Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Best Coney Dogs In Detroit « CBS Detroit June 27, 2012 4:00 PM Get your fill at one of the many amazing coney dog places in Detroit including Lafayette Coney Island George's Coney Island and more. credit: from the owner 118 W. LafayetteDetroit, Mich. 48226(313) 964-8198Lafayette Coney Island on Facebook Lafayette is one of the most well know places for coneys in Detroit. You can only pay cash but it is well worth it. The Coney Dogs are fantastic and a staple for Detroit. credit: from the owner 114 W. LafayetteDetroit, Mich. 48226(313) 961-7758American Coney Island on Facebook American Coney Island is located right next store to Lafayette but it doesn't stop them from doing plenty of business. The American Coney Island hasn't changed much in the 87 years it's been cooking up some of Detroit's favorite coney dogs. Family owned and operated, it's no wonder that the recipes of their ancestors have been perfected here and served along side the highest quality Dearborn Sausage brand links. credit: http://www.nationalconeyisland.com 45221 Utica Park BlvdUtica, Mich. 48315(586) 323-1966www.nationalconeyisland.com National Coney Island is a great place to go to late at night in Suburban Detroit. National is open 24 hours and the food is always great. The servers are pleasant and always make it for a great place to get a Coney late at night. (credit: from the owner) 1292 East Michigan AvenueYpsilanti, MI 48198(734) 485-2831Bill's Drive-In on Facebook Bill's Drive-in has been a tradition in Ypsilanti since the 1960's and for a good reason. It's uncomplicated American food at it's finest. No hamburgers or fries here. The dog has options of chili, mustard and onions. The only side is a bag of Ruffles potato chips … *scoffs* as if you needed something else. Bonus! Their specialty is homeade rootbeer. At around $2 for a coney and a glass of rootbeer it's an outstanding value. (credit: Lupima's Coney Island) 621 N Main StRochester, MI 48307(248) 652-9862facebook.com Be warned that it's cash only. The inside seating is limited so sit outside and enjoy the view of the river. Fans enjoy the Russian, Chicago and Mexican dogs, seasoned fries and chili cheese fries of course. 1437 N. RochesterRochester, Mich. 483107(248) 656-0030 Georges Coney Island features great Coney Dogs that can rival just about any Coney Dog in Detroit. The chili is fantastic and the Hot Dogs will make you wanting more. 23310 Farmington RoadFarmington, Mich. 48336(248) 888-0700 This restaurant offers the traditional Coney Island menu in a friendly, clean atmosphere. Watch & Listen LIVE
NEWS-MULTISOURCE
Phil Cade Philip "Phil" Cade (June 12, 1916 –August 28, 2001) was an American amateur auto racer. Career Born in Charles City, Iowa, Cade owned and raced a Maserati 250F and Maserati V8RI. He entered the 1959 United States Grand Prix with his 250F, and though he qualified, was unable to start the race because "his car's engine expired". Though he stopped regularly racing in 1962, he kept the 250F until 1988, and was still occasionally racing the V8RI into the 1990s. Death Cade died on August 28, 2001, in Winchester, Massachusetts. Complete Formula One results (key)
WIKI
From Krita Documentation Jump to: navigation, search Edit Shapes Tool shape-edit tool The shape editing tool is for editing vector shapes. In Krita versions before 4.0 it would only show up in the docker when you had a vector shape selected. In Krita 4.0, this tool is always visible and has the Shape Properties docker as a part of it. You can access the Edit Shapes tool by clicking on the icon in the toolbox, but you can also access it by pressing Enter when in the Shape Selection tool and having a shape selected that can be most efficiently edited with the edit shapes tool(Right now, that's all shapes but text). On Canvas Editing of Shapes As detailed further in the Tool Options, there's a difference between path shapes and specialised vector shapes that make it easy to have perfect ellipses, rectangles and more. Path Shapes Path shapes can be recognised by the different nodes they have. Paths in Krita are mostly bezier curves, and are made up of nodes. For straight lines, the nodes are connected by a line-segment and that's it. For curved lines, each node has a side handle to allow curving of that segment using the cubic bezier curve algorithm. What that means, in short, is that moving the side handles into a given direction will make the segment curve in that direction, and the longer the line of the node to the side handle, the stronger the curving. Selecting Nodes for Editing You can select a single node with left mouse button, they will turn bright green if selected. left mouse button+Shift on unselected nodes will add them to a selection. left mouse button+drag will make a selection rectangle. All nodes whose handles are touched by the rectangle will be selected. This combines with left mouse button+Shift above. Selected Nodes You can add and remove side handles from a selected node with left mouse button+Shift. Krita has several node-types that allow you control the side handles more efficiently. These are the corner, smooth and symmetric modes. Corner Represented by a circle, the corner type allows you to have handles that can point in different directions and have different lengths. Smooth Represented by a square, the smooth type will ensure a smooth transition by always pointing the handles into opposite directions, but they can still have different lengths. Symmetric Represented by a diamond, the symmetric node will force handles to always point in opposite directions and have the same length. left mouse button+Ctrl on a selected node will cycle between the node-types. del will remove the selected node. Selected Segments Segments are the lines between nodes. Hovering over a segment will show a dotted line, indicating it can be selected. You can left mouse button and drag on a segment to curve it to the mouse point. Clicking on different parts of the segment and dragging will curve it differently. Double left mouse button on a segment will add a node on the segment under the mouse cursor. The new node will be selected. Other Shapes Shapes that aren't path shapes only have a single type of node: A small diamond like, that changes the specific parameters of that shape on-canvas. For example, you can change the corner radius on rectangles by dragging the nodes, or make the ellipse into a pie-segment. Tool Options The tool options of the Edit Shapes Tool change depending on the type of shape you have selected. With the exception of the path shape, all shapes have a Convert to Path action, which converts said shape to a path shape. Path Shapes path tool line tool polyline tool polygon tool freehandvector tool Path shapes are the most common shape and can be made with the following tools: Node Editing Edit the nodes. Corner Point Make the selected node a corner or cusp. This means that the side handles can point in different directions and be different lengths. Smooth Point Make the selected node smooth. The two side handles will always point in opposite directions, but their length can be different. Symmetric Point Make the selected node smooth. The two side handles will always point in opposite directions, and their length will stay the same. Insert Point Insert a new node into the middle of the selected segment. Remove Point Remove the selected node. Line Segment Editing Edit line segments between nodes. Segment To Line Make the current segment a straight line. Segment To Curve Make the current segment a curve: It'll add side nodes for this segment to the nodes attached to it. Make Line Point Turn the selected node into a sharp corner: This will remove the side handles. Make Curve Point Turn the selected node into one that can curve: This will add side handles to the node. Break at Point Break the path at this point. Break Segment Break the path at the selected segment. Join with Segment Join two nodes that are only attached on one side with a segment. Merge Points Merge two nodes into one, if the nodes are adjacent or if both nodes are only attached on one side with a segment. Rectangle Shapes rectangle tool Rectangle shapes are the ones made with the Rectangle Tool. It has extra options to make rounded corners easy. Corner radius x The radius of the y-axis of the corner curve. Corner radius y The radius of the y-axis of the corner curve. Ellipse Shapes ellipse tool Ellipse shapes are the ones made with the Ellipse Tool. Type The type of ellipse shape it is. Arc An arc shape will keep the path open when it isn't fully circular. Pie A pie shape will add two extra lines to the center when the shape isn't fully circular, like how one cuts out a piece from a pie. Cord A cord shape will add a straight line between the two ends if the path isn't fully circular, as if a cord is being strung between the two points. Start Angle The angle at which the shape starts. End Angle The angle at which the shape ends. Close Ellipse An action to quickly make the ellipse fully circular. Star Shapes/Flower Shapes Star shapes and Flower shapes are dragged and dropped from the Add Shape Docker. Polygon Whether the shape should be handled as a polygon(like a pentagon or hexagon) or a star shape. Corners How many corners the shape should have. Inner Radius The position of the inner node relative to the center. Outer Radius The position of the outer node relative to the center. Spiral Shapes Spiral shapes are the ones dragged and dropped from the Add Shape Docker. Type The type of spiral Curve A round spiral. Line A blocky square spiral, like a greek ornament. Fade The number that indicates how fast the spiral spirals inwards. A high number will mean it is a perfect circle, a low number means it spirals inward very quickly. Direction Whether the spiral goes clockwise or counter clockwise.
ESSENTIALAI-STEM
Wu Fengchang Wu Fengchang (born 23 August 1964) is a Chinese engineer who is a researcher at the Chinese Research Academy of Environmental Sciences, and an academician of the Chinese Academy of Engineering. Biography Wu was born in Longyou County, Zhejiang, on 23 August 1964. He secondary studied at Quzhou No. 2 High School. In 1985, he was accepted to Changchun Institute of Geology (now Jilin University), graduating in 1989 with a bachelor's degree in geochemistry and exploration. He went on to receive his master's degree in 1992 and doctor's degree in 1995 at the Institute of Geochemistry, Chinese Academy of Sciences, all in environmental geochemistry. He joined the Communist Party of China in August 1993. He worked at the Institute of Geochemistry, Chinese Academy of Sciences, since 1995, what he was associate research fellow in 1995 and research fellow in 2001. In March 1997, he was recruited by McMaster University as a guest associate professor, he remained at the university until May 1999, when he was engaged by the Japan Science and Technology Agency as an overseas special researcher at Nagoya University. Wu returned to China in 2001 and that same year became a researcher at the State Key Laboratory of Organic Geochemistry, Chinese Academy of Sciences. He was honored as a Distinguished Young Scholar by the National Science Fund for Distinguished Young Scholars in 2005. He was appointed director of the State Key Laboratory of Environmental Protection and Lake Pollution Control in January 2008 and director of the State Key Laboratory of Environmental Benchmark and Risk Assessment in May 2011. Honours and awards * 2014 Science and Technology Progress Award of the Ho Leung Ho Lee Foundation * 2016 National Labor Medal * 27 November 2017 Member of the Chinese Academy of Engineering (CAE)
WIKI
Abhishek Dhar Abhishek Dhar (born 31 August 1970) is an Indian physicist specialising in statistical physics and condensed matter physics. He is a Professor in the International Centre for Theoretical Sciences, Bangalore. Education and career Dhar obtained his PhD in 1998 from the Department of Theoretical Physics at the Tata Institute of Fundamental Research. His doctoral advisor was Deepak Dhar. He did post-doctoral research at Indian Institute of Science, Raman Research Institute and University of California, Santa Cruz. Dhar then became a faculty member of the Raman Research Institute and later joined the International Centre for Theoretical Sciences. Research Dhar works on the theory and applications of statistical physics to study non-equilibrium problems. His research areas include anomalous heat transport in low dimensional systems and open quantum systems where he made significant contributions in developing an approach using quantum Langevin equations. Dhar also studies large deviations and fluctuation theorems in transport, foundational aspects of statistical mechanics, the measurement problem in quantum mechanics and models of active matter. Awards For his results in classical and quantum transport in low dimensional systems and contributions to non-equilibrium fluctuation theorems, Dhar was awarded the ICTP prize in 2008 and Shanti Swarup Bhatnagar award for Physical Sciences in 2009. He is a fellow of the Indian Academy of Sciences (2012), the National Academy of Sciences (2018) and the Indian National Science Academy (2020).
WIKI
The Indonesian horse that acts as a library - BBC News Share this with Email Facebook Messenger Messenger Twitter Pinterest WhatsApp LinkedIn Copy this link Adult illiteracy in Indonesia is dropping, but one region has almost a million adults who cannot read. In central Java, the BBC meets one man and his horse who are helping improve access to books. For a formerly wild horse that barely reaches shoulder-height on an adult man, Luna is an unlikely figure to help improve literacy rates in Indonesia. Luna is looked after by Ridwan Sururi, 42, in the village of Serang, in the Purbalingga region of Java island. It is a rural, tropical area, lying on the edge of one of Indonesia's most active volcanoes, Mount Slamet. In a region dotted by villages, Mr Sururi - and Luna - have become essential links between communities in recent months. In January, Mr Sururi started a mobile library called Kudapustaka - meaning 'horse library' in Indonesian. He travels between villages with books stored in boxes balanced on Luna's back. He visits schools three times a week - every Tuesday, Wednesday, and Thursday. Sometimes he brings along his daughter, Indriani Fatmawati. Children and villagers do not have to pay anything to borrow the books and Mr Sururi has not looked to make money from the scheme. I love horses, and I want this hobby to bring benefit to people, he told BBC Indonesia. The idea for Kudapustaka came from Nirwan Arsuka a fellow horse enthusiast and friend of Mr Sururi's. He asked me: Can we help society through our hobby? I said I was interested, but I didn't know how. Then, he had this idea to create a mobile library using horses. I liked the idea, but sadly I didn't have any books. So, he sent me boxes of books. According to Unesco, Indonesia has made great strides in reducing adult illiteracy in recent years, bringing the number of illiterate adults down from 15.4m in 2004 to 6.7m in 2011. However, Unesco says there are more than 977,000 illiterate adults in central Java, Ridwan's region. As a professional horse caretaker, Mr Sururi does not own any of his own animals. So did he ask permission to use the horse as a mobile library? I haven't, he said, laughing. The owner lives far away from this village and hasn't visited the horses for a long time. I am a bit sad about that. Of the three horses he is paid to look after, Mr Sururi picked Luna as his companion. It was a wild horse, but I tamed it. Luna has never kicked or bitten anybody, and is very friendly when surrounded by children. He said he wished more people would donate books to his scheme. Children here love comics and story books. Adults, on the other hand, need inspirational and how-to books, like how to farm, that kind of thing. Mr Sururi dreams of one day owning his own Kudapustaka horse - and a real library too. I hope I can have a small library in front of my house, he says. But I know it is only a dream. Hundreds of Aleppo men are reported missing after leaving rebel areas, the UN says. Obituary: John Glenn, first American to orbit the earth Aleppo doctor's heart-breaking letter The secret history of African-American Santas Images from the career of Kirk Douglas as he turns 100 Why La La Land's opening scene amazes audiences A murder inflames refugee tension in Germany Are voters really turning to Geert Wilders? What did the world find out about chimps' backsides? Helping US police not to pull the trigger
NEWS-MULTISOURCE
Encryption What is a VPN (virtual private network)? VPN — secure data transfer through public networks VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling. Password protect pdf Password protect PDFs: How to encrypt a PDF Due to its platform independence and the option to combine text and images with navigation aids in one document, the PDF format has been one of the most popular file formats for years. But when it comes to the security of the files, the same applies as to all other digital files: Only by password protecting PDFs is the information contained in the file secured. But how do you encrypt a PDF? QUIC – the Internet Transport Protocol based on UDP QUIC: What is behind the experimental Google Protocol? Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this. Finding a website host: how to search successfully Host: how to find out which provider is most suitable for your project If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays? Intrusion detection systems and prevention systems The intrusion detection and intrusion prevention systems at a glance A stable network is characterised not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible... S/MIME: the standard method for e-mail encryption S/MIME: how to encrypt and sign your e-mails If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to... IP Spoofing: Fundamentals and counter-measures IP Spoofing: Simple manipulation of data packets by attackers Sending data over networks is one of the most important and highest utilised functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things... Spear phishing Spear phishing: targeted attacks on your data Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work? What is MAC spoofing? What is MAC spoofing? MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC... Own your online success IONOS takes care of your online challenges Create your website with the perfect domain and the UK's fastest hosting!
ESSENTIALAI-STEM
Page:Fairy tales from Hans Christian Andersen (Walker).djvu/158 122 for a garden. They were not brother and sister, but they were just as fond of each other as if they had been. Their parents lived opposite each other in two attic rooms. The roof of one house just touched the roof of the next one, with only a rain-water gutter between them. They each had a little dormer window, and one only had to step over the gutter to get from one house to the other. Each of the parents had a large window-box, in which they grew pot herbs and a little rose tree. There was one in each box, and they both grew splendidly. Then it occured to the parents to put the boxes across the gutter, from house to house, and they looked just like two banks of flowers. The pea vines hung down over the edges of the boxes, and the roses threw out long creepers which twined round the windows. It was almost like a green triumphal arch. The boxes were high, and the children knew they must not climb up onto them, but they were often allowed to have their little stools out under the rose trees, and there they had delightful games. Of course in the winter there was an end to these amusements. The windows were often covered with hoarfrost; then they would warm coppers on the stove and stick them on the frozen panes, where they made lovely peep-holes as round as possible. Then a bright eye would peep through these holes, one from each window. The little boy's name was Kay, and the little girl's Gerda. In the summer they could reach each other with one bound, but in the winter they had to go down all the stairs in one house and up all the stairs in the other, and outside there were snowdrifts. "Look! the white bees are swarming," said the old grandmother. "Have they a queen bee, too?" asked the little boy, for he knew that there was a queen among the real bees. "Yes, indeed, they have," said the grandmother. "She flies where the swarm is thickest. She is the biggest of them all, and she never remains on the ground. She always flies
WIKI
Optical instrument An optical instrument is a device that processes light waves (or photons), either to enhance an image for viewing or to analyze and determine their characteristic properties. Common examples include periscopes, microscopes, telescopes, and cameras. Image enhancement The first optical instruments were telescopes used for magnification of distant images, and microscopes used for magnifying very tiny images. Since the days of Galileo and Van Leeuwenhoek, these instruments have been greatly improved and extended into other portions of the electromagnetic spectrum. The binocular device is a generally compact instrument for both eyes designed for mobile use. A camera could be considered a type of optical instrument, with the pinhole camera and camera obscura being very simple examples of such devices. Analysis Another class of optical instrument is used to analyze the properties of light or optical materials. They include: * Interferometer for measuring the interference properties of light waves * Photometer for measuring light intensity * Polarimeter for measuring dispersion or rotation of polarized light * Reflectometer for measuring the reflectivity of a surface or object * Refractometer for measuring refractive index of various materials * Spectrometer or monochromator for generating or measuring a portion of the optical spectrum, for the purpose of chemical or material analysis * Autocollimator which is used to measure angular deflections * Vertometer which is used to determine refractive power of lenses such as glasses, contact lenses and magnifier lens DNA sequencers can be considered optical instruments, as they analyse the color and intensity of the light emitted by a fluorochrome attached to a specific nucleotide of a DNA strand. Surface plasmon resonance-based instruments use refractometry to measure and analyze biomolecular interactions. Other types * Magic lantern * Polarization controller
WIKI
Neptune's moons perform a strange orbit dance around each other (CNN)Two of Neptune's innermost moons perform a strange dance to avoid each other that is weird and completely unique compared to all known orbits, according to new research. Naiad and Thalassa, both tiny Tic Tac-shaped moons around Neptune, are only about 1,150 miles apart. While Naiad completes an orbit around Neptune every seven hours, Thalassa takes about seven and a half hours. This makes Thalassa the slower moving partner in an oddly choreographed dance that actually keeps their orbits stable. Naiad is in a tilted, varying orbit that resembles an oddly zigzagging pattern, where it appears to pass Thalassa two times above and below. Compared to Thalassa's slow, steady loop, Naiad appears to be flying by and gaining four laps with its up, up and down, down pattern. A study of these orbits published recently in the journal Icarus. The observations of the orbital patterns were made using NASA's Hubble Space Telescope. "We refer to this repeating pattern as a resonance," said Marina Brozović, study author and expert in solar system dynamics at NASA's Jet Propulsion Laboratory. "There are many different types of 'dances' that planets, moons and asteroids can follow, but this one has never been seen before." Neptune is a gas giant distant from the sun in the outer solar system and it has 14 moons. Some of the moons formed in place along with Neptune while others were captured by the planet's gravity. Since the discovery of the small inner moons, scientists have believed that they are younger than Neptune and that they formed after Neptune captured its largest moon, Triton. They also thought these inner moons were fragmented due to impacts by comets. The seven inner moons, including Naiad and Thalassa that are each 60 miles long, are also interspersed with Neptune's ring system. "We suspect that Naiad was kicked into its tilted orbit by an earlier interaction with one of Neptune's other inner moons," Brozović said. "Only later, after its orbital tilt was established, could Naiad settle into this unusual resonance with Thalassa." Earlier this year, Mark Showalter, a planetary astronomer at the SETI Institute, uncovered the 14th moon around Neptune called Hippocamp. It was hidden from view during Voyager's initial observation of Neptune and its moons. "We are always excited to find these co-dependencies between moons," said Showalter, who is also a co-author on the new paper. "Naiad and Thalassa have probably been locked together in this configuration for a very long time, because it makes their orbits more stable. They maintain the peace by never getting too close."
NEWS-MULTISOURCE
Vitamin D is a Strength Trainer Vitamin D is frequently called “the sunshine vitamin” because it is naturally synthesized by the body after skin exposure to sunlight. However, the body’s ability to do that diminishes with age, as does outdoor activity in general. And this is a big problem. Having low levels of vitamin D is a threat to overall health and can weaken you in many ways. It can lead to a compromised immune system, brittle, easily fractured bones, a greater risk of depression, and rapid muscle loss. Muscle loss is not just an issue if you’re a body builder. With loss of muscle tissue also comes a lack of balance, poor physical performance, and less mobility. Unfortunately, it is fairly common, affecting over 20 percent of older adults. One of the major reasons for this slow-moving epidemic is a lack of vitamin D. This clinical study found that blood levels of the nutrient were key for maintaining muscles. In fact, poor physical performance was almost three times worse in those with low vitamin D. The good news is that boosting vitamin D and physical activity – and one helps the other – is an excellent way to avoid muscle loss and renew vitality and strength. Abstract: Aspell N, Laird E, Healy M, Lawlor B, O’Sullivan M. Vitamin D Deficiency Is Associated With Impaired Muscle Strength And Physical Performance In Community-Dwelling Older Adults: Findings From The English Longitudinal Study Of Ageing. Clin Interv Aging. 2019;14:1751‐1761. Published 2019 Oct 15. doi:10.2147/CIA.S222143 Purpose: Maintaining skeletal muscle function throughout life is a crucial component of successful ageing. Adequate vitamin D status may be important in preserving muscle function. We aimed to determine the association between impaired muscle function and serum vitamin D status in community-dwelling older adults. Falls were explored as a secondary aim. Methods: Data were analyzed from adults aged ≥60 years, from Wave 6 of the English Longitudinal Study of Aging (ELSA). Handgrip strength (HGS) and the short physical performance battery (SPPB) were employed as measures of muscle strength and physical function, respectively. Serum 25-hydroxyvitamin D [25(OH)D] was assessed with concentration <30 nmol/L classed as vitamin D deficient. Results: The study comprised 4157 community-dwelling adults with a mean age of 69.8 (SD 6.9). Overall, 30.6% had low HGS and 12.7% had low SPPB (≤6). Participants with the lowest serum 25(OH)D (<30 nmol/L) had the highest prevalence of impaired muscle strength and performance (40.4% and 25.2%) compared with participants with levels ≥50 nmol/L (21.6% and 7.9%). Consistent with this, vitamin D deficiency (<30 nmol/L) was a significant determinant of low HGS (OR 1.44 [1.22, 1.71], p<0.001) and poor physical performance (OR 1.65 [1.31, 2.09], p<0.001) in the logistic regression models. Older adults partaking in regular moderate physical activity had significantly lower odds of impaired muscle strength (OR 0.65 [0.58, 0.79]) and physical function (OR 0.30 [0.24, 0.38]), p <0.001, respectively. Single or multiple falls (15.8% and 10.5% in past year) were not associated with vitamin D status. Conclusion: Vitamin D deficiency was associated with impaired muscle strength and performance in a large study of community-dwelling older people. It is generally accepted that vitamin D deficiency at the <30 nmol/L cut-off should be reversed to prevent bone disease, a strategy that may also protect skeletal muscle function in ageing. Here is the link to the complete study: Vitamin D Deficiency Is Associated With Impaired Muscle Strength And Physical Performance In Community-Dwelling Older Adults: Findings From The English Longitudinal Study Of Ageing
ESSENTIALAI-STEM
Talk:Scouting in Arkansas Historical council information to be folded in Historical council information to be folded in — Preceding unsigned comment added by Kintetsubuffalo (talk • contribs) 14:07, 15 September 2006 * Arkansas Blytheville 1916 1917 disbanded 1917 * Arkansas 19 Jonesboro 1917 1923 changed name to Saint Francis Valley 19 1923 * Arkansas 677 Crowley Ridge 1924 1926 changed name to Mohawk 677 1926 * Arkansas 17 Jefferson County 1919 1930 changed name to Kanawha Area 17 1930 * Arkansas 19 Saint Francis Valley 1923 1930 disbanded 1930 * Arkansas 677 Mohawk 1926 1930 disbanded 1930 * Arkansas 17 Kanawha Area 1930 1934 1/2 disbanded into De Soto Area 13 1934 * Arkansas 17 Kanawha Area 1930 1934 1/2 disbanded into Quapaw Area 18 1934 * Arkansas 13 De Soto Area 1924 * Arkansas 14 Hot Springs 1918 1925 changed name to Ouachita Area 14 1925 * Arkansas 14 Ouachita Area 1925 * Arkansas 15 Fayetteville 1922 1926 * Arkansas 15? 1926 1935 * Arkansas 15 Eastern Arkansas Area 1935 http://www.eaac.org * Arkansas 16 Fort Smith 1920 1924 changed name to Fort Smith-Van Buren 16 1924 * Arkansas 16 Fort Smith-Van Buren 1925 1928 merged into Northwest Arkansas 16 1928 * Arkansas 753 Ozark 1926 1928 merged into Northwest Arkansas 16 1928 * Arkansas 16 Northwest Arkansas 1929 1930 changed name to Fort Smith Area 16 1930 * Arkansas 16 Fort Smith Area 1930 1936 changed name to Westark Area 16 1936 * Arkansas 16 Westark Area 1936 * Arkansas 18 Little Rock 1916 1919 ended 1919 * Arkansas 18 Little Rock 1920 1923 reformed/changed name to Pulaski County 18 1923 * Arkansas 18 Pulaski County 1923 1927 changed name to Quapaw Area 18 1927 * Arkansas 18 Quapaw Area 1927 Abooikpaagun Lodge merge * support; 80% of this article is a duplicate of Order of the Arrow. --Gadget850 ( Ed) 07:19, 21 May 2007 (UTC) * Support-- The article has been merged, so I am removing the tag. --Glennfcowan (talk) 05:44, 17 December 2007 (UTC)
WIKI
Search Results for: how to read frm file Examining the TokuDB MySQL storage engine file structure As we know different storage engines in MySQL have different file structures. Every table in MySQL 5.6 must have a .frm file in the database directory matching the table name. But where the rest of the data resides depends on the storage engine. For MyISAM we have .MYI and .MYD files in the database directory […] How to recover table structure from .frm files with MySQL Utilities Table structures are stored in .frm files and in the InnoDB Data Dictionary. Sometimes, usually in data recovery issues, we need to recover those structures to be able to find the lost data or just to recreate the tables. There are different ways to do it and we’ve already written about it in this blog. […] Concatenating MyISAM files Recently, I found myself involved in the migration of a large read-only InnoDB database to MyISAM (eventually packed). The only issue was that for one of the table, we were talking of 5 TB of data, 23B rows. Not small… I calculated that with something like insert into MyISAM_table… select * from Innodb_table… would take […] MySQL opening .frm even when table is in table definition cache or… “the case of Stewart recognizing parameters to the read() system call in strace output”. Last week, a colleague asked a question: I have an instance of MySQL with 100 tables and the table_definition_cache set to 1000. My understanding of this is that MySQL won’t revert to opening the FRM files to read the table […] Connecting orphaned .ibd files There are two ways InnoDB can organize tablespaces. First is when all data, indexes and system buffers are stored in a single tablespace. This is typicaly one or several ibdata files. A well known innodb_file_per_table option brings the second one. Tables and system areas are split into different files. Usually system tablespace is located in […] Recover MySQL root password without restarting MySQL (no downtime!) Disclaimer: Do this at your own risk! It doesn’t apply if you’re using Pluggable authentication and certainly won’t be usable if/when MySQL system tables are stored on InnoDB What is the situation? The situation is the classic “need to recover MySQL root password” but you cannot restart MySQL (because it is the master production server, […] MySQL 5.6 Transportable Tablespaces best practices In MySQL 5.6 Oracle introduced a Transportable Tablespace feature (copying tablespaces to another server) and Percona Server adopted it for partial backups which means you can now take individual database or table backups and your destination server can be a vanilla MySQL server. Moreover, since Percona Server 5.6, innodb_import_table_from_xtrabackup is obsolete as Percona Server also […] When (and how) to move an InnoDB table outside the shared tablespace In my last post, “A closer look at the MySQL ibdata1 disk space issue and big tables,” I looked at the growing ibdata1 problem under the perspective of having big tables residing inside the so-called shared tablespace. In the particular case that motivated that post, we had a customer running out of disk space in his […]
ESSENTIALAI-STEM
Bank of New South Wales building, Helidon Bank of New South Wales is a heritage-listed former bank building at 7 Railway Street, Helidon, Lockyer Valley Region, Queensland, Australia. It was built in c. 1915. It is also known as Bank of Commerce, Bank of Queensland Limited, and The Royal Bank of Queensland Limited. It was added to the Queensland Heritage Register on 21 October 1992. History The former Bank of New South Wales building at Helidon was constructed for the Royal Bank of Queensland, probably in 1915–1916. Queensland's first indigenous bank, the Queensland National Bank, was established in 1872, by a group of prominent Queenslanders who wished to secure development capital free from overseas or inter-colonial control. The Royal Bank of Queensland Limited was established in 1885 when local investors were finding it hard to obtain loans from sources outside Queensland. By 1889 it had 20 branches and agencies including branches at London and Edinburgh. It did not achieve the importance of the Queensland National Bank, but was a competitor to it and, with the Bank of North Queensland, was one of the three 19th-century banks formed in the colony. The Royal Bank of Queensland Limited established a Receiving Office, operated by its Gatton Branch, on this site in 1906. In May 1910, when it was realised that a rival bank, the Australian Joint Stock Bank, was about to open in premises directly across the street, this office was upgraded to a full branch in order to retain its sizeable business in the town. The Australian Bank of Commerce absorbed the Australian Joint Stock Bank in the same year. In 1911, the Royal Bank held a mortgage on this land from the owner, Mary Ellen Barry, but did not acquire the land until 1915, when it is thought that the combined bank and residence was constructed. In 1917 the Royal Bank of Queensland merged with the Bank of North Queensland to the Bank of Queensland Limited. The National Bank of Australasia absorbed this bank in 1922. Possibly in anticipation of this merger the Helidon branch was sold in 1921. It was purchased by the Australian Bank of Commerce, and so passed into the hands of its original competitor. The next change of name occurred in 1932 following the acquisition of the Australian Bank of Commerce by the Bank of New South Wales. It was as the Bank of New South Wales that this branch traded until 1970 when it was closed and the building passed into private ownership in 1971. It has since been used as a residence. Description The former bank building is located on the western side of Railway Street, Helidon approximately 50 m from the street. It is a timber structure on low stumps consisting of a banking chamber with manager's residence at the rear. The facade of the banking chamber features a central arch above the entry with the pediment above supported on double timber corbels and fluted timber pilasters. Above the pediment is a gable clad with pressed metal sheeting. The verandahs to the manager's residence have been built in. The roof is clad with corrugated iron and the intersection of the gabled roof of the former banking chamber and the pyramid-roofed residence is unusual in form, being a striking feature of the building. There are other buildings on site including a house to the rear of the bank building. These are not included in this entry. Heritage listing The former Bank of New South Wales premises and attached residence was listed on the Queensland Heritage Register on 21 October 1992 having satisfied the following criteria. The place is important in demonstrating the evolution or pattern of Queensland's history. The former bank building was constructed for the Royal Bank of Queensland Limited and is important in illustrating the development of Queensland because it was purpose built as premises for a bank formed to serve Queensland interests and needs when the state was a self-governing colony. It also illustrates the development of Helidon, which was a refreshment stop on the main railway line between Brisbane and Wallangarra, the state border interchange. The former bank is important for its association with the Royal Bank of Queensland, one of Queensland's three indigenous banks. The place is important in demonstrating the principal characteristics of a particular class of cultural places. The building is a good example, adapted for a small rural town, of a combined banking chamber and manager's residence. This residential arrangement was common in bank buildings from the nineteenth century until World War Two. The place is important because of its aesthetic significance. The former Bank of New South Wales building is important for its architectural appeal, which makes a major contribution to the townscape of Helidon.
WIKI
UpToDate Vaginal yeast infections may be set off by hormonal fluctuations during pregnancy, during breastfeeding, or around menstrual periods, for example. They aren’t contagious, and can’t spread to another person during sex. Yeast infection drug ok during pregnancy (video), although yeast infections have no major effects on the unborn baby, they are difficult to control during pregnancy and can cause significant discomfort to women. A word from verywell, if you try it, it must be plain with NO SUGAR. Just like any other thing you put in your vagina, the most common side effects are going to be burning and irritation. Vaginal yeast infections can be treated with medicines such as pills or creams, ovules, or ointments. Treating yeast infections, naturally, when you lay down the medicine can reach the site instantly and more importantly, the cream is less likely to leak out and cause burning on broken irritated skin. Atrophic vaginitis is treated with estrogen, which can be applied as a vaginal cream, ring, or tablet. Eczema, this disorder most often occurs on the front of both legs. Sexually transmitted diseases treatment guidelines, 2020. Doctors may also prescribe a single or multidose oral medication called fluconazole. • Did I catch it somehow? • Instead, stay nice and fresh with a mild soap (like Summer's Eve Feminine Wash for Sensitive Skin, $13; ) and grab some fragrance-free detergent when it comes time to wash your underwear. • Pain in the vagina during sexual intercourse. • Medicine put into the vagina can be uncomfortable. • If you use too much of it, yes. Wearing a wet swimsuit for many hours may keep your genital area warm and moist. Medical care, fluconazole (Diflucan tablets):. Yeast can grow out of check when a person is stressed, has recently used antibiotics or has a weakened immune system. Thank you for signing up, overall, there’s no harm in drinking cranberry juice if you find it comforting, but you should avoid it if you are taking any blood thinning medications. Tea tree oil and garlic both have antifungal properties, but there is not enough research to show that they are effective at treating a yeast infection (9,11). • Medications can effectively treat vaginal yeast infections. • Some doctors advise that women avoid sex during treatment. • This is a rare and severe form of Candidiasis, characterized by chronic infection of the skin, nails, scalp, and mucous membranes. • It almost makes you automatically clench up your vaginal muscles, as if that could prevent unwanted intruders from disrupting your sexual health, doesn't it? • Vaginal boric acid capsules are available over-the-counter. • A healthy vagina has many bacteria and a small number of yeast cells. • So can certain health problems, like diabetes or HIV infection. Are Some Women More At Risk For Yeast Infections? Side effects from these pills are rare with one treatment dose. Related questions, easier orgasms? Vaginal odor: causes, prevention, and treatment, in cases of BV, the pH becomes higher than 4. Your doctor may want to do a vaginal exam. This disorder typically occurs in people with diabetes or a weakened immune system or in otherwise healthy people whose hands are subjected to frequent wetting or washing.
ESSENTIALAI-STEM
字幕列表 影片播放 列印英文字幕 Neil: Hello. Welcome to 6 Minute English. I'm Neil and with me is Mike. Hello, Mike. Mike: Hello. Neil: Now, today we're talking about someone you might have read about in history books: Winston Churchill – the British prime minister during the Second World War who is well-known throughout the world. Winston Churchill: We shall fight on the beaches, we shall fight on the landing grounds, we shall fight in the fields and in the streets. We shall fight in the hills. We shall never surrender! Mike: Ah, never surrender, in other words, never submit to your enemy. I remember reading about this speech that Churchill gave in June 1940, when France was being invaded by the forces of Nazi Germany. Neil: Yes, and this shows the spirit of this very famous leader still admired to this day. So much so that here in the UK we are marking the 50th anniversary of Winston Churchill's death. Mike: He was a controversial figure wasn't he, Neil? Controversial – it means people have divided opinion about him. Neil: Yes he was quite a controversial figure. You'll learn more about him in this programme as well as some new words. But first, as ever, I'd like to ask you a quiz question, Mike. Mike: Okay, I'm ready! Neil: Do you know a lot about Churchill? Mike: I think I do, yes. Neil: Okay. We'll see about that. Which of these facts about Winston Churchill is false? Now, is it: a) He won the Nobel Peace Prize. b) He tried three times before passing exams to the Military Academy. c) He was a writer and a painter. Mike: I think it's (a). I think he won a Nobel Prize but I think it was Literature, not Peace. Neil: Well, we'll see at the end of the programme. Now, let's talk about Churchill. Mike: You know what, Neil, many people think Churchill has a lot to teach some of today's politicians. He was very determined, in other words, he was persistent. When Churchill believed in an idea, he didn't give up easily. Neil: Yes. The Mayor of London Boris Johnson sees another good quality in Britain's wartime leader. He says there's one thing today's politicians do that Churchill didn't. What was it? How did he deal with issues? Boris Johnson: It's an illusion to think that he was a guy who skated over the issues. He was deeply immersed in all the detail and all the technicality and that helped him to get the right answer. Mike: Ah, Churchill didn't 'skate over' the issues. 'To skate over' means to avoid dealing with something. Churchill studied the issues in detail… Neil: … and it helped him to get things right, according to Boris Johnson. One example is that Churchill actually went to Germany in the 1930s to assess the situation in the country first hand. Mike: Well, Nazi Germany was defeated and Churchill had a role in that. But there were other things he got wrong. He misjudged many situations. Misjudged, in other words, he formed a wrong opinion about them. Neil: That's right! The historian Nigel Knight, a leading academic at Cambridge University, wrote a book about Churchill. He lists some of the mistakes made by the wartime leader throughout his political career. Now, let's listen. How does he describe Churchill's character? Dr Nigel Knight: Churchill was fundamentally flawed. So was his military strategy: Gallipoli in World War One, which was replicated in the Norwegian, North African and the soft underbelly of Europe campaigns during the World War Two. It was his economic strategy as chancellor in the 1920s, the return to the gold standards, his attitude towards India and the Indians, and indeed his post war 51-55 ministry, which was very lacklustre and very poor indeed. Mike: Nigel Knight calls Churchill 'flawed', it means he had a weakness in his character. And Churchill didn't get it right all the time. Neil: No. He occupied different posts in government and sometimes he didn't get his strategy, which means his plan of action, right. His strategy in some military campaigns ended up in disaster. Mike: And his strategy regarding the British economy may have actually contributed to a period of economic crisis known as the Great Depression. And when he became prime minister again, in the 50s, his government wasn't very good, was it Neil? Neil: No. Not according to the Cambridge academic Dr Nigel Knight. He called it 'lacklustre', which means dull, uninspiring. Mike: Well, we shall remember him mostly for his speeches in World War Two. Neil: Well, we're running out of time so I'll go back to our quiz question. Mike: You mentioned three facts about Winston Churchill and you said one of them was false, Neil. Neil: Yes, and the options were: a) He won the Nobel Peace Prize. b) He tried three times before passing exams to the Military Academy. c) He was a writer and a painter. Mike: And I said I thought he won the Nobel Literature Prize, not the Peace Prize. Neil: And you were absolutely right! Churchill did win a Nobel Prize but it was for Literature because he wrote books about History. He was also a possible candidate for the 1945 Nobel Peace Prize but didn't win. Well, that's it for this programme but let's just remind ourselves of some of the words we've used today. Mike: They were: surrender, controversial, determined, skate over, misjudged, flawed, strategy and lackluster. Neil: Thanks, Mike. Well, that's it for today. Do go to www.bbclearningenglish.com to find more 6 Minute English programmes. Until next time. Goodbye! Mike: Bye!
