Document
stringlengths 87
1.67M
| Source
stringclasses 5
values |
|---|---|
Page:The Bobbsey Twins.djvu/27
Rh Just then Mr. Bobbsey came forth from the Lavine residence. Seeing his wife supporting their daughter, he hurried in that direction.
"Grace is not dead," he announced. "She had a fainting spell, that is all. But I think after this she had better leave rope skipping alone."
|
WIKI
|
Dynasty: Mauryan Empire
Reign: 268-232 BCE.
Coronation: 268 BCE
Predecessor: Bindusara ( Father)
Successor: Dasharatha( Grandson)
Sons: Mahendra, Sanghamitra, Tivala, Kunala, Charumati
Spouses: Devi, Karuvaki, Padmavati, Asandhimitra, Tishyaraksha
Mother: Dharma or Shubhadrangi
Ashoka popularly known as” Ashoka the Great” was the most powerful ruler of the Mauryan dynasty who ruled most of the Indian subcontinent from 268 to 232 BCE. Ashoka means “painless without sorrow” in Sanskrit.
His father was Bindusara, and his mother was a low-class princess called Dharma. She was daughter of a poor Brahmin. She was very beautiful even the chief queen was jealous of her beauty.
After the war of Kalinga Ashoka felt miserable on seeing the bloodshed. He promised not to wage war anymore and followed the path of Buddhism. Later he dedicated his life to spreading peace and preaching of Buddhism.
He erected the Ashoka pillars everywhere and spread his edicts on the pillars. The National Emblem of India is an adaptation from his Lion Capital at Sarnath. Most of the information about Ashoka comes from his inscriptions and from Buddhists legends. The rock edicts and the pillar edicts are mostly dated for different years as a ruler.
Ashoka was born in Pataliputra in 304B.C. and died in 232B.C. He was the grandson of Chandragupta Maurya. His father was the second ruler of Mauryan dynasty Bindusara and mother was Dharma. His mother Dharma was the daughter of a Brahmin priest of the Kingdom of Champa.
Due to his mother, Ashoka received a low position among other princes. Born into a royal family, he was good at fighting and was very brave. Besides, he was very good at hunting which is evident from his ability to kill a lion from a wooden rod.
According to Ashokavadana, Ashoka had an elder brother namely Susima and according to Theraghatha commentary he had a younger brother called Vitashoka.
His brothers feared about him and so convinced their father to post Ashoka as a general to distant frontiers. Ashoka proved a competent general and became aware of his brothers as a rival for the throne. It is believed Ashoka killed all his brothers and became King.
when Ashoka was 18 years he was sent to Ujjain as Viceroy. This is the time when he met his first wife Devi who was daughter of a merchant from Vidisha. Ashoka had two children from this wedlock namely Mahendra and Sangamitra who were famous for spreading Buddhism.
Ashoka was called back by Samrat to Pataliputra. He went back alone leaving his wife and children as they belonged to a merchant family not fit to be princess. After returning he married Asandhimitra and was the chief queen.
Different sources mention about the five consorts king Ashoka had. They were Devi, Karuvaki, Asandhimitra, Padmavati and Tishyarakshita. However, Karuvaki is only mentioned in the inscriptions of Ashoka. In the inscription it is mentioned as the mother of prince Tivara. Some say that Tishyarakshita was the regnal name of Kaurvaki.
Ashoka was one of the greatest rulers of the Mauryan Empire. In the beginning Ashoka ruled like his grandfather. Ashoka was disliked by his father Bindusara due to his rough skin. Sushima being the most loved son of Bindusara was apparently the next ruler after Bindusara.
When Ashoka turned 18 years his father Bindusara sent him to Taxila to put down the revolt. According to the sources it is believed that Ashoka was provided with an army of elephants, chariots and infantry but refused to pay any weapons.
It is understood that later weapons were provided through supernatural means. Upon reaching Taxila, the citizens of the place renounced the weapons and welcomed Ashoka to their place. The citizens informed Ashoka that their fight is only against the evil ministers and have nothing against him.
After his success at Taxila, Ashoka was called back and was sent to Ujjain. He also succeeded in Ujjain. According to Dipamvamsa and Mahamvamsa Ashoka fell in love with a merchant's daughter by name Devi. Some also say that she belonged to the Sakya clan. He married her and they had a son and a daughter by name Mahendra and Sangamitra. According to some legends Ashoka was first introduced to Buddhism by Devi.
When Ashoka was still in Ujjain, the people of Taxila started to rebel again. This time Bindusara sent Susima. Susima was working hard to control the rebels in Taxila when his father Bindusara fell ill.
He immediately ordered Susima to return to Pataliputra. However, all the ministers of Bindusara wanted Ashoka to be the successor which was refused by Bindusara. Upon Bindusara’s death Ashoka was crowned as the successor. When Susima returned to Pataliputra then Ashoka’s prime minister Radhagupta threw him to a charcoal pit and burnt him to death.
After he became the emperor Ashoka captured many kingdoms from north to south and east to west. He was constantly at war in the beginning of his reign. He expanded his empire across the Indian sub-continent including Iran and Afghanistan in the west and Bangladesh and Burmese in the east.
Kalinga, a place which is situated in the northeast never came under the control of Chandragupta Maurya or Bindusara. Ashoka decided to conquer Kalinga and hence decided to lead an army to Kalinga. Fierce battle took place between Asoka and the ruler of Kalinga. Thousands of soldiers laid their lives. There was bloodshed everywhere.
The Kingdom of Kalinga was located towards the east coast. Kalinga had several ports and a skilled navy. It was one of the deadliest battles fought between Ashoka and the state of Kalinga.
One of the important wars in the history of mankind is the Kalinga war. This war changed Asoka from a fierce and cruel ruler to a follower of Buddhism. During the Nanda period Kalinga was under the Magadh Empire and later on became an independent state.
Kalinga state was very powerful with huge army power and soldiers. Chandragupta and Bindusara tried to conquer but could not because of its huge material prosperity due to trade relations with Malay and Ceylon.
Ashoka conquered Kalinga 8 years after ascending the throne. The Ashoka’s edicts state that more than 100,000 people, animals died during the war and around 150,000 were taken as captive.
A fierce war was fought between Ashoka and the ruler of Kalinga for many days. More than 100,000 people were killed and 150,000 people were taken as prisoners. The next morning Ashoka went to see the aftermath of the war. He saw burnt houses, carcasses, wounded people and dead bodies everywhere.
There was blood shed everywhere. Many wounded people were crying in pain. There were many horses, elephants lying on the ground. Many people who had lost their beloved were crying and mourning. Even though Asoka won the Kalinga war, the bloodshed changed Ashoka. He returned to Pataliputra with a heavy heart.
Ashoka was grief stricken, he could not sleep at night as scenes of pain, bloodshed, and cries haunted him. Even his wife Devi who was a follower of Buddhism left him.
Ashoka built various stupas and viharas after embracing Buddhism. He also erected pillars at many places. Ashoka is given the credit of developing the stone architecture in India. Some of the famous stupas and pillars include Sanchi Stupa, Mahabodhi temple at Bihar, Barbara caves, pillar at Sarnath, pillar at Vaishali, Bharhut Stupa, Madhya Pradesh and many more. It is believed that Ashoka ordered construction of 84,00,000 viharas.
The 33 inscriptions on the Pillars of Ashoka are the edicts of Ashoka. These inscriptions are also found in some of the caves, boulders during his period. The inscriptions give us some information about the spread of Buddhism during his period.
One can see the inscriptions near the important routes and religious places. However, the inscriptions are not found in major cities like Pataliputra, Ujjain, Taxila where Ashoka worked more prominently. It is believed that Ashoka passed the message to his provincial governors who passed these messages to other officials in their territory.
Ashoka, who was a conqueror, embraced Buddhism and started preaching Ahimsa. He devoted the rest of his life to preaching Buddhism. He preached Dhamma Vijaya.
The word Dhamma is the Prakrit version of the Sanskrit word Dharma. Ashoka's Dhamma is a philosophical entity that emphasizes on high ideals in order to lead a successful life. The principles of Ashoka Dhamma are present in the form of various rock edicts in Brahmi language.
Ashoka appointed Dharma Mahamatra who were basically officers to spread the principles and ideologies of Buddhism worldwide like SriLankan, Burma, Southeast Asia. Asoka traveled intensely worldwide preaching the principles of Buddhism. The Buddhist emperor built many Stupas and Viharas for people.
The most famous among them are the great Sanchi Stupa, Asoka pillar at Sarnath has a four-lion capital. After embracing Buddhism, Ashoka abolished the slaughter of animals and became a vegetarian. He treated everyone equally and with love. Ashoka sent his missionaries to various places. Few among them are:
After ruling for 40 years with harmony, humanity, love, non-violence, Ashoka died in 232B.C. and thus came to an end to the Mauryan Dynasty. Many rulers who came after Ashoka in the Mauryan Empire were insignificant. The Kalinga war had indeed a very great and positive impact on Ashoka. Ashoka embraced the path of peace and ruled with justice and mercy.
According to Ashokvadana and Mahavamsa Ashoka built around 84,000 stupas and Viharas. Some of the Ashoka’s rock edicts mention that the king toured the Bodhi tree and started spreading dhamma during his eighth or ninth year.
He undertook many social welfare activities like digging wells, giving medical treatment for humans and animals and many more activities.
He went out on periodic tours to spread the preaching's of Dharma. Ashoka tried to solve the problems of people through the policy of Dhamma. He started practicing vegetarianism in the royal court and banned animal sacrifices which were not required.
To implement the Dhamma policy he appointed Dharma Mahamatras. He further ordered those matters relating to the public be reported to him at all times. By 12th year in throne, Ashoka started inscribing edicts to spread dhamma. Some of the basic principles of the Dhamma were to
Maintain a good and moral character,
Not to be selfish
To behave kindly and gently with all the living and nonliving things in the world.
To respect other's opinion and decisions
To maintain peace and harmony
The edicts are the inscriptions on the pillars and the rocks to spread Buddhism. The edicts were divided into four categories according to the size either as minor or major. The minor rock edicts were inscribed at the beginning of Ashoka’s reign.
The major rock edicts are the 14 edicts found in Odisha and the Major 7 pillar edicts were inscribed at the end of the reign. The 14 major rock edicts explain how to run the kingdom in a peaceful way. The 14 major rock edicts are:
1) It prohibits animal slaughter for any festival
2) Medical care for all living organisms including humans and animals. Also, social welfare schemes like construction of roads and tree planting.
3) One should respect parents, monks, Brahamans and Sramanas.
4) The killings of animals were stopped. Monk's travel all around preaching the principles of Dhamma.
5) To appoint Dhamma Mahamatta for the welfare and happiness of the poor and aged.
6) Welfare of all beings and to work for their happiness. He encouraged people to bring any kind of problems to him at all times. The second part of the edict deals with speedy administration and transaction of smooth business.
7) A plea to tolerate all religions and sects. TO maintain unity and peace tolerance towards other sects was important.
8)The emperor undertook Dharmayatras to come in contact with different sections of people in the empire.
9) Respect and practice of Dhamma was more important than celebrations performed after birth, marriage or before going for a journey.
10) Denounce fame and glory if people do not respect Dharma.
11) To show respect to elders and to abstain from killing animals.
12) Another appeal for tolerance towards other sects. He considered preaching Dharma is the best gift to give others.
13) The rock edicts request people for conquest of Dhamma instead of war.
14)Purpose of the Rock edicts that have been written.
Truly Ashoka was one of the greatest rulers in the History of India. The edicts and the inscriptions on the pillars are very important rules to succeed in life.
If you make any purchase via a link on this site, I may receive a small commission with no added cost to you.
|
FINEWEB-EDU
|
Little help with exercise 41
#1
i have been debugging code of exercise 40 from last 4 days and now i got all in and out of this exercise but still got one silly question in my mind
on line 36 how other_names is a list
i have checked type of other_names by printing type(other_names) that gives me <class ‘list’>
it is pretty clear one line above on line 35 that list comprehension is used but on line 36 there is no sign of even [] brackets so i’m bit curious that what made other_names a list
#2
You mean this on line 37?
If yes, just check what random.sample() function does. Google it and you will find:
sample() is an inbuilt function of random module in Python that returns a particular length list of items chosen from the sequence i.e. list, tuple, string or set.
#3
yes i googled it and found that python doc says
random. sample ( population , k )
" Return a k length list of unique elements chosen from the population sequence"
in the case of EX41 population is list WORDS and k is the count of “***” in particular snippet
so this sample function returning a list or string
#4
what is the meaning of last phrase drill from EX41
foo.K = Q “From foo, get the K attribute, and set it to Q.”
what i understood is
foo is an object of some class (may be A) and getting the attribute K (which can be variable) and setting it to Q
correct me if i’m wrong
but my question is what is Q ?
#5
Yes, basically foo is an instance of a class A().
then say we have this:
class A(object):
def __init__(self):
self.K = "bjgrft"
foo = A
Q = "whatever"
foo.K = Q
foo.K == "whatever"
True
In this example Q can be any other thing you wanted. You can play in the Python interpreter in your terminal and see for yourself. Write the code above. Make Q equal to any string you wanted, any integer , etc.
#6
as you said to run above code, i did that in two way
one as @io_io you said foo = A
and second as @zedshaw shown in EX40 like calling a class like function foo = A()
i have changed your code a bit
class A(object):
def __init__(self):
self.K = "bjgrft"
print("self = ",self)
foo = A
print("foo = ",foo)
print("A = ",A)
Q = "whatever"
print("Q = ",Q)
#print("foo.K = ",foo.K)
foo.K = Q
print("foo = ",foo)
print("foo.K = ",foo.K)
print("Q = ",Q)
print("foo.K == 'whatever'",foo.K == "whatever")
output of this is
A
if i don’t comment line 12 which is [print("foo.K = ",foo.K)] then i got error which is
AttributeError: type object 'A' has no attribute 'K'
and by second way calling class like function
class A(object):
def __init__(self):
self.K = "bjgrft"
print("self = ",self)
foo = A()
print("foo = ",foo)
print("A = ",A)
Q = "whatever"
print("Q = ",Q)
print("foo.K = ",foo.K)
foo.K = Q
print("foo = ",foo)
print("foo.K = ",foo.K)
print("Q = ",Q)
print("foo.K == 'whatever'",foo.K == "whatever")
i got output like
A()
can you explain difference between two ways
in second way i have not put comment on line 12 as before
and the difference i’m seeing in both way is
• self is printed in second way, not in first way
• getting an memory location of object foo in second way
• in first way i can’t fetch value of K which is on line 12, in second way i can fetch the K
and also can you tell me difference between instance and object
because zed says in section objects are like class of ex40 that
When you instantiate a class what you get is called an object.
and in word drill of ex41 zed says
object = Two meanings: the most basic type of thing, and any instance of some thing.
instance = What you get when you tell Python to create a class.
#7
Class Thing(object):
An instance of this class, is an object in memory. The terminology is where I struggled too.
Think:
Apple is a fruit, is food, is object.
So my “Thing ()” is an instance-“active copy of my class” is also an object.
The class , specifically the written code is the design for my thing. Creating an instance of it tells python to build it, it has the code qualities that make it an object.
Hope that helps!
#8
so basically your are saying that class is not in real or they are shady thing and when we instantiate a class then python gives a instance(copy or example) of that class and object is making that instance into a reality or making physical (means placing into a memory) so indirectly class comes to reality
as you said apple is a fruit, is food, is object
so fruit is class and they are not in real fruit is just a name
now we have an apple which is instance or example of fruit and orange also
now apple and orange are in real they are physical so they are objects
this is what you are trying to say?
#9
The words are descriptors.
Lables for the piece of code that makes up a class.
Granny Smith apples, red deliscuos apple, sour apple. All apples. They’re descriptions.
The piece of code that is the class…
Until you create that “instance”. The code is just an object waiting to be used. Class and instance and object are all the same piece of code. How it’s being used decides it’s label.
#10
I write the code, I save the file. The class piece of code, when called by making the instance:
car=GMCModeltruck()
car is now the actively stored class that the compiler can call upon and use. It can use it’s methods, and access initiated attributes.
#11
so car is instance or object?
#12
The car, in the example is an instance and an object.
Object just refers to the kind of thing it is. It’s not a function, it’s not a list…
It’s an object.
I’m gonna make you a bit of code you can run, but I need coffee first.
All these labels are just ways to identify that same piece of code, it’s purpose, and give python compiler directions what to do with it.
#13
i like to thank you for putting your time and effort to clear my doubt
you mentioned labels which are name for class and class is a piece of code, right?
and “Granny Smith apples, red deliscuos apple, sour apple. All apples. They’re descriptions.” which are all individual instances or examples of class, right?
and they all are also an object of class, right?
#14
It’s all just labels for the compiler to put stuff on neat little shelves so it can get them when it needs to.
Here’s that code. I don’t care if you copy and paste, I learn by seeing something, so this always helps me.
# class instance object
class SimpleExample(object):
def __init__(self):
self.alist = []
self.dictionary = {}
self.integer = 5
self.string = "spam lovely spam"
def simpleExamples_method(self):
print("I am a method within the SimpleExample class")
def test_class_types():
print("~~~~~~~ START ~~~~~~~")
print("objects can be full of useful things.")
try:
SimpleExample.simpleExamples_method()
except Exception as e:
print("we can not use a class that is not yet given a namespace in compiler memory.")
print("error = \n", e)
print("\n")
print("that self is a whole different terminology having to do with the class being 'started' -- initiated.")
# lets tell the compiler to make an instance of our class
spam_on_a_can = SimpleExample()
# Now lets try to use the 'instance's method
try:
print("\n")
print("-------------")
spam_on_a_can.simpleExamples_method()
except Exception as e:
print(e)
# lets see what python **LABELS** each of these as:
print("What type of thing is the SimpleExample?")
print("\t", type(SimpleExample))
print("\n")
print("What type of thing is the spam on a can?")
print("\t", type(spam_on_a_can))
print("what does python see the spam on a can as in memory?")
print("\t", spam_on_a_can)
print("what about the SimpleExample, what does python label that as?")
print("\t", SimpleExample)
print("~~~~~ END ~~~~~")
test_class_types()
#15
and another piece of code for you to try. Feel free to mangle this and experiment.
# more class object instance
class SimpleExample(): #<== lets take object out
def __init__(self):
self.alist = []
self.dictionary = {}
self.integer = 5
self.string = "spam lovely spam"
def simpleExamples_method(self):
print("I am a method within the SimpleExample class")
class SimpleExample2(object): #<== lets make another with object
def __init__(self):
self.alist = []
self.dictionary = {}
self.integer = 5
self.string = "spam lovely spam"
def simpleExamples2_method(self):
print("I am a method within the SimpleExample2 class")
print("What is SimpleExample Python?")
print("\t", type(SimpleExample))
print("What is SimpleExample2 Python?")
print("\t", type(SimpleExample2))
# lets make an instance of both
object_1 = SimpleExample()
object_2 = SimpleExample2()
print("~~~ After an instance of the class's are made ~~~~")
print("What is object_1 Python?")
print("\t", type(object_1))
print("what is the objects address?")
print("\t", object_1)
print("~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~")
print("What is object_2 Python?")
print("\t", type(object_2))
print("what is the objects address?")
print("\t", object_2)
print("\n~~~~~~~ What happened to the original class's code's label?")
print("class object SimpleExample: ")
print("\t", type(SimpleExample))
print("class object SimpleExample2: ")
print("\t", type(SimpleExample2))
print("\n How does python know what is an instance? It's labeled.")
print("Is object_1 an instance of SimpleExample?")
print(isinstance(object_1, SimpleExample))
#16
last line of second example clear me a bit but i want your conformation
what i learned from your code is object is just a label or name and memory location of instance and instance is copy of class (piece of code)
python know’s about every instance with it’s label and memory location (which is object)
and init method is used to initialized your instance into memory through self so self is an instance
#17
Correct. Also a class does not have to have an __ init __ to be used to store things. Try it out.
Initiating stuff is just saying I want my class to store these specific items for use later, and I want them to be related to, belong to this class I have defined.
That’s messy too.
#18
self I also not any special word in python. You can do:
Class SpamALot(object):
Def init(spam):
spam.astring = “this string belongs to the SpamALot class” .
more code for you to try out:
# class's and initiating
class SpamALot(object):
def __init__(spam):
spam.astring = "This string belongs to class SpamALot"
tryit = SpamALot()
print(tryit.astring)
class NoSpam(object):
alist_of_fruits = ['apples', 'oranges', 'pears']
tryit2 = NoSpam()
print(tryit2.alist_of_fruits)
#19
okay so instance will be initialized to first parameter of init method and that parameter can be anything, can be your name or mine, right?
and init method is just used to make container named first parameter of init method and that container contains all the code of class which is an instance of class and this instance is stored in memory by some label or name which is object and python returns this instance to an object or name, right?
#20
An instance doesn’t have to have any parameters.
The base class doesn’t either.
Initiating parameters is optional.
A class is just a Tupperware container who’s label can stick to everything inside.
The instance is just the copy of that container the compiler can take off the shelf, open up and use what’s inside.
I’m not sure if using so many words to describe it is necessary. Just play with the code, make it do tricks, you’ll see.
|
ESSENTIALAI-STEM
|
Universiti Teknologi Malaysia Institutional Repository
Interwined study on brain bio-electrical signal and salivary protein for mental stress level indicator
Mohammad, Nur Aini Fadzilah (2016) Interwined study on brain bio-electrical signal and salivary protein for mental stress level indicator. Masters thesis, Universiti Teknologi Malaysia, Faculty of Biosciences and Medical Engineering.
[img]
Preview
PDF
658kB
Official URL: http://dms.library.utm.my:8080/vital/access/manage...
Abstract
Lifetime exposure to stress can have significant impact on health that increase the risk of having diseases that may lead to death. In this project, inter-relationship between brain activity and salivary alpha-amylase (sAA) as stress marker is investigated in response to induced mental-stress activities. By using psychophysics experiment to alter normal mental condition, several mental tasks with different levels of difficulty (baseline level: 100% correct answer, easy level: 65-75% correct answer; medium level: 20-40% correct answer, and hard level: 0% correct answer) are presented to 20 healthy participants (10 male; 10 female). In this study, participants' normal mental condition is defined using results from perceived stress scale (PSS-IO) questionnaire given to them before experimental procedure with total score of 40. Participant with PSS-IO total score lower than 30 is considered in their normal mental condition. Brain activity from participants were recorded using electroencephalogram (EEG) and their saliva samples were also collected during experimental procedure. The characteristic of sAA is a biomarker for autonomic nervous system reacting sensitively to stress-related changes. A correlation analysis was conducted to see the significant correlation between specific activated brain area and sAA concentration level during alpha and beta frequency band specifically focusing on superior frontal gyrus, middle frontal gyrus, inferior frontal gyrus, orbital gyrus, anterior cingulate, and insula areas. Positive correlation that was statistically significant between brain activities in beta frequency band and sAA concentration level was found in insula area (F 0.998, rr- 3, p~0.042<0.05) for fJz band and anterior cingulate (F 0.997, rr- 3, p=0.047<0.05) and insula area (r= 0.999, n= 3, p= 0.031 <0.05) for fJ3 band. However, alpha-band activities and sAA level did not show any statistically significant correlation in all six desired brain area. These areas were significantly more active under stimuli with highest level of difficulties compared with that of the lowest level. Saliva analysis using ANOVA also showed statistically significant difference in concentration level of sAA for 4 different groups: (F (3, 8) =55.76509, p~0.00001<0.05) where only medium (M=1l0.79, SD=3.97); t (4) = 2.78, p= 0.002<0.0083 (two-tailed) and hard level (M~123.56, SD~2.50); t (4) ~ 2.78, p~O.OOOI <0.0083 (two-tailed) has significantly differ from baseline level (control group). In conclusion, brain activity in anterior cingulate and insula area within beta frequency band and sAA level showed statistically positive correlation, as it altered normal mental condition in regards to different levels of stress.
Item Type:Thesis (Masters)
Additional Information:Thesis (Sarjana Kejuruteraan (Bioperubatan)) - Universiti Teknologi Malaysia, 2016; Supervisor : Dr. Nugraha Priya Utama
Subjects:Q Science > QH Natural history > QH301 Biology
Divisions:Biosciences and Medical Engineering
ID Code:78927
Deposited By: Fazli Masari
Deposited On:17 Sep 2018 07:23
Last Modified:17 Sep 2018 07:23
Repository Staff Only: item control page
|
ESSENTIALAI-STEM
|
Outline of Karnataka
The following outline is provided as an overview of and topical guide to Karnataka:
Karnataka is the 6th biggest, 8th most populous, 13th highest and 16th most literate state of the 28 states of the democratic Republic of India. Karnataka is ranked 3rd in the country in tax revenue and 7th in the country in GDP. Karnataka is at 8th position in life expectancy and 11th in female-to-male sex ratio among the states in India. Karnataka is at 7th most media exposed states in India.
Names
* Common name: Karnataka
* Previously known as :State of Mysore
* Pronunciation:
* Official name: Karnāṭaka
* Nicknames: Kannada nādu, Karunādu
* Adjectivals
* Karnataka
* Karnāṭakadavaru/Karnatakan
* Canarese
* Demonyms
* Kannadigaru
* Kannadigas
* Canarese
* Abbreviations and name codes
* ISO 3166-2 code: IN-KA
* Vehicle registration code: KA
Rankings (amongst India's states)
* by population: 8th
* by area: 6th
* by crime rate (2016): 12th
* by gross domestic product (GDP) (2019): 3rd
* by Human Development Index (HDI): 18th
* by life expectancy at birth: 10th
* by literacy rate: 23rd
Geography
Geography of Karnataka
* Karnataka is: an Indian state, a state of the Republic of India.
* Rainfall in Karnataka
Location of Karnataka
* Karnataka is situated within the following regions:
* Northern Hemisphere
* Eastern Hemisphere
* Eurasia
* Asia
* South Asia
* Indian subcontinent
* India
* South India
* Time zone: Indian Standard Time (UTC+05:30)
The state has three principal geographical zones:
* 1) Karavali
* 2) Malenadu
* 3) Bayaluseeme
East flowing rivers
26 east-flowing rivers.
* Amarja
* Arkavathy River
* Bhadra River
* Chakra River
* Dandavathi
* Ghataprabha River
* Hemavati River
* Honnuhole River
* Kabini River
* Kaveri River
* Kedaka River
* Krishna River
* Kubja River
* Lakshmana Tirtha River
* Malaprabha River
* Palar River
* Panchagangavalli River
* Penner River
* Ponnaiyar River
* Shimsha
* South Pennar River
* Tunga River
* Tungabhadra River
* Varada
* Vedavathi River
* Vrishabhavathi River
West flowing rivers
10 west-flowing rivers, providing 60% of state's inland water resources.
* Gangavalli River
* Aghanashini River
* Kali River
* Kumaradhara River
* Shambhavi River
* Varahi River
* Souparnika River
* Sharavathi River
* Kumadvathi River
* Netravati River
* Gurupura River
Reservoirs
* Alamatti
* Linganamakki
* Bhadra reservoir
* Tungabhadra dam, Hospete
* Krishna Raja Sagara
* Tippagondanahalli Reservoir
* Haringi dam
* Gorur dam.
* Kabini dam.
* Navilatirtha Dam, Saundatti taluka of Belgaum District
Lakes
* Lakes in Bangalore
* Mysore city lakes
* Unkal lake, Hubli
* Fort Lake Belgaum
* Heggeri Lake, Haveri
* Hagari Jalashaya, Malavi
Districts of Karnataka
Districts of Karnataka There are 30 districts in Karnataka:
* Bagalkote
* Bengaluru Rural
* Bengaluru Urban
* Belagavi
* Bellary
* Bidar
* Vijayapura
* Chamarajanagar
* Chikkaballapur
* Chikkamagaluru
* Chitradurga
* Dakshina Kannada
* Davanagere
* Dharwad
* Gadag
* Kalburgi
* Hassan
* Haveri
* Kodagu
* Kolar
* Koppal
* Mandya
* Mysuru
* Raichur
* Ramanagara
* Shimoga
* Tumakuru
* Udupi
* Uttara Kannada
* Yadgir
Taluks of Karnataka
Taluks of Karnataka
* Afzalpur
* Aland
* Alanvara
* Alur
* Anekal
* Ankola
* Annigeri
* Arkalgud
* Arsikere
* Athani
* Babaleshwar
* Badami
* Bagalkot
* Bagepalli
* Bailahongal
* Bangarapet
* Bantwal
* Basavakalyan
* Basavana Bagevadi
* Belgaum
* Bellary
* Beltangadi
* Belur
* Bengaluru East
* Bengaluru North
* Bengaluru South
* Bhadravati
* Bhalki
* Bhatkal
* Bidar
* Bidar
* Bijapur
* Bilagi
* Brahmavara
* Byadgi
* Baindur
* Chadchan
* Challakere
* Chamrajnagar
* Channagiri
* Channarayapattana
* Chik Ballapur
* Chikmagalur
* Chiknayakanhalli
* Chikodi
* Chincholi
* Chintamani
* Chitapur
* Chitgoppa
* Chitradurga
* Dandeli
* Davanagere
* Devadurga
* Devanhalli
* Devar Hipparagi
* Dharwad
* Doddaballapura
* Gadag-Betigeri
* Gangawati
* Ganjendragad
* Gauribidanur
* Gokak
* Gubbi
* Gudibanda
* Kalaburagi
* Guledgudda
* Gundlupet
* Gurmitkal
* Hagaribommanahalli
* Haliyal
* Hangal
* Hanur
* Harihar
* Harpanahalli
* Hassan
* Haveri
* Heggadadevanakote
* Hirekerur
* Hiriyur
* Holalkere
* Holenarsipur
* Homnabad
* Honavar
* Honnali
* Hoovina Hadagalli
* Hosanagara
* Hosdurga
* Hoskote
* Hospet
* Hubli city
* Hubli
* Hukkeri
* Hulsoor
* Hungund
* Hunsagi
* Hunsur
* Ilkal
* Indi
* Jagalur
* Jamkhandi
* Jevargi
* Joida
* Kadaba
* Kadur
* Kagawad
* Kalghatgi
* kanakapura
* Kamalapura
* Kamalnagar
* Kampli
* Kanakagiri
* Karatagi
* Karkal
* Karwar
* Khanapur
* Kittur
* Kolar
* Kolhar
* Kollegal
* Koppa
* Koppal
* Koratagere
* Kotturu
* Krishnarajanagar
* Krishnarajpet
* Kudligi
* Kukanur
* Kumta
* Kundapura
* Kundgol
* Kunigal
* Kurugodu
* Kushtagi
* Lakshmeshwara
* Lingsugur
* Maddur
* Madhugiri
* Madikeri
* Malavalli
* Malur
* Mandya
* Mangalore
* Manvi
* Maski
* Molakalmuru
* Moodbidri
* Mudalgi
* Muddebihal
* Mudhol
* Mudigere
* Mulbagal
* Mundargi
* Mundgod
* Mysore
* Nagamangala
* Nanjangud
* Narasimharajapura
* Nargund
* Navalgund
* Nelmangala
* Nidagundi
* Nipani
* Nyamati
* Pandavapura
* Pavagada
* Piriyapatna
* Puttur
* Rabkavi Banhatti
* Raichur
* Ramdurg
* Ranibennur
* Raybag
* Ron
* Sagar
* Sakleshpur
* Sanduru
* Saundatti
* Savanur
* Sedam
* Shahabad
* Shahpur
* Shiggaon
* Shikaripura
* Shimoga
* Shirahatti
* Shorapur
* Shrirangapattana
* Siddapur
* Sidlaghatta
* Sindagi
* Sindhnur
* Sira
* Sirsi
* Siruguppa
* Sirwar
* Somvarpet
* Sorab
* Sringeri
* Srinivaspur
* Sulya
* Talikota
* Tarikere
* Tikota
* Tiptur
* Tirthahalli
* Tirumakudalu Narasipura
* Tumkur
* Turuvekere
* Udupi
* Vadagera
* Virajpet
* Yadgir
* Yadrami
* Yelahanka
* Yelandur
* Yelbarga
* Yellapur
Demographics
* Demographics of Karnataka
* Economy of Karnataka
* Religion in Karnataka
Government and politics of Karnataka
Politics of Karnataka
* Form of government: Indian state government (parliamentary system of representative democracy)
* Capital of Karnataka: Bengaluru
* Elections in Karnataka
* (specific elections)
* Unification of Karnataka
Union government in Karnataka
* Rajya Sabha members from Karnataka
* Karnataka Pradesh Congress Committee
* Indian general election, 2009 (Karnataka)
* Indian general election, 2014 (Karnataka)
Branches of the government of Karnataka
Government of Karnataka
Executive branch of the government of Karnataka
* Head of state: Governor of Karnataka
* Head of government: Chief Minister of Karnataka
* Council of Ministers of Karnataka
Legislative branch of the government of Karnataka
Karnataka Legislative Assembly
* Constituencies of Karnataka Legislative Assembly
Judicial branch of the government of Karnataka
* High Court of Karnataka
* Chief Justice of Karnataka
Law and order in Karnataka
Law of Karnataka
* Law enforcement in Karnataka
* Karnataka Police
History
* History of Karnataka
* Political history of medieval Karnataka
* Etymology of Karnataka
* Nanda Empire
* Mauryan empire of Emperor Ashoka
* Satavahana
* Kadambas
* Kadamba Dynasty founded by Mayurasharma
* Western Ganga Dynasty
* Badami Chalukyas
* Rashtrakuta Empire of Manyakheta
* Western Chalukya Empire
* Hoysalas
* Vijayanagara empire
* Nayakas of Chitradurga
* Madakari Nayaka
* Kempegowda
* Moghuls
* architecture
* literature
* Literature
* literary metres
* Vesara style of architecture
* Indo-Saracenic
* Battle of Talikota
* Nizam of Hyderabad
* Tippu Sultan
* Ekikarana Movement
Culture
* Art and culture of Karnataka
* Carnatic music
* Architecture of Karnataka
* Cuisine of Karnataka
* Kannada people
* Tulu people
* Kodava people
* Beary people
* Konkani people
* Folk arts of Karnataka
* Cinema of Karnataka
* Languages
* Kannada language
* Tulu language
* Kodava language
* Konkani language
* Beary language
* Dances
* Gubbi Veeranna Nataka Company
* Veeragase
* Kamsale
* Dollu Kunitha
* Bharatanatya
* Dollu Kunitha
* Bhuta Kola
* Yakshagana
* Nagaradhane
* Gaarudi Gombe
* Togalu Gombeyaata
* Veeragase
Symbols of Karnataka
Symbols of Karnataka
* State animal: Indian Elephant
* State bird: Indian roller
* State flower: Lotus
* State seal: Seal of Karnataka
* State tree: Sandalwood
North Karnataka
* World heritage centres
* Hampi
* Group of 8th century CE monuments, Pattadakal:
* Historical locations
* Western Chalukya
* Aihole:
* Badami:
* Basavana Bagewadi
* Basavakalyana,
* Bidar District
* Annigeri
* Bankapura
* Dambal
* Haveri
* Gadag
* Lakkundi
* Someshwara temple complex Lakshmeshwar
* Galaganatha Galageshwara temple
* Chaudayyadanapura
* Mahadeva Temple (Itagi)
* Shambulinga Temple Kundgol
* Hooli Panchalingeshwara Temple
* Lakshmeshwar
* Kudalasangama
* Rashtrakuta dynasty
* Malkhed, Kalaburagi district
* Naregal, Gadag District
* Kadamba dynasty
* Halasi
* Hangal
* Banavasi
* Deccan Sultanates
* Bijapur jaws are trying to devour an elephant.
* Bidar:
* Gulbarga
* Raichur
* Lakshmeshwar
* Rattas
* Saundatti
* Forts
* Basavakalyan Fort
* Bidar Fort
* Gulbarga Fort
* Savadatti Fort
* Bellary Fort
* Sandur Fort
* Gajendragad
* Nargund fort
* Other
* Sonda
* Ulavi
* Yana
* Utsav Rock Garden, Shiggaon
Coastal Karnataka
* Gokarna
* Mangalore
* Udupi
* Karkala
* Venur
* Malpe Beach
* Panambur Beach
* Kukke Subramanya
* Dharmastala
* Kollur
* Moodabidre
* Bhatkal
* Honnavar
* Ankola
* Murudeshwar
* Karwar
South Karnataka
* Bengaluru
* Mysuru
* Belur
* Halebidu
* Arasikere
* Aralaguppe
* Madhugiri
* Sira
* Yediyur
* Madikeri
* Srirangapattana
* Melukote
* Maddur
* Nanjanagudu
* Talakadu
* Bhadravathi
* Ikkeri
* Sravanabelgola
* Somnathpur
* Jog Falls
* Mekedatu
* Hesaraghatta
* Shivanasamudram
* Hogenakkal Falls
* Devarayanadurga
|
WIKI
|
Generation of a PXR reporter human induced pluripotent stem cell line (PXR-mCherry hiPSC) using the CRISPR/Cas9 system
Hyemin Kim, Ji Woo Kim, So Jin Kim, Young Jun Choi, Dae Sung Kim, Han Jin Park
Research output: Contribution to journalArticlepeer-review
1 Citation (Scopus)
Abstract
Pregnane X receptor (PXR) is a key nuclear receptor that mediates drug metabolism and stimulates hepatocyte proliferation. However, the lack of PXR expression in human pluripotent stem cell-derived hepatocytes limits their application for drug screening and toxicity testing. Here, we generated a PXR-mCherry reporter human induced pluripotent stem cell (hiPSC) line using the CRISPR/Cas9 system. PXR-mCherry hiPSCs were pluripotent and had differentiation potential and a normal karyotype. This cell line is an important tool for identifying factors that increase PXR-mediated drug metabolism and hepatocyte proliferation.
Original languageEnglish
Pages (from-to)72-75
Number of pages4
JournalStem Cell Research
Volume26
DOIs
Publication statusPublished - 2018 Jan
ASJC Scopus subject areas
• Developmental Biology
• Cell Biology
Fingerprint Dive into the research topics of 'Generation of a PXR reporter human induced pluripotent stem cell line (PXR-mCherry hiPSC) using the CRISPR/Cas9 system'. Together they form a unique fingerprint.
Cite this
|
ESSENTIALAI-STEM
|
Portal talk:Current events/2014 February 23
Oldest survivor of event
I moved the following entry to here, because there are many people listed under List_of_Holocaust_survivors, and logically there will frequently be a death of the oldest known survivor. I think we should wait until we get news of the death of the last Holocaust survivor. Otherwise, we may need to make room for the deaths of every oldest person who experienced World War II, or every other major world event. Mikael Häggström (talk) 17:33, 24 February 2014 (UTC)
|
WIKI
|
Wikipedia:Articles for deletion/The War That Ended the World
The result was Delete. —Quarl (talk) 2007-03-08 10:51Z
The War That Ended the World
* – (View AfD) (View log)
I think this is probably something someone made up in school one day -- IMDB and Google searches have failed to come up with anything implying that this exists or that any of these people are actors. I asked MadMax, who created it, about it, and he said he did so just to move the information off the page for Jordan Harris (whose IMDB page doesn't mention anything about this movie), and he agrees that it's probably either made up or very NN. My search did turn up the suspicious fact that there's a school in Colorado named Stargate (the supposed setting of the movie), and a teacher at that school named Marcella Embry (one of the supposed actors). Pinball22 18:12, 5 March 2007 (UTC)
* Speedy Delete due to WP:CSD against Stargate school if it's fake or WP:CSD if it's just some amateur movie. - Pious7 18:28, 5 March 2007 (UTC)
* Speedy delete: Most likely a high-school project. Entirely non-notable. Seicer (talk) (contribs) 19:39, 5 March 2007 (UTC)
* Strong delete. Checking the CSD stuff, I can't come up with a good rationale other than WP:NFT - and that's not a CSD criteria. Still, this looks like an ambitious fan project. --Dennisthe2 20:24, 5 March 2007 (UTC)
* Comment. It should also be mentioned, Harris hasn't worked on a feature film since Stuart Little 2 (2002). It seems doubtful that he would make his comeback on an apparent minor independent film in which he is clamed to have been involved in the designing of various cgi and digital effects. MadMax 21:41, 5 March 2007 (UTC)
* Speedy Delete per CSD G10 or A7 as per Pious7. This badly written article cannot be verrified anywhere as true. A1octopus 09:42, 6 March 2007 (UTC)
* Delete per WP:NFT or WP:CRYSTAL. Either one works, as I could find nothing to subtantiate that this is even a real film. -- Black Falcon 20:07, 6 March 2007 (UTC)
|
WIKI
|
Wikipedia:Articles for deletion/Katie Reider
The result was No consensus to delete at this time. —Sean Whitton / 13:14, 25 July 2008 (UTC)
Katie Reider
* ( [ delete] ) – (View AfD) (View log)
Prod removed with no reasoning, delete per MUSIC and NOTMEMORIAL. This wholy uncited article was created after the subject's death. A Google News search draws no coverage outside of Cincinnati, OH and Columbus, OH (her local area) prior to her obituary notice. As she was an independent musician, there are no major tours, no charted hits, no gold records, no assertion of stylistic representatation (in fact, a recent edit to the article compares her to more established artists), no major music awards or radio play, and in fact, nothing at all that fits WP:MUSIC besides the theme song criterion (which is uncited), despite a close to ten-year career claimed by the article. Perhaps the most pertinent question is that if she was so notable as to have an article, why did no one think to start the article before she died? This seems to be a perennal problem here on WP. MSJapan (talk) 21:39, 19 July 2008 (UTC)
* KEEP. Katie Reider received five awards for her music. Katie Reider's work was notable, and her Blue Jordan Records label, which has a Wikipedia entry, produces other notable artists -- at least one of whom, David Wolfenberger, has a Wikipedia entry. Katie Reider is cited on the Blue Jordan Records entry and was mentioned there prior to her death, so that should further establish her notability. Katie's music is routinely played on Sirius, and her music has appeared on nationally broadcast television shows such as "Dawson's Creek." She was in the midst of an East Coast music tour when she had to stop the tour for medical treatment. She released four records within six years and performed at several regional independent music festivals. News of Katie's death was reported on several websites -- many of them outside the Columbus and Cincinnati, Ohio, region.Nomad 2 (talk) 17:36, 21 July 2008 (UTC)
* Comment: One vote only. MSJapan (talk) 16:10, 23 July 2008 (UTC)
* keep Women's music rarely gets radio air time however she is on Sirius, in my view, this woman would have had an article on Wikipedia soon if not for her illness. Ladyjjames (talk) 02:31, 20 July 2008 (UTC)
* We do not have articles for people who may have become notable, only for those that are. TigerShark (talk) 20:49, 20 July 2008 (UTC)
* Reider's death was reported in Europe (Source: http://www.pinknews.co.uk/news/articles/2005-8417.html). She was notable. Nomad 2 (talk) 02:49, 23 July 2008 (UTC)
* Nomad, that is an overstatement of international coverage of her death. In the source above, Reider's death was reported by Pink News, a well-regarded European GLBT news source, which makes sense as Reider was a gay rights activist. However, the coverage from Pink News should not indicate that she is being covered by European media not centered on GLBT issues. -- Guroadrunner (talk) 14:37, 23 July 2008 (UTC)
* * COMMENT The fact remains that a reputable European news source covered Katie Reider's death because of her music and her work as a gay rights activist. The editors of Pink News clearly felt Katie Reider's craft and accomplishments were of sufficent familiarity and interest to its readers to report on her death. As a former reporter with three large national newspaper chains in the United States, I can assure you that news organizations do not write obituaries for people for whom such attention would puzzle its readers.Nomad 2 (talk) 21:31, 23 July 2008 (UTC)
* Keep Four albums in six years (per All Music Guide) show she was not just a flash in the pan. While she didn't receive national attention prior to her death, it seems she had an established fan base--possibly enhanced due to her illness, possibly not--and that she certainly appears to have had a certain amount of regional notability. Folkies and coffeehouse musicians don't often get much coverage, but she appears to have received more than about 95% of them. Eauhomme (talk) 06:18, 20 July 2008 (UTC)
* Most of the facts in the article, including theme song criteria, are quoted from an article in the Cincinnati Enquirer on her death, http://news.cincinnati.com/apps/pbcs.dll/article?AID=/20080714/ENT/80714003 Eauhomme (talk) 08:29, 20 July 2008 (UTC)
* Having a song used on a TV show is not the same as having a song which was the theme tune to a TV show, which is what WP:MUSIC specifies. So unless she wrote the theme tune to Dawson's Creek (which I don't think is claimed) then she still fails WP:MUSIC. TigerShark (talk) 21:14, 21 July 2008 (UTC)
* No. WP:MUSIC specifies "Has performed music for a work of media that is notable...." It cites the theme song as an example, not the defining criteria. Nomad 2 (talk) 02:42, 23 July 2008 (UTC)
* Comment: Incidental music in an episode of a TV show is not notable. MSJapan (talk) 16:10, 23 July 2008 (UTC)
* COMMENT: WP:MUSIC states "It has been the subject of multiple non-trivial published works whose source is independent from the musician/ensemble itself and reliable." Katie's career and performances have been covered with extensive original reporting by numerous news organizations in large DMAs and overseas. WP:MUSIC states "performance in a television show." Katie Reider's music appeared in several nationally broadcast TV shows. WP:MUSIC further states "Has been placed in rotation nationally by any major radio network." Katie Reider's music is in rotation on Sirius Satellite Radio. Finally, Katie Reider's work seems to be covered by Point 7: "the local scene of a city." She received five local music awards.Nomad 2 (talk) 21:42, 23 July 2008 (UTC)
* Speedy delete Per WP:A7. And even if sources are added, it fails to meet the WP:BAND guidelines. StaticGull Talk 14:34, 20 July 2008 (UTC)
* I disagree. Katie Reider's music was used in nationally broadcast television shows and is in rotation on Sirius Satellite Radio. Also, Reider's record label is a label of note, and she is cited on Blue Jordan Records Wikipedia page. Further, she won five music awards during her career, and she toured extensively in the United States. Nomad 2 (talk) 02:49, 23 July 2008 (UTC)
* Comment: The awards were local, there seems to be no assertion of her having toured nationally, and Blue Jordan is not a label of note. The article on the label lists 19 releases in 11 years, all from local artists only - the various stubs that are bluelinked only build false notability, as most of them only list the same info in the label article. MSJapan (talk) 16:10, 23 July 2008 (UTC)
* Note: This debate has been included in the list of Bands and musicians-related deletion discussions. -- the wub "?!" 20:37, 20 July 2008 (UTC)
* Delete I cannot see anything that prevents the subject from failing the general tests of WP:N and the specific tests of WP:MUSIC. Only the album releases had a chance of notability but they seem to have been published by an independant label which does not seem to be an "important" indie label (as defined in WP:MUSIC). TigerShark (talk) 20:49, 20 July 2008 (UTC)
* A7 speedy delete Virtually all the article was a copyright violation as User Freyde noticed: We can't have copy and paste articles on Wikipedia. Artene50 (talk) 21:54, 20 July 2008 (UTC)
* Keep: The article clearly asserts notability and is reasonably well sourced. Local music awards & use of her music in familiar TV programming meets criteria similar to WP:MUSIC, the many reliable sources noting her death suggest she meets WP:N. The assertion that an earlier version was a copyright violation is irrelevant. -MrFizyx (talk) 15:31, 23 July 2008 (UTC)
* Comment: Criteria "similar to" what the policy states don't matter; if the criteria as set forth exactly in the policy are not met, that's it, and obits are a poor indicator of notability. MSJapan (talk) 16:10, 23 July 2008 (UTC)
* Reply: OK, I should be more specific. First, I agrue that under WP:MUSIC she meets #1 (the so-called primary criterion), #7 & #10. Second, the biographic profile from the Cincinnati Enquirer that covers her death is not just your average "obituary" in the "local paper" nor is it the only time that she has had media coverage:
* Bishop, Lauren, "Musician Katie Reider dies", Cincinnati Enquirer, July 14, 2007
* Aust, Steve, "Katie Reider turns to family and friends for inspiration and support", CityBeat, May 4, 2000
* Knott, Sarah, "Rhythm in the City: Katie Reider is ready for anything", Cincinnati Enquirer, March 29, 2001
* Bird, Rick, "Live CD Shows Power of Katie Reider's Voice", The Cincinnati Post, January 18, 2001
* Bird, Rick, "New CDs Rolling Out for Katie Reider, Monk", The Cincinnati Post, December 20, 2001
* Smith, Stephanie, "OSU student sings her way to hit TV show", The Lantern, November 2, 2000
* -MrFizyx (talk) 18:05, 23 July 2008 (UTC)
* All the sources listed are local, one is a local alt.weekly and another is a student paper. So that doesn't suggest that her notability as musician went beyond her local communities. --Mosmof (talk) 12:30, 24 July 2008 (UTC)
* Bob Franke once said, "I never succeeded in becoming a national figure, but I succeeded in becoming local in an awful lot of places." Do you suggest that an "alt.weekly" of a major city and the "student paper" of the largest US university are not reliable sources with non-trivial coverage? What about the other three articles? How about this article from today's New York Times (it appears she played in places like the Bitter End in the hometown of that paper)? Her music was twice featured on Dawson's Creek; any chance they showed that in your town? -MrFizyx (talk) 15:08, 24 July 2008 (UTC) [p.s. The show was set in Massachusetts, but filmed in Wilmington, North Carolina and shown internationally.]
