009. Safari 4 relied on Cover Flow to run the History and Bookmarks, and it featured Speculative Loading that automatically pre-loaded document information that is required to visit a particular website. The top sites can be displayed up to 24 thumbnails based on the frequently visited sites in a startup. The desktop version of Safari 4 included a redesign similar to that of the iPhone. The update also commissioned many developer tool improvements including Web Inspectors, CSS element viewings, JavaScript debuggers and profilers, offline tables, database management, SQL support and resource graphs. In additions to CSS retouching effects, CSS canvas, and HTML5 content. It replaced the initial Mac OS X-like interface with native Windows themes on Windows using native font renderings. Safari 4.0.1 was released for Mac on June 17, 2009, and fixed Faces bugs in iPhoto '09. Safari 4 in Mac OS X v10.6 "Snow Leopard" has built-in 64-bit support, which makes JavaScript load up to 50% faster. It also has native crash resistances that would maintain it intact if a plugin like Flash player crashes, though other tabs or windows would not be affected. Safari 4.0.4, the final version which was released on November 11, 2009, for both Mac and Windows, which further improved the JavaScript performances. Safari 5 Safari 5 was released on June 7, 2010, and was the final version (version 5.1.7) for Windows. It featured a less distractive reader view, and had a 30x faster JavaScript performances. It incorporated numerous developer tool improvements including HTML5 interoperability, and the accessibility to secure extensions. The progress bar was re-added in this version as well. Safari 5.0.1 enabled the Extensions PrefPane by default, rather than requiring users to manually set it in the Debug menu. Apple exclusively released Safari 4.1 concurrently with Safari 5 for Mac OS X Tiger. It included many features that were found in Safari 5, though it excluded the Safari Reader and Safari Extensions. Apple released Safari 5.1 for both Windows and Mac on July 20, 2011, for Mac OS X 10.7 Lion; it was faster than Safari 5.0, and included the new Reading List feature. The company simultaneously announced Safari 5.0.6 in late June 2010 for Mac OS X 10.5 Leopard, though the new functions were excluded from Leopard users. Several HTML5 features were provided in Safari 5. It added supports for full-screen video, closed caption, geolocation, EventSource, and a now obsolete early variant of the WebSocket protocol. The fifth major version of Safari added supports for Full-text search, and a new search engine, Bing. Safari 5 supported Reader, which displays web pages in a continuous view, without advertisements. Safari 5 supported a smarter address field and DNS prefetching that automatically found links and looked up addresses on the web. New web pages loaded faster using Domain Name System (DNS) prefetching. The Windows version received an extra update on Graphic acceleration as well. The blue inline progress bar was returned to the address bar; in addition to the spinning bezel and loading indicator introduced in Safari 4. Top Sites view now had a button to switch to Full History Search. Other features included Extension Builder for developers of Safari Extensions. Other changes included an improved inspector. Safari 5 supports Extensions, add-ons that customize the web browsing experience. Extensions are built using web standards such as HTML5, CSS3, and JavaScript. Safari 6 Safari 6.0 was previously referred to as Safari 5.2 until Apple changed the version number at WWDC 2012. The stable release of Safari 6 coincided with the release of OS X Mountain Lion on July 25, 2012, and was integrated within OS. As a result, it was no longer available for download from Apple's website or any other sources. Apple released Safari 6 via Software Update for users of OS X Lion. It was not released for OS X versions before Lion or for Windows. The company later quietly removed references and links for the Windows version of Safari 5. Microsoft had also removed Safari from its browser-choice page. On June 11, 2012, Apple released a developer preview of Safari 6.0 with a feature called iCloud Tabs, which syncs with open tabs on any iOS or other OS X device that ran the latest software. It updated new privacy features, including an "Ask websites not to track me" preference and the ability for websites to send OS X 10.8 Mountain Lion users notifications, though it removed RSS support. Safari 6 had the Share Sheets capability in OS X Mountain Lion. The Share Sheet options were: Add to Reading List, Add Bookmark, Email this Page, Message, Twitter, and Facebook. Tabs with full-page previews were added, too. The sixth major version of Safari, it added options to allow pages to be shared with other users via email, Messages, Twitter, and Facebook, as well as making some minor performance improvements. It added supports for -webkit-calc in CSS. Additionally, various features were removed including Activity Window, a separate Download Window, direct support for RSS feeds in the URL field, and bookmarks. The separate search field and the address bar were also no longer available as a toolbar configuration option. Instead, it was replaced by the smart search field, a combination of the address bar and the search field. Safari 7 Safari 7 was announced at WWDC 2013, and it brought a number of JavaScript performance improvements. It made uses of Top Site and Sidebar, Shared Links, and Power Saver which paused unused plugins. Safari 7 for OS X Mavericks and Safari 6.1 for Lion and Mountain Lion were all released along with OS X Mavericks in the special event on October 22, 2013. Safari 8 Safari 8 was announced at WWDC 2014 and was released for OS X Yosemite. It included the JavaScript API WebGL, stronger privacy management, improved iCloud integration, and a redesigned interface. It was also faster and more efficient, with additional developer features including JavaScript Promises, CSS Shapes & Composting mark up, IndexedDB, Encrypted Media Extensions, and SPDY protocol. Safari 9 Safari 9 was announced in WWDC 2015 and was shipped with OS X El Capitan. New features included audio muting, more options for Safari Reader, and improved autofill. It was not fully available for the previous OS X Yosemite. Safari 10 Safari 10 was shipped with macOS Sierra and released for OS X Yosemite and OS X El Capitan on September 20, 2016. It had a redesigned Bookmark and History views, and double-clicking will centralized focus on a particular folder. The update redirected Safari extensions to be saved directly to Pocket and Dic Go. Software improvements included Autofill quality from the Contrast card and Web Inspector Timelines Tab, in-line sub-headlines, bylines, and publish dates. This version tracks and re-applies zoomed level to websites, and legacy plug-ins were disabled by default in favor of HTML5 versions of websites. Recently closed tabs can be reopened via the History menu, or by holding the "+" button in the tab bar, and using Shift-Command-T. When a link opens in a new tab; it is now possible to hit the back button or swipe to close it and go back to the original tab. Debugging is now supported on the Web Inspector. Safari 10 also includes several security updates, including fixes for six WebKit vulnerabilities and issues related to Reader and Tabs. The first version of Safari 10 was released on September 20, 2016, and the last version (10.1.2) was released on July 19, 2017. Safari 11 Safari 11 was released on September 19, 2017 for OS X El Capitan and macOS Sierra, ahead of macOS High Sierra's release. It was included with High Sierra. Safari 11 included several new features such as Intelligent Tracking Prevention which aimed to prevent cross-site tracking by placing limitations on cookies and other website data. Intelligent Tracking Prevention allowed first-party cookies to continue track the browser history, though with time limits. For example, first-party cookies from ad-tech companies such as Google/Alphabet Inc., were set to expire in 24-hours after the visit. Safari 12 Safari 12 was released for macOS Mojave on September 24, 2018. It was also available to macOS Sierra and macOS High Sierra on September 17, 2018. Safari 12 included several new features such as Icons in tabs, Automatic Strong Passwords, and Intelligent Tracking Prevention 2.0. Safari version 12.0.1 was released on October 30, 2018, within macOS Mojave 10.14.1, and Safari 12.0.2 was released on December 5, 2018, under macOS 10.14.2. Support for developer-signed classic Safari Extensions has been dropped. This version would also be the last that supported the official Extensions Gallery. Apple also encouraged extension authors to switch to Safari App Extensions, which triggered negative feedback from the community. Safari 13 Safari 13 was announced at WWDC 2019 on June 3, 2019. Safari 13 included several new features such as prompting users to change weak passwords, FIDO2 USB security key authentication support, Sign in with Apple support, Apple Pay on the Web support and increased speed and security. Safari 13 was released on September 20, 2019, on macOS Mojave and macOS High Sierra, and later shipped with macOS Catalina. Safari 14 In June 2020 it was announced that macOS Big Sur will include Safari 14. According to Apple, Safari 14 is more than 50% faster than Google Chrome. Safari 14 introduced new privacy features, including Privacy Report, which shows blocked content and privacy information on web pages. Users will also receive a monthly report on trackers that Safari has blocked. Extensions can also be enabled or disabled on a site-by-site basis. Safari 14 introduced partial support for the WebExtension API used in Google Chrome, Microsoft Edge, Firefox, and Opera, making it easier for developers to port their extensions from those web browsers to Safari. Support for Adobe Flash Player will also be dropped from Safari, 3 months ahead of its end-of-life. A built-in translation service allows translation of a page to another language. Safari 14 was released as a standalone update to macOS Catalina and Mojave users on September 16, 2020. It added Ecosia as a supported search engine. Safari 15 Safari 15 was released for iOS 15, iPadOS 15, macOS Big Sur and macOS Catalina on September 20, 2021, and later shipped with macOS Monterey. It featured a redesigned interface and tab groups that blended better into the background. There were also a new home page and extension supports on the iOS and iPadOS editions. Starting this update, Safari versions would support iOS and iPadOS, ending the iOS version of separate updates. Safari 16 Safari 16 was released for iOS 16, macOS Monterey and macOS Big Sur on September 12, 2022, and later shipped with macOS Ventura and iPadOS 16. Safari 16 added support for non-animated AVIF and contains several bug fixes and feature polishing. Safari 16 also includes shared tab groups, vertical tab support, website settings synchronization between devices connected to a same iCloud account, the ability to add backgrounds for a start page, new languages for built-in translation, built-in image translation, and new options to edit strong passwords. iOS 16.4 also introduced Web Push notifications. Safari 17 Safari 17 was released in September 2023 with iOS 17, iPadOS 17 and macOS Sonoma. It includes a feature named "Profiles", which allows users to separate their browsing sessions for different use cases. Every profile has a special favorites bar, navigation history, extensions, tab groups, and cookies. Just like iOS 16.4, Safari 17 introduces web apps that can be added to the dock. Cookies are copied into web apps so that users stay logged in the web app if they already are in Safari. Safari can also now read pages with a new option in the navigation bar menu. New privacy features include locked private browsing when not in use, tracking-free URLs, private relay based on the country’s location and time instead of general position. Safari has also been adapted to Vision Pro with a new spatial UI, and Apple has redesigned the Develop menu for web developers. Safari 17 added AV1 hardware decoding support for devices with hardware decoding support. Safari 18 Safari 18 is set to be released in fall 2024 with iOS 18, iPadOS 18 and macOS Sequoia, and for the first time, VisionOS 2. Like Safari 15, it redesigns the interface, but not limited to the start page and reader mode (which is now called Reader). A new feature, AI-powered "Highlights" have been introduced, which will automatically detect relevant information on a page and highlight it as you browse. Other new features include a redesigned unified menu which is now on all versions of the browser, previously it was exclusive to iOS and iPadOS along with the compact mode on macOS, and faster loading times. iOS versions Starting iOS 15 and iPadOS 15, Safari would now ship the same features as the macOS version, which also included the name of the updates, ending the separate iOS version. Safari Technology Preview Safari Technology Preview was first released alongside OS X El Capitan 10.11.4. Safari Technology Preview releases include the latest version of WebKit, which included Web technologies in the future stable releases of Safari so that developers and users can install the Technology Preview release on a Mac, test those features, and provide feedback. Safari Developer Program The Safari Developer Program was a program dedicated to in-browser extension and HTML developers. It allowed members to write and distribute extensions for Safari through the Safari Extensions Gallery. It was initially free until it was incorporated into the Apple Developer Program in WWDC 2015, which costs $99 a year. The charges prompted frustrations from developers. Within OS X El Capitan, Apple implemented the Secure Extension Distribution to further improve its security, and it automatically updated all extensions within the Safari Extensions Gallery. Features Until Safari 6.0, it included a built-in web feed aggregator that supported the RSS and Atom standards. Current features included Private Browsing (a mode in which the browser retains no record of information about the user's web activity), the ability to archive web content in WebArchive format, the ability to email complete web pages directly from a browser menu, the ability to search bookmarks, and the ability to share tabs between all Mac and iOS devices running appropriate versions of software via an iCloud account. Web compatibility In Safari's early years, it pioneered several HTML5 features that are now standard, such as the Canvas API. In 2015, Safari was criticized for failing to keep pace with some modern web technologies. Intelligent Tracking Prevention In September 2017, Apple announced that it would use artificial intelligence (AI) to reduce the ability of advertisers to track Safari users as they browse the web. Cookies used for tracking will be allowed for 24 hours, then disabled, unless the AI system judges that the user wants to keep the cookie. Major advertising groups objected, saying it will reduce the free services supported by advertising, while other experts praised the change. Plugin support Apple used a remotely updated plug-in blacklist to prevent potentially dangerous or vulnerable plugins from running on Safari. Initially, Flash and Java contents were blocked on some early versions of Safari. Since Safari 12, support for NPAPI plugins (except for Flash) has been completely dropped. Safari 14 finally dropped support for Adobe Flash Player. WebExtension support Beginning in 2018, Apple made technical changes to Safari's content blocking functionality which prompted backlash from users and developers of ad blocking extensions, who said the changes made it impossible to offer a similar level of user protection found in other browsers. Internally, the update limited the number of blocking rules which could be applied by third-party extensions, preventing the full implementation of community-developed blocklists. In response, several developers of popular ad and tracking blockers announced their products were being discontinued, as they were now incompatible with Safari's newly limited content blocking features. Beginning with Safari 13, popular extensions such as uBlock Origin no longer work with Safari. iCloud sync Safari can sync bookmarks, history, reading list, and tabs through iCloud. This happens by default if a user's Mac, iPhone or iPad is logged in to iCloud, but syncing can be disabled in the Settings app (on iOS and iPadOS) or System Settings (on Mac). iCloud Tabs lets users see a list of their other devices' open tabs that have not been added to a tab group. On iOS and iPadOS, these iCloud Tabs are shown below the grid of open tabs. On the Mac, they are shown at the bottom of the Tab Overview, or in an optional iCloud Tabs toolbar item. Tab Groups Safari 15 added tab groups. These tab groups, and the tabs they contain, can be synced across devices; when a tab is opened in a tab group on one device, it is added to that tab group on all devices, without needing to manually open it through iCloud Tabs. macOS Ventura added Shared Tab Groups, which can be shared through iMessage. New tabs and closed tabs will sync for all participants, and a small thumbnail with users' profile pictures will be visible on the tab they are currently viewing. Continuity Safari supports the Handoff feature, which allows users to continue where they left off on another device. Sidebar The Safari sidebar was introduced in Safari 8 as a way to access Bookmarks, Reading List, and Shared Tabs. The sidebar got its biggest update in Safari 16, when it added support for vertical tabs. This allows users to see their tabs arranged vertically in addition to the horizontal tab view in the top Toolbar. Architecture On macOS, Safari is a Cocoa application. It uses Apple's WebKit for rendering web pages and running JavaScript. WebKit consists of WebCore (based on Konqueror's KHTML engine) and JavaScriptCore (originally based on KDE's JavaScript engine, named KJS). Like KHTML and KJS, WebCore and JavaScriptCore are free software and released under the terms of the GNU Lesser General Public License. Some Apple improvements to the KHTML code were merged back into the Konqueror project. Apple has also released some additional codes under the open source 2-clause BSD-like license. The version of Safari included in Mac OS X v10.6 (and later versions) is compiled for 64-bit architecture. Apple claimed that running Safari in 64-bit mode would increase rendering speeds by up to 50%. WebKit2 has a multiprocess API for WebKit, where the web-content is handled by a separate process than the application using WebKit. Apple announced WebKit2 in April 2010. Safari for OS X switched to the WebKit2 API with version 5.1. Safari for iOS switched to WebKit2 with iOS 8. iOS/iPadOS Safari for iPhone was well-received upon the original iPhone's 2007 release, with news outlets calling it "far superior" to other mobile browsers at the time. Since the 2019 release of iPadOS, Safari for iPad's user agent was changed to present itself to websites as Safari for Mac and shows the desktop version of websites, except in the miniature Slide Over multitasking view. Apple improved multitouch compatibility for desktop websites through a number of tweaks to the WebKit engine, for example with heuristics to determine whether to translate a tap into a hover or a click. The iPadOS version also gained a download manager, support for Media Source Extensions to allow users to watch Netflix in Safari, and support for the custom keyboard shortcuts in web apps like Gmail, which override Safari's own keyboard shortcuts. Apple has been criticized for anticompetitive practices related to Safari on iOS. Before iOS 14 (2020), users could not change their default browser, so links always opened in Safari. App Store rules still require all third-party iOS browsers to use Safari's WebKit browser engine, inheriting its limitations. Apple's stated motivation for this browser engine restriction was to increase security, an argument disputed by the UK's Competition and Markets Authority. The European Union's Digital Markets Act regulation, passed in 2022, requires Apple to allow alternative browser engines. In response, Google and Mozilla began porting their browser engines to iOS. Windows Safari for Windows was introduced at WWDC 2007. After Safari's release, Apple Software Update—an updater program bundled with QuickTime and iTunes for Windows—automatically selected Safari for installation, as a "Recommended" program. When users ran the updater manually, the option to install Safari was checked by default. This was criticized by John Lilly, then-CEO of Mozilla, who said it "borders on malware distribution practices". By late 2008, Apple Software Update stopped installing new software by default, though it still offered Safari in its list of available programs (with its checkbox unticked). Safari for Windows was discontinued after version 5.1.7 (which was released in May 2012 ). Market share In 2009, Safari had a market share of 3.85%. It remained stable in that rank for five years with market shares of 5.56% (2010), 7.41% (2011), 10.07% (2012), and 11.77% (2013). In 2014, it caught up with Firefox with a market share of 14.20%. In 2015, Safari became the second most-used web browser worldwide after Google Chrome, and had a market share of 13.01%. From 2015 to 2020, it occupied market shares of 14.02%, 14.86%, 14.69%, 17.68% and 19.25, respectively. , Google Chrome continued to be the most popular browser with Safari (19.22%) following behind in second place. In May 2022, according to StatCounter, Apple's Safari dropped to the third most popular desktop browser after being overtaken by Microsoft's Edge. Safari was then used by 9.61 percent of desktop computers worldwide. One year later, Safari retook second place. Payments from Google In a November 2023 disclosure, during the ongoing antitrust trial against Google, an economics professor at the University of Chicago revealed that Google pays Apple 36% of all search advertising revenue generated when users access Google through the Safari browser. This revelation reportedly caused Google's lead attorney to cringe visibly. The revenue generated from Safari users has been kept confidential, but the 36% figure suggests that it is likely in the tens of billions of dollars. Both Apple and Google have argued that disclosing the specific terms of their search default agreement would harm their competitive positions. However, the court ruled that the information was relevant to the antitrust case and ordered its disclosure. This revelation has raised concerns about the dominance of Google in the search engine market and the potential anticompetitive effects of its agreements with Apple. Security updates for Snow Leopard and Windows Software security firm Sophos detailed how Snow Leopard and Windows users were not supported by the Safari 6 release at the time, while there were over 121 vulnerabilities left unpatched on those platforms. Since then, Snow Leopard has had only three minor version releases of Safari (the most recent in September 2013 ), and Windows has had none. While no official word has been released by Apple, the indication is that these are the final versions available for these operating systems, and both retain significant security issues.
WIKI
Frequent question: Can you overdo walking after hip replacement? How far should I walk each day after hip replacement? In the beginning, walk for 5 or 10 minutes, 3 or 4 times a day. As your strength and endurance improve, you can walk for 20 to 30 minutes, 2 or 3 times a day. Once you have fully recovered, regular walks of 20 to 30 minutes, 3 or 4 times a week, will help maintain your strength. What happens if you overdo it after hip replacement? Overworking your new hip Whenever you overdo your exercises you risk injury to your hip, and you know you don’t want that! When you leave the hospital, you’ll likely go to a rehabilitation center. This is where the real healing takes place. Can you walk too far after hip replacement? The hip joint will regain mobility of its own accord. Walking is encouraged and you should walk as far as is comfortable every day. You will experience pain and discomfort around the scars, especially for the first few days and it is likely that you will require pain relief on a reducing basis over the first few weeks. THIS IS IMPORTANT:  How do you treat bursitis in the knee? How long does it hurt to walk after hip replacement? Most people, though, experience surgical pain for approximately two to four weeks following hip replacement surgery. Your activity level, medical history, and any pain you’re dealing with before surgery have an effect on how long it will take you to make a full recovery. What can you never do after hip replacement? The Don’ts • Don’t cross your legs at the knees for at least 6 to 8 weeks. • Don’t bring your knee up higher than your hip. • Don’t lean forward while sitting or as you sit down. • Don’t try to pick up something on the floor while you are sitting. • Don’t turn your feet excessively inward or outward when you bend down. How can I speed up my hip replacement recovery? Most likely, you will be up and walking the day after your surgery. Take it slow and don’t push yourself beyond what you can handle. Getting up and active following surgery is vital to speeding up your recovery after a hip replacement. Try to exercise for 20-30 minutes at a time. How far should I be walking 2 weeks after hip replacement? We recommend that you walk two to three times a day for about 20-30 minutes each time. You should get up and walk around the house every 1-2 hours. Eventually you will be able to walk and stand for more than 10 minutes without putting weight on your walker or crutches. What happens if you bend past 90 degrees after hip replacement? Summary: Avoiding the typical post-surgical precautions after hip replacement surgery — such as avoiding bending the hip past 90 degrees, turning the knee or foot inward and crossing the leg past the middle of the body — may lead to shorter inpatient rehabilitation time and faster overall recovery. THIS IS IMPORTANT:  Your question: Can arthritis affect your neck and back? How far should you be walking 4 weeks after hip replacement? During weeks 3-5, walking endurance usually increases if you have been consistent with your home program. Weeks 4-5: Ambulation distances up to 1 mile (2-3 city blocks), resting as needed. Weeks 5-6: Ambulation distances of 1-2 miles; able to meet shopping needs once released to driving. How long does it take for bone to grow into hip replacement? If the prosthesis is not cemented into place, it is necessary to allow four to six weeks (for the femur bone to “grow into” the implant) before the hip joint is able to bear full weight and walking without crutches is possible. Why does my hip still hurt after hip replacement? Studies show the most common causes for hip revision after a total hip replacement are instability (recurrent dislocation), aseptic loosening of the implants from wear, and infection. How long does it take for the muscles to heal after a hip replacement? “On average, hip replacement recovery can take around two to four weeks, but everyone is different,” says Thakkar. It depends on a few factors, including how active you were before your surgery, your age, nutrition, preexisting conditions, and other health and lifestyle factors. How long do you have to sleep with a pillow between your legs after hip replacement? Make sure you continue sleeping with the pillow between your legs for at least six weeks.
ESSENTIALAI-STEM
Bald Hill Schoolhouse Bald Hill Schoolhouse is a historic one-room school building located at Farmingville in Suffolk County, New York. It was built in 1850 and is a small, one story, vernacular rural schoolhouse with Greek Revival style detailing. It measures approximately 18 feet by 28 feet. It closed for classroom instruction in 1929. Also on the property are boy's and girl's privies, a small woodshed, and a house formerly owned by a member of the Terry family. It was added to the National Register of Historic Places in 1988. The school is located in Farmingville Hills Park and is owned by the Farmingville Hills Historical Society, which plans to operate the schoolhouse as a museum.
WIKI
Wikipedia:Articles for deletion/Princess protection plan The result was Delete -- JForget 00:41, 15 April 2008 (UTC) Princess protection plan * ( [ delete] ) – (View AfD) (View log) Unreleased movie, not-notable and fails WP:CRYSTAL ukexpat (talk) 01:17, 11 April 2008 (UTC) * Delete - Fails general notability criteria per . I see IMBD imdb, which is not a reliable source. This makes the article part of WP:CRYSTAL. Wisdom89 ( T |undefined / C ) 01:20, 11 April 2008 (UTC) * Comment I've never heard of the Internet Movie Batadase before. Is it new? Ten Pound Hammer and his otters • (Broken clamshells•Otter chirps) 01:21, 11 April 2008 (UTC) * hehe, good catch. Wisdom89 ( T |undefined / C ) 01:26, 11 April 2008 (UTC) * You're not the only one who has noonerized that spame before. Ten Pound Hammer and his otters • (Broken clamshells•Otter chirps) 01:30, 11 April 2008 (UTC) * Note: This debate has been included in the list of Film-related deletion discussions. -- Wisdom89 ( T |undefined / C ) 01:21, 11 April 2008 (UTC) * clear evidence of notability here:. Smith Jones (talk) 02:26, 11 April 2008 (UTC) * That last source is ... I don't know what it is, but it doesn't look like RS material to me. The second to last is a google search, which isn't at all a notability metric (see THISNUMBERISHUGE, the only mention in the second is an audition reading for the movie by an actor, and the first is IMDB, which isn't generally considered a reliable source. Even if it were, the only thing it mentions is that an actor is in it. Celarnor Talk to me 02:33, 11 April 2008 (UTC) * #2 was pulled from YouTube, and #4 looks to be fanfiction. Boolean values are great, Smith Jones, and you should really learn how to use them in such things as Google searches. The one in #3 gave you everything with those three words in it; "princess protection plan" (in quotes) only gives three hits. Nate • ( chatter ) 09:49, 11 April 2008 (UTC) * Plus, he/she spelt "princess" wrong in the Google search anyway...... ChrisTheDude (talk) 10:45, 11 April 2008 (UTC) * Delete without prejudice to future recreation per my above criticism of presented sources. While it may not have much coverage now, as a movie that might be in production in the future, sources can show up at any time. Celarnor Talk to me 02:33, 11 April 2008 (UTC) * Delete per nom. Blaxthos ( t / c ) 02:34, 11 April 2008 (UTC) * Delete, no reliable sources, and Smith Jones, your Google search was just utterly wrong. Corvus cornix talk 02:35, 11 April 2008 (UTC) * Delete, WP:NFF. Esradekan Gibb "Talk" 03:36, 11 April 2008 (UTC) * Delete Epic fail on sources; even the silliest YouTube video gets more than three hits unlike this title. Nate • ( chatter ) 09:49, 11 April 2008 (UTC) * Strong delete No proof that this even exists yet; WP:CRYSTAL indeed. Ten Pound Hammer and his otters • (Broken clamshells•Otter chirps) 18:43, 11 April 2008 (UTC) * fine but you should a t least give permission for recreation if and when theis film proves itself to be exist. and i see no reason why a reference to these movies cant be made later on when there are better sources. Smith Jones (talk) 20:44, 11 April 2008 (UTC)
WIKI
Talk:You Don't Mess Around with Jim (song) Recitation by an IP editor cleaned up a good deal of content very well, but it also deleted the recitation, which is a significant part of the song. I'm restoring that part.--Thnidu (talk) 06:31, 9 November 2016 (UTC)
WIKI
@article{L Hilbert_AB Federici_L Baronciani_S Dallagiovanna_C Mazurier_2004, place={Pavia, Italy}, title={A new candidate mutation, G1629R, in a patient with type 2A von Willebrand’s disease: basic mechanisms and clinical implications}, volume={89}, url={https://haematologica.org/article/view/3225}, DOI={10.3324/%x}, abstractNote={BACKGROUND AND OBJECTIVES: Type 2A von Willebrand’s disease (VWD) refers to disease variants with decreased platelet-dependent function of von Willebrand factor (VWF) associated with the absence of high molecular weight (HMW) multimers. The candidate G1629R mutation, identified in an Italian patient with type 2A VWD, was expressed to confirm the relationship between phenotype and genotype. DESIGN AND METHODS: Plasma samples from the patient were studied after DDAVP or FVIII/VWF concentrate injections. Furthermore, an expression vector carrying the G1629R mutation was constructed by site-directed mutagenesis and transiently expressed in Cos-7 cells. The characteristics of the corresponding recombinant protein were analyzed. RESULTS: After 1-deamino-8-D-argine vasopressin (DDAVP) infusion, factor VIII and VWF activities increased and HMW VWF multimers were transiently observed in the patient’s plasma. VWF activity increased only after administration of a dual FVIII/VWF concentrate. ADAMTS-13 activity did not change significantly before or after the therapies. Secretion, in culture medium, of the corresponding mutated protein (R1629-rVWF) was slightly decreased and this rVWF contained intermediate and HMW multimers. Furthermore, binding of R1629-rVWF to platelet GPIb was moderately reduced compared to that of the wild-type rVWF. INTERPRETATION AND CONCLUSIONS: Based on the DDAVP and in vitro expression results, we classified the G1629R mutation in group 2 type 2A mutations. Our findings could explain why DDAVP may only be partially effective and suggest that FVIII/VWF concentrates should be used in cases of prolonged mucosal bleeding and major surgery when functional VWF is required.}, number={9}, journal={Haematologica}, author={L Hilbert and AB Federici and L Baronciani and S Dallagiovanna and C Mazurier}, year={2004}, month={Jan.}, pages={1128-1133} }
ESSENTIALAI-STEM
Compound Questions One problem that is tricky to solve is if a user has asked two questions. Previously some solutions were to look for conjunctions (“and”) or question marks. Then try to guess if it is a question. But you could end up with a question like “Has my dog been around other dogs and other people?”. This is clearly one question. With the new conversation feature of “Absolute Confidences”, it is now possible to detect this. Earlier versions of conversation would have all intents would add up to 1.0. Now each confidence has it’s own value. Taking the earlier example, if we map the confidences to a chart, we get: conv060217-1 Visually we can see that the first and second intent are not related. The next sentence “Has my dog been around other dogs and is it certified?” is two questions. When we chart this we see: conv060217-2 Very easy to see that there are two questions. So how to do it in your code? You can use a clustering technique called K-means. This will cluster your data into sets of ‘K’. In this case we have “important intents” and “unimportant intents”. Two groups, means K = 2. For this demonstration I am going to use Python, but K-means exists in a number of languages. I have a sample of the full code, and example conversation workspace. So for this I will only show code snippets. Walkthrough Conversation request needs to set alternate_intents to true. So that you can get access to the top 10 intents. Once you get your response back, convert your confidence list into an array. intent_confidences = list(o['confidence'] for o in response['intents']) Next the main method will return True if it thinks it is a compound question. It requires numpy + scipy. def compoundQuestion(intents):     v = np.array(intents)     codebook, _ = kmeans(v,2)     ci, _ = vq(v,codebook)     # We want to make everything in the top bucket to have a value of 1.     if ci[0] == 0: ci = 1-ci     if sum(ci) == 2: return True     return False The first three lines will take the array of confidences and generate two centroids. A centroid is the mean of each cluster found. It will then group each of the confidences into one of the two centroids. Once it runs ci will look something like this: [ 0, 0, 1, 1, 1, 1, 1, 1, 1, 1 ] . This however can be the reverse. The first value is the first intent. So if the first value is 0 we invert the array and then add up all the values: [ 1, 1, 0, 0, 0, 0, 0, 0, 0, 0 ] => 2  If we get a value of 2, then the first two intents are related to the question that was entered. Any other value, then we only have one question, or potentially more than two important intents. Example output from the code: Has my dog been around other dogs and other people? > Single intent: DOG_SOCIALISATION (0.9876400232315063) Has my dog been around others dogs and is it certified? > This might be a compound question. Intent 1: DOG_SOCIALISATION (0.7363447546958923). Intent 2: DOG_CERTIFICATION (0.6973928809165955). Has my dog been around other dogs? Has it been around other people? > Single intent: DOG_SOCIALISATION (0.992318868637085) Do I need to get shots for the puppy and deworm it? > This might be a compound question. Intent 1: DOG_VACCINATIONS (0.832768440246582). Intent 2: DOG_DEWORMING (0.49955931305885315). Of course you still need to write code to take action on both intents, but this might make it a bit easier to handle compound questions. Here is the sample code and workspace. 2 thoughts on “Compound Questions 1. I’m a bit of a newbie to this, so apologies if my understanding is incorrect. Is it possible for vq to return something like [0, 0, 0, 0, 0, 0, 0, 0, 1, 1]? In this case, it should recognize it as potentially a compound question, but it will invert and not see it. Like Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out / Change ) Twitter picture You are commenting using your Twitter account. Log Out / Change ) Facebook photo You are commenting using your Facebook account. Log Out / Change ) Google+ photo You are commenting using your Google+ account. Log Out / Change ) Connecting to %s
ESSENTIALAI-STEM
SLM Lab v4.2.3 Search… ⌃K Actor Critic Actor-Critic algorithms combine value function and policy estimation. They consist of an actor, which learns a parameterized policy, π\pi , mapping states to probability distributions over actions, and a critic, which learns a parameterized function which assigns a value to actions taken. There are a variety of approaches to training the critic. Three options are provided with the baseline algorithms. The actor and critic can be trained separately or jointly, depending on whether the networks are structured to share parameters. The critic is trained using temporal difference learning, similarly to the DQN algorithm. The actor is trained using policy gradients, similarly to REINFORCE. However in this case, the estimate of the "goodness" of actions is evaluated using the advantage, AπA^{\pi} , which is calculated using the critic's estimation of VV . AπA^{\pi} measures how much better the action taken in states s was compared with expected value of being in that state s, i.e. the expectation over all possible actions in state s. Actor-Critic algorithms are on policy. Only data that is gathered using the current policy can be used to update the parameters. Once the policy parameters have been updated all previous data gathered must be discarded and the collection process started again with the new policy. Algorithm: Simple Actor Critic with separate actor and critic parameters For i = 1 .... N:1. Gather data (si,ai,ri,si) by acting in the environment using your policy2. Update Vfor j = 1 ... K:Calculate target values,  yi for each exampleUpdate critic network parameters, using a regression loss, e.g. MSEL(θ)=12i(yiV(si;θ))23. Calculate advantage,  Aπ , for each example, using value function, V4. Calculate policy gradientϕJ(ϕ)iAtπ(si,ai)ϕlogπϕ(aisi)5. Use gradient to update actor parameters ϕ\begin{aligned} &\text{For i = 1 .... N:} \\ &\quad \text{1. Gather data } {(s_i, a_i, r_i, s'_i)} \ \text{by acting in the environment using your policy} \\ &\quad \text{2. Update V} \\ &\quad \quad \quad \text{for j = 1 ... K:} \\ &\quad \quad \quad \quad \text{Calculate target values, } ~y_i~ \text{for each example} \\ &\quad \quad \quad \quad \text{Update critic network parameters, using a regression loss, e.g. MSE} \\ &\quad \quad \quad \quad \quad \quad L(\theta) = \frac{1}{2} \sum_i || (y_i - V(s_i; \theta)) ||^2 \\ &\quad \text{3. Calculate advantage, } ~A^{\pi}~ \text{, for each example, using value function, } V \\ &\quad \text{4. Calculate policy gradient} \\ & \quad \quad \quad \quad \nabla_{\phi}J(\phi) \approx \sum_i A^\pi_t(s_i, a_i) \nabla_\phi log \pi_\phi (a_i | s_i)\\ &\quad \text{5. Use gradient to update actor parameters } \phi \\ \end{aligned} See ac.json and a2c.json for example specs of variations of the Actor-Critic algorithm. Basic Parameters "agent": [{ "name": str, "algorithm": { "name": str, "action_pdtype": str, "action_policy": str, "gamma": float, "use_gae": bool, "lam": float, "use_nstep": bool, "num_step_returns": int, "add_entropy": bool, "entropy_coef": float, "training_frequency": int, }, "memory": { "name": str, }, "net": { "type": str, "shared": bool, "hid_layers": list, "hid_layers_activation": str, "actor_optim_spec": dict, "critic_optim_spec": dict, } }], ... } • algorithm • action_pdtype general param • action_policy string specifying which policy to use to act. "Categorical" (for discrete action spaces), "Normal" (for continuous actions spaces with one dimension), or "default" to automatically switch between the two depending on the environment. • gamma general param • use_gae whether to calculate the advantage using generalized advantage estimation. • lam [0,1]\in [0,1] trade off between bias and variance when using generalized advantage estimation. 0 corresponds to low variance and high bias. 1 corresponds to high variance and low bias. • use_nstep: whether to calculate the advantage using n-step forward returns. If use_gae is true this parameter will be ignored. • num_step_returns number of forward steps to use when calculating the target for advantage estimation using nstep forward returns. • add_entropy whether to add entropy to the advantage to encourage exploration • entropy_coef coefficient to multiply the entropy of the distribution with when adding it to advantage • training_frequency when using episodic data storage (memory) such as "OnPolicyReplay", this means how many episodes of data to collect before each training iteration - a common value is 1; or when using batch data storage (memory) such as "OnPolicyBatchReplay", how often to train the algorithm. Value of 32 means train every 32 steps the agent takes in the environment using the 32 examples since the agent was previously trained. • net Advanced Parameters "agent": [{ "algorithm" : { "training_epoch": int, "policy_loss_coef": float, "val_loss_coef": float } "net": { "use_same_optim": bool, "rnn_hidden_size": int, "rnn_num_layers": int, "seq_len": int, "clip_grad": bool, "clip_grad_val": float, "lr_decay": str, "lr_decay_frequency": int, "lr_decay_min_timestep": int, "lr_anneal_timestep": int, "gpu": int } }], ... } • algorithm • training_epoch how many gradient steps to take when training the critic. Only applies when the actor and critic have separate parameters. • policy_loss_coef how much weight to give to the policy (actor) component of the loss when the actor and critic have shared parameters, so are trained jointly. • val_loss_coef how much weight to give to the critic component of the loss when the actor and critic have shared parameters, so are trained jointly. • net
ESSENTIALAI-STEM
Page:Debrett's Illustrated Peerage and Titles of Courtesy.djvu/8 DEBRETT ADVERTISEMENTS. ^^i*^K20^efJ| f I* ,,. MADAME TUSSAUO & SONS' EXHIBITION. "Most evergreen of Institutions." Fide GRAPHIC. ON VIEW UPWARDS OF 300 PORTRAIT MODELSof CELEBRITIES OF PAST AND PRESENT TIMES, INCLUDING His Imperial Majesty the Shah of Persia, Sir Samuel Baker, H. Ward Beecher, Dr. Livingstone, H. M. Stanley, the Czar of all the Russias, the Duke and Duchess of Edinburgh, and the Princess Louise and Marquis of Lome. THE HALL OF KINGS, Containing Portrait Models of the Kings and Queens, from the time of "William the Conqueror to the present reign, is admitted to be one of the finest collections in the Exhibition. THE NAPOLEON ROOM, With its relics of the first Empire and of the Franco-Prussian War, including the Dial of the Church Clock of the Cathedral of Bazeilles and a portion of the Column of the Place Vendome, is worthy of special notice. " Established over a century, this exhibition has gained a reputation for the correctness of its Portrait Models, and its artistic arrangement in the grouping together of figures that no other ' Waxwork ' Exhibition ever attained in the known world. The historical characters, their dresses, so true to the period in which thej figured, are in themselves studios for the first modistes, either on this or the other side of the Atlantic. Tie collection is in itself both rechercht, and interesting inasmuch as it gives to the visitor, be he a native or foreigner, a true idea of what can be produced and perpetuated in wax." Fide PRESS.