FINEWEB-EDU
Dennis Widgren Trond Dennis Widgren (born 28 March 1994) is a Swedish footballer who plays as a left back for IK Sirius in Allsvenskan. Östersunds FK Widgren started to play football at IFK Östersund, before moving to other local club Östersunds FK at age 14. He made his debut for their senior team in 2010. During Widgren's time at the club, Östersund won several promotions from Division 2, Sweden's fourth tier, to Allsvenskan, the highest division. He was a key player for long-time manager Graham Potter's side between 2010 and 2018, also making several continental appearances in the Europa League. Widgren was a part of the Östersund side that won Svenska Cupen in 2017, the first domestic title in the club's history. Hammarby IF On 2 January 2019, Widgren moved on a free transfer to fellow Allsvenskan club Hammarby IF, signing a three-and-a-half-year contract. He made 25 league appearances during his first season, as the club finished 3rd in the table. On 30 May 2021, Widgren won the 2020–21 Svenska Cupen with Hammarby through a 5–4 win on penalties (0–0 after full-time) against BK Häcken in the final. On 13 July 2021, Widgren was sent on loan for the remainder of the year to fellow Allsvenskan club IK Sirius. Making 18 league appearances, Widgren helped the club avoid relegation by finishing in 11th place in the table, before leaving at the end of the season. IK Sirius On 22 July 2022, Widgren transferred to IK Sirius on a permanent deal, signing a three-and-a-half-year contract. International career Between 2011 and 2013, Widgren won three caps for the Swedish U19 national team. He was the first player ever from Östersunds FK to feature in a domestic national team. Personal life Widgren was born in Östersund to a Swedish mother and a Norwegian father, thus making him eligible for the Norway national team. Honours Östersunds FK * Svenska Cupen: 2016–17 Hammarby IF * Svenska Cupen: 2020–21
WIKI
User:Dr.Fiza name: Fiza Faheem Barakzai birthdate: November/16/1990 age: 23 birth place: hyderabad, Pakistan occupation: student, writer, creative artist
WIKI
Talk:BFI TV 100 Centralized TV Episode Discussion Over the past months, TV episodes have been redirected by (to name a couple) TTN, Eusebeus and others. No centralized discussion has taken place, so I'm asking everyone who has been involved in this issue to voice their opinions here in this centralized spot, be they pro or anti. Discussion is here. --User: (talk) 01:32, 16 January 2008 (UTC) Dates Despite the top line of the article stating that the poll was carried out in 2000 and even a warning line in the edit box, people still keep adding post 2000 dates to the list. Why don't people read the article before changing it?Tuzapicabit (talk) 15:49, 7 October 2013 (UTC) * Maybe the warning needs to be after every closing date in the list? <IP_ADDRESS> (talk) 13:33, 29 December 2013 (UTC) Red Dwarf Why wasn't Red Dwarf included on this list? — Preceding unsigned comment added by Pickuptha'Musket (talk • contribs) 17:16, 18 March 2015 (UTC) * I guess for the same reasons thousands of other programmes weren't included as well. Bob talk 19:55, 18 March 2015 (UTC) Sourcing of article has begun Please continue it. The BBC News article in the "Further reading" section is a good place to start, to correct unsourced text. Unfortunately, a great deal of content in the section describing how the poll was done appears to come from another source, other than the two listed or that BBC News source not yet cited. That is, some editorial forensics must take place, to solve the issues with WP:OR and WP:VERIFY caused by the sloppiness of the earlier editors. 2601:246:C700:9B0:7573:9C20:A653:9660 (talk) 05:44, 5 December 2019 (UTC) "Because the list reports decisions made in the year 2000, programmes and series are presented as they were perceived in that year; as such, ones not yet having concluded by the year 2000 are presented as having an open-ended date span in the "Year(s)" column, even if they have subsequently ended.[verification needed]" I am not 100% certain what the point of the tag is. What the original editor says, that the end date was not provided for shows still currently airing in 2000, only makes logical sense as the folks compiling it would not have a crystal ball to see when in the future those would end. I suppose with the benefit of hindsight we could add those in but then you have to make the equally awkward statement that "We have added in an end date for the TV shows that would have been mid-run as of 2000 when the list was selected." GBrady (talk) 05:04, 24 December 2020 (UTC) * I don't think any post 2000 dates should be added, because the shows were only judged up till 2000. To give an example, I don't think Ab Fab would be as high as it is if the post 2000 episodes were included.Tuzapicabit (talk) 20:09, 11 March 2021 (UTC)
WIKI
• SearchBlox supports custom Elasticsearch analyzers which have been extended from standard analyzers in Elasticsearch. • The analyzers determine how a string is converted to tokens to improve their searchability or recall. • They are also used to split the terms for the filters used in SearchBlox. • The character that splits the term is called **separator**. • Click here to learn about using [Custom Fields in Search](🔗). # Mapping Files for Collections The analyzers are mapped in the JSON files available in `<SEARCHBLOX_INSTALLATION_PATH>/webapps/searchblox/WEB-INF/` The list of collection and the JSON files associated with mapping are listed as follows: collectionJSON file HTTP Collectionmapping.json File Collectionmapping.json Email Collectionmapping.json Database Collectionjdbc.json CSV Collectioncsv.json Amazon S3amazonS3.json MongoDBmongodb.json Custom Collectionmapping.json If fields are to be analyzed, then they have to be mapped to the relevant analyzer in the JSON file in the following format:   Analyzers supported in SearchBlox are given below. # sb_analyzer sb_analyzer considers space, comma, hyphen operators as the separators to tokenize the content indexed. This analyzer strips off most special characters from the content while indexing. sb_analyzer is the default analyzer for most string fields used in searches such as title, description, and content. This is the most common analyzer used for custom fields in order to filter them. The following JSON code needs to be specified in the JSON file for the specific field and the analyzer has to be mentioned as **sb_analyzer** in the "analyzer" field.   For example, if the meta field has the following data `<meta name="test" content="world ,news, breaking news, tv radio, part-time />`, on filtering the field using sb_analyzer, the filter would have the following terms • world • news • breaking • news • tv • radio • part • time # sb_analyzer_special sb_analyzer_special is similar to sb_analyzer except the special characters are not stripped off the content while indexing. This analyzer is to make the special characters appear in context while search. The following JSON code needs to be specified in the JSON file for the specific field and the analyzer has to be mentioned as **sb_analyzer_special** in the "analyzer" field.   For example, if the meta field has the following data `<meta name="test" content="world ,news, breaking news, tv radio, part-time />`, on filtering the field using sb_analyzer, the filter would have the following terms • world • news • breaking • news • tv • radio • part-time # comma_analyzer comma_analyzer considers comma character as a separator or tokenizer in the content indexed. Currently, comma_analyzer is used for keywords field. The following JSON code needs to be specified in the JSON file for the specific field and the analyzer has to be mentioned as **comma_analyzer** in the "analyzer" field.   For example, if the meta field has the following data `<meta name="test" content="world ,news, breaking news, tv radio, part-time" />`, on filtering the field using comma_analyzer, the filter would have the following terms • world • news • breaking news • tv radio • part-time # pipe_analyzer pipe_analyzer is a custom analyzer developed which uses pipe operator as a separator, this analyzer can be used if both comma, as well as space, are not to be used as separators. This analyzer is a custom one that is not used by default in SearchBlox. The following JSON code needs to be specified in the JSON file for the specific field and the analyzer has to be mentioned as **pipe_analyzer **in the "analyzer" field.   For example, if the meta field has the following data `<meta name="test" content="world news| breaking news| tv radio, part-time" />`, on filtering the field using comma_analyzer, the filter would have the following terms • world news • breaking news • tv radio, part-time # whitespace whitespace analyzer uses space character as a separator or tokenizer in the content indexed. The following JSON code needs to be specified in the JSON file for the specific field and the analyzer has to be mentioned as **whitespace** in the "analyzer" field.   For example, if the meta field is have the following data `<meta name="test" content="world news breaking news tv radio part-time" />`, on filtering the field using whitespace, the filter would have the following terms • world • news • breaking • news • tv • radio • part-time # sb_analyzer_alphanumeric sb_analyzer_alphanumeric is mostly similar to sb_analyzer except the following special characters are stripped off the content while indexing. Most special characters are also used as separators. Please find the list of characters stripped off when using this analyzer:   The following JSON code needs to be specified in the JSON file for the specific field and the analyzer has to be mentioned as **sb_analyzer_alphanumeric** in the "analyzer" field.   For example, if the meta field has the following data `<meta name="sbaspl" content="cat_ pat.bat+vat!(mat)rat{sat}[email protected]$dat"/>`, on filtering the field using sb_analyzer_alphanumeric , the filter would have the following terms • cat • pat • bat • vat • mat • rat • sat • fatchatdat # category_analyzer category_analyzer is similar to comma_analyzer except that its resulting values remain case sensitive. The following JSON code needs to be specified in the JSON file for the specific field and the analyzer has to be mentioned as category_analyzer in the "analyzer" field.   For example, if the meta field has the following data: `<meta name="test" content="World, news, Breaking News, TV, Part-time" />,` on filtering the field using category_analyzer, the filter would have the following terms: • World • news • Breaking News • TV • Part-time
ESSENTIALAI-STEM
Chicago, Milwaukee, St. Paul and Pacific Railroad Depot Chicago, Milwaukee, St. Paul and Pacific Railroad Depot may refer to: * Chicago, Milwaukee, St. Paul and Pacific Railroad Depot (Albert Lea, Minnesota), listed on the National Register of Historic Places in Freeborn County, Minnesota * Chicago, Milwaukee, St. Paul and Pacific Railroad Depot (Farmington, Minnesota), listed on the National Register of Historic Places in Dakota County, Minnesota * Chicago, Milwaukee, St. Paul and Pacific Railroad Depot (Aberdeen, South Dakota), listed on the NRHP in Brown County, South Dakota
WIKI
8.2. Separating Compile Arguments into their Variables: the ParseFlags Function SCons has a bewildering array of construction variables for different types of options when building programs. Sometimes you may not know exactly which variable should be used for a particular option. SCons construction environments have a ParseFlags method that takes a set of typical command-line options and distrbutes them into the appropriate construction variables. Historically, it was created to support the ParseConfig method, so it focuses on options used by the GNU Compiler Collection (GCC) for the C and C++ toolchains. ParseFlags returns a dictionary containing the options distributed into their respective construction variables. Normally, this dictionary would be passed to MergeFlags to merge the options into a construction environment, but the dictionary can be edited if desired to provide additional functionality. (Note that if the flags are not going to be edited, calling MergeFlags with the options directly will avoid an additional step.) env = Environment() d = env.ParseFlags("-I/opt/include -L/opt/lib -lfoo") for k,v in sorted(d.items()): if v: print k, v env.MergeFlags(d) env.Program('f1.c') % scons -Q CPPPATH ['/opt/include'] LIBPATH ['/opt/lib'] LIBS ['foo'] cc -o f1.o -c -I/opt/include f1.c cc -o f1 f1.o -L/opt/lib -lfoo Note that if the options are limited to generic types like those above, they will be correctly translated for other platform types: C:\>scons -Q CPPPATH ['/opt/include'] LIBPATH ['/opt/lib'] LIBS ['foo'] cl /Fof1.obj /c f1.c /nologo /I\opt\include link /nologo /OUT:f1.exe /LIBPATH:\opt\lib foo.lib f1.obj embedManifestExeCheck(target, source, env) Since the assumption is that the flags are used for the GCC toolchain, unrecognized flags are placed in $CCFLAGS so they will be used for both C and C++ compiles: env = Environment() d = env.ParseFlags("-whatever") for k,v in sorted(d.items()): if v: print k, v env.MergeFlags(d) env.Program('f1.c') % scons -Q CCFLAGS -whatever cc -o f1.o -c -whatever f1.c cc -o f1 f1.o ParseFlags will also accept a (recursive) list of strings as input; the list is flattened before the strings are processed: env = Environment() d = env.ParseFlags(["-I/opt/include", ["-L/opt/lib", "-lfoo"]]) for k,v in sorted(d.items()): if v: print k, v env.MergeFlags(d) env.Program('f1.c') % scons -Q CPPPATH ['/opt/include'] LIBPATH ['/opt/lib'] LIBS ['foo'] cc -o f1.o -c -I/opt/include f1.c cc -o f1 f1.o -L/opt/lib -lfoo If a string begins with a "!" (an exclamation mark, often called a bang), the string is passed to the shell for execution. The output of the command is then parsed: env = Environment() d = env.ParseFlags(["!echo -I/opt/include", "!echo -L/opt/lib", "-lfoo"]) for k,v in sorted(d.items()): if v: print k, v env.MergeFlags(d) env.Program('f1.c') % scons -Q CPPPATH ['/opt/include'] LIBPATH ['/opt/lib'] LIBS ['foo'] cc -o f1.o -c -I/opt/include f1.c cc -o f1 f1.o -L/opt/lib -lfoo ParseFlags is regularly updated for new options; consult the man page for details about those currently recognized.
ESSENTIALAI-STEM
3 Dividend Stocks That Pay You Better Than CDs and Savings Accounts According to Bankrate.com, the rate on a one-year certificate of deposit (CD) is 4.2%. And on a five-year CD, the rate is 3.9%. Those are better yields than investors can get with most stocks, as the S&P 500 average is just 1.8%. But that doesn't mean you should put all your money in CDs or in a savings account with a bank, where promotional rates can come in above 4% as well. There are higher-yielding dividend stocks that can potentially pay you higher rates for a longer time frame. Plus, you have the potential to benefit from an increase in their valuations as well. Three dividend stocks that pay more than your bank include Healthpeak Properties (NYSE: PEAK), Seagate Technology (NASDAQ: STX), and Kinder Morgan (NYSE: KMI). Here's a closer look at these three businesses and whether they make good investments right now. 1. Healthpeak Properties Healthpeak Properties is a real estate investment trust (REIT) that pays a dividend yield of 4.8% today. The company's portfolio and strategy revolve around healthcare, as its properties include life sciences campuses, medical offices, and retirement communities. The company pays a quarterly dividend of $0.30, which looks to be safe right now. In the third quarter, Healthpeak's funds from operations per share totaled $0.42, giving the business a decent buffer over its current payout. And over the trailing 12 months, the REIT's free cash flow of $917.2 million has been 41% higher than the dividends it has paid out during that time. While the stock underperformed the markets last year, falling 31% as the S&P dropped by just 19%, it has been rallying over the last few months after the release of its latest quarterly results. Although it hasn't always been a smooth ride for Healthpeak, and it did cut its dividend in 2021, the business looks to be in better shape right now. With healthcare also being more stable than it was during the peak of the pandemic, this could be an underrated income stock to buy today. 2. Seagate Technology Computer hardware company Seagate Technology provides its investors with a dividend yield of 5%. The company's storage solutions, including portable drives, are essential in what's an increasingly more digitalized business world. In the short term, businesses have been scaling back, however, and that is evident with Seagate's results as sales of $2 billion for fiscal 2023's first quarter (ended Sept. 30), were down 35% year over year. The company's CEO, Dave Mosley, stated that "global economic uncertainties and broad-based customer inventory corrections worsened in the latter stages of the September quarter." And the company is projecting sales to decline further to $1.85 billion in the upcoming quarter. There are tough times ahead for Seagate, but the business is reducing headcount and making other cost-cutting measures that could achieve annualized cost savings of $110 million. Seagate's payout ratio remains at 54%, and its free cash flow of $1 billion over the past four quarters is still far higher than the $604 million it paid in dividends. The company does have a buffer, but there's some risk here because if things don't improve soon, the payout could potentially be in jeopardy. Near its 52-week low and down 53% last year, Seagate is the riskiest buy on this list. However, given the long-term potential it offers, and since it's trading at a discounted 10 times earnings, for investors willing to take on some risk, it may be an optimal time to go against the grain and invest in the business for the long haul. 3. Kinder Morgan Oil and gas company Kinder Morgan is the highest-yielding stock on this list, paying investors 6.1% annually. It owns and holds interests in 83,000 miles worth of pipelines, making it a top energy infrastructure company to invest in. It estimates that its pipelines transport close to 40% of the natural gas that is produced in the country. In the third quarter, sales of just under $5.2 billion were up 35% year over year. Earnings of $576 million were also 16% higher than the $495 million that the company reported a year earlier. A key metric that income investors will want to focus on is distributable cash flow (DCF), which is an adjusted income figure oil and gas companies use to base their payouts on. And during the period, Kinder Morgan generated $492 million more in DCF than what it declared in dividends. Per share DCF of $0.49 compares favorably to the $0.2775 in quarterly dividends the company is currently paying investors. As a result, Kinder Morgan provides not only the highest yield on this list but arguably is the safest one to own right now, and it's an investment you can hold for years. Last year, the stock beat the markets with a return of 14%. 10 stocks we like better than Healthpeak Properties When our award-winning analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* They just revealed what they believe are the ten best stocks for investors to buy right now... and Healthpeak Properties wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of December 1, 2022 David Jagielski has no position in any of the stocks mentioned. The Motley Fool has positions in and recommends Kinder Morgan. The Motley Fool recommends Healthpeak Properties. The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
EGU2020-10323 https://doi.org/10.5194/egusphere-egu2020-10323 EGU General Assembly 2020 © Author(s) 2020. This work is distributed under the Creative Commons Attribution 4.0 License. Non-isothermal propagation and arrest of km-sized km-deep sills at calderas Luca Crescentini and Antonella Amoruso Luca Crescentini and Antonella Amoruso • Università di Salerno, Dipartimento di Fisica, Fisciano, Italy (luca.crescentini@sa.infn.it) Caldera unrest is often attributed to magma intrusion into a sill. In several cases, like Fernandina and Sierra Negra, Kilauea south caldera, and Campi Flegrei, the sill is km-sized and km-deep. A few questions related to sill emplacement at calderas seem still unanswered: how do sills form and spread, why can magma propagate for kilometers without solidifying, and why do ground deformation data rarely, if ever, detect sill propagation. When considering isoviscous incompressible magma intruding at a constant rate into a homogeneous half-space under non-isothermal conditions and forming a circular sill, mathematical modeling includes: a fluid-dynamic equation (relying on lubrication theory), a fracture propagation criterion, an elasticity equation (link between fluid overpressure and sill opening), and a heat-transfer magma-solidification equation. As already known, a small lag must exist between the fluid (magma) and fracture fronts, because of the large pressure gradients required to drive a viscous liquid into a narrow opening. We show that the free-surface effects on the elasticity equation are negligible, provided that depth-to-radius is smaller than one, as at the above-mentioned calderas; thus, spreading occurs like in an infinite medium. Taking advantage of published studies on hydraulic fracture propagation, first we consider isothermal spreading, as governing equations admit approximate analytical solutions for sill radius, sill opening, fluid overpressure and lag size.  Next we consider non-isothermal spreading of an isoviscous incompressible single-component magma, which is initially at its solidification temperature. We show that if the sill is at least a couple of kilometers deep and the product of viscosity and injection rate is sufficiently small, then the lag between the magma and fracture fronts is much smaller than the sill radius during most of the propagation process; as a consequence, propagation velocity is practically unaffected by the lag, except for the initial phase. Because of the way solidified magma thickness and sill opening grow with distance from the tip in the near-tip region, zero-lag non-isothermal spreading would stop after travelling unrealistically short distances, unless magma intrudes rocks that are as hot as the solidification temperature or has unrealistic overpressures. Thus, we consider how the lag might affect the sill maximum size, by preventing solidification at the tip. We compute non-isothermal propagation velocity and the solidified magma thickness by adapting the approach originally developed by Dontsov (2016) for the zero-lag propagation of penny-shaped hydraulic fractures with leak-off; then we relate the lag size to the propagation velocity using the isothermal solutions. We find that the lag plays a fundamental role in postponing the sill arrest by magma solidification, because heat exchange between the magma and the hosting rock is effective only behind the lag, where the magma has some finite thickness and sill opening grows with distance from the tip faster than thickness of solidified magma. As for ground deformation, we show that its pattern does not change appreciably over time if the final sill radius is smaller than 2 to 3 km: this explains why it is usually attributed to the inflation of a stationary source. How to cite: Crescentini, L. and Amoruso, A.: Non-isothermal propagation and arrest of km-sized km-deep sills at calderas, EGU General Assembly 2020, Online, 4–8 May 2020, EGU2020-10323, https://doi.org/10.5194/egusphere-egu2020-10323, 2020 Displays Display file
ESSENTIALAI-STEM
One of the Quaker martyrs who died for the cause of religious freedom, Mary Dyer was born Mary Barrett in England. The circumstances of her upbringing are unknown, though it seems likely she came from a family with money and received a good education. Mary Barrett married William Dyer, a milliner, at St. Martin’s-in-the Field Church in London in 1633. The couple crossed the Atlantic and arrived in Boston in 1635, where they immediately joined the Puritan church. Mary Dyer soon showed herself to be a “freethinker.” A friend and follower of Anne Marbury Hutchinson (see no. 26), Mary was supposedly the only person to rise and accompany Hutchinson out of the church when she was banished in 1638. Subsequently, Mary Dyer and her husband were also banished from the Massachusetts Bay Colony. The Dyers accompanied Hutchinson to Rhode Island, where he became a colonial officer and they raised five sons. They lived a routine life until 1652, when William and Mary went on a trip to England. He returned within a year, but Mary stayed in England until 1657. During that time she joined the Society of Friends— the Quakers. When she returned to New England, Mary was a true Quaker evangelist, preaching about the “Inner Light.” In 1658, During that same year, the Massachusetts legislature passed, by one vote, an ordinance that banished all Quakers on pain of death. Rather than putting fear into the Quakers, the new law seemed to summon up even stronger resistance. In 1659, Mary Dyer went to Boston tocomfort two Quakers being held in the Boston jail. She was banished along with them. All three of the Quakers soon returned to Boston and were sentenced to die. On October 27, 1659, Dyer was led to the gallows and watched as her two co-believers were hanged. She received a last minute reprieve, and was sent away for the third time. Mary returned to Boston in May, 1 660 and began to preach once more. She said she wished to “offer up her life” in protest of a “wicked law against God’s people.” This time there was no reprieve. Mary Dyer was tried and executed on June 1, 1660. To the very end, she was calm, as if she welcomed whatever trials came to her in the practice of her faith. Soon after Marys death, King Charles II sent an order to the Massachusetts Bay Colony, requiring that all Quakers be sent to England for trial. No more executions took place. In 1959, the Massachusetts legislature voted that a statue of Mary Dyer be placed on the grounds of the Massachusetts State House.
FINEWEB-EDU
Source mino-pypy / pypy / module / fcntl / interp_fcntl.py from pypy.rpython.tool import rffi_platform as platform from pypy.rpython.lltypesystem import rffi, lltype from pypy.interpreter.error import OperationError, wrap_oserror from pypy.interpreter.gateway import unwrap_spec, WrappedDefault from pypy.rlib import rposix from pypy.translator.tool.cbuild import ExternalCompilationInfo import sys class CConfig: _compilation_info_ = ExternalCompilationInfo( includes = ['fcntl.h', 'sys/file.h', 'sys/ioctl.h'] ) flock = platform.Struct("struct flock", [('l_start', rffi.LONGLONG), ('l_len', rffi.LONGLONG), ('l_pid', rffi.LONG), ('l_type', rffi.SHORT), ('l_whence', rffi.SHORT)]) has_flock = platform.Has('flock') # constants, look in fcntl.h and platform docs for the meaning # some constants are linux only so they will be correctly exposed outside # depending on the OS constants = {} constant_names = ['LOCK_SH', 'LOCK_EX', 'LOCK_NB', 'LOCK_UN', 'F_DUPFD', 'F_GETFD', 'F_SETFD', 'F_GETFL', 'F_SETFL', 'F_UNLCK', 'FD_CLOEXEC', 'LOCK_MAND', 'LOCK_READ', 'LOCK_WRITE', 'LOCK_RW', 'F_GETSIG', 'F_SETSIG', 'F_GETLK64', 'F_SETLK64', 'F_SETLKW64', 'F_GETLK', 'F_SETLK', 'F_SETLKW', 'F_GETOWN', 'F_SETOWN', 'F_RDLCK', 'F_WRLCK', 'F_SETLEASE', 'F_GETLEASE', 'F_NOTIFY', 'F_EXLCK', 'F_SHLCK', 'DN_ACCESS', 'DN_MODIFY', 'DN_CREATE', 'DN_DELETE', 'DN_RENAME', 'DN_ATTRIB', 'DN_MULTISHOT', 'I_NREAD', 'I_PUSH', 'I_POP', 'I_LOOK', 'I_FLUSH', 'I_SRDOPT', 'I_GRDOPT', 'I_STR', 'I_SETSIG', 'I_GETSIG', 'I_FIND', 'I_LINK', 'I_UNLINK', 'I_PEEK', 'I_FDINSERT', 'I_SENDFD', 'I_RECVFD', 'I_SWROPT', 'I_LIST', 'I_PLINK', 'I_PUNLINK', 'I_FLUSHBAND', 'I_CKBAND', 'I_GETBAND', 'I_ATMARK', 'I_SETCLTIME', 'I_GETCLTIME', 'I_CANPUT'] for name in constant_names: setattr(CConfig, name, platform.DefinedConstantInteger(name)) class cConfig(object): pass for k, v in platform.configure(CConfig).items(): setattr(cConfig, k, v) cConfig.flock.__name__ = "_flock" if "linux" in sys.platform: cConfig.F_GETSIG = 11 cConfig.F_SETSIG = 10 cConfig.F_GETLEASE = 1025 cConfig.F_SETLEASE = 1024 # needed to export the constants inside and outside. see __init__.py for name in constant_names: value = getattr(cConfig, name) if value is not None: constants[name] = value locals().update(constants) def external(name, args, result): return rffi.llexternal(name, args, result, compilation_info=CConfig._compilation_info_) _flock = lltype.Ptr(cConfig.flock) fcntl_int = external('fcntl', [rffi.INT, rffi.INT, rffi.INT], rffi.INT) fcntl_str = external('fcntl', [rffi.INT, rffi.INT, rffi.CCHARP], rffi.INT) fcntl_flock = external('fcntl', [rffi.INT, rffi.INT, _flock], rffi.INT) ioctl_int = external('ioctl', [rffi.INT, rffi.INT, rffi.INT], rffi.INT) ioctl_str = external('ioctl', [rffi.INT, rffi.INT, rffi.CCHARP], rffi.INT) has_flock = cConfig.has_flock if has_flock: c_flock = external('flock', [rffi.INT, rffi.INT], rffi.INT) def _get_error(space, funcname): errno = rposix.get_errno() return wrap_oserror(space, OSError(errno, funcname), exception_name = 'w_IOError') @unwrap_spec(op=int, w_arg=WrappedDefault(0)) def fcntl(space, w_fd, op, w_arg): """fcntl(fd, op, [arg]) Perform the requested operation on file descriptor fd. The operation is defined by op and is operating system dependent. These constants are available from the fcntl module. The argument arg is optional, and defaults to 0; it may be an int or a string. If arg is given as a string, the return value of fcntl is a string of that length, containing the resulting value put in the arg buffer by the operating system. If the arg given is an integer or if none is specified, the result value is an integer corresponding to the return value of the fcntl call in the C code. """ fd = space.c_filedescriptor_w(w_fd) op = rffi.cast(rffi.INT, op) # C long => C int try: intarg = space.int_w(w_arg) except OperationError, e: if not e.match(space, space.w_TypeError): raise else: intarg = rffi.cast(rffi.INT, intarg) # C long => C int rv = fcntl_int(fd, op, intarg) if rv < 0: raise _get_error(space, "fcntl") return space.wrap(rv) try: arg = space.bufferstr_w(w_arg) except OperationError, e: if not e.match(space, space.w_TypeError): raise else: ll_arg = rffi.str2charp(arg) rv = fcntl_str(fd, op, ll_arg) arg = rffi.charpsize2str(ll_arg, len(arg)) lltype.free(ll_arg, flavor='raw') if rv < 0: raise _get_error(space, "fcntl") return space.wrap(arg) raise OperationError(space.w_TypeError, space.wrap("int or string or buffer required")) @unwrap_spec(op=int) def flock(space, w_fd, op): """flock(fd, operation) Perform the lock operation op on file descriptor fd. See the Unix manual flock(3) for details. (On some systems, this function is emulated using fcntl().)""" if has_flock: fd = space.c_filedescriptor_w(w_fd) op = rffi.cast(rffi.INT, op) # C long => C int rv = c_flock(fd, op) if rv < 0: raise _get_error(space, "flock") else: lockf(space, w_fd, op) @unwrap_spec(op=int, length=int, start=int, whence=int) def lockf(space, w_fd, op, length=0, start=0, whence=0): """lockf (fd, operation, length=0, start=0, whence=0) This is essentially a wrapper around the fcntl() locking calls. fd is the file descriptor of the file to lock or unlock, and operation is one of the following values: LOCK_UN - unlock LOCK_SH - acquire a shared lock LOCK_EX - acquire an exclusive lock When operation is LOCK_SH or LOCK_EX, it can also be bit-wise OR'd with LOCK_NB to avoid blocking on lock acquisition. If LOCK_NB is used and the lock cannot be acquired, an IOError will be raised and the exception will have an errno attribute set to EACCES or EAGAIN (depending on the operating system -- for portability, check for either value). length is the number of bytes to lock, with the default meaning to lock to EOF. start is the byte offset, relative to whence, to that the lock starts. whence is as with fileobj.seek(), specifically: 0 - relative to the start of the file (SEEK_SET) 1 - relative to the current buffer position (SEEK_CUR) 2 - relative to the end of the file (SEEK_END)""" fd = space.c_filedescriptor_w(w_fd) if op == LOCK_UN: l_type = F_UNLCK elif op & LOCK_SH: l_type = F_RDLCK elif op & LOCK_EX: l_type = F_WRLCK else: raise OperationError(space.w_ValueError, space.wrap("unrecognized lock operation")) op = [F_SETLKW, F_SETLK][int(bool(op & LOCK_NB))] op = rffi.cast(rffi.INT, op) # C long => C int l = lltype.malloc(_flock.TO, flavor='raw') try: rffi.setintfield(l, 'c_l_type', l_type) rffi.setintfield(l, 'c_l_start', int(start)) rffi.setintfield(l, 'c_l_len', int(length)) rffi.setintfield(l, 'c_l_whence', int(whence)) rv = fcntl_flock(fd, op, l) if rv < 0: raise _get_error(space, "fcntl") finally: lltype.free(l, flavor='raw') @unwrap_spec(op=int, mutate_flag=int, w_arg=WrappedDefault(0)) def ioctl(space, w_fd, op, w_arg, mutate_flag=-1): """ioctl(fd, opt[, arg[, mutate_flag]]) Perform the requested operation on file descriptor fd. The operation is defined by opt and is operating system dependent. Typically these codes are retrieved from the fcntl or termios library modules. """ # removed the largish docstring because it is not in sync with the # documentation any more (even in CPython's docstring is out of date) # XXX this function's interface is a mess. # We try to emulate the behavior of Python >= 2.5 w.r.t. mutate_flag fd = space.c_filedescriptor_w(w_fd) op = rffi.cast(rffi.INT, op) # C long => C int if mutate_flag != 0: try: rwbuffer = space.rwbuffer_w(w_arg) except OperationError, e: if not e.match(space, space.w_TypeError): raise if mutate_flag > 0: raise else: arg = rwbuffer.as_str() ll_arg = rffi.str2charp(arg) rv = ioctl_str(fd, op, ll_arg) arg = rffi.charpsize2str(ll_arg, len(arg)) lltype.free(ll_arg, flavor='raw') if rv < 0: raise _get_error(space, "ioctl") rwbuffer.setslice(0, arg) return space.wrap(rv) try: intarg = space.int_w(w_arg) except OperationError, e: if not e.match(space, space.w_TypeError): raise else: intarg = rffi.cast(rffi.INT, intarg) # C long => C int rv = ioctl_int(fd, op, intarg) if rv < 0: raise _get_error(space, "ioctl") return space.wrap(rv) try: arg = space.bufferstr_w(w_arg) except OperationError, e: if not e.match(space, space.w_TypeError): raise else: ll_arg = rffi.str2charp(arg) rv = ioctl_str(fd, op, ll_arg) arg = rffi.charpsize2str(ll_arg, len(arg)) lltype.free(ll_arg, flavor='raw') if rv < 0: raise _get_error(space, "ioctl") return space.wrap(arg) raise OperationError(space.w_TypeError, space.wrap("int or string or buffer required"))
ESSENTIALAI-STEM
BRIEF-Mawson Announces C$8.1 Mln Strategic Investment By Goldcorp Feb 7 (Reuters) - Mawson Resources Ltd: * MAWSON ANNOUNCES C$8.1 MILLION STRATEGIC INVESTMENT BY GOLDCORP INC. * MAWSON RESOURCES LTD - PLANS TO USE NET PROCEEDS OF PLACEMENT TO EXPLORE ITS MINERAL PROPERTIES LOCATED IN FINLAND * MAWSON RESOURCES LTD - PURSUANT TO PRIVATE PLACEMENT FINANCING, GOLDCORP WILL SUBSCRIBE FOR 18 MILLION UNITS AT A PRICE OF C$0.45 PER UNIT Source text for Eikon: Further company coverage:
NEWS-MULTISOURCE
Devon Dikeou Devon Dikeou (born 1963) is an American artist, publisher, and art collector. Dikeou’s practice investigates the "in-between" — subtle interactions between artist, art object, viewer, space, and context. Life and education Devon Dikeou is originally from Denver, Colorado. She received a B.A. from Brown University in 1986 and an M.F.A. from the School of Visual Arts in 1988. Since the start of her career in the early 1990s, Dikeou has received several artist awards and nominations including The Sue Canon Award from the Museum of Contemporary Art Denver (2007), Assistance League of Houston (2011 and 2013), Santo Foundation (2012), and the DAM Key Award from Denver Art Museum (2017). Exhibitions Dikeou has exhibited at numerous international museums, foundations, and galleries including the New Museum, The Contemporary Austin, Boulder Museum of Contemporary Art, Artpace San Antonio, Tricia Collins Grand Salon, James Fuentes Gallery in 2017 and 2018, 179 Canal, Kai Matsumiya, and Postmasters. She has also shown at art fairs, including Art Basel Statements, The Armory Show, Independent, NADA Miami Beach, and NADA New York. Dikeou's mid-career retrospective "Mid-Career Smear" opened at The Dikeou Collection in February 2020. zingmagazine Devon Dikeou published the first issue of zingmagazine in 1995. zingmagazine is composed of rotating multi-page curatorial projects organized by artists and arts professionals. The Dikeou Collection In 1998, Devon Dikeou founded the Dikeou Collection along with her brother Pany Dikeou. The Dikeou Collection is a private contemporary art collection in downtown Denver, Colorado, and features work from over 40 international artists and functions as extension of zingmagazine.