* I never said the coverage wasn't non-trivial (holy triple negative, Batman!). They just don't establish any sort of notability beyond her own community. And college papers and alt weeklies are very local in what they cover - it would be a different story if we were talking about, say, Miami Herald or the Daily Tar Heel. The NY Times piece is good, and helps establish WP:N much better than any of the above links (though I don't think she still qualifies under WP:MUSIC). As for performing at the Bitter End - the place is basically like an amateur showcase, and hosts upwards of five or six acts a night. While there is a selection process, I don't think playing there demonstrates any sort of notability, any more than an aspiring comedian performing at a West Village open mic night. And the Dawson's Creek credit doesn't help that much too - there are plenty of television music by session musicians and artists who never release an album. We're not going to have an article about the guy who wrote the music for a Battlestar Galactica episode, even though it's a fairly big show and it's set in outer space and filmed in a studio in Los Angeles. I would focus on finding sources like the NY Times one, rather than relying on local papers and Dawson's Creek. --Mosmof (talk) 16:57, 24 July 2008 (UTC)
* I was trying to figure why the The Daily Tar Heel was so much better than The Lantern and then it finally sunk in that your point was that this wouldn't be local. :P I know of no notability criteria that require sources to be geographically diverse. OK then, here's one from Chicago. Not as helpful where reliability and utility for writing an article as concerned, but yet another locale:
* Barlow, Gary, "Reider Dies of Cancer, 30", Chicago Free Press, 9:46, July 16, 2008
* While I think you could find more articles of this sort, but I'm not sure they would contribute much to improving the article.-MrFizyx (talk) 20:57, 24 July 2008 (UTC)
* REPLY: Obituaries are news items in a newspaper that a member of the editorial team writes. Obits directly reflect notability. I believe you're thinking of "death notices," which are paid ads. (Source: http://www.nypl.org/research/chss/grd/resguides/obit/)Nomad 2 (talk) 00:36, 24 July 2008 (UTC)
* Comment Many of the early concerns regarding copyvio and sourcing have been corrected, so the current AfD as I see it rests securely on questions of notability. Eauhomme (talk) 19:27, 23 July 2008 (UTC)
* Weak keep Maybe I was a bit too hasty to tag this article as a speedy delete. It seems rather more complicated. This reuters article hints at some notability for her. If the copyvio has been removed, then I suppose this article should stay. Artene50 (talk) 02:25, 24 July 2008 (UTC)
* Comment Not hasty at all. Actually, at the time I made my note about much of the facts being from the Cincinnati Enquirer, I had completely missed that it was a copyvio. I had previously read the Enquirer article (before the Wikipedia article) and had not realized that the Wiki article was indeed a cut and paste. Had I realized it was, I would have called for a Speedy Delete myself, and requested a rewrite of the article. Now that it has been done, I favor a keep, as was my original contention. Eauhomme (talk) 04:57, 24 July 2008 (UTC)
* Comment: So now that the article has been rewritten, where's the assertion of notability? There's no tour information, nothing on her awards, fanbase, or sales figures, and nothing substantiating the Dawson's Creek claim, etc. MSJapan (talk) 16:30, 24 July 2008 (UTC)
* Reply. The New York Times ran an obituary on Katie Reider in the A-SECTION of the July 24, 2008, edition. Two Katie Reider songs were used in "Dawson's Creek," at least one in Season 4. The official Dawson's Creek music site is offline for some reason, but the NY Times article provides attribution for the use of her songs on the TV show. Nomad 2 (talk) 18:16, 24 July 2008 (UTC)
* Not an obit, but rather a local interest story as a result of. However, the attribution is one line, doesn't even give the song title, and there's really very little in the way of specifics about Reider's career in there. It's more about "the personal impact on the friends" than anything else. The vagueness of the info indicates that it clearly came from the interviewees, as oposed to outside research, so there's a real problem with WP:RS. MSJapan (talk) 20:52, 24 July 2008 (UTC)
* An article in the A-SECTION of the New York Times is fundamentally more than a "local interest story," given the global readership and the standards by which stories are judged newsworthy to appear in print. I don't think you can separate Katie Reider's notability from the theme of the article -- people die everyday, but articles such as this one are not commonplace. The Dawson's Creek attribution is in the OSU newspaper article. OSU's The Lantern is a credible newspaper at a leading journalism school.<IP_ADDRESS> (talk) 21:29, 24 July 2008 (UTC) (Nomad2)
* Actually, the cited article ran in the B (metro) section. It is the Our Towns column, which deals with the New York City suburbs. The news peg is that she lived in Montclair, New Jersey - hence, there is local interest. Snakewriggle (talk) 07:20, 25 July 2008 (UTC)
Venues played
I haven't found an actual tour schedule her Reider and it seems she was the opening act in many cases here, but here are some shows that I dug up. Many of these can be verified through primary sources (e.g. the Katie Todd Band site or the venue site). This only shows a few gig's outside of OH, but might be a start for someone to work through. -MrFizyx (talk) 21:03, 24 July 2008 (UTC)
* Aug 23 2003, Barrelhouse, Cincinnati, OH w/ The Katie Todd Band
* Mar 11 2005, Club 202 Columbus, OH w/ The Katie Todd Band
* Mar 12 2005, Gunther Murphy's, Chicago, IL w/ The Katie Todd Band
* June 4 2005, Rhythm and Blues Cafe, Cincinnati w/ The Katie Todd Band
* Aug 19 2005, Schuba's, Chicago, IL: Down The Line (Record Release) w/ Katie Reider
* Dec 30 2005, Little Brothers Columbus OH: w/ The Katie Todd Band & The Floor Walkers
* Jan 6, 2006, Schuba's, Chicago, IL: Miller Genuine Draft presents: The Onion AV Club's Justify Your Existence featuring...Katie Todd Band w/ The Katie Reider Band
* Apr 8 2006, Acorn Theater, Three Oaks, MI w/ The Katie Todd Band
* Comment Katie Reider has performed live since the 1990s and was in the midst of an East Coast tour in 2006; the complete roster is far lengthier than one submitted here. Katie Reider also performed several times at a leading regional invitation-only showcase event, the MidPoint Music Festival.<IP_ADDRESS> (talk) 22:12, 24 July 2008 (UTC) (Nomad2)
|
WIKI
|
User:Tommy Lee Sparta/Sandbox1
Leroy Tommy Lee Russell (born November 4, 1987), best known as Tommy Lee, is an Jamaican dancehall artist.
Tommy Lee is a member of the Vybz Kartel led Portmore Empire, he came into the music industry in 2010 and met vybz kartel and performed at vybz kartel birthday bash. He is known for songs such as grave yard, reality Story, money make friends, nuh fear dem and warn dem.
Early life
Tommy Lee is originally from Flankers, Montego Bay Jamaica. His Father died while he was 14 and he also got his first child at 14 while he was in the 8th grade in high school, he now has 5 kids. He Attended Anchovy High School in St James and He performed at many gatherings there and where influened by people in his neighboorhood to do music. he started doing music in 2009 and record his first song "sparta story" in sniper studios. Popular deejay Vybz Kartel noticed his talent during a performance in Montego Bay and signed him to the Portmore Empire in March 2010. He became known with the hit song, Some Bwoy (link Pon Chain) and he became one of jamaica fastest rising dancehall artist. He has made a difference in dancehall and is known for his darkness and demon character and is loved by young people.
Feud With Bounty Killer
Tommy Lee feud with bounty killer started in late August when Tommy Lee released the song 'Uncle Demon' and bounty killer didnt like that he is singing about demons and made a counteraction with Badmind Dem A Pree and then the feud kick off between them. The feud continued between them until Sting 2012
|
WIKI
|
Multiple Sclerosis
blank
Multiple sclerosis (MS) is a potentially disabling disease of the brain and spinal cord (central nervous system).In MS, the immune system attacks the protective sheath (myelin) that covers nerve fibers and causes communication problems between your brain and the rest of your body. Eventually, the disease can cause the nerves themselves to deteriorate or become permanently damaged.The cause of multiple sclerosis is unknown. It’s considered an autoimmune disease in which the body’s immune system attacks its own tissues. In the case of MS, this immune system malfunction destroys myelin.Myelin can be compared to the insulation coating on electrical wires. When the protective myelin is damaged and nerve fiber is exposed, the messages that travel along that nerve may be slowed or blocked.
*Symptoms:
• Numbness or weakness in one or more limbs that typically occurs on one side of your body at a time, or the legs and trunk
• Partial or complete loss of vision, usually in one eye at a time, often with pain during eye movement
• Prolonged double vision
• Tingling or pain in parts of your body
• Electric-shock sensations that occur with certain neck movements, especially bending the neck forward (Lhermitte sign)
• Tremor, lack of coordination or unsteady gait
• Slurred speech
• Fatigue
• Dizziness
• Problems with bowel and bladder function
We’ll One Over 30 Years Of Experience You Always The Best Guidance
|
ESSENTIALAI-STEM
|
-- Emerging Markets Pace Stock Gains as U.S. Futures Fluctuate; Gold Advances
Stocks rose as emerging markets
extended a four-week rally and gold reached a record, leading
gains in commodities. U.S. index futures were little changed and
Treasuries advanced. The MSCI Emerging Markets Index rallied 0.7 percent at
10:15 a.m. in London as Turkey’s ISE National 100 Index climbed
0.4 percent to a record. The MSCI World Index of stocks in 24
developed nations gained 0.2 percent. Futures on the Standard &
Poor’s 500 Index added less than 0.1 percent. Gold traded above
$1,300 an ounce, silver reached a 30-year high, cotton jumped
2.5 percent and raw sugar strengthened 1.5 percent. The euro
weakened against 14 of its 16 most-traded peers. The yield on
the 10-year Treasury note fell 3 basis points. A government official said Japan was considering a stimulus
plan worth as much as 4.6 trillion yen ($54.6 billion),
increasing confidence that the world will avoid another
recession following a Sept. 24 report that showed demand for
American capital equipment rebounded. Merger and acquisition
activity added to investors’ optimism, as Unilever agreed to buy
Alberto Culver Co. for $3.7 billion in cash, its biggest
purchase in a decade, while Wal-Mart Stores Inc., the world’s
largest retailer, offered to buy South Africa’s Massmart
Holdings Ltd. for 29.8 billion rand ($4.2 billion). “We find the backdrop for stocks still constructive,”
Mislav Matejka, the head of pan-European equity strategy at
JPMorgan Chase & Co., wrote in a report today. “Central banks
remain accommodative.” European Stocks Three stocks rose for every two that fell on the Stoxx
Europe 600 Index , which advanced 0.2 percent. Unilever, the
maker of Dove soap, rallied 2.6 percent. Temenos Group AG, the
Swiss maker of software for the banking industry, gained 1.4
percent as Barclays Plc advised buying the shares. Actelion Ltd.
led declining shares, sinking 7.4 percent after its clazosentan
medicine didn’t meet the main goal of a study. U.S. futures were little changed after the S&P 500’s 2.1
percent surge on Sept. 24 pushed the gauge to a fourth straight
weekly gain. The measure has rallied 11 percent since June,
heading for the best quarter in a year. The MSCI Emerging Markets Index climbed 0.8 percent and was
poised to close at the highest level since July 2008. China’s
Shanghai Composite Index advanced 1.4 percent, the most in three
weeks, after a report showed industrial profits jumped 55
percent during the first eight months of 2010 and shares began
trading after a three-day holiday. Benchmark equity gauges in
the Philippines and Indonesia increased to records, while
Thailand’s SET Index jumped to the highest level since 1996. The
MSCI Asia Pacific Index rose 1.3 percent, the most in two weeks. Gold, Silver The S&P GSCI index of 24 commodities climbed 0.5 percent,
adding to gains for the past five weeks in a row. Gold jumped
0.1 percent after earlier climbing to a record $1,300.15 an
ounce and silver rose as much as 0.8 percent to $21.6175 an
ounce, the highest since October 1980. Cotton for December
delivery jumped 2.46 cents to $1.0239 a pound in New York and
raw sugar added 0.37 cent to 24.77 cents a pound. Raw sugar
earlier climbed to 24.81 cents a pound, the highest price since
Feb. 22. The euro depreciated 0.3 percent to $1.3448 and also
slipped 0.3 percent versus the yen, to 113.25. The dollar was
little changed at 84.20 yen. The yield on the 10-year Treasury note fell 3 basis points
to 2.57 percent and the two-year security slipped 1 basis point
to 0.44 percent. The U.S. sells $36 billion of two-year debt,
the first of three auctions totaling $100 billion. The 10-year German bund yielded 2.31 percent, down 4 basis
points from the end of last week. Belgium auctions as much as
2.5 billion euros of 2016, 2020 and 2041 securities today. The
extra yield investors demand to hold the securities instead of
bunds, the region’s benchmark government security, was at 90
basis points, little changed from the end of last week. To contact the reporter on this story:
David Merritt in London on
dmerritt1@bloomberg.net To contact the editor responsible for this story:
Stuart Wallace at
swallace6@bloomberg.net
|
NEWS-MULTISOURCE
|
2001 OK CR 3
Darrin Lynn PICKENS, Appellant, v. STATE of Oklahoma, Appellee.
No. F98-698.
Court of Criminal Appeals of Oklahoma.
Jan. 24, 2001.
Joe Robertson, Robert Stubblefield, Capital Trial Division, Indigent Defense System, Norman, OK, Attorneys For Defendant at trial.
Don I. Nelson, Assistant District Attorney, Creek County Courthouse, Sapulpa, OK, Attorney for the State at trial.
William H. Luker, Capital Direct Appeals, Indigent Defense System, Norman, OK, Attorney for Appellant on appeal.
W.A. Drew Edmondson, Attorney General of Oklahoma, Robert Whittaker, Assistant Attorney General, Oklahoma City, OK, Attorneys for Appellee on appeal.
OPINION
JOHNSON, Judge:
1 Darrin Lynn Pickens was tried by jury in Creek County District Court, Case No. CF 90-66, before the Honorable Donald Thompson, District Judge, and convicted of Murder in the First Degree while in the commission of Robbery with a Dangerous Weapon, in violation of 21 0.8.Supp.1989, § 701.7 (Count 1) and Feloniously Carrying a Firearm, in violation of 21 0.8.8upp.1989, § 1288 (Count 2). The jury found the existence of three aggravating circumstances and set punish ment at death on the murder conviction and at ten years imprisonment on Count 2. The trial court sentenced accordingly. From the. Judgment and Sentences imposed, Appellant perfected this appeal. Appellant raises fifteen propositions of error.
T2 In the early morning of February 4, 1990, Pickens robbed the Mr. Quick 21 convenience store in Sapulpa. He shot the store clerk, Tommy Lee Hayes, four times. A customer found Hayes' body between 2:00 and 3:00 am. Hayes died from two of the gunshot wounds to the chest and abdomen. Three .38 caliber unjacketed lead bullets were found at the scene, and two more were recovered from Hayes' body. The store manager determined $180.88 was missing, and the last sale shown on the cash register occurred at 2:06 a.m.
T3 Pickens was arrested in Tulsa on February 9, 1990 on unrelated charges. Tulsa police officers found a .88 caliber F.LE. Titan Tiger Six Shot revolver in his car. At the time of his arrest, Pickens asked officers if he was being arrested for the Creek County crimes. Ballistics tests connected the revolver found in Appellant's car to the Tulsa crimes but did not positively identify it as the weapon used in the Sapulpa robbery/murder. However, on March 9, 1990, Pickens confessed to the crimes when he was interviewed on © the Sapulpa charges.
T4 In Proposition I, Pickens claims his confession to the robbery and homicide was improperly admitted into evidence because it was the fruit of an illegal arrest based upon a lack of probable cause for issuance of the arrest warrant. Pickens moved to suppress all evidence obtained as a result of his arrest, alleging the averments in the arrest warrant contained misleading and incorrect information about the ballistics tests which were either intentionally false or involved omissions made in reckless disregard for the truth. The motion was overruled at preliminary hearing. (O.R. 495-496, 504) An evi-dentiary hearing was held on Pickens' post-arraignment motion to suppress and was overruled prior to trial. (O.R.651)
15 Where a defendant makes a substantial preliminary showing that a false statement knowingly and intentionally, or with reckless disregard for the truth, was included by an affiant in a warrant affidavit, and if the allegedly false statement is necessary to the finding of probable cause, the Fourth Amendment requires that a hearing be held at the defendant's request. Franks v. Delaware, 488 U.S. 154, 156, 98 S.Ct. 2674, 2676, 57 L.Ed.2d 667 (1978).
In the event that at the hearing the allegation of perjury or reckless disregard is established by the defendant by a preponderance of the evidence, and, with the affidavit's false material set to one side, the affidavit's remaining content is insufficient to establish probable cause, the search warrant must be voided and the fruits of the search exeluded to the same extent as if probable cause was lacking on the face of the affidavit.
Id.; see also Gregg v. State, 1992 OK CR 82, ¶ 19, 844 P.2d 867, 875.
16 Deputy Sheriff George Elliott's affidavit for the arrest of Darrin Lyon Pickens details the circumstances of the crime scene and includes the statement that the weapon used in the robbery/shooting was believed to be either a "38 or 357 caliber" weapon. It states information was received from Tulsa County that Pickens was arrested with a .38 caliber weapon following two similar armed robberies in the Tulsa area involving convenience store clerks. According to the affidavit, Tulsa County notified Creek County "because it appeared to be the same kind of weapon and incident that occurred in Creek County." The affidavit states Pickens was previously convicted of robbing a convenience store in the same location; in addition, and relevant to the issue raised, Deputy Elliott stated in the affidavit that the projectiles recovered from the Creek County shooting scene were sent to Tulsa for comparison with the projectiles recovered from the Tulsa robbery/shootings. He said
it was determined the riflings on the recovered projectiles were the same and some similarities noted from all projectiles fired from the suspect's gun. These are the same results as were determined from the projectiles recovered from both crime seenes and both victims shot in Tulsa which Darrin Pickens confessed to committing.
T7 At the evidentiary hearing on the motion to suppress, Deputy Elliott stated he knew at the time he prepared the affidavit that Appellant had been positively connected to two similar robbery/shootings at convenience stores in Tulsa through a positive ballistics match of the projectiles found at those crime scenes with the gun found in Appellant's car. For that reason, he sent the projectiles recovered from the Mr. Quick 21 store in Sapulpa to Tulsa County for comparison with the projectiles and gun recovered in Tulsa and related to the Tulsa homicide/robberies. Based upon those comparisons, he stated in his affidavit
the riflings on the recovered projectiles were the same and some similarities noted from all projectiles fired from the suspects (sic) gun. These are the same results as were determined (sic) from the projectiles recovered from both crime seenes and both victims shot in Tulsa which Darrin Pickens confessed to committing.
He knew at the time he prepared the affidavit that the ballistics comparison of the projectiles from one of the Tulsa cases was a positive match to the gun found in Appellant's car. At the evidentiary hearing, he admitted he knew the projectiles recovered from the Sapulpa crime seene would be difficult to exactly match because they were mashed and mangled and were not jacketed bullets and, accordingly, said "similarities" rather than "exact weapon" and "exact bullet."
18 We have reviewed Elliott's testimony and the affidavit and find Appellant has not established by a preponderance of the evidence that Elliott's statements were made in reckless disregard of the truth or with an intent to mislead. In the affidavit, Elliott did not say the similarities were that the projectiles all had six lands, six grooves and a right hand twist; nor did he say that the results showed an exact match. At most, any ambiguity in Elliott's statements concerning the similarities noted on the projectiles arose from his own unfamiliarity with ballistics testing in general and not from an intent to willfully deceive or out of reckless disregard for the truth.
19 However, even if this Court were to find Elliott's averments regarding the bal-listiecs test were falsehoods or were made with reckless disregard for the truth, this would not render the arrest warrant void, if probable cause for the warrant was otherwise provided by the affidavit. Skelly v. State, 1994 OK CR 55, ¶ 22, 880 P.2d 401, 406; see also Franks, 438 U.S. at 158, 98 S.Ct. at 2677. In addition, if we were to find Elliott omitted material information-the specific statement that the tests revealed similarities but were not an exact match-we would still determine whether probable cause existed for the issuance of the arrest warrant "by examining the affidavit as if the omitted information had been included and inquiring if the affidavit would still have given rise to probable cause for the warrant." Wolford v. Lasater, 78 F.3d 484, 489 (10th Cir.1996), citing Stewart v. Donges, 915 F.2d 572, 582, n. 13 (10th Cir.1990). In either of these situations, we believe the magistrate was presented with facts sufficient to justify issuance of the warrant for Pickens' arrest.
1 10 "The existence of probable cause is a common sense standard requiring facts sufficient to warrant a man of reasonable caution in the belief that an offense has or is being committed." Mollett v. State, 1997 OK CR 28, ¶ 14, 939 P.2d 1, 7, cert. denied, 522 U.S. 1079, 118 S.Ct. 859, 189 L.Ed.2d 758 (1998), citing United States v. Wicks, 995 F.2d 964, 972 (10th Cir.1993). Here, Elliott's averments setting forth the similarities of the offenses committed by Pickens in Tulsa County within a matter of days from the Sapulpa homicide/robbery, the use of the same caliber weapon in those robberies/shootings, and that Pickens robbed a convenience store in the exact same location years earlier were sufficient to establish probable cause for Pickens' arrest. Even if Elliott had stated the results of the ballistics tests did not reveal a positive match to the exclusion of all other .38 caliber weapons, we believe such information would not have vitiated probable cause.
T11 On review, this Court will determine whether the magistrate had a substantial basis for concluding probable cause existed to believe the defendant committed the crime, looking at the totality of the cireum-stances contained in the affidavit supporting the warrant. Hooper v. State, 1997 OK CR 64, ¶ 7, 947 P.2d 1090, 1097, cert. denied, 524 U.S. 943, 118 S.Ct. 2353, 141 LEd.2d 722 (1998). Under this standard, it is clear the magistrate was presented with sufficient evidence justifying the issuance of the arrest warrant in this case, and this proposition is denied. dence justifying the issuance of the arrest warrant in this case, and this proposition is denied.
112 In Proposition II, Appellant argues his confession to Creek County Sheriff's officers was inadmissible and was obtained in violation of his right to counsel, because at the time of interrogation he was represented by counsel stemming from the charges in Tulsa County. At the time Appellant was transported from Tulsa County to Creek County, the Tulsa County Public Defender's office had been appointed to represent him on the Tulsa County charges and Creek County officers were aware Appellant was represented on those charges when they interviewed him. Before the interview, officers advised Appellant of his Miranda rights, and he waived his rights prior to speaking to the officers.
$13 Appellant concedes the Sixth Amendment right to counsel in one case does not invoke the Fifth Amendment right to counsel during interrogation on other unrelated charges. See MeNeil v. Wisconsin, 501 U.S. 171, 174-188, 111 S.Ct. 2204, 2209-10, 115 L.Ed.2d 158 (1991). However, counsel argues this Court should not interpret the Sixth Amendment so restrictively and urges us to apply the totality of the cireumstances test adopted in Dennis v. State, 1999 OK CR 23, 990 P.2d 277, to determine whether Appellant could knowingly and voluntarily waive his right to counsel when his court-appointed attorney on other charges in another county was not informed of his arrest and transportation to Creek County.
{ 14 We restricted our decision in Denis to apply "only where an attorney is present while a defendant is questioned and actively tries to see the defendant, who is not told the attorney is there." Id. at 114, 990 P.2d at 284. "Where the totality of the cireum-stances reflect that a defendant's decision [to waive counsel] would have been affected had he known an attorney was present, then admission of any statements made during questioning under those circumstances is error." Id. at « 20, 990 P.2d at 286; see also Lewis v. State, 1984 OK CR 98, 695 P.2d 528.
1 15 We find Dennis/Lewis inapplicable to this situation. Here, there was no attorney, appointed or retained, trying to speak, or waiting to speak with Appellant regarding the Creek County charges. We also decline to extend Dennis to require police officers to contact an attorney known to the defendant because of representation on other unrelated charges. Appellant has not shown admission of his confession to Creek County law enforcement violated his right to counsel or his right against self-incrimination and Proposition II is therefore denied.
Y16 In Proposition III, Appellant claims the trial court erred when it admitted Appellant's statements to Creek County law enforcement, because Appellant had previously invoked his right to counsel during his interrogation on Tulsa County charges. In Pickens I, we held the Tulsa confession was not obtained in violation of Edwards v. Arizona, 451 U.S. 477, 101 S.Ct. 1880, 68 L.Ed.2d 378 (1981), because Pickens re-initiated discussion with officers after he had previously requested counsel and thereby waived the previous invocation of the right to counsel. Pickens, 1993 OK CR 15, 11 15-16, 850 P.2d 328, 388-334. We have previously rejected this claim and it is barred by the doctrine of res judicata. See Howell v. State, 1998 OK CR 53, 14, 967 P.2d 1221, 1224, cert. denied, 528 U.S. 834, 120 S.Ct. 98, 145 L.Ed.2d 79 (1999). Our prior determination that the Tulsa confession was not obtained in violation of Appellant's Fifth Amendment right to counsel precludes the claim that his subsequent interrogation in Creek County was obtained in violation of his Fifth Amendment right to counsel. Accordingly, we find the admission of his confession to Creek County officers did not violate his Fifth Amendment right to counsel and does not require reversal of his convictions. In addition, the admission of Pickens' confession to the Tulsa confessions also does not require vacation of his death sentence, as we have previously ruled the Tulsa confessions were not obtained in violation of Pickens' Fifth Amendment right to counsel. Pickens, Id. at 11 15-16, 850 P.2d at 333-334.
1 17 In his fourth proposition of error, Appellant maintains the evidence presented at trial was insufficient to sustain his conviction for first degree murder, because there was insufficient independent evidence to corroborate Appellant's confession. A confession is not admissible under Oklahoma law unless it is supported by "substantial independent evidence which would tend to establish ... [its] trustworthiness...." Fontenot v. State, 1994 OK CR 42, 120, 881 P.2d 69, Ti-78, quoting Opper v. United States, 348 U.S. 84, 98, 75 S.Ct. 158, 164, 99 L.Ed. 101 (1954). See also Short v. State, 1999 OK CR 15, 1 34, 980 P.2d 1081, 1096, cert. denied, 528 U.S. 1085, 120 S.Ct. 811, 145 LEd.2d 683; Rogers v. State, 1995 OK CR 8, T35, 890 P.2d 959, 975, cert. denied, 516 U.S. 919, 116 S.Ct. 312, 188 LEd.2d 215 (1995). "Each material element need not be corroborated by facts independent of the confession and there may be inconsistencies between the facts proven and the facts related in the confession, unless the inconsistencies overwhelm the similarities." Rogers, id. "It is sufficient if the corroboration supports the essential facts admitted sufficiently to justify a jury inference of their truth." Opper, 348 U.S. at 98, 75 S.Ct. at 164.
118 In this case, the State provided sufficient corroborative evidence independent of Pickens' confession to show its trustworthiness and competence. The store manager testified the store clerk's car was blue and was parked in the lot. Pickens stated in his confession there was a blue car in the lot. Pickens admitted he fired four times, and the store clerk was in fact shot four times. On appeal, Appellant makes much of the fact that five bullets were recovered, not four. However, we find this inconsistency not so glaring as to outweigh the obvious similarity that multiple gunshots were fired. A .38 caliber weapon was found in Pickens' car; the lead bullets recovered were .38 caliber and ballistics could not exclude the possibility they were fired from the gun found in Pick-ens' car. Pickens admitted he obtained rolled money in the robbery. The store manager testified coin rolls were taken in the robbery. Appellant said the store clerk reached under the counter to get the change and put the money in a brown paper (candy) sack; both the change box and the small brown sacks were located directly beneath the register. Despite some inconsistencies in Pickens' confession, we find the State presented sufficient independent evidence to corroborate the confession.
119 When the sufficiency of evidence is challenged on appeal, this Court will determine whether, after reviewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime charged beyond a reasonable doubt. See Spuehler v. State, 1985 OK CR 182, 17, 709 P.2d 202, 203. We find there was sufficient evidence to support the jury's finding that Appellant committed the crimes charged beyond a reasonable doubt, and Proposition IV accordingly fails.
120 Next, Appellant contends reversible error occurred when evidence of other crimes was admitted during the first stage of trial. A defendant should be convicted upon evidence of the charged offenses, but other crimes evidence may be admissible to prove motive, opportunity, intent, preparation, plan, knowledge, identity or absence of mistake or accident. Burks v. State, 1979 OK CR 10, T2, 594 P.2d 771, 772, overruled in part on other grounds in Jones v. State, 1989 OK CR 7, 18, 772 P.2d 922, 925; 12 ©.§.1991, § 2404(B). Evidence of other crimes may also be admissible when it is part of the res gestae of the crime charged. Reyes v. State, 1988 OK CR 50, 1 6, 751 P.2d 1081, 1083; Lalli v. State, 1994 OK CR 15, 15, 870 P.2d 175, 177 ("Our post-Evidence code cases leave no doubt as to the continuing validity of the res gestae exception in the context of other crimes evidence.").
121 The plain language of 12 0.8. 1991, § 2404(B) indicates probative value is not limited to the purposes enumerated in the statute. See Kmighton v. State, 1996 OK CR 2, 136, 912 P.2d 878, 889. Prior to admission of the other crimes evidence, the trial court must weigh its probative value against the danger of unfair prejudice. If the probative value of the evidence is outweighed by the danger of unfair prejudice, confusion of the issues, misleading the jury, undue delay, needless presentation of cumulative evidence and unfair or harmful surprise, the evidence must be excluded. Id.; 12 0.8.1991, $ 2403. The admissibility of evidence is within the discretion of the trial judge, and reversal is not warranted absent a clear abuse of discretion. Ashinsky v. State, 1989 OK CR 59, 16, 780 P2d 201, 204.
1122 Pickens complains the admission of the following evidence violated his state and federal constitutional rights: evidence surrounding Appellant's arrest by Tulsa police officers; testimony by Deputy Elliott that certain items of evidence were in the care and custody of the court "from previous trials;" the jury's exposure to an "unredacted" transcript of Appellant's recorded statement, which contained references to his prior felony convictions, references to facts surrounding his acquisition of the gun, reference to the gun being the same weapon used in the Tulsa robberies, and reference by Appellant that he needed to get back to his cell in Tulsa; Appellant's statement within his recorded confession that he met the man from whom he obtained the gun in the penitentiary; and the receipt by the jury of Jury Instruction 14, which contained the title "Possessing a Firearm After a Felony Conviction-Elements" when Appellant was entitled to bifurcated trial.
128 As an initial matter, we note the Burks notice filed by the State prior to Appellant's first trial set forth with particularity the offenses committed by Appellant in Tulsa County. The notice did not state under what exception the evidence would be offered, but Appellant can hardly claim surprise by the State's use of the evidence surrounding his arrest for those crimes when the State utilized the evidence in the first trial. At trial, defense counsel's objection to the evidence surrounding the arrest was overruled, and the trial court allowed the officers to testify concerning the arrest for the purpose of showing where the gun came from. We find the testimony concerning Appellant's arrest and the discovery of the gun to be properly admissible for that purpose.
124 Secondly, we find Deputy Elliott's testimony that certain evidence was retained by the court "from previous trials" did not constitute inadmissible other crimes evidence or an evidentiary harpoon. Defense counsel's objection to the testimony as an evidentiary harpoon was properly overruled and his motion for mistrial properly denied. This statement was not an evidentiary harpoon as it was not calculated to prejudice Mr. Pickens but rather was offered in direct response to defense counsel's inquiry whether the items of evidence were under Elliott's care and control.
[25 The third instance complained of involved the jury's receipt of an unredacted transcript of Appellant's confession. The record shows the unredacted tape of Appellant's confession and the State's transcript of that confession were initially offered into evidence without any objection that the confession contained evidence of other crimes. Counsel stated on the record he preferred the jury not be provided with the transeription, but agreed to handle any incorrect statements during cross-examination. After the State had passed out transcriptions to the jurors and had begun to play the tape, defense counsel objected on the grounds that the statement contained evidence of other crimes. The trial court collected the transcriptions from the jurors, called the court in recess, and then allowed defense counsel to go through the transcription in its entirety and recommend what portions should be redacted. Thereafter, the redacted tape was played for the jury, and the jury followed along with the redacted transcription.
126 Nothing in the record shows that in fact jurors were exposed to any prejudicial other crimes evidence The transcript shows the jury had the original unredacted transcription until defense counsel objected to page 7. Further, the jurors only retained the transcription for a short time before the court gathered the transcriptions and recessed for the night. The trial court stated on the record that it did not believe the jurors read ahead in the transcription prior to recess. While the unredacted transcription may have contained the complained of references to other crimes evidence, under the cireumstances presented here, we cannot find the jury was actually exposed to that evidence as there is no evidence any juror read that far ahead in the unredacted transcription.
T27 The last complaint regarding the admission of other crimes evidence has more merit. At the close of the first stage evidence, the trial court and the parties argued and settled the jury instructions. Although defense counsel moved to dismiss Count 2 (Feloniously Carrying a Firearm), no objection was made to the proposed instructions to be given on that charge, the jury instructions were read to the jury, counsel made closing arguments, and the jury retired to deliberate. Sometime later, the jury sent Court's Exhibit 8, a note, which read: "In connection with Count 2, Instruction No. 14 regards possessing a firearm after a felony convietion. Since this is part of the instructions, can we assume that he has been previously convicted of a felony. /s Michael Wille."
128 The trial court stated on the record that the "title" to the original OUJI-CR-6-39 was inadvertently left on the instruction, even though the parties had agreed to modify the instruction to exclude the element of the prior conviction. Defense counsel's motion for mistrial was denied. The trial court submitted a new Instruction No. 14 with a "corrected title," and the trial court explained to the jury the computer printed the instruction incorrectly. The trial court then answered the jury's question, "No, you may not assume that defendant has previously been convicted of a felony, and, further, that nothing in these instructions should imply that defendant has ever been convicted of a felony."
$29 When a defendant is charged with multiple counts, one or more of which require a prior conviction as an element of the crime, the trial shall be bifurcated. Chapple v. State, 19983 OK CR 838, 118, 866 P.2d 1218, 1217. This mandatory procedure shields the defendant from the prejudicial misuse of his prior convictions by the jury during its determination of guilt in a multi-count trial, Appellant complains the corrected instruction and trial court's answer to the jury's question concerning Jury Instruction No. 14 were "too late" and the jury's exposure to the mis-titled instruction left no doubt Mr. Pickens was a convicted felon. Appellant submits this error requires reversal of his conviction on Count 2. The State completely failed to address this argument. Although we believe the error was inadvertent, we cannot find it was harmless beyond a reasonable doubt; the State offers no argument to persuade us to find the error did not influence the jury or that it had a very slight effect. Simpson v. State, 1994 OK CR 40, 1 36, 876 P.2d 690, 702 (discussing application of harmless error analysis to non-constitutional errors). Accordingly, we find reversal is warranted on Count 2; it is often impossible to "unring" the bell.
T 80 In Proposition VI, Pickens asserts the trial court committed reversible error when it admitted evidence that Tulsa police recovered a pistol from his vehicle without requiring the State to show the seizure of the evidence was made pursuant to a search warrant or to a valid exception to the constitutional requirement for a search warrant. At trial, the defense objected to the admission of the evidence on the ground the State failed to establish a proper predicate for the stop of the vehicle and the resulting search and seizure. To establish a proper predicate for the stop and search, the defense acknowledged the State would have to introduce evidence of other crimes. The defense objected to the admission of the other crimes evidence, and the trial court therefore did not require further predicate for the admission of the evidence. On appeal, Appellant contends the evidence should have been presented to the trial court in a hearing out of the presence of the jury; however, at trial, mo such request for a hearing outside the jury's presence was made.
Y31 At trial, Pickens did not move to suppress the evidence based on an illegal search, but rather objected to its admission because the State did not lay a proper predicate. Whenever a defendant makes a specific objection at trial, no different objections will be considered on appeal. Wi son v. State, 1998 OK CR 78, 164, 988 P.2d 448, 464; Romano v. State, 1995 OK CR 74, 1 18, 909 P.2d 92, 109, cert. denied, 519 U.S. 855, 117 S.Ct. 151, 136 LEd.2d 96 (1996). Therefore, we find Pickens has waived this claim. Hair v. State, 1979 OK CR 68, 18, 597 P.2d 347, 849.
132 Next, in Proposition VII, Pick-ens argues the trial court committed reversible error when it failed to instruct the jury sua sponte on the defense of voluntary intoxication and the "corresponding lesser included non capital offense of second degree felony murder during the course of a robbery by force or fear." At trial, no request was made for these instructions; Appellant has therefore waived all but plain error. Thornburg v. State, 1999 OK CR 32, 985 P.2d 1234, 1242. While the trial court has an obligation to instruct on lesser included offenses and on defenses when warranted by the evidence, in this case the referenced instructions were not warranted by the evidence; therefore, no plain error occurred.
183 First, while the evidence at trial disclosed Appellant was a chronic user of PCP and may have been under the influence of PCP at the time of the robbery/murder, the trial court properly did not instruct the jury on the defense of voluntary intoxication. When warranted by the evidence, a defendant is entitled to instructions on his theory of defense whether requested or not as long as his theory is tenable as a matter of law. Kinsey v. State, 1990 OK CR 64, 19, 798 P.2d 630, 638. Voluntary intoxication is not a defense to a general intent crime. Fairchild v. State, 1999 OK CR 49, 1 76, 998 P.2d 611, 627. Felony murder, with robbery with a dangerous weapon as the underlying predicate crime, is a general intent crime. Hammon v. State, 2000 OK CR 7, 172, 999 P.2d 1082, 1098; Traxler v. State, 96 Okl.Cr. 281, 250, 251 P.2d 815, 886 (1958).
134 Secondly, Appellant was charged with first degree murder while engaged in the commission of a robbery with a dangerous weapon.
Robbery, the predicate felony in second degree felony murder, cannot be accomplished with a dangerous weapon. If it is, the offenses are Robbery with a Dangerous Weapon and first degree felony murder. Foster v. State, 1986 OK CR 19, 1 81, 714 P.2d 1081, 1089. ... Where there is no evidence to support a lesser included offense the court has no right to ask the jury to consider the issue. Boyd v. State, 1992 OK CR 40, 19, 889 P.2d 1868, 1367-68.
Brown v. State, 1998 OK CR T7, 1 65, 989 P.2d 913, 980. In this case, there is no question the robbery of the Mr. Quik convenience store clerk was accomplished through the use of a dangerous weapon. Accordingly, we find no error occurred when the trial court did not instruct the jury sua sponte on second degree felony murder. Wilson, 1998 OK CR 73, 158, 988 P.2d at 468; Boyd v. State, 1992 OK CR 40, 19, 839 P.2d 1363, 1367, cert. denied, 509 U.S. 908, 118 S.Ct. 3005, 125 L.Ed.2d 697 (1998).
1385 We also find unpersuasive Appellant's argument in sub-proposition VII B that the trial court erred when it did not instruct on the lesser offense of second degree felony murder by robbery by force or fear because the "failure to give the jury the third option of convicting of a lesser included offense" would be violative of Beck v. Alabama, 447 U.S. 625, 687, 100 S.Ct. 2382, 2389, 65 L.Ed.2d 892 (1980) and Schad v. Arizona, 501 U.S. 624, 111 S.Ct. 2491, 115 L.Ed.2d 555 (1991). Beck and Schad held that "in death cases, the jury must be instructed on lesser included noneapital offenses supported by the evidence, in order to give the jury a viable option between acquittal and a death penalty offense." Pickens, 1994 OK CR 74, 8, 885 P.2d at 682-688. Lesser included offense instructions need not automatically be given in death cases, but are required only when supported by the evidence. Charm v. State, 1996 OK CR 40, 17, 924 P.2d 754, 759-760, cert. denied, 520 U.S. 1200, 117 S.Ct. 1560, 187 L.Ed.2d 707 (1997). To succeed on the claim that the trial court's failure to instruct the jury on lesser included offenses violated Beck, Appellant must demonstrate the evidence presented at trial "would permit a rational jury to find him guilty" of the lesser offense. Hogan v. Gibson, 197 F.3d 1297, 18307 (10th Cir.1999).
186 We have already determined there was no question the robbery in this case was accomplished with a dangerous weapon. The trial judge's failure to instruct sua sponte on a lesser offense that would require a jury to ignore that evidence and to assume the robbery was accomplished solely through "force or fear" does not violate the principles of Beck and Schad. This proposition is denied.
137 In his eighth proposition of error, Appellant argues improper tactics and arguments of the prosecutor denied him of a fair trial and sentencing. Appellant contends the prosecutor argued facts not in evidence, elicited improper hearsay evidence, injected his own opinion and eredibility into the trial, improperly shifted the burden of proof, and made improper argument appealing to the passions and prejudices of the jury.
138 During first stage closing argument, the prosecutor argued facts not in evidence when he stated the videotape of the crime seene showed coins on the ground, and not blood droplets as a defense witness had testified. No objection was made to this allegedly improper argument and we review for plain error only. Turrentine v. State, 1998 OK CR 33, "I 66, 965 P.2d 955, 975, cert. denied, 525 U.S. 1057, 119 S.Ct. 624, 142 L.Ed.2d 562 (1998). We find this argument was within the wide range of proper comment on the evidence presented as the videotape clearly depicts coins on the sidewalk.
189 At trial, the defense attacked the State's investigation of the homicide/robbery because little or no forensic investigation and testing was conducted on, what the defense argued was, available forensic evidence. In first and second stage closing arguments, the prosecutor commented on the defendant's power to subpoena and his failure to call witnesses to contradict the State's evidence that the investigation was performed properly and available evidence properly preserved. Appellant complains the argument improperly shifted the burden of proof by misleading the jury that he had some obligation to produce evidence. Again, no objection was made and we review for plain error only. Turrentine, id. Comment on a defendant's access to evidence and witnesses is permissible, and under the facts presented here, we find no plain error occurred. Thomas v. State, 1991 OK CR 58, 24, 811 P.2d 1837, 1844, cert. denied, 502 U.S. 1041, 112 S.Ct. 895, 116 LEd.2d 798 (1992); Estes v. State, 1974 OK CR 160, 17, 525 P.2d 1862, 1865.
140 During closing argument af- | ter the second stage of trial, the prosecutor asked the jury to remember that the last person the victim saw was the defendant and to remember the last sound the victim heard was the sound of thunder from the gun; the prosecutor asked the jury to "let Darrin Lynn Pickens hear the thunder that comes from this jury, and let the last words ... be that we, the jury fix his punishment at death." Appellant complains this argument was an improper appeal to the passion and prejudice of the jury. While the prosecutor should not encourage the jury to impose the death penalty out of sympathy for the victims, see Le v. State, 1997 OK CR 55, 153, 947 P.2d 585, 554-555, cert. demied, 524 U.S. 930, 118 S.Ct. 2329, 141 L.Ed.2d 702 (1998), this comment was not objected to and we find it did not rise to the level of plain error. Hooper v. State, 1997 OK CR 64, 1155-56, 947 P.2d 1090, 1111, cert. demied, 524 U.S. 948, 118 S.Ct. 2853, 141 L.Ed.2d 722 (1998).
41 Appellant's next complaint is about comments which were made when the prosecutor asked officer Elliott about a five dollar bill with, what the defense argued was, a blood stain. On redirect examination, the prosecutor asked officer Elliott, "Is it not true, sir, that you contacted me after that and showed me that five dollar bill?" Elliott responded, "Yes, sir." The prosecutor then asked, "And did we agree that it did not appear to be blood at that time?" The defense objected to the comment as "not a proper question," the prosecutor restated the question and defense counsel did not request any further relief. Thereafter, in response to a question about what was done with the bill, the witness answered "nothing" and stated, "I believe because you looked at it and didn't think it was blood either." No objection was made to the witness' answer. Appellant contends the prosecutor injected his personal opinion and credibility into the trial and elicited improper hearsay evidence which violated his right of confrontation.
142 Although Appellant characterizes the prosecutor's conduct as violative of the advocate-witness rule, we believe the prosecutor's conduct constituted impermissible vouching as the prosecutor himself did not testify as witness, but rather phrased his questions in a manner that tended to bolster the credibility of the State's witness. Cargle v. State, 1995 OK CR 77, 156, 909 P.2d 806, 823, cert. denied, 519 U.S. 881, 117 S.Ct. 100, 186 LEd.2d 54 (1996) (a prosecutor may not personally vouch for the credibility of its witnesses). "Argument or evidence is impermissible vouching only if the jury could reasonably believe that the prosecutor is indicating a personal belief in the witness' credibility, either through explicit personal assurances of the witness' veracity or by implicitly indicating that information not presented to the jury supports the witness' testimony." Nickell v. State, 1994 OK CR 73, T7, 885 P.2d 670, 673, quoting Freeman v. State, 1994 OK CR 87, 118, 876 P.2d 283, 288, cert. demied, 513 U.S. 1022, 115 S.Ct. 590, 130 L.Ed.2d 508 (1994). The prosecutor's questions relating to the five dollar bill effectively told the jury it could rely on and believe the witness' testimony because the witness' lack of investigation into the five dollar bill was in reliance upon the State's attorney's opinion of the evidence.
$438 Even though the prosecutor's questions tended to bolster this witness' testimony, we find the conduct does not require relief. The initial questions and answer were objected to, the prosecutor restated his question, and the defense requested no further relief. No further objection was made to the witness' final comment ["I believe because you looked at it and didn't think it was blood either."] and Appellant waived any objection to the witness' final answer.
144 Allegations of prosecutorial misconduct do not warrant reversal of a convietion unless the cumulative effect of the conduct deprived the defendant of a fair trial. Washington v. State, 1999 OK CR 22, T41, 989 P.2d 960, 974. Having-reviewed each of the alleged instances of misconduct, we find none, either singularly or cumulatively, warrants relief and this proposition of error is denied.
1145 In Proposition IX, Appellant argues he has been denied a fair opportunity for appellate review of his convictions and sentence because the record of trial proceedings does not contain two "private bench conversations between two potential jurors and the trial court." Following each of these private bench conversations, a potential juror was excused for cause. No objection to this procedure was made at trial and defense counsel did not make any sort of record regarding the excusal of these jurors. While a complete stenographic record should be taken in all capital cases, Van White v. State, 1988 OK CR 47, 752 P.2d 814, 821, failure to transcribe portions of a capital case is not per se reversible error. See Parker v. State, 1994 OK CR 56, 127, 887 P.2d 290, 294, 205. While this Court strongly recommends all portions of the trial be transcribed, including bench conferences and conferences in chambers, we cannot conclude that any error occurred in this case as a result of these two unrecorded conferences during voir dire. Appellant has raised no error relating to jury selection and has not demonstrated the trial court's excusal of either of these two jurors resulted in error. As Appellant has not demonstrated any reason for reversal on this ground and has not shown our ability to conduct the mandatory sentence review has been impeded in any way, we find this proposition does not warrant relief, Id.
146 Appellant also claims the record does not show he knowingly and intelligently waived his right to present mitigating evidence in the second stage of trial; and, as a result, the death penalty was imposed in violation of his Eighth and Fourteenth Amendment rights. After the State presented its evidence in aggravation, trial counsel advised the judge Mr. Pickens was "adamant" that he did not want his mother or any of his siblings called to testify for him in second stage proceedings. The trial judge asked Mr. Pickens whether his counsel's statements were correct and Mr. Pickens responded, "Yes." After the trial court inquired whether both trial counsel concurred with one another regarding Mr. Pickens' wishes, the trial court made the following inquiry:
THE COURT: All right, and Mr. Pick-ens, you've heard what both attorneys have said here, and is that correct? ~
MR. PICKENS: Yes.
THE COURT And its your wish not to follow their recommendation to call family members to testify on your behalf?
MR. PICKENS: Yes.
THE COURT: Okay. Is there any record from the State?
MR. NELSON: No, Y¥qur Honor.
Following the trial court's inquiry, Mr. Pick-ens' trial counsel in fact called two witnesses in mitigation and requested Dr. Murphy's and Dr. Hesson's first stage testimony be incorporated into defendant's second stage case in chief. Counsel's request was granted without objection from the State. Thereafter, the defense announced rest.
1 47 Without question, mitigating evidence is crucial to a sentencer in a capital case. However, the Eighth Amendment does not require mitigating evidence must be presented in a capital trial, only that the defendant be given the opportunity to present such evidence. Wallace v. State, 1995 OK CR 19, 118, 898 P.2d 504, 512-513, cert. denied, 516 U.S. 888, 116 S.Ct. 232, 133 L.Ed.2d 160.
148 Most capital cases are won in the second stage and not in the guilt-innocent stage. Counsel may well want to present little evidence in the first stage, so as to not offend the jury. If this is the trial strategy, then counsel must work extra hard in the second stage to save the life of the defendant. In an effort to assist the trial court when a defendant refuses to allow the presentation of mitigating evidence in the sentencing stage, in Wallace, we established guidelines to be followed by a defendant and counsel if an election is made not to present mitigating evidence." Id., 1995 OK CR 19, 11 21-22, 898 P.2d at 512-518. Failure to hold the mandatory Wallace hearing does not require automatic reversal. Fitzgerald v. State, 1998 OK CR 68, 140, 972 P.2d 1157, 1172-1178. In Fitzgerald, where no Wallace hearing was held, we stated,
if, from the record, it is apparent a defendant (a) understands the difference between life and death, (b) understands and appreciates the vital importance of mitigating evidence in capital proceedings, and (c) voluntarily and intelligently waives all right to present mitigating evidence, then failure to hold a Wallace hearing may be harmless.
Id.
€49 Mr. Pickens' case is not one where no mitigation evidence was presented. In fact, substantial mitigation evidence was presented which addressed Mr. Pickens' level of mental functioning as well as his history of drug use. Although the trial court's inquiry into Mr. Pickens' desire that no family member testimony be presented fell short of the guidelines set forth in Wallace, under the circumstances presented here, we find the inquiry was sufficient. His trial counsel stated on the record:
He is a client, he does understand what's going on, and his rationale for not wanting to put his family on, although we disagree with it, is well thought out,. He's thought it out, had lots of time to think about it, and it's a decision he's made and maintained that decision for a long period of time. It's not something he decides one day and changes his mind the next. He's been consistent about this for the three years that I've known him in this case....
The record establishes Mr. Pickens knew what evidence was available through family members and clearly desired to waive presentation of that particular mitigating evidence.
1 50 Although the trial court did not specifically define mitigating evidence and go over Mr. Pickens' right to present that evidence, it is clear from the history of this case and the record that Mr. Pickens understood the difference between life and death, understood the importance of presenting mitigating evidence, and understood the consequences of his decision not to call family members to testify on his behalf. In light of trial counsels' statements and Mr. Pickens' responses to the trial court's inquiry, we find any error in the trial court's failure to strictly follow the guidelines set forth in Wallace was harmless. Fitzgerald, 1998 OK CR 68, 140, 972 P.2d at 1173. This claim was rejected in Lambert v. State, 1999 OK CR 17, 159, 984 P.2d 221, 288, cert. demied, 528 U.S. 1087, 120 S.Ct. 816, 145 L.Ed.2d 687 (2000), and we decline to revisit the issue.
1 52 Appellant contends his death sentence must be vacated because Oklahoma's "murder to avoid arrest or prosecution" aggravating cireumstance is unconstitutionally vague and overly broad as construed by this Court in violation of the Eighth and Fourteenth Amendments. He argues the aggravator is broadly applied to anyone who commits a murder during the course of a felony and creates a presumption of guilt which requires the defendant to show his motive in killing was not to avoid arrest or prosecution.