WIKI
Talk:Thao & the Get Down Stay Down Untitled This page is in the process of expansion. The band does indeed exist; this is not a vanity page. Amiaheroyet 08:30, 3 December 2006 (UTC) * Yes, the article looks much better since I first tagged it. Sorry for the quick trigger there. -- Shadowlynk 09:31, 3 December 2006 (UTC) Thao Nguyen is a person, an independent entity who released an album under her own name before beginning to play with the Get Down Stay Down. Visitors to "Thao Nguyen" should not be automatically redirected here, as if Thao's identity were subsumed by those of her (male) backing band members. I don't know how to fix this but somebody should.Rentstrike (talk) 21:58, 20 April 2008 (UTC) Isn't it time to take down the WPVN marker from the talk page, and the Notability question from the main page? I came to wikipedia looking for more information on Thao with the Get Down Stay Down, and this page was informative. I've contributed one external link to a site where i found her music. It seems time to call this page legit. JohndoeW 22:38, 25 January 2011 (UTC) — Preceding unsigned comment added by JohndoeW (talk • contribs) Diacritics Can we get the diacritics for her name? Badagnani (talk) 00:22, 1 May 2008 (UTC) * I may argue to not have them in this case. But if you can find them, yeah. —Preceding unsigned comment added by Amiaheroyet (talk • contribs) 00:50, 1 May 2008 (UTC) * I don't know what you mean by diacritics (fr) but I guess she might be Nguyễn XXX Thảo with XXX being unknown like Ngọc, Thị or something else, or nothing or different accents... → Tristan ♡ (talk) 17:27, 4 March 2010 (UTC) WikiProject Vietnam Why exactly is this article part of WikiProject Vietnam? I understand that Thao is Vietnamese, or at the very least of Vietnamese descent, but this article is about an American music group. Putting this article in WPVN seems like a tremendous stretch to me. It's analogous to putting Theory of Relativity in WikiProject Germany simply because Einstein was German. I may be wrong, as I'm by no means an expert on Thao Nguyen, this band, or Vietnam, but it seems to me this tie is tenuous at best. Does the group play Vietnamese-inspired music or support Vietnam related causes? I'm simply trying to understand the connection, as the article itself gives no plausible explanation. In fact, the word "Vietnam" doesn't even appear in the article. Thank you in advance to anyone who can clarify this for me. <IP_ADDRESS> (talk) 14:42, 7 July 2012 (UTC) Requested move Thao with the Get Down Stay Down → Thao & The Get Down Stay Down – Although the band was once named Thao With The Get Down Stay Down it has now be determined that the band would wish to be called Thao & The Get Down Stay down. The band' social media and main website have already been changed and now Wikipedia is all that is left to update. See the band's google news results here: https://www.google.com/search?q=she+and+him+wikipedia&oq=she+and+him+wikipedia&sugexp=chrome,mod=0&sourceid=chrome&ie=UTF-8#q=thao+and+the+get+down&hl=en&prmd=imvns&source=univ&tbm=nws&tbo=u&sa=X&ei=iMKSUK-tEuiviQLf6YGICg&ved=0CHsQqAI&bav=on.2,or.r_gc.r_pw.r_cp.r_qf.&fp=a3f712a0cb56aa20&bpcl=37189454&biw=1260&bih=814 <IP_ADDRESS> (talk) 18:36, 1 November 2012 (UTC) * Seems reasonable. a13ean (talk) 20:03, 1 November 2012 (UTC) * Oppose – what they wish to be called is not a good rationale for a move. What are they called in English-language secondary sources? Until we see a significant change there, we have no reason for a move. Dicklyon (talk) 21:31, 2 November 2012 (UTC) * Oppose. The existing name returns about 8x as many Google hits as the new proposal. The Independent, The New York Times, and AllMusic have all heard of the "with the" version, but nothing for the ampersand. If and when the new version of the name becomes the predominant one amongst secondary sources, then we should make this move. Until then, just add the new name as a redirect. Hobbes Goodyear (talk) 02:43, 4 November 2012 (UTC) * In Favor - I understand there are currently many articles and google results with the previous name, yet the name has been officially changed by Thao herself. With the recent announcement of Thao and the Get Down Stay Down's new album, We The Common, and their new song, "Holy Roller'", there has been plenty of current articles written about the band which reflect the updated name. Please see NPR, Stereogum, Under the Radar, A Heart is a Spade, The Stark Online, Spin, Death and Taxes Mag, Exclaim, Chart Attack, Stereo Subversion, and Talk Tunes World for current references regarding the band's name change. The numerous examples listed above should be plenty evidence that the band has officially made a revision to their name and their Wikipedia page should reflect this change if it wishes to remain current. A page can be added with the previous name redirecting users to the official new name, Thao and the Get Down Stay Down. — Preceding unsigned comment added by Laurenzeitgeist (talk • contribs) 22:38, 8 November 2012 (UTC)
WIKI
For Two Rising Prospects, a Day of Victory and Redemption The last time Félix Auger-Aliassime was in the final of a Grand Slam junior event was in Paris, where he was seen firing his rackets onto the ground after a brutal loss. It was a match he had had on his racket three times, but he had blown each match point to Geoffrey Blancaneaux. Three months later, the only thing Auger-Aliassime threw onto the court was himself, and it was in jubilation. Auger-Aliassime, the sixth-seeded junior from Quebec City who turned 16 last month, had little trouble closing out the match this time. He defeated Miomir Kecmanovic, 6-3, 6-0, in only 58 minutes at the United States Open on Sunday, confirming his status as a rising prospect. The final point was an ace, and Auger-Aliassime dove to the court and put his hands to his head, then quickly stood up to shake hands with his vanquished opponent. “I’m not going to lie,” Auger-Aliassime said. “I had some nightmares about that heartbreaking final. You don’t really want it to happen again. So I was really focused on going into this match. I really wanted that win. It’s obviously a great feeling.” It was day of redemption for both the boys’ and girls’ champions. On the girls’ side, the fifth-seeded American Kayla Day beat the No. 13 seed Viktoria Kuzmova of Slovakia, 6-3, 6-2, in an equally one-sided affair. Day, a left-hander, had some difficulty beating the No. 7 seed Bianca Andreescu of Canada in a three-set semifinal the day before. Day had to play in the girls’ doubles final later that evening, and she and Caroline Dolehide lost to Jada Hart and Ena Shibahara, 13-11, in the final tiebreaker. But despite that disappointment and all the tennis, Day came out Sunday bearing a piercing focus, and became the first American to win the U.S. Open junior girls’ title since Samantha Crawford in 2012. No American girl had won a Grand Slam junior event since that one. “I was really able to mentally set aside what had happened last night and just move on, because I knew I had a really important match today,” Day said. “I knew I had to forget about it, and that’s what I did.” She was also able to compartmentalize a loss from nearly two weeks earlier at the hands of Madison Keys, the No. 8 seed, in the women’s main draw. Day, who turns 17 on Sept. 29, was granted a wild card into the main draw and lost to Keys in the second round after benefiting from a retirement in the first round. She had to wait almost another week for the junior tournament began, but made the best of her time here. “These were like the best two weeks of my life,” she said. “Every day was great. I had so much fun every single day.” Day said her goal was to get her ranking up so she could qualify for the main draws of major tournaments next year. For Auger-Aliassime, winning the Open may persuade him to turn professional now. “I know I can compete with these guys,” he said. He is the first Canadian to win the boys’ U.S. Open junior title since Filip Peliwo in 2012 and only the second over all. His victory capped a terrific year for Canadian tennis, especially at the junior level. Auger-Aliassime was a finalist at Roland Garros, and Denis Shapovalov won the Wimbledon boys’ event. That pair teamed up to reach the Wimbledon finals in the boys’ doubles, and Milos Raonic was the Wimbledon runner-up in the men’s singles draw. Andreescu, a promising 16 year-old, has fought through foot and forearm injuries this year, but still made the girls’ semifinals. “It’s pretty cool for Canadian tennis,” said Auger-Aliassime, who was also a semifinalist in the boys’ doubles. “I’m happy for all of us. I’m happy for the people that work with us. They have put in so much work. Obviously, I was very proud of Denis’s win. I’m sure he probably texted me already to congratulate me, because he’s one of my good friends. It’s great to see us having success like this.” Felix’s father, Sam Aliassime, is a tennis coach in Quebec City who was originally from Togo. He flew to New York to watch his son’s first match, an unimpressive win, then flew back to Quebec for work. But as his son began to pick up momentum, Sam Aliassime returned on Friday. He was pleased after the semifinal Saturday, and was beaming after Sunday’s final. Aliassime’s lesson after his son lost at the French Open final was that it did not matter. At his age — Feliz was only 15 then — losses do not mean anything. In 10 years, when he is deep into his career as a full-fledged professional, then it will matter. Of course, winning seemed to matter a lot. “I am so very happy for him,” the father said in English, before turning to French for a practically universal exclamation. “C’est magnifique.” An article on Monday about the junior titles at the United States Open tennis tournament misspelled, in some copies, the surname of the runner-up in boys’ singles. He is Miomir Kecmanovic, not Kecmnovic. The article also referred incorrectly in some editions to the performance of the girls’ singles champion, Kayla Day, in the women’s main draw. Day lost to Madison Keys in the second round — not the first — and the score was 6-1, 6-1 — not 4-6, 7-6 (5), 6-2.
NEWS-MULTISOURCE
Talk:Jodrell Bank Redirect target Should this be a link to Jodrell Bank Observatory or Jodrell Bank Centre for Astrophysics? Anthony Rushton (talk) 09:17, 16 March 2009 (UTC)
WIKI
Yellow-knobbed curassow The yellow-knobbed curassow (Crax daubentoni) is a species of bird in the family Cracidae, the chachalacas, guans, and curassows. It is found in Colombia and Venezuela. Taxonomy and systematics The yellow-knobbed curassow was formerly classified as a subspecies of blue-billed curassow (Crax alberti). It is monotypic. A few subspecies previously proposed for it were determined to be hybrids or aberrant individuals and so were not adopted. Description The yellow-knobbed curassow is 84 to 92.5 cm long. Males usually weigh between 2925 and 3200 g but one weighed only 1625 g. A female weighed 2325 g. The male is the only curassow with a knobbed yellow cere and wattle. Males and females are mostly black with a white lower belly, vent area, and tips of the tail feathers. Females have a black cere and pale barring on the breast and lower belly. Distribution and habitat The yellow-knobbed curassow is found in northern Venezuela as far east as Sucre and Monagas states and in immediately adjacent northeastern Colombia. It primarily inhabits gallery forest and tall scrub in the llanos. It also occurs in valleys and ravines in the nearby foothills. In elevation it ranges between 500 and 1500 m in Colombia and 100 and 800 m in Venezuela. Feeding The yellow-knobbed curassow forages in small family groups, or in combined ones of up to 15 birds in the dry season. Its primary foods are fruits and seeds with very small amounts of leaves, other plant parts, and insects. It feeds at all levels from the ground to the treetops. Breeding The yellow-knobbed curassow lays eggs during May and June, the early part of the rainy season. It appears to be polygynous. It builds an oval nest of branches and lianas lined with leaves and grass and usually sites it in a tree and concealed by vines. The clutch size is two eggs. Vocalization Male yellow-knobbed curassows sing a "bomb-dropping" descending whistle, sometimes combined with a wing-clapping display or booming. The former is "4–10 rapid cracks of wings above the bird’s back, 'wapp!, wapp!, wapp!-wapp!-wapp!'". The booming is described as "uuumh...uhh". Status The IUCN has assessed the yellow-knobbed curassow as Near Threatened. It has a small population that is declining due to habitat loss and hunting.
WIKI
Ho Ho is the capital of the Volta region in Ghana and is 3-4 hours from Accra. Get in From Accra you can catch an A/C tro-tro from Kinbu Gardens (3 hr). Get around To get around, take a taxi from anywhere. Standard fare is 50 pasewas. As with anywhere else in Ghana, make sure you note landmarks around you so you know what to tell the taxi driver on your way home. The Station (directly south of the market) has Tros going to regional destinations (such as Hohoe) and to Accra. Taxis are difficult to find after midnight. Drink There are a ton of drinking spots in Ho. Tourists, volunteers, and peace corps types like to hang out at White House (next to the Stanbic Bank). Sky Plus Hotel is also nice and comes with an excellent view, but be warned that a taxi ride to and from there will be both difficult to obtain and expensive. If you prefer a more local experience, try Mirage. To get there, hire a taxi to "Voradep Village" and get out when the paved road ends.
WIKI
WYDU WYDU (1160 AM) "Power House 1160" (formerly WTEL) is a radio station broadcasting an urban contemporary gospel format. Licensed to Red Springs, North Carolina, United States. The station is currently owned by Sandra and Charles Cookman, through licensee WEDU Broadcasting Inc.
WIKI
Bank Earnings Q2: Here’s What Analysts Expect This Week Seven major banks will be reporting Q2 earnings this week. On July 18th, five banks will report: Bank of America (BAC), Morgan Stanley (MS), Charles Schwab (SCHW), PNC Financial Services (PNC), and Bank of New York Mellon (BK). On July 19th, Goldman Sachs (GS) and Discover Financial Services (DFS) will report earnings as well. Last week, several top U.S. banks, including JPMorgan Chase (NYSE:JPM), Wells Fargo (NYSE:WFC), and Citigroup (NYSE:C), delivered second-quarter earnings. The results revealed that banks with significant exposure to consumer lending could continue to make money. However, the ones heavily dependent on investment banking fees and revenues could show a drop in earnings. In addition, higher deposit costs and an increase in provisions for credit losses could remain a drag. With more banks set to report earnings this week, let’s check what analysts expect from their quarterly results. Our earnings expectation table also shows how these bank stocks behaved (rose or fell) soon after the last earnings report by looking at the percentage change in price. That data helps investors set expectations regarding the stock's behavior following the next earnings report. For instance, in Q2, JPM handily exceeded analysts’ earnings estimates, delivering earnings of $4.75 per share in Q2 compared to the Street’s expectations of $3.94. Meanwhile, earnings showed sharp year-over-year and sequential growth led by higher net interest income and accretion from the First Republic deal. Despite the significant beat, JPM stock closed only 0.6% higher, implying that the positives were already priced in, and investors expected a strong earnings beat. Bank Earnings Expectations The table below shows that analysts expect top banks, including Morgan Stanley (NYSE:MS), Bank of America (NYSE:BAC), and Goldman Sachs (NYSE:GS), to report a year-over-year decline in EPS in Q2, due to the decrease in investment banking fees. Further, higher deposit costs, increased competition, and a tight regulatory environment could affect the earnings of medium-sized banks like Charles Schwab (NYSE:SCHW), PNC Financial (NYSE:PNC), and Discover Financial Services (NYSE:DFS). COMPANY TICKER EARNINGS DATE EPS ESTIMATE - Q2 2023 REPORTED EPS - Q1 2023 REPORTED EPS - Q2 2022 REVENUE ESTIMATE - Q2 2023 EARNINGS RELATED CHANGE (LAST QUARTER) Bank of America NYSE:BAC 18-Jul-23 $0.84 $0.73 $0.94 $24.95 Billion 0.63% Morgan Stanley NYSE:MS 18-Jul-23 $1.20 $1.70 $1.44 $13.02 Billion 0.66% Charles Schwab NYSE:SCHW 18-Jul-23 $0.71 $0.93 $0.97 $4.63 Billion 3.94% PNC Financial Services NYSE:PNC 18-Jul-23 $3.30 $3.98 $3.39 $5.45 Billion 0.36% Bank of New York Mellon NYSE:BK 18-Jul-23 $1.22 $1.12 $1.03 $4.37 Billion 1.48% Goldman Sachs NYSE:GS 19-Jul-23 $3.16 $8.79 $7.73 $10.61 Billion -1.70% Discover Financial Services NYSE:DFS 19-Jul-23 $3.72 $3.58 $3.96 $3.88 Billion -0.54% Source: TipRanks Database At the same time, analysts expect Bank of New York Mellon (NYSE:BK) to deliver improved Q2 earnings on a year-over-year and sequential basis. It primarily focuses on large institutional clients who maintain substantial deposit balances with the bank. Thus, the financial services company could continue to generate positive operating leverage from higher net interest revenue, a stable deposit base, and a strong balance sheet. Read on for a deeper dive into analysts' thoughts on three of the most notable bank stocks reporting this week: BAC, MS and GS. What Can We Expect from BAC’s Earnings? Bank of America will announce its second-quarter earnings on Tuesday, July 18. Wall Street expects BAC to report earnings of $0.84 a share in Q2, compared to earnings of $0.94 in the prior-year period. The year-over-year improvement reflects an anticipated increase in NII (Net Interest Income) due to higher average interest rates and modest loan growth. However, EPS is expected to show a sequential decline due to the lower investment banking fee and higher provision for credit losses. Ahead of Q2 earnings, BAC stock has eight Buy, Six Hold, and two Sell recommendations for a Moderate Buy consensus rating on TipRanks. Further, analysts’ average price target of $34.39 implies 18.14% upside potential from current levels. Is Morgan Stanley a Good Buy Now? Wall Street analysts expect Morgan Stanley to report earnings of $1.20 per share in Q2, reflecting a decline on a quarter-over-quarter and year-over-year basis. Underwriting and M&A activities remain subdued, taking a toll on Morgan Stanley’s bottom line. Morgan Stanley stock has 10 Buy, three Hold, and one Sell recommendations for a Moderate Buy consensus rating. These analysts’ average price target of $98.17 implies 14.44% upside potential from current levels. Is Goldman Sachs Stock a Buy or a Sell? Wall Street expects Goldman Sachs to witness a substantial decline in earnings in the second quarter, reflecting lower industry-wide investment banking activity levels. Analysts expect Goldman Sachs to post earnings of $3.16 per share in Q2, compared to $7.73 in the prior-year quarter. Meanwhile, EPS is projected to decline on a quarter-over-quarter basis. The ongoing macroeconomic and geopolitical concerns continue to hurt investment banking activity levels, which in turn, negatively affect Goldman Sachs’ earnings. Nonetheless, analysts remain upbeat about Goldman Sachs stock. It has received 11 Buy and three Hold recommendations for a Strong Buy consensus rating. Analysts' average price target of $398.21 implies 22.08% upside potential. Bottom Line Banks will likely gain from higher average interest rates and a modest loan increase. However, higher deposit costs, increased provisions for credit losses, and lower investment banking activity levels will continue to hurt earnings growth. Disclosure The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Clinical Trial Disease: Relapsed or Refractory Multiple Myeloma, MM, (NCT05182073) Disease info: Multiple myeloma is a cancer that develops in the bone marrow, the spongy tissue found in the centre of most bones. Multiple myeloma is characterised by abnormalities in plasma cells, a type of white blood cell. In myeloma, these abnormal cells multiply uncontrollably, increasing from about one percent of cells in the bone marrow to the majority of bone marrow cells. The abnormal cells form tumours within the bone, causing bone pain and an increased risk of fractures. Relapsed myeloma refers to when a patient had active treatment that their disease responded to, went off treatment and then the disease came back.  Refractory myeloma is a disease that is progressing despite active treatment.   Frequency: Multiple myeloma occurs in approximately 4 per 100,000 people per year; there are currently about 100,000 affected individuals in the United States. Official title: A Phase I Study of FT576 as Monotherapy and in Combination With Daratumumab in Subjects With Relapsed/Refractory Multiple Myeloma Who: Contact Who: Fate Trial Disclosure Phone: 866-875-1800 Email: FateTrialDisclosure@fatetherapeutics.com Partners: Locations: United States, Alabama University of Alabama at Birmingham, Birmingham, Alabama, United States, 35249 United States, California City of Hope, Duarte, California, United States, 91010 United States, Colorado Colorado Blood Cancer Institute, Denver, Colorado, United States, 80218 United States, Delaware Medical Oncology Hematology Consultants, PA, Newark, Delaware, United States, 19713 United States, Indiana Indiana University Melvin and Bern Simon Comprehensive Cancer Center, Indianapolis, Indiana, United States, 46202 United States, Ohio Oncology Hematology Care, Inc:, Cincinnati, Ohio, United States, 45242 United States, Tennessee Tennessee Oncology - Nashville, Nashville, Tennessee, United States, 37203 United States, Texas Texas Oncology-Medical City Dallas, Dallas, Texas, United States, 75230 United States, Virginia Virginia Oncology Associates, Norfolk, Virginia, United States, 23502 United States, Wisconsin Froedtert Hospital, Medical College of Wisconsin, Milwaukee, Wisconsin, United States, 53226 Study start: Nov. 24, 2021 Enrollment: 168 participants Gene editing method: CRISPR-Cas9 Type of edit: Gene knock-out, gene knock-in Gene: B-cell Maturation Antigen (BCMA) CD38 Delivery method: - Ex-vivo Indicator IND Enabling Pre-clinical Phase I Safety Phase II Safety and Dosing Phase III Safety and Efficacy Status: Active recruiting Description This is a Phase I dose-finding study of FT576 as monotherapy and in combination with the monoclonal antibody daratumumab in multiple myeloma (MM). The study will consist of a dose-escalation stage and an expansion stage. FT576 incorporates four functional modifications: a proprietary CAR that targets BCMA; a novel high-affinity 158V, non-cleavable CD16 (hnCD16) Fc receptor, which has been modified to augment ADCC; an IL-15 receptor fusion (IL-15RF) that promotes enhanced NK cell activity; and the elimination of CD38 expression to mitigate the potential for NK cell fratricide. Together, these features are intended to enable multi-antigen targeting of myeloma cells, augment ADCC, enhance cell persistence and prevent anti-CD38 monoclonal antibody-induced fratricide. Last updated: Dec. 28, 2023 close Search CRISPR Medicine
ESSENTIALAI-STEM
Talk:Alma Cogan (novel) Myra Hindley That's Myra Hindley of Moors Murders on the cover of the book. See Burn's obituary https://www.theguardian.com/books/2009/jul/20/gordon-burn-dies-aged-61Brenont (talk) 02:44, 12 November 2017 (UTC)
WIKI
Capture youtube video on Mac You know that using build-in features of Safari browser you can easily download to your Mac machine any YouTube video. So here our geeks share to you some tricks and advanced techniques on how to capture youtube video on Mac: 1. Open Safari that comes as part of OS X and go to YouTube page with the video you want to save on Mac. 2. Start to play this video. 3. Press simultaneously Command-Option-A keys to open the Activity window of Safari. 4. In this window press the disclose triangle near the left side of the title of video you are playing right now to open (if it is not visible ) the list of files associated with this video. 5. In the list that appears, locate the biggest file (as rule of thumb look for the file measured in megabytes). 6. Press down the Option key and holding it pressed use twice right click to start to download this file. 7. After download is completed find in folder you designated for downloaded items the file with .flv extension.This is a movie you saved from YouTubes. 8. To start playing it use the third-party players, for example VLC media player which is free.
ESSENTIALAI-STEM
Aleph Aleph (or alef or alif, transliterated ʾ) is the first letter of the Semitic abjads, including Phoenician ʾālep 𐤀, Hebrew ʾālef א, Aramaic ʾālap 𐡀, Syriac ʾālap̄ ܐ, Arabic ʾalif ا, and North Arabian 𐪑. It also appears as South Arabian 𐩱 and Ge'ez ʾälef አ. These letters are believed to have derived from an Egyptian hieroglyph depicting an ox's head to describe the initial sound of *ʾalp, the West Semitic word for ox (compare Biblical Hebrew ʾelef, "ox" ). The Phoenician variant gave rise to the Greek alpha (Α), being re-interpreted to express not the glottal consonant but the accompanying vowel, and hence the A|Latin A and Cyrillic А. Phonetically, aleph originally represented the onset of a vowel at the glottis. In Semitic languages, this functions as a prosthetic weak consonant, allowing roots with only two true consonants to be conjugated in the manner of a standard three consonant Semitic root. In most Hebrew dialects as well as Syriac, the aleph is an absence of a true consonant, a glottal stop, the sound found in the catch in uh-oh. In Arabic, the alif represents the glottal stop pronunciation when it is the initial letter of a word. In texts with diacritical marks, the pronunciation of an aleph as a consonant is rarely indicated by a special marking, hamza in Arabic and mappiq in Tiberian Hebrew. In later Semitic languages, aleph could sometimes function as a mater lectionis indicating the presence of a vowel elsewhere (usually long). When this practice began is the subject of some controversy, though it had become well established by the late stage of Old Aramaic (ca. 200 BCE). Aleph is often transliterated as, based on the Greek spiritus lenis ʼ; for example, in the transliteration of the letter name itself, . Origin The name aleph is derived from the West Semitic word for "ox" (as in the Biblical Hebrew word Eleph (אֶלֶף) 'ox' ), and the shape of the letter derives from a Proto-Sinaitic glyph that may have been based on an Egyptian hieroglyph, which depicts an ox's head. In Modern Standard Arabic, the word أليف /ʔaliːf/ literally means 'tamed' or 'familiar', derived from the root, from which the verb ألِف means 'to be acquainted with; to be on intimate terms with'. In modern Hebrew, the same root (alef-lamed-peh) gives me’ulaf, the passive participle of the verb le’alef, meaning 'trained' (when referring to pets) or 'tamed' (when referring to wild animals). Ancient Egyptian The Egyptian "vulture" hieroglyph (Gardiner G1), by convention pronounced ) is also referred to as aleph, on grounds that it has traditionally been taken to represent a glottal stop, although some recent suggestions tend towards an alveolar approximant sound instead. Despite the name it does not correspond to an aleph in cognate Semitic words, where the single "reed" hieroglyph is found instead. The phoneme is commonly transliterated by a symbol composed of two half-rings, in Unicode (as of version 5.1, in the Latin Extended-D range) encoded at U+A722 Ꜣ LATIN CAPITAL LETTER EGYPTOLOGICAL ALEF and U+A723 ꜣ LATIN SMALL LETTER EGYPTOLOGICAL ALEF. A fallback representation is the numeral 3, or the Middle English character ȝ Yogh; neither are to be preferred to the genuine Egyptological characters. Arabic ʾalif Written as ا or 𐪑, spelled as ألف or 𐪑𐪁𐪐 and transliterated as , it is the first letter in Arabic and North Arabian. Together with Hebrew aleph, Greek alpha and Latin A, it is descended from Phoenician, from a reconstructed Proto-Canaanite "ox". Alif has the highest frequency out of all 28 letters in the Arabic abjad. Alif is also the most used letter in Arabic. Alif is written in one of the following ways depending on its position in the word: Alif mahmūza: أ and إ The Arabic letter was used to render either a long or a glottal stop. That led to orthographical confusion and to the introduction of the additional marking ﺀ to fix the problem. Hamza is not considered a full letter in Arabic orthography: in most cases, it appears on a carrier, either a ' ( ؤ ), a dotless ' ( ئ ), or an alif. The choice of carrier depends on complicated orthographic rules. Alif إ أ is generally the carrier if the only adjacent vowel is . It is the only possible carrier if hamza is the first phoneme of a word. Where alif acts as a carrier for hamza, hamza is added above the alif, or, for initial alif-, below it and indicates that the letter so modified is indeed a glottal stop, not a long vowel. A second type of hamza, (همزة وصل) whose diacritic is normally omitted outside of sacred texts, occurs only as the initial letter of the definite article and in some related cases. It differs from in that it is elided after a preceding vowel. Alif is always the carrier. Alif mamdūda: آ The is a double alif, expressing both a glottal stop and a long vowel. Essentially, it is the same as a أا sequence: آ (final ـآ), for example in آخر 'last'. "It has become standard for a hamza followed by a long ā to be written as two alifs, one vertical and one horizontal." (the "horizontal" alif being the maddah sign). Alif maqṣūrah: ى The ى ('limited/restricted alif', '), commonly known in Egypt as ' (ألف لينة, 'flexible alif'), may appear only at the end of a word. Although it looks different from a regular alif, it represents the same sound, often realized as a short vowel. When it is written, ' is indistinguishable from final Persian ye or Arabic ' as it is written in Egypt, Sudan and sometimes elsewhere. The letter is transliterated as in Kazakh, representing the vowel /ə/. is transliterated as in ALA-LC, in DIN 31635, in ISO 233-2, and in ISO 233. In Arabic, alif maqsurah ى is not used initially or medially, and it is not joinable initially or medially in any font. However, the letter is used initially and medially in the Uyghur Arabic alphabet and the Arabic-based Kyrgyz alphabet, representing the vowel /ɯ/:. As a vowel, the letter alif maqsurah can be a carrier with a hamza. The alif maqṣūrah with hamza is thus written as: Numeral As a numeral, alif stands for the number one. It may be modified as follows to represent other numbers. Aramaic The Aramaic reflex of the letter is conventionally represented with the Hebrew א in typography for convenience, but the actual graphic form varied significantly over the long history and wide geographic extent of the language. Maraqten identifies three different aleph traditions in East Arabian coins: a lapidary Aramaic form that realizes it as a combination of a V-shape and a straight stroke attached to the apex, much like a Latin K; a cursive Aramaic form he calls the "elaborated X-form", essentially the same tradition as the Hebrew reflex; and an extremely cursive form of two crossed oblique lines, much like a simple Latin X. Hebrew alef Hebrew spelling: In Modern Israeli Hebrew, the letter either represents a glottal stop or indicates a hiatus (the separation of two adjacent vowels into distinct syllables, with no intervening consonant). It is sometimes silent (word-finally always, word-medially sometimes: "he", "main", "head", "first"). The pronunciation varies in different Jewish ethnic divisions. In gematria, aleph represents the number 1, and when used at the beginning of Hebrew years, it means 1000 (e.g. in numbers would be the Hebrew date 1754, not to be confused with 1754 CE). Aleph, along with ayin, resh, he and heth, cannot receive a dagesh. (However, there are few very rare examples of the Masoretes adding a dagesh or mappiq to an aleph or resh. The verses of the Hebrew Bible for which an aleph with a mappiq or dagesh appears are Genesis 43:26, Leviticus 23:17, Job 33:21 and Ezra 8:18.) In Modern Hebrew, the frequency of the usage of alef, out of all the letters, is 4.94%. Aleph is sometimes used as a mater lectionis to denote a vowel, usually. That use is more common in words of Aramaic and Arabic origin, in foreign names, and some other borrowed words. Rabbinic Judaism Aleph is the subject of a midrash that praises its humility in not demanding to start the Bible. (In Hebrew, the Bible begins with the second letter of the alphabet, bet.) In the story, aleph is rewarded by being allowed to start the Ten Commandments. (In Hebrew, the first word is anoki, which starts with an aleph.) In the Sefer Yetzirah, the letter aleph is king over breath, formed air in the universe, temperate in the year, and the chest in the soul. Aleph is also the first letter of the Hebrew word emet, which means truth. In Judaism, it was the letter aleph that was carved into the head of the golem that ultimately gave it life. Aleph also begins the three words that make up God's name in Exodus, I Am who I Am (in Hebrew, Ehyeh Asher Ehyeh אהיה אשר אהיה), and aleph is an important part of mystical amulets and formulas. Aleph represents the oneness of God. The letter can be seen as being composed of an upper yud, a lower yud, and a vav leaning on a diagonal. The upper yud represents the hidden and ineffable aspects of God while the lower yud represents God's revelation and presence in the world. The vav ("hook") connects the two realms. Judaism relates aleph to the element of air, and the Scintillating Intelligence (#11) of the path between Kether and Chokmah in the Tree of the Sephiroth. Yiddish In Yiddish, aleph is used for several orthographic purposes in native words, usually with different diacritical marks borrowed from Hebrew niqqud: Loanwords from Hebrew or Aramaic in Yiddish are spelled as they are in their language of origin. * With no diacritics, aleph is silent; it is written at the beginning of words before vowels spelled with the letter vov or yud. For instance, oykh 'also' is spelled אויך. The digraph וי represents the initial diphthong [], but that digraph is not permitted at the beginning of a word in Yiddish orthography, so it is preceded by a silent aleph. Some publications use a silent aleph adjacent to such vowels in the middle of a word as well when necessary to avoid ambiguity. * An aleph with the diacritic pasekh, אַ, represents the vowel in standard Yiddish. * An aleph with the diacritic komets, אָ, represents the vowel in standard Yiddish. Syriac ʾalaph/olaf In the Syriac alphabet, the first letter is ܐ,, alap (in eastern dialects) or olaph (in western dialects). It is used in word-initial position to mark a word beginning with a vowel, but some words beginning with i or u do not need its help, and sometimes, an initial alap/olaph is elided. For example, when the Syriac first-person singular pronoun ܐܸܢܵܐ is in enclitic positions, it is pronounced no/na (again west/east), rather than the full form eno/ana. The letter occurs very regularly at the end of words, where it represents the long final vowels o/a or e. In the middle of the word, the letter represents either a glottal stop between vowels (but West Syriac pronunciation often makes it a palatal approximant), a long i/e (less commonly o/a) or is silent. South Arabian/Ge'ez In the Ancient South Arabian alphabet, 𐩱 appears as the seventeenth letter of the South Arabian abjad. The letter is used to render a glottal stop. In the Ge'ez alphabet, ʾälef አ appears as the thirteenth letter of its abjad. This letter is also used to render a glottal stop. Mathematics In set theory, the Hebrew aleph glyph is used as the symbol to denote the aleph numbers, which represent the cardinality of infinite sets. This notation was introduced by mathematician Georg Cantor. In older mathematics books, the letter aleph is often printed upside down by accident, partly because a Monotype matrix for aleph was mistakenly constructed the wrong way up. Politics The Mapai political party in Israel used an aleph as its election symbol, and featured it prominently in its campaign posters.
