Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Passive Attenuator Basics An Attenuator is a special type of electrical or electronic bidirectional circuit made up of entirely resistive elements. An attenuator is a two port resistive network designed to weaken or “attenuate” (hence their name) the power being supplied by a source to a level that is suitable for the connected load. A passive attenuator reduces the amount of power being delivered to the connected load by either a single fixed amount, a variable amount or in a series of known switchable steps. Attenuators are generally used in radio, communication and transmission line applications to weaken a stronger signal. The Passive Attenuator is a purely passive resistive network (hence no supply) which is used in a wide variety of electronic equipment for extending the dynamic range of measuring equipment by adjusting signal levels, to provide impedance matching of oscillators or amplifiers to reduce the effects of improper input/output terminations, or to simply provide isolation between different circuit stages depending upon their application as shown. Attenuator Connection attenuator connection   Simple Attenuator Networks (also known as “pads”) can be designed to produce a fixed degree of “attenuation” or to give a variable amount of attenuation in pre-determined steps. Standard fixed attenuator networks generally known as an “attenuator pad” are available in specific values from 0 dB to more than 100 dB. Variable and switched attenuators are basically adjustable resistor networks that show a calibrated increase in attenuation for each switched step, for example steps of -2dB or -6dB per switch position. Then an Attenuator is a four terminal (two port) passive resistive network (active types are also available which use transistors and integrated circuits) designed to produce “distortionless” attenuation of the output electrical signal at all frequencies by an equal amount with no phase shift unlike a passive type RC filter network, and therefore to achieve this attenuators should be made up of pure non-inductive and not wirewound resistances, since reactive elements will give frequency discrimination. Simple Passive Attenuator simple passive attenuator Attenuators are the reverse of amplifiers in that they reduce gain with the resistive voltage divider circuit being a typical attenuator. The amount of attenuation in a given network is determined by the ratio of: Output/Input. For example, if the input voltage to a circuit is 1 volt (1V) and the output voltage is 1 milli-volt (1mV) then the amount of attenuation is 1mV/1V which is equal to 0.001 or a reduction of 1,000th. However, using voltage, current or even power ratios to determine or express the amount of attenuation that a resistive attenuator network may have, called the attenuation factor, can be confusing, so for the passive attenuator its degree of attenuation is normally expressed using a logarithmic scale which is given in decibels (dB) making it easier to deal with such small numbers. Degrees of Attenuation An attenuators performance is expressed by the number of decibels the input signal has decreased per frequency decade (or octave). The decibel, abbreviated to “dB”, is generally defined as the logarithm or “log” measure of the voltage, current or power ratio and represents one tenth 1/10th of a Bel (B). In other words it takes 10 decibels to make one Bel. Then by definition, the ratio between an input signal (Vin) and an output signal (Vout) is given in decibels as: Decibel Attenuation decibel attenuation Note that the decibel (dB) is a logarithmic ratio and therefore has no units. So a value of -140dB represents an attenuation of 1:10,000,000 units or a ratio of 10 million to 1!. In passive attenuator circuits, it is often convenient to assign the input value as the 0 dB reference point. This means that no matter what is the actual value of the input signal or voltage, is used as a reference with which to compare the output values of attenuation and is therefore assigned a 0 dB value. This means that any value of output signal voltage below this reference point will be expressed as a negative dB value, ( -dB ). So for example an attenuation of -6dB indicates that the value is 6 dB below the 0 dB input reference. Likewise if the ratio of output/input is less than one (unity), for example 0.707, then this corresponds to 20 log(0.707) = -3dB. If the ratio of output/input = 0.5, then this corresponds to 20 log(0.5) = -6 dB, and so on, with standard electrical tables of attenuation available to save on the calculation. Passive Attenuators Example No1 A passive attenuator circuit has an insertion loss of -32dB and an output voltage of 50mV. What will be the value of the input voltage. attenuator calculation   The antilog (log-1) of -1.6 is given as: attenuator antilog   Then if the output voltage produced with 32 decibels of attenuation, an input voltage of 2.0 volts is required. Attenuator Loss Table Vout/Vin 1 0.7071 0.5 0.25 0.125 0.0625 0.03125 0.01563 0.00781 Log Value 20log(1) 20log (0.7071) 20log (0.5) 20log (0.25) 20log (0.125) 20log (0.0625) 20log (0.03125) 20log (0.01563) 20log (0.00781) in dB’s 0 -3dB -6dB -12dB -18dB -24dB -30dB -36dB -42dB   and so on, producing a table with as many decibel values as we require for our attenuator design. This decrease in voltage, current or power expressed in decibels by the insertion of the attenuator into an electrical circuit is known as insertion loss and minimum loss attenuator designs match circuits of unequal impedances with a minimum loss in the matching network. Now that we know what a passive attenuator is how it can be used to reduce or “attenuate” the power or voltage level of a signal, while introducing little or no distortion and insertion loss, by an amount expressed in decibels, we can begin to look at the different attenuator circuit designs available. Passive Attenuator Designs There are many ways in which resistors can be arranged in attenuator circuits with the Potential Divider Circuit being the simplest type of passive attenuator circuit. The potential or voltage divider circuit is generally known as an “L-pad” attenuator because its circuit diagram resembles that of an inverted “L”. But there are other common types of attenuator network as well such as the “T-pad” attenuator and the “Pi-pad” (π) attenuator depending upon how you connect together the resistive components. These three common attenuator types are shown below. Attenuator Types attenuator types The above attenuator circuit designs can be arranged in either “balanced” or “unbalanced” form with the action of both types being identical. The balanced version of the “T-pad” attenuator is called the “H-pad” attenuator while the balanced version of the “π-pad” attenuator is called the “O-pad” attenuator. Bridged T-type attenuators are also available. In an unbalanced attenuator, the resistive elements are connected to one side of the transmission line only while the other side is grounded to prevent leakage at higher frequencies. Generally the grounded side of the attenuator network has no resistive elements and is therefore called the “common line”. In a balanced attenuator configuration, the same number of resistive elements are connected equally to each side of the transmission line with the ground located at a center point created by the balanced parallel resistances. Generally, balanced and unbalanced attenuator networks can not be connected together as this results in half of the balanced network being shorted to ground through the unbalanced configuration. Switched Attenuators Instead of having just one attenuator to achieve the required degree of attenuation, individual attenuator pads can be connected or cascaded together to increase the amount of attenuation in given steps of attenuation. Multi-pole rotary switches, rocker switches or ganged push-button switches can also be used to connect or bypass individual fixed attenuator networks in any desired sequence from 1dB to 100dB or more, making it easy to design and construct switched attenuator networks, also known as a step attenuator. By switching in the appropriate attenuators, the attenuation can be increased or decreased in fixed steps as shown below. Switched Attenuator switched attenuator   Here, there are four independent resistive attenuator networks cascaded together in a series ladder network with each attenuator having a value twice that of its predecessor, (1-2-4-8). Each attenuator network may be switched “in” or “out” of the signal path as required by the associated switch producing a step adjustment attenuator circuit that can be switched from 0dB to -15dB in 1dB steps. Therefore, the total amount of attenuation provided by the circuit would be the sum of all four attenuators networks that are switched “IN”. So for example an attenuation of -5dB would require switches SW1 and SW3 to be connected, and an attenuation of -12dB would require switches SW3 and SW4 to be connected, and so on. Attenuator Summary • An attenuator is a four terminal device that reduces the amplitude or power of a signal without distorting the signal waveform, an attenuator introduces a certain amount of loss. • The attenuator network is inserted between a source and a load circuit to reduce the source signal’s magnitude by a known amount suitable for the load. • Attenuators can be fixed, fully variable or variable in known steps of attenuation, -0.5dB, -1dB, -10dB, etc. • An attenuator can be symmetrical or asymmetrical in form and either balanced or unbalanced. • Fixed attenuators also known as a “pad” are used to “match” unequal impedances. • An attenuator is effectively the opposite of an amplifier. An amplifier provides gain while an attenuator provides loss, or gain less than 1 (unity). • Attenuators are usually passive devices made to from simple voltage divider networks. The switching between different resistances produces adjustable stepped attenuators and continuously adjustable ones using potentiometers. To simplify the design of the attenuator, a "K" (for constant) value can be used. This "K" value is the ratio of the voltage, current or power corresponding to a given value of dB attenuation and is given as: K factor equation We can produce a set of constant values called “K” values for different amounts of attenuation as given in the following table. Attenuator Loss Table dB 0.5 1.0 2.0 3.0 4.0 5.0 6.0 10.0 20.0 “K” value 1.0593 1.1220 1.2589 1.4125 1.5849 1.7783 1.9953 3.1623 10.000 and so on, producing a table with as many “K” values as we require. Fixed value attenuators, called “attenuator pads” are used mainly in radio frequency (Rf) transmission lines to lower voltage, dissipate power, or to improve the impedance matching between various mismatched circuits. Line-level attenuators in pre-amplifier or Audio Power Amplifiers can be as simple as a 0.5 watt potentiometer, or voltage divider L-pad designed to reduce the amplitude of an audio signal before it reaches the speaker, reducing the volume of the output. In measuring signals, high power attenuator pads are used to lower the amplitude of the signal a known amount to enable measurements, or to protect the measuring device from high signal levels that might otherwise damage it. In the next tutorial about Attenuators, we will look at the most basic type of resistive attenuator network commonly called a “L-type” or “L-pad” attenuator which can be made using just two resistive components. The “L-pad” attenuator circuit can also be used as a voltage or potential divider circuit.   « | » 5 Responses to “Passive Attenuators” 1. mastura binte mozammel wonderful..this give me the answers what i want to know.. Reply Leave a Reply Your email address will not be published. Required fields are marked * 4 − four = You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>
ESSENTIALAI-STEM
Blood Bound Blood Bound may refer to: * Bloodbound, a Swedish power metal band * "Blood Bound" (song), a song by HammerFall
WIKI
Romi Romi is a given name and may refer to: * Romi Dames (born 1979), Japanese-American actress * Romi Garduce (born 1969), Filipino mountain climber and IT Professional in Procter and Gamble Philippines * Romi Goldmuntz (1882–1960), Belgian businessman who played an essential role in the survival of the diamond business in Antwerp * Romi Mayes, Canadian musician * Romi Park (born 1972), Japanese-Korean actress and voice actor * Romi Paritzki (born 2004), Israeli world champion rhythmic gymnast * Romi Ropati (born 1976), retired rugby union player best known for his time with the Highlanders Super Rugby franchise * Romi Spada, Swiss bobsledder who competed in the early 1950s
WIKI
This site is for customers in Japan. Customers in other regions, please go to Global page. HOME > FAQ > 【MHC Tetramer】MR1 Tetramer FAQ 【MHC Tetramer】MR1 1. What antibody do you use for co-staining? MAIT cells are known to express CD3, CD69, and CD161 on the surface. Staining with anti-CD3 antibody was used in our data collection process. 2. Are there any markers other than MR1 tetramer to detect MAIT cells? It has been reported that human MAIT cells express TCR Vα7.2. However, not all cells expressing TCR Vα7.2 are MAIT cells. 3. How long can the prepared ligand be stored before loading onto the MR1 Tetramer? Vitamin B2 metabolic intermediates are unstable in aqueous solutions. It is therefore recommended to prepare ligand solutions immediately before loading onto the tetramer. We checked tetramer staining using the MR1 Tetramer stored for 7 months after ligand loading, and the reactivity is reduced to less than a half comparing with the Tetramer whose ligand is loaded just before the assay. 4. How stable is the MR1 tetramer? We have confirmed a shelf life of up to 12 months. It is recommended that ligands are loaded just before use, and are subsequently analyzed as soon as possible. 5. What is the expected positive rate of MR1 Tetramer? When using a Tetramer staining enhancer, the positive rate is expected to be around only a few percent. However, variations may occur between individuals, and it could also happen that positive cells cannot be detected in some of the samples. Conversely, in some cases, a sufficient positive rate can be obtained without using an enhancer. In addition, the degree of non-specific background staining tends to vary greatly depending on the samples. When considering cell staining, we recommend that you use samples from as many donors as possible. FAQ 【MHC Tetramer】
ESSENTIALAI-STEM
Arthur McDonald Air Marshal Sir Arthur William Baynes McDonald, (14 June 1903 – 26 July 1996) was a senior Royal Air Force officer. He served as Commander-in-Chief of the Royal Pakistan Air Force from 1955 to 1957. Early life McDonald was born on 14 June 1903 in either South Africa or Antigua. His father was a British Army doctor who had served in the Second Boer War. He grew up on the Caribbean islands of Saint Kitts and Antigua, then members of the British West Indies. He was educated at Antigua Grammar School, before joining Epsom College, a public school in Surrey, England. He studied engineering at Peterhouse, Cambridge, graduating with a Bachelor of Arts (BA) degree: as per tradition, his BA was promoted to a Master of Arts (MA Cantab) degree. Military career On 15 March 1924, McDonald was commissioned into the General Duties Branch of the Royal Air Force (RAF) as a pilot officer on probation. His commission and rank were confirmed on 15 September 1924. He was promoted to flying officer on 15 October 1925. On 1 September 1928, he was granted a permanent commission. He was promoted to flight lieutenant on 13 October 1929. McDonald was appointed Officer Commanding No. 79 Squadron and then Officer Commanding No. 32 Squadron in 1937. He served in the Second World War as Assistant Director of Repair and Servicing at the Air Ministry and then on the staff at Headquarters Fighter Command, before becoming Air Defence Commander in Ceylon in 1942, Air Officer Training at Headquarters Air Command of South East Asia Command in 1943 and Air Officer Commanding No. 106 Group in April 1945. After the war, McDonald was appointed Commandant of the RAF Staff College, Andover and then Commandant of the Aeroplane and Armament Experimental Establishment before becoming Director-General of Manning in the rank of air vice marshal at the Air Ministry in 1952. In June 1955, McDonald became the fourth and last Commander-in-Chief of the Royal Pakistan Air Force. At the time of his retirement the Royal Pakistan Air Force became the Pakistan Air Force, and McDonald was succeeded in the command of the renamed force by Air Marshal Asghar Khan. McDonald's last appointments were as Air Officer Commanding-in-Chief at Technical Training Command in 1958 and as Air Member for Personnel in 1959 before retiring in 1962. Sailing A keen sailor, McDonald competed in the 1948 Summer Olympics. He represented Great Britain in the Firefly event. He came ninth out of 21 competitors. He later became Admiral of the RAF Sailing Association. Later life Following retirement, McDonald continued sailing, and was an active member of the Royal Lymington Yacht Club. He won his last race at the age of 92. He died on 26 July 1996, aged 93.
WIKI
Fifth Third Offers Early Retirement Buyouts to Cut Costs As part of its attempts to curb costs, Fifth Third BancorpFITB offered employees early retirement buyouts in the first quarter of 2016. The proposal was made to 775 employees out of the total 18,000 workforce in a Jan 4 email by the company. The news was reported by the Cincinnati Business Courier. While the deadline for accepting the deal is now over, several employees are said to have taken the offer to retire on Mar 31. However, the number of employees that took the buyout package and the money offered in exchange for it was not revealed by Fifth Third. Notably, other companies usually have a 15% acceptance rate, implying around 116 workers in this case. The company is expected to shell out more information about the buyout program when it reports first-quarter earnings on Apr 21. Details like related upfront costs, long-term expected savings and additional cost cuts associated with jobs will likely be disclosed then. The move marked Fifth Third's first early retirement buyout package to its employees. The program was voluntary and employees were not required to accept the packages. "We had an expectation for the program and our results met our expectations," the company spokesman Larry Magnesen said. "We believed it represented a good way for the bank to manage its costs effectively while offering flexibility for individuals to move forward with their life plans," he added. The buyout package was offered to specific employees based on their years of service and age. The bank's business needs were also taken into consideration to restrict the number of people that took the package. According to Magnesen, employees that took the early retirement buyout were offered optional transition assistance and job search coaching by the company. Around 40 workers have joined the job search coaching program. In case the company had not received enough acceptances for the early retirement program, it could have opted for layoffs as generally done in such processes. "The bank is carefully monitoring implementation and it has gone well," Magnesen said. "We will look at how it aligns with ongoing expense management." The buyout program seems logical in view of the company's higher expense base, which despite efficiency initiatives remains a major concern. Notably, total expense growth on a year-over-year basis is expected to be in the range of 4.5% to 5% in 2016, including an estimated impact of the proposed change in the FDIC assessment fee and the one-time impact of the early retirement offer. Such measures will help the company to keep a check on expenses. Currently, Fifth Third carries a Zacks Rank #4 (Sell). Some better-ranked banks include First NBC Bank Holding Company FNBC , Western Alliance Bancorporation WAL and Northrim Bancorp Inc. NRIM . All these stocks hold a Zacks Rank #2 (Buy). Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days . Click to get this free report >> Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report FIFTH THIRD BK (FITB): Free Stock Analysis Report WESTERN ALLIANC (WAL): Free Stock Analysis Report NORTHRIM BCP (NRIM): Free Stock Analysis Report FIRST NBC BANK (FNBC): Free Stock Analysis Report To read this article on Zacks.com click here. Zacks Investment Research The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
NASA SBIR 02-1 Solicitation FORM B - PROPOSAL SUMMARY PROPOSAL NUMBER:02- B1.01-9762 (For NASA Use Only - Chron: 022237 ) SUBTOPIC TITLE: Exploiting Gravitational Effects for Combustion, Fluids, Synthesis, and Vibration Technology PROPOSAL TITLE: Void Fraction Sensor for Packed-Bed Reactors in Microgravity SMALL BUSINESS CONCERN (Firm Name, Mail Address, City/State/Zip, Phone) Creare Inc P.O. Box 71 Hanover , NH   03755 - 0071 (603 ) 643 - 3800 PRINCIPAL INVESTIGATOR/PROJECT MANAGER (Name, E-mail, Mail Address, City/State/Zip, Phone) Christopher J. Crowley amh@creare.com P.O. Box 71 Hanover , NH   03755 - 0071 (603 ) 643 - 3800 TECHNICAL ABSTRACT (LIMIT 200 WORDS) The innovative product resulting from this project is an instrument to measure void fraction in packed-bed reactors. As NASA pursues long-duration crewed missions, it will be necessary to adapt packed-bed chemical processing methods to reduced gravity to minimize the mass and volume of consumables carried from earth. Accurate measurement of void fraction is critical to (1) identify the flow regimes, and (2) quantify the liquid holdup for design and performance calculations. At present, there is no simple, easy-to-use instrument for microgravity. Capacitance-based sensors have several advantages including the potential to be very sensitive to liquid held up in the reactor, not intrude into the flow, and provide high rates of data sampling. With the conductive fluids used in reactors, a new signal-conditioning scheme is needed for capacitance-based measurements of void fraction. We will develop the new signal-conditioning scheme with an adapted version of a unique capacitance sensor previously developed at Creare. During Phase I we will prove the feasibility of the new signal-conditioning electronics using a multiphase flow facility. During Phase II we will develop the electronics package, adapt the sensor mechanical design to the configuration of packed-bed reactors, and demonstrate the prototype under packed-bed flow conditions. POTENTIAL COMMERCIAL APPLICATIONS (LIMIT 150 WORDS) A void fraction instrument capable of being used with conductive fluids has numerous industrial and research applications in many areas including chemical processing facilities, biotechnology, and pharmaceutical manufacturing. Our innovative electronics will also optimize the performance of the void fraction instrument for use with cryogenic fluids where the relative permittivity of the liquid is low. There are a host of industrial and aerospace applications where this capability is needed. POTENTIAL NASA APPLICATIONS (LIMIT 150 WORDS) Crewed space activities depend upon the development of packed-bed reactors for regenerative life support systems for extraction, absorption, humidification, leaching, etc. In addition to this primary application, the same innovative electronics approach that will enable operation with conductive fluids will also optimize the sensor performance with cryogenic fluids. NASA has many obvious potential applications for this technology in propellant transfer applications and in the operation of systems that use these fluids. Form Printed on 09-05-02 10:10
ESSENTIALAI-STEM
Abide "required" default behavior Here follows a rather basic question about Abide data validation. I’m new on the forum and hope I’m not asking a question that has been beaten to death already. I didn’t find it in the search. Suppose I set a field to be validated with: <input type="text" pattern="number" placeholder="Spouse Name" required> and this field gets shown or hidden on the form depending on user actions. Is it correct that Abide’s default behavior is to ignore the “required” attribute on this field when it is not visible, so it will not block form submission when it is hidden? Or does one have to do something special to prevent Abide from blocking form submission when a field is marked “required” and it is both empty and invisible? (Thanks!) See the valid solutions at https://get.foundation/sites/docs/abide.html#ignored-inputs Daniel – Thanks for replying to my question. I’m seeing in the examples that you linked (“ignored inputs”) that any input with type=“hidden” will be ignored. What about other cases? Suppose the input is not so marked, but is marked as style=“display: none;” or is in a div that is marked as style=“display: none”, etc. (style=“visibility: hidden;”). Is there any magic here, that allows Abide to ignore all inputs that are not shown on the form, or do I need to supply some logic in javascript or jquery that ensures that type=“hidden” is set? Then it will be (probably) not ignored. I see no .is(':visible') in our code which would cover this case. Probably, yes. 1 Like Thank you. That clarifies it for me. Armed with this, I can make my form behave correctly.
ESSENTIALAI-STEM
Welcome BoltWire is a FREE content management system written in PHP. Its innovative architecture combined with best-in-class forms processing gives surprizing power in the tiniest of footprints. Our software is ideal for creating complex, interactive, web applications fast... Commands Documentation > Handbook > Commands Commands are used to process form input and create various effects. Here's a list of commands currently available in BoltWire. Click one for more info: Authkey Create Csv Delete Edit If Index Info List Log Login Logout Mail Math Memberships Msg Nextpage Passdata Register Rename Reset Savedata Search Source Stamp Time Translate Unstamp Upload Warn Functions vs Commands Commands and functions are similar in BoltWire. The difference is that functions are processed immediately when a page loads, whereas commands are processed only after the form containing them submits. Consider the following example: [(mail to=somewhere@boltwire.com from={~email} subject='I visited page {p}' body=template.mail)] This is a function--causing an email to be sent by simply viewing the page it is written on. Everytime you revisit or reload the page, another email is sent. It gets the return email address from the user's member page--assuming that information is stored there as a data variable. The page name will be showed in the subject line. The body of the message comes from a template. A command allows you receive data from the user and then send the mail only after they submit that information. Here is a more useful example: [form] Subject: [text subject] Message: [box message rows=5 cols=50][box] [submit] [command mail to=somewhere@boltwire.com from={~email} subject={=subject} body={=message)] [form] It looks similar to the function, but it inserts the subject and message supplied by the user into the email. I could have gotten the "from" email from a text input field if desired, but decided to use one already in the system. Constructing Commands A command is used in a form and always begins with the word "command" followed by the name of the command. If there is an underscore in the command name, only the part of the command up to the underscore is used. This allows you to use the same command multiple times. For example: [command log_1 'some text' page=some.page] [command log_2 'other text' page=other.page] Note: the extension is only needed if you need to refer to the output of a specific command elsewhere in the form. BoltWire can otherwise keep each command separate with no problem. You can put as many parameters in a command as desired and all are passed to the command function, but the first parameter (or the "value" parameter) is given special priority in most commands. In other words, the following two commands are essentially the same: [command delete some.page] [command delete value=some.page] If there are spaces in the value (or any parameter argument) be sure to enclose it with quote marks. Using Commands When a form is submitted, BoltWire goes through a process to ensure the form is legitimate, and then filters and validates the input fields for security purposes and according to your instructions. See the forms tutorial for more information on this process. Then BoltWire begins to execute the commands in the order they appear in the form. Most commands return some value to the command which can then be used in future commands. Essentially you are writing a little script. Consider this example: [form] My favorite color today: [text color] [submit] [command time %x] [command log '{=time}: {=color}' page=log.color] [form] In this example, the user enters a color and the form is submitted. BoltWire then calculates today's date in the format 'MM/DD/YY' (see PHP's strftime function) and stores that value in the time command. Next the log command retrieves the time and color values and appends them to the specified page. That is log.color will be filled with lines that each look something like "05/23/14: Blue". Complex Forms Most forms in BoltWire are very simple. It's just a question of learning how each command works and supplying the correct parameters. However, there is no real limit to the complexity of the forms you can create with the ZAP form processor. Suppose you are doing a complex form but the final output is not working right--and you want to debug a specific line. You can use the warn command to peek at the value of a command at any time. In the example above, we could verify the time command is generating the right value by adding this line: [form] My favorite color today: [text color] [submit] [command time %x] [command warn {=time}] [command log '{=time}: {=color}' page=log.color] [form] Once it is verified you would delete the warn command or move it to check a different value or a command's value at a different point in the form execution. If you thought the log command was changing the time command in some way, you could move the warn command immediately after the log command to show its state at that point in the form processing. You would, of course, find it unchanged in the example above. Pages and Commands When you submit a form, it reloads the same page by default after the various commands are performed. If you wish to have the user forwarded to a different page, such as a thank you page or submission confirmation page add the following line: [command nextpage next.page] If the form aborts for some reason, the browser will NOT advance to the next page, but reload the form. This is usually the desired behavior, but you could use an abort conditional and a forwarding function if desired. For example: [form] Enter some text: [text field required=true] [submit] [command nextpage some.page] [form] [if abort]<(forward error.page)>[if] If a user enters content and hits submit, they are forwarded to some.page. If they try to submit the form with no content, the form aborts when it sees required=true, and the page is reloaded. The abort conditional sees that the form submission failed, and the user is forwarded to the error page. Page Shortcuts Page shortcuts are automatically applied to the value of any command that ends with the letters 'page', and to the arguments of a page parameter in any command. Page shortcuts are a special shorthand used within BoltWire to refer to specific pages. Here is the list: .page {p1}.page ..page {p1}.{p2}.page forum.+ forum.1521552319 (timestamp) ^ {id} ~bob member.bob @admin group.admin !edit action.edit forum.# forum.1000 (or next available number) So this command would create a new forum page: [command create {=content} page=forum.#] This line would forward a user to their member page: [command nextpage ~^] Action Pages Action pages are normal pages that can be called in special ways. They often contain forms because of their special properties. If you call a page, say action.newpost, the browser will display whatever is on that page and treat the page variables as you would expect. If there were a form on this page, it would reload the same page when submitted, unless you set the nextpage value to some other page. Because it is an action page, however, you can call it as an action and display it on top of another page. For example, if you pointed your browser to forum.1000&action=newpost, you would see the contents of action.newpost, but BoltWire would treat page variables as if you were on forum.1000. When you submitted the page, it would also revert to the underlying page (forum.1000). This makes action pages extremely useful. Consider the following form which might appear on action.newpost, and notice how simplified it becomes: [form] Title: [text title '{:title}'] Content: [box content cols=40 rows=5]<(source {p})>[box] [submit] [command savedata title] [command edit {=content}] [form] First, the title data variable does not need to have the page specified, it will load the title of whatever happens to be the underlying page. The same with the source function, which preloads the content of the forum page into the content box. You simply point it to the current page. Similarly, you do not have to specify the target pages for the savedata and edit commands--it automatically goes to the right location. To avoid overwriting the action page by accidentally calling it directly (ie action.newpost), you could add a simple line like the following: [if equal {p} action.newpost]<(forward error.page)>[if] Better still, to limit this to forum pages--consider this conditional: [if ! equal {p1} forum || ! number {p2}]<(forward error.page)>[if] Advanced Command Features BoltWire has a number of advanced features connected with commands worth mentioning here. Some are slightly experimental or only work in certain situations. Use with caution. 1) Conditionals. You can add a conditional parameter to any command except for list, info. In the example below, the command only processes if the current use is Bob. IE, only Bob can create the new forum page. [command create {=content} page=forum.# if='equal {id} bob'] 2) Translations. Suppose you are using a French language file. Command names are automatically converted from French to English. So [command creer...] is read as if it were [command create...]. 3) Stop Watch. You can test how long it takes to perform the various commands in your form by setting $BOLTstopWatch to 'commands' in index.php before calling the engine. To see all commands and functions set it to 'all'. To only see functions set it to 'functions'. For commands, you also have to abort the form before it completes or the stopwatch results will disappear when the page reloads. The easiest way to do this is to temporarily add [command warn 'Abort for stopwatch'] just before the close of the form. If you want to report the time for specific commands/functions, set $BOLTstopWatch to 'true' (or one of the other options) and then add stopwatch=true as a parameter to any command or function you wish. The times will appear immediately after the line that says "Page construction begun". 4) Output. You can modify the output of a command (the value passed back to the command after processing) by setting an output parameter to one of several options: output=false supresses all output. output=html returns the escaped html of the normal output. output=nolines replaces line breaks with a single space. output=csv replaces line breaks with commas to generate a csv list. 5) Escape. This can be set to true or false. Some commands return escaped values, and some do not. In certain cases you may wish to override the default behavior. For example, if you are using the output of one command that returns an escaped value as a parameter in a another command, the output will likely be garbled, because it doesn't have access to the raw data. Or if the output of a command contains unescaped markup that you want escaped for some reason, you can escape it. In most cases the default behavior is fine. Toolmapping. Toolmapping allows you to point a core command to a custom script, effectively overwriting the default behavior of the command. Suppose you wanted to customize how the login command works. Simply add the following line to index.php or config.php or a plugin, and when the login command is called, BoltWire will reroute the parameters to BOLTXmylogin (your script), rather than BOLTXlogin (the default script): $BOLTtoolmap['x']['login'] = 'mylogin'; It also works the opposite way. The following line would essential create a new "mylogin" command that maps to the default login command and functions exactly the same: $BOLTtoolmap['x']['mylogin'] = 'login'; Toolmapping is a very powerful feature for customizing how BoltWire works. BoltWire can also remap functions (change the 'x' to 'f') and conditionals (change the 'x' to 'c'). Developer Information All the commands available to BoltWire are included in commands.php and they are arranged in alphabetical order. There is a complicated forms input markup in markups.php used to generate BoltWire forms. Forms processing is a somewhat involved process in BoltWire, handled by several functions in library.php, and various lines of code in engine.php. To develop a custom command simply create a function prefixed by BOLTX modeled on one similar to your needs. Then add it to the config.php file or a plugin. It then becomes instantly available to your site. Suppose you wanted to create a command that allowed a user to self-join some group, perhaps the chess club on your site. You could use the following php function and then supply the form below it. function BOLTXchessclub($args) {      global $BOLTid;      BOLTlog($BOLTid, 'group.chessclub', "\n", 'unique');      } [form] [submit 'JOIN CHESSCLUB'] [command chessclub] [form] You could of course do this with the log command using only core BoltWire functionality. This is just an example. If you create a custom command it can be combined with other commands and all of BoltWire's built in forms processing capabilities. This means to do something quite complex you probably only need to add one or two small pieces to BoltWire's already robust core. If BoltWire can't get you all the way to your goal, it can definitely help get you most of the way! If you develop an especially useful command consider posting it to our mailing list so we can put it in the Extensions area and share it with others.
ESSENTIALAI-STEM
File:Vietnam War survival knife.jpg Summary This was my father's survival knife that he carried during the Vietnam War.
WIKI
Beverly LAPREASE, Individually and on behalf of all other persons similarly situated, Plaintiffs, v. RAYMOURS FURNITURE COMPANY, Inc., Individually and on behalf of all other persons similarly situated, and Louis Engle and Patrick Corbett, individually and as non-judicial personnel and enforcement officers of the Courts of the State of New York and on behalf of all other persons similarly situated, Defendants. Clifford LAWSON, Judith Lawson and Joan Messier, on behalf of themselves and all other persons similarly situated, Plaintiffs, v. Michael GALVIN and Earl Stoddard, In their capacity as City Marshals of the City of Albany, on behalf of themselves and all others similarly situated, Edward M. Fischer, in his capacity as Sheriff of Albany County, on behalf of himself and all others similarly situated, and Louis J. Lefkowitz, in his capacity as Attorney General of the State of New York, Defendants. Nos. 70-CV-16, 70-CV-50. United States District Court, N. D. New York. July 29, 1970. Onondaga Neighborhood Legal Services, Inc., Syracuse, N. Y., for plaintiff Laprease; Barbara B. Gregg, Syracuse, N. Y., of counsel. Edward P. Kearse, Corp. Counsel, City of Syracuse, Syracuse, N. Y., for defendant Engle; Carl W. Dengel, Asst. Corp. Counsel, Syracuse, N. Y., of counsel. William H. Welch, Syracuse, N. Y., for defendant Corbett. Lawrence F. Klepper, Legal Aid Society of Albany, Inc., Albany, N. Y., for plaintiffs; Joel F. Spitzer, Albany, N. Y., Dennis B. Schlenker, Catskill, N. Y., David L. Corbin, Albany, N. Y., of counsel. John W. Hacker, Corp. Counsel, City of Albany, Albany, N. Y., for defendants Galvin and Stoddard; George N. Meyl, Albany, N. Y., of counsel. John J. Clyne, Albany County Atty., Albany, N. Y., for defendant Fischer. Louis J. Lefkowitz, pro se; John Q. Driscoll, Asst. Atty. Gen., of counsel. New York State Council of Retail Merchants, by Weil, Gotshal & Manges, New York City, amicus curiae. General Motors Acceptance Corp. by Ross L. Malone, Gen. Counsel, New York City, amicus curiae. C.I.T. Financial Corp. by Arthur L. B. Richardson, Gen. Counsel, New York City, amicus curiae. Ford Motor Credit Corp. by Wright Tisdale, Gen. Counsel, Dearborn, Mich., amicus curiae. Chrysler Credit Corp., by Bookstein, Zubres & D’Agostino, Albany, N. Y., amicus curiae. New York State Sheriff’s Assn, by Edward G. Dillon, Albany, N. Y., amicus curiae. New York State Bankers Assn, by Cravath, Swaine & Moore, New York City, amicus curiae; John W. Barnum, Richard S. Simmons, Howard G. Kristol, New York City, of counsel. White Motor Corp. by Lynn, Burke & Lynn, Albany, N. Y., amicus curiae; Morton M. Z. Lynn, Albany, N. Y., of counsel. Before FEINBERG, Circuit Judge, and FOLEY and PORT, District Judges. PORT, District Judge. In the above-entitled actions, consolidated for hearing, the plaintiffs seek to enjoin the defendants from enforcing Article 71 of the New York Civil Practice Law and Rules. That Article governs the procedure in a replevin action, and permits the prehearing seizure of the subject matter of the action without the intervention or order of a judicial officer. Temporary restraining orders were issued in each case restraining the defendants from making seizures pursuant to the provisions of Article 71 and three-judge courts were designated and convened pursuant to 28 U.S.C. § 2281 et seq. After hearing argument, the three-judge court in each case continued by stipulation injunction's against seizure from the named plaintiffs by the named defendants pursuant to the provisions of Article 71, except when done by an order of a judge or court of competent jurisdiction. The court also refused to continue the actions as class actions. It was stipulated upon the oral argument that the application for temporary and permanent injunctive relief be heard and decided upon the record before the court without the taking of any oral evidence. THE STATUTORY SCHEME Article 71 provides for the bringing of an action “to try the right of possession of a chattel,” historically known as a replevin action. It mandates that the Sheriff, upon delivery to him by the plaintiff in the action of an affidavit, undertaking and requisition [which is deemed to be the mandate of the court], seize the chattels described in the affidavit. If an action to recover the chattel has not been commenced, the statute requires that there be additionally delivered to him a summons and a complaint. The requisition directs the Sheriff of any county where the chattel is found, to seize it. The Sheriff is obliged to serve upon the person from whose possession the chattel is seized, “a copy of the affidavit, requisition and undertaking delivered to him by the plaintiff.” The statute does not by its terms require the Sheriff to serve the summons and complaint, which may have been delivered to him by the plaintiff-creditor. Moreover, the person in whose possession the chattel is found may not necessarily be a defendant in the action. Therefore there is no requirement that a summons and complaint be served upon the person from whose possession the chattel is taken, or upon anyone else at thé'time of such taking. Without fixing a time therefor, the statute requires that the affidavit, requisition and undertaking be served upon the defendants named in the action, unless the court otherwise orders. The affidavit to be delivered to the Sheriff, among other things, shall identify the chattel to be seized and state the value thereof. The undertaking is in a specified amount “not less than twice the value of the chattel stated in the plaintiff’s affidavit,” conditioned to secure the return of the chattel to any person to whom possession is awarded or the payment of a judgment against the person giving the undertaking. The Sheriff retains possession of the seized chattel for a period of three days after which he delivers it to the plaintiff, unless in the meantime a person claiming the right‘to possession has reclaimed the chattel by filing with the Sheriff a notice of reclaimer, an undertaking in the same amount as the plaintiff’s, and an affidavit similar to that required of the plaintiff. The Sheriff retains the chattel for three days after which he delivers it to the reclaimer. At any time the chattel is in the possession of the Sheriff, the chattel may be ordered impounded by the court on motion and cause shown. C.P.L.R. § 7110 provides that the Sheriff shall forcibly enter a building or enclosure in order to search for and seize the chattel. FACTS Briefly stated, the plaintiff Laprease alleges that the defendant Raymours Furniture Co., Inc., has delivered an affidavit, requisition, undertaking and summons and complaint to the defendant Engle, Marshal for the City of Syracuse, requiring him to seize a bed, box-spring and mattress, a highehair, a chest, an eleven piece dinette set, and other household furnishings. On January 19, 1970, the defendant Engle, accompanied by two representatives of the defendant Raymours, attempted to seize the above-mentioned articles and advised the plaintiff that if she did not release them a forcible entry into her apartment would be made. A representative of the defendant Raymours agreed to hold the seizure in abeyance upon certain specified payments being made by the plaintiff Laprease. Mrs. Laprease, however, states that she is on welfare and unable to make the required payments. Consequently, she alleges that she is in “immediate danger” of having these articles which are “necessary and essential for the healthy and proper living arrangements for herself, her [ill] husband and her ten children * * * forcibly and illegally seized.” Mrs. Laprease also alleges that she has lived in the State of New York all her life, in the City of Syracuse for the past 16 years, and at her present address for the past 7 years; that she has no intention of removing the chattels pending the outcome of the replevin action on the merits, and that she believes that she has a meritorious defense to the action; that a pretrial seizure would irreparably injure her in that she does not have money to post a bond to reclaim the chattels and that she is financially unable to replace them. She further alleges that the threatened action of the defendants Engle and Raymour place her in immediate danger of being subjected to an illegal search and seizure and a consequent unlawful invasion of her privacy. Clifford and Judith Lawson, plaintiffs in 70-CV-50, alleged that they reside with their children in the City of Albany; that their sole income consists of $77.00 a week derived from the employment of Clifford; that they have no assets other than the household furniture, including a stove and refrigerator, all of which was purchased “on time” from Henry S. Mantell Finer Furniture (Man-tell) in October of 1968; that payments of $40.00 bi-weekly, in accordance with a purchase agreement, were made for six weeks, at which time Clifford became ill. In March of 1969 a representative of Mantell’s promised that they would not repossess the chattels if the plaintiffs would pay $20 every two weeks. It is alleged that these payments were made; nevertheless, a representative of Man-tell’s delivered an affidavit, requisition, and undertaking together with a summons and complaint, to the Sheriff of Albany County pursuant to Article 71. On or about February 16, 1970, the Sheriff seized the goods pursuant to Article 71. The plaintiffs allege that they were not able, financially, to acquire a surety or to post a bond in order to reclaim the goods. On February 18, 1970, Chief Judge Foley signed a temporary restraining order directing the return of the Lawson’s chattels, and restraining further Article 71 action against them, pending the determination of the action. Plaintiff Messier resides in the Village of Green Island, Albany County, New York, with her children and is a recipient of Aid for Dependent Children public assistance, and has no income other than that provided by public assistance. Therefore, she alleges that it is impossible for her to post a bond or obtain a surety in order to reclaim. In September of 1968, Messier’s husband bought on time from Mantell’s certain kitchen furniture, a rug, three end-tables, lamps, a chair, and a record player. The husband stopped making payments on these goods in August of 1969. Thereupon, the plaintiff Messier entered into an oral agreement with Mantell’s whereby she became the owner of the goods and would undertake the remaining payments on a deferred basis. However, a representative of Mantell’s has informed her that they intend to repossess the goods and that if she doesn’t surrender them voluntarily, then they will get a “court order.” The defendants, Marshals and Sheriffs, are the officers obliged under Article 71 to execute the requisition which “shall be deemed the mandate of the court,” by seizing the chattels described in the affidavit; the other defendants are plaintiffs in the replevin actions, and also the Attorney General of the State of New York. Other purchasers of household articles “on time”, reciting circumstances similar to the named-plaintiffs in Laprease, withdrew their applications to intervene in that action upon the agreement of the vendors involved not to avail themselves of the prejudgment seizure provisions of Article 71. CONTENTIONS The plaintiffs contend that Article 71 is unconstitutional, in that: (1) It provides for a search and seizure and resultant invasion of privacy, without a warrant, in violation of the Fourth and Fourteenth Amendments; (2) It violates the Due Process Clause of the Fourteenth Amendment by providing for the taking of property prior to notice and hearing, and (3) It is violative of the Equal Protection Clause of the Fourteenth Amendment, since it allegedly is a law of general applicability which discriminates against those whose financial condition makes it impossible for them to file the undertaking required to repossess the chattels seized. The defendants, and principally the amici curiae counter that: (1) Article 71 does not deprive persons of their property without due process of law, pointing to the safeguards contained in the Article itself and to the approval which tradition and time have given to the replevin device; (2) Article 71 does not deprive litigants of the equal protection of the laws —it is contended that the inability of litigants to afford themselves of the Article’s safeguards because of their poverty does not of itself render the Article unconstitutional on equal protection grounds. The State is not constitutionally responsible for the economic inequality of the parties in civil matters, and (3) § 7110 of Article 71 does not offend the Fourth Amendment because (a) these are civil not criminal proceedings and the Amendment is not applicable, and (b) even if it is established that a search and seizure take place under Article 71, the same are not unreasonable. JURISDICTION Jurisdiction is alleged to be based upon 28 U.S.C. §§ 1343(3), 1343(4), 2201, 2202, 2281, 2284, and 42 U.S.C. § 1983. None of the parties have seriously questioned the court’s jurisdiction. Upon the oral argument, the court sua sponte, raised the question of whether Eisen v. Eastman, 421 F.2d 560 (2d Cir. 1969) was controlling and defeated jurisdiction because the actions might deal solely with property rights. Having considered the question, we hold Eisen, supra, inapposite. The Fourth Amendment question that is present in these cases is clearly a “right or immunity [involving] personal liberty, not dependent for its existence upon the infringement of property rights.” Eisen v. Eastman, 421 F.2d at 564, quoting from Hague v. C.I.O., 307 U.S. 496, 531, 59 S.Ct. 954, 83 L.Ed. 1423 (1939). In regard to the “personal liberty” aspect, see Monroe v. Pape, 365 U.S. 167, 81 S.Ct. 473, 5 L.Ed.2d 492 (1961). Further, “the instant actions allege deprivation of procedural due process, a civil right, which may ultimately lead to the loss of a property right,” and jurisdiction would also appear proper on-the due process contentions. Escalera v. New York City Housing Authority, 425 F.2d 853 (2d Cir. Apr. 29, 1970). In any event, since this court has jurisdiction over the Fourth Amendment claims, pendent jurisdiction over the due process and equal protection claims exists. FOURTH AMENDMENT CLAIMS If the restraints of the Fourth Amendment are held to apply to an action under Article 71, it would not require the citation of any authority to demonstrate that a search or seizure made pursuant to and in reliance upon the provisions of that Article, would violate that Amendment's constitutional protections. The commands of § 7110 that “[i]f a chattel is secured or concealed in a building or enclosure and is not delivered pursuant to his demand, the sheriff shall cause the building or enclosure to be broken open and shall take the chattel into his possession,” and § 7102 that he “shall seize a chattel without delay when the plaintiff delivers to him an affidavit, requisition and undertaking,” — all without a warrant and without the intervention of a judicial officer — hardly comport with the Fourth Amendment’s guarantee that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation.” A search and seizure without a warrant can be made only in exceptional circumstances, and the search of a private dwelling without a warrant is presumptively “unreasonable.” See e. g. James v. Goldberg, 303 F.Supp. 935, 940 (S.D.N.Y.1969) (three-judge court) probable jurisdiction noted sub nom. Wyman v. James, 397 U.S. 904, 90 S.Ct. 921, 25 L.Ed.2d 85 (1970), and the cases cited therein. The argument that the Fourth Amendment does not apply, is supported by neither good sense nor law. If the Sheriff cannot invade the privacy of a home without a warrant when the state interest is to prevent crime, he should not be able to do so to retrieve a stove or refrigerator about which the right to possession is disputed. Nor should he have any greater right to make a seizure of these or similar chattels not within a building or enclosure by virtue of a requisition “deemed, to be the mandate of the court,” (emphasis added), but which in fact is the mandate of the plaintiff’s attorney issued without the examination or approval of an intervening magistrate, and resulting in a taking against the will of the owner. *“It is surely anomalous to say that the individual and his private property are fully protected by the Fourth Amendment only when the individual is suspected of criminal behavior.” Camara v. Municipal Court, 387 U.S. 523, 530, 87 S.Ct. 1727, 1732, 18 L.Ed.2d 930 (1967). The Fourth Amendment does not exist simply as a shield to prevent intrusions in criminal matters, but is a basic protection available to all, in matters both civil and criminal. See Camara v. Municipal Court, 387 U.S. 523, 87 S.Ct. 1727, 18 L.Ed.2d 930 (1967); See v. City of Seattle, 387 U.S. 541, 87 S.Ct. 1737, 18 L.Ed.2d 943 (1967); James v. Goldberg, supra. Further, if the possessor should resist or hinder a search and seizure provided for under § 7102 or § 7110, then he could be subject to criminal prosecution pursuant to N.Y. Penal Law, McKinney’s Consol.Laws, c. 40, § 195.05. Accordingly, it is abundantly clear that § 7102 and § 7110 fail to conform to the strictures of the Fourth Amendment, made applicable by the Fourteenth Amendment, and are unconstitutional on their face. DUE PROCESS Insofar as Article 71 permits a prehearing seizure, possibly without notice to the defendant, it violates due process, in addition to constituting an illegal search and seizure. See Sniadach v. Family Finance Corp., 395 U.S. 337, 89 S.Ct. 1820, 23 L.Ed.2d 349 (1969)', and Goldberg v. Kelly, 397 U.S. 254, 90 S.Ct. 1011, 25 L.Ed.2d 287 (1970). Beds, stoves, mattresses, dishes, tables and other necessaries for ordinary day-to-day living are, like wages in Sniadach, a “specialized type of property presenting distinct problems in our economic system,” the taking of which on the unilateral command of an adverse party “may impose tremendous hardships” on purchasers of these essentials. That it is a temporary taking, does not obviate the objection that it is a taking prior to hearing and notice. Bypassing the question of equal protection, and recognizing that the defendant can get possession pending trial by posting bond, he still will be deprived of the use and enjoyment of his property for a theoretical minimum of 4 days, and much more likely for a still longer period. Lack of refrigeration, cooking facilities and beds create hardships, it would seem, equally as severe as the temporary withholding of % of Sniadach’s pay, and measured by Sniadach, the hardships imposed cannot be considered de minimus. The factual difference that Sniadach dealt with an unsecured interest and in these eases the vendors’ interests were secured, dissolves before the purchasers’ claims that there were no defaults and no right to repossession. In fact, the plaintiff Messier in action 70-CV-50 alleges that the vendor held no secured interest in the property which he threatened to repossess, and the amici briefs further point out that the replevin remedy is not limited to secured transactions. The statute, giving the right to repossess without a hearing, is not “narrowly drawn” to meet special situations and circumstances but covers any replevin situation. The statute’s defenders find it insulated from attack by its age, an attribute that did not prevent the Court from “abandoning the legal customs and practices in this country with reference to attachments and garnishments”. Sniadach, supra, 395 U.S. at 350, 89 S.Ct. at 1827, Black, J., dissenting. Also, the “blessing of age” wears out. See Moragne v. States Marine Lines, Inc., 398 U.S. 375, 90 S.Ct. 1772, 26 L.Ed.2d 339 (U.S. June 15, 1970). Goldberg v. Kelly, supra, further bolsters the claim of lack of due process. No one claims, or could claim, that due process does not require a full evidentiary hearing with all the usual rights of an adversary proceeding before final judgment in a replevin suit. To permit the pretrial status quo to be reversed without a hearing or even an ex-parte application to a court or judge, “the governmental interest in [such reversal] ” should outweigh the replevin defendant’s “interest in avoiding [the] loss” resulting from the temporary loss of use and enjoyment of property to which he is entitled. The plaintiff in such a case has established no entitlement, except such as he has unilaterally declared unto himself. That the defendant may be able to reclaim the property by posting a bond, the amount of which has been fixed by his adversary, does not change the fact, as has been previously pointed out that he has already been deprived of his property possibly without notice and “an opportunity to be heard.” Neither have facts indicating special circumstances been presented to a judicial officer to justify a concept of due process that would allow the elimination of the right to be heard. While it is not hard to find that the interests of the secured creditor or the out-of-possession claimant might be promoted by the above-proceedings, the governmental interest supposedly advanced is much more elusive. The governmental interest should encompass the welfare of the alleged debtors and consumers, as well as creditors. Brunswick Corp. v. J. & P., Inc., 424 F.2d 100 (10th Cir. 1970) cited by the amici in support of their due process contentions is distinguishable. Brunswick, decided on the basis of Oklahoma law, held that the doctrine of conversion custodia legis did not apply to a conditional vendor because of the reservation of title by him. With little discussion the court found the situations in Sniadach and Brunswick “not in the least comparable” because Sniadach involved “a specialized type of property.” Implicit in the Brunswick holding is a finding of consent to the seizure and waiver of the constitutional rights by reason of the admission by the defendants in the replevin action that they were in default under the conditional sale contract. The lack of such admissions in the instant cases distinguishes Brunswick factually. Further, we question that the fine print in the usual consumers conditional sales contract gives rise to a competent and intelligent waiver of a constitutional right. In any event the New York Statute is not narrowly drawn to fit Brunswick. Defendants and amici also rely on Supreme Court eases distinguished by the majority in Sniadach: e. g., Ownbey v. Morgan, 256 U.S. 94, 41 S.Ct. 433, 65 L.Ed. 837 (1921); Coffin Bros. v. Bennett, 277 U.S. 29, 48 S.Ct. 422, 72 L.Ed. 768 (1928); McKay v. Mclnnes, 279 U.S. 820, 49 S.Ct. 344, 73 L.Ed. 975 (1929). However, we do not regard these cases as controlling. Ownbey dealt with attachment of property of a non-resident debtor, a special situation not presented here. Coffin Bros, dealt with attachment of assets of shareholders after a bank failure, thus raising issues of protecting the public not involved here. McKay was a per curiam affirmance without discussion based solely on the authority of Ownbey and Coffin Bros, and sustained a Maine creditor attachment. It was cited in Sniadach for the proposition: “A procedural rule that may satisfy due process for attachments in general, see McKay v. Mclnnes, 279 U.S. 820, 49 S.Ct. 344, 73 L.Ed. 975, does not necessarily satisfy procedural due process in every case.” Sniadach, supra, 395 U.S. at 340, 89 S.Ct. at 1822. We think that this is such a case, and do not regard McKay, whatever its authority may be after Sniadach, as suggesting a contrary conclusion. Procedural due process requires that notice and an opportunity to be heard be provided the alleged debtor before his property is seized pursuant to Article 71, or at least that the creditor present to a judicial officer the circumstances allegedly justifying summary action. Article 71’s failure to so provide renders it unconstitutional as violative of procedural due process. UNEQUAL PROTECTION The plaintiffs claim that Article 71, by requiring all defendants (impecunious included) in replevin actions to post a bond to reacquire property seized by the plaintiff, runs afoul of the Equal Protection Clause of the Fourteenth Amendment. This contention takes us into a murky and uncertain area. Compare, e. g., Douglas v. California, 372 U.S. 353, 361, 83 S.Ct. 814, 9 L.Ed.2d 811 (1963) (dissent of Harlan, J.) with Williams v. Shaffer, 385 U.S. 1037, 87 S.Ct. 772, 17 L.Ed.2d 683 (1967) (dissent of Douglas, J.). Since we have found the questioned provisions of Article 71 violative of other constitutional safeguards, it is neither necessary nor advisable for us to tread in this area which may be the subject of further examination in the near future by the United States Supreme Court. SUMMARY In conclusion, we hold that the provisions of Article 71 permitting the prejudgment seizure of chattels by the plaintiff in a replevin action without an order of a judge or of a court of competent jurisdiction, are unconstitutional in that they violate the search and seizure provisions of the Fourth Amendment, made applicable to the states under the Fourteenth Amendment, and the provisions further violate the procedural due process requirements of the Fourteenth Amendment. In so declaring, we do not hold or intend to intimate that nothing less than a full adversary evidentiary hearing prior to seizure, will comport with the requirements of procedural due process. Neither do we interfere with the remedy of the traditional replevin action recognized by Article 71, except as herein specifically provided. What is clear, however, is that the statutory scheme employed by New York, which permits prejudgment seizure without even an ex ;parte order of a judge or court upon a showing of justification therefor, does not comport with procedural due process or the 4th and 14th Amendments. The foregoing opinion constitutes the Findings of Fact and Conclusions of Law pursuant to F.R.Civ.P., Rule 52. For the reasons herein, it is Ordered that judgment be granted herein: (1) declaring those provisions of Article 71 permitting a prejudgment seizure of property without an order of a court or judge of competent jurisdiction unconstitutional on their face, void and unenforceable, and (2) enjoining and restraining the defendants from implementing or enforcing in any manner said provisions of Article 71. Settle judgment on notice in accordanee with F.R.Civ.P., Rule 65(d). APPENDIX ARTICLE 71 — RECOVERY OF CHATTEL 7101. When action may be brought. 