158 We have previously held this aggravating circumstance is sufficiently limited by the requirements that: (a) a predicate crime existed, apart from the murder, from which the defendant sought to avoid arrest/prosecution; and (b) the State presented evidence establishing the defendant's intent to kill in order to avoid arrest/prosecution. Alverson v. State, 1999 OK CR 21, 1 75, 983 P.2d 498, 520, cert. demied, 528 U.S. 1089, 120 S.Ct. 820, 145 L.Ed.2d 690 (2000). We decline to revisit the issue. The determination of the defendant's intent may be inferred from circumstantial evidence. LaFevers v. State, 1995 OK CR 26, 148, 897 P.2d 292, 311, cert. denied, 516 U.S. 1095, 116 S.Ct. 820, 183 LEd.2d 768 (1996). The State presented sufficient evidence to support both prongs of this aggravator. From the evidence showing Appellant frequented the Mr. Quik store, the jury could reasonably infer he killed Hayes to keep him from being identified as the person who robbed the store. Proposition XII is denied.
[54 Next, Appellant challenges the application of the "continuing threat" aggravator as unconstitutionally vague and overbroad, acknowledges our prior holdings upholding the application of this aggravator and asks this Court to reconsider. He complains the Oklahoma Uniform Jury Instruction, OUJI-CR 2d. 4-74, defining the "continuing threat" aggravator failed to properly set forth the requirement that the jury had to find that the defendant would commit "future acts of violence" and asserts the use of the term "probability" is confusing and causes the instruction to be overbroad in its application. He argues that "probability" is a statistical term and its use in the statutory sentencing scheme "violates the statistical rule of probability."
T55 This Court has previously upheld the constitutionality of this aggravator and we decline to reconsider our position on this issue. Seg, eg., Welch v. State, 1998 OK CR 54, 159, 968 P.2d 12831, 1248. Further, we reject Appellant's arguments relating to the use of OUJI-CR 2d. 4-74 for the reasons set forth in Bland v. State, 2000 OK CR 11, 1182-87, 4 P.Bd 702, 724-725, cert de-med, -- U.S. --, 121 S.Ct. 882, 148 L.Ed.2d 714 (2001). Proposition XIII is denied. j
1 56 Noting the use of mandatory language in the jury instructions dealing with aggravating cireumstances and the use of permissive language in the instructions dealing with mitigating circumstances, in Proposition XIV, Appellant argues the instructions on the issue of mitigation permitted the jurors to ignore the mitigating evidence altogether, and seriously diminished the effect the mitigating evidence presented in the case. We have consistently rejected the claim that instructing the jury they "may consider" mitigating evidence creates a doubt as to the jury's constitutional duty to consider such evidence and recently reaffirmed those holdings in Welch v. State, 2000 OK CR 8, 1 49, 2 P.3d 356, 874, cert. denied, -- U.S. --, 121 S.Ct. 665, 148 L.Ed.2d 567 (2000).
157 In his fifteenth proposition of error, Appellant argues the accumulation of error in this case deprived him of due process of law and a reliable sentencing proceeding and necessitates reversal of his conviction or modification of his sentence. No error occurred during the first or second stage of trial which warrants reversal of Appellant's conviction for murder.
MANDATORY SENTENCE REVIEW
158 In accordance with 21 0.98.1991, § 701.13(C), we must determine whether the sentence of death was imposed under the influence of passion, prejudice, or any other arbitrary factor, and whether the evidence supports the jury's finding of aggravating circumstances. The jury found the existence of three aggravating cireumstances: (1) that Pickens had previously been convicted of a felony involving the use or threat of violence against the person; (2) that the murder was committed for the purpose of avoiding or preventing lawful arrest or prosecution; and (3) that there existed the probability that Pickens would commit eriminal acts of violence that would constitute a continuing threat to society. Upon review of the record, we find sufficient evidence was presented to prove each of the aggravating circumstances alleged and we cannot say the sentence of death was imposed because the jury was influenced by passion, prejudice, or any other arbitrary factor contrary to 21 O.S .1991, § 701.183(C).
DECISION
1159 Finding no error warranting reversal of Appellant's conviction for First Degree Murder and his sentence of death, the Judgment and Sentence for First Degree Murder (Count I) entered in Creek County District Court, Case No. CRF 90-66, is hereby AFFIRMED; the Judgment and Sentence for Felonious Possession of a Firearm (Count II) is REVERSED AND REMANDED FOR A NEW TRIAL.
STRUBHAR, P.J.: concurs.
LUMPKIN, V.P.J.: concur in part/dissent in part.
CHAPEL, J.: concur in part/dissent in part.
LILE, J.; concur in part/dissent in part.
LUMPKIN, Vice Presiding Judge:
Concur in Part/Dissent in Part.
$1 I concur in the Court's decision to affirm the judgment and sentence in Count I, Murder First Degree. However, I agree with Judge Lile that the trial court took appropriate remedial action to correct the error in the heading of Instruction 14 and any error is harmless.
[ 2 In addition, in its discussion of Proposition VII, the Court partially cites the holding in Hogan v. Gibson, 197 F.8d 1297, 1807 (10th Cir.1999), regarding the request to provide an instruction on a lesser included offense. A more complete statement of the law applicable is set forth in Gilson v. State, 2000 OK CR 14, « 113, 8 P.8d 883, 917, where we held:
In determining the sufficiency of the evidence to support a lesser offense we look at whether the evidence might allow a jury to acquit the defendant of the greater offense and convict him of the lesser. See Hogan v. Gibson, 197 F.3d 1297, 18305 (10th Cir.1999) citing Beck v. Alabama, 447 U.S. 625, 686, 100 S.Ct. 2882, 2888, 65 L.Ed.2d 892 (1980). Only if there is evidence which tends to negate an element of the greater offense, which would reduce the charge, should instructions on a lesser included offense be given. See Fairchild, 998 P.2d at 627. See also Umited States v. Scalf, 708 F.2d 1540, 1546 (10th Cir.1983) ("a lesser included offense instruction should not be given unless there is evidence to support a finding that the lesser offense was committed while the greater offense was not.").
CHAPEL, Judge, Concurring in Part and Dissenting in Part:
4 1 I concur in reversing Count 2. However, I dissent to affirming the conviction and sentence for Count L.
T2 Pickens was in custody in the Tulsa county jail on an unrelated murder charge when he was arrested by Creek County officers for a robbery/murder at the Mr. Quick 21 convenience store in Sapulpa. Prior to this arrest Pickens had invoked his Fifth Amendment right to counsel, during a custodial interrogation regarding the Tulsa case. In addition, Pickens had been provided with a lawyer from the Tulsa Public Defender's Office to represent him in the Tulsa County case, and the Creek County officers were aware of this representation. Notwithstanding this knowledge, the officers did not make any effort to notify this Tulsa counsel that Pickens was being arrested for a similar robbery/murder in Creek County and that he was about to be interrogated regarding this offense. Nor did anyone from Creek County specifically inform Pickens that he could consult with his Tulsa counsel regarding the new charges.
T3 As noted in this Court's earlier opinion in this case, Pickens was interviewed two times on March 9, 1990, after being brought from Tulsa to the Creek County Police Department. During the first interview, which occurred before lunch and before Pickens was arraigned, Pickens confessed to the robbery and murder in Sapulpa, after being given Miranda warnings. After a lunch break Pickens was arraigned and then returned to the Creek County Police Department. He then confessed a second time to the Sapulpa crimes, this time admitting even more damaging facts. The second confession, which was not proceeded by Miranda warnings, was videotaped.
T4 This Court reversed Pickens' original conviction for the Sapulpa crimes, because the videotape of this confession was admitted into evidence at trial, in violation of his Sixth Amendment right to counsel This Court concluded that the admission of this videotape was not harmless error.
15 The issue now before this Court is the admission into evidence of Pickeng' initial, pre-arraignment confession during his re-trial for the Sapulpa crimes. I conclude that the admission of this confession was likewise a violation of Pickens' constitutional rights, which cannot be deemed harmless.
16 First, I would hold that the custodial interrogation that resulted in this confession was held in violation of Pickens' Fifth Amendment right to counsel. This Court has already recognized that Pickens invoked his right to counsel during an initial interrogation following his arrest in Tulsa It is well-established that an accused who has requested counsel under these circumstances cannot be approached for further questioning. Although a majority of this Court found that Pickens subsequently "re-initiated" communications with the police, I disagreed with this finding Because I do not agree that Pickens re-initiated communications with the police, or that he validly waived the right to counsel that he had previously invoked, I conclude that the initial confession in the Creek County case was vitiated by the failure of the Creek County officers to respect Pickens' prior custodial request for counsel. Because Pickens invoked his Miranda-based right to counsel and remained in police custody, police were prohibited from approaching him regarding the Tulsa crimes or any other erime.
17 Second, I would hold that the Sixth Amendment right to counsel, which had attached in the Tulsa case, was violated by the failure of the Creek County officers to contact Pickens' Tulsa counsel or specifically inform Pickens that he had a right to consult with this counsel. I here disagree with the Supreme Court's finding in MeNeil v. Wisconsin that the Sixth Amendment right is "offense specific." I find this to be an unrealistic and unreasonable interpretation of this constitutional right.
18 As this case aptly demonstrates, one cannot assume that seemingly "distinet" offenses will remain distinct as a case proceeds. In fact, the representation and defense of Pickens' case in Tulsa was specifically and substantially impacted by his un-represented confessions to the Creek County crimes, since one of these confessions was actually admitted during the sentencing-stage of his trial for the Tulsa: offenses. Furthermore, it is widely ree-ognized that separate offenses are often treated as a group, for the purposes of negotiating and implementing plea bargains, as well as for sentencing determinations. Interpreting the Sixth Amendment right to the assistance of counsel without regard to the realities of how distinct offenses are regularly treated within the context of the criminal justice system unnecessarily frustrates the purposes of the Sixth Amendment right. In particular, it unfairly subjects a custodial accused to unrepresented interrogations that may severely compromise a case in which he is already involved and for which he has already obtained counsel. Recognizing that in a case such as this one, where officers are fully aware that a custodial accused has already obtained counsel in another case, the Sixth Amendment right should include, at a minimum, either contacting this known counsel or specifically informing the accused that he has the right to consult with this counsel, prior to being interrogated regarding a different offense, would not unduly hamper police investigations or compromise legitimate confessions.
19 Furthermore, if the Sixth Amendment right to counsel will not be recognized to extend this far, I would hold that the Oklahoma Constitution does reach this far, in order to give full and operative protection to the right of an accused to be represented and assisted by his chosen or appointed counsel.
110 Pickens also asserts that it is unconstitutional to execute him because he is mentally retarded. In Lambert v. State, a majority of this Court declined to find that the execution of the mentally retarded violated either the United States Constitution or our Oklahoma Constitution. The Court's entire reasoning was as follows: "In light of Penry v. Lynaugh, we decline to grant relief." In Penry v. Experts who testified at Pickensg' trial estimated his mental age to be approximately that of a nine year-old child. I conclude, therefore, that it is no more acceptable to execute Pickens than it is to execute a nine year-old child.
[ 12 I am hopeful that perhaps the evolution of the law that has occurred since the 5-4 Penry decision will persuade our nation's highest court that our societal standards of decency have indeed evolved and matured to the point that the Court can confidently hold that the execution of the mentally retarded does violate the Eighth Amendment. If, as recognized by the Penry majority, it "was well settled at common law that "idiots," as well as 'lunaties, were not subject to punishment for criminal acts committed under those incapacities," where "idiocy was understood as 'a defect of understanding from the moment of birth/ " it surely cannot violate recognized canons of constitutional interpretation to hold that persons whose understanding is so impaired that they are classified as "mentally retarded" should not be subject to the ultimate penalty. If the United States Constitution does not prohibit this barbaric and inhumane practice, I would hold that our State constitution does.
13 I dissent from the Court's affirmance of Pickens' convictions, based upon the non-harmless use of his unconstitationally obtained confession at trial; and from the Court's affirmance of Pickens' capital sentence, based upon the district court's non-harmless allowance into evidence of unconstitutionally obtained confessions from the Tulsa and Creek County cases, and based upon my conclusion that the execution of mentally retarded persons violates both our federal and State constitutions.
LILE, J.:
Coneurs In Part/Dissents in Part
1 1 I concur in affirming the conviction and sentence for First Degree Murder. I cannot agree that the judgment and sentence for Felonious Possession of a Firearm should be reversed. The trial court took proper remedial action concerning the error in Instruction No. 14, and I find the error harmless. Simpson v. State, 1994 OK CR 40, 876 P.2d 690.
. The jury found the following aggravating circumstances: (1) that Pickens had previously been convicted of a felony involving the use or threat of violence against the person; (2) that the murder was committed for the purpose of avoiding or preventing lawful arrest or prosecution; and (3) that there existed the probability that Pickens would commit criminal acts of violence that would constitute a continuing threat to society.
. Appellant's original convictions for First Degree Murder, Feloniously Carrying a Firearm, and Robbery with Firearms were reversed and remanded for new trial in Pickens v. State, 1994 OK CR 74, 885 P.2d 678, overruled in part on other grounds, 1996 OK CR 19, 917 P.2d 980 (hereinafter referred to as Pickens IID. Our reversal was based upon the denial of Pickens' constitutional right to counsel under the Sixth Amendment and upon the trial court's failure to instruct on lesser included offenses of second degree murder and first degree manslaughter. We also criticized the language of the original Information filed in this matter which contained confusing language alleging felony murder but also alleging the murder was committed with a premeditated design.
. Appellant's Petition in Error was filed in this Court on November 16, 1998. Appellant's Brief was filed on October 13, 1999. The State's brief was filed on February 10, 2000. Appellant filed a Reply Brief on March 1, 2000. The case was submitted to the Court on March 17, 2000, and oral argument was held June 27, 2000. Appellant filed Post Oral Argument Supplemental Authorities on July 7, 2000.
. On February 8, 1990, Pickens robbed a Tulsa Circle K convenience store, killing the clerk by shooting her four times. On February 9, Pickens robbed another Tulsa Circle K and shot the clerk and was arrested while fleeing the scene of that crime. Pickens was convicted and sentenced to death and imprisonment on charges based on the Tulsa murder and robberies, and on appeal this Court affirmed that conviction in Pickens v. State, 1993 OK CR 15, 850 P.2d 328, cert. denied, 510 U.S. 1100, 114 S.Ct. 942, 127 LEd.2d 232 (1994), denial of post-conviction relief affirmed in 1996 OK CR 6, 910 P.2d 1063 (hereafter referred to as Pickens I or Tulsa case). Although the crime in this case preceded the Tulsa crimes, the trial in Tulsa County was held shortly before the first trial of this matter.
. This second motion to suppress was filed on July 17, 1996; the evidentiary hearing was held November 12, 1996, and the motion was denied on November 13, 1996.
. Pages 2 and 3 of the affidavit stated, in part: On 2-9-90 the Creek county Sheriff Department was notified by SGT. Wayne Allen of Tulsa Police Department that there had been Two (2) Armed Robberies with store clerks being shot. SGT. Allen advised there was a Blue Steel 38 Revoler (sic) recovered when the suspect [page 3] was arrested. The revolver was recovered from the suspects vehicle at the time of his arrest in Tulsa County. SGY.(sic) Allen advised because it appeared to be the same kind of weapon and incident that occurred in Creek County. The suspect was identified as Darrin Lynn Pickens. This suspect was arrested and later convicted in 1985 for robbing a Zip Trip Store which was located where the Mr. Quick Store is presently located.
This suspect was arrested and later convicted in 1985 for robbing a Zip Trip Store which was located where the Mr. Quick Store is presently located.
On getting this information from Tulsa Police Department the Five (5) projectiles recovered from the homicide scene at the Mr. Quick Store were taken to the Tulsa Police Lab for comparison from the 38 revolver that was recovered from suspects' (sic) vehicle.
Upon the lab completing the ballistics tests it was determined the riflings on the recovered projectiles were the same and some similarities noted from all projectiles fired from the suspects gun. These are the same results as were determined (sic) from the projectiles recovered from both crime scenes and both victims shot in Tulsa which Darrin Pickens confessed to committing.
This incident occurred in Creek County.
. Evidentiary harpoons are voluntary statements, made by experienced police officers or other lay witnesses that are willfully jabbed to inject information about other crimes calculated to prejudice the defendant and which do in fact prejudice the defendant. Lambert v. State, 1999 OK CR 17, 147, 984 P.2d 221, 235.
. Defense counsel objected to the introduction of the confession on the grounds that it was not voluntary and that a proper predicate for its introduction was not established.
. The other crimes evidence Appellant complains of that was contained within the unredacied transcript referenced his prior felony convictions, referenced facts surrounding his acquisition of the gun, referenced the gun being the same weapon used in the Tulsa robberies, and referenced Appellant's need to get back to his cell in Tulsa.
. OUJI-CR 2d 6-39 is entitled Possessing A Firearm After A Felony Conviction-Elements.
. Generally stated, the advocate-witness rule requires the roles of advocate and witness be kept separate and an advocate should be called as a witness only in circumstances of utmost necessity. See Boyd v. State, 1992 OK CR 40, 121, 839 P.2d 1363, 1369-70; Cavaness v. State, 1978 OK CR 76, (11, 581 P.2d 475, 478, cert. denied, 439 U.S. 1117, 99 S.Ct. 1024, 59 L.Ed.2d 76 (1979). This is so because evidence given by a prosecutor could easily carry more weight with a jury than the evidence of other witnesses. See Brown v. State, 1973 OK CR 109, T10, 506 P.2d 1396, 1399. "
. The guidelines set forth in Wallace are as follows: (1) The court must inform the defendant of the right to present mitigating evidence, and what mitigating evidence is; (2) the court must inquire both of the defendant and his attorney (if not pro se) whether he or she understands these rights; (3) the court should also inquire of the attorney if he or she has attempted to determine from the defendant whether there exists any evidence which could be used to mitigate the aggravating circumstances proven beyond a reasonable doubt by the prosecution; (4) if such information has been given, the attorney must advise the court what that mitigating evidence is; if the defendant has refused to cooperate, the attorney must relate that to the court; (5) the trial court must inquire of a defendant and make a determination on the record whether the defendant understands the importance of mitigating evidence in a capital sentencing scheme, understands such evidence could be used to offset the aggravating circumstances proven by the prosecution in support of the death penalty, and the effect of failing to present that evidence; (6) after being assured the defendant understands these concepts, the court must inquire of the defendant whether he or she desires to waive the right to present such mitigating evidence; and (7) finally, the court should make findings of fact pursuant to Grasso v. State, 1993 OK CR 33, 857 P.2d 802, of the defendant's understanding and waiver of rights.
. In Pickens I, 1993 OK CR 15, 115, 850 P.2d 328, 333, this Court held that Pickens invoked his Miranda-based right to counsel during a custodial interrogation regarding the Tulsa robbery and shooting for which he was initially arrested (at the Circle K store at 61st and Union}. Pick-ens was later charged and convicted, as part of the same Tulsa case, with a robbery/murder at another Tulsa convenience store, which had been committed some hours earlier. Id. at 331.
. This Court summarized the specific factual circumstances surrounding these two interviews in Pickens 11, 1994 OK CR 74, 11 1-4, 885 P.2d 678, 680-82.
. Id. at 681-82.
. Id. at 682. In addition, the Tenth Circuit Court of Appeals has subsequently held that the admission of this same videotape during the sentencing-phase of Pickens' trial for the Tulsa crimes was likewise a non-harmless violation of his right to counsel, and that court struck down his capital sentence for the Tulsa murder on this basis.
See Pickens v. Gibson, 206 F.3d 988, 995-97 (10th Cir.2000).
. Pickens I, 850 P.2d at 333.
. See Edwards v. Arizona, 451 U.S. 477, 101 S.Ct. 1880, 1884-85, 68 LEd.2d 378 ("[Aln accused, ... having expressed his desire to deal with the police only through counsel, is not subject to further interrogation by the authorities until counsel has been made available to him, unless the accused himself initiates further communication, exchanges, or conversations with the police."); Minnick v. Mississippi, 498 U.S. 146, 111 S.Ct. 486, 112 L.Ed.2d 489 (1990) (when accused requests counsel during custodial interrogation, police may not re-initiate interrogation, even after counsel has been provided).
. Pickens L, 850 P.2d at 333-34.
. My reasons for rejecting the Court's conclusion that Pickens "re-initiated" communications with the police are articulated in my concurrence in the Tulsa case, which is incorporated herein by reference. See id. at 344-46 (Chapel, J., specially concurring).
. See Arizona v. Roberson, 486 U.S. 675, 108 S.Ct. 2093, 100 LEd.2d 704 (1988) (suspect in custody who has invoked right to counsel during custodial interrogation on one case cannot be questioned regarding that case or any other case until counsel has been provided).
. Although the Supreme Court held in McNeil v. Wisconsin, 501 U.S. 171,. 111 S.Ct. 2204, 115 L.Ed.2d 158 (1991), that an accused's invocation of his Sixth Amendment right to counsel did not likewise invoke his Fifth Amendment (Miranda-based) right to counsel regarding questioning for a separate crime, McNeil did not involve a defendant who had previously invoked his Fifth Amendment right to counsel. Id. at 2206 (noting that accused "did not request an attorney" during his initial custodial interrogation). Consequently, the McNeil Court's conclusion that the Sixth Amendment right to counsel is "offense specific," meaning that the invocation of this right regarding one offense does not affect the ability of police to initiate interrogation regarding other offenses, id. at 2207, does not impact the current analysis. The McNeil Court itself specifically recognized that the Fifth Amendment right to counsel during custodial interrogation and the corresponding "Edwards rule" are "not offense specific." Id. at 2208 {emphasis in original). "Once a suspect invokes the Miranda right to counsel for interrogation regarding one offense, he may not be reapproached regarding any offense unless counsel is present." Id. (emphasis in original) (citing Arizona v. Roberson ).
. Id. at 2207.
. The significance of this impact is highlighted by the Tenth Circuit's reversal of Pickens' capital sentence in the Tulsa case, based upon the unconstitutional admission of the (second) Creek County confession. See note 4 supra.
. In United States v. Gouveia, 467 U.S. 180, 104 S.Ct. 2292, 81 LEd.2d 146 (1984), the Supreme Court held that inmates in administrative detention for commission of a crime did not have a Sixth Amendment right to counsel prior to indictment, because formal adversarial proceedings had not yet commenced against them. Id. at 2297-98. The Court reasoned:
It is only at that time "that the government has committed itself to prosecute, and only then that the adverse positions of government and defendant have solidified. It is then that a defendant finds himself faced with the prosecu-torial forces of organized society, and immersed in the intricacies of substantive and procedural criminal law."
Id. at 2298 (quoting Kirby v. Illinois, 406 U.S. 682, 689, 92 S.Ct. 1877, 32 LEd.2d 411 (1972)). In the case of an accused like Pickens, who has already been formally charged with one crime and is about to be charged with another, the government has already committed itself to prosecute; the adverse positions of the government and the accused have already solidified; and the accused is already faced with the prosecutorial forces of organized society and immersed in the intricacies of substantive and procedural criminal law. When Pickens was interrogated without his appointed counsel in Creek County, he was already "in a situation where the results of the confrontation 'might well settle the accused's fate and reduce the trial itself to a mere formality." " Id. (quoting United States v. Wade, 388 U.S. 218, 224, 87 S.Ct. 1926, 18 LEd.2d 1149 (1967)). The un-represented confession of Pickens to the Creek County robbery/murder arguably rendered both his Creek County trial and the capital stage of his Tulsa trial "a mere formality." ,
. See Okla. Const., art. II, sect. 20.
. The State does not challenge Pickens' assertion that he is mentally retarded.
. 1999 OK CR 17, 984 P.2d 221.
. Id. at 238.
. 492 U.S. 302, 109 S.Ct. 2934, 2954, 106 L.Ed.2d 256 (1989).
. See 109 S.Ct. at 2958-63 (Brennan, J., concurring in part and dissenting in part); id. at 2963 (Stevens, J., concurring in part and dissenting in part). The Supreme Court has recently granted a new petition for certiorari in the Perry case. See Perry v. Johnson, - U.S. --, 121 S.Ct. 563, 148 L.Ed.2d 483 (2000).
. My separate opinion in Lambert, which concludes that Article II, Section 9 of the Oklahoma Constitution prohibits execution of the mentally retarded, is incorporated herein by reference. See Lambert, 984 P.2d at 240-44 (Chapel, J., concurring in part and dissenting in part).
. Although my dissent from the Court's affir-mance of Pickens' convictions does not rely on this fact, the limited mental capacity of Pickens further illustrates his need for counsel as a "medium" between himself and the State. Cf. Maine v. Moulton, 474 U.S. 159, 106 S.Ct. 477, 487, 88 LEd.2d 481 (1985) ('The Sixth Amendment guarantees the accused, at least after the initiation of formal charges, the right to rely on counsel as a 'medium' between him and the State").
. In Perry, Justice O'Connor's opinion for the Court majority recognized that the Eighth Amendment's prohibition against cruel and unusual punishment "recognizes the 'evolving standards of decency that mark the progress of a maturing society."" 109 S.Ct. at 2953 (citations omitted). Her opinion also acknowledged that "[the clearest and most reliable objective evidence of contemporary values is the legislation enacted by the country's legislatures." Id. Hence the Court relied upon the paucity of jurisdictions (two states and the federal government) that had acted to ban execution of the mentally retarded. Id. at 2955. My separate opinion in Lambert catalogs the substantial development of the law in this area since 1989, including the ten additional death-penalty states that have acted to ban the execution of retarded persons, as well as
. Id. at 2953.
. Id. (citation omitted).
. The Perry majority acknowledged that "[in its emphasis on a permanent, congenital mental deficiency, the old common law notion of "idiocy," bears some similarity to the modern definition of mental retardation." 109 S.Ct. at 2954 (citation omitted).
|
CASELAW
|
Swiss money manager GAM sees 50 percent drop in first half pre-tax profit
ZURICH (Reuters) - Swiss money manager GAM Holding on Tuesday warned it expects a roughly 50 percent year-on-year fall in first-half underlying profit before tax, mainly due to a drop-off in performance fees. Zurich-based GAM posted underlying profit before tax of 101.5 million Swiss francs ($105.3 million) for the first six months of 2015. Underlying profit after tax for the first half is also expected to fall by around half compared to the year-ago period, the company said. Performance fees for the first half of the year are expected to fall to around 1 million francs from 44.1 million francs for the same period in 2015. “Net management fees and commissions are also expected to decline, mainly driven by lower average assets under management and a slight reduction in the average management fee margin,” the company said in a statement. “These effects will be partially offset by a reduction in personnel expenses and ongoing cost control.” GAM will report half-year results on Aug. 3. Shares in GAM are down 31.4 percent in 2016. Reporting by Joshua Franklin; Editing by Sunil Nair
|
NEWS-MULTISOURCE
|
User:Zeoes Biotech
ZEOES BIOTECH
Zeoes Biotech is an efficient manufacturer, supplier and exporter of Spirulina Powder, Spirulina Capsules, Spirulina Chocolates, Nutraceutical Products and stevia.
|
WIKI
|
Template:Did you know nominations/VyRT
The result was: promoted by Miyagawa (talk) 18:56, 8 July 2015 (UTC)
VyRT
* ... that the online platform VyRT was founded by Jared Leto as a live video streaming service?
* Reviewed: Memories to You
Created/Expanded by Earthh (talk). Self-nominated at 15:53, 8 June 2015 (UTC).
* Symbol question.svg It's an interesting and neutral hook, expanded recently enough after initially being created as a redirect, and I see no copyright violations, but which reference specifically is the hook being attributed to? Snuggums (talk / edits) 02:56, 10 June 2015 (UTC)
* It is attributed to Fast Company (FN3).--Earthh (talk) 17:43, 10 June 2015 (UTC)
* Symbol confirmed.svg Thanks for that. It seems reliable, and QPQ is also complete. All good to go. Snuggums (talk / edits) 22:05, 10 June 2015 (UTC)
* Symbol possible vote.svg There is quite a bit of close paraphrasing here.
* Source: We currently have the main page, Live, and Vault, as well as a number of personal pages that can be accessed for their applicable necessities.
* Article: The VyRT website features a main page, Live, and Vault, as well as a number of personal pages that can be accessed for their applicable necessities.
* Source: Whether or not there is a live event, you can still chat with others within the interests chats of your choice. VAULT features all available events for purchase
* Article: Whether or not there is a live event, users can chat with others within the interests chats of their choice. The Vault sections features all available events for purchase, including streaming and downloads.
* Source: so the team transitioned to a new site, rewrote everything in Ruby on Rails and expanded their capacity on Heroku
* Article: After the first streamed events, VyRT transitioned to a new site ... The team rewrote the website in Ruby on Rails and expanded its capacity on Heroku.
* Source: A user simply logs in at the designated time and date of the broadcast and can interact with other users via live feed.
* Article: Users log in at the designated time and date of the broadcast and can interact with others via live feed.
* Source: Artists interact with the audience over a live feed
* Article: Artists can also interact with the audience over a live feed.
* Source: VyRT is a website and startup that lets performers create live experiences and broadcast them to the world
* Article: His aim was to let musicians create live experiences and broadcast them on the Internet
* Source: Viewers who want to access the live show from Los Angeles as it happens on September 15, complete with real-time social community engagement from audiences worldwide, can do so for $14.99
* Article: The event included real-time social community engagement from audiences worldwide.
* Yoninah (talk) 22:39, 20 June 2015 (UTC)
* Not everything you cited is close paraphrasing. I'll fix this in the next days.--Earthh (talk) 18:30, 23 June 2015 (UTC)
* Sorry for the delay, I've been really busy with my final exams. I've removed or reworded all close paraphrasing you cited. I hope everything's fine now.--Earthh (talk) 21:35, 7 July 2015 (UTC)
* Symbol confirmed.svg Yes, thank you. No close paraphrasing seen. Restoring tick per Snuggums' review. Yoninah (talk) 15:51, 8 July 2015 (UTC)
|
WIKI
|
Page:The Green Bag (1889–1914), Volume 18.pdf/178
EXEMPTION FROM CAPTURE
'55
EXEMPTION OF PRIVATE PROPERTY AT SEA FROM CAPTURE By EDWIN MAXEY THE United States has for nearly a the English, which, because of the strength century contended for the principle of of its navy, feels that it would be poor policy the exemption from capture of ail private to give up the means of crippling an enemy property at sea, contraband excepted. The which the present rule affords. Yet England acceptance of this principle by the powers may come to see that the present rule cuts of Europe was urged by Secretary Marcy both ways, as it would tend materially to when the United States was invited to adhere cut off her food supply during a war between to the declaration of Paris. Yet for some her and a country possessing a reasonably reason his counter-proposition was rejected. strong fleet of commerce destroyers. The In 1870 Mr. Fish urged the acceptance of change would render the cutting off of her this "as another restraining and humanizing supply of food and raw materials for manu influence imposed by modern civilization facture impossible, except by a blockade of on the art of war." The following year a her coast. Therefore, selfishness, which, it treaty was concluded between the United is claimed by England, is the motive which States and Italy embodying this principle. has impelled the United States to champion It has also been applied by Prussia and the new rule, may yet impel England to Austria, and accepted in principle by Russia, abandon the old. provided it was accepted by the other states That England is gradually coming to this of Europe. But it cannot as yet be said to opinion is shown by the conclusions of the be a part of international law. The reason Royal Commission appointed in 1893 for the ableness of the rule, together with the fact purpose of investigating the question of the that it has been successfully applied to war supplies of food and raw material during a fare on land among all civilized nations, will naval war. These, they concluded, were undoubtedly secure its extension to warfare endangered in the following ways : " (i) The on sea. It is true that certain very able seizure by the enemy of ships and cargo writers, particularly Hall, argue for a con belonging to this country; (2) The possible tinuance of the present rule; but their argu establishment of a blockade of our coasts; ments are by no means conclusive. The and (3) The possibility that certain food gist of the arguments of this school is that stuffs might be held by certain nations to the present rule is the established law, that come under their definition of contraband." it is not as bad as confiscations of private Of these, they considered the first to be property on land, and no worse than some by far the most important; and upon this other things now practiced in war. This, basis a very respectable minority reached the however, does not touch the real question, logical conclusion that "if the proposed which is, Would the exemption contended conference were to result in the abrogation for be a substantial improvement over the of the existing rule, all the difficulties we present rule? That it accords with the have been instructed to consider would dis theory that war is a conflict between states — appear, and all proposed remedies would a theory that has contributed much toward disappear. In our opinion the evidence ameliorating the harsh conditions of war — laid before us tended to show that the rule does not admit of doubt. The'nation'which no longer does, if it ever did, subserve the stands the most in the way of'a change is real interests of this country. We desire
|
WIKI
|
Page:United States Statutes at Large Volume 110 Part 3.djvu/104
110 STAT. 1834 PUBLIC LAW 104-188—AUG. 20, 1996 (4) Paragraph (2) of section 4978(b) is amended by striking subparagraph (A) and all that follows and inserting the following: "(A) first from qualified securities to which section 1042 applied acquired during the 3-year period ending on the date of the disposition, beginning with the securities first so acquired, and "(B) then from any other employer securities. If subsection (d) applies to a disposition, the disposition shall be treated as made from employer securities in the opposite order of the preceding sentence.". (5)(A) Section 4978B (relating to tax on disposition of employer securities to which section 133 applied) is hereby repealed. (B) The table of sections for chapter 43 is amended by striking the item relating to section 4978B. (6) Subsection (e) of section 6047 is amended by striking paragraphs (1), (2), and (3) and inserting the following new paragraphs: "(1) any employer maintaining, or the plan administrator (within the meaning of section 414(g)) of, an employee stock ownership plan which holds stock with respect to which section 404(k) applies to dividends paid on such stock, or "(2) both such employer or plan administrator,". (7) Subsection (f) of section 7872 is amended by striking paragraph (12). (8) The table of sections for part III of subchapter B of chapter 1 is amended by striking the item relating to section 133. 26 USC 133 note. (c) EFFECTIVE DATE.— (1) IN GENERAL.— The amendments made by this section shall apply to loans made after the date of the enactment of this Act. (2) REFINANCINGS. —The amendments made by this section shall not apply to loans made after the date of the enactment of this Act to refinance securities acquisition loans (determined without regard to section 133(b)(1)(B) of the Internal Revenue Code of 1986, as in effect on the day before the date of the enactment of this Act) made on or before such date or to refinance loans described in this paragraph if— (A) the refinancing loans meet the requirements of section 133 of such Code (as so in effect), (B) immediately after the refinancing the principal amount of the loan resulting from the refinancing does not exceed the principal amount of the refinanced loan (immediately before the refinancing), and (C) the term of such refinancing loan does not extend beyond the last day of the term of the original securities acquisition loan. For purposes of this paragraph, the term "securities acquisition loan" includes a loan from a corporation to an employee stock ownership plan described in section 133(b)(3) of such Code (as so in effect). (3) EXCEPTION. — Any loan made pursuant to a binding written contract in effect before June 10, 1996, and at all times thereafter before such loan is made, shall be treated
�
|
WIKI
|
User:Godof86/Sujit Mukherjee
Sujit Mukherjee (August 21, 1930 - January 14, 2003) was a cricket writer, columnist, translator, publisher and historian.
|
WIKI
|
Abdul Malik Mujahid
Abdul Malik Mujahid (born 1951) is an American imam, producer, author, and non-profit executive. Mujahid has been selected eight times as one of the "World's 500 Most Influential Muslims".
Accomplishments
Abdul Malik Mujahid has been active in community leadership since his student days, he is the founding president of Sound Vision which was established in 1988 in Chicago. It is a non-profit organization which develops Islam-related content for the international news media to develop inter-faith peace and understanding. He is also the executive producer of Chicago's radio talk-show program Radio Islam. Abdul Malik Mujahid, a local Chicago Muslim leader and founder of Soundvision and Radio Islam, was recognized here at an annual event in 2016 for his achievements by the Chicago Muslim community organization, The Council of Islamic Organizations of Greater Chicago.
International interfaith movement
Mujahid has been active with the interfaith movement since the 1993 Parliament of the World's Religions was revived. He has addressed the Parliament in Cape Town, South Africa, Barcelona, Spain and Melbourne, Australia. In November 2009, the Board of Trustees of the council for a Parliament of the World's Religions elected him as chairman. Abdul Malik Mujahid chaired the international 2015 Parliament in Salt Lake City which was attended by 11,000 people from 50 religions and 80 countries.
He has served on the Independent Task Force on Civil Liberties and National Security by the Council on Foreign Relations in New York from 2006 to 2009. He also served on the independent task force of The Chicago Council on Global Affairs on the civic and political integration of Muslim Americans. This task force's report, Strengthening America: The Civic and Political Integration of Muslim Americans, was issued on June 26, 2007, calling for Muslims and non-Muslims to work together to create full and equal opportunities for Muslim Americans to participate in American civic and political life.
In 2008, he served on the Credentials Committee of the Democratic National Convention.
Mujahid is a founding member of a PAC (Political Action Committee) called - Muslim Democrats.
Mujahid is among the faith leaders asking for better policies on climate change. On September 21, 2014, along with Al Gore, he addressed a major interfaith gathering at Cathedral Church of St. John the Divine in New York City, saying that climate change will be one of the major themes of the forthcoming Parliament of the World's Religions.
He has been a major supporter of the undocumented workers' movement, speaking and leading one of the largest marches in Chicago history for immigration rights. Mujahid has served at the steering committee of the Midwest Coalition for Human Rights. As the national coordinator of the Bosnia Task Force USA, in the 1990s. He successfully led efforts in collaboration with the National Organization for Women (NOW) to declare rape as a war crime in the international law for the first time in human history.
Mujahid also chairs a coalition, Burma Task Force, USA, that reaches out to media and community stakeholders, US policymakers and international NGOs and human rights groups to raise awareness of ongoing genocide and persecution. Burma Task Force includes involvement of 17 other organizations from the Muslim American community. Based on Burma Task Force lawsuit a federal court summons Burmese President Thein Sein and several Burmese ministers for human rights violations allegedly committed against the stateless Rohingya Muslim minority. The US embassy in Yangon, however, issued a clarification that the lawsuit has nothing to do with Washington's policy toward Burma. He co-chaired an international conference, in early 2015, at the Nobel Peace Center, Oslo, Norway, where 7 Nobel Peace Laureates declared that what Rohingya are facing in Burma is a "text book case of genocide". The Nobel Laureates included Desmond Tutu from South Africa, Mairead Maguire from Ireland, Jody Williams from the US, Tawakkol Karman from Yemen, Shirin Ebadi from Iran, Leymah Gbowee from Liberia and Adolfo Pérez Esquivel from Argentina. Burma Task Force is housed at Justice for All, a not for profit organization and the member of the Task Force.
Mujahid's leadership Sound Vision also initiated and coordinated an informal network of 26 Muslim organizations against domestic violence.
Mujahid developed a friendship with Muhammad Ali after meeting him at a reception given by the Mayor of Chicago in 1977 in honor of Imam Warith Deen Mohammed. Ali worked with Mujahid to lend a famous name to the efforts of the Bosnia Task Force, and also marched with Mujahid in Chicago in the 1980s in support of oppressed Palestinians. Mujahid volunteered with Ali for food distribution.
As an imam, he gives Friday sermons ("khutba" in Arabic) at various Chicago mosques and prayer locations.
From 2005 to 2008, he served as Chairman of the Council of the Islamic Organizations of Greater Chicago (CIOGC).
In 2020, he filed for 2nd Democratic Delegate in the Illinois Democratic Primary. He lost the race to Robin Kelly.
He has authored one book, Conversion to Islam: Untouchables Strategy for Protest in India, which won the Outstanding Academic Book of the Year Award in 1990 from the American Library Association.
Campaign Against Terror, War and Hate
Imam Mujahid has consistently challenged the extremists' perspectives through critiques rooted in Islamic sources. Condemning terrorist attacks on the French magazine Charlie Hebdo, he wrote, "one cannot avenge the prophet who banned revenges." Speaking on Fox News', the O'Reilly Factor, he again condemned the terrorists but also questioned why Muslims who had saved the lives of Jewish Parisians and a Muslim policeman who was slain in the Paris attack were not being celebrated by the media.
Imam Malik Mujahid on a regular basis provides thinking and talking points to Imams and community leaders on various issues including on how to deal with issues related to news of terror attack and sample press release/statements of condemnation. While condemning terrorism, Imam Mujahid also asserted that American Muslims are more peaceful than other Americans communities. However, he wants the Muslim community to do more than just condemn terrorism. In frustration, he coined a phrase "condemning terrorism has become the 6th pillar of Islam." Lamenting on the gap between Muslim condemnation and a common perception of those who feel Muslims don't condemn terrorism, Imam Mujahid launched several initiatives including an anti-ISIS campaign.
Developing Resources to Deter Muslim Youth from Extremism
Under Imam Mujahid's guidance Sound Vision has produced multiple resources to strengthen Muslim communities' outreach and engagement of Muslim youth. Some of these resources are directly aimed at preventing extremism. and educating youth and parents about how to deal with issues related to discussing extremism and terrorism.
Hey ISIS You Suck!!! Campaign
In the aftermath of 2016 Orlando terror attack, Imam Mujahid led a campaign in Chicago in August 2016 condemning the terror organization ISIS. The campaign consisted of a billboard on a prominent highway with a short message, '"''Hey ISIS, you Suck!!!" signed by #ActualMuslims''. Imam Mujahid told CBS Evening News that as Christians defeated KKK, it is important for Muslims to do their part in defeating ISIS. Later Sound Vision, led by Mujahid, invited others communities to take this billboard campaign to their cities. As a result, this billboard has appeared in St. Louis, Missouri Miami, Florida and Phoenix, Arizona. The billboard campaign was also accompanied by a social media campaign with the hashtag, "#ActualMuslims." The campaign received wide media coverage. However, some questioned if the real target of the billboard was ISIS or those who think Muslims don't condemn terrorism. Funds are being raised to take this campaign to Times Square.
While the ISIS Sucks campaign was billboard based it was also accompanied by supporting booklets written by Mujahid and produced by Sound Vision. One booklet contrasted Prophet Muhammad's teachings with the abhorrent behavior of ISIS; another compared ISIS to the Egyptian president Sisi and argued that both are oppressive undemocratic regimes disregarding human life. Another anti-ISIS brochure debunks the ISIS argument about the revival of slavery.
Anti-war and anti-nuke positions
Imam Mujahid says he is against terrorism but cannot support the War on Terror. For the same reason he speaks out against war as well. Mujahid joined the National Council of Churches in asking President Bush to commit to "draw back from the use and threat of 'first strike' war."
Imam Malik Mujahid has spoken against using nuclear weapons at the United Nations. He was a guest speaker at the 25th anniversary of the elimination of the nuclear weapons in Kazakhstan. Mujahid was also a signatory of a joint statement by religious leaders, parliamentarians and mayors on the 70th anniversary of the Hiroshima and Nagasaki bombing s calling for a nuclear free world. He was one of the leading organizers of a major anti-war march in New York where 100 Imams endorsed a statement against war and terror. The rally was organized by the United National Antiwar Coalition (UNAC) with support from Muslim Peace Coalition. He has joined 1,000 other world leaders in criticizing the war on drugs as well.
War, Terror, and Hate as a connected cycle
Imam Mujahid considers war-terror-hate to be a connected cycle that dehumanizes and kills human beings. While reflecting on Laden's death he made mention of this war-terror-hate as a cycle again. "While condemning terrorism seems to have become almost a sixth pillar of Islam, it is important that Muslim American organizations achieve a higher level of credibility by pointing out that occupation, torture, disregard to the due process, and denial of the electoral process breeds terrorism."
Imam Mujahid organized a special track at the Parliament of the World's Religions against the war-terror-hate cycle. It resulted in a declaration against hate speech, war and violence as well as some follow up resources. Since Mujahid considers war-terror-hate a connected destructive cycle, he has organized training sessions for Muslim Peace Coalition to combat Islamophobia in Berkeley, CA and Long Island, NY. Mujahid assisted Charter For Compassion to develop their Anti-Islamophobia Guide. He has also offered webinars and seminars against the rising hate. Mujahid has emerged as an expert on Islamophobia. He has provided resources to students, mosques, and interfaith organizations on fighting Islamophobia. He has written about the impact of Islamophobia on Muslim children, and challenges of anger among Muslim youth. He has compiled statistics on Islamophobia in USA for years 2008 & 2011.
Fight against the Muslim Ban
While fighting Islamophobia he has also fought against what he considers to be anti-Muslim legislation. He criticized President Obama's signing into law the indefinite detention of the US citizens. Mujahid is an Amicus in Hawaii versus Trump and in the US Court of Appeal 4th District. He has extensively written against the Muslim Ban as well.
|
WIKI
|
Page:The Ancient Science of Numbers by Luo Clement (1908).pdf/109
discovered whether or not the character had been correctly portrayed. In other words, it was absolutely necessary that easily recognizable subjects should be chosen that there might be no difficulty experienced in recognizing their predominentpredominant [sic] traits. Moreover, the strictest comparison may be made between the qualities indicated in these readings, and the characteristscharacteristics [sic], or law of the letters, as described in Chapter VII.
It may also be added that the names presented below were choosenchosen [sic] for one reason alone: because they indicated a diversity of achievements, and might reasonably be expected to present a corresponding diversity of characteristics. The result follows, and the student is asked respectfully to accept it upon honor as a thoroughly sincere attempt to apply the conditions of this supreme test in a somewhat detailed demonstration of the principles of the Science of Numbers.
The readings follow:
|
WIKI
|
Giuseppe Matulli
Giuseppe Matulli (5 December 1938 – 11 February 2024) was an Italian researcher and politician. A member of Christian Democracy, he served in the Chamber of Deputies from 1987 to 1994.
Matulli died in Florence on 11 February 2024, at the age of 85.
|
WIKI
|
Mood Swings in Women due to Hormone Imbalance
A mood swing is defined as "an abrupt and apparently unaccountable change of mood." Mood swings can be triggered by any number of events or situations, but in many cases, the root cause of a mood swing is a shift in hormone levels. One minute you are feeling elated and happy, but the next you are expressing anger and hostility. Mood swings are common in women who are experiencing hormonal fluctuations due to physiological events, such menstruation or menopause. Chronic mood swings can significantly affect a woman's health and are often the result of a hormonal imbalance. The good news is that mood swings is another hormonal imbalance symptom that could be treated safely and effectively with hormone therapy.
What Causes Mood Swings?
Mood swings can be a side effect of lifestyle choices, life events or physiological changes, including:
Stress
It's no secret that stress influences mood. Stress has a number of effects on the body—physical and psychological. Hormones and neurotransmitters that regulate mood can be affected by stress levels. Too much stress can cause cortisol levels to rise, leading to fatigue, poor sleep and appetite changes, further impacting changes in mood and behavior.
Psychiatric Issues
Mood disorders are not always related to a hormonal imbalance. In some cases, psychological disorders or mental health conditions may be to blame. ADHD (attention deficit hyperactive disorder), bipolar disorder, panic disorder and depression are just a few examples of psychological issues that may cause mood swings.
PMS (premenstrual syndrome)
For many women, uncomfortable symptoms can occur approximately one to two weeks before menstruation. This period of time is known as PMS, or premenstrual syndrome. Premenstrual mood swings are just one symptoms and may be influenced by other common symptoms, including bloating, fatigue, changes in appetite and depression. The cause of these symptoms is related to shifts in progesterone and estrogen levels, which rise and fall throughout the full menstrual cycle.
PMDD (premenstrual dysmorphic disorder)
PMDD, or premenstrual dysmorphic disorder, is a more severe form of PMS, affecting approximately 8 percent of premenopausal women. The symptoms of PMDD are similar to those experienced with PMS, but mood swings tend to be more extreme, along with other emotions, such irritability, sadness, and anxiety. The cause of PMDD is not well understood, but it is speculated that it is the effect of an abnormal response of the brain to hormonal shifts that occur before menstruation leading to a deficiency in the neurotransmitter, serotonin.
Menopause
Mood swings are one of the most common symptoms of menopause. During perimenopause, severe mood swings can occur due to hormonal shifts affecting estrogen and progesterone. The hormonal shifts are generally more extreme in the earlier phases of the transition into menopause. Other menopausal symptoms, such as hot flashes and night sweats, can cause undue stress, poor sleep and anxiety that can lead to mood swings as well.
Thyroid Dysfunction
Thyroid dysfunction can influence mood and cause mood swings. Hypothyroidism can be the result of low thyroid hormone and high cortisol levels. This can affect sleep, energy and appetite, all of which can impact mood.
Hormonal Imbalance
In general, out of balance hormones can affect mood. Estrogen and progesterone are well-known for their role in female physiology and fluctuate frequently throughout the female life cycle. However, other hormones may become imbalanced due to age or illness and cause mood swings. For example, low testosterone in women can impact energy, weight, and sex drive. High cortisol can lead to anxiety, sleeplessness, and weight gain. Any of these factors can cause mood swings simply due to the effects on a woman'`s lifestyle or overall health and wellbeing.
How Mood Swings Affect Women&'s Health**
Mood swings can damage relationships, interfere with work productivity and limit social interactions. This can negatively affect your mental health and become a source of stress—both of which can increase the risk of more serious disease.
If your mood swings are more than occasional bouts of moodiness before your period or after a particularly bad day, it might be time to seek help. Identifying the root cause of your mood swings with the help of a qualified professional can you ensure you get the most effective treatment.
Female Hormone Balance Therapy for Mood Swings
Mood swings are not something any woman should ignore. If you are experiencing frequent mood swings, seek help from a qualified professional. If your mood swings are related to a hormonal imbalance, you are likely experiencing other symptoms or events in your lifecycle.
For example, women who are perimenopausal will likely be experiencing hot flashes, foggy thinking or joint pain along with mood swings. If you have a thyroid disorder, you may notice that your mood swings are accompanied by feeling tired all the time, a change in appetite and an inability to regulate your body temperature. These are signs that your mood swings may be related to a hormonal imbalance.
Advanced lab testing can help pinpoint which hormones are out of balance and may causing your mood swings and other symptoms. Following lab testing, you can meet with one of the expert physicians of the BodyLogicMD network for a one-on-one consultation. Each practitioner is highly trained and specializes in hormone health and balance. He/she will review your lab results, discuss your symptoms and medical history, as well as come to understand how your life has been affected by hormone imbalance. Your doctor will partner with you to develop a comprehensive treatment plan that will correct any hormone imbalance safely and effectively to help relieve you from the unwelcome symptoms, like mood swings.
