Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Gargoyle Magazine
Gargoyle Magazine is a literary magazine based in Washington, D.C. It was established in 1976 by Russell Cox, Richard Peabody, and Paul Pasquarella. By 1977, Peabody was the only remaining original editor. He continued running the magazine until 1990 with several different co-editors. Before the magazine ceased publication in 1990, 36 issues had been released. It resurfaced in 1997 with Peabody and Lucinda Ebersole as editors and continues to this day.
Gargoyle is dedicated to printing works by unknown poets and fiction writers, as well as seeking out the overlooked or neglected writers. It is considered an anthology that publishes both local and international authors, the magazine featured poetry, fiction, articles, art, photos, interviews, satire, reviews, long poems, and novel excerpts. The magazine has published work by authors as diverse as Angela Threatt, Joyce Renwick, Julia Slavin, Mary Kay Zuravleff, Ray Bradbury, Kathy Acker, Robert Peters, Radoslav Rochallyi and Nick Cave. Gargoyle has also published authors who have won the Pulitzer Prize, the MacArthur Fellowship, and the National Book Award among other honors. Each contributor receives one issue as compensation for their literary piece. Work from the magazine has been included in The Best American Fantasy, The Best American Non-Required Reading, New Stories from the South, and The Year's Best Fantasy and Horror.
In 1999, the magazine won a $7,500 grant from the London Arts Board.
The magazine's archive is housed in the Special Collections Research Center of the Estelle and Melvin Gelman Library at George Washington University. | WIKI |
User:Delaneylenore
My Sandboxes
User:Delaneylenore/Hours of Margaret of Foix
https://en.wikipedia.org/wiki/User:Delaneylenore/Citation_Assignment?action=edit | WIKI |
Jack Hickey
Jack Hickey may refer to:
* Jack Hickey (rugby) (1887–1950), Australian rugby footballer
* Jack Hickey (Australian rules footballer) (born 1930)
* Jack Hickey (baseball) (1881–1941), Major League Baseball pitcher | WIKI |
Talk:Rick Perry 2012 presidential campaign/Archive 1
Global warming
The current version has the following sentence under "announcement":
* On August 17, 2011, Perry said that he belives that global warming hasn't been caused by humans and if he becomes president he will not support the United States spending money on things to help prevent global warming.
This has nothing to do with his announcement to run for President. It should go in a new section, with more statements describing his political views on various topics. The12thMan (talk) 18:58, 19 August 2011 (UTC)
Reference?
Is there a reference for Rick_Perry_presidential_campaign,_2012 ...
This was removed from Climate change policy of the United States ...
Some potential sources for references ... Rick_Perry ... With related Media coverage of climate change and resulting Public opinion on climate change. <IP_ADDRESS> (talk) 03:33, 27 August 2011 (UTC)
* If it's in the other article, then there is no reason to duplicate it here. It's not about his Campaign - it belongs in the other article with regard to his political positions. Morphh (talk) 19:21, 29 August 2011 (UTC)
Unclear why this was removed ... "Rick Perry suggested global warming is a hoax"
Rick Perry suggested global warming is a hoax (Global Warming Hoax). from CBS News not a blog. <IP_ADDRESS> (talk) 18:53, 29 August 2011 (UTC)
* That content is presented on his article on his opinion for climate change. Also, it's not a statement he made, so you're taking someones words (opinion) and stating it as fact. It's better to present what Perry said, not what others suggest he said. Morphh (talk) 19:08, 29 August 2011 (UTC)
* See Rick_Perry. <IP_ADDRESS> (talk) 22:37, 30 August 2011 (UTC)
Resource regarding independent voters
Rick Perry: a candidate for whom 'unpresidential' is a virtue; Texas governor's stance on economy and global warming may play well with the US right, but it turns off independents by Chris McGreal 19.August.2011 <IP_ADDRESS> (talk) 02:22, 6 September 2011 (UTC)
* The Guardian. <IP_ADDRESS> (talk) 23:28, 6 September 2011 (UTC)
* More As Drought Worsened, Rick Perry Slashed Fire-Fighting Spending by Tim Murphy September 7, 2011 <IP_ADDRESS> (talk) 00:43, 12 September 2011 (UTC)
* Mother Jones <IP_ADDRESS> (talk) 03:59, 12 September 2011 (UTC)
* Also see Rick Perry on global warming and resulting climate change and Talk:Tea Party movement: Get the Energy Sector off the Dole <IP_ADDRESS> (talk) 01:07, 12 September 2011 (UTC)
Not Too Classy of a Quote
"Perry's performances in the GOP debates received generally poor reviews from the media with Brit Hume of Fox News stating that Perry "really did throw up all over himself" in his third debate.[15]"
So that's the quote you're going to choose? Really? If the reviews are "generally" poor as stated, perhaps you could find a more tasteful quote for this trend? Just a thought. Thanks<IP_ADDRESS> (talk) 11:14, 2 October 2011 (UTC)
* Fixed. Veriss (talk) 04:32, 10 October 2011 (UTC)
resource for wife and victimisation accusation
* Anita Perry faults Washington for her son leaving his job by Maggie Haberman October 14 2011 4:48 PM EDT <IP_ADDRESS> (talk) 23:21, 14 October 2011 (UTC)
WSJ resource
Perry to Call for Flat Tax in Economic Plan OCTOBER 19, 2011, 6:58 P.M. ET by JOHN D. MCKINNON <IP_ADDRESS> (talk) 00:01, 20 October 2011 (UTC)
* Flat tax <IP_ADDRESS> (talk) 05:14, 20 October 2011 (UTC)
Rick Perry's tax plan; A flat reception The Economist resource
http://www.economist.com/blogs/democracyinamerica/2011/10/rick-perrys-tax-plan Oct 25th 2011, 19:59 by W.W. <IP_ADDRESS> (talk) 23:58, 26 October 2011 (UTC)
BusinessWeek resource Rick Perry’s Not-Really-All-That-Flat Tax and revenue
The plan would simplify the code but come up far short on revenue October 27, 2011, 5:00 PM EDT by Richard Rubin and Peter Coy Also see Steve Forbes and Dick Armey.
<IP_ADDRESS> (talk) 23:14, 2 November 2011 (UTC)
* See Balanced budget ... <IP_ADDRESS> (talk) 00:21, 4 November 2011 (UTC)
Loss of Momentum
I know the debates have been blamed for Perry's fall off in the polls. I have a theory, which I guess is not of my own thinking along, that the answer to the Texas Dream Act and his staunch backing of it destroy his viability in the Republican primary. Is there any quantitative evidence to back this up? Manofmyth (talk) 01:46, 4 November 2011 (UTC)
Texas air quality resource
From Talk:United States Environmental Protection Agency ... E.P.A. Is Longtime Favorite Target for Perry by John M. Broder and Kate Galbraith in September 29, 2011 NYT, regarding Rick Perry related to the Rick Perry presidential campaign, 2012. <IP_ADDRESS> (talk) 23:56, 6 November 2011 (UTC)
* http://www.nytimes.com/interactive/2011/09/29/us/politics/texas-air-pollution-compared-to-other-states.html?ref=politics Regarding greenhouse gases, Texas has reduced its carbon dioxide emissions, but still releases more than any other state, currently over 600 million tons. Ozone concentrations are down significantly, but the Houston and Dallas areas do not meet federal standards. Texas has focused on reducing its nitrogen oxides emissions, which are a precursor to ozone, during still the highest emitter, at currently over 1.5 million tons.
'Brain freeze'
The last paragraph quotes Perry as saying he suffered a 'brain freeze' during the recent debate. However, that Wikipedia page redirects to Ice-cream headache. It might be original research, but perhaps linking to brain fart would be more appropriate? That seems more like what happened to Perry. Robofish (talk) 18:02, 12 November 2011 (UTC)
* Neither are appropriate for a BLP. Arzel (talk) 02:47, 13 November 2011 (UTC)
* Apparently there's a concerted attempt to suppress this. At this point it's the thing the individual is most noted for, at least currently, but you can't find it in any article related to Perry. This is the one where it should be, if not in Rick Perry itself. Lycurgus (talk) 10:50, 19 November 2011 (UTC)
* This article currently has a paragraph describing the incident and its aftermath. Primogen (talk) 04:21, 26 November 2011 (UTC)
Jon Huntsman, Jr. relationship resource
[http://www.nytimes.com/2011/11/28/us/politics/republican-candidates-share-complicated-relationships.html Friend? Foe? A Republican Scorecard] <IP_ADDRESS> (talk) 07:24, 29 November 2011 (UTC)
"Strong" video
Hey, I noticed someone removed the data about his YouTube video being disliked by over 200,000 people (and FYI, it's over 300,000 400,000 500,000 now). Why? I consider the fact that Perry's video has turned into an internet meme that is one of the five most disliked videos in the history of YouTube to be quite significant, especially since it only took a couple of days. I've even toyed with starting an article on just the video, considering the swift response it's gotten Purpleback pack 89 ≈≈≈≈ 01:41, 9 December 2011 (UTC)
* I agree.--Jkfp2004 (talk) 01:55, 9 December 2011 (UTC)
* Thank you. And for the record, I did a Google search, and rick perry strong youtube (no quotes) gets 2M hits, while Swift Boat Veterans for Truth, an established WP article, gets only 200K. Certainly a case for a greater mention of "Strong" (including its response) in this article, if not for a whole separate article Purpleback pack 89 ≈≈≈≈ 01:59, 9 December 2011 (UTC)
* I see last night, other editors have added the dislike data with reliable sources. Good Purpleback pack 89 ≈≈≈≈ 16:37, 9 December 2011 (UTC)
* There are sources galore for this. I support this move. If you start it, let me know and I will help out --Guerillero | My Talk 23:57, 9 December 2011 (UTC)
Endorsements Section?
What happened to the endorsements section of this article? I'm not familiar with how to work the editing functions of Wikipedia too much, so I can't figure out when i got deleted... Somebody with more expertise should look into this. :) — Preceding unsigned comment added by <IP_ADDRESS> (talk) 04:15, 10 December 2011 (UTC)
* The endorsement section is still there. If it was deleted at one point, it's been restored.--JayJasper (talk) 04:26, 10 December 2011 (UTC)
* To see his endorsements, click "show" on the light blue box in the endorsement section Purpleback pack 89 ≈≈≈≈ 04:32, 10 December 2011 (UTC)
potential resource
Rick Perry's War on Women by Jordan Smith November 30, 2011. This article appeared in the December 19, 2011 edition of The Nation, excerpt ...
<IP_ADDRESS> (talk) 09:54, 12 December 2011 (UTC)
Catholic charities and war on religion
A sentence on Perry's attack on Obama has [been in dispute]. The source clearly states that Perry was referencing the non-renewal of a Catholic charity, which he attributed to religious persecution or a supposed "war on religion". Editors cannot jump the gun here and disregard what Perry was speaking about with statistics of their own, because it runs into POV-pushing. The source cited is already an Op-Ed, and the facts need to be stated to give readers necessary background. I am willing to compromise with a line from the Op-Ed like so:
Perry said the Obama administration has an agenda to "go after" Catholic charities serving victims of human trafficking and that this is an example of Obama's "war on religion", even though Catholic organizations received $1.5 billion from the federal government in the last two years. [Too POV]
--to--
Perry criticized the non-renewal of a grant for a Catholic organization, the U.S. Bishops Council on Migratory and Refugee Services, saying the administration's decision to reduce federal funding was an example of Obama's "war on religion" 'Time magazine argued that Perry's criticisms against Obama were overblown, as Catholic organizations had received $1.5 billion in federal grant monies in the last two years of Obama's administration.' .- Sc r ew ba ll 23 talk 01:32, 13 December 2011 (UTC)
* The attribution of the $1.5 billion counter-argument to Time is fine. The first sentence is inaccurate; Perry did not refer to the non-renewal of a grant, though one can reasonably infer the issue to which he was referring. But Wikipedia reports facts – or sourced reasonable facsimiles thereof – not inferences. "Go after", as indicated by the quotation marks, is a direct quote. I assume there's no objection to "war on religion", since it remains in the proposed change above. I think an accurate compromise phrasing could be:
* In an apparent reference to the non-renewal of a grant for a Catholic organization, the U.S. Bishops Council on Migratory and Refugee Services, Perry said the administration's decision to reduce federal funding was an example of Obama's "war on religion". Time magazine argued that Perry's criticisms against Obama were overblown, as Catholic organizations had received $1.5 billion in federal grant monies in the past two years of Obama's administration.
* Fat&Happy (talk) 02:31, 13 December 2011 (UTC)
* That's fair. I'm glad we were able to reach an agreement here.-- Sc r ew ba ll 23 talk 04:16, 13 December 2011 (UTC)
Rick Perry dropping out of elections?
"As of 1/15/12, Rick Perry announced in a press conference that he is dropping out of the 2012 Presidential Candidacy Race and is endorsing fellow Republican Mitt Romney." --Hmmm....Either needs a source or needs to be removed NOW. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 20:56, 15 January 2012 (UTC) | WIKI |
In outer-space, a “wrinkle in time” sounds intriguing, sexy, and minuscule. But on your face, a wrinkle shows time – an unsolicited declaration of your own life experience on this planet. While these lines can certainly add character, distinction, and credibility; they can also falsely represent your true emotional attributes, allowing others to misperceive your kind self.
There are different types of wrinkles, also known as lines.
Static lines are always there. They are patient and sneaky. They are the end result of their predecessor, dynamic lines. Dynamic lines are a product of a natural process – speaking, thinking, listening, living. Dynamic wrinkles slowly evolve into static wrinkles. However, by intervening in the process that creates wrinkles, we can slow down the aging process. This is an important quality to someone wanting to maintain mystery about their chronological age into their 40s, 50s, and beyond. If you decide at age 65 that you don’t want to have wrinkles, but have never been proactive, you are going to have an expensive and painful time.
But, “youth” isn’t everything.
By tempering the movement of certain facial muscle contraction patterns, we can reduce, and sometimes eliminate the appearance of resting negative emotions (i.e. R.B.F.).
ANGRY EYES
Nobody wants to hear, “Why are you mad mom?” especially when you aren’t mad.
In the biz, we refer to these lines as the “elevens” because they look like the number 11. They are also called frown lines, anger lines and glabellar lines. The glabella is the area between your eyes at the bottom of the forehead. The muscles that make up the ‘glabella-complex’ allow you to frown by depressing the eyebrows. These muscles collectively pull in a downward vector, like a natural anchor for the upper face. Thus, when you release the anchor it is as though the part of the eyebrows closest to the nose is set free, allowing the eyebrows to relax upwards a small and natural, but
perceivable, amount. After having this area treated, people often look more approachable, rested, and awake.
SQUINTING EYES
Then, there are crow’s feet. They don’t start off this way though, usually they start as little hummingbird feet and progress from there. These are caused mostly by your eye sphincter muscle, the orbicularis oculi. When this muscle is softened, so too are the lines, but something else that can happen is an opening of the eye’s aperture. This lets more of your natural beauty show and can reduce the appearance of tired eyes.
HORIZONTAL LINES
Above all, there are the forehead wrinkles. These wrinkles run horizontally and are caused by a muscle called your frontalis. This is a big flat muscle that lifts up your eye-brows; in fact, it is the ONLY muscle that lifts up your eyebrows. You might be wondering, “if I am paralyzing the only muscle that lifts up my eye-brows, won’t I get heavy brows and saggy eye-lids?” Astute thinking if these were your thoughts! The answer is it depends. This is one of the reasons why selecting an expert injector is paramount when deciding where to go for treatment. An experienced medical professional will be able to determine the relative strength of the muscle, how much of a role it plays in your expressiveness, and how best to modulate it. Generally, this is not a good area to treat if you have excessive upper eye-lid skin.
Click [here] for a FAQ on Botox Cosmetic®.
I read this to the very end, so now what? If you made it this far, you might as well CLICK HERE to book a free consultation. Or call 587-521-0667. Or text 587-410-4835.
***
There is lots of information out there on how neuromodulators work, if you are wanting to really nerd out, please check out www.botox.ca. Alternatively, you can check out https://hemingwaymedicalspa.com/cosmetic-injectables/ for a more in-depth look at the neuromodulation and the aging process. | ESSENTIALAI-STEM |
getIterationsPreds: Obtaining the predictions returned by a workflow when applied...
Description Usage Arguments Value Author(s) References See Also Examples
Description
In the estimation process workflows are applied many times to different train+test samples of each task. We call these repetitions, the iterations of the estimation process. On each of these executions of the workflows they must return the predictions for the test set. This function allows you to obtain these predictions. The function also allows you to obtain the predictions on all iterations, instead of a single iteration.