7102. Seizure of chattel on behalf of plaintiff. (a) Seizure of chattel. (b) Service. (c) Affidavit. (d) Requisition. (e) Undertaking. (f) Disposition of chattel by sheriff. 7103. Reclaiming and impounding chattel. (a) Reclaiming chattel. (b) Impounding chattel. (c) Additional parties. 7104. Seizing or reclaiming less than all chattels. 7105. Sale of perishable property. 7106. Payment of sheriff’s fees and expenses ; liability of sheriff. (a) Payment of sheriff’s fees and expenses. (b) Liability of sheriff. 7107. Sheriff’s return. 7108. Judgment; execution in certain cases; enforcement by contempt. (a) Generally. (b) Where value of chattel should not be awarded; execution. (c) Failure of jury to fix sum. 7109. Unique chattel. (a) Injunction, temporary restraining order. (b) Judgment enforceable by contempt. 7110. Sheriff’s powers to enter building on seizure or execution. 7111. Action on undertaking. § 7101. When action may be brought An action under this article may be brought to try the right to possession of a chattel. § 7102. Seizure of chattel on behalf of plaintiff (a) Seizure of chattel. The sheriff shall seize a chattel without delay when the plaintiff delivers to him an affidavit, requisition and undertaking and, if an action to recover the chattel has not been commenced, a summons and complaint. (b) Service. The sheriff shall serve upon the person from whose possession the chattel is seized a copy of the affidavit, requisition and undertaking delivered to him by the plaintiff. Unless the court orders otherwise, the papers delivered to him by the plaintiff, shall be personally served by the sheriff on each defendant not in default in the same manner as a summons or as provided in section 314; if a defendant has appeared he shall be served in the manner provided for service of papers generally. (c) Affidavit. The affidavit shall clearly identify the chattel to be seized and shall state: 1. that the plaintiff is entitled to possession by virtue of facts set forth; 2. that the chattel is wrongfully held by the defendant named; 3. whether an action to recover the chattel has been commenced, the defendants served, whether they are in default, and, if they have appeared, where papers may be served upon them; and 4. the value of each chattel or class of chattels claimed, or the aggregate value of all chattels claimed. (d) Requisition. The requisition shall be deemed the mandate of the court and shall direct the sheriff of any county where the chattel is found to seize the chattel described in the affidavit. (e) Undertaking. The undertaking shall be executed by sufficient surety, acceptable to the sheriff. The condition of the undertaking shall be that the surety is bound in a specified amount, not less than twice the value of the chattel stated in the plaintiff’s affidavit, for the return of the chattel to any person to whom possession is awarded by the judgment, and for payment of any sum awarded by the judgment against the person giving the undertaking. A person claiming only a lien on the chattel may except to the plaintiff's surety. (f) Disposition of chattel by sheriff. Unless the court orders otherwise, the sheriff shall retain custody of a chattel for a period of three days after seizure. At the expiration of such period, the sheriff shall deliver the chattel to the plaintiff if there has not been served upon him either a notice of exception to plaintiff’s surety, a notice of motion for an impounding order, or the necessary papers to reclaim the chattel. Upon failure of the surety on plaintiff’s undertaking to justify, the sheriff shall deliver possession of the chattel to the person from whom it was seized. § 7103. Reclaiming and impounding chattel (a) Reclaiming chattel. A chattel may be reclaimed by any person claiming the right to its possession, except a defendant claiming only a lien thereon, by service upon the sheriff, and upon all parties to the action, of a notice that the reclaiming party requires a return of all or part of the chattels replevied; an undertaking executed as required by subdivision (c) of section 7102 and an affidavit stating that the reclaiming party is entitled to possession by virtue of facts set forth. The sheriff shall retain custody of the chattel for three days after such papers have been served upon him. At the expiration of such period he shall deliver the chattel to the person serving the notice if there has not been served upon him a notice of exception to sureties or a notice of motion for an impounding order. Upon failure by the surety to justify, the sheriff shall deliver possession of the chattel to the plaintiff. If more than one person serves a reclaiming notice on the sheriff, the sheriff shall move, on notice to all parties, to have the court determine to whom the chattel shall be delivered. (b) Impounding chattel. A chattel which is in the custody of the sheriff may be impounded pending judgment or further order of the court, upon motion of any person claiming the right to its possession, upon notice to the sheriff and to all parties to the action. The motion shall be granted if the chattel is of such a nature, or the circumstances are such, that the moving party, if found to be entitled to possession, would not be adequately compensated for its loss by the payment of its pecuniary value. An undertaking shall accompany the motion, in an amount not less than two hundred and fifty dollars, that the moving party will indemnify the sheriff for all expenses incurred by him in transporting, handling and safekeeping the chattel pending determination of the motion, and, if the motion is granted, pending judgment or further order of the court. All expenses resulting from impounding shall be taxed as disbursements in the action as the court may direct. (c) Additional parties. A motion under this section, or service upon plaintiff of a notice of reclamation or exception to surety by a person not a party to the action, makes such a person a party to the action. Plaintiff shall serve a copy of the complaint upon such person within twenty days after he becomes a party. § 710k. Seizing or reclaiming less than all chattels Where the seizure of two or more chattels is required by the plaintiff, the sheriff shall seize those chattels which can be found. Less than all of the seized chattels may be impounded or reclaimed. The value of the chattels seized, as stated in the affidavit of the plaintiff, shall be the value for the purposes of subsequent undertakings in the action. The plaintiff may, at any time before entry of judgment, require seizure of those chattels not yet seized, by delivering to the sheriff an affidavit, requisition and undertaking; the proceedings are the same as on a former seizure. § 7105. Sale of perishable property Upon motion with such notice as the court may require, the court may order the sheriff to sell perishable property which has been seized. The court shall prescribe the time and place of the sale, and the manner and time in which notice thereof shall be given. Unless the court orders otherwise, the sheriff, after deducting his fees and necessary expenses, shall pay the proceeds into court to be held pending determination of the action. § 7106. Payment of sheriffs fees and expenses; liability of sheriff (a) Payment of sheriff’s fees and expenses. The sheriff shall not deliver a chattel to the person entitled to possession unless such person shall, upon request, pay to the sheriff his lawful fees and the expenses necessarily incurred in taking and keeping the chattel. Such fees and expenses shall be taxed as costs in the action or may be taxed immediately upon motion and the sheriff may be required to refund any amount not found to be necessarily incurred. (b) Liability of sheriff. A sheriff is liable for damages caused by his delivery of a chattel in violation of this article only to the extent that such damages can not be collected from the party to whom the chattel was delivered, or his surety. When a chattel is delivered by the sheriff to any party, as prescribed in this article, the sheriff ceases to be responsible for the sufficiency of the sureties of any party; until then, he is responsible for the sufficiency of the sureties of any party. § 7107. Sheriff’s return The sheriff shall file with the clerk a return within twenty days after he has delivered a chattel; it shall include all papers delivered to or served on him and a statement of all action taken by him. Where the sheriff has not filed a return before the hearing of a motion made by any party to punish him for contempt for such failure, he may be punished for contempt. At least ten days’ notice of such motion shall be given to the sheriff. § 7108. Judgment; execution in certain cases; enforcement by contempt (a) Generally. Damages for wrongful taking or detention or for injury to or depreciation of a chattel may be awarded to a party. Except as provided in subdivision (b), judgment shall award possession of each chattel to the prevailing party or, if the action is discontinued or dismissed, to the person from whom it was seized, and where the person awarded possession is not in possession when judgment is entered, it shall in the alternative, award the value of each chattel at the time of trial or the sum for which it was sold under section 7105, decreased by the value of the interest of an unsuccessful party. (b) Where value of chattel should not be awarded; execution. A verdict, report or decision in favor of the defendant where the chattel is in possession of the plaintiff at the time it is rendered shall not fix the value of the chattel where: 1. the plaintiff is the owner of the chattel but it was rightfully distrained doing damage, and the value of the chattel is greater than the damages sustained by the defendant; or 2. the plaintiff is the owner of the chattel, but the defendant had a special property therein, the value of which is less than the value of the chattel. The verdict, report or decision shall state why the value of the chattel is not fixed, and the final judgment shall award to the defendant the amount of damages or value of his special property and, if such sum is not collected, possession of the chattel. An execution shall direct the sheriff to deliver possession of the chattel to the defendant unless the party in possession pays the sum awarded to the defendant with interest and sheriff’s fees and in case the chattel cannot be found within his county, then to satisfy that sum from the property of the party against whom the judgment is entered. If the chattel is in possession of the defendant, it may remain in his possession until the amount awarded is paid. (c) Failure of jury to fix sum. If the jury shall fail to fix any sum required to be fixed by this section, such sum shall be fixed by a jury empanelled for the purpose upon motion made before the judge who presided at the trial within fifteen days after verdict. § 7109. Unique chattel (a) Injunction, temporary restraining order. Where the chattel is unique, the court may grant a preliminary injunction or temporary restraining order that the chattel shall not be removed from the state, transferred, sold, pledged, assigned or otherwise disposed of until the further order of the court. (b) Judgment enforceable by contempt. Where the chattel is unique, the court, in addition to granting a judgment under section 7108, may direct that a party in possession deliver the chattel to the party entitled to possession. Disobedience of a judgment or order so directing may be punished as a contempt of court. If a party accepts the value of the chattel awarded to him by the judgment, he shall have no claim to the chattel. § 7110. Sheriffs powers to enter building on seizure or execution If a chattel is secured or concealed in a building or enclosure and it is not delivered pursuant to his demand, the sheriff shall cause the building or enclosure to be broken open and shall take the chattel into his possession. § 7111. Action on undertaking An action on an undertaking cannot be maintained after final judgment until the return, wholly or partly unsatisfied, of an execution on the judgment for delivery of possession of the chattel or for payment of a sum of money in lieu of the chattel. § 7112. Testimony by deposition to ascertain location of chattel A party to an action to recover a chattel may move without notice, upon a showing that he lacks knowledge of the location of the chattel or a part thereof, for an order to examine any person for the purpose of obtaining information with reference to such location. The order may be granted before or after service of summons and complaint, or anytime before or after final judgment, and may also restrain the adverse party from acting in violation of whatever rights the moving party may have in the chattel, upon the execution of a reasonable undertaking, with sufficient sureties, to reimburse the adverse party for all damages wrongfully caused by such restraint. Added L. 1968, c. 355, eff. Sept. 1, 1968. . Article 71 is set forth in full in the Appendix. . Judge Port granted, pursuant to 28 U. S.C. § 2284(3), a temporary restraining order dated February 18, 1970, enjoining the named defendants in Laprease, Engle and Corbett, from seizing any chattels in the possession of the named plaintiffs or the class plaintiffs pursuant to the pretrial replevin provisions of Article 71, except pursuant to an order of a judge or court of competent jurisdiction authorizing such seizure, pending the hearing and determination of this claim by the full court. Judge Foley’s temporary restraining order, dated February 18, 1970, enjoined the defendants in Lawson, and members of their class, from enforcing or executing any requisition delivered to them pursuant to C.P.L.R. § 7102, and from withholding possession or continuing to withhold possession from the person from whom it [the property] was seized pursuant to C.P.L.R. § 7102. . Except for the defendant Engle, who has submitted an amended answer which agrees with the claims of constitutional deprivation advanced by the plaintiffs in 70-CV-16 (Laprease). . It is claimed that Article 71 is a descendant of the ancient remedy of replevin originating from the English Statute of Marlbridge, 52 Henry III, ch. 21, which was incorporated into the laws of New York in the codification of 1788. . § 7102(d) C.P.L.R. . If the owner wanted to voluntarily surrender it, or, if it could be taken peaceably by “self-lielp,” there would be no need to resort to an Article 71 action. In relation to “self-help”, see the testimony of Ralph Stone, Chief of Law Consumer Unit, Legal Aid Society of St. Louis, Missouri, before the National Commission on Consumer Finance on June 22, 1970. . 193.05. Obstructing governmental administration A person is guilty of obstructing governmental administration when he intentionally obstructs, impairs or perverts the administration of law or other governmental function or prevents or attempts to prevent a public servant from performing an official function, by means of intimidation, physical force or interference, or by means of any independently unlawful act. . See 34 Albany L.Rev. 426 (1970) in which it is pointed out that the alleged creditor does not have to commence an action before serving the papers on the Sheriff. If an action lias not been commenced he must also serve a summons and complaint on the Sheriff; however, as indicated above, the Sheriff is only required to serve on the debtor the plaintiff’s affidavit, requisition, and undertaking. Therefore, the debtor may not even know of the institution of the action until some time after the chattels are delivered to, and possibly disposed of by the plaintiff. . At that juncture, there is nothing but tile plaintiff’s unexamined allegation that he is entitled to possession, to dispute the defendant’s presumptively lawful, actual or constructive possession. . Goldberg v. Kelly, supra, 397 U.S. at 263, 90 S.Ct. at 1018. . The ability to make good the threat to repossess under Article 71, coupled with the inability of the consumer to post security for the return of the goods. often results in the abandonment by the impecunious purchaser of defenses he may have to a replevin action, and instead, agreement to terms imposed by the seller. See the hearings held before the National Commission on Consumer Finance, especially the statements of Ralph Stone and David Caplovitz on June 22, 1970, and of Benny L. Kass and Mary Gardiner Jones on June 23, 1970. . See, e. g.. the cases cited in Goldberg, supra, 397 U.S. at 263 n. 10, 90 S.Ct. 1011, 25 L.Ed.2d 287, and the hearings held before the National Commission on Consumer Finance on June 22 and 23, 1970, describing the abuses attendant on replevin statutes. . See pp. 719-720 supra for discussion of nature of seized chattels in the instant cases. . See, Sanks v. Georgia, 399 U.S. 922, 90 S.( for reargument. :. 2229, 26 L.Ed.2d 788 restored to the calendar
CASELAW
STATE FARM FIRE AND CASUALTY COMPANY v. W.R. EVANS et al. 1021370. Supreme Court of Alabama. June 16, 2006. Rehearing Denied Oct. 20, 2006. Bert S. Nettles, C. Dennis Hughes, and Brennan C. Ohme of London & Yancey, L.L.C., Birmingham; E. Allen Dodd, Jr., of Scruggs, Dodd, Dodd & Bazemore, Fort Payne; and John A. Chandler, John W. Bonds, Jr., Kristin B. Wilhelm, and Melanie Winskie Crowe of Sutherland Asbill & Brennan, LLP, Atlanta, Georgia, for appellant. Herman Watson, Jr., Rebekah Keith McKinney, C. Anthony Graffeo, and Eric J. Artrip of Watson Jimmerson Givhan Martin & McKinney, P.C., Huntsville; Joe R. Whatley, Jr., Russell Jackson Drake, and Charlene P. Ford of Whatley Drake, LLC, Birmingham; W.N. Watson of Watson, Gillis & Carver, Fort Payne; Clay Hornsby of Morris Haynes & Hornsby, Birmingham; and Theodore J. Pintar of Milberg Weiss Bershad Hynes & Lerach, LLP, San Diego, California, for appellees. BOLIN, Justice. Pursuant to § 6-5-642, Ala.Code 1975, State Farm Fire and Casualty Company appeals from an order of the DeKalb Circuit Court certifying, pursuant to Rule 23(b)(3), Ala. R. Civ. P., a nationwide class of policyholders of homeowners’ insurance to pursue a class action against State Farm for alleged premium overcharges. W.R. Evans, in his individual capacity and as representative of a putative class, sued State Farm on April 6, 2000, alleging that State Farm had discovered while it was conducting a dwelling reinspection program that approximately 700,000 dwellings were overinsured by State Farm and that, by the terms of the homeowners’ policies, State Farm would be required to pay the homeowners only their replacement cost in case of loss rather than the coverage limit stated in the policies. Evans alleged that State Farm received unearned premium payments because he and other similarly situated policyholders paid premiums for coverage that did not attach and that exceeded State Farm’s maximum obligation under the terms of the policies. Evans sought class certification and asserted claims of money had and received, unjust enrichment, breach of fiduciary duty, fraudulent suppression, and negligence and wantonness. Evans sought compensatory damages, punitive damages, restitution, interest, and an attorney fee. On May 31, 2000, State Farm moved the trial court to dismiss Evans’s complaint or, in the alternative, for a summary judgment. On January 8, 2001, the trial court entered an order denying State Farm’s motion as it pertained to Evans’s claims of money had and received, unjust enrichment, and fraudulent suppression. The trial court granted State Farm’s motion and dismissed Evans’s claims of breach of fiduciary duty and negligence and wantonness. On February 21, 2001, State Farm answered Evans’s complaint and moved the trial court for a summary judgment as to the class allegations contained in Evans’s complaint, arguing that the class allegations failed to satisfy the requirements of Rule 23, Ala. R. Civ. P. On March 29, 2001, the trial court entered an order postponing a hearing on State Farm’s motion for a summary judgment as to the class allegations until after the parties had completed discovery. On August 2, 2002, State Farm submitted a supplemental brief in support of its motion for a summary judgment as to the class allegations, arguing that Evans’s claims are not appropriate for class certification and that the claims fail to satisfy the requirement of predominance. Evans amended his complaint on August 9, 2002, to add a claim for injunctive relief and an equitable accounting. On August 13, 2002, Evans responded to State Farm’s motion for a summary judgment as to the class allegations and abandoned his fraudulent-suppression claim. On August 19, 2002, Evans moved the trial court to certify a nationwide class pursuant to Rule 23(b)(2) and (b)(3), Ala. R. Civ. P. On September 3, 2002, the trial court entered an order denying State Farm’s motion for a summary judgment as to the class allegations and set the class-certification issues for a hearing. Following a hearing, the trial court, on January 30, 2003, entered an order finding that Evans had satisfied the threshold requirements for class certification pursuant to Rule 23(a), Ala. R. Civ. P. In addition, the trial court determined that class certification under Rule 23(b)(2) was not proper because the primary relief Evans sought was not injunctive or declaratory but was monetary in nature. The trial court concluded that class certification under Rule 23(b)(3) was proper and addressed the requirements of Rule 23(b)(3) as follows: “[Evans] also seeks class action certification under the provisions of Rule 23(b)(3), which are as follows: “ ‘An action may be maintained as a class action if the prerequisites of subdivision (a) are satisfied, and in addition: “ ‘(3) the court finds that the questions of law or fact common to the members of the class predominate over any questions affecting only individual members, and that a class action is superior to other available methods for the fair and efficient adjudication of the controversy. The matters pertinent to the findings include: (A) the interest of members of the class in individually controlling the prosecution or defense of separate actions; (B) the extent and nature of any litigation concerning the controversy already commenced by or against members of the class; (C) the desirability or undesirability of concentrating the litigation of claims in the particular forum; (D) the difficulties likely to be encountered in the management of a class action.’ “The court has previously herein found that there is a common nucleus of facts satisfying the commonality requirement of Rule 23(a). The question now becomes whether the questions of law or fact common to the members of the class predominate over any questions affecting only individual members, and whether a class action is superior to other available methods for the fair and efficient adjudication of the controversy. “State Farm argues that the law of unjust enrichment and money had and received varies from state to state in a way that destroys the predominance of commonality as to the law. The court rejects this argument. The essence of the theories of unjust enrichment or money had and received as stated in Alabama law is that a plaintiff can prove facts showing that defendant holds money which in equity and good conscience, belongs to plaintiff or holds money which was improperly paid to defendant because of mistake or fraud. Dickinson v. Cosmos Broadcasting Co., 782 So.2d 260 (Ala.2000). A survey of the law of other states shows that their laws on the subject of unjust enrichment and money had and received are the same or very similar to the law of Alabama, and the court finds that any slight variations that may exist should not be destructive of class certification because such variations can be overcome at trial by grouping similar state laws together and applying them as a unit. “State Farm asserts that there are also significant issues of fact that are not common to all members of the class, and that such common issues of fact as may exist do not predominate. State Farm maintains that [Evans] must prove facts individual to each member of the putative class in order to prove his claim, and that in its defense of [Evans’s] claim, it is entitled to prove facts individual to each member. “The court will examine first the elements that must be proved by [Evans] to sustain his claim. Applying the law of unjust enrichment and money had and received as stated above, [Evans] can sustain his claim by proving that State Farm holds money that was improperly paid to it because of mistake. This can be done in substantial part by proving from the records of State Farm that the re-inspection program resulted in a finding by State Farm that the existing coverage of the putative class members was excessive. The fact that State Farm found the coverage to be excessive equates to an acknowledgment that it mistakenly insured the dwellings for more than replacement cost. No further proof of mistake would be required, and [Evans] would have no need to offer proof of mistake from individual members of the class. “Whether the premiums were improperly paid depends upon whether they were paid for coverage upon which State Farm bore no risk. Here, again, [Evans] has no need to offer evidence from individual members of the class. A reasonable inference that State Farm received premiums upon which it bore no risk can be drawn from State Farm’s own determination that the higher coverage was excessive. The court finds that [Evans] can sustain his claim that State Farm holds money paid to it by mistake without proof from individual class members. “State Farm maintains that it is entitled to put forth a defense based on the individual facts relating to each member of the putative class. For example, State Farm submits that it should be able to show that the original coverage amount reflected a reasonable estimate of replacement cost, and that the recalculated replacement cost was inaccurately low. [Evans] argues, however, and the court agrees that State Farm is estopped from asserting a defense that impeaches the recalculated replacement cost. State Farm having made a determination through its re-inspection program that a homeowner’s coverage was excessive, and that the homeowner’s peril did not justify such coverage, and having used this determination to reduce the coverage, it cannot now be permitted to retreat from this determination. ‘There is a kind of evidential estoppel which, though it may not amount to complete estoppel in pais, is raised when persons who have spoken or acted one way under one set of circumstances, and with one objective in mind, undertake under other circumstances and when their objective has changed, to testimo-nially give different color to what they formerly said and did.’ Holly Hill Citrus Growers’ Ass’n v. Holly Hill Fruit Products, Inc., 75 F.2d 13 (5th Cir.1935); In re Gilmore, 221 B.R. 864 (Bkrtcy. N.D.Ala.1998). “State Farm is not, however, precluded from proving by other means that it was in fact at risk for the higher coverage amount in spite of the re-inspection finding that the coverage was excessive. It could, for example, prove that when a loss occurs, homeowner claims are frequently made based on contractor estimates for the full coverage amount and that these estimates are sometimes paid even though they exceed State Farm’s assessment of the loss. It also could show that in making claim payment decisions, it recognizes that replacement cost estimates can vary based upon the individual performing the estimate and the method used. Such proof would not be individualized to each member of the putative class but would bear upon issues common to all. “State Farm insists that it is entitled to prove the interaction between each policyholder and State Farm’s agent at the time the original coverage amount was determined for the purpose of showing that some policyholders requested the higher coverage. It is not a defense, however, that the policyholder requested the higher coverage because 1) such a request would be immaterial to whether State Farm received premiums for coverage upon which it bore no risk, and 2) such a request could not be used to rebut State Farm’s own acknowledgment that the higher coverage amount was excessive and based upon a mistake. “The court finds that State Farm has suggested no defense which would entitle it to offer individualized proof from each member of the putative class. “State Farm also contends that damages would be impossible to assess on a uniform, class-wide basis. Without a doubt, the calculation of damages would be complicated and would require an individual calculation for each member of the class. The relief sought by [Evans] is not couched in terms of damages but instead he seeks an accounting, the imposition of a constructive trust, disgorgement of funds, and distribution of restitution to the members of the class. Whether the monetary relief is called damages or restitution, it is apparent that a determination of the amount due each member of the class would require an individual calculation. Such individualized calculation should not, however, defeat class certification in this case. “The necessary calculation is feasible, as evidenced by the fact that State Farm developed a policy for making refunds and by the further fact that State Farm calculated the amount of refund due to [Evans] after this litigation was commenced. Moreover, it is well settled that the need for individual examination on the issue of damages is not a bar to class certification. See Sterling v. Velsicol Chem. Corp., 855 F.2d 1188 (6th Cir.1988). “For the reasons set forth above, it is the court’s finding that the questions of law and fact common to the members of the putative class predominate over any questions affecting only individual members, and that the predominance requirement of Rule 23(b)(3) is met. “The court’s consideration of the other matters pertinent to the issue of superiority leads it to the following conclusions: a) members of the class would probably have little interest in prosecuting separate actions because of the substantial expense in doing so compared to the amount of individual claims; b) there is no other litigation concerning this controversy; c) there is no undesirable reason for concentrating the litigation in this particular forum; and d) there are no unusual difficulties likely to be encountered in the management of this litigation as a class action. “For the reasons stated, the court finds that a class action is superior to other available methods for the fair and efficient adjudication of the controversy.” State Farm appeals. I. Standard of Review We initially-note that this Court reviews a trial court’s class-certification order to determine whether the trial court exceeded its discretion in issuing the order, “ ‘but we will review de novo the question whether the trial court applied the correct legal standard in reaching its decision to certify a class.’ ” Alfa Life Ins. Corp. v. Hughes, 861 So.2d 1088, 1094 (Ala.2003)(quoting Smart Prof'l Photocopy Corp. v. Childers-Sims, 850 So.2d 1245, 1248 (Ala.2002)). The party seeking certification has the burden of proving that it is entitled to class certification. § 6 — 5—641(e), Ala.Code 1975. Further, “an abuse of discretion in certifying a class action may be predicated upon a showing by the party seeking to have the class-certification order set aside that ‘the party seeking class action certification failed to carry the burden of producing sufficient evidence to satisfy the requirements of Rule 23.’ ” Compass Bank v. Snow, 823 So.2d 667, 672 (Ala.2001) (quoting Ex parte Green Tree Fin. Corp., 684 So.2d 1302, 1307 (Ala.1996)). II. Facts State Farm is in the business of providing homeowners’ insurance on a nationwide basis. State Farm homeowners’ insurance policies offer “Coverage A,” which indemnifies a homeowner for the costs associated with replacing a dwelling in the event of a total loss. Because it is difficult, before an actual loss has occurred, to determine the cost of replacing a dwelling, the replacement-cost coverage on an individual dwelling is necessarily an estimate. State Farm uses the “Boeckh” replacement-cost calculator to estimate the approximate replacement cost of the dwellings it insures with Coverage A. The Boeckh replacement-cost calculator is an estimating tool that combines certain factors such as type of construction; residence type; number of stories to the dwelling; square footage of the dwelling; wage rates in the area in which dwelling is located; and material prices in order to estimate the replacement cost. When the Boeckh calculator is used correctly, it produces an estimated replacement cost that is within plus or minus 10 percent of the actual replacement cost. However, certain factors such as local economic trends affecting demand or interior upgrades to a dwelling may affect the accuracy of the replacement cost arrived at using the Boeckh calculator. Additionally, State Farm annually applies an inflation index to the Coverage A amounts in order to protect the policyholder from construction-cost inflation. The purpose of this inflation index is to keep pace with changes in local construction costs. The policyholder is apprised of the inflation index in the insurance policy and in renewal notices for the policy. State Farm informs its policyholders that the replacement cost produced by the Boeckh calculator is just an estimate and that it is not a guarantee of what the replacement cost may actually turn out to be in case of a total loss. Policyholders are free to purchase coverage amounts above or below the estimate generated by the Boeckh calculator. It is State Farm’s practice to agree, within reason, to a policyholder’s request for coverage in an amount that is above or below the estimated cost generated by the Boeckh calculator. State Farm presented evidence indicating that some of the potential class members, including Evans, requested a coverage amount different from the replacement cost generated by the Boeckh calculator. Between 1993 and 1996, State Farm implemented a company-wide three-year reinspection program of dwellings the coverages for which had originally been written before 1990. This reinspection program included a review of policies providing for the replacement cost of a dwelling (“Coverage A amounts”). State Farm believed that a significant amount of the dwellings it insured were underinsured by an average of 20%. The stated purpose of the reinspection program was to protect the policyholder by ensuring proper coverage in case of major loss and to ensure that the policyholders pay a premium commensurate with the value of their dwelling. State Farm estimated that the reinspection program could result in a premium gain in excess of $100 million, which would be compounded each year the business stayed on the books. During the reinspection program, State Farm and its employees gathered the appropriate information necessary for the dwellings involved in the reinspection program, e.g., square footage, residence type, construction type, etc., and used the Boeckh calculator to calculate a new estimated replacement-cost figure. If during the reinspection a recalculated replacement-cost estimate differed from an existing Coverage A amount, the policyholder’s agent would discuss with the policyholder whether the policyholder wanted to make a change in the Coverage A amount. As with the original estimated coverage amounts, it was State Farm’s practice during the reinspection program to agree, within reason, to a policyholder’s request for a recalculated coverage amount that differed from the estimated coverage amount generated by the Boeckh calculator. State Farm reinspected over 6.3 million dwellings during the reinspection program, and it increased the Coverage A amounts in over 2.2 million policies. State Farm also decreased the Coverage A amounts in approximately 700,000 policies. State Farm maintains its homeowners’ policy information on a Fire Master Record (“the FMR”). Information regarding the reinspection program was maintained by State Farm in the FMR. Information relating to a homeowner’s policy is accessed from the FMR by using a policy data query (“PDQ”). A PDQ reflects the history of transactions relative to a particular policy. Because of the storage capacity of that system, State Farm keeps detailed policy premium information for only five years. Additionally, only the last 50 transactions relating to a policy are reflected in the PDQ history-transaction field. Once a policy has more than 50 transactions, the oldest transaction is dropped from the FMR. State Farm does not record the reasons for an increase or a decrease in the Coverage A amount in a policy. Evans states that class members can be identified through the PDQ and that the PDQ will uniformly show the following with respect to each class member: (1) “Reinspection Agent,” indicating that State Farm reinspected the insured’s dwelling and calculated a replacement cost; (2) “Insurance to Value Change,” indicating that the replacement cost of the dwelling differed from the original coverage amount and that the coverage amount had been changed; and (3) “Decrease Endorsement,” indicating a decrease in the Coverage A amount. Evans concludes that State Farm’s database contains the data necessary to calculate the total amount of the unearned premiums resulting from the reinspection program. State Farm states that it would be impossible from its database to identify all policies that had had a decrease in Coverage A amounts as the result of recalculated replacement cost during the relevant period because: (1) State Farm maintains detailed information relating to premiums and coverages for only five years; (2) only the last 50 transactions relative to a policy are reflected in the PDQ history-transaction field and once a policy has had more than 50 transactions, the oldest transaction is dropped from the FMR; and (3) State Farm does not record the reason for a coverage change, whatever it may be. State Farm does note two potential sources of information relating to decreases in Coverage A amounts between 1993 and 1996. Paul Kirchgasler, a fire-business analyst employed by State Farm, testified in his affidavit that the FMR has a “notes” field that allows, but does not require, a person making a change to a policy to enter comments regarding increases or decreases in Coverage A amounts. Kirchgasler states that it is possible that some comments were made regarding the decreases in Coverage A amounts between 1993 and 1996, but finding any such comments would require a file-by-file review because there is no feasible way to perform a computer-assisted search for that information. Kirchgasler also testified that another possible source for the information would be State Farm’s computer-assisted retrieval (“CAR”) system, a document-imaging system that contains imaged and microfilmed documents. Kirchgasler states that it is possible that certain documents relating to decreases in Coverage A amounts may have been imaged or microfilmed, but like the comments or “notes” field mentioned above, there is no requirement or policy dictating that such a document be maintained. He states that documents contained in the CAR system cannot be effectively searched by computer to look for information regarding decreases in Coverage A amounts because all that is captured in the system is a picture of the document, and there is no way to search the contents of that document. State Farm contends that there is no way to determine, except by way of individual testimony, whether pre-reduction coverage amounts differed in any material respect from either recalculated estimated replacement cost or decreased coverage amounts. For example State Farm points to a sample of decreases in Coverage A amounts made to policies by Evans’s agent. Evans’s agent reinspected a total of 427 dwellings of which 9, including Evans’s dwelling, resulted in a decrease in Coverage A amounts. Five of those nine decreases were within 10 percent of the previous Coverage A amount. Additionally, eight of the nine policyholders had at some point during the term of the policy chosen a Coverage A amount that differed from the estimated replacement cost calculated by State Farm. State Farm initially issued Evans’s homeowner’s policy in December 1981. The Coverage A amount was calculated at that time to be $105,300; however, Evans chose a lesser coverage amount of $100,000. Evans renewed his homeowner’s policy for the coverage year 1994-1995; the Coverage A amount was $139,800. The policy was due to be renewed for the 1995-1996 coverage year with a Coverage A amount of $143,300; however, the Coverage A amount was changed as a result of the reinspection program. The Coverage A amount had increased over the years because of the application of the inflation index as provided by the policy. Evans’s dwelling was reinspected in June 1995 as part of State Farm’s rein-spection program. Because an incorrect square-footage indicator was used, Evans’s Coverage A amount was recalculated to be $100,800. The Coverage A amount was recalculated using the correct square-footage indicator, which resulted in an estimated Coverage A amount of $136,600. The recalculated estimated Coverage A amount of $136,600 was within 10 percent of the $143,300 Coverage A amount that Evans’s homeowner’s policy would have been renewed for in December 1995 if the rein-spection program had not been conducted. Nevertheless, Evans requested a significantly lower coverage amount of $115,000, and at the same time changed the type of policy he had to one that would cover full replacement cost even if that cost exceeded $115,000. Evans requested a refund of the premiums he had paid in years preceding the reinspection program for coverage in excess of the estimated replacement cost of his dwelling. State Farm refunded Evans $8,215.99, which represented excess premiums paid from December 1981 through December 1995, plus interest. Accompanying the refund check was a letter that stated in part: “This refund is being paid to you unconditionally pursuant to State Farm’s voluntary refund procedure. This is an internal operating procedure, which exists separate and apart from your contract of insurance with State Farm, or any law, statute, rule or regulation which might apply to that policy of insurance. Under this procedure, State Farm may, subject to records availability, refund to its policyholders any premiums paid for coverage which appears to be in ‘excess’ of the property’s estimated replacement cost, where the ‘excess’ coverage is due to a mistake. Because records on your policy are available through policy year 1981, the amount paid to represents a refund of these ‘excess’ premiums with interest since the inception of the policy.... “This refund is not to be considered an admission of liability or any wrongdoing by State Farm or anyone else. To the contrary, State Farm continues to maintain that you have no legal entitlement to any refund. This policy was originally issued for the face amount you requested on your application and then renewed each year for a definite, specified premium, which was accepted by you. There certainly was no compulsion that you take this policy, or any subsequent renewal of the policy.” III. Rule 23(b)(8) Criteria In order to obtain class certification under Rule 23(b)(3), Ala. R. Civ. P., the plaintiff must establish the prerequisites of Rule 23(a), Ala. R. Civ. P., as well as those set forth in Rule 23(b)(3). Funliner of Alabama, L.L.C. v. Pickard, 873 So.2d 198 (Ala.2003). Rule 23(a) provides: “(a) Prerequisites to a Class Action. One or more members of a class may sue or be sued as representative parties on behalf of all only if (1) the class is so numerous that joinder of all members is impracticable, (2) there are questions of law or fact common to the class, (3) the claims or defenses of the representative parties are typical of the claims or defenses of the class, and (4) the representative parties will fairly and adequately protect the interests of the class.” Rule 23(b)(3) provides: “(b) Class Actions Maintainable. An action may be maintained as a class action if the prerequisites of subdivision (a) are satisfied, and in addition: “(3) the court finds that the questions of law or fact common to the members of the class predominate over any questions affecting only individual members, and that a class action is superior to other available methods for the fair and efficient adjudication of the controversy. The matters pertinent to the findings include: (A) the interest of members of the class in individually controlling the prosecution or defense of separate actions; (B) the extent and nature of any litigation concerning the controversy already commenced by or against members of the class; (C) the desirability or undesirability of concentrating the litigation of the claims in the particular forum; (D) the difficulties likely to be encountered in the management of a class action.” A. Predominance State Farm argues that the trial court erred in certifying Evans’s claims of unjust enrichment and money had and received as a class action pursuant to Rule 23(b)(3), Ala. R. Civ. P., because, it says, numerous individual issues predominate that make the asserted claims unmanageable as a class action. This Court has stated: “ ‘The predominance inquiry tests whether proposed classes are sufficiently cohesive to warrant adjudication by representation.’ Amchem Prods., Inc. v. Windsor, 521 U.S. 591, 623, 117 S.Ct. 2231, 138 L.Ed.2d 689 (1997). In considering whether questions of law or fact common to the class members predominate over questions applicable only to individual class members, a court must evaluate ‘what value the resolution of the class-wide issue will have in each class member’s underlying cause of action.’ Rutstein v. Avis Rent-A-Car Sys., Inc., 211 F.3d 1228, 1234 (11th Cir.2000). Courts examine the substantive law applicable to the claims and determine whether the plaintiffs presented sufficient proof that common questions of law or fact predominate over individual claims. See Ex parte Green Tree Fin. Corp., 723 So.2d 6 (Ala.1998); Smart Prof'l Photocopy Corp. v. Childers-Sims, 850 So.2d 1245 (Ala.2002).” Voyager Ins. Cos. v. Whitson, 867 So.2d 1065, 1071 (Ala.2003). Additionally, “the necessity of individualized testimony from each class member to prove an essential element of the cause of action defeats class certification.” Smart Prof'l Photocopy Corp. v. Childers-Sims, 850 So.2d at 1249. This Court has also stated: “[W]e have grave concerns as to whether any national class of plaintiffs in an action involving the application of the differing laws of numerous states can satisfy the requirements of showing that ‘the questions of law or fact common to the members of the class predominate over any questions affecting only individual members, and that a class action is superior to other available methods for the fair and efficient adjudication of the controversy.’ Rule 23(b)(3).” Ex parte Green Tree Fin. Corp., 723 So.2d 6, 11 (Ala.1998). Evans’s claims of unjust enrichment and money had and received are based on contentions that State Farm received unearned premium payments because the members of the purported class paid premiums for coverage that did not attach and that were in excess of State Farm’s maximum obligation under the terms of the members’ policies. In order to prevail on claims of unjust enrichment and money had and received, “the plaintiffs must establish that the defendants hold money that, in equity and good conscience, belongs to the plaintiffs, or that the defendants hold money that was improperly paid to the defendants because of mistake or fraud.” Funliner of Alabama, 873 So.2d at 209. Here, the trial court evaluated the claims of unjust enrichment and money had and received on the basis that State Farm held money that was paid to it based on mistake. In Smart Professional Photocopy, supra, the plaintiffs sued Smart Professional Photocopy (“Smart”) asserting claims of unjust enrichment, money paid by mistake, and money had and received. The plaintiffs alleged that they had mistakenly paid the amounts charged by Smart, which, they alleged, were in excess of the reasonable costs of reproducing medical records pursuant to § 12-21-6.1, Ala.Code 1975. Following a class-certification hearing, the trial court entered an order finding that common questions of law and fact predominated, and it certified two classes of individuals. In vacating the class-certification order and concluding that individual issues of fact predominated over the plaintiffs’ claims, this Court stated the following: “In the present case, Smart has demonstrated that individualized evidence is required to determine whether each class member operated under a mistake of fact. Each class member had a copy of an invoice prepared by Smart, the actual copies of medical records, and the envelope showing the postage paid. Some members may have reviewed their invoices to determine whether the shipping and handling charge was excessive or whether the per-page charges were improper. Others may have analyzed whether Smart charged more for medical records or for billing records. We note that the customers’ billings were received and paid in the first instance by the customers’ legal counsel, thus making an additional line of inquiry as to the customers’ knowledge of factual and legal matters in connection with the customers’ claims. A trier of fact would have to determine whether each individual member of the class paid an invoice from Smart by mistake. “Similar to the extensive inquiry required in Compass Bank [v. Snow, 823 So.2d 667 (Ala.2001),] the necessity of conducting such a detailed inquiry into more than 60,000 transactions among numerous class members renders the requirement of predominance impossible. We cannot assume that each class member paid the invoices based upon a mistake of fact. See Ex parte Green Tree Fin. Corp., 723 So.2d 6 (Ala.1998) (vacating a class-certification order, in part, because of individualized proof of subjective factors). “It is clear here ... that individual inquiry will be required to determine what information, if any, each class member relied upon in paying the invoices for Smart’s services. The customers have ‘contended from their initial filing, that payment was made by mistake and contend that they were not in possession of all of the facts necessary for determining how much to pay [Smart] for [its] copying and postage services.’ Because of the necessity in this case of proving each class member’s subjective state of mind, individual issues predominate over the customers’ claims. The customers cannot prove that each member paid under the same mistake of fact nor can they determine the extent of each class member’s knowledge upon payment of the invoice from Smart. Thus, the customers cannot satisfy their burden of proof as to each member’s payment by mistake without individual inquiries. See Reynolds Metals [v. Hill, 825 So.2d 100 (Ala.2002) ].” Smart Prof'l Photocopy, 850 So.2d at 1251 (emphasis added). See also Voyager Ins. Cos. v. Whitson, 867 So.2d at 1075, vacating a Rule 23(b)(3) class-certification order because the plaintiffs’ “unjust-enrichment claims ... [were] grounded in mistake of fact, and individual evidence would be required to prove mistake of fact.” The trial court stated the following in its certification order: “Applying the law of unjust enrichment and money had and received ..., [Evans] can sustain his claim by proving that State Farm holds money that was improperly paid to it because of mistake. This can be done in substantial part by proving from the records of State Farm that the re-inspection program resulted in a finding by State Farm that the existing coverage of the putative class members was excessive. The fact that State Farm found the coverage to be excessive equates to an acknowledgment that it mistakenly insured the dwellings for more than replacement cost. No further proof of mistake would be required, and [Evans] would have no need to offer proof of mistake from individual members of the class.” (Emphasis added.) The trial court’s order impermissibly assumes that each reduction in a Coverage A amount during the reinspection period represented a finding by State Farm that the pre-reduction coverage amount had been excessive and, therefore, a finding that it had mistakenly insured the dwellings for more than replacement cost. The evidence presented indicated that State Farm does not record the reasons for decreases in Coverage A amounts. For the trial court to conclude that all 700,000 decreases in coverage amounts were based on findings by State Farm that the existing coverages were excessive requires it to assume a mistake on the part of State Farm, a practice expressly forbidden by this Court in Smart Professional Photocopy, supra. In order to determine whether a policyholder’s pre-reduction coverage amount was in fact excessive would require an inquiry into each and every transaction that resulted in a reduction in the Coverage A amount. Therefore, because individual inquiries would be required to establish mistake, such individualized inquiries predominate, precluding class certification. The trial court’s order also fails to take into consideration an affirmative decision by a policyholder to choose to decrease his Coverage A amount. A policyholder could have chosen to decrease his Coverage A amount because he perceived his prior Coverage A amount to be too high. For example, a policyholder could have requested a reduction in coverage because of strained financial circumstances, because of a decrease in the balance he owed on the dwelling, or simply because he changed his mind about the reasons he wanted a higher Coverage A amount. Again, individual inquiries would be required to establish a mistake on the part of State Farm, and such individualized inquiries predominate, thereby precluding class certification. Evans contends in his brief that the PDQ field of the FMR will uniformly show the following with respect to each class member: (1) “Reinspection Agent,” indicating that State Farm had reinspected the insured’s dwelling and had calculated a replacement cost; (2) “Insurance to Value Change,” indicating that the replacement cost of the dwelling as calculated as a result of the reinspection program differed from the coverage amount and had been changed; and (3) “Decrease Endorsement,” indicating a decrease in the Coverage A amount. However, this information establishes only that a decrease in Coverage A amount occurred. It does not establish that the pre-reduction coverage was determined by State Farm to be excessive; any such determination would require an assumption that, as discussed above, is prohibited. Additionally, State Farm presented evidence regarding other potential sources of information relating to decreases in Coverage A amounts. However, the evidence indicated that it is not feasible to perform a computerized search for this information and that it would require a file-by-file search or an individual inquiry, which acts to defeat class certification in unjust-enrichment and money-had- and-received cases. Voyager Insurance, supra. The evidence presented indicated only that reductions in Coverage A amounts had occurred during the reinspection program. The trial court’s determination that pre-reduction coverage amounts were excessive, which resulted in the policyholders’ mistakenly paying for coverage in excess of replacement cost, resulted from an impermissible assumption by the trial court and could be determined only by individual inquiries, both of which defeat class certification of the unjust-enrichment and money-had-and-received claims. Accordingly, we conclude that individual issues of payment by mistake predominate over the claims presented and that Evans and the other policyholders have failed to meet their burden of proof. B. Superiority “When individual issues predominate over the common claims, manageability of the action as a class is not possible.” Voyager Insurance, 867 So.2d at 1077. Accordingly, because individual issues, of payment by mistake predominate over the common claims in this case, Evans and the other policyholders have failed to establish the superiority requirements of Rule 23(b)(3). TV. Conclusion Because we have concluded that Evans and the other policyholders have failed to establish the predominance and superiority requirements of Rule 23(b)(3), we preter-mit a discussion of the remaining issues raised by State Farm. We vacate the class-certification order entered by the trial court and remand the cause for further proceedings consistent with this opinion. ORDER VACATED; CAUSE REMANDED. NABERS, C.J., and SEE, LYONS, HARWOOD, STUART, SMITH, and PARKER, JJ., concur. . This case was originally assigned to another Justice on this Court; it was reassigned to Justice Bolin. . In "valued policy” states, the insurer is required by law to pay the entire coverage amount for a total loss regardless of the replacement cost of the dwelling. The class proposed here deals with only those putative class members who had "Coverage A” or replacement-cost coverage. . For example, if demand for new houses is down, a contractor may accept less profit to be able to keep construction crews working, whereas in a period of increased demand the contractor may include more than the normal overhead and profit in a project. .For example, the Boeckh calculator could generate approximately the same replacement-cost estimate for two dwellings based on such factors as square footage and exterior construction; however, one dwelling may have significant interior upgrades, i.e., trim molding, flooring, etc., which would cause the replacement cost of that dwelling to be significantly more than the dwelling without the upgrades. . State Farm established a voluntary refund policy during the reinspection program. State Farm would refund premiums in cases where the coverage amount before the rein-spection program was significantly higher than the recalculated coverage amount. State Farm's internal refund policy states: “There are cases of overinsurance that need response. Our recommended procedure to handle the problems are broken down into two issues[:] i "[I.] Situations involving overinsurance not related to mortgagee requirements. "This category would include mistakes made by the company and by agents. This would include, for example, significant mistakes of measurement and/or classification. Generally, that would be where the measurements were off by more than 10-15% and/or more than one classification category, i.e., classed as deluxe where standard was the appropriate category. "The procedure for handling overinsu-rance is: "[1.] We should refund the entire amount of the premium overcharged for as far back as our records allow to detect the time of errorf;] ''[2.] Interest is to be paid in these situations!)] "[II.] Situations of overinsurance relating to mortgagee requirements. "Where the property has been potentially overinsured due to a mortgagee requirement, we do not believe we have an obligation to refund monies. The continuing Reinspection Program will provide an opportunity for consultation between agent and policyholder. In most cases, a satisfactory agreement on values can be worked out. In those isolated cases where it appears the mortgagee is still an issue, the matter should be resolved between the insured and the mortgagee with little intervention from us.” . Evans's agent apparently kept hard copies of his clients’ files concerning coverage reductions during the reinspection program. . The remaining policy failed to contain sufficient information or documentation to determine whether the policyholder had requested a different coverage amount from the estimated replacement cost calculated by State Farm. .The correct square-footage indicator was 1,770 square feet; however, a square-footage indicator of 1,180 square feet was inadvertently used when the Coverage A amount was recalculated. . Smart was in the business of providing copying and other services to health-care businesses. . Two classes were certified because of the types of records requested by the plaintiffs and the amount Smart charged each plaintiff for its services.