Your treatment plan may include bioidentical hormone replacement therapy to restore hormone balance, along with nutritional guidance, fitness recommendations, stress-reduction techniques and pharmaceutical-grade supplements. Each element in your treatment plan will be designed to fit your lifestyle, while ensuring your medical needs are met and your wellness goals are achieved.
Contact the BodyLogicMD bioidentical hormone doctor nearest you to schedule an appointment and learn more about how hormone therapy may provide relief from mood swings.
Updated January 24th, 2018
Want more
Information?
Contact a Physician
×
|
ESSENTIALAI-STEM
|
3-5 July 2006
CERN, Geneva
Europe/Zurich timezone
OpenAlea - A platform for plant modelling, analysis and simulation
3 Jul 2006, 11:35
30m
40-SS-D01 (CERN, Geneva)
40-SS-D01
CERN, Geneva
Python in Science Python in Science
Speaker
Mr Christophe Pradal (CIRAD)
Description
The aim of the plant architecture research community is to understand the biological processes involved in the function and growth of plants with explicit representation of their topology and geometry. To understand these systems, which may be quite complex, researchers in botany, ecophysiology, forestry, horticulture, applied mathematics and computer science share experimental data, plant models and software tools. Research in this domain concerns several different scales, such as plant cells, plant organs, entire plants and plant populations. To support this research, we are developing OpenAlea, an open source software platform implemented in Python. OpenAlea is used for the integration and comparison of diverse models and tools provided by the research community. We use Python to glue together components implemented in various languages (e.g. C, C++ and Fortran). Standard wrapping tools, such as Boost.Python, Swig and f2py, are used to support the integration process. Different components can use common data structures such as sequences, tree graphs and multiscale tree graphs. To ease the communication between components, a unique interface has been specified for each data structure. The Zope component framework is used to define interfaces and adapters. Three types of components are integrated into OpenAlea: - analysis of plant architecture (e.g. AMAPmod), - geometric representation and visualization of plants at different scales (e.g. PlantGL), - and simulation models of ecophysiological processes (e.g. RATP, Archimede, PyCaribu, etc.). Users can combine components from OpenAlea and other Python scientific libraries into customised work flows according to their specific needs. Training courses on Python and OpenAlea's modules are given in France and other countries (e.g. Thailand, Brazil, etc.) or through an e-learning platform.
Summary
In this presentation, I will discuss:
- the plant architecture scientific domain.
- the OpenAlea architecture.
- the OpenAlea community of developers, modellers and users and how we work together.
- specific components for plant study.
- development tools and quality assurance.
- how Python is used to solve key problems.
Primary authors
Mr Christophe Pradal (CIRAD) Dr Frédéric Boudon (CIRAD)
Co-authors
Dr Christian Fournier (INRA) Dr Christophe Godin (CIRAD) Dr Hervé Sinoquet (INRA) Dr Jean-Baptiste Durand (LMC-IMAG) Mr Nicolas Dones (INRA) Dr Pierre Barbier de Reuille (INRA)
Presentation Materials
|
ESSENTIALAI-STEM
|
Should people living with HIV get vaccines early in the roll out?
WHO recommends that countries refer to the WHO SAGE Roadmap For Prioritizing Uses Of COVID-19 Vaccines In The Context Of Limited Supply[7] which was created under the assumption that there would not be substantive differences in vaccine efficacy among subgroups (for example, in people with comorbidities that increase the risk of severe COVID-19 such as HIV-positive status). Therefore countries can make plans for people to receive the vaccine in order of priority based on their age, health, occupation and other factors such as people in living in care or residential homes, or closed settings such as prisons. Some countries are prioritizing vaccination for all people living with HIV or for those who are immunocompromised (as indicated by having a CD4 cell count <200/mm3) [8],[9].
An informal poll of 52 countries revealed 24 that have an immunization policy that prioritizes vaccinations for people living with HIV. These policies are supported by recent literature which suggests that people living with HIV at any CD4 count appear to be at increased risk for severe outcomes and death due to COVID-19 compared with people without HIV[10],[11],[12]. Independent of the immune status, many people living with HIV have one or more comorbidities that may put them at increased risk for a more severe COVID-19. Therefore, people living with HIV with co-morbidities (such as COPD, asthma, diabetes, heart disease, kidney disease, liver disease, Parkinson’s disease, multiple sclerosis, motor neurone disease, severe obesity) should be prioritized for early vaccination in most settings. People living with HIV should not be excluded from COVID-19 vaccine access plans regardless of their immune status, and countries ought to consider including people living with HIV as a priority group for COVID-19 vaccination according to their epidemiological context.
|
ESSENTIALAI-STEM
|
Page:Travels to Discover the Source of the Nile - In the Years 1768, 1769, 1770, 1771, 1772, and 1773 volume 3.djvu/390
366 Denghel, all my great friends and the hopes of this country, I for the first time, since my arrival in Abyssinia, abandoned myself to joy.
constitution was, however, too much weakened to bear any excesses. The day after, when I went home to Emfras, I found myself attacked with a slow fever, and, thinking that it was the prelude of an ague, with which I was often tormented, I fell to taking bark, without any remission, or, where the remission was very obscure, I shut myself up in the house, upon my constant regimen of boiled rice, with abundant draughts of cold water.
was at this time told that there was a great commotion at Gondar; that a monk of Debra Libanos, a favourite of the Iteghè and of the king too, had excommunicated Abba Salama in a dispute about religion at the Itchegué's house; and, the day after, Hagi Mahomet, one of Ras Michael's tent-makers, who lived in the town below, through which the high road from Gojam passes, came to tell me, that many monks from Gojam had passed through the low town, and expressed themselves very much dissatisfied by hearing that a frank (meaning me) was in the town above. He said that when they came in sixes and sevens at a time, there was no fear; but when they returned altogether (as Michael sometimes made them do) they were like so many madmen; therefore, if I resolved to stay at Emfras, he wished I would order him send me some Mahometan soldiers, who would strictly act as I commanded them.
the same time I received news that my great friend, Tecla Mariam, and his daughter of the same name, the
|
WIKI
|
Talk:Talossa
Claimed number of members
Population figures have been going back and forth here. I've provided sources for the latest figures. If someone wants to change it, please provide a better source than what's there now. PubliusFL 04:13, 31 December 2006 (UTC)
An Imaginary Country Created By Schoolkids
Does this REALLY need an article? I mean, come on. Hundreds, if not thousands, of fake countries and languages are made up by kids every year. —The preceding unsigned comment was added by <IP_ADDRESS> (talk) 04:24, 13 January 2007 (UTC).
* Sure. But few of them are more than two decades old.--Agbdavis 04:49, 26 January 2007 (UTC)
* And the majority of the population (of either Talossa) aren't kids, but adults. For a micronation, Talossa has been around for a long time and has an actual history (the previous link is not NPOV - it's pro-R. Ben Madison, who wrote it. It is, however, the longest and most detailed history of Talossa available), unlike most other micronations, where they exist for a short period of time and then disappear, with one person in charge (and usually only one in the micronation) the whole time. <IP_ADDRESS> 04:30, 22 February 2007 (UTC)
* I agree. Silly it mat be - but it's a special type of silly that can last more than 25 years and become the inspiration to thousands of others via coverage in major broadsheet newspapers - and we should certainly document it. --Gene_poole 05:13, 22 February 2007 (UTC)
* Question- the infobox only contains information about the Kingdom of Talossa and none about the Republic of Talossa. Silly as this may be, impartiality is still an important principle. Would the wiki community find it acceptable to put symbols of both groups in the infobox?--Wyattt 23:37, 22 February 2007 (UTC)
* I think that would be OK to a point. The bottom line here is that the "republic" is only "notable" because of the "kingdom", so any mention of the former needs to be kept in proportion. We can't imply that they are somehow "equal". --Gene_poole 00:11, 23 February 2007 (UTC)
* The real problem is that all of the sources in the article mention only the "kingdom" and not the "republic." Therefore it's hard to say whether anything about the "republic" is verifiable. Certainly it would be tough to argue that adding any more details about the "republic" would be "relevant to (Talossa's) notability." The arguments for the existence of this article made above rely on Talossa being "more than 25 years old," providing "inspiration to thousands of others," and having "coverage in major broadsheet papers." All of these may be true about the entity called "Kingdom of Talossa," but it does not appear (to me at least) that any of them are true about the entity called "Republic of Talossa." PubliusFL 01:05, 23 February 2007 (UTC)
* Disclosure: I am a Talossan. But I feel that the Republic has only been around for three years and has had very little outside interest, especially in comparison with the multiple major media articles about the Kingdom. It merits a section of its own in this article, not its own article in whole.--Agbdavis 08:12, 23 February 2007 (UTC)
* Disclosure: I am a Talossan too, since almost nine years. The current division between a Republic and a Kingdom reflects one country being split in two halves. When the Republic was founded, most of the active citizens of the Kingdom left and the gutted Kingdom had to be built up again from scraps. Seeing them as anything else than two equal counterparts makes no sense. So let's write an unbiased article taking that into account. There is no need for a conflict here. —The preceding unsigned comment was added by <IP_ADDRESS> (talk) 13:07, 23 February 2007 (UTC).
* Agreed.--Agbdavis 03:39, 24 February 2007 (UTC)
* Agreed by me as well.--Wyattt 00:21, 25 February 2007 (UTC)
* Agreed and done. Elistir 11:40, 25 March 2007 (UTC)
* No, not done! You tried to add a second whole new infobox, deliberately refashioning the article to put the Republic on the same par as the Kingdom... an interesting political move, but just silly when you actually look at the edited article. What was agreed to was an article that was "unbiased" taking into account the role of both in recent history... a section devoted to the Republic. But if the Republic doesn't merit its own article (something I am neutral about) then you can't just jam in the infobox here.--Agbdavis 18:02, 25 March 2007 (UTC)
* If the article is to be unbiased, then it does need to put the Republic on the same par as the Kingdom.(a member of the Republic, not Elistir)
* That's not necessarily true. It is not umbiased to artificially create a total parity between the two, when the facts (the longevity of the Kingdom, broadsheet coverage, etc.) indicate that the Kingdom is of much greater significance. In that context, the Republic seems deserving of its own section within the article. I'm not sure what else you want to do... I am sure you will agree it is insane to try to cram in two full-size infoboxes into the article. And since the Kingdom article has already been deleted and squeaked by on another deletion review, there seems little reason to think a new page devoted to the Republic would pass muster. A Republic section of the article seems the only reasonable alternative.--Agbdavis 16:51, 28 March 2007 (UTC)
* Has any Talossa-related article really survived a deletion review? Kingdom of Talossa was speedy-deleted a few times, and now is just a redirect to this article. Republic of Talossa was deleted after a VfD, and is also now a redirect to this article. PubliusFL 19:05, 28 March 2007 (UTC)
* That is correct; bad phrasing on my part. I refer only to the assertion which started this section of the talk page; I was being all dramatic and such. You have discovered my fatal flaw.--Agbdavis 20:53, 28 March 2007 (UTC)
I agree. We're not here to determine which group is "more authentic" - that can solely be determined by reference to third party sources - and thus far there are dozens of those for the kingdom and none for the republic. Sticking 2 infoboxes into the article is not appropriate. --Gene_poole 00:40, 26 March 2007 (UTC)
* Gene Poole, what are the "dozens of sources" that determine for the Kingdom's "more authenticity" that you are talking about here? Obviously we need to attribute them. (a member of the Republic, not Elistir)
* Please familiarise yourself with Wikipedia content policies before contributing to this discussion. WP:V is a good place to start. There are multiple reliable third party sources from which content concerning the kingdom can be drawn, including 4 already listed in the article. There are no such sources for the republic. The primary reason that I or anyone else have heard of Talossa is because of press articles about Ben Madison and his kingdom. The republic, thus far, has achieved nothing of interest to anyone outside its own membership, and as a consequence has been documented nowhere, to my knowledge, outside its own website. --Gene_poole 20:49, 27 March 2007 (UTC)
* The concept of verifiability of information, whether inside or outside of Wikipedia, is hardly new to me; I am a librarian and am trained to evaluate the reliability of reference sources. I take Wikipedia's point that "a thing must be noted in the word before it ought to be noted in Wikipedia", so I suppose we in the Republic need more publicity. Nevertheless, you do not seem to be following "any material that is challenged or likely to be challenged needs a reliable source, which should be cited in the article". I grant that you have provided four, two of which are weighty, one of which is brief, and one of which cannot be checked unless you are a subscriber. But four is neither "multiple", let alone "dozens". If you have numerous others, then according to the verifiability rule that you pointed me to, since I am asking, you are under the onus of providing them. And if there are only four, and that may be all that is necessary for Wikipedia's purposes, then please state honestly and plainly that there are four reliable sources and do not exaggerate by speaking of dozens. (the above member of the Republic) —The preceding unsigned comment was added by <IP_ADDRESS> (talk) 02:12, 28 March 2007 (UTC).
* Anything greater than one is a "multiple". I find it rather odd that a librarian does not know this. The four references supplied are certainly more than sufficient to verify the existence of the kingdom according to WP:V. There are numerous other references publicly available as well, and you can easily find some of them, if you so desire, by doing a Google search. --Gene_poole 03:22, 28 March 2007 (UTC)
I have added a new link to the bottom of this article. It is to the Octagon & Crown, which is an online newspaper that covers both the Kingdom and the Republic. It is also the only internal media outlet within the Talossan community that is regularly updated. This newspaper has been well received within both Talossan communities, and I think it would be of interest to anyone who wanted more information about Talossan current events. The newspaper strives to be impartial and thorough (not easy with volunteer, amateur reporters), like Wikipedia itself, so it seemed to be an appropriate addition to this article. Again, I'm not looking to offend anyone, so let me know if this a totally off-base sort of thing to do.--Wyattt 04:42, 6 April 2007 (UTC)
I have one thing to say about this, even if it is an imaginary country created by schoolkids, what damage does it do to Wikipedia, I mean, the guy has a professional looking website, and quite frankly, I think it's funny. The guy's been interviewed and stuff, and besides, the only people who are going to wikipedia "Talossa" are people who know about it. The guy made a freaking language, and didn't violate any rules, so let the kids have their fun. Will
How can something "imaginary" last 25 years? I suggest that people create Wikipedia entries for their imaginary friends that they remember from their childhood. They will have "lasted" just as long. When I was little, my half of the bedroom was the kingdom of Tonysia, and my brothers was Conisia. I invaded his half and annexed the whole area apart from his bed, and called the area Greater Tonysia. I still remember all of this with affection, but I won't inflict it on Wikipedia proper, as it is infantile. Fun it may be for those of that disposition, but does anything imaginary belong in Wikipedia, however long it "lasts"? Awernham (talk) 14:49, 28 September 2011 (UTC)
Merger of Talossan language
A notability template has been on Talossan language for a while, and nobody has been able to come up with anything to improve the sourcing of that article. Since the language appears to be an aspect of the notability of Talossa itself, why not merge the language article into this one (with a redirect)? If any reliable sources dealing more specifically with the language come to light in the future, the history of the language article will be preserved for resurrection at that time. PubliusFL 19:58, 9 May 2007 (UTC)
* I endorse this. Quite simply there are no articles about the Talossan language in reliable sources. The small mention in the Wired article does not confer notability on this subject as distinct from the subject of Talossa. - Aagtbdfoua 02:58, 11 May 2007 (UTC)
* I am afraid I must endorse it as well, against my feelings on the matter. I must admit that the language itself is not alone notable yet, alas. We will change that soon, though, if I have my way.--Agbdavis 05:28, 11 May 2007 (UTC)
* I am against this, as the language itself is quite notable, as is the nation. --<IP_ADDRESS> 19:28, 21 July 2007 (UTC)
The question, IP friend, is whether the language has notability in and of itself or whether it derives notability from its origin in the Talossa project. It appears to me to be the latter, so I support a merge. --Fsotrain09 16:39, 28 December 2007 (UTC)
* Two years on, and the language hasn't become any more notable. I think there's sufficient consensus here for a merge, if anyone cares enough to carry it out... Robofish (talk) 04:19, 26 April 2009 (UTC)
Deleted questionable material
I have deleted this material:
* In late 2003-early 2004, some citizens of the Kingdom began to see Madison as intolerably eccentric and autocratic in the wake of certain actions on Madison's part including an attempt to have a citizen thrown out on false charges of domestic violence. Led by Chris Gruber (now called Kane Gruber), they responded by creating the secessionist Republic of Talossa on 1 June 2004. As of the 17 December 2007 census, the breakaway group claims 20 members. Although the Republic is not officially recognized by the Kingdom of Talossa, an agreement of friendship and cooperation has been signed between the two parties.
* Madison continued to lead the Kingdom until 2005, when he abdicated and renounced his citizenship, in favour of his wife's grandchild Louis, who became King on 16 August. Dr. Gregory Rajala held the post of Regent until Louis' abdication on 29 November 2006. An "interregnum" was in effect until 14 March 2007, when John W. Woolley was elected King of Talossa. As of 2009 the Kingdom claims 120 members.
This page made me suspect that the above claims may not be accurate and may not represent a neutral point of view. In any case, since they are unverifiable and have negative implications about living persons (specifically, Robert Ben Madison), they have no place in the article.
Disclaimer: I have never been affiliated with any of the various "Talossa" things. I am somewhat acquainted with it because son was an active member in the late 1990s, helped write the Talossan language books, and even attended one of the yearly reunions in Milwaukee. But he is now a graduate student at Berkeley and AFAIK is not an active Talossan anymore. All the best, --Jorge Stolfi (talk) 16:07, 1 January 2010 (UTC)
* Actually, your son is definitely a member of R. Ben Madison's group, see http://www.facebook.com/group.php?gid=145725202631 . I think it's easy to prove that Mr. Madison voluntarily left the whole thing to Woolley et consortes in 2005. I watched it happen and cannot believe that all records of the event have been erased. I'm affiliated with the Republic, by the way, so I'm not going to participate in this editing conflict. Jophan (talk) 14:16, 18 May 2010 (UTC)
Trimmed infobox
I trimmed most of the infobox since most of the items are pure fantasy, or unverifiable except by testimonials of members. Moerover, some of them may reflect a biased point of view (see above). In fact I beleive it is quite inappropriate to have infoboxes in micronation articles. Micronations are real social phenomena, and as such they definitely deserve Wikipedia articles, even more than Santa Claus; but the content of such articles must be limited to verifiable facts — which, for most of them, is little more than their existence. Talossa stands out as being somewhat more substantial than the rest, but even so things like "territorial claims" and "currency" cannot be posted here as facts. Micronations are games of make-believe; Wikipedia has the duty to report on their existence, but must not be sucked into playing their games (or worse, allowing itself to become their playground). All the best, --Jorge Stolfi (talk) 16:21, 1 January 2010 (UTC)
Lebanese village
Someone had added this paragraph at the bottom of the article:
* Talossa is also a name given to a small village in southern Lebanon. The name of the village has been kept for generations and it is believed to have existed for around a thousand years. The village is populated by some 5000 people where te majority live on remittances transferred by their sons living in America and Europe as a result of an expelling campaing carried out by vicious Israeli occupation that lasted 22 years (1978-2000). The village is beautifully situated on a hilltop surrounded by distant mountains that stretch from the Nabatieh area to the medeterenian shores of Nakoura.
Google apparently cannot find any reference to this village, but perhaps the spelling is wrong, or just the name is not official. Can someone confirm its existence? Thanks, and all the best, --Jorge Stolfi (talk) 18:41, 1 January 2010 (UTC)
Official website
I have switched the two links which both claim to be the "official" web site, so that the most likely candidate comes first. Why:
* Robert Ben Madison is the founder of Talossa, and is owner of all offical registrations (the trademark and the corporation) for Talossa. A Wikipedia user with the name "R. Ben Madison" put in the link to the website I now put first. That makes it a plausible candidate. Also, the history document of that website is, according to the PDF metadata, created by Thomas Leigh, who is still a "friend" of Robert Ben Madison on Facebook.
* John Woolley is neither a founder of Talossa, nor owner of any of its official registrations. Yet he has himself put a link into this Wikipedia-article, pointing to a site which he himself has registered, on which he himself claims to be king of Talossa. This clearly contradicts with a recent video message from Robert Ben Madison on YouTube. So, it is very, very unlikely that Woolley's website be the official site of the Kingdom.--Wwwdigi (talk) 08:07, 15 April 2010 (UTC)
* There shouldn't really much dispute here. If you look at the 2005 edition of R. Ben Madison's own account, "Ar Pats," viewable here then you can see he states "On 15 August 2005, the founder of Talossa, King Robert I, announced on Wittenberg that he was renouncing his Talossan citizenship and abdicating as King." He goes on to pronounce how dead the Kingdom became afterwards and woe is them and so on, but in contradiction of that fact is the continuous operation and activity of the Kingdom message board here (earliest messages on the main board are often from "kri," R. Ben Madison's account before he left Talossa). So this is ample proof - in R. Ben Madison's own words! - about how he left Talossa. Later editions of his account have changed the story, of course, and reflect the same reliability as his pronouncements of the country's death after his departure.
* So with ample evidence reflecting the continuity of the one entity - the Kingdom of Talossa - and the departure/abdication of R. Ben Madison, it doesn't seem like there should really be much question about which Talossa is the original "official" one.--<IP_ADDRESS> (talk) 07:17, 18 November 2010 (UTC)
Regarding placement of the Template
Someone with knowledge on this subject needs to clarify some information located in the article. At the beginning it mentions this sentence: "'The Kingdom was founded in 1979 by 14-year-old Robert Ben Madison'" Later in the article, this sentence is mentioned: "'Talossa was founded as a kingdom on December 26, 1979[6] by Robert Ben Madison, a 13 year-old resident of Milwaukee'" Joshua (Contribs. | Talk) (Logs | RC | NP | Useful)) 18:55, 3 November 2010 (UTC)
Removing the infoboxes (cannot have all three).
I have removed the infoboxes. The article is about one micronation that became three separate micronations, all three claiming to be the "legitimate Talossa". Since an infobox can only describe one micronation (that is one thing that is wrong with infoboxes), Wikipedia must not choose which is the "true" or "most important" one, and there is no space for all three (four?), the only fair solution is to have none. Moreover, almost every field in the Micronation ifobox is not a fact but merely a claim made by the group members, that cannot be confirmed by independent sources and therefore violates the basic policy of Wikipedia, "all contents must be verifiable facts".
|
WIKI
|
[New-bugs-announce] [issue42551] Generator `yield`s counted as primitive calls by cProfile
Matthew Suozzo report at bugs.python.org
Wed Dec 2 23:29:39 EST 2020
New submission from Matthew Suozzo <matthew.suozzo at gmail.com>:
# Issue
When profiling a generator function, the initial call and all subsequent yields are aggregated into the same "ncalls" metric by cProfile.
## Example
>>> cProfile.run("""
... def foo():
... yield 1
... yield 2
... assert tuple(foo()) == (1, 2)
... """)
<snip>
ncalls tottime percall cumtime percall filename:lineno(function)
...
3 0.000 0.000 0.000 0.000 <string>:2(foo)
...
This was unexpected behavior since it *looks* like a single call from the code. This also complicates basic analysis about the frequency of a codepath's execution where a generator might yield a variable number of times depending on the input.
The profile interface can and does differentiate between call types: Normal calls and "primitive" calls, i.e. those that are not induced via recursion, are displayed as "all_calls/primitive_calls" e.g. "3/1" for a single initial calls with 2 recursed calls (comparable to the example above).
This seems like an appropriate abstraction to apply in the generator case: Each yield is better modeled as an 'interior' call to the generator, not as a call on its own.
# Possible fix
I have two ideas that seem like they might address the problem:
* Add a new PyTrace_YIELD constant (and handle it in [3])
* Track some state from the `frame->f_gen` in the ProfilerEntry (injected in [3], used in [4]) to determine whether this is the first or a subsequent call.
I've not been poking around for long so I don't have an intuition about which would be less invasive (nor really whether either would work in practice).
As background, this seems to be the call chain from trace invocation to callcount increment:
[0]: https://github.com/python/cpython/blob/4e7a69bdb63a104587759d7784124492dcdd496e/Python/ceval.c#L4106-L4107
[1]: https://github.com/python/cpython/blob/4e7a69bdb63a104587759d7784124492dcdd496e/Python/ceval.c#L4937
[2]: https://github.com/python/cpython/blob/4e7a69bdb63a104587759d7784124492dcdd496e/Python/ceval.c#L4961
[3]: https://github.com/python/cpython/blob/4e7a69bdb63a104587759d7784124492dcdd496e/Modules/_lsprof.c#L419
[4]: https://github.com/python/cpython/blob/4e7a69bdb63a104587759d7784124492dcdd496e/Modules/_lsprof.c#L389
[5]: https://github.com/python/cpython/blob/4e7a69bdb63a104587759d7784124492dcdd496e/Modules/_lsprof.c#L311-L316
----------
components: C API
messages: 382373
nosy: matthew.suozzo
priority: normal
severity: normal
status: open
title: Generator `yield`s counted as primitive calls by cProfile
type: behavior
versions: Python 3.10, Python 3.6, Python 3.7, Python 3.8, Python 3.9
_______________________________________
Python tracker <report at bugs.python.org>
<https://bugs.python.org/issue42551>
_______________________________________
More information about the New-bugs-announce mailing list
|
ESSENTIALAI-STEM
|
-- Axa-AMP Deal Unlikely if Agreement Isn't Reached by Year-End, Review Says
AMP Ltd., which is in talks with AXA
SA to renew its bid for Axa Asia-Pacific Holdings Ltd., is
unlikely to finalize a transaction if an agreement isn’t reached
by the end of the year, the Australian Financial Review reported
in its Street Talk column, without saying where it got the
information. AMP needs to increase its original offer, valued at
A$5.15 a share based on its Oct. 22 closing price, the
newspaper said. AMP might offer more cash or agree to swap its
Asian businesses in return for increasing the total price paid
for AXA Asia, according to the report. To contact the reporter on this story:
Nichola Saminather in Sydney at
nsaminather1@bloomberg.net To contact the editor responsible for this story:
Tim Smith at
tsmith58@bloomberg.net
|
NEWS-MULTISOURCE
|
More than fifty shades of night
Some peppers may be hot enough to make you think you’re poisoned, but they, and many other common vegetables, are in the nightshade family. Photo of the Day archive: Hollis Easter, Potsdam NY.
Many nightshades are safe and delicious and go well in sandwiches and sauces. A few are deadly, dished up mainly by criminals, but most occupy a gray area between these two extremes. Worldwide, there are around 2,700 species in the nightshade family, known as solanaceae to Latin geeks. The group comprises tasty crops like tomatoes, potatoes, eggplant, peppers, and tomatillos. It is also composed in part by shady characters such as jimsonweed and deadly nightshade which have wrought mayhem and death, both accidental and intentional, throughout history.
Nightshades are present on every continent except Antarctica, though Australia and South America have the greatest diversity, and overall numbers, of species. Tobacco is one of the most economically important nightshades, while other family members, for example petunias and Chinese lanterns, spice up our yards. The majority of nightshades are wild species, some of which have been used as sources of medicine for millenia.
It seems that the word “sumac” is preceded by “poison” in the minds of many folks, which is sad because all the sumac we see on roadsides and in fencerows are perfectly harmless. Poison sumac, which grows in standing water, is a glossy-stemmed shrub with drooping white berries. It can cause a poison ivy-like rash, but is an uncommon species. To an even greater extent, everyone assumes the term “nightshade” always comes after the word “deadly.”
Obviously, part of the problem is one of branding. The “real” deadly nightshade (Atropa belladonna) is worthy of its name. A single berry can be fatal to a child, and 8-10 berries or just one leaf is enough to kill an adult. Accidental poisonings may occur because the deeply hooded purple berries taste sweet, and may be consumed by kids or adults. The plant has also been used deliberately as a way to kill political foes and unfaithful spouses. In at least one case, a whole garrison of soldiers was wiped out by sweet wine spiked with A. belladonnaberry extract (helpful hint: do not accept drinks from enemy kings or other people you do not know well).
Datura, aka jimsomweed, mad apple and devil’s apple – pretty – but on the shadier side of nightshade. Photo of the day archive: Vici and Steve Diehl, Antwerp, NY
However, deadly nightshade prefers temperate or subtropical climates, and is not known to occur in northern NY. What we commonly call “deadly nightshade” is the native, red-berry bittersweet nightshade (Solanum dulcamara), the seeds of which are very slightly toxic. But we do have a dangerous nightshade, jimsonweed (Datura stramonium), also known as devil’s apple or mad-apple. All parts of the plant are toxic, but especially the seeds. Native to Mexico and Central America, this coarse annual weed has very long, white, funnel-shaped flowers and bizarre-looking spiny pods, and can be found infesting pastures and barnyards throughout North America.
All nightshades contain some amounts of atropine, scopolamine, and other compounds which in minute quantities have medical uses, but are extremely dangerous at larger doses. Within very narrow limits, these chemicals have also be used recreationally. Tragically, some poisonings are a result of people consuming A. belladonna, D. stramonium, and other nightshades with especially high concentrations of such chemicals in the mistaken belief they can get high. A plant in one location may be many times as toxic as the same species growing on a different site, and there is no way outside of lab analysis to tell.
The common potato is in the nightshade family and can become toxic if exposed to too much light. You can tell id a potato’s skin and flesh has become green. Photo: Rasbak, Creative Commons, some rights reserved
In northern South America, especially Colombia, criminals use an extract from several tree-form nightshade species in the genus Brugmansiaon their victims to commit rapes and robberies. Seeds from Brugmansiaspecies have high levels of scopolamine, a sedative which causes retrograde amnesia—a person given such an extract would not recall events before or after they were poisoned—as well as delirium. (Please refer to that earlier line about not drinking with strangers…)
Potatoes which have been exposed to light will turn green, indicating that toxins like solanine have been created as a defense. The danger is small, but to be on the safe side these should be discarded. The chemicals penetrate into the flesh, and removing the green portions is not enough to eliminate the risk to infants or the elderly. Likewise, there is little danger in consuming a small amount of tomato or potato leaf, but where children are concerned, refer all questions to a poison-control center.
They say you shouldn’t paint any large, diverse group with the same brush, presumably because the bristles would wear out before you could finish. So enjoy your vegetable nightshades, but steer clear of the shady ones.
Paul Hetzler is a horticulture and natural resources educator with Cornell Cooperative Extension of St. Lawrence County.
Tags: , , ,
Comments are closed.
Comments are closed.
|
ESSENTIALAI-STEM
|
Hydroquinone Sentence Examples
hydroquinone
• All four mono-hydroxyxanthones are known, and are prepared by heating salicylic acid with either resorcin, pyrocatechin or hydroquinone; they are yellow crystalline solids, which act as dyestuffs.
0
0
• On fusion with caustic potash it decomposes with formation of tetrahydroxy-benzophenone, which then breaks up into resorcin and hydroquinone.
0
0
• Free hydroxylamine reduces it to hydroquinone.
0
0
• Quinhydrone, C 6 H40 2 -C 6 H 4 (OH) 2, is formed by the direct union of quinone and hydroquinone or by careful oxidation of hydroquinone with ferric chloride solution.
0
0
• On boiling with water it decomposes into quinone and hydroquinone.
0
0
• Photographic developers often contain hydroquinone and these are also well worth investigating.
0
0
• In the alkaline environment of the urine, arbutin is converted into another chemical, called hydroquinone, which kills bacteria.
0
0
• These creams contain the chemical Hydroquinone, which is under question with the FDA for potentially causing cancer and other skin ailments.
0
0
• If they bother you, you can cover them with concealing makeup or try a gentle bleaching agent containing hydroquinone.
0
0
• For example, the C-Clarifying Serum contains 10 percent prescription strength vitamin C and four percent prescription strength hydroquinone to promote a brighter, more even skin tone.
0
0
Advertisement
• Hydroquinone is listed as the first ingredient on the label.
0
0
• Hydroquinone, however, has been flagged by Good Guide as a chemical that can cause irritation.
0
0
• The active ingredients in the fading creams are hydroquinone for fading and the sunscreen octinoxate.
0
0
• If you want to hasten the process, use over-the-counter skin creams designed to lighten dark spots; many of these contain hydroquinone, a bleaching ingredient.
0
0
• While scars eventually fade on their own, people with deep complexions may want to speed the process along with products containing hydroquinone.
0
0
Advertisement
• Over-the-counter skin bleaches don't contain as much of the active ingredient hydroquinone as prescription bleaches and may be used in less severe cases.
0
0
|
ESSENTIALAI-STEM
|
Page:Sketches of representative women of New England.djvu/148
Rh auxiliary is witnessed by the following, which he officially promulgated in a general order dated February 16, 1883:—
"The commander-in-chief is delighted to learn that the loyal women of the land are forming auxiliary societies everywhere. The grand work done by these organizations is worthy of the highest praise.
"The Woman's Relief Corps of Massachusetts is hereby particularly mentioned on account of its perfect organization and the work it has accomplished. The President of the same, Mrs. E. Florence Barker, of Maiden, Mass., will be happy to furnish information.
"Commander-in-chief. ", Adjutant-general."
In general orders issued May 1, 1883, announcing the arrangements for the Seventeenth National Encampment, to be held in Denver, Col., July 24-28, Commander-in-chief Van Der Voort cordially invited representatives of the Woman's Relief Corps and other societies working for the Grand Army of the Republic to meet at Denver and perfect a national organization, adding: "They should bring their rituals, rules, by-laws, and plans of organization, and if possible agree on a uniform mode or system of procedure throughout the country. I pledge the noble women who compose these societies that they will be warmly greeted and given all the encouragement possible. Miss Clara Barton has promised to be present."
At a meeting of the board of directors of the Department of Massachusetts, W. R. C, held in Boston, June 27, 1883, Mrs. E. Florence Barker, Mrs. Sarah E. Fuller, and Mrs. Lizabeth A. Turner were chosen delegates to represent this department at the convention in Denver. It was voted that the Department of New Hampshire be invited to unite with Massachusetts in sending delegates.
Mrs. Barker presided with grace and tact over the deliberations of the women's convention at Denver, which was attended by delegates from several States. At the second day's session it was voted to form a National Woman's Relief Corps on the same basis as that of the Department of Massachusetts, provided the National Encampment of the Grand Army of the Republic should decide to recognize this action. Several of the delegates present refused to endorse the clause in the rules and regulations admitting to membership other women than relations of soldiers.
This clause also caused a lengthy discussion in the National Encampment when the resolution of endorsement was debated, for several conmrades who believed in a woman's national organization opposed any movement in its behalf that would not restrict the membership to relations of soldiers.
Past Commander-in-chief George S. Merrill, of Massachusetts, said: "We certainly, comrades of the Grand Army of the Republic, cannot afford to do anything that can by any possible means be construed as discourteous or hostile to any of the loyal women of America." Comrade William Warner, of Missouri (since Commander-in-chief), participated in the debate, saying in part: "I come from a State that has no organization, and that has no interest in any differences between the various organizations. I come from a State in which there does not breathe a loyal man who does not extend the right hand of welcome to every sister, mother, or sweetheart within her borders, whose heart beats in sympathy with us."
The resolution which was offered by Chaplain-in-chief Foster was adopted, namely: "That we cordially hail the organization of a National Woman's Relief Corps, and extend our greeting to them. We return our warmest thanks to the loyal women of the land for their earnest support and encouragement, and bid them God-speed in their patriotic work."
A messenger was sent to the W. R. C. Convention with an invitation for its members to attend the installation of officers of the G. A. R., and the meeting was adjourned at noon until three o'clock Proceeding to the Tabor Opera House, the delegates were officially notified of the vote of endorsement. Robert B. Beath, of Philadelphia, the historian of the G. A. R., was installed as Commander-in-chief, and, upon assuming the office and addressing
|
WIKI
|
/***************************************************************************** * acl.c: ***************************************************************************** * Copyright © 2005-2007 Rémi Denis-Courmont * $Id$ * * Authors: Rémi Denis-Courmont * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA. *****************************************************************************/ /***************************************************************************** * Preamble *****************************************************************************/ #ifdef HAVE_CONFIG_H # include "config.h" #endif #include #include #include #include #include #include /* FIXME: rwlock on acl, but libvlc doesn't implement rwlock */ typedef struct vlc_acl_entry_t { uint8_t host[17]; uint8_t i_bytes_match; uint8_t i_bits_mask; vlc_bool_t b_allow; } vlc_acl_entry_t; struct vlc_acl_t { vlc_object_t *p_owner; unsigned i_size; vlc_acl_entry_t *p_entries; vlc_bool_t b_allow_default; }; static int ACL_Resolve( vlc_object_t *p_this, uint8_t *p_bytes, const char *psz_ip ) { struct addrinfo hints, *res; int i_family; memset (&hints, 0, sizeof (hints)); hints.ai_socktype = SOCK_STREAM; /* doesn't matter */ hints.ai_flags = AI_NUMERICHOST; if( vlc_getaddrinfo( p_this, psz_ip, 0, &hints, &res ) ) { msg_Err( p_this, "invalid IP address %s", psz_ip ); return -1; } p_bytes[16] = 0; /* avoids overflowing when i_bytes_match = 16 */ i_family = res->ai_addr->sa_family; switch( i_family ) { case AF_INET: { struct sockaddr_in *addr; addr = (struct sockaddr_in *)res->ai_addr; memset( p_bytes, 0, 12 ); memcpy( p_bytes + 12, &addr->sin_addr, 4 ); break; } #if defined (HAVE_GETADDRINFO) || defined (WIN32) /* unfortunately many people define AF_INET6 though they don't have struct sockaddr_in6 */ case AF_INET6: { struct sockaddr_in6 *addr; addr = (struct sockaddr_in6 *)res->ai_addr; memcpy( p_bytes, &addr->sin6_addr, 16 ); break; } #endif default: msg_Err( p_this, "unknown address family" ); vlc_freeaddrinfo( res ); return -1; } vlc_freeaddrinfo( res ); return i_family; } /** * Check if a given address passes an access control list. * * @param p_acl pre-existing ACL to match the address against * @param psz_ip numeric IPv4/IPv6 address * * @return 0 if the first matching ACL entry is an access grant, * 1 if the first matching ACL entry is a denial of access, * -1 on error. */ int ACL_Check( vlc_acl_t *p_acl, const char *psz_ip ) { const vlc_acl_entry_t *p_cur, *p_end; uint8_t host[17]; if( p_acl == NULL ) return -1; p_cur = p_acl->p_entries; p_end = p_cur + p_acl->i_size; if( ACL_Resolve( p_acl->p_owner, host, psz_ip ) < 0 ) return -1; while (p_cur < p_end) { unsigned i; i = p_cur->i_bytes_match; if( (memcmp( p_cur->host, host, i ) == 0) && (((p_cur->host[i] ^ host[i]) & p_cur->i_bits_mask) == 0) ) return !p_cur->b_allow; p_cur++; } return !p_acl->b_allow_default; } /** * Adds an item to an ACL. * Items are always matched in the same order as they are added. */ int ACL_AddNet( vlc_acl_t *p_acl, const char *psz_ip, int i_len, vlc_bool_t b_allow ) { vlc_acl_entry_t *p_ent; unsigned i_size; div_t d; int i_family; i_size = p_acl->i_size; p_ent = (vlc_acl_entry_t *)realloc( p_acl->p_entries, ++p_acl->i_size * sizeof( *p_ent ) ); if( p_ent == NULL ) return -1; p_acl->p_entries = p_ent; p_ent += i_size; i_family = ACL_Resolve( p_acl->p_owner, p_ent->host, psz_ip ); if( i_family < 0 ) { /* * I'm lazy : memory space will be re-used in the next ACL_Add call... * or not. */ p_acl->i_size--; return -1; } if( i_len >= 0 ) { if( i_family == AF_INET ) i_len += 96; if( i_len > 128 ) i_len = 128; else if( i_len < 0 ) i_len = 0; } else i_len = 128; /* ACL_AddHost */ d = div( i_len, 8 ); p_ent->i_bytes_match = d.quot; p_ent->i_bits_mask = 0xff << (8 - d.rem); p_ent->b_allow = b_allow; return 0; } /** * Creates an empty ACL. * * @param b_allow whether to grant (VLC_TRUE) or deny (VLC_FALSE) access * by default (ie if none of the ACL entries matched). * * @return an ACL object. NULL in case of error. */ vlc_acl_t *__ACL_Create( vlc_object_t *p_this, vlc_bool_t b_allow ) { vlc_acl_t *p_acl; p_acl = (vlc_acl_t *)malloc( sizeof( *p_acl ) ); if( p_acl == NULL ) return NULL; vlc_object_yield( p_this ); p_acl->p_owner = p_this; p_acl->i_size = 0; p_acl->p_entries = NULL; p_acl->b_allow_default = b_allow; return p_acl; } /** * Perform a deep copy of an existing ACL. * * @param p_this object to attach the copy to. * @param p_acl ACL object to be copied. * * @return a new ACL object, or NULL on error. */ vlc_acl_t *__ACL_Duplicate( vlc_object_t *p_this, const vlc_acl_t *p_acl ) { vlc_acl_t *p_dupacl; if( p_acl == NULL ) return NULL; p_dupacl = (vlc_acl_t *)malloc( sizeof( *p_dupacl ) ); if( p_dupacl == NULL ) return NULL; if( p_acl->i_size ) { p_dupacl->p_entries = (vlc_acl_entry_t *) malloc( p_acl->i_size * sizeof( vlc_acl_entry_t ) ); if( p_dupacl->p_entries == NULL ) { free( p_dupacl ); return NULL; } memcpy( p_dupacl->p_entries, p_acl->p_entries, p_acl->i_size * sizeof( vlc_acl_entry_t ) ); } else p_dupacl->p_entries = NULL; vlc_object_yield( p_this ); p_dupacl->p_owner = p_this; p_dupacl->i_size = p_acl->i_size; p_dupacl->b_allow_default = p_acl->b_allow_default; return p_dupacl; } /** * Releases all resources associated with an ACL object. */ void ACL_Destroy( vlc_acl_t *p_acl ) { if( p_acl != NULL ) { if( p_acl->p_entries != NULL ) free( p_acl->p_entries ); vlc_object_release( p_acl->p_owner ); free( p_acl ); } } /** * Reads ACL entries from a file. * * @param p_acl ACL object in which to insert parsed entries. * @param psz_patch filename from which to parse entries. * * @return 0 on success, -1 on error. */ int ACL_LoadFile( vlc_acl_t *p_acl, const char *psz_path ) { FILE *file; if( p_acl == NULL ) return -1; file = utf8_fopen( psz_path, "r" ); if( file == NULL ) return -1; msg_Dbg( p_acl->p_owner, "find .hosts in dir=%s", psz_path ); while( !feof( file ) ) { char line[1024], *psz_ip, *ptr; if( fgets( line, sizeof( line ), file ) == NULL ) { if( ferror( file ) ) { msg_Err( p_acl->p_owner, "error reading %s : %m", psz_path ); goto error; } continue; } /* fgets() is cool : never overflow, always nul-terminate */ psz_ip = line; /* skips blanks - cannot overflow given '\0' is not space */ while( isspace( *psz_ip ) ) psz_ip++; if( *psz_ip == '\0' ) /* empty/blank line */ continue; ptr = strchr( psz_ip, '\n' ); if( ptr == NULL ) { msg_Warn( p_acl->p_owner, "skipping overly long line in %s", psz_path); do { if( fgets( line, sizeof( line ), file ) == NULL ) { if( ferror( file ) ) { msg_Err( p_acl->p_owner, "error reading %s : %m", psz_path ); } goto error; } } while( strchr( line, '\n' ) == NULL); continue; /* skip unusable line */ } /* skips comment-only line */ if( *psz_ip == '#' ) continue; /* looks for first space, CR, LF, etc. or end-of-line comment */ /* (there is at least a linefeed) */ for( ptr = psz_ip; ( *ptr != '#' ) && !isspace( *ptr ); ptr++ ); *ptr = '\0'; msg_Dbg( p_acl->p_owner, "restricted to %s", psz_ip ); ptr = strchr( psz_ip, '/' ); if( ptr != NULL ) *ptr++ = '\0'; /* separate address from mask length */ if( (ptr != NULL) ? ACL_AddNet( p_acl, psz_ip, atoi( ptr ), VLC_TRUE ) : ACL_AddHost( p_acl, psz_ip, VLC_TRUE ) ) { msg_Err( p_acl->p_owner, "cannot add ACL from %s", psz_path ); goto error; } } fclose( file ); return 0; error: fclose( file ); return -1; }
|
ESSENTIALAI-STEM
|
Flagship Stock And Bond ETFs Are Surging In Tandem To All-Time Highs
SHUTTERSTOCK PHOTO
Flagship ETFs tracking the S&P 500 on Monday hit their highest levels in the past year, with gains bookended by strong job growth in the U.S. and hopes of more stimulus out of Japan.
Stocks closed at all-time highs on a day in which the benchmark S&P 500 also set a new intraday record of 2143.16. It closed modestly below that level. All sectors advanced except for utilities and health care.
But in a reflection of investors' lingering doubts about the global outlook, bond exchange traded funds are surging too.
Both iShares Core U.S. Aggregate Bond ( AGG ) and iShares iBoxx $ Investment Grade Corporate Bond ( LQD ) -- the two largest bond ETFs -- are trading a whisker under all-time highs.
It's a strange time to be an investor, with stocks and bonds rising and falling sharply from one day to the next as the markets parse economic data and political news. Stock indexes rallied sharply last week on a bullish labor report for June. On Monday, stocks rallied again after a landslide victory over the weekend for Japan's ruling coalition under Prime Minister Shinzo Abe.
The S&P 500 has now more than recovered losses from a two-day plunge after Britons on June 23 voted to exit the European Union.
That shock vote, coupled with inflationary fears, has driven up haven demand for bonds, says Stephen Cohen, head of fixed income beta at BlackRock.
Investors poured $653 million into iShares JPMorgan USD Emerging Markets Bond ( EMB ) in June alone. The ETF saw roughly $2.3 billion in net inflow over the first half of this year, taking assets to more than $7 billion.
"The strongest theme driving global demand for bond ETFs remains the search for yield," Cohen wrote in a July 11 research note. He expects to see rising demand for domestic corporate bond ETFs among European investors, "given government bond yields in the U.S. are not as suppressed as they are in Europe."
SPDR S&P 500 ( SPY ) finished higher on the stock market today , notching an all-time intraday high of 214.07 along the way.
Consumer discretionary ETFs on Monday continued to build on their recent momentum. It's a sign that investors are betting on American consumers opening up their wallets.
SPDR S&P Retail ( XRT ) advanced 1.1%, and Consumer Discretionary Select Sector SPDR (XLY) rose 0.6%. Their holdings include Amazon (AMZN) and Wal-Mart (WMT), stocks that are in the spotlight amid this week's shopping bonanza for American consumers.
Amazon.com's Prime Day, scheduled for Tuesday, is a one-day summer sale exclusively for Prime members. Last year's inaugural event was a mixed success for shoppers, but it was a big win for the company. The e-commerce giant reported that it sold more units on Prime Day than on Black Friday 2014, the biggest Black Friday ever.
Wal-Mart is fighting back this year by offering free shipments with no minimum purchase through Friday.
XLY is leading its 10 Sector SPDR ETF peers in the quarter to date as it recovers from a middling performance in 2016 so far. The sector was the top performer for the week ended July 8, up 2.2%.
[ibdchart symbol="XLY" type="daily" size="full" position="leftchart" ]
SPDR Gold Shares (GLD) slumped early Monday as the stock market surged.
The commodity ETF tracks the price of gold .
[ibdchart symbol="gld" type="daily" size="full" position="leftchart" ]
The ETF has risen six weeks in a row to trade near its highest level in more than two years. But caution is returning to the gold market as Friday's jobs report could put a Fed rate hike in play again.
12 Bellwether ETFs
Here's a look at how major exchange traded funds, tracking various asset classes, performed today.
Their Relative Price Strength (RS) rating is a measure of price performance over the last 12 months, compared to all stocks and ETFs in the IBD database, on a scale of 1 (lowest) to 99 (highest).
Following daily ETF market action can be key to successful investing.
SPDR S&P 500 ( SPY ), +0.4%, RS 61
PowerShares QQQ (QQQ), +0.6%, RS 51
SPDR Dow Jones Industrial Average (DIA), +0.5%, RS 58
IShares Core S&P Mid-Cap (IJH), +0.6%, RS 68
IShares Russell 2000 (IWM), +1.2%, RS 61
IShares MSCI EAFE (EFA), +1.5%, RS 29
Vanguard FTSE Emerging Markets (VWO), +0.8%, RS 51
SPDR Gold Shares (GLD), -0.9%, RS 80
United States Oil (USO), -1.7%, RS 21
IShares Core U.S. Aggregate Bond ( AGG ), -0.3%, RS 51
PowerShares DB U.S.$ Bullish (UUP), +0.3, RS 39
IPath S&P 500 VIX Short-Term Futures (VXX), +0.1%, RS 3
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
|
NEWS-MULTISOURCE
|
Sunday, November 18, 2012
Capybara
Capybara | The capybara is the largest rodent in the world, and is found inhabiting the water-logged regions of South America. Despite its large size, the capybara is in fact very closely related to other South American rodents including chinchillas and guinea pigs. The capybara is a heavy, stocky-looking animal, which grows to more than a meter in length. The capybara also has a short head in comparison to its body, and has no tail at all.
The capybara is a semi-aquatic animal that is found inhabiting marshes and wetlands throughout the South American jungle. The capybara spends much of the hot daytime hours submerged in the cooler water and the capybara has a number of useful adaptations which help it to survive more effectively in its watery world. The capybara has slightly webbed feet which help to give the capybara more stability when it is moving around on the slippery river banks, and prevents the capybara from sinking too deeply into the mud when the capybara is in the water. The eyes, ears and nose of the capybara are also situated on the top of the capybara's head, enabling the body of the capybara to be fully submerged whilst the capybara can still hear, see and smell.
The capybara looks a bit like the enormous African hippo, and behaves in a very similar way to one, as the capybara spends the hot days in the water, venturing out onto dry land in search of food under the cover of night. The capybara is a herbivorous animal and therefore only eats plants in order to acquire all of the nutrients it needs. The diet of the capybara is mainly made up of grasses and aquatic plants, along with fruits and berries and the occasional munch on tree bark.