Usage
1
getIterationsPreds(obj, workflow = 1, task = 1, rep, fold, it, predComp="preds")
Arguments
obj
A ComparisonResults object
workflow
A string with the ID of a workflow (it can also be an integer). It defaults to 1 (the first workflow of the estimation experiment)
task
A string with the ID of a task (it can also be an integer). It defaults to 1 (the first task of the estimation experiment)
rep
An integer representing the repetition, which allows you to identify the iteration you want to inspect. You need to specify either this argument together with the argument fold, or only the argument it
fold
An integer representing the fold, which allows you to identify the iteration you want to inspect. You need to specify either this argument together with the argument rep, or only the argument it
it
An integer representing the iteration you want to inspect. Alternatively, for cross validation experiments, you may instead specify the repetition id and the fold id (arguments rep and fold, respectivily)
predComp
A string with the name of the component of the list returned by the workflow that contains the predictions (it defaults to "preds")
Value
The result is either a vector of the predictions of a particular iteration or a matrix with the predictions on all iterations
Author(s)
Luis Torgo ltorgo@dcc.fc.up.pt
References
Torgo, L. (2014) An Infra-Structure for Performance Estimation and Experimental Comparison of Predictive Models in R. arXiv:1412.0436 [cs.MS] http://arxiv.org/abs/1412.0436
See Also
getScores, getIterationsInfo, performanceEstimation
Examples
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
## Not run:
## Estimating MSE for 3 variants of both
## regression trees and SVMs, on two data sets, using one repetition
## of 10-fold CV
library(e1071)
data(swiss)
## running the estimation experiment
res <- performanceEstimation(
PredTask(Infant.Mortality ~ .,swiss),
workflowVariants(learner="svm",
learner.pars=list(cost=c(1,10),gamma=c(0.01,0.5))),
EstimationTask("mse",method=CV(nReps=2,nFolds=5))
)
## Get the iterations scores of svm.v2 on swiss
getIterationsPreds(res,"svm.v2","swiss.Infant.Mortality",rep=1,fold=2)
## this would get the same
getIterationsPreds(res,"svm.v2","swiss.Infant.Mortality",it=2)
getIterationsPreds(res,"svm.v2","swiss.Infant.Mortality",rep=2,fold=3)
## this would get the same
getIterationsPreds(res,"svm.v2","swiss.Infant.Mortality",it=8)
## Get the results of all iterations
getIterationsPreds(res,"svm.v1","swiss.Infant.Mortality")
## End(Not run)
performanceEstimation documentation built on May 2, 2019, 6:01 a.m. | ESSENTIALAI-STEM |
Black Women in the WCTUexplain how the WCTU permitted segregation: it basically allowed white unions in the South to decide they didn't want to admit black women, but if black women organized their own unions they were treated the same as a state's white unions in terms of where they fell in the national structure (i.e. they sent the same number of delegates to nat'l conventions who were seated on the executive committee). Comment on funding or lack thereof for Dept of Work Among the Colored People.
Frances Ellen Watkins Harper, pictured at right, was a WCTU leader, poet, and abolitionist. Born into a free black family in 1825, Harper was educated in Baltimore until her family fled the city after the passage of the Fugitive Slave Act in 1850. After short stints as a teacher, in the 1850s Harper joined the abolitionist movement and became a traveling lecturer. After the Civil War she was involved in the temperance and suffrage movements and worked to improve women's education and the welfare of recently freed slaves. She also continued to write and publish her novels and poetry.
Frances Harper and the "Department of Work Among Colored People"
A committed "temperance woman," Harper joined the WCTU in the 1880s and became Superintendent of its "Department of Work Among the Colored People." Harper's words, and her choice to join a mostly-white organization, demonstrate her commitment to interracial cooperation. Though she believed that education and resources were necessary for "race progress," she also thought that white women bore as much responsibility as white men in the oppression of black people and that they needed to educate themselves out of racial prejudice.
The below document is one of Harper's reports on the activity of her department. It was published in the WCTU's official newspaper, the Union Signal, in 1885. In it, Harper urges the white women in the WCTU to commit to organizing for temperance among black women. She reminds them that they, as white women, have benefited from generations of wealth and education that black women have not had. | FINEWEB-EDU |
Khalifa Haftar, Libya’s strongest warlord, makes a push for Tripoli - A bad and bloody bet
THIS WAS supposed to be a rare moment of cautious optimism in Libya. On April 4th António Guterres, the UN’s secretary-general, arrived in Tripoli, the capital, to prepare for a peace conference which, he hoped, would lead to long-delayed elections later this year. But hours after he arrived Khalifa Haftar, the warlord who controls much of the country, launched an offensive to seize the city. At times his self-styled Libyan National Army (LNA) has reached within 10km or so of Tripoli’s centre. Dozens have been killed. Flights were suspended after General Haftar’s jets bombed the city’s only functioning airport. The conference has been cancelled. “The UN is deeply engaged in negotiations for peace,” Mr Guterres said later. “We’re not always successful, I must confess.” The general had long threatened to take Tripoli. Until now he was posturing. No one is quite sure why he chose this moment to move on the capital. Whatever his reasons, his offensive is starting to look like a big miscalculation. He would have entered the conference in an enviable position, holding most of Libya’s land and oil wells. Instead the LNA is now bogged down on several fronts. The general risks losing not only the battle for Tripoli but many of his other gains as well. Upgrade your inbox and get our Daily Dispatch and Editor's Picks. He may have been encouraged by his recent romp through southern Libya, seized in a lightning campaign earlier this year. Many southerners welcomed the LNA. Their region is rife with ethnic and tribal fighting, and with smuggling gangs. Militants from neighbouring Chad and Sudan have joined the fray. Locals hoped the general would bring stability. He seized towns and a big oilfield with little bloodshed. Grabbing all the west will not be so easy. Militias from the port city of Misrata have vowed to block the LNA’s advance. One contingent has deployed to reinforce Tripoli. Another is preparing a counter-offensive to the south and east. The Misratans are the strongest force in western Libya and won a decisive victory over Islamic State (IS) in 2016. They resent General Haftar’s ambitions and are linked to the government in Tripoli through the interior minister, Fathi Bashagha, a Misratan. General Haftar had worked for months to co-opt forces in the west, some of whom are frustrated with the UN-backed Government of National Accord (GNA) in Tripoli. Now they seem united against him. His offensive is embarrassing his numerous foreign allies. Egypt and the United Arab Emirates have provided air support. France has special forces deployed in the east. Russia has sold him weapons. (The GNA counts Qatar, Turkey and Italy as partners.) The general’s friends nominally back the UN-led peace process but have tolerated and encouraged his machinations. France has not asked him to pull back. Instead it wants him to meet Fayez al-Serraj, the GNA’s leader, for peace talks in Geneva. Egypt did not even bother to sign an American-led statement calling for calm. After eight years of chaos, it is understandable why General Haftar looks appealing. He brought a measure of control to the east, while the GNA has struggled to keep Tripoli calm. Egypt and the UAE share his anti-Islamist politics. But the capture of Benghazi caused the destruction of large parts of the city. The general himself is 75 and in patchy health. His LNA is a hotch-potch of militias bound by mutual interests and money. It does not represent the entire country, and some of its members are not even Libyan. General Haftar’s empire may not outlast him. Even his attitude toward Islamists is driven by interests rather than ideology. Though he opposes the Muslim Brothers and their ilk, he has made common cause with the Madkhalis, an ultra-conservative sect backed by Saudi Arabia. They have sought to impose their puritanical views in the east. He may have hoped Tripoli’s Madkhali faction, now aligned with the GNA, would help him take the capital. The general met King Salman of Saudi Arabia in March, and may have won his support. By rushing the bulk of his forces west, the general has left a vacuum in the territory he already holds. Jihadists are trying to exploit it: IS attacked the central town of Fuqaha on April 9th. Unrest in the south and east would jeopardise the oil exports that provide 90% of government revenue. Output has recently increased, with Libya pumping some 1m barrels a day since the summer. The fighting may reduce global supplies already squeezed by sanctions on Iran and turmoil in Venezuela. On April 5th the price of Brent crude topped $70 a barrel, its highest level since November. Both sides claim to be winning. But the LNA may have overreached. It is stretched thin and will struggle to maintain supply lines across unfriendly territory. It captured, then lost, the defunct international airport on the edge of Tripoli. The GNA bombed an airfield its rival has used to launch air raids. An LNA retreat seems unlikely. It would be out of character, and humiliating, for General Haftar. But a long battle could spell final ruin for Libya. | NEWS-MULTISOURCE |
Hugh Grant: I'm like Barbra Streisand in trousers - CBS News
In a Sunday Morning interview with correspondent Tracy Smith, the actor calls himself a perfectionist who has driven people mad. Actor Hugh Grant is such a perfectionist when it comes to making movies he's driven others mad, he told Tracy Smith in an interview for CBS' Sunday Morning, to be broadcast August 7. But Grant, who stars alongside Meryl Streep in the new film Florence Foster Jenkins, says there are downsides to being a perfectionist. I think it can be a good thing, Grant told Smith. But I think there's also a drawback. And I've driven people mad on films that I've made. I want more takes. I want to try new lines. Then I want to interfere in the editing process and I want to interfere in the advertising process, everything, everything. Pretty much Barbra Streisand in trousers. In a wide-ranging interview, Grant talks about his motivation to work with Streep; his 1995 arrest for a run-in with a Los Angeles prostitute; his views on marriage; and what's next in his career. I'm torturing someone at the moment about a film, Grant remarked when asked what's ahead. I like to do that for a very long time, like a cat with a half-dead mouse. And then, and usually, I walk away at the end and say, 'I'm not going to do it.' I find it hard to sign on the dotted line, sometimes, he added. Grant, who was himself a victim of cellphone hacking, also talks with Smith about his work with the watchdog group Hacked Off, which speaks out against abuses by the British tabloid press. The project occupies more of his time than making films these days, and he's content that way. I feel more satisfied, Grant said. It's strangely bracing not to have people kissing my butt. And it's strangely bracing to be on big BBC news programs confronted by quite scary interviews and having to keep your end up, and keep your wits about you. I said 'bracing' -- it's utterly terrifying. The Emmy Award-winning Sunday Morning with Charles Osgood is broadcast on CBS on Sundays beginning at 9:00 a.m. ET. Executive producer is Rand Morrison. Follow the program on Twitter (@CBSSunday), Facebook, Instagram (#CBSSundayMorning) and at cbssundaymorning.com. You can also listen to Sunday Morning audio podcasts at Play.it. Watch CBS News anytime, anywhere with the our 24/7 digital news network. Stream CBSN live or on demand for FREE on your TV, computer, tablet, or smartphone. Copyright 2019 CBS Interactive Inc.All rights reserved. | NEWS-MULTISOURCE |
-- Potter Jr. Gets First PGA Tour Win in Playoff at The Greenbrier
Ted Potter Jr. won his first U.S. PGA
Tour title at The Greenbrier Classic, where U.S. Open champion
Webb Simpson blew a final-round lead and Tiger Woods and Phil Mickelson both missed weekend play as professionals in a
tournament for the first time. Potter made a four-foot birdie putt on the third extra hole
yesterday at the Old White TPC Course in White Sulphur Springs,
West Virginia , to beat Troy Kelly in a playoff between the 218th
and 464th ranked golfers in the world. Potter, 28, received $1.1 million for the victory, which
came after he missed the cut for weekend play in nine of his 15
previous PGA Tour events this year, including five straight. “When you’re missing cuts every week, you get down on
yourself,” Potter said at a news conference. “It’s hard to
pick yourself back up, but the plus side for me is I was still
young. I just knew I had plenty of time.” Potter forced the playoff by playing the final four holes
in 4-under par, including an eagle on the par-5 17th, to match
Kelly at 16 under. Kelly, 33, was more than 200 spots lower than
Potter in the Official World Golf Ranking, having missed 14 of
17 cuts this season with a previous best finish of 37th. Potter sealed his breakthrough victory at Old White’s 162-
yard par-3 18th hole, where he hit his tee shot about four feet
from the flag to set up the winning birdie. Simpson had entered the final round with a two-shot lead,
yet slipped to a tie for seventh place after shooting a 3-over
73 that featured bogeys on four of the last seven holes. Charlie Wi and Charlie Beljan tied for third at 14-under par. The tournament’s two biggest stars didn’t even play the
final two rounds, as Woods and Mickelson missed the cut in the
same tournament for the first time as pros. The PGA Tour next moves to Silvis, Illinois , for the $4.6
million John Deere Classic, the final tournament before the
British Open. The third of the season’s four major championships
is scheduled for July 19-22 at Royal Lytham & St. Annes in
northwest England . To contact the reporter on this story:
Erik Matuszewski in New York at
matuszewski@bloomberg.net To contact the editor responsible for this story:
Michael Sillup at
msillup@bloomberg.net | NEWS-MULTISOURCE |
Talk:Jasmine (Angel)
Jasmine Versus Glorificus
Although "Buffy" and "Angel" episodes frequently cover the same ground, why do you think the writers insisted on the white-hats fighting a god... twice?
Glorificus and Jasmine served essentially the same purposes on both shows. Both retconned reality-warping teenagers (Buffy’s sister, Dawn, and Angel’s son, Conner) to into the shows’ storylines. Each served as they key (literally in Dawn’s case) to existence for their respective god. Both gods also have naming issues, or rather the lack thereof: Jasmine cannot choose her own name because her real one holds the key to her power. “Glorificus” is technically a title her minions gave her, and she only insisted on the diminutive “Glory” because of her increasing materialism. Both also reside within human bodies: Glory shares a body with Ben, a human host created especially for her, and her ultimate weakness. Jasmine implants herself in Cordelia’s body and has to impregnate herself with Conner so she (as Cordelia) can give birth to herself (as Jasmine).
More importantly, both goddesses were also potential show-enders. “Buffy” Season 5 could have easily been the final series, and the Season 5 finale (“The Gift,” Buffy 5x22) could serve as a series finale for fans that didn’t want to switch to UPN (or simply wanted out of the show entirely). The “Angel” Season 4 finale (“Home,” Angel 4x22) would have also been an appropriate series finale had the show not been renewed. Both also serve a purpose in the real world: Buffy’s death on the show was a literal death on the WB network level, and Buffy (the character and show) was resurrected the following season on UPN. Cordelia’s pregnancy was written into the show because of Charisma Carpenter’s real-life pregnancy. The Jasmine storyline also conveniently wrapped-up countless loose ends by saying that Jasmine simply orchestrated everything on the show--no loose ends make for clean series cancellations.
Although many “Buffy” fans were bothered by Season 5 (more by the addition of Dawn than the rest of the Glory storyline), the latter half of the “Angel” run (Seasons 4 and 5) represent a very specific shift in the focus of the show, essentially veering the entire series off-course… twice. Season 4 deemphasized the quest for redemption (given to Angel by the Powers That Be) by making Cordelia the season’s Big Bad. Season 5 reacted to all the problems of the previous season; unfortunately, Season 4 linked everything on the show to Jasmine, and by effectively retconning Jasmine out of the show, the original point of “Angel” was lost--the entire concept of visions driving Team Angel on their respective quests for redemption was scrapped.
The question is: If the Glory storyline was so bad and received so poorly (by fan and network executive, alike), why did the “Angel” writers then virtually recreate it, tainting their show for the rest of its run?--hypercritic 21:40, 13 April 2006 (UTC)
* There are some major similaritiies, but the 2 story lines are used in different ways. Glory's storyline in season 5 is designed to investigate themes of family, adoption, and sacrifice. Angel Season 4 Jasmine storyline is more about dealing the fanaticism (and violence) religion can create, and issues about free will. Was Buffy Season 5 really poorly received by fans as a whole, in my experience this has not been the case? -- Paxomen 12:29, 9 May 2006 (UTC)
* Point taken--Angry fans usually stand-out more than happy ones, so there might be fewer dissenters than I thought.--hypercritic 04:55, 10 May 2006 (UTC)
First appearens
Didn't she technically appear in the episode "Spin the Bottle"? I mean, that's when she took over Cordelias' body. —The preceding unsigned comment was added by <IP_ADDRESS> (talk) 18:48, 18 January 2007 (UTC).
Classification
In season 4 (episode 21), Jasmine said to Angel that she was a Power That Was, Gunn also asked her if she was sometime earlier in the season. Why does people keep removing the classification and affiliation (formerly Power That Was)? <IP_ADDRESS> 22:27, 28 October 2007 (UTC)
Because "Power That Was" is no known group, individual, system, or anything else; it's never been used to refer to a group of beings like the Powers That Be, and to decide that there is a group called such is speculation. She used it as an adjective, describing herself, and all we know from that statement is that she used to be something, she never even said what it was that she used to be. She might be one of the Powers That Be, or something completely unconnected, or maybe not any group at all, but just a description (There's no affiliation called "powers" in the real world, but people often describe various nations as "powers"). JBK405 23:07, 28 October 2007 (UTC)
Actually, in the Buffy-verse the Powers That Be are a group. "Power That Was" was just a term that the gang coined to convey the idea that Jasmine's a former "Power That Be." So the Powers That Be should be listed as a former affiliation. The entire group has always been referred to with some ambiguity, meaning that's not much of a reason to exclude her from it. Absurdity (talk) 12:05, 28 February 2008 (UTC)
I agree, "Power That Was" wasn't meant to be a group in itself, Gunn was simply hinting at the fact that she was a "Power That Be" and now is not. Personally, I think the article should be changed to indicate this as it was implied (confirmed?) in the show and is what is generally taken as the case anyway. (judging by the number of edits to this point) <IP_ADDRESS> (talk) 12:34, 2 March 2008 (UTC)
Real Name
Wasn't her death supposed to happen after her real name was uttered?--SladeMcGowan 21:09, 3 May 2007 (UTC)
No, revealing her true name only thwarts her power of psychic control and being able to make the facade of looking human to do so. That's why everybody panics and w/e and her face goes into a meta-phase from pure human to pure... eyeless zombie thing.