CASELAW
Phosphoinositide 3-kinase binds to TRPV1 and mediates NGF-stimulated TRPV1 trafficking to the plasma membrane Alexander T. Stein, Carmen A. Ufret-Vincenty, Li Hua, Luis Fernando Santana, Sharona E. Gordon Research output: Contribution to journalArticlepeer-review 306 Scopus citations Abstract Sensitization of the pain-transducing ion channel TRPV1 underlies thermal hyperalgesia by proalgesic agents such as nerve growth factor (NGF). The currently accepted model is that the NGF-mediated increase in TRPV1 function during hyperalgesia utilizes activation of phospholipase C (PLC) to cleave PIP2, proposed to tonically inhibit TRPV1. In this study, we tested the PLC model and found two lines of evidence that directly challenge its validity: (1) polylysine, a cationic phosphoinositide sequestering agent, inhibited TRPV1 instead of potentiating it, and (2) direct application of PIP2 to inside-out excised patches dramatically potentiated TRPV1. Furthermore, we show four types of experiments indicating that PI3K is physically and functionally coupled to TRPV1: (1) the p85β subunit of PI3K interacted with the N-terminal region of TRPV1 in yeast 2-hybrid experiments, (2) PI3K-p85β coimmunoprecipitated with TRPV1 from both HEK293 cells and dorsal root ganglia (DRG) neurons, (3) TRPV1 interacted with recombinant PI3K-p85 in vitro, and (4) wortmannin, a specific inhibitor of PI3K, completely abolished NGF-mediated sensitization in acutely dissociated DRG neurons. Finally, simultaneous electrophysiological and total internal reflection fluorescence (TIRF) microscopy recordings demonstrate that NGF increased the number of channels in the plasma membrane. We propose a new model for NGF-mediated hyperalgesia in which physical coupling of TRPV1 and PI3K in a signal transduction complex facilitates trafficking of TRPV1 to the plasma membrane. Original languageEnglish (US) Pages (from-to)509-522 Number of pages14 JournalJournal of General Physiology Volume128 Issue number5 DOIs StatePublished - Nov 2006 Externally publishedYes ASJC Scopus subject areas • Physiology Fingerprint Dive into the research topics of 'Phosphoinositide 3-kinase binds to TRPV1 and mediates NGF-stimulated TRPV1 trafficking to the plasma membrane'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
mastello Etymology Ultimately of origin. Noun * 1) wooden tub (for harvesting etc.) * 2) trough
WIKI
Page:The American Cyclopædia (1879) Volume IV.djvu/62 CASHMERE other tropical countries. The tree, which re- sembles the walnut tree, is large, with oval, blunt, alternate leaves ; the flower is rose-col- ored and fragrant ; the stem furnishes a milky Cashew Nat juice, which when dry becomes black and is used as a varnish. The tree also secretes a gum having the qualities of gum arabic, and known in commerce as codjii gum. In South America, from whence it is imported, book- binders use it as a varnish for their books to protect them from moths and ants. The fruit is a pear-shaped receptacle, having an agreea- ble acid flavor with some astringency, and at the end the kidney-shaped ash-colored nut. This has a shell of three layers, the outer and inner hard and dry, while the intermediate con- tains a quantity of black, acrid, caustic oil, strong enough to excoriate the lips of those who crack the nut with their teeth ; and in India it is sometimes applied to the floors to drive away ants. To destroy this acrid matter, the nuts are roasted, which renders them when eaten wholesome and agreeable. The roasting is carefully conducted, as the acridity of the fumes is sufficient to produce severe inflam- mation in the face and hands of the roaster. CASHMERE, or Kashmir, a kingdom in the N. W. part of India, almost enclosed by ranges of the Karakorum and Himalaya, which separate it from Chinese Tartary, Thibet, and the British districts of N Lahoul and Spiti and the Punjaub ; area estimated at 75,000 sq. m. ; pop. at 750,- 000. It extends from lat. 82 17' to 36 N., and from Ion. 73 20' to 79 40' E., and inclu les the famous vale of Cashmere, the provinces of Ja- moo, Balti, Ladakh, Chamba, and some others. The valley of Cashmere is of irregular oval form, shut in by lofty mountains, the summits of some of which are covered with perpetual snow. It is from 5,500 to 0,000 ft. above the sea, and the alluvial plain which forms ?ts bot- tom is 70 m. long, 40 m. wide, and about ^,000 sq. m. in area, that of the whole valley being 4,500 sq. m. It is entered by many passes, 11 of which are practicable for horses. The highest, including that of the Pir Panjal, have an elevation of about 12,000 ft. The principal river is the Jhylum, a tributary of the Indus, which receives numerous tributaries from the mountains, and flows through the Baramula pass into the Punjaub. Several small lakes are scattered through the valley. Thus abun- dantly irrigated, and fertilized by rains which, unlike those of most parts of India, are light, the soil attains an extraordinary fertility, yielding returns of from 30 to 60 fold of the principal crops. Rice, the common food of the inhabitants, is the staple ; wheat, barley, buck- wheat, maize, and tobacco are cultivated to some extent ; cotton is found to flourish ; escu- lent vegetables, kitchen herbs, and saffron are abundant; and the lakes supply the poorer classes with a nutritious though insipid article of food in the singhara or water nut, the seed of the trapa bispinota, which is ground into flour, roasted, boiled, or eaten raw. About 60,000 tons of this nut are annually taken from the Wullur lake. Among the fruits are the apple, pear, peach, plum, apricot, cherry, pome- granate, and grape. Flowers of rare beauty, particularly the rose, which is highly culti- vated, abound in the valley. Many of the for- est trees attain a vast size; among them are the Himalayan cedar, the chunar, the poplar, the lime, and the wild chestnut. The willow, maple, birch, alder, pine, and white thorn are common. Every village has its grove of chu- nars and poplars, planted centuries ago by order of the Mogul emperors, and now forming one of the richest ornaments of the valley. Bears, both brown and black, are very numer- ous. The other wild animals are leopards, jackals, foxes, stags, gazelles, and wild goats. Birds of prey are numerous, including a spe- cies of vulture of great size. Game birds are very plentiful. Venomous reptiles are rare. The native horses are small and hardy. Cat- tle, sheep, and goats are numerous. The most valuable minerals are iron nnd lime- stone, both of which are abundant; copper, plumbago, and lead are also known to exist. The climate is salubrious, and milder than in many parts of India, but the stillness of the midsummer air gives the heat an oppressive- ness scarcely to be expected from the range of the thermometer (80 to 85 at noon in the shade), and the winter is sometimes severely cold. Snow falls abundantly. The bulk of the inhabitants are Mohammedans, speaking a Sanskrit dialect, with a large admixture of Persian, in which latter tongue the records and correspondence of the government are written. They are divided in sect into Sun- nis and Shiahs, the former being the more nu- merous and regarded as orthodox. The Cash- merians are preeminent among Indian nations by their physical perfections. The men are tall, robust, well formed, and industrious; the women famous for their beauty and fine com- plexions. They are a gay people, fond of pleasure, literature, and poetry, but are repre- sented by many travellers as peerless in cun-
WIKI
Buy on the Dip? This ETF Is Racking Up Bitcoin Exposure Bitcoin mania is sweeping across financial markets, but there still isn't a US-listed exchange traded fund dedicated to the cryptocurrency. Some ETFs are finding other ways to offer some Bitcoin exposure. The VanEck Vectors Real Asset Allocation ETF (RAAX) recently added a small position in the Grayscale Bitcoin Trust. The fund’s primary goal is to seek long-term total return. In pursuing long-term total return, RAAX seeks to maximize real returns while seeking to reduce downside risk during sustained market declines by allocating primarily to exchange-traded products that provide exposure to real assets, which include commodities, real estate, natural resources, and infrastructure. “RAAX invests in three types of real assets: financial assets, income assets and resource assets. RAAX evolved and diversified its financial assets in February by gaining exposure to the price of bitcoin,” said VanEck portfolio manager David Schassler. “This was accomplished with an initial investment of 2% into the Grayscale Bitcoin Trust. We believe that digital assets may offer RAAX many of the same benefits as gold. Most notably, protection against inflation and currency debasement in addition to overall portfolio diversification.” Bitcoin an Ideal Fit for RAAX RAAX holdings span assets that provide hedges against rising inflation and a weak U.S. dollar, meaning Bitcoin fits seamlessly into the portfolio. Bitcoin has sometimes been referred to as 'digital gold', with supporters suggesting it could be a good safe-haven investment. However, the cryptocurrency has tended to trade closer to equity markets in recent times and has been plagued by massive volatility, which has either made investors fortunes or crushed them. Like gold and other commodities, Bitcoin is a real asset, meaning its place in the RAAX portfolio is credible. “Real assets continue to benefit from fears of inflation and hopes of higher global growth in the second half of 2021. The recent positive trends in commodity prices offer much relief to an asset class that has struggled to perform since the financial crisis. Now that the tides are turning, commodities and other real assets have the potential to lead the market higher for many years to come,” according to Schassler. For more news, information, and strategy, visit the Crypto Channel. Read more on ETFtrends.com. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
INDEXER Rotary Table DIY Gearbox, Stepper Motor, and PLC Controller. 33,774 86 8 INDEXER Rotary table  One of difficult things in constructing things is cutting or making circles. Hopefully this will help some of you to invent some new ways of doing things. Adding circles, arcs, or curves to your next project may make it a winner. This instructable shows you how to make your own indexing table to drill hole patterns, to cut out circles, and to cut many other things related to a circle. It allows you to set the index degrees by setting some push buttons. As an example setting it to four divides the circle in four 90 degree segments. This would allow you to drill a 4 bolt hole pattern or cut an arc 90 degrees in a piece of material. If I won the Shopbot challenge I would use the machine and software start a small business making signs, templates, furniture, jigs, fixtures, engravings and parts out of wood and plastic. I have put together my own cnc mill drill but feel I need something bigger and more accurate like the shopbot to make it work. The autocad software completes the package for anyone to start a small business. Thank you to Instructables, Shopbot, and Autodesk for a great contest.   Features of index controller   Adjustable index degrees Adjustable index speed Single index by run button Single index by proximity switch Continuous run button Brake output Time lapse camera output Index count indicator Reset index to zero button Index count increase button Index count decrease button Add 10 to index count button Stop button Self contained controller Indexer can be connected to CNC computer control Some Uses  Cutting holes Cutting wheels Cutting round slots Cutting arcs Drilling hole patterns on flat surfaces Drilling hole patterns on round objects Cutting slots on round objects Triming pipe ends Time lapse photography Panoramic photography   Step 1: How to Set It Set the index degrees by dividing 360 degrees by a number. The number is set by using the push buttons to increase or decrease by one or by pushing the increase by ten button. To set it to 36 push the plus 10 button 3 times and then the increase button 6 times. Note you have to zero the count first by pushing the continuous button or holding the stop button on for 7 seconds. This will make the chuck index 10 degrees everytime the run button is pushed or the proximity sensor is triggered. Check the count by counting the number of times the indicator light comes on in between pauses. Run button is used to start the index to the next position or the proximity sensor can be used to trigger it to move to the next index position. Increase button is used to increase the divide number by one. Decrease button is used to decrease the divide number by one. Continuous button allows stepper motor to run continuous full circle rotations. After the continuous button is pushed the run button is pushed to start the motion or the proximity sensor can be used. The stop button is used to stop the motion. Time lapse mode button is held in for 5 seconds to enable that mode. First you need to set your index step amount. To set to 1 degree indexes first zero your count setting. When it is zero the count light will be turn on continuously. Then push the +10 button 36 times to set the count to 360. Then hold the time lapse mode button on for 5 seconds and the chuck will start to index in 1 degree increments. Push the stop button when you are done.   Step 2: Parts Needed to Make It Materials Programmable logic controller with pulse output ( Mitsubishi FX0-14MT-DSS Transistor Unit ) - Ebay Programmable logic controller software for FX PLC - Ebay Programmable logic controller cable - Ebay Stepper module I used is an STMicroelectronics GS-200S in half step mode but I recommend geckodrives - Ebay or electronic supplier 5Vdc voltage regulator 7805 - Radio Shack #276-1770 24Vdc voltage regulator LM317T - Radio Shack #276-1778 (8) Momentary pushbutton switches - Radio Shack bridge rectifier - Radio Shack fuse - Radio Shack fuse holder - Radio Shack Multipurpose PC Board - Radio Shack # 276-150 1/2 inch romex connector - hardware store Box to mount components - surplus (1) 24 Vdc relay for time lapse output - Radio Shack (3) On Off switches - Radio Shack 5/8 inch shaft to lathe chuck adapter - brother made it for me Lathe chuck borrowed from small lathe 24 VAC wall transformer - surplus Nema 34 Stepper motor - Ebay Aluminum plates 8 X 4.5 X 3/4 and 8 X 5.625 X 3/4 inch - brother donated Lovejoy coupling to fix gearbox shaft and motor shaft - Surplus Gearbox with high gear reduction like 60 to 1 - Surplus ( I would like to upgrade to an actual milling rotary table) Hardware for mounting everything together (10-32 threaded screws) Spacers - I made them Step 3: Buying Parts and Making It. The PLC that I have used is still found on ebay so you can use the same program that I am currently running. I am still looking to improve the program so I was not going to upload it to instructables yet. But if someone wants to build this right now I will provide the program. If you want to use a different PLC just make sure it has a pulse output that can be used with stepper motors. Your PLC needs to have a solid state outputs to make this work correctly. Mechanical relay outputs will not work.   The gearbox on my indexer is surplus and so others will have to find one that fits their needs. Therefore it makes no sense for me to draw a drawing with all the sizes and bolt holes because yours is going to be different. The goal is to look at what I have shown and make something better that will fit your use. Actually I would recommend a milling machine indexing table to get the stiffness and accuracy needed cut nice parts. My stepper module is also an older unit and so you will be selecting a different stepper driver for you project. I would recommend one of Gecko stepper drives. Remember most of the Gecko drives are 10 micro step drives. My drive is only 1/2 step drive. The PLC program will have to be changed to allow for this. This is a simple number change but it will slow the maximum high speed the motor can run. I will include a drawing showing a gecko drive being used. I removed the enable switch from the drawing because I do not feel it was needed. The love joy coupling is ok for my light duty indexer but for accuracy I would use a solid flexible coupling. The stepper motor on a index table does not have to be real big because if the high gear ratio of the gearbox. Also do not let that little stepper motor hurt you. That high gear ratio gives that little stepper motor a lot of power on the output shaft.   Make It Real Challenge Participated in the Make It Real Challenge ShopBot Challenge Participated in the ShopBot Challenge Share Recommendations • Beauty Tips Contest Beauty Tips Contest • Barbecue Challenge Barbecue Challenge • Stone Concrete and Cement Contest Stone Concrete and Cement Contest 8 Discussions 0 None KiraThant 4 years ago on Step 3 Thanks for sharing this valuable information. It will sure help me with my projects. 0 None a prillant end result i wood love to get a coppy of the ladder please for another progect 0 None Constructer 4 years ago on Introduction When you are ready to build and you have questions, let me know and I can help you through the process. 0 None Yochanan29 4 years ago on Introduction What I want it to do is to have a sophisticated rotary position control by aiming a beam of light and/or fine positioning for drill bits. Honestly, I do not want to spend too much at the moment. I still need something concrete so that I can practice PLC coding while interfacing with real life applications. Thanks again. 0 None Constructer 4 years ago on Introduction I think the micrologix would work even better than the PLC I used. Make sure you get right PLC with the correct solid state outputs. The PTO function is controlled by writing values to its control registers. This allows you to control speed and number of steps. The code would be determined by what you want to do with the stepper. What do you really want the stepper motor to do? I can point you in the right direction. 0 None Yochanan29 4 years ago on Introduction This is an extension to my previous comment. I believe using micrologix1100 can work for this application of interfacing with a stepper motor. The link below seems to verify that is the case: http://literature.rockwellautomation.com/idc/group... This starts on page 130 of the pdf. How would the code be written with a PTO instruction? Thanks 0 None Yochanan29 4 years ago on Introduction I believe that an Allen Bradley Micrologix1000 or Micrologix1100 can work with the free RSlogix500 Micro-starter software instead of the PLC that is currently being used. Could you please make sure this is correct and let me know if this will interface with the stepper drive module? For the program a timing instruction block (TON delay) can work. Could you please see how you can help with regards to this as well. If need me to be more specific please let me know. Thanks again for your time. 0 None notingkool 6 years ago on Introduction Awesome instructable. I make bicycle parts, and when i make hubs the hardest work is drill the holes for the spokes. And something like this will make my life easier. Even i could make another function for the drill to go down. The only problem is that the indexing head is really expensive in my country. Genial. Yo hago partes de bicicletas, y cuando fabrico mazas, la parte mas dificil es hacer los agujeros para los rayos. Y algo como esto me haria la vida mas facil. Incluso podria hacer otra funcion para hacer que el husillo baje. El unico problema es que el indexador es muy caro en mi pais.
ESSENTIALAI-STEM
mysql database error table is marked as crashed and should be repaired error: XXXXXX XX:XX:XX [ERROR] /usr/libexec/mysqld: Table ‘./database/table’ is marked as crashed and should be repaired myisamchk(1) – MyISAM table-maintenance utility · –recover, -r Do a repair that can fix almost any problem except unique keys that are not unique (which is an extremely unlikely error with MyISAM tables). If you want to recover a table, this is the option to try first. You should try –safe-recover only if myisamchk reports that the table cannot be recovered using –recover. (In the unlikely case that –recover fails, the data file remains intact.) If you have lots of memory, you should increase the value of myisam_sort_buffer_size. · –safe-recover, -o Do a repair using an old recovery method that reads through all rows in order and updates all index trees based on the rows found. This is an order of magnitude slower than –recover, but can handle a couple of very unlikely cases that –recover cannot. This recovery method also uses much less disk space than –recover. Normally, you should repair first using –recover, and then with –safe-recover only if –recover fails. If you have lots of memory, you should increase the value of key_buffer_size. (re)solution: # service mysqld stop # for tbl in `grep ‘ERROR.*Table’ ~mysql/$HOSTNAME.err | awk -F\’ ‘{print $2}’` ; do myisamchk –recover $tbl ; done # service mysqld start Leave a Reply
ESSENTIALAI-STEM
Mount Brewster Mount Brewster may refer to: Antarctica * Mount Brewster, a mountain on the Daniell Peninsula, Victoria Land, Antarctica Canada * Mount Brewster (Canada), a mountain in the Vermilion Range of Banff National Park New Zealand * Mount Brewster (New Zealand), a mountain in the Southern Alps
WIKI
Page:Solomon Abramovich Lozovsky - The World's Trade Union Movement (1924).pdf/77 Rh It is natural that such a lack of action by the Amsterdam and the industrial internationals called forth a desire in the masses to create such an organization as would not be an "oleomargerine" substitute for an international, but a real militant one.
WIKI
Ransom (Malouf novel) Ransom (2009) is a novel by Australian author David Malouf. It retells the story of the Iliad from books 22 to 24. Summary This story begins with Achilles mourning the death of Patroclus (who is described as his kinsman, cousin or lover in various books and films) during the Trojan War. Achilles, enraged at his friend's death, slays Hector, Patroclus' killer, and drags Hector's corpse behind a chariot around the walls of Troy and Patroclus' funeral pyre for the next ten days. This causes much dismay to the Trojans and his own men, as it is an unprecedented act of barbarism, and is made worse by the ancient belief held by both Greeks and Trojans that Hector's soul cannot pass into the afterlife unless it is given a proper burial, something that Achilles refuses to allow. The narrative shifts from Achilles to Priam, Hector's father, and the King of Troy. Priam cannot stand the abuse of his beloved son's body, and (prompted by the messenger-goddess Iris in a dream) decides that he will approach Achilles without his royal decorations, mortal to mortal, and attempt to ransom Hector's body back with the better part of the Trojan treasury. When Priam explains his plan to his family and advisors, it is met with resistance. After recruiting a common cart driver, Somax, from the market square, Priam and his driver set out for the Greek camp. With guidance from the god of travellers, Hermes, Priam eventually meets Achilles at his camp. Priam appeals to Achilles's conscience, reminding him of his own father and son (here Malouf juxtaposes Priam's grief at the death of his son and Achilles' grief at Patroclus' death), in trying to persuade him to return Hector to Troy for a proper burial. Achilles (partly due to the nostalgia stirred up when he mistakes Priam for his own father, Peleus) agrees, and the exchange is made. The story ends with a flash forward to Priams' inglorious death at the hands of Achilles' son, Neoptolemus. Years later, when Troy has fallen to the Greeks, an elderly Somax retells his story, highlighting the story as one of the major themes of the book. Differences from the Iliad There are several textual differences between the Iliad and Ransom. The character Somax, who drives the cart Priam rides en route to his negotiations with Achilles, is not mentioned in the original text. This leads to a drastically different interaction with Hermes in Ransom. Priam and Achilles are covered in much more detail in Ransom, leading to further textual differences. Critical reception Ransom was shortlisted for the 2011 International Dublin Literary Award. It received the 2009 John D. Criticos Prize for Greek literature. The book received positive reviews from the New York Times Book Review, the Dallas Morning News, the New Yorker, the San Francisco Chronicle, the Washington Post, the Los Angeles Times, the Boston Globe, and the Wall Street Journal and many other publications
WIKI
Ende language Ende may refer to the following languages: * Ende language (Indonesia), an Austronesian language of Flores Island, Indonesia * Ende language (Sulawesi), an Austronesian language of Sulawesi, Indonesia * Ende language (Papua New Guinea), a Papuan language of Papua New Guinea
WIKI
java – Application that performs Bin Packing Write an application that performs bin packing: The input consists of a sequence of packages'' whose sizes are coded as nonnegative integers along with a sequence of bins” whose capacities are are coded also by an integer. (For simplicity, we assume that all bins have the same capacity.) The program assigns each package to a bin such that no bin’s capacity is exceeded. The objective is to use the minimum number of bins to hold all the packages. Attempt these implementations: 1. Smallest packages first: The packages are sorted by size and smallest packages are used first. 2. Largest packages first: The packages are sorted by size and largest packages are used first. 3. Random filling: The packages are used in the order they appear in the input. (Hint: read the Supplement section on sorting.) After you have implemented all three programs, perform case studies to determine when one strategy performs better than another. This problem is famous because there is no efficient algorithm for best filling the bins. Describe a Monte Carlo algorithm for the Triangle Packing problem Book: Parameterized Algorithms by Marek Cygan (free to download legally) Chapter about Multivariate polynomials on Page 353 (In the book not the pdf) Question 10.19: Describe a Monte Carlo $2^{3k}n^{O(1)}$ – time polynomial-space algorithm for the Triangle Packing problem: given a graph $ G $ and a number $ k in N $, decide whether $ G $ contains $ k $ disjoint triangles (subgraphs isomorphic to K3). Hint 10.19 in Page 354: Use a similar approach as in the $2^{k}n^{O(1)}$ -time algorithm for $k$-path from this chapter (Page 333). I tried to solve the problem using the hint, but without success unfortunately, there are solutions to the book? I would be happy to get help if it can be solved even without official solutions of the book but it is important to solve it using the hint they brought in order to use the tools learned in the same chapter. Thanks in advance. K disjoint Triangles Packing Problem I’m trying to figure out how to use Narrow Sieves in Packing problems.. specifically in the K disjoint triangles packing problem. Is there any intuition I can use to answer these questions? thanks. clothing – Is a leather jacket + layers good enough for an European winter? (Back packing) It should definitely be enough but you should take the warm jacket with you just in case. But you can judge yourself. Temperature Averages in Paris in November are about 7°C (41°F) and it can be quite rainy (15 rainfall days in december as seen on holiday-weather.com). A rainjacket is advised, but depends on your personal preference. If you don’t mind holding your umbrella, then of course you don’t need a rain jacket. In the other places the temperature will probably be similar or a bit higher (up to a 10°C/50°F average in sicily’s december.) with similar rainfall days. Keep in mind that these are the average temperatures and it can get colder than that. I live in Switzerland, where it can get quite cool in November/December and on a cold day, a tshirt, hoodie and warm jacket keep me warm. But then again, you are probably used to warmer temperatures, so a layer more won’t hurt. If you can easily take the warm jacket, then do it, because it does get chilly, especially if you plan on visiting “mountain-y areas”. Better be safe than sorry, so pack the warm jacket also and test whether or not you need it. Have a good and warm time in Europe. algorithms – What kind of bin packing problem is this? I have a problem formulation but it does not resemble the usual packing problem I find in the literature but it is a usual problem in the packing industry. I just do not know the name for it. The problem formulation is as follows: Ich have a certain amount of objects with different weights (around 10000) and I want to pack them in boxes. The objective is that all boxes should have the same weight (at least within a predefined boundary). It is not mandatory that all objects are distributed. How can I formulate this optimization problem and what algorithms may suitable to solve this problem? data structures – Packing a sphere with cuboids This question on the Mathematics SE addresses how to pack a sphere with unit cubes. This addresses how to pack a 2D grid with rectangles. We can pack a sphere with the minimum number of unit cubes $m$ of a certain minimum volume $v$, necessary to capture fraction $f$ of the total volume inside the sphere, using octrees. Is there a similar algorithm for the minimum number of cuboids? pr.probability – Does there exist a scale invariant random packing of circles in the plane? I want to construct a scale invariant random packing of the plane with circles. Here is a way to construct a rotationally invariant, but not scale invariant random packing of the plane with circles: Suppose I have a Poisson point process in the plane (with say intensity 1 and time parametrised). After some fixed timestep $t_0$ I temporarily stop the PPP. Then start to grow a circle from each point (with the same speed for all circles) until the circle touches another circle then stop. This is also called the random Poisson lilypond model. Now, we continue the Poisson point process and for every point arriving we grow a circle around the point until it touches one of the other circles. Continuing this we get a random packing of the plane with circles. The packing must be rotationally invariant since it was construct rotationally invariant. However, it is quite clear that it is not scale-invariant. Is there a way to construct a random circle-packing which is also scale invariant? Ideas: Maybe one can change this construction slightly. For example one could do it on the hyperbolic plane, in the disc and do inversion, on the sphere and do stereographic projection or something along those lines. Further motivation is provided by the interfaces in the Ising model which have a scaling limit which is even conformally invariant. But the interfaces have a structure which is very difficult to think about so I was wondering whether one could find some of these properties just with circles. Here is an example of how such a circle packing could look. From arXiv:cond-mat/0203252v2 Create circle packing charts in google sheets I am trying to find a way to add a circle packing chart to a Google sheet, using the data in a google sheet as its data source The only possibility I have found is this from DHUMANITIES http://dhumanities.appspot.com/circle_packing_index.html But, either it no longer works or I am not configuring the data properly Does anyone know how to do this, create circle packing charts in google sheets? Thank you algorithms – One-dimensional packing problem: Optimal decomposition of music structure I am currently working on my Master thesis on the visualization of music structure and I’m looking to find an optimal description of repetitions found in a piece of music. Problem Description Given a section range in a song in seconds (or samples) , e.g. (10,20), I can look up where this section is repeated. Then we end up with a set of repeating sections like: ((10,20), (40,50), (70,80)). We call this a group. A group has a certain fitness given to it. (As a sidenote, the fitness of a group is defined as a combination of the sum of similarity values and how much of the song they cover alltogether) Our goal is to find a set of disjoint groups that altogether have the highest fitness; the optimal decomposition of the repetitions. Below are two different valid decompositions of the same song, one course, and one fine decomposition. Course decomposition Fine decomposition We are provided with a set of all candidate groups, here’s a small selection, sorted top to bottom by fitness: Example of candidates Current Greedy Method 1. Sort all candidates by fitness 2. Pick group G with the highest fitness 3. Remove any groups from candidates if they have overlap with G 4. Repeat from step 2 until no candidates are left Bonus Sometimes the candidates overlap every so slightly, which in the context should perhaps not immediately lead to disqualification. Example of slight overlap There are options to relax the no-overlap rule. Note that each of the sections in a group has a different brightness. This brightness corresponds to a confidence, so in a group some sections are more certain to be proper repetitions than others. For a group of sections G that we wish to add to a set of groups of sections S, we can: • simply remove sections from G if they overlap with any sections in S • trim the sides of to-be-added sections from G if they overlap with any sections in S • keep the overlapping sections in G I hope this problem is interesting enough to you to give it a shot! Thank you! clothing – Optimal packing method for bras? Whenever the topic of packing something in an optimal way comes up, it’s useful to see if the Navy has anything to say about it. The Navy is a good place to look because sailors need to be especially diligent about packing economically, and women sailors are no exception. Specifically, women in the US Navy are issued 11 bras and should have 2 in their seabag ready for deployment. The rest should be stored in their locker at port. These are of the type: sports, white or beige. Your question did not specify a given bra type, so this answer would apply to sports bras rather than the cantilevered or balconette or contoured or other bra types. Pursuing this topic, it turns out that the US Naval Academy provides female midshipmen with instructions on folding their bras… enter image description here b. Brassieres. Divide into thirds; fold right third and then left third back; fold top straps down to form a square; stack in locker with bottom sweatbands flush and facing out (Figure 6-B). …and to help get the point across, they provide an image… enter image description here Source: Midshipmen Uniform Regulations Presumably the required square shape is the result of computing optimized surface area versus volume. They make a point of explaining how the bras should be stored in the locker, but it’s implied that storage for deployment would follow the same pattern. It’s a good bet that the Navy hired external contractors to study the problem and produce a report which then informed the regulations. Nobody likes a tired, frumpy bra that’s been crushed in a suitcase, and if you eschew the sports bra in favour of the cupped bra style, then consider some of the recent innovations in specialist luggage.
ESSENTIALAI-STEM
2 I'm following this: https://tezos.b9lab.com/smartpy/language guide, but it's written for the SmartPy online IDE, I'm trying to do this all in my local dev environment. PyCharm IDE gives me an "An illegal target for a variable annotation" error when I use the sp.for_. Can anyone help me understand what am I doing wrong? import smartpy as sp class Summarise(sp.Contract): def __init__(self): self.init(storage=0) @sp.entry_point(name='sum') def sum(self, params): sp.for_ i in sp.range(1, params+1): pass 1 Answer 1 2 Found it. The desugared version is with sp.for_("x", params) as x: self.data.result += x https://smartpy.io/docs/general/control_statements So the translation for this example is: with sp.for_("i", sp.range(1, params+1)) as i: self.data.storage += i Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
ESSENTIALAI-STEM
Wabash Bridge (Ohio River) The Wabash Bridge is a railroad bridge over the Ohio River between the states of West Virginia and Ohio. It was the longest cantilever truss span for a short time when it was built. The bridge is also noted for its decorative finials on top of the towers. With its eastern end located on Route 2 in West Virginia, between Follansbee and Wellsburg, it was also a popular route for foot traffic from Follansbee and Wellsburg to Mingo Junction in Ohio. Streetcar service was provided on the West Virginia side to the steps leading to the footpath along the bridge. Specifications * Service - Railroad (Wheeling and Lake Erie) over the Ohio River * Location - Mingo Junction, Ohio and Rural Brooke County, West Virginia * Structure Type - Metal Cantilever Rivet - Baltimore Through Truss * Construction Date - 1904 * Builder/Contractor - American Bridge Company of New York, New York * Main Span Length - 700 ft * Structure Length - 1296 ft * Spans - 3 Main Span(s)
WIKI
calculating random error and systematic error East Homer New York Address 2707 State Route 215, Cortland, NY 13045 Phone (607) 345-7336 Website Link http://www.cnytechguy.com Hours calculating random error and systematic error East Homer, New York Systematic Errors Systematic errors in experimental observations usually come from the measuring instruments. They are just measurements made by other people which have errors associated with them as well. The first error quoted is usually the random error, and the second is called the systematic error. The accuracy of the volume measurement is the limiting factor in the uncertainty of the result, because it has the least number of significant figures. Absolute and relative errors The absolute error in a measured quantity is the uncertainty in the quantity and has the same units as the quantity itself. Note that this means that about 30% of all experiments will disagree with the accepted value by more than one standard deviation! However, we are also interested in the error of the mean, which is smaller than sx if there were several measurements. If A is perturbed by then Z will be perturbed by where (the partial derivative) [[partialdiff]]F/[[partialdiff]]A is the derivative of F with respect to A with B held constant. The moles of NaOH then has four significant figures and the volume measurement has three. Broken line shows response of an ideal instrument without error. Note that this also means that there is a 32% probability that it will fall outside of this range. Please try the request again. The meaning of this is that if the N measurements of x were repeated there would be a 68% probability the new mean value of would lie within (that is between If these were your data and you wanted to reduce the uncertainty, you would need to do more titrations, both to increase N and to (we hope) increase your precision and For example, 400. To reduce the uncertainty, you would need to measure the volume more accurately, not the mass. So one would expect the value of to be 10. Values of the t statistic depend on the number of measurements and confidence interval desired. Thus we have = 900/9 = 100 and = 1500/8 = 188 or = 14. And you might think that the errors arose from only two sources, (1) Instrumental error (How "well calibrated" is the ruler? twice the standard error, and only a 0.3% chance that it is outside the range of . Your calculator probably has a key that will calculate this for you, if you enter a series of values to average. The following diagram describes these ways and when they are useful. The essential idea is this: Is the measurement good to about 10% or to about 5% or 1%, or even 0.1%? The system returned: (22) Invalid argument The remote host or network may be down. The Idea of Error The concept of error needs to be well understood. For example, consider radioactive decay which occurs randomly at a some (average) rate. In such cases statistical methods may be used to analyze the data. S. Trial [NaOH] 1 0.1180 M 2 0.1176 3 0.1159 4 0.1192 The first step is to calculate the mean value of the molarity, using Equation 3. m = mean of measurements. For example, a result reported as 1.23 implies a minimum uncertainty of ±0.01 and a range of 1.22 to 1.24. • For the purposes of General Chemistry lab, uncertainty values should For example, if there are two oranges on a table, then the number of oranges is 2.000... . Assume you made the following five measurements of a length: Length (mm) Deviation from the mean 22.8 0.0 23.1 0.3 22.7 0.1 Finally, the error propagation result indicates a greater accuracy than the significant figures rules did. Notice that this has nothing to do with the "number of decimal places". Standard Deviation For the data to have a Gaussian distribution means that the probability of obtaining the result x is, , (5) where is most probable value and , which is Random counting processes like this example obey a Poisson distribution for which . For example, when using a meter stick, one can measure to perhaps a half or sometimes even a fifth of a millimeter. Is the paper subject to temperature and humidity changes?) But a third source of error exists, related to how any measuring device is used. This relative uncertainty can also be expressed as 2 x 10–3 percent, or 2 parts in 100,000, or 20 parts per million. If you measure a voltage with a meter that later turns out to have a 0.2 V offset, you can correct the originally determined voltages by this amount and eliminate the It may usually be determined by repeating the measurements. Then the probability that one more measurement of x will lie within 100 +/- 14 is 68%. To find the estimated error (uncertainty) for a calculated result one must know how to combine the errors in the input quantities. Your cache administrator is webmaster. A reasonable way to try to take this into account is to treat the perturbations in Z produced by perturbations in its parts as if they were "perpendicular" and added according Error Analysis and Significant Figures Errors using inadequate data are much less than those using no data at all. One must simply sit down and think about all of the possible sources of error in a given measurement, and then do small experiments to see if these sources are active. The uncertainty in the mass measurement is ± 0.0001 g, at best. In fact, since the estimation depends on personal factors ("calibrated eyeballs"), the precision of a buret reading by the average student is probably on the order of ± 0.02 mL. It generally doesn't make sense to state an uncertainty any more precisely. Returning to our target analogy, error is how far away a given shot is from the bull's eye. First, here are some fundamental things you should realize about uncertainty: • Every measurement has an uncertainty associated with it, unless it is an exact, counted integer, such as the number For example 5.00 has 3 significant figures; the number 0.0005 has only one significant figure, and 1.0005 has 5 significant figures. Now we can apply the same methods to the calculation of the molarity of the NaOH solution. Exell, www.jgsee.kmutt.ac.th/exell/PracMath/ErrorAn.htm Random Error and Systematic Error Definitions All experimental uncertainty is due to either random errors or systematic errors. Obviously, it cannot be determined exactly how far off a measurement is; if this could be done, it would be possible to just give a more accurate, corrected value. Systematic errors also occur with non-linear instruments when the calibration of the instrument is not known correctly. Systematic errors can result in high precision, but poor accuracy, and usually do not average out, even if the observations are repeated many times. Always work out the uncertainty after finding the number of significant figures for the actual measurement. For instance, the repeated measurements may cluster tightly together or they may spread widely. For instance, what is the error in Z = A + B where A and B are two measured quantities with errors and respectively? Again, the uncertainty is less than that predicted by significant figures. The correct procedures are these: A. The number to report for this series of N measurements of x is where . In a sense, a systematic error is rather like a blunder and large systematic errors can and must be eliminated in a good experiment. Another possibility is that the quantity being measured also depends on an uncontrolled variable. (The temperature of the object for example). If the variables are independent then sometimes the error in one variable will happen to cancel out some of the error in the other and so, on the average, the error When reporting relative errors it is usual to multiply the fractional error by 100 and report it as a percentage. The best way to detect erratic error or blunders is to repeat all measurements at least once and to compare to known values, if they are available. Nevertheless, buret readings estimated to the nearest 0.01 mL will be recorded as raw data in your notebook.