The relatively large size and slow nature of the capybara, mean that the capybara is often a rewarding meal for hungry predators. Wildcats including jaguars, pumas and ocelots are the primary predators of the capybara along with caimans and eagles that hunt the younger ones. The capybara is also one of the best sources of food for the world's heaviest snake, the anaconda. The capybara breeds at different times of the year, depending on the region which it inhabits. Most capybara breed once a year, when a litter of four baby capybaras are born after a gestation period of around 5 months. The baby capybara are able to walk within hours of birth and remain with the mother capybara until they are a few months old.
The capybara lives in a group with between 10 and 30 other capybara individuals. The capybara remain in their large groups for safety and capybara groups have been known to contain up to 100 capybara individuals.
No comments:
Post a Comment
|
ESSENTIALAI-STEM
|
Talk:City of Halifax
Redirect
Please stop changing the redirect. The HRM is not a city. So this redirect would be wrong if it was pointing to the HRM. The only city called Halifax was the one that no longer exists. What now exists is the Halifax Regional Municipality which is not a city. Also it would break a very large number of links that are very specifically pointing to Halifax (former city) on purpose instead of the HRM. -DJSasso (talk) 18:14, 18 January 2013 (UTC)
|
WIKI
|
Coinage metals
The coinage metals comprise those metallic chemical elements and alloys which have been used to mint coins. Historically, most coinage metals are from the three nonradioactive members of group 11 of the periodic table: copper, silver and gold. Copper is usually augmented with tin or other metals to form bronze. Gold, silver and bronze or copper were the principal coinage metals of the ancient world, the medieval period and into the late modern period when the diversity of coinage metals increased. Coins are often made from more than one metal, either using alloys, coatings (cladding/plating) or bimetallic configurations. While coins are primarily made from metal, some non-metallic materials have also been used.
History
Early coinage made from metal came into use during the Axial Age in the Greek world, in northern India, and in China, as coins became a widespread embodiment of money. Bronze, gold, silver and electrum (a naturally occurring pale yellow mixture of gold and silver that was further alloyed with silver and copper) were used. Silver coins from about 700 BC, are known from Aegina Island. Early electrum coins from Ephesus, Lydia date from about 650 BC. Ancient India in 6th century BC, was also one of the earliest issuers of coins in the world.
The gold Croeseids, issued in Lydia, were the first true gold coins with a standardized purity for general circulation. The gold and silver Croeseids formed the world's first bimetallic monetary system, c. 550 BC. The Persian daric was also an early gold coin which, along with a similar silver coin, the siglos, (from Ancient Greek σίγλος, Hebrew שֶׁקֶל (shékel)) represented the bimetallic monetary standard of the Achaemenid Persian Empire. These coins were also very well known in the Persian and Sassanids era, most notably, in Susa and in Ctesiphon.
Precious metals were used historically in commodity money and are found in bullion coins and some collectable coins. Coins functioning as fiat money are now made from a larger variety of base metals.
Multiple metals
Coins may be composed of multiple metals using alloys, coatings, or bimetallic forms. Coin alloys include bronze, electrum and cupronickel. Plating, cladding or other coating methods are used to form an outer layer of metal and are typically used to replace a more expensive metal while retaining the former appearance. For example, United States cents since 1982 are zinc with copper-plating, and thus retain their prior copper look while having a less expensive composition. Coatings may also be used as a form of debasement in commodity money. Bimetallic coins are used for their distinctive appearance and generally have an outer ring of one metal or alloy surrounding a center of contrasting metal.
Requirements for a coinage metal
Coins that are intended for circulation may circulate for decades and thus must have excellent resistance to wear and corrosion. Achieving this goal typically necessitates the use of base metal alloys. In addition, some metals, such as manganese, are unsuitable as they are too hard to take an impression well or are apt to wear out stamping machines at the mint.
When minting coins, especially low denomination coins, there is a risk that the value of metal within a coin is greater than the face value, leading to negative seigniorage. This leads to the possibility of smelters taking coins and melting them down for the scrap value of the metal. Pre-1992 British pennies were made of 97% copper; but as of 2008, based on the price of copper, the value of a penny from this period is 1.5 new-pence. Modern British pennies are now made of copper-plated steel.
Cupronickel, a base metal alloy with varying proportions of copper and nickel, was introduced as a cheaper alternative for silver in coinage. Cupronickel, most commonly 75% copper, 25% nickel, has a silver color, is hard wearing and has excellent striking properties, essential for the design of the coin to be pressed accurately and quickly during manufacture. However, in the 21st century with the prices of both copper and nickel rising, it has become common to experiment with various alloys of steel, often stainless steel as an even cheaper alternative. For example, in India some coins have been made from a stainless steel that contains 82% iron, 18% chromium, and many other countries that have minted coins that contain metals now worth nearly the coin face-value, are experimenting with various steel alloys. Italy had earlier experimented with acmonital, a stainless steel alloy, for its coins.
A number of more exotic metals have been used to make demonstration or fantasy coins which have not been used to make monetized coins for a nation-state. Some of these elements would make excellent coins in theory (e.g. zirconium). More expensive metals that are intrinsically valuable as commodities are less practical as coinage due to their cost, but could be used for bullion coins.
Chemical elements used in circulating coins
In 1992, twenty-four chemical elements used in world coinage were documented by Jay and Marieli Roe in an award-winning exhibit and publication: aluminum, antimony, carbon, cobalt, copper, gold, hafnium, iron, lead, magnesium, molybdenum, nickel, niobium, palladium, platinum, rhenium, silver, tantalum, tin, titanium, tungsten, vanadium, zinc and zirconium. Chromium and manganese, however, were not mentioned, even though both elements had been used in common circulation coins (Canada wartime V nickels and US wartime Jefferson nickels, respectively) long before the article's publication.
Non-circulating
Chemical elements used in non-circulating commemorative, demo, bullion or fantasy coins, medals, patterns, and trial strikes:
* Cadmium: 1828 medal made by G. Loos for the marriage of Heinrich von Dechen, "of Silesian cadmium".
* Cobalt: 2005 Cameroon 750 CFA francs struck in cobalt-plated iron.
* Hafnium: Fred Zinkann demo coin.
* Iridium: 2013 $1/25$ oz 10 franc bullion coin issued by Rwanda as part of "Noble Five" precious metals set.
* Molybdenum: Demo coin, Fred Zinkann. 2008 1 tr oz coins by Coins By Design, Murray Buckner (mintage 250).
* Niobium: Austria has issued a number of bimetallic 25 euro coins with a niobium center.
* Palladium: First issued 1966 by Sierra Leone. Also presentation sets from Tonga and bullion coins of various countries.
* Rhenium: Fred Zinkann fantasy pieces, Pope Matthew Triple Ducat and Malvinas 5 Australes
* Rhodium: 2014 $1/25$ oz 10 franc bullion coin issued by Rwanda as part of "Noble Six" precious metals set. Also Cohen Mint bullion round.
* Ruthenium: 1967 $1/2$ Hau from Tonga was 98% palladium and 2% ruthenium.
* Selenium: 1862 medal in UK Science Museum, commemorating Berzelius, discoverer of the element.
* Silicon: Privately struck US quarter patterns dated 1964 (Pollock-5380) in nickel-silicon alloy.
* Tantalum: Used in a bimetallic silver-tantalum coin from Kazakhstan.
* Tellurium: 1896 Hungarian mining medal. Reproductions exist from 1975.
* Titanium: First issued 1999 by Gibraltar. Austria has made bimetallic silver/titanium commemoratives.
* Tungsten: While Tungsten alloys are too hard for practical use, a few private demos have been struck for experimentation, e.g. Fred Zinkann US half eagle patterns.
* Uranium: Two types of a German medal of native uranium.
* Vanadium: 2011 1 Troy ounce coins by Coins By Design, Murray Buckner (mintage 20).
* Zirconium: 2012 1 Troy ounce coins, including 50 black & 50 Rainbow, by Coins By Design, Murray Buckner (mintage 500).
Element Series
Beginning in 2006, Dave Hamric (Metallium) has been attempting to strike "coins" (technically tokens or medals, about the size of a US cent) of every stable chemical element. He has struck tokens of the following elements, apparently not only metals: aluminium, antimony, barium (reactive, sealed in glass capsule), beryllium, bismuth, boron (mixed with binder, sealed in resin cast), cadmium, calcium (reactive, sealed in glass capsule), carbon (mixed with binder, sealed in resin cast), cerium (reactive, sealed in glass capsule), chromium, cobalt, copper, dysprosium, erbium, europium (reactive, sealed in glass capsule), gadolinium, gallium, gold, hafnium, holmium, indium, iridium, iron, lanthanum (reactive, sealed in glass capsule), lead, lutetium, magnesium, mercury (sealed in resin cast, containing the expected coin-weight of liquid mercury), molybdenum, neodymium (reactive, sealed in glass capsule), nickel, niobium, palladium, phosphorus (mixed with binder, sealed in resin cast), platinum, praseodymium (reactive, sealed in glass capsule), rhenium, rhodium, ruthenium, samarium (reactive, sealed in glass capsule), scandium, selenium, silver, strontium (reactive, sealed in glass capsule), sulfur, tantalum, tellurium, terbium, thallium (extremely poisonous; lead token clad on one side with thallium foil and sealed in resin), thulium, tin, titanium, uranium (not offered for sale), vanadium, ytterbium, yttrium, zinc, zirconium.
|
WIKI
|
Talk:Facelift (disambiguation)
smas
smas is an abreviation for supeficial musculo aponevrotic system of the face; this anatomocal study has been presented by dr vladimir mitz and all,working in a team with professor paul tessier in paris; this work has been presented to the french society of plastic surgery in 1973,dr skoog being present in the room; the study has been published in the plastic and reconstructive surgery journal in 1976; since that time dr vladimir mitz has developped the biplane face lift procedure,still widely used nowadays,for its exceptionnal natural results! Vladimirmitz 16:09, 7 May 2007 (UTC)
If this is a disambiguation page...
why does it contain an article about one of the usages of the heading term? —Preceding unsigned comment added by <IP_ADDRESS> (talk • contribs)
* Based on a brief discussion at Wikipedia talk:WikiProject Disambiguation, I plan to:
* 1) move this page to Facelift (disambiguation)
* 2) edit it (back) to being consistent with WP:MOSDAB
* 3) create a new Facelift page that redirects to Rhytidectomy
* If there are objections, let me know here. (John User:Jwy talk) 02:00, 28 November 2007 (UTC)
* Completed. —Preceding unsigned comment added by Jwy (talk • contribs) 05:38, 30 November 2007 (UTC)
Movement of DAB and redirect
Previously, we had: Facelift as a redirect to Rhytidectomy, and Facelift (disambiguation) listing:
* Facelift (product)
* Facelift (automobile)
* Facelift (album)
* Facelift (TV series)
* "Face Lift" (CSI) -> CSI: Crime Scene Investigation (season 1)
* "Facelift" -> Third (Soft Machine album)
WP:PRIMARYTOPIC informs:
A topic is primary for a term, with respect to usage, if it is highly likely—much more likely than any other topic, and more likely than all the other topics combined—to be the topic sought when a reader searches for that term.
A topic is primary for a term, with respect to long-term significance, if it has substantially greater enduring notability and educational value than any other topic associated with that term.
* (Facelift ->) Rhytidectomy has 3034 PVs in the last 30 days. (with a subset attributable to the redirect)
* Facelift (product) has 262 PVs.
* Facelift (automobile) has 1874 PVs.
* Facelift (album) has 7179 PVs.
* Facelift (TV series) has 88 PVs.
* "Face Lift" (CSI) -> CSI: Crime Scene Investigation (season 1) has 3355 PVs. (subset attributable)
* "Facelift" -> Third (Soft Machine album) has 2277 PVs. (subset attributable)
Usage is not shown for Rhytidectomy and is arguable for Facelift (album). Long-term significance may likely be Rhytidectomy. Further, Special:WhatLinksHere/Facelift shows a litany of celebrity and automotive links, with are currently blindly redirected to Rhytidectomy.
As such, I have moved Facelift (disambiguation) to Facelift, with Facelift now serving as the DAB for such inbound links. UW Dawgs (talk) 00:59, 23 July 2015 (UTC)
* I have reverted your WP:CUTANDPASTE move. If you think rhytidectomy is not the primary topic, please propose a proper page move of the disambiguation page. older ≠ wiser 01:53, 23 July 2015 (UTC)
* Rhytidectomy alone fails on usage, much less the subset attributable to the alternate term of 'facelift,' as noted above. UW Dawgs (talk) 01:59, 23 July 2015 (UTC)
* That may well be, but it doesn't excuse a cut and paste move. older ≠ wiser 02:05, 23 July 2015 (UTC)
Requested move 23 July 2015
The result of the move request was: no consensus to move. Calidum T|C 23:12, 31 July 2015 (UTC)
Facelift (disambiguation) → Facelift – Facelift currently serves as a redirect to an article to which it is not WP:PRIMARYTOPIC per usage, as shown in the above section. Request is to move Facelift (disambiguation) to Facelift, allowing it to serve as DAB UW Dawgs (talk) 02:18, 23 July 2015 (UTC)
* Oppose the album does not appear in the first 100 google hits, almost all of which is for the surgery, and google news all refers metaphorically to the surgical procedural, as do almost all of google books his (either actually or metaphorically), without the album in any sight -- <IP_ADDRESS> (talk) 04:34, 23 July 2015 (UTC)
* This move is about the disambiguation page, not the album?? starship.paint ~ KO 04:39, 23 July 2015 (UTC)
* The nominator bases the move rationale on the prominence of the album. The album is not prominent, so the rationale fails to capture real world usage. If the album isn't in contention for primarity, there is no reason to find the surgical procedure isn't primary. -- <IP_ADDRESS> (talk) 04:07, 24 July 2015 (UTC)
* No, it's based on the lack of a WP:PRIMARYTOPIC. UW Dawgs (talk) 06:32, 24 July 2015 (UTC)
* Like I said, it is based on the prominence of the album. There cannot be a "lack" of primarity without another topic to dispute that primarity -- <IP_ADDRESS> (talk) 05:01, 25 July 2015 (UTC)
* Again, no. The lack of a clear WP:PRIMARYTOPIC is shown by the aggregate behavior of the other articles (plural). At no point have I made the argument you are ascribing to me. Please desist. Cheers. UW Dawgs (talk) 18:33, 27 July 2015 (UTC)
* Correct, has no to impact to the album page.
* Currently:
* Facelift (disambiguation) (Serves as DAB)
* Facelift -> Rhytidectomy
* Proposed:
* Facelift (Serves as DAB)
* Facelift (disambiguation) -> Facelift UW Dawgs (talk) 05:28, 23 July 2015 (UTC)
* Oppose. Only a 30 day period is a small sample size, which may indicate skewed results based on recentism and recent news spikes (Isn't the band Alice in Chains been in the news and on tour recently? And isn't it the 25th anniversary of the Facelift album? That could explain the recentism and news spikes during this year, especially for something celebrating a 25th/silver aniversary) And as the IP notes, when just searching "facelift" into Google, it takes a while before you get anything close to the album. IMO, there is an indication of long-term significance regarding the surgery procedure, but questionable evidence based on usage regarding the album -- again there may be only recent interest and traffic during these past few months just because both the album and the band Alice in Chains are currently celebrating their 25th year. And no evidence on what the pages would be like on a "normal" basis. Thus not enough to warrant a change to the WP:PRIMARYREDIRECT at this time. Zzyzx11 (talk) 04:55, 23 July 2015 (UTC)
* oppose per Zzyzx11 --Ozzie10aaaa (talk) 11:00, 23 July 2015 (UTC)
* re usage, WP:PRIMARYTOPIC says ( emphasis mine ) "A topic is primary for a term, with respect to usage, if it is highly likely—much more likely than any other topic, and more likely than all the other topics combined —to be the topic sought when a reader searches for that term."
* Even if your theory of a 25th aniversary spike on Facelift (album) were true, you can drop that article's traffic to ~15% of current levels and Rhytidectomy would still fail the usage compoment based on the first four articles linked on the current DAB (ignoring the 5th and 6th). UW Dawgs (talk) 05:46, 23 July 2015 (UTC)
* WP:D lists other tools besides just the 90 days of recent traffic hits on Wikipedia articles. And as I mentioned, Google web searches, Google Books searches, etc. seem to indicate a more long-term usage and significance meaning to the surgery procedure -- and it takes a while before you actually find something related to the album. And the problem I have is that we don't have data yet for what has been going on for the past few years regarding traffic to these Wikipedia articles. So what if I drop those stats to ~15% of current levels? -- it is still based on data from the past few months. Even if it were true that there is some more usage towards this pop culture topic (a music album), unless there is more evidence that this usage towards it is more ever-lasting, I do not think that should outweigh the more long-term meaning and significance of the surgery procedure. As WP:PRIMARYTOPIC says, if there is some conflict between a topic of primary usage (such as Apple, Inc) and one of primary long-term significance (such as Apple, the fruit), consensus determines which article, if any, is the primary topic. So I still vote for the status quo: long-term significance towards the surgery procedure. In other words: if I had to choose between the short-term, 90-day systemic bias behavior of the average Wikipedia user who is more generally interested in pop culture/music/TV topics, versus the overall behavior of the average worldwide Internet user represented more by Google results, I'm going to error on the side of the latter and credibility every time. Zzyzx11 (talk) 06:22, 23 July 2015 (UTC)
* - on page views, I would not count the articles where "face lift" is not the main subject. For example, the CSI show, where Face Lift is just one of the many episodes of one season. Alternatively I would at least divide by 23 because there were 23 episodes. For the album called third, again, Facelift is one of five different songs considering the existence of Esther's Nose Job, so I would either divide the views by 5 or discount all the views altogether. starship.paint ~ KO 02:16, 24 July 2015 (UTC)
* Agreed, it's simply listing the existing DAB articles. Facelift (automotive) and/or Facelift (album) alone are sufficient to support a WP:PRIMARYTOPIC dispute. Especially as seen by the numerous automotive articles which are linking to the redirect and landing on Rhytidectomy. Hence the need to move the DAB location. UW Dawgs (talk) 02:44, 24 July 2015 (UTC)
* Support at least two topics with long-term significance here, Rhytidectomy and Facelift (automotive), and no primary topic. Peter James (talk) 10:13, 24 July 2015 (UTC)
* I cannot support this argument. When I do the same Google web searches, Google Books searches, etc., there seems to be still overwhelming results to the surgery procedure than the auto practise -- again suggesting that there is both more long-term usage and significance meaning toward the former among the general worldwide Internet public. I do not think it helps the "long-term" case when Facelift (automotive) remains a stub with only four citations. And again, you cannot just merely look at "Whatlinkshere" in a bubble because (as I was alluding to in my previous comment), it may fall into the systemic bias behavior of the average Wikipedia user, who is more interested in writing more articles on automobile-related topics than surgical procedures. Of course, Special:WhatLinksHere/Facelift_(automotive) is getting skewed higher when more Wikipedia editors are going to create more auto-related articles (especially a page for every single car model) to link to. Zzyzx11 (talk) 13:02, 24 July 2015 (UTC)
* Support - As Peter James says, we have two topics of long-term significance, namely the automotive practise and the surgical procedure. Neither is a clear primary topic over the other. Luke no 94 (tell Luke off here) 10:43, 24 July 2015 (UTC)
* Comment "we have two topics of long-term significance, namely the automotive practise and the surgical procedure." Maybe I'm dense, but I'm not seeing the aim of the move. The dab, as it stands, covers the "sub-uses", & the above quote covers the two major sub-uses; the automotive IMO is only true in light of the surgical, so the primary remains surgical. Losing the other minor uses would be a bad idea. (Giving prominence to an album I've never heard of would be a worse one, IMO.) TREKphiler any time you're ready, Uhura 17:04, 24 July 2015 (UTC)
* Oppose; there's a clear primary topic. What would your typical user of WP expect when they type in facelift? Red Slash 04:06, 25 July 2015 (UTC)
* In your hypothetical, 25% of users may be expecting Rhytidectomy, while 75% of users clearly are NOT expecting the current behavior based on usage stats. That's not a 'clear' WP:PRIMARYTOPIC. UW Dawgs (talk) 18:42, 25 July 2015 (UTC)
* Oppose. There clearly is a primary topic. Suggesting the automotive usage or the album are anywhere near as common is frankly laughable. What do most people think of a when they hear the term? An album by a relatively obscure band? A car appearance change? I really don't think so. Ridiculous. Let's use a bit of common sense. -- Necrothesp (talk) 13:52, 29 July 2015 (UTC)
* And yet 75% of our 'Facelift' traffic is not interested in Rhytidectomy. Hence there is no clear WP:PRIMARYTOPIC. UW Dawgs (talk) 16:49, 29 July 2015 (UTC)
* I'll repeat, common sense! Remember, there are lies, damned lies and statistics! -- Necrothesp (talk) 08:41, 30 July 2015 (UTC)
|
WIKI
|
De Finetti diagram
A de Finetti diagram is a ternary plot used in population genetics. It is named after the Italian statistician Bruno de Finetti (1906–1985) and is used to graph the genotype frequencies of populations, where there are two alleles and the population is diploid. It is based on an equilateral triangle, and Viviani's theorem: the sum of the perpendicular distances from any interior point to the sides of said triangle is a constant equal to the length of the triangle's altitude.
Applications in genetics
The de Finetti diagram is used extensively in A.W.F. Edwards' book Foundations of Mathematical Genetics. The sum of the lengths, representing allele frequencies, is set to be 1. In its simplest form the diagram can be used to show the range of genotype frequencies for which Hardy–Weinberg equilibrium is satisfied (the curve within the diagram). A. W. F. Edwards and Chris Cannings extended its use to demonstrate the changes that occur in allele frequencies under natural selection.
|
WIKI
|
Talk:University of Pennsylvania Journal of International Law
Requested move
University of Pennsylvania Journal of International Economic Law → University of Pennsylvania Journal of International Law — This will reflect the current name of the publication, which used to be called "Journal of Economic Law. (This is uncontroversial). A redirect should also be created from "University of Pennsylvania Journal of International Economic Law." Thanks. —ballpointzen (talk) 23:24, 16 February 2010 (UTC) ✅ DES (talk) 14:26, 17 February 2010 (UTC)
Journal abbreviation
To the anonymous IPs who keep changing the journal abbreviation: the journal abbreviation field (as explained in the doc with the infobox template) is intended for the ISO abbreviation. This is an internationally, standardized way of abbreviation journal names. Here is a site that explains how that works (that this is a chemistry library really is immaterial). Journalseek does not include this journal, but it includes the University of Pennsylvania Journal of International Economic Law and the University of Pennsylvania Journal of International Business Law. For these two, it lists as standard abbreviations "Univ Penn J Int Econ Law" and "Univ Penn J Int Bus Law", respectively. Following the ISO standards, the abbreviation of this journal is "Univ Penn J Int Law", NOT "U. Pa. J. Int'l L." Please do not revert without giving an adequate rationale --Crusio (talk) 21:36, 19 March 2010 (UTC)
Class=C
This article has seven inline citations, and good detail, far better than a stub. --DThomsen8 (talk) 03:15, 16 May 2010 (UTC)
|
WIKI
|
Main Content
designopts
Valid input arguments and values for specification object and method
Syntax
OPTS = designopts(D,METHOD)
Description
OPTS = designopts(D,METHOD) returns a structure array with the default design parameters used by the design method METHOD. METHOD must be one of the options returned by designmethods.
Use help(D,METHOD) to get a description of the design parameters.
If you have DSP System Toolbox™ software installed, OPTS has the SystemObject property if at least one of the structures available for that design method is supported by System objects. However, not all structures for that design method are supported by System objects.
Examples
collapse all
Create a lowpass filter with a numerator and denominator order of 10 and a 3-dB frequency of 0.2π rad/sample. Obtain the default design parameters for a Butterworth design. Test whether the filter structure is a direct-form II biquad.
D = fdesign.lowpass('Nb,Na,F3dB',10,10,0.2);
OPTS = designopts(D,'butter')
OPTS = struct with fields:
FilterStructure: 'df2sos'
SOSScaleNorm: ''
SOSScaleOpts: [1x1 fdopts.sosscaling]
SystemObject: 0
if isequal(OPTS.FilterStructure,'df2sos')
fprintf('The default filter structure is Direct-Form II\n');
fprintf('with second-order sections.\n');
end
The default filter structure is Direct-Form II
with second-order sections.
Introduced in R2009a
|
ESSENTIALAI-STEM
|
Page:Report of The Inter-Governmental Committee, Malaysia.pdf/37
4. Eligibility for Pension
(i) The effect of the Scheme on pensions (in view of the provisions & the Pensions Laws and Schemes in North Borneo/ Sarawak and in other territories) is as follows.
(ii) Any entitled officer who (a) elects to retire from the pensionable service under this Scheme (whether he accepts an offer of a contract appointment or not) or (b) retires from the service on medical grounds or (c) is regnited to retire from the service either in accordance with the provisions of paragraph 12 or 13 below or to facilitate the reorganisation of the Public Service or on the grounds of public interest or because of the abolition of his office or on grounds of age will be eligible to receive such pension from the Government of North Bornco/Sarawak as he has earned by his pensionable service in North Boruco/Sarawak irrespective of whether his length of service in North Borneo/Sarawak is less than ten years and of whether he has attained the minimum retiring age at the date of his retirement of has served the minimum period under the Scheme applicable to him.
(iii) Where an entitled officer has other scheduled service, his eligibility for pension in respect of that other service will depend on the pensions law relating to it, An entilled officer who elects to retire before he has completed ten years total pensionable service (including qualifying service which is not in itself reckonable for the computation of pension) will be eligible only for a gratuity in respect of that part of his scheduled pensionable service which was not served in North Borneo Sarawak; provided that reciprocal arrangements will so far as possible be made by the Governments of the Federation of Malaya, Singapore, Sarawak, Brunei and North Borneo so that an officer who retires under this Scheme with less than 10 years total pensionable service which includes other scheduled pensionable service in Malaysia will receive pension in respect of his pensionable service under those Governments notwithstanding that his length of pensionable service is less than 10 years.
(iv) The pension of any entitled officer who is called upon to retire under this Scheme (either for constitutional reasons or to facilitate the localisation of the Public Service or to facilitate the reorganisation of the Public Service or because of the abolition of his office or on grounds of age) (paragraphs 6 (vi) to (vi), 12 and 13 below refer) will be calculated on the basis of the pensionable emoluments which he is drawing at the date on which his leave prior to retirement expires, and the averaging provisions of the Pensions Ordinance will not apply to such officers.
5. Calculation of Compensation
(i) An entitled officer will be eligible for compensation to be calculated and paid as setout below.
(ii) Compensation shall be calculated as a lump sum in accordance with the tables (Appendices I and II) which have been drawn up by the Goverment Actuary in the United Kingdom. These tables take account of length of pensionable service up to ten years. The maximum amount of compensation payable under this Scheme shall be £12,000.
(iii) Compensation shall be calculated by multiplying the officer's annual pensionable emoluments at the date taken for calculation by the factor appropriate to his age and length of service at that date.
(iv) The dates taken for calculation shall be— (a) in the case of the initial instalment, the operative date, or for an officer serving on probation, the date of confirmation,
(b) in the case of subsequent instalments each anniversary of the operative date, or, for an officer serving on probation, each anniversary of the date of his confirmation;
(c) the date of retirement, when an officer's compensation will be finally fixed:
Provided that at each date taken for calculation after the operative date, the point in time in relation to which the calculation is made shall be the point most favourable to the officer between the operative date and that date.
|
WIKI
|
1962 Volunteer 500
The 1962 Volunteer 500 was a NASCAR Grand National Series event that was held on April 29, 1962, at Bristol International Speedway in Bristol, Tennessee.
The transition to purpose-built racecars began in the early 1960s and occurred gradually over that decade. Changes made to the sport by the late 1960s brought an end to the "strictly stock" vehicles of the 1950s.
Race report
This 500-lap event lasted for a duration of three hours and 24 minutes. Thirty-six drivers managed to qualify for this racing event; with Fireball Roberts earning a pole position start due to his qualifying speed of 81.374 mph. Bobby Johns would beat out the likes of Richard Petty and Fireball Roberts by six laps; a dominating performance made possible by running the high line when nobody else wanted to run up high so he didn't get held up nearly as much as everyone else. This was the only time in Herman Beam's career that he got a top ten in a race with more than thirty cars starting. Granted, only eleven actually finished.
Johns would later credit his win in this event to having a sense of consistency; rather than accelerating the car to full throttle all the time. Johns' vehicle was unsponsored during an era where corporate sponsorships for NASCAR vehicles were very few and far in-between.
Larry Frank was the last-place finisher of this event due to his car overheating on lap 29. George Green would become the final driver to finish the event while David Pearson's faulty lug bolts would prevent him from acquiring a "top five" finish. Most of the vehicles in this race were Pontiac or Chevrolet. All of the drivers were born in the United States of America; no foreigners attempted to qualify for this racing event. Johnny Allen relieved Jack Smith in the #47 and received the checkered flag.
While there are only four cautions to this race, an incredibly long duration of 37 laps were spent under the caution flag due to the various accidents and incidents that happened during the race. Gene Blackburn would retire from NASCAR Cup Series racing after this event.
Individual earnings for each driver ranged from the winner's share of $4,405 ($0 when adjusted for inflation) to the meager earnings of $100 ($0 when adjusted for inflation) that was given to several low-ranked drivers. NASCAR only authorized a total sum of $17,865 to the qualifying drivers of this event ($0 when adjusted for inflation).
At least eight notable crew chiefs were in attendance for this race; including Bud Moore, Herman Beam, Glen Wood, Ratus Walters and Shorty Johns.
Major wrecks
The first major wreck of the race occurred when Nelson Stacy, on his 302nd lap, skidded into the second-turn guardrail after the '62 Ford had blown a tire. It bounced back on the track in time to be hit by Maurice Petty's '62 Plymouth. Stacy was shaken up, got a few minor bruises, and was sent to the hospital for observation. He was released before the race ended.
The second major wreck occurred when cars driven by Ned Jarrett and George Green collided on the fourth turn. Nobody was hurt. Both cars were badly damaged and hauled off the track by the wreckers. They were quickly repaired, however, and they got back into the race and were running at the finish.
Timeline
Section reference:
* Start of race: Fireball Roberts starts the race with the pole position.
* Lap 29: Larry Frank managed to overheat his vehicle.
* Lap 60: Larry Thomas fell out with engine failure.
* Lap 61: Fred Lorenzen fell out with engine failure.
* Lap 62: Bobby Johns takes over the lead from Fireball Roberts.
* Lap 68: Ralph Earnhardt managed to overheat his vehicle.
* Lap 81: Oil pressure issues forced Stick Elliott out of the race.
* Lap 160: Richard Petty takes over the lead from Bobby Johns.
* Lap 161: G.C. Spencer fell out with engine failure.
* Lap 163: Bobby Johns takes over the lead from Richard Petty.
* Lap 191: The oil line started acting strangely on Darel Dieringer's vehicle.
* Lap 223: Joe Lee Johnson fell out with engine failure.
* Lap 225: Johnny Allen fell out with engine failure.
* Lap 297: Maurice Petty had a terminal crash, forcing him to exit the event.
* Lap 302: Nelson Stacy had a terminal crash, forcing him to exit the event.
* Lap 321: Richard Petty takes over the lead from Bobby Johns.
* Lap 327: Bobby Johns takes over the lead from Richard Petty.
* Lap 359: Bunkie Blackburn noticed that the rear end of his vehicle was missing.
* Lap 368: Richard Petty fell out with engine failure.
* Lap 370: Fred Harb noticed that the head gasket of his vehicle was loose.
* Lap 430: Buck Baker's engine would stop working properly, causing him not to finish the race.
* Lap 444: The rear end of Joe Weatherly's vehicle came off, forcing him to exit the race.
* Lap 461: Problems with his lug bolts forced David Pearson to exit the race prematurely.
* Finish: Bobby Johns was officially declared the winner of the event.
|
WIKI
|
2 VPS's 2 webmin installs 1 virtualmin install - Domain question
2 posts / 0 new
Last post
#1 Sat, 08/11/2012 - 13:37
duman
2 VPS's 2 webmin installs 1 virtualmin install - Domain question
Hi all, I have been happily using webmin + Virtualmin on a VPS over the last few months and its been amazing after setup! Though still being new to all of this, im a bit confused how i should handle a certain situation.
I have 2 VPS running Webmin,
VPS A has webmin + virtualmin + bind9 + mail server and is hosting all my domains VPS B has only Webmin at this stage
I would like to be able to host a few things on VPS B but due to it only being 128mb ram, i am trying to keep everything minimal. Can i point example.tld and foo.example.tld to VPS B but keep the bind records, mail and everything else on VPS A?
Should I just change the A record to point to VPS B ip and that will be enough?
I would liek to have some control over .htaccess and php stuff on VPS B, so im not sure if just pointing example.tld and foo.example.tld to VPS B, then setting up webmin to handle it will do or if i need Virtualmin and additional setup on VPS B?
Thanks in advance!
Sat, 08/11/2012 - 14:12
andreychek
Can i point example.tld and foo.example.tld to VPS B but keep the bind records, mail and everything else on VPS A?
Sure!
VPS A would continue to act as the nameserver for foo.example.tld, but you'd go into Server Configuration -> Edit DNS Records, and set the IP address for foo.example.com to point to VPS B. Keep the MX record where it is now.
I would liek to have some control over .htaccess and php stuff on VPS B, so im not sure if just pointing example.tld and foo.example.tld to VPS B, then setting up webmin to handle it will do or if i need Virtualmin and additional setup on VPS B?
It's entirely up to you whether or not you use Virtualmin... you can use a .htaccess file and PHP with or without it.
Virtualmin of course makes that even simpler, but with only 128MB of RAM, you may want to avoid using the full Virtualmin stack of software (Virtualmin itself is small, but a lot of it's dependencies aren't).
-Eric
|
ESSENTIALAI-STEM
|
At mealtimes in the Middle Ages, all drank small beer, regardless of age, particularly while eating a meal at the table. Table beer was around this time typically less than 1% ABV.
Beer during the Middle Ages was naturally produced in a wide range of alcohol concentrations, generally classed as strong beers of 8-14% ABV; medium beers of about 4-8% ABV, and weak beers of 1-3% ABV.
It had about 10% alcohol content, so it was quite strong. And we know what it was made of because the Egyptians were very methodical at writing down how they made their beers. In the 1980s people were able to recreate the beer of Tutankhamun based on hieroglyph information.
There is a story repeated so often that it has become a truth — that medieval folk drank weak beer to avoid the perils of drinking water — but it's a myth. The folk in olden times who could afford it would pay for good clean water.
|
FINEWEB-EDU
|
User:Jodawson/sandbox
Concerto Project Management
Concerto Project Management is a web-based project-management solution, first launched in 2004 by Concerto Integrated Software Solutions. It was originally developed to support transformation projects within the UK local Government and Government collaborative strategy in managing estates and large scale capital projects.
In 2013, Concerto developed integrated BIM capabilities in collaboration with NG Bailey and Laing O'Rourke in response to the UK Government's Soft Landings Framework. This functionality was used as a test product to support the Manchester Town Hall project, a key Local Government capital project used as a testing ground for the effective use of theBuilding Information Modelling framework in public sector projects.
In 2014, Concerto worked on further development in collaboration with Mouchel and Vinci construction to fully support the NEC Engineering and Construction Contract which facilitates the use of Lean principles.
The product is now in its 4th version release and is still used predominantly by public sector organisations. Concerto Projects is provided via a proprietary based license, cloud based, see Cloud computing, or hosted in-house.
Recognition
In 2011, Concerto Projects was featured in Project Manager Today and in 2013 in FM Link. In 2014, interviews and articles were featured in BIMCrunch and in Adjacent Government magazine regarding the developments in support of the Government Soft Landings Famework. In 2015, Concerto featured in FM World Magazine in relation to the development work supporting the NEC3 contract.
Core Features
* customised templates / work flow
* programme & portfolio management
* file & document management
* log & risk management
* online & offline planning tools
* drag and drop resource management
* budget and funding management
* fee and contract management
* business performance
* automated reporting
* integration with finance systems and MS Project
* orders and invoicing
|
WIKI
|
HISTORY OF THE UNITED STATES BY GEORGE BANCROFT
Volume 1, Part 1
Chapter 13 — The Providence Plantations
WHILE the state was thus connecting by the closest bonds the energy of its faith with its form of government, Roger Williams, after remaining two years or a little more in Plymouth, accepted a second invitation to Salem. The ministers in the bay and of Lynn used to meet once a fortnight at each other’s houses, to debate some question of moment; at this, in November, 1633, Skelton and Williams took some exception, for fear the custom might grow into a presbytery or a superintendency, to the prejudice of the church’s liberties; but such a purpose was disclaimed, and all were clear that no church or person can have power over another church. Not long afterward, in January, 1634, complaints were made against Williams for a paper which he had written at Plymouth, to prove that a grant of land in New England from an English king could not be perfect except the grantees “compounded with the natives.” The opinion sounded like treason against the charter of the colony; Williams was willing that the offensive manuscript should be burned; and so explained its purport that the court, applauding his temper, declared “the matters not so evil as at first they seemed.”
Yet his generosity and forbearance did not allay a jealousy of his radical opposition to the established system of theocracy, which he condemned, because it plucked up the roots of civil society and brought all the strifes of the state into the garden and paradise of the church. The government avoided an explicit rupture with the church of England; Williams would hold no communion with it on account of its intolerance; “for,” said he, “the doctrine of persecution for cause of conscience is most evidently and lamentably contrary to the doctrine of Jesus Christ.” The magistrates insisted on the presence of every man at public worship; Williams reprobated the law; the worst statute in the English code was that which did but enforce attendance upon the parish church. To compel men to unite with those of a different creed he regarded as an open violation of their natural rights; to drag to public worship the irreligious and the unwilling seemed only like requiring hypocrisy. “An unbelieving soul is dead in sin,” such was his argument; and to force the indifferent from one worship to another “was like shifting a dead man into several changes of apparel.” “No one should be bound to worship, or,” he added, “to maintain a worship, against his own consent.” “What!” exclaimed his antagonists, amazed at his tenets; “is not the laborer worthy of his hire?” “Yes,” replied he, “from them that hire him.”
The magistrates were selected exclusively from the members of the church; with equal propriety, reasoned Williams, might “a doctor of physick or a pilot” be selected according to his skill in theology and his standing in the church.
It was objected to him that his principles subverted all good government. The commander of the vessel of state, replied Williams, may maintain order on board the ship, and see that it pursues its course steadily, even though the dissenters of the crew are not compelled to attend the public prayers of their companions.
But the controversy finally turned on the question of the rights and duty of magistrates to guard the minds of the people against corrupting influences, and to punish what would seem to them error and heresy. Magistrates, Williams protested, are but the agents of the people, or its trustees, on whom no spiritual power in matters of worship can ever be conferred, since conscience belongs to the individual, and is not the property of the body politic; and with admirable dialectics, clothing the great truth in its boldest and most general forms, he asserted that “the civil magistrate may not intermeddle even to stop a church from apostasy and heresy,” “that his power extends only to the bodies and goods and outward estate of men.” With corresponding distinctness, he foresaw the influence of his principles on society. “The removal of the yoke of soul-oppression,” to use the words in which, at a later day, he confirmed his early view, “as it will prove an act of mercy and righteousness to the enslaved nations, so it is of binding force to engage the whole and every interest and conscience to preserve the common liberty and peace.”
The same magistrates who punished Eliot, the apostle of the Indian race, for censuring their measures, could not brook the independence of Williams; and the circumstances of the times seemed to them to justify their apprehensions. An in tense jealousy was excited in England against Massachusetts; “members of the general court received intelligence of some episcopal and malignant practices against the country;” and the magistrates on the one hand were careful to avoid all unnecessary offence to the English government, on the other were consolidating their own institutions, and even preparing for resistance. It was in this view that the freeman’s oath was appointed, by which every freeman was obliged to pledge his allegiance, not to King Charles, but to Massachusetts. There was room for scruples on the subject; and an English lawyer would have questioned the legality of the measure. The liberty of conscience, for which Williams contended, denied the right of a compulsory imposition of an oath: when, in March, 1635, he was summoned before the court, he could not renounce his belief; and his influence was such “that the government was forced to desist from that proceeding.” To the magistrates he seemed the ally of a civil faction; to himself he appeared only to make a frank avowal of truth. Before the tribunals, he spoke with the distinctness of clear and settled convictions. He was fond of discussion; and to the end of his life was always ready for controversy, as the means “to bolt out the truth to the bran.”
The court at Boston remained as yet undecided; the church of Salem—those who were best acquainted with Williams—taking no notice of the recent investigations, elected him their teacher. Immediately the ministers met together, and declared any one worthy of banishment who should obstinately assert that “the civil magistrate might not intermeddle even to stop a church from apostasy and heresy;” the magistrates delayed action, only that a committee of divines might have time to repair to Salem and deal with Williams and with the church in a church way. Meantime, the people of Salem were blamed for their choice of a religious guide; and a tract of land, to which they had a claim, was withheld from them as a punishment.
To the ministers Williams frankly but temperately explained his doctrines; and he was armed at all points for their defence. In conjunction with the church, he wrote “letters unto all the churches whereof any of the magistrates were members, that they might admonish the magistrates of their injustice.”
At the next general court, Salem was disfranchised till an ample apology for the letter should be made. The town submitted; so did the church. Williams was left alone. Anticipating the censures of the colonial churches, he declared himself no longer subjected to their spiritual jurisdiction. “My own voluntary withdrawing from all these churches, resolved to continue in persecuting the witnesses of the Lord, presenting light unto them, I confess it was mine own voluntary act; yea, I hope the act of the Lord Jesus, sounding forth in me the blast, which shall in his own holy season cast down the strength and confidence of those inventions of men.” Summoned in October to appear before the representatives of the state, he “maintained the rocky strength” of his convictions, and held himself “ready to be bound and banished, and even to die in New England,” rather than renounce them.
The members of the general court of 1635 pronounced against him the sentence of exile, yet not by a very large majority. Some, who consented to his banishment, would never have yielded but for the persuasions of Cotton; and the judgment was vindicated, not as a restraint on freedom of conscience, but because the application of the new doctrine to the construction of the patent, to the discipline of the churches, and to the “oaths for making tryall of the fidelity of the people,” seemed about “to subvert the fundamental state and government of the country.”
Winter was at hand; Williams obtained permission to remain till spring, intending then to begin a new plantation. But the affections of the people of Salem revived; they thronged to his house to hear him whom they were so soon to lose forever; “many of the people were much taken with the apprehension of his godliness;” his opinions were contagious; the infection spread widely. It was therefore resolved to remove him to England in a ship that was just ready to set sail. In January, 1636, a warrant was accordingly sent to him to come to Boston and embark. For the first time he declined the summons of the court. A pinnace was sent for him; the officers repaired to his house; he was no longer there. Three days before, he had left Salem, in winter snow and inclement weather, of which he remembered the severity even in his late old age. “For fourteen weeks he was sorely tost in a bitter season, not knowing what bread or bed did mean.” Often in the stormy night he had neither fire, nor food, nor company; often he wandered without a guide, and had no house but a hollow tree. But he was not without friends. The respect for the rights of others, which had led him to defend the freedom of conscience, had made him the champion of the Indians. He had learned their language during his residence at Plymouth, had often been the guest of the neighboring sachems; and now, when he came in winter to the cabin of the chief of Pokanoket, he was welcomed by Massassoit; and “the barbarous heart of Canonicus, the chief of the Narragansetts, loved him as his son to the last gasp.” “The ravens,” he relates, “fed me in the wilderness.” And, in requital for their hospitality, he was ever through his long life their friend and benefactor; the apostle of Christianity to them without hire, or weariness, or impatience at their idolatry; the pacificator of their own feuds; the guardian of their rights, whenever Europeans attempted an invasion of their soil.
He first began to build and plant at Seekonk, which was within the patent of Plymouth. “That ever-honored Governor Winthrop,” says Williams, “privately wrote to me to steer my course to the Narragansett bay, encouraging me from the freeness of the place from English claims or patents. I took his prudent motion as a voice from God.”
In June, the law-giver of Rhode Island, with five companions, embarked on the stream; a frail Indian canoe contained the founder of an independent state and its earliest citizens. Tradition has marked the spring of water near which they landed. To express unbroken confidence in the mercies of God, he called the place PROVIDENCE. “I desired,” said he, “it might be for a shelter for persons distressed for conscience.”
In his new abode, “My time,” wrote Williams of himself, “was not spent altogether in spiritual labors; but day and night, at home and abroad, on the land and water, at the hoe, at the oar, for bread.” Within two years others fled to his asylum. The land which he occupied was within the territory of the Narragansetts. In March, 1638, an Indian deed from Canonicus and Miantonomoh made him the undisputed possessor of an extensive domain; but he “always stood for liberty and equality, both in land and government.” The soil became his “own as truly as any man’s coat upon his back;” and he “reserved to himself not one foot of land, not one tittle of political power, more than he granted to servants and strangers.” “He gave away his lands and other estate to them that he thought were most in want, until be gave away all.”
So long as the number of inhabitants was small, public affairs were transacted by a monthly town meeting. A commonwealth was built up where the will of the greater number of householders or masters of families, and such others as they should admit into their town fellowship, should govern the state; yet “only in civil things;” God alone was respected as the Ruler of conscience.
At a time when Germany was desolated by the implacable wars of religion; when even Holland could not pacify vengeful sects; when France was still to go through the fearful struggle with bigotry; when England was gasping under the despotism of intolerance; almost half a century before William Penn became an American proprietary; and while Descartes was constructing modern philosophy on the method of free reflection—Roger Williams asserted the great doctrine of intellectual liberty, and made it the corner-stone of a political constitution. It became his glory to found a state upon that principle, and to stamp himself upon its rising institutions, in characters so deep that the impress has remained to the present day, and can never be erased without the total destruction of the work. The principles which he first sustained amid the bickerings of a colonial parish, next asserted in the general court of Massachusetts, and then introduced into the wilds on Narragansett bay, he found occasion, in 1644, to publish in England, and to defend as the basis of the religious freedom of mankind; so that, borrowing the language employed by his antagonist in derision, we may compare him to the lark, the pleasant bird of the peaceful summer, that, “affecting to soar aloft, springs upward from the ground, takes his rise from pale to tree,” and at last utters his clear carols through the skies of morning. He was the first person in modern Christendom to establish civil government on the doctrine of the liberty of conscience, the equality of opinions before the law; and in its defence he was the harbinger of Milton, the precursor and the superior of Jeremy Taylor. For Taylor limited his toleration to a few Christian sects; the wisdom of Williams compassed mankind. Taylor favored partial reform, commended lenity, argued for forbearance, and entered a special plea in behalf of each tolerable sect; Williams would permit persecution of no opinion, of no religion, leaving heresy unharmed by law, and orthodoxy unprotected by the terrors of penal statutes. Taylor clung to the necessity of positive regulations enforcing religion and eradicating error, like the poets, who first declare their hero to be invulnerable, and then clothe him in earthly armor; Williams was willing to leave Truth alone, in her own panoply of light, believing that, if in the ancient feud between Truth and Error the employment of force could be entirely abrogated, Truth would have much the best of the bargain. High honors are justly awarded to those who advance the bounds of human knowledge, but a moral principle has a much wider and nearer influence on human happiness; nor can any discovery be of more direct benefit to society than that which is to establish in the world the most free activity of reason and a perpetual religious peace. Had the territory of Rhode Island been large, the world would at once have been filled with wonder and admiration at its history. The excellency of the principles on which it rested its earliest institutions is not diminished by the narrowness of the land in which they were for the first time tested. Let, then, the name of Roger Williams be preserved in universal history as one who advanced moral and political science, and made himself a benefactor of his race.
The most touching trait in the founder of Rhode Island was his conduct toward those who had driven him out of their society. He says of them truly: “I did ever, from my soul, honor and love them, even when their judgment led them to afflict me.” In his writings he inveighs against the spirit of intolerance, and never against his persecutors or the colony of Massachusetts. We shall presently behold him requite their severity by exposing his life at their request and for their benefit. It is not strange, then, if “many hearts were touched with relentings.” The half-wise Cotton Mather concedes that many judicious persons confessed him to have had the root of the matter in him; and the immediate witnesses of his actions declared him, from “the whole course and tenor of his life and conduct, to have been one of the most disinterested men that ever lived, a most pious and heavenly minded soul.”
Americanist History is researched, compiled, formatted for the Internet by Steve Farrell. The copyright of the original text of George Bancroft’s History of the United States is held in the Public Domain.
|
FINEWEB-EDU
|
Octanis 1: How to Make Solar Panels
49,893
550
47
Introduction: Octanis 1: How to Make Solar Panels
About: A rover mission to Antarctica • Octanis is an association at EPFL pushing students to go beyond just solving exercise series.
Octanis 1 will fly to Antarctica and land a satellite controlled rover. To do this, it needs lots of power and it will get it from the sun! Here's a guide on how to make Octanis' solar panels.
Find out more about the rover mission: http://octanis.org/
Step 1: Cut Your Cells
Cutting solar cells is the trickiest bit and this step depends on the type of solar cell and cutting device you use.
We used Sunpower C50 cells, that can be cut with a diamond glass cutter. It's enough to score the cell with precise force and then snap it carefully, hoping it will snap along the cut line. The yield for this is about 50%, so make sure you order enough cells!
Step 2: Clean Them
Use a sonicator bath to clean the cells. Make sure they don't overlap or touch each other as this would produce nasty stains.
Step 3: Prepare the Solar Panel Foundation
We will use adhesive foil as a layout guide and an easy way to keep the cells together when flipping them around after soldering.
Cut the adhesive foil to size (Octanis 1 has a panel size of 30cm x 30cm). Peel off the adhesive foil and set it aside. Place the non-adhesive side on a flat surface. Spray the clean solar cells with distilled water to get rid of dust.
Step 4: Layout & Solder the Cells
While the cells are still wet, place them on the non-adhesive side. Make sure you align them correctly (pay attention to the polarity).
Then solder them together using solar tabbing (get it on eBay). Octanis 1 uses a 7s2p (7 series, 2 parallel) configuration. Soldering is straightforward, use solder tin if necessary. Solder as you would solder a PCB.
Make sure you make the tabbing that goes out (where you will connect your load) is long enough.
Step 5: Prepare for Epoxy Pouring
When you're done with soldering, carefully stick the adhesive on to the solar cells. It should be sticking on the back side of the cells!