WIKI
Marion Township, Hendricks County, Indiana Marion Township is one of twelve townships in Hendricks County, Indiana, United States. As of the 2010 census, its population was 1,402. Geography Marion Township covers an area of 38.62 sqmi, all land. Unincorporated towns (This list is based on USGS data and may include former settlements.) * Hadley * New Winchester Adjacent townships * Eel River Township (north) * Center Township (east) * Clay Township (south) * Floyd Township, Putnam County (west) * Jackson Township, Putnam County (northwest) Cemeteries The township contains fifteen cemeteries: Abner-Ragan, Dickerson, Higgins, New Winchester Baptist, New Winchester, Noland Number 1, Peck, Robbins, Ryner, Sears, Shannon, Tinder, Turner, Turner Farm and Vannice. Major highways * [[Image:US 36.svg|20px]] U.S. Route 36 * [[Image:Indiana 75.svg|20px]] Indiana State Road 75 * [[Image:Indiana 236.svg|20px]] Indiana State Road 236 Airports and Landing strips * Layne Field 5II1
WIKI
MongoDB Queries Level : Intermediate Mentor: Shailendra Chauhan Duration : 00:02:00 What is a MongoDB query? MongoDB Query is a means to retrieve data from the MongoDB database. MongoDB queries simplify retrieving data from the database, similar to SQL queries in SQL Database language. During a query procedure, one can apply parameters or conditions to retrieve specific data from the database.  Field Selection The find() method presents the database collection in Non-Structured form ({<Key>: <value>}), including the auto-created <key> "id" by MongoDB and collection data inserted by the user or admin. Find a single document In MongoDB, we may discover a single document using the findOne() method, which returns the first document that meets the filter query phrase. Displaying documents in an organized manner The pretty() method in MongoDB allows us to show documents from a specified collection in a well-formatted manner.  What is Query Selector? Query selectors are used in MongoDB queries to filter documents based on certain conditions. Basic Operators for Query Selectors • $eq: Finds values equal to a given value. • $gt: Matches values greater than a given value. • $lt: Matches values that are less than a given value. • $gte: Finds values greater than or equal to a given value. • $lte: Returns values that are less than or equal to a given value. • $ne: Matches any value not equal to the specified value. Logical Query Selectors • $and: Combines query clauses using a logical AND. • $or: Combines query clauses using a logical OR. • $not: Reverses the effect of a query expression, returning documents that do not match it. • $nor: Joins query clauses using a logical NOR and selects documents that fail all query expressions. Element Query Selectors • $exists: Matches documents with the specified field. • $type: Selects documents whose fields are of the provided type. Array Query Selectors • $in: Matches any of the values in the array. • $nin: Does not match any of the values supplied in an array. • $all: Matches arrays containing all of the elements supplied in the query. • $size: Matches arrays that have a certain number of elements. • $elemMatch: Returns documents that have an array field with at least one element that meets all of the specified query requirements. Self-paced Membership • 22+ Video Courses • 800+ Hands-On Labs • 400+ Quick Notes • 55+ Skill Tests • 45+ Interview Q&A Courses • 10+ Real-world Projects • Career Coaching Sessions • Email Support Upto 60% OFF Know More Still have some questions? Let's discuss. CONTACT US Accept cookies & close this
ESSENTIALAI-STEM
SCCM2012 (R2) new application creation fails I had recently migrated my DBs from one volume to another volume due to space concerns, all was successful and life was good 🙂 However the other day, I wanted to create a new application and got the following “unknown” error. The SMS Provider reported an error connecting to the ConfigMgr site database server. Verify that the SQL Server is online and that ConfigMgr site server computer account is an administrator on the ConfigMgr site database server. SmsAdminUI.log would something unknown as well. Description = “CSspConfigurationItem: SQL_ERROR”; File = “e:\\qfe\\nts\\sms\\siteserver\\sdk_provider\\smsprov\\sspconfigurationitem.cpp”; SQLMessage = “*** Unknown SQL Error!”; Scratched my head a few times and started DDGing as the error was pretty self explanatory and found the following KB/Blog entry. Basically, after such a DB files location move the SQL TRUSTWORTHY setting gets reset and the dbowner may change. I hope on the MSSQL and executed the following queries to save the day – well only the creation of new packages. ALTER DATABASE CM_CIE SET TRUSTWORTHY ON; EXEC sp_changedbowner ‘sa’; Then tried to create a new application and voilà… #2012, #2012r2, #application, #creation, #error, #mssql, #package, #sccm, #system-center Uninstall GP2010 and installation of GP2015 This document describes how to uninstall GP2010 and installation of GP2015. Prerequisite: local admin rights to uninstall and install software on the machine 1. Uninstall GP2010 following components 1. GP2010, Mekorma MICR 2010, Integration Manager for Microsoft Dynamics GP 2010, Dexterity Shared Components 11.0 (64-bit) 2. Remove the following folders 1. C:\Program Files (x86)\Microsoft Dynamics\GP2010 2. C:\Program Files (x86)\Common Files\microsoft shared\Dexterity 2. Restart the computer 3. Install GP2015 (includes dexterity 14) as usual. Uninstall using WMIC note that Mekorma not playing nice with wmic or msiexec – must uninstall manually. wmic call Msiexec GUID product where name=”Microsoft Dynamics GP 2010″ call uninstall /nointeractive {DC90A0A6-2D90-493E-8D13-D54AD123B9FD} product where name=”Integration Manager for Microsoft Dynamics GP 2010″ call uninstall /nointeractive {FAFD8B80-E75F-4557-85F3-67B8D7A14E8F} product where name=”Dexterity Shared Components 11.0 (64-bit)” call uninstall /nointeractive {F5459EB2-A662-4EB3-AD94-E771DC2F542A} product where name=”Mekorma MICR 2010″ call uninstall /nointeractive {A45282DB-59DC-4A5D-9E1F-08A225D81A44} To run on several nodes at the same time: wmic:root\cli>/failfast:on /node:@”c:\temp\trainingwks.txt” product where name=”Microsoft Dynamics GP 2010″ call uninstall /nointeractive #dynamics, #gp, #gp2010, #gp2015
ESSENTIALAI-STEM
Cooperative Village Cooperative Village is a community of housing cooperatives on the Lower East Side of Manhattan, New York City. The cooperatives are centered on Grand Street in an area south of the entrance ramp to the Williamsburg Bridge and west of the FDR Drive. Combined, the four cooperatives have 4,500 apartments in twelve buildings. The cooperatives were sponsored, organized and built by trade unions, the Amalgamated Clothing Workers of America and International Ladies' Garment Workers' Union, as well as the United Housing Foundation, a development organization set up by the unions in 1951. The cooperatives followed strict Rochdale Principles, with one vote per member, irrespective of the nominal value of his shares. Resale of shares was restricted; members moving out of the apartments had to sell their shares back to the cooperative at the buying price, minus a flip tax. After the original financing structures governing the apartments were phased out, beginning in 1986, the shareholders of each cooperative decided, in separate votes in 1997 and 2000, to abandon the limited equity rules and free the resale of shares, in some cases increasing the value of apartments fivefold. To keep the maintenance fees low for original tenants, many of them retirees, a high flip tax is charged, up to 25% of the gross sales price for "first sales" and up to 15% for "second sales". In a similar instance, the shareholders at the Penn South sister cooperative in the Chelsea section of Manhattan voted to continue operating under limited equity rules. Amalgamated Dwellings The Amalgamated Dwellings, one of the oldest housing cooperatives in the United States, was the second cooperative sponsored by the Amalgamated Clothing Workers of America, after the successful Amalgamated Cooperative Apartments in the Bronx. The six-story Art Deco building with 236 apartments was designed by the architects Springsteen & Goldhammer and was completed in 1930 at the site of a former printing plant. The building covered one city block, with a protected garden in the center. The design was intended to provide direct sunlight to all rooms, something that was missing from the typical Manhattan tenements. The cooperative also had a library, an auditorium, a nursery, and a gym. The apartments were priced at $500 a room, with monthly maintenance fees, including repayment of the mortgage, at $12.50 a room. Hillman Housing Corporation The Hillman Housing Corporation was the third cooperative sponsored by the Amalgamated Clothing Workers. The cooperative, located on Grand Street between Kazan Plaza and Lewis Street on two sides of the Amalgamated Dwellings buildings, consists of three twelve-story buildings with 807 units. A garden links Hillman Houses to each other and to the Amalgamated Dwellings. Construction was begun in November 1947 and was completed by 1950 at a total cost of $9.1 million. The design is attributed to Springsteen & Goldhammer, with Herman J. Jessor responsible for much of the work. Four slum blocks with 65 tenement buildings were torn down to clear the site for the development. As banks were unwilling to provide loans to the cooperative, financing was provided by the Mutual Life Insurance Company. The cooperative is named after Sidney Hillman, founder and first president of the Amalgamated Clothing Workers of America. Each of the three Hillman houses is named after a cooperative or labor leader: * Edward A. Filene, father of the credit union movement * Meyer London, socialist member of the 64th United States Congress * Louis D. Brandeis, U.S. Supreme Court Justice East River Housing Corporation The East River Housing Corporation was one of the first developments of the newly formed United Housing Foundation and was financially sponsored by the International Ladies' Garment Workers' Union. A mortgage loan was insured by the Federal Housing and Home Finance Agency. Construction work was begun in November 1953 and completed in 1956. The cooperative has 1,672 apartments in four 20- and 21-story towers on an open lot facing the East River. The project was designed by George W. Springsteen and his new associate, Herman J. Jessor, who would go on to design many other UHF projects, including Co-op City. The buildings followed the "towers in a park" concept introduced to the U.S. in the late 1930s by the Castle Village towers in Hudson Heights in upper Manhattan. The Castle Village layout, with cross-shaped towers placed diagonally to the cardinal directions optimized to give each apartment a maximum view, was used by most post-war social and affordable housing in New York City. Springsteen's derivation, used already at Hillman Houses, connects three of these towers side by side. The East River towers also share the reinforced concrete construction and red brick facade with Castle Village. At the time of construction the 21 story towers were the highest reinforced concrete buildings in the U.S. Each of the four East River houses is named after a labor leader: * Morris Hillquit, a co-founder of the Socialist Party of America * Morris Sigman, president of the International Ladies' Garment Workers' Union (ILGWU) * The Erlich-Alter Building, named after Henryk Erlich and Victor Alter, leaders of the Polish Bund * Benjamin Schlesinger, three-time president of the ILGWU Seward Park Housing Corporation Seward Park Housing Corporation is located in the triangle between Grand Street and East Broadway, and abuts the New York City public park that shares its name. The buildings, designed by Herman Jessor, share the general design of the East River Houses, with four towers facing the Lower East Side. Each of the twelve semi-attached towers has seven or eight apartments on each floor around a central stairwell and corridor. Construction work was begun in 1957 and finished in 1959 at a total cost of $23,258,392.75. A mortgage loan from Bowery Savings Bank and pension funds of the United Hatters, Cap & Millinery Workers, International Union as well as Brotherhood of Painters, Decorators and Paperhangers of America covered $18 million, with about 25% of the costs paid as equity by the 1,728 cooperative members. In January 1999, in the wake of a collapse in the parking garage, New York City building inspectors suspected there could be a potential flaw in Jessor's "honeycomb" design of the massive garage roof. The roof had been built to support a vast playground/park above, with trees and grass upon hundreds of thousands of pounds of soil. After the collapse on Friday night, January 15, 1999, the New York City Department of Buildings opened an investigation into other Jessor projects to test for durability. The investigation did not turn up any major design flaws, and cited convergence of many elements including several days of warm rain, followed by quick freezing, thawing, and refreezing, along with a stoppage in the drainage system combined with minor cracking of the concrete in the roof and the immense weight above. After a four-year lawsuit, the Greater New York Insurance Company, insurer for Seward Park Housing, lost their nonpayment case to the cooperative, and $18 million for the damages. After the insurer won a subsequent appeal, the insurer and coop settled in 2010 with the coop returning $3.25 million to the insurer. The buildings are known for their murals by Hugo Gellert in a socialist realist style. Each of the murals depicts a "progressive" hero with an associated quote: * Thomas Jefferson: "We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness." (Declaration of Independence) * Abraham Lincoln: "In giving freedom to the slave, we assure freedom to the free." (1862 Annual Message to Congress) * Franklin D. Roosevelt: "Freedom of Speech • Freedom to Worship • Freedom from Want • Freedom from Fear" (1941 State of the Union Address) * Albert Einstein: "A new type of thinking is essential if mankind is to survive and move towards higher levels." (1946 telegram on behalf of the Emergency Committee of Atomic Scientists) In popular culture Frances Madeson’s 2007 comic novel Cooperative Village is set in the co-operative.
WIKI
Page:RS22836 (IA RS22836-crs).pdf/6 considered, some $2 million in FY2008 supplemental assistance for Nicaragua as part of the Administration’s Mérida Initiative to boost the region’s capabilities to interdict the smuggling of drugs, arms, and people, and to support a regional anti-gang strategy. For FY2009, the Administration has requested $38 million for Nicaragua, not including P.L. 480 food aid. Nicaragua could also receive roughly $6.7 million of the $100 million in Mérida Initiative funds for Central America included in the FY2009 budget request. The FY2009 request includes increases in funds for security reform and combating transnational crime, democracy and civil society programs, and trade capacity building programs to help Nicaragua benefit from CAFTA-DR. Millennium Challenge Account (MCA). In addition to traditional development assistance, Nicaragua benefits from its participation in the MCA, a presidential initiative that increases foreign assistance to countries below a certain income threshold that are pursuing policies to promote democracy, social development, and sustainable economic growth. In 2005, the Bush Administration signed a five-year, $175 million compact with Nicaragua to promote rural development. The compact, which entered into force in May 2006, includes three major projects in the northwestern regions of León and Chinandega. Those projects aim to promote investment by strengthening property rights, boost the competitiveness of farmers and other rural businesses by providing technical and market access assistance, and reduce transportation costs by improving road infrastructure. During a recent visit to Nicaragua, John Danilovich, director of the Millennium Challenge Corporation, asserted that, despite some political differences, he believes that the United States and Nicaragua can work together to combat poverty. Consolidating Democracy. U.S. democracy programs aim to reform government institutions to make them more transparent, accountable and professional; combat corruption; and promote the rule of law. The United States provided some $13 million to support the November 2006 elections in Nicaragua. Some 18,000 observers monitored the elections. Following the November 2008 municipal elections, USAID is expected to help increase the capacity and transparency of local governments. Other ongoing programs seek to increase citizen advocacy and the role of the media. Human Rights. U.S. officials have expressed some concerns regarding respect for human rights in Nicaragua. According to the State Department’s March 2008 human rights report on Nicaragua, civilian authorities generally maintained effective control of security forces, but there were some reports of unlawful killings involving the police. Some of the most significant human rights abuses included harsh prison conditions, arbitrary arrests and detentions, and widespread corruption in and politicization of government entities, including the judiciary and the Supreme Electoral Council. Human rights problems related to labor issues include child labor and violation of worker rights in some free trade zones. In October 2007, Human Rights Watch asserted that
WIKI
Historical circumstance and background of the After the armada was defeated only around of the Spanish delivers (65/130) made it back to Spain. Only $13.90 / page And Over 20, 500 Spanish Sailors and Military were wiped out in the battle of the Armada. But Spain did certainly not shed importance after the Armada was defeated. Actually Spain conquered England in sea and on land in numerous battles for the reason that decade after the Spanish Flottille, Spain also kept an important influence above dealings in Europe plus the Americas till well in the 16th Hundred years. But Because of the War with England Italy was in serious Debt and King Philip had announced several bankruptcies. Phillip accepted the defeat from the armada as gods will certainly. Soon after this individual Planned a brand new better stronger armada similar to the English Boats. In the year 1595 Spanish ships landed in Cornwall although got burnt off down. In the years 1596 and 1597 Other Armadas were sent nonetheless they were held backside by powerful Storms. In around the seventeenth Century Italy started to gradually lose electricity. Now the Spanish Kings could not believe they may do what ever he wished. The Flotte was the start of fall from the Spanish disposition. The English a new very Successful victory. Just 100 males were murdered and non-e of the ships were sunk. But several, 000 British sailors perished of disease. And those whom survived had been treated awfully by the government, many were given barely enough money for the trip back to Great britain. Due to the Flottille being defeated, England started to be a powerful nation. Elizabeth can now be remarkably secure, inside the knowledge that one more invasion was not likely to happen. This also resulted in England could survive because an independent simple country. Another thing was today the The spanish language had significantly less ships, that they could use to safeguard there trading ships, which meant English language sailors could rob The spanish language ports more easily. Inside the 17th Hundred years as The country of spain was developing weaker, Great britain began to build colonies. Then they established settlers in parts of America, parts which the Spanish had disregarded. The English language businessmen took over more and more transact with central and South America. Following the defeat from the Armada an enormous celebration occurred in England. A medal was performed (on the right) This said the almighty blew and in addition they were spread. Much later, by the end of Elizabeths reign, as a result of the conflict against Spain, Englands financial debt reached several million. Offices and crown lands had to be sold to end going into more debt.
FINEWEB-EDU
impression Materials Elastic- dr. Sumit Goel • View 116 • Download 2 Embed Size (px) DESCRIPTION ppt. lecture for undergraduate dental students who r eyeing for a comprehensive knowledge regarding elastomers Text of impression Materials Elastic- dr. Sumit Goel DEFINITION An impression is essentially a negative or reverse replica of any entity. In dentistry, this replica is of the teeth and its supporting and surrounding structures. According to the ability of the set material to be withdrawn over undercuts :Elastic impression materials Hydrocolloid Agar Alginate Rubbers Polysulfide. Poly silicones. Polyether. Non-elastic or Rigid impression materials Impression compound ZOE Ideal Requirements of Impression Materials 1. Fluid enough to adapt to the oral tissues Viscous enough to be contained in the tray In mouth should transform (set) into a rubbery or rigid solid in a reasonable amount of time: setting time less than 7min 2. 3. Set impression should not distort or tear when removed from mouth Impressions must be dimensionally stable until the cast can be poured Impression should maintain dimensional stability after removal of cast to enable making of a second or third cast from same impression Biocompatible Material associated, processing equipment, and processing time should be cost effective Elastomers or Rubber base Impression materials fulfills most of these Soft and rubber-like & are known as elastomers or synthetic rubbers. As per ADA Sp. No. 19 they are called as - non-aqueous Elastomeric dental impression materials. Liquid polymers which are converted into solid rubber at room temperature Contains large molecules with weak interaction between them, tied together at certain points and form 3D network Basically used for dentulous cases by virtue of their ability of withdrawal from under cuts and their excellent surface detail reproduction. Types:III.According to chemistry ( setting rxn)1) Polysulfides 2) Polysilicones condensation & addition 3) Polyether 2. According to Viscosity1) Light body or syringe consistency 2) Medium or regular body 3) Heavy body or tray consistency 4) Very heavy body or putty consistency 3. ADA ClassificationBased on selected elastic properties & dimensional changes 1) Type I 2) Type II 3) Type III General Properties:Excellent reproduction of surface details Generally hydrophobic (except poly ether) Good elastic properties (repeated pouring is possible)Dimensional inaccuracies are lower but exists due to various reasons Excellent tear strength. Extended shelf-life Generally higher cost Requires tray adhesive or mechanical interlocking with the tray. CHARACTERSTICS Rheological properties (viscoelastic )- play major roleIntroduced as Viscous pastes- setting reaction- viscoelastic solids. imp. Mat. should be free of any distortion dev due to strain during its removal, thus the mat. Should be visco elastic i.e. intermediate behavior between elastic solid and viscous liquid. Supplied as: All elastomers - two paste systems (base & catalyst) Putty consistency supplied in jars Uses: Impression material for all applications including Fixed partial dentures Dentures and edentulous impressions Border molding of special trays (poly ether) Bite registration As duplicating material for refractory casts 1. POLY SULFIDES: Ist elastomer to be introduced mercaptan/Thiokol Polysulfide First dental elastomers Indications completetissue denture removable fixed partial denture crown and bridge Composition:Base Paste: Liquid Inert Polysulfide Polymer 80 to 85 % - fillers (Titanium dioxide, zinc sulfate ,copper carbonate or silica) 16 to 18 % Plasticizer-- dibutylpthalate (viscosity) Accelerator--- 0.5% Sulfur Reactor /catalyst/accelerator PasteLead dioxide 60 to 68 % 3% Dibutylphthalate (plasticizer) - 30 to 35 % Sulfur (accelerator) Retarder --- oleic acid or stearic acid Other substances like Magnesium & deodorants- 2 % Tray adhesive: Butyl rubber or styrene/acrylonitrile dissolved in a volatile solvent such as chloroform or a ketone. Chemistry and Setting ReactionsThe lead dioxide reacts with the poly sulfide polymer Oxidizing agent like lead dioxide initiates polymerization rxn through Chain lengthening by oxidation of the terminal -SH groups and Cross-linking between pendant -SH groups. Exothermic reaction - 3 to 40 C rise in temp. leaving water as by product. It is accelerated by heat and moisture PbO2 + S HS - R- SH HS - R-S-S-R-SH + H2O Poly sulfide +Water Mercaptan + Lead dioxide T-butyl hydro peroxide alternative to PbO2 Polysulfide Reaction--SH O = Pb = O H S S H O = Pb = O HS---------------------SH H O S-= Pb = O -S-S---------------S-S- S + 3PbO + H O 2 S mercaptan + lead dioxide polysulfide rubber + lead oxide + water OBrien Dental Materials & their Properties: Unpleasant odor and colour - stains linen & messy to work with Extremely viscous and sticky - mixing is difficult Mixing time is 45 seconds Long setting time of 12.5 (at 370C) - Patient discomfort Excellent reproduction of surface detail Dimensional stability: - Curing shrinkage is high 0.45%. It has the highest permanent deformation (3 to 5%) among the elastomers It is hydrophobic - so the mouth should be dried thoroughly before making an impression The shelf life is good (2 years) AdvantagesLower costto silicones and compared polyethersLong working time High tear strength High flexibility Good detail reproductionPhillips Science of Dental Materials 1996 Disadvantages Poor dimensional stability water by-product pour within one hour single pour Custom Messy paste-paste bad traysmix odor may stain clothing Long setting timePhillips Science of Dental Materials 1996 Silicone Rubber Impression Material:Developed to over come some of the disadvantages of poly sulfide TypesBased on the type of polymerization reaction 1) Condensation silicones 2) Addition silicones CONDENSATION SILICONE: Also known as conventional silicone. Available in light, medium and putty consistency Indications complete crown dentures and bridge COMPOSITION:Base pasteAccelerator paste Polydimethyl siloxane Tetraethyl (hydroxyl-terminated) Orthosilicate (cross linking agent) Colloidal silica or Stannous octoate microsized metal (catalyst) oxide (filler) 35-75% Color pigments SETTING REACTION: CH3 OC2H5 OH-Si-OH + C2H5O-Si- OC2H5 Sn octoate CH3 OC2H5 Silicone + CH3CH2OH Cross-linking between terminal group of the silicon polymers and alkyl silicate to form 3D network Dimethyl siloxane + Tetraethyl orthosilicate Stannous octate Silicone rubber + ethyl alcohol Ethyl alcohol byproduct-evaporate -shrinkage &dimensional instability Tray adhesive Polydimethyl siloxane & Ethyl silicate Properties: Pleasant odor and color. Mixing time of 45sec & setting time of 8-9mins. Excellent reproduction of surface details and highly elastic. Lesser dimensional stability - high curing shrinkage (0.4 - 0.6%) permanent deformation due to shrinkage caused by the evaporation of ethyl alcohol is also high (1-3%). - needs a dry field.. inert. with all gypsum Hydrophobic Biologically Compatible products. AdvantagesBetter Clean, Stock elastic properties pleasant tray putty-wash Good working and setting time DisadvantagesPoor dimensional stabilityshrinkageof ethanol high polymerization evaporation pour immediately30 minutes within Hydrophobicpoor wettability Addition silicones:Also called as polyvinyl siloxanes Better properties than condensation silicones. Indicationscrown and bridge denture bite registration-Improvement over condensation silicones -no by-product Composition: Base: Poly (methyl hydrogen siloxane) Other siloxane prepolymers Fillers Accelerator:Divinyl poly siloxane Other siloxane pre polymers Platinum salt: Catalyst (chloroplatinic acid) Palladium (Hydrogen absorber) Retarders Fillers SETTING REACTION:CH3 CH3Pt salt CH3 CH3 Si-H + CH2=CH-Siactivator Si-CH2-CH2-Si CH3 CH3 CH3 CH3 Vinyl + siloxane Silane siloxane Silicone rubber No by product, but imbalance hydrogen gas air bubbles in the stone models To avoid this palladium /platinum is added. CLINICAL SIGNIFICANCE: Sulfur compounds retard the setting of silicones One source of sulfur contamination is from latex gloves Vinyl gloves should be used Properties: Pleasant odor and color Excellent reproduction of surface details Mixing time of 45 secs ,setting time of 5-9 mins. Best dimensional stability - low curing shrinkage (0.17 %) - lowest permanent deformation (0.05 0.3 %) Stone pouring delayed by 1-2 hours Extremely hydrophobic, some manufacturers add a surfactant (detergent) to make it more hydrophilic Good shelf life of 1-2 yrs Good tear strength (3000gm / cm2) Advantages Highly pour accurate High dimensional stabilityup to one week Stock or custom trays Multiple casts Easy to mix Pleasant odor DisadvantagesExpensive Sulfur in latex gloves + ferric and Al sulfate in retraction solution inhibits setting teeth with pumice req before impression. Polishing
ESSENTIALAI-STEM
Original story was translated by J.N.B. Hewitt in 1889. There was once a certain, upright man, a good hunter, and a chief in his country. He was beloved by his own people because he always worked for their welfare. Every fall he went hunting at a distant place that took him three days to reach. The good hunter always had good luck at hunting because whatever he first killed, be it a bear, deer, or whatever, he would dress it out and cut it up into as many pieces as there are animals in the woods. He would give a piece of the meat to every species of animal, placed on a square plate of soft-maple bark. The meat was cut in proportion to the size of the animal. When he finished preparing this feast, he would stand forth and call the animals in a loud voice, saying, “Come here you animals as deer, bear, seals, beavers, panthers, eagles, buzzards, and all manner of flying things. Choose a representative from among you to be present at this feast that I give.” The crows sent a white crow who is their chief. From the sky came two large birds, called Akuks, one white and the other blue. Their tail feathers held a life-giving spirit in themselves. For many years the good hunter conducted such a feast at his first hunt of the season. He continued to make these offerings in accordance to ancient customs of the Skarure. But, one night, misfortune struck the good hunter. His people were attacked by a foreign group of enemies and were annihilated by them. The good hunter chief was the last one of his people to be killed. He was scalped by the intruders. Back then, the war parties carried ten poles upon which they fastened the scalps of their victims. The scalp of the good hunter-chief was the last one to be placed on the top of the tenth pole to be carried back to the country of the intruders. The war party had not gone very far on their return trip before they stopped to dance, feast, and offer thanks for their victory. They danced all night and, in the morning, they hung a kettle over the fire to prepare themselves a meal. After their breakfast, they started to dance again. They continued to dance all day. In the meantime, an eagle had flown over the woods, looking for the body of the good hunter-chief who had always offered them food. The eagle located the scalped body and flew to spread the news to the other animals in the woods and in the sky. The animals and birds decided to hold a council to figure out what action could be taken regarding the death of the chief. They decided that it would be a good idea to help their human friend who had always been kind to them. The buzzard asked the assembly of animals and birds if any of them knows where a special white root grows. It was tiny in size, but powerful in medicine. The white Akuks was asked if he ever saw such a root. “Yes, I have,” answered the white Akuks, “I shall go for it right away.” Off he went to climb the sky to recover the white root. Next the council turned to the white crow, the chief of the crows. They asked him to summon one of his black constituents. This he did and when that black crow came, they told him, “It is your duty to recover the scalp of the good hunter who offered food to us. It is the uppermost one on the tenth pole carried by the chief’s enemies who are still dancing as we speak.” The black crow took to flight to seek the up-rising smoke from campfire of the war party. Soon he came across their encampment and circled around to avoid suspicion. He called out “ah-ah-ah” as he flew closer to their camp. The war party was too busy dancing and celebrating, they did not notice how close the crow was flying to their fire. Finally, the crow saw the pole of scalps that he was looking for. He dived toward the fire, swooped up and made sure that it was the right scalp on the top of the pole. He then circled around and swooped down toward the fire again, and with one quick move, snatched the scalp from the pole. He then turned and flew back to the council of animals and birds, with the good hunter’s scalp in his beak. By the time the black crow returned with the scalp, the white Akuks had arrived with the special white root. The root looked like a tiny human hand. Together they all went to the body of the dead chief and held their council once more. The buzzard took a buzzard’s egg and cracked one end open. He dumped the contents out and took the tiny shell to a nearby running spring, dipping the water against the current. When he returned, they placed the hand-shaped root into that eggshell and immediately the water turned to blood. They dripped that blood onto the dry scalp of the dead hunter, rubbing it into the exposed flesh. They then replaced the scalp upon his head and made it appear as if it had never been disturbed. Then they poured the rest of the blood-like fluid into the mouth of the good hunter. Soon, he began to breathe again as his life was renewed. The council of animals and birds rejoiced that their kind friend was restored. They dispersed to go back to the far corners of the woods. The good hunter chief lived to be a very old man, always grateful to the animals who brought him back from death.
FINEWEB-EDU
Why did the Sports section run thousands of words dedicated to basketball’s triangle offense? Jason Stallman, the editor of the Sports desk, explains. A Reporter Obsessed: Seeing The Triangle From All Sides In late October, as Phil Jackson was about to begin his first season running the Knicks, Scott Cacciola, a reporter for the Sports desk, wrote a piece for us about how the team would deploy Jackson’s preferred method of putting the ball in the basket: the triangle offense. (Knicks fans groaned.) Scott’s article mentioned that the system was outlined in all its glory in 1962 by its creator, Tex Winter, in a 228-page book called “The Triple-Post Offense.” I absolutely did not want to read that thing, but I did like the idea of paying someone else to read it.
NEWS-MULTISOURCE
Page:Popular Science Monthly Volume 27.djvu/447 Rh a power of absorption more intense and lying nearer to the yellow of the spectrum, and obtained in eosine and in various derivatives coloring substances which hardly possess more than a broad absorption band in the yellow, and with which he obtained the desired result. When these bodies were mixed in due proportions with the dry gelatine plates, the yellow of the colored objects appeared quite clear on the photograph, but the blue was still always brighter. Professor Vogel then inserted a yellow glass between the object and the camera, which partly absorbed the blue rays, leaving the yellow unimpaired, and obtained photographs in which the blue, as well as the green and yellow, and partly even the red, parts of the colored objects presented to the observer's eye the same vivid effects as the original. The Objects of Bathing.—The object of bathing, says a writer in the "Saturday Review," is fourfold: to produce a certain amount of nervous shock, that should be followed by reaction and an increased circulation of the blood on the surface, resulting in a more rapid change of tissues; to lower the temperature of the body; to cleanse the skin; and to produce pleasurable feelings, and, in connection with swimming, the beneficial effects of one of the best forms of physical exercise. The nervous shock and the reaction from it, following the first contact with the water, are important points, and to obtain them the plunge or the douche is preferable to any other form of bath. To wade up to the middle and stand shivering and fearful of the momentary feeling of discomfort is neither healthy nor pleasant, and timid persons who dare not plunge boldly into the water should be content with the douche-bath. A large garden hose, with a high pressure of water, held at a distance of fifteen or twenty feet from the body, will give an idea of this most delightful curative and bracing agent. Sea-bathing differs from out-door fresh-water bathing in the greater specific gravity of sea-water and its consequent greater buoyancy and more uniform temperature, while the pure air, sunshine, and better sanitary surroundings of sea-side places contribute largely to the results. Mineral baths, as such, have no particular superiority over other baths of the same density and temperature. In addition to the greater healthiness and enjoyableness of out-door bathing, it is probable that the simple exposure of the body to the sun and fresh air is of real benefit, and contributes to the sum total of the good results. Cramps are considered one of the great dangers of bathing, but when they are fatal it is probably the result of syncope or fainting, from failure of the heart's action. A good swimmer in vigorous health would hardly be wholly disabled by a cramp of only a part of his limbs. Structure of the Edible Birds' Nests.—Mr. Pryer, whose account of his visit to the Gomantin Caves, in North Borneo, has furnished a fund of information respecting the edible birds' nests of the Chinese, has published in a Japan paper an article correcting some misapprehensions that he has found to exist on the subject. That the nests are made from the saliva of the bird he regards as a physical impossibility, for a bird could not secrete in a few days a mass of saliva more than equal, when dried, to the entire bulk of its own body, and then do this nine consecutive times a year. He thinks that some saliva is used by the birds, the alga? being worked up in the bird's mouth in the same manner that mud is worked up by the Japanese swallow. Mr. Pryer at first thought that the black nests owed their color to their being made of the brown outsides of the algae, while the white nests are made of the inside. This is not correct, for the birds can use only the inside; the black nests are simply white nests grown old and frequently repaired. How to sleep well.—In sleeping, much depends on securing a comfortable position. Lying on the back would seem to give the most ease, but general experience and practice prove that it does not, and it is liable to some definite objections. In a weakly state of the heart and blood-vessels, and in certain morbid conditions of the brain, the blood seems to gravitate to the back of the head, and to produce troublesome dreams. Persons who have contracted chests, and who have had pleurisy and retain adhesions
WIKI
Page:Vedic Grammar.djvu/166 156 I. ALLGEMEINES UND SPRACHE. 4. VEDIC GRAMMAR. of all the Dvandvas) in which the compound consists of two co-ordinated nouns in the dual, each with its own accent. 2. The first member assumes an unchangeable form. 3. Only one accent remains and is restricted to the last syllable of the final member. 4. The first member assumes (but quite rarely in the RV.) the form of the stem. 5. The formation, becoming more general, can assume plural endings (but the RV. has only a few examples in the last book). 6. In the later Samhitãs this type becomes quite general, forining a single category with the dual Dvandvas. 7. The final stage (of which the examples are few) is that of Dvandvas which are neuter singulars of a collective character. 260. In the commonest and earliest type of the old Dvandvas each member is dual in form and has a separate accent. This type seems to have originated from two grammatical practices frequent in the Vedas: (a) the juxta- position of two coordinate words without ca; e. g. bhúmano divás pári (Ix. 735) 'away from earth and heaven', krátum dákşam (VIII. 423) 'under- standing and will'; (b) the use of the elliptic dual which puts one of a pair in the dual to express both, as dyávā 'heaven and earth'. This origin is probable because the dual Dvandvas are found alternating with one or both of these usages; thus mitrá-váruna 'Mitra and Varuna' appears beside both mitrá alone and mitró váruṇaḥ (or mitró váruņaś ca and mitráś ca váruņas ca); mātárā-pitárã 'mother and father' beside mātárā or pitárā and pitrė matré and other cases, the VS. (IX. 19) having pleonastically even pitárā- mātárā ca meaning 'father and mother'. The transition from the syntactical collocation divás.. prthivyás (VI. 30¹) to a dual compound is seen in divás- prthivyos of heaven and earth' (occurring four times in the RV.) where the second word is put in the dual to show clearly that an associated couple is meant. In the RV. the two duals of the compound are often separated; e. g. dyávā ha kṣámā (X. 12¹) 'heaven and earth'; dyávā yajnáiḥ prthivi (VII. 53¹); indrā no átra váruṇā (IV. 41¹)²; á náktā barhiḥ sadatām uṣāsā (VII. 425) 'let Night and Dawn seat themselves upon the litter'; indrā nú pusánā (vI. 57¹) 'Indra and Pūşan'; indrā nv àgní (VI. 59³) Indra and Agni', indra yo agni (v1. 60¹) ³; cákṣur máhi mitráyor am éti priyám várunayoḥ (VI. 51¹) 'the great, dear eye of Mitra and Varuņa comes'. In two or three examples of tmesis the dual ending appears in the first member only, while the singular remains in the second; thus mitrá... várunaḥ (VIII. 25²) and indra yó vam varuna (v1.685) 'O Indra and Varuna'. Generally, however, the two duals are in immediate juxtaposition, as indra-bŕhaspáti 'Indra and Brhaspati'; dyáva-prthivi 'Heaven and Earth'; agní-șómã 'Agni and Soma'; gen. mitráyor- várunayohs of Mitra and Varuna'. The characteristic final vowel of the first member is -a6, as uṣásā-náktä (or náktoşásā); hence it even ousts - as in ágnā-viṣṇū (AV.) ‘O Agni and Vişnu'. Beside this a there sometimes appears a in the vocative, both in tmesis, as in mitra rājānā varuṇā (v. 62³) 'O kings Mitra and Varuna' (voc. of rájānā mitrá-váruṇā, III. 567; x. 645); and when the members are joined, as I Cp. WACKERNAGEL, KZ. 23, 302 ff., REUTER, KZ. 31, 176 ff., DELBRÜCK, Alt- indische Syntax 58 (p. 98), Vergleichende Syntax, Erster Theil 41 (p. 137 f.). 2 In each of the first 6 stanzas of IV. 41 indrā and várunā are separated by one or two words of two or three syllables. 3 Also visņu agan váruṇă Vişņu and Va- rupa' in a Mantra in TB. II. 8. 45. 4 The Pada text here reads várunā; cp. indrā kó vām varuṇā (IV. 41¹). 5 Double duals in -bhyam do not appear to occur. 6 The ending -au or -äv never occurs in the first member.