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Edward Kennedy (journalist) The result was Keep (non-admin closure). brew crewer (yada, yada) 00:52, 23 December 2007 (UTC) Edward Kennedy (journalist) * – (View AfD) (View log) This is a classic WP:BLP1E. No mention of any notability outside of breaking the news of the German surrender. -- brew crewer (yada, yada) 00:12, 21 December 2007 (UTC) brew crewer (yada, yada) 00:12, 21 December 2007 (UTC) * Weak keep. In short, you obviously are right in WP:BLP1E. However, integrating this info into the article on German surrender may be difficult, and theis information is still worth keeping (I found it quite interesting, it definitely is also an interesting example for media historical studies). I think in this case keeping it as it is may have more sense. Pundit | utter 00:29, 21 December 2007 (UTC) * I know, I felt bad nominating this for deletion. I searched for somewhere to merge the info, but there really isn't anything. End of World War II in Europe is an obvious candidate, but as the article is written in timeline-like manner, it's hard to merge the info into that article. -- brew crewer (yada, yada) 00:38, 21 December 2007 (UTC) * Or you could just leave it and let people research, write and improve it or even try to do that yourself. He got sacked for breaking the news of the German surrender, it's quite a fascinating little tale. How about forgetting the alphabet soup for a minute and using a bit of common sense? Nick mallory (talk) 07:13, 21 December 2007 (UTC) * I started the article, so obviously I think it should be kept. I believe there's quite a bit more to this guy. Note these blog items: http://journalismprofessor.blogspot.com/search?q=Edward+Kennedy I don't have access to The New York Times' 1963 obituary, but I bet it has more on the man that could be added. Pha telegrapher (talk) 01:02, 21 December 2007 (UTC) * Thank you. I've got the obit and it does add some things. He was managing editor of the Santa Barbara News-Press, not enough alone for notability, but it helps in this article. Joshdboz (talk) 13:51, 21 December 2007 (UTC) * Keep This is an excellent example of why "One Event notability" is only a guideline. There's no doubt that there is plenty of verifiable information on this very significant event, , , etc. The question is whether this article should be on Kennedy or the event that he caused (ie the early release of the German surrender). The latter option would be quite awkward in finding a title and would essentially be this stub minus other biographical information - that being taken into account, I have no problem with this event being primarily covered in this biography. Joshdboz (talk) 01:10, 21 December 2007 (UTC) * Keep Of course, he will be mainly remembered for the German surrender scoop, and the fallout from the scoop which was still news in 1946, but he was a noted journalist in his own right, for example, he was the AP bureau chief in Paris and Cairo. There is room for expansion beyond the one event. FlowerpotmaN &middot;( t ) 02:23, 21 December 2007 (UTC) * I didn't know that he was bureau chief in Cairo. That would be a good addition to the article. I'd like to know about his career before the scoop for which he's best known. Pha telegrapher (talk) 19:46, 21 December 2007 (UTC) * Keep I think this is a stub that deserves a chance to grow. It was nominated less then an hour after creation. What's there is a good start. If after some time passes, no one can expand it, then let's revisit it.--Cube lurker (talk) 03:34, 21 December 2007 (UTC) * Keep And nominating this an hour after it was created seems bad form to me. Nick mallory (talk) 07:12, 21 December 2007 (UTC) * Speedy keep and give the writer some time to work on it, eh? An accomplished journalist, scoop of the century, multiple sources provided with more to come, fascinating historical moment. Clearly notable, verifiable, neutral, etc. What greater good was being served by nominating this when it was obviously a work in progress? In fact, I strongly encourage User:Pha telegrapher to submit this subject to Did You Know? I'd be happy to help him with that process. --JayHenry (talk) 07:18, 21 December 2007 (UTC) * Keep Adequate notability and sources. Colonel Warden (talk) 12:22, 21 December 2007 (UTC)
WIKI
Carbon nanoparticle reinforced polymer composites File Description SizeFormat  Hao-W-2016-MPhil-Thesis.pdfThesis13.45 MBAdobe PDFDownload Title: Carbon nanoparticle reinforced polymer composites Author(s): Wu, Hao Item Type: Thesis or dissertation Abstract: Theoretically, covalent functionalised carbon nanotubes (f-CNTs) are supposed to be effective reinforcement fillers to improve the mechanical properties of the brittle epoxy in a significant extent. The mechanical properties (tensile strength, Young’s modulus, etc) of the CNTs are much higher than the properties of the epoxy resins. In addition, for f-CNTs, the covalent functionalisation methods are good ways to improve the CNT/epoxy interfacial bonding strength and the miscibility of the CNTs in the epoxy. However, there is still no satisfied functionalisation method to improve the performance of the CNT/epoxy nanocomposites (NCs) in a significant content. The reason can be concluded as the conventional covalent functionalisation methods damage the CNT scaffolds so the benefits of the functionalisation are overshadowed. In this project, f-CNTs modified by a new damage-free functionalisation method, thermochemical grafting (TC) approach, were used to reinforce an epoxy. The grafting chemicals were glycidyl methacrylate (GMA) and methyl methacrylate (MMA), respectively. For comparisons, NCs reinforced by as-received (non-functionalised) CNTs and three different commercial functionalised amine-CNTs were prepared. A high shearing method to do the CNT/epoxy mixing was built and two different stirrers were used to produce NC samples separately. In the tensile tests, NCs made via a two blade stirrer were produced and tested. The NCs reinforced by 0.25wt% GMA grafted CNTs showed a better elongation property (strain improvements from the pure epoxy:18.12%) than the NCs reinforced by other kinds of CNTs (strain improvements from the pure epoxy: around 10.00% or less). Meanwhile, the commercial covalent functionalised CNTs reduced the elongations (strain reductions from the pure epoxy: 10% or higher) of the NCs. In the fracture toughness tests, NCs made via a dissolver disk were produced and tested. It was found that GMA grafted CNTs improved the model I fracture toughness of the NCs, from the pure epoxy resin, with a significant number of 16.48%. This number is higher than the other NCs. The influences of the surface functionalisation on the CNT dispersion state are discussed. In addition, the failure mechanisms of the NCs reinforced by different kinds of CNT/f-CNTs are identified and discussed. Content Version: Open Access Publication Date: May-2016 Date Awarded: Dec-2016 URI: http://hdl.handle.net/10044/1/43764 Advisor: Li, Qianqian Greenhalgh, Emile Shaffer, Milo Department: Aeronautics Publisher: Imperial College London Qualification Level: Doctoral Qualification Name: Master of Philosophy (MPhil) Appears in Collections:Aeronautics PhD theses Items in Spiral are protected by copyright, with all rights reserved, unless otherwise indicated. Creative Commons
ESSENTIALAI-STEM
Talk:Erasmiaans Gymnasium As no problems were argumented I changed this page into a redirect. NB The (other) Gymnasium Erasmianum has greatly improved since my first suggestion
WIKI
jbackup script The following script may be useful for sites wishing to execute a daily backup procedure. #!/bin/ksh # The following 3 lines setup the environment for the backup # to run via Cron. # export JBCRELEASEDIR=/usr/jbc export LD_LIBRARY_PATH=$JBCRELEASEDIR/lib:/usr/ccs/lib:/usr/lib export PATH=$PATH:/usr/jbc/bin # CD to a directory that has disk space to hold tempory files # used during jbackup. # cd /tmp # Echo the start of backup information. # echo Backup Started `date` echo # Perform the backup creating a Stat file, The stat file needs to be # somewhere outside the backup path other wise jbackup will try to backup # the same file that it is writing to. The file also needs to be pre-created # or it will fail. This will also need to store the output from the # backup in a convenient area of the disk. # Modify the device name to match the one on your system. It needs to be # a device with rewind. # Also the -m needs to be changed to the correct media size for your tape # device. # find /data -print | sort | jbackup -m10000 -S/tmp/stats f /dev/rmt/1c -v 2> /tmp/Aviion_backup_log #Display finish of backup messages # echo Backup Finished `date` echo # Verify that the backup was completed successfully. If backup failed # then mail root with the error and also print a backup failed error # message on the default printer. (add -d {printer name} to the lp # statement if different printer is required.) # cat /tmp/Aviion_backup_log | egrep 'ERROR!|failed' > /tmp/error.check if (test -s "/tmp/error.check") then   echo Error in Aviion_backup_log >/tmp/mail.error   cat /tmp/error.check >>/tmp/mail.error   mail root < /tmp/mail.error   banner 8500_backup failed `date` | lp else # If backup was successful then wait for 5 minutes to make sure that # the tape has fully rewound. Then display start of verify message. # The verify will check that the data on the tape is valid (i.e. no # bad tape blocks etc.) #   sleep 300   echo Verify Started `date`   echo # Start the restore (Remember to change the tape device to the relevent # one for your machine) and store any output from the restore in a # convenient area of the disk. #   jrestore -f/dev/rmt/1c -P 2> /tmp/Aviion_verify_log # Display the verify finished message #   echo Verify Finished `date` # Check the verify output for any errors. If any errors are found # then mail root with the error and also print a verify failed # error message on the default printer. (add d {printer name} to # the lp statement of different printer is required.) #   cat /tmp/Aviion_verify_log | egrep 'ERROR!|failed' > /tmp/error.check   if (test -s "/tmp/error.check") then     echo Error in verification of Aviion_verify_log >/tmp/mail.error     cat /tmp/error.check >>/tmp/mail.error     mail root < /tmp/mail.error     banner Aviion_verify of_backup failed `date` | lp   fi fi # Backup finished cd \ Files
ESSENTIALAI-STEM
Latin Kings (disambiguation) The Latin Kings are a Latino street gang, founded in Chicago in 1954. Latin Kings, Latin kings, or The Latin Kings may also refer to: * Kings of Alba Longa, a series of legendary kings of Alba Longa, an ancient city in Latium, or their predecessors * Kings of Jerusalem, the rulers of the Latin Catholic Crusader state which comprised the city * The Latin Kings (group), a Swedish hip hop group * The Original Latin Kings of Comedy
WIKI
Page:Popular Science Monthly Volume 64.djvu/157 Rh a dot or a dash, according to the disposition of the holes on the first strip. Accordingly, taken as a whole, the receiving arrangement is not capable of being influenced so as to print a telegraphic sign except by the operation of a series of wave trains succeeding one another at certain assigned intervals of time. An improvement has been lately described by the same inventor in which the apparatus used, although more complicated, performs the same functions. At each station two instruments have to be employed; at the transmitting station one to effect the conversion of Morse signals into the properly arranged series of wave trains, and at the receiving station an instrument to effect the reconversion of the series of wave trains into the Morse signals. These are called respectively the dispenser and the collector. The details of the arrangements are somewhat complicated and can only be described by the aid of numerous detailed drawings, but the inventor states that he has been able to carry on Hertzian wave telegraphy by means of these arrangements for short distances. Moreover, the method lends itself to an arrangement of multiplex telegraphy, by sending out from different transmitters signals which are based upon different arrangements of time intervals between the electric wave trains. Although this method may succeed in preventing a receiving arrangement from being influenced by vagrant waves or waves not intended for it, yet an objection which arises is that there is nothing to prevent any one from intercepting these wave trains, and with a little skill interpreting their meaning. Thus, if the record were received in the ordinary way on a simple receiver, corresponding to a Morse dot would be printed five dots at unequal intervals, and corresponding to a Morse dash would be printed two such sets of five dots. A little skill would then enable an operator to interpret these arbitrary signals. On the other hand, the inventor asserts that he can overcome this difficulty by making intervals of time between the impulses in the series so long that the latter become longer than the intervals between each of the series of waves which are dispatched in continuous succession when the key is pressed for a dash. In this case, when telegraphing, the series of dots would overlap and intermingle with each other in a way which would make the record unintelligible if received in the usual manner, but would be perfectly legible if received and interpreted by a receiver adapted for the purpose. Another way of obliterating the record, as far as outsiders are concerned, is to interpolate between the groups of signals an irregular series of dots, i. e., of wave trains, which would affect an ordinary coherer, and so make an unintelligible record on an ordinary receiver,
WIKI
Bookmaker GVC forecasts higher annual profit on online gaming boost Adds details from statement, background, and CEO comment Oct 8 (Reuters) - Ladbrokes and bwin owner GVC Holdings GVC.L on Thursday raised its outlook for annual core earnings after posting a 12% rise in third-quarter revenue, helped by a surge in online gaming and as sports events such as the English Premier League resumed. The company, which owns brands such as Coral and Eurobet, said full-year earnings before interest, taxes, depreciation, and amortization (EBITDA) is now expected between 770 million and 790 million pounds ($995.9 million to $1.02 billion). GVC had previously forecast annual EBITDA to be between 720 million pounds and 740 million pounds, and last week warned that new gambling rules in Germany, its second-largest online-gaming market, would reduce 2021 profit by 70 million pounds. However, the company is steaming ahead as it also announced the acquisition of Bet.pt, an online gambling operator in Portugal. Gambling companies have been expanding overseas to offset a hit from tighter regulations in Britain. The company, which has a U.S. presence through a venture with casino operator MGM Resorts MGM.N, said the business was tracking ahead of expectations, with sales of roughly $150 million to $160 million expected this year. "We have delivered our nineteenth consecutive quarter of double-digit online growth, along with market share gains in all our major territories ... GVC is primed for further growth," Chief Executive Officer Shay Segev said. Online net gaming revenue for the three months ended Sept. 30 jumped 26% as COVID-19 encouraged customers to play more to relieve themselves of boredom. ($1 = 0.7732 pounds) (Reporting by Tanishaa Nadkar and Pushkala Aripaka in Bengaluru, Editing by Sherry Jacob-Phillips) ((tanishaa.nadkar@thomsonreuters.com; +919730172534; Twitter - @TanishaaNadkar;)) The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Talk:Ana (gamer) Move discussion in progress There is a move discussion in progress on Talk:Attach (Call of Duty player) which affects this page. Please participate on that page and not in this talk page section. Thank you. —RMCD bot 00:03, 4 September 2018 (UTC) Free content attribution Hi. Please do not remove the free content attribution as doing so makes this article a copyright violation since it contains copy/paste text from a source with a compatible license. See Copying_text_from_other_sources. The red category is created by the template itself, if you do not like the red category, please raise that at Template_talk:Free-content_attribution. Thank you. Mel ma nn 12:02, 30 April 2021 (UTC) Embedding tweets? I've been trying to find media which would be appropriate to add to this article, but unsurprisingly, most of it is not free content and cannot be used. One alternative is quoting the official tweets announcing winners. This seems appropriate to me since Valve runs these accounts, and they can be considered equivalent to announcements of a sports governing body or a peak body when it comes to Dota 2 esports. Examples of what it might look like are to the right. What do you think? Any input is appreciated. Mel ma nn 11:29, 4 May 2021 (UTC) * It's misleading to use a fake fan created logo derivative to represent official statements and games. Please don't do so. I've also reverted your change to the image at Dota 2. -- ferret (talk) 12:37, 4 May 2021 (UTC) * It's a reasonably accurate re-creation of the logo, in my opinion. But I'll take on your feedback. In any case, I'm not insisting on this particular image or any image at all, if the tweets were to be included any other image, or no image, could be used. Mel ma nn 13:20, 4 May 2021 (UTC) * , embedded tweets would just be glorified citations right? ~ Dissident93 (talk) 18:00, 5 May 2021 (UTC) * Essentially. Perhaps a quotation/citation? I think the article could use an image or media, but that's hard to come by. Tweets might serve a similar purpose to contribute towards the topic. Only other alternative that comes to mind is perhaps including a game screenshot of ana's Io from one of the TI 2019's games. Perhaps that could be justified under non-free rationale, similarly to how File:Dota 2 Gameplay Aug 2017.jpg is used in the article Dota 2. Mel ma nn 18:30, 5 May 2021 (UTC)
WIKI
Page:Metamorphoses.djvu/471 METAMORPHOSES BOOK VIII received them, humble indeed, thatched with straw and reeds from the marsh; but pious old Baucis and Philemon, of equal age, were in that cottage wedded in their youth, and in that cottage had grown old together; there they made their poverty owning it, and by bearing it in a contented spirit. It was of no use to ask for masters or for servants in that house; they two were the whole household, together they served and ruled. And so when the heavenly ones came to this humble home and, stooping, entered in at the lowly door, the old man set out a bench and bade them rest their limbs, while over this bench busy Baucis threw a rough covering. Then she raked aside the warm ashes on the hearth and fanned yesterday's coals to life, which she fed with leaves and dry bark, blowing them into flame with the breath of her old body. Then she took down from the roof some fine-split wood and dry twigs, broke them up and placed them under the little copper kettle. And she took the cabbage which her husband had broaght in from the well-watered garden and lopped off the outside leaves. Meanwhile the old nian with a forked stick reached down a chine of smoked bacon, which was hanging from a blackened beam an, cutting off a little piece of the long cherished pork, he put it to cook in the boiling water. Meanwhile they beguiled the intervening time with their talk * * * * a mattress of soft sedge.- grass was placed on a couch with frame and feet of willow. They threw drapery over this, which they were not accustomed to bring out except on festal days; but even this was a cheap thing and well- worn, a very good match for the willow couch. The ods reclinei. The old woman, with her skirtg tucked up, with trembling hands set out the table, 451
WIKI
Page:American Historical Review, Vol. 23.djvu/325 Rh Besides guarding secrets, the Southern press did much to develop and preserve a high morale among the people and the soldiers. In reporting the many indecisive engagements near Richmond, the editors of the South would always claim victory while the Northern papers were exaggerating Union disasters or complaining that the successes achieved by Federal arms were not more conclusive. To use a familiar athletic term, the men in the field were well supported "on the side lines". With admirable cleverness the best interpretation was put upon Southern reverses. When the earlier promises of moving on to Washington and New York failed to materialize, the papers began to preach the theory that the whole purpose was the defense of the Southern capital. Thus Gettysburg and Antietam were heralded as defensive victories. Always the superior fighting power of Confederates over Unionists was assumed in the newspaper comments, and that fighting spirit which goes with an air of invincibleness was engendered. In spite, however, of all this caution there were occasional breaches of discretion on the part of Southern papers. The "rebel war clerk" Jones declared that the enemy "seemed to have speedy and accurate information from Richmond not only of all movements of our army, but of the intentions of the government. … They know every disposition of our forces from day to day sooner than our own people!" The publication of his army's movements at times frustrated Lee's plans, as for instance when the papers heralded the sending of Longstreet to the Western army, which was intended to be a secret. Beauregard, who suffered at various times from reporters, complained in 1861 that the real extent of his numerical strength as well as his intended operations were revealed by newspapers and requested the Secretary of War to exclude reporters from the vicinity of his army. In the last desperate months of Southern resistance, some interesting disclosures came from a quite unexpected source. President Jefferson Davis, after the fall of Atlanta, visited Georgia to stem the tide of opposition led by Governor Brown. In speaking at Macon he explained that reinforcements were not sent to Georgia from
WIKI
Page:Confederate Military History - 1899 - Volume 1.djvu/463 Rh not in official capacity but as gentlemen of distinction. Afterward they went as passengers aboard a British merchant vessel, &quot;The Trent, &quot; carrying English mails, and sailed for England. In the meantime Captain Charles Wilkes, U. S. N., commanding the United States sloop-of-war, &quot;San Jacinto, &quot; carrying thirteen guns, who appears to have had a zeal not according to knowledge, was busy in carrying out a purpose to capture the Confederate commissioners and executed his designs with success enough to produce a sensation which involved his government in a serious difficulty with England, from which extrication was gained only by very mortifying explanations. Cruising near the island on the alert for the &quot;Trent,&quot; Captain Wilkes sighted the approaching vessel on the high seas, and gave the command to &quot;beat to quarters, hoist the colors and load the guns. The next proceeding was to fire a shot across the bow of the &quot;Trent,&quot; which caused that vessel to display the British colors with out arresting its onward speed. A shell from the &quot;San Jacinto&quot; across her course brought the &quot;Trent&quot; to without delay and Captain Wilkes then sent his executive officer with a guard of marines and a full armed boat crew to board the British ship. Lieutenant Fairfax, the executive officer, went aboard, and informing Captain Moir of the &quot;Trent&quot; as to the object of his visit, asked for the passenger list, saying that he would search the vessel to find Mason and Slidell. But while the English captain was protesting against this breach of international law and refusing to show any papers, the two Confederate commissioners with their associates, Eustis and McFarland, appeared and united with the British officer in his protest. At this juncture the other Federal officers in the armed cutter came aboard with a number of marines and other armed men of the boat s crew and the second cutter also appearing alongside Captain Wilkes formed a line outside the main deck cabin into which the Southern passengers had retired to pack their baggage. This show of force
WIKI
Articles | Volume 21, issue 8 Nat. Hazards Earth Syst. Sci., 21, 2543–2562, 2021 https://doi.org/10.5194/nhess-21-2543-2021 Nat. Hazards Earth Syst. Sci., 21, 2543–2562, 2021 https://doi.org/10.5194/nhess-21-2543-2021 Research article 25 Aug 2021 Research article | 25 Aug 2021 Optimizing and validating the Gravitational Process Path model for regional debris-flow runout modelling Jason Goetz et al. Related authors Transfer learning for landslide susceptibility modelling using domain adaptation and case-based reasoning Zhihao Wang, Jason Goetz, and Alexander Brenning Geosci. Model Dev. Discuss., https://doi.org/10.5194/gmd-2022-119,https://doi.org/10.5194/gmd-2022-119, 2022 Preprint under review for GMD Short summary Evaluating the destabilization susceptibility of active rock glaciers in the French Alps Marco Marcer, Charlie Serrano, Alexander Brenning, Xavier Bodin, Jason Goetz, and Philippe Schoeneich The Cryosphere, 13, 141–155, https://doi.org/10.5194/tc-13-141-2019,https://doi.org/10.5194/tc-13-141-2019, 2019 Short summary Related subject area Landslides and Debris Flows Hazards Debris flow velocity and volume estimations based on seismic data Andreas Schimmel, Velio Coviello, and Francesco Comiti Nat. Hazards Earth Syst. Sci., 22, 1955–1968, https://doi.org/10.5194/nhess-22-1955-2022,https://doi.org/10.5194/nhess-22-1955-2022, 2022 Short summary Integration of observed and model-derived groundwater levels in landslide threshold models in Rwanda Judith Uwihirwe, Markus Hrachowitz, and Thom Bogaard Nat. Hazards Earth Syst. Sci., 22, 1723–1742, https://doi.org/10.5194/nhess-22-1723-2022,https://doi.org/10.5194/nhess-22-1723-2022, 2022 Short summary Landslides caught on seismic networks and satellite radars Andrea Manconi, Alessandro C. Mondini, and the AlpArray working group Nat. Hazards Earth Syst. Sci., 22, 1655–1664, https://doi.org/10.5194/nhess-22-1655-2022,https://doi.org/10.5194/nhess-22-1655-2022, 2022 Short summary Variable hydrograph inputs for a numerical debris-flow runout model Andrew Mitchell, Sophia Zubrycky, Scott McDougall, Jordan Aaron, Mylène Jacquemart, Johannes Hübl, Roland Kaitna, and Christoph Graf Nat. Hazards Earth Syst. Sci., 22, 1627–1654, https://doi.org/10.5194/nhess-22-1627-2022,https://doi.org/10.5194/nhess-22-1627-2022, 2022 Short summary Assessing the importance of conditioning factor selection in landslide susceptibility for the province of Belluno (region of Veneto, northeastern Italy) Sansar Raj Meena, Silvia Puliero, Kushanav Bhuyan, Mario Floris, and Filippo Catani Nat. Hazards Earth Syst. Sci., 22, 1395–1417, https://doi.org/10.5194/nhess-22-1395-2022,https://doi.org/10.5194/nhess-22-1395-2022, 2022 Short summary Cited articles Aaron, J., McDougall, S., and Nolde, N.: Two methodologies to calibrate landslide runout models, Landslides, 16, 907–920, https://doi.org/10.1007/s10346-018-1116-8, 2019.  Aleotti, P. and Chowdhury, R.: Landslide hazard assessment: summary review and new perspectives, B. Eng. Geol. Environ., 58, 21–44, https://doi.org/10.1007/s100640050066, 1999.  Angillieri, M. Y. E.: Debris flow susceptibility mapping using frequency ratio and seed cells, in a portion of a mountain international route, Dry Central Andes of Argentina, CATENA, 189, 104504, https://doi.org/10.1016/j.catena.2020.104504, 2020.  Ardizzone, F., Cardinali, M., Carrara, A., Guzzetti, F., and Reichenbach, P.: Impact of mapping errors on the reliability of landslide hazard maps, Nat. Hazards Earth Syst. Sci., 2, 3–14, https://doi.org/10.5194/nhess-2-3-2002, 2002.  ASF DAAC: ALOS PALSAR Radiometric Terrain Corrected high resolution digital elevation model: Includes Material © JAXA/METI, https://doi.org/10.5067/Z97HFCNKR6VA, 2011.  Download Short summary Debris flows are fast-moving landslides that can cause incredible destruction to lives and property. Using the Andes of Santiago as an example, we developed tools to finetune and validate models predicting likely runout paths over large regions. We anticipate that our automated approach that links the open-source R software with SAGA-GIS will make debris-flow runout simulation more readily accessible and thus enable researchers and spatial planners to improve regional-scale hazard assessments. Altmetrics Final-revised paper Preprint
ESSENTIALAI-STEM
Condensed Matter Seminar: Spontaneous Conducting Boundary Channels in 1T-TaS2 Eran Maniv, Ben Gurion University 22 July 2024, 11:00  Kaplun Building, Flekser Hall 118  Condensed Matter Seminar Zoom: https://tau-ac-il.zoom.us/j/85779688797   Abstract: Materials that transition between metal and insulator, the two opposing states that distinguish all solids, are fascinating because they underlie many mysteries in the physics of the solid state. In 1T-TaS2, the metal-insulator transition is linked to a series of metastable states of a chiral charge density wave whose basic nature is still an open question. In this talk, I will show that pulses of current through these materials create current-carrying boundary channels that distinguish the metallic and insulating states. Our collaborative work (Transport and scanning SQUID) demonstrates electrical control of these channels’ properties, suggesting their formation could be due to the complex interplay of the formation of domain walls and intrinsic properties of the charge density wave phase. Our findings show that physical boundaries play a key role in the properties of the metastable states of the metal-insulator transition, highlighting new possibilities for in-situ electrical design and active manipulation of electrical components.       Event Organizer: Dr. Dominik Juraschek     Recordings of past seminars >   Tel Aviv University makes every effort to respect copyright. If you own copyright to the content contained here and / or the use of such content is in your opinion infringing, Contact us as soon as possible >>
ESSENTIALAI-STEM
Cavegirl (film) The 1985 sex comedy Cavegirl was written and directed by David Oliver and starring Daniel Roebuck, Cynthia Thompson, and Stacey Q in her film debut. Plot The film tells the story of a clumsy high school boy named Rex (Daniel Roebuck) who gets lost in a cave while on a class excursion. A crystal opens a time portal and sends him back in time to caveman times. There he meets "smokin' hot" Eba (Cynthia Thompson). The antics follow as Rex tries to get Eba to sleep with him. Cast * Daniel Roebuck as Rex * Cynthia Thompson as Eba (as Cindy Ann Thompson) * Darren Young as Dar * Saba Moor-Doucette as Saba (as Saba Moor) * Jeff Chayette as Argh * Charles Mitchell as Char * Cynthia Rullo as Aka * Tom Hamill as Casey * Bill Adams as Bill * Chris Noble as Hank * Bill Sehres as Ralph * Syndi King as Karen * A.A. Cavallaro as Rex's Father * Maggie Ostroff as Rex's Mother * Stacey Q as Brenda (as Stacey Swain)
WIKI
methylol meth·y·lol (meth'ĭ-lol), Hydroxymethyl; the moiety, -CH2OH. Farlex Partner Medical Dictionary © Farlex 2012 meth·y·lol (meth'i-lol) Hydroxymethyl; the radical, -CH2OH. Medical Dictionary for the Health Professions and Nursing © Farlex 2012 References in periodicals archive ? These were assigned to the bridging methylene (I-CH2-I) and methylene group and hydrogen bonded terminal methylol functions (I-CH2-OH), respectively. During formation of b-stage resin, a dominant reaction occurs between two equivalents of the thus formed methylol phenol with itself to form a longer-chain methylol phenolic that has an ortho-ortho substituted methine bridge. This could be explained by additional condensation reaction (postcure phenomenon) involving either residual methylol groups or phenolic hydroxyl groups (3,391 [cm.sup.-1]) [28, 29]. Chaikumpollert, A method for preservation of natural rubber latex using methylol compounds, National Science and Technology Development Agency, 2010, Malaysia patent MY142541 (A). Zigon, "Aliphatic hyperbranched polyesters based on 2,2-bis(methylol)propionic acid--Determination of structure, solution and bulk properties," Progress in Polymer Science, vol. The methylol of hydroxymethyl resorcinol could react with the amino groups on HPAM. It characterizing the course of reaction completeness of the methylol ureas and metilol groups formation, characterizing stitching degree at polycondensation in the solution containing [Ca.sup.2+] and in control solution without [Ca.sup.2+]. 2, 2-bis methylol propanoic acid, dipentaerythritol, and silver benzoate were procured from Aldrich, Germany. This peak was related with the condensation of phenolic and methylol groups to form methylene bridges [12]. The interaction of formaldehyde with the functional groups of amino acids (e.g., primary amines and thiols) forms methylol adducts that can further crosslink with other amino acids through methylene bridge formation (25).
ESSENTIALAI-STEM
wiki:ToDo Version 17 (modified by rme, 5 years ago) (diff) -- Things To Do Here are some big and small things that would be good to do. If you would be interested in funding any of these, please send mail to business@…. If you would be interested in volunteering to work on any of these, that would be welcome, too. Please send mail to openmcl-devel@… to discuss any of them. Microsoft Windows The 32-bit Windows lisp doesn't currently run on 64-bit Windows. This is because 64-bit Windows doesn't let us set up an x86 LDT so that we can use a segment register to point to thread-local data. A possible solution to this is to pare down the size of the TCR so that we can fit as many slots as possible into the Windows TLS vector. Documentation We could really use better documentation tools. We had a long thread on openmcl-devel about it, but there seems to be no magic way to make editing Docbook content easier. Better documentation generally. Producing this would presumably be made easier by better tools. Debugging Single stepping (not the evaluator kind, the compiled code kind). Delivery Tree-shaking support. Make the lisp available as a shard library. Release Tools We now have a buildbot that builds and tests ccl automatically. In addition to ccl's own test suite, it would be desirable to run and test other major software. For instance, Maxima has a substantial test suite. Networking Enhance socket interface to support IPv6. Maybe follow  http://www.franz.com/support/documentation/current/doc/socket.htm#socket-ipv6-1 IDE stuff Unbundle the Cocoa-based IDE from the ccl distribution and make it available as a separate product. Add and document a reasonable way to create NSStrings/CFStrings from lisp strings. There's unexported stuff like %make-nsstring and ccl::with-autoreleased-nsstrings, but there needs to be something official. Design and implement some sort of windowing library for MS Windows that doesn't rely on Cocotron. Maybe something for X11, too. (Note that ccl doesn't have any idea how to call C++, so it's best to pick a library with a C interface.) Bring back Fred. Lisp Implement missing CLOS MOP features. Compiler Better machine-word arithmetic support. Or maybe an interface akin to LispWorks's int32 API. Runtime/GC Enhancements Make ccl reliably handle out-of-memory conditions on operating systems (like Solaris) that don't lie about memory allocation. The GC stops all other threads while it operates. Some sort of concurrent GC (where collector and mutator threads can run at the same time) might be beneficial for some users. Objective-C Bridge Revive support for the GNU Objective-C runtime in the Objective-C bridge. Java The jfli interface to Java ships with ccl as an example, but perhaps an improved bridge would be useful (e.g., for Android). Project Infrastructure Rename openmcl-devel@… to ccl-devel@…. Review tickets on the Trac. Update Trac main page now that ccl.clozure.com exists. Ports to More Systems Port to Itanium. Probability: low. Port to modern SPARC. Probability: very low. At some point, the Darwin/PPC is going to die (not least because we'll run out of working hardware). The PPC Linux port will likely live on, but we'll probably need to acquire some newer hardware one of these days. Some larger PPC systems use a page size of 64K. CCL expects a page size of 4K, and it would take some effort to make it work with other page sizes. Old stuff
ESSENTIALAI-STEM
Exactly what are the behavioural and you will emotional outcomes of stress? This means that, it is possible to sense stress, muscle tissue stress, soreness, disease, indigestion and you may faintness. You may also breathe more quickly, keeps tremors or have problems with certain pains and aches. On much time-title, you happen to be placing on your own at risk out of cardiac arrest and you will coronary arrest. 10 Many of these changes try the body’s way of making it simpler on exactly how to strive otherwise run away and once the stress otherwise hazard has passed, your stress hormones levels will usually go back to typical. 11 However, whenever you are constantly around fret, such hormones remain in you, causing the observable symptoms out-of stress. If you are caught from inside the a busy work environment otherwise into an overcrowded instruct, you simply cannot struggle otherwise escape, so that you cannot use up the latest toxins your own human anatomy tends to make to protect your. Over the years, the new build-upwards of these chemical substances and also the changes they establish is going to be destroying for your body. several If you’re stressed you can also feel several thinking, and additionally stress, irritation or lower notice-respect, which can lead to are taken, indecisive and tearful. 13 You are able to sense symptoms out of constant care, rushing advice, or several times discuss an equivalent something in your head. You’ll be able to feel alterations in their behavior. You are able to reduce your own vibe quicker, operate irrationally otherwise be more vocally or truly competitive. 14 Such thinking is feed on each other and develop real periods, which could make you become bad. Such as for instance, significant nervousness can make you getting thus unwell, you after that worry you have a critical health. What is causing worry? All kinds of activities can lead to fret. The most common include works, money things and you can relationship which have people, children and other loved ones. Stress is brought about either of the significant upheavals and existence incidents for example split up, unemployment, moving domestic and you can bereavement, otherwise because of the a series of lesser problems such as for example effect undervalued working otherwise arguing with a relative.16Sometimes, there are not any obvious causes. Matchmaking and worry Matchmaking are a good support in times as soon as we end up being troubled. But not, from time to time the folks surrounding you, be it somebody, moms and dad, guy, friend or colleague, increases stress levels. 17 Relationships, the latest forgotten piece of the fresh welfare mystery I browsed relationships to possess Mental health Sense Times 2016 and exactly how a good relationship are essential in regards to our mental health. See the animation now: Occurrences such as for example constant slight arguments and you can conflicts, so you can larger family crises, like an event, problems or bereavement will likely change the way do you think, become and you will act. This might for that reason influence your stress levels. Work-lives balance and be concerned The pressure from an ever more demanding performs culture in the united kingdom is amongst the biggest members to fret one of several standard populace. 18 If you are antique performing era is 37 instances each week, new latest and you can dramatic increase in Britain’s functioning circumstances ways that it is likely to boost. 20.1% of one’s Uk doing work people performs 45 times or even more per day. 19 The human being will cost you off unmanaged performs relevant fret was thorough. Perception unhappy towards amount of time you spend at your workplace and you may forgetting other regions of lives on account of functions get improve your vulnerability so you’re able to worry. Enhanced levels of stress is, otherwise managed very early enough, result in burn off-away or maybe more severe mental health trouble. Mental health issues such as for instance nervousness and you can anxiety, are usually the leading reason behind work absences, bookkeeping for approximately 40% from problems log off. 20 For the how does grizzly work 2008, mental health accounted for 442,one hundred thousand instances of works-associated problems and has had a projected cost of 13.5 mil. 21 This means that, intellectual ill health now makes up about a critical proportion out-of much time-title sickness and you can early old age, cited since the top factor in infection getting 20% regarding NHS group .twenty two
ESSENTIALAI-STEM
Page:The White Stone.djvu/162 158 the refinements of cruelty. For nearly three whole centuries the Jesuits were, in the Middle Kingdom, a source of endless disturbances. In our own times, the Christian acquired the habit of sending jointly or separately into that vast Empire, whenever order was disturbed, soldiers who restored it by means of theft, rape, pillage, murder, and incendiarism, and of proceeding at short intervals with the pacific penetration of the country with rifles and guns. The poorly armed Chinese either defend themselves badly or not at all, and so they are massacred with delightful facility. They are polite and ceremonious, but are reproached with cherishing feeble sentiments of affection for Europeans. The grievances we have against them are greatly of the order of those which Mr. Du Chaillu cherished towards his gorilla. Mr. Du Chaillu, while in a forest, brought down with his rifle the mother of a gorilla. In its death, the brute was still pressing its young to its bosom. He tore it from this embrace, and dragged it with him in a cage across Africa, for the purpose of selling it in Europe. Now, the young animal gave him just cause for complaint. It was unsociable, and actually starved itself to death. 'I was powerless,' says Mr. Du Chaillu, 'to correct its evil nature.' We complain of the Chinese with as great a show of reason as Mr. Du Chaillu of his gorilla. "In 1901, order having been disturbed at Peking,
WIKI
User:Rollojj/Basic Algebra Basic Algebra An algebra is basic if, modulo its Jacobson radical, it is the product of division rings (as opposed to matrix algebras over division rings). Every algebra is Morita equivalent to a basic algebra.
WIKI
Prairie Township, Wilson County, Kansas Prairie Township is a township in Wilson County, Kansas, in the United States. History Prairie Township was established in 1872. It was named from its setting upon the prairie.
WIKI
Water purification From WikiPrepping Jump to: navigation, search Water purification is the process of removing undesirable chemicals, biological contaminants, suspended solids and gases from contaminated water.[1] Contaminants Aside from sediment, contaminants typically found in non-purified water are[2]: Cryptosporidium Potential health effects from ingestion of water contaminated with Cryptosporidium are: • Gastrointestinal illness (for example, diarrhea, vomiting, cramps). Sources of Cryptosporidium in drinking water are: • Human and animal fecal waste. Methods that are effective in removing Cryptosporidium from water are: • Boiling (rolling boil for 1 minute) - very high effectiveness; • Filtration - high effectiveness when using an absolute less than or equal to 1 micron filter (NSF Standard 53 or 58 rated "cyst reduction / removal" filter); Methods that are not sufficiently effective in removing Cryptosporidium: • Disinfection with iodine or chlorine - not effective; • Disinfection with chlorine dioxide - low to moderate effectiveness; Combination filtration and disinfection has a very high effectiveness in removing and killing Cryptosporidium when used with chlorine dioxide and an absolute less than or equal to 1 micron filter (NSF Standard 53 or 58 rated "cyst reduction / removal" filter). Giardia lamblia Also known as Giardia intestinalis. Potential health effects from ingestion of water contaminated with Giardia are: • Gastrointestinal illness (for example, diarrhea, vomiting, cramps). Sources of Giardia in drinking water are: • Human and animal fecal waste. Methods that are effective in removing Giardia: • Boiling (rolling boil for 1 minute) - very high effectiveness; • Disinfection with chlorine dioxide - high effectiveness; • Filtration- high effectiveness when using an absolute less than or equal to 1 micron filter (NSF Standard 53 or 58 rated "cyst reduction / removal" filter); Methods that are not sufficiently effective in removing Giardia: • Disinfection with iodine or chlorine - low to moderate effectiveness; Combination filtration and disinfection has a very high effectiveness in removing and killing Giardia when used with chlorine dioxide and an absolute less than or equal to 1 micron filter (NSF Standard 53 or 58 rated "cyst reduction / removal" filter). Bacteria Potential health effects from ingestion of water contaminated with bacteria are: • Gastrointestinal illness (for example, diarrhea, vomiting, cramps). Sources of bacteria in drinking water are: • Human and animal fecal waste. Methods that are effective in removing bacteria: • Boiling (rolling boil for 1 minute) - very high effectiveness; • Disinfection with iodine or chlorine - high effectiveness; • Disinfection with chlorine dioxide - high effectiveness; • Filtration - moderate effectiveness when using an absolute less than or equal to 0.3 micron filter; Combination filtration and disinfection has a very high effectiveness in removing and killing bacteria when used with iodine, chlorine, or chlorine dioxide and an absolute less than or equal to 0.3 micron filter (NSF Standard 53 or 58 rated "cyst reduction / removal" filter). Viruses Potential health effects from ingestion of water contaminated with viruses are: Sources of viruses in drinking water are: • Human and animal fecal waste. Methods that are effective at removing viruses: Methods that are not effective at removing viruses: Purification methods Boiling Boiling is the single most effective method of removing any active biological contaminants. Boiling water long enough removes all microorganisms and viruses from it. To ensure full effectiveness, water should be brought to a rolling boil for at least 1 minute at normal elevations. However, because boiling temperature decreases with elevation, longer boiling times are required at high elevations. At altitudes greater than 6,562 feet (greater than 2000 meters), you should boil water for 3 minutes.[2] Filtration A water filter removes impurities by means of a sufficiently fine physical barrier. In order for a particular threat to be removed, pores in the barrier must be too small for it to pass. All filters can remove sediment, but sub-micron pore sizes are required to reliably remove microorganisms. Protozoa can get as small as 50 microns, and bacteria as small as 0.2 microns; thus, a 0.2 micron filter is required to reliably block them. Viruses are too small to be blocked by any physical filter. Filtration is not effective against viruses, unless the filtration device utilizes some additional means of disinfection (e.g. a chemical matrix) to kill viruses. Main article: Water filtration Chemical disinfection Exposure to certain chemicals, such as iodine, chlorine, or chlorine dioxide, can kill some or all microorganisms. The effect of these chemicals varies significantly - not all are effective against all threats. The amount of time necessary to fully disinfect water depends on the quantity of the chemical used, water temperature (cold water takes longer), and water clarity. Iodine Iodine reliably kills viruses and most protozoa. However, it is not sufficiently effective against Giardia. In clear warm water, iodine takes ~30 minutes to perform at maximum effectiveness. If water is cold or turbid, considerably longer reaction time is required. Iodine remains in the water after purification, negatively affecting its taste. Adding vitamin C to the water (after disinfection is complete) helps to precipitate most of the iodine still in the water, and makes the taste more subdued.[3]. Chlorine Chlorine dioxide Ultraviolet disinfection Sufficiently long exposure to ultraviolet (UV) light will kill some microorganisms. Because the amount of exposure depends on water clarity, is it important to filter out all sediment to maximize the effect. References 1. https://en.wikipedia.org/wiki/Water_purification 2. 2.0 2.1 A Guide to Drinking Water Treatment and Sanitation for Backcountry & Travel Use 3. https://en.wikipedia.org/wiki/Portable_water_purification
ESSENTIALAI-STEM
ALERT Stop Ransomware Mid-Flight Nubus Definition - What does Nubus mean? A Nubus is a 32-bit parallel computer bus. It was created by the Massachusetts Institute of Technology and originated from the NuMachine workstation project, which designed workstations to interface with LANs using microprocessors. The MIT laboratory team for the NuMachine worked in collaboration with Western Digital. The original Nubus and NuMachine were designed for the Western Union NuMachine and for the Lisp Machines Incorporated LMI-Lambda. The NuMachine was used in components by Texas Instruments, Next, Incorporated (NeXT) and Apple Computer. In 1983 the NuMachine was bought by Texas Instruments. It was replaced by the TI Explorer in 1985. At the time, Nubus was considered a significant advancement, since most computer interfaces used an 8-bit bus. Today, Nubus is no longer used and was replaced mostly by the peripheral component interconnect (PCI) and other parallel buses. Techopedia explains Nubus The Nubus card uses pins instead of an edge connector, which is used on a PCI or industry standard architecture card. Not only did the Nubus introduce a 32-bit bus, but it had an ID structure permitting cards to be identified by the host during booting. At the time, the majority of buses used pins on the CPU, which connected to the backplane. This structure corresponded to data standards and signaling, which included configuring the memory and the card, interrupts and other time consuming tasks. In fact, Nubus was one of the first plug-and-play designs. However, the Nubus architecture required a controller chip between the I/O chips on the card and the bus. This scheme required additional cost and complexity compared to the simple bus systems supported by minimal I/O chips. Nubus cards can be designed as either a master or slave. A master manages bus requests for bus mastery and can secure the bus from access by other Nubus devices for an allotted time. The slave responds to requests, transmits non-master requests and does not need support for the entire 32-bit transfer. A 24-bit Nubus card is utilized on the Macintosh II series. It is called a 24-bit aliasing and supports address lines 0 to 23. Nubus was also chosen for NeXT Computer modules, but it had a different printed circuit board design. Share this:
ESSENTIALAI-STEM
Esme Tombleson Esme Irene Tombleson (née Lawson; 1 August 1917 – 30 July 2010) was a New Zealand politician of the National Party. An Australian child prodigy who recited Shakespeare, she had a career in theatre and ballet. During the war, her sharp mind and strong memory was recognised, and she became a civil servant. She came to New Zealand through marriage, and lived on rural land near Gisborne. She represented the electorate in Parliament for 12 years, and was prominent as a campaigner for multiple sclerosis. Early life She was born in Sydney in 1917 and educated there. She received her education at the Sydney Church of England Girls Grammar School in Darlinghurst, the Sydney Conservatorium of Music, and the Imperial School of Ballet in London. She was taken around Australia as a child prodigy by her mother, reciting Shakespeare. She was involved in various ballet, opera and theatre companies. During World War II she served in the Women's Auxiliary Signalling Corps in Sydney, where her sharp memory was recognised. She became secretary of the Manpower Advisory Committee. Rural life She came to New Zealand in 1951 when she married Tom Tombleson, a Gisborne farmer. They had met at Franz Josef while on holiday. She was a headstrong person and as a public servant, she had been in a position of power. As she knew nothing about farming, this was an area where her husband was a clear superior to her, and she found the experience interesting. They lived on Burnage Station, some 75 km from Gisborne. She had to teach herself how to cook, created a massive flower garden without ever having been a gardener before, and taught rural children ballet. This was not fulfilling her, so she started to take an interest in politics. Political career Tombleson was selected as a National Party candidate shortly before the in the Gisborne electorate, when the previous candidate suffered a heart attack. She defeated the incumbent, Labour's Reginald Keeling, in the marginal seat. At the time, she was the only woman on the National caucus. After Mary Grigg and Hilda Ross, she was the third female National MP. She was joined by another female in the National caucus at the next general election in, Rona Stevenson. Tombleson had a passion for fishing and when she was offered the role of Associate Minister of Social Welfare, she turned down the offer, as she wanted to be Minister of Fisheries. She led the 1965 delegation to the 54th conference of the Inter-Parliamentary Union in Ottawa, Ontario, Canada; she was the first woman to lead a New Zealand delegation to the IPU. She was defeated by Trevor Davey in the. Later life Tombleson was a co-founder of the National Multiple Sclerosis (MS) Society in 1961. She was president of the organisation (1975–1982) and founded the Gisborne–East Coast branch in 1988. For many years, she was on the executive of the International Federation of the Multiple Sclerosis Society. She was able to control meetings, as she had learned during her theatre training how to project her voice. When her hearing got worse later in life, her voice grew even louder. Tombleson was appointed a Companion of the Queen's Service Order for public services in the 1977 Queen's Silver Jubilee and Birthday Honours. She was awarded the New Zealand 1990 Commemoration Medal in 1990, and made a Commander of the Order of the British Empire in the 1993 New Year Honours, for services to multiple sclerosis and the community. Also in 1993, she was awarded the New Zealand Suffrage Centennial Medal. She received the "rarely awarded" gold medal for distinguished services to multiple sclerosis in 1987. She died on 30 July 2010 in Gisborne. The MS Society of New Zealand offers Esme Tombleson Awards at its annual general meetings.
WIKI
Ada... A Way of Life Ada... A Way of Life is a 2010 Hindi musical film written and directed by Tanvir Ahmad, with music by A. R. Rahman. Rahman composed the songs for Ada in 2001, after completing the score for Lagaan, but Ahmad's plans for the film were shelved. Though the music was composed for the original concept, the film features a new script as well as different actors, as it stars debuting actor Ayaan Ahmed, the director's son. Along with its notable composer, the soundtrack also features award-winning singer Jayachandran, contributing vocals for the first time to a Hindi language film. The soundtrack was released on 20 May 2008. The film was scheduled to be released on 31 December 2009 but released a year later on 31 December 2010. Plot The director, Tanvir Ahmed, describes this film as "a tale of a noble father, a religious mother and a gangster son in Mumbai City". It is the tale of Ayaan, son of the noble Anil Anand, and the spiritual Aamina. Ayaan's world is turned upside down when Anil starts receiving death threats if he goes ahead with his testimony against some criminals. The murder of his father sets Ayaan on a course of revenge and killing against the criminals of Mumbai, as he becomes a contract killer. Cast * Ayaan Ahmad as Ayaan Anand * Rahul Roy as Professor Anil Anand * Ayesha Jhulka as Amina Anand * Nauheed Cyrusi as Gul * Milind Gunaji as D'Costa * Saurabh Dubey as Akrambhai Promotion To promote the film, Nokia and Big Music combined to launch a contest allowing contributors to remix two of the soundtrack songs, the winner of which—selected by Rahman—will have the opportunity to work with Rahman in the composer's studio. In support of the unusual promotion, Nokia launched its Nokia XpressMusic mixer, a positioning strategy not only to promote the film but also Nokia's music phones in advance of the launch of the Nokia MusicStore. Soundtrack The soundtrack features 10 songs, composed by A. R. Rahman, with lyrics penned by Nusrat Badr and Raqeeb Alam. The album was released in India on 20 May 2008 by Big Music, two years before the release of the film. The soundtrack received generally favorable reviews from critics. It got an 8.5/10 rating on Planet Bollywood, 8.25/10 on Music Aloud, and 3/5 on Bollywood Hungama. Lyrics by Nusrat Badr except where noted
WIKI
Page:Popular Science Monthly Volume 34.djvu/856 ETEOROLOGY is one of the youngest of the sciences. Most of what is settled and systematized has been developed within the memory of men who are still living. The contributions of Americans to research in this branch have been among the most important. Among the earlier labors in this field none deserve or have received wider recognition than those of Prof. Espy. He may, indeed, be regarded with justice as the founder of the science as at present cultivated in relation to storm predictions. was born in Westmoreland County, Pa., May 9, 1785, and died in Cincinnati, Ohio, January 24, 1860. While he was still an infant his father moved to the Blue Grass region of Kentucky; but, on finding the institution of slavery antagonistic to the principles inherited from his Huguenot ancestry, he removed after a few years to the Miami Valley in Ohio. One of his daughters had in the mean time married a Kentuckian of Mount Sterling, and James, remaining with this sister for the sake of the opportunity, became, at eighteen years of age, a student in Transylvania University, at Lexington. Here he was visited in 1805 by an elder brother, who was engaged in the practice of the law in Pennsylvania, who wrote of him: "I met my brother James, whom I had not seen since he was an infant. I found him at the university, where he had made considerable progress in the dead languages and in general science. He shows an ardent desire for knowledge, and promises to be both intelligent and useful." He was graduated in 1808, and went to Xenia, Ohio, where he taught school and studied law. Of this part of his career, Mrs. L. M. Morehead, his niece, in her "Few Incidents" of his life, says that "his love for teaching amounted to enthusiasm, and, although he completed his law studies, he finally abandoned the idea of choosing the law as his profession, and determined to follow the bent of his inclination, and become a conscientious instructor of youth." To his latest years "he considered this a noble profession, and even in old age was fond of drawing out young students to talk over their lessons with him, both hearing them and asking them questions." Either before or after this—the authorities differ—he filled creditably and satisfactorily the position of principal of the academy at Cumberland, Md., where he married Miss Margaret Pollard, who afterward gave him her full sympathy and encouragement in his meteorological researches. In 1817 Mr. Espy became a teacher in the classical department of the Franklin Institute, a position in which, according to the
WIKI
Digimon: The Movie is a 2000 American-Japanese film adaptation produced by Saban Entertainment and distributed by 20th Century Fox as part of the Digimon franchise. It was composed from three films that are edited to create a flowing storyline: The prequel to Digimon Adventure, Digimon Adventure: Our War Game and the two-part Digimon Adventure 02 film Digimon Hurricane Touchdown!! and ''Transcendent Evolution!! The Golden Digimentals''. Dialogue * Sora: [over the phone] This is Sora! Mimi told me you were the one who threw up in my hat! [phone cuts out] * Tai: There's something wrong with her phone! Perfect timing! * Mrs. Kamiya: Kids, I made your favorite: liver sticks! * Tai: Great... In a minute! * Kari: So, do you have a name? * Koromon: Koromon! * Tai: [sniffs the air] We're in luck! She burned them! * Kari: Tai, his name is Koromon! * Tai: Whose name? * [Agumon destroys a vending machine, Kari is on his back in a Koloa-like outfit] * Kari: Mom usually just puts money in, but I guess that works too. [Kari takes two of the beverages that came from the destroyed machines] Just one each! * [Agumon jumps to avoid an oncoming truck] * Passenger: Did you see that? * Driver: [tired sounding] No, I was sleeping. * Passenger: But you're driving! * Tai: "Dear Sora, I'm sorry about what happened. I haven't this bad since the time I accidentally threw up in your hat and didn't tell you about it before you put it on. I know our relationship has been a little stormy lately. You say you love thunder showers, so what's a few raindrops between friends? Love, Tai." Love? I mean from! I mean... [changes "love" to "from"] * Kari: Who are you writing to, Tai? * Tai: [Tai shouts in surprise and hides the email from Kari] It's just an email joke! What are you doing in here anyway, Kari? * Kari: I wanted to show you my new dress! I'm going to a birthday party! I got my friend a Pink Power Ranger! * Kari (Narrator): [As Tai tries to take the present from Kari] My brother and I had a 'give-and-take' relationship. I would give, and he would take. * Tai: Ah, who cares? * Kari: If you want to send an email, you have to click this. [grabs the mouse] Click! * Tai: I wasn't going to send that letter! * Kari: Then what did you write it for? * Tai: Aww, Go to your party! * Kari: [depressed] OK... * Tai: [dejected] I can't believe Sora's gonna read my letter. [notices it failed to send] Wait a minute, 'unable to deliver'? [angrily] I can't believe she's not gonna read my letter! You try and tell a girl you're sorry and your computer shuts you do- [shouts as he falls off the chair] * [Tentomon and Agumon have arrived on the Internet to find Keramon eating data] * Izzy: There he is! Go get him! * Tentomon: He doesn't know we're here yet! * Agumon: Let's sneak up on him quietly. * Tentomon: [shouts] Super Shocker! * Agumon: That's quietly? * Agumon: We're going back in! * Tentomon: I assume Izzy and Tai were unsuccessful in finding anyone else. * Agumon: Then you and I will just have to beat that thing by ourselves! * Gabumon: Sorry we're late! * Patamon: I was surfing the web, but I wiped out! * Tentomon: Gabumon and Patamon! * Patamon: Is T.K. on this ride? * Gabumon: He's not tall enough. * Infermon: I'm looking for the programmer. Don't interfere! * Matt: He's teasing us! * Tai: Oh yeah? Then let's get him! * Matt: It's time to Digivolve! * [Wargreymon and Metalgarurumon are merging to become Omnimon] * Izzy: Part WarGreymon... * T.K.: Part MetalGarurumon! * Izzy: They Digivolved together to become... * Omnimon: Omnimon! * Izzy: YOU'VE... GOT... MAIL!!! [presses enter] * [Diaboromon has been killed by Omnimon] * Omnimon: Connection... Terminated. * Diaboromon: [splits apart] Willis... * Izzy: I'm... about... to barf. * Tai: Wait 'till you try the cake. * [Terriermon lands on Willis' head and stretches his ears to shade him] * Willis: Oh! Well, that's better! I don't suppose you could turn into a glass of lemonade too, could ya? * [After Terriermon Digivolves for the first time] * Willis: Huh? He's got pants now! * Terriermon: If Davis eats it all... [Inflates Stomach] * DemiVeemon: [Laughing] * Davis: There's not an ounce of fat below my neck! * Willis: Now, you're gonna deliver that pizza to my house, right? Well, would you mind doing me a favor and pick us up on the way? * Davis: Tell them to forget the whole thing, I'm in the mood for Chinese. * Willis: Shut up! [Into phone] Oh! No, I said 'line up'! We'll line up on the side of the road with a sign so we're easy to spot! * [Davis and Willis need a ride so Veemon digivolves to Raidramon to give them one] * Davis: Did somebody call for a ride? * Terriermon: Wow, that's cool! * Willis: Couldn't you done that before? * [They ride through a meadow and a bunch of kids run alongside] * Kid: Hey, can we get a ride too? * Davis: Sorry, but we're on a mission! * [The three approach where the others are appearing as a cloud of dust] * Upamon: Hey, its a big gust of wind! * Cody: No, it's Davis! * Yolei: Same difference. * [After Willis share his back story] * Davis: [crying] That's the saddest story I have ever heard. * Willis: Hey, I'm the one with the problem, not you. Get over it. * Davis: [Stops crying] OK. * Willis: Wow, that was fast. <hr width="50%"/> * Cody: Armadillomon! * Armadillomon: Cody, you're back! I've been digging all over for you. <hr width="50%"/> * [Wendigomon has just been destroyed by Magnamon and Rapidmon, causing Kerpymon to revert to his 'good' form] * Kerpymon: Willis... * Willis: Kokomon? * Kerpymon Thank you... [Kerpymon disintegrates] * Willis: [Crying] Now I've lost... both of them... * Terriermon: You'll never lose me, Willis! I told you! I'm your friend! Friends are always there for each other. * Willis: [happily] Terriermon! Voice Cast * Joshua Seth - Tai Kamiya * Michael Reisz - Matt Ishida * Mona Marshall - Izzy Izumi, Terriermon * Colleen O'Shaughnessey - Sora Takenouchi * Michael Lindsay - Joe Kido, Greymon * Philece Sampler - Mimi Tachikawa, Cody Hida * Wendee Lee - T.K. Takaishi ("Eight Years Ago" & "Four Years Later"), little Kokomon * Doug Erholtz - T.K. Takaishi ("Present Day") * Lara Jill Miller - Kari Kamiya * Tom Fahn - Agumon, Digmon * Joseph Pilato - MetalGreymon * Lex Lang - WarGreymon, Omnimon (shared), Rapidmon * Kirk Thornton - Gabumon, MetalGarurumon, Omnimon (shared) * Jeff Nimoy - Tentomon, Kabuterimon * Tifanie Christun - Biyomon, Yolei Inoue * R. Martin Klein - Gomamon * Anna Garduno - Palmon * Laura Summer - Patamon * Dave Mallow - Angemon, Seraphimon, Upamon * Edie Mirman - Gatomon, Angewomon, Magnadramon * Brian Donovan - Davis Motomiya * Bob Glouberman - Willis * Derek Stephen Prince - Veemon * Steven Jay Blum - Flamedramon, Raidramon, Magnamon, Poromon * Neil Kaplan - Hawkmon * Robert Axelrod - Armadillomon * Michael Sorich - Gargomon * Bob Papenbrook - Red Greymon * Peggy O'Neal - Botamon * Brianne Siddall - Koromon * Michael Sorich - Big Agumon * David Lodge - Parrotmon * Paul St. Peter - Keramon, Infermon, Diaboromon, Kokomon * Brianne Siddall - Kuramon * Mike Reynolds - Gennai
WIKI
Sipa Press Sipa Press is a French photo agency based in Paris. Overview It was founded in 1973 by the Turkish news photographer and photojournalist Gökşin Sipahioğlu together with American writer Phyllis Springer, concentrating their activities from the beginning on photojournalism. Sipa Press is a French-based photo agency distributing up to 6000 news pictures every day to customers in more than 40 countries worldwide. It covers politics, economy, entertainment, and sports. 20 million pictures are filed in Sipa's archives and 12 million in its digital database. The editorial staff consists of 91 members, and about 600 correspondents contribute to the service. Most significant partnerships exist with Associated Press, Rex Features in the UK, and La Presse in Italy. In July 2011 Sipa Press was taken over by the German DAPD News Agency, the managing director being Heinrich Ollendiek. In October 2012, DAPD filed for insolvency protection, with all six of its subsidiaries declaring bankruptcy.