Turn over the panel and peel off the non-adhesive side.
Tape it onto a flat surface, make sure the tape is very strong. The epoxy has the potential to unstick the tape if it goes underneath it.
Step 6: Make a Border Out of Tape
... so the epoxy doesn't flow out. Again, this needs to stick well!
Step 7: Pour the Epoxy Resin
We used 10:6 two-part resin from OBI. For a panel size of 30x30cm we used 90ml of resin (A: 56ml, B: 34ml)
Step 8: Let the Resin Cure.
For faster curing (less than 5 days), leave it under a UV lamp.
Be the First to Share
Recommendations
• Battery Powered Contest
Battery Powered Contest
• Plywood Challenge
Plywood Challenge
• Plastic Contest
Plastic Contest
47 Discussions
0
fety
fety
Reply 4 years ago
aka ultrasonic jewelry cleaner.
0
octanisorg
octanisorg
5 years ago
be sure to check out our new rover page. we'll be adding more info soon:
http://octanis.org/rover/
0
�L
�L
5 years ago on Step 8
is there a materials list, like where to buy the stuff?
0
astrong0
astrong0
5 years ago
Interesting project. What is the scope of the mission? Is it simply because you can or is this going to lead up to a more invested project? Perhaps testing certain novel devices in extreme temperatures?
0
octanisorg
octanisorg
Reply 5 years ago on Introduction
we like to push the limits of what's possible using the open source and maker approach. check out our wiki for more info http://octanis.org/wiki/
0
slickdog
slickdog
5 years ago
In the textfor step 3 you state to place the foil non-adhisive side on a flat surface, then in step 4 you say to place the cells on the non-adhesive side. How do you do this when the non-adhesive sie is facing down, or is there an error in the text? Later on in step 5 the foil is stuck to to the panels and the non adhesive side taken off. This I find cinfusing are you using two seperate shgets of adhesive foil or is it in three layers with two non adhesive an one adhesive?
0
rafi_rfiq
rafi_rfiq
5 years ago
more informetion abuots cells. I meen how to make one by my sellf
0
octanisorg
octanisorg
Reply 5 years ago on Introduction
if you really want to make the individual cells (not the panels!) yourself, try
http://www.wikihow.com/Make-Solar-Cells
0
cavi21
cavi21
5 years ago on Introduction
Kinda OT, but what are your concerns about the weight of the Octanis and the winds in Antartica? Also are you planning to retrieve this thing after all the studies that you are planning to make?
Also thanks to share this!
0
octanisorg
octanisorg
Reply 5 years ago on Introduction
the rover will be retrieved at some point, as abandoning it would not only be sad but would go against the antarctic treaty. our weight limit is 2.5kg.
for the locations we're currently looking at winds are not too much of an issue. if we do get blown over, our wheel struts can put us back into position and we shouldn't take much damage. summer vs winter weather makes a difference.
0
nwonharp
nwonharp
5 years ago on Introduction
In step 4 you say " use solder tin if necessary " What do you mean ? are you talking about using flux ? or " pre-tinning " the connectors before soldering ? Or maybe you keep your solder in a " tin can " ( LOL )
Cheers , take care , and have a good day !!
0
octanisorg
octanisorg
Reply 5 years ago on Introduction
solder as you would solder any wire (https://www.instructables.com/id/Soldering-101%3A-Lesson-1%3A-Tin-the-Tip/). make sure you dont short out the traces.
0
g1ra
g1ra
5 years ago on Introduction
I plan to make solar panel for my robot.
Please can you tell me what is the weight of one solar cell of this type? (only the bare solar cell without cover or soldering )
Where did you bought this solar cells?
0
octanisorg
octanisorg
Reply 5 years ago on Introduction
probably a couple of grams, the datasheet doesn't specify. you can get search for them on ebay.
0
WilliamL14
WilliamL14
5 years ago on Step 8
I really like this project but I seem to have missed some basic information. (Maybe you provided it and i just did not see it?) For starters, it's not clear to me why you cut the cells in that particular shape.
0
Patrick Gallagher
Patrick Gallagher
Reply 5 years ago on Step 8
The uncut Sun Power cell has those rounded corners. So they cut the cell into 3 pieces. The leftover 3rd piece is used for a different project, presumably. They used all end pieces and that's the shape you get. Look like boats.
|
ESSENTIALAI-STEM
|
-- Russia to Charge Greenpeace Activists Over Arctic Protest Act
Russia plans to charge Greenpeace
activists over the boarding of an oil platform to campaign
against drilling in the Arctic, investigators said. The ecological campaigners endangered the security of
workers and property at OAO Gazprom (GAZP) ’s oil rig and resisted Coast
Guard officials, the Investigative Committee in Moscow said on
its website today. “Charges will be filed shortly,” the law-enforcement agency said, without specifying further. Russian investigators have opened a criminal case against
30 Greenpeace activists from 18 countries for piracy, a charge
that carries a maximum prison sentence of 15 years. They were
remanded in custody at the end of last week for two months in
the port city of Murmansk. “This case is unpredictable and it’s hard to make any
forecasts,” Vladimir Chuprov, head of the energy program of
Greenpeace’s Russian branch, said today by phone. “But they
seem to be backing away from the piracy charge and desperately
looking for something else to accuse the activists of.” Greenpeace protesters scaled a Gazprom rig in the Pechora
Sea on Sept. 18. The state-owned company has accused the
environmental organization of endangering the lives of workers
on the rig who were underwater at the time of the protest
action. Russia’s Coast Guard boarded Greenpeace’s Arctic Sunrise
ship in international waters on Sept. 19, a day after two
protesters scaled the rig, and towed the vessel to Murmansk.
Gazprom plans to become the first Russian company to start
producing oil in Arctic waters at the Prirazlomnoye deposit as
soon as this year. Greenpeace activists scaled the same drilling
platform in 2012. The detained activists include citizens of the U.S.,
Finland , Argentina , Switzerland, the U.K., Australia, Brazil,
Canada, Denmark , the Netherlands, New Zealand , Ukraine, Russia,
France, Italy, Turkey , Poland and Sweden, according to
Greenpeace. To contact the reporter on this story:
Henry Meyer in Moscow at
hmeyer4@bloomberg.net To contact the editor responsible for this story:
Balazs Penz at
bpenz@bloomberg.net
|
NEWS-MULTISOURCE
|
Page tree
The Shibboleth 2.x software has reached its End of Life and is no longer supported. This documentation is available for historical purposes only. See the IDP4 and SP3 wiki spaces for current documentation on the supported versions.
Skip to end of metadata
Go to start of metadata
Upgrade IdP 2.0/2.1 to 2.2
When upgrading to IdP 2.2 you should make the following changes in your configuration files. None of these changes are strictly required but making these changes is necessary for some new features and to remove some warning messages.
Endorsed Libraries
Xerces, one of the two libraries that you should have endorsed when installing the IdP has a new version out. To do this, refer to the Servlet container preparation documentation referenced in the first step of the IdP installation instructions.
Logging Configuration
The latest version of the logging framework used by the IdP has changed its configuration slightly, removing some configuration options and adding additional ones.
First, you will also need to remove each <ImmediateFlush> element, as this option is no longer supported.
Next you will need to replace each <layout> element with an <encoder> element and specify the character set used in the logging messages.
So, currently, you will have sections that look like this:
<layout class="ch.qos.logback.classic.PatternLayout">
<Pattern>SOME_PATTERN_STRING</Pattern>
</layout>
and they need to be changed to look like this:
<encoder class="ch.qos.logback.classic.encoder.PatternLayoutEncoder">
<Pattern>SAME_PATTERN_AS_ABOVE</Pattern>
<charset>UTF-8</charset>
</encoder>
Changes in Principal Name Returned from Authentication
It has always been the case that the authentication engine can, and usually does, return more than one identifier for a user (e.g. the uid and the DN for the user if authenticating against an LDAP). As such, the value of RequestContext.getPrincipalName() was always defined as the "first" of an unordered set. As a stop-gap solution, IdP 2.2 will now prefer the user's login ID (the thing they type in the username field of the login page) if available, if not it will fall back to the same "first" of an unordered set behavior.
However, if you need something other than the username, or the authentication mechanism you use doesn't use a username, you will need to write a custom attribute definition that access the javax.security.auth.Subject, via RequestContext.getUserSession().getSubject(), and select whichever principal name is correct for your use case.
LDAP and Relational Database Result Caching
The LDAP and Relational Database data connectors can now cache their results for a configurable period of time. To enable this you need to configure the cache manager used by the code by adding the following <bean> at the same level as the other <bean> elements in the internal.xml file.
<bean id="shibboleth.CacheManager" class="org.springframework.cache.ehcache.EhCacheManagerFactoryBean" />
In the default IdP config this is added as the first child of the <beans>. It doesn't matter if you do the same, just so long as it is a child of <beans>.
Timeout/Duration/Interval Property Syntax Change
All of the configuration properties dealing with time has been changed to use the XML schema duration notation. This removes any ambiguity as to the time units (minutes, second, milliseconds) of the configuration property.
When you start the IdP it will find the various configuration properties that need to be updated to the new notation and will write out a warning message in the idp-process.log indicating where the configuration options are and what the current value would be in duration notation. Then simply edit that file, locate the configuration option, and replace the current value with the one given by the IdP.
MDC Cleanup Filter
This is only needed if you use your own customized web.xml file.
The IdP currently does not clean up a small piece of state when it finishes a request. This state is associated with something known as the Mapped Diagnostic Context (MDC) of the logging framework. If you maintain your own web.xml file with which you replace the shipped with version, be sure to add the following after the <listener> element.
<!-- Add IdP SLF4J MDC cleanup filter to all requests -->
<filter>
<filter-name>SL4JCleanupFilter</filter-name>
<filter-class>edu.internet2.middleware.shibboleth.common.log.SLF4JMDCCleanupFilter</filter-class>
</filter>
<filter-mapping>
<filter-name>SL4JCleanupFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
Clustering
Grab the latest tc-config.xml from the clustering documentation.
• No labels
|
ESSENTIALAI-STEM
|
BlessWorld Foundation International
Affecting the World Through Health
A Global Health Initiative
Archive for June, 2023
In addition to Carbohydrates and proteins, fats are a major source of energy, providing structure and cushion to cells and membranes. Fats are more energy dense than carbohydrates and proteins and contain 9 calories per gram, in contrast to 4 calories per gram of carbohydrates and proteins. Fats are fundamental part of a healthy, balanced diet and are the body’s only source of essential fatty acids, since these can not be made by the body. Similar to carbohydrates and proteins, unused fat is converted into body fat and stored as residual energy sources.
The following are the functions of Fats in the body:
• Prevent damage to the organs by providing cushion.
• Absorb nutrients such as vitamins A, D, E, and K
• Maintain normal levels of cholesterol and blood pressure.
• Store and provide energy.
• Support cell growth.
According to the American Heart Association, there are four major dietary fats in food including:
• Saturated fats
• Trans fats
• Monounsaturated fats
• Polyunsaturated fats)
Monounsaturated and polyunsaturated fats are types of unsaturated fats.The different types of fat have varying chemical composition and structures, and consequently, vary in their physical properties. Based on these, saturated fats and trans fats are considered ‘bad’ and appear solid in room temperature while unsaturated fats- monounsaturated fats and polyunsaturated are considered ‘good’ fats remain liquid in room temperature. Fats play an essential role in determining the cholesterol level of the body. Good and bad fats have various effects on the body’s cholesterol level. For instance, diets high in good fats increases the body’s good cholesterol level, also called high-density lipoprotein (HDL). In the same vein, diets high in bad fats increases the body’s bad cholesterol known as low-density lipoprotein (LDL).
Sources of good fat include tofu, flaxseed, avocados, olives, soy, sesame seed, nuts, dairy, fatty fish, canola, and coconut. On the contrary, baked foods, pizza dough, chips, vegetable shortening, fried foods, margarine, hydrogenated or partially hydrogenated vegetable oil are sources of bad fat, particularly trans-fat. Although both bad fats, Trans fats are worse than saturated fats and are not recommended for a healthy diet. However, red meat, chicken skin, ice cream, cheese, cream, butter are sources of saturated fats which are only recommended in small quantities, even though they are considered bad fats and increase bad cholesterol.
As advised by the World health Organization, Centers for Disease Control and Prevention and National Health Services, it is important to consume more polyunsaturated and monounsaturated (good) fats than saturated and trans (bad) fats. Bad fats, particularly Trans fats have been shown to increase the risk of heart disease and increase levels of bad cholesterol (LDL). In contrast, Unsaturated fats (monounsaturated and polyunsaturated fats) reduce the risk of heart attacks by decreasing the levels of bad cholesterol (LDL) cholesterol and increasing the good cholesterol level (HDL).
|
ESSENTIALAI-STEM
|
SPSS Tutorials
BASICS REGRESSION T-TEST ANOVA CORRELATION
SPSS String Variables Tutorial
SPSS CHAR.SUBSTR - Example
Working with string variables in SPSS is pretty straightforward if one masters some basic string functions. This tutorial will quickly walk you through the important ones.
SPSS Main String Functions
SPSS Syntax Example
We asked respondents to type in their first name, surname prefix and last name. We'd like to combine these into full names and correct some irregularities such as incorrect casing and double spaces. For creating some test data, close all open datasets and run the syntax below.
*Create mini test dataset.
set unicode off.
data list free/s1 s2 s3 (3a20).
begin data
'ANNEKE' ' VAN DEN ' 'BERG' 'daan' '' 'balvert' 'a' '' 'b'
end data.
1. Correcting First Names
*1. Declare new string variables.
string n1 to n4 (a20).
*2. Extract first letter of first name.
compute n1 = char.substr(s1,1,1).
exe.
*3. Convert to upper case.
compute n1 = upcase(n1).
exe.
*4. Substitution: use substring function within upcase function.
compute n1 = upcase(char.substr(s1,1,1)).
exe.
*5. Extract remaining letters and convert to lower case.
compute n1 = lower(char.substr(s1,2)).
exe.
*6. Substitution: concatenate results from previous attempts.
compute n1 = concat(upcase(char.substr(s1,1,1)),lower(char.substr(s1,2))).
exe.
2. Correcting Surname Prefixes
*1. Remove leading spaces.
compute n2 = ltrim(s2).
exe.
*2. Substitution: remove leading spaces and convert to lower case.
compute n2 = lower(ltrim(s2)).
exe.
*3. Replace double spaces by single spaces.
compute n2 = replace(n2,' ',' ').
exe.
3. Combining First and Last Names
*1. Reuse capitalization syntax used for first name on last name.
compute n3 = concat(upcase(char.substr(s3,1,1)),lower(char.substr(s3,2))).
exe.
*2. If rtrim is omitted, concat doesn't seem to work.
compute n4 = concat(n1,n2,n3).
exe.
*3. Correct concatenation but spaces should be inserted.
compute n4 = concat(rtrim(n1),rtrim(n2),rtrim(n3)).
exe.
*4. Final concatenation.
compute n4 = concat(rtrim(n1),' ',rtrim(n2),' ',rtrim(n3)).
exe.
*5. Replace double spaces by single spaces.
compute n4 = replace(n4,' ',' ').
exe.
4. Flag Single Letter Names
*1. Find short first/last names from separate name components.
compute flag_1a = char.length(s1).
compute flag_1b = char.length(s3).
exe.
*2. Find short first/last names from combined names.
compute flag_2a = char.index(n4,' ') -1.
compute flag_2b = char.length(n4) - char.rindex(rtrim(n4),' ').
exe.
Previous tutorial: SPSS String Variables Basics
Next tutorial: SPSS INDEX Function
Let me know what you think!
*Required field. Your comment will show up after approval from a moderator.
This tutorial has 18 comments
|
ESSENTIALAI-STEM
|
Erik Stai
Erik Stai (29 November 1915 – 4 March 2004) was a Norwegian high jumper. He represented the club IF Vestheim.
He finished fourth at the 1938 European Championships with a jump of 1.90 metres. He never participated in the Summer Olympics. He became Norwegian champion in 1938 and 1939, but his career was interrupted by World War II in Norway 1940–1945.
His career best jump was 2.00 metres, achieved in September 1940 at Bislett stadion.
|
WIKI
|
User:Intherealmalyk/sandbox
Malyk aka Malik Johnson-Brown is a young african american man born in Toledo, Ohio on June 14, 1996. Birthed by Tiajuna Phelps. At the age of 13 Malyk discovered his passion for music.
|
WIKI
|
Talk:Simone Pika
Moving to the article room
Hello,
I created this article already existing in the German wikipedia. I'm quite new here, but heard that I cannot move this article to the public. Can someone with the rights do it - if the article has nothing to complain about
Cheers, tarwel Tarwel (talk) 10:23, 4 October 2023 (UTC)
|
WIKI
|
Killing of David Byrne
The Irish criminal David Byrne was shot dead on 5 February 2016 at the Regency Hotel in Whitehall, Dublin.
It is believed by the Garda Síochána that Daniel Kinahan, the son of Christy Kinahan, was the intended target, but had left early.
Background
Byrne had been investigated by every Garda specialist unit since he was a teenager. He was present at the fatal stabbing of Declan Gavin in August 2001 in Crumlin, Dublin. He was called as a witness in the trial of Brian Rattigan for the killing, but said he had seen nothing.
David Byrne had been arrested many times and was a suspect in the murder of Gary Bryan in Walkinstown in 2006.
In January 2016 Gardaí had a special policing plan put in place for the following month when two boxing events would be attended by members of a criminal gang associated with Christy Kinahan. The Kinahan gang have a long association with boxing both in Dublin and Marbella.
Shooting
On 5 February 2016 there was to be a boxing match for the WBO European lightweight title between Jamie Kavanagh and Antonio João Bento at the Regency Hotel in Whitehall, Dublin. At the weigh-in there was an organised armed attack; the match was cancelled after the shooting. There were at least four attackers with masks, army style-helmets and flak jackets, two of whom were disguised as members of the Garda Emergency Response Unit and armed with AK-47s. An associate of the Kinahan cartel, David Byrne (32) was shot dead; security sources said that the gang had intended to kill others. Two men were injured and taken to the Mater Private Hospital and Beaumont Hospital.
After the attack, security camera recordings suggested that six people had been involved, including a man disguised as a woman. The attackers escaped in a Ford Transit van which was later found burnt-out.
Funeral
Because of the length of time Byrne's body would be waked at his parents' house before the funeral, special security measures were put in place. The funeral was held at the Church of St Nicholas of Myra, Francis Street. Gardaí checked the church before and after the ceremony for explosives but the funeral passed without incident and the hearse went to Mount Jerome Cemetery.
Investigation
One line of investigation is that the shooting was in revenge for the murder of Gary Hutch in Spain in September 2015.
Shortly after the shooting a call was placed to the BBC saying that the Continuity IRA had carried out the attack because Byrne had been involved in the killing of Alan Ryan four years before; however, the Continuity IRA later stated that it was not responsible.
Legal
On 18 May 2016 Patrick Hutch, the brother of Gary Hutch, was charged at the Criminal Courts of Justice with the murder of David Byrne. There was no application for bail; the defendant was granted legal aid and remanded to appear in Clover Hill District Court on 25 May. The trial of Patrick Hutch for murder and possession of firearms was later set for January 2018 at the non-jury Special Criminal Court; he was denied bail. On 20 February 2019, all charges against Patrick Hutch were dropped and he walked free from court.
In October 2019 the High Court ordered the Director of Public Prosecutions to provide transcripts of the collapsed trial to the Garda Síochána Ombudsman Commission. Jonathan Dowdall, a former Sinn Féin counciller, was subsequently charged with the Regency murder.
In April 2021, Gerry Hutch became the subject of a European Arrest Warrant as Gardaí said they had enough evidence to charge him with murder in connection with the shooting of David Byrne. The EAW was issued after the Director for Public Prosecutions moved that he be charged with murder and tried before the Special Criminal Court. He is also likely to face other charges, such as attempted murder and possession of firearms. An investigation file was submitted by Garda detectives based in Ballymun to the DPP late in 2020.
In April 2021 three men appeared in court in relation to the shooting. In August 2021 Gerry Hutch was arrested in Spain on foot of the European Arrest Warrant in connection with the shooting. In September 2021 Gerry Hutch was extradited to the Republic of Ireland and charged with the murder of David Byrne.
On 28 September 2022 both Jonathan Dowdall and his father Patrick pleaded guilty to facilitating the murder of David Byrne.
On 3 October 2022 the Special Criminal Court was told that Jonathan Dowdall was willing to be a witness in the Regency shooting trial. The trial was adjourned for a week. Though Dowdall had been convicted of facilitating the murder, the charge of murder against him had been dropped. Dowdall is under Garda protection and is being assessed for the witness protection programme.
In April 2023 Gerry Hutch was acquitted of the murder of David Byrne.
Aftermath
The hotel was renamed the Bonnington in October 2017. The renaming had been considered before the shooting, but the process was accelerated after it.
|
WIKI
|
Talk:Spring Hill, Pike County, Alabama
THE AFRICAN AMERICAN YOUNGBLOOD FAMILY FROM TROY ALABAMA
Can anyone tell me anything about Jefferson Youngblood and Hattie White-Shirley Youngblood and their many children from Crenshaw, Pike County Alabama ? Also Brantley Alabama? 2603:7080:9802:C586:D430:C8F5:427A:97EC (talk) 17:55, 17 March 2023 (UTC)
|
WIKI
|
How to Install a Water Shutoff Valve
Basin siphon or sink drain in a bathroom, clean
Vladdeep / Getty Images
Compression water shutoff valve
The Spruce
There are several types of water shutoff valves, or stop valves, designed for different kinds of pipe. There are also a few different valve configurations, including standard straight, angled (angle stop), and in-line. Shutoff valves are commonly available for installation on copper, CPVC, galvanized steel, and PEX pipe or tubing. They allow you to turn off the water supply to a single fixture and are conveniently located near the fixture.
Removing the Old Valve
To install a shutoff valve, you have to start by shutting off the main water supply to the entire house. Then, remove the old valve as follows:
1. Position a Bucket
Place a bucket under the valve to capture water.
2. Remove the Valve
Hold the valve body with one adjustable wrench, and loosen the valve's compression nut with a second adjustable wrench. Unthread the nut all the way, and remove the valve from the end of the pipe.
3. Remove the Compression Sleeve
Remove the old brass compression sleeve from the pipe. If the sleeve is stuck, use tongue-and-groove pliers to carefully twist the sleeve off of the pipe. If the sleeve is not easily removed by the pliers, you can also use a compression sleeve puller or cut off the pipe below the sleeve.
4. Clean the Pipe
Clean the exterior of the pipe by gently sanding with fine emery cloth. Now you are ready to install a new valve.
Here are the basic installation steps for five common types of water shutoff valves.
Compression Shutoff Valve
Multi-turn compression shutoff valve
Home-cost.com/Brasscraft
Shutoff valves with compression fittings are used with copper pipe and are installed with two adjustable wrenches.
1. Put on the Compression Nut
Slide the compression nut onto the pipe with the threads of the nut facing the end of the pipe.
2. Add the Compression Sleeve
Slide the compression sleeve onto the pipe, so it is at least 1 inch from the end.
3. Push on the Valve
Push the valve onto the pipe, so the pipe is fully seated inside the valve body.
4. Slide the Sleeve and Nut
Slide the compression sleeve up against the threaded inlet of the valve. Then, slide the compression nut over the sleeve and onto the threaded inlet while keeping the pipe fully seated in the valve.
5. Hand-Tighten the Nut
Hand-tighten the compression nut until it is snug.
6. Tighten With a Wrench
Hold the valve body with one adjustable wrench, and tighten the compression nut with a second adjustable wrench about 3/4 of a turn.
7. Verify That the Valve Is Closed
Make sure the valve is closed by turning its handle clockwise until it stops. If the valve has a lever handle, turn the lever so it is perpendicular to the valve body and pipe.
8. Turn on the Water
Turn on the main water supply, and check for leaks at the shutoff valve.
Copper Sweat/Solder Shutoff Valve
Sweat shutoff valve
Home-cost.com/Brasscraft
A sweat (soldered) fitting is used only with rigid copper and requires a traditional soldered connection using a propane torch and solder.
1. Remove the Handle and Washer Assembly
Remove the handle and washer assembly from the new shutoff valve. This will prevent the washers from being damaged by heat.
2. Clean the Pipe and Valve Body
Clean the outside portion of the pipe and the inside of the shutoff valve body fitting seat (the part that receives the copper pipe) with fine emery cloth.
3. Apply Flux
Apply flux to the outside of the pipe and the inside of the fitting seat.
4. Attach the Valve Body to the Pipe
Fit the valve body onto the pipe, and twist it back and forth to evenly distribute the flux between the pipe and the fitting seat.
5. Heat the Fitting
Heat all sides of the fitting with a propane torch. Periodically check the joint temperature by touching the end of the solder to the pipe surface at the joint. When the solder turns liquid and flows freely, the joint is sufficiently hot.
6. Apply Solder Into the Joint
Apply solder into the joint around the pipe while continuing to apply heat.
7. Stop Heating and Wipe the Area
Remove the flame from the joint, and wipe the valve with a damp cloth to clean its finish while the pipe joint is still hot. Do not move the parts until the solder hardens.
8. Add the Handle and Washer Assembly
Reinstall the valve washer assembly and handle.
9. Verify That the Valve Is Closed
Make sure the valve is closed by turning its handle clockwise until it stops. If the valve has a lever handle, turn the lever so it is perpendicular to the valve body and pipe.
10. Turn on the Water
Turn on the main water supply, and check for leaks at the shutoff valve.
Push-On Shutoff Valve
Push on shutoff valve
Home-cost.com/Brasscraft
Push-on fittings are compatible with copper, PEX, and CPVC water supply pipe. They require a clean square cut on the end of the pipe.
1. Cut the Pipe
Cut the end of the pipe using an appropriate type of tubing cutter.
2. Smooth and Clean the Cut End
Deburr (smooth) the cut end using a deburring tool, and then clean the pipe as needed. The pipe end must be squarely cut, clean, and smooth to ensure a good connection with the push-on valve.
3. Mark the Pipe
Measure and mark the pipe at the manufacturer's specified depth dimension (typically about 1 inch from the end of the pipe). This mark indicates how far the valve must be pushed onto the pipe to be fully seated.
4. Push on the Valve
Push the valve onto the pipe until it reaches the depth marking, indicating it is fully seated. Push-in fittings typically include a preinstalled (but removable) stiffener for PEX tubing. The stiffener must be in place for PEX installations and does not need to be removed for copper or CPVC pipe.
5. Verify That the Valve Is Closed
Make sure the valve is closed by turning its handle clockwise until it stops. If the valve has a lever handle, turn the lever so it is perpendicular to the valve body and pipe.
6. Turn on the Water
Turn on the main water supply, and check for leaks at the shutoff valve.
FIP Iron Pipe Shutoff Valve
Iron pipe or FIP valve shutoff
Home-cost.com/Brasscraft
Iron pipe valves have threaded (FIP) fittings for use with galvanized steel water supply pipe.
1. Apply Plumber's Tape
Apply plumber's tape thread sealant or pipe dope to the threads on the end of the pipe.
2. Thread the Valve
Thread the shutoff valve onto the pipe.
3. Tighten the Connection
Hold the valve body steady with one adjustable wrench, and use a second adjustable wrench to tighten the valve connection. The outlet of the valve should face in the desired direction when the valve is tight.
4. Verify That the Valve Is Closed
Make sure the valve is closed by turning its handle clockwise until it stops. If the valve has a lever handle, turn the lever so it is perpendicular to the valve body and pipe.
5. Turn on the Water
Turn on the main water supply, and check for leaks at the shutoff valve.
PEX Barbed Shutoff Valve
PEX shutoff valve
Home-cost.com/Brasscraft
Barbed PEX shutoff valves are designed specifically for PEX tubing and require a PEX crimping tool.
1. Make a Square Cut
Make a clean square cut on the end of the PEX tubing using a PEX tubing cutter.
2. Add a Brass Crimp Ring
Slide a brass crimp ring onto the PEX tubing.
3. Insert the Valve
Insert the barbed end of the shutoff valve into the PEX tubing until the tubing completely stops at the valve body.
4. Position the Crimp Ring
Position the crimp ring over the barbed area, and crimp the ring with a PEX crimping tool following the manufacturer's directions.
5. Verify That the Valve Is Closed
Make sure the valve is closed by turning its handle clockwise until it stops. If the valve has a lever handle, turn the lever so it is perpendicular to the valve body and pipe.
6. Turn on the Water
Turn on the main water supply, and check for leaks at the shutoff valve.
|
ESSENTIALAI-STEM
|
This is a live mirror of the Perl 5 development currently hosted at https://github.com/perl/perl5
Always defining PERLIO_TERM, even if it's empty, makes for a simpler
[perl5.git] / dosish.h
CommitLineData
d6376244
JH
1/* dosish.h
2 *
4bb101f2
JH
3 * Copyright (C) 1993, 1994, 1996, 1997, 1998, 1999,
4 * 2000, 2001, 2002, by Larry Wall and others
d6376244
JH
5 *
6 * You may distribute under the terms of either the GNU General Public
7 * License or the Artistic License, as specified in the README file.
8 *
9 */
79072805 10#define ABORT() abort();
a0d0e21e 11
137443ea 12#ifndef SH_PATH
55497cff 13#define SH_PATH "/bin/sh"
137443ea 14#endif
55497cff
PP
15
16#ifdef DJGPP
3fe9a6f1
PP
17# define BIT_BUCKET "nul"
18# define OP_BINARY O_BINARY
b0891165 19# define PERL_SYS_INIT(c,v) MALLOC_CHECK_TAINT2(*c,*v) Perl_DJGPP_init(c,v)
933fea7f 20# define init_os_extras Perl_init_os_extras
39e571d4
ML
21# define HAS_UTIME
22# define HAS_KILL
23 char *djgpp_pathexp (const char*);
b8f06700 24 void Perl_DJGPP_init (int *argcp,char ***argvp);
39e571d4
ML
25# if (DJGPP==2 && DJGPP_MINOR < 2)
26# define NO_LOCALECONV_MON_THOUSANDS_SEP
27# endif
273cf8d1 28# define PERL_FS_VER_FMT "%d_%d_%d"
3fe9a6f1 29#else /* DJGPP */
3fe9a6f1 30# ifdef WIN32
b0891165 31# define PERL_SYS_INIT(c,v) MALLOC_CHECK_TAINT2(*c,*v) Perl_win32_init(c,v)
23f519f0 32# define PERL_SYS_TERM() Perl_win32_term()
3fe9a6f1
PP
33# define BIT_BUCKET "nul"
34# else
2986a63f 35# ifdef NETWARE
b0891165 36# define PERL_SYS_INIT(c,v) MALLOC_CHECK_TAINT2(*c,*v) Perl_nw5_init(c,v)
728c2768 37# define BIT_BUCKET "nwnul"
2986a63f 38# else
b0891165 39# define PERL_SYS_INIT(c,v) MALLOC_CHECK_TAINT2(*c,*v)
2986a63f
JH
40# define BIT_BUCKET "\\dev\\nul" /* "wanna be like, umm, Newlined, or somethin?" */
41# endif /* NETWARE */
3fe9a6f1
PP
42# endif
43#endif /* DJGPP */
55497cff 44
23f519f0 45#ifndef PERL_SYS_TERM
6cb8cb21 46# define PERL_SYS_TERM() HINTS_REFCNT_TERM; OP_REFCNT_TERM; PERLIO_TERM; MALLOC_TERM
23f519f0 47#endif
8cc95fdb 48#define dXSUB_SYS
c07a80fd 49
55497cff
PP
50/*
51 * 5.003_07 and earlier keyed on #ifdef MSDOS for determining if we were
52 * running on DOS, *and* if we had to cope with 16 bit memory addressing
53 * constraints, *and* we need to have memory allocated as unsigned long.
54 *
55 * with the advent of *real* compilers for DOS, they are not locked together.
56 * MSDOS means "I am running on MSDOS". HAS_64K_LIMIT means "I have
57 * 16 bit memory addressing constraints".
58 *
59 * if you need the last, try #DEFINE MEM_SIZE unsigned long.
60 */
61#ifdef MSDOS
7e4e8c89
NC
62# ifndef DJGPP
63# define HAS_64K_LIMIT
64# endif
55497cff
PP
65#endif
66
e6aa3164
PP
67/* USEMYBINMODE
68 * This symbol, if defined, indicates that the program should
16fe6d59 69 * use the routine my_binmode(FILE *fp, char iotype, int mode) to insure
e6aa3164
PP
70 * that a file is in "binary" mode -- that is, that no translation
71 * of bytes occurs on read or write operations.
72 */
73#undef USEMYBINMODE
74
61bb5906
CB
75/* Stat_t:
76 * This symbol holds the type used to declare buffers for information
77 * returned by stat(). It's usually just struct stat. It may be necessary
78 * to include <sys/stat.h> and <sys/types.h> to get any typedef'ed
79 * information.
80 */
c623ac67 81#if defined(WIN64) || defined(USE_LARGE_FILES)
a810272a
NS
82# if defined(__BORLANDC__) /* buk */
83# include <sys\stat.h>
84# define Stat_t struct stati64
85# else
c623ac67 86#define Stat_t struct _stati64
a810272a 87# endif
c623ac67 88#else
2e64bfdb
JH
89#if defined(UNDER_CE)
90#define Stat_t struct xcestat
91#else
61bb5906 92#define Stat_t struct stat
c623ac67 93#endif
2e64bfdb 94#endif
61bb5906 95
e6aa3164
PP
96/* USE_STAT_RDEV:
97 * This symbol is defined if this system has a stat structure declaring
98 * st_rdev
99 */
100#define USE_STAT_RDEV /**/
101
102/* ACME_MESS:
103 * This symbol, if defined, indicates that error messages should be
104 * should be generated in a format that allows the use of the Acme
105 * GUI/editor's autofind feature.
106 */
107#undef ACME_MESS /**/
108
44a8e56a
PP
109/* ALTERNATE_SHEBANG:
110 * This symbol, if defined, contains a "magic" string which may be used
111 * as the first line of a Perl program designed to be executed directly
112 * by name, instead of the standard Unix #!. If ALTERNATE_SHEBANG
113 * begins with a character other then #, then Perl will only treat
d1be9408 114 * it as a command line if it finds the string "perl" in the first
44a8e56a
PP
115 * word; otherwise it's treated as the first line of code in the script.
116 * (IOW, Perl won't hand off to another interpreter via an alternate
117 * shebang sequence that might be legal Perl code.)
118 */
119/* #define ALTERNATE_SHEBANG "#!" / **/
120
a3526348
SH
121#include <signal.h>
122
a0d0e21e
LW
123/*
124 * fwrite1() should be a routine with the same calling sequence as fwrite(),
125 * but which outputs all of the bytes requested as a single stream (unlike
126 * fwrite() itself, which on some systems outputs several distinct records
127 * if the number_of_items parameter is >1).
128 */
129#define fwrite1 fwrite
130
a0d0e21e 131#define Fstat(fd,bufptr) fstat((fd),(bufptr))
05af4e39
PFI
132#ifdef DJGPP
133# define Fflush(fp) djgpp_fflush(fp)
134#else
135# define Fflush(fp) fflush(fp)
136#endif
8cc95fdb 137#define Mkdir(path,mode) mkdir((path),(mode))
3fe9a6f1
PP
138
139#ifndef WIN32
140# define Stat(fname,bufptr) stat((fname),(bufptr))
141#else
2d7a9237
GS
142# define HAS_IOCTL
143# define HAS_UTIME
144# define HAS_KILL
145# define HAS_WAIT
b990f8c8 146# define HAS_CHOWN
3fe9a6f1 147#endif /* WIN32 */
7da0e383
RGS
148
149/*
150 * <rich@phekda.freeserve.co.uk>: The DJGPP port has code that converts
151 * the return code of system() into the form that Unixy wait usually
152 * returns:
153 *
154 * - signal number in bits 0-6;
155 * - core dump flag in bit 7;
156 * - exit code in bits 8-15.
157 *
158 * Bits 0-7 are always zero for DJGPP, because it uses system().
159 * See djgpp.c.
160 *
161 * POSIX::W* use the W* macros from <sys/wait.h> to decode
162 * the return code. Unfortunately the W* macros for DJGPP use
163 * a different format than Unixy wait does. So there's a mismatch
164 * and, say, WEXITSTATUS($?) will return bogus values.
165 *
166 * So here we add hack to redefine the W* macros from DJGPP's <sys/wait.h>
167 * to work with our return-code conversion.
168 */
169
170#ifdef DJGPP
171
172#include <sys/wait.h>
173
174#undef WEXITSTATUS
175#undef WIFEXITED
176#undef WIFSIGNALED
177#undef WIFSTOPPED
178#undef WNOHANG
179#undef WSTOPSIG
180#undef WTERMSIG
181#undef WUNTRACED
182
183#define WEXITSTATUS(stat_val) ((stat_val) >> 8)
184#define WIFEXITED(stat_val) 0
185#define WIFSIGNALED(stat_val) 0
186#define WIFSTOPPED(stat_val) 0
187#define WNOHANG 0
188#define WSTOPSIG(stat_val) 0
189#define WTERMSIG(stat_val) 0
190#define WUNTRACED 0
191
192#endif
a5f78619
AD
193
194/* Don't go reading from /dev/urandom */
195#define PERL_NO_DEV_RANDOM
|
ESSENTIALAI-STEM
|
Gnaphalodes
Gnaphalodes trachyderoides is a species of beetle in the family Cerambycidae, the only species in the genus Gnaphalodes. It is found in the southern United States, Mexico, and Central America.
|
WIKI
|
Unicode Utilities: Confusables
help | character | properties | confusables | unicode-set | compare-sets | regex | bnf-regex | breaks | transform | bidi | idna | languageid
Input With this demo, you can supply an Input string and see the combinations that are confusable with it, using data collected by the Unicode consortium. You can also try different restrictions, using characters valid in different approaches to international domain names. For more info, see Data below.
Confusable Characters
2615
HOT BEVERAGE
𝅭
A4F81D16D
LISU LETTER TONE MYA TIMUSICAL SYMBOL COMBINING AUGMENTATION DOT
ԁ
050113E7146FA4D2
CYRILLIC SMALL LETTER KOMI DECHEROKEE LETTER TSUCANADIAN SYLLABICS KOLISU LETTER PHA
212E
ESTIMATED SYMBOL
Total raw values: 8
Confusable Results
☕𝅭ԁ℮ ☕𝅭ꓒ℮ ☕𝅭Ꮷ℮ ☕𝅭ᑯ℮ ☕ꓸꓒ℮
Total filtered values: 5
Data
Confusable characters are those that may be confused with others (in some common UI fonts), such as the Latin letter "o" and the Greek letter omicron "ο". Fonts make a difference: for example, the Hebrew character "ס" looks confusingly similar to "o" in some fonts (such as Arial Hebrew), but not in others. See also unaccented Latin Characters..
The data for confusables and restrictions is from UTS39. You can suggest additions or changes to the Unicode data for future versions of that standard.
For more information on the use of the data, see proposed updates Unicode Security Mechanisms and Unicode Security Considerations.
The restrictions are purely on a character level. For a more detailed view, see idna.
Caveats
The Unicode data is designed for testing, not enumerating, so not all combinations are generated in this demo; In particular, where a character is confusable with a sequence, not all combinations are generated.
Fonts and Display. If you don't have a good set of Unicode fonts (and modern browser), you may not be able to read some of the characters. Some suggested fonts that you can add for coverage are: Noto Fonts site, Unicode Fonts for Ancient Scripts, Large, multi-script Unicode fonts. See also: Unicode Display Problems.
Version 3.8; ICU version: 60.0.1.0; Unicode version: 10.0.0.0
|
ESSENTIALAI-STEM
|
Does Keto Actually Cause You To Burn More Fat?
Article-at-a-Glance
• Keto diets focus on high fat intake with the belief that it enhances the body’s fat burning.
• Despite claims, the body on a keto diet primarily burns the dietary fat consumed, not stored body fat.
• Ketosis does not confer any special fat-burning advantages; weight loss is tied to calorie deficit.
• Reduced appetite and limited food choices on keto can lead to easier calorie control for some people.
• Ultimately, long-term weight loss success is about sustainable habits, not the diet’s macronutrient composition.
The Claim
Now, let us begin by talking about what we always hear: the keto diet is a fat melting powerhouse, right? Simply put, it is when you consume a lot of fats and reduce carbs that your body switches to a machine for burning fats. But what exactly happens on your plate and in your body? Let’s embark on an excursion into the keto diet and its purported fat burning properties.
Keto diet’s high fat intake supposedly trains the body to burn more fat.
Imagine your body as if it were a fire. What it means is this; this type of diet suggests that when you add more fats like butter, oils, or avocados to this fire, it will start to burn fats with greater efficiency than before. This appears reasonable at face value but do our bodies really work like that?
Keto allegedly puts the body into a special fat-burning state.
When you eliminate most carbohydrates from meals consumed by an individual, the state called ketosis manifests itself. Within ketosis, since there aren’t enough carbohydrates available for energy use, the human system starts making ketones out of fatty acids. The belief that being in ketosis leads to round-the-clock burning of more body fat has emerged.
Keto is claimed to burn more fat than other diets with the same calorie content.
The keto community often suggests that this diet can help you lose more fat than other diets, even when you’re eating the same amount of calories. It’s as if keto has a secret weapon that other diets don’t. But is there truth to this, or is it just wishful thinking?
Why the Claims Are Wrong
The body does burn more fat on keto, but only the dietary fat consumed, not extra body fat.
Here’s the flip side: eating more fat means burning more fats–simply because fat is what’s obtainable. However big but, this doesn’t imply that you’re burning more fat from your own body. If the quantity of fat you consume is enough to meet your energy demand, then there would be no need for the body to touch its deposits of fats.
Ketosis, despite its popularity among keto followers, does not offer special fat-burning benefits.
Ketosis has a nice ring to it. It’s like the body has undergone some kind of mutation and it produces these things called ketones. But in reality, ketosis doesn’t mean that you are using stored body fat as a source of energy; it means only that your diet is supplying you with fat used for forming ketones.
What counts most is not just which macronutrients are burned for fuel when losing weight—it’s energy balance. If a person consumes more calories than they burn, they will gain weight, and if their caloric intake is lower than what they expend, they will lose weight regardless of whether those calories come from protein, carbohydrates or fats.
When calories are controlled between different diets regardless of the carbohydrate content found within them — changes in calorie intakes do not affect results in weight-loss interventions as seen in studies conducted on humans.
Well, two people can reach one destination by taking different paths. If you eat fewer calories than you burn—whether through high-carb or high-fat diets—you will lose weight. This has been backed by science and many studies have shown that there is no difference between low-carb and other types of diets rich in carbohydrates when calorie intake was matched. For those interested in marathon training understanding role nutrition diet periodisation crucial optimal performance?
The Silver Lining of Keto
Now, I’m not here to completely rain on the keto parade. There are some aspects of the diet that can be beneficial for certain people. It’s all about understanding what works for you and using that to your advantage. Let’s talk about some of the positives that keto dieters often report.
Some individuals experience reduced appetite on keto, leading to lower calorie consumption.
One of the most talked-about benefits of keto is the effect it can have on your appetite. Carbs, especially the refined and sugary kind, can cause blood sugar spikes and crashes that lead to hunger pangs. Since keto is low in carbs, some people find that they just aren’t as hungry, which makes cutting calories easier.
Keto restricts access to high-calorie, highly palatable foods, potentially reducing calorie intake.
By cutting out carbs, you’re also saying goodbye to a lot of high-calorie temptations like cakes, cookies, and sodas. This can naturally lead to a reduction in calorie intake. After all, it’s not just about eating the right things, but also about avoiding the wrong things that can add up to weight gain.
A sense of mental calm and stable mood on keto can improve diet adherence for some.
There’s also something to be said for the mental clarity and stability that some people find on keto. Without the ups and downs of sugar rushes, they feel more even-keeled, which can make sticking to a diet much easier. And when it comes to weight loss, consistency is key.
Best Practices Moving Forward
If you’re considering keto, remember it’s not a magic bullet. It’s a tool, and like any tool, it’s about how you use it. Let’s go over some best practices that can help you make the most of a keto diet—or any diet, for that matter.
• Focus on creating a calorie deficit. It’s the foundation of weight loss, no matter what you’re eating.
• Choose foods that help you feel full and satisfied, whether that’s fats on keto or fiber-rich carbs on other diets.
• Pay attention to your body’s signals. If you feel good and you’re losing weight, you’re on the right track.
• Don’t forget about exercise. It’s a crucial part of the weight loss equation.
• Plan for the long term. What will you do after keto? Make sure you have a strategy for maintaining your weight loss.
Because in the end, it’s not about the diet you choose, it’s about how you adapt it to fit your life. It’s about building habits that you can stick with, not just for weeks or months, but for life. That’s how you make real, lasting change.
And if keto helps you do that? Great. But if it doesn’t, that’s okay too. There are plenty of paths to a healthy lifestyle, and your job is to find the one that’s right for you.
Transitioning out of keto should be done intelligently, gradually reintroducing carbohydrates to maintain weight loss.
When it’s time to say goodbye to strict keto, don’t just dive back into a high-carb lifestyle. Reintroduce carbs slowly to avoid shocking your system and piling the pounds back on. This is also a great time to get acquainted with healthier carb sources like whole grains, fruits, and veggies. Remember, it’s not just about losing weight, it’s about finding a balanced diet you can enjoy for a lifetime.
Conclusion
When one thinks about stopping keto, however, one should not just take a plunge into a high-carb diet. Introducing carbohydrates slowly can prevent your body from being shocked and gaining weight again. It is also an opportunity to learn about other sources of carbs that are healthier like whole grains, fruits, and vegetables. So it’s more than just weight loss; get yourself a balanced diet that could work for you till the end.
Keto is not some magic pill but can be used by people who find it as an easier option. Just like any eating plan, it has its good and bad sides that need to be understood beforehand. The main point here is that keto may promote weight loss—not because it possesses magical fat-burning properties but because it might lead to reduced calorie intake in some individuals without causing hunger feelings.
In general, losing fat involves creating a calorie deficit through eating healthy rather than following a specific kind of a diet plan. The optimal nutrition strategy is the one allowing you to continue nourishing your body in future while maintaining adherence over time. Consequently, forget about looking for miracles and put emphasis on foundations plus long-term sustainability. Regardless if you are on the ketogenic or another type of low-carb/high-fat diets, the principles of fat loss remain same. Henceforth discover what suits you best and stick with it as you remember that health is journey which takes a lifetime unlike running.
• Eat fewer calories than your body burns to lose weight.
• Find a diet that helps you feel full and satisfied to make it easier to eat less.
• Listen to your body and adjust your diet according to how you feel and your weight loss progress.
• Exercise regularly to boost your calorie deficit and improve your overall health.
• Plan for the future and create a sustainable eating plan to maintain your weight loss after keto.
By understanding the facts and approaching your diet with a clear, realistic plan, you can make informed choices that lead to lasting health and happiness. So, let’s put the myths to bed and start working on what we know works: balance, moderation, and consistency. You’ve got this!
Post Tags :
Nutrition, Weight Loss
|
ESSENTIALAI-STEM
|
The Met has arranged with Le Poisson Rouge, the high-art cabaret space in Greenwich Village, to present two concerts.
Met Opera Concerts Set For Le Poisson Rouge
The Metropolitan Opera is going downtown. The Met has arranged with Le Poisson Rouge, the high-art cabaret space in Greenwich Village, to present two concerts based on Met productions of two contemporary operas: “The Tempest” by Thomas Adès and Nico Muhly’s “Two Boys.” The collaboration gives the Met some visibility in the slightly hipper, younger and more contemporary music scene, and adds big-institution luster to Le Poisson Rouge, which has become firmly established as a New York concert site. The Met often collaborates with major institutions like Juilliard, the Metropolitan Museum of Art and the Museum of Modern Art but rarely with such a small fish. “It seemed like a good idea, as a way of educating the audience and reaching out to a new audience, to have performances down there,” Peter Gelb, the Met’s general manager, said. Mr. Gelb said the first performance, on Oct. 26, would involve a few cast members of “The Tempest” and Mr. Adès as pianist performing scaled-down numbers from the opera. The concert will include works by Ives, Purcell, Stravinsky and Tippett, with other instrumentalists joining in, a spokesman later added. Mr. Muhly will play and program the second concert in May. Mr. Gelb said the Met was paying for the performances and would split the ticket take with Le Poisson Rouge.
|
NEWS-MULTISOURCE
|
User:LexBrown070/Evaluate an Article
Which article are you evaluating?
G. E. M. Anscombe
Why you have chosen this article to evaluate?
It was a piece of a larger work on Women In Philosophy. This particular woman caught my eye because she was active in Philosophy up until the year before I was born which I consider recent for Philosophical Literature.
Evaluate the article
The article seems to be well composed. The lead section is short, however, I find it to be encompassing without giving too much of the information away that will be discussed later. The content is filled with links and references which is especially included when referring to the topics previous works and the areas in Philosophy in which she focused most of her attention on. Those topics are also linked and pop up to the correct Wiki page. I find that there are both primary and secondary sources that are all reputable throughout the page. It is written in a neutral tone; even when conveying the point of some written works of the subject, it conveys what the message was and no further. There is an image of the subject which flows nicely with the rest of the page, there is also an image of texts that was referenced and the page is well organized. There is a lot of activity in the talk page and edits were taken into consideration.