WIKI
Galilean moons From Conservapedia Jump to: navigation, search The four Galilean satellites Io, Europa, Ganymede, and Callisto, shown next to Jupiter's Great Red Spot to give perspective. The Galilean moons are the four satellites of Jupiter discovered in 1610 by Galileo Galilei. They were the first natural satellites of any planet other than Earth to be discovered and are in fact the only four known dwarf planet sized satellites that Jupiter has. Discovery and naming Galileo Galilei observed Jupiter beginning on January 7, 1610, with his famous telescope. He at first thought he had discovered three stars near Jupiter, but on the next night those "stars" seemed to have moved. He continued to observe Jupiter and its companion "stars" for seven days, during which time a fourth "star" (actually Ganymede) appeared and all four of these objects appeared to move with Jupiter. Finally he concluded that these objects were not stars at all, but satellites of Jupiter. This was the first direct observation that provided evidence for Nicolaus Copernicus's heliocentric model of the solar system.[1] Simon Marius claimed to observe Jupiter and these satellites independently of Galileo and beginning five weeks earlier. However, he did not publish his findings, while Galileo published his. Furthermore, Galileo's notes were more reliable and extensive than those of Marius, which is why Ganymede and the three other satellites he observed (Io, Europa, and Callisto) are called the Galilean satellites and not the Galilean-Marian satellites.[1] Marius does, however, receive credit for providing the names that the satellites have today. He named Ganymede, the largest, for the mythical son of King Tros of Troy, carried aloft to Mount Olympus by Zeus to be the cupbearer to the gods. (The names Zeus and Jupiter refer to the same classical deity from whom Jupiter gets its name.) The other three satellites are named for three of Zeus' most famous mistresses.[1] Marius propounded these names after Johannes Kepler suggested them to him. Galileo, for his part, called them the "Medicean planets" after the Medici family whose patronage he was actively seeking at the time. He did so on the advice of the Grand Duke of Tuscany, whom he had tutored in mathematics as a boy. Rather than assign the moons individual names, Galileo simply numbered the moons I, II, III, and IV and prefaced each Roman numeral by the name of Jupiter. The satellites carried these names for two centuries. At that time, the technology of telescopes had improved tremendously, so that telescopes could now detect objects much smaller than these four moons. The discovery of other moons of Jupiter made the simple naming system untenably confusing. Only then did the Keplerian/Marian names come into common usage. Resonating orbits Orbital resonance of Io, Europa, and Ganymede The inner three of the Galilean moons (Io, Europa, and Ganymede) participate in a complex orbital resonance or Laplace resonance. These three satellites complete their orbits around Jupiter in the ratio 1:2:4. They also conjoin with one another at their apsides, in a mutually self-correcting manner that allows the resonance to persist. (Most such resonances are unstable and end with one or all bodies changing their orbits.) According to the most currently popular models of this resonance, Ganymede's orbit should not be as eccentric as it now is. Others have suggested that an asteroidal or cometary impact has produced this eccentricity, but Showman and Malhotra, in 1997, showed that such an impact cannot account for the observed eccentricity.[2] The resonance is held responsible for the relatively pronounced eccentricity of the innermost satellite, Io—and also for the tremendous tidal reshaping that Io undergoes during its less-than-two-day month. Most scientist hold that the latter phenomenon heats Io and causes its remarkable volcanism. The origin of the resonance itself is controversial. Peale and Lee, in 2002, presented a model suggesting that this resonance is primordial and thus was part of the Jovian system since its formation.[3] Their model, however, derives from the nebular hypothesis of the formation of the solar system and thus depends on uniformitarian assumptions. Showman and Malhotra suggest a model by which the resonance developed after the solar system had formed.[2] Interiors Cutaway views of the interiors of Io, Europa, Ganymede, and Callisto The recently completed Galileo Project has returned a wealth of data that has allowed planetary scientists to refine greatly their models of the interiors of the Galilean moons. Their best conjectures of those interior structures are shown at the left. Except for Callisto, all the moons appear to have metallic (iron, nickel) cores. Again, except for Callisto, all the cores are surrounded by rock shells. Io's rock or silicate shell extends to the surface, while the rock layers of Ganymede and Europa are in turn surrounded by shells of water in ice or liquid form. Callisto is shown as a relatively uniform mixture of comparable amounts of ice and rock. Recent data, however, suggests a more complex core than has been previously supposed. The surface layers of Ganymede and Callisto differ markedly from the underlying ice/rock layers in a variety of ways, including the portion of rock they contain and definitely the relative relief of the surfaces. Ganymede has very high relief while Callisto has very low relief and looks flat by comparison. Europa's surface is one of brittle ice overlying either another, much thicker ice layer or a liquid water ocean. Galileo's recent flyby data, including magnetometer measurements, suggest that a liquid water ocean might now underlie a relatively thin surface ice/rock layer. The thinness of the surface was the key fact that informed the decision to crash Galileo into Jupiter rather than risk an unplanned crash landing on Europa.[4][5] Much of the preceding is taken from the original caption to the image shown, written by JPL/NASA staff, but revised in light of additional data received subsequent to the composition of this image.[6] Magnetospheres Io, Europa, and Ganymede all definitely possess their own internal magnetic fields. But because they lie well within Jupiter's magnetosphere, most of the magnetic fluxes are induced by Jupiter's field interacting with either the conductive core of Io or the conductive shells (possible subsurface oceans) of Europa and Ganymede. Ganymede's field is strong enough to define its own magnetosphere inside that of Jupiter. Callisto's magnetic fluxes are very weak, and its internal magnetic field is probably undetectable. Callisto has a weak induced magnetic field, though it lies outside Jupiter's magnetosphere. Io Io galileo 19951217 sc 0-002-005.jpg : Main article: Io Io is the innermost, the most dense, and in many other ways the most remarkable of the Galilean moons. Since the Voyager 1 and Voyager 2 flybys in 1979 and 1980, Io has been known to be volcanically active—the most active body in all the solar system. Tidal heating is the most popular theory to explain this activity, but even that cannot account completely for the total amount of heat that flows out from Io at all times. Europa Europa true color.jpg : Main article: Europa Europa, the second innermost, is also the smallest of the Galileans. It has very few craters, and thus by uniformitarian criteria it is considered "young." The brittle ice sheet that overlays it has fueled speculation as to whether a much thicker ice sheet, or a liquid-water ocean, lies deep to it. This in turn has fueled speculation, both in the scientific community and in science fiction, as to whether Europa harbors life. The Galileo spacecraft developed evidence in favor of the proposition that Europa has a sub-crust saltwater ocean under a very thin rock-and-ice layer. In order to prevent the spacecraft from crashing into Europa, rupturing the crust, and contaminating Europa's oceans with earthly microbes, Galileo's mission controllers steered Galileo into a crash dive into Jupiter in September 2003.[4][5] However, the exploration of Europa with a submersible probe, to be delivered by an ice-penetrating missile, is under active consideration. Ganymede Ganymede2 galileo big.jpg : Main article: Ganymede Ganymede is the largest moon not only of Jupiter but in all the solar system—larger than Mercury so that in theory it could be a true planet if it orbited the Sun. In sharp contrast to Io and Europa, Ganymede is very heavily cratered and is therefore considered "old." Ganymede has its own independent magnetic field, and a quite strong one. Like Europa, it has a saltwater ocean, but under a much thicker crust than that of Europa. Callisto Callisto true color.jpg : Main article: Callisto Callisto, the outermost of the Galilean moons, does not participate in the Laplace resonance with the other three and also lies beyond the Van Allen-like radiation belt that surrounds Jupiter. Like Ganymede, Callisto is very heavily cratered. Problems for Uniformitarianism Posed by the Galileans The three-part orbital resonance of Io, Europa, and Ganymede becomes very difficult to explain in light of Ganymede appearing to be so much "older" than Io or Europa. At least some astronomers believe that this resonance is primordial.[3] Not all astronomers agree.[2] But if the resonance is primordial, then the presence within it of bodies of differing "geological ages" begs explanation. Most observers consider that Io is older than it looks, because the volcanoes and their associated lava flows have erased the craters. But that cannot apply to Europa, which looks at least as "young" as does Io. Io's volcanism testifies to its tremendous internal heat. In fact, Io is radiating far more heat than tidal heating alone could generate. And yet no astronomer accepts radioactive decay as a significant source of Io's heat. Either Io has another, still-unknown source of heat, or else the present rate of heat outflow is unsustainable and temporary. References 1. 1.0 1.1 1.2 "The Discovery of the Galilean Satellites," JPL, NASA, n.d. Quoted by Hamilton, Calvin J., SolarViews. Accessed February 18, 2008. 2. 2.0 2.1 2.2 Showman, Adam P., and Malhotra, Renu. "Tidal Evolution into the Laplace Resonance and the Resurfacing of Ganymede." Icarus, 127:93-111, 1997. Accessed February 18, 2008. 3. 3.0 3.1 Peale, S. J., and Lee, Man Hoi. "A Primordial Origin of the Laplace Relation Among the Galilean Satellites." Science, 298(5593):593-597, October 2002. Accessed February 18, 2008. 4. 4.0 4.1 "Galileo Crashes into Jupiter." ABC News Online, Australian Broadcasting Company, September 21, 2003. Accessed February 20, 2008. 5. 5.0 5.1 Macey, Richard. "Galileo's death leap onto Jupiter." Sydney Morning Herald Online, September 15, 2003. Accessed February 20, 2008. 6. "Catalog page for Image PIA01082," NASA/JPL Photojournal. Accessed February 29, 2008.
ESSENTIALAI-STEM
User:Graeme Boddy Riverbug. In New Zealand and Britian this is the name given to a one man inflatable craft that is the modern hi-tech version of an inner tube used for floating rivers(river tube)
WIKI
Joseph Torbey Joseph Torbey (Arabic: جوزيف طربيه, from Tannourine) is a Lebanese banker, the Chairman of the Crédit Libanais bank and the head of the World Union of Arab Bankers (WUAB). Biography Born in Beirut, Joseph Torbey holds a PhD in Law from the University of Lyon in France, and studied Public administration and Business Taxation at the University of Southern California, Los Angeles. He was head of the Income Tax Department at the Ministry of Finance from 1970 to 1988. In 1988, he became the Chairman of Crédit Libanais. He was the president of the Association of Banks in Lebanon (ABL) from 2001 to 2005, 2009-2013 and 2015–2019. In 2006, he became the head of the World Union of Arab Bankers (WUAB). He is also president of the Maronite League from 2007 to 2013.
WIKI
Talk:Pathogens and Global Health New(er) name Any objections to moving this article to the journal's new name as of 2012, which is Pathogens and Global Health? I am not familiar with the journal's history, but this seems to be the current name. EricEnfermero (Talk) 06:41, 22 March 2015 (UTC) * Yep, this is the current name. I've gone ahead and moved the article. --Randykitty (talk) 16:40, 22 March 2015 (UTC)
WIKI
External Counterpulsation – EECP External counterpulsation is an FDA approved method Dr. Steenblock uses to treat circulatory conditions such as angina and a whole lot more. Known as “EECP treatments are done using a computer-driven device in which three compressive air cuffs (like big blood pressure cuffs) are wrapped around each leg, one at calf level, another slightly above the knee and the third on the thigh. These are then inflated and deflated in synchronization with his or her cardiac or heart pumping cycle.  During diastole or when the heart fills with blood following a contraction the three sets of air cuffs are inflated in sequence (lower body to upper) which sends blood rushing to the heart. This causes an increase in diastolic blood pressure, the generation of arterial blood flow that is the reverse of what normally occurs and an increase in blood return from veins. The cuffs are all deflated just prior to contraction or systole, which (among other things) brings about a a decrease in ventricular workload and increased cardiac output. EECP has the near immediate effect of delivering more oxygen to the heart while simultaneously reducing the demand for oxygen by lowering the heart’s work requirements.  Over time it bolsters blood flow through blood vessels that feed the heart. Many doctors refer to this increased blood & oxygen flow as a “natural bypass.” What Clinical Studies say about EECP: Clinical studies have demonstrated that ECP/EECP reduces the number and severity of angina episodes. According to published data these effects stick around for months to years after a course of therapy is concluded. One review showed that EECP elicited a significant clinical response in 70-80% of treated patients with refractory angina which lasted for up to 5 years. Please contact us at 949-229-8551 or use the form below to get more information about Dr. Steenblock and his celebrated approach to chronic and degenerative disease treatment including the use of EECP.
ESSENTIALAI-STEM
SourceForge has been redesigned. Learn more. Close #15 Bad VCD scope output open nobody None 5 2009-05-18 2009-05-18 No I have several examples of VCD output scope definitions that lead to bad scopes with the latest version of Veriwell (2.8.7). Here's one example: module main; initial begin #5; call_task( 1'b0 ); end initial begin #10; call_task( 1'b1 ); end initial begin `ifdef DUMP $dumpfile( "task3.vcd" ); $dumpvars( 0, main ); `endif #1000; $finish; end task call_task; input a; begin #100; $display( $time, "Task called for a=%h", a ); end endtask endmodule This generates the following VCD dumpfile: $date Sun May 17 23:47:15 2009 $end $version Veriwell 2.8.7 $end $timescale 1s $end $scope task call_task $end $var reg 1 ! a $end $upscope $end $upscope $end $enddefinitions $end #0 $dumpvars x! $end #5 0! #10 1! The problem is that there is only one $scope call but two $upscope calls. There should be a $scope call for "main" prior to the $scope call to the "call_task" task. I have run into other issues where the $scope and $upscope calls don't match up (too many of one and not enough of the other). If this problem can be fixed, I can verify the other situations and append them to this bug report accordingly. Discussion Log in to post a comment.
ESSENTIALAI-STEM
Template talk:Timeline of iPhone models Color At the time of writing (July 2010), this timeline appears to be seriously flawed. The colour key indicates that the darkest blue shade refers to "iPhone 4", but on my display the darkest blue shade in the timeline begins in mid 2009 and is labelled "iPhone 3GS". The use of colour to denote handsets *and* availability is confusing: decide what colour means and use it for just that. -- <IP_ADDRESS> (talk) 08:14, 1 July 2010 (UTC) * This is still a problem several months later, and this timeline is used in several articles. I am not sure how to fix it. Can anybody help? –Cwenger (talk) 12:38, 24 December 2010 (UTC) 2016 * This is a good template and is useful in the articles. I suggest though that because the colors are very similar between models near each other, and they are used in the timeline on the same line, it can be difficult at first glance to see the break point. For example, currently (September 2016) the original iPhone and iPhone 3 are on the same lines and are nearly the same pink/rose shade. Thanks Group29 (talk) 14:01, 14 September 2016 (UTC) AT&T and Verizon Should we distinguish between the AT&T and Verizon versions of iPhone 4 on this timeline? Democraticmacguitarist (talk) 17:57, 11 January 2011 (UTC) CB failure The current timeline image fails for red-green colorblindness (Deuteranomaly (6% of males, 0.4% of females). All the greens appear to be the same hue. (20040302 (talk)) * It failed even normal color vision.. I changed colors, not sure how they are for color blind. --Harriv (talk) 12:20, 1 November 2012 (UTC) * Harriv, thanks for that. The new scheme works better - though the iPhone 5 line is too similar to the blue text. (20040302 (talk) 14:32, 1 November 2012 (UTC)) * Any better? The Anonymouse (talk &#124; contribs) 07:21, 11 January 2013 (UTC) * It works for me! Thanks youse (20040302 (talk) 10:37, 11 January 2013 (UTC)) The new Green used for the 2016 models (edit: and 2015 models - I didn't check last year) is a bit too close to the yellow for red-green colorblindness. Can we amend the template once more to choose a more distinct hue please? (20040302 (talk) 13:22, 16 February 2016 (UTC)) value:rgb(0.5, 1, 0.4) would work - but I am not a designer.. (20040302 (talk) 13:27, 16 February 2016 (UTC)) Organize by capacity? The current way of organizing models by capacity make me unable to read out all info from this template when I am using a monochrome screen to browse it. I guess that is also same for color blind people. Should it be reversed back?C933103 (talk) 08:13, 22 October 2014 (UTC) * I preferred the organization by model instead of the current organization by capacity. --IngenieroLoco (talk) 18:05, 24 October 2014 (UTC) Clarification of Timeline Shouldn't there be some clarification of what this timeline actually incorporates? As far as I've seen, the iPhone 4S has been available in India until Feb 2016, but it shows last availability as end of 2014. Is this chart really "availability of models in the U.S."? If so, then we should just label it that way. Chuck (talk) 22:22, 22 March 2016 (UTC) Readability, color blindness and how we solved it at Czech wiki After new models has been added recently (iPhone 8, iPhone 8 Plus and iPhone X), it become very hard to read this timeline, because it's 1000px max size and it's using 6px font-size when rendered at 120 dpi and less. Font size is problem, because it does not comply with MOS:FONTSIZE, here's screen where you can check that's unreadable at such screen density. At Czech wiki version we were trying many possible solutions that would not increase whole image size because even at 2017 there's 40 % online users with screen 1366px in width and smaller, where vertical scrolling becomes annoying. Our best solution came up with 9,5% font size instead of S or M (courtesy of cs:Wikipedista:RiniX) and with different color scheme and repeating shorthands of iPhone versions. Feel free to reuse this version as you like. → Here's a demo: cs:%C5%A0ablona:%C4%8Casov%C3%A1_osa_model%C5%AF_iPhone Color scheme has been tested for colorvision deficiencies: * Protanopia * Deutanopia * Tritanopia * Achromatopsia (no color vision → grayscale) Colors for future iPhone models If you want to use the same color scheme, here's guidelines for future iPhone models. It has to be converted to rgb form (using hex just for easier readability) * Colors for future iPhone SE models: #90CAF9, #64B5F6, #42A5F5 * In case if next model X will be just updated (such as XS, XGS...): #A5D6A7, #81C784 * Future models with different name (use colors gradually): * light green: #DCEDC8, #C5E1A5, #AED581 * lime: #F0F4C3, #E6EE9C, #DCE775 * yellow: #FFF9C4, #FFF59D, #FFF176 * amber: #FFECB3, #FFE082, #FFD54F * orange: #FFE0B2, #FFCC80, #FFB74D * dark orange: #FFCCBC, #FFAB91, #FF8A65 * brown: #D7CCC8, #BCAAA4, #A1887F H0n24 (talk) 20:55, 13 September 2017 (UTC) * A problem is that I believe the original iPhone were not called iPhone 2G? * How about a layout like this? User:C933103/Template:Timeline of iPhone models 2 C933103 * (Design rationale: 4GB model of original iPhone, every 8GB model after, 5C and SE, 16/32GB version of 6/6S/7 (Plus) are treated as lowest end, 8GB original iPhone, 16GB up till 5S, 64GB of 6/8 (Plus) are treated as lower end, 16GB original iPhone and 32GB of every models thereafter till 5S are treated as higher end, remaining are the top end) * (talk) 04:55, 20 September 2017 (UTC) * Your condensed version looks nice, but it sadly does not depict reality. For example Apple is currently officially (via eshop) selling 16 models by generation and size (not counting country specific models, that would be more than 60 models). Your version says it's only 11 models. Same issue goes for previous models, just compare total counts at the end of the year. H0n24 (talk) 00:07, 24 September 2017 (UTC) * the condensed version combines the 7 and 7 Plus models into 7 (Plus), so count them as two. Then you get 17 for the end of 2017, but that's because there's a potentially non existant "iPhone 6 32 GB" on the condensed version. I can't find it on the website but I found it on Amazon. I don't know if that's also the case with other models. Wumbolo (talk) 08:12, 24 September 2017 (UTC) * Oh yea, I missed that. Thanks. I suggest using "7, 7+" instead of "7 (Plus)", comma is usually considered less confusing with greater adoption UX speaking. Also next suggestion for condensed version - get rid of that gray part and cut table by current years (eg. in 2017 cut it at 2018, next year cut it at 2019 etc.). At czwiki we use larger font, cuz 6 px is hard to read and it could technically replace current layout. Check this example. H0n24 (talk) 10:00, 24 September 2017 (UTC) * For iPhone 6 32 GB, it is currently selling only via carriers and third party partners in countries including China, India, US, UK instead of on Apple official online shop, you can see further detail about it by searching "iphone 6 32gb" online or see iphone 6's article. C933103 (talk) 14:33, 24 September 2017 (UTC) * You do realize that you can currently buy any iPhone ever made, if you "don't count Apple official online shop", right? Like for example iPhone 2G from 2007 officially discontinued at 2008 is being sold new today for $15 300 at Amazon therefore it could be included in graph also. Additionally, there are over 300 different iPhone models based on hardware or software differences and over that there are hundreds of custom made iPhones, such as 24k gold one for example. Using Apple Official shop as source will prevent unnecessary complexity and chaos. H0n24 (talk) 15:37, 24 September 2017 (UTC) * The difference is if apple are still supplying the model. And iphone 6 32GB were never offered via official online shop. Those gold iphones and all the other variants are not officially supplied by apples. Using apple official shop as a source would mean missing models from the table. C933103 (talk) 08:54, 28 September 2017 (UTC) * 2. Comma is also ok.C933103 (talk) 14:33, 24 September 2017 (UTC) * 3. I have another question about that, is that in the current version of the template, there are spaces in between the end of previous model and the start of next model, however in this condensed version it does not exists. Were the spaces intentionally added by modifying start date to give visual distinction? C933103 (talk) 14:33, 24 September 2017 (UTC) * It's intentional. Open for suggestions if possible to do programmatically without counting days offset. H0n24 (talk) 15:37, 24 September 2017 (UTC) * 4. Grey part is necessary to fit in the text of latest model as well as giving the needed length for recently introduced model, as well as distinguishing between recently discontinued model and still in production model C933103 (talk) 14:33, 24 September 2017 (UTC) * Yet it's not helpful due to added complexity and confusion. H0n24 (talk) 15:37, 24 September 2017 (UTC) * The dimensions are absolute, not responsive, so it doesn't matter if there is a grey thing. It means the product isn't yet going to be discontinued. As for the Plus models, if they are specifically mentioned in the navboxes they can be here too, as to avoid confusion (it isn't obvious if a generation has a Plus model or not). I'm not sure whether H0n24 agrees or disagrees with me (his sandbox version doesn't mention Plus models), but I'm going to have to go with agree. If by "grey part" you mean the tiny area between two iPhone bars, I think it shouldn't be indiscriminate but determined by the date a product has been discontinued, and the date the next product is launched/whatever (e.g. currently in all versions, the iPhone X has the start date set to Sep 22, 2017, which is the date the product was released to stores; I didn't check the start date for other iPhones so I just want it to be consistent, if you want the date the product was available for preorder, you can go for e.g. Sep 15 for the iPhone X). If two bars overlap, I don't know what would happen to the template, but the overlap should be distinctively visible. Need there be no offset, there shall be no offset. As for the GB variations, they should be as compact as possible, as they are of inferior significance than the regular/Plus shenanigans. I don't see any other issues. H0n24 says it passes color blindness and goodbye. When I say model I refer to iPhone model, when I say version I refer to the timeline template version. Wumbolo (talk) 19:28, 27 September 2017 (UTC) * Disclaimer: my sandbox version is just for development/testing purposes. I DID (!) manipulate with selling end dates of previous iPhone models just so there is visible "white space" between two models at second one, so it's not accurate. Dunno how to visually distinguish them better with this graph system. Also, I haven't checked this version for color blindness, only our czech version with old scheme has been tested, so careful with that. Also AFAIK all historical dates in the table are from official selling start and end (so without preorders) that's possible to check with apple.com/eshop, atleast it's consistent with 4-7 models. iPhone X should be an exception because we don't know if it will be delayed at November. H0n24 (talk) 07:26, 28 September 2017 (UTC) * Let's say the dates are the availability and discontinued dates which we have on the respective Wikipedia pages of the iPhones. I checked all of the dates and found these errors: * I compared all start and end dates in the template with the released and discontinued dates we have at List of iOS devices: * The original iPhone was discontinued on July 15, not July 11. * List of iOS devices states iPhone SE 32GB and 128GB were released on March 21, 2017, but the current template states they were released on March 24, 2017. * List of iOS devices states iPhone SE 16GB and 64GB were discontinued on March 21, 2017, but the current template states they were released on March 24, 2017. * What about the iPhone 6 and iPhone 6 Plus 32GB version? The article on it says it was first released in (late) February 2017, but List of iOS devices states it was released on March 10. * When were the iPhone 6S and iPhone 6S Plus 32GB released? This source says September 9, 2016; List of iOS devices states September 7, 2016; the current template says September 16, 2016. * I didn't pay attention to infoboxes as they are overwhelmingly incorrect. * Wumbolo (talk) 10:48, 28 September 2017 (UTC) * , By grey part, I believe it's referring to the grey bar at the end of my sandbox as well as in the current template after the current date until year 2019. As for end date manipulation, I was asking about how it is currently handling in the current template. C933103 (talk) 09:01, 28 September 2017 (UTC) * I agree with the new layout. Wumbolo (talk) 09:42, 20 September 2017 (UTC) * I agree with the new layout. Wumbolo (talk) 09:42, 20 September 2017 (UTC) Suggestion to put the capacity increases in the same swimlane I see that 3G and 3GS models are put in the same swim lane. Again, iPhone 5 to iPhone 5S are paired up in the same swim lane. These models span multiple years. For 6S, 6S Plus, and SE, there was storage increase. Despite the minor nature of the update, the new capacity models are moved into a new swim lane, which makes the overall timeline look unevenly spread out and less organized. Moving models into a new swim lane just from a size increase also makes it harder to show a pattern where Apple discontinues the previous year's L sized storage to avoid overlapping with the new model's price points. --Saledomo (talk) 04:28, 6 May 2018 (UTC) "Please leave this link syntax intentionally." What's wrong with replacing: iPhone 3G with: iPhone 3G ? Just curious... --Kaledomo (talk) 12:11, 14 September 2018 (UTC) Great diagram! But what about iOS? I like this graph very much. But I think it will be helpful if the line of an iPhone contious in a much lighter colour as long it is/was supported with iOS updates. E.g. the 1st iPhone was able to get updates until iOS 3.1.3 which was the last iOS 3 version. So with the release of iOS 4 on June 21, 2010 the support stopps. So a very light pink line should be drawn until the iPhone 4 was released. The reason for that is, that you easily see the "lifetime" of any iPhone. Thank you in advance! — Preceding unsigned comment added by <IP_ADDRESS> (talk) 12:50, 4 October 2019 (UTC) iPhone 8/8 Plus 256 GB iPhone 8/8 Plus 256 GB discontinued on September 10, 2019. The template indicates that it is still in production.--<IP_ADDRESS> (talk) 15:47, 21 October 2019 (UTC)
WIKI
The Most Popular Healthcare Drug – Magnesium Citrate India Magnesium citrates are one of the most widely used and most required drugs in the pharmaceuticals domain. If you own a pharmaceutical firm and if you are in need of magnesium citrates, remember that you are dealing with a crucial area of health care and it is thus essential to ensure the authenticity of the compounds that you are using. You may either customise these based on your customer’s requirement or use them in generic ratio. The reputed and experienced manufacturers of Magnesium Citrate India deal with trading of these compounds and citrates both within and across the national borders! Also, check for the expiry dates and it is always advisable to go for those combinations which are quite far from the expiry dates than those nearer! Hence it is always advisable to get in touch with the leading manufacturers of Magnesium Citrate India. Why are Magnesium Citrates used – Magnesium citrates are used widely for cleaning stool from the intestines before surgery or to relieve constipation. It is actually a saline laxative which functions by increasing the fluid content in the smaller intestine and hence results in bowel movement within 30 minutes to maximum of 3 hours. The other alternatives of magnesium citrates include stool softeners and bulk-forming laxatives. Usage of Magnesium Citrate – First of all, abide by the instruction of the doctor. If he has advised the patient to use it before surgery or for bowel movement, he will also guide you on the duration before which this needs to be consumed. Also, this can be consumed by chilling it a bit in the refrigerator to improve the taste but do not freeze it! Freezing would spoil the compound and it will not serve you the purpose. Generally doctors advise to consume at least 8 ounces or 240 milliliters of water which is almost equivalent to a full glass, after having the magnesium citrate as it prevents all the side effects that might occur, the most common and serious being loss of too much body water-dehydration. Magnesium citrate, if used frequently for bowel movements, it can produce laxative dependence, which mean the patient will not be able to regular bowel movement without consuming this compound at all. Moreover over usage of magnesium citrate is known to produce diarrhea, abdominal pain, decreased weight, and weakness in the body. In such a situation, consult the physician immediately. Do not consume tetracycline or quinolone antibiotics like doxycycline, tetracycline and ciprofloxacin within a range of 2 hours before or after consuming magnesium citrate as it chemically reacts in the body and neutralizes the citrate functionality and often brings forth serious side effects. Guidelines to use Magnesium Citrate – Seek the necessary guidance from certified and experienced dealers and drug pharmaceuticals organisation for the right combination, and customised compound as per customer requirement. Make sure that the products adhere to the expiry dates. Moreover the shelf life should be long enough to allow effectiveness and purity of the drug compounds. These dealers who provide the drugs internationally are known to have separate quality and improvement specialists and R&D wing which continuously thrive towards providing better service in terms of delivery, packaging, customisation of quantity and most importantly better health! Consult the best manufacturers of Magnesium Citrate India for the original and genuine drugs. Leave a Reply
ESSENTIALAI-STEM
Olympic protest galvanized blacks here When African-American Olympic medalists John Carlos and Tommie Smith thrust their black-gloved fists into the Mexico City air on Oct. 16, 1968, during "The Star-Spangled Banner," the impact on the nation and the world was immediate. During a year of racial unrest, turmoil and violence, the actions on the podium after the final of the 200-meter dash at the Summer Games were an act of defiance that galvanized those in Columbus, too. "It was something that little black boys who played sports like me had never seen before," said Wil Haygood, a journalist and author who grew up in Columbus and recently wrote the book "Tigerland" about sports championships at East High School in 1968-69. "It was kind of scary because we all knew blacks who had defied authority, and often, when that happened, bad things happened to you." The raised black fist — a symbol that came to represent black power, pride, solidarity and resistance — was a brave act in the largely segregated America of 1968. So what Carlos and Smith did remains a defining moment in a modern era in which NFL quarterback Colin Kaepernick started a movement and debate by kneeling on the sideline during the national anthem to protest racial inequities and police brutality in African-American communities. That simple act by the two sprinters set a path and continues to play a role in the lives of those who remember it, including those who watched the events from central Ohio. "We were very supportive of their actions and why they did it," said John S. Evans, who was an Ohio State University student and president of the Black Student Union in 1968. Smith, Carlos and the other Olympic athletes arrived in Mexico City amid political protests by students there. On Oct. 2, 1968 — 10 days before the games opened — dozens were killed and more than 1,000 injured when Mexican police and the military opened fire on the students. Join the conversation at Facebook.com/columbusdispatch and connect with us on Twitter @DispatchAlerts The United States already had been wracked with violence in the preceding months, including the assassinations of the Rev. Martin Luther King Jr. in April in Memphis and presidential candidate Sen. Robert Kennedy in June in Los Angeles. Protests outside the Democratic National Convention in Chicago in August were chaotic, with television viewers watching helmeted Chicago police officers use their billy clubs to crack protesters on their heads. Smith, the gold medalist, and Carlos, who earned the bronze, had their own concerns before going to the 1968 Olympics, which ran from Oct. 12 to 27. They had helped organize the Olympic Project for Human Rights, which tried to persuade African-American athletes to boycott the games. The group was formed to protest racial segregation in the United States and racism in sports; they also were upset that Muhammad Ali had been stripped of his heavyweight boxing title after he refused to be inducted into the Army during the Vietnam War. But they went. Smith later said, "If I win, I am American, not a black American. But if I did something bad, then they would say I am a Negro. We are black, and we are proud of being black. Black America will understand what we did tonight." Ned Pettus, Columbus' public-safety director, was a 16-year-old senior at Linden-McKinley High School during the '68 Olympics. "I wasn't the most mature, sophisticated person on Earth," Pettus said. He said his biggest focus at the time was getting his older brother to let him use his car. But he also remembers how important the actions of Carlos and Smith were to the black community. "The impact on self-esteem was the courage to stand up and speak up for what you thought and what you believed," Pettus said. Evans, now 75, led a sit-in at Ohio State's administration building in 1968 to protest the segregation of off-campus housing and call for a special office to address concerns of African-American students. At Ohio State, with its emphasis on football, there was a concern about how many kids who played football never got their degrees, Evans said. He said it was atrocious at the time that the "lily-white institution" had just three black faculty members. Smith and Carlos shone a light on these issues on a global scale. "The majority of the black students that I knew, not just at Ohio State. took pride in them bringing forward that things were not right in America," Evans said. Kenny Anderson ran track at Ohio State in '68. Anderson, a New York City native, had transferred from the University of Texas-El Paso that fall. He remembers watching the Summer Olympics at the Student Union. Olympic long jumper Bob Beamon had been Anderson's roommate in El Paso. Anderson vividly remembers watching his friend set a world record for the long jump at 29 feet, 2½ inches in Mexico City's high altitude. "It was shocking what he did do," Anderson said. Anthony Callender, who grew up on Long Island outside New York City, also ran track at Ohio State at the time, competing on the 440-yard relay team with Anderson. Callender lived in Park Hall, where many student-athletes lived. After King was assassinated, a white football player from Cleveland who was on scholarship asked him, "You guys going to riot now?" "I felt offended by that," he said. Six months later, Callender was living in Morrill Tower, glued to the Olympics on TV. "A lot of us had been following a lot of the discussion to boycott the Olympics," Callender said. Tommie Smith had been part of that. "We were anticipating something would happen, a demonstration." When Smith and Carlos raised their fists skyward, Callender celebrated. "I was jumping up and down on the furniture," he said. "I'm saying, 'Somebody made a statement. I don't know what's going to happen now. But somebody made a statement.'" Callendar graduated from Ohio State in 1971 with a bachelor's degree in public administration. He earned a master's degree from Pratt Institute in New York City and later worked as a transportation planner with city agencies there. October 1968 in Mexico City always stuck with him. "That and other experiences showed me I was part of a people who stand up for our rights," he said.