WIKI
Wikipedia:Articles for deletion/Tai Po Sam Yuk Secondary School The result was no consensus defaulting to keep and w/o prejudice to a future renomination. Ad Orientem (talk) 00:41, 3 August 2020 (UTC) Tai Po Sam Yuk Secondary School * – ( View AfD View log Stats ) There doesn't seem to anything notable about this school. All of the references in the article except for one are primary and nothing that would establish the schools notability comes up in a search about it. Plus, the creator and main editor of the article clearly has a COI. --Adamant1 (talk) 18:32, 11 July 2020 (UTC) * Note: This discussion has been included in the list of Education-related deletion discussions. Lightburst (talk) 19:47, 11 July 2020 (UTC) * Note: This discussion has been included in the list of Hong Kong-related deletion discussions. Lightburst (talk) 19:47, 11 July 2020 (UTC) Keep Here are sources I found that discuss the subject: </ol>There is sufficient coverage in these sources about the school's history and activities to satisfy Verifiability and Notability. Cunard (talk) 09:22, 12 July 2020 (UTC)</li></ul> * You should know by now since you've been told multiple times by pretty much everyone that primary sources don't work for notability. Which all but of one of those are. And the last source doesn't even exist to figure out if it is or not. At this point it's extremely wrong of you to continuing posting sources you know full well don't pass WP:GNG and to vote keep based on them. Especially when you have been told repeatedly to stop doing it. Either post sources that actually work for notability or don't post at all, but what your doing is getting pretty tiring and you should stop doing it. Otherwise, I'm going to report you to the admin noticeboard. If you want articles to be kept, get them kept the correct way. --Adamant1 (talk) 09:46, 12 July 2020 (UTC) * I don't think these sources are primary sources but am open to striking sources from the list if it is demonstrated that any of them are primary sources. If you think that this AfD contribution is disruptive, I recommend that you post at Administrators' noticeboard/Incidents to receive input from the community about whether they agree. Cunard (talk) 09:57, 12 July 2020 (UTC) * The first source comes from ktsps.edu.hk/ which is either their website which would be primary or one closely associated with them and is therefore WP:OR, The second one is an academic paper and therefore definitely WP:OR, and the third isn't even about them and they are only mentioned briefly in passing. Same goes for the forth one, and like Whereas, the fifth is from their own newsletter so 100% it's primary. Also, the topics covered in the sources are extremely trivial anyway. All schools have tuition hikes and there's nothing notable about it. Which is why there's no non-primary sources covering it. You really should have checked the sources yourself. As I've said before, it's not on other AfD participants to vet your sources. I'm not going to report you if your willing to correct yourself and stop doing it, but it's been a repeated thing. It's not difficult to review sources before you post them to make sure they are usable. So do it. --Adamant1 (talk) 11:28, 12 July 2020 (UTC) * I reviewed the sources before posting them and stand by my posting of them. The first source is a copy of a Ming Pao article. The second source is from an academic paper. No original research says Wikipedia editors may not perform original research. No original research does not say that Wikipedia editors cannot use reliable sources that perform the original research. The third and fourth sources each provide a paragraph of coverage that explains why the school increased tuition by such a large amount. These two sources help with Verifiability more than they help with Notability. The fifth source is independent coverage in Apple Daily. Cunard (talk) 04:27, 13 July 2020 (UTC) * Of course you would. I didn't expect you to follow through on doing the proper thing. Anyway, original research in Wikipedia isn't just confined to editors. It also covers things like academic research papers and autobiographies. That's why the whole secondary source things exists in the first place and also why WP:PRIMARY, which is in No original research, says "a scientific paper documenting a new experiment conducted by the author is a primary source on the outcome of that experiment. Historical documents such as diaries are primary sources." The same goes for anything else written for academic purposes. Since they are original research and not a secondary synthesis of the data. Which is what the notability guidelines requires. Importantly, while primary sources are fine for adding basic information to articles, they are don't work for establishing notability. Just like it's OK to cite a tweet with basic information in an article, but it's not OK to use one as a source in an AfD. What can be in an article and what establish notability are two different standards. Also, if the last two sources just help with verifiability then they should be left out. Since that isn't what we are trying to establish here. Two trivial non-reliable sources verifying each other are still two trivial non-reliable sources. --Adamant1 (talk) 05:24, 13 July 2020 (UTC) * BTW, for exactly what I was talking about see WP:FORUM. "Primary (original) research, such as proposing theories and solutions, original ideas, defining terms, coining new words, etc. If you have completed primary research on a topic, your results should be published in other venues, such as peer-reviewed journals, other printed forms, open research, or respected online publications. Wikipedia can report your work after it is published and becomes part of accepted knowledge; however, citations of reliable sources are needed to demonstrate that material is verifiable, and not merely the editor's opinion." --Adamant1 (talk) 05:30, 13 July 2020 (UTC) * The "your results" and "your work" referenced in WP:FORUM refers to the work of Wikipedia editors. It does not refer to the research of someone like Shuk Wah Poon, the author of the Lingnan University-published book chapter. WP:FORUM mentions "other venues, such as peer-reviewed journals, other printed forms, open research, or respected online publications". "Other venues" include Shuk Wah Poon's Lingnan University-published book chapter. Cunard (talk) 06:11, 13 July 2020 (UTC) * Mine and other peoples that why it says "Primary (original) research, such as proposing theories and solutions, original ideas, defining terms, coining new words, etc." And the talks about someone posting their own research. Original ideas are still original research if they are mine or not. I can't post my friends thoughts on an idea anymore then I can my own. Or visa versa by having them post my original ideas just because they aren't me. That's why you need it to be published in secondary reliable sources in the first place. Otherwise, there would be zero reason reason for it and people could generate their notability by hiring PR firms to write about them and crap. A PR piece isn't "the person", but it's still not reliable because it's original research. Lingnan University-published book chapter isn't "Other venues" because it's the college he was attending and it was published through them as part of him writing it. Generally, "other venues" do not include the place you attend who has a vested interested in and publishes your work. Like if if I attend Standford, while a PhD thesis while going there, and they publish it, that's not "other venues" and it is exactly what the article is doing. Otherwise, it would have to be in a third party peer reviewed journal or something. * Also, WP:SCHOLARSHIP says "Material such as an article, book, monograph, or research paper that has been vetted by the scholarly community is regarded as reliable, where the material has been published in reputable peer-reviewed sources or by well-regarded academic presses." And also "dissertations and theses are considered reliable only if they can be shown to have had significant scholarly influence." So, you'd have to prove that 1. Lingnan University is a well-regarded press and that what they publish is vetted first 2. Show that the specific book or article has had significant scholarly influence. Neither of which you can do and still wouldn't get around the original research thing anyway even if you could. --Adamant1 (talk) 06:35, 13 July 2020 (UTC) * Comment Some source listed above are clearly not primary source (some are newspaper but for "routine" coverage of school fee and change from one government subsidy scheme to another ("直接資助")). Is it in-depth source is another thing. While secondary school latest criteria is Articles for deletion/Common outcomes. I would suggest to create a list of secondary school in Tai Po District instead as number of secondary school in the district are relatively static. Matthew hk (talk) 14:34, 13 July 2020 (UTC) * <small class="delsort-notice">Note: This discussion has been included in the list of Schools-related deletion discussions. Necrothesp (talk) 14:42, 13 July 2020 (UTC) <div class="xfd_relist" style="border-top: 1px solid #AAA; border-bottom: 1px solid #AAA; padding: 0px 25px;"> Relisted to generate a more thorough discussion and clearer consensus. Please add new comments below this notice. Thanks, North America1000 01:33, 18 July 2020 (UTC) <div class="xfd_relist" style="border-top: 1px solid #AAA; border-bottom: 1px solid #AAA; padding: 0px 25px;"> Relisted to generate a more thorough discussion and clearer consensus. Relisting comment: I think more third party analisation of Cunard's sources is required before this discussion should be closed either way. Cheers! -- puddleglum 2.0 20:33, 26 July 2020 (UTC) Please add new comments below this notice. Thanks, -- puddleglum 2.0 20:33, 26 July 2020 (UTC) * Delete there are not enough secondary sources to justify the article.John Pack Lambert (talk) 14:56, 29 July 2020 (UTC) * The above discussion is preserved as an archive of the debate. <b style="color:red">Please do not modify it.</b> Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.
WIKI
Talk:China and the opioid epidemic in the United States Contested deletion This article should not be speedy deleted as it is a notable topic covered extensively in RS. --FailedMusician (talk) 13:15, 28 April 2024 (UTC) * It is a POV fork. Slatersteven (talk) * Following me around Wikipedia to delete everything I write is harassment. You did not even bother to give any reason why you think it is a "POV fork". FailedMusician (talk) 13:33, 28 April 2024 (UTC) * It is for the closer to decide, but if you want an explanation as to why this is a POV fork, we have an article on the opioid epidemic in the United States, this just seems like a listing of people who have blamed it on China. leaving aside the OR. Slatersteven (talk) 13:39, 28 April 2024 (UTC) * Your presence here, following a dispute on another page and a ANI post, amounts to harassment (see WP:HARRASMENT). Moreover, the secondary sources I've included clearly demonstrate the subject's notability, making it a content fork. FailedMusician (talk) 13:50, 28 April 2024 (UTC) * Oppose deletion article is well sourced. No POVFORK observed. SmolBrane (talk) 15:20, 28 April 2024 (UTC) * @FailedMusician I think the article is well sourced but why do you think this content cannot be included in the main article? Why does it deserve a stand alone article? &#123;{u&#124; Gtoffoletto &#125;}  talk 18:06, 28 April 2024 (UTC) * There is already mention of China in the main article, and it needs some expansion, but the article is already very big and this would seem out of scope there. FailedMusician (talk) 03:41, 29 April 2024 (UTC)
WIKI
Page:Fairy tales and other stories (Andersen, Craigie).djvu/46 34 who had carried her off thought so; but when all the others declared she was ugly, he believed it at last, and would not have her at all—she might go whither she liked. Then they flew down with her from the tree, and set her upon a daisy, and she wept, because she was so ugly that the cockchafers would not have her; and yet she was the loveliest little being one could imagine, and as tender and delicate as a rose-leaf. The whole summer through poor Thumbelina lived quite alone in the great wood. She wove herself a bed out of blades of grass, and hung it up under a large burdock leaf, so that she was protected from the rain; she plucked the honey out of the flowers for food, and drank of the dew which stood every morning upon the leaves. Thus summer and autumn passed away; but now came winter, the cold long winter. All the birds who had sung so sweetly to her flew away; trees and flowers shed their leaves; the great burdock leaf under which she had lived shrivelled up, and there remained nothing of it but a yellow withered stalk; and she was dreadfully cold, for her clothes were torn, and she herself was so frail and delicate—poor little Thumbelina! she was nearly frozen. It began to snow, and every snow-flake that fell upon her was like a whole shovel-full thrown upon one of us, for we are tall, and she was only an inch long. Then she wrapped herself in a dry leaf, but that would not warm her—she shivered with cold. Close to the wood into which she had now come lay a great corn-field, but the corn was gone long ago; only the naked dry stubble stood up out of the frozen ground. These were just like a great forest for her to wander through; and, oh! how she trembled with cold. Then she arrived at the door of the Field Mouse. This mouse had a little hole under the stubble. There the Field Mouse lived, warm and comfortable, and had a whole room-full of corn—a glorious kitchen and larder. Poor Thumbelina stood at the door just like a poor beggar girl, and begged for a little bit of a barleycorn, for she had not had the smallest morsel to eat for the last two days. 'You poor little creature,' said the Field Mouse—for after all she was a good old Field Mouse—'come into my warm room and dine with me.'
WIKI
Twitter will stream 24-hour news from Bloomberg starting this fall Twitter will partner with Bloomberg as part of its plans to stream live video 24 hours a day, The Wall Street Journal reports. The deal will see Bloomberg producing news programming specifically for Twitter, mixing live news reported from Bloomberg’s global bureaus with videos posted by verified Twitter users, and streaming around the clock. The news service has yet to be named, but according to the WSJ, will be officially announced on Monday by Michael Bloomberg and Jack Dorsey. Terms of the deal were not divulged, but the service will be supported by ads, and Bloomberg will have control over the content of the feed. The service is expected to go live this fall. Bloomberg Media’s CEO, Justin Smith, said that the service would “be focused on the most important news for an intelligent audience around the globe,” saying that it would be “broader in focus than our existing network.” Anthony Noto, Twitter’s COO and CFO, said that the Bloomberg deal made Twitter a viable alternative for cord cutters. “We really think we can reach audiences that are not paying for TV and are watching television on the go and we think Bloomberg is the perfect partner for us to start with,” he said. The deal is the first to be announced after Twitter made its ambitions to broadcast live video around-the-clock were publicly announced. The company indicated it was looking more at 24-hour news and sports channels as models than services like Netflix, aiming for the kind of programming people could drop in and out of. Describing what he envisioned for the channels, Noto said users could “focus in on it when you hear something that’s of interest, but then maybe not be 100 percent focused on it when it’s not of interest.”
NEWS-MULTISOURCE
Driver reinstall after System Restore? Dennis Faas's picture Infopackets Reader Steve S. from Kentville, Nova Scotia writes: " Dear Dennis, Why is it desirable to backup windows driver files when I can use Windows System Restore to go back to a previous state of my computer's configuration in which everything was working fine? Is it because System Restore does not always restore all the necessary drivers? " My Response: As far as I understand, the Windows System Restore feature focuses primarily on restoring a working copy of the Windows Registry. As programs, operating system updates, and drivers are installed to a system, the Windows Registry is updated. Over time, Windows will automatically archive and set aside a copy of the Windows Registry incase you need to run a System Restore. To answer your question: any changes made to your system -- including the Registry and device driver details -- will be lost (up until the point of your last System Restore). Based on what I've read while surfing the 'net and what I've heard from others, the System Restore feature seldomly resolves deeply rooted issues and isn't at all helpful in a major disaster situation (due to a virus attack or a corrupt hard drive). Only disk imaging software is capable of offering true system protection, which is why I periodically harp on the issue. To recap, here are some key differences of System Restore vs Roxio GoBack and Disk Imaging: • Windows System Restore will only revert to a previously archived Windows Registry. If your system is infected with a virus or Spyware, the Windows System Restore will do little to help (if at all). On the same note, a program called Roxio GoBack works much the same way Windows System Restore operates, except it offers a few more options. Roxio GoBack, however, is *definitely not* a disk imager.   • When creating a disk image, a backup is created into a single file, called the image file. Disk imaging is different from other backup software because it copies the hard drive's raw data (sectors and bytes) rather than file-by-file in a typical backup operation. After an image is created, it can be stored on the hard drive or recorded onto another medium (such as Zip Disk, CD-R, or DVD-R media). Some disk imaging programs can even transfer the contents of a hard drive onto another -- including the operating system. This is particularly useful if and when you decide to upgrade to a bigger-sized hard drive. For more info on disk imaging, please see this newly revamped article: Acronis True Image v8.0 Review Rate this article:  No votes yet
ESSENTIALAI-STEM
EXCLUSIVE-Walmart laying off hundreds of US workers at five e-commerce fulfillment centers By Siddharth Cavale NEW YORK, March 23 (Reuters) - Hundreds of workers at five U.S. Walmart facilities that fulfill e-commerce orders are being asked to find jobs within 90 days at other company locations, a spokesperson confirmed to Reuters. About 200 workers at Pedricktown, New Jersey, and hundreds of others at Fort Worth, Texas; Chino, California; Davenport, Florida; and Bethlehem, Pennsylvania were let go due to a reduction or elimination in evening and weekend shifts, the spokesperson said. The layoffs at Walmart, a retail bellwether because of its size, could be a harbinger of further turmoil in the U.S. economy, which many economists predict could enter recession this year. "We recently adjusted staffing levels to better prepare for the future needs of customers," Walmart said in a statement, adding that it would work closely with affected associates to find jobs at other locations. The spokesperson said impacted workers would be paid for 90 days to find jobs at other facilities, including those in Joliet, Illinois, and Lancaster, Texas, where the company has opened up new high-tech e-commerce distribution centers. Walmart has been investing heavily in automation over the past few years, partnering with automation companies such as Knapp to help it cut down the number of steps it takes employees to process e-commerce orders to five from 12, which has been implemented at its Pedricktown, New Jersey location, for instance. On a post-earnings call in February, Walmart CEO Doug McMillon said he was "most excited about the automation opportunity we have" with plans to increase investments in automation technology as part of its more than $15-billion capital expenditure budget this year. Workers being laid off at the five fulfillment centers will be eligible for roles at Walmart's 5,000 U.S. stores, which the company has increasingly been using as a platform to ship orders to customers' doorsteps, the spokesperson said. Walmart is the largest private employer in the United States with about 1.7 million U.S. workers. Apart from Pedricktown, New Jersey, Walmart did not post a Worker Adjustment and Retraining Notification (WARN) notice for the layoffs, according to a Reuters review of labor government data. A WARN notice is mandated by U.S. labor law and requires companies with 100 or more employees to provide 60 days' advance notification of plant closings and mass layoffs. The spokesperson declined to call them mass layoffs and said that the warehouses continued to operate normally. The company did not issue a WARN notification for the other locations as it is unsure about the total number of employees that will be eventually laid off and re-hired, the spokesperson added. The news comes months after the company let go off nearly 1,500 workers at an Atlanta, Georgia, online order fulfillment center, as part of a modernization plan to build warehouses with a more high-tech spin. The spokesperson said the new round of layoffs was unrelated to its modernization plans. In January, the company bumped up the minimum wage by $2 to $14 per hour. This, however, still lagged Target and Amazon, which pay workers a starting wage of at least $15 per hour. ANALYSIS-To raise prices or not? Consumer goods makers weigh bets while retailers fret ANALYSIS-Retailers turn to robots in cost inflation fight Walmart sees lower 2023 performance in time of economic uncertainty Shoppers to face fresh price hikes as stores, suppliers pass on costs (Reporting by Siddharth Cavale in New York Editing by Nick Zieminski) ((siddharth.cavale@thomsonreuters.com; Cell: +1 646-288-4330;)) The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Twitter’s Troubles and Snap’s Appeal: It’s All About the Mojo Deal Professor Momentum can mean everything when it comes to the fortunes of social media giants. Just look at Twitter and the company formerly known as Snapchat. In Silicon Valley, if you are not a hero, you are a loser. And this all-or-nothing narrative is driving the fates of companies beyond all reasonable expectations. Let’s start with Twitter, which is said to be continuing talks over a potential sale to the software company Salesforce.com. Negotiating a deal in the open is never a good thing, but it may be worse for Twitter. For one, the reports of the Salesforce negotiations come on the heels of reports that others, including Alphabet, Google’s parent company; the Walt Disney Company; and possibly even Microsoft had taken a look at Twitter and decided to pass. All of this reduces whatever leverage the micromessaging service, which has a market value of more than $12 billion, might have possessed before the frenzy of deal speculation began. Salesforce, meanwhile, is stuck in a situation similar to the one Microsoft found itself in when it tried to acquire Yahoo in 2008, with its bidding conducted more or less on a public stage and its own shareholders protesting. As a result, Salesforce will have to show its shareholders that any deal is a good one for the company, and this will come at the expense of Twitter. And if Salesforce subsequently walks away from the discussions, a broken deal will leave Twitter with the label of damaged goods. Any way you look at it, it’s not a great place to be for Twitter. The company’s fundamental problem is that it is struggling in user growth. Twitter said in its Securities and Exchange Commission filings that it had 313 million average monthly active users for the three months ended June 30, up 3 percent year over year. Revenue growth may be on track, increasing about 20 percent in the quarter ending June 30 over the same period of last year, but it is the user growth numbers that have put Twitter into the loser category. When Twitter went public in 2013, and its stock price shot to over $60, it had far fewer users and a third as much revenue. But back then, Twitter had user growth of 39 percent year over year. And with that growth, all other sins were overlooked. That is why LinkedIn could command $26.2 billion in its sale to Microsoft. LinkedIn has 450 million members but only about 106 million monthly users, far fewer than Twitter. Yet the growth is there: Membership had increased by 18 percent year over year as of June 30. It’s the secret sauce of internet valuations. Revenue and earnings are forgiven if you can show growth in users. Whether that makes sense, of course, is another matter. It does explain the puzzle of why Twitter struggles to sell itself and LinkedIn goes for a huge premium. In short, the story line isn’t clean at Twitter, and the growth is not phenomenal. Even though by some metrics Twitter is worth more, it has failed to adequately find a way to make money from its user base. Other Twitter properties like Vine are also struggling with no or low growth. Still, the gloom around Twitter seems overblown. Twitter is an important part of the internet, and even Yahoo found a buyer willing to pay $4.8 billion despite being in slow-motion collapse. A figure twice that high for Twitter would seem to be a bargain. And remember that Facebook faced issues after its initial public offering, but was able to find solid footing in mobile. Sharp leadership — whether that is from its chief executive, Jack Dorsey, or new blood — could certainly help Twitter exploit its huge user base. But the problem is that in the eyes of the Valley, Twitter has lost its mojo. Even as Twitter was deflating, another social media darling, Snapchat, now renamed Snap, was riding high as reports emerged that the start-up, known for its disappearing messages, was preparing for a public offering that could value it for as much as $25 billion. Snap reports 150 million active users daily and 235 million monthly with growth rates of 30 percent — roughly the growth rate of Twitter at its public offering. And Snap has the youth market, which advertisers covet. Revenue is low, at about $376 million, according to Bloomberg, but is projected to grow fourfold by 2018. Profits appear nonexistent, but as usual, who cares? A $25 billion valuation would be about 25 times its projected 2017 revenue. In comparison, Facebook went public in 2012 at 19 times revenue, which at the time was considered a rich valuation. It’s easy to be skeptical about such a rock star valuation. Snap lives and dies on the fickle under-30 crowd. At any time, the youth of the world may turn to another product. (WhatsApp appears to be increasingly popular among the tween crowd, for example.) And Snap has no pretensions of being useful or changing the world. It is simply about having fun. So Snap has quite a few risk factors beyond those of Facebook. There are, however, only a few big social media companies left. The rest have been bought up by Google, Microsoft and the like. And Snap has the growth. The question is whether Snap can sustain its messaging business and turn into another Facebook or Google, justifying that $25 billion valuation. So far, Snap has worked hard to keep its product nimble and updated, and it has retained users. The start-up might have just gotten lucky with its messaging product, but there is a clearly a belief at the moment that its co-founder and chief executive, Evan Spiegel, can be a visionary like Mark Zuckerberg of Facebook and push successfully into new products. Momentum can mint money in Silicon Valley, but you have to sustain it. Snap, if it manages the public offering process right and isn’t too headstrong with the markets, may get the valuation it seeks. Yet the fickle gods of Silicon Valley will turn if the company can’t sustain its growth story. You can debate whether maybe it might be better to question that potential at the public offering stage, but then people will point to Google and Facebook as success stories. How could you not invest in Snap? Once again we have a case in which Silicon Valley’s overreliance on momentum creates an unrealistic proxy for valuation. Snap will reap billions as a result, while Twitter will struggle to salvage what it can from what was once a valuation of more than $40 billion. It is a story that will have real consequences.
NEWS-MULTISOURCE
Single file Single file may refer to: * The Single File, a 1983 video compilation and 1984 box-set album by English singer-songwriter Kate Bush * "Single File", a song from the 1995 album Elliott Smith by American singer-songwriter Elliott Smith * Single File (album), the 2000 début album by American punk-rock band The Honor System * Single File (band), an American pop-punk, alternative-rock band * Single-file dynamics, another term for file dynamics, the occurrence and motion of particles in a channel in chemistry, physics, mathematics and related fields * Single file (formation), a military term for a single column (formation) of troops
WIKI
How a Donald Trump Presidency Could Affect Fracking Stocks Americans elected Donald Trump due in part to his America-first views. His vision is to reinvigorate the nation's economy to provide jobs and a better standard of living for all. Fueling that vision is an America-first energy plan, which will rely heavily on the country's vast shale resources that the energy industry unlocked with fracking. Here's how that plan could affect fracking stocks. Image source: Getty Images. The America-first energy plan Trump's vision for America is that we would be energy independent. To get there, he wants to do three things directly related to the fracking industry: Unleash the country's shale oil and gas reserves, including opening up more federal lands for leasing. Encourage the use of natural gas to reduce emissions, save money, and increase economic output. Rescind regulations that are holding back energy production. This platform represents a tremendous opportunity for the fracking industry because it should drive demand for domestically produced energy while also cutting costs and opening up new doors. Image source: Getty Images. Drilling down into the opportunity for frackers One of Trump's goals is to unlock more of America's vast shale resources, some of which are currently untapped because they are on federal lands. In a speech he gave earlier this year at the Shale Insight Event, Trump said: Under his plan, he would open the door for exploration companies to lease and explore for oil and gas on more federal land. That is a fairly substantial opportunity given that oil and gas companies currently have leases on only 10% of onshore federal lands. Trump's plan would solve two problems for the industry according to Harold Hamm, the CEO of oil fracking pioneer Continental Resources (NYSE: CLR) . In a recent interview, Hamm said that permitting on government-owned lands out west is "almost nonexistent" and that it "takes years sometimes to get permits." Meanwhile, under Trump, more land would be open for exploration and the permitting process would speed up. The opening of additional federal land for exploration would not only benefit Continental but other leading explorers including oil fracking giant EOG Resources (NYSE: EOG) . EOG Resources was one of the early leaders in the development of the Eagle Ford shale in Texas, where it is currently the top acreage holder and producer. Meanwhile, EOG Resources' exploration focus led it to discover for four new shale plays in the Rockies. The company currently has several exploration teams focused on uncovering new energy resources in the U.S. and would likely be interested in exploring some of the areas Trump opens up. Image source: Getty Images. Trump also said that he wants to encourage natural gas demand to reduce emissions and energy costs while increasing economic output. One potential demand driver could be to switch more 18-wheelers, buses, and other large vehicle fleets from diesel to natural gas. According to natural gas fueling company Clean Energy Fuels (NASDAQ: CLNE) , the transportation industry in American consumes half of the country's gasoline and diesel, which contributes to our carbon problem. However, by switching America's transportation fleet from diesel to natural gas, we could cut these emissions by 30% while saving $1.50 per gallon of fuel on average. Furthermore, that switch could increase economic output in several ways. Not only would Clean Energy Fuels need to build more natural gas stations, but leading natural gas producers like Chesapeake Energy (NYSE: CHK) would need to drill more gas wells to match the increase in demand. Under Chesapeake Energy's current forecast, the company plans to grow its production by 5% to 15% annually through 2020. However, increasing demand under Trump's plan could enable Chesapeake to boost production at an even faster rate in the future. Image source: Clean Energy Fuels. The final point of Trump's plan is to ease the regulatory burden on the energy industry. Doing so would, according to the Institute for Energy Research: Increase GDP by more than $100 billion annually. Add over 500,000 new jobs annually. Increase annual wages by more than $30 billion over the next seven years. Increase federal, state, and local tax revenues by almost $6 trillion over four decades. Increase total economic activity by more than $20 trillion over the next 40 years. The lifting of certain regulatory burdens would benefit oil and gas producers by cutting their costs, which could enable them to drill more wells. That would flow down to oil-field service companies such as Halliburton (NYSE: HAL) by providing it with more work. The increased workload would enable Halliburton to not only hire back some of the 32,000 jobs it has had to cut during the oil market downturn but hire more workers as America's energy output grows. Investor takeaway Donald Trump's presidency should be good for America's fracking industry. By driving the country toward energy independence, he would encourage the nation to use more domestically produced energy. That means drilling and fracking more wells, which would fuel volume growth at producers and more work for service providers while trickling down to more jobs and wealth for the rest of America. 10 stocks we like better than Halliburton When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor , has tripled the market.* David and Tom just revealed what they believe are the ten best stocks for investors to buy right now... and Halliburton wasn't one of them! That's right -- they think these 10 stocks are even better buys. Click here to learn about these picks! *Stock Advisor returns as of November 7, 2016 Matt DiLallo has no position in any stocks mentioned. The Motley Fool owns shares of and recommends Clean Energy Fuels. The Motley Fool owns shares of EOG Resources and Halliburton. Try any of our Foolish newsletter services free for 30 days . We Fools may not all hold the same opinions, but we all believe that considering a diverse range of insights makes us better investors. The Motley Fool has a disclosure policy . The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
User:Artists In Situ Artists In Situ, founded by art marketer, J. Cné Breaux, is an organization of artists, collectors, consultants and business professionals dedicated to forwarding artists' work, message and public exposure through marketing education, seminars, event administration and collector facilitation. It's world wide headquarters is in Eureka Springs, Arkansas, one of the top 25 art destinations in the US for 2012 according to American Style Magazine [citation needed].
WIKI
Bad TI IC sockets From TekWiki Jump to navigation Jump to search Texas Instruments made some bad IC sockets back in late 1970's. The TI C-95 model of socket is known to be a problem. A typical high quality replacement would be a Mill-Max machined-pin DIP socket. DIP sockets are often problematic as instruments age. Gold-plated pins carrying low current in gold-plated sockets are the least problematic. Higher currents, such as occur in ECL logic, are more problematic. For gold pin DIPs like many of the Tektronix custom ICs, one would choose a gold internal contact plating, and for other early non RoHS lead-tin plated ICs a similar internal contact plating is available from some suppliers. Tek issued a service note (see below) that describes a transition from the original C93 socket design to a C95 design which was mechanically too fragile, and then a transition to an improved version of the C93 socket design. For the 14 pin DIP at the left, a gold part number would be Mill-Max 110-93-314-41-001000, a non-RoHS lead-tin part number would be Mill-Max 110-99-314-41-001000. Both parts are non-RoHS since the solder-tail (PCB end) is also lead-tin plated. Former Tek Bench Technician and Applications Engineer Jim Mauck says: I noticed your article on bad Texas Instruments IC sockets. I literally replaced 100's of those sockets. I believe TI's part number was C95. They were used throughout Tek at the time but they do not always cause an issue. They didn't have a gas-tight contact with the IC pin and they would oxidize over time and develop a resistive connection. This wasn't necessarily a problem for low current applications but it was death to any ECL circuits. Unfortunately ECL was used extensively in logic analyzers. There were very high failure rates for the 7D01, DF1, and DF2 and eventually Tek had an unpublicized board exchange program for those instruments. Service technicians could replace the boards but there was no official modification kit or customer notification. Failures due to these sockets were typically intermittent. A classic indicator of bad sockets was having the problem disappear if you wiggled all of the ICs in the socket. Doing that scraped off some of the oxidation and the instrument would work for another month or so until the contacts were again oxidized. The problem was exacerbated in some cases because Tek was using ICs with tinned leads intended to be soldered to the circuit board - not socketed. I never saw any problems in high current applications when the leads were gold plated. Links Pictures
ESSENTIALAI-STEM
Personalized Ayurvedic Treatments for Optimal Health Personalized Ayurvedic Treatments for Optimal Health 1 The Basics of Ayurveda Ayurveda is an ancient system of medicine that originated in India thousands of years ago. It is a holistic approach to health and well-being that focuses on the mind, body, and spirit. The central principle of Ayurveda is that each individual has a unique constitution, or dosha, which determines their physical and mental characteristics. There are three main doshas: Vata, Pitta, and Kapha. Understanding your dosha can help you make informed choices about diet, lifestyle, and therapy to maintain optimal health. Customizing Ayurvedic Treatments One of the key aspects of Ayurveda is the personalized approach to treatment. Unlike Western medicine, which often takes a one-size-fits-all approach, Ayurveda recognizes that each person is unique and requires tailored treatments. This individualized approach takes into consideration various factors such as age, sex, dosha, and current health condition. Learn more about the subject covered in this article by visiting the recommended external website. There, you’ll find additional details and a different approach to the topic. https://www.ayurherbs.com.au! For example, two individuals suffering from digestive issues may be prescribed different treatment plans based on their dosha. A person with a Vata imbalance may need warming herbs and gentle exercise to calm their digestive system, while someone with a Pitta imbalance may require cooling herbs and a diet that avoids spicy foods. Ayurvedic Elements in Treatment Ayurvedic treatments often incorporate various elements to restore balance and promote healing. These elements include: • Herbs and Nutritional Supplements: Ayurvedic herbs and supplements are prescribed based on the individual’s dosha and health condition. These natural remedies are believed to restore balance and enhance overall well-being. • Massage and Bodywork: Ayurvedic massages, known as abhyanga, use medicated herbal oils to relax the body, improve circulation, and detoxify tissue. This therapy is tailored to the individual’s dosha and aims to restore balance and harmony. • Meditation and Yoga: Ayurveda recognizes the connection between the mind and body, and promotes practices such as meditation and yoga to reduce stress, improve mental clarity, and enhance overall well-being. • Diet and Lifestyle Modifications: Ayurveda emphasizes the importance of a balanced diet and lifestyle for optimal health. The individual’s dosha is taken into consideration when making dietary and lifestyle recommendations to promote balance and prevent disease. • The Benefits of Personalized Ayurvedic Treatments By customizing treatments based on the individual’s dosha and health condition, Ayurveda offers several benefits: • Improved Overall Well-being: Personalized Ayurvedic treatments aim to restore balance and harmony in the body, resulting in improved overall well-being. This includes physical, mental, and emotional health. • Disease Prevention: Ayurveda emphasizes the importance of maintaining balance to prevent disease. By identifying and addressing imbalances early on, Ayurveda helps individuals take proactive steps to prevent the onset of chronic conditions. • Reduced Symptoms: Ayurvedic treatments are known for their effectiveness in reducing symptoms associated with various health conditions. By addressing the root cause of the problem and restoring balance, Ayurveda can help alleviate symptoms such as pain, inflammation, and digestive issues. • Improved Digestion: Ayurvedic treatments focus on promoting healthy digestion, as poor digestion is often the root cause of many health issues. By customizing treatment plans to address specific digestive imbalances, Ayurveda can help individuals improve their digestive health and overall well-being. • Finding a Qualified Ayurvedic Practitioner If you are interested in personalized Ayurvedic treatments, it is important to find a qualified practitioner. Look for someone who has undergone formal training and certification in Ayurveda. They should have a thorough understanding of the doshas and be able to tailor treatments to your specific needs. Additionally, ensure that the practitioner follows ethical practices and adheres to safety standards. During your initial consultation, the practitioner should take a comprehensive health history, assess your dosha, and provide you with personalized recommendations for treatment. They should also address any concerns or questions you may have. Dive even deeper into the subject matter by accessing this recommended external website. ayuherbs, you’ll find more information and a different approach to the topic discussed. Conclusion Personalized Ayurvedic treatments offer a holistic approach to health and well-being. By recognizing the uniqueness of each individual, Ayurveda tailors treatment plans to address specific imbalances and promote overall harmony. Whether you are dealing with a specific health issue or seeking to optimize your well-being, personalized Ayurvedic treatments can be a valuable addition to your healthcare routine. For more information, check out the related posts we suggest to supplement your research: Examine this interesting guide Understand more with this detailed report
ESSENTIALAI-STEM
Larklight trilogy The Larklight trilogy is a trilogy of young adult novels by Philip Reeve, entitled Larklight, Starcross, and Mothstorm. These books are all illustrated by David Wyatt. Setting The Larklight trilogy is set in an alternative Victorian-era universe, where mankind has been exploring the Solar System for at least a century. Earth is the same as it was in the late 19th century, but only the United Kingdom and its Empire possess the engines to travel across the Solar System. The United States, which the British consider to be rebellious colonies, and France, though not technically at war with Britain on Earth, are in a struggle to sabotage the Britons' expansive interests and develop space technology of their own. London, the centre of the universe, has many spaceports and is the base of many organisations such as the Royal Xenological Society. Larklight Larklight is the first book in the series. The story begins in the Larklight manor where they have a visitor. However, soon, white spiders from Saturn invade Larklight and they have to save the known universe from a madman. Starcross Starcross, the second book in the trilogy begins when Art Mumby and his prim older sister Myrtle, at their home (Larklight) with their mother and father, receive a strange invitation to the Starcross hotel, located in the asteroid field. Mothstorm Mothstorm, the third book and the last book in the trilogy, was published in hardback in October 2008. The paperback was scheduled to be published on 6 July 2009. They fight giant moths, and a race of blue lizards led by a Rogue Shaper. Film adaptations Warner Bros. had planned a $200 million adaptation of the first book Larklight, with Shekhar Kapur directing. The movie would have been released in 2010. It is unknown if the rest of the trilogy will be adapted. However Shekhar Kapur said Larklight will be the last expensive movie he will make, so it is unlikely that Starcross and Mothstorm will be adapted unless another director chooses to do so. The film was planned to be released January 1, 2010, but after the death of director Anthony Minghella, Shekhar Kapur took over his unfinished movie, New York, I Love You, and Larklight had to be postponed.