The article qualifies as being well developed. Strengths are that the article seems to have little to no pieces of missing information. There is a reference to one of the books written by the subject that has no Wiki Page assigned to it and that is an area that can use some improvement.
|
WIKI
|
Wall Street Journal: GOP victory in Alabama may be more costly than defeat | TheHill
The Wall Street Journal is warning in a new editorial that a victory by GOP candidate Roy Moore in the Alabama Senate race could be "more costly than a defeat." The Journal's editorial board writes that "Republicans have an unusual political problem in Alabama." "Their candidate may win," the editorial says. Moore is facing multiple allegations of sexual misconduct. A woman accused him of initiating a sexual encounter with her in 1979 when she was 14 and he was 32. Other women have come forward to allege Moore pursued relationships with them or touched them inappropriately when they were teenagers. The Journal's editorial board wrote that it finds "evidence and the testimony of the other women persuasive" even if it is "generally skeptical about trial by newspaper." "But this is an election, not a trial, and voters have to make decisions in these imperfect circumstances," the editorial says. The editorial says Alabama voters should consider that there are "strong moral and practical reasons" to reject Moore. The editorial board said the slim GOP Senate majority explains the "unfortunate decision" by President Trump earlier this week to endorse Moore. "But victory would come at considerable cost," the editorial says. "The Senate would be obliged to seat him, and the allegations would surely be referred immediately to the Ethics Committee, which is already vetting the sexual misconduct of Minnesota Democrat Al FrankenAlan (Al) Stuart FrankenNative American advocates question 2020 Democrats' commitment Reid says he wishes Franken would run for Senate again Al Franken urges Trump to give new speech after shootings: 'Try to make it sound like you're sincere, even if you're not' MORE." It warns that if Moore becomes a senator, the media will "hang him around the neck of every Republican candidate as Democrats try to drive turnout among women and dispirit GOP voters." The editorial board said it understands the "fix" Alabamians are in. "Especially with a Democratic candidate who better fits California than what may be the country’s most conservative state. This is an example of how the country could benefit if Democrats still had an anti-abortion or moderate wing," it says. "But no election is forever, and the winner next week will have to run again in 2020 for a full six-year term. Alabama Republicans would get another chance at Mr. Jones, but if they elect Mr. Moore they might be stuck with him for a very long time." After the allegations surfaced last month, multiple Republicans called for Moore to step aside in the race. Trump earlier this week called Moore to endorse him in the election, which is scheduled to be held next week. The Republican National Committee also reinstated its support for the candidate after initially cutting ties. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
|
NEWS-MULTISOURCE
|
Gesomyrmex incertus
Gesomyrmex incertus is an extinct species of formicid in the ant subfamily Formicinae known from a fossil found in eastern Asia.
History and classification
Gesomyrmex incertus is known from a single ant found in Russia. The specimen was described from a compression fossil preserved in diatomite deposits of the Bol’shaya Svetlovodnaya site. The site is exposed on the bank of Barachek Creek 3 km upstream from the creeks confluence with the Bol’shaya Svetlovodnaya River in the Pozharsky District, on the Pacific Coast of Russia. The fossil-bearing rocks preserve possibly Priabonian plants and animals which lived in and around a small lake near a volcano. The site has been attributed to either the Maksimovka or Salibez Formations and compared to the Bembridge Marls and Florissant Formation, both of which are Priabonian in age.
At the time of description, the part and counterpart holotype specimen, PIN 3429/1183 & PIN 3429/1164 was preserved in the A. A. Borissiak Paleontological Institute collections, part of the Russian Academy of Sciences. The fossil, an isolated head of a queen, was first described by the trio of paleomyrmecologists Gennady Dlussky, Alexandr Rasnitsyn, and Ksenia Perfilieva. In the type description, Dlussky, Rasnitsyn, and Perfilieva named the species G. incertus, with the specific epithet derived from the Latin incertus meaning "doubtful".
Gesomyrmex incertus is distinguished from the other two species of Gesomyrmex described from Bol’shaya Svetlovodnaya in several ways. With a 4.2 mm long head, the queen of Gesomyrmex magnus is much larger than the single G. intertus queen. Gesomyrmex macrops is distinguished from G. intertus in that the queen has a much larger eye diameter to head length than either other species. The shape of the rear edge of the G. intertus head capsule along with the elongated head is unique among the Gesomyrmex species.
Description
The head of the holotype queen is approximately 2.4 mm long by 1.6 mm wide. The rectangular head capsule has sides that are almost parallel to each other and ending at rounded back corners. Unlike the other species of Gesomyrmex, the back edge is concave in profile and the sides of the head are faintly concave. The mandibles have four total teeth on the chewing margins.
|
WIKI
|
Soyuz TMA-22
Soyuz TMA-22 was a crewed spaceflight to the International Space Station (ISS). TMA-22 was the 111th flight of a Soyuz spacecraft, and transported three members of the Expedition 29 crew to the ISS. The spacecraft docked to the ISS on 16 November 2011, and remained docked to serve as an emergency escape vehicle until its undocking on 27 April 2012. Soyuz TMA-22 successfully landed in Kazakhstan on 27 April 2012 11:45 GMT.
TMA-22 was the final flight of a Soyuz-TMA vehicle, following the design's replacement by the modernized TMA-M series. The launch of Soyuz TMA-22 was originally scheduled for 30 September 2011, but was delayed until 14 November following the launch failure of the Progress M-12M resupply vehicle on 24 August 2011. Soyuz TMA-22 was the first crewed mission to dock with the ISS since the Retirement of the American Space Shuttle fleet at the end of the STS-135 mission in July 2011.
Rescheduling of launch
Soyuz TMA-22's launch was rescheduled from late September 2011 to 14 November, due to the failed launch of the uncrewed Progress M-12M cargo spacecraft on 24 August 2011. The incident was caused by a blocked fuel line leading to the gas generator of the third-stage RD-0110 engine of the spacecraft's Soyuz-U booster. After the loss of Progress M-12M, all Russian crewed spaceflights were temporarily suspended, due to the similarities between the failed engine and the third-stage engine in use on the crewed Soyuz-FG booster. A Russian commission blamed the Progress M-12M failure on a single human error, and put additional procedures in place to prevent the problem from recurring. On 30 October 2011, Russia successfully launched the uncrewed Progress M-13M cargo spacecraft atop a Soyuz-U booster, clearing the way for the Soyuz TMA-22 launch.
Launch
Soyuz TMA-22 was launched on schedule from the Gagarin's Start launchpad at Baikonur Cosmodrome, Kazakhstan, at 04:14:03 UTC on 14 November 2011. Soyuz Commander Shkaplerov sat in the Soyuz's center seat, with flight engineer Ivanishin strapped in to his left and NASA astronaut Burbank sitting to his right. The Soyuz-FG rocket carrying Soyuz TMA-22 was launched in blizzard-like conditions, with high winds and temperatures as low as -5 °C. Nonetheless, conditions were deemed to be within acceptable parameters for launch.
The rocket followed a nominal ascent trajectory, and successfully inserted Soyuz TMA-22 into orbit approximately nine minutes after the launch. Once in orbit, the spacecraft deployed its two solar panels and communications antennas as planned.
Docking
Soyuz TMA-22 docked with the ISS at 05:24 GMT on 16 November 2011, about nine minutes earlier than planned. The spacecraft docked at the MRM-2 Poisk module, while Soyuz TMA-22 and the ISS were flying 400 km above the southern Pacific Ocean. The Soyuz crew entered the ISS at around 6:39 GMT, and were greeted by Expedition 29 crewmembers Mike Fossum, Sergei Volkov and Satoshi Furukawa. Burbank, Shkaplerov and Ivanishin received congratulatory satellite calls from Russian dignitaries and family members before participating in a safety briefing led by Expedition 29 commander Fossum.
Deorbit
Soyuz TMA-22 undocked from the ISS on 27 April 2012 at 8:15 AM (GMT), carrying Burbank, Shkaplerov and Ivanishin, and landed safely near Arkalyk, Kazakhstan, at 11:45 AM the same day. The spacecraft's departure ended Expedition 30, and left astronauts Oleg Kononenko, André Kuipers and Don Pettit aboard the station to begin Expedition 31.
|
WIKI
|
Talk:Xiahou Ba
Reference
When I expand the article (as of March 09, 2011), my primary source is the Brief History of Wei, and secondary sources being biographies of Guo Huai, Xiahou Xuan, and Xiahou Yuan from SGZ. I glanced though material from the biography of Jiang Wei and Liu Shan, and believe quotes can be made from it to implement Xiahou's later life as a Shu general, as I need to focus on something else and won't be available for a week, I leave this note here so people may have a direction on where to look at for citations.EkmanLi (talk) 06:21, 10 March 2011 (UTC)
|
WIKI
|
Talk:Yellowstone National Cemetery
Notables section
Section removed IAW WP standards. Cemetery articles often list people who meet WikiPedia Notability criteria, like Medal of Honor recipients. Otherwise the names lack referencing. WP is WP:NOTMEMORIAL. – S. Rich (talk) 15:56, 14 April 2021 (UTC)
|
WIKI
|
Oscars 2019: Show needs a host
Bill Carter, a media analyst for CNN, covered the television industry for The New York Times for 25 years, and has written four books on TV, including The Late Shift and The War for Late Night. The opinions expressed in this commentary are his own. The Hollywood Reporter ran a fascinating quiz last week: It asked a random sample of about 2,200 adults a simple question: What movie took home the Best Picture Oscar last year? A not-so whopping 20% of respondents got the right answer: "The Shape of Water." By far the biggest response, 58%, was: no clue. Likely the reason is that a very high percentage of those 2,200 adults had not gone to the movies to see "The Shape of Water." (I tried the quiz out on a range of friends and colleagues: Out of approximately 10 people, only one got the film right, though another suggested it might have been "the one about the fish-man.") It is probably too late for this information to mean anything to the producers of the upcoming Oscars show on February 24, but there are a couple of messages screaming out loud in these results: 1. Don't count on the appeal of the year's best picture to pull in hordes of viewers, because the odds are very high that few people are going to have seen that movie. And 2. Why on earth would it be a good idea to skip having somebody host the event this year? The trend has been all but cemented over the past decade or so that the year's big honors have gone to beautifully crafted, smaller-budget films, ones that used to be called "arthouse movies." Unsurprisingly, along with that trend has come a precipitous decline in the size of the audience for the Oscars show, which plummeted to a new and alarming low last year of 26.5 million viewers, down almost 20% from the year of the envelope fiasco. This year might be different because a few movies that qualify as hits — "Black Panther," "A Star Is Born," "Bohemian Rhapsody," and "Mary Poppins Returns" — will likely win nominations. But the rest of the lineup will likely include a familiar assortment of smaller returns, critically praised little gems: "Green Book," "BlacKkKlansman," "The Favourite," and "If Beale Street Could Talk." A movie in a foreign language, "Roma," might even win — that's never happened before. And almost nobody went to the movies to see that one because it's available on Netflix. The winnowing of the Oscars audience is probably impossible to stem, no matter what the Academy does, and it is trying some ideas this year, like giving some less prominent awards away during commercial breaks, and promising yet again to cut down on the show's bloated length (3 hours, 50 minutes last year.) Too many people just find the show both irrelevant and boring now. Making things even worse, it is now strongly expected that the Academy will have the show go host-less this year. It would be a fallback plan, of course. The initial choice for the role, Kevin Hart, was devoured by his own history of ugly "comedy" on gay themes. The process went totally quiet after Hart stepped down, though there had to be frantic discussions for weeks in elegant Beverly Hills boites about who could be induced to step in late, and who might fulfill another suspected new requirement of no edgy material (as in: cutting political jokes, slashing jokes about stars and their peccadillos, pointed jokes about sensitive Hollywood topics like sexual harassment) — thanks to a sense that it doesn't play widely with the Oscars audience. Given the timing and the strictures, maybe it's no shock that a different host never turned up in the audition room. But the idea that it wouldn't help the broadcast to have a name host with proven appeal is counterintuitive. Anything entertaining would help the broadcast. It's not as though it is impossible to think of candidates who might pique the interest of viewers who've sworn off the Oscars habit. Some names come to mind quickly. How about Tina Fey and Amy Poehler, who've killed at the Golden Globes? Or either separately? Or Amy with Maya Rudolph, who just killed again at the Globes? Will Ferrell and Kristen Wiig together? Jim Parsons is undeniably talented and maybe would help stem any lingering enmity over the unpleasant Kevin Hart business. Donald Glover has become an entertainment force; who wouldn't want to see him play host? (Maybe not the Academy if it's really committed to no ruffled feathers.) Melissa McCarthy has been a top movie comedy star for years, and she may be a nominee. How about Bryan Cranston, who can literally do anything? (OK, he's engaged on Broadway at the moment.) Dave Chappelle? Keegan-Michael Key? Jordan Peele? Or reunion of same? Is there any figure in the entertainment business more appealing right now than Lin-Manuel Miranda? He will be finished with his run as "Hamilton" in Puerto Rico in time to make it to the Oscars show — and he almost certainly will because the alternative to having one comedy-oriented host will likely be lots of people singing songs. He and Emily Blunt may do something from "Mary Poppins Returns" and Lady Gaga will surely be a presence singing from "A Star is Born." Maybe Rami Malek will sing with Queen, which would be a moment. There are indeed ways to survive this year host-less thanks to movies with a lot of built-in entertainment value. But the result will still be a party without a genuine host. The title does imply a real function: to welcome the guests, put them at ease and take charge of the event. That could mean stepping out front to cover for any untoward moments (there have been plenty of those at previous Oscars). And just being a warm and funny presence. It can be done. See: Billy Crystal, circa 1990, 1991, 1992, 1993, 1997, 1998, 2000, 2004 and 2012. And if he's interested.....
|
NEWS-MULTISOURCE
|
Talk:Riverdale Collegiate Institute
Façade was not maintained
"In the nineteen-nineties it was extensively renovated but the original facade was maintained." The façade may have been maintained beneath, but it looks entirely different outside. It does not look at all like the same school. The alumni page on Facebook has a picture of the building as it was when I attended school there. Not sure if this link will continue to work, but here is what it looked like. It looks nothing like the school as it is now. https://scontent-yyz1-1.xx.fbcdn.net/v/t1.0-9/53502715_10211244576745245_2741153019998502912_n.jpg?_nc_cat=111&ccb=2&_nc_sid=825194&_nc_ohc=hXP285AkH60AX_r-PK_&_nc_oc=AQlhHBt-1lg67U1Fscvvh4fDtPxyGGvlKIKegeW7HYPQEEWGFJ51hcAeo9Yy4qWWKcU&_nc_ht=scontent-yyz1-1.xx&oh=0bf3131324976799ae96eb5a28ee1f38&oe=6033A418 — Preceding unsigned comment added by DeepNorth (talk • contribs) 21:00, 23 January 2021 (UTC)
Untitled
Perhaps adding a clubs lists would be a good idea. Also, stubs for the bigger clubs/orgainizations (BAA, GAA, SKYA)
Frequent vandalism
This page is fequently vandalised by (presumably Riverdale) Students who attempt to delete sections off the page, most commonly trying to remove all references to Jefferies Williams, despite His acalimed status as a Canadian snake-tamer. <IP_ADDRESS> (talk) 19:34, 27 February 2023 (UTC)
|
WIKI
|
the united states food administration was created in 1917 and was watched over by herbert hoover. the united states food administration was a campaign that encouraged the united states citizens to change their eating habits so that they could have enough food to supply and feed the u.s soldiers and citizens in europe. the administrations jobs was to watch over the amount of food they have stocked overseas and made sure that there was enough to feed everyone, but because there were so many people to feed, they needed more food. that's why they made the campaign so they could have more food to support the people overseas.
the answer is c.
it wasn't just the sauks however, it was them, the meskwakis, and the kickapoos, they crossed the mississippi river into illinois, in 1832.
charlemagne's crowning made the byzantine emperor redundant, and relations between the east and the west deteriorated until a formal split occurred in 1054. the eastern church became the greek orthodox church by severing all ties with rome and the roman catholic church — from the pope to the holy roman emperor on down.
|
FINEWEB-EDU
|
Page:General History of Europe 1921.djvu/576
434 General History of Europe "deed of patriotism." One of the bands turned to the ancient fortress of the Bastille. The castle had long had a bad reputa- tion as a place of confinement for prisoners of State and for those imprisoned by "sealed letters." When the mob demanded admis- sion, it was naturally denied them, and they were fired upon and nearly a hundred were killed. After a brief attack the place was surrendered, and the mob rushed into the gloomy pile. They found only seven prisoners, but one poor fellow had lost his wits and another had no idea why he had been kept there for years. The captives were freed amidst great enthusiasm, and the people soon set to work to demolish the walls. The anniversary of the fall of the Bastille is still celebrated as the great national holiday of France. 754. Abolition of Feudalism, August, 1789. About the first of August news began to reach the National Assembly of the serious disorders in the provinces. In some cases the peasants burned the country houses of the nobles so as to destroy the registers enumerating the feudal dues. This led to the first important reforms of the Assembly. A momentous resolution abolishing the survivals of serfdom and other institutions of feu- dalism was passed in a night session (August 4-5) amid great excitement. The exclusive right of the nobility to hunt and to maintain pigeon houses was abolished, and the peasant was per- mitted to kill game which he found on his land. The tithes of the Church were done away with. Exemptions from the payment of taxes were abolished forever. All citizens, without distinction of birth, were thereafter to be eligible to any office. Moreover, all the peculiar privileges of the provinces were revoked and absorbed into the law common to all Frenchmen. All France was to have the same laws, and its citizens were henceforth to be treated in the same way by the State. The Assembly soon went a step farther in consolidating and unifying France. It wiped out the old provinces altogether, by dividing the whole country into districts of convenient size, called de- partments. These were much more numerous than the ancient divisions and were named after rivers and mountains. This obliterated from the map all reminiscences of the feudal disunion.
|
WIKI
|
Marti Anderson (statistician)
Marti J. Anderson is an American researcher based in New Zealand. Her ecological statistical works is interdisciplinary, from marine biology and ecology to mathematical and applied statistics. Her core areas of research and expertise are: community ecology, biodiversity, multivariate analysis, resampling methods, experimental designs, and statistical models of species abundances. She is a Distinguished Professor in the New Zealand Institute for Advanced Study at Massey University and also the Director of the New Zealand research and software-development company, PRIMER-e (Quest Research Limited).
Academic career
Marti J. Anderson completed a Bachelor of Arts (BA) in Biology at Occidental College in 1991, advised by Dr Gary Martin. She then pursued a Graduate Diploma of Science (Honours) in Zoology at the University of Sydney in Australia, going on to complete a PhD in Marine Ecology supervised by Professor Antony J. Underwood (completed in 1997). Following this, she was awarded a U2000 Postdoctoral Fellowship to continue her work in marine science as part of the Centre for Ecological Impacts of Coastal Cities at the University of Sydney. During this time, she also completed a Master of Arts (MA) in Mathematical Statistics supervised by Professor John Robinson (completed in 1999).
In 1999, she began a full-time academic position as Lecturer in the Department of Statistics at the University of Auckland, rising to Associate Professor in 2007. She was appointed to a Professorial Chair in Statistics at the Institute for Information and Mathematical Sciences (IIMS) at Massey University's Albany campus in 2009. She was the first woman to be appointed to a full-time Professorial position in New Zealand in any of the fields of Mathematics, Statistics or Computer Science.
She became a member of the Professoriate in the New Zealand Institute for Advanced Study (NZIAS) in 2011, and soon thereafter (2013), she was elected a Fellow of the Royal Society of New Zealand. In 2015 she was awarded a James Cook Research Fellowship for work on multivariate statistical models of ecological communities. She was awarded the title of Distinguished Professor by Massey University in 2018.
Marti J. Anderson is also the sole Director of the New Zealand research and software-development company PRIMER-e (Quest Research Limited).
Selected works
* Anderson, Marti, Ray N. Gorley, and Robert K. Clarke. Permanova+ for Primer: Guide to Software and Statisticl Methods. Primer-E Limited, 2008.
* Anderson, Marti, Ray N. Gorley, and Robert K. Clarke. Permanova+ for Primer: Guide to Software and Statisticl Methods. Primer-E Limited, 2008.
* Anderson, Marti, Ray N. Gorley, and Robert K. Clarke. Permanova+ for Primer: Guide to Software and Statisticl Methods. Primer-E Limited, 2008.
|
WIKI
|
Is a Much Needed Apple Inc. iPad mini Upgrade Coming Soon?
According to Apple site Macotakara , a next generation Apple iPad mini 4 may be coming soon. The device will reportedly feature the A8 processor found inside the iPhone 6 series as well as 802.11ac connectivity, upgrades from the A7 and 802.11n connectivity in the iPad mini 3.
In other words, it might finally be the iPad mini that should have launched back in October 2014.
Why didn't Apple use the A8 in the iPad mini 3 to begin with?
Perhaps a cynic might say that Apple did not include the A8 processor in the iPad mini 3, because it wanted to save something for a future device. That might be true, but I have an alternative explanation.
The A8 is built on a Taiwan Semiconductor 20-nanometer process, which was pretty new when the iPhone 6 launched. I would not be surprised if, to ensure enough supply for its much higher-margin (and higher volume) iPhone 6 devices, as well as the higher-margin iPad Air 2, the company kept the iPad mini lineup on more mature technology.
Given how little Apple seems to value the iPad mini lineup these days, this would not be at all surprising.
If Apple waited on the A8, making other big upgrades would not make sense
If Apple was not able to upgrade the processor in the iPad mini 3 in the October timeframe, then it makes sense from a number of perspectives to just keep the fundamental platform the same and upgrade it later when A8 supply is freed up.
Not only did this route save Apple research-and-development effort and resources that were likely better utilized on future iPads, but it also makes sense from a manufacturing cost perspective. Component prices usually come down each year, and if Apple can use largely the same components as it did in the previous model but sell the device for the same price, margins improve.
A newer iPad mini could help overall iPad sales
The current iPad mini stack (16 gigabyte models) is priced as follows:
iPad mini- $249
iPad mini 2- $299
iPad mini 3- $399
The original iPad mini is slow, has a very low resolution display, no touch ID, and is not a particularly good value in tablets. The iPad mini 2 is much faster and has a better display than the original iPad mini, but even then it is probably on the pricey side. The iPad mini 3 is almost comically priced given that it is an iPad mini 2 with Touch ID.
I love Touch ID, but it is hardly worth $100.
If Apple introduces a new iPad mini 4 with the aforementioned features (and maybe an updated industrial design), then the new product stack could look something like this:
iPad mini 2- $249
iPad mini 3- $299
iPad mini 4- $399
This stack, in my view, would be significantly more attractive. It would give users clear reason to buy the top end model, while also offering reasonable values at lower price points. Although by no means guaranteed, this stack could help give iPad sales -- which have posted year-over-year declines for several quarters now -- a much needed shot in the arm.
Wall Street hacks Apple's gadgets! (Investors, prepare to profit.)
Apple forgot to show you something at its recent event, but a few Wall Street analysts and the Fool didn't miss a beat: There's a small company that's powering Apple's brand-new gadgets. And its stock price has nearly unlimited room to run for early in-the-know investors. To be one of them, just click here !
The article Is a Much Needed Apple Inc. iPad mini Upgrade Coming Soon? originally appeared on Fool.com.
Ashraf Eassa has no position in any stocks mentioned. The Motley Fool recommends Apple. The Motley Fool owns shares of Apple. Try any of our Foolish newsletter services free for 30 days . We Fools may not all hold the same opinions, but we all believe that considering a diverse range of insights makes us better investors. The Motley Fool has a disclosure policy .
Copyright © 1995 - 2015 The Motley Fool, LLC. All rights reserved. The Motley Fool has a disclosure policy .
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
|
NEWS-MULTISOURCE
|
If You Get Sinus Headaches or Constant Congestion You Need To Check For This Hidden Connection
We have all been through the struggle known as ‘stubborn cold.’ It is the type of a cold that does not stop no matter how hard you try. Although you may free yourself of the soreness in your throat or the nasty chest pain, your stuffed nose seems to ‘enjoy’ bothering you till the end.
This congestion is usually normal, but sometimes it may be a sign of a sinus infection, otherwise known as sinusitis.
sinus
Acute sinusitis
Sinusitis is a common ailment in the States, and over 37 million Americans deal with it once in their lifetime. Sinus infection is a word that describes an inflammation or swelling of the lining in your sinuses. Sinuses in a healthy individual are filled with air, but any blockage with fluids and germs may result in infections.
Causes
● Nasal polyps
● Immune deficiency, immune-suppressant drugs and antibiotics
● Swelling of the nasal mucous membrane, usually triggered by allergic reactions or cold
● Blocked / Narrow drainage ducts
Symptoms:
● Fever
● Bad breath (Halitosis)
● Fatigue
● Toothache
● Facial pain/pressure
● Stuffy nose
● Nasal discharge
● Loss of smell
● Congestion and headache
The real truth about acute sinusitis
Although antibiotics are considered as the only way to treat acute sinusitis, bacteria are not the real cause of common sinus infections.
Experts believe that about 80% of all Americans deal with any form of candida overgrowth. This fungus is controlled by the bacteria in your gut. Considering that antibiotics also harm good bacteria, they also contribute to the overgrowth of the yeast that candida thrives on.
It is not easy to fight this pathogenic fungus because it creates a protective biofilm that is resistant to common antibacterial and antifungal drugs. They live in dark and moist environment. Pretty much like your nasal cavities, right?
Fungal sinusitis is often caused by bacteria overgrowth, although sometimes fungal sinusitis develops into polyps and causes thrush in the oral cavity and throat.
A 1999 study showed that allergic fungal sinusitis is common in patients with chronic rhinosinusitis, and it is usually subsided after regular antifungal and anti-inflammatory treatment.
Control your yeast
Take probiotics to provide your gut with the good bacteria it needs. This is the best way to prevent and control fungal overgrowth. Reduce your sugar intake and control your sweet tooth. Consider cutting down your intake of fungus-prone grains like corn and wheat. Find a good way to introduce coconut oil and apple cider vinegar to your diet. These both provide an excellent anti-fungal effect.
According to a group of Korean researchers, the skin of pumpkin seeds has Pr-2 proteins. These can aid in the fight against several types of candida, including the form that causes yeast-related diaper rash and vaginal yeast infection.
Clear your sinuses
Introduce some healthy changes to your dietary habits. Rinse your nose and oral cavity with a saline solution to get rid of the fungus from your sinuses.
Add half a teaspoon of each baking soda and sea salt to a cup of boiling water. Use a neti pot or sterile eye dropper to drain your sinuses every day.
You can also use the help of warm compresses. Apply them on your face. Inhale the steam of essential oils, preferably oils with anti-fungal properties, such as eucalyptus, thyme, tea tree or oregano. These will provide you a great relief.
Comments
|
ESSENTIALAI-STEM
|
Philips RC-MM Protocol
RC-MM was defined by Philips to be a multi-media IR protocol to be used in wireless keyboards, mice and game pads. For these purposes the commands had to be short and have low power requirements.
Whether the protocol is actually used for these purposes today is unknown to me. What I do know is that some Nokia digital satellite receivers used the protocol (9800 series).
Features
• 12 bits or 24 bits per message.
• Pulse position coding, sending 2 bits per IR pulse.
• Carrier frequency of 36kHz.
• Message time ranges from 3.5 to 6.5 ms, depending on data content.
• Repetition time 28 ms (36 messages per second).
• Manufacturer Philips.
Transmission timing
In this diagram you see the most important transmission times. The message time is the total time of a message, counting form the beginning of the first pulse until the end of the last pulse of the message. This time can be 3.5 to 6.5 ms, depending on the data content and protocol used.
The signal free time is the time in which no signal may be sent to avoid confusion with foreign protocols on the receiver's side. Philips recommends 1 ms for normal use, or 3.36 ms when used together with RC-5 and RC-6 signals. Since you can never tell whether a user has other remote controls in use together with an RC-MM controlled device I would recommend always to use a signal free time of 3.36 ms.
The frame time is the sum of the message time and the signal free time, which can add up to just about 10 ms per message.
Finally the repetition time is the recommended repetition time of 27.778 ms, which allows 36 messages per second. This is only a recommendation and is mainly introduced to allow other devices to send their commands during the dead times.
No provision is made for data collisions between two or more remote controls! This means that there is no guarantee that the messages get across.
Modulation
With this protocol a 36 kHz carrier frequency is used to transmit the pulses. This helps to increase the noise immunity at the receiver side and at the same time it reduces power dissipated by the transmitter LED. The recommended duty cycle of the pulses is 1:3 or 1:4.
Each message is preceded by a header pulse with the duration of 416.7µs (15 pulses of the carrier), followed by a space of 277.8µs (10 periods of the carrier). This header is followed by 12 or 24 bits of data.
By changing the distance between the pulses two bits of data are encoded per pulse. Below you find a table with the encoding times.
DataMarkSpace
0 0166.7µs (6 cycles)277.8µs (10 cycles)
0 1166.7µs (6 cycles)444.4µs (16 cycles)
1 0166.7µs (6 cycles)611.1µs (22 cycles)
1 1166.7µs (6 cycles)777.8µs (28 cycles)
Protocol
RC-MM comes in 3 different flavours, called modes. Each mode is intended for a particular purpose and differs mainly in the number of bits which can be used by the application. All data is sent with MSB first.
12-bit Mode
The 12 bit mode is the basic mode, and allows for 2 address bits and 8 data bits per device family. There are 3 different device families defined: keyboard, mouse and game pad.
Mode bitsDevice Type
0 0Extended mode
0 1Mouse mode
1 0Keyboard mode
1 1Game pad mode
The 2 address bits provide for a way to use more than 1 device simultaneously. The data bits are the actual payload data.
24-bit Mode
The 24 bit mode, also know as extended mode, allows more data to be transmitted per message. For instance for multi-lingual keyboards or a high resolution mouse.
Mode bitsDevice Type
0 0 0 0OEM mode
0 0 0 1Extended Mouse mode
0 0 1 0Extended Keyboard mode
0 0 1 1Extended Game pad mode
OEM Mode
In the OEM mode the first 6 bits are always 0 0 0 0 1 1. The next 6 bits are the customer ID (OEM manufacturer). My observation showed that Nokia used the code 1 0 0 0 0 0 for their 9800 series digital satellite receivers.
Finally the last 12 bits are the actual pay load data.
|
ESSENTIALAI-STEM
|
midnight movie
Etymology
Originating in 1950s American television, the term has undergone several changes over time (see Wikipedia article).
Noun
* 1) A B-movie, often in camp style and with a retro theme.
* 2) A low-budget film which has become a cult classic, referring in this sense to original tradition of showing such films at night.
* 3) A low-budget film shown on television after midnight, particularly but not exclusively in the US.
|
WIKI
|
Tech Is Splitting the U.S. Work Force in Two
A small group of well-educated professionals enjoys rising wages, while most workers toil in low-wage jobs with few chances to advance. PHOENIX — It’s hard to miss the dogged technological ambition pervading this sprawling desert metropolis. There’s Intel’s $7 billion, seven-nanometer chip plant going up in Chandler. In Scottsdale, Axon, the maker of the Taser, is hungrily snatching talent from Silicon Valley as it embraces automation to keep up with growing demand. Start-ups in fields as varied as autonomous drones and blockchain are flocking to the area, drawn in large part by light regulation and tax incentives. Arizona State University is furiously churning out engineers. And yet for all its success in drawing and nurturing firms on the technological frontier, Phoenix cannot escape the uncomfortable pattern taking shape across the American economy: Despite all its shiny new high-tech businesses, the vast majority of new jobs are in workaday service industries, like health care, hospitality, retail and building services, where pay is mediocre. The forecast of an America where robots do all the work while humans live off some yet-to-be-invented welfare program may be a Silicon Valley pipe dream. But automation is changing the nature of work, flushing workers without a college degree out of productive industries, like manufacturing and high-tech services, and into tasks with meager wages and no prospect for advancement. Automation is splitting the American labor force into two worlds. There is a small island of highly educated professionals making good wages at corporations like Intel or Boeing, which reap hundreds of thousands of dollars in profit per employee. That island sits in the middle of a sea of less educated workers who are stuck at businesses like hotels, restaurants and nursing homes that generate much smaller profits per employee and stay viable primarily by keeping wages low. Even economists are reassessing their belief that technological progress lifts all boats, and are beginning to worry about the new configuration of work. Recent research has concluded that robots are reducing the demand for workers and weighing down wages, which have been rising more slowly than the productivity of workers. Some economists have concluded that the use of robots explains the decline in the share of national income going into workers’ paychecks over the last three decades. Because it pushes workers to the less productive parts of the economy, automation also helps explain one of the economy’s thorniest paradoxes: Despite the spread of information technology, robots and artificial intelligence breakthroughs, overall productivity growth remains sluggish. “The view that we should not worry about any of these things and follow technology to wherever it will go is insane,” said Daron Acemoglu, an economist at the Massachusetts Institute of Technology. Semiconductor companies like Intel or NXP are among the most successful in the Phoenix area. From 2010 to 2017, the productivity of workers in such firms — a measure of the dollar value of their production — grew by about 2.1 percent per year, according to an analysis by Mark Muro and Jacob Whiton of the Brookings Institution. Pay is great: $2,790 a week, on average, according to government statistics. But the industry doesn’t generate that many jobs. In 2017, the semiconductor and related devices industry employed 16,600 people in the Phoenix area, about 10,000 fewer than three decades ago. “We automate the pieces that can be automated,” said Paul Hart, a senior vice president running the radio-frequency power business at NXP’s plant in Chandler. “The work force grows but we need A.I. and automation to increase the throughput.” Axon, which makes the Taser as well as body cameras used by police forces, is also automating whatever it can. Today, robots make four times as many Taser cartridges as 80 workers once did less than 10 years ago, said Bill Denzer, Axon’s vice president for manufacturing. Workers’ jobs were saved because the company brought other manufacturing work back from Mexico. The same is true across the high-tech landscape. Aircraft manufacturing employed 4,234 people in 2017, compared to 4,028 in 2010. Computer systems design services employed 11,000 people in 2017, up from 7,000 in 2010. Most of the growth in the Phoenix-area job market since 1990 has come in low-productivity industries, like health care. Productivity is the dollar value of the output per worker in each industry. The job sectors in the charts below represent about two-thirds of all Phoenix-area jobs. Productivity and job growth in the Phoenix metropolitan area SELECTED LOW-PRODUCTIVITY JOBS SHARE OF ALL JOBS 1990 2017 AVERAGE WEEKLY 2017 WAGE CHANGE IN WAGES 1990-2017 0% 5% 10% Accommodation and food services $420 +28 % Administrative and waste services 750 +44 Educational services 832 +24 Retail trade 647 +8 Health care and social assistance 1,024 +12 SELECTED HIGH-PRODUCTIVITY JOBS 0% 5% 10% Manufacturing $1,422 +34 % Finance and insurance 1,432 +47 Wholesale trade 1,504 +52 Information 1,420 +44 Real estate and rental and leasing 1,043 +51 2017 PRODUCTIVITY IN THOUSANDS $0 $100 $200 $300 +10 PCT-POINT CHANGE IN SHARE OF JOBS 1990 - 2017 Health care and social assistance +5 Administrative and waste services Accommodation and food services Finance and insurance Educational services INCREASED SHARE DECREASED SHARE Information Real estate and rental and leasing Retail trade Wholesale trade –5 Manufacturing –10 LESS PRODUCTIVE MORE PRODUCTIVE Productivity and job growth in the Phoenix metropolitan area SELECTED LOW- PRODUCTIVITY JOBS SHARE OF ALL JOBS AVG. WEEKLY 2017 WAGE PCT. CHG. 1990- 2017 2017 1990 Accommodation and food services $420 +28 % Administrative and waste services 750 +44 Educational services 832 +24 Retail trade 647 +8 Health care and social assistance 1,024 +12 0% 5 10 SELECTED HIGH- PRODUCTIVITY JOBS SHARE OF ALL JOBS AVG. WEEKLY 2017 WAGE PCT. CHG. 1990- 2017 2017 1990 Manufacturing $1,422 +34 % Finance and insurance 1,432 +47 Wholesale trade 1,504 +52 Information 1,420 +44 Real estate and rental and leasing 1,043 +51 0% 5 10 +10 PCT- POINT CHANGE IN SHARE OF JOBS 1990 - 2017 Health care and social assistance +5 Administrative and waste services Accommodation and food services Educational services Finance and insurance INCREASED SHARE DECREASED SHARE Information Real estate and rental and leasing Retail trade Wholesale trade –5 Manufacturing –10 $0 $100 $200 $300 2017 PRODUCTIVITY IN THOUSANDS By The New York Times | Sources: Bureau of Labor Statistics; Brookings (productivity) To find the bulk of jobs in Phoenix, you have to look on the other side of the economy: where productivity is low. Building services, like janitors and gardeners, employed nearly 35,000 people in the area in 2017, and health care and social services accounted for 254,000 workers. Restaurants and other eateries employed 136,000 workers, 24,000 more than at the trough of the recession in 2010. They made less than $450 a week. The biggest single employer in town is Banner Health, which has about 50,000 workers throughout a vast network that includes hospitals, outpatient clinics and home health aides. Though it employs high-paid doctors, it relies on an army of lower paid orderlies and technicians. A nursing assistant in Phoenix makes $31,000 a year, on average. A home health aide makes $24,000. While Banner invests heavily in technology, the machines do not generally reduce demand for workers. “There are not huge opportunities to increase productivity, but technology has a significant impact on quality,” said Banner’s chief operating officer, Becky Kuhn. The 58 most productive industries in Phoenix — where productivity ranges from $210,000 to $30 million per worker, according to Mr. Muro’s and Mr. Whiton’s analysis — employed only 162,000 people in 2017, 14,000 more than in 2010. Employment in the 58 industries with the lowest productivity, where it tops out at $65,000 per worker, grew 10 times as much over the period, to 673,000. The same is true across the national economy. Jobs grow in health care, social assistance, accommodation, food services, building administration and waste services. Not only are some of the tasks tough to automate, employers have little financial incentive to replace low-wage workers with machines. On the other end of the spectrum, the employment footprint of highly productive industries, like finance, manufacturing, information services and wholesale trade, has shrunk over the last 30 years. Economists have a hard time getting their heads around this. Steeped in the belief that technology inevitably leads to better jobs and higher pay, they long resisted the notion that the Luddites of the 19th century, who famously thrashed the weaving machines that were taking their jobs, might have had a point. “In the standard economic canon, the proposition that you can increase productivity and harm labor is bunkum,” Mr. Acemoglu said. By reducing prices and improving quality, technology was expected to raise demand, which would require more jobs. What’s more, economists thought, more productive workers would have higher incomes. This would create demand for new, unheard-of things that somebody would have to make. To prove their case, economists pointed confidently to one of the greatest technological leaps of the last few hundred years, when the rural economy gave way to the industrial era. In 1900, agriculture employed 12 million Americans. By 2014, tractors, combines and other equipment had flushed 10 million people out of the sector. But as farm labor declined, the industrial economy added jobs even faster. What happened? As the new farm machines boosted food production and made produce cheaper, demand for agricultural products grew. And farmers used their higher incomes to purchase newfangled industrial goods. The new industries were highly productive and also subject to furious technological advancement. Weavers lost their jobs to automated looms; secretaries lost their jobs to Microsoft Windows. But each new spin of the technological wheel, from plastic toys to televisions to computers, yielded higher incomes for workers and more sophisticated products and services for them to buy. Something different is going on in our current technological revolution. In a new study, David Autor of the Massachusetts Institute of Technology and Anna Salomons of Utrecht University found that over the last 40 years, jobs have fallen in every single industry that introduced technologies to enhance productivity. The only reason employment didn’t fall across the entire economy is that other industries, with less productivity growth, picked up the slack. “The challenge is not the quantity of jobs,” they wrote. “The challenge is the quality of jobs available to low- and medium-skill workers.” Adair Turner, a senior fellow at the Institute for New Economic Thinking in London, argues that the economy today resembles what would have happened if farmers had spent their extra income from the use of tractors and combines on domestic servants. Productivity in domestic work doesn’t grow quickly. As more and more workers were bumped out of agriculture into servitude, productivity growth across the economy would have stagnated. “Until a few years ago, I didn’t think this was a very complicated subject; The Luddites were wrong and the believers in technology and technological progress were right,” Lawrence Summers, a former Treasury secretary and presidential economic adviser, said in a lecture at the National Bureau of Economic Research five years ago. “I’m not so completely certain now.” The growing awareness of robots’ impact on the working class raises anew a very old question: Could automation go too far? Mr. Acemoglu and Pascual Restrepo of Boston University argue that businesses are not even reaping large rewards for the money they are spending to replace their workers with machines. But the cost of automation to workers and society could be substantial. “It may well be that,” Mr. Summers said, “some categories of labor will not be able to earn a subsistence income.” And this could exacerbate social ills, from workers dropping out of jobs and getting hooked on painkillers, to mass incarceration and families falling apart. Silicon Valley’s dream of an economy without workers may be implausible. But an economy where most people toil exclusively in the lowliest of jobs might be little better.
|
NEWS-MULTISOURCE
|
Follow
Rust question
I tried to implement some generic math types (vectors etc.) And found that the whole bounds thing is pretty terrible.
If I have a function with some 'where' constraints and want to use it, the using Functions also have to fulfill the bounds themselves.
Is there a possibility to combine all those bound in a trait or type etc where I can then just write
Fn X<T> (a: T)
Where T : bounds_type
Instead of having to write
Fn Y<T> (a: T)
Where
T: trait1,
T: trait2,
[...]
?
Rust question
I found it.
You write:
trait traitname : trait1 + trait2 [...] {}
And if you have any bound like the std::ops where you have to write your traitname like
<Output = T>
You write:
<Output = Self>
Sign in to participate in the conversation
Gamedev Mastodon
Mastodon server focused on game development and related topics.
|
ESSENTIALAI-STEM
|
User:Markanderson72
I'm Mark. I'm interested in New Zealand fauna especially beetles. I developed an inordinate fondness for large flightless weevils, especially flax and ngaio weevils after studying the ngaio weevil for the Department of Conservation in 2011. I see wikipedia as a great tool for conservation. If we don't know what is out there, we won't care about it. This is why it is important to increase the quality and quantity of pages on NZ endemic species. In my own small way, I try to raise awareness of some of our less noticed species that I am passionate about.
These are the pages that I have started (or edited):
New Zealand Beetles
* Ngaio weevil
* Flax weevil
* Astelia weevil
* Turbott's weevil (edited)
* Amychus granulatus
* Geodorcus alsobius
* Geodorcus auriculatus
* Geodorcus capito
* Geodorcus helmsi
* Geodorcus ithaginis
* Geodorcus montivagus
* Geodorcus novaezealandiae
* Geodorcus philpotti
* Geodorcus servandus
* Geodorcus sororum
* Genus Geodorcus
* Paralissotes reticulatus (edited)
* Genus Hadramphus (edited)
* Genus Lyperobius
* Lyperobius huttoni (edited)
* Genus Rhynchodes
* Hadramphus spinipennis
* Rhynchodes ursus
* Lyperobius hudsoni
* Lyperobius clarkei
* Plocamostethus (edited)
* Genus Horelophus
* Horelophus walkeri
* Mecodema crenicolle
Other
* Maud Island (edited)
* Mokohinau Islands (edited)
* Ophiocordyceps robertsii (edited)
* Stephens Island (New Zealand) (edited)
* The Brothers (New Zealand) (edited)
* Spelungula cavernicola (edited)
* The Sisters Islands (edited)
* Dolomedes schauinslandi
* Dolomedes (edited)
* Eldon's galaxias (edited)
* Chatham parakeet (edited - added image)
* Okarito kiwi (edited - added new image)
* Malherbe's Parakeet (edited - added new image)
* Amblyomma sphenodonti
* ''Maoriblatta novaeseelandiae
* Mōhua (edited - added new image)
* Pelorus Bridge (edited)
* Agrostichthys parkeri (edited - added image)
* Hoherius (edited)
|
WIKI
|
Page:Tales of my landlord (Volume 4).djvu/263
reached the borough town without meeting with any remarkable adventure, and alighted at the little inn. It had occurred to him more than once, while upon his journey, that his resumption of the dress which he had worn while a youth, although favourable to his views in other respects, might render it more difficult for him to remain incognito. But a few years of campaigns and wandering had so changed his appearance, that he had great confidence that in the grown man, whose brows exhibited the traces of resolution and considerate thought, none would recognize the raw and bashful stripling who won the game of the popinjay. The only
|
WIKI
|
Tips on Maintaining Spinal Health
Often neck and spine pain is the result of our poor posture. Inactivity for a long time can also cause spinal problems. One of the most neglected parts of the body is the back. Many people do not care about their spinal health, maybe you are one of them? Whereas in the back there are all the nerves that connect the middle of the body with the brain. Do you realize that any activity and activity that you do can hurt your spine? Do all your activities well to keep your spine, because in addition to your kindness and health, as well as to keep your posture upright. Here are tips to keep your spine that may be useful for those of you who have symptoms of spinal pain. When you try to pick up or lift an item on the floor, do not bend it, bend your knees. Spinal health is important to you, to maintain your spinal health and how to improve your spine condition if you are sick is by diettalk.
Because when you bend and lift the items off the floor, it can cause your spine to feel sick and feel burdened, but it can also cause cramps or dislocations. So try to keep your spine straight while taking or lifting things off the floor. Bend your knees to align yourself with the goods. Lift the item close to the body, then slowly stand again. Similarly, when you try to put heavy items in a high place, about a few inches above your head. Do not lift the item higher than your shoulders. When going to put things in a high place, try to use a ladder or a chair, because when lifting heavy loads above the shoulder line, there will be great pressure on your spine that can cause the spine to hurt.
When you stand for a long time, try to change your position as often as possible. One example is when queuing at the cinema, change the position of your feet as often as possible in turn. It is important to balance your backbone. Try to keep your back straight and do not bend down. Get used to walking straight, with your head looking forward and your back straight, and the tips of your feet pointing straight ahead. It’s important to use shoes that make you feel comfortable. Reduce using high heels for a long time. When sitting in front of a computer or television, do not let your knee position be higher than your thighs, and avoid hanging your legs away from the floor. Let both your feet flat on the floor and lean your back on the back of the chair. Make sure you look straight ahead. Look for a comfortable position, because discomfort for a long time can cause muscle cramps.
|
ESSENTIALAI-STEM
|
Complexity to Simplicity and Back Again
Generalizing a problem can make the solution simpler or more complicated, and it’s often hard to predict which beforehand. Here’s a mini-example of a puzzle and four generalizations which alternately make it simpler or more complicated.
Warning: The solutions are given right after the puzzles. If you want to think about them, cover the screen.
Puzzle: There are 10 prisoners labeled P=\{1,2,\ldots,10\}. A malicious warden puts a black or white hat on each. Prisoner i can see prisoner j‘s hat iff i < j. The warden has each prisoner guess the hat color on their head, in order starting from prisoner 1. The prisoners can hear previous guesses.
If a prisoner guesses right, they are freed, otherwise they are sent back to jail. Given that the prisoners can strategize as a group beforehand, for how many prisoners can they guarantee freedom in the worst case?
It turns out that the prisoners can guarantee the freedom of all prisoners except prisoner 1: Prisoner 1 first counts the number of black hats, then guesses black if it’s even and white if it’s odd. Now prisoner 2 knows their hat color, since they heard prisoner 1’s guess and they can count the number of black hats they see. Once prisoner 2 guesses correctly, prisoner 3 can guess correctly using prisoner 1 and 2’s answer, and so forth.
Generalization 1:What if there are 3 hat colors? What if there are n hat colors? What if the hat colors are drawn from an arbitrary, possibly infinite set S?
This generalization makes the solution simpler, since it reveals something about what was going on in the first solution.
As long as the prisoners can put a group structure on the hat colors, they can run the same strategy as before: Player 1 adds up all the colors and announces that. Each subsequent player adds up all the colors they can see and the correct guesses, and subtracts that from the sum that player 1 announced.
Generalization 2: What if P=\{1,2,3,\ldots\}, i.e., there are infinitely many prisoners, arranged like \mathbb{N}?
The solution to this generalization makes things more complicated: it uses a trick which is not related to the previous problems, and which is not clear how to generalize.
It turns out there is still a strategy to free all but the first prisoner.
Here’s the new trick: Consider the set S of all possible assignments of hat colors to prisoners. Let s\equiv t for s,t\in S iff s agrees with t for all but finitely many prisoners. This is an equivalence relation. Beforehand, the prisoners choose a representative from each equivalence class (this requires the axiom of choice).
Since each prisoner can see all but finitely many of the other prisoner’s hats, each prisoner knows which equivalence class they’re in. Then the solution is similar to before: The first prisoner adds up the finitely many differences between the hat colors and the chosen representative, and the subsequent ones can then all correctly deduce their own hat color.
Generalization 3: What if P is an arbitrary ordinal? What if P is an arbitrary linear ordering?
This solution makes things simpler, as it reveals what was going on in the previous solution. This problem was solved by Chris Hardin and Alan Taylor.
The answer is that, for P an arbitrary linear order, the prisoners have a strategy that does not use communication (i.e., nobody can hear anyone else’s guess) and guarantees that the set W of prisoners who guess wrong does not have an infinite ascending chain.
If P is an ordinal, this guarantees that W is finite, and then the prisoners can use communication to save all but the first prisoner. If P is the reals, then this guarantees that they can free all prisoners except those in a set of measure zero.
The solution is surprisingly simple. The prisoners agree beforehand on a well-ordering \leq of the set of assignments of hat colors to prisoners, then each prisoner takes the \leq-least assignment consistent with what they can see, and guesses the hat color they have in that assignment.
As an exercise, try showing that an infinite ascending sequence of wrong guesses would translate into an infinite descending sequence of hat color assignments, and thus contradict well-ordering.
Generalization 4: What if P is just a relation, not necessarily transitive?
Chris Hardin and Alan Taylor considered this generalization in this paper. It turns out that things become complicated again.
For example, suddenly the number of different hat colors matters. Hardin and Taylor prove the following striking theorem:
Theorem: Suppose the prisoners are labeled 1,2,3,\ldots and that each even can see all higher-numbered odds and each odd can see all higher-numbered evens. Suppose that no prisoner can hear anyone else’s guess. Then:
1. If there are 2 hat colors, the prisoners have a strategy guaranteed to save infinitely many prisoners.
2. If there are \aleph_2 hat colors, the prisoners have no strategy guaranteed to save anybody.
3. If there are \aleph_0 hat colors, whether or not the prisoners have a strategy that can save anybody is independent of ZFC.
About these ads
5 Comments
Filed under Uncategorized
5 responses to “Complexity to Simplicity and Back Again
1. Frank Vega
Hi people
Could I have your opinion about one post “P versus UP” in:
http://the-point-of-view-of-frank.blogspot.com/
?
Thanks
2. Jason
Great Puzzle, though it should be made clear that the warden has N black hats and N white hats, depending on the number (N) of prisoners. If he just puts black or white hats on the prisoners at random and without bounds there could be all black or all white hats.
3. Amit
In generalization 1, how can all prisoner saved except 1st ? You said if prisoner are able to put group on hat colors (I understand u mean if they are able to communicate information about colors of others’ hats with guesses , can u please give an example for 4 colors.)
What I understood is in case of 3 colors ,1st prisoner can tell about color 1’s parity and 2nd prisoner can tell about 2nd color’s , from that onwards another prisoner can tell about their colors.This make sure all prisoners can be saved definitely but first 2.