FINEWEB-EDU
Removing null or specific values from list in Java Have you tried to remove null values from a List (may a ArrayList). Yesterday I was trying it out, when I had to remove null values from a List before processing it. Initially, I was trying with the simple for loop and out I was getting Still NullPointerException while processing. I tried with couple of ways, before I came to a efficient one. Lets see this with an example: Lets see what are the flaws, when u try to remove null values from a List with a for loop: List li = new ArrayList(); FileListItem fLI = new FileListItem(); fLI.setFormFileName("123"); FileListItem fLI2 = new FileListItem(); FileListItem fLI3 = new FileListItem(); FileListItem fLI4 = new FileListItem(); fLI4.setFormFileName("456"); li.add(fLI); li.add(fLI2); li.add(fLI3); li.add(fLI4); System.out.println("====this.fileList() =====" + li); for(int i = 0;i <> System.out.println("li Size ====" + li.size() + " & Value of i ===== "+i); FileListItem fileListItem = (FileListItem) li.get(i); System.out.println("fileListItem is ====== "+fileListItem); if(null == fileListItem.getFormFileName()) li.remove(i); } System.out.println("====this.fileList() =====" + li); What output it will produce, Lets see === this.fileList()==[FileListItem{ formFileName=123}, FileListItem{ formFileName=null}, FileListItem{ formFileName=null}, FileListItem{ formFileName=456}] li Size ====4 & Value of i ===== 0 fileListItem is ====== FileListItem{ formFileName=123} li Size ====4 & Value of i ===== 1 fileListItem is ====== FileListItem{ formFileName=null} li Size ====3 & Value of i ===== 2 fileListItem is ====== FileListItem{ formFileName=456} === this.fileList()== [FileListItem{ formFileName=123}, FileListItem{ formFileName=null}, FileListItem{ formFileName=456}] Here it still contains a Null Value in it. So what is the efficient way to remove elements from a list: Iterator is wonderful thing to handle it. Lets see the same thing with Iterator. System.out.println("====this.fileList() =====" + li); Iterator itr = li.iterator(); while(itr.hasNext()){ FileListItem fileListItem = (FileListItem) itr.next(); if(null == fileListItem.getFormFileName()) itr.remove(); } System.out.println("====this.fileList() =====" + li); Here the Output will be : ====this.fileList() ===== [FileListItem{ formFileName=123}, FileListItem{ formFileName=null}, FileListItem{ formFileName=null}, FileListItem{ formFileName=456}] ====this.fileList() ===== [FileListItem{ formFileName=123}, FileListItem{ formFileName=456}] ListIterator can also be used for the same, but ListIterator give you additional advantage of adding elements to a list, while iterating it. Please download the complete code from here: ListDemoCode Comments Popular posts from this blog Green Cleaning: Its impacts on Health & Environment Capturing a Screenshot in Java (Using AWT) Have U Seen My Web-site
ESSENTIALAI-STEM
How to use typings to install cordova from github DefinitelyTyped? Hi, I have the same issue as described in this post Ionic2 typescript project with cordova plugins. So far, I prefer to use typings to install the d.ts files for cordova. However, I met the following issues: 1). When using the following command, it adds the following kev/value to the typings.json file. // command line $ typings install cordova --ambient --save // typings.json file "cordova": "registry:dt/cordova#0.0.0+20151102150547" However, when I look into /typings/main/ambient/cordova/index.d.ts, it is different from the one in DefinitelyTyped. 2). The default es6-shim in typings.json does come from DefinitelyTyped, as "es6-shim": "github:DefinitelyTyped/DefinitelyTyped/es6-shim/es6-shim.d.ts#4de74cb527395c13ba20b438c3a7a419ad931f1c" If I want to reference cordova from DefinitlelyTyped, what should I do? And why there is a uuid #4de74cb527395c13ba20b438c3a7a419ad931f1c after the es6-shim reference? can I just do: "cordova": "github:DefinitelyTyped/DefinitelyTyped/cordova/cordova.d.ts#4de74cb527395c13ba20b438c3a7a419ad931f1c" Hi, the hash at the end is a reference to a specific commit. I don’t know why there is this uri in the typings.json, I have the same. However, for me cordova is available inside my typescript source code. Also support for intellisense inside visual code. @stefanhuber, ah, yes, the hash references to the commit. It’s helpful if I want to change to other commits. Finally, I found a solution to get the StatusBar resovled by TypeScript. Just install cordova is not enough, I have to install the corresponding plugins as well. $ typings install cordova --ambient --save $ typings install cordova/plugins/statusbar --ambient --save It will add the followings to the typings.json { "ambientDependencies": { "cordova": "registry:dt/cordova#0.0.0+20160316155526", "cordova/plugins/statusbar": "registry:dt/cordova/plugins/statusbar#0.0.0+20160316155526" } } And another interesting thing I found is that, they do link to the DefinitelyTyped repo. I was fooled by the strange registry:dt/cordova#0.0.0+20160316155526. If I type https://api.typings.org/entries/dt/cordova%2Fplugins%2Fstatusbar/versions/latest into the browser, I will get the following json. And the location property points to the DefinitelyTyped. { "tag":"0.0.0+20160316155526", "version":"0.0.0", "description":null, "compiler":null, "location":"github:DefinitelyTyped/DefinitelyTyped/cordova/plugins/StatusBar.d.ts#56295f5058cac7ae458540423c50ac2dcf9fc711", "updated":"2016-03-16T15:55:26.000Z", "deprecated":null} Now, I can use the StatusBar to modify its styles for iOS. :slight_smile: And I am using Visual Code too. Hi, I followed your method but I still get an error on ionic cli with the camera plugin: ERROR in [default] /app/pages/page2/page2.ts:16:27 Property ‘DestinationType’ does not exist on type ‘typeof Camera’. ERROR in [default] /app/pages/page2/page2.ts:17:22 Property ‘PictureSourceType’ does not exist on type ‘typeof Camera’. ERROR in [default] /app/pages/page2/page2.ts:19:24 Property ‘EncodingType’ does not exist on type ‘typeof Camera’. ERROR in [default] typings/browser/ambient/ng-cordova/camera/index.d.ts:11:45 Cannot find namespace ‘ng’. I’ve added the camera plugin $ typings install cordova --ambient --save $ typings install cordova/plugins/camera --ambient --save typings.json: { "ambientDependencies": { "cordova": "registry:dt/cordova#0.0.0+20160316155526", "cordova/plugins/camera": "registry:dt/cordova/plugins/camera#0.0.0+20160316155526" } } Is there something that I missed? I’ve done the installing similar to you however haven’t tried an ionic serve yet because in Visual Code intellisense is saying that ‘property getPicture’ is not a type on Camera: let options = { quality: 100, destinationType: Camera.DestinationType.DATA_URL, sourceType: Camera.PictureSourceType.CAMERA, allowEdit: false, encodingType: Camera.EncodingType.JPEG, targetWidth: 350, targetHeight: 350, correctOrientation: true, saveToPhotoAlbum: false } Camera.getPicture(options).then... (though it doesn’t complain about the properties of Camera defined in my options). Looking at the index.d.ts for the camera plugin shows it’s only picking up the following properties: declare var Camera: { // Camera constants, defined in Camera plugin DestinationType: { DATA_URL: number; FILE_URI: number; NATIVE_URI: number } Direction: { BACK: number; FRONT: number; } EncodingType: { JPEG: number; PNG: number; } MediaType: { PICTURE: number; VIDEO: number; ALLMEDIA: number; } PictureSourceType: { PHOTOLIBRARY: number; CAMERA: number; SAVEDPHOTOALBUM: number; } // Used only on iOS PopoverArrowDirection: { ARROW_UP: number; ARROW_DOWN: number; ARROW_LEFT: number; ARROW_RIGHT: number; ARROW_ANY: number; } How do I instead get my code to ‘see’ the property of the Camera interface as also defined in index.d.ts? interface Camera { /** * Removes intermediate photos taken by the camera from temporary storage. * @param onSuccess Success callback, that called when cleanup succeeds. * @param onError Error callback, that get an error message. */ cleanup( onSuccess: () => void, onError: (message: string) => void): void; /** * Takes a photo using the camera, or retrieves a photo from the device's image gallery. * @param cameraSuccess Success callback, that get the image * as a base64-encoded String, or as the URI for the image file. * @param cameraError Error callback, that get an error message. * @param cameraOptions Optional parameters to customize the camera settings. */ getPicture( cameraSuccess: (data: string) => void, cameraError: (message: string) => void, cameraOptions?: CameraOptions): void; // Next will work only on iOS //getPicture( // cameraSuccess: (data: string) => void, // cameraError: (message: string) => void, // cameraOptions?: CameraOptions): CameraPopoverHandle; } The ‘documentation’ says I should be able to just use Camera.getPicture: http://ionicframework.com/docs/v2/native/Camera/ I have not used any import call at the start of my page as I am not sure it’s necessary (docs don’t say so). Thanks to anyone who can advise! UPDATE: I found that I needed to install ionic-native as advised here: and then import using import {Camera} from 'ionic-native'; for Camera.getPicture to be recognised by the intellisense. Unfortunately now the Camera properties defined in my options such as DestinationType are not being recognised by the intellisense (I’ve inverted my problem!). I’ll update again if I get that sorted. Argh, can’t wait for some thorough documentation! UPDATE 2: In node_modules -> ionic-native -> dist -> plugins -> camera.d.ts it shows that the properties destinationType, sourceType and encodingType are expecting numbers. Thus, as per the comments in that file, for my situation I needed to specify: let options = { quality: 100, destinationType: 0, sourceType: 1, allowEdit: false, encodingType: 0, targetWidth: 350, targetHeight: 350, correctOrientation: true, saveToPhotoAlbum: false } Dear all, by adding the typings of the cordova plugins the api is available as stated in the documentation of the plugin. e.g. the camera plugin is attached to the navigator object. So, without installing ionic-nativ (which is JUST a wrapper) in order to use the camera try: navigator.camera.getPicture(...) Hi @stefanhuber, You’re right, navigator.camera.getPicture(...) would be sufficient for now. My options look something like this though just to avoid the typescript warning: let options = { quality: 100, destinationType: navigator.camera.DestinationType.FILE_URI, sourceType: navigator.camera.PictureSourceType.CAMERA, allowEdit: true, encodingType: navigator.camera.EncodingType.JPEG, targetWidth: 100, targetHeight: 100, saveToPhotoAlbum: false, correctOrientation:true }; I got the ionic native plugin to work with the following steps. • install plugin with => ionic plugin add cordova-plugin-camera • install ionic-native if not present already (node-module) => npm install ionic-native while in the root of your app. • import {Camera} from 'ionic-native'; in your .ts file • Use following code to open camera (on emulator/device, cordova is not available with ionic serve) var options = { destinationType: 1, sourceType: 1, encodingType: 0, quality:100, allowEdit: false, saveToPhotoAlbum: true, correctOrientation: true, targetWidth:1000, targetHeight: 800 }; Camera.getPicture(options).then((imgPath) => { return imgPath; }, (err) => { if(err.error == "cordova_not_available") { return "my-fake-path"; } else { alert("Failed to open camera: " + err.error); } }); Need some help. I am trying to use network interface plugin https://github.com/salbahra/cordova-plugin-networkinterface While using the plugin function networkinterface.getipaddress I get an error [ts] Cannot find name 'networkinterface' any If i try using typings install cordova/plugins/networkinterface --ambient --save. I get an error that it can’t find the plugin. Although If I run my app I get the desired result but if I use any global variable/ function inside this networkinterface.getIPAddress(function (ip) { alert(ip); this.testip(ip); }); I get an error TypeError: Cannot read property 'testip' of null (testip being a function) How to solve this? I was to use the id address for some calculations and in some other function also. The syntax have changed in the meantime, for me this worked when installing plugin related definitions: typings install dt~cordova-plugin-statusbar --global
ESSENTIALAI-STEM
6 Sagittarii 6 Sagittarii is a massive, orange-hued star in the southern zodiac constellation of Sagittarius. With an apparent visual magnitude of 6.27, it is just below the nominal brightness limit for visibility with the typical naked eye under ideal viewing conditions. The distance can be estimated from the annual parallax shift of $1.763$ as roughly 2,600 light years away. It is moving closer to the Sun with a heliocentric radial velocity of −22 km/s. 6 Sagittarii has a peculiar velocity of $−22.0$, which may indicate it is a runaway star. This is an evolved giant star with a stellar classification of K2 III. It is only 25 million years old and has around ten times the mass of the Sun. The star is radiating about 6,817 times the Sun's luminosity from its photosphere at an effective temperature of 3,778 K. It appears to be a source of extended infrared excess, but this emission may be due to intervening cirrus.
WIKI
Hyung-Sik Byeon Kyung Hee University, Seoul, Seoul, South Korea Are you Hyung-Sik Byeon? Claim your profile Publications (2)6.46 Total impact • Source Article: Effects of Hyul-Bu-Chuke-Tang on Erythrocyte Deformability and Cerebrovascular CO(2) Reactivity in Normal Subjects. [show abstract] [hide abstract] ABSTRACT: Aim. Hyul-bu-chuke-tang (HCEt) is a well-known traditional herbal medicine that is used for the treatment of ischemic cerebrovascular disorders. We investigated the acute effects of HCEt on erythrocyte deformability and cerebrovascular CO(2) reactivity (CVR) in healthy male subjects. Materials and Methods. We examined erythrocyte deformability in an HCEt group (n = 14) and a control group (n = 10). CVR was measured using hyperventilation-induced CO(2) reactivity of the middle cerebral artery and transcranial Doppler (TCD) in the HCEt group (n = 11). A historical control group (n = 10) of CVR measurements was also created from our previous study. All measurements were performed prior to and 1, 2, and 3 hours after HCEt administration. Results. HCEt significantly improved erythrocyte deformability 1 hour after administration compared to the control group (2.9 ± 1.1% versus -0.6 ± 1.0%, P = 0.034). HCEt significantly improved the CVR 2 hours after administration compared to the historical control group (9.1 ± 4.0% versus -8.1 ± 4.1%, P = 0.007). The mean blood pressure and pulse rate did not vary from baseline values in either group. Conclusions. We demonstrated that HCEt improved erythrocyte deformability and CVR. Our findings suggest that an improvement in erythrocyte deformability contributes to HCEt's effect on cerebral microcirculation. Evidence-based Complementary and Alternative Medicine 01/2012; 2012:725241. · 4.77 Impact Factor • Article: Effects of GV20 acupuncture on cerebral blood flow velocity of middle cerebral artery and anterior cerebral artery territories, and CO2 reactivity during hypocapnia in normal subjects. [show abstract] [hide abstract] ABSTRACT: Acupuncture has been gaining popularity among practitioners of modern medicine as an alternative and complementary treatment. However, the mechanism of its therapeutic effect still remains uncertain. The present study chose the GV20 acupoint to evaluate acupoint effectiveness, hypothesizing that its stimulation induces cerebrovascular responses. The effects of GV20 acupuncture treatment on middle cerebral artery (MCA) and anterior cerebral artery (ACA) blood flow velocities, and CO(2) reactivity during hypocapnia were evaluated in 10 healthy male subjects (mean age 25.6 ± 0.8 years). Measurements were done at rest and during hypocapnia, and were repeated four times each at different cerebral artery territories with an interval of 1 week. MCA and ACA blood flow velocities were measured with a transcranial Doppler flowmeter. Blood flow velocity was corrected to 40 mm Hg of end-tidal CO(2) partial pressure (P(ETCO2)), and was expressed as CV40. CO(2) reactivity was measured as percent change in mean blood flow velocity/mm Hg P(ETCO2). Mean MCA and ACA blood flow velocities at rest, CV40, and CO(2) reactivity during hypocapnia increased significantly after GV20 acupuncture treatment, whereas mean arterial blood pressure and pulse rate at rest did not change significantly. The increases in MCA and ACA blood flow velocity were associated with improved CO(2) reactivity after GV20 acupuncture treatment. The data suggest that GV20 acupuncture treatment increases cerebral blood flow. The results of this small-scale study provide preliminary evidence for acupuncture effectiveness. Journal of alternative and complementary medicine (New York, N.Y.) 03/2011; 17(3):219-24. · 1.69 Impact Factor
ESSENTIALAI-STEM
Robert J. Frey Dr. Robert J. Frey is a former Managing Director of Renaissance Technologies Corp (1992–2004) and presently serves as a Research Professor on the faculty of Stony Brook University where he is the Founder and Director of the Program in Quantitative Finance within the Department of Applied Mathematics and Statistics. Frey obtained his Ph.D. in Applied Mathematics and Statistics from Stony Brook University in 1986. He is the Founder, and Chief Executive Officer of global fund of hedge funds group FQS Capital Partners.
WIKI
Page:An Exposition of the Old and New Testament (1828) vol 5.djvu/22 16 The message was sent to Joseph by an angel of the Lord; probably, the same angel that brought to Mary the tidings of the conception—the angel Gabriel. Now the intercourse with heaven, by angels, with which the patriarchs had been dignified, but which had been long disused, begins to be revived; for when the First-Begotten is to be brought into the world, the angels are ordered to attend his motions. How far God may now, in an invisible way, make use of the ministration of angels, for extricating his people out of their straits, we cannot say; but this we are sure of, they are all ministering spirits for their good. This angel appeared to Joseph in a dream, when he was asleep, as God sometimes spake unto the fathers. When we are most quiet and composed, we are in the best frame to receive the notices of the divine will. The Spirit moves on the calm waters. This dream, no doubt, carried its own evidence along with it, that it was of God, and not the production of a vain fancy. Now, 1. Joseph is here directed to proceed in his intended marriage. The angel calls him, Joseph, thou son of David: he puts him in mind of his relation to David, that he might be prepared to receive this surprising intelligence of his relation to the Messiah, who, every one knew, was to be a descendant from David. Sometimes, when great honours devolve upon those who have small estates, they care not for accepting them, but are willing to drop them; it was therefore requisite to put this poor carpenter in mind of his high birth; "Value thyself. Joseph, thou art that son of David, through whom the line of the Messiah is to be drawn." We may thus say to every true believer; "Fear not, thou son of Abraham, thou child of God; forget not the dignity of thy birth, thy new birth." Fear not to take Mary for thy wife; so it may be read. Joseph, suspecting she was with child by whoredom, was afraid of taking her, lest he should bring upon himself either guilt or reproach. No, saith God, Fear not; the matter is not so. Perhaps Mary had told him that she was with child by the Holy Ghost, and he might have heard what Elisabeth said to her, (Luke 1. 42.) when she called her the mother of her Lord; and if so, he was afraid of presumption in marrying one so much above him. But from whatever cause his fears arose, they were all silenced with this word, Fear not to take unto thee Mary thy wife. Note, It is a great mercy to be delivered from our fears, and to have our doubts resolved, so as to proceed in our affairs with satisfaction. 2. He is here informed concerning that Holy Thing, with which his espoused wife was now pregnant That which is conceived in her, is of divine original. He is so far from being in danger of sharing in an impurity by marrying her, that he will thereby share in the highest dignity he is capable of. Two things he is told, (1.) That she had conceived by the power of the Holy Ghost; not by the power of nature. The Holy Spirit, who produced the world, now produced the Saviour of the world, and prepared him a body, as was promised him, when he said, Lo, I come, Heb. 10. 5. Hence he is said to be made of a woman, (Gal. 4. 4.) and yet to be that second Adam, that is, the Lord from heaven, 1 Cor. 15. 47. He is the Son of God, and yet so far partakes of the substance of his mother, as to be called the Fruit of her womb, Luke 1. 42. It was requisite that his conception should be otherwise than by ordinary generation, that so, though he partook of the human nature, yet he might escape the corruption and pollution of it, and not be conceived and shapen in iniquity. History tells us of some who vainly pretended to have conceived by a divine power, as the mother of Alexander; but none ever really did so, except the mother of our Lord. His name in this, as in other things, is, Wonderful. We do not read that the Virgin Mary did herself proclaim the honour done her; but she hid it in her heart, and therefore God sent an angel to attest it. Those who seek not their own glory shall have the honour that comes from God; it is reserved for the humble. (2.) That she should bring forth the Saviour of the world; (v. 21.) She shall bring forth a Son; what he shall be, is intimated, [1.] In the name that should be given to her Son; Thou shalt call his name Jesus, a Saviour. Jesus is the same name with Joshua, the termination only being changed, for the sake of conforming it to the Greek. Joshua is called Jesus, (Acts 7. 45. Heb. 4. 8.) from the Seventy. There were two of that name under the Old Testament, who were both illustrious types of Christ; Joshua, who was Israel's Captain at their first settlement in Canaan; and Joshua, who was their High-Priest at their second settlement after the captivity, Zech. 6. 11, 12. Christ is our Joshua; both the Captain of our salvation, and the High-Priest of our profession, and, in both, our Saviour;—a Joshua who comes in the stead of Moses, and does that for us, which the law could not do, in that it was weak. Joshua had been called Hoshea, but Moses prefixed the first syllable of the name Jehovah, and so made it Jehoshua, (Numb. 13. 16.) to intimate that the Messiah, who was to bear that name, should be Jehovah; he is therefore able to save to the uttermost, neither is there salvation in any other. [2.] In the reason of that name; For he shall save his people from their sins; not the nation of the Jews only, (he came to his own, and they received him not,) but all who were given him by the Father's choice, and all who have given themselves to him by their own. He is a King who protects his subjects, and, as the Judges of Israel of old, works salvation for them. Note, Those whom Christ saves, he saves from their sins; from the guilt of sin by the merit of his death, from the dominion of sin by the Spirit of his grace. In saving them from sin, he saves them from wrath and the curse, and all misery here and hereafter. Christ came to save his people, not in their sins, but from their sins; to purchase for them, not a liberty to sin, but a liberty from sins, to redeem them from all iniquity; (Tit. 2. 14.) and so to redeem them from among men, (Rev. 14. 4.) to himself, who is separate from sinners. So that those who leave their sins, and give up themselves to Christ as his people, are interested in the Saviour, and the great salvation which he has wrought out, Rom. 11. 26. V. The fulfilling of the scripture, in all this. This evangelist, writing among the Jews, more frequently observes this than any other of the evangelists. Here, the Old-Testament prophecies had their accomplishment in our Lord Jesus; by which it appears, that this was He that should come, and we are to look for no other; for this was He to whom all the prophets bear witness. Now the scripture that was fulfilled in the birth of Christ, was that promise of a sign which God gave to king Ahaz, (Isa. 7. 14.) Behold, a virgin shall conceive; where the prophet, encouraging the people of God to hope for the promised deliverance from Sennacherib's invasion, directs them to look forward to the Messiah, who was to come of the people of the Jews, and the house of David; whence it was easy to infer, that though that people and that house were afflicted, yet neither the one nor the other could be abandoned to ruin, so long as God had such an honour, such a blessing, in reserve for them. The deliverances which God wrought for the Old-Testament church, were types and figures of the great salvation by Christ; and if God will do the greater, he will not fail to do the less.
WIKI
Sleepio Sleepio is a digital sleep-improvement program featuring cognitive behavioural therapy (CBT) techniques developed by sleep scientist Colin Espie and ex-insomnia sufferer Peter Hames. Sleepio was tested in a randomized placebo-group clinical trial in 2012. In a commentary on this research published by The Lancet, Sleepio was described as "a proven intervention for sleep disorders using the internet". The journal Nature described Sleepio as "about as effective as CBT delivered in person". History Sleepio is the first program from Big Health, the behavioural medicine company co-founded by Professor Colin Espie and Peter Hames. In March 2013 Sleepio was one of the launch apps in the Apps Library of the UK National Health Service (NHS). Sleepio was one of ten partners worldwide to launch on Jawbone's UP self-tracking platform in April 2013, allowing import of sleep data collected by the UP activity tracker into Sleepio. Integrated support is also available to users of the BodyMedia FIT band. Sleepio was available free of charge via the NHS to people over 18 living in the English counties of Oxfordshire, Berkshire and Buckinghamshire. How it works The Sleepio program is delivered via the web and via mobile devices. A virtual sleep expert, The Prof, guides the user through six interactive weekly sessions. The results of the cognitive behavioural therapy group showed Sleepio to be comparable in effectiveness to face-to-face CBT. A 2020 study involving over 7,000 NHS patients found that a six-week Sleepio treatment was effective, with a success rate of 56% compared to a target success rate of 50%, and a gain of nearly six hours of sleep per week. Awards In March 2013, Sleepio was a finalist in the Digital Innovation category at the NHS Innovation EXPO. In November 2013, Sleepio was the winning "Healthcare IT Product Innovation" as selected by a UK healthcare industry website, E-Health Insider. The start-up was also a semi-finalist in the BIG Awards organised by Cisco Systems, Inc. in 2013. In April 2014, Sleepio won the Bupa Startup competition at Wired Health. In June 2014, the company behind the Sleepio program, Big Health, was chosen as the Best Health Startup at The Europas Awards, the annual event honoring the best tech startups in Europe.
WIKI
Andrew Whittaker Andrew Whittaker may refer to: * Jack Whittaker (lottery winner) (Andrew Jackson Whittaker, Jr., born 1947), won a 2002 lottery jackpot * Andrew Whittaker (engineer) (born 1956), American structural engineer
WIKI
2 Top Stocks You Can Buy on Sale It's been a pretty up-and-down period for investors lately, but even with concerns about the surge of the delta variant worldwide, global spikes in inflation, and whispers of another crash, the market has still managed to continue hitting fresh record highs. While some stocks have fallen from the peaks they realized in the earlier days of the pandemic, investors are getting used to shares of their favorite companies trading at nosebleed valuations. But even in today's particularly expensive market, there are still bargains to be found. Today, we're going to look at two top stocks that have seen shares retreat in recent months, but which still present fantastic opportunities for long-term investors searching for catalysts for ongoing portfolio growth. Let's dive right in. Image source: Getty Images. 1. Teladoc Teladoc (NYSE: TDOC) is one of my favorite healthcare companies for long-term investors, and it's one I write about often. The company controls a massive market share of the fast-growing field of telemedicine and is by far the most established player in this booming industry. The company had a substantial track record of consecutive years of solid revenue growth pre-pandemic, and it has extended its streak with the spike in demand for telehealth solutions during the pandemic. Given Teladoc's dominant position in the telemedicine industry and the burgeoning need for quality virtual services across the healthcare specrum, the company poses a durable investment opportunity with plenty of growth potential left. Some investors have shied away from Teladoc in recent months as global economies have reopened, and its shares are trading down about 30% from January levels. However, one could argue that the stock has retreated to a far more reasonable valuation compared to its pandemic high, particularly given the fact that its price-to-sales ratio is about 14. And Teladoc continues to deliver exceptional revenue and business growth quarter after quarter. In its most recent quarter, its paid memberships in the U.S. alone surpassed the 52 million mark, while total visits on its platform were 28% higher than in the year-ago period. Teladoc's second-quarter revenue also popped year over year by a robust 109%. Revenue during the first six months of 2021 marked a 127% uptick from the same period in 2020, a sign that its ability to deliver strong growth numbers isn't limited to the hyped-up demand of the pandemic era. Shares of Teladoc may not be in for an explosive hike anytime soon. But as the world continues to become increasingly virtual and the company deepens its foothold within the high-growth digital healthcare industry, the stock is also likely to see some impressive gains in the coming years. Even with a share-price retraction in recent months, Teladoc is still trading up by more than 700% from just five years ago. Investors searching for a bargain stock that could fuel long-term, sustainable returns should take a second look at Teladoc. 2. Pinterest Social media stock Pinterest (NYSE: PINS) is another popular pandemic play that has seen shares decline in recent months. The stock is down approximately 20% year to date, trading at about $50 per share. In the second quarter, the company's global average revenue per user surged 89% compared to the year-ago quarter, while its overall revenue increased by a whopping 125% year over year. Meanwhile, its global monthly active users jumped 9% from the year-ago period. The company also has a cash-rich balance sheet, with cash and cash equivalents of about $1 billion compared to just $237.4 million in total current liabilities as of the end of the second quarter. Pinterest has a unique appeal that sets it apart from the average social media stock. Its user-friendly image search and sharing functionalities have made it a popular choice with consumers around the world looking for everything from fashion inspiration to recipe ideas. At the same time, Pinterest is increasingly becoming a key advertising tool for brands of all sizes, from household names to small boutiques. This can help it capitalize on the growth of another booming industry -- the world of e-commerce. As always, share price alone is never an indicator of a good or a bad stock. While fickle investor sentiment has brought down Pinterest stock in the short term, its long-term growth trajectory is likely to translate to notable future gains for buy-and-hold investors. It's also worth noting that Pinterest is still trading more than 60% higher than just one year ago. Long-term investors who buy the stock now and hold it for years can benefit from its considerable runway for growth. 10 stocks we like better than Teladoc Health When our award-winning analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* They just revealed what they believe are the ten best stocks for investors to buy right now... and Teladoc Health wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of August 9, 2021 Rachel Warren has no position in any of the stocks mentioned. The Motley Fool owns shares of and recommends Pinterest and Teladoc Health. The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
National Pub of the Year The National Pub of the Year is an annual competition held by CAMRA, the winner of which is announced in the February of the year following that in which the competition is run, that finds the best pub in the UK. Established in 1988, the competition helps to highlight quality pubs around the UK that are worth seeking out and visiting. Each year, each local CAMRA branch nominates one pub in their area to be entered. These 200 pubs then go through to the regional competition, which then whittles down to 4 pubs to go to the national final. The pubs in the national final are evaluated on: * Quality of the Real Ales served * Value for money * Atmosphere * Interior decoration * Customer service and welcome Winners * 2023: The Tamworth Tap, Tamworth, Staffordshire (second win) * 2022: The Tamworth Tap, Tamworth, Staffordshire * 2021: Competition cancelled due to COVID-19 pandemic * 2020: Competition cancelled due to COVID-19 pandemic * 2019: The Bell Inn, Aldworth, Berkshire (second win) * 2018: Wonston Arms, Wonston, Hampshire * 2017: Cricketers Arms, St Helens, Merseyside * 2016: George & Dragon, Hudswell, North Yorkshire * 2015: Sandford Park Alehouse, Cheltenham, Gloucestershire * 2014: The Salutation Inn, Ham, Gloucestershire * 2013: The Swan with Two Necks, Pendleton, Lancashire * 2012: The Baum, Rochdale, Greater Manchester * 2011: The Bridge End Inn, Ruabon, Wrexham * 2010: The Harp, Charing Cross, London * 2009: The Kelham Island Tavern, Sheffield, South Yorkshire (second win) * 2008: The Kelham Island Tavern, Sheffield, South Yorkshire * 2007: Old Spot Inn, Hill Road, Dursley, Gloucestershire * 2006: Tom Cobley Tavern, Spreyton, Devon * 2005: The Swan, Little Totham, Essex (second win) * 2004: The Fat Cat, Norwich, Norfolk (second win) * 2003: The Crown & Thistle, Gravesend, Kent * 2002: The Swan, Little Totham, Essex * 2001: The Nursery Inn, Heaton Norris, Greater Manchester * 2000: Blisland Inn, Blisland, Cornwall * 1999: The Rising Sun, Tipton, West Midlands * 1998: The Fat Cat, Norwich, Norfolk * 1997: The Sair Inn, Linthwaite, Huddersfield, West Yorkshire * 1996: Halfway House, Pitney, Somerset * 1995: Coalbrookdale Inn, Coalbrookdale, Shropshire * 1994: Beamish Mary Inn, No Place, between Stanley and Beamish, Co Durham * 1993: Three Kings, Hanley Castle, Worcestershire & The Fishermans Tavern, Broughty Ferry, Angus * 1992: (No Result) * 1991: Great Western, Wolverhampton, West Midlands * 1990: The Bell Inn, Aldworth, Berkshire * 1989: Cap & Feathers, Tillingham, Essex * 1988: The Boars Head, Kinmuck, Aberdeenshire Regional winners ===2022 === 2017 ===2011 === ===2010 === 2007 ===2005 === Runners-up * 2010: * Taps, Lytham St Annes, Lancashire * Beacon Hotel, Sedgley, West Midlands * Salutation, Ham, near Berkeley, Gloucestershire * 2009: * Royal Oak Inn, Wantage, Oxon * Crown Hotel, Worthington, Greater Manchester * Royal Oak, Friday Street, West Sussex * 2008: * The Crown, Stockport, Greater Manchester * Tom Cobley Tavern, Spreyton, Devon * Royal Oak, Rusper, West Sussex * 2007: * Turks Head, St Helens, Merseyside * Land of Liberty, Peace and Plenty, Heronsgate, Hertfordshire * Blue Peter Hotel, Kirkcolm, Dumfries & Galloway * 2006: * Failford Inn, Failford, Ayrshire * West Riding Refreshment Rooms, Dewsbury railway station, Dewsbury, West Yorkshire * Dove Street Inn, Ipswich, East Anglia * 2005: * The Check Inn, North Wroughton, Wiltshire * Old Coach House, Southwell, East Midlands * Robin Hood, Jarrow, Tyne & Wear * 2004: * Arden Arms, Stockport, Greater Manchester * New Inn, Halse, Somerset * Olde Swan, Netherton, West Midlands * 1998: * Brewery Arms, Keighley * Number 22, Darlington * Plough and Harrow, Monknash, Glamorgan * 1997: * Blacksmith's Arms, Calbourne, Isle of Wight * Railway, Yorton, Shropshire * Pot Kiln, Frilsham, Berkshire * Boat Inn, Ashleworth, Gloucestershire
WIKI