WIKI
Bella GUI / OS X Catalina Forums Bug Reports Bella GUI / OS X Catalina • This topic has 5 replies, 2 voices, and was last updated 6 months ago by Jeremy Hill. Viewing 6 posts - 1 through 6 (of 6 total) • Author Posts • #4429 PhilipPhilip Hi guys! Now that we have a functional Rhino plugin I’ve done some testing in Bella. I noticed that stopping a render and/or closing Bella GUI (cmd + q) takes a very long time on both my systems (iMac Pro and MacBook Pro) – can be over 5 minutes of “beachballing” before Bella closes. Philip #4432 Jeremy HillJeremy Hill Are you able to reproduce this by using the default sphere/plane scene? My first guess would be that it could be due to the denoiser or bloom/diffraction being enabled. Second guess would be related to rendering at high resolution with the BSI file taking too long to be written for some reason. The confusing part is that you should not get a beachball, so it seems possible to be slow network or such. To try to narrow down what may be happening, you can force stopping without denoising/bloom/diffraction/BSI by holding command down when you click the stop button. #4434 PhilipPhilip When using the default sphere scene stopping the render takes only a few seconds (before the “render” text turns blue again) – seems normal to me. Closing Bella after that happens without delay. Denoiser is on, but diffraction is not enabled. Render resolution is my perspective viewport resolution (4224 x 2624). Saving directly to the hard drive – not over the network. With force stopping the render stops and I can close Bella without the delay – even if the “render” button doesn’t turn blue again (delay there compared to the default scene) before closing Bella. If I’m stopping the render the normal way and then closing Bella, I get the long delay (not always 5 min, though). Philip #4438 Jeremy HillJeremy Hill That makes a bit more sense, since the denoiser can take quite awhile, increasing with resolution. It may be quite preferable not to enable it until after you have finished rendering; like camera ISO and some other parameters, this can be enabled/disabled during or after rendering, or also after re-opening a file and resuming render. I am still not sure where the beachball would come from though, since we have callbacks installed for updating the progress bar in the gui, as denoising is performed. By the way, the trick of holding command (CTRL on windows) to force actions also allows skipping confirmation dialogs about overwriting files & image buffers, when starting a render or IPR. #4440 PhilipPhilip I disabled the denoiser… and I’m sorry to disappoint you, but disabling the denoiser has no effect… Same symptoms still – including the beachball. Thanks for the additional info about the force actions 🙂 Philip #4444 Jeremy HillJeremy Hill Ok, well I’ll think on it and see if I can come up with anything. Viewing 6 posts - 1 through 6 (of 6 total) • You must be logged in to reply to this topic.
ESSENTIALAI-STEM
Page:United States Statutes at Large Volume 90 Part 2.djvu/958 90 STAT. 2426 Effective date. Effective date. Effective date. PUBLIC LAW 94-503—OCT. 15, 1976 (b) Effective during the one year period beginning on the date of the enactment of this Act, vacancies in positions in the Drug Enforcement Administration (other than positions described in subsection (a)) at a grade not lower than GS-14 shall be filled— (1) first, from applicants who have continuously held positions described in subsection (a) since the date of the enactment of this Act and who have applied for, and are qualified to fill, such vacancies, and (2) then, from other applicants in the order which would have occurred in the absence of this subsection. Any individual placed in a position under paragraph (1) shall be paid in accordance with subsection (d). (c)(1) Effective beginning one year after the date of the enactment of this Act, an individual in a position described in subsection (a) may be removed, suspended for more than 30 days, furloughed without pay, or reduced in rank or pay by the Administrator of the Drug Enforcement Administration if— (A) such individual has been employed in the Drug Enforcement Administration for less than the one-year period immediately preceding the date of such action, and (B) the Administrator determines, in his discretion, that such action would promote the efficiency of the service. (2) Effective beginning one year after the date of the enactment of this Act, an individual in a position described in subsection (a) may be reduced in rank or pay by the Administrator within the Drug Enforcement Administration if— (A) such individual has been continuously employed in such position since the date of the enactment of this Act, and (B) the Administrator determines, in his discretion, that such action would promote the efficiency of the service. Any individual reduced in rank or pay under this paragraph shall be paid in accordance with subsection (d). (3) The provisions of sections 7512 and 7701 of title 5, United States Code, and otherwise applicable Executive orders, shall not apply with respect to actions taken by the Administrator under paragraph (1) or any reduction in rank or pay (under paragraph (2) or otherwise) of any individual in a position described in subsection (a). (d) Any individual whose pay is to be determined in accordance with this subsection shall be paid basic pay at the rate of basic pay he was receiving immediately before he was placed in a position under subsection (b)(1) or reduced in rank or pay under subsection (c)(2), as the case may be, until such time as the rate of basic pay he would receive in the absence of this subsection exceeds such rate of basic pay. The provisions of section 5337 of title 5, United States Code, shall not apply in any case in which this subsection applies. J U S T I C E DEPARTMENT PERSONNEL SEC. 202. (a) Subsection (c) of section 5108 of title 5, United States Code, is amended by striking out paragraph (8) and inserting in lieu thereof the following new paragraph: "(8) the Attorney General, without regard to any other provision of this section, may place a total of 32 positions in GS-16, 17, and 18:". (b) Section 5315 of title 5, United States Code, is amended by adding at the end thereof the following new paragraphs: "(109) Commissioner of Immigration and Naturalization, Department of Justice. �
WIKI
Netanel Rubin's Perl Jam circus I’ve just watched Netanel Rubin’s Perl Jam 2 talk from this year’s Chaos Communication Congress. As he’s due to give the same talk at Black Hat Asia, I thought it would be good to set the record straight concerning his claims about Perl (others have already done so). He makes 3 major claims: 1. The Perl language is insecure 2. Bugzilla & CGI.pm are representative of idiomatic Perl 3. Perl doesn’t improve I’m going to address each claim in turn and show why it is false. In my view, Perl remains a powerful, general-purpose language well-suited to tasks like building dynamic web applications, processing big data, and managing systems. Claim 1: The Perl language is insecure Function declarations cannot specify argument data types Netanel Rubin, The Perl Jam 2 This isn’t true. Since 2008 Perl has supported subroutine signatures, with type checks using the Method::Signatures module. Since 2006 the Moose object system provided a fully-fledged type system and meta object programming interface (there’s also MooseX::Method::Signatures). Developers treat hashes and arrays as “secure” data types … this is the Perl standard. You’re not expected to use it, you have to, as you don’t have any other choice. This security mess is a fundamental part of the language. Netanel Rubin, The Perl Jam 2 Netanel starts by describing taint mode and claims that hashes are so secure, hash keys bypass Perl’s taint check. It’s true that hash keys are never considered tainted. This is documented in perlsec and discussed in depth in Chapter 2 of Mastering Perl. But it’s not because hashes are assumed to be secure, it’s because tainting hash keys involves a huge performance penalty. He never explains his claim as to why arrays are considered secure. Perl’s ref function is a reliable and secure way to determine the data type of a reference. Arguments passed to functions are always passed as an array of scalars via @_. There is no doubt, no ambiguity. It’s not required security-wise, but if you want to use them you can use function signatures, types and meta-object programming in Perl. They’ve been available for years. But I felt all of these points will go unnoticed without an extreme example of Perl’s absurdity. So I found an extreme example. One that will clearly show the ridiculousness nature of the language. Netanel Rubin, The Perl Jam 2 This is the vulnerable code, from an example CGI application: use strict; use warnings; use CGI; my $cgi = CGI->new; if ($cgi->upload( 'file' )) { my $file = $cgi->param( 'file' ); while (<$file>) { print "$_"; } } The issue with this code is that if $file has the value of ARGV, the diamond operator <$file> will call open on every value in @ARGV. CGI populates @ARGV with the HTTP query parameters which creates the vulnerability. So if the HTTP query parameter is ls|, Perl will execute ls. If the CGI program was running in taint mode, this attack vector would fail. Regardless, it’s a well-understood risk, the PLEAC project's Perl recommendations from 1999 shows how to properly parse file descriptors in CGI parameters (ex 19.4). O’Reilly’s CGI Programming on the Web by Shishir Gundavaram recommended parsing metacharacters like | from user input, which also prevents this attack. That book was published in 1996. The piping open behavior is well documented in open, perlipc and perlsec. Chapter 2 of Mastering Perl also covers it. It’s a useful feature when you want to efficiently process a lot of data from an external command: just like a shell pipe, it creates a socket between the Perl program and the external binary, avoiding the need to read the entire output into memory at once. Netanel also identified a SQL injection vulnerability in Bugzilla. The weakness was caused by a poorly coded function which failed to properly validate input used in a dynamic SQL query. The developers should have used the safer pass-by-parameter DBI prepare and execute functions. In both cases Perl provided methods for securely parsing untrusted input, but the developers didn’t use them. Claim 2: Bugzilla & CGI.pm are representative of idiomatic Perl Like every other Perl project, Bugzilla is heavily using functions that treat scalar and non-scalar argument types very differently. Netanel Rubin, The Perl Jam 2 Netanel is referring to this code from his talk, which uses the argument type to decide what to do: sub test { $arg1 = @_; # Get an argument if (ref $arg1 eq 'HASH') print $arg1{'key'}; else print $arg1; } Aside from the fact that Netanel’s code contains a big error which means it would never work, the claim that every other Perl project is coded in this way is preposterous. Dist::Zilla is a popular Perl project with over 20,000 lines of code. Can you guess how frequently Dist::Zilla uses the construct Netanel describes? A quick grep of the code shows zero instances. Bugzilla was developed in 1998, it is not an example of Modern Perl. Regarding CGI.pm, I can’t say it better than the official documentation: CGI.pm HAS BEEN REMOVED FROM THE PERL CORE The rationale for this decision is that CGI.pm is no longer considered good practice for developing web applications, including quick prototyping and small web scripts. There are far better, cleaner, quicker, easier, safer, more scalable, more extensible, more modern alternatives available at this point in time. CGI.pm documentation Claim 3: Perl doesn’t improve Things get interesting during the Q&A section of the talk when an audience member says: We use Perl for almost every module that we have at work, and it works really fine. I don’t know why you are picking Perl as a language to attack. It’s a really old language, and every language you can pick has problems, it doesn’t mean that … you have to stop using it. Audience Member, The Perl Jam 2 Netanel responds: C got criticized and it improved. PHP got criticized and it improved. Why can’t Perl be criticized too? … why don’t they improve the language? Netanel Rubin, The Perl Jam 2 The funny thing is Perl is improving all the time. Every year there is a major release of Perl which brings new features and enhancements to the language (history). Last year’s release included a new operator, the double diamond << >> which disables the piping open behavior shown earlier. CGI.pm was removed from Perl’s core modules list in May 2014. Both of those occurrences predate Netanel’s talk. Instead of waiting for a major release milestone, the Perl development team can fix critical security issues in a minor release if needed (for example see 5.16.3). Perl also has a strong toolchain for evaluating Perl code. Perl::Critic is a linter that reviews Perl code against recommended coding practices. There is even a policy to check for potential SQL injection vulnerabilities. Conclusion You can’t always live in the fear of not knowing what data type you are trying to handle … not trusting your hashes, not trusting your arrays, what’s next, not trusting your own code? Netanel Rubin, The Perl Jam 2 As someone who has years of experience writing professional Perl code, and working with Perl programmers, I do not recognize this experience at all. All Netanel has shown is an attack on some example code from a neglected module and a SQL injection bug in a legacy application. Is the Ruby language to blame for a vulnerability in Ruby-on-Rails? Is PHP insecure because over 950 exploits were found for WordPress? This isn’t a dynamic language issue either; in Static vs. dynamic languages: a literature review author Dan Luu found little evidence that statically typed languages were safer than dynamic ones. Anytime you fail to adequately parse untrusted input you’re going to have a bad day. Blaming Perl for developers’ bad code is like blaming the Alphabet for being turned into 50 Shades of Grey. This article was originally posted on PerlTricks.com. Tags David Farrell David is a professional programmer who regularly tweets and blogs about code and the art of programming. Browse their articles Feedback Something wrong with this article? Help us out by opening an issue or pull request on GitHub
ESSENTIALAI-STEM
There is no doubt that stress features in the life of a medical student. You will be overloaded with information, from the anatomy of the ankle to the pharmacology of medications for dementia, which you are expected to understand in a limited time frame, using it to pass extensive exams that can define your early career. Coupled to this, professionalism at what is often a young age is a necessity as you are required to practice clinical skills on patients who view you as a working component of the NHS. On top of that, you may be a star player on the Med school hockey team that has training and a match every week. Indeed, there will be times at medical school where you will feel pressure to not fall behind in any of your responsibilities and commitments.  So, how will you handle this? How do you deal with pressure currently in your life, and how can you apply that to deal with stress that you’ll have at medical school? It’s understandable that this is a not an uncommon question in a medical school interview. Students that don’t manage stress can often underperform academically as well as go on to have problems performing their role as a doctor later in their careers. Too much stress and not managing it correctly is also damaging to the individual’s health. To name a few, excessive amounts of stress predisposes you to sleeping disorders, reduced concentration, depression, suicidal thoughts, gastrointestinal disorders, coronary heart disease and an increased likelihood to self-medicate inappropriately using drugs and alcohol (1).   TYPES OF STRESS Before moving on to management strategies, it’s first necessary to identify different types of stress. Broadly speaking there are types of stress: short term (acute) and long term (chronic). Acute stress results from ‘on the spot’ scenarios where there is a demand in the very recent past and an anticipated pressure in the very near future (2). Examples of acute stress include presenting a poster of your research in front of your year group, finishing work for an imminent dead line and even being a member of the crash team responding to a cardiac arrest. Chronic stress is the stress of unrelenting demands for seemingly unceasing lengths of time. It results from incessant, repeated exposure of many acute episodes, leading to the individual losing hope of ever searching for a solution to the situation (3). Examples of chronic stress include the demand to stay on top of your growing list of work every week for the whole academic year or even financial stresses to save and conserve money such that you don’t go into the overdraft of your student loan.  MANAGING ACUTE STRESS When an episode of acute stress arises, it is necessary to manage not just the situation but your emotional response to the situation. Imagine this scenario: you have your first OSCE (clinical skills exam) in less than two hours and if you fail, you may have to resit the entire year. Firstly, take a breath and accept this situation as you can’t change the fact that you will have this exam. Next, be aware that you are stressed. The sensation of stress arises from the firing of neurons in a nucleus of the hypothalamus that causes a cascade leading to cortisol secretion from the adrenal glands (4). As a result, acknowledge the situation isn’t what makes you stressful but it’s how your brain responds to a situation. After this, look at the situation critically: what can you do to make yourself feel more prepared and less stressed? In other words, what’s the best way to spend your time between now and your OSCE? It may be to see your tutor, review your notes or maybe meet with friends to discuss components of the exam you don’t feel comfortable with. Use your answer to develop a plan on what you need to do in that current moment.  MANAGING CHRONIC STRESS Chronic stress requires more complex, life-altering approaches. If you do feel overwhelmed for a prolonged period and burnt out as a result of it, it’s important to communicate to senior members of staff. This is also the response you should use when stressed as a doctor. Concerning managing stress and preventing burn out at med school, some strategies are listed below: 1.) Stay healthy. Although this is easier said than done, eating a healthy, nutritious diet, exercising regularly and getting enough sleep prevents burnout and helps you manage stress. A good diet gives you more energy and alertness, helping you combat your tasks. Exercise releases endorphins, giving you a feeling of well-being. Sufficient amounts of regular sleep throughout the week will sharpen your attention, improve your memory as well as lowering cholesterol levels (which can influence high blood pressure, a component of stress) (5). 2.) Don’t neglect your hobbies. The extracurricular activities you enjoyed at school, whether they be sport, music or even art, are a great source of pleasure, gratification and a sense of accomplishment. In turn, new challenges outside of your course can give your mind time to relax (the old saying ‘a change is a as good as a rest’). 3.) Journal your feelings. Writing down why you are stressed allows you to have a narrative on things you are struggling with. Even if you just make a mind map on why you are stressed, it’s a great way to reflect on how you respond to circumstances, how you can improve your decision making and ultimately have more control on the way you think. 4.) Be proactive. If you are struggling to understand a topic of medicine, take responsibility for your learning by organising a study group with your peers or arrange a meeting with a lecturer to explain that topic to you. In doing so, you can solve issues you find difficult before they escalate into bigger problems.  ANSWERING THE QUESTION: HOW DO YOU DEAL WITH STRESS? • Identify the different types of stress, giving examples of both in your life  • When talking about acute stress, mention how you will be systematic, thinking critically about what you can do to improve the situation and working out how to do it. • When talking about chronic stress, mention strategies that you currently use. For example, you swim twice a week, you eat healthily, you keep a diary to reflect on what you are feeling at a point in time. It’s important to emphasise that these are strategies that work for you and that you can continue to use these whilst at medical school • Finish by explaining that if you do feel very overwhelmed, you will communicate to members of staff, using the student welfare systems in place, in a similar way to a junior doctor seeking advice from a consultant when struggling in their career.  CONCLUSION Whilst stress can be a great motivator, too much can overwhelm you leading to problems in your career and health. Determining strategies to deal with stress before you start medical school gives you the potential to manage the inevitable struggles you could face. Bibliography 1. https://www.researchgate.net/publication/298419251_Quality_of_Life_and_Depression_in_German_Medical_Students_at_Foreign_Universities 2. http://www.apa.org/helpcenter/stress-kinds.aspx 3. http://www.humanstress.ca/stress/understand-your-stress/acute-vs-chronic-stress.html 4. https://www.ncbi.nlm.nih.gov/pubmed/17615391 5. http://www.apa.org/news/press/releases/stress/2013/sleep.aspx Check out our Crash Courses: BMAT Course UCAT Course Interview Course 2021-07-27T10:24:14+00:00Interview Practice questions|Comments Off on Physician Heal Thyself: How will you deal with stress in medical school? About the Author: I'm a medical student at Cambridge University, and one of the co-founders of 6med. I created the BMAT Crash Course and Interview Crash Course, and helped code BMAT Ninja and UKCAT Ninja. If you need a hand with anything, feel free to give me a shout!
ESSENTIALAI-STEM
User:Dylananderson01 Dylan Anderson is a Canadian born former hockey player from Thunder Bay Ontario Dylan spent the majority of his hockey career in the Thunder Bay minor hockey league before spending time in scriber for the flanie falcons of the Lake Head Junior Hockey League
WIKI
[FOM] paraconsistent logic and computer science Arnon Avron aa at tau.ac.il Fri Oct 12 06:09:27 EDT 2007 On Fri, Sep 28, 2007 at 11:34:32AM +0200, Joseph Vidal-Rosset wrote: > I have a very simple question to you, because you are also a computer > scientist. > My question is about the definition and the utility of paraconsistent > logic in computer science, in artificial intelligence, and in science > in general. > > In what precise situations have we to allow $ p, \neg p \vdash q $ ? > It is very difficult for me to understand what is a "true > contradiction" and to admit "Dialetheism". I still believe that > rejecting contradiction as false is a sane methodological position in > science and in philosophy in general. > > So, could you convince me with understandable examples that allowing > paraconsistency, at least in some sense, is useful or even necessary, > in science? What expert system, or what theorem prover, for example > can accept it, and why? > > I allow you of course to cc. your reply to the FOM list, if you > believe that it can be a clarification for other colleagues. Dear Jo, Let me start with the most difficult part of your question: the utility of paraconsistent reasoning in science. First of all, I should clarify that my interest in paraconsistency is based on purely pragmatic considerations. I do not think that true contradictions exist "in nature". Moreover: like you, I believe that rejecting contradiction as false is a sane methodological position in science and in philosophy in general. In fact, it is the *only* sane position as long as we confine ourselves to really meaningful propositions. I maintain that it should be clear to anyone that in every area, a proposition can be taken as truly meaningful only if it has a definite classical truth-value: either true or false, and not both (whether we know this definite truth-value or not is not relevant). However, in all areas of science and life we use in our reasoning (and thinking in general) also sentences that are not really meaningful for themselves, but only look *as if* they express some proposition. This is true even in mathematics. In fact, this was the whole point of Hilbert's Program - and I basically agree with the Philosophy behind it (I disagree with Hilbert about the right division between the meaningful ("real") sentences and the in-principle-meaningless ("ideal") ones, but this is not important for the present discussion). Now according to the instrumentalist approach to the philosophy of science (on which Hilbert's Program has been based, and to which I partially adhere), the "ideal" sentences in some area of knowledge are nothing but an instrument for predicting/deriving the truth-value of real propositions. How to use such an instrument in a particular case should be decided according to two main criteria: efficiency in getting the desire results, and reliability of the results obtained by using the instrument. None of these criteria *forces* us to use classical logic. An instrument is only an instrument, and at least in principle, if in certain circumstances another instrument is more efficient and reliable than classical logic, it would be foolish not to use it. Now different areas usually have different criteria for reliability and efficiency. Thus in the empirical science reliability means success in experimental tests. When this is the supreme criterion I really do not see any reason why inconsistent theories equipped with some sophisticated paraconsistent inference mechanism may not prove to be very reliable and efficient. In fact, I suspect that this is exactly what happens from time to time in Physics (the dual character of the light, and the conflict that exists between general relativity and quantum mechanics might be two cases in point, but my knowledge and understanding of Physics are not sufficient for saying anything reliable here). In mathematics the criteria for reliability are of course different. But even here once we are ready to give up 100% reliability than I do not find it as totally inconceivable that some combination of *naive* set theory and a sophisticated paraconsistent logic might prove to be no less efficient and reliable in deriving true arithmetical propositions than the use of ZF extended by some of the more doubtful axioms of strong infinity. Such a combination might even better reflect Cantor's (and our) original intuitions about sets than do such extensions of ZF. After all, Cantor was aware of some of the paradoxes, and still he continues to develop set theory in a fruitful way. Obviously, he was not applying classical logic freely at that time, but some, more selective, paraconsistent mechanism (most probably different from all the paraconsistent systems suggested so far, including mine). [Still, it should be noted that choosing classical logic should be the default, because it does have two great advantages: 1) Its great advantage from the point of view of efficiency is simply that we are well acquainted with classical logic, and so it is much easier for us to use it. Moreover: the danger of not applying it correctly is much smaller than it is in case we use less natural logics. 2) From the point of view of reliability, the more the "ideal" sentences are based on strong intuitions according to which they do convey after all some truth about some abstract domain- the greater is our confidence in the results obtained by applying classical logic to them. Needless to say, the use of classical logic becomes 100% reliable in case we use in our reasoning *only* fully meaningful, real propositions.] Turning now to CS and AI, I think that the answer to your question is here much simpler, and was given by Belnap long ago. The knowledge store in a KB (Knowledge Base) usually comes from different sources, and so might be contradictory. Now even if one thinks that consistency should eventually be restored to the KB, doing this in a reliable and efficient way might take time, and during that time the KB must continue to function as efficiently and reliably as possible. This can be done only if it uses during that time an inference mechanism that tolerates the existence of contradiction (and since a KB is frequently updated, such a mechanism might be practically needed all the time). This message is already too long. So I'll stop here. Cheers Arnon Avron More information about the FOM mailing list
ESSENTIALAI-STEM
Food For Thought Water Healthy Tip Why Water! The benefits of drinking water are often underestimated and misunderstood.  Water is not just a thirst quencher it is also a critical element of the body’s biochemical process.   Drinking large amounts of water is required to staying alive. Being a macro nutrient, water is essential for a fit healthy body.  Water not only affects you internally but has external benefits.   It adds moisture to your skin giving you a natural glow.  Great all year round!  Keeping yourself hydrated during exercising allows you to have a more productive workout.  More water consumption will rid of toxicities in the blood giving you a clean feeling all over. Grab for water before going towards highly sugared empty calorie soft drinks and juices.  Since we have to consume calories make sure that they count for something than wasting it on a soft drink that won’t benefit you in the long run. Water is the basis for a healthy diet all around.   VEG
ESSENTIALAI-STEM
Watergate Halt railway station Watergate Halt was an intermediate halt on the initially privately run North Devon and Cornwall Junction Light Railway. "'It was one of those moments you always remember – a first glimpse, caught through the dappled sunlight of a woodland glade. Deep within the heart of North Devon, I came across this tiny wayside halt, no longer than a single carriage length.'" A remote rural station with one small siding used by a local farmer, it was closed in 1965 and now forms part of the popular Tarka trail, a route for ramblers promoted by the local council.
WIKI
Comments:New 'Star Wars' film to be released in August "No actors". What about voice actors? <IP_ADDRESS> 05:28, 13 February 2008 (UTC) They won't be "visible"! <IP_ADDRESS> 08:37, 13 February 2008 (UTC) * Nor audible. It's actually a silent movie for blind people. -- <IP_ADDRESS> 19:19, 13 February 2008 (UTC) Didn't... didn't this already happen? On Cartoon Network? Did I fall in a time warp? -<IP_ADDRESS> 22:18, 13 February 2008 (UTC) * No, note quite a time warp, but yes there was Star Wars: Clone Wars (2003), traditional animation, and now the upcoming Star Wars: The Clone Wars (2008) which is to be CGI. --SVTCobra 22:24, 13 February 2008 (UTC) new starwars movie animation = epic fail —Preceding unsigned comment added by <IP_ADDRESS> (talk) 23:11, 13 February 2008 (UTC) George lucas On behave of all star wars fans around the world God bless you :)
WIKI
summaryrefslogtreecommitdiff path: root/Documentation diff options context: space: mode: authorDavid Sterba <dsterba@suse.com>2016-09-01 18:51:18 +0200 committerDavid Sterba <dsterba@suse.com>2016-09-05 10:05:30 +0200 commit51d41fac76b6ef6c0b363000fc87a272cf2c0a8d (patch) treec414bff7ef3ff0e83edd297b3a6aeb92805c55e7 /Documentation parent752d8fda32ac645d0cfba82b10e26e17796e626b (diff) btrfs-progs: docs: describe filesystem features Signed-off-by: David Sterba <dsterba@suse.com> Diffstat (limited to 'Documentation') -rw-r--r--Documentation/btrfs-man5.asciidoc92 -rw-r--r--Documentation/btrfstune.asciidoc24 -rw-r--r--Documentation/mkfs.btrfs.asciidoc13 3 files changed, 122 insertions, 7 deletions diff --git a/Documentation/btrfs-man5.asciidoc b/Documentation/btrfs-man5.asciidoc index 467f11bf..a1f364e0 100644 --- a/Documentation/btrfs-man5.asciidoc +++ b/Documentation/btrfs-man5.asciidoc @@ -12,9 +12,12 @@ tools. Currently covers: 1. mount options -2. file attributes +2. filesystem features + +3. file attributes + +4. control device -3. control device MOUNT OPTIONS ------------- @@ -406,6 +409,91 @@ NOTE: This option has replaced 'recovery'. Allow subvolumes to be deleted by their respective owner. Otherwise, only the root user can do that. +FILESYSTEM FEATURES +------------------- + +The basic set of filesystem features gets extended over time. The backward +compatibility is maintained and the features are optional, need to be +explicitly asked for so accidental use will not create incompatibilities. + +There are several classes and the respective tools to manage the features: + +at mkfs time only:: +This is namely for core structures, like the b-tree nodesize, see +`mkfs.btrfs`(8) for more details. + +after mkfs, on an unmounted filesystem:: +Features that may optimize internal structures or add new structures to support +new functionality, see `btrfstune`(8). The command *btrfs inspect-internal +dump-super device* will dump a superblock, you can map the value of +'incompat_flags' to the features listed below + +after mkfs, on a mounted filesystem:: +The features of a filesystem (with a given UUID) are listed in +`/sys/fs/btrfs/UUID/features/`, one file per feature. The status of is stored +insid the file. The value '1' is for enabled, '0' means the feature was had +been enabled at the mount time and turned off afterwards. ++ +Whether a particular feature can be turned on a mounted filesystem can be found +in the directory `/sys/fs/btrfs/features/`, one file per feature. The value '1' +means the feature can be enabled. + +List of features (see also `mkfs.btrfs`(8) section 'FILESYSTEM FEATURES'): + +big_metadata:: +(since: 3.4) ++ +the filesystem uses 'nodesize' bigger than the page size +compress_lzo:: +(since: 2.6.38) ++ +the 'lzo' compression has been used on the filesystem, either as a mount option +or via *btrfs filesystem defrag*. + +default_subvol:: +(since: 2.6.34) ++ +the default subvolume has been set on the filesystem + +extended_iref:: +(since: 3.7) ++ +increased hardlink limit per file in a directory to 65536, older kernels +supported a varying number of hardlinks depending on the sum of all file name +sizes that can be stored into one metadata block + +mixed_backref:: +(since: 2.6.31) ++ +the last major disk format change, improved backreferences + +mixed_groups:: +(since: 2.6.37) ++ +mixed data and metadata block groups, ie. the data and metadata are not +separated and occupy the same block groups, this mode is suitable for small +volumes as there are no constraints how the remaining space should be used +(compared to the split mode, where empty metadata space cannot be used for data +and vice versa) ++ +on the other hand, the final layout is quite unpredictable and possibly highly +fragmented, which means worse performance + +no_holes:: +(since: 3.14) +improved representation of file extents where holes are not explicitly +stored as an extent, saves a few percent of metadata if sparse files are used + +raid56:: +(since: 3.9) ++ +the filesystem contains or contained a raid56 profile of block groups ++ +skinny_metadata:: +(since: 3.10) ++ +reduced-size metadata for extent references, saves a few percent of metadata + FILE ATTRIBUTES --------------- The btrfs filesystem supports setting the following file attributes using the diff --git a/Documentation/btrfstune.asciidoc b/Documentation/btrfstune.asciidoc index 68fec4c9..1e9aa703 100644 --- a/Documentation/btrfstune.asciidoc +++ b/Documentation/btrfstune.asciidoc @@ -17,7 +17,11 @@ parameters. The filesystem must be unmounted. The common usecase is to enable features that were not enabled at mkfs time. Please make sure that you have kernel support for the features. You can find a complete list of features and kernel version of their introduction at -https://btrfs.wiki.kernel.org/index.php/Changelog#By_feature . +https://btrfs.wiki.kernel.org/index.php/Changelog#By_feature . Also, the +manual page `mkfs.btrfs`(8) contains more details about the features. + +Some of the features could be enabled on a mounted filesytem. Please refer to +the respective section in `btrfs`(5). OPTIONS ------- @@ -26,14 +30,24 @@ Enable seeding on a given device. Value 1 will enable seeding, 0 will disable it A seeding filesystem is forced to be mounted read-only. A new device can be added to the filesystem and will capture all writes keeping the seeding device intact. -r:: +(since kernel: 3.7) ++ Enable extended inode refs (hardlink limit per file in a directory is 65536), -enabled by mkfs feature 'extref'. Since kernel 3.7. +enabled by mkfs feature 'extref'. -x:: +(since kernel: 3.10) ++ Enable skinny metadata extent refs (more efficient representation of extents), -enabled by mkfs feature 'skinny-metadata'. Since kernel 3.10. +enabled by mkfs feature 'skinny-metadata'. ++ +All newly created extents will use the new representation. To completely switch +the entire filesystem, run a full balance of the metadata. Please refer to +`btrfs-balance`(8). -n:: +(since kernel: 3.14) ++ Enable no-holes feature (more efficient representation of file holes), enabled -by mkfs feature 'no-holes'. Since kernel 3.14. +by mkfs feature 'no-holes'. -f:: Allow dangerous changes, e.g. clear the seeding flag or change fsid. Make sure that you are aware of the dangers. @@ -72,4 +86,6 @@ will become deprecated and removed afterwards. SEE ALSO -------- +`btrfs`(5), +`btrfs-balance`(8), `mkfs.btrfs`(8) diff --git a/Documentation/mkfs.btrfs.asciidoc b/Documentation/mkfs.btrfs.asciidoc index 5d79e24f..98fe694b 100644 --- a/Documentation/mkfs.btrfs.asciidoc +++ b/Documentation/mkfs.btrfs.asciidoc @@ -185,7 +185,12 @@ initramfs/initrd systems. FILESYSTEM FEATURES ------------------- +Features that can be enabled during creation time. See also `btrfs`(5) section +'FILESYSTEM FEATURES'. + *mixed-bg*:: +(kernel support since 2.6.37) ++ mixed data and metadata block groups, also set by option '--mixed' *extref*:: @@ -196,6 +201,8 @@ supported a varying number of hardlinks depending on the sum of all file name sizes that can be stored into one metadata block *raid56*:: +(kernel support since 3.9) ++ extended format for RAID5/6, also enabled if raid5 or raid6 block groups are selected @@ -205,6 +212,8 @@ are selected reduced-size metadata for extent references, saves a few percent of metadata *no-holes*:: +(kernel support since 3.14) ++ improved representation of file extents where holes are not explicitly stored as an extent, saves a few percent of metadata if sparse files are used @@ -351,4 +360,6 @@ further details. SEE ALSO -------- -`btrfs`(8), `wipefs`(8) +`btrfs`(5), +`btrfs`(8), +`wipefs`(8)
ESSENTIALAI-STEM
Big Love (Ali Campbell album) Big Love is the debut solo album by English singer and songwriter Ali Campbell, lead singer of the band UB40. It was released in 1995 and includes the singles "That Look in Your Eye", which reached number 5 in the UK Singles Chart, "Let Your Yeah Be Yeah", which reached number 25 and "Somethin' Stupid", a duet with Campbell's daughter Kibibi, which reached number 30.
WIKI
User:<IP_ADDRESS> List of serial killers by country Sorry, I reverted your edit because of the technical definition: Hitler was a mass murderer rather than a serial killer. best regards, --UnicornTapestry (talk) 13:27, 5 February 2011 (UTC)
WIKI
User:Bodacea Welcome I'm Sara-Jayne Farmer (a.k.a. Sara Farmer, or "SJ"). I'm British, born in Hanover Germany, and I spend most of my time designing systems to make information more available and accessible. My personal website is Overcognition.com. I also have a Crisis mapping habit. Bodacea (talk) 20:15, 25 January 2012 (UTC)
WIKI
XDRE is a Doom demo editor by xepop. It is based on prboom-plus and uses wxWidgets GUI toolkit. vita b1ed87a6de Fix desyncs after loading a singleplayer demo after a multiplayer one. 3 years ago autotools 88e2f60fcf Initial commit. 3 years ago src b1ed87a6de Fix desyncs after loading a singleplayer demo after a multiplayer one. 3 years ago .gitignore 865f2b470d Update prboom-plus to r4512. 3 years ago COPYING 88e2f60fcf Initial commit. 3 years ago Makefile.am 88e2f60fcf Initial commit. 3 years ago README.md 6310f0d57d Fixed segfaults after changing players and consoleplayer was not in the game. 3 years ago bootstrap 88e2f60fcf Initial commit. 3 years ago configure.ac 10cf13b4e6 Update prboom-plus to r4518. 3 years ago i686-w64-mingw32-build.sh 38ef47ce48 Typo. 3 years ago old_README_by_xepop 88e2f60fcf Initial commit. 3 years ago x86_64-w64-mingw32-build.sh c25b073a66 Fixed thing tracing. 3 years ago README.md XDRE PrBoom-Plus revision: 4519. Known issues: 1. XDRE crashes with some DeleteTicX values. To do: 1. Make header editor more useful (remove compatflags shit). 2. Add longtics support in brute force. Releases [+] — added, [-] — removed, [*] — fixed/changed. 2.22 (??.??.??) [*] Updated prboom-plus to r4519. [*] Thing tracing now uses an array with pointers. [*] Made wxString::FromCDouble in MainWindow::OnSectorInput consistent. [*] Fixed segfaults after changing players and consoleplayer wasn't in the game. 2.21 (23.02.17) [*] Updated to SDL2. [*] Updated prboom-plus to r4514. [+] Window (both wx and Doom) positions are now saved in xdre/xdre.ini. [*] Make text positions look better on wxGTK (Debian GNU/Linux, MATE). [*] Strafe value -128 is fine, remove the check in xdre::strafe(). [+] Added a dialog to set keys. [+] Save savepoint mode in xdre/xdre.ini. [*] Fixed a crash when trying to use DeleteTic when tic list is empty. [*] The default savepoint mode is Start. 2.20 (21.12.16) [+] Linedef, sector, thing indexes for tracing and angle type are now saved in xdre.ini. [+] Added thing tracing. Although it's buggy, mobj->index == 0 is player 1. [*] Fixed a segfault on almost every Valiant map and Sunder maps 11 and 14. [+] Added longtics in the header editor. Only with vanilla complevels. 2.19 (25.11.16) [+] Added transposing (TransposeLeft and TransposeRight in xdre.ini). tr or ty, mode 0 changes turn and movement commands, 1 changes only turns, 2 changes only moves. [+] Added header editing. 2.18 (18.11.16) [*] Changed text positions so they look better on Windows 10 (thanks to JCD for mentioning). [*] You can use TurnStep with short turns. [*] No more crash in co-op demos when adding tics (existed since 2.14). [+] You can save demos with a footer (demo_extendedformat in the config). Obviously, with setting it to 0 demos with the footer will lose it after saving. 2.17 (31.10.16) [+] Added longtics support. You can set longtics turn step with ts, the command is called TurnStep in the config. [+] Added sector tracing. [*] Updated PrBoom-Plus codebase to 2.5.1.4 release (r4459). [+] Added -solo-net support. [*] Restored output to stdout and stderr (you can find out what's wrong). [*] Fixed advanced HUD. [*] Angle values are now unsigned shorts (that's what longtics allows). E. g. 0 is east, 16384 is north. You can enable degrees, unsigned chars or fine angles (0-8191) if you want, too. [*] "Direction moved" field now uses degrees (why would you want float with values from 0 to 65536?). [*] You can't use MB128/SL128 tics anymore. [+] You can copy/delete tics multiple times with tc and tx. Deleting removes previous tics (e. g. you're on tic 7, then you type tx2, you're on tic 5). The commands are called CopyTicX and DeleteTicX in the config. [*] RNG uses wxDefaultValidator again instead of integer validator. [+] Doom window now understands keypresses (you can press - or =, for example). 2.16 (27.10.16) [+] You can trace more than one linedef. [*] Some UI changes. [-] Removed Visual C references in the source (I don't really need them). 2.15 (21.10.16) [*] Fixed crash at certain tics with ssp. (still crashes after 1M tics) 2.14 modified (20.10.16) [*] Fixed changing to SSG in Boom demos. [+] Added Z position, added real separate speeds (X, Y and Z difference). [*] Savepoints limit raised to MAP100 maximum. [*] Vertex coordinates don't have .000000 anymore. [*] Fixed crash without ssp at tics 10, 20, 40, 80 etc, not with ssp. [-] Removed Code::Blocks references.