Why is it that Jasmine does not have a profile picture?
I have been unable to add a profile picture for Jasime.
Fair use rationale for Image:Jasmine birth.jpg
Image:Jasmine birth.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
BetacommandBot (talk) 14:37, 2 January 2008 (UTC)
Fair use rationale for Image:Jasmine deformed.jpg
Image:Jasmine deformed.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
BetacommandBot (talk) 14:38, 2 January 2008 (UTC)
Fair use rationale for Image:Jasmine original.jpg
Image:Jasmine original.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
BetacommandBot (talk) 14:38, 2 January 2008 (UTC)
Fair use rationale for Image:DevourerStatue.jpg
Image:DevourerStatue.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
BetacommandBot (talk) 21:18, 13 February 2008 (UTC)
Reason for Rain of Fire, Darkness, and Angelus?
Was any satisfactory reason for these things ever given in the show? Why didn't Jasmine just use the Beast to destroy WolfRam & Hart and then wait to be born? What was the point of causing all of the destruction and chaos? The only reason for bringing out Angelus I can think of is to keep Angel out of the way. —Preceding unsigned comment added by Rampage455 (talk • contribs) 03:19, 2 March 2008 (UTC)
I think the fire and darkness was to make Angel Investigations desperate enough to bring out Angelus, and Jasmine wanted Angelus as a minion. Maybe she was planning to have him commit the sacrifice that Conner ended up doing. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 15:46, 11 May 2008 (UTC)
anti-villain?
According to the anti-villain page:
"An anti-villain is a character in a film, drama or literary work who pursues undeniably villainous ends, but employs methods that are arguably noble in order to advance his interests. Thus, the anti-villain is the converse of the anti-hero, who frequently resorts to immoral means in pursuit of an admirable goal."
Jasmine is labeled in this article as an anti-villain, but her goal is world peace (which is good) while her method is a lot of mass murder and mind control (which is bad). Doesn't that make her an anti-hero, not an anti-villain? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:52, 23 March 2008 (UTC)
Yes, I would classify her as such, too. The original purpose for dubbing her an anti-villain seems to be out of plot purposes. She was the "Big Bad" of Season 4 therefore she is a villain. However, considering her purposes, she was a villain with non-villainous goals so the anti-villain title is wrongfully given, and probably so only due to having villain in the term.
I suppose it depends on what you consider "Evil." Even if her goal is world peace, the cost of everyone's free will can also be considered an end, just as much as it can be a mean. Furthermore, "world domination" is a very common villain goal. Even if the world were to be conquered under somewhat good-natured circumstances, it's still domination nonetheless. Because of this similarity in ultimate objectives, she fits the anti-villain camp better than anti-hero, in my opinion. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 05:41, 3 July 2008 (UTC)
Position
I noticed that Jasmine has been put as people in the text box at the bottom of the page, however Jasmine is infact a power like the powers that be or the first, shes stated that her self. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:18, 15 April 2008 (UTC)
Powers
It should also be noted that Jasmine displayed a number of magical abilities such as possesion, healing people, mass information erasing and the ability to see the unseen all this during and after her possesion of Cordilia. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:52, 15 April 2008 (UTC)
Jasmine or PTP?
Not going to make any request whatsover for this to be put on the article, but I want it out of my system. When possessing Cordelia, Jasmine has shown LACK OF FORESIGHT to the fullest: went ahead on an ad hoc basis, and showed no capacity for masterplans; her sheer inability to estimate somebody would fetch Faith, her helplesness in the face of Willow and futile attempts to stop the return of Angel that proved to be just minor nuisances... the list kinda goes on. Even with something as powerful as the Beast in its disposal, "Jasmine" failed to estimate Angelus killing the Beast because he didn't want the lunk of rock around. For an all-powerful being who, in its "a better world" scenario knew there was one slight glitch in there, she doesn't go out of her way to stop our rogue group from acquiring the one thing that will bring her down; hell, she can't even estimate THAT. Sure, she throws big words around, like 'There was a time when I could have seen that coming aeons before it ever crossed your mind', but for someone who has arranged events for millions of years, she sure can't handle the little stuff. "Jasmine" lags behind, for instance, Sahjahn in terms of planning.
Now, try this on for a size - Skip was in on this from the start. He himself said that the visions of Doyle were part of the plan, and who did the visions come from? The Powers that Screw You. Skip did say he had been working for the PTP, and he IS. An idea me and a friend saw was that - PTP raised Jasmine by arranging the events as they were (showing Cordelia what she needed to hear/see to give it up, refusing to help Angel by taking away the visions) to do the ultimate good deed - create world peace by removing free will. Throughout the series, save for season 5, PTP is pitted against The Wolf The Ram The Hart; Holland Manners himself states in "Reprise" that Wolfram&Hart exists because there is evil in humans, because they have a CAPACITY for evil. Take away that capacity by removing free will, there you have it - "they would all be angels". Hence The Wolf The Ram The Hart's victory and Team Angel's lack of contact with the PTP in the last season; the PTP failed. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 10:54, 11 June 2008 (UTC)
Religious Intolerance in this Article
I find this article to be severely biased against the Exalted One. The perspective that the evil Angel gang was right in ending Her Celestial Holiness's kingdom of peace and love, for example. The POV that she wanted us as mindless slaves, instead of bringing us her love....
I demand it be rewritten. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 15:21, 3 February 2011 (UTC) | WIKI |
Mark LEVASSEUR, Appellant, v. Peter PEPE, Appellee.
No. 95-1346.
United States Court of Appeals, First Circuit.
Heard Sept. 15, 1995.
Decided Nov. 22, 1995.
Thomas J. Gleason, Haverhill, MA, for appellant.
William J. Duensing, Assistant Attorney General, with whom Scott Harshbarger, Attorney General of the Commonwealth of Massachusetts, Boston, MA, was on brief for appellee.
Before STAHL, Circuit Judge, CAMPBELL, Senior Circuit Judge, and LYNCH, Circuit Judge.
STAHL, Circuit Judge.
In January of 1990, petitioner Mark Le-vasseur was convicted in a Massachusetts state court of rape, indecent assault and battery, and assault and battery. After exhausting his state court remedies, Levasseur sought a writ of habeas corpus in the United States District Court for the District of Massachusetts, pursuant to 28 U.S.C. § 2254, claiming that his state convictions were obtained in violation of the United States Constitution. Specifically, Levasseur asserted that an improper admission of hearsay testimony violated his Sixth Amendment right to confrontation, an unduly suggestive identification procedure violated his Fourteenth Amendment right to due process of law, and his trial counsel’s deficient performance deprived him of his Sixth Amendment right to the effective assistance of counsel. The district court denied the habeas application, and this appeal followed. For the reasons discussed below, we affirm.
I.
BACKGROUND
A Pretrial Events
At some time between the late evening and early morning hours of June 30 and July 1, 1988, a man driving a big, dark-colored, “4 x 4” pickup truck approached the victim (“Jane Doe”) as she was walking on the sidewalk and asked her if she wanted a ride. Undeterred by Doe’s initial rejection, the driver returned and Doe relented. Instead of dropping Doe at her destination, the driver took her to a deserted area behind a factory and raped her on the truck seat. Her attacker, still restraining Doe, drove away from the scene and then pushed her out of the truck.
Ronald Ralls, driving behind the truck, saw Doe fall from the truck and stopped to render aid. Ralls drove Doe to his home and notified the police. Officer Mendes arrived, but Doe rebuffed his attempts to approach her. The officer detected the smell of alcohol on Doe’s breath. Emergency paramedics transported Doe to the hospital. Doe’s continued refusal to let anyone touch her prevented the hospital staff from administering a “rape kit.” Eventually, Doe, in the presence of Officer Mendes, related the incident in general terms to a female hospital administrator.
Five days later at the police station, Doe further recounted the incident to Inspector Boutselis. Boutselis showed Doe over six thousand photographs of white males. A 1983 photograph of Le-vasseur was among the six thousand. Although Doe said several photographs, including Levasseur’s, looked similar to her assailant, she was unable to make an identification.
On July 13, 1988, because of a new lead, Inspectors Boutselis and Guilfoyle began to focus on Levasseur. On their way to Levass-eur’s residence in an unmarked car, Boutselis and Guilfoyle noticed a pickup truck fitting Doe’s description. Boutselis and Guilfoyle observed the truck pull over to the side of the road, saw the driver beckon to a young blond-haired girl walking on the sidewalk, and heard him say “Come on.” After the girl continued walking and the truck drove on, Guilfoyle questioned the girl, who said that the man in the truck had offered her a ride but she did not know him. Learning from the police dispatcher that the truck belonged to Levasseur, Boutselis and Guil-foyle stopped Levasseur and asked about the girl. Levasseur told them that she was his cousin and he had offered her a ride, but he did not volunteer her name. Levasseur agreed to go to the police station, where Boutselis and Guilfoyle questioned and photographed him.
The next day, Inspector Boutselis showed Doe a group of sixty photographs including Levasseur’s photograph from the day before. Doe stated that Levasseur’s recent photograph looked like her assailant and asked Boutselis for more photographs of Levass-eur. Upon examining Levasseur’s 1983 photograph, Doe said that it looked more like her assailant than the recent photograph. Given the seriousness of the charges, Doe refused to make a positive identification of Levasseur based solely on the photographs and requested to see him in person.
Using an unmarked car, Inspector Boutsel-is and Doe began field identifications. Over the next five months, they made nine excursions lasting two to three hours each to locations near Levasseur’s place of work and home. On five occasions, they sat outside the Textron plant in Wilmington thinking that Levasseur was employed there. Le-vasseur, it was later discovered, worked at Digital Equipment Corporation, not Textron. On the remaining four occasions, Boutselis and Doe sat at an intersection in North Chelmsford one-half mile from Levasseur’s home. Doe never positively identified anyone on the first eight excursions. During the ninth trip, on December 16, 1988, however, Doe saw Levasseur’s truck approach and exclaimed, “Wow, this looks like it.” As the truck came within six feet of Doe and Le-vasseur looked in her direction, Doe screamed, “It’s him, it’s him. Get me ... out of here right now.”
B. The Trial
On January 24, 1990, Levasseur was brought to trial on charges of rape, indecent assault and battery, and assault and battery. The prosecution called six witnesses in its direct case and one witness on rebuttal, with Levasseur calling himself, his wife, and his mother-in-law as his defense witnesses.
In Ms rebuttal case, the district attorney called Inspector Guilfoyle to testify about the July 13, 1988, incident with the blond-haired girl (we use the language used at trial and refer to “the blond-girl incident”). In recounting Ms conversation with the blond girl, Inspector Guilfoyle uttered the following hearsay testimony:
Q. Sir, ... what was the nature of the conversation with her [the blond girl]?
A. We pulled up; we were in an unmarked vehicle. We identified ourselves to the young lady. We asked her if she knew the gentleman in the truck; she said no. We asked her if she could tell us what he wanted and she said he offered her a ride.
(emphasis added).
After a three-day trial, the jury found Le-vasseur guilty of rape, indecent assault and battery, and assault and battery. Levasseur was sentenced to concurrent state prison terms of ten to fifteen years and four to five years.
C. Postr-Conviction Proceedings
After the jury’s verdict, Levasseur filed a motion for a new trial wMch the trial court denied. The Massachusetts Appeals Court affirmed the convictions, and the Supreme Judicial Court of the Commonwealth of Massachusetts denied Levasseur’s petition to obtain further appellate review. The United States Supreme Court denied Levasseur’s petition for a writ of certiorari.
Having exhausted his state remedies, Le-vasseur filed a petition for habeas corpus in the United States District Court for the District of Massachusetts. The district court denied the petition for the following reasons. Levasseur’s trial counsel had procedurally defaulted on the claim of unduly suggestive identification by his failure to object. The court held that Levasseur could not excuse this procedural default because he could not show cause for that failure via a claim of meffective assistance of counsel. Counsel’s failure to object did not constitute deficient performance because the identification method was not unduly suggestive. With respect to the hearsay claim, the court held that Levasseur’s Confrontation Clause rights were violated, but the error was harmless. Finally, according to the district court, Le-vasseur’s remaining ineffective-assistance-of-counsel claims failed because trial counsel’s overall performance was not deficient and Levasseur suffered no prejudice.
II.
DISCUSSION
On appeal, Levasseur makes the following four arguments: (1) he did not procedurally default on Ms Due Process and Confrontation Clause claims, (2) the violation of his Sixth Amendment right to confrontation was not harmless error, (3) the pre-trial identification procedure was unduly suggestive and violated his Fourteenth Amendment right to due process of law, and (4) he was denied effective assistance of counsel. We discuss each argument in turn.
A Procedural Default
Levasseur asserts that the district court erred in holding that he procedurally defaulted on his Due Process and Confrontation Clause claims. Levasseur admits that Ms trial counsel did not object to the pre-trial identification procedure and the hearsay statement as each was introduced and acknowledges that, to consider such claims on appeal, Massachusetts requires contemporaneous objection to their admission as evidence at trial, Mass.R.Crim.P. 24(b). He contends, however, that his filing a motion for new trial and the trial court’s consideration of the issues presented acted to resurrect and preserve these claims for review. We disagree.
Under Massachusetts case law, issues previously lost for appeal may be resurrected and preserved for appellate review if a trial judge exercises Ms discretion and considers them in ruling on a motion for a new trial. See Commonwealth v. Harrington, 379 Mass. 446, 399 N.E.2d 475, 478 (1980); Commonwealth v. Gagne, 367 Mass. 519, 326 N.E.2d 907, 911 (1975); Commonwealth v. Buckley, 17 Mass.App.Ct. 373, 458 N.E.2d 781, 783 review denied, 391 Mass. 1103, 461 N.E.2d 1219 (1984). Whether the trial court considered Levasseur’s Due Process and Confrontation Clause claims and thereby waived his procedural default is a legal question subject to our plenary review. See Burks v. Dubois, 55 F.3d 712, 716 (1st Cir.1995) (reviewing de novo question of whether state court’s limited review of petitioner’s claim for miscarriage of justice effected a waiver); Puleio v. Vose, 830 F.2d 1197, 1200 (1st Cir.1987), cert. denied, 485 U.S. 990, 108 S.Ct. 1297, 99 L.Ed.2d 506 (1988) (same).
In ruling on Levasseur’s motion for new trial, the trial judge did not consider Levass-eur’s Due Process and Confrontation Clause claims individually but rather only as part and parcel of Levasseur’s ineffective-assis-tanee-of-counsel claim. The court concluded that the attorney’s failure to object to the identification process and the hearsay testimony was not ineffective assistance of counsel. Because the trial judge never considered the Due Process and Confrontation Clause claims severally, it did not resurrect these proeedurally defaulted claims, and we consider them on appeal only as they constitute part of Levasseur’s ineffeetive-assis-tance-of-counsel claim.
Levasseur invites this court to rule that an appellant claiming ineffective assistance of counsel in a motion for a new trial before a state trial court preserves for habeas corpus review not only the ineffective-assistance-of-counsel claim but the substantive claims subsumed within the ineffeetive-assistance-of-counsel claim. In this case and typically, however, the substantive claims underlying the ineffective-assistance-of-counsel claim are constitutional claims that were proeedurally defaulted due to the ineffective performance of counsel. In Coleman v. Thompson, 501 U.S. 722, 750, 111 S.Ct. 2546, 2564-65, 115 L.Ed.2d 640 (1991), the Supreme Court ruled that federal habeas review of proeedurally defaulted claims is barred unless the petitioner demonstrates (1) cause for the default and “actual prejudice as a result of the alleged violation of federal law” or (2) that failure to consider the claims will result in “a fundamental miscarriage of justice.” By proposing that proeedurally defaulted claims should also be preserved if they form part of an ineffeetive-assistance-of-counsel claim, Le-vasseur suggests that we create a third way to excuse procedural default, where Coleman purposefully provides only two. Recognizing Levasseur’s suggestion as an attempt to make an end run around Coleman, we refuse his invitation.
Having determined that the trial court did not resurrect Levasseur’s otherwise proee-durally defaulted Due Process and Confrontation Clause claims, we turn our attention to determining whether we nonetheless may review the proeedurally defaulted claims on habeas. We begin by considering the Confrontation Clause claim.
B. Inadmissible Hearsay
Where a petitioner, like Levasseur, has proeedurally defaulted on his claim, we reach the merits on habeas corpus review only if the default can be excused by establishing either cause for the default and actual prejudice resulting therefrom or that failure to consider the claim will result in a “substantial miscarriage of justice.” Coleman, 501 U.S. at 750, 111 S.Ct. at 2565. Should the petitioner surmount this hurdle and excuse his default, we may then reach the merits of his claim and determine whether a constitutional error has occurred and, if so, whether the error was harmless.
In considering Levasseur’s proeedurally defaulted Confrontation Clause claim, the district court assumed arguendo that Levass-eur had excused his default and limited its analysis to the merits of Levasseur’s Confrontation Clause claim. Specifically, the district court held that although Inspector Guil-foyle’s testimony about the blond girl’s statements was inadmissible hearsay that violated Levasseur’s Sixth Amendment right to confront his accusers, it was harmless error. Similarly we limit our analysis to the determination of harmless error and affirm for the reasons that follow.