WIKI
Capitol Records, Inc. v. Thomas-Rasset Capitol Records, Inc. v. Thomas-Rasset was the first file-sharing copyright infringement lawsuit in the United States brought by major record labels to be tried before a jury. The defendant, Jammie Thomas-Rasset, was found liable to the plaintiff record company for making 24 songs available to the public for free on the Kazaa file sharing service and ordered to pay $220,000. Before filing suit, Capitol Records offered to settle for $5,000, but Thomas-Rasset declined. The ultimate damage order came after several trials and appeals in 2007–2013. The damage award at one stage reached $1,920,000. The case was originally named Virgin Records America, Inc v. Thomas-Rasset. Background Jammie Thomas (born 1977), now Jammie Thomas-Rasset, is a Native American mother of four from Brainerd, Minnesota, and worked as a natural resources coordinator for the Mille Lacs Band of Ojibwe Indians. The RIAA sent Thomas a cease-and-desist letter and settlement offer in August 2005. Thomas declined the settlement offer. On April 19, 2006, several major record labels sued Thomas for copyright infringement by unauthorized downloading and sharing of 24 sound recordings on Kazaa under the username "TEREASTARR@KaZaA". The labels' complaint alleged that Thomas infringed copyright on February 21, 2005, downloading and distributing songs by such bands as Aerosmith, Green Day, and Guns N' Roses. Rather than seeking actual damages, the plaintiffs sought relief via statutory damages, assessed in accordance with 17 USC 92 § 504(c)(2). First trial The first trial against Thomas was held in Duluth, Minnesota and was presided over by U.S. District Court Judge Michael J. Davis. Thomas was represented by Minneapolis attorney Brian Toder. The plaintiffs alleged that on February 21, 2005, Jammie Thomas shared a total of 1,702 tracks online; however, plaintiffs sought relief for only 24 of these. Thomas contended that she was not the person behind the "tereastarr" account and denied having downloaded any files. During the trial, her lawyer suggested her computer could have been under the control of people elsewhere by means of "a spoof, a zombie or some other type of hack". Juror Michael Hegg later commented, "She's a liar." A hard drive containing the copyrighted songs was never presented at the trial, though Thomas did turn over a hard drive that referenced neither Kazaa nor the infringing files to the plaintiffs' attorneys. The jury was instructed that merely "making available" sufficed to constitute an infringement of the plaintiffs' distribution right, even without proof of any actual distribution. The issue of whether copyright infringement required actual distribution was raised by the defense during examination of Sony BMG's head of litigation on the first day of trial, but the court sustained the plaintiffs' objection and did not permit the topic to be revisited until jury instructions were prepared just before the trial's conclusion. Despite disagreement from the defense, the court proceeded to interpret "making available" as distribution for purposes of instructing the jury. On October 4, 2007, after 5 minutes of deliberation, the jury returned a verdict finding her liable for willful infringement, and awarded statutory damages in the amount of $9,250 for each of the 24 songs for a total of $222,000. Retrial The judge in Thomas' trial then, sua sponte (of his own accord), issued an order indicating a possible "manifest error of law" in connection with his "making available" jury instruction, on the ground that it may have contravened binding 8th Circuit precedent, and on the ground that a case upon which the RIAA and the Court had relied had been vacated by the Court which had issued it, without Judge Davis's knowledge. Subsequently, the Court vacated the judgment, on the ground that "making available" could not be equated with "distribution" under "settled case law". The retrial which ensued found Thomas-Rasset liable for willful copyright infringement, and awarded plaintiffs damages of $1.92 million. Highlights In May 2009, during preparation for the retrial, Brian Toder stepped down as Thomas-Rasset's lawyer. Thomas-Rasset then accepted Joe Sibley and Kiwi Camara's offer to defend her pro bono. Before the trial, Camara unsuccessfully tried to persuade the court to bar evidence collected by MediaSentry, arguing that the company was not a licensed private investigator under the Minnesota Private Detectives Act (MPDA) and that it violated federal pen register and wiretapping laws. In rejecting these arguments, the court said that the MPDA did not apply to an out-of-state entity like MediaSentry, and that "There is no expectation of solitude or seclusion when a person activates a file sharing program and sends a file to the requesting computer. By participating in Kazaa, a user expects millions of other users to view and copy her files, each time receiving the very information that Thomas-Rasset sent to MediaSentry and MediaSentry recorded." Camara also tried to raise a fair use defense at the last minute, but it was disallowed on procedural grounds. Fair use is an affirmative defense which would have to have been raised prior to the first trial, or at least reasonably early enough to allow for discovery in the retrial, whereas the retrial date was only days away. The retrial was held on June 15, 2009, under the updated case name Capitol Records v. Thomas-Rasset. During oral arguments, the parties disagreed on whether Thomas-Rasset received notice of investigation, and whether she got the hard drive replaced to destroy evidence or because it was damaged in an unrelated incident. The arguments presented by the plaintiffs included technical details tying the shared folder on Kazaa to her IP address, the user name in the shared folder matching the user name on many of the defendant's online accounts, and the fact that numerous files in the shared folder contained tags giving credit to uploaders and ripping groups—indicating they were likely downloaded, not ripped from her own CDs. Although only 24 songs were at issue, plaintiffs told the jury that 1,700-plus songs were in the shared folder, that "a message must be sent", and that the infringement was "substantial" and "massive". At one point, the plaintiffs drew a rebuke from the court for presenting new evidence of questionable relevance; it was partially stricken from the record. The defense argued that Thomas-Rasset had no reason to download music, as she was one of the plaintiffs' best customers, having legally purchased over 200 CDs, including many of the songs at issue, which she only ever ripped into WMA format, not MP3 as found in the shared folder. On the stand, Thomas-Rasset speculated that perhaps her children or then-boyfriend had installed Kazaa on her computer without her knowledge. Closing arguments focused on the fact that none of the evidence pointed to Thomas-Rasset personally, but only to the IP address assigned to her Internet account. The jury was instructed to find that the owners' copyrights were infringed if the plaintiffs owned copyrights in the songs and there was an infringement of either the reproduction right (via Thomas-Rasset "downloading copyrighted sound recordings on a peer-to-peer network, without license from the copyright owners") or the distribution right (via Thomas-Rasset "distributing copyrighted sound recordings to other users on a peer-to-peer network, without license from the copyright owners"). For each song reproduced or distributed, the infringement had to be assessed as willful or non-willful, and damages assessed accordingly. The jury was not allowed to be specific in its verdict about which rights (distribution or reproduction) were infringed, and the judge did not attempt to define distribution in the second trial. After 5 hours of deliberation on June 18, the jury found Thomas-Rasset liable for willful copyright infringement of all the songs in question, and awarded the plaintiffs statutory damages of $1.92 million ($80,000 per song, within the allowed range of $750 to $150,000). Motion for injunction On July 6, 2009, the plaintiffs filed a motion asking for an injunction against Thomas-Rasset that would require her to destroy all infringing sound recordings on her computer and desist from any further infringement of their copyrights. Their motion claims trial evidence established that Thomas-Rasset "was distributing 1,702 sound recordings ... to millions of other users," and that the plaintiffs would face "great and irreparable harm" were she to continue to infringe upon their copyrights. Reduction of damages and settlement offer Also on July 6, 2009, Thomas-Rasset filed a motion asserting the statutory damage award was so disproportionate to actual damages as to be unconstitutional, and announcing her intention to appeal two prior court orders permitting the plaintiffs to present certain evidence at trial. The evidence in question included allegedly incomplete and therefore inadmissible copyright registrations, and Thomas-Rasset claimed that evidence collected by MediaSentry should have been inadmissible because it was collected in violation of state private investigator and wiretap statutes. The motion called for either a retrial with that evidence suppressed, a reduction of damages to the statutory minimum ($750 per song; $18,000 total), or a removal of statutory damages altogether. The following January, Judge Davis reduced the amount of the damages to $54,000 under the common law doctrine of remittitur, characterizing the original damages as "monstrous and shocking." A few days later, the plaintiffs proposed a $25,000 settlement to Thomas-Rasset. She declined. The plaintiffs then rejected the damage reduction ordered by the judge. On June 18, the court appointed a special master to facilitate negotiations due to the parties' failure to reach a settlement. Third trial After unsuccessful negotiations, a third trial to re-determine the amount of damages was set for October 4, 2010, later rescheduled to November 1, 2010. For this trial, the jury was instructed that the issues of the defendant's liability and willfulness had been determined by a previous jury, and in determining the damage amounts, it "may consider the willfulness of the defendant's conduct, the defendant's innocence, the defendant's continuation of infringement after notice or knowledge of the copyright or in reckless disregard of the copyright, the effect of the defendant's prior or concurrent copyright infringement activity, whether profit or gain was established, the value of the copyright, the need to deter this defendant and other potential infringers, and any mitigating circumstances." The amounts were to be assessed within the statutory range of $750 to $150,000 per song. On November 4, 2010, a jury in Minneapolis decided that the amount should be $62,500 per song, for a total award to the plaintiffs of $1.5 million. A month later, Thomas-Rasset's attorneys requested that the court reduce the award to either zero or an amount the court believes is constitutional, arguing that the Due Process Clause had been violated because the plaintiffs hadn't proven that the defendant, specifically, had caused them any actual harm, only that file sharing, in general, had. In July 2011, the court ruled that the $1.5 million award was "so severe and oppressive as to be wholly disproportioned to the offense and obviously unreasonable." The court again reduced the jury award to $54,000, or $2,250 per song. The record labels filed for appeal in the Eighth Circuit on August 22. Appellate proceedings In December 2011, in its opening brief for the appeal, the plaintiffs asked the court to hear oral arguments pertaining to the exclusivity of the distribution right and the constitutionality of statutory damages which bear no relation to actual damages. The Motion Picture Association of America (MPAA), concerned about the ramifications of the case for its industry, filed an amicus curiae brief providing further arguments in favor of the plaintiffs' point of view. Both briefs contend that making-available is a form of distribution, and that actual damages are irrelevant to statutory damages. In March 2012, the plaintiffs, citing the St. Louis, I. M. & S. Railway Co. v. Williams case as precedent, argued that due process was satisfied by a jury's statutory damage award, regardless of whether it bears "a reasonable relation to the plaintiff's actual injury...regardless of whether actual damages can be proven, regardless of whether the defendant's infringement was willful, and regardless of Congress's interest in deterring conduct deemed to be contrary to the public interest." In an effort to simplify the case to deal only with the constitutionality of a very large statutory damage award against a noncommercial file-sharer, Thomas-Rasset agreed to drop the making-available issue and accept an injunction against further making-available of copyrighted works to the public, but asked the court to explicitly state that no decision had been reached on the issue and that it was merely being set aside. Oral arguments were presented June 12, 2012, before judges Murphy, Melloy, and Colloton. On September 11, 2012, the court concluded the District Court made two errors: * 1) The original damage award of $222,000 was constitutional, subject to the Williams standard, and should not have been reduced on due process grounds; and * 2) The District Court's injunction against Thomas-Rasset should have included a prohibition on making available sound recordings for distribution. The court declined to rule on whether making-available infringes the distribution right, as it was not an issue decided by the lower court. The case was remanded to the District Court for a judgment that includes these remedies. Thomas-Rasset's counsel asked the Supreme Court for certiorari, primarily reasoning that the statutory damage award is (in effect) punitive, so case law relating to punitive damages should apply. The RIAA, reaffirming prior arguments and pointing out that there is no disagreement among the lower courts, urged that the petition be rejected. The court denied certiorari on March 18, 2013. Aftermath In March 2013, Thomas-Rasset announced she would declare bankruptcy to avoid paying the RIAA the $222,000. The RIAA suggested that it would accept a lower payment if Thomas-Rasset would make a video about copyright infringement, which she refused. As of April 2016, the RIAA had not announced receipt of any payments from Thomas-Rasset.
WIKI
File:Scientific racism irish.gif Summary "Scientific Racism" from an American magazine, Harper’s Weekly, shows that the Irish are similar to Negroes, and should be extinct. An illustration from the influential American magazine Harper's Weekly shows an alleged similarity between "Irish Iberian" and "Negro" features in contrast to the higher "Anglo-Teutonic." The accompanying caption indicates that the so-called Iberians were "believed to have been" an African race that invaded first Spain and then, apparently, Ireland, where they intermarried with native savages and "thus made way...for superior races" Drawing by: H. Strickland Constable. 1899, Ireland from One or Two Neglected Points of View see here http://www.nde.state.ne.us/SS/irish/unit_2.html
WIKI
Joint Pain Reduction can vary Together with the Main Reason for Joint Pain Joint pain reduction and its treatment remedies may vary depending on the reason for the joint pain. Provided that joint parts pain is definitely an upshot of your essential concern, for that reason controlling that condition can easily provide you with long-term alleviation.Currently there is not any acknowledged treatment for scenarios like Osteoarthritis as well as Joint disease. For that reason any kind of health-related therapy of these situations is largely geared towards cutting down bones pain, growing joint versatility in addition to standard of living. Aside from, the process is aimed towards minimizing productive impairment, even though constraining any poisonous side effects inside the treatment. But many of the medicine treatments are targeted at reduction of symptoms. They may be performing not in fact give you a recover. The favorite no steroidal Anti infected medicines (NSAIDs) are designed to generate timely joint pain relief and they are deemed relatively truly harmless.The COX-2 inhibitors might be a new college of Anti –irritated prescription drugs which have the capacity to selectively prohibit the COX-2 enzyme. This helps prevent generating chemical messengers which are accountable for the pain feeling along with puffiness in case there is rheumatoid arthritis symptoms. For joint pain comfort, steroids are often needed every once in awhile. This can be sometimes employed by mouth in lower dosage sums, or simply implemented in to the afflicted joint parts. They are often fundamentally advised for quick comfort of bones pain, soreness along with inflammation round the influenced your bones. Glucosamine and Chondoitrin sulphate will be the supplements for sustafix that happen to be found in sufferers with osteoarthritis. These are usually natural supplements which usually tend to ease signs and symptoms in individuals struggling with acceptable to important joint pain. Not only this, these substances may also help in re-energizing cartilage. In comparison to the normally prescribed NSAIDs, these natural supplements are definitely not associated with any sort of adverse reactions. But any type of medicine treatment solution should invariably be observed from a physician and has to be designed in agreement to particular person demands.
ESSENTIALAI-STEM
  I wrote merge sort in Ruby I am learning sorting algorithms these days. And to me merge sort looks simple than other sorts. (There are merge sort, insertion sort, quick sort, selection sort, bubble sort, et cetera.) I thought I should try to write it in Ruby. The steps of the merge sort are: As always, I am writing a test first (lol) because I like to see some tests are passing. class Sorter def self.merge_sort(array) array.sort # make the test pass end end require "minitest/autorun" class SorterTest < Minitest::Test def test_merge_sort array = [2, 1, 3] assert_equal [1, 2, 3], Sorter.merge_sort(array) end end I am going to name the two sorted arrays as left and right class Sorter def self.merge_sort(array) left = array[0..mid] right = array[mid + 1..-1] # not done yet end end What is mid? It is index of an element which is in the middle. In my case, I include this element to the left array. class Sorter def self.merge_sort(array) mid = (array.size - 1) / 2 # when array has 3 elements, mid index is 1 left = array[0..mid] # then this one becomes array[0..1] (2 elements) right = array[mid + 1..-1] # this one becomes array[2..-1] (1 element) # ... end end Let’s not forget these two arrays (left and right) are magically sorted. And do not worry because there will be magical “recursion”. And then, pick the smallest number from the two arrays. Here, we already know the smallest number of each array. (duh, they are sorted) Now I can compare the leftmost element of left array and the leftmost element of right array, and update original array with smaller one, one by one. class Sorter def self.merge_sort(array) mid = (array.size - 1) / 2 left = array[0..mid].sort right = array[mid + 1..-1].sort array.size.times do |i| if left[0] < right[0] array[i] = left.shift else array[i] = right.shift end end array end end require "minitest/autorun" class SorterTest < Minitest::Test def test_merge_sort array = [2, 1, 3] assert_equal [1, 2, 3], Sorter.merge_sort(array) end end Yay! the test fails with error because there are edge cases! It is because one out of two arrays didn’t have the leftmost element at some point. (in other words, the array was empty) For example, left[0] can be nil when right[0] is an integer. ArgumentError: comparison of Integer with nil failed This time I change the conditions and loops, to see how things are going. class Sorter def self.merge_sort(array) mid = (array.size - 1) / 2 left = array[0..mid].sort right = array[mid + 1..-1].sort i = 0 while left.size > 0 && right.size > 0 if left[0] < right[0] array[i] = left.shift i += 1 else array[i] = right.shift i += 1 end end while left.size > 0 array[i] = left.shift i += 1 end while right.size > 0 array[i] = right.shift i += 1 end array end end Now test shall pass! By the way, I am not supposed to use sort method in the merge_sort method to be honest. So let’s now use recursion and complete the code. But look, don’t forget the base condition. class Sorter def self.merge_sort(array) return array if array.size == 1 mid = (array.size - 1) / 2 left = merge_sort(array[0..mid]) right = merge_sort(array[mid + 1..-1]) i = 0 while left.size > 0 && right.size > 0 if left[0] < right[0] array[i] = left.shift i += 1 else array[i] = right.shift i += 1 end end while left.size > 0 array[i] = left.shift i += 1 end while right.size > 0 array[i] = right.shift i += 1 end array end end Cool!   4 Kudos   4 Kudos Now read this Setup Ruby with Ubuntu setup Ruby on Ubuntu 12.04 LTS with rbenv - I installed Ubuntu to my old laptop (Windows 7) with - wubi. And I did open terminal = ctrl + alt + T (and then connect to Wi-Fi ) install git $ sudo apt-get update $ sudo apt-get install git... Continue →  
ESSENTIALAI-STEM
Tarabhusan Pal Junior College Tarabhusan Pal Junior College, formerly known as Karimganj Junior College of Science, established in 2003, is a major college situated in Nilmoni Road, Karimganj, Assam. This college is affiliated with the AHSEC. (Recognition No. AHSEC/RPR/RRC/60/07/1904). Class XI and XII students are taught here in Science, Arts and Commerce. Science * Physics * Chemistry * Mathematics * Biology * Computer Science & Application * Statistics Commerce * Business Studies * Accountancy * Commercial Mathematics & Statistics Arts * Bengali * English * History * Economics * Political Science * Logic & Philosophy
WIKI
Matthew 12:4 Matthew 12:4 is the fourth verse in the twelfth chapter of the Gospel of Matthew in the New Testament. Content In the original Greek according to Westcott-Hort, this verse is: * πῶς εἰσῆλθεν εἰς τὸν οἶκον τοῦ Θεοῦ, καὶ τοὺς ἄρτους τῆς προθέσεως ἔφαγεν, οὓς οὐκ ἐξὸν ἦν αὐτῷ φαγεῖν, οὐδὲ τοῖς μετ᾿ αὐτοῦ, εἰ μὴ τοῖς ἱερεῦσι μόνοις; In the King James Version of the Bible the text reads: * How he entered into the house of God, and did eat the shewbread, which was not lawful for him to eat, neither for them which were with him, but only for the priests? The New International Version translates the passage as: * He entered the house of God, and he and his companions ate the consecrated bread--which was not lawful for them to do, but only for the priests. Analysis According to Lapide the show-bread were loaves which were always placed before the Holy of Holies. There were twelve of them to represent the twelve tribes of Israel, and these loaves, God commanded to be renewed every Sabbath. According to Lev. 24:8 these loaves were only eaten by the priests, and that only in the Tabernacle. However, in the case of David like the apostles, the requirements of people being fed surpassed the normal rules. Commentary from the Church Fathers Jerome: " Observe that neither David nor his servants received the loaves of show-bread, before they had made answer that they were pure from women." Chrysostom: " But some one will say, How is this instance applicable to the question in hand? For David did not transgress the sabbath. Herein is shown the wisdom of Christ, that He brings forward an instance stronger than the sabbath. For it is by no means the same thing to violate the sabbath, and to touch that sacred table, which is lawful for none. And again, He adds yet another answer, saying, Or have ye not read in the Law, that on the sabbath days the Priests in the temple profane the sabbath, and are blameless?"
WIKI
Argued and submitted August 11, reversed November 4, 2009 Wendy SIPOREN, Ivend Holen and Medford Citizens for Responsible Development, Respondents, v. CITY OF MEDFORD and Wal-Mart Stores, Inc., Petitioners. Land Use Board of Appeals 2008185; A142541 220 P3d 427 John R. Huttl argued the cause and filed the brief for petitioner City of Medford. Gregory S. Hathaway argued the cause for petitioner WalMart Stores, Inc. With him on the brief were Jeff N. Evans and Davis Wright Tremaine LLP. Kenneth D. Helm argued the cause and filed the brief for respondents. Before Haselton, Presiding Judge, and Armstrong, Judge, and Rosenblum, Judge. HASELTON, P. J. HASELTON, P. J. Respondent City of Medford (the city) and intervenor-respondent Wal-Mart Stores, Inc. (Wal-Mart) seek judicial review of an order of the Land Use Board of Appeals (LUBA) in which LUBA remanded the city’s decision to approve a site development plan without requiring a more comprehensive traffic impact analysis than the one Wal-Mart provided. ORS 197.850(1). On judicial review, the legal issue is whether LUBA, pursuant to ORS 197.829, was required to affirm the city’s interpretation that its code does not require a more comprehensive traffic impact analysis under these circumstances. Because we conclude that the city’s decision is not “inconsistent with the express language” of the city’s code, ORS 197.829(l)(a), LUBA’s order is unlawful in substance, ORS 197.850(9)(a). Accordingly, we reverse. Because it provides context for the parties’ contentions, before turning to the facts, we explain the general structure of the Medford Land Development Code (MLDC) and the specific code provisions that inform the central issue in this case — viz., whether a comprehensive analysis of the traffic impacts resulting from Wal-Mart’s proposed store is necessary before the city may approve Wal-Mart’s site plan and architectural review application. The MLDC is divided into six articles. Three articles are pertinent to our review — that is, Article I, Article II, and Article IV. The city and Wal-Mart’s interpretation of the code relies primarily on the provisions in Article II, the purpose of which is “to designate and define the responsibilities of the approving authorities and to set forth the procedural requirements and substantive criteria for plan authorizations and the development permit.” MLDC 10.100. Article II provides for 13 different types of review, including site plan and architectural review as well as the review of zone changes. Those two distinct types of review are governed by different provisions of the MLDC. The Site Plan and Architectural Commission (SPAC) conducts site plan and architectural review, which is governed by four provisions of the MLDC — that is, MLDC 10.285, MLDC 10.287, MLDC 10.290, and MLDC 10.291. MLDC 10.285 generally describes the site plan and architectural review process and provides, in part: “* * * The Site Plan and Architectural Review process is established in order to provide for review of the functional and aesthetic adequacy of development and to assure compliance with the standards and criteria set forth in this chapter for the development of property as applied to the improvement of individual lots or parcels of land as required by this code. “Site Plan and Architectural Review considers consistency in the aesthetic design, site planning and general placement of related facilities such as street improvements, off-street parking, loading and unloading areas, points of ingress and egress as related to bordering traffic flow patterns, the design, placement and arrangement of buildings as well as any other subjects included in the code which are essential to the best utilization of land in order to preserve the public safety and general welfare, and which will encourage development and use of lands in harmony with the character of the neighborhood within which the development is proposed.” (Emphasis added.) Relatedly, MLDC 10.287 defines the content of a site plan and architectural review application. Generally, an application must contain particular information concerning landscaping and building construction. In addition to an architectural plan, the building construction section of the application requires site plan information, including information about (1) “[e]xisting and proposed off-street parking: location, number, type and dimensions of spaces, parking area, internal circulation pattern”; (2) “[a]ccess: pedestrian, vehicular, service, points of ingress and egress”; (3) “[s]treet dedication and improvements”; and (4) “[l]ocation of existing public improvements including streets, curbs, sidewalks, street trees, utility poles, light fixtures, traffic signs and signals, and such other data as may be required to permit [SPAC] to make the required findings.” The nature of those findings is contained in MLDC 10.290. That provision states, in pertinent part: “[SPAC] shall approve a site plan and architectural review application if it can find that the proposed development conforms, or can be made to conform through the imposition of conditions, with the following criteria: “(1) The proposed development complies with the applicable provisions of all city ordinances.” (Emphasis added.) Finally, under MLDC 10.291, the conditions that SPAC may impose include “[requiring the installation of appropriate public facilities and services and dedication of land to accommodate public facilities when needed”; “[Requiring the improvement of an existing, dedicated alley which will be used for ingress or egress for a development”; and “Controlling the number and location of parking and loading facilities, points of ingress and egress and providing for the internal circulation of motorized vehicles, bicycles, public transit and pedestrians[.]” In sum, the text of MLDC 10.285 and MLDC 10.287 demonstrates that SPAC is authorized to consider consistency in the aesthetic design, site planning, and general placement of related facilities. Specifically, SPAC reviews, inter alia, (1) the placement of facilities (e.g., bus pullouts) as they relate to a specific site plan, (2) ingress and egress from the site, and (3) the movement of vehicles and pedestrians within the site. However, the express wording of the code provisions circumscribing SPAC’s authority do not indicate that SPAC has broad authority to determine the adequacy of street capacity for development that constitutes a permitted use within the zone. Instead, the adequacy of street capacity is determined during the review of zone changes, which is governed by an entirely separate provision, MLDC 10.227. Specifically, MLDC 10.227 provides that the Planning Commission — not SPAC — “shall approve a quasi-judicial zone change” if it finds, among other things, that the zone change complies with certain criteria. One of those criteria is that the applicant demonstrate that “Category A urban services and facilities are available or can and will be provided, as described below, to adequately serve the subject property with the permitted uses allowed under the proposed zoning * * *.” MLDC 10.227. Among the requirements of “Category A urban services and facilities” in MLDC 10.227(2) are: “(b) Adequate streets and street capacity must be provided in one (1) of the following ways: “(i) Streets which serve the subject property, as defined in Section 10.461(2), presently exist and have adequate capacity; or “(ii) Existing and new streets that will serve the subject property will be improved and/or constructed, sufficient to meet the required condition and capacity, at the time building permits for vertical construction are issued; or “(iii) If it is determined that a street must be constructed or improved in order to provide adequate capacity for more than one (1) proposed or anticipated development, the Planning Commission may find the street to be adequate when the improvements needed to make the street adequate are fully funded.” In sum, MLDC Article II allocates authority among different decision-making entities. The Planning Commission has authority to determine the adequacy of street capacity to serve permitted uses before approving a zone change. Conversely, in reviewing a site plan application, SPAC has authority to consider consistency in the aesthetic design, site planning, and general placement of related facilities. Unlike Article II, which allocates authority among decision-makers, MLDC Article I contains provisions that “apply to the general provisions, administration and enforcement” of the MLDC, including broad definitions of the terms “development” and “developer” on which petitioners rely, and Article IV contains provisions that apply to “the establishment and application of development standards for public improvements.” MLDC 10.007. Of particular pertinence to our review here, Article IV includes MLDC 10.460 to 10.462, the code provisions that petitioners invoke — and on which LUBA relied — as precluding the city from approving the site plan without requiring a more comprehensive traffic impact analysis than the one Wal-Mart provided. Among other things, a TIA “identifies] the traffic impacts that a proposed development will have on the existing and future street network” and “determines all improvements or mitigation measures necessary to maintain adequate [levels of service] at study area intersections and ensure safe pedestrian and vehicular ingress to and egress from the transportation system.” MLDC 10.460. A TIA is required when “a proposed application has the potential of generating more than 250 net average daily trips * * * or the Public Works Department has concerns due to operations or accident history, a TIA will be required to evaluate development impacts to the transportation system.” MLDC 10.461(3). Nonetheless, “[t]he level of detail and scope of a [TIA] will vary with the size, complexity, and location of the proposed application.” MLDC 10.461(1). For that reason, the Public Works Department issues a “scoping letter” that defines the study area of the TIA. The study area “shall address at least the following areas: “(a) All proposed site access points; “(b) Any intersection where the proposed development can be expected to contribute 25 or more trips during the analysis peak period. * * *; and “(c) Any intersections directly adjacent to the subject property.” MLDC 10.461(2). Apparently, based on the outcomes of a TIA, “[w]henever level of service is determined to be below level D for arterials or collectors, development is not permitted unless the developer makes the roadway or other improvements necessary to maintain level of service D respectively.” MLDC 10.462 (emphasis added). As we will amplify shortly, the references to “development” and “developer” are central to petitioners’ contentions (and LUBA’s conclusion) that the provisions of MLDC 10.462 were applicable and controlling here. Specifically, petitioners contend, and LUBA agreed, that, because the proposed Wal-Mart store is a “development,” the provisions of Article IV required SPAC consideration and approval of a comprehensive analysis of the traffic impacts resulting from the proposed store before the city may approve Wal-Mart’s application. Ultimately, the issue for purposes of our review reduces to whether, given the allocation of functions described and prescribed in Article II, the city’s contrary construction of its code is “inconsistent with the express language.” ORS 197.829(1)(a). With that background concerning the structure of the MLDC and the nature of TIAs — and with the legal issue clearly in mind — we turn to the material facts, which we take from LUBA’s order and the record. Wal-Mart seeks to build a 176,335-square-foot retail store on 18.5 acres in the city. The city’s previous decisions with respect to Wal-Mart’s applications have resulted in two prior appeals to LUBA, see Siporen v. City of Medford, 55 Or LUBA 29 (2007); Wal-Mart Stores, Inc. v. City of Medford, 49 Or LUBA 52 (2005), and, as LUBA indicated, “[t]he procedural twists and turns that this matter has taken do not make for easy reading.” Siporen, 55 Or LUBA at 31. It is sufficient to note that, as pertinent to our review, LUBA’s remands in those two cases ultimately directed the city to apply MLDC 10.462 to its review of Wal-Mart’s site plan and architectural review application or explain the reason that it does not apply under these circumstances. See Siporen, 55 Or LUBA at 53, 56; Wal-Mart Stores, Inc., 49 Or LUBA at 64. Following LUBA’s remand in Siporen, Wal-Mart filed an application concerning its proposed store — that is, the application that is the subject of our review — with SPAC. Wal-Mart also submitted a “limited” TIA. Before SPAC, petitioners Siporen, Holen, and Medford Citizens for Responsible Development (MCRD) raised issues concerning the traffic impacts of the proposed development. Specifically, Siporen and MCRD squarely raised the legal issue that LUBA had previously remanded — namely, that the city needed “to explain why it was not requiring [Wal-Mart] to provide a comprehensive traffic analysis under [MLDC] 10.462 and related provisions of the Medford Code.” SPAC rejected petitioners’ arguments and determined “that the project [was] in compliance” with MLDC 10.290(1) — that is, that “[t]he proposed development * * * complies with the applicable provisions of all city ordinances.” In that regard, SPAC determined that, contrary to petitioners’ premise, for purposes of MLDC 10.290(1), MLDC 10.462 was not “applicable.” According to SPAC, MLDC 10.462 is “applicable at the time of zone change” — and not at the time of SPAC’s review of a site plan and architectural review application. Ultimately, SPAC approved Wal-Mart’s application. Petitioners appealed SPAC’s approval to the city council. Petitioners noted that “Wal-Mart [had] submitted a revised traffic impact analysis” but that the analysis “was limited to studying the ingress and egress points for the store’s parking areas” and that “[t]he impacts on nearby intersections were not part of this revised TIA.” (Underscoring in original.) Consistently with their position before SPAC, the gravamen of petitioners’ position before the council was that (1) MLDC 10.460 to 10.462 operate collectively to require a more comprehensive TIA than the one that Wal-Mart had submitted; and (2) the text of those code provisions was inconsistent with the city’s “informal policy of requiring a comprehensive TIA only at the time of zone change.” As did SPAC, the city council approved Wal-Mart’s application. The council did not focus specifically on the meaning of MLDC 10.462; rather, the council’s analysis pertained, broadly, to the scope of SPAC’s authority as described in MLDC Article II. See 231 Or App at 587-91 (describing provisions). Ultimately, the council concluded that SPAC had been correct in determining that “the facility adequacy of arterial and collector streets under MLDC 10.462 is vested with the Planning Commission at time of zone change, and not SPAC whose authority over transportation issues is defined and limited * * (Emphasis added.) Accordingly, the council determined that MLDC 10.462 did not apply to SPAC’s review of Wal-Mart’s application so as to require a comprehensive TIA. Petitioners appealed the city council’s decision to LUBA. Before LUBA, the essential nature of the parties’ positions remained constant. In particular, petitioners reiterated that (1) SPAC cannot approve an application unless it “complies with the applicable provisions of all city ordinances.” MLDC 10.290(1); (2) given their structure and content, MLDC 10.460 to 10.462 necessarily operate in concert to prohibit “development” if the level of service for arterials or collectors falls below level of service D unless roadway or other improvements necessary to maintain level of service D are made; and (3) Wal-Mart is a “developer” that submitted an application for “development.” Consequently, petitioners asserted that the city erred by not requiring Wal-Mart to prepare a comprehensive TIA to demonstrate that its proposed development complies with the requirement in MLDC 10.462 to maintain level of service D. Conversely, the city and Wal-Mart, focusing on code provisions related to the scope of SPAC’s authority (e.g., MLDC 10.285 - 10.290), contended that MLDC 10.462 was inapplicable to site plan and architectural review. As Wal-Mart explained, “the City fully explained in its findings why [MLDC] 10.462 is not an applicable requirement for site plan and architectural review. The essence of those findings is that the site plan and architectural review code provisions ([MLDC] 10.285 -10.290) neither authorize SPAC to review comprehensive TIA[s] nor otherwise require such an analysis for site plan and architectural review applications. If the City intended to require such an analysis for site plan and architectural review applications, it would have done so expressly as it has done for other types of land use reviews, such as zone changes. As the City explained in its findings, the City determines the adequacy of the transportation system to accommodate permitted uses at the time of zone change, not upon review of a site plan architectural review application for a permitted use. Petitioners offer an alternative interpretation, but fail to explain why [MLDC] 10.462 overrides the explicit requirements of the site plan and architectural review standards. The City’s interpretation of its Code regarding the allocation of duties and responsibilities among its decision-making bodies is entitled to deference.” (Record citations omitted.) In sum, the parties’ positions were essentially “two ships passing in the night.” On the one hand, petitioners contended that, because MLDC 10.460 to 10.462 apply to “development” and the site plan application for Wal-Mart’s store concerned “development,” SPAC could not approve Wal-Mart’s application without a comprehensive TIA. On the other, the city and Wal-Mart contended that, because, under the allocation of functional responsibility described in MLDC Article II, SPAC is not authorized to require or review a comprehensive TIA, MLDC 10.462 is inapplicable. Ultimately, LUBA rejected the city’s and Wal-Mart’s arguments and remanded the city’s decision. After examining the code provisions on which the city and Wal-Mart relied, LUBA rejected their contention that SPAC’s scope of authority was limited so as to render MLDC 10.462 inapplicable in this context. In so holding, LUBA concluded that “the city’s interpretation finds almost no support” in the text of the code provisions on which the city relied and that, “[g]iven the paucity of textual support for the city’s interpretation of MLDC 10.290([1]), we cannot defer to that interpretation.” (Emphasis added.) LUBA further observed, in remanding the city’s decision, that “[t]he city will need to amend MLDC 10.290([1]) if it wishes to approve development site plans without applying MLDC 10.461 and 10.462.” On judicial review of LUBA’s decision, the parties reiterate their respective positions concerning the correct interpretation of the city’s code under these circumstances. However, beyond that — and dispositively here — the city and Wal-Mart contend that, regardless of the relative correctness of the parties’ differing interpretations, LUBA erred in failing to sustain the city’s interpretation of its code because that interpretation was not “inconsistent with the express language” of the code. ORS 197.829(l)(a). According to Wal-Mart, “LUBA evaluated various provisions of the text and reached its own conclusions as to how the text should be interpreted. In every instance where the text could be interpreted in one of two ways, LUBA chose to discount the textual and contextual support cited by the City, and instead provided its own support for the alternative interpretation. In so doing, LUBA failed to acknowledge that the text is capable of supporting more than one interpretation, and that the City’s reconciliation of conflicting provisions should be given deference. LUBA’s approach is error as a matter of law.” Petitioners disagree, contending that “[the city] and Wal-Mart both argue that LUBA conducted a comparative analysis between the city’s interpretation of the code and * * * MCRD’s interpretation of the code, and improperly substituted its judgment for that of the city. That is not the case. In the appeal below * * * MCRD presented LUBA with a set of arguments that showed that the provisions of Article IV [that govern development standards for public improvements] and MLDC 10.290([1]) explicitly contradicted the city’s contextual rationalization for determining that a TIA is ‘only required at the time of rezoning.’ “Below, LUBA expressly identified that its job was to determine whether the city’s interpretation was sustainable under ORS 197.829(1) — ‘not whether petitioners’ interpretation is better or sustainable.’ ” Accordingly, petitioners contend, “LUBA understood its task was to consider whether the text and context of MLDC 10.290([1]) supported the city’s view that a TIA under MLDC 10.461 and 10.462 is only required at the time of rezone.” In sum, petitioners conclude, “LUBA correctly found that the text and context of [the city’s] development code does not support the city’s interpretation that a comprehensive [TIA] is only required at the time of rezoning and that MLDC 10.461 and 10.462 do not apply to site plan review applications.” As correctly understood, the issue on judicial review is whether LUBA’s order is “unlawful in substance,” ORS 197.850(9)(a), because, in rendering that order, LUBA failed to comply with the standard of review prescribed in ORS 197.829(l)(a): LUBA must affirm the city’s interpretation of its code unless that interpretation is “inconsistent with the express language” of the code. In Foland v. Jackson County, 215 Or App 157, 164, 168 P3d 1238, rev den, 343 Or 690 (2007), we described the meaning of “inconsistency” for purposes of ORS 197.829: “Whether a local government’s interpretation of its ordinance is ‘inconsistent’ with the language of the ordinance depends on whether the interpretation is plausible, given the interpretive principles that ordinarily apply to the construction of ordinances under the rules of PGE [v. Bureau of Labor and Industries, 317 Or 606, 859 P2d 1143 (1993)].” Thus, on review in this case, our task is to determine whether, based on the express language of the code, the city’s interpretation concerning the applicability of MLDC 10.462 is “plausible” in light of the interpretive principles of PGE. Foland, 215 Or App at 164 (emphasis added). That is, LUBA’s task — and now ours in reviewing whether LUBA’s order comports with ORS 197.829(l)(a) — is not to determine whether the city’s interpretation of its code was “correct” in some absolute sense of choosing among various plausible interpretations, but, instead, merely whether that interpretation satisfied PGE’s first level threshold of plausibility. If it does, then, under ORS 197.829(l)(a), LUBA should have, and we must, sustain that interpretation, even if another interpretation might be “better” or more sensible or persuasive. We turn then to whether the city’s interpretation of its code in this case is plausible. The parties proceed from the same starting point, viz., MLDC 10.290(1), a provision that requires SPAC to approve an application if the proposed development, among other things, complies “with the applicable provisions of all city ordinances.” (Emphasis added.) But their respective treatments of what are “applicable” provisions for purposes of SPAC’s review in this context differ diametrically. As noted, petitioners contend that the provisions of MLDC 10.460 to 10.462 are “applicable” in such a way as to compel Wal-Mart’s submission, and SPAC’s consideration, of a comprehensive TLA. Conversely, the city and Wal-Mart contend that the allocation in MLDC Article II of SPAC’s functions as distinguished from, e.g., the Planning Commission’s responsibility with respect to zoning substantiates its interpretation that MLDC 10.462 is not “applicable” here as to petitioners’ argument. We agree with petitioners that the city’s interpretation of its code pertaining to whether MLDC 10.462 is “applicable” for purposes of MLDC 10.290(1) appears to be “inconsistent with the express language,” ORS 197.829(1)(a), of the former — but that is true only if MLDC 10.462 is read in isolation. When MLDC 10.462 is read in conjunction with other contextually pertinent code provisions relating to the scope of SPAC’s review responsibilities, the city’s contrary interpretation is “plausible.” Foland, 215 Or App at 164 (emphasis added). Consequently, LUBA erred, under ORS 197.829(l)(a), in failing to affirm that interpretation. We return to the city’s rationale for its interpretation. As Wal-Mart explains, “[t]he key to the City’s interpretation of what provisions are applicable to site plan review is the understanding that its review bodies have different roles and responsibilities, and those roles and responsibilities are dictated by Article II (Sections 10.100 - 10.296) of the MLDC.” Accordingly, those provisions — and specifically those pertaining to SPAC’s authority and scope of review, e.g., MLDC 10.285, MLDC 10.287, and MLDC 10.290 — are pertinent context for determining whether MLDC 10.462 is “applicable” to the development proposed in this site plan review. See PGE, 317 Or at 611 (reasoning that, “at the first level of analysis, the court considers the context of the statutory provision at issue, which includes other provisions of the same statute and other related statutes”); Western Land & Cattle, Inc. v. Umatilla County, 230 Or App 202, 209-10, 214 P3d 68 (2009) (explaining that “the ‘consistency with the express language’ inquiry looks at the text of the plan provision or the regulation in question, as well as the context of other parts of the plan or regulation that are relevant to the textual meaning of that ‘express language’ ”). The city has expressly indicated that the purpose of Article II of the MLDC is “to designate and define the responsibilities of the approving authorities and to set forth the procedural requirements and substantive criteria for plan authorizations and the development permit.” MLDC 10.100. As noted, the city has provided for 13 different types of review in Article II. Specifically, as pertinent here, the review of a proposed zone change by the Planning Commission and the review of a site plan by SPAC are two distinct types with different requirements and purposes. To be sure, as petitioners correctly point out, there is no express statement in the MLDC that a comprehensive TIA is required only at the time of rezoning. However, given the text and context of the code provisions on which the city relied, the city plausibly interpreted its code to allocate authority among its decision-making entities and, in so doing, limit the scope of authority of each entity. MLDC 10.227 expressly provides that the Planning Commission must determine that street capacity is adequate to “serve the subject property with the permitted uses” allowed in a zone before it approves a zone change. Following a zone change, when specific sites are proposed, MLDC 10.285 expressly provides that SPAC must consider “consistency in the aesthetic design, site planning and general placement of related facilities.” The general placement of related facilities includes the review of “points of ingress and egress as related to bordering traffic flow patterns,” MLDC 10.285; however, the express wording of the code provisions governing SPAC’s authority does not include authority to generally review street capacity and the adequacy of the transportation system for each permitted use within the zone — which is what petitioners in this case seek. For those reasons, the city plausibly determined that MLDC 10.462 does not apply to SPAC’s review of Wal-Mart’s application. The thrust of petitioners’ opposing position on review is that the city’s interpretation cannot be reconciled with various code provisions, which, in petitioners’ view, the city has essentially ignored. To support their contention, petitioners rely on Hodge Oregon Properties, LLC v. Lincoln Cty., 194 Or App 50, 93 P3d 93 (2004), and Just v. City of Lebanon (A122516), 193 Or App 121, 88 P3d 307 (2004). However, those cases are materially distinguishable. In Hodge Oregon Properties, LLC, an applicant sought a conditional use permit to site a nonforest dwelling on property, part of which was zoned “Timber Conservation” (TC). 194 Or App at 52. A neighbor opposed the application because the applicant had not demonstrated that “the dwelling and its septic system would be located entirely within the TC zone.” Id. The county approved the application, reasoning that the dwelling itself would be sited in the TC zone and that the siting of the septic system was not a part of its decision. Id. at 52-53. LUBA disagreed, concluding that, because a “dwelling” was defined to include a septic system, the county erred. Id. at 53. On review, we affirmed, relying, as did LUBA, on the fact that a “dwelling” was defined to include “sanitation” ie.g., a septic system). Id. at 54. We concluded that the county’s approval of the “dwelling” as a conditional use without a demonstration that the proposed structure had sanitation was “inconsistent with the express language” of its code. Id. at 54-55 (citing ORS 197.829(1)(a)). In Just, LUBA remanded the city’s annexation and zoning designation, concluding that the city could not approve an annexation without a specific development proposal. 193 Or App at 123, 125. We affirmed, rejecting the city’s argument that LUBA should have deferred to the city’s interpretation because (in the city’s view) that interpretation “ ‘was consistent with the plain language of the ordinance and consistent with the City’s plans and policies governing annexations.’ ” Id. at 124. We reasoned that Urbanization Element Annexation Policy 3 of the Lebanon Comprehensive Plan included a mandatory requirement that a specific development proposal accompany annexation requests “ ‘[ujnless otherwise approved by the city.’ ” Id. at 127 (brackets in original). Although it was unclear from the text of the exception whether the city could defer the requirement of a specific development proposal until after the approval of the annexation, other annexation and public facilities policies made it clear that the city would consider specific development proposals at the time that it made its annexation decision. Id. at 128-29. In Hodge and Just, the text of local enactments examined in context foreclosed the local government’s interpretations. That is not the case here. Fundamentally, because there is no code provision that expressly indicates the type or types of development review in which MLDC 10.462 applies, the parties’ arguments are entirely contextual and the code provisions on which either party relies do not foreclose the other party’s interpretation. Notwithstanding that neither party’s contentions fully harmonize all cited provisions of the city’s code, both parties present plausible interpretations of the code. Under such circumstances, LUBA must affirm the city’s interpretation. Because LUBA did not do so here, its order is unlawful in substance. Accordingly, we must reverse. Reversed. The parties have adopted a shorthand convention of referring to traffic impact analyses (TIAs) that address level of service only at points of ingress and egress to a site as ‘limited” TIAs. Conversely, they refer to TIAs that address a broader study area, including points of ingress and egress as well as intersections where the development would potentially contribute 25 or more trips, as “comprehensive” TIAs. We adopt that convention as well. We note that the version of MLDC 10.290 quoted above is different from the version that LUBA quoted in its order. As pertinent to our review, the critical difference between the versions appears to be that subsection (2), to which LUBA and at least one of the parties on review referred, was apparently renumbered as subsection (1). For clarity, throughout this opinion, our quotations and references to MLDC 10.290 are to the version quoted above and, where necessary, we modify LUBA’s and the parties’ quotations and references to that code provision accordingly. Relatedly, MLDC 10.235, which governs the approval of preliminary planned unit developments (PUD), provides that, if such a development includes a use that is not allowed in the underlying zone, the applicant — as would be true of an applicant who requested a zone change — must demonstrate the adequacy of public facilities such as streets. Specifically, MLDC 10.235(C)(5) provides, in part: “If the Preliminary PUD Plan includes uses not allowed in the underlying zone pursuant to Subsection 10.230(D)(7)(c), the applicant shall alternatively demonstrate that either: 1) demands for the Category ‘A’ public facilities listed below are equivalent to or less than for one or more permitted uses listed for the underlying zone, or 2) the property can be supplied by the time of development with the following Category A’ public facilities which can be supplied in sufficient condition and capacity to support development of the proposed use: “d. Public streets. “Determinations of compliance with this criterion shall be based upon standards of public facility adequacy as set forth in the Code * * One element of a TIA is an analysis of the “level of service,” a concept described in the city’s Transportation System Plan as follows: “Intersection levels of service (LOS) for signalized intersections are grades of A through F that are used to rate the intersection performance within a specified time period, typically the AM or PM peak hour. * * * Progressively higher LOS reflect increasingly worse intersection performance, with higher levels of control delay and increased congestion and queues. * * * “The City of Medford’s Comprehensive Plan has established LOS standards that are intended to guide roadway design and improvement priorities by establishing a threshold for determining the level of delay that is unacceptable to the community, thus triggering a roadway or intersection improvement. Currently the acceptable LOS threshold is LOS D or better. Under its current application, this standard requires that zone change decisions not allow increases in traffic that would exceed Level of Service D.” Moreover, Transportation Goal 2, Policy 3, of the “Public Facilities Element” of the “Goals Policies and Implementation” section of the city’s comprehensive plan requires that “Arterial Streets shall be designed and improved so that the minimum overall performance during peak travel periods should be service level ‘D.’ Land use designations and development should not cause this minimum level of service to be exceeded during peak hours.” (Emphasis added.) A “developer” is a person or entity “who or which causes the development of real property and is the owner of record or owner under contract to purchase or lease for purposes of development, the real property to be developed or improved.” MLDC 10.012. In turn, “development” is “[t]he improvement of a parcel of land; including partitioning or subdividing of any improved or unimproved real property, for any purpose, and by any person, association, or other entity.” Id. We do not understand the city or Wal-Mart to contend that the proposed store is not “development” or that Wal-Mart is not a “developer.” As we understand the parties’ arguments, a “comprehensive” TIA must comply with MLDC 10.462. ORS 197.829 provides, in part: “(1) The Land Use Board of Appeals shall affirm a local government’s interpretation of its comprehensive plan and land use regulations, unless the board determines that the local government’s interpretation: “(a) Is inconsistent with the express language of the comprehensive plan or land use regulation; “(b) Is inconsistent with the purpose for the comprehensive plan or land use regulation; “(c) Is inconsistent with the underlying policy that provides the basis for the comprehensive plan or land use regulation; or “(d) Is contrary to a state statute, land use goal or rule that the comprehensive plan provision or land use regulation implements.” Accord Western Land & Cattle, Inc. v. Umatilla County, 230 Or App 202, 209, 214 P3d 68 (2009) (applying methodology from Foland); Wal-Mart Stores, Inc. v. City of Oregon City, 204 Or App 359, 365, 129 P3d 702, rev den, 341 Or 80 (2006) (noting the concept of deference to a local government’s interpretation of its own enactments as described in Gage v. City of Portland, 319 Or 308, 877 P2d 1187 (1994), Clark v. Jackson County, 313 Or 508, 836 P2d 710 (1992), and Church v. Grant County, 187 Or App 518, 69 P3d 759 (2003); concluding that “[w]e see no inconsistency in following the steps of statutory interpretation articulated in PGE while also giving a local legislative body’s interpretation and application of its own enactments some deference * * *”). We pause to note that, as LUBA indicated, a land use regulation that is worded like MLDC 10.290(1) is “almost always a bad idea, because it invites disputes in individual land use proceedings over what ordinance requirements are ‘applicable.’ A far better practice is to specify the ordinance provisions that apply or at the very least to provide some guidance regarding which provisions apply.” We agree with LUBA’s assessment in that regard.