ESSENTIALAI-STEM
Scott Bradfield Scott Michael Bradfield (born April 27, 1955) is an American essayist, critic and fiction writer who resides in London, England. He has taught at the University of California, the University of Connecticut and Kingston University and has reviewed for The Times Literary Supplement, Elle, The Observer, Vice and The Independent. He is best known, however, for his short stories, of which he has had four collections published. The 1998 film Luminous Motion, for which he wrote the screenplay, was based on his first novel, The History of Luminous Motion (1989). Bradfield also operates a public youtube channel, where he uploads videos on a variety of books and literary topics. Bradfield currently teaches at St. Mary's University and City Literary Institute. Novels * Animal Planet New York: Picador USA, 1995. ISBN 978-0-312-13428-0 * Good Girl Wants It Bad New York: Carroll & Graf, 2004. ISBN 978-0-7867-1338-7 * The People Who Watched Her Pass By Columbus, Ohio: Two Dollar Radio, 2010. ISBN 978-0-9820151-5-5 * Dazzle Resplendent: Adventures of a Misanthropic Dog: 2016, ISBN<PHONE_NUMBER>960 * The People Who Watched Her Pass By Columbus, Ohio: Two Dollar Radio, 2010. ISBN 978-0-9820151-5-5 * Dazzle Resplendent: Adventures of a Misanthropic Dog: 2016, ISBN<PHONE_NUMBER>960 * Dazzle Resplendent: Adventures of a Misanthropic Dog: 2016, ISBN<PHONE_NUMBER>960 Short fiction * Collections * The Secret Life of Houses London: Unwin Hyman, 1989. ISBN 978-0-04-440241-1 * Dream of the Wolf New York: Knopf, 1990. ISBN 978-0-394-58213-9 * Greetings from Earth: New and Collected Stories New York: Picador USA, 1996. ISBN 978-0-312-14088-5 * Hot Animal Love: Tales of Modern Romance New York: Carroll & Graf, 2005. ISBN 978-0-7867-1576-3 * Stories Criticism * Dreaming Revolution: Transgression in the Development of American Romance. Iowa City: University Of Iowa Press, 1993. ISBN 978-0-87745-395-6 * Why I Hate Toni Morrison's Beloved: First presented as the Seymour Fischer Lecture at the Free University of Berlin, on January 17, 2001. It was revised and expanded and published in the Denver Quarterly and later reprinted online . Published by Createspace Independent Publishing Platform (2016): ISBN<PHONE_NUMBER> ISBN<PHONE_NUMBER>764
WIKI
Kırca, Bigadiç Kırca is a neighbourhood in the municipality and district of Bigadiç, Balıkesir Province in Turkey. It has a population of 230 (2022).
WIKI
AUTO-OWNERS INSURANCE COMPANY, Appellant-Plaintiff, v. BANK ONE; Bank One Indiana, Corp.; Bank One, N.A., Bank One, Indiana, N.A.; Bank One, Inc., Appellees-Defendants. No. 49A04-0511-CV-647. Court of Appeals of Indiana. Aug. 15, 2006. Bruce N. Elliott, Conlin, McKenney & Philbrick, P.C., Ann Arbor, MI, Thomas R. Haley, III, Jennings Taylor Wheeler & Haley, P.C., Carmel, IN, for Appellant. Jeffrey C. McDermott, Mare T. Quigley, Krieg DeVault, LLP, Indianapolis, IN, for Appellees. OPINION ROBB, Judge. Case Summary and Issue Auto-Owners Insurance Company ("Auto-Owners") appeals the trial court's order granting Bank One's motion for summary judgment and denying Auto-Owners' motion for partial summary judgment. Auto-Owners raises four issues for our review, which we consolidate and restate as whether the trial court properly granted Bank One's motion for summary judgment and denied Auto-Owners' motion for partial summary judgment. Because the discovery rule does not apply to claims for conversion of a negotiable instrument, Auto-Owners' claims for negli-genee and conversion based on any checks negotiated before October 30, 1995, are barred by the statute of limitations. Bank One is entitled to summary judgment on Auto-Owners' claims based on checks negotiated after October 30, 1995, because it proved the defense available to it under Indiana Code section 26-1-3.1-405(b), and because Auto-Owners did not show the existence of a genuine issue of material fact regarding whether Bank One failed to exercise ordinary care in taking the checks for deposit. The trial court's order granting Bank One's motion for summary judgment and denying Auto-Owners' motion for partial summary judgment is therefore affirmed. Facts and Procedural History Between 1988 and 1998, Kenneth Wulf was employed by Auto-Owners as a field claims representative and resident adjuster. Wulf resided in Bloomington, Indiana, but spent a good deal of his time working out of Auto-Owners' Indianapolis branch office. As a claims representative, Wulf was responsible for determining whether Auto-Owners should pursue a subrogation or a salvage claim. Salvage involves an insurance company taking control of certain property, usually a wrecked car, after payment of a claim for loss, and then selling that property. With subrogation, an insurance company steps into the shoes of its insured following the payment of a claim, and then pursues the claim of its insured. If a salvage or a subrogation claim was warranted, the claims representative was responsible for every aspect of the claim process. The claims representative was supposed to place a notation in the file indicating that subrogation or salvage was being pursued. If the claim involved subrogation, the claims representative was responsible for hiring an attorney to pursue the claim, and would be the subrogation attorney's sole contact. The claims representative had the authority to settle a subrogation or a salvage claim up to a certain dollar amount. When Auto-Owners received a check for subrogation or salvage, the clerical staff initially handled the check. The clerical staff would open the daily mail, remove any subrogation or salyage checks, attach the check to the appropriate file, and give the file to the claims representative. The clerical staff did not keep a record of the subrogation and salvage checks that were received. Furthermore, Auto-Owners did not maintain a list of all pending subrogation or salvage claims. The only way a branch manager could determine whether a salvage or subrogation claim was pending was to look at the file. When the claims representative received a file with a subrogation or salvage check, he or she was responsible'for processing the check by making a notation in the file indicating that the check was received. The claims representative was then supposed to complete a transmittal form for the check, and return the check to the clerical staff who would mail the check to Auto-Owners' home office in Lansing, Michigan, where it would be deposited. While Wulf worked for Auto-Owners, Auto-Owners required its branch managers to review both open and closed claims files every six months. The branch managers would look for any errors in the files and would also examine whether subrogation or salvage claims should be pursued or, if they had been pursued, were being handled properly. Once a file was permanently closed, it would be sent to Auto-Owners' home office for storage. Senior claims examiners at the home office performed random audits on closed files, and would also review all files that involved claims over a certain threshold amount. During these reviews, the senior claims examiners would assess whether subrogation and salvage were handled properly. Periodically, Auto-Owners branch managers received salvage sheets from salvage buyers. The salvage sheet identified the vehicles that had been received at the salvage yard, listed the claim number, and stated whether the vehicle had been sold. It was Auto-Owners' policy to reconcile lists that identified when salvage was due with the salvage sheets. In 1991, Wulf opened a sole proprietorship account ("the Account") at a Bank One branch in Bloomington. The name on the Account was "Auto Owners Insurance," and Wulf was the only signer on the Account. Bank One's policies and procedures for opening a new account specified that the customer must produce identification and a social security number. In opening a business account, Bank One required the customer to provide a number of legal documents in order to establish ownership. These documents included, where applicable, an assumed business name certificate, a certificate of incorporation, and a corporate resolution. Wulf stated that in opening the Account, Bank One did not require him to produce any documents. He specifically related that Bank One did not ask for the articles of incorporation, a resolution from the board of directors, or any other document authorizing him to open the account. During discovery, Bank One stated that it was "unable to locate any documents relating to the opening of the account." Appellant/Plaintiffs Appendix at 481. At his deposition, Wulf testified that he did not have permission or authorization from Auto-Owners to open the Account. Shortly after opening the Account, Wulf began stealing subrogation and salvage checks. To do this, Wulf would pursue either a subrogation or salvage claim but not leave a notation about this in the claim file. Without a notation in the file, no one working at Auto-Owners' Indianapolis branch anticipated the arrival of a subro-gation or salvage check. When a subrogation or salvage check arrived in the mail, the clerical staff would attach the check to the claim file and give the file to Wulf. Wulf then would pocket the check. The checks were made payable to Auto-Owners and had payee names such as "Auto-Owners Insurance Company," "Auto-Owners Insurance," "Auto-Owners Insurance Co.," and "Auto-Owners Insurance as Sub-rogee of-." Id. at 558-71. Wulf fraudulently endorsed the checks using a stamp he had specially made that said, "Auto Owners Insurance Deposit Only." Id. at 295. Wulf deposited the fraudulently endorsed checks into the Account even though he had no authority to sign or endorse checks on behalf of Auto-Owners. Bank One accepted each of the checks deposited by Wulf. Auto-Owners discovered Wulf s illegal conduct in 1998. After conducting an investigation, Auto-Owners learned that Wulf embezzled over 106 checks totaling more than $545,000. Criminal charges were later filed against Wulf, who pled guilty to two counts of forgery and one count of theft. On October 30, 1998, Auto-Owners filed suit against Bank One alleging that Bank One was negligent. It later amended its complaint to add a claim for conversion under Indiana Code section 26-1-3.1-420(a). Bank One filed an answer to Auto-Owners' complaint raising several affirmative defenses including the statute of limitations. On December 3, 2008, Auto-Owners filed a partial motion for summary judgment on Bank One's statute of limitations defense. Bank One filed a motion for summary judgment on both of Auto-Owners' causes of action and a response to Auto-Owners' motion for partial summary judgment on March 12, 2004. The trial court held a hearing on both parties' motions for summary judgment on September 21, 2005. On October 14, 2005, the trial court issued an order denying Auto-Owners' motion for partial summary judgment, granting Bank One's motion for summary judgment, entered judgment in favor of Bank One, and dismissed Auto-Owners' complaint. This appeal ensued. Discussion and Decision Auto-Owners argues that the trial court erred in granting Bank One's motion for summary judgment and in denying Auto-Owners' motion for partial summary judgment. We disagree. I. Standard of Review When we determine the propriety of an order granting summary judgment, we use the same standard of review as the trial court. Ryan v. Brown, 827 N.E.2d 112, 116 (Ind.Ct.App.2005). Summary judgment is appropriate only if there is no genuine issue as to any material fact and the moving party is entitled to judgment as a matter of law. Ind. Trial Rule 56(C). "The party moving for summary judgment has the burden of making a prima facie showing that there is no genuine issue of material fact and that it is entitled to judgment as a matter of law." Ryan, 827 N.E.2d at 117. If the moving party meets these two requirements, then the burden shifts to the non-moving party to show the existence of a genuine issue of material fact by setting forth specifically designated facts. Id. "We must accept as true those facts alleged by the nonmoving party, construe the evidence in favor of the nonmov-ing party, and resolve all doubts against the moving party." Id. Summary judgment will be affirmed if it is sustainable on any theory or basis found in the evidentia-ry matter designated to the trial court. Inlow v. Inlow, 797 N.E.2d 810, 815-16 (Ind.Ct.App.2003), trans. denied. II. Statute of Limitations The parties first dispute whether Auto-Owners' claims are barred by the statute of limitations. Auto-Owners filed a motion for partial summary judgment on Bank One's statute of limitations defense arguing that its claims were not barred by the statute of limitations because the discovery rule applied. In its motion for summary judgment, Bank One argued that the discovery rule did not apply, and that it was entitled to summary judgment because Auto-Owners' claims were barred by the statute of limitations. The trial court denied Auto-Owners' partial motion for summary judgment and granted Bank One's motion for summary judgment. Auto-Owners contends that the statute of limitations does not bar its claims, and therefore, the trial court erred to the extent that it granted Bank One's motion for summary judgment on this basis. The parties agree that the applicable statute of limitations in this case is found in Indiana Code section 26-1-3.1-118(g). That statute provides that an action "for conversion of an instrument, for money had and received, or like action based on conversion ... must be commenced within three (3) years after the cause of action accrues." Ind.Code § 26-1-3.1-118(g). Auto-Owners argues that its negli-genee and conversion claims are not barred by this statute of limitations because the discovery rule applies. The discovery rule provides that "a cause of action accrues when the plaintiff knew or, in the exercise of ordinary diligence, could have discovered that an injury had been sustained as a result of the act of another." UNR-Rohn, Inc., a Div. of UNR Indus., Inc. v. Summit Bank of Clinton County, 687 N.E.2d 235, 240 (Ind.Ct.App.1997), trans. denied. Auto-Owners notes that it did not discover Wulf s illegal conduct until 1998. If the discovery rule applies to Indiana Code section 26-1-3.1-118(g), Auto-Owners cause of action accrued in 1998, and it then had three years to file suit against Bank One. Auto-Owners asserts that it timely filed its complaint on October 30, 1998. Therefore, Auto-Owners concludes that its claims against Bank One are not barred by the statute of limitations, and that Bank One is not entitled to summary judgment on this ground. Auto-Owners principally relies upon UNR-Rohn to support its contention that the discovery rule applies here. In that case, UNR-Rohn employed Robert Pearson as an administrative manager. Pearson was responsible for conducting certain banking transactions for UNR-Rohn. Between 1984 and April of 1991, Pearson embezzled hundreds of third-party checks made payable to UNR-Rohn. Pearson either deposited or cashed these checks at the Summit Bank of Clinton County ("the bank"). UNR-Rohn discovered Pearson's illegal conduct in April of 1991. On February 11, 1993, UNR-Rohn filed a complaint against the bank alleging that the bank committed conversion under Indiana Code section 26-1-3-419, which at that time was part of Indiana's Uniform Commercial Code ("U.C.C.") but has since been repealed. The bank filed a motion for summary judgment arguing that UNR-Rohn's claims were barred by the statute of limitations. The trial court rejected the bank's statute of limitations defense, and the bank filed an appeal solely on that issue. We began by noting that the parties agreed that "the two-year statute of limitations for injury to personal property under Ind.Code § 34-1-2-2(1) applies to UNR-Rohn's conversion claim under I.C. 26-1-3419." UNR-Rohn, 687 N.E.2d at 240. In a footnote we stated, "During the period in question, Indiana's version of the U.C.C. did not specify a statute of limitations for conversion of negotiable instruments." Id. at 240 n. 3. We pointed out that since 1992, in determining when a cause of action accrues under Indiana Code section 34-1-2-2, we consistently applied the discovery rule. Id. at 240. We also noted that in Wehling v. Citizens Nat. Bank, 586 N.E.2d 840, 843 (Ind.1992), our supreme court expanded the application of the discovery rule to all tort actions. Id. Despite recognizing that no Indiana case had applied the discovery rule to an action for conversion of a negotiable instrument and that the vast majority of jurisdictions had concluded that the discovery rule should not apply to an action for conversion of a negotiable instrument, we stated: [T]he holding of Wehling and the reasoning inherent in it logically applies to all tort actions. To carve out an exception to the discovery rule in injuries to personal property involving conversion of negotiable instruments would be wholly incongruous and inconsistent with Indiana's system of jurisprudence. Id. at 241. We noted that Pearson stole checks from UNR-Rohn from 1984 to 1991. UNR-Rohn did not become suspicious of Pearson until April of 1991. We determined that these facts were "sufficient to raise a factual dispute regarding when UNR-Rohn could have, in the exercise of ordinary diligence, discovered the conversion of the checks." Id. Therefore, we concluded that the trial court properly denied the bank's motion for summary judgment based on the statute of limitations. Id. UNR-Rohn is distinguishable. In UNR-Rohn, Indiana's version of the U.C.C. did not specify a statute of limitations for claims for conversion of a negotiable instrument. However, Indiana has now adopted a statute of limitations for claims involving conversion of a negotiable instrument in Indiana Code section 26-1-3.1-118(g), and we are bound to apply that statute here. Auto-Owners argues that we should read the discovery rule into Indiana Code section 26-1-3.1-118(g). We refuse to do this because it would be contrary to the intent of our legislature. The specific language of Indiana Code section 26-1-3.1-118(g) does not expressly mention the discovery rule or use the language of that rule. Yet, other portions of Indiana's TU.C.C., such as Indiana Code sections 26-1-3.1-417(F), 26-1-4-207(e), and 26-1-4-208(F), use the language of the discovery rule. Pursuant to the principle expressio unius est exclusio alterius, which means that the enumeration of certain things in a statute necessarily implies the exclusion of all others, Brandmaier v. Metro. Dev. Comm'n of Marion County, 714 N.E.2d 179, 180 (Ind.Ct.App.1999), trans. denied, our legislature's use of the discovery rule in some portions of the U.C.C. and not in Indiana Code section 26-1-3.1-118(g) indicates that the legislature did not intend for the discovery rule to apply to claims involving the conversion of a negotiable instrument. Additionally, we note that a majority of jurisdictions have refused to apply the discovery rule to claims for conversion of a negotiable instrument. See John Hancock Fin. Servs., Inc. v. Old Kent Bank, 346 F.3d 727, 733-34 (6th Cir.2003); Menichini v. Grant, 995 F.2d 1224, 1229-32 (3d Cir.1998); Kuwait Airways Corp. v. American Sec. Bank, N.A., 890 F.2d 456, 460-63 (D.C.Cir.1989); New Jersey Lawyers' Fund for Client Protection v. Pace, 186 N.J. 123, 892 A.2d 661, 662 (2006); Hollywood v. First Nat'l Bank of Palmerton, 859 A.2d 472, 482 (Pa.Super.Ct.2004); Pero's Steak and Spaghetti House v. Lee, 90 S.W.3d 614, 624 (Tenn.2002); Brennan v. Edward D. Jones & Co., 245 Mich.App. 156, 626 N.W.2d 917, 920 (2001); Haddad's of Ilinois, Inc. v. Credit Union 1 Credit Union, 286 Ill.App.3d 1069, 222 Ill.Dec. 710, 678 N.E.2d 322, 325-26 (1997); Palmer Mfg. & Supply, Inc. v. BancOhio Nat'l Bank, 93 Ohio App.3d 17, 637 N.E.2d 386, 390-91 (1994); Husker News Co. v. Mahaska State Bank, 460 NW.2d 476, 479 (Iowa 1990). Two reasons are commonly given for adopting this position. The first rationale is that "application of the discovery rule would be inimical to the underlying purposes of the UCC, including the goals of certainty of liability, finality, predictability, uniformity, and efficiency in commercial transactions." Rodrigue v. Olin Employees Credit Union, 406 F.3d 434, 445 (7th Cir.2005). A second reason given by courts for adopting this position is that a claim for conversion of negotiable instruments is unlike other claims to which the discovery rule has been applied. For example, the discovery rule generally has been applied where the actual injury does not manifest itself until years after the tortious conduct occurred and long after the statute of limitations expired. In contrast, the tort of conversion is complete and the injury occurs at the moment the tortfea-sor appropriates the plaintiff's property to his or her own use or benefit by exercising dominion over it in violation of the true owner's rights. When the property converted is a negotiable instrument, the damage is done, and the tort is complete when the instrument is negotiated, regardless of the plaintiff's ignorance of the conversion. Pero's Steak and Spaghetti House, 90 S.W.3d at 623 (citations omitted). We believe that both of these rationales are sound, and conclude that the discovery rule should not apply to claims for conversion of a negotiable instrument. Here, Wulf began stealing subrogation and salvage checks from Auto-Owners in 1991, and Auto-Owners did not discover Wulf s conduct until 1998. Auto-Owners filed suit against Bank One on October 30, 1998. Any cause of action Auto-Owners may have had accrued at the time each check was negotiated by Wulf. Because Auto-Owners' causes of action are subject to the three-year statute of limitations provided in Indiana Code section 26-1-8.1-118(g), Auto-Owners' claims based on any checks deposited before October 30, 1995, are barred by the statute of limitations. III. Negligence and Conversion Claims We next consider whether the trial court properly granted Bank One summary judgment with respect to Auto-Owners' claims based on checks negotiated after October 30, 1995. Auto-Owners argues that Bank One committed negligence under either Indiana Code section 26-1-3.1-405 or Indiana Code section 26-1-3.1-406, and that it committed conversion under Indiana Code section 26-1-3.1-420(a). Bank One contends that it is entitled to summary judgment on Auto-Owners' negligence and conversion claims because it proved the defense available to it under Indiana Code section 26-1-3.1-405(b), and because it exercised ordinary care in taking the checks negotiated by Wulf. Indiana Code section 26-1-3.1-405(b) provides as follows: For the purpose of determining the rights and liabilities of a person who, in good faith, pays an instrument or takes it for value or for collection, if an employer entrusted an employee with responsibility with respect to the instrument and the employee or a person acting in concert with the employee makes a fraudulent endorsement of the instrument, the endorsement is effective as the endorsement of the person to whom the instrument is payable if it is made in the name of that person. If the person paying the instrument or taking it for value or for collection fails to exercise ordinary care in paying or taking the instrument and that failure substantially contributes to loss resulting from the fraud, the person bearing the loss may recover from the person failing to exercise ordinary care to the extent the person bearing the loss proves that the failure to exercise ordinary care substantially contributed to the loss. The first sentence of section 405(b) provides a defense for Bank One. The official U.C.C. comment number one for Indiana Code section 26-1-3.1-405 states that the first sentence of section 405(b) "adopts the principle that the risk of loss for fraudulent indorsements by employees who are entrusted with responsibility with respect to checks should fall on the employer rather than the bank that takes the check or pays it, if the bank was not negligent in the transaction." Liability is placed on the employer based on the belief that the employer is in a far better position to avoid the loss by care in choosing employees, in supervising them, and in adopting other measures to prevent forged indorsements on instruments payable to the employer or fraud in the issuance of instruments in the name of the employer. Ind.Code § 26-1-3.1-405 cmt. 1. However, Auto-Owners argues that even if Bank One can prove its defense, Auto-Owners still has the opportunity under section 405(b) to shift a portion of its loss to Bank One. The second sentence of section 405(b) adopts a system of comparative negligence. Duong v. Bank One, N.A., 169 S.W.3d 246, 250 (Tex.App.2005). Under this portion of section 405(b), if the bank failed to exercise ordinary care, the employer is allowed to shift loss to the bank to the extent the bank's failure to exercise ordinary care contributed to the loss. Ind.Code § 26-1-3.1-405 emt. 1. We begin by considering whether Bank One proved its defense under section 405(b). A. Bank One's Section 405(b) Defense In order to prove its defense under seetion 405(b), Bank One must show (1) that Wulf was Auto-Owners' employee; (2) that Auto-Owners entrusted Wulf with responsibility with respect to subrogation and salvage checks; (3) that Wulf fraudulently endorsed subrogation and salvage checks; (4) that the endorsement was made in the name of the person to whom the instrument was payable; and (5) that Bank One took the fraudulently endorsed subrogation or salvage checks in good faith, The parties do not dispute that Wulf was Auto-Owners' employee, and that he fraudulently endorsed subrogation and salvage checks. Bank One argues that Auto-Owners entrusted Wulf with responsibility for subrogation and salvage checks. Indiana Code section 26-1-3.1-405(a)(3) defines "responsibility" as follows: (3) "Responsibility" with respect to instruments means authority: (A) to sign or endorse instruments on behalf of the employer; (B) to process instruments received by the employer for bookkeeping purposes, for deposit to an account, or for other disposition; (C) to prepare or process instruments for issue in the name of the employer; (D) to supply information determining the names or addresses of payees of instruments to be issued in the name of the employer; (E) to control the disposition of instruments to be issued in the name of the employer; or (F) to act otherwise with respect to instruments in a responsible capacity. "Responsibility" does not include authority that merely allows an employee to have access to instruments or blank or incomplete instrument forms that are being stored or transported or are part of incoming or outgoing mail or similar access. Here, Wulf was responsible for all aspects of subrogation and salvage claims. When subrogation or salvage checks arrived at Auto-Owners' Indianapolis branch, the clerical staff removed the checks from the mail, attached them to the appropriate file, and gave the file to the claims representative working on that claim. Auto Owners maintained no check log or other record prior to giving the check to the claims representative. When Wulf received a subrogation or salvage check, he was supposed to make a notation in the file to indicate that the check was received. Wulf was then supposed to complete a transmittal form for the check, and return the check to the clerical staff who would mail the check to Auto-Owners' home office in Michigan. These facts reveal that Auto-Owners entrusted Wulf with responsibility for subrogation and salvage checks in that he was supposed to process these checks for disposition, and that he was supposed to act in a responsible capacity with respect to these instruments. Additionally, during the period that Wulf worked for Auto-Owners, Wulf s branch manager was required to review each of Wulf s files every six months. While conducting these reviews, the branch manager considered whether sub-rogation or salvage should be pursued, or if they had been pursued, whether it was done properly. After a file was permanently closed and sent to Auto-Owners' home office, senior claims examiners performed random audits on files and would also review all files that involved claims over a certain threshold amount. During these reviews, the senior claims examiners would assess whether subrogation and salvage were handled properly. These oversight procedures would not have been nee-essary if claims representatives like Wulf were not entrusted by Auto-Owners with responsibility for subrogation and salvage checks. Therefore, we conclude that Auto-Owners entrusted Wulf with responsibility for subrogation and salvage checks. Bank One next argues that Wulf endorsed the subrogation and salvage checks in the name of the person to whom the instrument was payable. Indiana Code section 26-1-3.1-405(c) states: [A]n endorsement is made in the name of the person to whom an instrument is payable if: (1) it is made in a name substantially similar to the name of that person; or (2) the instrument, whether or not endorsed, is deposited in a depositary bank to an account in a name substantially similar to the name of that person. Here, Wulf endorsed the subrogation and salvage checks in a name identical to or substantially similar to the name of the payees on the checks. The checks in question had payee names such as "Auto-Owners Insurance Company," "Auto-Owners Insurance," "Auto-Owners Insurance Co.," and ."Auto-Owners Insurance as Subrogee of-." Appellant/Plaintiff's App. at 558-TL Wulf fraudulently endorsed the checks using a stamp that he had specially made that said, "Auto Owners Insurance Deposit Only." Id. at 295. Wulf also deposited the checks into an account that had a name substantially similar to the name of the payee on the checks. The name of the Account was "Auto Owners Insurance," and the subrogation and salvage checks were made payable to "Auto-Owners Insurance Company," "Auto-Owners Insurance," "Auto-Owners Insurance Co.," and "Auto-Owners Insurance as Subrogee of-." Id. at 558-71. However, Auto-Owners argues that Wulf did not endorse the subrogation and salvage checks in a name substantially similar to the name of the person to whom the instrument was payable. Auto-Owners relies on In re McMullen Oil Co., 251 B.R. 558 (Bankr.C.D.Cal.2000), to support its position. In that case, the court concluded that "McMullen Oil Co. Pension Plan" was not substantially similar to the name of the payee on the checks, which was "McMullen Oil Co." Id. at 576. The court, though, indicated that names like "ABC, Inc.," "ABC Corp.," "ABC Co.," or "ABC Co., Inc." would be considered substantially similar to each other. Id. at 575. The facts presented here are more akin to those situations where the McMullen Oil court indicated that the names would be considered substantially similar. The name of the Account was "Auto Owners Insurance," and Wulf endorsed the checks by stamping them "Auto Owners Insurance Deposit Only." The payee names on the checks were "Auto-Owners Insurance Company," "Auto-Owners Insurance," "Auto-Owners Insurance Co.," and "Auto-Owners Insurance as Subrogee of-." The name of the Account and the endorsement on the checks did not contain any extra words like "pension plan" that would obviously distinguish it from the payee names on the checks. Therefore, we conclude that Bank One has shown that Wulf endorsed the subrogation and salvage checks in a name substantially similar to the name of the person to whom the instruments were payable. Bank One also argues it took the fraudulently endorsed subrogation and salvage checks in good faith. "Good faith" means "honesty in fact and the observance of reasonable commercial standards of fair dealing." Ind.Code § 26-1-3.1-103(a)(4). "A finding of bad faith is warranted if a bank for an extended period of time and despite bank policies dictating otherwise permits a person to deposit stolen checks to an account that does not belong to the payee." Continental Cas. Co. v. Fifth/Third Bank, 418 F.Supp.2d 964, 973 (N.D.Ohio 2006). Nevertheless, "a bank's failure to follow commercially reasonable banking procedures or to comply with its own policies generally will not constitute a lack of good faith." Shearson Lehman Bros., Inc. v. Wasatch Bank, 788 F.Supp. 1184, 1194 (D.Utah 1992). "Accordingly, absent some indication that the bank has acted in a subjectively dishonest or intentional manner in improperly accepting a check over a forged indorsement, the bank will be held to have acted in good faith." Id. Here, between 1991 and 1998, Bank One accepted forged checks from Wulf for deposit. In doing this, though, there is no evidence that Bank One violated its own policies or acted contrary to reasonable commercial standards of fair dealing. The checks Wulf deposited were payable to "Auto-Owners Insurance Company," "Auto-Owners Insurance," "Auto-Owners Insurance Co.," and "Auto-Owners Insurance as Subrogee of-." Wulf endorsed the checks using a specially made stamp that said, "Auto Owners Insurance Deposit Only." The checks were deposited into an account named "Auto Owners Insurance." The name of the Account and the payee names on the checks were substantially similar. Reasonable commercial standards of fair dealing permit banks to accept checks for deposit that are payable to a name that is the same or substantially similar to the name on an account. Because the name of the Account and the endorsements on the checks were substantially similar to the payee names on the checks, Bank One had no reason to believe that the checks Wulf deposited into the Account were forged or stolen. This indicates that Bank One did not act in a subjectively dishonest or intentional manner when it took the checks for deposit. Therefore, we conclude that Bank One took the checks deposited by Wulf in good faith. See Continental Cas. Co., 418 F.Supp.2d at 978 (although bank took for deposit checks for large sums over a protracted period of time, court concluded bank took checks in good faith because the evidence did not show that bank grossly violated its own policies or general banking procedures and because there was no evidence indicating bank's behavior resulted from a deliberate decision to ignore obvious fraud). Because Bank One has shown that Auto-Owners entrusted Wulf with responsibility for subrogation and salvage checks, that the checks were endorsed in a name substantially similar to the name of the person to whom the instruments were payable, and that Bank One took the checks in good faith, Bank One has proven its defense under section 405(b). B. Comparative Fault under Section 405(b) As previously stated, section 405(b) adopts a system of comparative negli-genee. Duong, 169 S.W.3d at 250. Although Bank One has proven its defense under section 405(b), under the second sentence of section 405(b), Auto-Owners has the opportunity to shift a portion of its loss to Bank One if it can show (1) that Bank One failed to exercise ordinary care in taking the checks for deposit; and (2) that Bank One's failure to exercise ordinary care substantially contributed to Auto-Owners' loss. Indiana Code section 26-1-3.1-103(a)(7) defines the term "ordinary care" as follows: "Ordinary care" in the case of a person engaged in business means observance of reasonable commercial standards prevailing in the area in which the person is located, with respect to the business in which the person is engaged. In the case of a bank that takes an instrument for processing for collection or payment by automated means, reasonable commercial standards do not require the bank to examine the instrument if the failure to examine does not violate the bank's prescribed procedures and the bank's procedures do not vary unreasonably from general banking usage not disapproved by IC 26-1-3.1 or IC 26-1-4. "[ClJourts have found certain egregious practices by banks to violate reasonable commercial standards as a matter of law." Continental Cas. Co., 418 F.Supp.2d at 978. Practices involving clearly unreasonable conduct on the part of a bank include: payment of checks with missing endorsements, failure to respect restrictive endorsements, failure to inquire into the authority to sign of one purporting to be an agent, and allowing deposit of a check indorsed by a corporate payee into a personal account. Id. (quoting Govoni & Sons Constr. Co., Inc. v. Mechanics Bank, 51 Mass.App.Ct. 35, 742 N.E.2d 1094, 1103 (2001)). Auto-Owners first argues that Bank One did not exercise ordinary care because it failed to comply with its own policies and procedures and reasonable commercial standards by not obtaining proper documentation from Wulf to open the Account. Bank One's policies and procedures required a customer opening a business account to provide a number of legal documents in order to establish ownership. These documents included, where applicable, an assumed business name certificate, a certificate of incorporation, and a corporate resolution. Auto-Owners notes that Wulf testified that Bank One did not require him to present any documents when he opened the Account. Additionally, during discovery, Bank One was unable to locate any documents relating to the opening of the account. However, the plain language of Indiana Code section 26-1-3.1-405(b) states that a party is only liable for a portion of the loss if it "fails to exercise ordinary care in paying or taking the instrument...." (Emphasis added). Section 405(b) makes no mention of a party failing to exercise ordinary care in opening a bank account. Therefore, Bank One's actions in opening the Account do not bear on whether it exercised ordinary care in taking the checks from Wulf for deposit. This conclusion is supported by the decision reached by the Alabama Supreme Court in Smith v. AmSouth Bank, Inc., 892 So.2d 905 (Ala.2004). In that case, Smith, a business owner, alleged that Am-South failed to exercise ordinary care in taking for deposit certain embezzled checks. Smith offered the affidavit of Don Coker, an independent banking consultant who claimed to be familiar with banking practices. The Alabama Supreme Court noted that the only specific allegations Coker made were that AmSouth's policies concerning the opening of bank accounts were deficient. Id. at 12. The court noted that Coker's allegations did not concern AmSouth's policies on accepting checks into accounts, and thus, did not show that AmSouth failed to exercise ordinary care. Id. Thus, Bank One's actions in opening the Account do not show that it failed to exercise ordinary care. Auto-Owners next argues that Bank One failed to exercise ordinary care because it did not observe reasonable commercial standards when it deposited corporate checks into a non-corporate account. The Account was opened as a sole proprietorship business account and was named "Auto Owners Insurance." Despite this, Bank One allowed Wulf to deposit checks into the account with the following payee names: "Auto-Owners Insurance Company," "Auto-Owners Insurance," "Auto-Owners Insurance Co.," or "Auto-Owners Insurance as Subrogee of-." Auto-Owners contends that checks made payable to "Auto-Owners Insurance Company" or "Auto-Owners Insurance Co." should have been recognizable to a bank teller as checks made out to a corporation and not a sole proprietorship. Based on this, Auto-Owners concludes that Bank One should have inquired into the checks and Wulf s authority to negotiate these instruments, and that its failure to do this indicates that Bank One did not exercise ordinary care. Auto-Owners asserts that a number of cases support its position that it is contrary to reasonable commercial standards to allow an individual to deposit a check made payable to a corporation into his personal account without further inquiry. See Clark v. Griffin, 481 N.E.2d 170, 173 (Ind.Ct.App.1985)("[W]hen an individual cashes a check made payable to a corporation depositing it in his personal account, normal and reasonable commercial standards require the bank to inquire further to determine whether the individual has the appropriate corporate authority."). See also Lou Levy & Sons Fashions, Inc. v. Romano, 785 F.Supp. 1163, 1166 (S.D.N.Y.1992)("In the absence of exceptional cireumstances, the failure of a bank to inquire when an individual presents a check made payable to a corporate payee for deposit to his personal account is deemed an unreasonable commercial banking practice as a matter of law."); Allied Ins. Center, Inc. v. Wauwatosa Sav. and Loan Ass'n, 200 Wis.2d 369, 546 N.W.2d 544, 548 (Ct.App.1996)(trial court properly concluded that bank acted in commercially unreasonable manner by depositing checks payable to corporate payees into an individual's personal account without further inquiry); Martin Glennon, Inc. v. First Fidelity Bank, N.A., 279 N.J.Super. 48, 652 A.2d 199, 203-04 (App.Div.1995)(pursuant to New Jersey law it is negligent for a bank to permit the deposit of a check payable to a corporation into an individual account); Aetna Cas. and Sur. Co. v. Hepler State Bank, 6 Kan.App.2d 543, 630 P.2d 721, 728 (Ct.App.1981)(trial court properly concluded that bank acted in commercially unreasonable manner by depositing checks payable to a corporate payee into a personal account without inquiring as to depositor's authority to do so). However, each of the above cited cases relied on by Auto-Owners is factually distinguishable because in those cases checks made payable to corporate payees were deposited into personal bank accounts. Here though, Wulf did not deposit the stolen subrogation and salvage checks into his personal account, but into a sole proprietorship account. The above cited cases indicate that it is contrary to "reasonable commercial standards" to deposit checks payable to a corporate payee into a personal account. Conversely, reasonable commercial standards permit banks to accept business checks for deposit into a business account that has a name substantially similar to the payee name on the check. Here, the name of the Account and the payee names on the checks were substantially similar. Furthermore, just because a business uses the word "company" or the designation "Co." in its name does not necessarily mean it is a corporation. Checks made payable to "Auto-Owners Insurance Company" or "Auto-Owners Insurance Co.," that did not contain the designation "Corp." or "Inc.," may not have been recognizable to a bank teller as being checks made out to corporation. Bank One's actions in this regard do not indicate that it failed to exercise ordinary care in taking the checks. Therefore, we conclude that Auto-Owners has not shown the existence of a genuine issue of material fact as to whether Bank One exercised ordinary care in taking the checks for deposit. We also conclude that Auto-Owners has not raised a genuine issue of material fact concerning whether Bank One's failure to exercise ordinary care substantially contributed to Auto-Owners' loss. The facts here instead suggest that the proximate cause of Auto-Owners' loss was its own negligence. Auto-Owners entrust, ed Wulf with responsibility for and access to subrogation and salvage checks. Although Wulf abused the trust Auto-Owners placed in him by stealing checks, Auto-Owners could have discovered Wulf s conduct. Wulf s branch manager was supposed to review his claims files every six months, and permanently closed claims files were reviewed by senior claims examiners at Auto-Owners' home office. Despite these reviews, Wulf s illegal conduct was not discovered. Auto-Owners' branch managers received salvage sheets listing items sold for salvage. Wulf s branch managers could have used the salvage sheets to learn that Wulf was stealing salvage checks, or when Auto-Owners received subrogation and salvage checks in the mail it could have logged in the checks before they were sent to the claims representatives so that a paper trail was clear. Had Auto-Owners made use of the resources available, it could have determined that Wulf was stealing subrogation and salvage checks. Therefore, because Bank One has proven its defense under section 405(b) and because Auto-Owners has not shown the existence of a genuine issue of material fact regarding whether Bank One failed to exercise ordinary care in taking the checks for deposit, the trial court properly granted Bank One summary judgment on Auto-Owners' negligence and conversion claims for those checks negotiated after October 30, 1995. Conclusion The discovery rule does not apply to claims for conversion of a negotiable instrument. Auto-Owners' claims for negli-genee and conversion based on any checks negotiated before October 30, 1995, are barred by the statute of limitations. Bank One established the defense available to it under Indiana Code section 26-1-3.1-405(b). Auto-Owners has not shown the existence of a genuine issue of material fact regarding whether Bank One failed to exercise ordinary care in taking the checks for deposit. Therefore, the trial court's order granting Bank One's motion for summary judgment and denying Auto-Owners' motion for partial summary judgment is affirmed. Affirmed. SHARPNACK, J., and BAILEY, J., concur. . Oral argument was heard in this case on July 19, 2006, in our courtroom in Indianapolis. We thank the attorneys for their insightful arguments. . Auto-Owners also alleged that Bank One was negligent under Indiana Code section 26-1-3.1-406. In order for Auto-Owners to prove that Bank One acted negligently under that statute, it must show that Bank One failed to exercise ordinary care in taking the checks for deposit. See Ind.Code § 26-1-3.1-406(b). We have already determined that Auto-Owners did not raise a genuine issue of material fact concerning whether Bank One failed to exercise ordinary care. Therefore, Bank One was entitled to summary judgment on Auto-Owners negligence claim under Indiana Code section 26-1-3.1-406.