Talk:Five dead in attack in Pakistan * I'm unprotecting under the assumption that people can behave civilly now. Amgine, or whomever, feel free to reprotect if you see the edit war start back up. Actually, the conversation in this talk page seems better than in the usual fights, as far as I can tell. Nyarlathotep 21:31, 3 March 2006 (UTC) editprotected Category:Sindh and Category:Karachi need to be added. Ali Rana (talk) 05:57, 6 August 2009 (UTC) * ✅ &mdash; Gopher65talk 01:13, 8 August 2009 (UTC) Unpublishable in this condition Contradictions between the article and it's own sources prevent this article from being publishable; Contradiction #1; Day of Bush visit; Article; "The explosions come just a day before United States President George W. Bush is scheduled to visit the nation" Source; "The explosions happened the day President George W. Bush is scheduled to arrive here." * Addressed --Brian McNeil / talk 21:20, 2 March 2006 (UTC) Contradiction #2. Moroccan girl article; "over fifty more were injured, including a young Moroccan girl." source; "Moroccan national girl is missing, sources said." * article: "Some 52 people were injured, including a young Moroccan girl who was hit by debris" - inaccurate claim. --Brian McNeil / talk 21:21, 2 March 2006 (UTC) Contradictions 3; number of bombs; Article; "Two explosions near a US consulate in Karachi, Pakistan killed five" Source;"Police initially said two car bombs had gone off, but provincial police chief Jahangir Mirza said that a single bomb may have triggered a second smaller explosion in a burning car." * Addressed --Brian McNeil / talk 21:24, 2 March 2006 (UTC) Contradiction #4; number of deaths Article; "Two explosions near a US consulate in Karachi, Pakistan killed five" Source; "killing about two people on spot and wounding over 40, a senior police official, Manzoor Mughal, told KUNA by telephone. * Assertion backed by second source. Title is "Two car explosions near US Consulate in South Pakistan kill over 5, wound 40". --Brian McNeil / talk 21:25, 2 March 2006 (UTC) Finally, Bush statement adds nothing but propaganda to the article; especially since no terrorist group has been identified. Perhaps it was just someone who was crazy or who had relatives killed by a US bomb somewhere; there is no proof at all that terrorists did this. Neutralizer 18:12, 2 March 2006 (UTC) * Your actions aren't actionable, because you chose to make this argument on your own ignorance. * It is the day before, because Bush will be arriving quite late, and will not have time to visit. Note, that's visit, not arrive. * Forbes/AP: "Some 52 people were injured, including a young Moroccan girl who was hit by debris, said provincial government spokesman Salahuddin Haider." KUNA's article was published before the AP. * And here's where you screwed up. That was after the car bomb, note - only the first was denoted as a CAR BOMB. Forbes/AP: "Police initially said two car bombs had gone off, but provincial police chief Jahangir Mirza said that a single bomb may have triggered a second smaller explosion in a burning car." * So what? It's attributed to him, and the statements are relevent, especially since they were the first lines of the transcript after a reporter asked him about the events in Pakistan. Check the White House source. * There are no actionable objections here - absoluely none. You searched for a needle in a haystack, only to find out your needle was a pin. --MrMiscellanious (talk) – 18:27, 2 March 2006 (UTC) * Association with Bush. First source: "Two car explosions near US Consulate in South Pakistan kill over 5, wound 40," ... "Officials said the bombing could be timed for Bush's visit to Pakistan." --Brian McNeil / talk 21:28, 2 March 2006 (UTC) NPOV and a prime example of anglo/american centric point of view This article was rushed through publishing and into lead..with absolutely no collaborative work...why ??? Another car bomb somewhere in the world???? 1. There is no proof or even evidence that the bombing was done by "terrorists"; it might( or even likely) have even been done by US. ops or the CIA for their geopolitical purposes (no dead body of the "suicide" bomber has been found and, suspiciously, the AP report even says; "His body was not recovered".)...1 theory is as good as any other and if somebody really wanted to threaten Bush...why not wait til he actually arrived? 2. It is conspiracy theory pushing to suggest that the attack was connected to the Bush visit. There is no evidence whatsoever that the attack was connected to the Bush visit; so there should not be any of his propaganda quotes included in an article about an event that has not been shown to have anything at all to do with the USA. This did not happen in the USA; it happened in Pakistan so if you want a quote; please report one from a government leader of Pakistan. 3. The title says "near US consulate"..maybe it was near the Iranian consulate too...we don't publish tabloid type innuendo here. Please deal with these issues before publishing and putting up in lead place again. Neutralizer 21:00, 2 March 2006 (UTC) * You are getting really tiring. You are making your actions on the other members of the press, not this article specifically. You are inserting your problems with the other articles without reading this article, and substituting this article for MSM. That's a huge problem, and you need to realize it. --MrMiscellanious (talk) – 21:57, 2 March 2006 (UTC) * So when policys dont fit here? International 22:18, 2 March 2006 (UTC) Title still problematic Thanks ; its much better now; but I think we all realize saying "near US consulate" is an unnecessary innuendo. I will remove that reference. Neutralizer 21:38, 2 March 2006 (UTC) * It was less than 20 meters away. IT'S A SAFE ASSUMPTION. --MrMiscellanious (talk) – 21:58, 2 March 2006 (UTC) * I would agree to rename if "According to Pakistani officials" is added. Pakistani officials can make innuendos, wikinewsians can't. --MateoP 22:05, 2 March 2006 (UTC) * Good idea because we don't make assumptions here; we report events as they are...Since it was actually the Mariott attacked; perhaps we should just say that? Neutralizer 22:11, 2 March 2006 (UTC) * Oh, dear lord - you're contradicting your own comments again. Wake up; don't you see anything remotely wrong with what you just stated and your first statement? --MrMiscellanious (talk) – 22:12, 2 March 2006 (UTC) * Mateo; I trust your judgement on the title; I have already changed it once. Neutralizer 22:14, 2 March 2006 (UTC) Bush quote I reverted the edit removing the Bush quote because this is a direct response to the attacks the article is about, thus making it a relevant item for inclusion. --Brian McNeil / talk 22:27, 2 March 2006 (UTC) "During a press conference in New Delhi, India, President Bush stated he would still travel to Pakistan despite the explosions." International 22:32, 2 March 2006 (UTC) * sugestion, put this last in the article: Protected: Parties make discussion to reach compromise text. I want the parties to this site disruption to COMMUNICATE on this talk page and reach compromise regarding possible issues with this article. DO NOT further edit this article until consensus is reached on this page. - Amgine | talk en.WN 22:27, 2 March 2006 (UTC) * I'm not particularly happy about this because there were detailed points given above and I addressed them. As soon as I'd done that and put the article back up as lead there were efforts to add in "fluff" that was to the detriment of the article and made it unclear. I have been left with a feeling that despite trying to address the concerns of those who claim this article represented the POV of the current US administration they have continually moved the goalposts as to what is acceptable. I feel I have gone out of my way to justify myself on items I have removed, and items I have added. However, there always seemed to be some need to underplay the damage/death toll or twist it into something blaming the US administration for the attack. If you raise a list of points criticising an article and they're all addressed, then is it any wonder you're thought of as interfering or disrupting if you suddenly find another lot of even more trivial reasons to colour the article with your personal perspective? I'm sorry I lost my temper in one of my edit summaries, but this was getting ridiculous. Incidentally, this isn't on my watchlist so this may be my final comment on this page. --Brian McNeil / talk 22:47, 2 March 2006 (UTC) * I appreciate the work Brian did; I just wanted to clarify that the temper loss Brian refers to happened on an edit where Brian (perhaps mistakenly) removed the President's quote, so that led me to think Brian was ok with leaving that quote out. Neutralizer 00:31, 3 March 2006 (UTC) compromise text suggestion "During a press conference in New Delhi, India, President Bush stated he would still travel to Pakistan despite the explosions." In the end of article. remove: "During a press conference in New Delhi, India, President Bush stated he would still travel to Pakistan despite the explosions, saying that: "Terrorists and killers are not going to prevent me from going to Pakistan. My trip to Pakistan is an important trip. It's important to talk with President Musharraf about continuing our fight against terrorists." Bush also expressed his condolences to the individuals lost in the attack during the conference." Clean and no spinn. International 23:09, 2 March 2006 (UTC) * It's a quote, not a spin... I do not see an issue with it. --MrMiscellanious (talk) – 23:11, 2 March 2006 (UTC) * This is a compromise suggestion. If you take a stand for your point there will be no solution I guess. I take story of main lead as disputed. International 23:22, 2 March 2006 (UTC) * What? It provides context to the article of Bush's statements, provided in full, not paraphrased. HOW can that possibly be spin? Please DON'T avoid questions if you bring them up. --MrMiscellanious (talk) – 23:24, 2 March 2006 (UTC) * My suggestion dont include Bush statement just the facts, very NPOV. His statment is spinn for media and in this case it is not necessary for the article.International 23:38, 2 March 2006 (UTC) * You're not making any sense. Here is a quote, taken from an official transcript, from a response of the attacks. This is the most absolute NPOV we can get, attributing quotes back to their origination. Paraphrasing takes away from the neutrality. --MrMiscellanious (talk) – 23:51, 2 March 2006 (UTC) * Look at edithistory. This is a dispute. You want the text, other dont. This is a compromise suggestion. Currently the article is published and protected. Maybe it should be put in develop if no solution surface. International 00:00, 3 March 2006 (UTC) * 1; I'm comfortable with International's suggestion; even though I don't think Bush has anything at all to do with this story and prefer to see his name left out altogether. Neutralizer 00:37, 3 March 2006 (UTC) * 2; The actual explosion was in the Marriott hotel parking lot; that is what the article should say. Neutralizer 00:44, 3 March 2006 (UTC) Why do I even bother? This isn't a discussion. A discussion would actually appear as if users would look at other's comments. I do not see this on this talk page. --MrMiscellanious (talk) – 00:46, 3 March 2006 (UTC) * 3; Finally, either the word "suicide" should be removed or a reference to the fact that; "His body was not recovered"-AP should be included; it is misleading to say "suicide" when no body has been found for that person; he could have jumped out before impact. Neutralizer 00:50, 3 March 2006 (UTC) MrM; I have read your comments; which of them do you feel is being ignored? Neutralizer 00:52, 3 March 2006 (UTC) * Every single one of them, including the article at hand: * "The explosions come just prior to United States President George W. Bush's scheduled visit to the country." <- This + proximity to US consulate = relevent * "The explosions occurred at the parking lot of the Marriott Hotel in Karachi, about 60 feet (18 meters) from the consulate gate." * "According to police, a suicide bomber apparently hit the vehicle of a United States diplomat..." --MrMiscellanious (talk) – 01:46, 3 March 2006 (UTC) * Neutralizer...until you can prove that this was not a suicide attack, which I might add thats what every media outlet is saying about at least 1 explosion, then suicude stays. Find a source that says otherwise. Jason Safoutin 01:48, 3 March 2006 (UTC) * I get your point; especially MrM's about the reference to the Marriott; but I really don't see why we want to say "near the US consulate"..one source says a particular diplomat at the Hotel was the target. Re; suicide; don't we need a body to report a suicide? Why not mention no body has been found? Neutralizer 04:31, 3 March 2006 (UTC) Proposal re; President Bush's quote Why not replace the Bush quote with this quote by the President of the country where the explosion happened; "We condemn this outrage in the strongest terms," Pakistan's president, Gen. Pervez Musharraf, said in a message transmitted from Islamabad to New Delhi. "Our authorities are investigating the incident and those responsible will be brought to justice." The explosion has not been shown to have anything at all to do with the USA or President Bush + Bush wasn't even in the country at the time; so it's illogical to include the Bush POV. Neutralizer 13:34, 3 March 2006 (UTC) * This quote should be added, but I'm not sure bush's quote should go, not looked too closely at it myself. Nyarlathotep 21:32, 3 March 2006 (UTC) Non-Consensus Publishing Alert * The above is your point of view. The article is not currently protected. However, you have been warned to gain consensus before editing the published article. You have been unable, at this point, to gain that consensus from the community. This does not suggest the article is in error, but that the collaborative nature of writing here has resulted in the article expressing something with which you have a personal issue. - Amgine | talk en.WN 22:44, 3 March 2006 (UTC) * No, The above is your point of view and through your inappropriate article talk page warning above you are still protecting it. In addition, your comments are factually wrong in their entirety; the first dispute arose within 3 hours of the very first edit and there was never a consensus to publish Bush's POV with this article; in fact there were more editors who were opposed to inclusion of the Bush POV than favoured it. Then the article was protected for a day (including Bush's comments) until shortly after my comment above and you are still protecting it by preventing editing of it. This article has not been published by consensus and Bush's remarks should be replaced with those of the President of the country where this event happened; Pakistan. It is silly and wrong to say the inclusion of Bush's remarks is being done collaboratively as anyone can check the history to see that is not the case at all. The only reason Bush's comments are here and not the President of Pakistan's is because you and MrM. are constantly pushing the anglo/american centric point of view. Neutralizer 02:57, 4 March 2006 (UTC) * I do not wish to be rude, but a consistently anti-US stance is an anglo-American-centric point of view. I have not edited this article, but what I understand of the facts - a US diplomat was targeted by a suicide bomber a few metres from the US consulate - would suggest to me that the views of the US president would be relevant on the matter. I believe the comments of the host country's leader would likewise be relevant on the matter. I would certainly not remove the quotes repeatedly, claiming a consensus when on the talk page there was clearly no consensus. * Perhaps you should be reminded that a community consensus is when all members of the discussion have agreed to a compromise. Often this can be worked out through constructive conversations where positive suggestions are made, and editors achieve a compromise text. Where differences are intransigent you might gain agreement from all parties to ask an abiter to create a compromise text which will be accepted. In no way does consensus imply that one side of a dispute may delete en masse the text they are opposed to. - Amgine | talk en.WN 03:57, 4 March 2006 (UTC) * Your comments are again entirely factually wrong. You have stated often that you personally have an anti-US stance so perhaps you are talking to yourself. I have no stance in my edits other than NPOV. You make the assumption the diplomat was the target; the sources to not support your theory. The explosion was not a "few metres" from the consulate but about 70 feet away in a hotel parking lot. Your comment about "remove the quotes repeatedly" is grossly misleading. I removed the Bush quote once and then after Brian also removed it, I removed it again a second time for a total of 2. On the other hand MrM inserted the quote at least 3 times. The bottom line is that if the attack had happened in Washington some 70 feet from the Pakistan consulate, this article would not be quoting only the Pakistan leader and not the US leader and you certainly would not be warning editors not to include a quote from Bush. The anglo/american centric point of view is something you may not even notice you push for in our articles so I urge you to try to step back and be a bit more objective; and most importantly, don't make false statements about what others do, e.g."remove the quotes repeatedly" without checking the facts. Neutralizer 05:13, 4 March 2006 (UTC)
WIKI
Proclamation 5873 By the President of the United States of America A Proclamation On World Food Day, the United States joins 150 other nations in reaffirming our determination to end world hunger. We Americans are a generous people, and we are blessed with the liberty and the bountiful natural resources that make prosperity and opportunity possible. Through private and public efforts, we gladly share our abundance in the fight against hunger; we have done so more generously than all other countries combined. This year, we are sending about $1.4 billion in food commodities abroad to help the hungry. Some estimates suggest that one third of the people of the developing nations lack enough food to lead active working lives. That must change. Clearly, more needs to be done. Permanent progress in this regard will not be achieved, however, unless, along with remedial assistance, needy nations receive a transfusion of incentive- and market-based ideas. The tide of freedom and democracy now sweeping the globe offers the greatest long-term promise for success in the fight against hunger and economic stagnation. Finding a lasting solution to world hunger requires agricultural and trade policies with one irreplaceable ingredient: freedom. Freedom alone can build economic progress, cooperation, and stability for nations at every level of development. We need to move toward a time when government intervention no longer distorts individuals' production and trade decisions. We also need thriving international markets to which all farmers have broad access. That is something for all of us to remember this year especially, when World Food Day focuses on rural youth. These young people often migrate to the cities. We must develop policies that will encourage and enable them to remain in their agricultural and rural communities and improve their families' food productivity and income. Stabilization of developing countries' agricultural base accompanied by structural reforms to increase farmers' earnings are crucial steps in the drive to conquer hunger worldwide. This October 16 marks the eighth successive year in which people everywhere have observed World Food Day. It is a day on which all Americans can resolve once again to wage and win the battle against world hunger. In recognition of the desire and commitment of the American people to end world hunger, the Congress, by Senate Joint Resolution 336, has designated October 16, 1988, as "World Food Day" and authorized and requested the President to issue a proclamation in observance of that day. Now, Therefore, I, Ronald Reagan, President of the United States of America, do hereby proclaim October 16, 1988, as World Food Day. I call upon the people of the United States to observe this day with appropriate activities to find and implement ways in which our Nation can better combat world hunger. In Witness Whereof, I have hereunto set my hand this twenty-eighth day of September, in the year of our Lord nineteen hundred and eighty-eight, and of the Independence of the United States of America the two hundred and thirteenth. RONALD REAGAN [Filed with the Office of the Federal Register, 12:23 p.m., September 29, 1988]
WIKI
Crissi Mariam Robert Crissi Mariam Robert - 9 months ago 42 Javascript Question Issue in mapping arrays Issue in mapping : actions/index.js export function fetchUserIds(){ return function(dispatch){ axios.get(`${ROOT_URL}/userids`,{ headers:{ authorization: localStorage.getItem('token')} } ) .then( response => { console.log(response); console.log(response.data); dispatch({ type:FETCH_USERIDS, payload:response.data }); }) } } actions/types.js export const FETCH_USERIDS='fetch_userids'; reducers/auth_reducer.js import { AUTH_USER, UNAUTH_USER, AUTH_ERROR, FETCH_MESSAGE, FETCH_USERIDS } from '../actions/types'; export default function (state = {},action){ console.log(action); switch(action.type){ case AUTH_USER: return {...state, error:'',authenticated:true}; case UNAUTH_USER: return {...state,authenticated:false}; case AUTH_ERROR: return {...state,error:action.payload}; case FETCH_MESSAGE: return {...state,message:action.payload}; case FETCH_USERIDS: return {...state,userids:action.payload}; } return state; } reducers/index.js import { combineReducers } from 'redux'; import { reducer as form } from 'redux-form'; import authReducer from './auth_reducer'; const rootReducer = combineReducers({ form, //form:form auth:authReducer }); export default rootReducer; components/feature.js import React, { Component } from 'react'; import { connect } from 'react-redux'; import * as actions from '../actions'; import UserLists from './userlists'; class Feature extends Component { componentWillMount(){ console.log(this.props); this.props.fetchUserIds(); } render(){ console.log(this.props); console.log(this.props.users); return ( <div> {this.props.users.map((userids, index) => ( <p key={index}>Hello, {userids.userid} </p> ))} </div> ); } } function mapStateToProps(state){ console.log(state); console.log(state.auth.userids); return { users:state.auth.userids}; } export default connect(mapStateToProps,actions)(Feature); The following is the output displayed in javascript console: Object { type: "@@redux/INIT" } bundle.js:34560:5 Object { type: "@@redux/PROBE_UNKNOWN_ACTION_x.l.j.…" } bundle.js:34560:5 Object { type: "@@redux/INIT" } bundle.js:34560:5 Object { type: "auth_user" } bundle.js:34560:5 Object { form: Object, auth: Object } bundle.js:34385:6 undefined bundle.js:34386:6 Object { history: Object, location: Object, params: Object, route: Object, routeParams: Object, routes: Array[2], children: null, authenticated: true, dispatch: createThunkMiddleware/</</<(), users: undefined, 8 more… } bundle.js:34364:14 Object { history: Object, location: Object, params: Object, route: Object, routeParams: Object, routes: Array[2], children: null, authenticated: true, dispatch: createThunkMiddleware/</</<(), users: undefined, 8 more… } bundle.js:34370:14 undefined bundle.js:34371:14 Object { data: Array[5], status: 200, statusText: "OK", headers: Object, config: Object, request: XMLHttpRequest } bundle.js:32514:14 Array [ Object, Object, Object, Object, Object ] bundle.js:32515:14 Object { type: "fetch_userids", payload: Array[5] } bundle.js:34560:5 Object { form: Object, auth: Object } bundle.js:34385:6 Array [ Object, Object, Object, Object, Object ] bundle.js:34386:6 Object { history: Object, location: Object, params: Object, route: Object, routeParams: Object, routes: Array[2], children: null, authenticated: true, dispatch: createThunkMiddleware/</</<(), users: Array[5], 8 more… } bundle.js:34370:14 Array [ Object, Object, Object, Object, Object ] But while adding map function it shows the error.The console won't display the array objects.How can I map to display it in list?Please help me Answer Source this.props.users is undefined initially so you need to put a check before mapping {this.props.users && this.props.users.map((userids, index) => ( <p key={index}>Hello, {userids.userid}</p> ))} Recommended from our users: Dynamic Network Monitoring from WhatsUp Gold from IPSwitch. Free Download
ESSENTIALAI-STEM
Page:A Chinese Biographical Dictionary.djvu/410 Rh Parkes and his companions. In these trying circumstances the tact and resource of Prince Kung won the admiration of his opponents, but the occasion did not admit of any concessions. Prince Kung returned those prisoners who had survived their ill-treatment, for which some expiation was exacted in the destruction of the Summer Palace, and surrendered one of the gates of the capital. Residences in the city were assigned to Lord Elgin and his French colleague and the Hall of Ceremonies was appointed for the exchange of the ratified copies of the treaty. This act was accomplished on Oct. 24th, and a fortnight later the whole allied force was withdrawn from Peking, leaying Sir Frederick Bruce as the first British Minister at the Chinese Court to arrange with Prince Kung the conduct of diplomatic relations. A new department, called the Tsung-li Yamên, was formed, and opened its doors with the year 1861, under the presidency of Prince Kung. Some few months later Prince Kung was called upon to deal with a graye dynastic crisis caused by the death of his brother Hsien Fêng. Two of the Princes, together with the Minister 肅順 Su Shun, seized the Regency, to the exclusion of the Empress Dowager and Prince Kung; but as the Imperial funeral procession neared Peking, the conspirators were promptly arrested. Su Shun was executed, and the Princes were allowed to commit suicide. For his services in this matter Prince Kung was appointed President of the Imperial Clan Court and received the title of 議政. Not long afterwards he experienced his first rebuff at the hand of fortune. On the 2nd April 1865 an edict appeared stating that he was dismissed from his posts "for having overrated his own importance." Five weeks later he was re-instated in all his offices except that of President of the Council. He experienced a second rebuff in the year 1874, when his nephew, the Emperor, degraded him, nominally for "using language in very many respects unbecoming," but really
WIKI
Clean reference from old drive removed This site uses cookies. By continuing to browse this site, you are agreeing to our Cookie Policy. • Clean reference from old drive removed Looking forward to playing with openmediavault I used old HDD from a previous NAS. I removed these discs since I received my new discs. Today when I looked at hdparm configuration files I saw references from those old drives that are no longer present in my system. Is there a way to clean all this? for example I can see reference to old drive in hdparm.conf Source Code 1. quiet 2. /dev/disk/by-id/ata-SAMSUNG_HD204UI_S2H7J9KB700773 { 3. apm = 1 4. spindown_time = 242 5. write_cache = off 6. } 7. /dev/disk/by-id/ata-SAMSUNG_HD204UI_S2H7JD2B213172 { 8. apm = 1 9. spindown_time = 242 10. write_cache = off 11. } 12. /dev/disk/by-id/ata-SAMSUNG_HD204UI_S2H7J9KB700774 { 13. apm = 1 14. spindown_time = 242 15. write_cache = off 16. } 17. /dev/disk/by-id/ata-SAMSUNG_HD204UI_S2H7JD2B213181 { 18. apm = 1 19. spindown_time = 242 20. write_cache = off 21. } 22. /dev/disk/by-id/ata-WDC_WD100EMAZ-00WJTA0_xxxxxx { 23. apm = 127 24. spindown_time = 60 25. write_cache = on Display All You can see all old disk it's Samsung HD204UI_* I try to look in /dev/disk/by-id but I don't see old HD204UI Source Code 1. drwxr-xr-x 2 root root 460 mars 5 17:10 . 2. drwxr-xr-x 7 root root 140 mars 1 14:30 .. 3. lrwxrwxrwx 1 root root 9 mars 1 14:05 ata-MATSHITADVD-ROM_UJ890AC_YK00_035910 -> ../../sr0 4. lrwxrwxrwx 1 root root 9 mars 1 14:05 ata-SAMSUNG_SSD_PM851_2.5_7mm_128GB_S1CTNSAF928480 -> ../../sdd 5. lrwxrwxrwx 1 root root 10 mars 1 14:05 ata-SAMSUNG_SSD_PM851_2.5_7mm_128GB_S1CTNSAF928480-part1 -> ../../sdd1 6. lrwxrwxrwx 1 root root 10 mars 1 14:05 ata-SAMSUNG_SSD_PM851_2.5_7mm_128GB_S1CTNSAF928480-part2 -> ../../sdd2 7. lrwxrwxrwx 1 root root 10 mars 1 14:05 ata-SAMSUNG_SSD_PM851_2.5_7mm_128GB_S1CTNSAF928480-part5 -> ../../sdd5 8. lrwxrwxrwx 1 root root 9 mars 6 02:28 ata-WDC_WD100EMAZ-00WJTA0_xxxx -> ../../sda 9. lrwxrwxrwx 1 root root 10 mars 1 14:30 ata-WDC_WD100EMAZ-00WJTA0_xxxx-part1 -> ../../sda1 10. lrwxrwxrwx 1 root root 9 mars 6 02:28 ata-WDC_WD100EMAZ-00WJTA0_xxxxx -> ../../sdb 11. lrwxrwxrwx 1 root root 10 mars 1 14:45 ata-WDC_WD100EMAZ-00WJTA0_xxxxx-part1 -> ../../sdb1 12. lrwxrwxrwx 1 root root 9 mars 6 02:28 ata-WDC_WD80EZAZ-11TDBA0_xxxx -> ../../sdc 13. lrwxrwxrwx 1 root root 10 mars 1 14:56 ata-WDC_WD80EZAZ-11TDBA0_xxxx-part1 -> ../../sdc1 14. lrwxrwxrwx 1 root root 9 mars 6 02:28 wwn-0x5000cca257ee375e -> ../../sdc 15. lrwxrwxrwx 1 root root 10 mars 1 14:56 wwn-0x5000cca257ee375e-part1 -> ../../sdc1 16. lrwxrwxrwx 1 root root 9 mars 6 02:28 wwn-0x5000cca273cf24b1 -> ../../sda 17. lrwxrwxrwx 1 root root 10 mars 1 14:30 wwn-0x5000cca273cf24b1-part1 -> ../../sda1 18. lrwxrwxrwx 1 root root 9 mars 6 02:28 wwn-0x5000cca273d4ef2b -> ../../sdb 19. lrwxrwxrwx 1 root root 10 mars 1 14:45 wwn-0x5000cca273d4ef2b-part1 -> ../../sdb1 20. lrwxrwxrwx 1 root root 9 mars 1 14:05 wwn-0x5002538844584d30 -> ../../sdd 21. lrwxrwxrwx 1 root root 10 mars 1 14:05 wwn-0x5002538844584d30-part1 -> ../../sdd1 22. lrwxrwxrwx 1 root root 10 mars 1 14:05 wwn-0x5002538844584d30-part2 -> ../../sdd2 23. lrwxrwxrwx 1 root root 10 mars 1 14:05 wwn-0x5002538844584d30-part5 -> ../../sdd5 Display All If you can help ! I'm a newbie ! I try to clean hdparm.conf but the reference comeback when I change an option on the OMV smart gui The post was edited 3 times, last by Revers62 (). • Probably you have created shared folders on this drive which are used in some services (SMB/CIFS, FTP, ...). So first remove all of these shared folders from the services. Then delete the shared fold ers. Then you should be able to delete the file. Everything to be done in the GUI of OMV. Odroid HC2 - armbian - Seagate ST4000DM004 - OMV4.x Asrock Q1900DC-ITX - 16GB - 2x Seagate ST3000VN000 - Intenso SSD 120GB - OMV4.x :!: Backup - Solutions to common problems - OMV setup videos - OMV4 Documentation - user guide :!: • Sorry it's me ! This old disk come from my old old nas the one who run on ubuntu with mdadm without OMV. I just plug it on my new nas for test a HBA. I see in OMV ( my new NAS ) the disk, and I reemove it. This disk were very old and I will not use them in my new nas. But Why I can see some traces of these disks in the configuration files • a big thank you for trying! I will do : Source Code 1. grep -r ata-SAMSUNG_HD204UI_S2H7J9KB700773 * I will find all the files that contain information on these old disks :) result : etc/smartd.conf etc/openmediavault/config.xml etc/hdparm.conf I had to run a smart test on these old drives without remembering.... So smartd and OMV keeps information even if the disks are no longer present and if of course we do not unmount the discs properly like me ! The post was edited 3 times, last by Revers62 ().
ESSENTIALAI-STEM
Movement of Progressive Democrats The Movement of Progressive Democrats (Mouvement des Démocrates Progressistes, MDP) was a political party in Burkina Faso. History The MDP was established on 15 October 1987 by Hermann Yaméogo. It joined the Popular Front, but was suspended from the group in July 1990 following internal problems. In December 1990 Yaméogo broke away from the party to establish the Alliance for Democracy and Federation. The party won a single seat in the 1992 parliamentary elections. In 1996 it merged into the new Congress for Democracy and Progress.
WIKI
Page:United States Statutes at Large Volume 106 Part 3.djvu/337 PUBLIC LAW 102-416—OCT. 14, 1992 106 STAT. 2131 Public Law 102-416 102d Congress An Act To restore the Federal trust relationship of the United Auburn Indian Community, to establish the Advisory Council on California Indian Policy, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the "Advisory Council on California Indian Policy Act of 1992". SEC. 2. FINDINGS. The Congress has reviewed the social, economic, and political circumstances of California Indians and of governmental policies and programs affecting California Indians and finds that— (1) the Congress has recognized a special government-to- government relationship with Indian tribes in the United States; (2) due to the unique historical circumstances of the Indians of California, Federal law and policies have often dealt specifically with California Indians; (3) there is an urgent need to clarify the eligibility of unrecognized and terminated California Indian tribal groups to be federally acknowledged as Indian tribes with all the rights and powers attendant to that status; (4) there is among California Indians a continuing social and economic crisis, characterized by, among other things, alcohol and substance abuse, critical health problems, family violence and child abuse, lack of educational and employment opportunities, and significant barriers to tribal economic development; (5) these conditions exist even though public policies and programs adopted by the Federal Government have been intended to improve the conditions of California Indians; and (6) California Indian tribes and tribal organizations have expressed a need for a review of the public policies and programs affecting California Indians and to make such policies and programs more effective in accomplishing Federal policy objectives. SEC. 3. DEFINITIONS. For purposes of this Act— (1) The term "California Indian tribe" means any federally recognized or imacknowledged Indian tribe located in the State of California. (2) The term "Secretary** means the Secretary of the Interior. (3) The term "Bureau" means the Bureau of Indian Affairs of the Department of the Interior. Oct. 14, 1992 [H.R. 2144] Advisory Council on California Indian Policy Act of 1992. 25 USC 651 note. 25 USC 651 note. 25 USC 651 note. �
WIKI
[The Little Typer] 10 It also depends on the List Posted by roife on Mon, Mar 29, 2021 Sigma Type:Σ Σ 的定义 (Σ-type) If (cons a d) is a (Σ ((x A)) D) then a:A and d’s type is found by consistently replacing every x in D with a. 注解:Σ Type 相当于存在量词,即提供一个 a: A 的值代入 D 使得 D 成立,其类型为 \(\exist\ a:A, D[x:=a]\)。 它和 Π Type 的区别在于: • (Π ((Y U)) X) 中,Π 可以代入 Y 类型所有的值,并且 Π 类型描述的值就是 X,其中 XY 构建 • Σ 需要找到可以构建类型的特定值 a,并且 Σ 类型描述的值为 ad 组成的 Pair (cons a d): (Pair A D[x:=a]),其中不能将 D 独立于 a 作为命题 Σ 类型类似于一个 type constructor:在 Pair (cons a d): (Σ ((x A)) D) 中,x 是一个变量,值为 a: Ad 的类型为将类型 D 中出现的所有 x 替换为值 a 的结果。 例如 (cons 'bagel (same 'bagel)) 的类型可以是(即证明对应的命题为) (Σ ((bread Atom)) ; 注意 bread 是一个变量 (= Atom bread 'bagel)) (The Law of Σ) The expression (Σ ((x A)) D) is a type when A is a type, and D is a type if x is an A. 注解D is a family of types over A. (The Commandment of cons) If p is a (Σ ((x A)) D) then p is the same as (cons (car p) (cdr p)) 一个特殊的 Σ 表达式是 (Σ ((A U)) A),这个类型可以让一个 type 和其描述的值一起组成一个 Pair:如 (cons Nat 4)(cons Atom 'porridge) Pair 与 Σ 的联系 对于一个 Σ 表达式: (Σ ((x A)) D) 其中 D 中没有出现 x,那么这个类型即为 (Pair A D) 因此 (Pair A D)(Σ ((x A)) D) 的特殊形式。 这个关系类似于 Π 表达式和 → 表达式的关系。如果 Π 表达式的参数在 Π 表达式的主体中没有出现,那么就是一个 → 表达式。即 → 表达式是 Π 表达式的特殊形式。 Σ 与 Vec 用 Σ 表达式可以让列表长度和内容组成一个 Pair,例如 (cons 17 (peas 17)) 或者 (cons 2 (vec:: 'a (vec:: 'b vecnil))) Π 需要传入所依赖的值,而 Σ 的依赖有时候可以被计算出来(比如 List 的长度)。 Pair/Σ as statement (Pair A D) 的值为 (cons a d),即包含了 A 的 evidence aD 的 evidence d,所以可以看作是 “A and D”。 (Σ ((x A)) D) 可以如果把 D 里面的 x 全部换成类型为 Aa,那么 d 即为 D 的 evidence,可以看作 “There exists”。 例如: (Σ ((es (List Atom))) (= (List Atom) es (reverse Atom es))) ; There exists a list of atoms that is equal to itself reversed. ; Proof: ; (cons nil (same nil)) eliminator for Σ Σ 的 eliminator 还是 carcdr p (Σ ((x A)) D) 则: • (car p) : A • (cdr p) : D[x:=(car p)] 举个例子,若 p 为: (Σ ((l Nat)) (Vec Atom l)) 则: • (car p): Nat • (cdr p): (Vec Atom (car p)) list→vec Definition with non-specific type (claim listvec (Π ((E U)) ( (List E) (Σ ((l Nat)) (Vec E l))))) (define listvec (λ (E) (λ (es) (rec-List es (cons 0 vecnil) (step-listvec E))))) 考虑用 rec-List,首先定义 step 需要注意的是 Σ 表示 exists,所以定义返回类型的时候不需要用 (Σ ((l Nat)) (Vec E (add1 l))),因为只要传入 (add1 l),那么类型自然是 (Vec E (add1 l)) 一个声明和定义如下: (claim step-listvec (Π ((E U)) ( E (List E) (Σ ((l Nat)) (Vec E l))) (Σ ((l Nat)) (Vec E l)))) ; 注意返回值是 (Vec E (add1 l)) (define step-listvec (λ (E) (λ (e es listvec_es) (cons (add1 (car listvec_es)) (vec:: e (cdr listvec_es)))))) 然而这样是错误的,这会导致下面的定义也能被接受,然而实际上是不对的。这是因为 Σ 表达式隐藏了一个信息“长度”,导致类型是不精确的。 (define listvec (λ (E) (λ (es) (cons 0 vecnil)))) (Use a Specific Type for Correctness) Specific types can rule out foolish definitions. replicate • (replicate x n):将元素 x: E 复制 n (claim replicate (Π ((E U) (l Nat)) ( E (Vec E l)))) (claim mot-replicate ( U Nat U)) (define mot-replicate (λ (E k) (Vec E k))) (claim step-replicate (Π ((E U) (e E) (l-1 Nat)) ( (mot-replicate E l-1) (mot-replicate E (add1 l-1))))) (define step-replicate (λ (E e l-1) (λ (step-replicate_l-1) (vec:: e step-replicate_l-1)))) (define replicate (λ (E l) (λ (e) (ind-Nat l (mot-replicate E) vecnil (step-replicate E e))))) 利用 replicate 我们可以写出另一个错误的 list→vec (claim copy-52-times (Π ((E U)) ( E (List E) (Σ ((l Nat)) (Vec E l)) (Σ ((l Nat)) (Vec E l))))) (define copy-52-times (λ (E) (λ (e es copy-52-times_es) (cons 52 (replicate E 52 e))))) (define listvec (λ (E) (λ (es) (rec-List es (cons 0 vecnil) (copy-52-times E))))) ind-List 类似于 ind-Nat ind-List 需要一个 motive,其类型为: ( List U) ind-List 的类型为 (mot target)base 的类型为 (mot nil)step 的类型为 (Π ((e E) (es (List E))) ; 比 ind-Nat 多了一个参数 ( (mot es) (mot (:: e es)))) ees 分别代表头部元素和去掉头部元素后的列表。每次会对 es 进行递归。 (The Law of ind-List) If target is a (List E), mot is an (→ (List E) U), base is a (mot nil), and step is a (Π ((e E) (es (List E))) ( (mot es) (mot (:: e es)))) then (ind-List target mot base step) is a (mot target). (The First Commandment of ind-List) The ind-List-expression (ind-List nil mot base step) is the same (mot nil) as base. (The Second Commandment of ind-List) The ind-List-expression (ind-List (:: e es) mot base step) is the same (mot (:: e es)) as (step e es (ind-List es mot base step)). Better definition for list→vec 将长度纳入类型定义。 (claim listvec (Π ((E U) (es (List E))) (Vec E (length E es)))) (claim mot-listvec (Π ((E U)) ( (List E) U))) (define mot-listvec (λ (E es) (Vec E (length E es)))) (claim step-listvec (Π ((E U) (e E) (es (List E))) ( (mot-listvec E es) (mot-listvec E (:: e es))))) (define step-listvec (λ (E e es) (λ (step-listvec_es) (vec:: e step-listvec_es)))) ; (Vec E (add1 (length E es))) (define listvec (λ (E es) (ind-List es (mot-listvec E) vecnil (step-listvec E)))) 遗憾的是,这个定义依然有漏洞。如果更改 step 的定义,并且使用 replicate 重新定义,将其变成第一个元素的重复: (define step-listvec (λ (E e es) (λ (listvec_es) (replicate E (length E (:: e es)) e))))
ESSENTIALAI-STEM
Category:International Consortium of Investigative Journalists This category contains pages related to the International Consortium of Investigative Journalists.
WIKI
WordPress at a glance action is not described password_reset action-hook . WP 1.5.0 Fires before the user's password is reset. Usage add_action( 'password_reset', 'action_function_name_3045', 10, 2 ); function action_function_name_3045( $user, $new_pass ){ // action... } $user(object) The user. $new_pass(string) New user password. Changelog Since 1.5.0 Introduced. Where the hook is called reset_password() password_reset WC_Shortcode_My_Account::reset_password() password_reset wp-includes/user.php 2398 do_action( 'password_reset', $user, $new_pass ); woocommerce/includes/shortcodes/class-wc-shortcode-my-account.php 374 do_action( 'password_reset', $user, $new_pass ); Where the hook is used (in WP core) Usage not found!
ESSENTIALAI-STEM
Page:Dracula.djvu/369 Rh ask that the captain come to him. The captain come, when told that he will be pay well; and though he swear much at the first he agree to term. Then the thin man go and some one tell him where horse and cart can be hired. He go there and soon he come again, himself driving cart on which a great box; this he himself lift down, though it take several to put it on truck for the ship. He give much talk to captain as to how and where his box is to be place; but the captain like it not and swear at him in many tongues, and tell him that if he like he can come and see where it shall be. But he say 'no'; that he come not yet, for that he have much to do. Whereupon the captain tell him that he had better be quick—with blood—for that his ship will leave the place—of blood—before the turn of the tide—with blood. Then the thin man smile and say that of course he must go when he think fit; but he will be surprise if he go quite so soon. The captain swear again, polyglot, and the thin man make him bow, and thank him, and say that he will so far intrude on his kindness as to come aboard before the sailing. Final the captain, more red than ever, and in more tongues, tell him that he doesn't want no Frenchmen—with bloom upon them and also with blood—in his ship—with blood on her also. And so, after asking where there might be close at hand a ship where he might purchase ship forms, he departed. "No one knew where he went 'or bloomin' well cared,' as they said, for they had something else to think of—well with blood again; for it soon became apparent to all that the Czarina Catherine would not sail as was expected. A thin mist began to creep up from the river, and it grew, and grew; till soon a dense fog enveloped the ship and all around her. The captain swore polyglot—very polyglot—polyglot with bloom and blood; but he could do nothing. The water rose and rose; and he began to fear that he would lose the tide altogether. He was in no friendly mood, when just at full tide, the thin man came up the gangplank again and asked to see where his box had been stowed. Then the captain replied that he wished that he and his box—old and with much bloom and blood—were in hell. But the thin man did not be offended, and went down
WIKI
Leila Shahid Leila Shahid (born in Beirut in 1949) is a Palestinian diplomat. She was the first woman ambassador of Palestine, serving the PLO in Ireland in 1989, in The Netherlands in 1990, then serving the PA in France where she had taken office in Paris in 1993. From 2006 to 2014, she was the General Delegate of Palestine to the EU, Belgium and Luxembourg. She is the daughter of Munib Shahid and Serene Husseini Shahid and thus related to the Al-Husayni clan. Shahid's parents were from Acre and Jerusalem, but she grew up with her two sisters in exile in Lebanon. After studying anthropology and psychology at the American University of Beirut, Leila worked in the Palestinian refugee camps until 1974 when she began her doctorate in anthropology in Paris, where she met Jean Genet. In 1976 she was elected president of the Union of Palestinian students in France. In September 1982, Shahid and Jean Genet went to Beirut. They arrived during the Sabra and Shatila massacres. Genet's account was published in "La revue d'études palestiniennes", in an article entitled Quatre heures à Chatila (Four Hours at Chatila) -- Catherine Biscovitch's film "Dancing Among the Dead" was based on this article by Genet. While working as the Ambassador of Palestine to France, Shahid arranged for the safe storage of artefacts in that had been discovered during archaeological investigations in Gaza at sites such as Tell es-Sakan; they had been on display at the Institut du Monde Arabe for an exhibition on Gaza's history but could not be returned after the end of the exhibition due to the start of the Second Intifada. In 2004, she was with Palestinian leader Yasser Arafat during his final days. She was a longtime director of "La revue d'études palestiniennes" (The Review of Palestinian Studies), while serving as a board member right now. The Russell Tribunal on Palestine was established in response to a call by Leila Shahid and Ken Coates (Chairperson of the Bertrand Russell Peace Foundation), Nurit Peled (Israeli, Sakharov Prize for Freedom of Speech 2001). Though not a Baha'i, she is the great-great granddaughter of the Baha'i prophet Baha'u'llah through her father, who was a grandson of Abdu'l-Baha. Her father was excommunicated from the Baha'i Faith for opposition to Shoghi Effendi.
WIKI
User:Jasenlee/Fred Luddy Frederic (Fred) Luddy is the founder and current CPO of ServiceNow, a SaaS provider of IT Service Management software. He has worked in previous roles as the CTO for enterprise software firms at Peregrine Systems, later sold to HP, as well as Remedy now a product sold by BMC. Early Years Enterprise Software Associates Boole and Babbage Amdahl Corporation Peregrine Systems Fred was employed at Peregrine Systems from 1990 to 2003 where he held the position of Chief Technology Officer (note that during that time Peregrine also owned the Remedy Corporation which was subsequently sold to BMC). ServiceNow Fred, along with his brother Rob Luddy, founded ServiceNow in early 2004 where he first served as CEO and CTO before stepping down in 2011 after the company executed an IPO. Education Mr. Luddy attended both Indiana University and Sir George Williams University but dropped out of both universities to pursue his interests in programming and technology.
WIKI
MySQL Enterprise Backup 8.0 User's Guide  /  Appendixes  /  Backup Progress Table Update Appendix E Backup Progress Table Update The mysql.backup_progress table has been updated with the release of MySQL Enterprise Backup 8.0.19 in the following ways: • Changed the storage engine from CSV to InnoDB • Added a new auto-increment primary key column id • Added a composite index on the backup_id and current_timestamp columns When MySQL Enterprise Backup 8.0.19 or later tries to perform its first full backup on a database, it automatically checks the format of the mysql.backup_progress table. If it detects that the table is in the old format (which means the server has been upgraded from 8.0.18 or earlier and has been backed up by MySQL Enterprise Backup before), it attempts to perform a format update on the table automatically with the following steps: • Create in the new format a table named mysql.backup_progress_new and copy into it data from the original mysql.backup_progress table. • Rename the original mysql.backup_progress table to mysql.backup_progress_old, and the mysql.backup_progress_new table to mysql.backup_progress. For the migration to the new table format to succeed, before performing the first backup task with MySQL Enterprise Backup 8.0.19 or later for the first time on a MySQL Server that has been upgraded from 8.0.18 or earlier and has been backed up by MySQL Enterprise Backup before, grant the required privileges to the mysqlbackup user on the server by issuing these statements at the mysql client: : GRANT ALTER ON mysql.backup_progress TO 'mysqlbackup'@'localhost'; GRANT CREATE, INSERT, DROP ON mysql.backup_progress_old TO 'mysqlbackup'@'localhost'; GRANT CREATE, INSERT, DROP, ALTER ON mysql.backup_progress_new TO 'mysqlbackup'@'localhost'; If these privileges are not granted, the table upgrade will fail with an error message similar to the following: 191219 20:48:43 MAIN ERROR: MySQL query 'RENAME table mysql.backup_progress TO mysql.backup_progress_old, mysql.backup_progress_new TO mysql.backup_progress': 1142, ALTER command denied to user 'mysqlbackup'@'localhost' for table 'backup_progress' These privileges are no longer needed after the first full backup has been performed by MySQL Enterprise Backup 8.0.19 or later, by which point they can be revoked. Note If you are working with a multiprimary Group Replication setting, make sure these privileges are granted on all primary nodes; see also Chapter 9, Using MySQL Enterprise Backup with Group Replication.