We first set forth the legal framework. The standard here for determining whether habeas relief must be granted because of unconstitutional trial error is the Brecht/Kotteakos standard of harmless error. Under that standard, an unconstitutional trial error is harmless unless the court finds with fair assurance that the error, considered in light of the record as a whole, “ ‘had [a] substantial and injurious effect or influence in determining the jury’s verdict.’ ” Brecht v. Abrahamson, 507 U.S. 619, - -, 118 S.Ct. 1710, 1721-22, 128 L.Ed.2d 353 (1993) (quoting Kotteakos v. United States, 328 U.S. 750, 776, 66 S.Ct. 1239, 1253, 90 L.Ed. 1557 (1946)); see Kotteakos, 328 U.S. at 765, 66 S.Ct. at 1248 (holding that requisite degree of certainty is “fair assurance”). Assessments of harmless error are necessarily context-specific. Kotteakos, 328 U.S. at 762, 66 S.Ct. at 1246-47. The following factors, however, are relevant to our determination of whether the jury was substantially swayed by the tainted hearsay evidence: (1) the extent to which the error permeated the proceeding, (2) the centrality of the issue affected by the error to the ease as actually tried and (3) the relative strength of the properly admitted evidence of guilt. See Brecht, 507 U.S. at -, 113 S.Ct. at 1722 (considering infrequency of state’s references to constitutional error and strength of evidence of guilt as factors relevant to assessing whether error “substantially influence[d]” jury); Shaw v. Collins, 5 F.3d 128, 132-33 (5th Cir.1993) (considering centrality of the issue affected by the error to the case as tried and finding that Confrontation Clause violation was not harmless because tainted testimony “was the linchpin in the State’s case”). After reciting the standard of review, we consider each factor in turn.
Because a harmless-error determination on habeas corpus review is a mixed question of law and fact, we examine this issue de novo. Brecht, 507 U.S. at -, 113 S.Ct. at 1724 (Stevens, J., concurring); Scarpa v. Dubois, 38 F.3d 1, 9 (1st Cir.1994) (holding that “[i]n federal courts, mixed questions of law and fact arising in section 2254 cases are ordinarily subject to de novo review”), cert. denied, — U.S. -, 115 S.Ct. 940, 130 L.Ed.2d 885 (1995).
1. Prevalence of the error
The constitutional error in this case consists of two discrete statements uttered at the end of the trial. During his rebuttal case, the district attorney violated Levass-eur’s Sixth Amendment right to confront his accusers by eliciting from Inspector Guilfoyle the hearsay testimony about the blond girl’s statements to him. Specifically, Guilfoyle testified that the blond girl said Levasseur had offered her a ride and that she had said no. In his closing argument, the district attorney paraphrased the offending statement:
One can look at this case, and if one adds up the facts that were proven beyond a reasonable doubt and then add any inferences that can be drawn from the account with the young female on the bridge on July 13th, with almost the same words that were spoken to [Jane Doe]: Do you want a ride?
(emphasis added).
Viewing these two constitutionally erroneous statements in the context of the trial as a whole, we find that they did not permeate the trial proceedings. During his opening argument and throughout the presentation of his direct case, the district attorney carefully avoided any hearsay testimony about the blond girl’s statements. The district attorney purposefully excluded Guil-foyle — the only witness with personal knowledge of the blond girl’s statements — from the six witnesses who testified as part of his direct case. Only after Levasseur took the stand and stated that the blond girl was his cousin did the district attorney offer Guil-foyle’s hearsay evidence on rebuttal and paraphrase it in his closing argument. At least on the facts of this case, an error occurring in the rebuttal case and repeated once in closing argument — comprising three lines in a 513-page transcript — is not prevalent in the context of a three-day trial in which the opening argument and direct case (the first two days) are free of error. See Brecht, 507 U.S. at -, 113 S.Ct. at 1722 (finding that error comprising less than two pages of a 900-page trial transcript was not prevalent).
2. Centrality of the issue affected, by the error
The issue primarily affected by the erroneous admission of Guilfoyle’s hearsay statement was the prosecution’s modus oper-andi theory: because Levasseur attempted to pick up the blond girl two weeks after Doe’s rape using the same modus operandi he had used to lure Doe into his truck, Levasseur must have raped Doe. Had mo-dus operandi been the prosecution’s central theory to support Levasseur’s conviction, the constitutional error in admitting the hearsay would likely have been fatal to the prosecution’s ease and necessarily harmful. The prosecution, however, only used the modus operandi evidence to corroborate Doe’s otherwise strong identification of Levasseur. After considering the trial in its entirety, we find that Doe’s clear identification of Levass-eur was the linchpin in the prosecution’s ease, and the modus operandi evidence was merely collateral thereto.
In his opening argument, the district attorney concentrated exclusively on Doe’s identification of Levasseur; he did not mention the blond-girl incident. The bulk of the prosecution’s direct case concerned Doe’s identification of Levasseur, to which four of the six prosecution witnesses testified. The testimony of the prosecution’s first witness, Doe, centered on her ability to view her assailant and his truck, the effect of her consumption of two drinks on her perception, her description of her assailant and his truck, and her identification of Levasseur in photo arrays and in the field. Officer Mendes, the prosecution’s second witness, testified to Doe’s condition closely following the rape, concluding that she was not intoxicated, and to her initial description of the incident. Mr. Ralls, the third witness, gave an eyewitness description of the truck from which he saw Doe thrown. He also described Doe’s condition immediately following the rape, detecting no odor of alcohol. The sixth and final witness, Inspector Boutselis, recalled Doe’s detailed description of her assailant, the truck, and the incident, recounted five days after the rape. He also recalled Doe’s reactions to the photo arrays and the field identifications. He then provided the only account of the blond-girl incident in the prosecution’s direct case. As previously stated, this account was limited to what Boutselis saw and heard transpire between Levasseur and the blond girl.
In response to Levasseur’s assertion that the blond girl was his cousin, the district attorney presented additional evidence illustrating modus operandi in his rebuttal case. Finally, in his closing argument, the district attorney referred to the blond-girl incident only twice, focusing his comments instead on Doe’s identification of Levasseur.
The district attorney’s tactical decision not to introduce the blond-girl incident in his opening argument and to wait until the last witness in his direct case to do so reveals the diminished importance the prosecution placed on the issue of modus operandi Conversely, the primacy of Doe’s identification of Levasseur is evident throughout the trial, being the district attorney’s focus in both his opening and closing arguments and his direct case.
8. Relative strength of the properly admitted evidence
The final factor tests the strength of the properly admitted evidence of guilt in deciding whether the error substantially affected the jury. Was the properly admitted evidence so strong that it overwhelmed the impact of the erroneously admitted evidence? Or was the case very close, with evidence evenly balanced on both sides, enhancing the effect of the error on the jury’s verdict? In answering these questions, we heed Brecht’s warning not to assess the potential strength of the properly admitted evidence if offered at a new trial but rather to assess the strength of the properly admitted evidence as that evidence actually was presented at the trial. Brecht, 507 U.S. at -, 113 S.Ct. at 1724 (Stevens, J., concurring) (“The habeas court cannot ask only whether it thinks the petitioner would have been convicted even if the constitutional error had not taken place. Kotteakos is full of warnings to avoid that result.”). We find that this factor also militates against Levass-eur and that the prosecution’s properly admitted evidence was strong enough to minimize the impact of the erroneously admitted hearsay testimony.
The prosecution’s evidence of Levasseur’s guilt, stripped of the erroneously admitted evidence, reduces to two broad areas of incrimination: (1) Doe’s identification of Le-vasseur and (2) Levasseur’s encounter with the blond girl. We will consider the strength of each area of incriminating evidence separately, then cumulatively, and finally we will compare the prosecution’s evidence of guilt to Levasseur’s defense.
a. Doe’s identification of Levasseur
As the linchpin in the prosecution’s case, Doe’s identification of Levasseur is strong inculpatory evidence. It readily satisfies all but one of the traditional indicia of reliability that the Due Process Clause requires of identifications. See Manson v. Brathwaite, 432 U.S. 98, 114, 97 S.Ct. 2243, 2253, 53 L.Ed.2d 140 (1977) (setting out the factors for assessing reliability of identification testimony). Doe had adequate opportunity to view her assailant throughout the incident; her degree of attention during a traumatic experience is presumed to have been acute, despite her having consumed two drinks earlier that evening; her prior description of her assailant accurately fits Levasseur; when she saw Levasseur in his truck, Doe demonstrated a high degree of certainty in identifying him as the perpetrator (and this comes from a woman who appreciated the gravity of the charges as demonstrated by her refusal to identify Levasseur by his photo alone and request to see him in person); and she never positively identified anyone other than Le-vasseur throughout the six-month investigation. Although the six-month lapse between the rape and Doe’s identification of Levass-eur is troubling, its effect is outweighed by the sheer strength and number of the other factors.
Officer Mendes’ and Inspector Boutselis’ testimony corroborated Doe’s identification testimony on certain events, such as her initial and subsequent descriptions of her assailant and the truck, her assertion that she was not intoxicated, and her reactions to the photo arrays and field identification. In addition, Mr. Ralls’ eyewitness testimony describing the assailant’s truck was consistent with Doe’s.
The only inroads that Levasseur’s counsel was able to make against Doe’s credibility was highlighting her failure to notice a scar on Levasseur’s neck and tattoos on his arm despite her testimony that Levasseur was wearing a tanktop when he raped her. Such an oversight, however, is understandable given the circumstances and would be unlikely to undermine Doe’s otherwise detailed description.
b. Levasseur’s encounter with the blond girl
After removing the tainted hearsay evidence from our consideration, we conclude that the remaining evidence about the blond-girl incident is still moderately probative of Levasseur’s guilt. Before assessing its probative strength, we recount the evidence as it came in at trial.
Inspector Boutselis introduced the blond-girl incident by testifying that two weeks after Doe’s rape he saw Levasseur drive up to an approximately sixteen-year-old blond girl walking on the sidewalk, beckon to her, and say “Come on”; the young girl kept walking and did not get in the truck. Bout-selis also testified that when he and Guilfoyle subsequently pulled Levasseur over, Levass-eur told Boutselis that the girl was his cousin and he was going to give her a ride. When Boutselis asked Levasseur her name, Levass-eur did not answer.
Levasseur’s testimony provided a different account of the blond-girl incident. Levass-eur testified that he had been swimming with his aunt and cousin, that he had taken his aunt home first, and that he was dropping his cousin off when Inspectors Boutselis and Gu-ilfoyle arrived on the scene. He testified that his cousin’s name is Tina Guillemette, she was twenty-seven or twenty-eight years old, and he does not know where she lives now.
Although she was not a witness to the blond-girl incident, Levasseur’s wife, Judith Levasseur, testified to historical facts underlying Levasseur’s explanation of the incident. Judith Levasseur testified that Tina Guillem-ette is Levasseur’s cousin, she was approximately twenty-eight years old on July 13, 1988, and does not look sixteen years old. Judith Levasseur also testified that Tina Guillemette is not a good friend of her husband’s, it would be unusual for Levasseur to go swimming with Tina Guillemette and his aunt, and she knows how to get to Tina Guillemette’s house in Lowell.
To rebut the Levasseurs’ testimony, the district attorney called Inspector Guilfoyle. Consistent with Boutselis, Guilfoyle testified to seeing a young blond girl walking on the sidewalk, Levasseur’s truck pulling up next to her, Levasseur motioning to her, and the girl continuing to walk on. After having spoken with the blond girl in close proximity, Guilfoyle presumed that she was sixteen or seventeen years old.
We begin our assessment of the strength of the blond-girl incident by noting that although the Inspectors and Levasseur provided competing explanations of the blond-girl incident, consideration of the nature, source and extent of the contradictions between the stories reveals the weakness of Levasseur’s explanation. Boutselis’ and Guilfoyle’s testimony, Levasseur’s prior statements to the police, and his wife’s testimony all contradict Levasseur’s explanation on significant details. We briefly note each of the contradictions.
After talking with the blond girl face-to-face, Guilfoyle testified that the blond girl was sixteen or seventeen years old, and Boutselis estimated that she was sixteen after seeing her from the police car. Levass-eur, however, testified that Tina Guillemette was twenty-eight years old and Levasseur’s wife testified that Tina Guillemette does not look sixteen. Boutselis and Guilfoyle both testified that Levasseur had beckoned and called “Come on” to the blond girl, consistent with offering her a ride, whereas Levasseur testified that he was dropping his “cousin” off. Similarly, Guilfoyle testified that the blond girl was walking along the sidewalk before Levasseur pulled over, which is also inconsistent with Levasseur’s claim that he was dropping her off.
Levasseur’s statement to Boutselis immediately following the blond-girl incident contradicted his trial testimony. Boutselis testified that when he questioned Levasseur on the day of the blond-girl incident, Levasseur explained his encounter with the blond girl as offering to give his cousin a ride and he did not provide his cousin’s name when asked. However, Levasseur testified at trial that he was dropping his cousin off and his cousin’s name is Tina Guillemette.
Most telling, perhaps, is that even Levass-eur’s wife, testifying to seemingly innocuous background information, indirectly contradicted Levasseur. While Levasseur claimed that he had gone swimming with his aunt and his cousin on July 13,1988, Judith Levasseur testified that Levasseur and Guillemette were not good friends and such an event would have been an unusual occurrence. Similarly, after Levasseur testified that he did not know where Tina Guillemette now lives, Judith Levasseur testified that she knows how to find Guillemette. This testimony raises the question why Levasseur would not have contacted Guillemette to have her testify and corroborate his testimony if his wife knows where she lives. Given her importance to Levasseur’s explanation of the blond-girl incident, Tina Guillemette is notably absent.
Having noted the contradictions discounting Levasseur’s explanation, we must assess how strong Inspectors Boutselis’ and Guil-foyle’s testimony about the blond-girl incident is as evidence of Levasseur’s guilt. Even without the hearsay evidence, Boutsel-is’ and Guilfoyle’s testimony presents circumstantial evidence that the blond girl did not know Levasseur and he had offered her a ride. For instance, that Levasseur did not know the blond girl can be inferred from Boutselis’ and Guilfoyle’s testimony that the blond girl kept walking, did not stop and talk with Levasseur and did not get in his truck. Similarly, that Levasseur offered the blond girl a ride can be inferred from the testimony that Levasseur beckoned to her and said “Come on.”
These two inferential facts support the prosecution’s suggestion that, two weeks after Doe’s rape, Levasseur followed the same modus operandi with the blond girl as was used to lure Doe into the truck. Because this evidence makes it more probable that Levasseur' raped Doe, it is moderately probative of Levasseur’s guilt.
Considering the prosecution’s case cumulatively, we find Doe’s strong identification of Levasseur corroborated by moderately strong evidence of modus operandi. Levass-eur’s defense, in contrast, is too unsound to weaken the prosecution’s ease.
c. Levasseur’s defense
Levasseur’s defense was misidentification, and it entailed his refutation of the charges and an alibi. Levasseur’s alibi and his refutation testimony are weak exculpatory evidence, however, because Levasseur’s alibi witness was sleeping during the time of the disputed event, and the district attorney impeached Levasseur’s credibility.
Levasseur’s wife, Judith Levasseur, was his alibi witness. She testified that on the night of the rape, she and Levasseur obtained take-out pizza (as was their custom on Thursday nights), drove home, ate it, watched television and went to bed around 10:00 p.m. On cross-examination, the district attorney elicited the following damaging information: Judith Levasseur is a heavier sleeper than her husband and she frequently does not awaken when he gets out of bed during the night. Even accepting Judith Levasseur’s testimony as true, she was asleep during the hours surrounding the incident and could not consciously account for Levasseur’s presence in bed at that time. The rape occurred sometime after midnight, leaving Levasseur ample time to get out of bed undetected, get dressed and reach the scene of the incident in nearby Lowell.
On direct examination, Levasseur resolutely denied that he had raped Doe and testified consistently with his wife that on June 30, 1988, the night in question, they had taken pizza home and- gone to bed. On cross-examination, however, the district attorney impeached Levasseur’s refutation. The district attorney elicited from Levasseur that on July 13, 1988, at the police station he had told Inspector Boutselis that at 9:00 p.m. on June 30, 1988, he could have been driving around downtown Lowell, but he was not sure. Levasseur admitted that he only became sure about his whereabouts after he spoke with his wife and her immediate family. Levasseur conceded, however, that his in-laws were not with Levasseur and his wife on June 30,1988. Therefore, their assistance in reconstructing his whereabouts is dubious.
In addition to the impeachment of Levass-eur’s testimony about the blond-girl incident, the district attorney also impeached Levass-eur’s credibility more generally with another logical inconsistency. Levasseur testified on direct that he had offered to give Inspector Boutselis a sperm sample while he was at the police station on July 13, 1988. On cross-examination, however, Levasseur conceded that as of July 13, 1988, the police had not specifically informed him that he was suspected of rape; they had only made vague references to abusing some girl and claims of sexual harassment. With this line of questioning, the district attorney implied that Le-vasseur disclosed a guilty mind by offering a sperm sample when all that was charged was battery and sexual harassment, neither of which necessarily involve the ejaculation of semen.