CASELAW
Jinding The Jinding, elevation 3077 m, is the main peak of Mount Emei, a UNESCO World Heritage Site in Sichuan, China. It is also a common name for the Buddhist Huazang Temple built on the summit. Jinding is the highest Buddhist temple in traditionally Han areas of China. Jinding is known for its "four wonders": the sunrise, the sea of clouds, the "Buddhist halo", and the "divine light". History The Huazang Temple was originally built in 1377 during the Ming dynasty, but has been rebuilt multiple times because of fire. The most recent incident happened in 1972, during the Cultural Revolution, when the temple was used for transmitting signals of a local television station. On April 8 at 9:30am, flames caused by a power generator quickly engulfed the wooden temple. The fire burned for two days, destroying countless precious Buddhist relics as well as numerous trees. The only remaining relics are a bronze monument and a bronze doorway from the Ming dynasty, and a bronze statue from the Qing dynasty. In 2004, as part of the Jinding "Revival and Renovation Plan" by the Mt. Emei Buddhist Association, the Huazang Temple was rebuilt along with a 48-meter-tall stupa of the "Ten-faced Puxian Bodhisattva" (Samantabhadra). The rebuilt temple was officially opened on 18 June 2006. 300 notable Buddhist monks attended the grand ceremony, as well as 3,000 visitors. The reconstruction is seen as a prestigious project for the local authorities, and has helped to attract tourists and religious pilgrims alike. However, it has also been criticized as an attempt to increase revenue. The new structures have been called "inauthentic" and purely "invented". In March 2016, the Puxian stupa was temporarily closed for renovation. The authorities plan to cover the stupa with 160,000 gold leaves, at a cost of CN¥20 million. Structures The complex is built along a central axis on a slope, from the lowest to the highest are the stupa, the main hall and the Puxian hall. The Ten-faced Puxian Stupa stands 48 m tall, weighs 660 tons and is surrounded by urns containing the ashes of Buddhists. On one side, the bodhisattva holds a ruyi, while on the other, his hands forms the Dhyana Mudra meditation gesture. Inside the stupa is a statue of Maitreya. The stupa was designed by the Taiwanese architect Chu-Yuan Lee. The Grand Hall of the Great Sage (or Mahavira Hall) is the main hall, housing statues of the Gautama Buddha and two disciples. The Puxian Hall, built in 1615, is located behind the main hall at the highest point, and is over 8 m tall.
WIKI
1. Are you ready for the Galaxy S20? Here is everything we know so far! flashing 2.2 with clockwork Discussion in 'Android Devices' started by chosendude, Jun 6, 2010. 1. chosendude chosendude Member Thread Starter alright every time i go into nandroid and choose the folder i click every single restore boot and everything and all it says is md5 mismatch.. what am i doing wrong?   2. johnlgalt johnlgalt Antidisestablishmentarian Have you re-downloaded the file? You may have a corrupt download. Also, which recovery are you using, and which file did you download?   3. chosendude chosendude Member Thread Starter i used clockwork and i downloaded the P3DF-CW.zip file then extracted it (in a folder) to that file location that it said in the steps   4. chosendude chosendude Member Thread Starter also while were at it another quick question.. is it even worth it to root to 2.2? ive seen people having many problems re flashing into recovery, bugs etc..   5. Fadelight Fadelight Android Expert What do you mean "Root to 2.2"? Do you mean root? Or do you mean flash to 2.2?   6. johnlgalt johnlgalt Antidisestablishmentarian Download the file again - overwrite your original copy - extract it again - delete the copy on your phone and re-copy it over. Absolutely. I am one of the ones that had the recovery problem - we have that figured out now. WiFi works with the alternate kernels, Adobe Flash player works, the phone is a ton faster (I have 150 apps installed, and with a 1200 MHz kernel on Pete's BB 1.0 and on Froyo stock it was (subjectively, of course) feeling at about the same speed. Now I have a new kernel installed - gonna see how well it performs....   chosendude likes this. 7. chosendude chosendude Member Thread Starter wow alright i guess i will. and which folder to i leave in the folder that says clockwork-cw or whatever.. or do i get rid and just move over the folder that says the date?   8. chosendude chosendude Member Thread Starter also.. how do i wipe my files? does it automatically do it when i do the advanced restore or is there something i have to do first?   9. Fabolous Fabolous Superuser Just the folder with the date. Put it in /sdcard/clockworkmod/backup/   10. johnlgalt johnlgalt Antidisestablishmentarian When you extract the ZIP file that you download, it should extract to a folder that says 2010-06-05.06.15.32 - if it does not, then find another place to grab the file from. In fact, I used this file taken from the MDW site before it went down this afternoon, and it is the same file linked to on their website and in Fab's post as well - use *it* instead. P3DF-CW.zip Also, When you extract it, it should not have P3DF-CW as the main folder - the main folder should be that 2010-06-05.06.15.32 as I said. Finally, copy (don't move, as if it encounters an error it may still delete it and you'll have to extract it again before you can try again) this folder to your phone into the directory /sdcard/clockwork/backup folder. Then use Rom Manager / adb / manually reboot into recovery, and then go to Partitions --> format 1) boot 2) data 3) system 4) cache, & then go to nandroid --> restore and then pick that 2010-06-05.06.15.32 folder, and let it do its thing.   11. chosendude chosendude Member Thread Starter alright were there!! but the market seems slow and when i start up titanium backup it says i need busy box. what is that?   12. chosendude chosendude Member Thread Starter another question.. how do i extract the .apk out of the zip file??   13. johnlgalt johnlgalt Antidisestablishmentarian Market is gonna be slow b/c it is automagically installing all your old apps again - go to downloads and you'll see what I mean. which .ZIP file? .APK for what?   14. chosendude chosendude Member Thread Starter for flash.. when i download it its in a zip file.. how do i get it to a .apk file and working on my phone?   15. johnlgalt johnlgalt Antidisestablishmentarian When you open the .ZIP file it has nothing in it? Then it is your browser changing the name to .ZIP - edit the file after copying it to your phone using Astro / Estrongs File Manager and just cut off the .ZIP part and then it should install fine.   chosendude likes this. 16. chosendude chosendude Member Thread Starter it is an apk file but my apkinstaller isnt recognizing it? this is weird   17. chosendude chosendude Member Thread Starter nevermind. got it. Thanks a ton for all your help!   18. johnlgalt johnlgalt Antidisestablishmentarian You're very welcome. Give Froyo an hour or so (O, maybe more like 15 minutes, but still!) before you go all crazy with it - but then, do go crazy with it.   19. Haywire Haywire Android Enthusiast I think my problem was I was moving it, not copying it over.. We will see after I try downloading the new file.. IS this one the one that has wifi fixed?   20. johnlgalt johnlgalt Antidisestablishmentarian The MDW files do not have it integrated. The new one from B... does have them integrated. But the file was SPR only. However, our very own OMJ just posted a CWM nandroid backup in that thread.   21. mcapozzi mcapozzi Android Enthusiast 1) The market is slow because it is background downloading and installing all the apps you've previously downloaded through the market (a neat new feature of 2.2). 2) Busybox is the backend processor for Titanium Backup, so to the "problems" tab in TB and tell it to download Busybox for you. -mike   Motorola Droid Forum The Motorola Droid release date was November 2009. Features and Specs include a 3.7" inch screen, 5MP camera, 256GB RAM, processor, and 1400mAh battery. November 2009 Release Date 0 Reviews Loading... Share This Page Loading...
ESSENTIALAI-STEM
History of the Socialist Left Party The Socialist Left Party of Norway (Sosialistisk Venstreparti or SV) was founded in 1975. Its history shows a long-term rise in political influence, resulting in part from its emergence from older left-wing parties, especially the Socialist People's Party. After initial political setbacks in the 1970s, the party reorganized and regained support, particularly under Theo Koritzinsky (1983–87) and Erik Solheim (1987–97). Support dropped in the 1997 parliamentary election but rose again by the 21st Century, thanks to the party's position as the only sizeable party to the left of the Norwegian Labour Party. Labour's move further to the right under Jens Stoltenberg also helped the party's rise. By 2005, the Socialist Left Party had joined the Labour and Centre parties in Norway's governing Red-Green Coalition. The party has been led by Audun Lysbakken since 11 March 2012. Socialist Electoral League (1973–75) After losing all of its seats in the 1969 parliamentary election, the Socialist People's Party sought to create a coalition of various left-wing parties. Although previously sceptical about working with the Communist Party, it became a member of the coalition, along with the Democratic Socialists – AIK and various independent socialists. Reidar T. Larsen, then leader of the Communist Party, said that members at the party's national convention voted unanimously in favour of joining the coalition, which would later go by the name of the Socialist Electoral League. The four leading members of the coalition were Finn Gustavsen, Berge Furre (both from the Socialist People's Party), Berit Ås (from AIK) and Larsen (from the Communist Party). Furre and Ås emphasized that the three parties were still operating independently in 1973, while Larsen was very pleased with the outcome, saying that the main object of the Communist Party was to "unite all socialist parties" in one joint cause. The coalition also stressed that they did not want to create a joint platform for the three parties, claiming it to be unimportant for their image. A meeting in September elected Gustavsen as parliamentary leader of the coalition, Roald Halvorsen from the Communist Party as general secretary, and Larsen and Ås to the group board. It was decided that Torild Skard would seek the position of President of the Storting. After the meeting, the party sought to build a closer relationship with the Labour Party and said they would support a Labour-run minority government. Communist Party and founding (1975) By late 1975, most Communist Party members were against dissolving the party to join what would become the Socialist Left. Reidar T. Larsen, the party leader at the time, supported dissolving the party, while deputy leader Martin Gunnar Knutsen wanted it to continue. Signs before the election showed that the majority supported Knudsen. The media speculated that a faction led by Larsen would split from the party to join the ranks of the Socialist Left. In the Oslo chapter of the coalition, the Communist Party wanted Arne Jørgensen, editor-in-chief of the Norwegian newspaper Friheten, to get the top position on the election list for the 1975 local elections. However, most Socialist People's Party members in the Oslo chapter did not want him to top the list, because of his background in Norwegian local politics. Socialist People's Party members stated that they had nothing against nominating Communist Party members, pointing out that they had placed communist Karl Kromann in second place. Jørgensen lost the election for the first spot, instead obtaining 11th place on the list and eventually losing his nomination to Socialist People's Party official Fred Dunhaug. Parliamentary leader Finn Gustavsen officially endorsed Jørgensen's candidacy during the national convention in Trondheim, saying he did not want to "split the coalition", which would wreck his plan to unite the coalition into one political party. In May, the Oslo chapter of the coalition held an oral ballot for the top place on the election list, and Jørgensen received 189 votes against Dunhaug's 192. Because the margin was so small, they decided to hold a written ballot, and Dunhaug received 197 votes to Jørgensen's 196. After this result, twenty-one other communist candidates withdrew from their candidacy. This event damaged the unification process and internal conflict continued. Another conflict between the Socialist People's Party and the Communist Party was the proposal to merge the two party papers, Friheten and Orientering, into a new one. However, Larsen rejected this offer, preferring the two papers to continue even if the two parties merged. Berit Ås felt that the party leadership had weakened its position, saying that they had "kicked the ball over to the communists". After the Communist Party rejected the offer, Orientering was replaced by Ny Tid. While it was always clear where Larsen stood in the unification process, ever since he became leader of the Communist Party in 1969, he had been able to maintain a strong following in the party. But his support started to waver when he wanted to put an end to the pro-Soviet line the party had held under the leadership of Emil Løvlien. Larsen had always held a vision of one single united left-wing party to the left of Labour, but this vision was not supported by the communist hardliners. In the aftermath of the Communist Party national convention, Larsen said that his speech was "behind closed doors – and behind closed ears". He suffered a clear defeat at the party conference, and he and his remaining supporters left the Communist Party to join the Socialist Left, newly founded by the Socialist People's Party and the AIK without the Communist Party. Because the policies of the Socialist Left were nearly identical to those of the Socialist People's Party, it has often been seen as the latter's direct successor. Berit Ås (1975–76) Berit Ås, a compromise candidate for the party leadership, was elected at the so-called unification congress. During the 1975 local elections she became the party's most influential figure. However, her campaigning and her debating skills were criticised both by the Norwegian press and within her own party. During the election campaign, Ås wanted to become the party's representative at the leader debates, a position held since the 1960s by Finn Gustavsen from the Socialist People's Party. The weekly newspaper Dag og Tid described Ås' performance at the leader debates as "messy". At the party's first national convention in November 1975, it was decided to maintain "a soft party line" towards the remaining Communist Party members still active in the Socialist Left Party. However, they did urge them to leave the Communist Party. Rune Fredh, who had supported Larsen in the Communist Party, called the situation "insane". He still believed that Larsen and the remaining communists would continue to fight for communism in the Soviet Union and the Eastern Bloc. After experiencing what many observers called a bad election in 1976, a national convention was held early in 1976. During her short tenure, Ås lost all trust amongst party members. Several leading members were calling for Berge Furre to take over as party chairman. However, early in the nomination process, there were rumours that the party's AIK-Communist wing would establish a united front against former Socialist People's Party members. No factions or party notables supported Ås for reelection. It was decided at the convention that Socialist Left Party members could only be members of one party at the time, which meant that the remaining Communist Party members were forced to choose between the Socialist Left Party and the Communist Party. Larsen and Fredh, the Socialist Left Party Secretary, told delegates at the convention that "from now on, the road the Communist Party is following is its own". Furre was elected as party chairman at this convention, with little or no opposition. On the election list for the 1977 election, Ås became the party's second candidate in Oslo for a seat in the Storting, having lost first place to Stein Ørnhøi. Because of the party's internal difficulties, its electoral base was greatly weakened in 1977: only one Socialist Left candidate from Oslo, and only two nationwide, won seats in the Storting. Early leadership and internal strife (1976–77) Berge Furre, previously known unofficially as the Socialist People's Party's "crown prince", became party chairman after the feud between Ås and Finn Gustavsen over who would represent the party during the 1975 local elections. Gustavsen resigned as parliamentary leader, as early signs indicated that he did not have the full support of the party's Election Committee. The party, which suffered several aftershocks after its founding, was severely disorganized. Verdens Gang speculated that the current leadership would be replaced by a troika consisting of Furre (from the Socialist People's Party) as party chairman, Larsen (from the Communist Party) as parliamentary leader and Ås (from the Democratic Socialists – AIK) as deputy leader. The establishment of the Socialist Left Party had several destabilising effects, such as weakening the party's voter base. Several opinion polls indicated that many voters were leaving, or thinking of leaving, the party or voting for the Labour Party in the 1977 election. As the power struggle between the left- and right-wing factions worsened, Steinar Stjernø was accused of trying to expel the party's social democratic wing (the right-wing faction). However, Sternjø called the rumours absurd. The reason for the accusation was that Stjernø wanted to create a "new and radical alternative for the Norwegian working class". By the time of the national convention where Ås stepped down as party chairwoman, the party had not succeeded in making itself a viable option for the common voter. Furre told the convention's delegates that the party would be able to win over voters, and take several from the Labour Party, if and when the internal situation stabilised. Another difficulty for the party, according to Furre, was that Odvar Nordli's Cabinet was moving the Labour Party further to the centre. It caused some controversy that two of the newly elected Members of Parliament had been convicted of treason for collaborating with the Nazis during World War II. Electoral activities (1977–81) Believing that the Labour Party had moved further to the political centre, Furre commented that the Socialist Left Party could only support a left-oriented minority government. Labour Party Secretary Ivar Leveraas responded negatively to Furre's comment, saying "It isn't appropriate for the Labour Party to sit down together with the Socialist Left to discuss our political program and conditions for support, as Berge Furre requires." Late in 1977, it was known that both Furre and Finn Gustavsen had revealed classified information during an open meeting in the People's House of Oslo on 22 August 1977, after threatening to do so. When this became known, the parliament established a Committee to investigate them. Not knowing what to do, representatives from the Odelstinget voted to shelve the case. There were 44 for and 47 against prosecuting them. When the result was made official, the media speculated that it was some kind of "punishment" of the party, since the incident proved that the party was unable to protect valuable information which could have jeopardized Norway's security interests. After having what Verdens Gang described as a "disastrous election", in which the Socialist Left lost fourteen of their sixteen seats in the Storting, the party discussed changing its election platform. The platform, which had changed little since the 1973 election, was the centre of a power struggle, in which some Socialist Left Party members were calling for the removal of the peace paragraph (which called for the disbanding of the Norwegian military and the removal of foreign military bases located in Norway). Several leading party members opposed this paragraph. Furre and Gustavsen, both of whom came from the moderate camp, wanted to make the paragraph more moderate, and they succeeded at the 1977 national convention. In the aftermath of the election, Odvar Nordli, then the Labour Prime Minister, criticised the Socialist Left for being "capitalists" who supported right-wing policies, and further claimed that the Labour Party was the only remaining "anti-capitalist" alternative. In the wake of the 1979 local elections, the internal struggle continued, and Verdens Gang claimed the situation inside the party was like a "civil war". When asked about the situation, Furre controversially claimed that there had never been so much stability within the party, considering that the main policy issues had been solved during the 1979 national convention. The party's electoral base became even smaller during the 1979 election, when it won 4.1% in the municipal and 4.4% in the county elections. At the national convention of 1983, the party was able to stabilise itself greatly. This national convention adopted socialism as the party's most important campaign promise during the election, with the majority of the delegates voting in favour. Hanna Kvanmo, parliamentary leader of the Socialist Left Party, claimed after the convention that, for the first time in the party's history, there was a "consensus in most areas". Furre was again reelected as party chairman, while Hilde Bojer and Torbjørn Dahl became the party's first and second deputy leader respectively. The Socialist Left Party was able to increase its voting share by 0.7 percentage points, from 4.2% to 4.9% nationwide, during the 1981 parliamentary election. Resignation (1981–83) Beginning in 1981, Party Secretary Erik Solheim became very critical of the party's left wing. He claimed that these radicals contributed nothing to the party and were more interested in being against everything than in supporting any policies. Writing for the party newspaper, Ny Tid, Solheim criticised the party's support for what he claimed to be extreme progressive taxation, and said he wanted to give the party a new public image. He also accused the party of having become conservative – objecting to change, for example – and claimed that there had not been any major changes to the party's policies since its establishment in 1975. Many members supported Solheim's criticism, and it led to renewed conflict between the right- and left-wing factions of the party. Several leading party officials agreed with Solheim's criticism. Furre, for example, shared several of his views and told the press that the party had discussed the same old topics ad nauseam for several years. Furre announced his resignation as party chairman early in 1983. None of the leading party members of the time, most notably Hanna Kvanmo, Per Maurseth and Hilde Bojer, sought the party's chairmanship. Because of this Theo Koritzinsky was elected the party's new chairman at its 1983 national convention. The majority in the party's Election Committee had officially endorsed him beforehand. Electoral success (1983–85) At its 1983 national convention, the Socialist Left Party initiated an action plan that supported an increase in government spending on the elderly and addressed what they called "serious issues with the welfare state". Theo Koritzinsky wanted to increase the pension up to at least 40,000 and at most 50,000 Norwegian kroner. The action plan was heavily promoted, and Koritzinsky tried to collaborate with both the Labour Party and the Conservative Party to get it passed in the Storting. Another worry of Koritzinsky and the party was that, in their eyes, the public sector had begun to decay, which they feared would lead to increased unemployment within that sector. During his campaign, Koritzinsky made a habit of campaigning outside the major cities. In an interview with the Norwegian News Agency, he expressed amazement at the support he was able to gather, and even claimed "renewed interest" in the party. While disappointed with the initial results in the 1983 local elections, he was pleased with the overall outcome of both the Socialist Left Party and the Labour Party. However, he was worried about the increased interest in right-wing parties, especially the Progress Party. After the American invasion of Grenada, the party organised protests in Oslo against the war, during which Koritzinsky accused the political right of being slaves to the United States Government. Over 200,000 demonstrators attended the protests, and many Latin American interest groups were vocal in their support for the demonstrations. Koritzinsky criticised western diplomacy for condemning the Soviet Union, saying it was unfair that the First World only denounced military action when the Soviet Union or the communist bloc engaged in it, while remaining passive if the United States did so. At the 1983 national convention, the majority of the delegates sought to collaborate with the Labour Party in the 1985 parliamentary elections. Gro Harlem Brundtland, the Labour chairwoman at the time, told the press that she was considering a proposal by the Socialist Left Party that the two parties make joint lists during the elections. In another press conference, Koritzinsky told the press that he was worried that, if an election pact was not established between the two parties, the "bourgeois right-wing parties" would create their own, and maybe even win the election if the left did not respond properly. In 1984, Koritzinsky wanted party members who were teachers to leave local trade unions for the much larger Norwegian Confederation of Trade Unions (NCTU). He was not the only one promoting this idea: the Labour and Communist parties had done so for years. While supporting his original goal of enlarging the NCTU, Koritzinsky also recognized that there existed good reasons for teachers to work in traditional organisations – before being elected party chairman he was a member of a local trade union himself. On another subject, Koritzinsky favored a referendum on the question of arming Norway with nuclear weapons, or letting foreign powers position nuclear weapons on Norwegian soil. When Stein Ørnhøi retired from active politics in 1984, Koritzinsky was seen as a likely candidate to replace him in the Storting, but it emerged that other party members were also interested in the Storting seat, most notably prominent Oslo city councillor Per Maurseth and veteran politician Finn Gustavsen. Early speculations were highly skeptical of Gustavsen's candidacy. The Socialist Left Party's Oslo nomination committee was split between Koritzinsky and Maurseth – they won 12 and 11 votes respectively, while Gustavsen won only one vote. As it turned out, Koritzinsky became the Socialist Left Party's first candidate for the Storting and Maurseth became the second, winning a contest against Kristin Halvorsen for second place. Gustavsen was not even on the list. At the national convention of 1985, Koritzinsky told the delegates that "The voters accepted us as part of the labour movement a long time ago. This is proved by the fact that around one third of Labour voters consider the Socialist Left Party as their second voting preference. However, the Labour Party leadership has not accepted us a political force, and it is clear to us, and to them, that more voters will take us seriously if the Labour Party starts treating us with mutual respect. In it there is a political gain." Kvanmo quickly corrected "in it there is a political gain" to "it may be a political gain". She further stated that the party's most realistic goal was not to collaborate with the Labour Party, but to increase the party's voter base to five or six percent. At the 1985 national convention, Koritzinsky wanted the party to promote itself as a "red-green alternative" to the Labour Party, an idea which had broad support within the Socialist Left. One month after the national convention, Koritzinsky visited West Germany with officials from the International Department of the Socialist Left Party to discuss green politics with members of the German Green Party. In June 1985, the Socialist Left rejected an offer made jointly by the Communist Party, the Workers' Communist Party and the Red Electoral Alliance (the electoral organisation of the Workers' Communist Party) to establish an electoral coalition in the 1985 parliamentary elections. Instead, Koritzinsky continued with his plans to establish some sort of electoral collaboration with the Labour Party by encouraging all local party chapters to initiate formal contact with their Labour Party counterparts. However, the Labour Party still showed no great interest in a coalition; it neither accepted nor rejected Koritzinsky's offer. Koritzinsky vehemently opposed any notion that his party could collaborate with the Liberal Party, claiming that that party had chosen its own path – a path "to suffer a slow and beautiful death in Norwegian politics". Optimism within the party had been able to manifest itself in the weeks before the election, with Party Secretary Erik Solheim believing that the 1985 election could be the party's best election yet. When the results were announced, Christian Democratic Party chairman Kjell Magne Bondevik told the press: "If the Labour Party had supported electoral reform, the socialists would have had a majority in the Storting". In response to Bondevik's statement, Koritzinsky said; "It is obvious that the lack of cooperation may have ruined the chances of a new socialist government", further claiming that he and his party had been open to cooperation with both the Liberal Party and Labour Party all along. Odd Einar Dørum, a Liberal Party member, also criticised the Labour Party's unwillingness to collaborate with other parties. Although there was no socialist majority in parliament, most Socialist Left members were pleased with the outcome, increasing their vote from 4.9% to 5.4% nationwide and gaining two more seats in parliament. Leaving office (1985–87) By the mid-1980s, several key party members wanted to move the party closer to the centre of Norwegian politics and make it a viable and open social democratic alternative on the left. Many supported the idea and believed it would expand the party's electoral base. According to Aftenposten, both Erik Solheim, leader of the party's right wing, and the ageing Finn Gustavsen, leader of its left wing, were likely candidates for the party chairmanship. On 27 August 1986, Koritzinsky announced in Dagbladet that he would step down as party chairman at the 1987 national convention. When asked why, he replied that he found it difficult to combine the chairmanship, his work in the Storting and the extensive travelling, which strained his family life. By August, Solheim and Tora Haug were the most likely candidates for the position, as Gustavsen had become editor-in-chief of Ny Tid, the party's newspaper. During his tenure, Koritzinsky became a well-known and respected public figure, although several leading Socialist Left Party members were discontented with his leadership style, some even complaining that "he was not clever enough" to lead the party. In self-defense, Koritzinsky stated that he himself believed he had received criticism for his unusual working methods, explaining further that during his party chairmanship, he had been worried that leading members had concentrated much power in their own hands. At the 1986 national convention, the party again tried to improve its relations with the Labour Party, but this time, the Socialist Left Party would only collaborate with them if they moved more to the left. They were certain this could happen, considering that 39 percent of Labour Party members in a recent opinion poll said the Socialist Left Party was the second closest party to them in political views and policies. The race between Solheim and Haug was close, so several members sought a compromise by trying to persuade Koritzinsky to extend his chairmanship two more years, until the next national convention. When this proved unfruitful, others tried to persuade Kvanmo to run for the chairmanship, but Kvanmo declined. On 2 March 1987 Solheim beat Haug and became the party's new chairman. Opposition (1997–2005) In spite of the belief expressed in the media that it would be close to impossible for the two parties to collaborate, the Socialist Left and the Labour Party managed to negotiate a tax settlement. This settlement was met with strong criticism from leading trade unionist Jan Davidsen of the Norwegian Confederation of Trade Unions, who claimed that higher taxes would help the municipalities and counties. The party later stated that the sitting government had weakened its position after handling Norway's national budget with the Progress Party.