CASELAW
Ceres Community Project The Ceres Community Project is a U.S. non-profit organization that mentors teens in nutrient-dense food preparation as well as chef, employment, and business skills, then works with volunteers to deliver the food to people with life-threatening illnesses and their families. Ceres also includes a garden to grow produce for the program. The organization has also partnered with other non-profit organizations such as the Work Horse Organic Agriculture (WHOA), which supplies organic produce and eggs to Ceres. The program has had significant impacts on both the teen chefs and the clients, with increases of fruit and vegetables and decreases in unhealthy food consumption in both groups. Ceres has also served as a model for similar projects in other communities such as in Chicago and Cleveland. History Cathryn Couch, a former professional chef, founded Ceres after taking a friend's daughter as an apprentice to cook for a friend who had stage 2 breast cancer.
WIKI
Closed Bug 1793408 Opened 2 years ago Closed 2 years ago Firefox freezes on some websites with Cache the World enabled Categories (Core :: Disability Access APIs, defect) defect Tracking () VERIFIED FIXED 107 Branch Tracking Status firefox105 --- disabled firefox106 --- disabled firefox107 --- verified People (Reporter: emilghitta, Assigned: Jamie) References () Details (Whiteboard: [ctw-m3]) Attachments (2 files) Attached image digi24.gif Found in • Firefox 107.0a1 Preconditions • Enable accessibility.cache.enabled pref • Launch NVDA Details We have encountered multiple websites which are causing Firefox to freeze and become unusable while having the accessibility.cache.enabled pref and NVDA enabled. We are drafting a list of websites (with additional details) in which we spotted this freeze: https://docs.google.com/spreadsheets/d/112-Qrob80pKrte7D8uHZlWAA3i8PgfrkCngdBuD4ZPU/edit?usp=sharing Expected result • No freeze is encountered. Actual result • Firefox freezes and becomes unusable. Has STR: --- → yes Updating the link. Something has changed at website level and the issue is now reproducible on https://www.digi24.ro/stiri/actualitate/politica. I'll try to see if we can isolate the faulty element in a reduced tc if possible. QA Whiteboard: [qa-regression-triage] I've morphed this bug into a more general one that tracks all cases/websites which are causing Firefox to freeze. We'll file separate bugs if it turns out that some websites have different causes. Removing the regression labels for this bug. QA Whiteboard: [qa-regression-triage] OS: Windows 10 → All Summary: Firefox freezes when navigating to digi24.ro → Firefox freezes on some websites with Cache the World enabled Blocking the main meta due to Jamie's specifications. Blocks: a11y-ctw No longer blocks: 1737193 I can't reproduce this freeze on any of the sites listed. :( Some questions: 1. Does the browser UI freeze or just the tab in question? For example, can you close the tab either with the mouse or control+w when this occurs? 2. If the browser UI does freeze, do you eventually see the Windows "not responding" indicator? 3. If the browser UI can still be used, are you able to take a profile using the Firefox Profiler? I may be able to use a profile to figure out what's going on. 4. If the browser UI does freeze, we'll need to create a dump to figure out what's going wrong. Probably the simplest way to do this is to use crashfirefox64.exe. You'll need to get the process id of the main Firefox process and pass that to the command; e.g. crashfirefox64.exe 12345, where 12345 is the process id of the main Firefox process. One way to get the process id of the main process is to use about:processes. I neglected to mention: once you intentionally crash Firefox, let it submit a crash report and then provide the crash report id. Whiteboard: [ctw-m3] (In reply to James Teh [:Jamie] from comment #4) I can't reproduce this freeze on any of the sites listed. :( Some questions: Weird...We are able to reproduce the freeze on those listed websites. We are able to reproduce when both accessibility.cache.enabled is set to true and NVDA is running (version: 2022.3) 1. Does the browser UI freeze or just the tab in question? For example, can you close the tab either with the mouse or control+w when this occurs? The browser UI freezes. I'm unable to close the tab via mouse or control+w 1. If the browser UI does freeze, do you eventually see the Windows "not responding" indicator? Yes. 1. If the browser UI can still be used, are you able to take a profile using the Firefox Profiler? I may be able to use a profile to figure out what's going on. Unfortunately, the browser UI freezes and Firefox is unusable. 1. If the browser UI does freeze, we'll need to create a dump to figure out what's going wrong. Probably the simplest way to do this is to use crashfirefox64.exe. You'll need to get the process id of the main Firefox process and pass that to the command; e.g. crashfirefox64.exe 12345, where 12345 is the process id of the main Firefox process. One way to get the process id of the main process is to use about:processes. I was able to generate the crash report via the crashfirefox64.exe tool: https://crash-stats.mozilla.org/report/index/4416b110-2c6e-4d14-bb3e-8f0fc0221005#tab-details I've also generated a dump file via procdump ( I've sent it to you on slack) Thanks very much. The dump helped a lot. The critical missing piece here is that this can only be reproduced when moving the mouse over the document. Since I'm a blind screen reader user, I don't use the mouse and I was thus unable to reproduce this. I'm working on a fix. 1. When constructing a TextLeafPoint and searching for a leaf, do not descend inside an OuterDoc (iframe/browser). Otherwise, we end up inside another document. Other TextLeafPoint code avoids crossing document boundaries, so the constructor must do this too. 2. When searching for a leaf, include an OuterDoc, but don't walk inside it. Previously, we skipped OuterDocs altogether. This meant that if you started on an OuterDoc, walking backward and then forward by character would never return you to your origin. Also, clients walking the document text shouldn't just skip iframes altogether, so exposing them as a single character makes more sense. This fixes infinite loops in OffsetAtPoint when querying a container with an iframe at the end. Assignee: nobody → jteh Status: NEW → ASSIGNED Emil, would you mind re-testing with the Win64 opt build from this try run? (It isn't finished yet, but it should be done in an hour or so.) I want to make sure there isn't another freeze on some of the pages that is different to the one I've fixed, especially since it's difficult for me to reproduce. Thanks. Flags: needinfo?(emil.ghitta) Hey Jamie. I can't reproduce the freeze on any of those websites on my Windows 10 machine using this try build but Rares encountered the same hang after performing some actions on the page (clicking on several links, and navigating through the header items). So he had to stress test the pages a little bit for that freeze to occur on his end. I'm sending the dump generated on that machine via slack, hopefully, it points out the cause. We also tested on a Windows 7 machine. We couldn't reproduce the freeze but we encountered a random crash. Since we don't have any clear steps we are not sure if this is caused by the patch applied to this try build, if it surfaced out now since the freeze is no longer reproducible or if this is something different: https://crash-stats.mozilla.org/report/index/ee91831e-2d96-4ba8-9b7c-190d30221006 Flags: needinfo?(emil.ghitta) Pushed by jteh@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/447cc0286695 Consistently treat OuterDocAccessibles as a single character in TextLeafPoint. r=morgan Thanks for the dump. Both the dump and the crash seem to have some sort of stack corruption, but the corruption is identical in both of them, which makes me think that these are the same issue and also that this is not a one-off problem. Unfortunately, I wasn't able to glean anything useful from either of them; the stack just doesn't go far enough for me to get any useful data. I'm hoping we might have more luck figuring this out once this patch lands in Nightly. Status: ASSIGNED → RESOLVED Closed: 2 years ago Resolution: --- → FIXED Target Milestone: --- → 107 Branch The patch landed in nightly and beta is affected. :Jamie, is this bug important enough to require an uplift? • If yes, please nominate the patch for beta approval. • If no, please set status-firefox106 to wontfix. For more information, please visit auto_nag documentation. Flags: needinfo?(jteh) Flags: needinfo?(jteh) I have verified this fix using the following steps: 1. Have an affected browser version opened with accessibility engine force enabled and CTW activated. 2. Have the unaffected (latest Nightly) open with accessibility engine force enabled and CTW activated. 3. Go through the list of websites where the issue was observed and load them one by one on both browsers. 4. Attempt to reproduce the issue on the affected build, then restart the browser. 5. Attempt to reproduce the issue on the unaffected build using the same exact steps it reproduced with, in a few tries. 6. Then I performed a 30 min exploratory on the fixed build to attempt to reproduce the freeze again. Having reproduced a freeze on 11 out of 13 of the websites on the affected build and absolutely no freeze on the unaffected build on both Windows 10 and Windows 7, I consider this issue fixed. While these issues are intermittent and also not that easy to reproduce, we can't be sure it's completely fixed until we perform a full test run, but the behavior has definitely improved dramatically. Status: RESOLVED → VERIFIED Thanks to you and your team for all of your work in testing this. Please file separate bugs for any freezes you subsequently discover. Thank you. Blocks: 1793772 You need to log in before you can comment on or make changes to this bug. Attachment General Created: Updated: Size:
ESSENTIALAI-STEM
Esperos Kallitheas Esperos (in Π.Ο.Κ. Έσπερος) is a sports club in Kallithea (within greater Athens, Greece), founded in 1943 during the Nazi occupation of the country (1941–44). History Started as a football club and participated during World War II in the games organised by the "Union of Greek Athletes" (founded by Gregoris Lambrakis) seeking finance in order to fund public messes for the starving population. After the war the Esperos football team played in Division 1 for three periods (1948–49, 1949–50 and 1954–55) and in Division 2 most of the time. In year 1966 Esperos (football) was co-founder of Kallithea FC. Since 1944, POK Esperos (the official name standing for Panathlitikos Omilos Kallitheas, Allsports Club of Kallithea) has also uninterruptedly participated in all national volleyball (men) and basketball (men) (Esperos Kallitheas B.C.) championships with 7 and 8 Division 1 participations respectively. POK ESPEROS is a founding member of the Hellenic Basketball Federation (EOK), the Hellenic Volleyball Federation (EOΠE), the Hellenic Table Tennis Federation (EΦOEΠA) and also a member of the Hellenic Handball Federation (OXE).
WIKI
golang xml处理函数目前常规的应用没有问题,主要利用xml.Marshal和xml.Unmarshal。 不能生成自关闭标签,能解析自关闭标签。遇到命名空间的时候比较头大,解析和生成xml不能用一个结构,必须定义成2个。 1:获取字段属性 func main() { d := `<result code="1000"><msg>Command completed successfully.</msg></result>` type result struct { Code int `xml:"code,attr"` Msg string `xml:"msg"` } abc := result{} xml.Unmarshal([]byte(d),&amp;abc) fmt.Printf("%+v\n",abc) } //{Code:1000 Msg:Command completed successfully.} 2:节点带有属性和内容的获取方式 func main() { d := `<result code="1000"><period unit="y">1</period></result>` type result struct { Period struct{ Unit string `xml:"unit,attr"` Value int `xml:",chardata"` } `xml:"period"` } abc := result{} xml.Unmarshal([]byte(d),&amp;abc) fmt.Printf("%+v\n",abc) } //{Period:{Unit:y Value:1}} 3:如果有节点一样,仅仅是命名空间不一样的处理方式 继续阅读 在用golang处理xml 命名空间属性,可能是个bug,golang 1.10.1 func main() { str :=`<?xml version="1.0" encoding="UTF-8"?> <epp xmlns="urn:ietf:params:xml:ns:epp-1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="urn:ietf:params:xml:ns:epp-1.0 epp-1.0.xsd"> <hello /> </epp>` doc:=xml.NewDecoder(strings.NewReader(str)) for { t, err := doc.Token() if err!=nil{ print(err.Error()) break } switch to := t.(type) { case xml.StartElement: for _,v:=range to.Copy().Attr{ fmt.Printf("space:%s--local:%s---value:%s\n",v.Name.Space,v.Name.Local,v.Value) } default: } } } 得到的结果: space:–local:xmlns—value:urn:ietf:params:xml:ns:epp-1.0 space:xmlns–local:xsi—value:http://www.w3.org/2001/XMLSchema-instance space:http://www.w3.org/2001/XMLSchema-instance–local:schemaLocation—value:urn:ietf:params:xml:ns:epp-1.0 epp-1.0.xsd 在解析 xsi:schemaLocation 这个名称的时候返回的不对了。感觉是个BUG,有新的发现在更新。 这里使用的是官方的包管理工具dep  https://github.com/golang/dep 背景 gitlab 10.5.6,gitlab_ci,golang 1.10.1,dep v0.4.1 1:安装,直接在github下载二进制文件,放入系统的path目录即可 2:遇到的问题 2.1 go get gitlab项目失败 git config –global url.”git@git.ciphp.com:”.insteadOf “https://git.ciphp.com/” 使用ssh的方式替代https的模式,这样可以用证书拉项目 2.2 dep init 不能在软链接目录执行 暂时无解,请到gopath非软链接目录执行 2.3 dep ensure is not within a known GOPATH/src 如果登录到gitlab ci机器,能手工执行成功,修改.gitalb-ci.yml执行脚本的pwd环境变量 php偏移量16个0 openssl_encrypt($xml,’AES-128-CBC’,$key, false, hex2bin(‘00000000000000000000000000000000’)); //java代码是服务提供方写的,目前知道这样写的对方能解出来,不懂java就不写代码了. golang package main import ( “bytes” “crypto/aes” “crypto/cipher” “encoding/base64” “fmt” “io” “log” “os” ) var iv = []byte{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0} //必须这样写,如果写成[]byte(“16个0”)会丢失前面16个字节 func main() { TestCBCAES() } func TestCBCAES() { key := []byte(“IHqnFXMNhpzYNLOU”) data := “xmlssssss” result, err := AesEncrypt([]byte(data), key) if err != nil { panic(err) } origData, err := AesDecrypt(result, key) if err != nil { panic(err) } fmt.Println(string(origData)) } func AesEncrypt(origData, key []byte) ([]byte, error) { block, err := aes.NewCipher(key) if err != nil { return nil, err } blockSize := block.BlockSize() origData = PKCS5Padding(origData, blockSize) blockMode := cipher.NewCBCEncrypter(block, iv) crypted := make([]byte, len(origData)) blockMode.CryptBlocks(crypted, origData) return crypted, nil } func AesDecrypt(crypted, key []byte) ([]byte, error) { block, err := aes.NewCipher(key) if err != nil { return nil, err } //blockSize := block.BlockSize() blockMode := cipher.NewCBCDecrypter(block, iv) origData := make([]byte, len(crypted)) // origData := crypted blockMode.CryptBlocks(origData, crypted) origData = PKCS5UnPadding(origData) return origData, nil } func PKCS5Padding(ciphertext []byte, blockSize int) []byte { padding := blockSize – len(ciphertext)%blockSize padtext := bytes.Repeat([]byte{byte(padding)}, padding) return append(ciphertext, padtext…) } func PKCS5UnPadding(origData []byte) []byte { length := len(origData) // remove the last byte unpadding := int(origData[length-1]) return origData[:(length – unpadding)] } golang代码参考,修改了偏移量的方式,可能跟服务端实现的方式有关系 如何讓 AES 在 Golang 與 Android(Java) 得到一致的加解密結果 GO项目跑整个项目的覆盖率 gitlab-ci.sh 内容如下 set -e echo “mode: atomic” > coverage.txt for d in $(go list ./… | grep -v vendor | grep -v doc); do go test -race -coverprofile=profile.out $d if [ -f profile.out ]; then cat profile.out | grep -v statements | grep -v atomic >> coverage.txt rm profile.out fi done go tool cover -func=coverage.txt go 1.10 之后建议使用如下代码 set -e go test -race -coverprofile=coverage.txt $(go list ./… | grep -v “vendor” | grep -v “doc”) go tool cover -func=coverage.txt gitlab页面设置 导航到页面settings/ci_cd 展开节点:General pipelines settings–>Test coverage parsing 输入 total:\s+\(statements\)\s+(\d+.\d+)% 刚开始使用gitlab的单元测试覆盖率,测试的代码是golang的,经过摸索如下 total:\s+\(statements\)\s+(\d+.\d+)% .gitlab-ci.yml 配置文件如下 script: - go test -coverprofile=coverage.out && go tool cover -func=coverage.out 就是从输出的内容里面用正则匹配,能成功就OK了 服务端 processor := enameepp.NewEppContactProcessor(&EppStruct{}) domainProcessor := enameepp.NewEppDomainProcessor(&EppStructDomain{}) TMultiplexedProcessor := thrift.NewTMultiplexedProcessor() TMultiplexedProcessor.RegisterProcessor("contact", processor) TMultiplexedProcessor.RegisterProcessor("domain", domainProcessor) server := thrift.NewTSimpleServer4(TMultiplexedProcessor, transport, transportFactory, protocolFactory) fmt.Println("Starting the simple server... on ", addr) return server.Serve() 客户端 var transport thrift.TTransport var err error transport, err = thrift.NewTSocket(addr) if err != nil { fmt.Println("Error opening socket:", err) return err } transport = transportFactory.GetTransport(transport) defer transport.Close() if err := transport.Open(); err != nil { return err } protocol := thrift.NewTBinaryProtocolTransport(transport) mp := thrift.NewTMultiplexedProtocol(protocol, "domain") //client := enameepp.NewEppContactClientProtocol(transport, protocol, mp) client := enameepp.NewEppDomainClientProtocol(transport, protocol, mp) return handleClient2(client) 原始代码 for { select { case poll := <-connPool: print("pool") case <-time.After(20 * time.Second): break //希望在这里退出循环 } } 结果是一直在循环,搜索了下发现这样写是不对的,改进代码 OK: for { select { case poll := <-connPool: print("pool") case <-time.After(20 * time.Second): break OK //这样就可以退出了 } } 使用SSH包写了一个SCP文件到远程服务器的东东 func sendFile(client *ssh.Client, src string, dest string) error { session, err := client.NewSession() if err != nil { return err } defer session.Close() go func() error { w, errs := session.StdinPipe() if errs != nil { return errs } defer w.Close() fileSrc, srcErr := os.Open(src) if srcErr != nil { return srcErr } srcStat, fileErr := fileSrc.Stat() if fileErr != nil { return fileErr } fmt.Fprintln(w, &quot;C0644&quot;, srcStat.Size(), filepath.Base(dest)) io.Copy(w, fileSrc) fmt.Fprint(w, &quot;x00&quot;) // 传输以x00结束 return nil }() if err := session.Run(&quot;/usr/bin/scp -qrt &quot; + filepath.Dir(dest)); err != nil { return err } return nil } 在服务器上执行一个PY脚本 func execCmd(client *ssh.Client, cmd string) (error, string) { sessions, err := client.NewSession() if err != nil { return err, &quot;&quot; } defer sessions.Close() str, errc := sessions.CombinedOutput(cmd) return errc, string(str) } 结果 SCP文件是正常的,在执行PY脚本的时候代码也全部执行了,不过输出的结果不一致 和在服务器上直接执行python xxx.py par1 par2 不一样 xxx.py os.system(‘tar zxvf xxx.tar.gz’)//这个会显示解压文件的路径 ptint(“start”) os.system(cp xxx.class) print(“stelp 2”) os.system(‘tar zcvf xxx.tar.gz ./’)//这个会显示路径 GO得到的结果 显示tar zxvf 的结果 显示tar zcvf 的结果 print(start) print(step 2) 没闹明白为啥这样的 是不是和PY调用系统命令有关系.
ESSENTIALAI-STEM
Measles is a highly contagious viral infection, common mostly in childhood. It causes a rash all over the body, which is its most characteristic symptom. It is contagious from about four days before the appearance of the rash until approximately four days after. Also known as rubeola, measles is one of the leading causes of death in small children as it carries the risk of serious complications like pneumonia and encephalitis. Measles spreads rapidly via a similar mechanism to the flu (via coughing, sneezing, close contact, etc.), but people who have had measles before cannot catch it again. What are its symptoms? Measles symptoms usually set in about 10 to 14 days after exposure to the virus and early symptoms may be non-specific symptoms, similar to those of the common cold. Signs may include: • Fever (which may spike sharply once the rash sets in) • Runny nose and sneezing • Sore throat • Persistent cough • Red, sore eyes • Small white spots on the inside of the mouth (these are called Koplik’s spots) • A rash of small red spots in tight clusters, which sets in several days after the appearance of the other symptoms, usually starting on the face, around the hairline or behind the ears before spreading to the rest of the body. How is it diagnosed? A measles diagnosis is usually fairly straightforward thanks to its characteristic blotchy rash and the presence of Koplik’s spots. Your doctor may order a blood test to confirm the diagnosis. What are your treatment options? Once the infection has set in, measles treatment is largely about managing the symptoms as there is no known cure. Serious complications can usually be avoided with treatment at home including plenty of bed rest, adequate nutrition and hydration and, if necessary, fever-reducing medication. A doctor may also recommend a vitamin A supplement. If a secondary infection does develop, your doctor will prescribe antibiotics to treat it. Can it be prevented? The measles vaccine is the gold standard in measles prevention. In South Africa, the measles vaccine is part of the EPI (Expanded Programme on Immunisation) and is scheduled for babies nine months of age, followed by a booster at 18 months. There’s also an additional vaccination for measles, mumps and rubella (MMR), which can be done at 15 months, with a booster shot at the age of five years old. In cases where routine immunisation hasn’t taken place, it’s essential to keep infected individuals isolated during the contagious period. What to do now Baby immunisations are available at Clicks clinics, including for measles.  To make an appointment at a Clicks Clinic, call 0860 254 257 or visit Clicks Clinics online.  For more info The National Institute of Communicable Diseases  The accuracy of this information was checked and approved by physician Dr Thomas Blake in January 2015
ESSENTIALAI-STEM
Fort Granville Fort Granville was a militia stockade located in the colonial Province of Pennsylvania. Its site was about a mile from Lewistown, in what is now Granville Township, Mifflin County. Active from 1755 until 1756, the stockade briefly sheltered pioneer settlers in the Juniata River valley during the French and Indian War. The fort was attacked on August 2, 1756, by a mixed force of French troops and Native Americans, mostly Lenape warriors. The fort’s garrison surrendered the strongpoint to these attackers, who celebrated their victory and destroyed the stockade. Background After the French victory in the Battle of the Monongahela on 9 July 1755, English settlers, who set up farms on Native American lands that they had illegally squatted on drew in hostilities from Native Americans. Native Americans who never legally ceded their land, resorted to hit-and-run tactics on the Pennsylvania frontier. The Native American tribes whose land was underhandedly sold by the Iroquois and the Province of Pennsylvania then entered in alliances with Native Americans from present-day Ohio. This led to the Franco-Indian alliance with Native American Nations who distrusted the Iroquois, the British, and Pennsylvania. The Shawnee and Delaware sought to drive settlers off of land sold out from under the Shawnee by the British and Iroquois in western Pennsylvania. In late 1755, Colonel John Armstrong wrote to Governor Robert Hunter Morris: "I am of the opinion that no other means of defense than a chain of blockhouses along or near the south side of the Kittatinny Mountains from the Susquehanna to the temporary line, can secure the lives and property of the inhabitants of this country." The provincial government of Pennsylvania decided that a string of forts should be constructed across the province from the Delaware Water Gap to the Maryland line. On 17 December 1755, Capt. George Croghan was issued the order below as signed by Benjamin Franklin, Joseph Fox, Joseph Hughs, and Evan Morgan: "Sir:—You are desired to proceed to Cumberland County and fix on proper places for erecting three stockades, viz.: One back of Patterson's, one upon Kishecoquillas, and one near Sideling Hill; each of them fifty feet square, with Block House on two of the corners, and a Barracks within, capable of lodging fifty men. You are also desired to agree with some proper Person or Persons to oversee the workmen at each Place, who shall be allowed such Wages as you shall agree to give, not exceeding one Dollar per day; and the workmen shall be allowed at the rate of six Dollars per month and their Provisions, till the work is finished." Location and construction Instead of constructing the fort at the mouth of the Kishacoquillas Creek, Croghan went up the Juniata River to a site near a spring. The exact location can no longer be determined, as the construction of the Pennsylvania Canal destroyed the spring around 1829. According to historian Walter O'Meara, "This fort was an important link in the chain of strongpoints on the west side of the Susquehanna [River], commanding the point where the Juniata [River] falls through the mountains." Governor Morris planned the construction of Fort Pomfret Castle, Fort Granville, Fort Shirley, and Fort Lyttleton as the westernmost line of defense of the Pennsylvania frontier. Croghan began construction in December 1755, and in January 1756, the fort was named by Governor Robert Hunter Morris in honor of John Carteret, 2nd Earl Granville. The final construction was square, with sides measuring eighty-three paces (between 207.5 and 415 feet), with a bastion at each of the four corners. An important natural feature of the fort site was a ravine which, since the fort's slope had not been graded to form a glacis, provided cover for the enemy forces who later captured the fort. In February 1756, Governor Morris described the fort to General William Shirley: * "15 miles northeast of Fort Shirley, near the mouth of a Branch of the Juniata called Kishequokilis, a third Fort is erected, which I have called Fort Granville. This Fort commands a narrow pass...which is so circumscribed that a few men can maintain it against a much greater number, as the rocks are very High on each side, not above a gunshot assunder, and thus extended for 6 miles, and leads to a considerable settlement upon the Juniata, between Fort Granville and where that River falls into the Susquehanna." Garrison and supplies Governor Morris assigned 75 men under the command of Captain James Burd to construct the fort, however by February the garrison was reduced to 41 as detachments were sent to various locations to obtain supplies. Food and ammunition were in short supply, with Burd writing to his lieutenant on 27 February, "Write to Mr. Buchannan to send...one whole barrel of Gun poudder, letting him know that we have not one ounce in store here." On 28 March, Elisha Saltar, Commissary General, reported to Governor Morris that "Fort Granville...is so Badly stor'd with Amunition, not having three rounds per man...Great part of the Souldiers have left their posts & Come to the Inhabitants, particularly from Fort Granville." Soon after this, Captain Burd was promoted to major and transferred to the Third Battalion of the Pennsylvania Provincial Regiment, to begin construction of Fort Hunter and later Fort Halifax and Fort Augusta. Captain Edward Ward was given command of the fort. On 20 May, Ward wrote to Major Burd, "I have but 30 men to garrison This fort at present." By 3 June, there were 39 men listed in the garrison, although some of these were untrained recruits. Two separate reports state that the fort was equipped with two swivel guns, mounted on the bastions. Siege and capture, 1756 In 1754, the British and Iroquois had sold lands traditionally recognized as belonging to the Shawnee. In response, the Shawnee called on Indian allies from across the Ohio Valley. Delaware and Illinois warriors, along with a small group of French soldiers, joined the Shawnee in their effort to drive off the new interlopers by attacking recently established farms. By the summer of 1756, the local settlers only left the fort when absolutely necessary due to an increase in the number of sightings of Native Americans intent on reclaiming their land. The combined Native American forces had driven most settlers in the area to Fort Granville. Assistance for the recent settlers arrived under the command of Lieutenant Edward Armstrong (brother of Colonel John Armstrong) with a militia force to protect them during the harvest. Some of this militia was sent south to Tuscarora to help the settlers there. Around 22 July, some 60 to 70 Indian warriors, including Shawnee, Delaware, and Illinois, appeared outside the fort ready for battle, but the commanding officer declined to engage in hopes they would leave. The Native Americans fired at one man and wounded him but he was able to get back into the fort with no serious injury. A short distance from the river they killed a man named Baskins, burned his house, and took his wife and children captive. They also took Hugh Carrol and his family prisoners. On 30 July, Captain Edward Ward, commandant at Fort Granville, took all but 24 men out of the fort to protect settlers in Sherman's Valley, leaving Lieutenant Armstrong in command. The Native Americans estimated the number of men remaining in the fort, and on 2 August 100 warriors, along with 55 Frenchmen led by Francois Coulon de Villiers (not his brother, Louis Coulon de Villiers, as is often written incorrectly) attacked the fort. About midnight, Coulon's men succeeded in setting Fort Granville on fire. In his diary account of the fort's capture, Joseph Shippen wrote that "they were putting out the Fire with Clay, having no Water in the Fort." Armstrong was shot while trying to extinguish the fire, and the French commander ordered a suspension of hostilities. Several times, Coulon offered quarter to the defenders for their surrender, but Armstrong refused. He was later shot a second time and died. Shortly after Armstrong's death, Sergeant John Turner surrendered the fort by opening the gates. Following orders from the French commander, Fort Granville was burnt by Captain Jacobs, leader of the Delaware participants. A report published in the Pennsylvania Gazette on 19 August stated: * "The Enemy took Juniata Creek, and came under its Bank to a Gutt [ravine] (said to be about 12 Feet deep) and crept up till they came within about 30 or 40 Feet of the Fort, where the Shot from our Men could not hurt them: That into that Gutt they carried a Quantity of Pine Knots, and other combustible Matter, which they threw against the Fort, till they made a Pile and Train from the Fort to the Gutt, to which they set Fire, and by that Means the Logs of the Stockade catched, and a Hole was made, through which the Lieutenant and a Soldier were shot, and three others wounded, while they were endeavouring to extinguish the Flames: That the Enemy then called to the Besieged, and told them, they should have Quarter, if they would surrender; upon which, it is said, one John Turner immediately opened the Gates, and they took Possession of the Fort." The French letter Before leaving, the French commandant had his troops set up a flagpole with a French flag on it, and "a Shot Pouch, with a written Paper in it." The pouch containing the letter, written in French, was prominently displayed so that it would be found by any British troops sent to the fort. The letter appeared to be from a French woman, saying goodbye to her lover: * "Don't think that ever I will have any Regard for You, & don't expect ever to get any Mercy from me, for I do not want to see You after You vex me so much...Go away, it is not expedient that you should remain here...think not that I shall cease to persecute you." At least one historian believes that the letter was intended as a joke, mocking the British military. Aftermath The captives (22 soldiers, 3 women, and 5 or 6 children) were divided, and some were taken to Fort Duquesne and then to the Lenape village of Kittanning, including Sergeant John Turner, his wife and stepsons Simon Girty, Thomas Girty, George Girty, and James Girty. There, Captain Jacobs ordered that the sergeant be put to death. They tied him to a stake and "after having heated several old gun barrels red-hot, they danced around him, and every minute or two, seared and burned his flesh... After tormenting him almost to death, they scalped him, and then held up a lad, who ended his sufferings by laying open his skull with a hatchet." The reasons for Turner's execution are unclear. One source says that it was due to a personal feud with an Indian named Fish whom Turner had killed, but a French report of Fort Granville's capture, found after the capture of Fort Duquesne in 1758, says that Turner was accused of murdering Simon Girty Sr., (Simon Girty's father) in order to marry his widow. One prisoner, a man named Barnhold, managed to escape and provided the first eyewitness account of the fort's capture. The other captives were taken to Fort de Chartres in the Illinois country, where they were ransomed from the Indians by the French officers and local inhabitants. Escorted to New Orleans, they were then repatriated to England and eventually returned to the American colonies. Analysis of the factors leading to the fort's capture focused on the lack of ammunition and the ravine which allowed French forces to approach the fort unseen. Colonel William Clapham wrote from Fort Augusta on 14 August that he was "well Assured that this Loss was entirely occasioned by a Want of Ammunition, having receiv'd a Letter two or three days ago from Colonel John Armstrong, that they had in that Fort only one Pound of Powder & fourteen Pounds of Lead." In response, Benjamin Franklin reported that the fort had "50 Pound of Powder, and 100 Weight of Lead." Captain Joseph Shippen wrote to his father, Edward Shippen III: "It was a scandalous thing to leave the Gully near Fort Granville just as Nature left it." The French and Indian raid led to retaliation in the form of the Kittanning Expedition, led by Lieutenant Armstrong's brother, Colonel John Armstrong. Thomas Girty, stepson of Sergeant John Turner, was rescued during the raid and provided additional details about the fort's capture. Fort Granville was not rebuilt, as it was decided that the western line of defense was too widely spaced and difficult to supply. Plans to build Fort Pomfret Castle were scrapped and Fort Shirley and Fort Patterson were abandoned. The line of defense withdrew to Fort Augusta, Fort Hunter, and Fort Halifax. Legacy A brass plaque on a stone plinth memorializing the fort's destruction was erected in Lewistown in Mifflin County, Pennsylvania, in 1916 by the Pennsylvania Historical Commission and the Committee on Historical Research of Mifflin County. A historical marker was erected in 1947 by the Pennsylvania Historical and Museum Commission.
WIKI
-- Persian Gulf Stocks: Dubai Financial Market, Industries Qatar Dubai’s benchmark DFM General Index (DFMGI) rose less than 0.1 percent to 1,471.49 at the 2 p.m. close in the emirate, trimming this month’s loss to 9.8 percent. Qatar’s QE Index fell 0.7 percent. The following shares were active in the Persian Gulf region. Stock symbols are in parentheses. Dubai Financial Market (DFM) (DFM UH) retreated 1.6 percent to 94.5 fils, the lowest close since May 16, on bets second-quarter profit at the only publicly traded Arab stock market may drop after trading volumes slumped. The stock “is a proxy for the market,” said Samer Darwiche, a Dubai-based analyst at Gulfmena Investments Ltd. “Lower traded volume of the exchange means that second-quarter earnings will be lower than the strong first-quarter figures.” Industries Qatar QSC (IQCD) declined 1.4 percent, the most since May 14, to 136.9 riyals. Shares of the second-biggest petrochemicals maker in the Middle East retreated 6.2 percent this month as oil prices headed for the biggest monthly drop in three years. To contact the reporter on this story: Alaa Shahine in Dubai at asalha@bloomberg.net To contact the editor responsible for this story: Claudia Maedler at cmaedler@bloomberg.net
NEWS-MULTISOURCE
These Startups Are Building Tools to Keep an Eye on AI In January, Liz O’Sullivan wrote a letter to her boss at artificial intelligence startup Clarifai, asking him to set ethical limits on its Pentagon contracts. WIRED had previously revealed that the company worked on a controversial project processing drone imagery. O’Sullivan urged CEO Matthew Zeiler to pledge the company would not contribute to the development of weapons that decide for themselves whom to harm or kill. At a company meeting a few days later, O’Sullivan says, Zeiler rebuffed the plea, telling staff he saw no problems with contributing to autonomous weapons. Clarifai did not respond to a request for comment. O’Sullivan decided to take a stand. “I quit,” she says. “And cried through the weekend.” Come Monday, though, she took a previously planned trip to an academic conference on fairness and transparency in technology. There she met Adam Wenchel, who previously led Capital One’s AI work, and the pair got to talking about the commercial opportunity of helping companies keep their AI deployments in check. O’Sullivan and Wenchel are now among the cofounders of startup Arthur, which provides tools to help engineers monitor the performance of their machine learning systems. They’re supposed to make it easier to spot problems such as a financial system making biased lending or investment decisions. It is one of several companies, large and small, trying to profit from building digital safety equipment for the AI era. Researchers and tech companies are raising alarms about AI going awry, such as facial recognition algorithms that are less accurate on black faces. Microsoft and Google now caution investors that their AI systems may cause ethical or legal problems. As the technology spreads into other industries such as finance, health care, and government, so must new safeguards, says O’Sullivan, who is Arthur's VP of commercial operations. “People are starting to realize how powerful these systems can be, and that they need to take advantage of the benefits in a way that is responsible,” she says. Arthur and similar startups are tackling a drawback of machine learning, the engine of the recent AI boom. Unlike ordinary code written by humans, machine learning models adapt themselves to a particular problem, such as deciding who should get a loan, by extracting patterns from past data. Often, the many changes made during that adaptation, or learning, process aren’t easily understood. “You’re kind of having the machine write its own code, and it’s not designed for humans to reason through,” says Lukas Biewald, CEO and founder of startup Weights & Biases, which offers its own tools to help engineers debug machine learning software. Researchers describe some machine learning systems as “black boxes,” because even their creators can’t always describe exactly how they work, or why they made a particular decision. Arthur and others don’t claim to have fully solved that problem, but offer tools that make it easier to observe, visualize, and audit machine learning software’s behavior. The large tech companies most heavily invested in machine have built similar tools for their own use. Facebook engineers used one called Fairness Flow to make sure its job ad recommendation algorithms work for people of different backgrounds. Biewald says that many companies without large AI teams don’t want to build such tools for themselves, and will turn to companies like his own instead. Weights & Biases customers include Toyota’s autonomous driving lab, which uses its software to monitor and record machine learning systems as they train on new data. That makes it easier for engineers to tune the system to be more reliable, and speeds investigation of any glitches encountered later, Biewald says. His startup has raised $20 million in funding. The company's other customers include independent AI research lab OpenAI. It uses the startup’s tools in its robotics program, which this week demonstrated a robotic hand that can (sometimes) solve a modified Rubik’s Cube. Arthur’s tools are more focused on helping companies monitor and maintain AI after deployment, whether that’s in financial trading or online marketing. They can track how a machine learning system’s performance changes over time, for example to flag if a financial system making loan recommendations starts excluding certain customers, because the market is drifting away from conditions the system was trained on. It can be illegal to make credit decisions that have a disparate impact on people based on gender or race. IBM, which launched AI transparency tools last year as part of a service called OpenScale, and another startup Fiddler, which has raised $10 million, both also offer AI inspection tools. Ruchir Puri, chief scientist at IBM Research, says KPMG uses OpenScale to help clients monitor their AI systems, and that the US Open used it to check that automatically selected tennis highlights included a balance of players of different gender and ranking. Fiddler is working with financial information company S&P Global, and consumer lender Affirm. Wenchel, who is Arthur’s CEO, argues that AI monitoring and auditing technology can help AI spread deeper into areas of life outside of tech, such as healthcare. He says he saw first-hand in the financial sector how justifiable caution about AI systems’ trustworthiness held back adoption. “Many organizations want to put machine learning into production to make decisions, but they need a way to know it’s making the right decisions and not doing it in a biased way,” he says. Arthur’s other cofounders are Priscilla Alexander, also a Capital One veteran, and University of Maryland AI professor John Dickerson. Arthur is also helping AI gain a foothold in archaeology. Harvard’s Dumbarton Oaks research institute is using the startup’s technology in a project exploring how computer-vision algorithms can speed the process of cataloging photos depicting ancient architecture in Syria made inaccessible and endangered by war. Arthur’s software annotates images to show which pixels influenced the software’s decision to apply particular labels. Dumbarton Oaks research institute is using Arthur's software to guide development of machine learning software that catalogues images of Syrian architecture. Yota Batsaki, Dumbarton’s executive director, says this helps reveal the software’s strengths and limitations, and for AI to earn acceptance in a community that doesn’t automate much. “It’s essential to evaluate the interpretations being made by the model and how it is ‘thinking’ to build trust with librarians and other scholars,” she says. O’Sullivan remains an AI activist. She’s technology director at the nonprofit Surveillance Technology Oversight Project and an active member of the Campaign to Stop Killer Robots, which wants an international ban on autonomous weapons. But she and her Arthur cofounders don’t believe governments or even defense departments should be deprived of AI altogether. One of Arthur’s first clients was the US Air Force, which awarded the company a 6-month prototyping contract at Tinker Air Force Base in Oklahoma, working on software that predicts supply chain problems affecting engines used on B-52 bombers. The project is aimed at reducing unnecessary costs and delays. O’Sullivan says that kind of work is very different from entrusting machines with the power to take someone’s life or liberty. Arthur reviews the potential impacts of every project it takes on, and is working on a formal internal ethics code. “The extreme use cases still need to be regulated or prevented from ever coming to light, but there’s tons of room in our government to make things better with AI,” O’Sullivan says. “Constraints will make me and a lot of other tech workers more comfortable about working in this space.”