Given the inability of Levasseur’s alibi witness to vouch for his whereabouts and the widespread impeachment of Levasseur’s testimony, Levasseur’s shaky defense case helped the prosecution’s case more than it hurt it. After comparing the prosecution’s case to Levasseur’s defense, we conclude that the strength of the prosecution’s remaining evidence of guilt, relative to Levasseur’s defense, minimizes the impact of the improperly admitted evidence on the jury’s verdict.
Having determined that the error did not permeate the record, the issue affected by the error was not central to the prosecution’s case, and the prosecution’s case minus the inadmissible evidence was strong, we find with fair assurance that, in light of the record as a whole, the Confrontation Clause violation did not substantially influence the jury’s verdict, and therefore it was harmless.
We now turn to Levasseur’s remaining arguments.
C. Pre-trial Identification
Levasseur also contends that the district court erred by holding that Doe’s December 17, 1988, identification of him in his truck one-half mile from his home was not unduly suggestive and did not violate the Due Process Clause. We disagree and affirm for the reasons set forth in the well-reasoned opinion of the district court below. Levasseur v. Pepe, No. 93-10832-DPW, slip op. at 14-22 (D.Mass. Feb. 28, 1995). Careful review of the record convinces us that the district court was correct in finding that Doe’s identification of Levasseur, under the totality of the circumstances, possessed sufficient indicia of reliability, as we discussed in section B.3.a. supra, and that counsel’s failure to object to the identification was not ineffective assistance of counsel.
D. Ineffective Assistance of Counsel
Levasseur contends that the district court erred in concluding that Levasseur was not denied effective assistance of counsel when his trial counsel failed to object to the hearsay testimony of the blond girl, failed to object to the testimony of Levasseur’s prior bad acts offered solely to impugn his character, failed to object to the jury instruction on identification, and failed to call a rebuttal witness claiming to be the blond girl. We disagree and affirm for the reasons set forth in the opinion of the district court below. Levasseur v. Pepe, No. 93-10832-DPW, slip op. at 27-32 (D.Mass. Feb. 28, 1995). Careful review of the record convinces us that the district court was correct to find that only one of the alleged errors amounted to deficient performance — the failure to object to the hearsay testimony of the blond girl — but that no actual prejudice resulted therefrom.
Ill
CONCLUSION
In sum, we find that Levasseur procedurally defaulted on his Due Process Clause and Confrontation Clause claims; the Confrontation Clause violation was harmless error; the pre-trial identification procedure was not unduly suggestive and counsel’s failure to object to the identification was not ineffective assistance of counsel; and Levasseur was not denied effective assistance of counsel.
For the reasons articulated, the district court did not err in denying the application for habeas relief. The district court’s judgment is affirmed.
. For a more comprehensive statement of the facts, see Commonwealth v. Levasseur, 32 Mass.App.Ct. 629, 592 N.E.2d 1350, 1351-53, review denied, 413 Mass. 1104, 600 N.E.2d 171 (1992), cert. denied, - U.S. -, 113 S.Ct. 978, 122 L.Ed.2d 132 (1993).
. Because Levasseur was no longer cooperating with the investigation and probable cause to arrest him did not exist, Inspector Boutselis could not require Levasseur to participate in a line-up.
. We note that the Fourth and Eighth Circuits have held that once cause and prejudice is found sufficient to excuse the procedural default and an error is found on the merits, no additional harmless-error review is necessary. Hill v. Lockhart, 28 F.3d 832, 839 (8th Cir.1994) ("[I]t is unnecessary to add a separate layer of harmless-error analysis to an evaluation of whether a petitioner in a habeas case has presented a constitutionally significant claim for ineffective assistance of counseh”), cert. denied, — U.S. -, 115 S.Ct. 778, 130 L.Ed.2d 673 (1995); Smith v. Dixon, 14 F.3d 956, 974, 976 (4th Cir.) (en banc), cert. denied, - U.S. -, 115 S.Ct. 129, 130 L.Ed.2d 72 (1994). Because we review the Confrontation Clause issue as the district court decided it, assuming arguendo that Levasseur excused his procedural default, we need not decide whether we agree with our sister circuits.
. Levasseur would have us consider every reference to the blond-girl incident in determining prevalence. Although such evidence is relevant to the next factor we consider, determining the centrality of the issue affected by the error, it is not relevant here. To determine prevalence, we need only ask how often the error occurred. Because the other references to the blond-girl incident in the record were free of constitutional error, we do not consider them in assessing the error's prevalence. For instance, when Inspector Boutselis testified in the prosecution’s direct case about the blond-girl incident, he limited himself to what he saw and heard transpire between Levasseur and the blond girl. He stated that he saw Levasseur beckon to the blond girl and heard Levasseur call, "Come on.” Because this evidence is free of constitutional error and clearly admissible, we do not consider it in assessing the error's prevalence.
. Levasseur’s trial counsel failed to object under Massachusetts' rules of evidence to the introduction of the blond-girl incident as a prior bad act offered to show identity (modus operandi). Because 28 U.S.C. § 2254 limits habeas corpus review of a state prisoner's conviction to violations "of the Constitution or laws or treaties of the United States,” we consider this failure only as it implicates the Sixth Amendment right to effective assistance of counsel.
. No scientific evidence of Levasseur's guilt, such as a semen specimen, exists. Doe's refusal to let anyone touch her following the rape prevented the hospital staff from administering a "rape kit.”
. Although Levasseur showed his scar to the jury, he did not show his tattoos to the jury.
. Discussing Doe's failure to notice Levasseur's tattoos, the district court found it reasonable to assume that a rape victim would focus on her assailant's face rather than on his arms.
. Although a similar question may be asked of the prosecution regarding its failure to call the blond girl to testify, its failure to do so seems more excusable: Inspectors Boutselis and Guil-foyle did not get the blond girl's name and address. After learning from the blond girl that she did not know Levasseur and he had offered her a ride and deducing that Levasseur was following the same modus operandi used to lure Doe into the truck, Boutselis and Guilfoyle immediately pursued Levasseur, who had driven away from the scene moments before. Under these circumstances, one can excuse Boutselis and Guilfoyle for not taking the additional time needed to remain and obtain the blond girl’s name and address.
. This evidence becomes stronger evidence of guilt, however, considering that the inconsistencies likely damaged Levasseur’s credibility overall and affected the other elements of his defense, i.e., that he did not know Doe and that he was misidentified.
. In contrast, Boutselis testified that Levasseur had told him that “he was in the Lowell area, the downtown area from 9:00 p.m. on, but he couldn't recall his exact whereabouts or account for his exact whereabouts.”
| CASELAW |
The developing gut–lung axis: postnatal growth restriction, intestinal dysbiosis, and pulmonary hypertension in a rodent model
Stephen Wedgwood, Cris Warford, Sharleen R. Agvatisiri, Phung N. Thai, Nipavan Chiamvimonvat, Karen M. Kalanetra, Satyan Lakshminrusimha, Robin H. Steinhorn, David A. Mills, Mark A. Underwood
Research output: Contribution to journalArticle
3 Scopus citations
Abstract
Background: Postnatal growth restriction (PNGR) in premature infants increases risk of pulmonary hypertension (PH). In a rodent model, PNGR causes PH, while combining PNGR and hyperoxia increases PH severity. We hypothesized that PNGR causes intestinal dysbiosis and that treatment with a probiotic attenuates PNGR-associated PH. Method: Pups were randomized at birth to room air or 75% oxygen (hyperoxia), to normal milk intake (10 pups/dam) or PNGR (17 pups/dam), and to probiotic Lactobacillus reuteri DSM 17938 or phosphate-buffered saline. After 14 days, PH was assessed by echocardiography and right ventricular hypertrophy (RVH) was assessed by Fulton’s index (right ventricular weight/left ventricle + septal weight). The small bowel and cecum were analyzed by high-throughput 16S ribosomal RNA gene sequencing. Results: PNGR with or without hyperoxia (but not hyperoxia alone) altered the microbiota of the distal small bowel and cecum. Treatment with DSM 17938 attenuated PH and RVH in pups with PNGR, but not hyperoxia alone. DSM 17938 treatment decreased α-diversity. The intestinal microbiota differed based on oxygen exposure, litter size, and probiotic treatment. Conclusion: PNGR causes intestinal dysbiosis and PH. Treatment with DSM 17938 prevents PNGR-associated RVH and PH. Changes in the developing intestine and intestinal microbiota impact the developing lung vasculature and RV.
Original languageEnglish (US)
JournalPediatric research
DOIs
StateAccepted/In press - Jan 1 2019
ASJC Scopus subject areas
• Pediatrics, Perinatology, and Child Health
Fingerprint Dive into the research topics of 'The developing gut–lung axis: postnatal growth restriction, intestinal dysbiosis, and pulmonary hypertension in a rodent model'. Together they form a unique fingerprint.
• Cite this | ESSENTIALAI-STEM |
The Power of V&V
A secure system – especially a system that is used to provide security – has to be trusted. But what underpins that trust? What proof do we have that the main components of our trusted system are implemented properly and won’t fail at a critical moment? We mentioned this point in our last article about Secure OS and, as promised, we return to it here.
Verification and validation (V&V) are applied to assure that software (or the whole system or appliance) truly possesses the stated properties. Although these terms (V&V) sound quite similar and are used in conjunction with each other, they have quite different meanings. Let’s recap.
Verification is the process used to determine whether the outcome of a given stage of product development (i.e. software development) conforms exactly to the requirements set at the beginning of the stage.
Validation is the process used to determine whether the product (computer program, operating system, appliance etc.) satisfies its intended use and user needs. Requirements, lifecycle processes and other supporting artifacts can also be validated for their conformance to the expected results.
Put simply, verification asks, “Have we implemented the system properly?” while validation tries to find out “Did we implement the proper system?” And while the second question requires the involvement of an expert (whose opinion forms the basis for the whole scope of validation issues, from requirement validation to the final integration test), the first question has to be addressed mainly using formal methods.
Indeed, the one cannot exist without the other. The system can only be verified with regard to a concrete property, for example, evidence that the program does not suffer from deadlocks. The fact that this property makes sense should be validated. Furthermore, verification can be performed in a trivial way by restricting the ability to lock resources – but this may disrupt the integrity of those resources. Therefore, we have to validate an additional condition. In some cases the property definition can also be the subject of verification if the expert requirements can be appropriately formalized into the verification goal.
The Power of V&V
To envision the process of verification you can try imagining a sort of “magic evaluator” ready at the push of a button to perform an assessment of any given source code: Is the code valid or not? Is it safe or not? And so on. But even this sort of ideal raises a number of questions. The first of them being: what will we actually prove? What statements is verification capable of making evident? The correctness, completeness, data consistency, accuracy and safety of execution… It has been shown that all the properties might be represented as a composition of two basic properties – the ‘safety’ property and the ‘liveness’ property. The safety property stipulates that the system cannot reach a specific (unsafe) state. Put another way, this means “something bad will never happen”. The liveness property, on the other hand, guarantees that after a finite run the system will reach some defined state – in other words, “something good will definitely happen”.
However, awareness of the decomposition possibility of the verification goal is one thing, while the correct and valid representation of such a decomposed goal without loss of sense is, clearly, another. Sometimes, attempting rule decomposition for a system model results in a negative effect: the model hangs in the safety part of the rule without being able to establish the liveness part. This imposes additional conditions on the decomposition process. In some other realistic scenarios, you have to address the “fairness property” in addition to safety and liveness (just like in real life).
The Power of V&V
To formalize the criteria defined in such a manner, classical or temporal logic is often used and, to verify the system properties according to these criteria, the appropriate programming languages. In particular, for classical logic clauses Prolog is quite popular, while for temporal logic the Promela and SPIN languages are used. However, this is not the only way to define verification goals. The formal definition of correct program behavior and verification of this behavior is so specific and of such significance that in 1969 computer scientist and logician C. A. R. Hoare proposed a formal theory intended to establish the correctness of computer programs deductively. The basis of this theory is a set of logical rules defined in a way that imitates the semantics of imperative language constructions. Later, an approach to criteria specification was developed that even more closely resembles programming abstractions and supports further software design – design-by-contract programming.
Another major issue is the choice of object for verification. Despite the fact that a verification procedure implies a precise evaluation, the right choice of object needs to be made for there to be confidence in the result.
For example, one may choose a static system configuration – i.e. system parameters, applications and security policy restrictions – to verify. The evaluator accepts this data, performs the verification procedures according to the logical rules (based on expert knowledge) and generates ‘Pass’ or ‘Fail’ output. The evaluator may, for example, ascertain whether a certain kind of attack on the system is possible or if an unprivileged user can obtain unauthorized access to specific resources in the system, etc.
The verification of system configuration can ensure system behavior is trusted if system components are configured properly. This means that all system services and applications should run as specified and contain no bugs or vulnerabilities that could be exploited to affect the functioning of the whole system.1
However, the situation is often different in reality. Therefore, software internals need to be verified2. One thing is clear at this point – because software internals have a lot of representation layers, the need to make the right choice once again appears. What object is to be verified – the high-level source code or the sequences of machine instructions? Is it necessary to consider the program environment and how to model this environment? Is examining the specific dependencies of low-level execution from the hardware platform of any value…? And again, the choice depends on the verification goal and on the level of assurance provided for verification. Suppose you need to ensure the absence of a certain type of vulnerability in a piece of software (this example can be interpreted in most cases as the safety problem mentioned above). Testing and static code analysis intended to find typical dangers are not usually considered as formal verification methods3 due to the fact they tend not to cover all possible situations (although exceptions do exist). To solve this problem of the verification method, you need to perform logical computations with code constructions in order to make it evident that any continuous fragment on the program control flow graph (including all non-linear transitions) is not vulnerable to the given exploitation method. All that is required is to formalize, in a general way, the appropriate valid conditions and implement efficient evaluation algorithms for the entire program code.
The issue may be further complicated by the lack of guarantees that a compiler will save the proven properties for the resultant machine code, and by the necessity of guaranteeing the properties originally defined for the low-level code. It is because of this complexity of verifying program code that the verification methods are applied to the code as simply and concisely as possible. Priority is given to the code of the operating system kernel and the code of the low-level services that underpin the security of the whole system.
The Power of V&V
One promising approach to verification is by guaranteeing the security of some code properties (or setting the basis for such a guarantee) when the code is created. By demonstrating that a notation or programming language is capable of imparting the necessary characteristics to the program code, one can avoid the tedious checking procedures at least for these characteristics. Code generation minimizes human error (i.e. bugs) when creating software code. This is quite an effective approach that is currently only used for a limited number of algorithms in a specific context – at least until another more complicated task is solved. This task appears because we do not eliminate the code verification issue, but instead pass it to a higher level – the level of language (or compiler) verification. Therefore, we have to verify that the language is safe, meaning that all the constructions produced with this language are safe in the previous sense. This is a non-trivial task, but after being solved once it addresses verification issues for any code created using previously evaluated methods.
Another approach to implementing the verifiability of program code as it is created is to use the design-by-contract approach (contract-based programming). In this case, implementation starts by determining precise formal specifications of programming interfaces that prescribe preconditions (obligations accepted by the clients of interfaces), post-conditions (obligations accepted by the interface supplier) and invariants (obligations for saving certain properties related to the interface). Many programming languages support design by contract natively or with third-party extensions (e.g. C and Java languages).
“Laboratory verification” of the program code may cause complaints if the code behavior is affected to a large extent by the environment. Of course, it would be good if a system made from loosely coupled trusted components with properly defined interfaces could give a 100% guarantee that it will execute properly, but in real systems it is quite difficult to predict what influence the environment will have on individual components. In order to assess the correctness of the system it is necessary to resort to an analysis of the behavior of parallel components. Formal verification of whether a given logical formula is satisfied for the system with parallel execution architecture is referred to as model checking. This method brings together existing knowledge and expertise in the software verification field, and is widely used throughout the world to evaluate existing hardware and software systems. The Turing Award has been given twice for work in the field of model checking. The first time was in 1996 to Amir Pnueli “for seminal work introducing temporal logic into computing science and for outstanding contributions to program and systems verification”. The second time was in 2007 to the three scientists, Clarke, Emerson, and Sifakis “for their role in developing Model-Checking into a highly effective verification technology that is widely adopted in the hardware and software industries”).
During the Turing Award ceremony in 2007, ACM President Stuart Feldman said about the model checking method: “This is a great example of an industry-transforming technology arising from highly theoretical research.” We can say with some certainty that if the future of all aspects of our life lies with technologies that are safe, secure and smart in all senses of the word, validation and verification methods provide the route to that future.
It is impossible to cover all aspects of V&V in one article. For those who are particularly interested in the subject, we can recommend a paper by one of the pioneers of the model-checking approach, Edmund M. Clarke, ‘The Birth of Model Checking’, and his book ‘Model Checking’, co-authored with Orna Grumberg and Doron A. Peled, for a more in-depth exploration of the method. The best way to learn about aspects of safety, liveness and the other main properties is to refer to the original works listed in the paper by Ekkart Kindler, ‘Safety and Liveness Properties: A Survey’. The excellent monograph by G. Tel, ‘Introduction to distributed algorithms’, gives a detailed explanation of the formal representation and development of correct and dependable algorithms in complex systems.