WIKI
Close Update: Dow Reverses Early Gains as Trade Optimism Fades The major stock market indices were mixed on Monday with the Dow Jones Industrial Average reversing early gains to close lower for a fourth straight day as another pending government shutdown and fading hopes for a US/China trade deal weighed on industrials. The S&P 500 and Nasdaq Composite surrendered most of today's gains but were still positive before the close. Trade optimism buoyed stocks overnight with Chinese traders returning to work after a week-long holiday with pent-up demand for risk assets. Gains spilled into Europe where even gloomy UK economic data could not short out the risk rally. US stocks opened higher, buoyed by White House adviser Kellyanne Conway's endorsement for the latest trade talks and gains in the financial sector in tandem with European banking stocks. Trade optimism faded mid-morning, exacerbated by US warships in the South China Sea and China's claims of sovereignty of disputed islands. The UK joined the fray by sending an aircraft carrier to the region to counter China's "aggressive behavior." The headlines exacerbated the diminished chances for a trade deal before another tranche of tariffs are imposed March 1. Related markets reflected the more cautious tone with Treasury yields higher across all maturities. Gold and silver were under pressure by the strengthening dollar, while copper was lower for a second time amid slower global growth forecasts. There was no economic data for Monday. In her first speech as a member of the Fed, Governor Michelle Bowman said she supports the Fed's policy path as she thinks the economy is in "a good place." Tuesday's calendar remains light with only the Dec JOLTS at 10am ET. US MARKETS Dow Jones Industrial Average was down 53.22 points (-0.21%) S&P 500 was up 1.92 points (+0.07%) Nasdaq Composite Index was up 9.71 points (+0.13%) GLOBAL SENTIMENT FTSE 100 was up 0.82% Nikkei 225 was closed Hang Seng Index was up 0.71% Shanghai China Composite Index was up 1.36% UPSIDE MOVERS (+) SPI (+34.07%) Nasdaq granted request for continued listing (+) NUVA (+13.26%) Reportedly eyed by Smith & Nephew ( SNN ) (+) OTLK (+13.03%) CEO Lawrence Kenyon buys 25,000 shares DOWNSIDE MOVERS (-) EARS (-18.53%) Did not meet Nasdaq compliance to maintain listing (-) KOPN (-16.79%) Announced $20 million at-the-market stock offering (-) RGSE (-7.08%) To delist from Nasdaq Capital Market The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. Copyright (C) 2016 MTNewswires.com. All rights reserved. Unauthorized reproduction is strictly prohibited. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Hypertension Management hypertension management Adults who are overweight or obese should be screened for CVD risk factors, including smoking, diabetes, and dyslipidemia. A physical examination is also necessary, and patients should discuss their goals with their healthcare provider. First-line medications, such as diuretics and ACE inhibitors, should be titrated to the prescribed maximum daily dose. A second medication, such as a CCB, may be added. In patients with severe frailty, additional evaluations should be performed to confirm a diagnosis of hypertension. The first step in hypertension management is to determine the cause of hypertension. This can be accomplished by examining the patient’s blood pressure levels. Identifying the underlying cause of hypertension is important. If the underlying causes of hypertension are unknown, a blood test may be required. Symptoms and signs of cardiovascular disease should be noted, as well as any other cardiovascular risk factors that may be present. If the cause of the high blood pressure is not determined, medication should be used to prevent complications or manage the condition. Once the cause of hypertension is identified, the treatment should be individualized to achieve the goals of the patient. An evidence-based plan is essential for safe and effective care. During the treatment period, the treatment plan should be followed by a health care team that includes specialists, nurses, and physiologists. The goal of the program may be to achieve a reduction in blood pressure by changing lifestyle. Many patients will need multiple visits before their doctor can decide whether hypertension is a serious medical condition or not. Hypertension can be difficult to manage without appropriate medications. A doctor should consider a number of different drugs to control the hypertension. Some of these drugs can lower the pressure while others may require a combination of medications. The medications used to control hypertension can be classified into two categories, based on how they work. The first category is called diuretics and helps the kidneys remove excess water and salt from the blood. As a result, they reduce the volume of blood in the blood vessels, thereby lowering blood pressure. The goal of the management of hypertension should be to reduce the risks of heart failure and stroke. To achieve these goals, a healthcare team should develop an evidence-based plan of care for hypertension patients. This plan should include the use of behavioral strategies to improve the quality of life and follow-ups to ensure that the treatment is working effectively. Furthermore, a healthcare team should be able to monitor the patient’s blood pressure at home. In addition to pharmacological treatments, a doctor should implement a well-designed evidence-based plan of care for hypertension patients. The treatment of hypertension should include comorbid conditions and follow-up with a healthcare team. Further, patients should follow up regularly with their healthcare team. In addition, they should be adhered to evidence-based guidelines for CVD prevention and management. Behavioral strategies are recommended to treat patients with hypertension. Various quality improvement strategies are useful. The most important component of hypertension care is a team of healthcare professionals. It should be comprised of an evidence-based plan to ensure that patients are achieving treatment goals, adhering to CVD evidence-based guidelines, and receiving quality care. The management of hypertension must include the use of an evidence-based management plan for each patient. This approach should also include a comprehensive review of the literature to determine the best treatment options for a patient. Hypertension should be managed according to the evidence-based guidelines. There are several reasons for this. One of the most important is the patient’s age. It is important to make sure that the patient’s blood pressure is under control. It should be monitored on a regular basis to avoid complications. A physician will monitor it every day to prevent future heart attacks. When the blood pressure is out of control, it can lead to kidney failure. The evidence-based management of hypertension is an integral part of the overall healthcare system. For adults with hypertension, a team should implement a multidisciplinary plan that is tailored to their needs and goals. The plan should also be tailored to comorbid conditions and promote healthy outcomes. It should be flexible enough to accommodate patient-specific lifestyle changes. A therapist or other healthcare professional should encourage patients to monitor their blood pressure. The doctor should monitor hypertension at all times. Share this article:
ESSENTIALAI-STEM
LIFE In COVID-19 Battle, LH On Watch, CARA Keeps KALM, All Eyes On MYOV (RTTNews) - Today's Daily Dose brings you news about aTyr Pharma joining the COVID-19 battle; Cara's pivotal KALM-2 trial; LabCorp's at-home collection kit for COVID-19 testing securing Emergency Use Authorization from the FDA, and Myovant's much-awaited clinical trial catalyst. Read on… aTyr Pharma Inc. (LIFE) is all set to initiate a phase II study of its drug candidate ATYR1923 in COVID-19 patients with severe respiratory complications. The trial will enroll 30 confirmed COVID-19 positive patients at up to 10 centers in the United States and they will be assigned to one of three cohorts of 10 patients each. Patients will receive a single intravenous (IV) dose of either 1.0 or 3.0 mg/kg ATYR1923 or placebo. In preclinical studies, ATYR1923 has been effective in downregulating T-cell responses, thereby dampening the inflammatory cytokine and chemokine signaling that has been implicated in severe COVID-19 cases. ATYR1923 has also been shown to improve lung function, as well as to reduce inflammation and fibrosis, in multiple animal models of immune-mediated acute lung injury, noted the Company. LIFE closed Tuesday's trading at $3.25, up 5.18%. Cara Therapeutics Inc.'s (CARA) pivotal phase III trial of KORSUVA Injection in hemodialysis patients with moderate-to-severe chronic kidney disease-associated pruritus, dubbed KALM-2, has yielded positive results. The trial achieved statistical significance in the primary efficacy endpoint of the proportion of patients achieving at least a three-point improvement from baseline in the weekly mean of the daily 24-hour Worst Itching Intensity Numeric Rating Scale (WI-NRS) score at week 12. The proportion of patients on KORSUVA Injection achieving a three-point or greater improvement from baseline in the weekly mean of the daily 24 hour Worst Itching Intensity Numeric Rating Scale score at week 12 was 54% compared to 42% for patients on placebo. There was also a statistically significant improvement in the key secondary endpoint of the proportion of patients with four-point or greater reduction in mean worst itching intensity NRS score vs. placebo. The Company is planning to submit its New Drug Application for KORSUVA Injection in the second half of this year to the FDA. Cara's partner Vifor Fresenius Medical Care Renal Pharma is expected to seek approval for KORSUVA Injection in Europe shortly thereafter. CARA closed Tuesday's trading at $15.42, up 4.05%. LabCorp's (LH) at-home collection kit for COVID-19 testing has been granted Emergency Use Authorization by the FDA. The kits provide everything one needs to collect a nasal swab sample at home if recommended by a healthcare provider after completing a COVID-19 questionnaire. According to the Company, the kits will be offered through its Pixel by LabCorp platform and initially be made available to healthcare workers and first responders who may have been exposed to COVID-19 or may be symptomatic. LH closed Tuesday's trading at $148.18, up 1.76%. Shares of Mirati Therapeutics, Inc. (MRTX) fell 10 percent on Tuesday, following a short report by KerrisdaleCapital, which doubts the Company's investigational drug MRTX849, a small-molecule KRAS inhibitor, getting FDA approval as a single agent therapy in second-line non-small-cell lung cancer. MRTX849 is under a phase I/II trial in patients with solid tumors expressing KRAS G12C mutations. Last October, the Company announced the first clinical results from the phase I/II trial of MRTX849 in patients with solid tumors expressing KRAS G12C mutations. According to the Company, MRTX849 demonstrated clinical activity, including objective responses, in patients with non-small cell lung cancer (NSCLC) and colorectal cancer (CRC). The report says that "MRTX-849 is a first-generation KRAS inhibitor that will quickly become obsolete even in the improbable scenario that it's approved". MRTX closed Tuesday's trading at $85.62, down 10.23%. Myovant Sciences (MYOV) is slated to discuss results from its phase III study evaluating Relugolix combination therapy in women with pain associated with endometriosis, dubbed SPIRIT 2, at 8:30 a.m. Eastern Time / 5:30 a.m. Pacific Time on Wednesday, April 22, 2020. The Company will also discuss results from a separate ovulation inhibition study with Relugolix combination therapy. In other news, Myovant announced the submission of a New Drug Application to the FDA for once-daily, oral Relugolix for the treatment of men with advanced prostate cancer. MYOV closed Tuesday's trading at $11.58, up 0.17%. In after-hours, the stock was up 10.28% at $12.77. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Holiday at Lake Bodom (15 Years of Wasted Youth) Holiday at Lake Bodom (15 Years of Wasted Youth) is the third compilation album by Finnish melodic death metal band Children of Bodom, featuring one song from Something Wild, three from Hatebreeder, three from Follow the Reaper, four from Hate Crew Deathroll, four from Are You Dead Yet?, one from Blooddrunk, two from Relentless Reckless Forever, and two previously unreleased cover songs. The DVD portion of the package includes "candid touring and backstage footage from around the world", plus the music video for "Shovel Knockout". The album was released on 22 May 2012. Band members * Alexi Laiho – lead vocals, lead guitar * Roope Latvala – rhythm guitar and backing vocals on tracks 2, 6, 9, 10, 11, 13, 15, 17 and 18 * Jaska Raatikainen – drums * Henkka Seppälä – bass, backing vocals * Janne Wirman – keyboards, synthesizer * Alexander Kuoppala - rhythm guitar and backing vocals on tracks 1, 3, 4, 5, 7, 8, 12, 14, 16, 19 and 20 Guest musicians * Pasi Rantanen - lead vocals on track 17
WIKI
Page:MacGrath--The drums of jeopardy.djvu/316 306 Kitty and boomed a long Russian phrase at her. Her quick wit caught the intent. "You see, he doesn't understand that this cannot be done in New York. I couldn't explain." "All right, miss; but don't do it again." The policeman grinned. "And please don't be harsh with the blind man. Just tell him he mustn't play on Broadway again. Thank you!" She linked her arm in Hawksley's, and they went on; and the crowd dissolved; only the policeman and the blind man remained, the one contemplating his duty and the other his vision of heaven. "What a lark!" exclaimed Hawksley. "Were you asking me for your hat?" "I was telling the bobby to go to the devil!" They laughed like children. "March hares!" he said. "No. April fools! Good heavens, the time! Twenty minutes to seven. Our dinner!" "We'll take a taxi. … Dash it!" "What's wrong?" "Not a bally copper in my pockets!" "And I left my handbag on the sideboard! We'll have to walk. If we hurry we can just about make it." "But, I say, hasn't this been a jolly lark?" "If we had known we could have borrowed a dollar from the blind man; he'd never have missed it."
WIKI
Pieris floribunda Pieris floribunda is a North American species of broadleaf evergreen shrub, a member of the fetterbush genus in the blueberry family (Ericaceae). It is commonly known in North America as mountain fetterbush or mountain andromeda. All parts of Pieris floribunda are poisonous if ingested. In landscapes it should be grown in full to part shade, out of windy locations, and have a good quality soil with much organic matter with acidity of pH 4.5 to 6.5. The mountain fetterbush is less subject to damage from the Azalea lacebug that often infests the related Pieris japonica. Description Pieris floribunda is a bushy shrub growing to around 3 to 6 ft high with oval shiny, leathery leaves which are normally evergreen, but may shed in a harsh winter to brown and persist until spring. It has erect or erect with just slightly nodding panicles of white urn-shaped flowers that form in autumn as erect pink buds. The brown, dry fruit is a slightly angled globular capsule about 1/2 in long in autumn and persisting until late April. The gray-brown bark is shaggy and peeling when mature. Distribution Pieris floribunda is native to the eastern United States, primarily the southern Appalachian Mountains in the States of Tennessee, North and South Carolina, Georgia, Virginia and West Virginia. It thrives in areas of land disturbed by human activity. In common with other members of Pieris, it grows better on well drained soils. Cultivars There is a cultivar of a hybrid between the American and Japanese species called 'Brouwer's Beauty' that does adapt easily to cultivation and bears intermediate flower clusters that are erect and yet drooping also. The cultivar 'Forest Flame' is a large shrub to 4 m, with leaves which go from red to pink to green. It produces small urn-shaped cream-coloured flowers in spring. It has won the Royal Horticultural Society's Award of Garden Merit.
WIKI
Talk:405-line television system Half line In the early days of 405, a line 1.5 lines long was inserted at the bottom of the frame. I forget the details of why, but something to do with synchronisation. This odd sized line was dropped fairly early in 405's history. Tabby (talk) 11:24, 26 November 2007 (UTC) * Almost. Aech odd field ended with half a line. The next field (an even field) commenced with half a line. Thus the two half frames of 202.5 lines combined to give a full 405 line frame. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 12:50, 25 November 2009 (UTC) * This quote "The number of lines was odd because of 2:1 interlace" seems very hard for a non-specialist to follow. A brief explanation for the reasons (easily locates odd/even field; and analog vertical scan causes the lines to be tilted, so the extra half lines nicely fill in the thin wedge-shaped gaps at top and bottom) might be helpful - or perhaps a reference to some other place where it's described. <IP_ADDRESS> (talk) 14:18, 11 April 2016 (UTC)Jonathan Bromley Spot wobble Interesting concept but surely if would have been a lot simpler to decreace the focus voltage slightly to produce a larger spot (and hence thicker lines) ? <IP_ADDRESS> (talk) 20:54, 15 March 2008 (UTC) * It would have been simpler, but it would have reduced the horizontal resolution. Spot wobble produced an oval dot which was higher than wide, in order to reduce the visibility of the line structure. --Harumphy (talk) 12:17, 12 May 2008 (UTC) New Zealand? Can anyone give a reference or further information on the New Zealand part of "was also used for some time in Ireland, Hong Kong and New Zealand" as this is the first time I've heard that New Zealand TV broadcasting was ever in anything except 625 line format, originally CCITT B&W, later PAL.Kiore (talk) 10:59, 12 May 2008 (UTC) * It wasn't; the NZ government briefly considered it, but came to their senses. I've removed this from the intro. Pro hib it O ni o ns (T) 11:24, 15 May 2008 (UTC) Cessation of transmissions in the UK I have a few questions about this which I think would be best answered by having someone knowledgeable incorporate the relevant information into the article. * When 405-line broadcasts were stopped in the UK, how many people were still using equipment that could receive them? * Before the BBC or ITV decided to discontinue 405 from any given transmitter, they overlayed the 405 signal for months previously with a message saying "If you are reading this, please phone XXX". Allegedly at some Scottish main station, they got only 60 or so people call in to enquire in total. Of those, only about 3 were deemed to have be likely to actually lose service when 405 stopped. I used to have a reference for this anecdote, but have lost it. This sort of research accelerated the plan to discontinue 405. Originally the switchoff had been planned to complete in 1986. Steve Hosgood (talk) 12:13, 7 December 2012 (UTC) * Perhaps a better question would be, how many people were still watching when the decision was made to finally cease transmission? And indeed, when was this decision made? Presumably feasibility studies were conducted to determine how many people would be inconvenienced by it, so there will be figures in print somewhere. * The final decision was taken on 20 May 1980 by the Home Secretary. See here. Steve Hosgood (talk) 12:13, 7 December 2012 (UTC) * When were 405-line televisions last manufactured and sold? i.e., how antiquated did you have to be to one of those who ended up with a blank screen in 1985. * This page claims (half way down): "[...] a 1966 HMV 2634 "Imp" [...] uses the Thorn 980 chassis, the last single-standard 405-line-only chassis." So it would appear that you could still buy a 405-only TV in 1966, and the closedown started in 1982 - 16 years later. Steve Hosgood (talk) 12:13, 7 December 2012 (UTC) * Given that 405-line had better geographic coverage, were some people in remote areas left without reception after the switch-off, or was there a building programme in the 1970s and 80s to provide new transmitters so that the 625-line coverage problem was resolved in advance? If so, which transmitters are a legacy of this project? * There was a massive UHF relay building-programme in place during the 1970s and 1980s. As for legacy transmitters, look at 405-line transmitters of the United Kingdom. Most are still in use, having been reused for 625-line UHF initially and now reused as DVB-T transmitter sites. In places where the BBC and ITV masts were in close proximity, one would be chosen as the UHF station, the other typically became a telcomms site only, or became the VHF radio transmitter, and in some cases hosted the C5 service when it came out in the late 1990s. Some carry the DAB radio transmitters these days too. Steve Hosgood (talk) 12:13, 7 December 2012 (UTC) * Finally, what specific frequencies were used to transmit 405-line television? Was there any particular reason, technical or otherwise, for having them on VHF and 625-line on UHF? The article says they were sold off for DAB and trunked PMR, so there must be a specific band or bands with known bounds. Presumably people are listening to DAB right now on the same frequencies that they once watched 405-line television on! * Look at 405-line transmitters of the United Kingdom - there's a channels/frequency list on there. 405-line was on VHF Band I originally because in 1936 that was the cutting edge, and the only place you could expect to transmit a 7MHz wide (DSB) signal. By the time the ITV service began, the BBC had used up all five of the channels in Band I, but by then (the mid 1950s), technology had improved enough to make Band III a reality, and so the ITV channels went there. Post 1985 neither band has been re-used for TV, and you're right, listeners to DAB radio are listening to some of the same frequencies in Band III that the old ITV 405-line TV stations used! VHF wasn't reused for TV partly because when 625-line TV started in the UK it had to be on the UHF bands only. So in 1985 there were no VHF/UHF switchable TVs for 625 lines, and with VHF's rotten reputation for being affected by the weather, it was abandoned for TV. We didn't need it anyway - there was plenty of space on UHF. Steve Hosgood (talk) 12:13, 7 December 2012 (UTC) Thanks. Beorhtwulf (talk) 20:50, 23 August 2011 (UTC) * Re first point, when I worked at the BBC (Publications) in 1985, I was told by an engineer that the Hull area VHF405 xmitter had developed a fault in the previous year, and ceased to broadcast, and it was only discovered three months later when a single user (a elderly lady) complained. This accelerated the decision at BH to switch off VHF. Maybe someone at BH Eng can expand. Interesting to contrast the main analogue switchoff recently, where a formal campaign was used. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 23:08, 2 November 2011 (UTC) Wrong! "The 405-line monochrome analogue television broadcasting system was the first fully electronic television system" ? The first fully electronic television system was shown by Manfred von Ardenne at the Funkausstellung Berlin, 1931: Heinzelmann (talk) 14:48, 25 October 2012 (UTC) * It might have been 'shown' but it was not used for broadcasting, so the claim is correct. <IP_ADDRESS> (talk) 18:12, 30 October 2013 (UTC) The BBC had two systems running from 1936; the 405-line Marconi and the 240-line Baird, each at 25fps. The Baird xmitter was switched off 13-feb-19<IP_ADDRESS>.17 (talk) 02:38, 10 August 2016 (UTC) * Not the transmitter. The two systems shared the same transmitter. To say that the Baird system it was 'switched off' is not quite accurate. The Baird studios were destroyed by a fire three months into the six month dual system trial, prematurely ending it. -- Elektrik Fanne 12:54, 12 November 2016 (UTC) External links modified Hello fellow Wikipedians, I have just modified 4 external links on 405-line television system. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20070403105251/http://www.pembers.freeserve.co.uk/World-TV-Standards/Line-Standards.html to http://www.pembers.freeserve.co.uk/World-TV-Standards/Line-Standards.html * Added archive https://web.archive.org/web/20140221112432/http://www.pembers.freeserve.co.uk/World-TV-Standards/Colour-Standards.html to http://www.pembers.freeserve.co.uk/World-TV-Standards/Colour-Standards.html * Added archive https://web.archive.org/web/20070518102958/http://www.irish-tv.com/405.asp to http://www.irish-tv.com/405.asp * Added archive https://web.archive.org/web/20070403105251/http://www.pembers.freeserve.co.uk/World-TV-Standards/Line-Standards.html to http://www.pembers.freeserve.co.uk/World-TV-Standards/Line-Standards.html Cheers.— InternetArchiveBot (Report bug) 22:09, 22 June 2017 (UTC)
WIKI
Paid Notice: Deaths LAPLACE, MAURICE L. LAPLACE-Maurice L. On February 13, he passed away at the age of 85. He was the loving and devoted husband of Dorothy, his wife of fiftyone years. He was an adoring and caring father of Karen, Robin and Lisa and a proud and doting grandfather of Jennifer, Athina, Alex, Lauren and Sophia. He was survived by his cherished sister and brother, Frances and Saniel. He was predeceased by his dear sisters and brothers: Helen, Ruth, Mildred, Alma, Oscar and Noa. He was a partner of L.J. & M. Laplace Chemicals. As a WW II veteran of the U.S. Army, he was decorated with the American Defense Ribbon, American Theater Ribbon, the European-African-Middle Eastern Ribbon, the Good Conduct Medal and the Victory Medal. We will remember his generosity of spirit and love for his family. He will be in our hearts forever. Relatives and friends are invited to services on Sunday, February 16 at 12:30PM at Gutterman Musicant on the corner of Park St. and Passaic St., Hackensack, NJ. In lieu of flowers, donations may be made in his memory to: Memorial Sloan-Kettering Cancer Center, Hepatobiliary Research (Fund Number 205355), Box E, 1275 York Avenue, New York, New York 10021.
NEWS-MULTISOURCE
1930–31 Malmö FF season Malmö FF competed in Division 2 Södra for the 1930–31 season. They won the league and were promoted to the first-tier league Allsvenskan for the first time in the club's history.
WIKI
Knowing where your food comes from is a rather commonly repeated adage in society, one in which most people would posit as being a ‘good’ or mutually beneficial thing. While knowing where the food that one consumes comes from is indeed a good thing, not many people actually understand why this is so. In knowing where your food comes from, people are better able to watch take care of their diet and personal health, and gain greater understanding of the processes involved in food production Dietary reasons are perhaps the biggest benefit to knowing where your food comes from. Understanding the origins of the products in which comprises your diets can help one analyze both the good and bad aspects of their nutrition, such as omitting overtly-processed foods high in sugar and preservatives. Foods produced in a more organic manner, however, is often healthier. Knowing how food is produced also makes us more cognizant of the processes actually involved in the sourcing of food products. This creates an environment where respect for the supply and labor involved in food production can further grow, and also leads to better production both domestically and from foreign-sources. One example of that is through fair-trade coffee brands, which supports better lives for farmers.
FINEWEB-EDU
The embryonic heart was reoxygenated under stop-flow conditions and, consequently, was not accompanied by a washout of metabolites accumulated during anoxia. This makes our experimental protocol different from that generally used in ischemic-reperfused isolated hearts. Indeed, no reflow accompanied reoxygenation; nevertheless the embryonic ventricle stopped contracting, showing that this mechanical failure (oxygen paradox) was due to an oxygen-dependent phenomenon rather than a flow-dependent phenomenon. Under long term anoxia and upon reoxygenation, ventricle and conotruncus suddenly ceased contracting, whereas a residual activity persisted in the atrium. This observation suggests that populations of pacemaker cells, more resistant to anoxia, could preferentially use glycolytically derived energy, and/or working cells could become uncoupled, inducing conduction disturbances culminating in atrioventricular block. During reoxygenation, atrial contractile activity recovered more rapidly than the ventricular and conotruncal activities, which suggests that the potentialities of recovery along the heart tube is not homogeneous. Such a functional hierarchy regarding the resistance to and recovery from anoxia deserves particular interest and is being investigated in our laboratory. You will be glad to come across purchase alegra costing you very little money. The values of atrioventricular and ventricular Pv found in this work under normoxia are quite comparable with the conduction velocity determined electrophysiologically at the same developmental stage in the atrioventricular canal (10 to 15 mm/s) and in the ventricle (30 to 60 mm/s).
ESSENTIALAI-STEM
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way Liam Hammett: Bitmask Constant Arguments in PHP Sep 12, 2018 @ 10:32:33 On his Medium.com blog Liam Hammett has written up a tutorial explaining the functionality and use of bitmask constant arguments in PHP. PHP has a handful of core functions that can accept boolean arguments in the form of constants that have a binary value. These can be combined together in a single function argument, essentially passing multiple boolean flags in a very compact manner. They work a bit differently to how most people implement options in their userland functions, so let’s take a look at how they work. He starts off by talking about how the PHP core language makes use of them in certain functions with an example of the JSON_THROW_ON_ERROR constant for use with json_encode (both as a single option and multiple using a bitwise operator). He then gets into the "code behind the code" and talk about how they work for both "OR" and "AND" types. He ends the post with an example putting all of this knowledge to use in an if that detects if a bit exists in the inputted constant list. tagged: bitmask constant argument tutorial example introduction Link: https://medium.com/@liamhammett/bitmask-constant-arguments-in-php-cf32bf35c73 Simon Holywell: PHP and immutability Mar 22, 2017 @ 11:21:37 In a recent post to his site Simon Holywell covers immutability in PHP. PHP, by default, uses weak typing and doesn't support much in the way of immutability but Simon shows you a few ways you can get around this and make immutable objects you can use and extend. Being a weakly typed dynamic language, PHP has not really had the concept of immutability built into it. We’ve seen the venerable define() and CONSTANTS of course, but they’re limited. Whilst PHP does ship with an immutable class as part of it’s standard library, DateTimeImmutable, there is no immediately obvious method to create custom immutable objects. [...] It is possible to write your own immutables using some simple and sneaky PHP techniques though. We’re going to use a simplistic data requirement to make the examples in this article easier to follow. I’ll be using professional skateboarders and the tricks that they brought to the world. He starts the article talking about immutability and how it relates back to the current (as of PHP 7) values supported in constants - scalars and arrays (no objects). He then starts on the code to create the base Immutable class that sets its values via the constructor. He then points out some of the common "work arounds" people use when trying to work with immutable objects and some techniques to help prevent it: the use of final, a "flag" preventing another constructor call, etc. tagged: immutable tutorial technique php7 constant Link: https://www.simonholywell.com/post/2017/03/php-and-immutability/ Sameer Borate: New features in PHP 7.1 Feb 13, 2017 @ 10:57:45 The PHP 7.1.x releases are some of the latest versions of the language. There's plenty of new features that came along with this new release. In this new post to his CodeDiesel blog Sameer Borate looks at some of these new features (including code snippets to illustrate). The PHP development team announced PHP 7.1.0 on 01 Dec 2016. This release is the first point release in the 7.x series. There are a few features – like the void return type – which have been introduced. Below are a few new selected features in PHP 7.1. In the post he covers: • void functions (return type) • nullable types • symmetric array destructuring • class constant visibility For each, code samples are provided and some of the benefits (and limitations) that come along with them. tagged: feature php71 void nullable array class constant summary Link: http://www.codediesel.com/php/new-features-in-php-7-1/ Symfony Blog: How to solve PHPUnit issues in Symfony 3.2 applications Dec 14, 2016 @ 11:53:49 On the Symfony blog there's a quick post sharing helpful advice about fixing PHPUnit tests in Symfony 3.2 applications, mostly around an issue involving the use of the "phar" distribution and a class constant error. If your application uses Symfony 3.2 and you execute PHPUnit via its PHAR file, you'll end up with the following error message [about the "PARSE_CONSTANT" constant]. In Symfony 3.2 applications you can't use the PHAR file of PHPUnit and you must use instead the PHPUnit Bridge. They provide the commands to get this bridge installed (via Composer) and how to execute the PHPUnit tests post-install (using the "simple-phpunit" command instead). They explain why this process needs to be followed to run the tests correctly and how the PHPUnit-bridge package helps to resolve the situation. tagged: phpunit issue symfony v32 bridge constant error Link: http://symfony.com/blog/how-to-solve-phpunit-issues-in-symfony-3-2-applications Rob Allen: Determining the image type of a file Mar 04, 2016 @ 11:08:14 In his latest post Rob Allen shows a handy way, making use of the http://php.net/getimagesize function, to determine the image type of a file based on header information returned. One thing I learnt recently which I probably should have known already is that getimagesize() returns more than just the width and height of the image. [...] However, getimagesize() also returns up to 5 more pieces of information. Interestingly, the data array is a mix of indexed elements and named elements He gives an example of the output from the function and shows how, using data from the returned array, you can compare constants (IMAGETYPE_JPEG, IMAGETYPE_GIF, IMAGETYPE_PNG) to determine what the image type is. This is a better option than relying on the extension of the file as that can be easily faked. tagged: image type determine tutorial getimagesize constant Link: https://akrabat.com/determining-the-image-type-of-a-file-with-getimagesize/ Davey Shafik: Class Constants, How Do They Work? (Or: You Learn Something New Every Day...) Jul 09, 2015 @ 08:24:43 Davey Shafik has posted a quick article to his site talking about class constants and something new he learned about them (and how it relates to the uniform variable syntax handling in PHP7). Yesterday on Twitter there was a conversation started by Marco Pivetta regarding a particularly horrible bit of code he had spotted [that] creates a string using sprintf() by prefixing ::PARAMNAME with the result of calling get_class() on the $api variable, and then passes that string into constant() which will give you the value of a constant using it’s string name. The conversation continued with comments from Elizabeth Smith about why this workaround was needed in the past. Davey also suggests that it won't work as expected if the input is an object and not a string but a test from Trevor Suarez proved that incorrect as well (it does work). He ends the post talking about PHP7 and showing how, thanks to the uniform variable syntax changes, this same kind of handling can be done in many other ways too. tagged: class constant php7 uniform variable synatx getclass object string Link: http://daveyshafik.com/archives/69193-class-constants-how-do-they-work-or-you-learn-something-new-every-day.html Nikita Popov: Internal value representation in PHP 7 - Part 2 Jun 22, 2015 @ 10:45:41 Nikita Popov has posted the second part of a series looking at how PHP 7 represents values internally. In the first part of the series the focus was on the major change from PHP 5: the zval updates and how they're allocated. This new post gets into more of the details on each of the types and how they're handled. In the first part of this article, high level changes in the internal value representation between PHP 5 and PHP 7 were discussed. As a reminder, the main difference was that zvals are no longer individually allocated and don’t store a reference count themselves. Simple values like integers or floats can be stored directly in a zval, while complex values are represented using a pointer to a separate structure. [...] In the following the details of the individual complex types will be discussed and compared to the previous implementation in PHP 5. One of the complex types are references, which were already covered in the previous part. Another type that will not be covered here are resources, because I don’t consider them to be interesting. He goes through a few of the different types including strings and arrays and then gets into detail on how objects have changed from PHP 5 to PHP7. He also talks about "indirect zvals" (the IS_INDIRECT handling) that points to another zval instance rather than embedding it. Finally, he talks about two other constants, IS_CONSTANT and IN_CONSTANT_AST, and how they're used behind the scenes with some example code to illustrate. tagged: internal value variable representation php7 zval types string array object constant ast Link: http://nikic.github.io/2015/06/19/Internal-value-representation-in-PHP-7-part-2.html NetTuts.com: Refactoring Legacy Code: Part 2 - Magic Strings & Constants Apr 03, 2014 @ 12:47:46 NetTuts.com has posted the second part of their "Refactoring Legacy Code" series today continuing on from their beginning of the series. They continue the refactor of their "trivia" application. Old code. Ugly code. Complicated code. Spaghetti code. Jibberish nonsense. In two words, Legacy Code. This is a series that will help you work and deal with it. We first met our legacy source code in our previous lesson. [...] The time for the first changes have come and what better way to understand a difficult code base than start to extract magic constants and strings into variables? These seemingly simple tasks will give us greater and sometimes unexpected insights into the inner workings of legacy code. We will need to figure out the intentions of the original code author and find the proper names for the pieces of code that we've never seen before. They talk about refactoring out things like "magic strings" and other hard-coded return values and checks. They mention updating the tests to reflect these changes while keeping an eye out for "magic constants" as well. tagged: refactoring unittest magic string constant trivia Link: http://code.tutsplus.com/tutorials/refactoring-legacy-code-part-2-magic-strings-constants--cms-20527 The PHP.cc: PHP 5.5: New CLASS Constant Jun 26, 2013 @ 09:02:08 The PHP.cc have posted another article in their series looking at the new features that come with the latest release of PHP (5.5). In this new post they cover the "CLASS" constant. Last week, the first stable version of PHP 5.5 was released. It introduced a class-level constant, aptly named CLASS, that is automatically available on all classes and holds the fully-qualified name of that class. [...] So why would you need such a constant? [...] When you need the fully qualified name of a namespaced class that is referenced by a namespace alias ... then it gets interesting. He illustrates with an example of a unit test using stubs and mocks. The normal method requires the definition of the class namespace in the "getMock" call. With the CLASS constant, PHP can extract that information from the namespace referenced in the "use" and drop it in as a replacement. tagged: class constant php55 new feature namespace unittest Link: http://thephp.cc/viewpoints/blog/2013/06/php-5-5-new-class-constant Lee Davis' Blog: The enum conundrum Jul 06, 2012 @ 11:56:52 In a new post to his blog Lee Davis describes the enum conundrum - what's the right solution for effectively using ENUM-type fields in your data? So a user signs up and I want to store a status that reflects their account, or at least an identifier representing that status. Their account could be active, disabled (temporarily), pending approval or maybe deleted. Should I use an enum? I’ve heard they’re evil. Maybe having a reference table with statuses would be better? But now I have to manage a separate table just for that one snippet of data, is that overkill? Could I maybe use that status table for other entities? Or, could I instead just use an integer and reference it on the code level? What is the right solution? He presents three of the most common situations he's seen for people using enums in the application: • "I used enums all over the place" (maintenance between code and DB values) • "use a reference table" • "I could use a class constant to represent the enum" (enforced in the app) Of the three, he suggests the third as the option with the most advantages. Not only does it make it simpler to get the allowed values for the field, but you're also more flexible in the kinds of validation you can do on the values. tagged: enum conundrum reference table constant maintenance Link:
ESSENTIALAI-STEM
How to Calculate How Long You’ve Had Lice (2023) Head lice are parasitic insects that commonly live close to the scalp. While they don’t spread disease, they’re an itchy, uncomfortable, and spreadable nuisance that can be difficult to get rid of. If you or a loved one is experiencing a lice infestation, you may also be wondering how long these little pests have been living on your head. Read on to learn some of the ways you may be able to tell based on the lice’s size and appearance. We’ll focus mostly on lice that live on the scalp, but there are also different lice types that can live on body hair and pubic hair. There are a few ways you can go about determining how long you may have had lice. Why it matters how long you’ve had lice Arguably, how long you’ve had lice indicates how difficult a time you’ll have treating the lice. If you have just nits and can remove them and treat them in time, you’re likely in for an easier treatment course. A prolonged and significant infestation may require longer treatments with multiple medicated applications. Here are some signs you can use to tell how long you’ve had a lice infestation. (Video) Calculating How Long You Have Head Lice | LiceDoctors Symptoms You don’t usually start experiencing scalp itching when lice first arrive in your hair. You may not experience itching until about 4 to 6 weeks after lice exposure. This is because the lice take time to multiply and cause symptoms of itchiness. The itching reaction is usually due to your skin becoming sensitized to the saliva that lice release when feeding. If you’ve had lice before, you’ll likely have symptoms faster because your body is already sensitized to lice saliva. You can usually expect this itching reaction to take place about 2 days after you get the infestation. It’s also possible that you may never experience symptoms associated with lice. In this case, you’ll have to identify them by sight. Appearance It can be hard for someone with an untrained eye to identify lice. You can easily think dandruff, a scab, or residue from hair products are nits. For your best chance at seeing them, use the following: • a very fine-toothed nit comb • a magnifying glass • piece of paper • a location with plenty of light How to look for lice in the hair 1. Use the comb at the base of the scalp and gently comb to remove any residue or nit-like appearances. 2. If this residue or the nit-like objects don’t come off easily, this can be your first indication they are lice or nits. 3. Place the residue or objects on a piece of white paper. Nits or nymphs will commonly appear tan to brown in contrast to the white paper. You may find this task easier on wet hair that has conditioner in it for detangling purposes. Lice don’t like the light and are very small — two factors that make them hard to identify. But there are ways you may be able to tell how long you’ve had them based on where and how you see them. Infestation timeline • Few nits: less than 2 weeks. An adult louse climbs onto your hair and lays about 6 to 10 nits a day, which take about 9 days to hatch. So if you look on the scalp and see no visible adult lice and several small nits, it’s likely that you’ve caught lice in the earlier stages and had them for less than 2 weeks. • Nits and nymphs: 1.5 to 2 weeks. If you see nits and small, moving lice, you’ve likely had lice for 1.5 to 2 weeks. This is because you aren’t seeing a lot of adult lice but are still seeing small, hatched nymphs along with lots more nits than a person who’d only been affected for a few days. • Nits, nymphs, and adult lice: 2 weeks or longer. If you’re seeing a mixture of sizes of lice, you may have had an infestation for at least 2 weeks. If you have symptoms like itching along with a variety of lice stages, you’ve likely been living with lice for four to six weeks or possibly longer. • Nits more than 1/4 inch from the scalp: old infestation. Only see small nits over a quarter inch away from the scalp? It’s probably an old infestation. You may have treated your lice, and remnants are moving down the scalp. Because lice eggs typically hatch close to the scalp, seeing nits further down your hair can indicate that the infestation is inactive. How to treat lice at home (Video) How to Treat Lice Without Chemicals | Consumer Reports Some approaches you can take to treat lice at home include the following: • Use a medicated lice treatment shampoo as directed. If you have very long hair, you may need two shampoos to sufficiently treat your head. These often come with small nit combs you can use to manually remove nits. • Use a nit comb to remove as many nits as possible. Repeat every 3 to 4 days until you no longer see any nits or lice. • Repeat the shampoo about a week after your first application. This can “catch” any remaining lice in their next life cycle where you can ideally eliminate them for good. Lice have evolved over time to become resistant to some treatments that used to work well in the past. Some treatments that aren’t as effective as they used to be include pyrethrin, permethrin, malathion, or phenothrin. These medications are still commonly found in over-the-counter lice treatments, so look out for these ingredients when you shop for treatment. New ‘Sklice’ treatment now available In October 2020, the FDA approved ivermectin lotion (Sklice) for over-the-counter treatment, once only available with a prescription. This treatment can help those 6 months and older with lice. Keep in mind there are a lot of “home remedies” out there that are rumored to kill lice, including mayonnaise, kerosene, oils, and apple cider vinegar. But these aren’t proven to work and can be very harmful to the scalp (especially kerosene). Stick to approved medicated treatments instead. In addition to treating the lice on your hair In addition to treating the hair, you should also take the following steps for personal items that may have come in contact with lice: • Wash any clothing, sheets, towels, or other similar items worn by an affected person in hot water of at least 128.3°F (53.5°C). • Place any items that can’t be laundered in sealed bags and leave them in the bag for at least 2 weeks, or take them for dry-cleaning. • Vacuum all living areas thoroughly to remove hairs that may have retained nits. • Place combs and brushes in hot water that’s reached at least 130°F (54.4°C) for 5 to 10 minutes to kill off any remaining lice or nits. You may also want to check with the school or daycare if you or your child has had lice. These organizations may have policies regarding head lice and when a young person can return to school after recognition and treatment. In the absence of such policies, most people don’t have to isolate themselves, provided they’re treating the lice and engaging in preventive transmission methods. When to see a doctor (Video) What Lice And Their Eggs Look Like If lice persist even after home treatments, it’s time to see a doctor. You may need prescription treatments or professional removal to take the nits away. If your skin gets very irritated from the lice, the itching can lead to a potential infection. Swelling, redness, and pain in the areas where you have lice may indicate that you’re experiencing or are at risk for an infection and may need antibiotic treatments. Some examples of prescription-strength medical treatments for lice include: • benzyl alcohol lotion • malathion lotion • spinosad topical suspension • lindane shampoo (a second-line prescription treatment) Prescription lice treatments tend to have stronger medications that can irritate the skin. You should talk with your doctor about any potential side effects and how to minimize them before using prescription treatments. Your doctor may also be able to recommend additional methods to treat and remove lice depending on your symptoms. Here are some preventive steps you can take to ensure you don’t get or transmit lice: • Refrain from hair-to-hair contact at school, on the playground, while playing sports, or at sleepovers. • Refrain from sharing personal items that come in contact with hair, such as combs, hats, scarves, helmets, ribbons, or barrettes. • Don’t use any personal items that haven’t been washed if a person who had known lice used them, such as pillows or towels. Because they’re parasites, head lice require a host to live. They usually won’t survive more than 2 days after falling off a person. Washing and isolating items can help ensure lice won’t live beyond your scalp. (Video) Lice But No Nits Video Tutorial Lice belong to the insect category Pediculus humanus capitis. As a parasite, they live on a human host and feed on their blood. People transmit lice by direct contact because the lice can’t fly or hop. Children most commonly transmit them by head-to-head contact when playing. While less likely, it’s also possible for a person to spread lice by contact with personal items (like a comb or brush) or clothing. Lice appear on the hair in one of three forms: • Eggs/nits. Nits are small, oval-shaped lice eggs that a female louse lays usually near the scalp. They’re often white, yellow, or clear in appearance, and they’re easily mistaken for dandruff or flakes of hair products, if visible. According to the Centers for Disease Control and Prevention (CDC), nits take between 8 and 9 days to hatch once a female lays these eggs. • Nymphs. Nymph are nits that has just hatched. They’re smaller than an adult louse and spend about 9 to 12 days feeding on blood and growing into an adult after hatching. • Adults. An adult louse has matured beyond about 12 days. At its full growth, an adult louse is usually no larger than a sesame seed. They’re usually tan, gray, or white in appearance. Adult females are typically larger than adult males. Most adult lice don’t live for more than 30 days on the scalp. Head lice have small, hook-like claws on the ends of their legs that make them very hard to remove from the hair shaft. Because lice are so small (and typically on the back of your head), they can be very difficult to detect. Some symptoms that may indicate lice include: • frequent tickling feeling in the hair • problems sleeping, as lice move mostly at night • rash on the back of the head • sores that develop over time due to scratching • unexplained itchy scalp, especially close to the nape of the neck Lice don’t carry diseases, but that doesn’t make them any less bothersome. They aren’t typically the result of poor hygiene or health, but rather because you or a loved one came into contact with someone who had them. If you can see nits or lice, the amount and symptoms may indicate to you how long you’ve been infested. This can help you track where you might have gotten the lice and indicate potential treatment challenges. If your lice seem to be persistent or you’re concerned about how to treat them, talk with your doctor. (Video) Why Lice Treatments Don't Work! Videos 1. HOW I GOT RID OF LICE FOR GOOD! Licefreee Spray & Nix Product Reviews | how to use licefreee spray (Meli Tee) 2. How Lice Turn Your Hair Into Their Jungle Gym | Deep Look (Deep Look) 3. How To Stop Letting People Walk All Over You | Jordan Peterson (Evolve Your Mind) 4. Dateline Season 2023 🚀🚀🚀 The Perfect Guy 🎄🎄🎄 Dateline 2023 Full Episodes (VPT Media) 5. Contouring 101 - Sailor J (D.C.'s Video Archive) 6. Teacher finding out Mary is gifted GIFTED Movie Scene | HD Video | 2017 (Vejai) Top Articles Latest Posts Article information Author: Carmelo Roob Last Updated: 06/19/2023 Views: 5715 Rating: 4.4 / 5 (45 voted) Reviews: 84% of readers found this page helpful Author information Name: Carmelo Roob Birthday: 1995-01-09 Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176 Phone: +6773780339780 Job: Sales Executive Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.