• yot
@Amit
You have not factored in the fact that more information can be conveyed since there are more colors. This was not explained in the article so don’t blame yourself for not following. Think of this if you will:
Assume there are N hat colors. The prisoners assign a number to each color {0,1,…N-1}. The first prisoner then adds up all of the colors he sees and divides the number by N. He then figures out the remainder and states it (by it’s corresponding color). He has a bleak 1/N chance of surviving. The rest have guaranteed safety though. The next prisoner also adds up all of the colors he sees to figure out which color should be added to get the previous result announced (you can prove there is one and only one answer to this at all times). Now he knows which color he is wearing. Any prisoner following adds up the colors he sees, adds the colors announced by the previous prisoners (except the first) and derives what color he’s wearing like the 2nd prisoner did.
4. Bruce Smith
In Generalization 2, the solution presented doesn’t *only* require the axiom of choice — it requires that a group of prisoners can select and agree on a single choice of representatives, even though no such choice can be computable or finitely describable (so there is no way one of them could either imagine one choice, or communicate it to others, if they were finite beings). I.e. the prisoners have godlike powers. (Of course, if they could see an infinite number of hats in the first place, I guess they did anyway.)
Leave a Reply
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
Google+ photo
You are commenting using your Google+ account. Log Out / Change )
Connecting to %s
|
ESSENTIALAI-STEM
|
Talk:Great Western Railway of Colorado
Passenger service
The December 1970(!) timetable says there was "Mixed Train Service" operated on the mainline between Longmont and Eaton and to Loveland, whereas the Welty and Milliken Branches were operated for "Intermittent Freight Service" only. The article says passenger operation was given up in 1926, but obviously was continued in the form of mixed trains after that time. --Thogo 15:07, 19 May 2018 (UTC)
|
WIKI
|
Mina Tander
Mina Tander (born 4 December 1979) is a German actress. She played BfV agent Esther Krug on Berlin Station from 2016 to 2019.
Biography
Born in Cologne, Tander is the daughter of an Afghan journalist father, who died when she was a child, and a German teacher mother.
She was raised in Cologne with her older sister Simin Tander.
Tander is married to German film director Elmar Fischer. He directed Tander in his 2003 film Fremder Freund (Strange Friend), and in the 2009 episode "Die Kronzeugin" of Der Kriminalist (The Criminalist).
Accolades
* 2009: Nomination – German Film Critics Award for Best Actress for Wedding Fever in Campobello (Maria, ihm schmeckt's nicht)
* 2014: Nomination – Jupiter Award for Best German Actress for Buddy
* 2017: Win – Jupiter Award for Best German Actress for Seitenwechsel
|
WIKI
|
UNICORE Resource Broker NJS Plugin
1.5α1
org.eurogrid.broker.server
Class ResourceBroker
java.lang.Object
|
+--org.eurogrid.broker.server.AbstractBroker
|
+--org.eurogrid.broker.server.ResourceBroker
All Implemented Interfaces:
NamedPlugin, ResourceBroker, ResourceChecker
public class ResourceBroker
extends AbstractBroker
University of Manchester Resource Broker NJS V4 Plugin. Principal class.
Version:
$Revision: 1.28 $, $Date: 2004/02/17 11:32:40 $
Author:
Jon MacLaren, Donal K. Fellows
See Also:
"EUROGRID WorkPackage 5.2", "GRIP WorkPackage 2.4", TicketManager, ExpertBroker, LocalResourceChecker
Nested Class Summary
static interface ResourceBroker.TSIRunEngine
Passed to LocalResourceCheckers that wish to run scripts on the local TSI.
Field Summary
static String VERSION
The version of the broker engine.
Fields inherited from class org.eurogrid.broker.server.AbstractBroker
controlState, isInitialised, localVsiteName, logger
Constructor Summary
ResourceBroker()
Method Summary
protected void checkQoS(CheckQoS task, IncarnatedUser incedUser, User user, byte[] context, CheckQoS_Outcome outcome)
Incarnate a CheckQoS, producing an outcome.
protected void checkResources(CheckResources task, IncarnatedUser incedUser, User user, byte[] context, CheckResources_Outcome outcome)
Incarnate a CheckResources, producing an outcome.
String claim(Ticket ticket, ResourceSet resources, IncarnatedUser incUser, User user)
Claim the ticket.
boolean fillInEstimate(ResourceSet resSet, Estimate est, IncarnatedUser user)
Generate a ticket for a resource request.
String getFormalName()
Get the formal name of the plugin.
String getGatewayURL()
Get the URL for the gateway to access the Usite containing this broker.
ResourceSet getLocalResources()
Get the current resource set for the host Vsite.
String getName()
Get the name of the plugin.
ResourceSet getResources(Vsite vsite)
Get the resources for a particular Vsite.
String getTextOfElement(Element element, String tag)
Get the textual content of the given DOM element, complaining if it is anything other than simple text.
String initialise(Vsite vsite, ResourceSet resources, ResourceChecker.NJS njs, Element configuration)
Initialise ourselves
boolean isBrokeringFor(Vsite vsite)
Test if this broker brokers for the given Vsite.
protected void logBannerMessage()
Write the main banner message to the log.
static Vsite makeVsite(String handle, String address)
Wrapper method that creates a Vsite given a handle and address for it.
String mapToLocation(Storage storage)
Get where a particular piece of storage is located.
boolean resourceSetOKHere(ResourceSet set, IncarnatedUser user)
Check a single resource set
Methods inherited from class org.eurogrid.broker.server.AbstractBroker
apply, getLogger, getLogger, getQoSCheckResource, getResourceCheckResource, getState, incarnateCheckQoS, incarnateCheckResources, initialise, initialiseLogger, nextJobID
Methods inherited from class java.lang.Object
clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
Field Detail
VERSION
public static final String VERSION
The version of the broker engine.
See Also:
Constant Field Values
Constructor Detail
ResourceBroker
public ResourceBroker()
Method Detail
checkQoS
protected void checkQoS(CheckQoS task,
IncarnatedUser incedUser,
User user,
byte[] context,
CheckQoS_Outcome outcome)
throws ResourceCheckerException
Incarnate a CheckQoS, producing an outcome.
Specified by:
checkQoS in class AbstractBroker
Parameters:
task - the request to check resources that requires incarnation
incedUser - the incarnated user performing the check
user - the user performing the check
context - broker context for passing to sub-brokers
outcome - the incarnated user performing the check
ResourceCheckerException
checkResources
protected void checkResources(CheckResources task,
IncarnatedUser incedUser,
User user,
byte[] context,
CheckResources_Outcome outcome)
throws ResourceCheckerException
Incarnate a CheckResources, producing an outcome.
Specified by:
checkResources in class AbstractBroker
Parameters:
task - the request to check resources that requires incarnation
incedUser - the incarnated user performing the check
user - the User performing the check
context - broker context for passing to sub-brokers
outcome - the incarnated user performing the check
ResourceCheckerException
claim
public String claim(Ticket ticket,
ResourceSet resources,
IncarnatedUser incUser,
User user)
throws ResourceCheckerException
Claim the ticket. Only partially implemented; we confirm that we issued the ticket, but do not check that the resource set is what we issued the ticket against.
Parameters:
ticket - The ticket being claimed
resources - The resource set that contains the ticket
incUser - The incarnated user
user - The real user
Returns:
Parameter to be passed to the TSI (constant NONE for now)
Throws:
ResourceCheckerException - If the ticket is not valid
fillInEstimate
public boolean fillInEstimate(ResourceSet resSet,
Estimate est,
IncarnatedUser user)
Generate a ticket for a resource request. This updates the given estimate so that it contains a ticket that promises to deliver the level of service requested in the resource-set for the given incarnated user. Note that the resources must be described in system terms at this point; application level stuff has to be done at an earlier stage.
Parameters:
resSet - The set of resources specifying the requested quality of service.
est - The estimate to fill in.
user - The incarnated user making the request.
Returns:
Whether an estimate has been successfully filled in.
getFormalName
public String getFormalName()
Description copied from interface: NamedPlugin
Get the formal name of the plugin. This should be long enough to allow people who are not experts with the code to understand it, and will be written to the log to associate itself with the shorter name.
getGatewayURL
public String getGatewayURL()
Get the URL for the gateway to access the Usite containing this broker.
getLocalResources
public ResourceSet getLocalResources()
Get the current resource set for the host Vsite.
getName
public String getName()
Description copied from interface: NamedPlugin
Get the name of the plugin. This should be fairly short so that the logging messages aren't too massive.
getResources
public ResourceSet getResources(Vsite vsite)
Get the resources for a particular Vsite. This method caches the values returned for up to an hour, so multiple fetches of a resource set can be expected to be fairly efficient.
getTextOfElement
public String getTextOfElement(Element element,
String tag)
Get the textual content of the given DOM element, complaining if it is anything other than simple text.
Parameters:
element - The element to extract the content from.
tag - The tag of the element being extracted (for log messages).
Returns:
The extracted string.
initialise
public String initialise(Vsite vsite,
ResourceSet resources,
ResourceChecker.NJS njs,
Element configuration)
throws ResourceCheckerException
Initialise ourselves
Specified by:
initialise in class AbstractBroker
Parameters:
vsite - The Vsite where we are.
resources - The resources at this Vsite.
njs - The hosting NJS.
configuration - The initialisation XML from the IDB.
Returns:
The name of the host Vsite for use in broker-loop detection.
ResourceCheckerException
isBrokeringFor
public boolean isBrokeringFor(Vsite vsite)
Test if this broker brokers for the given Vsite.
logBannerMessage
protected void logBannerMessage()
Description copied from class: AbstractBroker
Write the main banner message to the log. At least one line should be written at level CONFIG and any additional lines should be at level INFO.
Specified by:
logBannerMessage in class AbstractBroker
makeVsite
public static Vsite makeVsite(String handle,
String address)
Wrapper method that creates a Vsite given a handle and address for it. For use by plug-in modules only.
mapToLocation
public String mapToLocation(Storage storage)
Get where a particular piece of storage is located. Returned value might include environment variables to be expanded; this is OK as the TSI will do that for us.
resourceSetOKHere
public boolean resourceSetOKHere(ResourceSet set,
IncarnatedUser user)
Check a single resource set
Parameters:
set - The resource set to check
user - The user to perform the check on behalf of
Returns:
true for OK, false for no.
UNICORE Resource Broker NJS Plugin
1.5α1
Submit a bug or feature
Copyright © 2002-2004 University of Manchester, U.K. See license.terms for details.
|
ESSENTIALAI-STEM
|
@article{Malanga_Estevez_Calvo_Abele_Puntarulo_2005, title={Oxidative stress in gills of limpets from the Beagle Channel: comparison with limpets from the Antarctic}, volume={69}, url={https://scientiamarina.revistas.csic.es/index.php/scientiamarina/article/view/331}, DOI={10.3989/scimar.2005.69s2297}, abstractNote={The aim of this work was to study the oxidative profile of gills of two limpet species (<i>Nacella (Patinigera) magellanica</i> and <i>Nacella (Patinigera) deaurata</i>) (Gmelin, 1971) exposed to different environmental conditions. Due to the tidal characteristics of the Beagle Channel, <i>N. magellanica</i> are exposed to air twice daily for 3 to 5 hours each time, whereas <i>N. deaurata</i> are exposed to air for 3 hours only during spring tides. The different regime of exposure includes extreme temperatures under 0ºC during winter and more than 20°C in summer for <i>N. magellanica</i>, whereas <i>N. deaurata</i> are usually covered by more than 0.3 m of water at 4°C in winter and 11°C in summer. No significant differences were found between the two molluscs regarding the oxygen uptake, the content of ?-tocopherol and ?-carotene and the activities of the antioxidant enzymes catalase and superoxide dismutase. Lipid peroxidation in gills was estimated as the content of lipid radicals, assessed by electron paramagnetic resonance (EPR). Lipid radical content and total iron content were respectively 80.6 and 62% lower in <i>N. magellanica</i> than in <i>N. deaurata</i>. A typical EPR spectrum of ascorbyl radical in gills from both limpets was observed. Both the ascorbyl radical content and the ascorbyl radical content/ascorbate content ratio were significantly lower in N. magellanica than in <i>N. deaurata</i>. In the Antarctic <i>Nacella concinna</i> inhabits all levels of the littoral zone. Limpets at the highest level in the intertidal showed significantly increased activities of both catalase and superoxide dismutase as compared to their intertidal and subtidal relatives. Thus, it seems that Antarctic high intertidal conditions, involving regular exposure to air and presumably also thermal stress on sunny days during the Antarctic summer, cause a necessity for <i>N. concinna</i> to ward off higher oxygen radical species production by increasing its antioxidant defence. Taken as a whole, the data presented here indicate that coping with environmentally demanding conditions requires a complex adjustment of the physiological metabolic pathways to ensure survival by minimising intracellular damage.}, number={S2}, journal={Scientia Marina}, author={Malanga, Gabriela and Estevez, Maria Susana and Calvo, Jorge and Abele, Doris and Puntarulo, Susana}, year={2005}, month={Dec.}, pages={297–304} }
|
ESSENTIALAI-STEM
|
Measuring Gene Expression in Endurance Athletes as a Novel Technique for Determining training Response to Sprint Interval Training (SIT)
• Siri Lauluten
Student thesis: Doctoral Thesis
Abstract
The fundamental aim of an endurance athlete is to improve their ability to physically perform at a high intensity for a prolonged period of time. Furthermore, this high performance area of sport can be metabolically demanding, requiring high rates of oxidative (aerobic) and non-oxidative (anaerobic) metabolism with precise regulation and control. To meet these requirements, monitoring of training is an essential component of a successful training plan, as manipulation of training volume, frequency, intensity and recovery is vital for optimal results. Due to the long-distance nature of endurance events, high-volume and low-intensity training has traditionally been the main focus for endurance athletes. However, this high-volume load can often lead to overtraining and/or a performance plateau. More recently, a shift in training volume and intensity involving low volume but high intensity sessions (termed high-intensity interval training; HIT), has become more commonly used by endurance athletes. While endurance athletes have long appreciated the role of HIT as part of a comprehensive training program, the recent surge in HIT popularity is mainly due to the efficiency of the training and the recent evidence that it causes gene expression and phenotypic performance changes that resemble those of endurance training. Studies have suggested that in young healthy persons of average fitness, intense interval training is therefore a time-efficient strategy with results comparable to traditional endurance training.However, despite recent research advancements, the fundamental question remains regarding the minimum volume of exercise necessary to improve performance. The aim of the proposed study was to investigate two different regimes of high intensity exercise (low-volume/high-frequency and high-volume/low-frequency) in 26 well-trained endurance cyclists, measure their effect on both physiological changes and gene expression changes, and determine whether the changes caused by HIT are due to total work or areregime-dependent. The training intervention consisted of nine bouts of 30-second sprints per week for two weeks at different volumes per group: one low-volume/high-frequency group with 3 repetitions 3 times per week (9 subjects), one high-volume/low-frequency group with 9 repetitions once per week (9 subjects), and one control group without training intervention (8 subjects). The physiological measures of interest related to the metabolic changes from the endurance capacity test, VO2max test, and Wingate test, which were measured on all subjects at time-points before (baseline) and after the intervention period.To achieve a full understanding of the biochemical adaptation, regulation and markers associated with HIT, an examination of the gene expression changes in vivo was performed by taking blood samples from participants before training (baseline), immediately after the final training session (acute response), and 72 hours after the final training session (delayed response), extracting RNA from white blood cells, and undertaking a genome-wide microarray analysis to identify genes differentially expressed after high-intensity exercise.The aim was also to investigate the changes in expression levels in response to varying levels of exercise (frequency of weekly sessions and number of bouts per session), and which of these training regimes would achieve a higher performance outcome.Some significant differences were found in the physiological traits measured between training intervention groups and the control group, as well as between the groups themselves. While there were no significant changes in ventilation threshold (VT1) between the two training groups themselves, a significant difference was found between both of the training groups and the control group post-training. Furthermore, a significant increase from baseline (p = 0.006) was found in the post-training intervention endurance capacity test (ECT) for the high-volume/low-frequency group, while no significant change was seen inthe low-volume/high-frequency group or the control group. These findings suggest that the high-volume/low-frequency regime may be more effective at improving endurance performance in relation to the endurance capacity test.In relation to gene expression changes, data was only available for 6 subjects in the low volume/high-frequency group and 4 subjects in the high-volume/low-frequency group.Microarrays were performed for these subjects at three time-points (baseline, acute post training and delayed post-training); however, after normalisation, quality control and statistical analysis of participant data, no significant changes in gene expression were found between either of the two post-training time-points compared to baseline, or between different training regime groups.Overall, however, this study allowed researchers to obtain an increased understanding of the physiological and gene expression adaptations that can result from high intensity training and determined that training regime influences performance outcome. By implementing the minimum training regime necessary to obtain performance improvements it may be possible to optimise athlete response to training whilst avoid overtraining and illness. Additionally, no alteration in gene expression was detected after the training intervention, possibly due to that the effect size investigated being smaller than anticipated. Further research in this area may provide sport coaches, exercise physiologists,sport scientists, and athletes another tool to optimise training prescription for athletes as well as evaluating and monitoring an individual’s biological response to exercise.
Date of Award18 Jun 2016
Original languageEnglish
SupervisorBon Gray (Supervisor) & Lotti Tajouri (Supervisor)
Cite this
'
|
ESSENTIALAI-STEM
|
Alberto Martorell Lossius
Alberto Martorell Lossius (born 18 July 1950) is a Spanish retired tennis player who won a bronze medal at the 1979 Mediterranean Games.
He is a son of the late Alberto Martorell Otzet (1916–2011), a football goalkeeper who played for Español from 1933 to 1945 and also for the Spain national team.
|
WIKI
|
Washing, see Detergency
Dieterici s equation A modification of van der Waals equation, in which account is taken of the pressure gradient at the boundary of the gas. It is written [c.136]
Dietrich, Lehn and Sauvage recognized not only the possibility of enclosing a cation completely in a lipophilic shell, but they also recognized the potential for using such systems for activating associated anions. This is made particularly clear in a paper which appeared some years later One of the original motivations for our work on cryptates rested on their potential use for salt solubilization, anion activation and phase transfer catalysis . This particular application is discussed below in Sect. 8.3. [c.348]
Toluene is marketed mosdy as nitration and industrial grades. The generally accepted quality standards for the grades are given by ASTM D841 and D362, respectively, which are summarized in Tables 16 and 17, with the appropriate ASTM test method specified for determining the specification properties (40). Although the actual concentration of toluene in samples is not stipulated by these specifications, the purity is in fact controlled by the specific gravity and the boiling-range requirements of the method. [c.187]
By far the most important metal containing dyes are derived from OjO-dUiydroxyazo stmctures in which one of the two azo nitrogen atoms and the two hydroxyl oxygen atoms are involved in bonding with the metal ion. Thus these dyes serve as terdentate ligands. In the case of metal ions with a coordination number of four, eg, Cu(H), the fourth position is usuaUy occupied by a solvent molecule (47). [c.436]
In 1969, Dietrich, Lehn and Sauvage published the first report of a type of molecule which was to engender tremendous interest in the chemical community. These compounds were macrobicyclic polyethers having nitrogen pivot atoms and exhibiting the ability to bind a variety of metal cations. The syntheses of the first examples of macrobicyclic amines were carried out as illustrated in Eq. (8.1). The appropriate diaminopolyether and polyether diacyl chloride were condensed under high dilution conditions to give diamide 1 in 80% yield. Reduction was then effected using LiAlH4 to tetrahydrofuran to yield diamine 2 in 75% yield. A second equivalent of the diacyl chloride used in the first step was allowed to react with 2 (again, high dilution) affording the macrobicyclic diamide 3 in 45% yield. Reduction using diborane afforded the compound called [2.2.2]-cryptand (4) as its bis-borane adduct. Removal of the borane residues could be effected by treatment with 6 N HCl affording 4 in more than 90% yield from 3. The overall yield for the process was about 25%. [c.347]
The actual catalyst is a complex formed from osmium tetroxide and a chiral ligand, e.g. dihydroquinine (DHQ) 9, dihydroquinidine (DHQD), Zj -dihydroqui-nine-phthalazine 10 or the respective dihydroquinidine derivative. The expensive and toxic osmium tetroxide is employed in small amounts only, together with a less expensive co-oxidant, e.g. potassium hexacyanoferrate(lll), which is used in stoichiometric quantities. The chiral ligand is also required in small amounts only. For the bench chemist, the procedure for the asymmetric fihydroxylation has been simplified with commercially available mixtures of reagents, e.g. AD-mix-a or AD-mix-/3, ° containing the appropriate cinchona alkaloid derivative [c.257]
See pages that mention the term Washing, see Detergency : [c.259] [c.414] [c.177] [c.204] [c.267] [c.706] [c.206]
Physical chemistry of surfaces (0) -- [ c.0 ]
|
ESSENTIALAI-STEM
|
Role of Homodimerization of Human Cytomegalovirus DNA Polymerase Accessory Protein UL44 in Origin-Dependent DNA Replication in Cells
@article{Sinigalia2008RoleOH,
title={Role of Homodimerization of Human Cytomegalovirus DNA Polymerase Accessory Protein UL44 in Origin-Dependent DNA Replication in Cells},
author={Elisa Sinigalia and Gualtiero Alvisi and Beatrice Mercorelli and Donald M Coen and Gregory S. Pari and David Andrew Jans and Alessandro Ripalti and Giorgio Pal{\`u} and Arianna Loregian},
journal={Journal of Virology},
year={2008},
volume={82},
pages={12574 - 12579}
}
ABSTRACT The presumed processivity subunit of human cytomegalovirus (HCMV) DNA polymerase, UL44, forms homodimers. The dimerization of UL44 is important for binding to DNA in vitro; however, whether it is also important for DNA replication in a cellular context is unknown. Here we show that UL44 point mutants that are impaired for dimerization, but not for nuclear localization or interaction with the C terminus of the polymerase catalytic subunit, are not capable of supporting HCMV oriLyt…
The Carboxy-Terminal Segment of the Human Cytomegalovirus DNA Polymerase Accessory Subunit UL44 Is Crucial for Viral Replication
Although the amino-terminal domain was sufficient for origin-dependent synthesis in a transient-transfection assay, the carboxy- terminal segment was crucial for virus replication and for the formation of DNA replication compartments in infected cells, even when this segment was replaced with a simian virus 40 NLS that ensured nuclear localization.
The Human Cytomegalovirus DNA Polymerase Processivity Factor UL44 Is Modified by SUMO in a DNA-Dependent Manner
It is shown that overexpression of SUMO alters the intranuclear distribution of UL44 in HCMV-infected cells, and enhances both virus production and DNA replication, arguing for an important role for sumoylation in H CMV life cycle and UL44 function(s).
Analysis of the Association of the Human Cytomegalovirus DNA Polymerase Subunit UL44 with the Viral DNA Replication Factor UL84
Results strongly suggest that UL44 and UL84 interact directly using a region of UL44 different from the UL54 binding site, which means UL44 can bind interacting replication proteins using a mechanism different from that of PCNA.
The Flexible Loop of the Human Cytomegalovirus DNA Polymerase Processivity Factor ppUL44 Is Required for Efficient DNA Binding and Replication in Cells
ULTS indicate that ppUL44Δloop is functional in dimerization and binding to pUL54 but strongly impaired in binding nuclear structures within the nucleus, as shown by its inability to form nuclear speckles, reduced nuclear accumulation, and increased intranuclear mobility compared to wild-type pUL44.
Live-Cell Analysis of Human Cytomegalovirus DNA Polymerase Holoenzyme Assembly by Resonance Energy Transfer Methods
Intriguingly, substitutions preventing DNA binding of ppUL44 influence the BRETmax of protein–protein interactions, implying that binding to dsDNA induces conformational changes both in the ppul44 homodimer and in the DNA polymerase holoenzyme.
Towards the identification of small molecules inhibiting he dimerization of HCMV DNA polymerase processivity factor UL44
It is confirmed that UL44 forms dimers in cells, as well as gaining insights relative to the formation of HMCV DNA polymerase holoenzyme, suggesting conformational changes within UL44 upon DNA binding in complex to UL54.
Regulated Transport into the Nucleus of Herpesviridae DNA Replication Core Proteins
Mechanisms controlling the nuclear import of herpesviral DNA replication machinery are summarized and potential implications for the development of antiviral compounds aimed at inhibiting the Herpesvirus life cycle are discussed.
Divide et Impera: Identification of Small-Molecule Inhibitors of HCMV Replication Interfering with Dimerization of DNA Polymerase Processivity Factor UL44
It is shown that full length UL44 dimerizes in a cellular context with high affinity and that such interaction could be targeted by small molecules, thus inhibiting the replication of several HCMV strains, including a drug-resistant mutant.
References
SHOWING 1-10 OF 47 REFERENCES
The cytomegalovirus DNA polymerase subunit UL44 forms a C clamp-shaped dimer.
Human cytomegalovirus (HCMV) DNA polymerase processivity factor ppUL44 dimerizes in the cytosol before translocation to the nucleus.
It is shown that pUL44 dimerizes in the cytoplasm via its N-terminal domain, before translocating to the nucleus, and that nuclear translocation of differently tagged ppUL44 heterodimers can occur even when one subunit carries a nonfunctional nuclear localization signal.
Boundaries and structure of human cytomegalovirus oriLyt, a complex origin for lytic-phase DNA replication
Preliminary deletion analysis suggests that multiple components within the boundaries of oriLyt cooperate to enable initiation of HCMV lytic-phase DNA synthesis.
Residues of Human Cytomegalovirus DNA Polymerase Catalytic Subunit UL54 That Are Necessary and Sufficient for Interaction with the Accessory Protein UL44
It is observed that deletion of the C-terminal segment or substitution of alanine for Leu1227 or Phe1231 in UL54 greatly impaired both the UL54-UL44 interaction in pulldown assays and long-chain DNA synthesis without affecting basal polymerase activity, identifying these residues as important for subunit interaction.
Human Cytomegalovirus DNA Polymerase Catalytic Subunit pUL54 Possesses Independently Acting Nuclear Localization and ppUL44 Binding Motifs
Two distinct sites within the HCMV DNA polymerase are identified, which represent potential therapeutic targets and establishes the molecular basis of UL54 nuclear import, which is identified and established.
Human cytomegalovirus uracil DNA glycosylase associates with ppUL44 and accelerates the accumulation of viral DNA
The data suggest that pUL114 associates with ppUL44 and that it functions as part of the viral DNA replication complex to increase the efficiency of both early and late phase viral DNA synthesis.
Physical and functional interaction of human cytomegalovirus DNA polymerase and its accessory protein (ICP36) expressed in insect cells
Expression of the human cytomegalovirus (HCMV) (AD169) DNA polymerase gene under the control of the polyhedrin promoter of Autographa californica nuclear polyhedrosis virus in Spodoptera frugiperda
The Human Cytomegalovirus UL44 Protein Is a Substrate for the UL97 Protein Kinase
It is indicated that UL97 is sufficient to phosphorylate UL44 in vitro and is necessary for the normal phosphorylation of UL 44 in infected cells, which strongly suggests that UL44 is a natural substrate of UL97.
Specific Residues in the Connector Loop of the Human Cytomegalovirus DNA Polymerase Accessory Protein UL44 Are Crucial for Interaction with the UL54 Catalytic Subunit
The crystal structure of UL44 revealed the presence of a connector loop analogous to that of the processivity subunit of herpes simplex virus DNA polymerase, UL42, which is crucial for interaction with its cognate catalytic subunit, UL30.
|
ESSENTIALAI-STEM
|
Can you show a sample of Duplex Contract in WCF ?
Posted by Akiii on 5/18/2012 | Category: WCF Interview questions | Views: 5674 | Points: 40
Answer:
[ServiceContract(Namespace = "http://www.Microsoft.com",
SessionMode = SessionMode.Required,
CallbackContract = typeof(IDuplexCallBack) )]
public interface IService1
{
[OperationContract(IsOneWay = true)]
void getData();
}
public interface IDuplexCallBack
{
[OperationContract(IsOneWay = true)]
void filterData(DataSet Output);
}
In the above code, getData() is a method which will be called by the client on the Service. This getdata() is implemented in the server side.
filterData() is a method which will be called by the server on the Client. This method is implemented in the client side.
CallbackContract is the name of the contract which will be called by the server on the client to raise an event or to get some information from the client.
Thanks and Regards
Akiii
| Alert Moderator
Comments or Responses
Login to post response
|
ESSENTIALAI-STEM
|
UPDATE 5-Portugal's bond yields near 6-week low as PM confident on ratings test
* DBRS due to unveil rating review after markets close * Investment grade rating needed to qualify for ECB scheme * Outlook in focus as well as rating (Updates prices) By John Geddie LONDON, Oct 21 (Reuters) - Portugal’s government bond yields fell towards a six-week low on Friday, after its prime minister said he had no doubt that rating agency DBRS would maintain the investment-grade rank the country needs to qualify for the ECB’s asset purchase scheme. The Canadian ratings firm - the only one of the big four agencies that rates Portugal at investment grade - is due to present its review after markets close on Friday. Analysts said that as regulation dictates that Portugal must be informed of the results a day before, the comments by Antonio Costa were seen as a strong hint that Lisbon would keep the key rating. European Central Bank President Mario Draghi confirmed on Thursday that if Portugal were downgraded it would fall out of the quantitative easing programme. If Lisbon, as some expect, announces a bond auction for next week on Friday, that would be another strong hint that the country has avoided a cut. “We’re as certain as can be that there won’t be a downgrade,” said Lyn Graham-Taylor, fixed income strategist at Rabobank. “It may have been intimated to the government already.” Investor angst over the decision has receded in recent weeks anyway, with the promise of budget deficit cuts in 2017 and renewed promises of left-wing support for Portugal’s government. Portugal’s 10-year bond yield fell 4 basis points to 3.19 percent on Friday, within sight of a six-week low of 3.16 percent struck on Thursday, according to Tradeweb. By 15.40 GMT, it was yielding 3.21 percent, still down 1.4 bps on the day. The German 10-year bond yield - the euro zone benchmark - was flat around the zero percent mark after a brief dip into negative territory earlier in the day. While there appears to be a broad consensus among analysts and investors that Portugal will dodge a downgrade, a change in its rating outlook from stable to negative is seen as possible. “We expect the trend to be lowered to negative, which should cap the upside in Portuguese government bonds medium term, and we stick with our cautious strategic stance,” Commerzbank strategist David Schnautz said. If DBRS cuts the outlook it would mean a greater likelihood of a rating cut at the next review in six months’ time. Warnings by DBRS in August of risks to Portuguese creditworthiness, mainly from slowing growth and weakness of the banking sector, coupled with concerns over rising friction between Lisbon and the European Commission over its budget plans, have spooked markets in recent months. Ten-year yields rose from around 2.70 in August to an eight-month high of 3.61 percent in early October, before edging back to current levels. Commerzbank said yields should fall back to around 2.8 percent if Lisbon survives the review, while some investors have warned that yields could rise as much as 200 basis points if it is downgraded. Without access to the programme, many analysts fear Portugal would need a new bailout. Of other rating reviews due on Friday, analysts said there was a chance Standard & Poor’s could downgrade France, the EU’s second largest economy. S&P rates France at AA and has had it on a negative outlook for two years. (Reporting by John Geddie; Additional reporting by Dhara Ranasinghe; Editing by Alison Williams and John Stonestreet)
|
NEWS-MULTISOURCE
|
Triple Rush
Triple Rush is an American reality television series that aired on the Travel Channel from April 14 to 25, 2011. The program is about bicycle courier services in New York City.
Premise
Triple Rush gives you an insider's look at the chaotic workings of three different New York City courier companies as they battle for survival in this intensely competitive industry. We'll witness the bike messengers' hair-raising dashes through busy Manhattan streets—speeding between cars, racing through red lights and doing battle with taxicabs—all to earn a few dollars and support their lives in the fast lane. We'll also meet the dispatchers, who balance the needs of messengers who want non-stop, lucrative runs, customers who want excellent service and owners who want kick-ass couriers who don't make mistakes.
|
WIKI
|
Drawing
Lesson 0: About Drawing
Drawing is arguably one of the most ancient creative acts. Drawings on cave walls date back 32,000 years. Though unprovable, these drawings probably arose from a human will to depict if not record the world and its various forms. These cave drawings are decidedly representational in nature. However, representational drawing is only one of many ways to draw from the world. The artist places these bits of experience on paper, a cave wall or any other substrate. The complexity to which someone can interpret and then produce from experiences of the world are limitless. There is no right way to draw. There is only what the world is and then what one wants to say about it. Drawing is a way of making sense of what we see. It is also a way of communicating. Drawing can be private, to be seen only by one's self. It can also be a method of illustrating a feeling or an idea or an experience to someone else or to an audience.
The act of drawing is often very immediate. It can be a way of taking notes to be revisited or refined into a painting, an architectural blueprint or a sequence to be used in a short film. It is for many the first step to any project.
Drawing is an extreme art that can convey to the viewer a clear idea about the scene and subject (scene is the situation in the drawing and subject is the main part or action of drawing). Drawing requires more flexibility of finger joints and also the palm. An artist with tremendous ideas can have good creative drawings in his account.
In the simplest form, drawing is seeing and replicating this as accurately as possible on some medium. This works because the eye works as a pin-hole camera, capturing the view in the retina plane at the back of the eye. The task of the brain is to put together an understanding of the three-dimensional world and all objects within from the two-dimensional retinal image. If you want to draw the view, you just have to draw what you see, while ignoring what the brain tells and knows about the three-dimensional world, because that knowledge will not work in the two-dimensional drawing.
First, one has to learn to see. This requires some practice, because the brain interprets a lot of things and this makes it harder to see what there actually is. For instance, when you see a face, you categorize it and parts of it a face with eyes, a nose and a mouth. In your mind, you have some simple idea of the basic, symbolic shape of the eye. You can try this by drawing an eye. You probably draw it as a line drawing, with a circle inside an oval, not as a photo-realistic drawing. You possibly draw it like it would be in a face directly looking at you. You might also know how to draw a symbolic eye directly from the side. The problem is that every eye is different and you should be able to draw what you see without your brain telling you what things should look like. You should see and draw what things look like.
There are some exercises that you can try to make your brain ignore what things should look like. It is possible if you draw something that your brain does not know how to categorize, name or symbolize.
* Draw the wrinkles on some part of your your hand. Do not look at your drawing. Just very slowly follow the lines in your hand and draw the same lines. This is an exercise to make you see the little details, the drawing itself probably is just a bunch of lines and does not need to be accurate.
* Find a line drawing of some subject that does not have too much detail. Turn it upside down and draw it. Occlude parts of the original drawing so that you do not see the whole picture at any time. While you draw, compare the angles of the lines and the different shapes they make. When you are finished, turn them over and compare. You may be surprised how accurate your copy is.
Lesson 1: Materials Required
Drawing requires few supplies. Pencil(charcoal or ink can be used for shading), clean paper, cloth, eraser.
Pencil :- Pencil is used to make an outline sketch of the subject. Pencil of variant grades are used for different purposes. 2B can be used for sketching, 3B is used for light shading, 4B or 5B are used for dark shading and HB or 1B can be used to create sharp and fine lines.
The H - 6H pencils are harder and leave a lighter line. These will also work well for lightly sketching in your composition. A 2H pencil with a light hand leaves a barely visible mark. This allows you to map everything out without having to go back and erase and construction lines. Working from light to dark will help you avoid erasing and leave you with a more cohesive drawing.
(charcoal and ink can be used for shading) :- It gives much darker impression than a pencil shading.
Clean paper :- Remember to look for the right kind of paper for the medium you are using.
If you are planning to use graphite, then a harder, smooth paper works best (Bristol is a good sturdy paper). Inks require different paper depending on the tool that you use. If you are using a nib tipped pen or a ball point you will need a smooth hard paper (again Bristol is a good choice). If you plan on using just a brush a sized paper will work best. Water color paper is good choice. If you want to use both nib and brush a Hot Press Water Color paper will work well for both tools. Charcoal requires some tooth. Unlike pencils, charcoal has little (in the case of compressed charcoal) to no (vine charcoal) binder so it will not stick as well to a smooth surface. There is a huge array of charcoal/pastel papers to choose from. Finding the kind that you like will take some searching. To begin practicing, a pad of Rough Newsprint will work until you are ready to move on to the nicer (and more expensive) fine art paper.
Cloth :- A cloth wrapped on a finger can be used for broader shading and to smudge lines and curves.
Eraser :- An eraser can be used for lightening any point on a drawing, so as to make it brighter than surrounding part. There are a few different kinds of eraser and it is important to get the proper eraser for the medium. The Pink eraser is the same kind that is found on a standard yellow pencil. They work well for erasing light marks, but be aware that as they age they will harden and leave pink smudges on the paper. The Plastic or White eraser is a good all purpose eraser. It can easily and cleanly remove light and dark marks. It removes both graphite and charcoal. It is flexible and with an a sharp knife or razor blade you can carve the eraser into a delicate point. The Kneaded eraser will work on graphite but works best with charcoal. This self-cleaning eraser will allow you to delicately lighten areas of your drawing. By kneading the putty to a soft consistency you can then press it gently against the surface of your drawing and remove small amounts of material. Erasers easily become a crutch for the novice. It is important to think of the eraser as another drawing tool and not a correction device.
Lesson 2 : Warmup & Sketching
Many people consider sketching to be even more rough and fundamental than drawing. They are essentially the same thing, but perhaps a finished drawing has more validity to be displayed than a sketch. This is arguable.
Sketching a form in nature should begin loosely. Artists often warm up the same way an athlete, a writer or pianist does. They get loose. Get yourself in character. Mood is half of what will sustain a healthy drawing habit. The second thing is an order of operations, like in math. To draw well you need both the emotion but also the skill. Artists have a set of rituals that they perform before beginning any serious study. Drawing is a process like any other and the tradition of drawing has refined certain methods that can be learned and practiced. Over time these methods become second nature. It is surprising how quickly this happens and should not be feared.
Use 2B (or 1B) for sketching.
When sketching, try to sketch whole figures without losing their proportion. That is, if you are drawing a man, try keep the same ratio and position of his body parts. This gets easier in time.
Draw and shade a sphere, cone, cylinder, and cube. These are the main forms which make up the basics of most other 3-dimensional objects. Then try drawing some natural 3-dimensional objects:
(Try to make drawings of some photographs, so that you can improve sketching skill.)
A sketch is the skeleton of a drawing, so try to have a good sketch by practicing more.
Seeing and Practical Tips
It is less important that you make a good drawing than learn to experience and practice a love of using one's eyes. A common way of teaching drawing is to avoid looking at one's paper at all in the beginning. The reward of drawing is not the drawing itself, it is the memory of the experience of seeing the real thing. A true master of drawing is one that practices this integration. Copying is a great way to develop technique. It is also a way of avoiding the more difficult job of being original. Be careful when finding this balance. When in doubt err on the side of observation.
To have your hands flexible, to draw any shape with out using a scale or any other things, do the following exercises:
Draw a long straight line, then try to draw parallel lines of same length. -By doing this repeatedly (both horizontally and vertically) you can draw straight lines easily.
Draw a small circle without releasing pencil from paper, then try to draw concentric circles around it as you did before. -By doing this repeatedly you can draw complicated curves easily.
Try to draw more free hand designs, to improve your sketching skill.
The above exercises can be done on a rough paper with a smooth pencil.
These exercises can be done any time to maintain your finger flexibility.
Proportion
To practice proportion, get a picture you are interested in drawing and draw a grid on it.
Once you have done that, draw the same grid on a blank piece of paper. Cover everything up except for one grid space.
Look at where the eye ends in relationship to where the halfway mark is on the piece from the grid. The right corner of her eye ends at right about the half way mark, the bottom of her eye ends a bit above the mark. Draw that on the grid. Do this for each square until you are finished. The grid will only help with features like the eyes, nose, mouth, eyebrows, hair, and shape of head. The grid does not actually help with anything that does not have an outline. Shading is needed for space without shapes.
Portraiture
-Study how Picasso divided the face into halves. Find a center line for a face in 3/4 view as well as tilted back and down. Avoid drawing heads facing front and looking into the camera. -Try to think of the head as a 3D form and not as a recognizable face. The further you get from being able to recognize them in a crowd the closer you will be to capturing their individual personality.
Shading
-Try covering your paper with a middle tone. Use an eraser to remove the light areas and charcoal to fill in the dark. This play of light and dark is called Chiaroscuro. Your first try may seem to be messy, but just go along the lines, and shade in one direction. Keep practicing!
Exercises
* Challenge. Create some "cover art" or "poster art" for Wikiversity the Movie.
Resources
* anatomy for artists
* material comparisons
* Andrew Loomis books are freely available on the internet.
Student Gallery
This is a simple exercise for you who want to learn to draw. Draw the tube first, then the body, and at last the clothes.
--Esbjorn 07:51, 11 January 2007 (UTC)
|
WIKI
|
What is an MBKP file
MBKP-File extension
Common problems with the MBKP file
The MBKP file is damaged
If, after installing a program selected from the list, you still cannot open the file with the MBKP extension, the problem may be corruption. As a solution, you can find a fresh copy of the MBKP file that you want to open
The MBKP file extension is not associated with any corresponding application
In this case, the easiest way is to use the tool built into the operating system for association of the MBKP file with applications to support it. Double click on the file you cannot open - the operating system will display a list of programs that could potentially work with your MBKP file. Select one of these programs or indicate a place on the hard disk where you have installed an application from our list. The Windows system should then open the MBKP file using the temporarily installed program.
The entry relating to the MBKP file in the Windows registry has been removed or damaged
Entries that link the file extensions of the MBKP file with applications are located in the key HKEY_CLASSES_ROOT. If you don't know how to get to the Windows registry or how to make changes there, ask a specialist for help. Not knowing this could cause irreparable changes to your computer.
The MBKP file is infected with a virus
It can happen that a computer virus masquerades as an MBKP file. In this case there will definitely be no way to open such a file. Download a good antivirus program and scan the MBKP file mentioned. If the antivirus detects threatening data, it could mean that the MBKP file is infected.
Similar file extensions
MB3Minimal Board Editor (MBE)
MBP1Kindle Touch annotation
MBFAVSStardent AVS X Bitmap Image
MBSAMicrosoft Baseline Security Analyzer Format
MBACMascotCapsule Resource
MBFXAVS X Image
MBDMultimedia Builder MP3 Authoring Format
MBSOpera mailbox format
MBLLogger Pro Experiment Data Format
MBRZune Smooth Streaming Format
|
ESSENTIALAI-STEM
|
Page:United States Statutes at Large Volume 113 Part 3.djvu/573
PROCLAMATION 7201—MAY 26, 1999 113 STAT. 2091 Proclamation 7201 of May 26, 1999 Prayer for Peace, Memorial Day, 1999 By the President of the United States of America A Proclamation The challenges to oxn Nation's peace and freedom are as old as American history and as new as today's headlines. They have taken many forms through the years, from the bitter discord of civil war at home to the aggression of tyrants abroad. But the price of peace and freedom has always remained the semae: the service and sacrifice of our young men and women in uniform. Looking back across the decades, we marvel at the valor and determination of these gallant Americans who, in each generation, have stepped forward to preserve our freedom, defend our democracy, uphold our ideals, and protect our interests. The battles in which they fought and died—Brandywine, Gettysburg, San Juan Hill, Belleau Wood, Coral Sea, Inchon, Khe Sahn—are a testament to uncommon courage and indomitable spirit. Those who stuvived were forever changed. Those who died stay forever young in their loved ones' memories. Their final thoughts most likely were of home and family; their final actions purchased the freedom we enjoy today. Now, on Memorial Day, our thoughts turn to them. We remember with profound gratitude those who took to the seas and skies in moments of peril for our Nation. We remember those who marched through mud or rice paddies, snow or setad, because they knew, as President Eisenhower reminded us, that "a soldier's pack is not so heavy a burden as a prisoner's chains" and that true peace is won only by those willing to die for it. We remember those in the Normandy American Cemetery overlooking Omaha Beach who, 55 years ago, relit the torch of freedom in a war-weary Europe. We remember those whose final resting place is unknown, but whose sacrifice is known to us all. The passing of time and the blessings of peace and prosperity can never make us forget what these brave Americans endured and what they lost so that right would triiunph, freedom would survive, and our Nation would prevail. In honor of all the courageous men and women who gave their lives in defense of our Nation and our fundamental ideals, I ask that every American say a prayer for lasting peace on this Memorial Day. I ask that every American remember our heroic war dead in some special way, whether by placing flowers on a veteran's grave, lighting a candle, observing a moment of silence, or saying a prayer of thanks. While we can never fully repay our debt to America's fallen weirriors, we can remember their service and honor their sacrifice. In respect and recognition of the courageous men and women to whom we pay tribute, the Congress, by joint resolution approved on May 11, 1950 (64 Stat. 158), has requested the President to issue a proclamation calling upon the people of the United States to observe each Memorial Day as a day of prayer for permanent peace and designating a period on that day when the American people might unite in prayer. NOW, THEREFORE, I, WILLIAM J. CLINTON, President of the United States of America, do hereby proclaim Memorial Day, May 31, 1999,
�
|
WIKI
|
Accelerate the Value of Data
Configuring Cleanse Rules
Cleanse rule configuration details are part of tenant configuration and these rules can be applied to any entity type.
Configuration details for entity cleansing are available in the cleanseConfig section of the entity configuration.
HCP Entity with cleanseConfig
{
"URI": "configuration/entityTypes/HCP",
"cleanseConfig": {
"mappings": [
{
"URI": "configuration/entityTypes/HCP/cleanseConfig/mappings/Identifiers",
"inputMapping": [
{
"attribute": "configuration/entityTypes/HCP/attributes/Identifiers/attributes/Type",
"cleanseAttribute": "Identifiers.Type",
"mandatory": true,
"allValues": true
},
{
"attribute": "configuration/entityTypes/HCP/attributes/Identifiers/attributes/ID",
"cleanseAttribute": "Identifiers.ID",
"mandatory": false,
"allValues": true
}
]
}
],
"infos": [
{
"URI": "configuration/entityTypes/Individual/cleanse/infos/default",
"useInCleansing": true,
"sequence": [
{
"chain": [
{
"cleanseFunction": "MECleanser",
"mapping": {
"inputMappingRef": "configuration/entityTypes/HCP/cleanseConfig/mappings/Identifiers",
"outputMapping": [
{
"attribute": "configuration/entityTypes/HCP/attributes/ME",
"cleanseAttribute": "ME",
"mandatory": true
}
]
},
"proceedOnSuccess": true,
"proceedOnFailure": true
},
{
"cleanseFunction": "NPICleanser",
"mapping": {
"inputMappingRef": "configuration/entityTypes/HCP/cleanseConfig/mappings/Identifiers/inputMapping",
"outputMapping": [
{
"attribute": "configuration/entityTypes/HCP/attributes/NPI",
"cleanseAttribute": "NPI",
"mandatory": true
}
]
},
"proceedOnSuccess": true,
"proceedOnFailure": true
}
]
}
]
}
]
}
}
|
ESSENTIALAI-STEM
|
Wikipedia:Miscellany for deletion/Wikipedia:WikiProject New York Theatre (2nd nomination)
__NOINDEX__
The result of the discussion was Keep for historical reference. Already tagged as inactive and historical. --RL0919 (talk) 16:20, 10 April 2011 (UTC)
WikiProject New York Theatre
Dead project, started back in 2005 and went inactive in 2006 with no activity. JJ98 (Talk) 00:44, 1 April 2011 (UTC)
* Delete per nom. -- Klein zach 02:38, 1 April 2011 (UTC)
* Keep, there might have been very little activity on the project, but some work was done and deleting things doesn't actually save us hard drive space. Why bother with it at all when it's tagged as inactive? -- Ned Scott 08:56, 1 April 2011 (UTC)
* Delete per precedent that we delete any WikiProject that has never had activity. Playing devil's advocate, what do we gain from keeping it? Ten Pound Hammer, his otters and a clue-bat • (Otters want attention) 16:17, 1 April 2011 (UTC)
* Comment This was previously sent to MfD in 2008, and the consensus was to keep in spite of the inactivity. Although I don't see any pressing need to delete this WikiProject now (what has changed since 2008, other than the passage of time?), I doubt that there's any hope of this project being revived. After all, the articles within its scope surely are also within the scope of WikiProject Musical Theater. A Stop at Willoughby (talk) 18:25, 1 April 2011 (UTC)
* Keep as tagged. As I said above, there's no pressing need to delete this now (nothing has changed since the last MfD), and Cunard, below, makes a decent case for keeping these pages. A Stop at Willoughby (talk) 17:30, 7 April 2011 (UTC)
* Keep WikiProject New York Theatre contains valuable history. See Wikipedia talk:WikiProject New York Theatre for example: "I notice that the WikiProject page doesn't even mention that (free) images should be added to all articles. From the four days of my life that I spent in NYC, I found quite a lot of theatre pictures on my hard drive ;-) and uploaded lots of them today, described them (hopefully correctly) and added them (again hopefully correctly) to theatre, and sometimes musical, articles. Maybe you find some errors, or even some more use for the pictures. I appreciate every comment and correction. Some of the photos are not very good, but I think they are at least better than none. I created a category at commons:Category:Theaters in New York City. If you upload your own photos to the Commons, please use this category that is also linked to worldwide theatre building categories and the relevant NY categories. --AndreasPraefcke 20:08, 14 June 2007 (UTC) While I could add images of most Broadway theatre building exteriors to the articles, the following are still in want of recent exterior photographs: *American Airlines Theatre *Longacre Theatre *Manhattan Center *Palace Theatre, New York *Studio 54 Of the off-Broadway houses, I think the following are in an especially urgent want of an image: *Delacorte Theater *Elgin Theater (Joyce Theatre) *Little Shubert Theatre *Lucille Lortel Theatre *New York Theatre Workshop *Theater for the New City *Victoria Theater (New York City) As there are barely any theatre interior photographs at all, do take your cameras with you and upload! --AndreasPraefcke 07:56, 22 June 2007 (UTC)" 's commentary about the lack of photographs in this WikiProject's articles ought to be preserved. Editors who come across this WikiProject may find his comments helpful, in that they are pointed to commons:Category:Theaters in New York City. That this WikiProject and its talk page are useful indicates that the benefits of retaining the WikiProject far outweigh deleting it. Cunard (talk) 23:17, 6 April 2011 (UTC)
|
WIKI
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.