NEWS-MULTISOURCE
Hypothesis alert! Come take a dive with me on how the nft.gamestop.com blockchain ecosystem could operate. [Hello r\/Superstonk, Jellyfish here with you! I would like to change it up a little bit with all the dismal posts and switch focus to the excitement of the future and what could be. ](https://preview.redd.it/693r0rj957c71.jpg?width=320&format=pjpg&auto=webp&s=5a0d117bb5bb813963786b7ff7a3600d55fd97fe) Remember this is all guesswork, speculation, and a hypothesis at best from me. This post was *inspired* by reading this [thread](https://twitter.com/PastryETH/status/1416206434203750402) from pastry on Twitter. I would like to borrow a couple of those concepts and dive into how the pieces *could* fit into the interconnected and operable GameStop ecosystem being worked up for [nft.gamestop.com](https://nft.gamestop.com). **Again, this is all me speculating, and I am completely prepared to be completely wrong when GameStop really does announce what is happening. With that said, let's take a look:** [Please look past my shitty ability to make graphics, I hope this information conveys! ](https://preview.redd.it/tfiar25ss6c71.png?width=1995&format=png&auto=webp&s=adce3f15d68070625207da8ccbde84939ddc2e67) GameStop will utilize Ethereum as the backbone of the ecosystem they are working to build, which will be driven by smart contracts and the scaling solutions they are working to put in place. Remember, Smart Contracts automatically executes code once specific terms have been met. They first started as programmable money but are decentralized digital legos capable of lending, borrowing, swapping, and much more to come. https://preview.redd.it/zk0j3niqu6c71.jpg?width=1600&format=pjpg&auto=webp&s=9205a143c52ee331edbf961b642df5a52ab5c90e # NFTs Unique tokens that can be used by creators to tokenize a wide range of content (not just art). [ According to a report by decentralized app marketplace DappRadar, the average number of NFT sales rose almost 300&#37;, from 21,815 per day in January, to 82,373 in May \(so far\). This number rose even higher as crypto prices started to plummet on May 12, with sales surging to almost 94,000 NFT transactions a day. ](https://preview.redd.it/1v352263v6c71.png?width=891&format=png&auto=webp&s=cd85ec43fefcf1459011882e5e1b9afd705beb3f) * NFT space appears to cool down, yet in-depth numbers say the opposite; the number of sales and the daily average of unique active wallets spiked 111.46% and 151.89% respectively from the previous quarter.  * Axie Infinity attracts more than 4,700 daily unique wallets increasing usage by 360.61% quarter-on-quarter; play-to earn-games might be the key to mass adoption. [https:\/\/dappradar.com\/blog\/dapp-industry-report-q2-2021-overview](https://preview.redd.it/ee5mdtfov6c71.png?width=726&format=png&auto=webp&s=4d2e2f2289bf4d877cbfd9cce15f61c092542c43) >Based on the latest sales, those NFTs that provide owners with an added value or utility appear to be gaining steam. Virtual pieces of land and NFTs that unlock DeFi capabilities are becoming rapidly appreciated. The ceiling for metaverses, play-to-earn games, and the gamification of DeFi, or GameFi, is higher than ever.  > >While the sales volume appears to fall down, both, the number of sales, and the number of unique wallets suggest otherwise. In comparison to Q1, the number of sales spiked by 111.46%, while the daily average of unique wallets increased by 151.86% as well. Reaching more people is the path to mass adoption. Play-to-earn games, led by Axie Infinity are a key driver on this surge. With more than 62,000 unique wallets in the last 30 days, it appears that a wider, more mainstream audience has finally arrived.  > > **With the surge of blockchains that enable faster and cheaper transactions, decentralized games can be upgraded by financial features to create unique ecosystems. GameFi combines the traits of DeFi, games, and NFT to create an entertaining option to generate passive income. Moreover, GameFi dapps allow players to get full control of their in-game assets so they can be utilized in different manners.** [NOTE: THIS IS NOT A RECOMMENDATION OR ENDORSEMENT OF THESE PROJECTS, MEANT STRICTLY FOR INFORMATIONAL PURPOSES ABOUT NFTs](https://preview.redd.it/hkn4p2r107c71.jpg?width=680&format=pjpg&auto=webp&s=83f7819cef1cacd29924162361c98c7bce4f6b0c) # DeFi DeFi has exploded but in GameStop’s case, I think it might be leveraged for flexibility and its non-custodial nature. With DeFi, GameStop can become its own bank and cut out costly middlemen for transactions in its ecosystem. [How it is today](https://preview.redd.it/0p0n2kerw6c71.png?width=656&format=png&auto=webp&s=37fb15bc46ce39baa3ee04a7da1d0fc5ea5782bb) [How it can be](https://preview.redd.it/jxm0ah3uw6c71.png?width=729&format=png&auto=webp&s=70c5f27808a64599ce8701eec45a5506b3aae86f) This opens up the possibility of P2P loans, complex programmed loans, & a faster & more fair process, in general, The top 5 banks in the US control $3.7T worth of lending https://preview.redd.it/cd2t6ztj37c71.png?width=548&format=png&auto=webp&s=c19845f2ef245251686cef3edecabc87f607e83d # Insurance The insurance market is based on trust management. GameStop's blockchain can take this in a new direction by managing trust & can be used to verify any type of data in a contract. With Ethereum and its solutions, GameStop can act as an unbiased insurer in any number of products they wish to explore: extended warranties, travel insurance for e-sport gaming events, etc. All of this is possible since GameStop is now in the position to be its own bank. https://preview.redd.it/tkhhcyctx6c71.png?width=669&format=png&auto=webp&s=7ae44d4cf048574a7f51ad4f69576d5d1d839c2b # Voting Voting on anything requires the authentication of voters’ identity, secure record-keeping to track votes, & trusted tallies to determine the winner. Votes can be captured as transactions on the blockchain, and GameStop and voters would have an immutable and verifiable audit trail. # Metaverse NFTs on Ethereum will power a universe beyond our own like the Oasis in Ready Player One. https://preview.redd.it/zynlj9iqy6c71.jpg?width=300&format=pjpg&auto=webp&s=5c6c52c77449de2e5cd0c2cd8d75f64955a387eb Virtual reality technology will power an augmented reality of virtual space and tokenized in-app purchases. Examples in the space today that *could* interact with what GameStop is building due to interoperability. NOTE: THIS IS NOT A RECOMMENDATION OR ENDORSEMENT OF THESE PROJECTS, MEANT STRICTLY FOR INFORMATIONAL PURPOSES ABOUT THE METAVERSE. [https:\/\/axieinfinity.com\/](https://preview.redd.it/rcppa9xvy6c71.png?width=179&format=png&auto=webp&s=e54fdf28471779057e5f7c69165385d6d0b2bc80) [https:\/\/decentraland.org\/](https://preview.redd.it/7j27d8fxy6c71.png?width=105&format=png&auto=webp&s=012222f3f1261d58953182739a11199cdf849aef) [https:\/\/isotile.com\/](https://preview.redd.it/4yidg1sxy6c71.png?width=329&format=png&auto=webp&s=25dfbd3887b0932e7d92326300cc1284544f3829) [https:\/\/www.cryptovoxels.com\/](https://preview.redd.it/78718bi0z6c71.png?width=160&format=png&auto=webp&s=ae273190f7f30fe913f2552e50283cd4569e6f01) # Supply Chain With Ethereum and GameStop's solution, transactions can be stored in a permanent decentralized record that is monitored securely and transparently. This can greatly reduce time delays and human mistakes. It can also be used to monitor costs, labor, & even waste/emissions at every point of GameStop's supply chains. https://preview.redd.it/s2n0zpvr07c71.png?width=2120&format=png&auto=webp&s=13142e68a4ef680b44eaa07b31c992e5d328c249 # Decentralized Autonomous Organizations (DAOs) https://preview.redd.it/ux618ku937c71.png?width=1280&format=png&auto=webp&s=d0de8daa116d9d72a250d4f2e2dca25c31a34f3c DAOs are entities made up of any number of individuals who maintain the group’s decisions in a distributed manner. Individuals can use tokens to vote and propose ideas they want for the protocol. I wouldn’t be surprised if GameStop goes this route for governance. As a side note, I do see DAO’s as the future of [r/Superstonk](https://www.reddit.com/r/Superstonk/) for fairly and transparently kicking ass. In theory, GameStop could allow for this entire ecosystem to be governed via a DAO. GameStop's DAO could own the smart contracts and assets of this ecosystem, with voting rights granted to DAO members. DAO stands for "Decentralized Autonomous Organization". In my example, GameStop's DAO owns the smart contracts and assets that make up the GME Metaverse. It would also own a purse of GameCoin which allows it to be truly autonomous as well as subsidize various operations and initiatives throughout the GME Metaverse. In this scenario, the gaming community will propose and vote on policy updates, future NFT auctions, whitelisting of NFT contracts to be allowed inside the Metaverse or NFT Marketplace, Marketplace integrations, and whatever the community deems relevant. Voting takes place on the GameStop DAO's governance interface, powered by Ethereum. **What kinds of things could be voted on?** * Upgrading to add more features and protocol upgrades. * Specifics and dates of future NFT auctions. * Size of marketplace fees, which are always in GameCoin. * Primary sale fees, which are always in GameCoin. * Allocation of GameCoin grants to development efforts. # ICO's Initial Coin Offerings “ICO’s” can change the way we think about how video games are financed. ICO’s for proposed titles occur globally & online, which allows an exponentially higher number of investors, all while governance and control are maintained transparently and effectively by the DAO for the project. Can you imagine the revenue GameStop can generate for facilitating this development model? I do think the industry will be interested as all of these items are already why Ethereum already has the attention of developers around the world. [Ethereum is attracting the world’s developers. Since Q3 2019, it has gained more than 300 developers per month, with GameStop entering the fray with Jordan Holberg @eviljordan, Matt FinΞstonΞ | @finestonematt, j@Cyberhorsey](https://preview.redd.it/5ga10b6f47c71.png?width=2004&format=png&auto=webp&s=d8c02b0948a1b50f3cda03f885dfeaf3d60048cd) As you can see, just by making the jump into the NFT space, GameStop has positioned itself to disrupt other industries as well! [GameStop is coming for everything :D ](https://i.redd.it/4p0evnux57c71.gif) And this is before any excitement about a crypto dividend or crypto shares. Buckle up! TL:DR - GameStop is building a money printing press that will disrupt more than just gaming. [ Thanks for dropping by and taking a dive! Please let me know if you have any questions or ideas on other areas to explore, happy to try and help! ](https://i.redd.it/iirj53v067c71.gif)
NEWS-MULTISOURCE
Talk:Norwegian POW Museum Clean-up I've attempted a clean up and I think it's pretty good now. The tone is better, and I took care of most grammar and pov issues. Still needs sourcing as there's absolutely nothing there right now. Even foreign language sources would be better than nothing. But this is beyond the scope of my knowledge. Someone else will have to tackle it. As such, I'm leaving it on Cleanup for someone else to handle. --Lendorien 02:04, 23 March 2006 (UTC)
WIKI
COMBIN Function (DAX) How does the COMBIN function (DAX) work? The COMBIN function (DAX) returns the number of combinations for a given number of items. COMBIN Formula Syntax COMBIN(      number, number_chosen ) How do you use the COMBIN function? Use COMBIN to determine the total possible number of groups for a given number of items. Related Blog Posts Related Support Forum Posts Combine actuals and forecast Combine Worksheets in a Workbook Combine Calculate and Switch for multiple criteria or condition Considerations when using the COMBIN function Numeric arguments are truncated to integers. If either argument is nonnumeric, COMBIN returns the #VALUE! error value. If number < 0, number_chosen < 0, or number < number_chosen, COMBIN returns the #NUM! error value. A combination is any set or subset of items, regardless of their internal order. Combinations are distinct from permutations, for which the internal order is significant. Related Video Tutorials Formula examples using the COMBIN function =COMBIN(A1, A2) =COMBIN(A1, A3) =COMBIN(8,2) Related Course Modules Ultimate-Beginners-Guide-To-PowerBI DOWNLOAD To access our comprehensive DAX formula reference guide just insert your email address below. The resource will download immediately and we’ll also email it to you.
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Similarities between the Bible and the Qur'an The result was KEEP AND CLEANUP. —Larry V (talk &#124; contribs) 23:40, 15 December 2006 (UTC) Similarities between the Bible and the Qur'an * — (View AfD) I know this is going to be a controversial deletion so I decided to take this to AfD directly instead of prodding it. Basically, before you do anything, I want you to discard all of your biases and prior knowledge of this topic and look at it completely objectively. If you can't do that, I don't think you should make any judgment on this AfD because you probably have some kind of vested interest in the topic or something which would interfere with your neutrality. Now, looking at this monster of an article, all I see is original research. There are zero references in the entire article except when it quotes primary sources (being the Bible and Qur'an itself). That in itself is okay sometimes, but throughout the article, large sections of both works are quoted and it leaves the reader to draw conclusions, sort of like saying "Here's two passages. They have similarities." and just leaving it at that. Finally, the Bible and Qur'an are similar. So what? The Lion King and Hamlet are similar too but they don't have an article that just puts two sections of them side-by-side verbatim without even explaining why they're similar (a side note, is it copyvio to have such large blocks of Biblical and Qur'anic text in an article?). That is something that should be discussed in their individual articles, if it's notable enough at all (and a side note, isn't it obvious enough that the Bible and Qur'an would have similarities even without an article on it?). Axem Titanium 20:55, 8 December 2006 (UTC) * no vote yet Good points. The question is: Is the article verifiaBLE. And another interesting question: Would it be ok with OR in SOME cases? Or in other words, is it OR if the facts are obviously self-evident and non-controversial? Im sure everybody agrees that this is a more ... uh.... "notable"? ... uh... topic than comparing The Lion King with Hamlet. --Striver 21:01, 8 December 2006 (UTC) * Delete as OR unless article can be rewritten with proper sourcing, in which case, stubify and restart This is a reasonable topic for an encyclopedia, but at the moment, the article appears to be pure original research. I don't see any copyvio issues here however. Bwithh 21:04, 8 December 2006 (UTC) * delete- i agree there is no copyvio, but I do not agree that this is a viable topic for an article. The question posed by Striver is a telling one - "is OR ok in some cases?" I think the answer is no, even when its self-evident stuff. OR is OR, and the fact that something is true does not make it automatically valid as a WP article.--Dmz5 04:52, 9 December 2006 (UTC) * well, to clarify my comment, I mean that this is a reasonable article if there is no original research (including "self-evident" stuff) i.e. rely on authoritative secondary sources only instead. A quick glance at google books suggests that there are books out there making this kind of comparison. How reliable these sources are will take further investigation Bwithh 05:04, 9 December 2006 (UTC) * Delete The entire article consists solely of original research. Unless it can be backed up by several scholarly sources on the topic it must go. --The Way 06:24, 9 December 2006 (UTC) * Aside from the title, this article is redundant with Islamic view of the Bible. Delete this version, point links/redirects to Islamic view of the Bible, and leave this name (or a stub) available in case someone wants to make a sourced article that meets the title. BCoates 11:41, 9 December 2006 (UTC) * Keep I think large chunk of text from Qur'an and Torah should be removed and commentary from secondary reliable sources should be included. This can be done by first trimming the whole article by removing all primary sources. TruthSpreader Talk 16:26, 9 December 2006 (UTC) * Keep the article can be salvaged. In words case, stubify. --Striver 18:43, 9 December 2006 (UTC) * Keep but clean up. This is one of the instances where the only reference can be both holy books and some obscure compared religion books. Doubt anythyng useful can be found on the web to reference it. Somebody will have to move his bulk to a good library. Alf photoman 20:58, 9 December 2006 (UTC) * Keep and rewrite. Anomo 22:05, 9 December 2006 (UTC) * Keep and rewrite it FirefoxMan 00:31, 10 December 2006 (UTC) * very strong keep. This is a compilation and not OR--but it is a very useful compilation. I can not understand why scholarly sources are wanted by The Way: the sources are the paraphrased texts. The reader is supposed to judge for himself. Do we need a scholarly work to tell us what part of the Bible discusses Moses? * There are some things to be improved: the title is not a good choice--this is a comparison of some events and people in the Koran with the OT and NT. It -- fortunately -- is not about the similarities of their ethical or religious content, or their style, or their manner of composition, or their historical influence. It -- fortunately -- does not attempt to judge which story is more likely to be historical, or to cite sources who might give their opinions on that. * The paraphrases are too long, as are the sections done by quotation. It would be better to make compact accounts, with appropriate parts as quotations in each of the sections--and to make each parallel a main section. this would be much more readable. And perhaps it is not a good idea to include the entire Gospels as one paraphrase. I'd advise doing just the OT here, and do a separate article for the Gospels. DGG 05:29, 11 December 2006 (UTC) * Scholarly context is needed. Obviously these texts were not originally written in modern English. Plus, Wikipedia is not a religious text archive (though Wikiquote or WIkisource might be used for this). Also see my comments below Bwithh 00:57, 13 December 2006 (UTC) * some comments This discussion is notable for the most drastic misunderstanding of copyright yet seen in WP. Neither the Bible nor the Koran are copyright. Specific translations may be, but most of this is paraphrase, and citing a few verses from even a recent translation is just about the clearest example of fair use I can imagine. (though if a particular translation is used, it should be identified) * I do not see this as biased to an Islamic view. The only reason why someone would think so is the relative unfamiliarity of the Koran when read by someone who knows the Bible thoroughly. I hope it does not mean that the editor thinks that any mention of a non Judeochristian view is necessarily bias. Even if we for some reason judge by length, the Koranic passages are usually shorter. DGG 05:38, 11 December 2006 (UTC) * Keep, it is known that the Qur'an cites passages of the old testament Rough 18:00, 11 December 2006 (UTC) * Keep Highly useful for researchers.--Patchouli 00:40, 13 December 2006 (UTC) * Comment But without sourcing and context, this is not of much use to researchers. The article does not even indicate which versions of the Koran and the Bible are used. There are substantial differences and debates over interpretation and translation of these texts. As it is, the article seems to suggest with its quotations that the English language versions of the Koran and Bible are stable and uncontroversial. But the meaning of these texts is a matter of dispute even for those fluent in the relevant strains of Arabic and Hebrew/Greek. Proper referencing and scholarly context is needed. Bwithh 00:55, 13 December 2006 (UTC) * Keep. Sourcing is possible; has redeeming value. --Ab e g92 contribs Boomer Sooners! 10:39, 13 December 2006 (UTC)
WIKI
How to Create a Directory or Files in the SiteWorx File Manager SiteWorx File Manager is handy for managing your website files.   1. Log in to your SiteWorx account.   2. In the File Manager section, click on File Manager. 3. If you have multiple domains, then choose the appropriate domain from the drop-down menu and click on Login. 4. Navigate to the directory where you want to create your file. For creating a file in the HTML directory, click on the HTML directory.   5. Click on New Item. 6. Select Folder as the item type, enter a name for your directory, and then click Create Now.   How to create a new file such as myfile.txt? 1. Click on New Item. 2. Select File as the item type, enter your filename like MyFile.txt, and then click Create Now. • 0 Users Found This Useful Was this answer helpful? Related Articles How to Reset My SiteWorx's Account Password After you access your SiteWorx account, follow these steps to reset your password: 1. Log in to... How to Upload Files via the SiteWorx File Manager You can use SiteWorx's inbuilt file manager instead of an FTP program. 1. Log in to your... How to Edit File in the SiteWorx File Manager You can use SiteWorx's inbuilt file manager to edit files on your website. 1. Log in to your... How to Access AWStats in SiteWorx AWStats is an open-source web analytics tool. Follow the steps below to access your AWStats. 1.... How to Access Webalizer in SiteWorx Webalizer is an open-source web analytics tool. Follow the steps below to access Webalizer. 1.... Powered by WHMCompleteSolution
ESSENTIALAI-STEM
  • Maty BlueCArd - part 4 - DC DC Boost Converter - what is it and why we need it Updated: Jun 26, 2020 To power the Arduino Board and the rest of the electronic we need a stable power source. In this tutorial I'll show you what is a DC DC Boost Converter (aka step up converter), how to use it and why we need it BlueCArd The elements used in this tutorial are from the list of elements needed for BlueCArd. The detailed list can be found here: BlueCArd - list of elements The elements needed for this tutorial are: The elements from the last tutorial (without the USB cable): Arduino Nano First Steps • 1x DC DC Boost Converter -> from 1V - 5V to 5V and at least up to 500 mA • 4x more pin connector cables (2x black and 2x red) I also made a video where I show how to connect the circuid and how the used current changes when we change the input voltage. You can watch the video here: What is a DC DC Boost Converter? A boost converter (step up converter) is a device that can increase the voltage from the power source (while decreasing the current). For BlueCArd I used this one: As you can see You can put any voltage between 1V and 5V at its input and it will output stable 5V. How does it work (very short explanation)? I'm not an electrical engineer and I'll try to explain it to the extent of my understanding. If you find any errors please send me a message or write it in the comments, so I can fix them. Thank You! Below is the general circuit of a DC DC boost Converter: • Vin is the input voltage (in our case from 1V to 5V) • Vout is the output voltage (in our case 5V) How it works: 1. When switch S is closed the current follows the blue line and the inductor L creates a magnetic field. 2. When switch S is opened the magnetic field of the inductor L starts to collapse inducing current through the inductor L creating a high voltage spike and the current is pushed through the red line (through the diode D) and is stored in the capacitor C. 3. The diode D stops the current flowing back from the capacitor. (Side note about capacitors: If you don't know how a capacitor works -> the space between the plates indicates that the circuit is broken there and no electrons can flow through -> the electrical particles are stored at the plates creating a load and when the input voltage is lower than the stored the capacitor tries to push current in the opposite direction -> that is why there is a diode there to stop the current flowing back.) When the switch S is switched very fast this effect pumps up the Vout. The switch S is normally a MOS transistor. In this way the Vout is much higher than Vin. But in the same time the output current is much lower than the input current (P = U.I). Why use the DC DC Boost Converter? The DC DC Boost Converter has 5V stable output independent of the power source. • This means that I can power without a problem the Arduino Nano microcontroller and any other elements that require 5V • I can also calculate the needed resistors for the LEDs and other components that need different voltage independent of the power supply and don't have to change the circuit when I change the power source • I can also use e.g. only 1 rechargeable battery with 1.2V to power smaller circuits Changing the circuit to use the DC DC Boost Converter Use the circuit from the last tutorial. To connect the step up converter to the circuit do the following: 1. Connect the 5V output of the boost converter to the (+) pins on the breadboard 2. Connect the GND output of the boost converter to the (-) pins on the breadboard 3. Connect the VIN pin of the Arduino Nano board to the (+) pins on the breadboard 4. Connect one of the GND pins of the Arduino Nano board to the (-) pins on the breadboard 5. Disconnect the usb cable (if you have it connected) 6. Put some voltage (1V to 5V) on the input of the boost converter (GND or (-) on the IN- and (+) on the IN+) 7. Enjoy In the picture below I set up the input voltage to 3.6V (equals to 3 rechargeable AA batteries) And on this picture, I changed it to 1.2V (equals to 1 rechargeable AA battery) As you can see the circuit is working regardless of the input voltage. You can also see that the current flowing into the Boost Converter is different. Both times the power consumption is the same so when the voltage goes down the current must proportionally go up! This is also why I decided to use 3xAA rechargeable batteries for BlueCArd, so I can limit the current through the Boost Converter. Next Steps In the next tutorial I'll show you how to connect the AT-09 (HM-10) module to the Arduino Nano and how to send commands between the Arduino Nano and the BLE module. Hashtags: #arduino #arduinonano #dcdcboost #dcdcstepup #dcdcboostconverter #boostconverter #rccar #breadboard Previous: BlueCArd part 3 - Arduino Nano first steps Next: BlueCArd part 5 - Arduino Nano Bluetooth Module How To 557 views0 comments  
ESSENTIALAI-STEM
User:Philipp2003 Hey fellows! I'm Philipp2003 and I come from Germany. I'm a big Wrestling fan since I was 10 and my favourite wrestler is Dolph Ziggler. And I'm a fan from the telenovela Sturm der Liebe as well. I hope I'm a huge help in the Wiki community. If I make any mistakes, please point this out to me. Thank you! :)
WIKI
Yomna Nassef, Evan Ou Dr. Yomna Nassef and Dr. Evan Yee Ping Ou were married June 30 at the Islamic Cultural Center of New York. Imam Saad Jalloh, who was ordained there, officiated. Last month, the bride, 31, and groom, 30, completed their residencies as emergency medicine physicians at NewYork-Presbyterian/Columbia hospital, where they met as first-year residents. Starting Aug. 1, both will become emergency room attending physicians at St. John’s Riverside Hospital in Yonkers. Dr. Nassef graduated from N.Y.U. and received a medical degree at Sidney Kimmel Medical College in Philadelphia. She is a daughter of Karima A. Nasser and Ezzat E. Nassef of Woodside, Queens. The bride’s father, who is retired, was an assistant editor of Arabic documents at the United Nations in Manhattan. Her mother, who is also retired, was a science teacher at Middle School 80 in the Bronx. Dr. Ou graduated from the University of California, San Diego, from which he also received a medical degree. He is the son of Susan K. Ou and James J. Ou of Los Angeles. The groom’s mother works in Pasadena, Calif., as a lab technician for the California Institute of Technology. His father is a professor of molecular microbiology and immunology at the University of Southern California.
NEWS-MULTISOURCE
Poll Do you like the discussion forum ? Both while and do while are looping constructs that execute the given set of statements as long as the given condition is true. A while loop first checks if the condition is true and then executes the statements if it is true. If the condition turns out to be false, the loop ends right there. A do while loop first executes the statements once, and then checks for the condition to be true. If the condition is true, the set of statements are executed until the condition turns out to be false. If the condition is false, the loop ends right there. So the difference between the two is that a do while loop executes the set of statements atleast once. Syntax   while (<condition>) begin // Multiple statements end   do begin // Multiple statements end while (<condition>);   Example #1 - while loop   module tb; initial begin int cnt = 0; while (cnt < 5) begin $display("cnt = %0d", cnt); cnt++; end end endmodule   Simulation Log ncsim> run cnt = 0 cnt = 1 cnt = 2 cnt = 3 cnt = 4 ncsim: *W,RNQUIE: Simulation is complete. Click to try this example in a simulator!    Example #2   module tb; initial begin int cnt;   while (cnt != 0) begin $display ("cnt = %0d", cnt); cnt++; end end endmodule   Simulation Log ncsim> run ncsim: *W,RNQUIE: Simulation is complete. Click to try this example in a simulator!    Example #3 - do while loop   module tb; initial begin int cnt = 0; do begin $display("cnt = %0d", cnt); cnt++; end while (cnt < 5); end endmodule   Simulation Log ncsim> run cnt = 0 cnt = 1 cnt = 2 cnt = 3 cnt = 4 ncsim: *W,RNQUIE: Simulation is complete. Click to try this example in a simulator!    Example #3 - do while loop   module tb; initial begin int cnt = 0; do begin $display("cnt = %0d", cnt); cnt++; end while (cnt == 0); end endmodule   Simulation Log ncsim> run cnt = 0 ncsim: *W,RNQUIE: Simulation is complete. Click to try this example in a simulator!    You may also like: You consent to our cookies if you continue to use our website. To know more about cookies, see our privacy policy. I accept cookies from this site. Agree
ESSENTIALAI-STEM
Don’t Miss a Single Update or New Release! Sign up Today How to Stop Eating Out of Boredom How to Stop Eating Out of Boredom Eating out of boredom is one of the biggest causes of weight gain, but there are several things that you can do to avoid this bad habit and the extra unnecessary calories that come with it. Boredom can trigger eating for some people and can result in snacking without thinking much about it. If you eat out of boredom you often feel unsatisfied after your meal and may want to continue eating. A big part of being able to avoid unnecessary eating is to know your own appetite and eating habits, and avoiding the situations that can lead to unnecessary eating. If you can eliminate most of your boredom related eating, you will find that your weight will stabilize and that you will only eat when it is necessary. Doing this can be a bit challenging, but there are several steps you can take to help get rid of your bad eating habits. Think for a minute before you eat Before you pick up a snack, it helps to think for a minute about whether or not you are really hungry. For many people, nothing more than boredom can trigger their appetite, and they subconsciously go to the kitchen for a snack without even realizing that they may not have been hungry in the first place. A few minutes of contemplation can end up making a major difference in whether or not you decide to continue to eat. You don't need to eat every few hours; you really should only eat when you're truly hungry. The key is to find the right balance and not eat when you're starving, but also avoid eating when you are full or just somewhat hungry. Try to differentiate between the times that you are actually hungry, and the times that you want to eat out of boredom. Drink water before you eat Dehydration is a common cause of hunger for many people, but most of us aren't even aware that we might be dehydrated. If you aren't drinking around 6 to 8 glasses of water per day, there is a chance that you may be experiencing mild to moderate dehydration, and although you don't need to necessarily drink water when you're not thirsty, you should definitely try drinking water when you're hungry. For many people, drinking water alleviates the sensation of being hungry, and it can end up being a great way to keep excess calories off when you actually aren't hungry. It's even more important to do this after a meal; some meals are high in sodium and your body may just be craving water rather than more food. Try to keep a bottle of water with you throughout the day and drink it, and your calorie intake will also be lower overall. Stay busy to avoid boredom eating It seems obvious, but staying busy will help you avoid eating out of boredom and keep those excess calories off. Try to identify the times of day that you don't have much to do and schedule activities during those times. Instead of staying in you might go to the gym or talk a walk. Do whatever you can to keep yourself occupied, and then when you actually do need to eat there's a much better chance that you will actually be hungry. You can also keep a diary of the times that you eat and what you ate during each particular meal. It will help you identify the meals during your day that are excess, and the more detailed that you keep your food diary the easier it will be to identify the unnecessary meals. Don't eat when you are watching TV Eating and watching TV can quickly become a bad habit that leads to excess weight gain. The TV basically grabs your attention while you scarf down food and you can pretty easily eat a lot more than you need to. It doesn't mean that you should avoid watching TV, but you should definitely avoid eating while watching TV if you know that it is one of your weaknesses that has led to weight gain in the past. If you are going to eat something when watching TV, make sure that it is healthy and portion out your servings so you don't overeat without thinking. Some people may have to forgo eating and watching TV altogether if it really becomes a problem, but most of the time this bad habit can be managed by planning out your food choices and thinking about what you are eating. Think about what you're craving When you eat out of boredom, you are more likely to crave a particular food like chocolate or popcorn rather than food that will actually satisfy you. If you are bored and you find yourself craving a specific food, alarm bells should go off and you should avoid eating at that particular moment. This can take a bit of practice, and again you will have to learn how to really take a moment to pause before you pick up a food or start making a snack. If you find yourself craving a particular food, try drinking water and waiting, and the chances are that your craving will disappear. Also it helps to simply not have those foods available in your house, which leads us to the next tip. Avoid keeping unhealthy foods at home One of the easiest and most effective ways to avoid eating out of boredom is to simply avoid having unhealthy foods in your home. Eating when you are bored isn't as bad as eating something unhealthy when you're bored. It's both the bad habit of eating when you don't really need to, and eating something that isn't good anyway that leads to the most weight gain. You can take care of one of these problems by simply only having healthy organic foods available in your home. This takes a bit of care when you are shopping, and you may need to change your diet a bit to find the healthy foods that you really enjoy, but once you've cleared your fridge and pantry of the junk you'll find that it's a lot easier to eat healthy. Even when you're bored it won't be a big deal to pick up an apple, orange or handful of nuts, and you won't regret the decision. Snack on healthy foods if you really have to At the end of the day, you do need to snack regularly to keep your metabolism going and it isn't always a bad thing. Snacking only becomes a problem when it occurs way too often, or when you actually gain weight as a result of it. The key to avoiding weight gain is to snack on something that is actually good for you. If you feeling a craving, drink water and if you find that you're still hungry, go ahead and eat a healthy snack. Eating healthy foods like fruits and vegetables won't lead to weight gain, even if you eat them when you're bored, so you can satisfy your cravings without having to avoid eating altogether. If you eat healthy foods most of the time and still find that you are gaining weight, you will definitely need to change up your eating habits, but for most people eating healthy whole foods when snacking will help tremendously. About the author Dr. Constance Odom, MD 6 min read
ESSENTIALAI-STEM
ArduDroid: a Simple 2-Way Bluetooth-based Android Controller for Arduino 408,985 417 244 Posted Introduction: ArduDroid: a Simple 2-Way Bluetooth-based Android Controller for Arduino Remote Control Contest Second Prize in the Remote Control Contest UPDATES: REQUIREMENTS • Breadboard wiring and electronics skills. • Arduno Uno. • HC-05 Bluetooth serial module. INTRODUCTION ArduDroid (formerly Andruino) is a simple tool to help you control your Arduino (or clone) from your Android phone. It's both an Android app and an Arduino program. ArduDroid has a simple Android user interface to 1) control Arduino's digital and PWM pins 2) send text commands to Arduino 3) and receive data from Arduino over Bluetooth serial using the ever popular and really cheap (less than $10 from ebay) HC-05 Bluetooth over serial module. This app has been tested and designed for the HC-05 Serial Bluetooth module. Other Bluetooth modules may or may not work. Please see comments section for users who tried other Bluetooth modules with this app. INSTALL FROM GOOGLE PLAY https://play.google.com/store/apps/details?id=com.techbitar.android.Andruino ArduDroid should work with other Bluetooth modules with some tweaking but I have only tested it with the HC-05. This is an alpha version that's running fine on my Samsung Galaxy S2 Plus. Please share your experience running ArduDroid on your phone. Also, while I used Arduino Uno in this prototype, feel free to experiment with other models of Arduino. Please share your experience to help me improve this app. I have published a guide before on building and programming a circuit with the HC-05 Bluetooth module and Arduino but I will briefly describe again in this guide how to wire the circuit using a breadboard and jumper wires. ArduDroid is an app that evolved during one of my development projects. Special thanks to engineer Jafar Quttaineh for testing the app and for his invaluable input. Step 1: How to Use ArduDroid You can use ArduDroid to send commands to Arduino to control a relay to turn electric gadgets on/off, control a robot servo, increase/decrease speed of a motor and reverse direction, dim a light, speed up a fan, and so on.  Furthermore, you can read Arduino pins and sensors then transmit the data back to your android phone. Step 2: ArduDroid Components & Downloads 1) Install ArduDroid from Google Play:    For previous version downlowded from my website, this is the certificate fingerprints: MD5 : BA:80:C2:6A:68:31:8F:21:D6:FC:08:8E:09:D8:F5:CF SHA1: 04:EA:2E:47:80:71:BE:D9:D2:ED:86:5F:15:1F:1E:9E:77:62:DB:85   2) Download the Arduino program: ardudroid.ino (requires Arduino IDE 1.05 or later) HARDWARE • Android device running version 2.3.3 or higher with Bluetooth. • Arduino Uno or clone. • CD4050 level shifter IC  or 2K Ohms & 1K Ohms resistors as voltage dividers. • HC-05 Bluetooth module. Other Bluetooth over serial modules should work with some modifications. • Breadboard & jumper wires. • Power source. Step 3: Wiring the Circuit Please note that while my actual prototype as shown in the video and photo uses the CD4050 IC to level shift from 5V to 3.3V, in the wiring diagram I am using a voltage divider because I believe it will be simpler for most people to acquire the resistors than the IC.  You only need to drop the Arduino's TX voltage to 3.3V to match the RX of the HC-05. The Arduino's RX pin can handle the HC-05 incoming TX signal which is 3.3V. I used 2K and 1K ohms resistors in my circuit diagram to drop 5V to 3.3V but you can use different resistor values. Google "voltage divider calculator" and use the myriad calculators to determine what other resistor values work best for you. Step 4: How to Modify the ArduDroid Companion Program On the Arduino side I have included a skeletal program (ardudroid.ino) that intercepts and processes the ArduDroid commands issued from your Android device.  You can update the Arduino code according to your project needs. ArduDroid is an Android app that sends/receives data from Arduino with the help of an Arduino sketch named ardudroid.ino In this sketch, there are four code blocks supporting the four key functions of ArduDroid. You can modify these code blocks to suit your requirements. The blocks are labeled according to their functions in a comment line at the start of each code block. I inserted a comment "// add your code here" to help you find and place your code, but you can decide how you wish to modify the functional code blocks. Step 5: Control AnalogWrite Pins This is the code block that receives the PWM value from 0 to 255 that you send from Android to control the PWM designated Arduino Uno pins 11,9,10,5,4,3. You can add code to control a motor for a robot or fan, for example, to speed it up or slow it down. Or you can send a command to dim a light.   // 3) GET analogWrite DATA FROM ARDUDROID   if (ard_command == CMD_ANALOGWRITE) {      analogWrite(  pin_num, pin_value );     // add your code here     return;  // Done. return to loop();   } Step 6: Control DigitalWrite Pins This is the code block that receives from Android the pin number and the ON/OFF (HIGH/LOW) value to toggle the corresponding pin.  You can turn a relay on /off to switch an electrical device.  Please note that this code block calls a function set_digitalwrite() which has a Switch/Case structure to give you room to write code to act on each pin separately. // 2) GET digitalWrite DATA FROM ARDUDROID   if (ard_command == CMD_DIGITALWRITE){      if (pin_value == PIN_LOW) pin_value = LOW;     else if (pin_value == PIN_HIGH) pin_value = HIGH;     else return; // error in pin value. return.     set_digitalwrite( pin_num,  pin_value);  // call function to process digital pin#     return;  // return from start of loop()   } // 2a) select the requested pin# for DigitalWrite action void set_digitalwrite(int pin_num, int pin_value) {   switch (pin_num) {   case 13:     pinMode(13, OUTPUT);     digitalWrite(13, pin_value);      // add your code here          break; .  .  . .  .  . .  .  . case 2:    pinMode(2, OUTPUT);     digitalWrite(2, pin_value);     // add your code here           break;          // default:     // if nothing else matches, do the default     // default is optional   } } I have excluded pin 0 and pin 1 because they are used for Arduino Uno serial communication by default. I might enable those two pins in future releases of the app and leave it up to the user to determine which pins will be used for the Arduino serial communications.  Step 7: Send Text/command From Android to Arduino This is the code block that handles the text you type in the field next to Send Data button.  For example, you can send a password to activate/login into a system. Or you can send text to an LCD connected to Arduino to display something. // 1) GET TEXT COMMAND FROM ARDUDROID   if (ard_command == CMD_TEXT){       inText ="";  //clears variable for new input       while (Serial.available())  {       char c = Serial.read();  //gets one byte from serial buffer       delay(5);       if (c == END_CMD_CHAR) { // if we the complete string has been read         // add your code here         break;       }                    else {         if (c !=  DIV_CMD_CHAR) {           inText += c;           delay(5);         }  }  }  } Step 8: Get Text/command From Arduino This code block sends anything you want from Arduino to your Android.  In my sample code below, I send the value of analog pin 0 whenever I press the Get Data button. Since analog pin is not connected to anything in the demo video, I was getting ambient noise values.  Please note that there is no error detection/correction in my code block. If accuracy is critical to your app, make sure you add error detection such as visual markers to enclose the data being sent or a checksum. // 4) SEND DATA TO ARDUDROID   if (ard_command == CMD_READ_ARDUDROID) {     // char send_to_android[] = "Place your text here." ;     // Serial.println(send_to_android);   // Example: Sending text     Serial.print(" Analog 0 = ");     Serial.println(analogRead(A0));  // Example: Read and send Analog pin value to Arduino     return;  // Done. return to loop();   }} Step 9: Things to Consider Alternatives to ArduDroid There are a quite a few solutions to enable Android-Arduino integration. The more expensive and complex ones involve specialized and costly hardware such as Google's ADK, but by far the cheapest and in my opinion the simplest is the Bluetooth integration using the HC-05 transceiver.  I expect WiFi to eventually replace Bluetooth with the help of WiFi Direct (point to point WiFi communications without a router) but his is a couple of years down the road. As for Bluetooth-based solution for Android to Arduino communication, you can find a few approaches to pick from depending on your project needs and the degree of abstraction you are looking for. Some approaches use a terminal app on the Android such as Blueterm to send and receive raw text data from Arduino over Bluetooth SPP.  Others solutions employ a comprehensive library such as Amarino.  My ArduDroid sits in the middle. Notes on support and updates I will do my best to support ArduDroid and I am hoping that those of you who find this tool useful to share your expertise with other users. Please let me know if you run into any bugs or problems running ArduDroid on your device. Kindly note the device model and OS version as well as other useful info.  Please feel free to leave a comment if you have any technical questions. 8 People Made This Project! Recommendations • Microcontroller Contest Microcontroller Contest • Science of Cooking Science of Cooking • Pocket-Sized Contest Pocket-Sized Contest user We have a be nice policy. Please be positive and constructive. Tips Questions 231 Comments Hi I would like to customize the keys and add few things to the app. Could you please share the source code for the app? :) email : gn605@york.ac.uk Dear. I would like to customize the keys and add few things to the app. Can you please share the source code for the app? email :tabu512@yahoo.co.jp Hi! I would like to customize the keys and add few things to the app. Can you please share the source code for the app? email id: anatolii_ice@list.ru Hello, really good work! I am curious about how these work, could you please send me the source code via my email, roboticsatkal@gmail.com Thanks! Could you please send me the source code of the android app my email Id is bhimashankarspatil@gmail.com... thnkz so much... Hi, great job! can I get the source code for the Android App. I need to customize buttons and layout for my purposes. Thank you in advance, my email is: munawar.muteen@gmail.com Hi, it is a great project. I am student and I am planning to use this for my project , Can you please send me the source code so I could customize it ? my emali-id is koppisettiprajnesh@gmail.com Hi, thanks for the great project! would it be possible to port it to Digispark? I only need to control a single PWM channel so an Arduino Uno would be a bit overkill. Hi, great job! can I get the source code for the Android App. I need to customize buttons and layout for my purposes. Thank you in advance, my email is: choijw1024@empas.com! Hi! I would like to customize the keys and add few things to the app. Can you please share the source code for the app? email id: stavirs@gmail.com
ESSENTIALAI-STEM
Walmart cautious on economy, forecasts annual earnings below estimates Adds shares, details on forecast Feb 21 (Reuters) - Walmart Inc WMT.N forecast full-year earnings below estimates on Tuesday, saying it was cautious about the economic outlook for 2023 and that consumers were likely to continue shopping for lower-priced items that could pressure its margins. Shares of the world's largest retailer fell 2.6% to $142.50 in premarket trading. Walmart, which operates more than 5,000 stores in the United States, has been using its market power to negotiate better prices from its suppliers and ward off competition from rivals such as Target Corp TGT.N, whose shelves are relatively pricier. However, lower prices and discounts, along with weak consumer sentiment and Walmart's decision to increase employee wages, are expected to take a toll on its margins this year. "There's still a lot of trepidation and uncertainty with the economic outlook. Balance sheets are continuing to get thinner, savings rate is roughly half of what it was at a pre-pandemic level and we've not been in a situation like this where the Fed is raising at the rate that it does," Chief Financial Officer John David Rainey told Reuters. "So, that makes us cautious on the economic outlook because we simply don't know what we don't know." Walmart forecast fiscal 2024 earnings of $5.90 to $6.05 per share, compared with analysts' estimates of $6.50 per share, according to Refinitiv IBES data. The consolidated gross profit rate declined 83 basis points in the holiday quarter, primarily due to markdowns and sales of lower-margin products, the company said. There is also no guarantee that Walmart will be able to keep prices lower enough to spur demand, with a number of its biggest suppliers, including NestleNESN.S,Coca-Cola Co KO.N, Procter & GamblePG.N and UnileverULVR.L, disclosing in recent weeks that they are planning for more price hikes this year. In contrast, Kraft Heinz KHC.O and PepsiCo PEP.Oplan to pause further price hikes to counteract declining volumes, but their prices are still substantially elevated compared to a year earlier. Rainey said a consumer shift toward buying more food and consumables from general merchandise is expected to be a drag on margins this year. Still, Walmart reported strong demand in the quarter ended Jan. 31, posting total revenue of $164.05 billion, a 7.3% increase from last year. Analysts had estimated revenues of $159.76 billion. The company's quarterly attributable net income rose 76.2% to $6.28 billion, helped by unrealized gains in equity and other investments. (Reporting by Uday Sampath in Bengaluru and Siddharth Cavale and Arriana McLymore in New York; Editing by Anil D'Silva) ((UdaySampath.Kumar@thomsonreuters.com; Twitter: https://twitter.com/sampath_uday ;)) The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Wikipedia:Miscellany for deletion/User:Katielaurenmalone The result of the discussion was The page has been suppressed with deletion, based on the ArbCom motion on self-disclosure by minors and COPA. Keegan (talk) 08:35, 13 November 2009 (UTC) User:Katielaurenmalone Deletion per WP:NOT as a personal web page. Jeffrey Mall (talk • contribs) - 02:52, 13 November 2009 (UTC) * Could probably be speedied, the user's only contribs were vandalism. If not deleted it at least needs to be oversighted. Equazcion (talk) 03:08, 13 Nov 2009 (UTC) * Indeed, depending on the outcome of this MfD, I will request suppression. Jeffrey Mall (talk • contribs) - 03:16, 13 November 2009 (UTC) * Delete I don't think any of the criteria for speedy deletion apply here. However, I do think this is an inappropriate use of a Wikipedia userpage under the WP:UP guideline. Specifically, this page may violate #5 ("personal information of other persons without their consent") and definitely violates #8 ("other non-encyclopedia related material"). Oversight may be appropriate if this page manages to escape deletion. A Stop at Willoughby (talk) 05:20, 13 November 2009 (UTC) * Blank unrelated messages. Speedy deletion of a userpage is not justifiable by a few test edits. The information on the userpage does not look like a serious privacy concern; worrying about it in the absence of a complaint from an involved person is not necessary. Deletion is not necessary. I have welcomed the newcomer, and hope that she my find interesting ways to contribute productively to the project. If she subsequently wants to stop contributing under her real name, there are easy options available --SmokeyJoe (talk) 05:57, 13 November 2009 (UTC) * I've emailed SmokeyJoe regarding the oversight issue. I'd advise care in making public postings regarding that. Equazcion (talk) 06:20, 13 Nov 2009 (UTC) * I don’t think calling for oversight for every revelation of a child’s name, age and location is to be taken seriously. If you disagree, consider birth notices, children’s academic ceremonies and sporting awards, etc. However, if you really think there is a need for oversight, go to Requests for oversight and do not even post here. By posting the character string “oversight” at MfD, you flag the private information which can be easily recovered from caches, mirrors and archives. --SmokeyJoe (talk) 08:18, 13 November 2009 (UTC) * There are more stringent practices regarding protection of minors on Wikipedia than in other forums, and the general existence of a similar type of information elsewhere has never stopped us from oversighting in similar cases. Nevertheless you're right about requesting oversight now rather than mentioning it here and waiting til the MfD closes. Equazcion (talk) 08:23, 13 Nov 2009 (UTC)
WIKI
Wikipedia:Articles for deletion/Yilin zhong The result was Keep. There is only one real argument for deleting here which is a failure to meet WP:GNG and since sources have been added there is consensus that she satisfies this guideline. Michig (talk) 08:47, 21 March 2015 (UTC) Yilin Zhong AfDs for this article: * – ( View AfD View log Stats ) Not sure if she passes WP:BIO, article has a promotional tone, and is difficult to understand. EoRdE6(Come Talk to Me!) 19:59, 26 February 2015 (UTC) * Note: This debate has been included in the list of People-related deletion discussions. EoRdE6(Come Talk to Me!) 19:59, 26 February 2015 (UTC) * Note: This debate has been included in the list of Authors-related deletion discussions. EoRdE6(Come Talk to Me!) 20:00, 26 February 2015 (UTC) * Note: This debate has been included in the list of China-related deletion discussions. EoRdE6(Come Talk to Me!) 20:00, 26 February 2015 (UTC) * delete. Also unconvinced she is notable. Needs more than lots of Amazon page ranks which can be temporary and generally are unverifiable. Could just be the lack of English language coverage though, there seems a lot more in Chinese which I’m ill equipped to evaluate.-- JohnBlackburne wordsdeeds 20:27, 26 February 2015 (UTC) * Sigh, I tried to convince the author to use AfC, but I guess they ignored that advice and moved it back to mainspace... The article was speedy deleted at Yilin Zhong previously, but I feel the AfD should run its course now. The article, while promotional, really doesn't rise to the G11 level. No comment on notability at this time. --ThaddeusB (talk) 22:03, 26 February 2015 (UTC) - As I talked to ThaddeusB I am totally confused here. I am not a wiki person and really cannot understand what you guys are talking about. As I said, if any parts of this article is wrong, please just delete them or revise it. I have no idea how to meet your requirements so please just change it as you like. Thank you all. — Preceding unsigned comment added by Emptynow (talk • contribs) 00:31, 27 February 2015 (UTC) * Note: This debate has been included in the list of United Kingdom-related deletion discussions. • Gene93k (talk) 01:57, 27 February 2015 (UTC) * Delete Fails WP:BASIC and WP:CREATIVE. I couldn't find significant coverage in Chinese sources. These two sources in the article were written by her, not about her.--Antigng (talk) 02:25, 27 February 2015 (UTC) - Hi Antigng, thanks for your search effort. the first search was with the traditional Chinese words and this language was not used in mainland China so there is nothing by that search. But it looks like that if someone published 10 books but cannot find an interview online, then he is not existed on wiki. e.g. the CCTV (China's Central TV Station) interview for her first book was broadcasting in 1996 when China has no internet yet, so we cannot find it by google at all. So were those books published before 2000 when Amazon launched in China and then there was no source online as well. I don't know what to say now. Emptynow (talk) 11:26, 27 February 2015 (UTC) -Ok, you guys pushed me spending five hours today to find those very limited online sources from 2000 in Chinese website. Done. and exhausted. I think this is the end of my contribution to this article no matter what happens next. Thank you guys. Good night. Emptynow (talk) 02:27, 28 February 2015 (UTC) Relisted to generate a more thorough discussion so a clearer consensus may be reached. * Delete: Fails the GNG, pure and simple--- whether sources might exist doesn't matter, it's whether it's provable that they do. I recommend to Emptynow that if he doesn't know what Wikipedia requires for creating an article, reviewing the links at WP:PILLAR is a good way to start. Nha Trang Allons! 20:27, 27 February 2015 (UTC) * Keep - the recently added Chinese language sources appear to be sufficient to establish notability. --ThaddeusB (talk) 16:39, 3 March 2015 (UTC) Please add new comments below this notice. Thanks, &mdash; Coffee // have a cup // beans // 00:17, 6 March 2015 (UTC) Relisted to generate a more thorough discussion so a clearer consensus may be reached. * Keep - seems to have significant refs .. unless can be proved to be self-promotional should keep. May be more notable in the Chinese community but still notable. --Len (talk) 11 March 2015 (UTC) Please add new comments below this notice. Thanks, &mdash; Coffee // have a cup // beans // 01:09, 14 March 2015 (UTC) * Change to keep. Some of these sources meet our standard. Antigng (talk) 05:30, 14 March 2015 (UTC)
WIKI
Antono (name) Antono is an Esperanto masculine given name that is a form of Anthony, as well as a surname. Notable people with this name include the following: Given name * Antono Refa, fictional character from Babylon 5, played by William Forward Surname * Amat Antono (born 1958), Indonesian politician * Ian Antono (born Jauw Hian Ling, 1950), Indonesian guitarist and songwriter
WIKI
How To Reset Netgear WiFi Extender In the event of a factory reset, all personalized settings, such as your user name, password, network name (SSID), and security settings, are erased. When you are unable to recover the administrator password for your WiFi range extender, a factory reset is required. It is necessary to factory reset your device in order to begin a new installation. To carry out a factory reset on your NETGEAR WiFi extender, follow these steps: • Connect your extension to the wall. • If the Power LED does not illuminate, press and hold the Power or On/Off button for a few seconds. • The high-intensity LED lights. • Wait for the LEDs on your extender to reach a stable state before proceeding. • Take a few minutes to complete this task. • Find the Reset or Factory Reset button on your extension and press it. • The button is often positioned on the side or bottom panel of the extender, hidden behind a tiny hole. • Press and hold the Reset or Factory Reset button with a straightened paper clip or other similarly sized item until the Power LED blinks, then release the button. • This can take up to ten seconds to complete. • Wait for the LEDs on your extender to reach a stable state before proceeding. • Take a few minutes to complete this task. Your extender has been reset and is now ready to be configured. Leave A Reply Your email address will not be published. en_USEnglish
ESSENTIALAI-STEM
ContextUtil ContextUtil ContextUtil ContextUtil Class Определение Получает сведения о контексте объекта COM+.Obtains information about the COM+ object context. Этот класс не наследуется.This class cannot be inherited. public ref class ContextUtil sealed public sealed class ContextUtil type ContextUtil = class Public NotInheritable Class ContextUtil Наследование ContextUtilContextUtilContextUtilContextUtil Примеры В следующем примере кода показано, как использовать ContextUtil для создания ServicedComponentтранзакционного.The following code example demonstrates how to use ContextUtil to create a transactional ServicedComponent. [assembly:System::Reflection::AssemblyKeyFile("Transaction.snk")]; [Transaction] public ref class TransactionalComponent: public ServicedComponent { public: void TransactionalMethod( String^ data ) { ContextUtil::DeactivateOnReturn = true; ContextUtil::MyTransactionVote = TransactionVote::Abort; // do work with data ContextUtil::MyTransactionVote = TransactionVote::Commit; } }; [Transaction] public class TransactionalComponent : ServicedComponent { public void TransactionalMethod (string data) { ContextUtil.DeactivateOnReturn = true; ContextUtil.MyTransactionVote = TransactionVote.Abort; // Do work with data. Return if any errors occur. // Vote to commit. If any errors occur, this code will not execute. ContextUtil.MyTransactionVote = TransactionVote.Commit; } } <Transaction()> _ Public Class TransactionalComponent Inherits ServicedComponent Public Sub TransactionalMethod(ByVal data As String) ContextUtil.DeactivateOnReturn = True ContextUtil.MyTransactionVote = TransactionVote.Abort ' Do work with data. Return if any errors occur. ' Vote to commit. If any errors occur, this code will not execute. ContextUtil.MyTransactionVote = TransactionVote.Commit End Sub 'TransactionalMethod End Class 'TransactionalComponent Комментарии ContextUtil— предпочтительный класс, используемый для получения контекстной информации COM+.ContextUtil is the preferred class to use for obtaining COM+ context information. Поскольку все static члены этого класса (shared в Visual Basic), не обязательно создавать его, прежде чем использовать их.Because the members of this class are all static (shared in Visual Basic), it is not necessary to instantiate it before using them. Свойства ActivityId ActivityId ActivityId ActivityId Возвращает идентификатор GUID, который представляет действие, содержащее компонент.Gets a GUID representing the activity containing the component. ApplicationId ApplicationId ApplicationId ApplicationId Возвращает идентификатор GUID для текущего приложения.Gets a GUID for the current application. ApplicationInstanceId ApplicationInstanceId ApplicationInstanceId ApplicationInstanceId Возвращает идентификатор GUID для текущего экземпляра приложения.Gets a GUID for the current application instance. ContextId ContextId ContextId ContextId Возвращает идентификатор GUID для текущего контекста.Gets a GUID for the current context. DeactivateOnReturn DeactivateOnReturn DeactivateOnReturn DeactivateOnReturn Получает или задает бит done в контексте объекта COM+.Gets or sets the done bit in the COM+ context. IsInTransaction IsInTransaction IsInTransaction IsInTransaction Возвращает значение, показывающее, является ли текущий контекст транзакционным.Gets a value that indicates whether the current context is transactional. IsSecurityEnabled IsSecurityEnabled IsSecurityEnabled IsSecurityEnabled Возвращает значение, показывающее, включена ли безопасность на основе ролей в текущем контексте.Gets a value that indicates whether role-based security is active in the current context. MyTransactionVote MyTransactionVote MyTransactionVote MyTransactionVote Получает или задает бит consistent в контексте объекта COM+.Gets or sets the consistent bit in the COM+ context. PartitionId PartitionId PartitionId PartitionId Возвращает идентификатор GUID текущего раздела.Gets a GUID for the current partition. SystemTransaction SystemTransaction SystemTransaction SystemTransaction Возвращает текущий контекст транзакции.Gets the current transaction context. Transaction Transaction Transaction Transaction Возвращает объект, описывающий текущую транзакцию DTC COM+.Gets an object describing the current COM+ DTC transaction. TransactionId TransactionId TransactionId TransactionId Возвращает идентификатор GUID текущей транзакции DTC COM+.Gets the GUID of the current COM+ DTC transaction. Методы DisableCommit() DisableCommit() DisableCommit() DisableCommit() Устанавливает для битов consistent и done значение false в контексте COM+.Sets both the consistent bit and the done bit to false in the COM+ context. EnableCommit() EnableCommit() EnableCommit() EnableCommit() Устанавливает в контексте COM+ для бита consistent значение true, а для бита done значение false.Sets the consistent bit to true and the done bit to false in the COM+ context. Equals(Object) Equals(Object) Equals(Object) Equals(Object) Определяет, равен ли заданный объект текущему объекту.Determines whether the specified object is equal to the current object. (Inherited from Object) GetHashCode() GetHashCode() GetHashCode() GetHashCode() Служит хэш-функцией по умолчанию.Serves as the default hash function. (Inherited from Object) GetNamedProperty(String) GetNamedProperty(String) GetNamedProperty(String) GetNamedProperty(String) Возвращает именованное свойство из контекста COM+.Returns a named property from the COM+ context. GetType() GetType() GetType() GetType() Возвращает объект Type для текущего экземпляра.Gets the Type of the current instance. (Inherited from Object) IsCallerInRole(String) IsCallerInRole(String) IsCallerInRole(String) IsCallerInRole(String) Определяет, имеет ли вызывающий объект указанную роль.Determines whether the caller is in the specified role. IsDefaultContext() IsDefaultContext() IsDefaultContext() IsDefaultContext() Определяет, активирован ли обслуживаемый компонент в контексте по умолчанию.Determines whether the serviced component is activated in the default context. Обслуживаемые компоненты, в которых отсутствует информация каталога COM+, активируются в контексте по умолчанию.Serviced components that do not have COM+ catalog information are activated in the default context. MemberwiseClone() MemberwiseClone() MemberwiseClone() MemberwiseClone() Создает неполную копию текущего объекта Object.Creates a shallow copy of the current Object. (Inherited from Object) SetAbort() SetAbort() SetAbort() SetAbort() Устанавливает в контексте COM+ для бита consistent значение false, а для бита done значение true.Sets the consistent bit to false and the done bit to true in the COM+ context. SetComplete() SetComplete() SetComplete() SetComplete() Устанавливает в контексте COM+ для бита consistent и для бита done значение true.Sets the consistent bit and the done bit to true in the COM+ context. SetNamedProperty(String, Object) SetNamedProperty(String, Object) SetNamedProperty(String, Object) SetNamedProperty(String, Object) Задает именованное свойство для контекста COM+.Sets the named property for the COM+ context. ToString() ToString() ToString() ToString() Возвращает строку, представляющую текущий объект.Returns a string that represents the current object. (Inherited from Object) Применяется к
ESSENTIALAI-STEM
User:Nzscottie New Zealand citizen who likes to read wiki sites and clink on the links. Adding the links I know that hopefully will be interesting and helpful to those researching.