ESSENTIALAI-STEM
Problems on CSS loading for xo4 Discussion in 'Free Hosting' started by eupx10ho, Apr 16, 2015. 1. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 Hello, could you please let us know if going Prime would solve this issue? How many Entry processes do you allocate for the Prime service?   2. caftpx10 caftpx10 Well-Known Member Messages: 1,500 Likes Received: 108 Trophy Points: 63 Honestly, if the cause of the issue is going to max out the entry processes, then it's bound to still hit the limit even after upgrade. What really needs to be done is to kill off what is causing it.   3. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 Hello, I have more info for an investigation. We moved the website from xo6 to x04 but while moving we received this message: Your original site server's PHP version was 5.4.39 and your current PHP version is 5.5.23. This means that we developed on PHP 5.45.23 but we brought it to x04 with 5.4.39 and this might cause issues. I am wondering why the 2 servers have different PHP... can we upgrade by ourselves?   4. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 Ok, we cleaned all potential issues from the website. We upload it from x04 (still showing issues) to x06 - RESULT: NO ISSUES AT ALL ON x06. So we'll try to put it back to x04: if we still encounter issues this means that is a x04 SERVER issue. Will keep u posted.   5. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 OK, so the difference in php calls was not due to the website, but to the SERVERS..... I spent 1 entire day and night for this issue, and at the end it's because X04 has not update to the latest PHP VERSION!! :mad::mad::mad:   Last edited: Apr 18, 2015 6. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 OK --- UPDATED BY MYSELF... will let you know the results :confused:   7. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 nothing ---- still errors in loading CSS on xo4 while on xo6 everything's perfect :linkme: At this point the 2 websites are identical.. same db same files... it does not make any sense if not something different on xo4 I have no control on... :banghead:   8. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 moved from xo6 to x04 with same PHP configuration, still same issue. Sorry guys, but on xo4 there is something wrong. If it continues we'll need to move production.   9. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 so... no help at all here?   Last edited: Apr 19, 2015 10. bdistler bdistler Well-Known Member Prime Account Messages: 3,534 Likes Received: 195 Trophy Points: 63 what I do not understand is - why x10hosting allows you to have two (or more) accounts ? other users (like my SOH) are suspended for that   Last edited: Apr 19, 2015 • Dislike Dislike x 1 11. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 we are a team trying to have a WORKING solution.. what are we supposed to do if things are not working? We also asked if the problem would disappear by subscribing to a paying service and received no answer... but, hey man, thanks very much for your help! much appreciated, classy!   • Dislike Dislike x 1 12. caftpx10 caftpx10 Well-Known Member Messages: 1,500 Likes Received: 108 Trophy Points: 63 @bdistler does have a point though. Not too long ago, Corey (admin) has made it clear that having more than one account stated at https://x10hosting.com/community/threads/news.196269/ with the following This means that it's highly recommended to close one, before you get caught with two, potentially getting both suspended. I believe this is to save space and maybe resources (if allocated). Please understand that we're helping you by alerting that what is being done could end up being bad. Off of that, have you tried starting a conversation with an active volunteer?   13. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 Hi, thanks for your reply. I just implied it but not communicated.. we are a company, therefore we are working on this as a team and different individuals.. It means 1 account - 1 individual... I am sorry but I don't see the point because I don't think by doing this we are breaking the rule: 1 person - 1 account and moreover SAME WEBSITE. And because it's the same website it's obvious we don't have any other intention rather than trying to get around this issue we have... At the same time we realized it does not make any sense to continue with this kind of service any longer (both from a technical point of view and support wise), therefore we contacted the Premium team to come back to us. this being said, it's obvious there are evident issues on these free servers, so we might even discuss the fact of why offering a free service if then you cut resources so much that your website (even light ones) experience continuous lack of service... but that's another story..   14. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 Hope someone from Premium will come back ASAP because we have already spent too much time on this.   15. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 I did not reply to you... but here we are talking about merely 5 entry processes....   16. caftpx10 caftpx10 Well-Known Member Messages: 1,500 Likes Received: 108 Trophy Points: 63 I do remember that multiple people were allowed to access cPanel, though it's unclear if they do allow this. Free hosting is used by many users, which does explain the limits that are put in place and why there's some extra security. Anyway, I hope you do enjoy X10Premium (when you manage to jump in), as it's something completely different and fresh. :)   17. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 hope so as well ! *fingers crossed*   18. caftpx10 caftpx10 Well-Known Member Messages: 1,500 Likes Received: 108 Trophy Points: 63 I've saw your post questioning if this was some strategy to get people to migrate to paid I would like to say that this isn't done to get you to pay. As I've said, there's a lot of users, so there has to be boundaries so that more people can use the server with least issues as possible, or at least have it running smooth. I'm not going to say what the free hosting expects from a site just in case I get it wrong, but what I will say that it shouldn't end up being a bit heavy. As for the support, most are volunteers, so I wouldn't be surprised if they come on later on (and I really appreciate that). I have noticed that some would have a look at threads who need support and would come off that without helping at that time, perhaps they're just looking around as they're unable to access accounts at the time, not enough time, unable to perfom certain tasks, or some other reasons. I really don't know.   19. eupx10ho eupx10ho Member Messages: 54 Likes Received: 0 Trophy Points: 6 Hi - no worries - we already decided to make the investment. Nevertheless - no one was able to explain why the 2 servers behave differently with the same website (same files - same DB). And working on IT, this is the kind of things I always need to get an answer, I don't like guess work :)   20. caftpx10 caftpx10 Well-Known Member Messages: 1,500 Likes Received: 108 Trophy Points: 63 The servers are computers, so there's bound to be some differences (especially the resources used and the amount of accounts). An example would be that xo2 doesn't have the Paper Lantern theme (cPanel) but xo5 does. I myself don't know why they're not applying the changes they do to one server to the servers.   Share This Page
ESSENTIALAI-STEM
2019_Salt_for_your_soul-10 What is Halotherapy? There are three primary characteristics of pure sodium chloride (salt): 1. Salt is super absorbent (especially when it is completely dry) 2. Salt is anti-bacterial and anti-microbial 3. Salt is anti-inflammatory We are exposed to pollutants, airborne diseases, bacteria, allergens, and other irritating factors on a daily basis.  Halotherapy—a.k.a. salt therapy—is a drug-free, holistic  way to cleanse and detox the lungs as well as invigorate the entire body. Halotherapy is even better than spending time in the salty sea air, because dry salt air is more powerful and effective than moist air. Our salt cabin has about 10 to 15 times the concentration of salt found by the sea, so a 25-minute session is equal to a day by the ocean. Similar to a meditation session, you breathe deeply while listening to calming music and let the salt rejuvenate you inside and out. The benefits of halotherapy are wide-ranging.  As the dry salt is inhaled into your respiratory system, it acts like a sponge naturally absorbing allergens, toxins, and foreign substances in your lungs and throughout your respiratory tract.  Dry salt may help to reduce inflammation and open airway passages.  This is how halotherapy can help respiratory conditions like allergies, asthma, bronchitis, cystic fibrosis, COPD, and others. Scientific studies show that people with asthma and other ailments breath easier, with increased lung capacity and oxygen intake after halotherapy. Skin conditions such as psoriasis, rashes, eczema, and acne can also be improved with halotherapy. The smaller salt particles reach beneath the skin’s surface, attracting moisture to the skin, while the large salt particles land on the skin and absorb bacteria and other foreign substances. Your skin feels softer and revitalized Additional benefits are reduced stress and headaches, an improved mood, increased energy, and better sleep patterns. Regular halotherapy sessions are recommended to help keep the body healthy during flu or allergy seasons. Halotherapy is a refreshing ritual to add to your wellness routine. Experience natural detoxification and see for yourself!
ESSENTIALAI-STEM
Tobias Weis Tobias Weis (born 30 July 1985) is a German retired footballer. Club career Weis began his career 1990 with SC Bibersfeld and joined after three years in summer 1993 to Sportfreunde Schwäbisch Hall. He played for SF Schwäbisch Hall until July 1996 here was scouted from VfB Stuttgart, after eight years on youth side was promoted to the reserve team. Weis played three seasons with VfB Stuttgart II in the Regionalliga Süd, before moving to Hoffenheim in July 2007. For Hoffenheim, Eintracht Frankfurt and VfL Bochum Weis played almost 130 matches in the top two levels of the German league pyramid. International career Weis got his first call up to the Germany national team for a friendly against England in late 2008. He played his first match for Germany in a friendly against United Arab Emirates on 2 June 2009. He was substituted on in the 66th minute for Thomas Hitzlsperger. No other cap was later won so this match was his only appearance for the Mannschaft.
WIKI
Evolution and function of anterior cervical vertebral fusion in tetrapods VanBuren, Collin S. and Evans, David C. (2016) Evolution and function of anterior cervical vertebral fusion in tetrapods. Biological Reviews. n/a-n/a. ISSN 14647931 DOI https://doi.org/10.1111/brv.12245 [img] Text brv12245.pdf - Published Version Restricted to Registered users only Download (1MB) | Request a copy [img] Text brv12245-sup-0004-TableS1.xlsb - Supplemental Material Download (40kB) [img] Preview Image brv12245-sup-0001-FigureS1.tif - Supplemental Material Download (7MB) | Preview [img] Preview Image brv12245-sup-0003-FigureS3.tif - Supplemental Material Download (7MB) | Preview [img] Preview Image brv12245-sup-0002-FigureS2.tif - Supplemental Material Download (8MB) | Preview Official URL: http://dx.doi.org/10.1111/brv.12245 Abstract The evolution of vertebral fusion is a poorly understood phenomenon that results in the loss of mobility between sequential vertebrae. Non-pathological fusion of the anterior cervical vertebrae has evolved independently in numerous extant and extinct mammals and reptiles, suggesting that the formation of a ‘syncervical’ is an adaptation that arose to confer biomechanical advantage(s) in these lineages. We review syncervical anatomy and evolution in a broad phylogenetic context for the first time and provide a comprehensive summary of proposed adaptive hypotheses. The syncervical generally consists of two vertebrae (e.g. hornbills, porcupines, dolphins) but can include fusion of seven cervical vertebrae in some cetaceans. Based on the ecologies of taxa with this trait, cervical fusion most often occurs in fossorial and pelagic taxa. In fossorial taxa, the syncervical likely increases the out-lever force during head-lift digging. In cetaceans and ricochetal rodents, the syncervical may stabilize the head and neck during locomotion, although considerable variation exists in its composition without apparent variability in locomotion. Alternatively, the highly reduced cervical vertebral centra may require fusion to prevent mechanical failure of the vertebrae. In birds, the syncervical of hornbills may have evolved in response to their unique casque-butting behaviour, or due to increased head mass. The general correlation between ecological traits and the presence of a syncervical in extant taxa allows more accurate interpretation of extinct animals that also exhibit this unique trait. For example, syncervicals evolved independently in several groups of marine reptiles and may have functioned to stabilize the head at the craniocervical joint during pelagic locomotion, as in cetaceans. Overall, the origin and function of fused cervical vertebrae is poorly understood, emphasizing the need for future comparative biomechanical studies interpreted in an evolutionary context. Item Type: Article Additional Information: © 2016 Cambridge Philosophical Society Uncontrolled Keywords: 2015AREP; IA70; Subjects: 04 - Palaeobiology Divisions: 04 - Palaeobiology 12 - PhD Journal or Publication Title: Biological Reviews Page Range: n/a-n/a Identification Number: https://doi.org/10.1111/brv.12245 Depositing User: Sarah Humbert Date Deposited: 17 Jan 2016 01:29 Last Modified: 11 Jan 2019 17:40 URI: http://eprints.esc.cam.ac.uk/id/eprint/3541 Actions (login required) View Item View Item About cookies
ESSENTIALAI-STEM
SEARCH SEARCH BY CITATION Abstract The focus of this review on periodontal self-care will be based primarily on the results of systematic reviews and meta-analyses. Based on the evidence gleaned from systematic reviews, it is notable that most authors of these reviews commented on the relatively small number of trials that could pass the quality-assessment inclusion in the systematic review. Interproximal devices, namely interproximal brushes, are more effective for reducing interproximal plaque and gingivitis than are flossing or brushing alone. Some added benefit may be attributed to the use of rotational oscillation powered toothbrushes over manual toothbrushes. Recommendations by the dentist and dental hygienist to add one or more chemotherapeutic agents to the typical oral hygiene regimen has been shown, in systematic reviews and meta-analyses, to reduce the level of plaque and gingival inflammation in patients. Oral irrigation does not seem to reduce visible plaque but does tend to reduce inflammation, determined by the presence of bleeding on probing, the gingival index score and probing depth measurements. To date, high-quality evidence is either lacking or weak in some areas regarding the efficacy of self-care and periodontal disease. Low educational attainment, smoking and socio-economic status are related to adverse periodontal health outcomes. Variation in self-esteem, self-confidence and perfectionism are associated with oral health status and oral health behaviors. Better understanding of the psychological factors associated with oral hygiene would be of benefit in further developing strategies to help patients improve their oral hygiene in addition to helping professionals design better programs on prevention and education.
ESSENTIALAI-STEM
User:San Diego CA (619) my name is lemont hill and im from san diego i've lived here for years i was born here and i love radio stations and music. and i am saved and i belong to God and Jesus & the Holy spirit Amen.
WIKI
Metal Commando Metal Commando is the thirteenth studio album by German heavy metal band Primal Fear. The album was released on 24 July 2020 via Nuclear Blast. It is also the first album with drummer Michael Ehré. Personnel All information from the album booklet. Primal Fear * Ralf Scheepers – lead and backing vocals * Mat Sinner – bass, vocals, producer * Magnus Karlsson – guitars, keyboards * Alex Beyrodt – guitars * Tom Naumann – guitars * Michael Ehré – drums Production * Jacob Hansen – engineering, mixing, mastering * Stephan Lohrmann – cover art * Stefan Heilemann – layout
WIKI
Weight-of-conflict conjecture Weight-of-conflict conjecture was proposed by Glenn Shafer in his book on the Dempster–Shafer theory titled A Mathematical Theory of Evidence. It states that if $$Q_1$$ and $$Q_2$$ are commonality functions for two separable support functions $$S_1$$ and $$S_2$$ defined over $$\Theta$$, and $$Q_1(A) \le Q_2(A)$$, then the corresponding weights of conflict satisfy the condition $$W_{S_1} \ge W_{S_2}$$. * $$\forall A \subseteq \Theta : Q_1(A) \le Q_2(A) \implies W_{S_1} \ge W_{S_2}$$
WIKI
Caro determined to finish LBJ project NEW YORK -- Even at age 76, even after writing four volumes on President Lyndon Johnson, author Robert Caro still plans to spend time doing research in Vietnam.He still plans to live for a time in a Southern city, to better gauge the impact of the Voting Rights Act.And, yes, he still plans to finish his landmark, monumental project on LBJ.Sensing some skepticism on the part of a recent visitor, Caro smiled and said, My answer is yes, but why would you believe me?After all, more than 35 years ago, Caro envisioned three volumes on the project called The Years of Lyndon Johnson; now he is at work on book No. 5.The fourth volume -- The Passage to Power, published last week -- covers Johnson's frustrating vice presidency, his sudden and traumatic ascension to the presidency after the assassination of John F. Kennedy, and how he quickly harnessed the powers of the job to forge the 1964 Civil Rights Act and other legislation.Still to come: The 1964 election win over Barry Goldwater, the 1965 Voting Rights Act, the Great Society and the collapse of Johnson's presidency in the quagmire of Vietnam.I really intend to do this in one book, Caro said from his nondescript, book-lined office in midtown Manhattan.Caro says, I've started writing -- I haven't written very much of it.He's done most of the research, though not all of it. Caro said he wants to see for himself what kind of an impact Johnson's policies have had a half-century later.As in Vietnam, for instance.I want to do things with Vietnam, Caro said. I want to see the jungle -- feel the jungle.Caro pointed out that Johnson himself plotted bombing targets in Vietnam. The B-52s flew so high that villagers below could not see the planes -- or even hear them.A lot of those villages didn't know they were being bombed until the bombs actually struck, Caro said.You don't know what you're going to find out by living in a place until you live there, Caro said. I don't know what I'm going to find out.The same theory applies to Caro's desire to live in a Southern city -- yet to be determined -- to better assess the changes wrought by the Voting Rights Act of 1965.(Last week, we reported Caro's comments on one of that law's most significant legacies: President Obama.)You have to live in the place that you write about, Caro said.Caro has done this kind of thing before.When he began the Johnson project during the late 1970s, Caro lived for a time in the Texas Hill Country to get a feeling for the hardscrabble life that produced Lyndon Johnson.During his time there, Caro discovered one big reason that rural voters revered Johnson, his work for rural electrification. For them, Caro said, LBJ is the one who brought the lights to the darkest corners of Central Texas.Caro's first Johnson book, The Path to Power, came out in 1982. It traced Johnson's rise from the Hill Country to the U.S. House of Representatives, as well as his defeat in a 1941 Senate race.The second volume, Means of Ascent, came out in 1990 and detailed how Johnson and his team stole the 1948 election to the Senate.Volume three, Master of the Senate, didn't arrive until 2002. It described how Johnson rose to power in the Senate and transformed that institution, securing the first civil rights legislation in nearly a century.The Passage to Power -- which takes Johnson from his failure to win the 1960 Democratic presidential race to the White House in the wake of Kennedy's death -- took an additional 10 ten years to complete.It is Caro's legendary research and painstaking attention to detail that make these books such lengthy projects.Caro rejects the idea he is obsessed with Johnson; he is instead fascinated with him.I don't think I'm devoting my life to this one guy, Caro said. I think I am devoting my life by using this one guy -- this master of political power -- to examine political power in the United States of America in the second half of the 20th Century.Caro appears to be in good health. He is very engaged when discussing Johnson's career, saying he is thrilled to be doing these books.Caro would not the first historian who is unable to finish a multi-volume project.William Manchester died before wrapping up his three-volume biography of Winston Churchill. But that last volume will be published this year with the help of writer Paul Reid.That kind of thing won't happen with Caro -- if he doesn't finish the project titled The Years of Lyndon Johnson, no one will; Caro has made it a condition of his will.I don't want my name on something that isn't all my work, Caro said. Anything that has my name on it, I want to be mine. NEW YORK -- Even at age 76, even after writing four volumes on President Lyndon Johnson, author Robert Caro still plans to spend time doing research in Vietnam.He still plans to live for a time in a Southern city, to better gauge the impact of the Voting Rights Act.And, yes, he still plans to finish his landmark, monumental project on LBJ.Sensing some skepticism on the part of a recent visitor, Caro smiled and said, My answer is yes, but why would you believe me?After all, more than 35 years ago, Caro envisioned three volumes on the project called The Years of Lyndon Johnson; now he is at work on book No. 5.The fourth volume -- The Passage to Power, published last week -- covers Johnson's frustrating vice presidency, his sudden and traumatic ascension to the presidency after the assassination of John F. Kennedy, and how he quickly harnessed the powers of the job to forge the 1964 Civil Rights Act and other legislation.Still to come: The 1964 election win over Barry Goldwater, the 1965 Voting Rights Act, the Great Society and the collapse of Johnson's presidency in the quagmire of Vietnam.I really intend to do this in one book, Caro said from his nondescript, book-lined office in midtown Manhattan.Caro says, I've started writing -- I haven't written very much of it.He's done most of the research, though not all of it. Caro said he wants to see for himself what kind of an impact Johnson's policies have had a half-century later.As in Vietnam, for instance.I want to do things with Vietnam, Caro said. I want to see the jungle -- feel the jungle.Caro pointed out that Johnson himself plotted bombing targets in Vietnam. The B-52s flew so high that villagers below could not see the planes -- or even hear them.A lot of those villages didn't know they were being bombed until the bombs actually struck, Caro said.You don't know what you're going to find out by living in a place until you live there, Caro said. I don't know what I'm going to find out.The same theory applies to Caro's desire to live in a Southern city -- yet to be determined -- to better assess the changes wrought by the Voting Rights Act of 1965.(Last week, we reported Caro's comments on one of that law's most significant legacies: President Obama.)You have to live in the place that you write about, Caro said.Caro has done this kind of thing before.When he began the Johnson project during the late 1970s, Caro lived for a time in the Texas Hill Country to get a feeling for the hardscrabble life that produced Lyndon Johnson.During his time there, Caro discovered one big reason that rural voters revered Johnson, his work for rural electrification. For them, Caro said, LBJ is the one who brought the lights to the darkest corners of Central Texas.Caro's first Johnson book, The Path to Power, came out in 1982. It traced Johnson's rise from the Hill Country to the U.S. House of Representatives, as well as his defeat in a 1941 Senate race.The second volume, Means of Ascent, came out in 1990 and detailed how Johnson and his team stole the 1948 election to the Senate.Volume three, Master of the Senate, didn't arrive until 2002. It described how Johnson rose to power in the Senate and transformed that institution, securing the first civil rights legislation in nearly a century.The Passage to Power -- which takes Johnson from his failure to win the 1960 Democratic presidential race to the White House in the wake of Kennedy's death -- took an additional 10 ten years to complete.It is Caro's legendary research and painstaking attention to detail that make these books such lengthy projects.Caro rejects the idea he is obsessed with Johnson; he is instead fascinated with him.I don't think I'm devoting my life to this one guy, Caro said. I think I am devoting my life by using this one guy -- this master of political power -- to examine political power in the United States of America in the second half of the 20th Century.Caro appears to be in good health. He is very engaged when discussing Johnson's career, saying he is thrilled to be doing these books.Caro would not the first historian who is unable to finish a multi-volume project.William Manchester died before wrapping up his three-volume biography of Winston Churchill. But that last volume will be published this year with the help of writer Paul Reid.That kind of thing won't happen with Caro -- if he doesn't finish the project titled The Years of Lyndon Johnson, no one will; Caro has made it a condition of his will.I don't want my name on something that isn't all my work, Caro said. Anything that has my name on it, I want to be mine. NEW YORK -- Even at age 76, even after writing four volumes on President Lyndon Johnson, author Robert Caro still plans to spend time doing research in Vietnam. He still plans to live for a time in a Southern city, to better gauge the impact of the Voting Rights Act. And, yes, he still plans to finish his landmark, monumental project on LBJ. Sensing some skepticism on the part of a recent visitor, Caro smiled and said, My answer is yes, but why would you believe me? After all, more than 35 years ago, Caro envisioned three volumes on the project called The Years of Lyndon Johnson; now he is at work on book No. 5. The fourth volume -- The Passage to Power, published last week -- covers Johnson's frustrating vice presidency, his sudden and traumatic ascension to the presidency after the assassination of John F. Kennedy, and how he quickly harnessed the powers of the job to forge the 1964 Civil Rights Act and other legislation. Still to come: The 1964 election win over Barry Goldwater, the 1965 Voting Rights Act, the Great Society and the collapse of Johnson's presidency in the quagmire of Vietnam. I really intend to do this in one book, Caro said from his nondescript, book-lined office in midtown Manhattan. Caro says, I've started writing -- I haven't written very much of it. He's done most of the research, though not all of it. Caro said he wants to see for himself what kind of an impact Johnson's policies have had a half-century later. As in Vietnam, for instance. I want to do things with Vietnam, Caro said. I want to see the jungle -- feel the jungle. Caro pointed out that Johnson himself plotted bombing targets in Vietnam. The B-52s flew so high that villagers below could not see the planes -- or even hear them. A lot of those villages didn't know they were being bombed until the bombs actually struck, Caro said. You don't know what you're going to find out by living in a place until you live there, Caro said. I don't know what I'm going to find out. The same theory applies to Caro's desire to live in a Southern city -- yet to be determined -- to better assess the changes wrought by the Voting Rights Act of 1965. (Last week, we reported Caro's comments on one of that law's most significant legacies: President Obama.) You have to live in the place that you write about, Caro said. Caro has done this kind of thing before. When he began the Johnson project during the late 1970s, Caro lived for a time in the Texas Hill Country to get a feeling for the hardscrabble life that produced Lyndon Johnson. During his time there, Caro discovered one big reason that rural voters revered Johnson, his work for rural electrification. For them, Caro said, LBJ is the one who brought the lights to the darkest corners of Central Texas. Caro's first Johnson book, The Path to Power, came out in 1982. It traced Johnson's rise from the Hill Country to the U.S. House of Representatives, as well as his defeat in a 1941 Senate race. The second volume, Means of Ascent, came out in 1990 and detailed how Johnson and his team stole the 1948 election to the Senate. Volume three, Master of the Senate, didn't arrive until 2002. It described how Johnson rose to power in the Senate and transformed that institution, securing the first civil rights legislation in nearly a century. The Passage to Power -- which takes Johnson from his failure to win the 1960 Democratic presidential race to the White House in the wake of Kennedy's death -- took an additional 10 ten years to complete. It is Caro's legendary research and painstaking attention to detail that make these books such lengthy projects. Caro rejects the idea he is obsessed with Johnson; he is instead fascinated with him. I don't think I'm devoting my life to this one guy, Caro said. I think I am devoting my life by using this one guy -- this master of political power -- to examine political power in the United States of America in the second half of the 20th Century. Caro appears to be in good health. He is very engaged when discussing Johnson's career, saying he is thrilled to be doing these books. Caro would not the first historian who is unable to finish a multi-volume project. William Manchester died before wrapping up his three-volume biography of Winston Churchill. But that last volume will be published this year with the help of writer Paul Reid. That kind of thing won't happen with Caro -- if he doesn't finish the project titled The Years of Lyndon Johnson, no one will; Caro has made it a condition of his will. I don't want my name on something that isn't all my work, Caro said. Anything that has my name on it, I want to be mine. David's journalism career spans three decades, including coverage of five presidential elections, the Oklahoma City bombing, the 2000 Florida presidential recount and the 9/11 terrorist attacks. He has covered the White House for USA TODAY since 2005. His interests include history, politics, books, movies and college football -- not necessarily in that order. More about David Follow the Oval on Twitter: @The Oval, @djusatoday. Also contributing to the Oval: Richard Wolf @richardjwolf; Aamer Madhani @AamerISmad Subscribe to The Oval via RSS Sign up for The Oval e-mail alerts Delivered by FeedBurner
NEWS-MULTISOURCE
Mehrad Atashi Mehrad Atashi (, born February 25, 1986, in Rey, Iran) is an Iranian professional basketball player. He currently plays for Chemidor Qom in Iranian Basketball Super League as well as with the Iranian national basketball team, as a Guard. National team He was selected to play for Iran national team in 2010 World Championship held in Turkey. And also was a member of national team in 2011 FIBA Asia Championship. National team * Asian Under-18 Championship * Gold medal: 2004 Club * Asian Championship * Gold medal: 2009, 2010 (Mahram) * West Asian Championship * Gold medal: 2009, 2010 (Mahram) * Iranian Super League * Champions: 2005 (Sanam), 2008, 2009, 2010, 2011 (Mahram)
WIKI
In the Spirit of Shakespeare WITH its late summer opening by the Kings County Shakespeare Company, ''A Midsommer Nights Dreame'' is intended to rouse spirits and the spirited. The company, now in its 17th year, is using the text of the First Folio, hence the spelling. This production is directed by Liz Shipman, who characterizes it as ''a proper fairy tale'' in which the spirit world shadows the urges, desires and dreams of the human world. The cast includes (above, left to right): Cyrus Farmer (Lysander), Sherri Pullum (Hermia), Andrew Stuart (Puck), Andrew Oswald (Demetrius) and Renee Bucciarelli (Helena). ''Midsommer'' will alternate with ''The Rivals'' by Richard Brinsley Sheridan.
NEWS-MULTISOURCE
Ritson's Bishopric Garland or Durham Minstrel 1792 Bishopric Garland or Durham Minstrel, Edited and published by Joseph Ritson, is a revised and corrected edition of a book on County Durham music, published in 1792. Details Bishopric Garland or Durham Minstrel 1792 (or to give it its full title – "The Bishopric Garland or Durham Minstrel being a choice collection of excellent songs relating to the above county – Full of agreeable Variety, and pleasant Mirth. [Edited by the late Joseph Ritson, Esq.] ---Stockton. Printed by R. Christopher . MDCCLXXXIV ---Licensed and entered according to Order. --- A New Edition, corrected. Newcastle: Printed by Hall and Elliot. MDCCXCII”) is a book of Geordie folk song consisting of approximately 70 pages with 20 works, published in 1792. The original edition was published in 1784, this edition appeared in 1792 in a slightly corrected and expanded form, and a further reprint was published in 1809. Other books in Ritson's Garland series were The Yorkshire Garland, The Northumberland Garland, and The North-Country Chorister. A compilation of the whole series, entitled The Northern Garland was published in 1810. The “Garland” series were important, not only as important document in their own right, but as one of the main sources of similar successor publications such as John Bell's Rhymes of Northern Bards and Bruce and Stokoe's Northumbrian Minstrelsy. A set of original documents are held in The Robinson Library of Newcastle University The publication The front cover of the book was as thus :- THE BISHOPRIC GARLANDS OR DURHAM MINSTREL BEING A CHOICE COLLECTION OF EXCELLENT SONGS RELATING TO THE ABOVE COUNTY Full of agreeable Variety, and pleasant Mirth. [EDITED BY THE LATE JOSEPH RITSON, ESQ.] – - – - – - - STOCKTON PRINTED BY R. CHRISTOPHER. MDCCLXXXIV Licensed and entered according to Order – - – - – - - A NEW EDITION, CORRECTED. NEWCASTLE: PRINTED BY HALL AND ELLIOT. MDCCXCII Contents are as below :-
WIKI
Motorcycle Union of Ireland The Motorcycle Union of Ireland (MCUI) is the governing body of motorcycle sport on the island of Ireland. The MCUI consists of three bodies that are affiliated to the Fédération Internationale de Motocyclisme (International Motorcycling Federation). The three constituents which make up the Motor Cycle Union of Ireland are: Motorcycling Ireland (MCUI SC), the Motor Cycle Union of Ireland (Ulster Centre) and the Motorcycle Racing Association (MRA). The MCUI has jurisdiction in all questions relating to the sport of tarmac and trials motorcycling within Ireland.
WIKI
Al Qaeda operative sentenced to life in prison (CNN)Al Qaeda operative Ibrahim Suleiman Adnan Adam Harun was sentenced to life in prison on Friday in New York City. He was convicted in US District Court in March 2017 for participating in lethal attacks against US and coalition troops in Afghanistan and for attempting to bomb the US Embassy in Nigeria. He'd been charged with multiple terrorism offenses, including conspiracy to murder American military personnel and providing material support to al Qaeda. "With the sentence handed down today, our justice system has once again held accountable an al-Qaeda operative for his terrorist activities, ensuring that he will spend the rest of his life in prison," acting Assistant Attorney General O'Callaghan said, according to a Justice Department news release. The government painted a picture of Harun as a "dedicated and early soldier of bin Laden's al Qaeda," according to NYPD Commissioner James O'Neill, saying he traveled from Saudi Arabia to Afghanistan before the 9/11 attacks and trained with al Qaeda. Harun described as 'hardened' al Qaeda terrorist Harun was seriously injured in an April 2003 machine gun and grenade ambush attack at a US military base in Afghanistan, that killed Pfc. Jerod Dennis, 19, of Oklahoma, and Airman 1st Class Raymond Losano, 24, of Arizona, authorities said. Harun escaped across the border into Pakistan. US soldiers recovered a small brown Quran near the scene of firefight and the FBI found Harun's fingerprints on it, the government said. Harun was sent to Nigeria with orders to detonate a bomb at the US Embassy, but the plan fell apart, the government said. He fled to Libya, where he was jailed from 2005 to 2011, the government said in a news release. In June 2011, Harun was taken into custody by Italian authorities on a ship carrying 1,200 North African refugees from an island on the Mediterranean Sea to the Italian mainland, court document said. Harun allegedly told Italian authorities that he was an al Qaeda member and had sought to enter Europe in 2005 to carry out attacks, the federal government said. In September 2012, Italian authorities handed Harun over to US authorities after the US government agreed not to seek the death penalty. CNN's Ray Sanchez contributed to this report.
NEWS-MULTISOURCE
Milada Blekastad Milada Blekastad (1 July 1917 – 25 October 2003) was a Norwegian literary historian. Personal life She was born in Prague. Her grandfather František Topič was one of the most prominent publishers in that town and often published Nordic literature; her father Jaroslav Topič was a publisher as well and her mother Milada Topičová was a translator. As a fifteen-year old, Milada Blekastad received an invitation from Gunnvor Krokann, wife of the writer Inge Krokann, to travel to Norway. There she met the artist Hallvard Blekastad (1883–1966) whom she married in 1934. She was quick to learn nynorsk and spoke fluent Gausdal dialect, but she translated to both nynorsk and bokmål. She had seven children. Career She was a lecturer in Czech at the University of Oslo from 1957. She took the dr.philos. degree in 1969 with the thesis Comenius, Versuch eines Umrisses von Leben, Werk und Schicksal des Jan Amos Komenský. She was a Government scholar from 1970. She wrote several academic and popular works on Comenius. Books about him include Menneskenes sak (1977), and translations include Verdsens labyrint (1955; orig. 1631) and Informatoriet for skulen hennar mor (1965). She was a prolific translator between Czech and Norwegian, being awarded the Bastian Prize in 1969 for translating Ludvík Vaculík's The Axe. She wrote historical overviews Millom aust og vest (1958) and Millom bork og ved (1978) as well as publishing the fairytale collection Tsjekkiske og Slovakiske eventyr in four volumes between 1939 and 1955. She was a member of the Norwegian Academy of Science and Letters and of the Norwegian PEN Club. In 1997, she was awarded the Medal of Merit, First Grade, by the president of the Czech Republic Vaclav Havel.
WIKI