1This is the case when the validation of lifecycle processes (based on an awareness of possible vulnerabilities) may help to reject configuration verification as inappropriate or enter compensating measures (e.g. code analysis) to provide some guarantees for software implementation. >>
2It should be noted that configuration verification and software verification are not interchangeable measures. While a check of the program code guarantees that it will be executed as expected, configuration checks ensure conformance to the required policy. >>
3They are usually considered as validation methods. >>
Related Posts
There are 2 comments
1. ED DASHIELL
Hi Ekaterina,
I am a retired mainframe COBOL programmer. I wanted to compliment you on your article which is well written, understandable, and informative. Reading it brought back pleasant memories from my programming career and I have not seen the subject of code verification and validation explicated as well as your article does. Your article is an excellent example of technical writing at its best. Thank you for the enjoyable read. Best Wishes, Ed
2. William Larson
Hi, Ekaterina (say, how do you pronounce that, anyway, as in E Katrina?)
No matter. What I liked about your article is your educating folks (but not perhaps dimwits like me) on all things cyber security-related. That is, in particular, validation advice and other matters on what is secure, or not, etc, etc. I am not educated in computer programming, and do not usually follow highly technical discourse on computer security-related issues, such as yours. But I am computer savvy, self-educated (or self-limited, if you will), and find your advice somewhat difficult to comprehend.
So, would it be possible for dolts like me to read a synopsis of what you’ve said about these validation issues? You know, like in layman (laywoman’s) terms, for those of us like me who think COBOL sounds more like the color blue, than seeing red, when security issues are at stake.
I purchased, like, and trust Kaspersky anti-virus software (recommended for me by Best Buy, no less), and use it daily to keep my computer and my data safe. However, am not sure whether any of your advice applies to trusting THEM, thru validation, or otherwise. Your thoughts this? Thanks.
Bill Larson, somewhere in Minnesota (a dolt personified)
Leave a Reply to ED DASHIELL Cancel Reply
Your email address will not be published. Required fields are marked *
| ESSENTIALAI-STEM |
Marduk was one of the most important deities in the ancient Babylonian pantheon. He played a central role in the religious and cultural life of the city of Babylon. As the god of creation, he was considered the supreme deity, and his cult was the most powerful in the region. The God Marduk was believed to have created everything in the world, including human beings. He was revered for his wisdom, power, and authority.
In Babylonian mythology, God Marduk was said to have defeated the chaotic forces of Tiamat. He established order and harmony in the universe. He was also known for his fierce battles with other gods. His victories were celebrated with great fanfare and elaborate rituals.
The worship of Marduk was central to Babylonian religion and played an essential role in the city’s political and social life. The Babylonian king was seen as Marduk’s earthly representative, and the king’s role in the cult was essential to his legitimacy. The temple of Marduk is known as the Esagila. It was Babylon’s most important religious site and attracted pilgrims across the ancient Near East. As in the Babylonian pantheon, the god Marduk was known as the King of Gods and reportedly freed the Jews. Similarly, in Egyptian and Greek mythology, check out our Fascinating articles:
- The Role of Anubis, The Egyptian God of the Underworld.
- Prometheus: The God of Fire and the Creator of Mankind in Greek Mythology
In this article, we are explaining the god of Babylon and all his mythological history.
The Origins of the God Marduk:
Marduk was the god of Babylon, revered as the supreme deity in the Babylonian pantheon. However, his origins are shrouded in mystery and debate. Some scholars believe that Marduk emerged from a merger of earlier Babylonian gods. In contrast, others suggest he was created as a unifying figurehead for the city-state.
Regardless of his origins, Marduk quickly rose to prominence and became the most important god in Babylonian religion. He was believed to have created the world and was associated with Jupiter. Marduk was also known for his battles with other gods. His victories were celebrated with elaborate rituals.
The worship of Marduk was central to Babylonian culture. His cult was crucial to the city-state’s political and social life. The Babylonian king was seen as Marduk’s earthly representative, and his role in the cult was essential to his legitimacy.
Marduk’s rise to prominence and influence is a fascinating aspect of Babylonian history and mythology. As babylon god marduk’s legacy continues to captivate historians and enthusiasts alike.
The Rise of Marduk:
Marduk’s rise to prominence in Babylonian religion was a gradual process that took place over several centuries. As the city of Babylon grew in power and influence, so too did the cult of Marduk.
At first, Marduk was a minor deity associated with the city of Babylon. However, as the city-state began to expand its influence and control over neighboring territories, the cult of Marduk also grew in power and influence. The Babylonian kings saw Marduk as their protector and patron deity, and the king’s role in the cult was crucial to his legitimacy.
Over time, Marduk’s mythology and cult became increasingly elaborate and complex. He was associated with a wide range of attributes, including wisdom, justice, and warfare. The Babylonians believed that Marduk had defeated the chaos dragon Tiamat and created the world from her body.
Marduk’s cult also played an important role in the political and social life of Babylon. The city’s major religious festivals were centered around Marduk’s cult. The king was required to participate in these rituals as part of his duties. The priesthood of Marduk held significant power and influence. They were involved in many aspects of Babylonian life, including education, medicine, and astronomy.
One of the most important monuments in Babylon was the temple of Marduk, known as the Esagila. This temple was the center of Marduk’s cult and was one of the largest and most impressive structures in the city. The Esagila was also home to a massive ziggurat, a towering stepped pyramid that was believed to symbolize the connection between heaven and earth.
Marduk and the Babylonian Creation Myth
One of the Babylonian mythology’s most compelling and elaborate stories is the epic tale of creation, Enuma Elish. This myth describes the origins of the world and the struggles between the gods, including Marduk.
According to the myth, the universe was a formless, chaotic void in the beginning. The goddess Tiamat, representing the primordial sea, and her consort Apsu, the god of fresh water, produced a generation of gods living in the sea’s depths.
As these gods grew in power, they became increasingly noisy and disruptive. They disturbed the peaceful existence of Apsu and Tiamat. In response, Apsu planned to destroy them all, but his son, Ea, thwarted them. Ea killed Apsu and imprisoned Tiamat, but her rage was such that she swore revenge against the other gods.
The gods needed a champion to match her power to defeat Tiamat. Marduk stepped forward and offered to take on the challenge, but only if he was made king of the gods. The other gods agreed, and Marduk set about creating a series of weapons and monsters to aid him in his battle with Tiamat.
In the epic battle that followed, Marduk was able to slay Tiamat and establish his supremacy over the other gods. Marduk created the world from Tiamat’s body to commemorate his victory, with humans created to serve the gods.
The story of Enuma Elish is a testament to the power and importance of Marduk in Babylonian mythology. As the champion who defeated the primordial chaos, Marduk was seen as a symbol of order and stability. His role as the world’s creator and patron of humanity further cemented his position as the most crucial god in Babylonian religion.
Marduk and the Jews in Babylon:
The Babylonian captivity of the Jewish people was a significant historical event. In 586 BCE, the Babylonian king Nebuchadnezzar II conquered Jerusalem. He exiled many of the Jews to Babylon. During their time in Babylon, the Jewish people faced many challenges, including adapting to a new culture and religion.
Interestingly, Marduk, the God of Babylon, was seen by some Jews as a potential liberator. This may seem surprising given that Marduk was a central figure in Babylonian religion and mythology. There are some indications that the Jewish people saw Marduk positively.
For example, the book of Daniel in the Hebrew Bible portrays Nebuchadnezzar II as a powerful king who acknowledges the greatness of God. In one famous passage, Nebuchadnezzar has a dream he cannot interpret. The Jewish captive, Daniel, who serves as an advisor to the king, can solve the imagination and reveals that it is a warning from God.
The dream is seen as a sign of the power of the Jewish God. It is also noteworthy that the dream features images reminiscent of Babylonian mythology, including a tree that symbolizes the greatness of a king.
Some scholars have suggested this may be a deliberate attempt to link Jewish beliefs with the Babylonian religion. To means that Marduk, as the king of the gods, could be seen as a benevolent figure who might assist the Jews in their captivity.
While it is unclear whether the Jewish people in Babylon worshiped Marduk, it is clear that his mythology had a significant impact on the culture of the region.
Overall, the story is fascinating and complex, with many interpretations and implications. | FINEWEB-EDU |
Continue your journey
Please confirm that you have the tools needed to complete your 5 day hydration challenge
We process your personal data as stated in our Privacy Policy. You may withdraw your consent at any time by clicking the unsubscribe link at the bottom of any of our emails.
Close
5 Day Hydration Challenge
How to "charge your batteries" and get more energy
Welcome!
Let the journey begin...
To get more energy, you have to start by charging your batteries...
This is a 2 step process and it starts with hydration... the next step will complete the "charge"...
Imagine a battery that's fully charged...
... and as you start using up the energy, the battery cell begins to "dry" like a plum turning into a prune...
That’s what happens to the cells of your body when you become dehydrated…
Not only do cells begin to shrivel up, you begin to lose that “charge” that gives you energy…
Getting more energy starts with staying hydrated…
The keyword here is “staying” hydrated…
There’s one time when everyone becomes dehydrated… that’s overnight when you sleep…
The difference between those who are getting more energy and those who still feel tired all the time starts with creating a habit of “staying” hydrated…
To “stay” hydrated you must start your day by drinking water…
Most people don’t drink much water to begin with… much less do they drink water first thing upon waking up…
That’s why we start every program with the 5 day hydration challenge…
The purpose of this challenge is to create a habit to hydrate first thing in the morning AND stay hydrated throughout the day
It doesn’t work the same if you wait until later in the day to hydrate…
If you want to get more energy following our method, hydration needs to be done first thing in the morning… and you must make a conscious effort to stay hydrated throughout the day...
The key is to hydrate consistently… 5 days is to get you “warmed up”…
It’s the first step on this journey…
I’m going to walk you through a series of improvements…
Every time you improve you’ll start to notice little to no changes at first…
It’s like getting a long train going…
It seems hard at first and like you’re barely making any progress…
… but if you do this consistently, over time you start to develop momentum…
When you hit momentum, then it’s hard to stop…
That’s when your energy starts to kick in…
Then I’m going to teach you how to “turn up the knob” to get more energy…
Small simple tweaks to your lifestyle can make a big difference…
Hydration is a skill…
That’s why consistency is important, because you have to practice hydration…
There is no formula that tells you exactly how much water you need to drink…
There are many factors that you need to take into account…
#1 what are your current levels of hydration
#2 what is your diet like
#3 what are your activity levels like
#4 height
#5 weight
#6 etc.
The goal with this exercise is for you to learn how your body feels when it’s hydrated and when it’s dehydrated…
Most people have been dehydrated for so long, they’ve forgotten what it feels like to be hydrated…
Some people take 4-6 weeks to hydrate because they’re so dehydrated…
You may not be as dehydrated as I was, but when I was dehydrated I had a lot of gas, bloating and constipation…
Some of the ways I can gauge how hydrated I am are
• Skin goes from dry & rough to smooth and moisturized
• Scalp looks and feels healthier
• Stronger hair and nails
• Increased alertness
• more energy
To get started I read a book called Your Body’s Many Cries For Water by F Batmanghelidj, M.D. where he said you should drink a minimum of 2 quarts (liters) a day…
… again, I’m just sharing what I did… you need to figure out what works for you… 2 quarts a day is a good starting point… but that’s not where it ends…
Do you want a little bit of energy or a lot of energy?
… because in this program you get what you put into it…
If you only do a little bit, you’ll get a little out…
If you put in more effort and do more, you’ll get a lot more out of this…
So for me personally, I drink closer to a gallon of water a day…
Now, I’m not saying “drink more water”…
I’m saying learn to hydrate…
Start slow and learn to build up…
Make small progressions…
There’s a lot to learn so be patient with yourself…
You don’t have to implement everything I share at once…
The goal isn’t perfection… it’s progress…
There’s 3 improvements you’re going to learn about…
#1 Cleanliness
#2 Minerals
#3 Hardness/alkalinity
The third one is advanced stuff so we’ll leave that for later on…
Let’s start with the basics…
Remember, you are here…
Here’s the two most important things I do when it comes to water…
#1 I make sure that my water is clean
#2 I make sure that my water has minerals…
The most ideal situation is to find a good source of water from a natural spring that has been tested for cleanliness and minerals…
As I write this, I live in Phoenix, AZ, so we don’t have a natural spring in the city… but I drive up north to Sedona about 2.5 hours and I can get good water that’s clean, mineralized and with a pH of ~8…
This is the most ideal situation… to get water from a good natural source…
This is not always possible, so I do make my own water…
Again… I’m sharing what I do…
… and most importantly… why…
… because I give a f*ck about my gut flora…
… and because it gives me a ton of energy, good sleep and it makes it easier to stay lean and toned…
This is the “brewery” equipment I have at the Beer Diet Project kitchen…
To get clean water I use a water steam distiller
A second option (not as good, but pretty good) would be a reverse osmosis system (wether at home or many grocery stores offer this option)…
I don’t have any filter recommendations as they are not nearly as efficient as using reverse osmosis or a water distiller…
Also, do not use distilled water from the store sold in plastic jugs… distilled water is very powerful and it makes plastic residue to leach into water more likely so that’s not a good option…
When I make my own distilled water I only use glass to store…
Next, keep in mind that reverse osmosis and distilling water removes all minerals from water… water without minerals doesn’t hydrate you…
That’s why I mineralize my water using
#1 Ionic magnesium
#2 SOLE salt
What is SOLE salt?
SOLE is pink Himalayan salt crystals dissolved in water… these salt crystals have 82+ minerals that your body needs for hydration and more…
Not all pink Himalayan salt has a good level of minerals and processing affects how clean it is…
That’s why I use unprocessed pink Himalayan salt crystals which are big and unprocessed…
I soak these crystals in water until it saturates and becomes salt water (see picture below…)
That salt water is what I call SOLE salt…
I’m not a doctor so I can’t tell you how much to use… and it depends on the factors mentioned above (diet, lifestyle, etc.)…
I personally add about 2mL of ionic magnesium and 4mL of SOLE salt to 1 quart of water… but it depends…
That’s what I use to stay hydrated…
If I want to “turn the knob up” and get more energy I do other tweaks which I’m going to be sharing as we make progress through this course…
We're starting with the 2 most basic, but very important factors that affect your energy levels, hydration and improving sleep...
The third factor only works when the first 2 are in place... that's why you can't skip steps one and two... when you follow this process in order, when you get to step three you'll see why this is a favorite energy booster for many people…
To start this journey and complete the 30 day Energy Jumpstart, you must do minimum 5 days of STAYING hydrated from the moment you wake up all the way until evening…
You don’t want to drink much water before going to bed because you don’t want to be waking up at night to go pee…
I try to get all of my water in between the moment I wake up until an hour before dinner some times sooner…
I don’t drink much water after dinner… but then again, if I’m thirsty, I listen to my body…
It’s not about what I do… it’s about learning to be intuitive with your body…
That’s why this is a skill…
That’s why there’s 3 main pillars to this program
#1 Learn
#2 Study
#3 Practice
Repetition is key…
Proper hydration with minerals is the first skill you’ll need to learn, study and master to be able to complete this journey…
To grow probiotics you need to be well hydrated…
To get more energy, you need to be well hydrated…
To complete this step you need to start your 5 day hydration challenge...
Here's the recipe I use to stay hydrated throughout the day
Aqua Vita Splash Ale
#1 a source of clean water
#2 Ionic magnesium
#3 SOLE salt crystals (large)
It’s mineralized water and it’s the beginning of the journey...
To continue this course, please confirm that you are taking action and are ready to start your 5 day hydration challenge...
The next step will help you sleep better, but it won't work unless you are hydrated...
Fill out the form below to confirm that you have the tools needed to complete your 5 day hydration challenge and get access to the better sleep challenge...
BeerDietProject.com, including all associated social media, is for informational purposes only and should not be considered a substitute for consulting your physician regarding medical advice pertaining to your health. We are not responsible for any loss, injury, or damage that allegedly arises from any information published on this website and related social media sites. You are responsible for any actions you take regarding your medical care. | ESSENTIALAI-STEM |
• RE: BFDH Morphology
Dear George, and Vijay,
the latest version, 2.1.0 of the API has morphology calculation in the public API under the descriptors module. There is documentation at https://downloads.ccdc.cam.ac.uk/documentation/API/descriptive_docs/descriptors.html#morphology and https://downloads.ccdc.cam.ac.uk/documentation/API/module/descriptors_api.html#ccdc.descriptors.CrystalDescriptors.Morphology
Best wishes
Richard
• RE: Co-crystal design
Hi Luca,
the return value of the screen() method is a ComplementarityScreen.ResultSet. This has a couple of methods for extracting results grouped by active or by coformer, and list-like access to individual results, i.e.
results = complementarity_screen.search(mol1, [mol2])
print(len(results))
result = results[0]
Then you can get the individual success property:
print(result.success)
print(result.identifiers)
etc.
There is documentation for the ccdc_rp package available on the downloads page of the CCDC,
https://www.ccdc.cam.ac.uk/support-and-resources/downloads/
under the CSD Python API Research Partner Add on documentation.
I hope this is clear. Get back to me if you would like more information.
Best wishes
Richard
• RE: Co-crystal design
Dear Luca,
this functionality has been exposed in the CSD Python API, but is currently available only to Research Partners of the CCDC. I believe you are working for Merck at the moment, and they are a Research Partner. In which case you will be able to download the ccdc_rp package from the Research Partner Portal at CCDC, and gain access to it via
from ccdc_rp.descriptors import MolecularDescriptors
complementarity_screen = MolecularDescriptors.ComplementarityScreen()
I hope this is helpful. Please get back to me if anything is unclear.