ESSENTIALAI-STEM
Page:TheAmericanCarbonManual.djvu/74 often be valuable, it is quite possible to produce them. The effect of a drawing in lead-pencil may be imitated by using graphite as the pigment; red chalk may be imitated by Venetian red; for sepia and bistre effects these pigments themselves may be used. For most purposes, however, a fine black, either neutral, or inclining in tone to brown or purple, will be preferred. Fine lampblack, or good Indian-ink, will, in such case, generally form the basis of the coloring matter. If the color required be a pure neutral black, the addition of a blue pigment is necessary to neutralize the brown tint of Indian-ink; and, where necessary, coldness is corrected by the addition of some warm color. The selection of this color will be governed by the tint desired, and by the considerations of permanency. Many of the most beautiful tints are most fugitive. Carmine, for instance, is unstable; and some samples are injured by the action of the chromic salt. Crimson lake is a valuable color, but it is not strictly permanent. Indian red is a very powerful and very-permanent color. Venetian red is also permanent. For blue, ultra-marine is quite satisfactory as regards permanence. In judging of colors for this purpose, it should be borne in mind, that the actual effect of color employed is chiefly seen in middle tint. It is difficult to distinguish much difference between a blue-black, a brown-black, a purple-black, a rosy-black, etc, in the extreme darks of a picture; but the tone is easily distinguished in middle tint, and, as, a rule, warm half-tones are the most pleasing. It should also be remembered that a weak picture will often look brilliant in a warm tone, whilst a vigorous print will look feeble in a cold color. We have stated before, that by the addition of a large proportion of color to the gelatine, a vigorous print may be obtained from a feeble negative, and by the use of a
WIKI
3 things to know about Cary Fukunaga, the new James Bond director Ending weeks of speculation following the abrupt departure of director Danny Boyle from the as-yet-untitled 25th James Bond movie, American director Cary Joji Fukunaga has been announced as his replacement. Fukunaga is slated to begin filming the project — expected to be the final film starring Daniel Craig as 007 — next March, and the film is eyeing a February 2020 release date. Michael G. Wilson, Barbara Broccoli and Daniel Craig announced today that #Bond25 will begin filming at Pinewood Studios on 4 March 2019 under the helm of director, Cary Joji Fukunaga with a worldwide release date of 14 February 2020. (1/2) pic.twitter.com/Oyzt826sXd Boyle, who directed Slumdog Millionaire and 28 Days Later, among other movies, dropped out of the project in August due to “creative differences,” provoking curiosity and speculation over who might take the reins in his absence. And while the choice of Fukunaga as Bond director is somewhat unexpected given the franchise’s history, it’s also exciting for those familiar with him and his work. Here are three things to know about the newest Bond director. Technically, an American has helmed a Bond film before — the Philadelphia-born Irvin Kershner directed the 1983 Sean Connery Bond film Never Say Never Again — but that was a bit of an outlier, one of the few Bond movies not produced by Eon Productions. The James Bond movies are so steeped in Britishness that the character has only once been portrayed by an American (Barry Nelson, in a 1950s television version of Casino Royale). But Fukunaga has long made films that span cultures and languages, and his unusual visual sense and taste for grittier work likely make him a great candidate for the job, regardless of nationality. Fukunaga’s first feature, the 2009 indie movie Sin Nombre, is a Mexican-American film set near the border about a young boy who’s a member of the MS-13 gang and a girl trying to cross into the US. It was filmed entirely in Spanish and premiered at Sundance, where it won awards for directing and cinematography. He followed it up with the 2011 film Jane Eyre (starring Mia Wasikowska, Michael Fassbender, and Jamie Bell) and 2015’s Beasts of No Nation, which was one of the first films to be released on Netflix and in theaters on the same day. (Fukunaga was also originally on board to write and direct the film version of Stephen King’s It but exited the project over creative differences with the studio in 2015. He retained a screenplay credit on the 2017 film, which is the first of two planned movies.) But though his movies have garnered accolades from critics, Fukunaga is known just as much for his TV work. He directed all eight episodes of the first season of True Detective, starring Woody Harrelson and Matthew McConaughey, which netted him an Emmy in 2014. The series was highly lauded by critics and audiences, with an especially memorable single tracking shot sequence in the fourth episode. Fukunaga has served as executive producer on other films and TV shows, such as this year’s TNT limited series The Alienist. And his latest TV project, Maniac, starring Jonah Hill and Emma Stone, is set to release on Netflix Friday, one day after the Bond announcement. Fukunaga has spent much of his life moving between cultures and absorbing them. His father, a third-generation Japanese American, was born in an internment camp in the US during World War II; his mother is Swedish-American. His parents split when he was a child, after which his father married an Argentinian woman and his mother married a Mexican-American man. Fukunaga is fluent in French as well as Spanish, the latter of which he learned during summers in Mexico with his mother and stepfather. Fukunaga grew up in the Bay Area and once wanted to be a pro snowboarder, something he actively trained for, eventually living in Japan for a year. He majored in history at UC Santa Cruz and studied political science at the Institut d’études politiques in Grenoble, France. But eventually, he figured out that he wanted to be a filmmaker — his first job in the field was as a camera production assistant on Destiny’s Child’s “Survivor” video — and attended New York University’s Tisch School of the Arts’ graduate program in filmmaking. While a student, he wrote and directed the 2004 short Victoria Para Chino, which screened at Sundance and won a Student Academy Award in 2005. After his win for True Detective, Fukunaga became something of a sensation on the internet, as much for his braids as for the various endearing bits of trivia that surfaced, such as the fact that he likes to send Cary Grant GIFs to his friends, writes long love letters, and dated Michelle Williams for a while. And now that he’s helming a Bond film, his popularity seems unlikely to wane anytime soon.
NEWS-MULTISOURCE
Crazy Heart Crazy Heart is a 2009 American drama film, written and directed by Scott Cooper in his feature directorial debut. Based on the 1987 novel of the same name by Thomas Cobb, the story was inspired by country singer Hank Thompson. Starring Jeff Bridges, Maggie Gyllenhaal, Colin Farrell, and Robert Duvall, the film follows an alcoholic country singer and songwriter who tries to turn his life around after beginning a relationship with a young journalist. Bridges, Farrell, and Duvall also sing in the film. Filming took place in 2008 throughout New Mexico, as well as Houston and Los Angeles. Original music for the film was composed by T Bone Burnett, Stephen Bruton, and Ryan Bingham. It was dedicated to Bruton, who died the same year the film was made. The film was produced by Country Music Television and was originally acquired by Paramount Vantage for a direct-to-video release, but was later purchased by Fox Searchlight Pictures for theatrical release. Crazy Heart opened in theaters in the United States on December 16, 2009. From its $7 million budget, it amassed domestic earnings of $39.5 million plus $7.9 international for a worldwide total of $47.4 million. The film was met with critical acclaim and received three nominations at the 82nd Academy Awards, winning Best Actor for Bridges and Best Original Song for "The Weary Kind", written by Bingham and Burnett. Plot Otis "Bad" Blake is a 57-year-old alcoholic singer-songwriter who was once a country music star. He now earns a modest living by performing in small-town bars across the southwestern United States. Having a history of failed marriages (four that he admits to, although a reference is made to a fifth he does not discuss), Blake is without a family. He has a son, aged 28, with whom he has not had contact in 24 years. He is mostly on the road performing, staying in cheap motels, and travelling alone in his 1977 Chevrolet Suburban. The film opens with his arrival at a bowling alley for a show. In Santa Fe, he meets Jean Craddock, a young journalist after a story, divorced and with a four-year-old son, Buddy. She interviews Blake one evening after his gig, and then as they become close, Jean visits again ostensibly to gather more material, and the two enter into a relationship. Jean and her son become a catalyst for Blake to get his life back on track. In doing so, he lets himself be pushed into renewing a professional relationship with Tommy Sweet, a popular and successful country music star he once mentored, and plays as the opening act at one of his concerts, despite his initial balking and wounded pride at being the opening act to his former student. He asks Tommy to record an album with him, but Tommy says his record company insists on a couple more solo albums before a duet project can be recorded. He instead suggests that Blake concentrate on writing new songs that Tommy can record solo, telling him he writes better songs than anyone else. Blake's drinking soon gets out of control and he ends up running off the road while driving drunk. In the hospital, the doctor informs him that although he only sustained a broken ankle from the crash, he is slowly killing himself, and must stop drinking and smoking and lose 25 pounds if he wants to live more than a few more years. Blake's relationship with Jean makes him start to rethink his life. While in Houston, he calls up his son to make amends, only to learn that his mother, Bad's ex-wife, has died. Jean and her son begin to visit more frequently, but after Blake briefly loses Buddy at a shopping mall while drinking at a bar, Jean breaks up with him. Blake resolves to quit drinking. After going through a treatment program at a rehab center, and with support from an Alcoholics Anonymous group and old friend Wayne, Blake finally manages to get sober. Having cleaned up his act, he tries to reunite with Jean but, despite congratulating him on getting sober, she tells him that the best thing he can do for her and Buddy is to leave them alone. Later, Blake finishes writing a song that he thinks is his best ever, "The Weary Kind", and sells it to Tommy. Sixteen months later, Tommy plays "The Weary Kind" to an appreciative audience while Blake watches backstage, as his manager presents him with another of the large royalty checks for the song. As Blake is leaving, Jean approaches him, saying she has come to the show as writer for a large music publication. As they catch up, Blake sees an engagement ring on Jean's finger and tells her that she deserves a good man. He offers her the money from the royalty check for Buddy to have on his 18th birthday, which Jean initially refuses but eventually accepts after Blake says the song would not exist without her, and states that "it isn't money". Jean asks if Blake would like to see Buddy again, but Blake declines, saying it might be too unsettling for the boy. The film ends with Jean asking Blake for another interview, after which they walk away happily, chatting with each other. Cast * Jeff Bridges as Otis "Bad" Blake * Maggie Gyllenhaal as Jean Craddock * Colin Farrell as Tommy Sweet * Robert Duvall as Wayne Kramer * Paul Herman as Jack Greene * Jack Nation as Buddy, Jean's son * Ryan Bingham as Tony of Tony and the Renegades, backup group at bowling alley * Rick Dial as Wesley Barnes, Jean's uncle, Santa Fe piano player * Tom Bower as Bill Wilson Development of original novel The New York Times said the novel, written by Thomas Cobb, "also functions as a shrewd and funny running critique of contemporary country music." Cobb based the character "Bad" Blake on country music entertainer Hank Thompson, Ramblin' Jack Elliott and Cobb's doctoral advisor in graduate school, Donald Barthelme; Cobb studied with Barthelme in a creative writing class in the University of Houston in the 1980s. When Cobb struggled between using an "upbeat" ending and a "downbeat" ending, Barthelme suggested that Cobb use the "downbeat" ending. The nickname "Bad" came from a sentence that popped into Cobb's mind, "Bad's got the sweats again." The name "Blake" came from W. Glenn Blake, a friend from graduate school who is now a senior editor at Boulevard magazine, and some people Cobb knew in Tucson, Arizona. The book, which was out of print since its original publication, went into print again when the film was released. Pre-production The process of creating a film adaptation took many years because the concept was optioned, but was never produced into an actual adaptation until director Scott Cooper produced the film. Cobb assumed that the film would use a more upbeat ending, because the Hollywood film industry often prefers "things that are generally positive". According to Cobb, he had nothing to do with the making of the film. The shooting of a sequence depicting the novel's ending – in which Bad falls off the wagon and dies of a heart attack – occurred; Cooper wanted to use it as the ending, but he did not get final authority to do so. A sequence of Bad Blake visiting his son in Los Angeles was also cut from the final film. Bridges initially passed on the role when he was first offered it. He explained to Vanity Fair that although he liked the script, he realized that the songs would make or break it and at the time the film had no musical attachments. A year later he talked with T Bone Burnett, who was approached to work on the film's soundtrack; together they both agreed to work on the film, and Bridges joined the project. Music The album entitled Crazy Heart: Original Motion Picture Soundtrack was released in 2009 to accompany the film. The 23-track album contains many songs written by Burnett, Bruton, and Bingham, but also some by John Goodwin, Bob Neuwirth, Sam Hopkins, Gary Nicholson, Townes Van Zandt, Sam Philips, Greg Brown, Billy Joe Shaver, and Eddy Shaver. The songs are performed by various artists including actors Bridges, Farrell, and Duvall, as well as singers Bingham (who sings the theme song "The Weary Kind" and plays Tony in the film), Buck Owens, The Louvin Brothers, Lightnin' Hopkins, Waylon Jennings, Townes Van Zandt, and Sam Philips. At the 82nd Grammy Awards, the theme song "The Weary Kind" by Ryan Bingham won for Best Song Written For Motion Picture, Television Or Other Visual Media and the soundtrack also won for Best Compilation Soundtrack Album For Motion Picture, Television Or Other Visual Media. Critical response Review aggregator website Rotten Tomatoes reports that 90% of critics have given the film a positive review based on 212 reviews, with an average score of 7.40/10. The consensus reads, "Thanks to a captivating performance from Jeff Bridges, Crazy Heart transcends its overly familiar origins and finds new meaning in an old story." On Metacritic the film holds a score of 83 out of 100 based on 32 reviews, indicating "universal acclaim". Critics mainly praised the performance of Jeff Bridges as Bad Blake, with many claiming he elevated the film above its seemingly conventional story and languid pace. Tom Long from Detroit News writes, "It's a bit too easy, a bit too familiar, and maybe even a bit too much fun. But the easy magic Bridges brings to the screen makes it all work." The Toronto Star's Linda Barnard attests that "some goodwill evaporates in the final reel, when a few false endings lead to a choice that's not the best one for Crazy Heart, but the generosity of Bridges' performance puts us in a forgiving mood." Jeff Bridges' performance earned him the Academy Award for Best Actor, as well as Best Actor prizes from the Los Angeles Film Critics Association, Broadcast Film Critics Association, Golden Globe Awards, Screen Actors Guild and the Independent Spirit Awards. Bridges also received nominations from the Chicago Film Critics Association, London Critics Circle, Online Film Critics Society and the Satellite Awards. Gyllenhaal was nominated for an Academy Award for Best Supporting Actress for her performance. The song "The Weary Kind" earned Ryan Bingham and T Bone Burnett the 2009 Academy Award for Best Original Song and a Golden Globe. Home media The film was released on April 20, 2010, on DVD and Blu-ray. The single-disc DVDs special features included six deleted scenes, while the Blu-ray 2-disc set contained eight deleted scenes (including one in which Bad reunites with his son), plus two alternative music cuts and a short documentary in which the stars discuss "What Brought Them to Crazy Heart".
WIKI
Yren Rotela Yren Ailyn Rotela Ramirez (born 9 January 1981) is a Paraguayan activist for the rights of LGBT people and sex workers. Biography Yren Rotela was born on 9 January 1981 in the Obrero neighborhood of Asunción, Paraguay. She is the second of seven siblings. She came out as a trans woman at age 14, after which she was expelled from school. Professional career In 1999, an instance of police repression against sex workers prompted Rotela to dedicate herself to activism, publicly denouncing the abuses and extortion that affect this community. As a sex worker, she began to organize with her colleagues, and in 2007, she co-founded Panambí: Association of Transvestite, Transsexual, and Transgender People, which adopted its charter in 2008 and obtained legal status in 2009. She served as its president for two terms, from 2012 to 2016. Through Panambí, Yren Rotela denounced violations and promoted the rights and grievances of trans people. She is a leader of the Federation of Women of Paraguay, a member of the María Rivarola Healthcare Rights Movement, of the Forum for Education, the UN Women Advisory Group of Civil Society in Paraguay, the 8M Paraguay movement, and is the national and international head of the Lactrans Network of Latin America and the Caribbean. In 2015, Amnesty International granted her the Peter Benenson Award for the defense of human rights "for her tireless work in favor of the dignity of [transvestite, transsexual, and transgender people] in Paraguay, her contribution to the visibility of the drama that this collective lives through in the absence of justice and impunity in hate crimes and other serious abuses of human rights." On 17 March 2015, during meeting No. 154 of the Inter-American Court of Human Rights, she was part of the delegation that presented the results of the report "Denuncias de actos de violencia e impunidad contra personas trans en Paraguay" (Reports of Acts of Violence and Impunity Against Trans People in Paraguay), carried out by the Panambí association. Together with Tamara Amarilla, Gabriela Espinoza, and Mariana Sepúlveda, she was appointed as a facilitator of the National System of Judicial Facilitators (SNFJ) in December 2016. Being part of this structure allowed her to advocate for people who need guidance, acting as a link between them and public institutions. Rotela participated in the 47th General Assembly of the Organization of American States, held in Cancún, Mexico, as the Paraguayan representative of the Trans Persons Network of Latin America and the Caribbean (Redlactrans). In the Assembly, the Paraguayan chancellor opposed the approval of an article on the rights of LGBT persons. In September 2017, Rotela gave the talk "¿Nos define el sexo?" (Does sex define us?) on the Gramo conversation platform. She was a candidate on the Kuña Pyrenda Movement's list for the Senate in the 2018 Paraguayan general election. Part of her platform was based on "recognizing the gender identity of trans people, access to economic, social, cultural, civil, and political rights for the entire LGBT community, and the approval of a law against all forms of discrimination." In July 2018, she was invited by the United States government to participate in the International Visitor Leadership Program (IVLP), the State Department's main professional exchange program. Name change In December 2016, through a civil trial, Yren Rotela became the first trans person, together with Mariana Sepúlveda, to present a request to change her name in Paraguay. Five months later, on 11 May 2017, she received a favorable opinion from the Civil and Commercial Judge Julia Rosa Alonso Martínez. Under Article 25 of the Constitution of Paraguay, the case marked a milestone in the country's jurisprudence. However the Prosecutor's Office appealed the measure, and the case is still before the Chamber of Civil Appeals; In 2022, still not being able to change their names, they decided to take the matter to the UN. As of October 2017, Paraguay does not have a gender identity or anti-discrimination law.
WIKI
User:JP Azore/sandbox Chili Riders The Chili Riders (Also known as The Villagers, Chili Riders Club, CRC) is a local bike club in Legazpi City formed in May 2007. It is composed of about 30 members. At first glance, they may seem like an ordinary circle of friends but are actually an organized group as claimed by its members. Although a bike club, they also have interest in skateboards, sand boards, etc. They meet twice a week on weekends. Formation The club started when Kyle, JP, Kobe and Mico met while playing in the streets of Our Lady's Village back in April 2007. They shared a common interest in bikes which brought them together. They decided to form a team or a group but never named it. They only had 5 members but they were cruising and exploring their neighborhood with their bikes. They had no "leader" or "Presiden". Later that year, Kobe, being the most able member, became the president. An agreement between members allowed for Kobe as president but in his absence, anyone can lead. There was no formality at the time. At the end of May 2008, 4 members had a meeting that eventualy led to the formation of a "group". There was a debate about which name to use so they just unofficially used the name, "OLV Bikers" but the name wasn't recognized by everyone and the name and was rejected.
WIKI
The Week in Tech: Our Future Robots Will Need Super-Smart Safety Checks Bits Hi. I’m Jamie Condliffe. Greetings from London. Here’s a look at the week’s tech news: Machines are more than ever controlled by software, not humans. Occasionally it goes fatally wrong. On March 10, 157 people died when an Ethiopian Airlines Boeing 737 Max 8 jet crashed. Five months earlier, another crash of the same model of airplane killed 189 people. There are indications that software intended to prevent the jets from stalling may have played a role in both accidents. Reporting by The New York Times suggests that the software didn’t receive a detailed review by the Federal Aviation Administration before it entered use: Under new rules, the agency delegated much of the responsibility to Boeing. If the software was at fault, and the problem did slip through the regulatory net, it raises questions about how safety-critical technology is vetted. Those questions will become more important over the next few years. A year ago, an Arizona woman was struck and killed by one of Uber’s autonomous cars. The vehicle’s autonomy systems failed to brake, as did the safety driver behind the wheel. Companies like Uber and Waymo, along with most of the auto industry, expect autonomous cars to proliferate over the next decade. Such advances aren’t limited to cars — they will further automate everything from air travel to food delivery. They are built on technologies, like artificial intelligence, that will make split-second decisions for humans. The Boeing software was designed to perform a simple task: Nudge the airplane’s nose down based on sensor readings if a stall was anticipated. As harder tasks are handed to software, the stakes rise. “As you create more advanced A.I. systems, the harm that can result from them failing can be really large,” said Jade Leung, a researcher at Oxford University’s Center for the Governance of Artificial Intelligence. But increasing the complexity of systems makes checking them more difficult. Hardware, from chips to special sensors, can be difficult to test. And it can be difficult for humans to understand how some A.I. algorithms make decisions. Ms. Leung said regulators needed to be more aware of tail-end risks — the highly unlikely but catastrophic events that could occur if something malfunctioned. That might mean introducing more conservative rules that relax as technology matures, ideally developed in tandem with technologists who understand deeply how the systems work. “Verifying the performance and safety of software is a really, really hard technical challenge,” Ms. Leung said. Nonetheless, it’s a challenge that has to be addressed. When a company spends billions on world-leading digital infrastructure, it naturally wants to wring every last cent of revenue out of it. That’s partly what is driving Google’s new Stadia gaming service, announced on Tuesday. Google’s pitch is straightforward: Think of it as Netflix for gaming. As long as they have a fast internet connection, users can pay a subscription to play high-definition games, akin to what they’d find on current top-end consoles, on any computer, phone or tablet. The company’s promise: that its cloud infrastructure makes that achievable. It will add racks of gaming-specific chips to existing server farms to essentially give people an on-demand, remote gaming computer. And Google officials believe that since most users are now so close to its pervasive hardware, lag won’t be a problem — an issue that held back earlier game streaming platforms, like the now-defunct OnLive. Google is not alone in the push into what some people see as the future of gaming. Microsoft had already announced that it planned to offer a trial of a similar service for Xbox consoles, computers and mobile devices this year. Amazon, which owns the game-watching service Twitch, is widely believed to be planning something similar, built on its Amazon Web Services cloud infrastructure. Those three companies happen to be the world’s largest cloud providers. It’s not surprising that they’re enamored of the idea of taking a slice of the $135 billion gaming industry, when all it could take is the flex of an existing muscle. About $500 million should buy a lot of computer. This past week, we found out how much. Writing for The Times, Don Clark explained what the Department of Energy would get for dropping that sum on a supercomputer: Lab officials predict it will be the first American machine to reach a milestone called “exascale” performance, surpassing a quintillion calculations per second. That’s roughly seven times the speed rating of the most powerful system built to date. The device, called Aurora, will be used to figure out everything from how drugs work to the impact of climate change. It’s also a useful indicator of the nation’s competitiveness in science and technology — or, at this point, whether it’s leading or lagging behind China. On that front, Mr. Clark reports that it has been a mixed bag for the United States: An IBM system called Summit, built for the Oak Ridge National Laboratory in Tennessee, took back the No. 1 position last year on a twice-yearly ranking of the world’s 500 most powerful systems — a spot held by China for five years. But China leads by another key measure: It accounted for 227 systems on the Top 500 list, compared with 109 for the United States. China is expected to have its own exascale supercomputer running as soon as 2020 — a full year before Aurora boots up. Google received its third antitrust fine from the European Union since 2017. This one, for 1.5 billion euros, or about $1.7 billion, was for imposing unfair terms on the search service it offers to other websites. Facebook will stop targeting some of its ads. It will no longer allow advertising of housing, jobs or credit to be aimed at those of a certain race, gender or age group. The Pentagon’s giant cloud contract has a one-man holdup. Deap Ubhi, a little-known entrepreneur, is at the center of a legal battle between Amazon and Oracle over the $10 billion project. Take a look at an early iPhone prototype. It’s red, about the size of an old computer motherboard and helped engineers to program the first breakthrough smartphone. A.I. researchers could give computers a little more credit. Rich Sutton, a pioneer of some of today’s most effective A.I. techniques, argues that a “bitter lesson” in artificial intelligence is that “the only thing that matters in the long run is the leveraging of computation.” Why is there still relatively little tech regulation? “Lawmakers are reluctant to disrupt the enormous wealth creation machine that technology has turned out to be,” according to the security expert Bruce Schneier. Screen sharing can be an easy route to professional humiliation. But don’t worry, the aftermath usually isn’t as bad as you might think. (Even so, here are some tips for avoiding future catastrophes.) Jamie Condliffe is editor of the DealBook newsletter. He also writes the weekly Bits newsletter. Follow him on Twitter here: @jme_c.
NEWS-MULTISOURCE
The Medical Medley of Metabolic Syndrome Virtually all of us have heard about the obesity “epidemic” (it’s not contagious, by the way), but what about metabolic syndrome? A lesser known phenomenon, metabolic syndrome is a collection of conditions related to obesity that are typically treated separately with prescription drugs. Metabolic syndrome is almost as common in the US population as obesity: 24% in women and 22% in men. And just like obesity, rates have grown parallel with poor diet and a sedentary lifestyle. In order to be diagnosed with metabolic syndrome, 3 of the following 5 conditions must be present.1     •    Blood sugar higher than 100     •    Blood pressure higher than 130/85     •    Triglycerides higher than 150     •    HDL cholesterol (the “good” cholesterol) lower than 40 in men or 50 in women     •    A waist circumference greater than 40” for men or 35” for women (slightly less for Asian men and women) Why is waist circumference mentioned rather than obesity? Body fat in the abdomen area is considered more dangerous than fat distributed elsewhere because vital organs like the liver and pancreas are located in the abdominal cavity. Metabolic syndrome is strongly related to insulin resistance, which occurs when cells in the muscles, body fat and liver start ignoring the signal being sent out by the hormone insulin to pull glucose out of the bloodstream and into the cells. Why should metabolic syndrome be addressed early on? A recently published large study of more than 27,000 individuals found that insulin resistance was evident more than 20 years before an eventual diagnosis of diabetes or pre-diabetes.2 This means that if you have metabolic syndrome, even without a current diagnosis of pre-diabetes you are likely on the path to pre-diabetes and diabetes. So, the time to act is now! How is metabolic syndrome treated in conventional medicine? Early treatment of metabolic syndrome usually includes a recommendation to modify diet and lifestyle. However, occasional and very brief visits to the doctor are typically not the best context for conversations about these preliminary steps. This is because many people face major challenges with changing their eating and exercise habits. With progression of metabolic syndrome, as many as 5 conditions may be involved, so each tends to be treated with separate medicines. This means people diagnosed with metabolic syndrome may be taking multiple prescription drugs for each of blood sugar management, blood pressure, triglycerides and cholesterol. In addition to prescription drugs, bariatric surgery is increasingly being recommended as a treatment for obesity, even for teens.3 It goes without saying that major surgery like this comes with inherent risks. Are drugs or surgery the only solutions? Usually not! There is growing evidence that metabolic syndrome can be reversed, mainly through long-term weight management and lifestyle changes. That’s the good news. But of course this is not a quick-fix solution. Many with metabolic syndrome have tried every “diet”, having lost and regained the excess weight over and over again. This is because unless insulin resistance—the underlying cause of metabolic syndrome-- is halted, the weight creeps back because the original metabolic imbalance has not been addressed. There is also growing evidence indicating that success in weight management is increased with a personalized approach that takes into account eating patterns, preferences, metabolic goals and comorbidities (or other conditions).4 Michael Dansinger, MD Director of the Diabetes Reversal Program at Tufts Medical Center, emphasizes the benefit of coaching assistance: “I suspect that having a good coach can quadruple the odds of long-term success compared to going it alone. It is just too hard to police yourself without help.”5 What have you done to address metabolic syndrome? References: 1https://emedicine.medscape.com/article/165124-overview 2https://www.sciencedaily.com/releases/2018/10/181004192202.htm 3https://pediatrics.aappublications.org/content/144/6/e20191399?sso=1&%3Bsso_redirect_count=1&%3Bnfstatus=401&%3Bnftoken=00000000-0000-0000-0000-000000000000&%3Bnfstatusdescription=ERROR%3A%20No%20local%20token&sso_redirect_count=2&nfstatus=401&nftoken=00000000-0000-0000-0000-000000000000&nfstatusdescription=ERROR%3A%20No%20local%20token&nfstatus=401&nftoken=00000000-0000-0000-0000-000000000000&nfstatusdescription=ERROR%3a+No+local+token 4https://www.thelancet.com/action/showPdf?pii=S2213-8587%2819%2930149-4 5https://www.bostonmagazine.com/sponsor-content/80-of-diabetics-can-reverse-their-disease-heres-how/
ESSENTIALAI-STEM
3 Tips from Someone With Experience Regenerative Medicine Information If you are here because you want to know more about what regenerative medicine is all about, this is really the right place to be in because we are going to be looking at these things now. Well, there are a lot of people who ask this question and if you are someone who wants to know the answer as well, just stick around as we are going to be looking at these things now. There are many things that you can get to learn about this type of medicine and if you are really curious, you are not alone as there are many other people who are really curious as well. We hope that you will get to learn a lot about regenerative medicine after you have read this whole article so we suggest that you start with it now. If you have to replace cells and if you have to regenerate tissues, you can use regenerative medicine. You can regenerate organ tissues and cells with regenerative medicine and that is something that is really beautiful indeed. You can get to engineer those human cells and get to regenerate them which is all really wonderful and really amazing. You can have cells in your body restored and that is great to know because this can help you and heal you faster. You can get to talk to your doctor more about regenerative medicines and you can get a whole lot of answers from them which is great because you can really get to know more. There are many cases where regenerative medicines were used for heart problems and other such problems and they work really great. Your tissues can be regenerated with regenerative medicine and that is great because you can actually get to replace dead cells in your body. Regenerative medicine can give your heart new and healthy cells so that your heart will not be diseased or troubled anymore. You can actually also regenerate bone cells and that is especially beneficial if you have fractured bones that need fast healing. You can get to learn a lot more if you do more research on regenerative medicines. Getting to try regenerative medicines is really great and you can really get a lot of wonderful benefits from them as we have seen in this article. If your friends are not sure what regenerative medicine is all about, you can tell them about it by sharing this article to them.
ESSENTIALAI-STEM
Rhabdophis Rhabdophis is a genus of snakes in the subfamily Natricinae of the family Colubridae. Species in the genus Rhabdophis are generally called keelback snakes, and are found primarily in Southeast Asia. Toxicity Rhabdophis is often thought of as completely harmless, but there are several cases of severe envenomation and at least one recorded fatality from the Japanese species. The symptoms have been compared to those of highly venomous African colubrids such as the boomslang. Similar reports exist for other species of the genus, which also make reference to the highly hemorrhagic nature of the venom. There is a supposed antivenom in Japan, but not in other countries. While the term "poisonous snake" is often incorrectly used for a wide variety of venomous snakes, some species of Rhabdophis are in fact poisonous but not venomous. Keelback snakes have salivary glands that secrete poison they ingest from eating poisonous toads. While both venom and poison are toxins, a venom requires direct delivery, for instance subcutaneously through a snake bite, but can be ingested without harm. A poison can also be absorbed indirectly, e.g., by touch or through the digestive system, or delivered by the fang of a poisonous snake. Rhabdophis ingest poisonous toads and the poison is absorbed into their blood stream, but the snake is immune to it. The toad poison accumulates in the snakes' salivary glands and is secreted when they bite. Therefore, they use toad poison as their venom. Although this is harmful to small rodents, they cannot harm humans as the concentration of poison secreted is very low. Species These species are recognized as being valid: * Rhabdophis adleri Zhao, 1997 * Rhabdophis akraios Doria, Petri, Bellati, Tiso & Pistarino, 2013 – Singalang keelback * Rhabdophis angeli (Bourret, 1934) – Angel's keelback * Rhabdophis auriculatus (Günther, 1858) – white-lined water snake * Rhabdophis barbouri (Taylor, 1922) – Barbour's water snake * Rhabdophis bindi Das, E.N. Smith, Sidik, Sarker, Boruah, N.G. Patel, Murthy & Deepak, 2021 – Bindee keelback * Rhabdophis callichroma (Bourret, 1934) – Bavi keelback * Rhabdophis callistus (Günther, 1873) – Boettger's keelback * Rhabdophis ceylonensis (Günther, 1858) – Sri Lanka blossom krait, Sri Lanka keelback * Rhabdophis chiwen Z. Chen, Ding, Q. Chen & Piao, 2020 – Chiwen keelback * Rhabdophis chrysargoides (Günther, 1858) – Javanese keelback, Günther's keelback * Rhabdophis chrysargos (Schlegel, 1837) – specklebelly keelback * Rhabdophis confusus David & G. Vogel, 2021 * Rhabdophis conspicillatus (Günther, 1872) – red-bellied keelback * Rhabdophis flaviceps (A.M.C. Duméril, Bibron & A.H.A. Duméril, 1854) – orangeneck keelback, orange-lipped keelback, yellow-headed keelback * Rhabdophis guangdongensis Zhu, Wang, Takeuchi & Zhao, 2014 – Guangdong keelback * Rhabdophis helleri (Schmidt, 1925) – Heller’s red-necked keelback * Rhabdophis himalayanus (Günther, 1864) – orange-collared keelback * Rhabdophis hmongorum (Kane, Tapley, La & Nguyen, 2023) – H’mong keelback snake * Rhabdophis leonardi (Wall, 1923) – Burmese keelback * Rhabdophis lineatus (W. Peters, 1861) – zigzag-lined water snake * Rhabdophis murudensis (M.A. Smith, 1925) – Muruden keelback, Gunung Murud keelback * Rhabdophis nigrocinctus (Blyth, 1856) – black-striped keelback * Rhabdophis nuchalis (Boulenger, 1891) – Hubei keelback * Rhabdophis pentasupralabialis Jiang & Zhao, 1983 * Rhabdophis plumbicolor (Cantor, 1839) – green keelback, lead keelback * Rhabdophis rhodomelas (H. Boie, 1827) – blueneck keelback, blue-necked keelback * Rhabdophis siamensis (Mell, 1931) * Rhabdophis subminiatus (Schlegel, 1837) – red-necked keelback * Rhabdophis swinhonis (Günther, 1868) – Swinhoe's grass snake * Rhabdophis tigrinus (H. Boie, 1826) – tiger grooved-neck keelback, tiger keelback, Japanese grass snake, yamakagashi Nota bene: A binomial authority in parentheses indicates that the species was originally described in a genus other than Rhabdophis.
WIKI
Magic Leap expands shipments of its AR headset to 48 US states – TechCrunch If you are dying to get your hands on some crazy Magic Leap hardware, you have some much better options as of today. At the company’s first developer conference, Magic Leap announced they are opening orders of the Magic Leap One Creator’s Edition headset to the 48 contiguous states of the USA. If you’re in Hawaii or Alaska, no dice. Previously, you had to be in Chicago, LA, Miami, NYC, San Francisco or Seattle in order to get your hands on it. Also, if you had previously ordered the headset in one of those cities, someone would come to you, drop it off and get you set up personally. That service is expanding to 50 cities, but you also don’t need to have someone set it up for you in order to buy one now. It’s worth reiterating that this thing costs $2,295. The company is doing a financing plan with Affirm so that interested buyers can spread the cost of the device over 24 months. It’s called a Creator’s Edition, but it’s definitely geared toward the developer crowd. There are a few apps available for download in the Magic Leap World Store, but this isn’t anywhere near consumer-ready and that’s why they’re getting developers to start building out some cool stuff while they get their ducks in a row and further hone their pitch for a post-iPhone vision of computing.
NEWS-MULTISOURCE
Microsoft Graph Toolkit The Microsoft Graph Toolkit is a collection of reusable, framework-agnostic web components and helpers for accessing and working with Microsoft Graph. All components can access Microsoft Graph without any customization required. The Microsoft Graph Toolkit is a great resource for any developer looking to create a web app, Microsoft Teams tab, or SharePoint web part that makes calls to Microsoft Graph. By providing UI components that are designed to look and feel like Microsoft 365 experiences, the Toolkit reduces your time and cost to integrate with the platform. All the UI components authenticate with and access data from Microsoft Graph. The components are fully customizable using CSS and templating so you can match your unique branding and control the content displayed in the components. Get started You can use the components by referencing the loader directly (via unpkg), or by installing the npm package. Animated gif that shows referencing the loader to use the toolkit components For details about how to get started with the Microsoft Graph Toolkit, see the Get started video. Use via mgt-loader See the following jsfiddle example. <script src="https://unpkg.com/@microsoft/mgt/dist/bundle/mgt-loader.js"></script> You can then start using the components in your HTML page. The following is a full working example with the MSAL provider. <script src="https://unpkg.com/@microsoft/mgt/dist/bundle/mgt-loader.js"></script> <mgt-msal-provider client-id="[CLIENT-ID]"></mgt-msal-provider> <mgt-login></mgt-login> <!-- <script> // alternatively, you can set the provider in code and provide more options mgt.Providers.globalProvider = new mgt.MsalProvider({clientId: '[CLIENT-ID]'}); </script> --> Note: MSAL requires the page to be hosted in a web server for the authentication redirects. If you're just getting started and want to play around, you can use live server in Visual Studio Code. Use via NPM (es6 modules) By using the es6 modules, you have full control of the bundling process and you can bundle only the code you need for your site. First, add the npm package: npm install @microsoft/mgt Now you can reference all components at the page you are using: <script src="node_modules/@microsoft/mgt/dist/es6/components.js"></script> Or, just reference the component you need and avoid loading everything else: <script src="node_modules/@microsoft/mgt/dist/es6/components/mgt-login/mgt-login.js"></script> Similarly, to add a provider, you can add it as a component: <script src="node_modules/@microsoft/mgt/dist/es6/components/providers/mgt-msal-provider.js"></script> <mgt-msal-provider client-id="[CLIENT-ID]"></mgt-msal-provider> Or, add it in your code: <script type="module"> import { Providers, MsalProvider } from '@microsoft/mgt'; Providers.globalProvider = new MsalProvider({ clientId: '[CLIENT-ID]' }); </script> Providers The components work best when used with a provider. The provider exposes authentication and APIs that the components use to call Microsoft Graph. The toolkit contains providers for MSAL, SharePoint, Teams, and Office Add-ins (coming soon). You can also create your own providers by extending the [IProvider] abstract class. Polyfills If you're using the es6 modules from the npm package, make sure to include polyfills in your project as they are not included automatically. To learn more, see polyfills. If you're using the mgt-loader.js script from the bundle on unpkg, the polyfills are already included. Using the components with React, Angular, and other frameworks Web components are based on several web standards and can be used with any framework you're already using. However, not all frameworks handle web components the same way. To learn more about the considerations that might apply depending on your framework, see the Custom Elements Everywhere project. The following sections provide a quick overview of using the Microsoft Graph Toolkit components with React and Angular. React React passes all data to Custom Elements in the form of HTML attributes. For primitive data this is fine, but it does not work when passing rich data, like objects or arrays. In those cases you will need to use a ref to pass in the object. Ex: // import all the components import '@microsoft/mgt'; class App extends Component { render() { return <mgt-person show-name ref={el => (el.personDetails = { displayName: 'Nikola Metulev' })} />; } } Because React implements its own synthetic event system, it cannot listen for DOM events coming from custom elements without the use of a workaround. You will need to use a ref to reference the toolkit components and manually attach event listeners with addEventListener, as shown in the following example. // you can just import a single component import '@microsoft/mgt/dist/es6/components/mgt-login/mgt-login.js'; class App extends Component { render() { return <mgt-login ref="loginComponent" />; } componentDidMount() { this.refs.loginComponent.addEventListener('loginCompleted', e => { // handle event }); } } React, Typescript, and TSX A known issue can occur when you use custom elements with React and Typescript. Typescript will throw an error when trying to use a component in tsx. The workaround is to define the custom element in your code, as shown. declare global { namespace JSX { interface IntrinsicElements { 'mgt-login': any; } } } You can then use it in your tsx as <mgt-login></mgt-login>. Angular Angular's default binding syntax will always set properties on an element. This works well for rich data, like objects and arrays, and also works well for primitive values. To use custom elements, first, enable custom elements in your app.module.ts by adding the CUSTOM_ELEMENT_SCHEMA to the @NgModule() decorator, as shown in the following example. import { BrowserModule } from '@angular/platform-browser'; import { NgModule, CUSTOM_ELEMENTS_SCHEMA } from '@angular/core'; import { AppComponent } from './app.component'; @NgModule({ declarations: [AppComponent], imports: [BrowserModule], schemas: [CUSTOM_ELEMENTS_SCHEMA], providers: [], bootstrap: [AppComponent] }) export class AppModule {} You can then import the component you'd like to use in your component *.ts file. import { Component } from '@angular/core'; import '@microsoft/mgt/dist/es6/components/mgt-person/mgt-person'; @Component({ selector: 'app-root', templateUrl: './app.component.html', styleUrls: ['./app.component.css'] }) export class AppComponent { person = { displayName: 'Nikola Metulev' }; } Finally, use the component as you normally would in your template. <mgt-person [personDetails]="person" show-name></mgt-person>
ESSENTIALAI-STEM
Useful Reference De percolab 2.0 Aller à : navigation, rechercher Living in this generation provides the advantage of making use of products which can be stamina Star rated. This means, they eat much less power which will lead to decreased expense to cover next month. A washer and dryer combination furthermore provides such an advantage. So which you need to we really choose? Top Load Washer Dryer Combination This is your top bet if you are interested in ability. These are not only energy efficient, they're also efficient with regards to drinking water intake. The services are a lot better than one other kinds of washers online. All the electricity ate is a result of the heating procedure for h2o additionally the heating system procedure of the dryer. Some forward loaders has a 6th sense innovation. Thus giving the washer a mind of the own to measure simply how much temperature the water needs. Additionally, a moisture detector are incorporated during the dryer to discover simply how much wetness try remaining in your own clothing. In this manner, it hinders over drying that not only uses most electricity, but is furthermore damaging to the material of one's clothes. To understand more about best washer and dryer brand and useful reference, please visit our website this website (https://steamwasherdryer.tumblr.com/). When you're just starting to remember buying a commercial washer, here are a few important things to consider. It can save you revenue by purchase a used unit. You are able to cleanse even more garments at the same time to slashed washing opportunity down. You can even spend less overall on maintenance to your washing machines. As a side mention; by using industrial washers, you will definitely actually use less detergent due to the method in which these are typically created and the loads you will definitely operated. Purchasing Utilized Types If you should be amazed just a little by the cost of the industrial versions which are available, it is essential to keep in mind that you have the capability to buying used washers. The put gadgets will come from experts or exclusive households. Much like once reselling a concise design, the reseller will repair or refurbish the product before reselling it. You are able to obtain a Maytag commercial washer for similar rates as an inferior Adora unit. Washing Larger Lots Another thing to think about once you purchase a commercial washer like a Dexter brand washer is you should be able to clean easily double the total amount that you'll be in a position to wash-in a conventional top loading washer. By incorporating lots, it's possible to wash clothing in two the total amount of times it would generally need you. If you have the dryers to complement, it will be possible to reduce whatever would typically capture four to six days to achieve into 1 or 2 days. A Lot Fewer Repairs Take note of the summary of the models you might be contemplating purchasing. Nearly all commercial washers and dryers expenses more not merely since the equipment is heavy-duty. They even cost more because they're developed to final. Be sure that the system you buy will be able to sit the test of the time and start to become worth the financial you make.