WIKI
Are You Facing Digital Strain, Possibility of Dry Eyes... ? - By Dr.VidyaBawkar [ Lasik/ Cornea & Cataract Surgeon ] & Dr.Prachi Naik [ Comprehensive Ophthalmalogist & Cataract Surgeon ] - Diana Annie [BBA,PGD in Aviation(AUH) & Health Awareness Programmer] Dry Eyes is not a specific disease in its own right. It's a symptom that may be related to a variety of underlying diseases, disorders, or lifestyle challenges. It occurs when your eyes aren't sufficiently hydrated & lubricated by the tears you produce. Why My Tears Not Produced Much? People typically produce fewer tears as they age, commonly resulting in dry eye. Other causes may include medications or medical conditions that dry out. Some contact lenses can worsen dry eye. Am Having Watery Eyes, So Why Do I Get Dry Eye? The tear film that covers your eye surfaces must contain the proper three-layer structure of mucous, water & oil. If the oil-producing glands in your eyelids aren't functioning correctly, you may not be adding enough oil to your tear film to keep all that water from evaporating, no matter how many tears you produce. What Signs Does Dry Eye Produce? Dry eye typically makes the eyes red, itchy, tired, and irritated, as if there's something in your eyes. You may also experience light sensitivity & blurred vision. Is Dry Eye Dangerous? Dry eye is not an emergency condition. But if you let your dry eye continue on a severe basis, you're exposing your corneas to damage, infection & scarring. How Does An Eye Consultant Find the Cause of Your Dry Eye? They will examine your symptoms, eliminating other possible causes to help confirm a case of dry eye. We will also study your medical history, lifestyle, current medication list, tear production to understand the cause of your dry eye. How Is Dry Eye Treated? Eye drops are commonly used to age-related dryness,in Computer uses. Environmental & work changes, changes in your medical care or contact lens usage, & Treatment of the eyelid glands may also be prescribed.hot fomentation and lid Massage is very important to improve dry eye symptoms.
ESSENTIALAI-STEM
Bedford bus station Bedford bus station serves the town of Bedford, Bedfordshire, England. The bus station is part owned by the Stagecoach in Bedford and Bedford Borough Council and is situated in the town centre on All Hallows just off Greyfriars. The main operator at Bedford bus station is Stagecoach in Bedford. Other operators include Stagecoach in Northants, Grant Palmer, Cedar Coaches, Flittabus and Ivel Sprinter. History The bus station and adjacent multi storey car park were originally constructed in the 1960s. In 2012, plans were launched to redevelop the Bedford bus station as part of the Town Centre's renovation plan. In June 2013, plans to rebuild the bus station were approved by the local council. The rebuilt bus station opened in March 2015. Services Bus services run from the bus station around the town. Services go as far afield as Kettering, Northampton, Milton Keynes, Oxford, Luton, Hitchin, Sandy, Biggleswade and Cambridge. National Express services also call at the bus station. (Services 305 Southend-Liverpool, 314 Cambridge-Birmingham/Southport and 326 Newcastle-Cambridge) Stagecoach X5
WIKI
Lawmaker renews national debate over lowering voting age | TheHill Rep. Ayanna PressleyAyanna PressleyScaramucci calls on GOP to save country from Trump 'depredations' Pro-Trump Republican immigrant to challenge Dem lawmaker who flipped Michigan seat Joseph Kennedy mulling primary challenge to Markey in Massachusetts MORE (D-Mass.) sparked a fresh debate over whether younger teenagers are old enough to vote in federal elections when she introduced an amendment that would lower the voting age from 18 to 16. While the amendment failed to pass the House in a 126-305 vote last week, the debate continues.  Many conservatives, for example, oppose the idea as "radical." They include Boston talk radio host and political commentator Jeff Kuhner, who on Saturday challenged Pressley to come on his show “Kuhner Report” to debate the issue. "Why stop at 16? Why not 15? Or 14? Or 13? This is simply more liberal insanity," Kuhner tweeted. Joe Walsh, the former GOP congressman and host of "The Joe Walsh Show" on radio, argued that 15 year olds "have no skin in the game." "Respectfully, a 5 year old's future is at stake every election too, but we don't let 5 year olds vote," he tweeted on the same day. Respectfully, a 5 year old's future is at stake every election too, but we don't let 5 year olds vote.A 16 year old doesn't know enough yet to vote. They haven't lived enough yet to vote. They're too young. https://t.co/k2Yhl1DUsi Former Arkansas Gov. Mike Huckabee (R) also weighed in: "Liberals don't think kids know what gender they are, but are smart enough to vote. It's a brave new world!" Massachusetts Democratic Rep. Ayanna Pressley just introduced a bill to lower the voting age to 16. Liberals don't think kids know what gender they are, but are smart enough to vote. It's a brave new world! Pressley and her supporters, however, counter that modern young people have earned a vote. "The #youth of this nation are the foot soldiers of the movement, expending sweat equity at the forefront of our most existential crises. They deserve the right to be ballot casters," Pressley tweeted over the weekend. The #youth of this nation are the foot soldiers of the movement, expending sweat equity at the forefront of our most existential crises. They deserve the right to be ballot casters. #16toVote → https://t.co/x87Sw0Zqtr pic.twitter.com/WJhzuvh2Za About half of House Democrats voting for Pressley's amendment, while almost every House Republican voted against it.  "Those who pay taxes should have a voice in our democracy. As a teen, I worked & paid taxes. This week I voted for an amdt that would give young adults the right to vote - it failed by a wide margin. I support policies that encourage work & this could be part of the conversation," tweeted Rep. Michael BurgessMichael Clifton BurgessHouse approves bill raising minimum wage to per hour The 27 Republicans who voted with Democrats to block Trump from taking military action against Iran GOP rep: Children are free to leave migrant camps at 'any time' MORE (R-Texas), the lone Republican who voted for the amendment. Those who pay taxes should have a voice in our democracy. As a teen, I worked & paid taxes. This week I voted for an amdt that would give young adults the right to vote - it failed by a wide margin. I support policies that encourage work & this could be part of the conversation. An op-ed in The New York Times by child development expert Laurence Steinberg that earned wide attention argued that the student movement launched after the school shooting in Parkland, Fla., last year proved young people are ready to vote. Writer Noah Berlatsky in a supportive op-ed for CNN on Saturday argued that young people are leading political movements now by rallying for gun control and confronting senators over climate change legislation. But RealClearPolitics co-founder Tom Bevan in a trending response on Sunday dismissed the first lines of the op-ed as "the opening line of an Onion piece." Could be the opening line of an Onion piece: "My son follows the news closely; he watches John Oliver every week."https://t.co/UwuFXth86S The Constitution does not prohibit states from setting a lower voting age, and some cities have considered or adopted legislation to lower the minimum voting age. Many states allow 16-year-olds to preregister to vote. Oregon is currently considering lowering the state's minimum voting age from 18 to 16, according to CNN. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Page:Notes and Queries - Series 11 - Volume 9.djvu/305 ii s. ix. APRIL is, ion.] NOTES AND QUERIES. 301 LONDON, SATURDAY, APRIL 18, CONTENTS. No. 225. NOTES : The Widener-Stevenson Collection, 301 Webster and the ' N.E.D.,' 302 A Wolfe Dispatch Great Fire of London : Contemporary Letter, 304 " Plowden " ' N & Q.' in Fiction Phil May and his Biographers Allsop Place Samuel Annesley, 305 King's College Hospital" T. K." Identified, 306. QUERIES : " Stackfreed " Bothwell, 306-John Swinfen Gale Families Shaftesbury's ' Judgment of Hercules ' Briefs Authors Wanted Biographical Information Wanted, 307 Battledore and Shuttlecock : Technical Terms Antedated Patent of Nobility " Cor vicer," an Old Trade Brian Duppa, Bishop of Winchester" An honest man and a good bowler " Wilkinson's Iron Chapel Sir Nathaniel Mead, 308 Kendrick of Beading " Burganes "An Opera Pass" Kemendyne," 309. REPLIES : Uncollected Kipling Items, 309 Fox of Strad- broke, 310 Milo as Surname Push-Plough, 311 Leyson Family St. Pancras Bibliography History of Glass-making, 312 W. Ive ' Montalbert,' Old Novel " Rucksack '" or " Rucksack " Pallavicini : Jaszber^nyi Lieut. -Col. James MacPherson " MacFarlan's geese" Altars, 314 Jeremiah Horrocks Authors of Quota- tions Wanted Magistrates wearing Hats, 315 Rhubarb Communion Table by Grinling Gibbons Human Fat as a Medicine Barbers and Yellow' Napoleon dans 1'Autre Monde,' 316 The Taylor Sisters Law Maxim- Harwich and George I. A " Quarrel d'Olman "Parishes in Two Counties Fee- Farm Rents, 317 Sir John Dyn- ham, 318. NOTES ON BOOKS: 'Dedications' Marlowe's 'Ed- ward II.'' The Divine Right of Kings ' ' Book-Prices Current ' " Bohn's Popular Library " ' The Antiquary.' OBITUARY : Edward Marston. Notices to Correspondents. JEUrfcs* THE WIDENER-STEVENSON COLLECTION. OF the many valuable lives that were lost in the Titanic a couple of years ago. not one showed greater promise of distinction than that of Harry Elkins Widener. Dying at the early age" of 27, he left behind him a reputation hardly second to that of the most renowned of book - collectors and biblio- graphers. Mr. Widener belonged to a wealthy family, and the difficulties that beset the humbler class of collectors were, perhaps, hardly known to him. But it is one thing to buy books, and another thing to know them, and the extent of Mr. Widener's knowledge may be gauged from the sumptuous catalogue of the more important books and manuscripts in his collection of which he printed 102 copies in 1910 for private distribution. For the very accurate bibliographical descriptions of the books included in this catalogue Mr. Widener was responsible. On the aims of bibliography, indeed, his views were large, for he'contended that a mere description of a book was not sufficient, but that all the circumstances attendant on its inception, its execution, and its publication should be recorded for the satisfaction of the student. My personal acquaintance with Mr. Widener was but slight, but it was sufficient to enable me to appreciate both his lovable disposition, and the keen enthusiasm which he displayed in following his favourite pursuit. It was astonishing that at so early an age he could have acquired a know- ledge of books that would have done honour to a veteran. Mr. Widener's taste in collecting was eclectic, and a fine Caxton and a precious manuscript of Thackeray were equally wel- come to his shelves. But from his student days at Harvard, the works of Robert Louis Stevenson had always possessed an irre- sistible attraction for him. No modern writer makes such an appeal to youth as Stevenson ; and even in the case of elderly persons, an appreciation of the author of ' Weir of Hermiston ' is always an indication of freshness of mind. From an early age, therefore, Mr. Widener had begun to collect first editions of this writer, whose works became his inseparable companions. In the course of a few years he had secured the finest collection of " Stevensons " in existence, and at the time of his lamented death in April, 1912, there were very few gaps to be filled up in this department of his library. It was almost a necessity that a biblio- graphical catalogue should be made of this collection, and the work has been carried out in the most efficient manner by Mr. A. S. W. Rosenbach, of Philadelphia, who has produced a volume which ranks in every way amongst the choicest monuments of bibliography. In outward form it is a magnificent quarto of 266 pages, and it contains over ninety facsimiles of title- pages and manuscripts. One hundred and fifty copies have been printed at the charge of Mrs. George D. Widener as a memorial of her son. The collection contains every printed work of Stevenson, with one or two slight exceptions, but its most attractive features are three in number. Of these the first is the trial, or proof, edition of ' Penny Whistles ' (afterwards known as ' A Child's Garden of Verses '), of which only one other copy is in existence. Nine poems are printed in this
WIKI
User:KaivalGyan1 Kaival Gyan Mandir is located in Carol Stream Illinois. This temple is the first of the Sat Kaival religion to go out of India. In this temple the teachings of Kaival Karta, Paramguru, Saints, and other gods are taught. With a Youth Group developing with the temple; this temple is a must see place. In 2007 this temple was first opened with the blessings of P.P. Shree Avichaldasji Maharaj and has been becoming a part of society step by step. To learn more about this temple visit www.kaival.org સત કૈવલ સાહેબ
WIKI
Uganda’s Shilling Weakens for Second Day on Dollar Demand by Oil Importers Uganda ’s shilling weakened for a second day against the dollar amid demand for the U.S. currency by domestic importers of oil and energy equipment. The currency of East Africa’s second-biggest coffee producer weakened 1 percent to 2,600 per dollar at 11.55 a.m. in the capital, Kampala. It closed at 2,575 yesterday. “There is basically corporate demand for the dollar arising from the energy sector, both oil importers and of importers of equipments like generators,” Benon Okwenje, a currency trader at Stanbic Bank Uganda Ltd. (SBU) , said by phone from Kampala. Uganda, East Africa’s third-biggest economy, has faced electricity shortages since July 5 after independent generators who sell to the state-run Uganda Electricity Transmission Company cut off supplies to the national grid over accumulated debts, according to Umeme Ltd., the power distributor. Power deficits forced companies to buy generators as well as oil to fire them, Okwenje said. Uganda’s currency is the world’s third-worst performer this year, after Suriname’s dollar and the Maldives rufiyaa, according to Bloomberg Data. The currency has weakened as inflation accelerated to a 17-year-high of 16 percent in May, before slowing to 15.8 percent last month. To contact the reporter on this story: Fred Ojambo in Kampala via Nairobi at pmrichardson@bloomberg.net . To contact the editor responsible for this story: Paul Richardson at pmrichardson@bloomberg.net .
NEWS-MULTISOURCE
Los Valdecolmenas Los Valdecolmenas is a municipality located in the province of Cuenca, Castile-La Mancha, Spain. According to the 2004 census (INE), the municipality has a population of 111 inhabitants. The name of Valdecolmenas is a transformation of "Valle de las Colmenas," translated as "Beehive Valley," that was the original. This resulted in extreme curiosity that the town named "Valdecolmenas de Abajo" (Lower Valdecolmenas) found itself to be situated at a higher elevation than the town named "Valdecolmenas de Arriba," (Upper Valdecolmenas). The origin of this unusual name can be traced to the Middle Ages, when the names given were based, apparently, on their position with respect to the major river that runs through the Valley.
WIKI
riisuuntuminen Noun * 1) undressing taking one's clothes off * 1) undressing taking one's clothes off
WIKI
At least two Palestinians killed, 16 Israelis hurt in violence over Trump plan JERUSALEM/RAMALLAH, West Bank (Reuters) - At least two Palestinians were killed in the occupied West Bank and 16 Israelis were hurt on Thursday in a surge of violence that erupted amid Palestinian anger at a U.S. peace plan. In Jerusalem, an Arab citizen of Israel was killed after he shot and slightly wounded an Israeli paramilitary border policeman at an entrance to the walled Old City, Israeli authorities said, calling the attack politically motivated. The peace proposal announced by U.S. President Donald Trump on Jan. 28 would give Israel most of what it has sought during decades of conflict, including the disputed holy city of Jerusalem and nearly all the occupied land on which it has built settlements. With violence on the rise, the Israeli military said it was sending reinforcements to the West Bank, where Israeli troops in the city of Jenin shot dead a 19-year-old man during clashes. Palestinians said he had thrown rocks at soldiers who came to demolish the home of a Palestinian involved in the 2018 killing of a Jewish settler. In a separate incident in Jenin, a Palestinian officer in the police station was killed by what Palestinian authorities said was Israeli gunfire. Israeli officials did not comment, and Israeli media reported he was shot by troops by mistake. In a scene reminiscent of a wave of Palestinian street attacks in 2015, a car ran down Israeli soldiers on a Jerusalem sidewalk, injuring at least 14 of them, Israeli police said. The assailant fled and was arrested later in the day, the Israeli military said, without immediately identifying the driver. Israel’s YNet news website identified him as a 25-year-old Palestinian. On a road to a Jewish settlement in the West Bank, a suspected Palestinian gunman slightly wounded an Israeli soldier before fleeing, the Israeli military said. Palestinian President Mahmoud Abbas condemned Israel for the deaths, linking them to what Trump has billed as the “deal of the century”. Trump senior adviser Jared Kushner, the face of the U.S. plan, said Abbas bore some responsibility for the surge in violence. “I think he does have responsibility,” Kushner said of Abbas moments after briefing United Nations Security Council ambassadors on the plan’s details. “He calls for days of rage in response and he said that before he even saw the plan.” Kushner added that he met personally with Abbas four times as he was crafting the proposal, but “they chose not to meet with us again.” The Palestinians, who have long shunned the Trump administration, accusing it of bias toward Israel, say the plan falls far short of their demands for a viable independent state and other rights. Israel supports the Trump plan. The Arab League opposes it, while the European Union has rejected parts of it. Visiting Israeli security forces in the West Bank after Thursday’s incidents, Israeli Prime Minister Benjamin Netanyahu also accused Abbas of inciting violence. “We will do everything necessary to protect our security, to define our borders and to ensure our future,” Netanyahu said in a statement. “We will do it with you or without you.” On Wednesday, Israeli troops shot dead a 17-year-old Palestinian elsewhere in the West Bank, saying he had thrown a firebomb at them during a violent protest against Trump’s plan. He was the first fatality since the blueprint was announced. The Israel-Gaza border has also been shaken by several days of violence. Palestinians have launched mortar fire, rockets and balloon-borne explosives into Israel, causing panic but no serious casualties. Israel has carried out nightly air strikes against sites belonging to Gaza’s ruling Hamas Islamists. Reporting by Maayan Lubell Ali Sawafta; Additional reporting by Nidal al-Mughrabi in Gaza, Dan Williams and Dedi Hayun in Jerusalem and Rodrigo Campos at the United Nations; Writing by Maayan Lubell and Peter Graff; Editing by Angus MacSwan, Daniel Wallis and Grant McCool
NEWS-MULTISOURCE
Page:Memoirs of the Geological Survey of Great Britain, Volume 1.djvu/423 410, fossil, Scottish and Irish glacial beds. In the mammaliferous crag at Bramerton. , living. Throughout the European Seas. Note. Fossil in the coralline and red crags. 23. Saxicava rugosa (Mytilus sp.), Linnæus. , Hiatella rugosa, Fleming. Saxicava pholadis of Lamarck; Solen minutus of Linnæus; Hiatella oblonga of Turton; Hiatella arctica of Lamarck, and Mytilus præcisus of Montagu, are all varieties of this protean species. Agina purpurea of Turton appears to me to be a form of the young shell. , fossil. One of the most generally distributed shells in the glacial beds. It occurs in all the Irish, Scotch, and English fossiliferous drifts and glacial clays, including the Bridlington beds and the mammaliferous crag of Thorpe. Abroad it is found in the glacial formations of Scandinavia, Russia, and Canada. , living. In all the seas of Northern and Arctic Europe, Boreal America, and Greenland. It ranges as far south as the Canary Isles, (d'Orbigny). Its vertical range is very great. In the British Seas it is found abundantly in the laminarian and coralline regions. In the Mediterranean I have observed it alive at all depths between twenty and eighty fathoms. ''Note. Saxicava rugosa'' appears in all its forms in the coralline, and afterwards in the red crag. 24. Saxicava sulcata, Smith. , fossil. In the Clyde, Swedish, and Canadian beds. , living. Is not this the Greenland Mga byssifera of Otho Fabricius? It is possibly only a variety of the last. 25. Psammobia feroensis (Tellina sp.), Gmelin. , fossil. In the Lancashire and Irish drift. Always rare. , living. In the beds of Northern and Celtic Europe, frequent Rare in the Mediterranean. Note. Occurs in the coralline crags; also in the Campinian beds of Belgium, according to M. Nyst. 26. Donax trunculus, Linnæus. , fossil. In the Irish beds. In the mammaliferoua crag at Bramerton. , living. Throughout the Celtic and South European Seas, ranging to Senegal (Adamson). Phillippi mentions it among the Red Sea shells collected by Von Hemprich and Ehrenberg. It is always littoral. Note. The earliest appearance of Donax trunculus in the British area dates from the epoch of the Mammaliferous Crag, It is among the species marked by Phillippi as very rare in the Sicilian tertiaries. 27. Tellina crassa. Gmelin. , Tellina obtusa, Sowerby (Min. Conch.). Arcopagia crassa, Browm , fossil. Mammaliferous crag at Portwick. Some fragments from the Irish beds appear to belong to this species.
WIKI
After careful observation, the researchers concluded that it was changing its seּx, which was unheard of in adult reptiles. Hypsilurus boydii are small tree lizards that live in the tropical forests of northern Queensland. The seּx-changed Hypsilurus boydii previously mated with a male and laid eggs, confirming it to be a female. However, it has now stopped producing eggs and has developed male body traits, including the testes. Before that, both children had been in stiff competition for many years, although one was definitely dominant. “The first thing that warned us about a change is that the two started getting close, sitting on the same branch instead of staring at each other at opposite ends,” said SEA LIFE Melbourne Aquarium representative. said. Research has confirmed that a previously female Hypsilurus boydii dragon now has testicles as well as male features such as size and crest thickening. It could be the result of a male’s death or moving to a new housing at the same time. However, subsequent breeders observed that the dominant Hypsilurus boydii began to grow again, having previously reached a typical female weight of about 100 grams. Furthermore, the female crest thickens as well, an important difference can be observed between the male and the female in this species. The process is slow, but the dragon Hypsilurus boydii now reaches 160 grams, the typical male weight. “We did an ultrasound examination to determine which reproductive organs were present. Surprisingly, we found that there were no more ovaries left, instead mature testicles were present. development, “the aquarium representative added. Aquariums in Australia currently do not have the resources to investigate the genetics of dragons to see if they have a dragon with some unusual chromosome or is a wolf-like evolutionary response to the female recognizes herself without a male nearby. They are connecting with scientists on conducting specific tests, but need to consider the ethical implications as this is an animal not a research specimen.
FINEWEB-EDU
Tyre Care: Is it Really Worth the Trouble? If you own a car, there is a fair chance you must have come across a term called “Tyre Care”. Now we all know that regular car maintenance can do wonders but the real question is: it takes time and effort and is it really worth the fuss? Making sure your car performs well on a busy road is a task itself. You always tend to look for repairing major parts attached to your car like the engine, battery , exhaust and fuel tank, which is a clever act. However even if these parts are fit to be driven and you still experience mishaps along your drive such as tyre puncture, then it means you are neglecting proper tyre monitoring. Having said it all, if you really want overall car performance worthwhile then make a habit of monitoring your tyres on a regular basis. Continuing to drive on bad tyres is a hazard and it will adversely affect your car’s performance as well.   Always Avoid driving on Potholes We often tend to roll our tyres on potholes and road debris expecting that it might not damage the tyre quality. However, if you are used to driving at a high speed and you come across a road bump or a pothole then your tyres will be damaged in a bad way ! This can also cause your tyres to burst in some cases leaving you stranded in the middle of nowhere. Hence always avoid driving over potholes and road bumps so that your tyre quality does not suffer.   Correct Wheel Alignment & Tyre Fitting It is very important to note that regularly checking proper wheel alignment is mandatory. As cars having aligned wheels will give you less road trouble then those that are not correctly aligned. If your wheels are not aligned in a symmetry that will cause your car to drift in a wrong direction causing you to lose control over your car. This can be dangerous if you are driving at a higher speed. Hence making sure you have correctly aligned wheels you should take help from a reliable tyre garage near you. Localities in Yorkshire have many places to go to for new tyre replacements. But a good approach is to focus on customer reviews so you have an idea what to expect. Talking about local areas, if you are somewhere in Pontefract, you can make a booking online. One such place to consult forgetting the right type oftyres in Pontefract is from Ossett Tyre House- call them here 1924271081.   Check Tyres for proper pressure Having balanced air pressure in the tyres will help you avoid any underinflation or overinflation of tyres. If your tyres are accidently overinflated , they might burst if encountered with a road bump at a high speed. Hence those who tend to keep themselves safe by pumping extra air pressure need to be careful too! On the other hand less tyre pressure will cause your tyre quality to suffer weakening the tread of the tyre and quality all over. We conclude that having a regular check on the tyres is as important as checking your engine, fuel or even exhausts. Leave a Reply
ESSENTIALAI-STEM
On this day in history, 6th April 1590, Elizabeth I's principal secretary, Sir Francis Walsingham, died at around the age of fifty-eight. Although he had served the queen for many years, he died in debt, as he had underwritten the debts of Sir Philip Sidney, his son-in-law. Walsingham was an incredibly important man during Elizabeth I's reign, being a statesman, private secretary, adviser, diplomat and spymaster, and he probably saved the queen's life many times by uncovering various plots against her. Elizabeth called him her “Moor”. He was born c.1532 (some say 1530) at Scadbury Park, Chislehurst, Kent, and was the son of William Walsingham and Joyce Denny. His father died when he was an infant, and his mother married Sir John Carey, a relation of Mary Boleyn, Anne Boleyn's sister. Walsingham's father was Common Sergeant of London, his mother was related to Sir Anthony Denny, a member of Henry VIII's Privy Council, and his uncle, Sir Edmund, was Lieutenant of the Tower of London. Walsingham studied at King's College, Cambridge, and then, in 1550, he went abroad to continue his education. In 1552, he returned to England and enrolled at Gray's Inn (The Honourable Society of Gray’s Inn, an Inn of Court). When Mary I came to the throne, Walsingham, who was a staunch Protestant, fled abroad and continued his law studies at the University of Padua, and then lived in Switzerland between 1556 and 1558. Elizabeth I's accession to the throne in 1558 meant that Walsingham could return to England. In 1559, his friendship with Sir William Cecil helped him to become a member of Parliament for Banbury, and then for Lyme Regis in 1563. In 1569, Walsingham was asked by William Cecil to investigate the Ridolfi Plot, and in 1570 Elizabeth I asked Walsingham to help the Huguenots in France negotiate with Charles IX, because he had built up a good relationship with them. In the same year, he became the ambassador to France, and it was to his house that Protestant refugees fled during the time of the St Bartholomew's Massacre and other troubles. Walsingham returned to England in 1573, and was rewarded for his hard work by being made the queen's principal secretary, a position he shared with Sir Thomas Smith until 1576 when Smith retired. In 1577, he was rewarded again with a knighthood and was trusted with special embassies in 1578 and 1581 to the Dutch and French courts. In the late 1570s, Walsingham was known for his opposition to the plans to encourage Elizabeth I to marry the Duke of Anjou, and for his encouragement of military intervention in the Low Countries. In the mid to late 1580s, he and William Cecil worked on preparing England for war with Spain. Although Walsingham was an important diplomat and the queen's principal secretary for a time, he is best known as Elizabeth I's spymaster, and for his successful work uncovering plots against the Queen. He worked on uncovering the Ridolfi Plot, and put a stop to the Throckmorton (Throgmorton) and Babington Plots. It was the Babington Plot which convinced Elizabeth I of the need to execute Mary, Queen of Scots, and Walsingham was one of the advisers who encouraged her to take this course of action. (Taken from On This Day in Tudor History by Claire Ridgway) - The Queen's Agent: Francis Walsingham at the Court of Elizabeth I by John Cooper - Elizabeth's Spy Master : Francis Walsingham and the secret war that saved England by Robert Hutchinson - Sir Francis Walsingham: A Courtier in an Age of Terror by Derek Wilson - The Watchers: A Secret History of the Reign of Elizabeth I by Stephen Alford - Her Majesty's Spymaster: Elizabeth I, Sir Francis Walsingham, and the Birth of Modern Espionage by Stephen Budiansky - If you subscribe to Oxford Dictionary of National Biography then you can read Walsingham's biography there at http://www.oxforddnb.com/view/article/28624. It has a very long and detailed list of sources.
FINEWEB-EDU
Caitlind Alexander is the author of over 60 books for children, including the Jamie and Kendall Broderick Mystery series, the 14 Fun Facts and 101 Fun Facts series, the Wonderful World of Animals Series, and the Miss Jones series. She lives in California where she loves to visit historic places and learn about new things. She also loves to travel and has been all over the world. Our Heroes in History series introduces early readers to heroes in American history. Some are well known, such as Ben Franklin. Others are much less known, such as Rebecca Motte. This series is aimed at second graders (ages 6-8). What is a scorpion? Scorpions are small animals that crawl around on the ground. They have big pinchers and a stinging tail. They can be very scary. The smallest scorpions are very tiny. They are less than a half inch (10 mm) long. That is about the size of your smallest fingernail. The biggest scorpions can grow to be over eight inches (21 cm) long. Find out more about this amazing animal. RL 3.6 The Liberty Bell is the iconic symbol of American freedom, but it was actually made for a different purpose. The original wasn't even made in America! Do you know: Where was the original Liberty Bell made? When did it get the name Liberty Bell? How did it get cracked? When was it last rung? Find out. Amaze your family and friends with these fun facts. Ages 8+ RL: 6.9 Cats are small, furry mammals. They have a round body with four legs. They also have a long, thin tail. The tail of a cat can be as long as its body. This book is a shorter version of our popular “Cats: Our Furry Friends" and is for early readers. With 1405 easy to read words, young children can experience for themselves the joy of learning about the cat. Ages 5-8 RL: 1.6 What is a porcupine? Porcupines are small animals that are part of the rodent family. That is the same family that rats and mice are a part of. Porcupines are brown or black. Some look yellowish or reddish. They can also be white. Many porcupines have quills that have black and white stripes. This can help them be seen in the dark.Learn about porcupines in this 15-minute book. Reading level: 3.8 What is a cat? Cats are small, furry mammals. They have a round body with four legs. Most cats weigh between eight and eleven pounds (4 to 5 kg). They are about nine to ten inches (23 to 25 cm) high at the shoulder. They are about 18 to 20 inches (46 to 51 cm) from their nose to the tip of their tail. About 12 inches (30 cm) of this is tail. That means their tail is longer than their body. RL: 3.4 James Monroe sat on the river bank. He had his knees pulled up close. His arms were held tight against his chest to try and keep the cold out. The rain came down in drizzles, but the night kept getting colder. It wasn't just the cold that was a problem. Eighteen year old James was tired and hungry. All the men around him were. They had been fighting for days. They were fighting for freedom. RL: 2 You may have heard about the Pilgrims from the time you were a small child. You may have heard how they sailed to America on a ship called the Mayflower. But how much do you really know about the Mayflower? Here are some fun facts you may not know. Do you know: How long was the Mayflower? Where on the ship did the Pilgrims sleep? Find out more in this fun book. Reading Level: 6.3 In 1812 the British and American armies went to war. They fought over the rights of ships at sea. The war had been going on for two long years when this story takes place. It was September of 1814 in Scituate (say skit-you-ate) Massachusetts. The town was small. Most of the people in the town made their living by fishing. Find out how two girls stop the British Army in this 15-minute book. RL: 2.6 Giant squid are strange looking animals. They are a long tube with a head and arms sticking out the front. They are also big. A giant squid can be 60 feet (18.3 metres) long from its tail to the tip of its longest arms. It can weigh more than 1,000 pounds (454 kg). That is a HUGE animal! Learn what a giant squid looks like, where it lives, what it eats, who are its enemies, and more. RL: 3.4 Life in the early 1800s was very different than it is today. If you had been born in America 200 years ago, you would have had much more work to do, much less free time, fewer toys and clothes, and no internet or even computers! Life was much simpler then, but it was also a lot harder. How much do you know about what life was like back then? Here are some fun facts. Reading Level: 6.3 A monarch butterfly is one of the biggest butterflies in North America. It can be as big as a five-year-old child's hand. It has orange wings with black stripes. There are also tiny white dots around the edge of the wings. This book is a shortened version of our popular “Monarch Butterflies: Magnificent Fliers" and is intended for beginning readers. 1033 easy to read words, Reading Level: 2.2 You may have eaten a turkey. But what do you know about them? Turkeys might surprise you. Let me tell you about them. There are wild turkeys and tame turkeys. They are very different from each other. Wild turkeys look different from tame turkeys. Tame turkeys are brown or white. Let your early reader find out about both wild and tame turkeys in this short 15-minute book. Reading level: 2.1 Earthquakes can be frightening occurrences. Suddenly the ground begins to shake. Things are thrown around and buildings come crashing to the ground. Scientists have studied earthquakes for years and have discovered many things. How much do you know? Amaze your family and friends with these fun facts. Ages 8+. RL: 6.2 A platypus is one of the strangest animals on Earth. There is no other animal like it. It looks like a beaver with a big duck bill on its face. It also has big fat paws. It is covered in soft fur. The fur keeps its skin from getting wet when it swims. With only 1135 easy to read words, young children can experience for themselves the joy of learning about the platypus. RL: 2.1 Icebergs can be fascinating. They are fresh water, floating islands of ice. Some of them are big enough to hold 100 football stadiums, or more. They can be a danger to passing ships and wildlife that gets trapped on them. They drift along with the currents, melting as they make their way toward warmer waters, and their slow death. Find out more about icebergs in this fun 15-minute book. RL: 6.4 Do you know the story of the Pilgrims? You may think the pilgrims came to America for religious freedom. While they were seeking religious freedom, that was only half the story. Here are some fun facts you may not know about the Pilgrim story. Do you know: Did the Pilgrims practice religious freedom? How did they pay for their passage to America? What does the word Pilgrim mean? And more. RL: 5.6 It was July, 1739. Sixteen-year-old Eliza Lucas sat by the fire. Eliza tried to work on her sewing, but it was hard. It was stormy outside. The wind was blowing hard and the rain slapped at the window. Eliza kept thinking about her plants. She was trying to grow indigo plants. If she could succeed, it would change South Carolina forever. Find out how in this 15-minute book. Reading level: 2.8 A hummingbird is a bird. It is a very small bird. Most of them are smaller than your hand. These birds are called hummingbirds because of the sound they make. Their wings beat so fast that it makes a humming sound. Many people like these birds. Let us learn more about them. Many hummingbirds have very bright feathers on their head and neck. These feathers shine in the light. Ages 5-8 Read. Lev:2.1 When 12-year-old Susan Pyle breaks her leg during the New Madrid earthquake, the doctor tells her parents that she cannot be moved. But the whole town is moving. Aftershocks are shaking down buildings, the earth is turning to quicksand, and the waters of the Mississippi River are rising. Her parents make the agonizing decision to leave her behind as they flee. Based on a true story. RL: 2.7 Often considered one of the greatest speeches given by a president, the Gettysburg Address is one of Abraham Lincoln's most well known speeches. Delivered on November 19, 1863, the speech was given at the dedication of the Soldier's National Cemetery in Gettysburg. Learn more about this iconic speech in this 15-minute book. Reading level: 6.5 How does an elephant hatch an egg? They don't sit on them! But without the help of elephants, there would be a lot fewer birds in Africa. Find out how elephants impact their environment, and help birds to hatch eggs. This book is appropriate for early readers, or as a read-aloud book. Ages Pre-K to 8. Reading level: 1.9 Volcanoes have frightened man for thousands of years. Mountains spewing hot fire and ash have rained down destruction on cities, burning buildings and taking lives. But volcanoes are not just a destructive force. They are also a constructive force. They help to form the Earth's crust and create new lands. Named for Vulcan, the Roman god of fire, volcanoes have interested scientists for many years. Owls are birds. They have a round, bird-shaped body with many feathers. They also have two wings. Their wings are very big. Most owls are brown, tan and white. Some are all white or all brown. These colors help the owl blend into nature. This book is a shortened version of our popular “Owls: Silent Hunters of the Night" for beginning readers. Only 1360 easy words teach kids about the owl. RL:1.8 The United States flag is the emblem of our country, symbolizing the beginning of our country. Through the years the flag has changed many times, but its meaning has not. It stands for liberty, justice, freedom and honor. Do you know: Who designed the first flag (It wasn't Betsy Ross)? How many stars and stripes were on the Star Spangled Banner? Where does the name "Old Glory" come from? RL:6.8 "We will knock on your door when we are leaving so you can close up," the man in charge told Dicey. "You may go to bed now." Dicey hated the British. Dicey and her family wanted America to be free. It was 1780 and the Revolutionary war had been going on for four years. Now she had a chance to do something. She could be a spy! Find out what Dicey does in this exciting 15-minute book. RL: 2.5 Parrots come in many colors. They can be green, blue, yellow, red, black, or white. Many of them have three or four colors. There are many kinds of parrots. The smallest ones are as long as your middle finger. They weigh less than two quarters. The biggest ones are as tall as a four year old boy! This book is a shorter version of “Parrots: Birds That Talk" and is for early readers. RL:1.9 The Minutemen were a big part of the Revolutionary War. They got their name because they could be ready to fight in a minute. But men were not the only ones who could fight. Here is the story of how Prudence Wright and her "Minute Women" captured a couple of British during the Revolutionary War. Find out more in this exciting 15-minute book. Reading Level: 2.5 It is used to show location in hundreds of movies and television shows. Showing an image of this one building immediately lets people know that something is happening in London, England. It is the clock tower, often called Big Ben by the people of the world. The tower took 34 years to build from the ashes of the fire that destroyed Parliament in 1834. Find out more in this 15-minute book. RL: 6.5 What is a Monarch Butterfly? A monarch butterfly has five stages of its life. First it is an egg. Then it hatches to become a larva. A larva looks like a tiny worm. The larva grows into a caterpillar. The caterpillar then wraps itself in a green cocoon. When it comes out of the cocoon, it is a butterfly. Find out more about this amazing animal in this 15-minute book. Reading level: 3.9 Ages 7-10 Ellis Island is America's most well-known immigration station. From 1892 to 1954 it processed over 12 million immigrants. Millions more were denied entry and sent back to their homelands. It quickly became known as the Island of Hope, and the Island of Tears. Here are some fun facts about this historic landmark. Amaze your family and friends with these fun facts. Reading Level: 6.9 Anacondas are snakes. They can be very BIG snakes. Like all snakes, they have a long, thin body. They have no feet or legs, and their skin is covered in scales. There are four different types of anacondas. The different kinds are different colors. Green anacondas are the biggest snakes in the world. Help kids learn about the huge anaconda snake in this exciting 15-minute book. Reading level: 3.9 Owls are birds. They have a round, bird-shaped body with feathers. They also have large wings. Their wings are very big for the size of their body. Most owls are brown, tan and white. Some of them are all white or all brown. These colors help the owl blend into nature. Learn what an owl looks like, where it lives, what it eats, who are its enemies, how babies are born, and other fun facts. RL: 2.9 A duck billed platypus is one of the strangest animals on Earth. There is no other animal like it. It looks like a beaver with a big duck bill on its face and big fat paws. A platypus is covered in fur. Their fur is soft. It is also waterproof. It keeps their skin from getting wet when they swim. Find out more about this amazing animal in this 15-minute book. Reading level: 3.4 Ages 7 to 10 It was June 28th, 1778. The Americans were at war with the British. On that day the American army was beside the Delaware River. They were at a place called Monmouth. Mary Hays was there too. Her husband William was a soldier. Most people called Mary "Molly". Find out how Molly helps the soldiers, and how she even acted like a soldier herself in this exciting 15-minute book. Reading level: 2.7 A parrot is a bird. Many parrots are very colorful birds. They can be green, blue, yellow, red, black, and white. Many of them have three or four colors. There are many different kinds of parrots. In fact, if you include all the birds in the parrot family, there are over 390 different kinds of parrots. Have children learn about parrots in this fun 15-minute book. Reading level: 3.1 Arlington Cemetery is one of our nation's most famous cemeteries. It is the final resting place for presidents, soldiers and heroes of our nation. But it was not always so. Arlington Cemetery has a storied past as a historic mansion home with large grounds, a civil war stronghold, and as a freedman's village. How much do you know about this National Cemetery? 14 Fun Facts with more info. RL: 6.9 Annie Oakley went from a life of poverty and abuse, to being one of the most famous women in the world. She made her own way, learning to fire guns like a man and perfecting her sharp shooting. When she joined Buffalo Bill's Wild West Show, her fame spread. Finally she found happiness in both her personal and her professional life. Find out more about this woman who could outshoot any man. RL: 6.3 Francis was nervous. He had a big job ahead of him. He was on a boat in the harbor at Baltimore. Here it was September 13, 1813 and the war of 1812 was still going on. Francis looked out into the harbor. It was filled with British ships. On one of those ships was a prisoner. The man's name was Dr. William Beanes. Find out how this adventure leads to the writing of our national anthem. RL: 2.7 Hummingbirds are very small birds. Most of them are only three to five inches long. These birds are called hummingbirds because of the sound they make. Their wings beat so fast that it makes a humming sound. Many people like these birds. Let us learn more about them. Learn what a hummingbird looks like, where it lives, what it eats, who are its enemies, how babies are born, and fun facts. RL: 3.2 It was October 16, 1780. Hannah Handy was in the field when they came. She had her head down, hoeing the crops. Suddenly her son screamed. He was supposed to be taking care of her infant daughter. Why was he screaming? Hannah looked up. What she saw made her blood run cold. Indians were coming out of her cabin. Find out how Hannah gets her children back, and more kids as well. RL 2.9 David Bushnell sat on the bank of the river. He kept scanning the water for signs of life. At first there was nothing. Then two curved metal pipes rose out of the water. They came toward him slowly. A moment later a large round tube appeared. The top of the tube flipped open. Out popped a young man's head. "I think it's going to work," the man said! Read about America's first submarine. RL: 2.8 Mount Rushmore is one of the largest sculptures in the world. Begun in 1927, the head of four presidents, Washington, Jefferson, Lincoln, and T. Roosevelt were carved into the face of a mountain. Mount Rushmore has become one of the most visited tourist attractions in the United States. It stands today as one of the enduring symbols of America. Here are some fun facts about this monument. RL:6.1 The presidents of the U. S. have served for over 227 years. During that time many things have happened within the office. Do you know: How many presidents were lawyers? What is the most popular first name for presidents? Name all the presidents who have not lived in the White House. How many presidents were wither born or died on July 4th? How many years was there no vice president? RL: 6.1 Margie stood by the river. She had a hard choice to make. A man had come to her mother. He had said that he was there to take Margie home. When he said home, he meant her other family. Margie thought about her other family. She had been born in 1696. Her father was a minister. Her mother kept a pioneer home. They had named her Eunice Williams. Read her story in this 15 minute book. RL: 2.7 "Oh Elizabeth, there is so much to do!" Penny said. "And I am worried. I do hope the other ladies are with us." Penelope Barker was often called Penny. She was at the home of her friend, Elizabeth King. They were there to get ready for a great tea party. And this tea party would be great. Penny hoped that it would help change life in America. Find out what happened in this 15-minute book RL: 2.6 "Are they going to kill us?" little Polly Craig asked. "They will try," Sarah answered. "But our men are strong." "Are they strong enough?" "Yes," Sarah answered with determination. It was August 16th, 1782. Sarah Boone Brooks and Polly Craig were seated in front of a small, one-room cabin in Bryan's Station. Find out how the women and girls saved Bryan Station. Reading level: 2.7 There are many amazing animals on Earth. Some are funny. Some are strange. This book will tell you about 7 fun animals. This is a set of 7 of our popular 15-Minute Books for early readers. It contains the full text and pictures from the following books: "Meet the Elephant", "Meet the Hippo", "Meet the Polar Bear", "Meet the Beaver", "Meet the Bat", "Meet the Spider", "Meet the Raccoon" RL: 2.1 There are many fascinating animals on Earth. Some are funny. Some are strange. This book will tell you about 7 animals. This is a set of seven of our popular 15-Minute Books for early readers. It contains the full text and pictures from the following books: "Meet the Tiger", "Meet the Giraffe", "Meet the Wolf", "Meet the Cougar", "Meet the Badger", "Meet the Reindeer", Meet the Rabbit". RL: 2.1 You have heard of Wilbur and Orville Wright. You know about their owning a bicycle shop. You know about them building and flying the first airplane. But here are some fun facts you may not know. Do you know: Who made the attempt at the first flight and what happened? Was the first flight at Kitty Hawk? Did Wilbur graduate from high school? Who taught Wilbur and Orville about inventing? And more. Florence Nightingale went from being a rich child to the poorest conditions in war. Along the way she saved countless lives, changed the world of health care, created schools and trained countless nurses. She also wrote hundreds of books, and changed the way women and hospital patients were treated. Find out more about this founder of modern nursing in this short 15-minute children's bio. RL: 6.5
FINEWEB-EDU