Best wishes
Richard
• RE: How do I change the space group settings using python?
Hi,
I'm sorry, that functionality has not been exposed in the CSD python API.
Best wishes
Richard
• RE: How can I find polyoxometalates using the Python API?
Hi,
I think this is the sort of problem that is best addressed by scanning the CSD, rather than substructure searching it. Something like the following would do what you want reasonable efficiently:
import time
from ccdc import io, search, utilities
csd = io.EntryReader('csd')
settings = search.Search.Settings()
settings.must_have_elements = ['O', 'Mo']
hits = []
start = time.time()
for i, e in enumerate(csd):
if i and i % 10000 == 0:
utilities.Timer.progress(start, i, len(csd), '%d hits' % len(hits))
if settings.test(e):
m = e.molecule
if len([a for a in m.atoms if a.atomic_symbol == 'Mo']) > 6:
hits.append(e.identifier)
with open('poms.gcd', 'w') as writer:
writer.write('\n'.join(hits))
writer.write('\n')
If you have more complex requirements then maybe substructure searching may be necessary. If the query returns a large number of hits, and you will be getting one for every Mo atom in the CSD, then an approach using a SubstructureSearch.HitProcessor would allow you to extract information from each hit as it is found, rather than waiting for the end of the search.
I hope this is helpful. Please come back to the forum if you have any further questions.
Best wishes
Richard
• RE: Systematically Measure Angles of Any Two Atoms Attached to a Metal
I'm not quite clear what you are trying to do here.
If you want to measure the metal's bond in a single molecule, then the following will work:
from ccdc.descriptors import MolecularDescriptors
def metal_angles(mol, element):
metals = [a for a in mol.atoms if a.atomic_symbol == element]
for m in metals:
nbrs = m.neighbours
for i in range(len(nbrs)):
for j in range(i+1, len(nbrs)):
print('%s - %s - %s: %.3f' % (nbrs[i], m, nbrs[j], MolecularDescriptors.atom_angle(nbrs[i], m, nbrs[j])))
We can test it with an entry from the CSD:
from ccdc import io
csd = io.EntryReader('csd')
mol = csd.molecule('ABALUN')
metal_angles(mol, 'Fe')
You could use the search API to do the same thing:
from ccdc import search
searcher = search.SubstructureSearch()
searcher.add_substructure(search.SMARTSSubstructure('*~[Fe]~*'))
searcher.add_angle_measurement('ANG1', (0, 0), (0, 1), (0, 2))
angles = searcher.search(mol)
for a in angles:
print a.match_atoms(), a.measurements['ANG1']
The geometry analyser of the CSD does not analyse bond angles or torsion angles involving metal atoms. This is because these measurements are sensitive to the oxidation state of the molecule.
I hope this is helpful.
Best wishes
Richard
• RE: GoldMine functions using the CSD API
Hi Jordan,
I think the following will work:
for i in range(len(results.ligands)):
try:
ligand = results.ligands[i]
except RuntimeError:
pass
else:
process(ligand)
I'm curious as to why the docking results are corrupted, though. Did you concatenate many files to make the docking result, or did GOLD create corrupted files?
Best wishes
Richard
• RE: Python: cannot access atom.occupancy/ General: what is atom.chirality = 'Mixed'?
Hi Toms,
can you let me know what the error message is when you try to access the occupancy attribute, and give me details of your Manjaro operating system? I'd like to investigate this if I can find an appropriate vagrant virtualbox for it.
Thanks
Richard
• RE: GoldMine functions using the CSD API
Dear Jordan,
yes you will be able to use the API for this.
The docking module of the CSD API, https://downloads.ccdc.cam.ac.uk/documentation/API/descriptive_docs/docking.html
shows how to read ligands in their docked poses, how to get access to the scoring terms of the fitness function you have used, and how to inspect the hydrogen bonds of the docked poses.
There are example programs using docking in https://downloads.ccdc.cam.ac.uk/documentation/API/cookbook_examples/docking_examples.html which may be helpful.
Best wishes
Richard
• RE: Python: cannot access atom.occupancy/ General: what is atom.chirality = 'Mixed'?
Dear Toms,
Can you show me an example script where atom.occupancy gives you an error? The occupancy attribute may be None if the atom has no coordinates, that is for an implicit hydrogen.
I can use it perfectly normally in, for example:
from ccdc import io
csd = io.EntryReader('csd')
mol = csd.molecule('ABABUB')
print('\n'.join('%s: %.4f' % (a, a.occupancy) for a in mol.atoms))
The value 'Mixed' is returned when the algorithm used to determine chirality is unable to come up with an answer. This can occur when the chiral atom has more than four bonds, for example, atom U1 of AAPUNI.
Best wishes
Richard | ESSENTIALAI-STEM |
Classification and application of ceramic bearings
Ceramic bearings are bearings made of high-tech materials with excellent performance and a wide range of applications. Its emergence has brought revolutionary changes to the
development of modern industry.
• Classification of ceramic bearings
Ceramic bearings can be divided into different types according to different classification methods. According to different materials, they can be divided into alumina ceramic
bearings, silicon nitride ceramic bearings, silicon carbide ceramic bearings, etc.; according to different shapes, they can be divided into spherical ceramic bearings,
cylindrical ceramic bearings, conical ceramic bearings, etc.; according to size Different from each other, they can be divided into micro ceramic bearings, small ceramic
bearings, large ceramic bearings, etc.
• Performance of Ceramic bearing
High wear resistance: The surface hardness of ceramic bearings is higher than that of metal bearings, and they have stronger wear resistance, which can effectively extend the
service life of equipment.
High temperature resistance: Ceramic bearings can maintain stable performance in high temperature environments and are suitable for mechanical equipment in high temperature
environments.
Corrosion resistance: Ceramic bearings have high resistance to corrosion by chemicals such as acids, alkalis, and salts, and are suitable for equipment in chemical industry,
medicine, and other fields.
High precision: Ceramic bearings have higher precision than metal bearings and are suitable for high-precision mechanical equipment.
Light weight: Ceramic bearings are lighter than metal bearings and are suitable for lightweight mechanical equipment.
• Applications of ceramic bearings
Ceramic bearings are widely used in various fields due to their excellent performance. The following are the main application areas of ceramic bearings:
Industrial field: Ceramic bearings are widely used in various industrial machinery and equipment, such as compressors, electric motors, gearboxes, etc.
Medical field: such as medical equipment, pharmaceutical manufacturing equipment, etc.
Aviation field: such as aircraft engines, reducers, etc.
Automotive field: such as automobile engines, transmissions, etc.
Food processing field: such as food processing machinery, kitchen equipment, etc.
In short, as a component made of high-performance materials, ceramic bearings have excellent performance and wide application prospects, making them an important support for
the development of modern industry. with science
With the continuous advancement of technology and changes in market demand, ceramic bearings will show broader prospects in future development. | ESSENTIALAI-STEM |
Simple Embedded Twitch Stream Throwing Console Tons of Console Errors
I have embed a twitch stream on my website and its throwing tons of errors which can be seen in the image below.
The code used to embed the stream is as follows:
<iframe src="http://player.twitch.tv/?channel=ChannelName" height="720" width="1280" frameborder="0" scrolling="no" allowfullscreen="true" id="stream"></iframe>
Code for the chat:
<iframe frameborder="0" scrolling="no" id="chat_embed" src="http://www.twitch.tv/ChannelName/chat?darkpopout" height="720" width="320"></iframe>
Is there anyway to get rid of these errors because I think they are messing with other JS on my page.
You have to pay for an SSL certificate?
Also how would that resolve these JS errors produced when embedding a twitch stream?
401s are because you’re not signed in on Twitch (expected), postMessage error is because the embed is not on twitch.tv (expected). The stack traces could be real problems, but if everything works, they can be ignored.
A cross-origin iframe cannot mess with JS on the parent page unless the browser isn’t properly restricting cross-origin access (usually due to insecure configuration or significantly outdated browser).
Hey, that makes sense. Would these errors mess with other JS on the page?
No, since they’re from the iframe.
Okay, thank you!
This topic was automatically closed 30 days after the last reply. New replies are no longer allowed. | ESSENTIALAI-STEM |
Aidan's custom Twitter API library for Java, implemented in Boid for Twitter.
Java Shell
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Failed to load latest commit information.
Wiki Images
contrib
libs
src
test
.gitignore
README.md
build.xml
README.md
Android Notes:
We use Ant to build for Android, as we remove libraries that are not required and are built into Android itself. However, people tend to install the SDK in different locations, so before you do anything, you will need a file called local.properties with the following contents:
sdk-folder=/opt/android-sdk-linux/
(Obviously changing the value to where you store the Android SDK. You will also need to install Android API Level 8 (or change the Android path in build.xml if you want to use another API level) from the android SDK package manager)
Then to build Boid's Twitter Library for Android, you can run
ant android
And it if you get Build Successful then that's awesome, and you should have a ~200kb file in the bin directory called twitter-android.jar
If you want to be even more lazy, you can make an shell script:
ant android
mv bin/twitter-android.jar ../amazing-new-app/libs/twitter-android.jar
notify-send "Boid Twitter Lib" "Built Succesfully! Refresh Eclipse"
(Ubuntu only with the libnotify utils installed) | ESSENTIALAI-STEM |
Questions about Laparoscopic SPIDER 2018-08-21T17:36:21+00:00
Questions about Laparoscopic SPIDER® Surgery
Los Angeles, Irvine, and Riverside, California Los Angeles
Does Dr. Dahiya perform LAP-BAND® surgery using Single Incision Laparoscopic Surgery (SILS)?
With the state-of-the-art SPIDER® Surgical System, our board-certified Los Angeles bariatric surgeon Dr. Shyam Dahiya performs several types of weight loss surgery using SILS, including LAP-BAND® surgery. Dr. Dahiya also uses SILS techniques for REALIZE® Band surgery and laparoscopic sleeve gastrectomy.
Does the SPIDER® Surgical System affect recovery time for laparoscopic bariatric surgery?
Yes. One of the many reasons Dr. Dahiya uses SILS for bariatric surgery like LAP-BAND® surgery and REALIZE® Band surgery is that the recovery time for single incision laparoscopic surgery is typically shorter and less painful. The SPIDER® system contains some of the most advanced SILS technology available, and Dr. Dahiya is one of relatively few bariatric surgeons in the United States with training and experience in using the SPIDER® system for SILS.
What is the difference between SILS with the SPIDER® system and regular laparoscopic weight loss surgery?
Traditional laparoscopic bariatric surgery, such as laparoscopic gastric bypass, uses multiple small incisions in the abdomen to provide your bariatric surgeon access to the digestive tract. This approach is very safe, but as with all surgical procedures, more incisions slightly increase the risk of infection and other extremely rare complications.
Because your safety is our number one priority, we use the state-of-the-art SPIDER® Surgical System, allowing Dr. Dahiya to perform gastric banding and sleeve gastrectomy weight loss surgery with a single incision (SILS). SILS is how the SPIDER® system works to further reduce the already low risk of infection and help make your recovery time faster and less painful.
Is the SPIDER® Surgical System just for bariatric weight loss surgery?
While Dr. Dahiya specializes in bariatric surgery, he is fully qualified to perform other SILS procedures using the SPIDER® Surgical System. In fact, Dr. Dahiya was the first surgeon in the world to successfully remove a large hepatic (liver) cyst using the SPIDER® system. SPIDER® can also be used for gall bladder surgery (cholecystectomy), kidney surgery (nephrectomy), and colon surgery (colectomy).
To learn more about minimally invasive SILS for LAP-BAND® and other weight loss surgeries in Los Angeles, please contact Dr. Dahiya today to set up a consultation at our office in Lakewood, California. | ESSENTIALAI-STEM |
Electoral reform in India
A number of measures have been suggested to improvise and strengthen the existing electoral practices in India.
Political parties in India
Since 1952, when the first election ended, various reforms have addressed the issue of party funding. However, the current situation is as follows:
* According to a study by the Centre for Media Studies, inr<PHONE_NUMBER>00 was projected to be spent in the 2014 general election by government, political parties, and candidates. Official spending by the Election Commission of India and the Government of India was around Rs. 7,000-8,000 crores —i.e. elections have become very expensive for political parties.
* The Association for Democratic Reforms (ADR) in a report published on 25 January 2017 states that the total declared income of national and regional parties between 2004-2005 and 2014-2015 stood at Rs. 11,367 crores. Total income from known donors was 16% (Rs. 1,835 crore) and total income from other known sources including membership fees, bank interest, etc. was 15% (Rs. 1,698 crore) leaving 69% (Rs. 7,833 crore) of the total income from unknown sources (contributions below Rs. 20,000 each), and thus untraceable. Comparing audited income with projected spending seems to indicate that political parties earned an additional large amount of black money.
* In a 9 May 2014 on the Lok Sabha Elections of 2014, ADR shows that out of the total 8,163 contesting candidates, 1,398 (17%) had criminal cases pending against them; 889 (11%) with serious criminal cases and 2,208 (27%) were crorepatis, i.e. capable of funding their own election campaigns. Thus, one could conclude that the reforms instituted till date have largely failed and could even be considered responsible for driving parties into a greater dependency on black money, and rich criminal elements to contest elections.
Committees that covered political funding reform
The problem with political party funding reform is that the reformer and the reformee are one and the same. In other words, a conflict of interest is built into the system. When pressed to do something by public outrage due to a breaking scandal, a committee will be constituted to study the matter and make suggestions. If public pressure is not maintained, the committee's suggestions will either be implemented in a diluted form, or sometimes, ignored altogether. From the 1960s onwards, the committees that have been constituted have used key terms that indicate the different facets to the problem of political funding reform, which are still relevant today.
Speed money: Gets things done quickly and creates a “tendency to subvert integrity in the public services instead of being isolated and aberrative is growing into an organised, well-planned racket.”
Parallel economy: Has been referred to be operating simultaneously and competing with the 'official' economy. Property dealings have been “a significant avenue of illegal deals, with ratios of 'white' and 'black' payments being freely mentioned”.
Delayed action: There has been a great lag in the implementation of committee recommendations. For example, in 1964, the Santhanam Committee recommended the setting up of a Central Vigilance Commission (CVC) as the apex probity watchdog to address governmental corruption. However it achieved the status of statutory autonomous body free from any executive authority only 39 years later, when the Central Vigilance Commission (CVC) Act of 2003 was legislated.
Some of the reforms undertaken are listed below and are the responses of the government of the day to both external and internal pressures to do something. They are broken up by source (who pushed for and/or made it happen) and listed chronologically within each heading to underscore the fact that different times needed different solutions. The Finance Bill 2017, largely considered a regressive bill as concerns political party funding, appears to indicate what can happen when a party comes under intense pressure to generate funds to contest an upcoming election.
Lack of transparency (and coordination): The government established the Vohra committee in 1993—it unequivocally confirmed linkages between crime and politicians. The mandate of the committee was to take stock of all available information about the activities of crime syndicates or mafia which had developed links with and were being protected by government functionaries and political personalities. The report recommended the setting up of a Nodal Cell that would serve as a collection point for relevant information collected by various government agencies such as the Central Bureau of Investigation (CBI), Research And Analysis Wing (R&AW), Intelligence Bureau (IB), Central Board of Excise and Customs (CBEC), Central Board of Direct Taxes (CBDT), Central Economic Intelligence Bureau (CEIB), Enforcement Directorate (ED) and Narcotics Control Bureau (NCB).
Section 11.1 of the Vohra committee report: "In sum, the various agencies presently in the field take care to essentially focus on their respective charter of duties, dealing with the infringement of laws relating to their organisations and consciously putting aside any information on linkages which they may come across."
The final Vohra report did not reveal any specific names of individual politicians or bureaucrats but only stated in a general manner that what was already widely known and talked about for years. All attempts via RTI to get at the minutes and file notings of the meetings that were held by the committee and would have provided real information have failed. The Ministry of Home Affairs (MHA) declined to share the file notings of the committee meetings, terming them as “secret”.
Committee Quotes About Political Funding
* Wanchoo committee report, 1970 (Section 2.20): "In this connection, it has been pointed out that large funds are required to meet election expenses and it is common knowledge that these are financed to a great extent by wealthy persons with lots of black money. According to some, this is not the cause but an outlet for black money. The situation is stated to have been further aggravated by the ban imposed recently on donations by companies to political parties."
* Dinesh Goswami committee report, 1990 (Section 1.6): "The role of money and muscle power at elections ... rapid criminalisation of politics .... increasing menace of participation of non- serious candidates; form the core of our electoral problems."
* Vohra committee report, 1993 (Section 10.1): "The various crime Syndicates/Mafia organisations have developed significant muscle and money power and established linkages with government functionaries, political leaders and others to be able to operate with impunity".
* The Supreme Court in its judgement (20/3/1997) in connection with the murder of political activist Naina Sahni: “..have developed an extensive network of contacts with bureaucrats, government functionaries at lower levels, politicians, media personalities, strategically located persons in the non-Governmental sector and members of the judiciary”
Reforms
The Representation of the People Act (RPA) of 1951 provided the first set of rules for the conduct of elections to the Houses of Parliament and State Legislatures. Over the years the RPA has been amended to reflect changing circumstances. Political party funding reform has been enacted via changes to the Company Law, via Money Bills, the Income Tax Law, through Supreme Court orders, etc.