ESSENTIALAI-STEM
Operation Mastiff Operation Mastiff was an operation conducted by the U.S. 1st Infantry Division in the Dầu Tiếng District, lasting from 21 to 25 February 1966. Prelude U.S. intelligence reports indicated that the People's Army of Vietnam (PAVN) 9th Division planned to attack the Army of the Republic of Vietnam (ARVN) 8th Regiment, 5th Infantry Division in the Dầu Tiếng District and was massing its forces in the Boi Loi Woods 12 km south of Dầu Tiếng. U.S. commander General William Westmoreland ordered MGen Jonathan O. Seaman to launch a spoiling attack on the PAVN. Concerned about possible leaks by the ARVN III Corps staff, Seaman shared a false plan indicating that the target was the Michelin Rubber Plantation east of Dầu Tiếng and B-52 strikes were conducted in that area to lend it credibility. It was hoped that this would cause the PAVN to move their forces to the west bank of the Saigon River where the real operation would take place. After this ruse had been in place for a week the real operation commenced. Operation On the morning of 21 February 142 helicopters began lifting the 2nd and 3rd Brigades of the 1st Infantry Division to establish a cordon around a 100 square kilometer area around the west bank of the Saigon River. The units then moved in from the north and south discovering abandoned base areas, hospitals and supplies but few PAVN soldiers. Aftermath Operation Mastiff officially concluded on 25 February, the US claiming PAVN/VC losses were 61 killed (40 in a single airstrike), U.S. losses were 17 killed. The operation was a major disappointment for the U.S. command as the PAVN 9th Division was not engaged and the PAVN had again demonstrated their ability to choose when and where it would stand and fight.
WIKI
Volcker Rule May Mostly ‘Go Up in Smoke,’ Goldman’s Levitt Says The Volcker rule, which would bar banks from trading for their own accounts, is likely to be postponed and weakened amid lobbyists’ resistance, said former Securities and Exchange Commission Chairman Arthur Levitt, who advises Goldman Sachs Group Inc. (GS) Wall Street “will be doing all it can to delay this until they hope there’s a Republican president and a Republican Senate,” Levitt said in a radio interview on “Bloomberg Surveillance” with Tom Keene and Ken Prewitt. “This is going to be a long slog, and much of that rule that you see today is going to go up in smoke.” A version of the rule, released by regulators this week, “is much sterner, much more rigorous than most people expected,” Levitt said. It will likely prompt firms to consider giving up their status as bank holding companies to avoid its costs, he said, without naming specific lenders. Goldman Sachs and Morgan Stanley (MS) were the biggest U.S. securities firms before they converted to bank holding companies after the September 2008 bankruptcy of Lehman Brothers Holdings Inc. Both became subject to regulation by the Federal Reserve and won access to central bank programs such as the discount window, which are designed to protect deposit-taking banks. The rule, named for former Fed Chairman Paul Volcker , was included in last year’s Dodd-Frank regulatory overhaul to rein in risky trading that helped fuel the 2008 credit crisis. The central bank, Federal Deposit Insurance Corp. and Office of the Comptroller of the Currency worked with the SEC on a draft issued this week. In its current form, the regulation would impose costs on lenders and drive capital to non-bank market makers, said David Hilder , an analyst at Susquehanna Financial Group LLP, in a note to clients earlier this week, in which he also predicted that firms may consider giving up their bank status. Levitt, a Democrat appointed to the SEC by former President Bill Clinton , is also on the board of Bloomberg LP, the parent company of Bloomberg News. To contact the reporters on this story: Charles Mead in New York at cmead11@bloomberg.net ; John Tucker in New York at jtucker@bloomberg.net To contact the editor responsible for this story: David Scheer at dscheer@bloomberg.net
NEWS-MULTISOURCE
Browse FAQs What are the recommended ribbon cables for the BCPM printed circuit board? Published date: 04 June 2020 Issue What are the recommended ribbon cables for the BCPM printed circuit board? Product Line BCPM Environment Cabling and connection Cause How to select Flat ribbon cable vs Round ribbon cable. Resolution Flat ribbon cables are recommended for use when the BCPM printed circuit board will be mounted inside of the PDU that is being monitored. Round ribbon cables are the preferred choice when the ribbon cable will be threaded through conduit.   Commercial Reference Number Ribbon Cable for use with BCPM products CBL016 Flat Ribbon Cable (quantity 1) for BCPM, length = 1.2 m CBL017 Flat Ribbon Cable (quantity 1) for BCPM, length = 1.5 m CBL018 Flat Ribbon Cable (quantity 1) for BCPM, length = 1.8 m CBL020 Flat Ribbon Cable (quantity 1) for BCPM, length = 3.0 m CBL021 Flat Ribbon Cable (quantity 1) for BCPM, length = 6.1 m CBL022 Round Ribbon Cable (quantity 1) for BCPM, length = 1.2 m CBL024 Round Ribbon Cable (quantity 1) for BCPM, length = 6.1 m Was this helpful? What can we do to improve the information ? Can't find what you are looking for? Reach out to our customer care team to receive information on technical support, assistance for complaints and more.
ESSENTIALAI-STEM
30-Minute No-Equipment Full-Body Strength Workout With Charlee Atkins The Flat Belly Code Being Health-Smart Isn’t Preventing Obesity, What’s The Disconnect? How Do We Fix It? With uncontrolled obesity everywhere in our society, a question we need to ask ourselves is… why? With so much health information available and no lack of visual reminders about just how overweight many in our society are, one would think that these would call people to action to re-asses their lifestyles by curbing over eating and living more active lives. It doesn’t seem that is happening though. So what is the disconnect between this abundant knowledge and this lack of action? How do we go about preventing obesity? I believe it is two-fold. I see a huge lack of willpower and, to be quite honest, rampant laziness. The Different Types of Coconut Oil As its popularity grows, so do all the questions about it. For instance, how is it produced, what are the different types, what are its uses, how it should be stored, what are its benefits, what do the terms on the labels mean, and which ones should you buy? Splenda (A/K/A Sucralose): 7 Seriously Strong Reasons I Use It and Recommend It Splenda, which is also known by the generic name sucralose, was introduced into our food supply in 1998 when it was approved by the FDA. Since then it’s been approved by 100 other countries, and has become the most popular non-caloric sweetener in the world. During it’s short history, which is less than 20 years, there have been no deaths, diseases or illnesses directly attributable to sucralose. Critics say that we need more time for health problems to reveal themselves, and that may be true. That said, I personally like the product’s strong track record. My biggest reason for recommending Splenda is that our government says it’s safe, and the product has demonstrated safety with a huge worldwide population group. So far, so good. The Myth Of Moderation Moderation doesn’t work for everyone, or for every food. Sugar could be the exception to the generally accepted rule that “everything’s fine in moderation.” For sugar addicts, abstinence may be preferable. Manganese – The Overlooked Trace Mineral: Why You Should Have It And Where To Find It Don’t make the mistake of confusing manganese for magnesium. They may sound similar but Manganese has a whole host of different benefits, & makes up a part of the essential bone-building group of calcium, magnesium, manganese & boron. Learn about this trace mineral, what it can do for you, and which tasty foods it can be found in with this article. Women Need Vitamin D According to ScienceDaily(1) Americans have low vitamin D levels. That means we are susceptible to other illnesses including cancer and cardiovascular disease. Here are the specific benefits of vitamin D for your health. Vitamin A – The Necessity and the Risks Although Vitamin A, also known as retinol (a form of alcohol used by the body to preserve the life of the vitamin itself) is necessary for fighting infection, cleansing kidneys, clearing acne, lowering cholesterol, lessening menstrual cramps, delaying senility, preventing wrinkles, handling stress, limiting memory loss, eliminating night blindness, controlling asthma, restricting yeast infections and much more an overdose of Vitamin A, as a supplement can be toxic. Taking Vitamin A supplements must be handled by a physician. Tests must be taken to prove deficiencies and dosages must be regulated. Too much Vitamin A causes brittle fingernails, hair loss, low blood pressure, pain, nausea and diarrhea, mouth ulcers, immune deficiencies, blood in the lungs, thyroid malfunctions, brain swelling, seizures, heart disease, liver inflammation, comas and in some cases even death. Differences in Herbal Medicines Differences in herbal paths are often confusing. You should know how you want to use herbals before you choose what path to learn. Or, you’ll not enjoy it. Back To School Lunch Boxes: How and What to Pack Packing your kid’s lunch box for school or kindergarten can be a real headache. Make it simple and learn from a personal experience about how and what to pack to make your life easier and your kid happy. 7 Foods That Boost Your Haemoglobin Count Haemoglobin is an iron-rich protein that exists in your red blood cells. Its main function is to transport oxygen from the lungs to the body’s tissues, thus aiding the living cells that make up your body. Haemoglobin also helps carry carbon dioxide away from the cells and transport it back to the lungs. Considering the vital role haemoglobin plays in keeping us healthy, it is necessary to maintain it in normal levels in your blood. For A Healthy Diet Changing As Well An Unhealthy Snack List Eating snacks while at the office or at home just after lunch is a common event. It usually doesn’t matter if the snack is healthy or not, or what the effects of these can have on our overall health. Bad habits are like viruses in your diet, causing bad health in what you are eating. If you don’t clear these viruses out then the cycle will continue and ruin your life. Our eating pattern becomes a habit that most people fall into through no real fault of their own. Clarified Butter or Ghee – Should You Eat It? Ghee or clarified butter, has been around in India for thousands of years. Prepared by simmering butter and removing the residue, ghee is traditionally considered to be the food of the Gods – with mystical healing properties. To know if we should be eating it today You May Also Like FREE Weight Loss Tips Here!
ESSENTIALAI-STEM
Estimated Glomerular Filtration Rate Authored by Dr Colin Tidy, 11 Dec 2017 Patient is a certified member of The Information Standard Reviewed by: Prof Cathy Jackson, 11 Dec 2017 The estimated glomerular filtration rate (eGFR) does not diagnose any specific kidney disease but is a test to assess how well your kidneys are working. Various different diseases, conditions and medicines can affect the function of the kidneys. A reading of greater than 90 ml/min/1.73 m2is normal. The estimated glomerular filtration rate (eGFR) blood test is commonly done as a routine part of monitoring people with kidney diseases or with conditions that can affect the kidneys, such as diabetes or high blood pressure. It is also often done as a routine test in many medical situations. If you are found to have chronic kidney disease (CKD) then the eGFR test is usually done at regular intervals to monitor your kidney function. The eGFR is a test that is used to assess how well your kidneys are working. The test estimates the volume of blood that is filtered by your kidneys over a given period of time. The test is called the estimated glomerular filtration rate because the glomeruli are the tiny filters in the kidneys. If these filters do not do their job properly then the kidney is said to have reduced or impaired kidney function. The eGFR test involves a blood test which measures a chemical called creatinine. Creatinine is a breakdown product of muscle. Creatinine is normally cleared from the blood by the kidneys. If your kidneys are not working properly, the level of creatinine in the blood goes up. The eGFR is then calculated from your age, sex and blood creatinine level. An adjustment to the calculation is needed for people with African-Caribbean origin. In the UK this adjustment is made by multiplying the eGFR calculation by 1.21. However, the correction needed may vary depending on how the eGFR has been calculated by your local laboratory.   eGFR calculations have not been fully validated in other ethnic groups (for example, Indo-Asians) or in subjects of mixed race. eGFR is also less reliable in Chinese patients. Note: it is not possible to assess the eGFR accurately in people with abnormal amounts of muscle and in people who have conditions that can affect the level of creatinine. This includes: • People with muscle wasting conditions. • People who have had an amputation of an arm or leg. • Malnourished people. • Pregnancy. • People with acute kidney injury. • People with a lot of fluid retention (oedema). • Children. Further reading and references Kidney Dialysis Treatment Options Okay so here are the basics:I am 5’11, 180lbs, 20% bodyfat. My blood pressure is 115/70 and my resting heartrate is 68. I had a urinalysis for my foamy urine about 8 months ago but the tests came... Alex1000 Health Tools Feeling unwell? Assess your symptoms online with our free symptom checker. Start symptom checker Listen
ESSENTIALAI-STEM
[SOLVED] R: How to check whether object exists inside function? Issue Question I need to check whether an object exists inside a function and not elsewhere. How can I do this? To make clear what I mean I use exists: fun <- function(){exists("x")} x <- 1 fun() > TRUE My expected output for the code above is FALSE because the variable x was created outside the function. So x is saved inside the global environment and that is why the funtion returns TRUE but can we somehow test whether x is in "function environment"? I’ve tried I found this which also does not work in my case. There they suggest using library(rlang) f1 <- function(x){ arg <- quo_name(enquo(x)) if(exists(arg, where = .GlobalEnv)){ return(2*x) } else { cat('variable ', '`', arg, '`', ' does not exist', sep = "") } } I expect the output being variable x does not exist for both following cases but this is not the case if x was defined outside the function before: x <- 1 f1(x) > 2 rm(x) f1(x) variable `x` does not exist Solution We can do this by specifying a specific environment for exists to search in and tell it to only look there, and not in the enclosing environments. The where= argument tells exists where to look for that object. We can either specify it explicitly with environment() (which returns the current environment), or use the default value of -1 which drops the R_GlobalEnv from the list of environments to search. Either way, the key is to set inherits=FALSE to limit it to only the specified environment. Otherwise, it also looks in the enclosing environments (like R_GlobalEnv) which we don’t want: x <- 1 fun <- function(){exists("x", inherits = F)} fun() [1] FALSE However if we define x in the enviroment of the function, it returns TRUE: fun <- function(){ x<-3; exists("x", inherits = F)} fun() [1] TRUE The example mentioned with explicitly defined environment: fun <- function(){exists("x", where = environment(), inherits = F)} What’s happening with the default where=-1 argument? The documentation says that if you provide it with an integer, it selects the environment based on "the position in the search list". We can see that .GlobalEnv is at position 1, followed by attached packages rm(list=ls()) # clear .GlobalEnv x <- 3 # Add x to .GlobalEnv ls() # Show that x is the only thing in .GlobalEnv [1] "x" search() # Show the search list [1] ".GlobalEnv" "package:lubridate" "package:forcats" "package:stringr" [5] "package:dplyr" "package:purrr" "package:readr" "package:tidyr" [9] "package:tibble" "package:ggplot2" "package:tidyverse" "tools:rstudio" [13] "package:stats" "package:graphics" "package:grDevices" "package:utils" [17] "package:datasets" "package:methods" "Autoloads" "package:base" Now we run this function which checks for different objects in different environments by integer value: fun <- function(){ y <- 3 k <- function(){ z <- 3 print(exists('z', -1, inherit=FALSE)) print(exists('x', 1, inherit=FALSE)) print(exists('y', parent.frame(), inherit=FALSE))} k() print(exists('x', -1, inherit=FALSE)) print(exists('y', -1, inherit=FALSE)) print(exists('x', 1, inherit=FALSE)) print(exists('ymd', 2, inherit=FALSE)) print(exists('last2', 3, inherit=FALSE)) print(exists('str_detect', 4, inherit=FALSE)) } > fun() [1] TRUE # Inside k(), -1 is the function env for k() - z is there [1] TRUE # 1 is .GlobalEnv, x is there [1] TRUE # to choose parent env with y, we need to specify it with parent.frame() [1] FALSE # -1 is the function env, x not in function env [1] TRUE # -1 is the function env, y is in function env [1] TRUE # 1 is .GlobalEnv, x is in .GlobalEnv [1] TRUE # position 2 is the lubridate package [1] TRUE # position 3 is the forcats package [1] TRUE # position 4 is the stringr package From this we can see that -1 is always the local environment of the current function, while 1 is .GlobalEnv and higher numbers are attached packages as listed by search(). If you want to specify with more detail, for instance to look in fun() from within k(), then you need to specify the environment explicitly, either with a relative function like parent.frame() as above or by getting the environment as an object and referring directly as below: fun <- function(){ y <- 3 env <- environment() k <- function(e){ z <- 3 print(exists('y', inherit=FALSE)) print(exists('y', where=e, inherit=FALSE)) } k(env) } fun() [1] FALSE [1] TRUE Answered By – divibisan Answer Checked By – Clifford M. (BugsFixing Volunteer) Leave a Reply Your email address will not be published.
ESSENTIALAI-STEM
What Is Long-Term Memory Loss? The National Institutes of Health (NIH) defines long-term memory loss as difficulty remembering events that occurred further in the past. Long-term memories are formed when short-term memories, or non-permanent memories, are consolidated in the hippocampus, a brain structure located in the medial temporal lobe; once the memories are consolidated, they are available independent from the hippocampus in the neocortex, where they can be retrieved. When a patient has long-term memory loss, he has problems recalling stored memories, not creating new memories. Types of Memories The Helpguide.org article “Improving Your Memory--Tips and Techniques to Improve Memory,” states that long-term memories can be three types of memories: episodic, semantic and procedural 2. Both episodic and semantic memories are conscious memories, which require active thought to remember; procedural memories, on the other hand, can be recalled unconsciously. Episodic memories are about experiences, semantic memories are factual data and procedural memories are skills and routines. Brain Location Long-term memories are stored in the neocortex, part of the cerebral cortex responsible for higher functions in the brain, according to Helpguide.org. The neocortex has separate parts for different functions; for example, there are areas in the neocortex for language, sensation, movement and problem-solving. When part of the neocortex is damaged, the patient will lose the associated memories. For example, if the language area of the neocortex is injured, the patient may have long-term loss of semantic language memories. Stress Causes Stress is a large factor in long-term memory loss. The Franklin Institute states that during a stressful event, the brain releases the hormone cortisol 3. In large quantities, such as from long-term stress, cortisol can damage the brain. Cortisol interferes with neurotransmitters, making it difficult for the patient to retrieve long-term memories. This type of long-term memory loss may be temporary, if the patient is able to control her level of stress. Other Causes Certain diseases and injuries can cause long-term memory loss by damaging the neocortex; however, these afflictions may cause permanent long-term memory loss. The NIH states that physical injuries, such as head trauma, can affect long-term memory; other possible causes for neocortex lesions are brain tumors and strokes. Substance use, such as as excessive alcoholism, and degenerative diseases, such as Alzheimer's disease, also can result in long-term memory loss. Treatment A patient with long-term memory loss can help reduce the severity of his symptoms by keeping mentally active or doing what Helpguide.org describes as “neurobic” activities. One way to improve recall is to rehearse information, where the patient practices important content repetitively. Using mnemonic devices, which utilize associations to remember items, also can help. The patient can reinforce information by using multiple senses, such as speaking out loud while writing. Increasing the amount of attention used when studying something can help with later recall, as this will strengthen the neural connections. ×
ESSENTIALAI-STEM
Is blood sugar of 103 OK? Is blood sugar of 103 OK? The normal fasting blood glucose level is below 100 mg/dl. A person with prediabetes has a fasting blood glucose level between 100 and 125 mg/dl. If the fasting blood glucose level is to 126 mg/dl or above, a person is considered to have diabetes. Is 103 blood sugar high in the morning? Here are the normal blood sugar ranges for a person without diabetes according to the American Diabetes Association: Fasting blood sugar (in the morning, before eating): Less than 100 mg/dL. 1-2 hours after a meal: Less than 140 mg/dL. 2-3 hours after eating: Less than 100 mg/dL. What are normal blood sugar levels for non diabetics? A normal blood glucose level for adults, without diabetes, who haven’t eaten for at least eight hours (fasting) is less than 100 mg/dL. A normal blood glucose level for adults, without diabetes, two hours after eating, is 90 to 110 mg/dL. What is a good glucose level for a woman? A blood sugar level less than 140 mg/dL (7.8 mmol/L) is normal. Should I test my blood sugar if I not diabetic? For healthy people, blood sugar testing is typically recommended every three years or so; if prediabetes is diagnosed, repeat testing is recommended more often, at least yearly. CGM might allow earlier diagnosis of prediabetes or diabetes. Is 104 blood sugar normal? Fasting blood sugar test In general: Less than 100 mg/dL (5.6 mmol/L ) is normal. 100 to 125 mg/dL (5.6 to 6.9 mmol/L ) is diagnosed as prediabetes. 126 mg/dL (7.0 mmol/L ) or higher on two separate tests is diagnosed as diabetes. How do I get my blood sugar down fast? When your blood sugar level gets too high — known as hyperglycemia or high blood glucose — the quickest way to reduce it is to take fast-acting insulin. Exercising is another fast, effective way to lower blood sugar….Eat a consistent diet 1. whole grains. 2. fruits. 3. vegetables. 4. lean proteins.
ESSENTIALAI-STEM
Intel gets an upgrade at Jefferies on hopes change is coming Shares of Intel Corp. are up 1.9% in Tuesday morning trading after Jefferies analyst Mark Lipacis abandoned his bearish call on the stock, upgrading it to hold from underperform while raising his price target to $64 from $40. "Share loss, a transistor transition disaster, changing of the management guard, and a CEO bonus that inflects with the stock in the low $60s tell us the table is set for change at Intel," he wrote. "We increase our price target to $64 assuming that the company divests memory...and cuts operating expenditures," Lipacis wrote. Those two activities would represent a shift toward greater focus and frugality, he said. His third F theme for the company is "fabless," and while he estimates that the sale of Intel's factories could help it "close the transistor gap with AMD " and boost earnings, he sees a low probability that the company will go this route in the near term. Intel shares have climbed 16% in the past three months, while the Dow Jones Industrial Average has risen 9%.
NEWS-MULTISOURCE
Cocote Cocote is a 2017 Dominican Republic drama film directed by Nelson Carlo de Los Santos Arias. It was selected as the Dominican entry for the Best Foreign Language Film at the 91st Academy Awards, but it was not nominated. Cast * Vicente Santos as Alberto * Judith Rodíguez as Karina * Pepe Sierra as Martínez * Yuberbi Rosa as Patria * Isabel Spencer as Chave
WIKI
Paul Hutchison (English cricketer) Paul Michael Hutchison (born 9 June 1977, Leeds, Yorkshire, England) is an English former first-class cricketer. He was a left-handed batsman, and a left-arm fast-medium bowler. Hutchison played for the Under-17 and Under-19 England team. On Hutchison's first-class debut for Yorkshire County Cricket Club in 1997, he took 7 for 38, followed by a County Championship debut tally of 7 for 50, recording the best Yorkshire debut bowling return since Wilfred Rhodes in 1898. He went on to play thirty nine first-class matches for Yorkshire between 1996 and 2001, taking 143 wickets at 22.68, before being released by the county. At the start of the 1996 season Hutchison was selected to play in the Test trial match at Chelmsford where he played for 'The Rest of England' against England 'A'. The highlight being dismissing Nasser Hussain in the second innings. Hutchison also toured with England 'A' twice, firstly to Kenya and Sri Lanka in 1997/98 and then Zimbabwe and South Africa in 1998/99. Injury to his back cut short this tour and he returned home with a stress fracture to the back. An injury that would trouble him for the rest of his career. He joined Sussex in 2002, but, beset by injury, he only stayed two years before moving to Middlesex. However, he only made two first-class appearances in 2005. His most recent non first-class appearance was at Lord's in June 2007, when he took 2 for 35 for the Marylebone Cricket Club (MCC) against a European XI. Since retiring from first-class cricket Hutchison has been involved in cricket at varying levels. He is the former head coach to the Swedish Cricket Federation, is an active scout for one of the 18 first-class Counties and spent time as cricket chairman at Pudsey St Lawrence Cricket Club and New Farnley Cricket Club in the Bradford Premier League. Hutchison was appointed as director of cricket and men's head coach at Jersey in March 2024.
WIKI
Page:Bird Life Throughout the Year (Salter, 1913).djvu/212 146 rocky ledges guillemots and razorbills swarm like bees, outlying hummocks capped with peat in which are the burrows of shearwater and petrel and the far western, sea-girt haunts of gannet and fulmar. All these varied scenes of bird-life, often in wild and picturesque setting, may be found around our shores. We may take our stand upon the bold chalk cliffs of Flamborough, which front the North Sea like a great white wall and overlook its restless waves from such a height that they are dwarfed to a tracery of finest ripples. Or we may stand where the grim overhanging front of Spanish Head, with its memories of the ruined Armada, looks across the narrow sound to the Calf of Man. Or shall we choose some remote spot upon the coast of Western Wales where rent and twisted strata, stacks and natural arch combine to form rock scenery of wild and varied type? As each swell passes, the water gurgles and spurts from a blowhole, and its hoarse, hollow murmur is heard as it ebbs and flows into dismal caverns haunted by otter and seal. Not less suited to our purpose are parts of the Irish coast, where the black and jagged cliffs are brilliant with patches of the white campion, sulphur kidney-vetch or rose sea-pink. To enjoy a general survey of such a sea-bird colony we must take a boat and cruise along the foot of the cliffs. Earth, air and water teem with birds. Heavy
WIKI
CountIF + Expressions • I am trying to count the number of cells with a date within the last 7 days. CountIF supposedly supports expressions, but I cannot get it to recognize the following: COUNTIF(J1:J80,"&gt;(Today()-7)") The function will will work if I enter the date I want to see if the field is greater than =COUNTIF(J14:J31,"&gt;01/01/2003"), but I want the date to change for the current day... Plz advise... I've got a solution that works, but it involves setting a cell to Today()-7 and then entering: =COUNTIF('1.4A'!J2:J31,A9) + COUNTIF('1.4A'!J14:J31,A10) + COUNTIF('1.4A'!J14:J31,A11) + COUNTIF('1.4A'!J14:J31,A12) + COUNTIF('1.4A'!J14:J31,A13) + COUNTIF('1.4A'!J14:J31,A14+'1.4A'!G58) + COUNTIF('1.4A'!J14:J31,A15) + COUNTIF('1.4A'!J14:J31,A16) but I don't like this impletmentation.... • Hi, you wrote: "but I don't like this impletmentation...." Wow, can't blame you for that!! Try this syntax based on your original formula: =COUNTIF(J1:J80,"&gt;"&TODAY()-7) Tom Urtis • One more thing and then I'll take a refresher course.... How can I make Excel count the cells as described in the original post AND only count them if another cell has a value.. So... COUNT J1:J80 WHERE J1:J80=Today()-7 AND F1:F80=Pending so only count the cells that are within the last seven days and Pending. • Quote Originally posted by Anonymous One more thing and then I'll take a refresher course.... How can I make Excel count the cells as described in the original post AND only count them if another cell has a value.. So... COUNT J1:J80 WHERE J1:J80=Today()-7 AND F1:F80=Pending so only count the cells that are within the last seven days and Pending. for multiple criteria, you'll probably need =SUMPRODUCT (for ease) or need to take a look at Excel's Database functions (all proceeded with D.... ie DCOUNTA, DSUM etc etc) if you want some serious info without performance degredations... however : sumproduct : =SUMPRODUCT((J1:J80=TODAY()-7)*(F1:F80="Pending")) for an ameuter explanation of what this formula is actually doing in the background, see the earlier thread : http://www.ozgrid.com/forum/viewthread.php?tid=220 Participate now! Don’t have an account yet? Register yourself now and be a part of our community!
ESSENTIALAI-STEM
Keep Moving (EP) Keep Moving is the debut solo extended play (EP) by Australian musician Andrew Stockdale. Recorded throughout 2012 and 2013 in Byron Bay, the EP features four songs from Stockdale's debut solo album of the same name. It was released by Universal on 26 April 2013 in Australia, Germany and Austria, on 28 April in the United Kingdom and the rest of Europe, and on 30 April in the United States. Personnel * Andrew Stockdale – vocals, guitars, organ (track 3) * Ian Peres – bass, organ and Wurlitzer electric piano (track 1) * Elliott Hammond – Wurlitzer electric piano and bongos (track 1), drums (track 3) * Vin Steele – rhythm guitar (tracks 1 and 4) * Hamish Rosser – drums (tracks 1 and 4) * Will Rockwell-Scott – drums (track 2) * Alex "Rudy" Markwell – rhythm guitar (track 3)
WIKI
SenseTalk Date and Time Formats SenseTalk's mechanism for formatting date and time values, and for recognizing dates and times displayed in different configurations (i.e., 1/7/19 or Jan. 7, 2019), uses format strings based on the formats established by the International Components for Unicode (ICU) standard. You can learn about this standard in the ICU User Guide. In SenseTalk, date and time format strings are used by the formattedTime function, in the timeFormat global property and the timeInputFormat global property, and in a variable's format property. SenseTalk accepts and supports three different methods of defining a date/time format: • Bracket style: Tokens enclosed in square brackets, [ and ]. Examples: [year], [weekday] This style is used in all of SenseTalk's built-in formats, such as those in the timeFormat and the timeInputFormat global properties. • Percent style: Tokens identified by the percent character, %. Examples: %Y, %A Note that this style is used by the strftime function in other programming languages such as C, Python, and PHP. • Unicode style: Tokens as defined by the ICU standard. Examples: yyyy, EEEE These date/time formats are compatible with a wide range of other software that also uses the ICU libraries. Each of the following examples results in a date in this format: April 8, 2019 10:04:37 • Bracket format: [month name] [day], [year] [hr]:[mi]:[se] • Percent format: %B %e, %Y %H:%M:%S • Unicode format: MMMM d, yyyy HH:mm:ss Any characters you include in a date/time definition string in addition to tokens are treated as literal. In the examples above for each format, spaces, the comma (,), and colons (:) are placed between tokens where they need to appear in the formatted date/time sequence. Date and Time Definitions The table below shows the specific tokens needed to define each part of a date/time sequence in various formats. The Displays column shows what each token displays for the date: January 7, 2019 2:34:56.01234567 p.m. Bracket Style Percent Style Unicode Style Displays Description [year] %Y yyyy 2019 The full year (4-digit year number) [yr] %y yy 19 The last 2 digits of the year (always 2 digits, with leading zero for years 1-9) [y] %1y y 2019 The year number (1 or more digits) (Note: [y] and y might not behave exactly the same as %1y in all cases.) [long monthName] [monthName] [long month] %B MMMM January The full month name [mon] [abbreviated monthName] [abbrev monthName] [abbr month] %b MMM Jan The abbreviated month name (first 3 characters of the name) [month] [m] %1m M 1 The month number (1 or 2 digits) [short month] [mo] [short monthName] %m MM 01 The month number (always 2 digits, with leading zero for months 1-9) [day] [d] %1d %e d 7 The day of the month (1 or 2 digits) [da] %d dd 07 The day of the month (always 2 digits, with leading zero for days 1-9) [era]   G AD The abbreviated name of the era (BC or AD) [eraName]   GGGG Anno Domini The full name of the era [weekday] [weekday name] [long weekday] [long weekdayName] %A EEEE Monday The full name of the day of the week [wkday] [abbr(ev(iated)) weekday] [abbr(ev(iated)) weekdayName] %a E Mon The abbreviated name of the day of the week (first 3 characters) [short weekday] [short weekdayName]   EEEEEE Mo The short abbreviation of the day of the week (first 2 characters) [dayOfWeek] %w e 2 The number of the day of the week, from 1 to 7. The number 1 represents the local starting day of the week (which can vary depending on system settings). For this example, Sunday is the first day of the week. [am] [pm] %p a PM The period of the day (AM or PM) [hour] [hour24] %1H H 14 The hour of day using a 24-hour clock (from 0 to 23) [hr] [hr24] %H HH 14 The hour of day using a 24-hour clock (from 00 to 23, always 2 digits, with leading zero for hours 0-9) [hour12] %1I h 2 The hour of day using a 12-hour clock (from 1 to 12) [hr12] %I hh 02 The hour of day using a 12-hour clock (from 01 to 12, always 2 digits, with leading zero for hours 1-9) [minute] [min] %1M m 34 The minute of the hour (from 0 to 59) [mi] %M mm 34 The minute of the hour (from 00 to 59, always 2 digits, with leading zero for minutes 0-9) [second] [sec] %1S s 56 The second of the minute (from 0 to 59) [se] %S ss 56 The second of the minute (from 00 to 59, always 2 digits, with leading zero for seconds 0-9) [millisecond] %F SSS 012 The millisecond (thousandth of a second) within the second (from 000 to 999, always 3 digits) [nanosecond]   SSSSSS 012346 The nanosecond (millionth of a second) within the second (from 000000 to 999999, always 6 digits) [timeZone] %z ZZZ 0800 The time zone offset from GMT in hours and minutes (±hhmm) [short timeZone]   x 08 The time zone offset from GMT in hours (and minutes if not zero) [long TimeZone]   ZZZZ GMT-08:00 Long localized GMT offset in hours and minutes (GMT±hh:mm) [timeZone ID] [long timeZone ID] %Z VV America/Los Angeles Long time zone identifier [short timeZone ID]   V uslax Short time zone identifier [timeZone City]   VVV Los Angeles Time zone exemplar city [timeZoneName]   vvvv Pacific Time Time zone generic name [short timeZoneName]   v PT Time zone generic abbreviation [long timeZoneName]   zzzz Pacific Standard Time Time zone specific name [abbr(ev(iated)) timeZone Name]   z PST Time zone specific abbreviation [timeZoneISO]   XX -0800 or Z The time zone offset from GMT in hours and minutes (±hhmm) or Z for zero offset [short timeZoneISO]     -08 or Z The time zone offset from GMT in hours (and minutes if not zero) or Z for zero offset [long timeZoneISO]     -08:00 or Z The time zone offset from GMT in hours and minutes (±hh:mm) or Z for zero offset [dayOfYear] %1j D 7 The day of the year (from 1 to 366) [dayOfYear3] %j DDD 007 The day of the year (from 001 to 366, always 3 digits) [weekYear]   YYYY 2019 The year number in Week of Year* calculations. This is the year used in the ISO year-week calendar as defined by ISO 8601. The value might be different from the calendar year for dates that are within the first or last 3 days of the year. [weekOfYear]   w 2 The week number within the year (from 1 to 52 or 53)* [wkOfYear]   ww 02 The week number within the year (from 1 to 52 or 53, always 2 digits, with leading zero for weeks 0-9)* [weekOfMonth]   W 2 The week number within the month (from 1 to 5)* [dayOfWeekInMonth]   F 1 The ordinal number of the weekday within the month (from 1 to 5). In this example, the value 1 indicates that January 7, 2019, is the first Monday of the month.*   %c     The complete localized date and time   %x     The localized date   %X     The localized time ['quoted']   'quoted' quoted When using the bracket style, anything outside of [ ] is always literal, so this is needed only to treat text containing square brackets as literal (extremely rare). * Week Of Year Values calculated for the [weekYear], [weekOfYear], or [wkOfYear] fields first determine which week of the year a date falls within, from 1 to 53. Week 1 for a year is the week that contains at least 4 days in that year (or in other words, that contains January 4 of that year). For example, because January 1 of 2019 fell on a Tuesday, week 1 of that year encompasses the dates from December 30, 2018 (Sunday), through January 5, 2019 (Saturday). Weeks between week 1 of one year and week 1 of the following year are numbered sequentially from 2 to 52 or 53 (if needed). The [weekYear] of December 30 and 31 of 2018 is therefore 2019, not 2018, because those days fall within the first week of 2019. Values are similarly calculated for [weekOfMonth] and [dayOfWeekInMonth].   This topic was last updated on October 29, 2020, at 05:16:37 PM. Eggplant icon Eggplantsoftware.com | Documentation Home | User Forums | Support | Copyright © 2020 Eggplant
ESSENTIALAI-STEM
Chupador River The Chupador River is a river of Paraná state in southeastern Brazil. It is a tributary of the Corumbataí River at the junction of Iretama, Barbosa Ferraz and São João do Ivaí municipalities.
WIKI