Anti Defection Law
The Anti-Defection Law was passed in 1985 through the 52nd Amendment to the Constitution. The main intent of the law was to combat “the evil of political defections” by elected politicians for the lure of office.It mainly focus on crime background of any political leader before registering his/her name for election.
Association for Democratic Reforms (ADR)
[1994] A writ petition was filed by ADR in the Supreme Court for direction to implement the recommendations made by the Law Commission in its 170th report regarding:
* Debarring a candidate from contesting elections if charges have been framed against him/her by a Court in respect of certain offences.
* Candidates be required to furnish details of criminal cases pending against them.
* Candidates be required to provide true and correct statement of assets owned by them.
[2015] A PIL was filed by ADR to bring political parties under the Right to Information Act 2015, on the basis of the ruling by the CIC of 03/06/2013 (see below)
[2015] A PIL was filed by ADR requesting the constitution of an independent body to administer enforcement of Foreign Contribution (Regulation) Act, 2010 (FCRA)
Central Information Commission (CIC)
[1969] Under Section 293a of the Companies Act, 1956, companies were prohibited from making contributions to a political party or for any political purpose. The ban on company donations was not accompanied by an alternate source of funding as a substitute, e.g. state funding. This greatly increased politicians' reliance on black money to fund elections.
[1985] The Companies (Amendment) Act, 1985 permitted companies to make political contributions up to 5% of the average net profit of the last three years provided a resolution authorising such contributions is passed by the Board of Directors and the company discloses the contribution details in its Profit & Loss Account. It has been noted by some observers that companies continued to make donations to political parties in black money preferring the anonymity of this route. The cap was increased to 7.5% in 2013.
[2008] Tax filings of political parties remained confidential and were not disclosed to the public until 2008. Using the provisions of the Right to Information Act 2005, the CIC allowed disclosure of parties' income tax returns
[2013] The CIC ruled that political parties can be held to be public authorities and come within the ambit of the Right to Information Act Companies Act.
[2013] After the CIC ruling, all the political parties banded together and backed "The Right to Information (Amendment) Bill, 2013" which was introduced in the Lok Sabha on August 12, 2013, amending the original act (RTI 2005). The Amendment removes political parties from the scope of the definition of "public authorities". Thus political parties in India no longer fall under the dimensions of RTI. This amendment was met by huge protests from the civil rights societies and the general public.
Confederation of Indian Industry (CII)
[1993] A task force set up by the CII recommended that corporate contribution by companies be made tax-deductible and that shareholder confirmation of board decisions about political contribution be required. It also recommended state funding of elections with the funds to be raised either by a cess on excise duty or through contributions by industry to an elections fund pool., i.e. a tax on industry to finance campaigns. Money would be distributed according to a formula. Nothing came of this.
Election Commission of India (ECI)
[1998] ECI Press Note, 15 January 1998: Partial state subsidy in the form of free time for seven national and 34 state parties on the state-owned television and radio networks totalling 61 hours of each of the two media. The limit of election expenditure imposed on contesting candidates is revised from time to time by the Union of India through the ECI.
[2011] Big states: Rs. 40,00,000 for Lok Sabha elections and Rs. 16,00,000 for State Assembly elections.
[2014] Big states: Rs. 70,00,000 for Lok Sabha elections and Rs. 28,00,000 for State Assembly elections. According to a study by ADR, analysis of the expenditure statements of candidates to the ECI after the poll results were announced, indicated that the average election expenditure was 49% of the limit imposed. This seems to indicate that these limits have no practical value. There is no limit on the expenditure a party can incur during its election campaigns.
Supreme Court judgement on RPA overturned
[1975] Parliament amended the Representation of Peoples Act to nullify a Supreme Court judgement of 1974 (see Supreme Court Rulings below). Specifically, Parliament amended Explanation 1 to Section 77(1) of the RPA so that party and supporters’ expenditures not authorised by a candidate did not count while calculating their election expenses. This effectively opened a back door to unlimited spending and is a typical example of the conflict of interest inherent in parliamentary legislation in areas of self-interest.
Income Tax Law
[1979] Taxation Laws (Amendment) Act 1978 exempted income received by a political party by voluntary contributions from any person from inclusion in the total party income. Income Tax exemption was allowed only if (a) audited accounts were maintained and (b) the party maintains a record of the names and addresses of all contributors donating Rs. 20,000 or above. This is generally considered a loophole to allow unlimited donations by simply breaking up larger donations into smaller ones....
Supreme Court Rulings
[1974] The Supreme Court ruled in “Kanwar Lala Gupta vs Amar Nath Chawla & Ors” that party spending on behalf of a candidate should be included in calculating that candidate's election expenses in order to determine whether the election expenditure limit had been violated. This was nullified by amending the RPA in 1975.
[1997] On December 18, 1997 in Writ Petitions Nos. 340-343/93 Vineet Narain and other versus Union of India and others (aka Jain Havala Case), the Supreme Court issued directions to establish institutional and other arrangements aimed at insulating the CBI from outside influences. The judgment also declared the Single Directive null and void. The Single Directive was a set of executive instructions issued to the CBI by the Central Government prohibiting it from initiating inquiry/investigation against officers of the rank of joint secretary and above without obtaining prior permission of the government.
[2013] NOTA was introduced in India following the 2013 Supreme Court directive in the People's Union for Civil Liberties vs. Union of India judgment. The Court directed the Election Commission to introduce a “ None of the Above [NOTA] ” option into the Electronic Voting Machines. This allows voters the option of expressing their dissent against all the contestants. For instance, In Kerala, a group of women activists urged people not to elect a candidate if no woman was present in the fray. In Tamil Nadu, a youth group campaigned for NOTA as a protest vote against corruption.
Finance Bills [2017]
On February 1, 2017, The Finance Bill (2017) was introduced in Lok Sabha.
Background
Before the bill came into effect,
(i) - a company donating to a political party could contribute up to 7.5% of the average of its net profits in the last three financial years.
(ii) - And it was required to disclose the amount of contributions made to any political parties along with the name of the political parties to which such contribution was made.
Amendments in the Finance Bills [2017]
The Finance Bill [2017] amends to
(i) Remove the cap limit on the companies for contributions that they could make to any political parties.
(ii) And also removing the requirement of a company to disclose the name of the political parties to which it was contributing.
The bill further adds that "contributions will have to be made only through a cheque, bank draft, electronic means, or any other scheme notified by the government to make contributions to political parties."
(iii) It introduces "Electoral Bonds" as a means to make anonymous contributions to political parties. These bonds will be issued by the State Bank of India.
Electoral Bonds
Introduced with the Finance Bill (2017), Electoral Bonds allow donors to pay political parties with banks as an intermediary. These bonds can only be issued by the State Bank of India.
Range of a bond - Rs 1000 to Rs 1 crore.
Availability - 10 days each in the months of January, April, July, and October, with an additional period of 30 days specified by the central government in the year of general elections.
Validity - 15 days (from the date of issue)
Any person who is a citizen of India or entities incorporated or established in India can buy electoral bonds. And then donate it to the political party of choice "anonymously". To buy and transfer these bonds, the person or entity has to provide some authentication details to the bank but the names of donors are kept confidential, even from political parties. Anonymity is intended to prevent the political victimization of the donor.
There is no limit on the quantity of bonds that can be purchased by an individual or a company. The bonds donated to political party must be encased within 15 days through its verified account, failed to so, the issuer of these bonds i.e.State Bank of India deposits these into Prime Minister's Relief Fund.Explained: Why is the electoral bond scheme being opposed by transparency activists?
Criticism of Electoral Bonds
In a series of articles investigating the Electoral Bonds, Nitin Sethi with Huffpost India studied a compilation of documents collected through RTI queries by Commodore Lokesh Batra over a span of 2 years. The RTI documents went on to revel serious problems with the Electoral Bonds Scheme and its implementation. In July 2022, the amount of donations through electoral bonds crossed Rs 10,000-Crore mark as per government data.
Election Commission
The Election Commission expressed its opposition to Electoral Bonds during a hearing on the electoral bonds issue in the Supreme Court, citing its affidavit filled with the Law Ministry in 2017, terming it "a retrograde step". The poll panel led by senior advocate Rakesh Dwivedi during the course of the hearing expressed concern over the anonymity of donor identity and clauses that may allow for shell companies and foreign entities/companies to fund (with no cap limits) and influence Indian elections. The Election Commission argued in court that "the scheme "legalizes anonymity" but the right to vote means making an informed choice - knowing the candidate was only "half of the exercise" and citizens must know the parties which are funding the candidates."
In a letter to Law Ministry written in May 2017, Election Commission stated “In a situation where the contribution received through electoral bonds are not reported, on perusal of the contribution report of political parties, it cannot be ascertained whether the political party has taken any donation in violation of provision under Section 29(b) of the RP Act which prohibits the political parties from taking donations from government companies and foreign sources.”
Civil Rights Societies
The introduction of Electoral Bonds received huge criticism from the civil rights societies and even the public in general. The concept of donor "anonymity" threatens the very spirit of democracy. The Association for Democratic Reforms (ADR), a non-governmental organisation (NGO) argues that the additional amendments done in different Acts to pave the way for electoral bonds have "opened the floodgates to unlimited corporate donations to political parties and anonymous financing by Indian as well as foreign companies, which can have serious repercussions on Indian democracy". Opposition parties argue that this move keeps the political parties and the voters in dark, and at the same time only the ruling party has all the access to contribution records through state mechanisms like SBI and Income Tax Department.
In a statement Association for Democratic Reforms (ADR)stated that "It may also be noted that the printing of these bonds & SBI commission for facilitating the sale and purchase of the bonds is paid from the taxpayers’ money by the central government.” ADR along with Common Cause another non-profit organization has moved to Supreme Court in 2017. Court had sought response from government and EC. However till March 2021 the case has not been heard in detail.
RBI
An investigative article published by HuffPost India on November 18, 2019, examines a series of documents which show how the Reserve Bank of India was critical of the Electoral Bonds Schemes on multiple occasions, and how the Government of India ignored the concerns of the RBI time and time again and went ahead with its plans for the Electoral Bonds. The RBI said that the bonds would "undermine the faith in Indian banknotes and encourage money laundering."
Switch to a proportional system
Calls for a switch from First past the post to a proportional system have been growing since 2017, in lights of several states elections whose results have shown large wins in seats by parties receiving far less than 50 % of the popular votes
Important events in India's History of Electoral Reform
These can be summed up in the table shown below:
Challenges to electoral reform
Improving the electoral process has manifold challenges:
* Transparency and Honesty: Provide political parties with legal ways of sourcing funds in adequate quantities. Voters should ideally have all information on political activities, including political finance, before casting their votes. In addition, parties and elected officials have a duty to serve the public interest; therefore, their “business” cannot be shrouded in secrecy 13 . Parties must also be weaned away from accepting funding from illegal sources.
* Accountability: This is required to mitigate the risks of conflict of interest and corruption in the political process.
* Responsiveness to change: Election funding reform must be constantly monitored for adverse side-effects and these must be corrected in a timely fashion. A method needs to be devised to be able to implement required re- form which is often diluted or even blocked by the political parties if it does not suit them.
* The "arms-race" effect: Find ways to reduce the overall cost of contesting elections for all parties and candidates while maintaining a level playing field for all.
* Criminals: Blocking the entry of criminal elements into the election process is a must. “Winnability” as the main criterion for choosing candidates must be strongly discouraged by the voters.
* Conceptualising corruption: Corruption needs to be conceptualised soundly else prescriptions will be flawed.
* Rigorous implementation of the law: Finally and most importantly, should ensure the rigorous implementation of existing laws to prosecute and disqualify politicians breaking the law, in a timely fashion. For instance, the ECI re- ported that during the Lok Sabha 2014 elections, around Rs. 300 crores of unaccounted cash, more than 17,000 kg of drugs and huge amount of liquor, arms, and other materials were seized. One does not hear of a correspondingly large number of candidates being disqualified.
Moving forward
It is expected that electoral reforms will contribute to better participation of the citizens in electoral practices, reduce corruption and strengthen democracy in India. More than 3000 crores were spent by the government for conducting the 2014 Loksabha elections.
The article been political party funding, the challenges it faces and the reform initiatives that have been undertaken over the years to contain the political corruption that has invaded Indian democracy. N. Ram concludes succinctly in his book:
"There is no such thing as political corruption as a self-contained category. If the objective is to understand corruption in India in its pervasiveness, its omnipresence, and its multifariousness, so that something meaningful and effective can be done about it, it needs to be approached as a problem not just of politics, or the economy or society, not to mention the moral sphere- but of political economy in its profound sense.
This is a long term undertaking, though necessary, if India is ever to move away from its thoroughly corrupt situation. Not all corruption is the same. Some forms of corruption are worse than others. e.g. the handover of land to mining companies disregarding the environmental consequences is different from giving money for votes. One needs to distinguish corruption that is grossly damaging from that which is less so.
Since the challenge is on many fronts, it must be responded to strategically, in stages, and with an eye to weakening and undermining corruption's base rather than concentrating on its symptoms.
In the short term: (a) strict implementation of existing laws to fight corruption rather than constantly creating new ones when a problem arises, and then not implementing it forcefully, (b) appeals to the judiciary to strike down regressive political finance legislation, (c) popular protests against harmful decisions taken by the government e.g. redefining coconut trees as grass to allow rampant tree felling to benefit some company, would help." | WIKI |
Talk:Baen's Bar
I don't think a merger is neceassary. There is a diffrence between a publishing house and an online community, thus the need for separate articles. Sure, we can merge them and make the Baen's Bar a redirect to a section of Baens Books, but I don't think it is a good idea. --Piotr Konieczny aka Prokonsul Piotrus 20:04, 7 Jan 2005 (UTC)
* Needs to be done. Otherwise, this article is ripe for being deleted per WP:WEB. It really doesn't assert notability at all on its own. -- Kesh 02:21, 19 January 2007 (UTC) | WIKI |
Describe Meiosis II or Homotypic division. from Biology Cell Cycle and Cell Division Class 11 Assam Board
Chapter Chosen
Cell Cycle and Cell Division
Book Chosen
Biology
Subject Chosen
Biology
Book Store
Download books and chapters from book store.
Currently only available for.
CBSE Gujarat Board Haryana Board
Previous Year Papers
Download the PDF Question Papers Free for off line practice and view the Solutions online.
Currently only available for.
Class 10 Class 12
Describe Meiosis II or Homotypic division.
Meiosis II is very similar to mitosis. It has the following stages which are -:
1. Prophase II. It occurs immediately after cytokinesis of meiosis I. The nuclear membrane disaapars and chromosomes become compact.
2. Metaphase II. The chromosomes arrange themselves on the equator. Each chromosome is attached to the spindle fibres of opposite poles by its centromeres. The spindle microtubules from the opposite poles attach to the kinetochores of sister chromatids.
3. Anaphase II. The centromere of each chromosome divides into two sister chromatids. Thus two chromatids of each chromosome move towards opposite poles.
4. Telophase II. The group of young chromosomes at each pole arranges itself into a daughter nucleus. The nuclear membrane is formed. Nucleoli appear and spindles disappear. takes place resulting in the formation of four daughter cells.
226 Views
What is polyteny ?
Polytene chromosomes are giant chromosomes which are formed due to repeated DNA replication without cell division. They are found in some insects.
708 Views
Name an important event that occurs during meiosis and not during mitosis.
Crossing over takes place during meiosis but not during mitosis.
530 Views
Namethe five phases of of Prophase I.
The five phases of prophase 1 are
i. Leptotene
ii. Zygotene
iii. Pachytene
iv. Diplotene
v. Diakinesis.
620 Views
Name the process in which there is an exchange of genetic material between non-sister chromatids of homologous chromsomes during meiosis.
Crossing over.
978 Views
What are two types of cells on the basis of presence or absence of nucleus ?
On the basis of the presence and absence of nucleus the cells are divided into two types Eukaryotic and prokaryotic cells.
533 Views | ESSENTIALAI-STEM |
CNS Part 3 Flashcards Preview
Physiology > CNS Part 3 > Flashcards
Flashcards in CNS Part 3 Deck (62):
1
Special senses vs somatosensory differences in receptors
Special- high density of receptors in target organ, discrete travel and bundle processing
Somatosensory- diffuse pattern, covers a large field
2
Same second messengers can have __ responses based on cell
Different
3
Sensory receptors transduce enviro changes into electronic signals. Connect to __ __ neurons which relay info via __ __ to brain and spinal cord. __ __ neuron cell bodies housed in __ __ and __ __ __
Primary afferrent
Action potentials
Primary afferrent, dorsal root, cranial nerve ganglia
4
Cranial nerve ganglia have a __ process that extends dismally within a __ __ to sensory receptors, and a __ __ that enters the spinal cord or brain through a __ __ or __ __
Peripheral, peripheral nerve
Central process, dorsal root or cranial nerve
5
Each __ __ __ has a specific cutaneous field
T4 Dermatome innervated by
DRG
T4 DRG
6
Exteroceptive info: interaction of __ with the __
2 types
Skin, enviro
Fine discriminatory touch and pain/temp
7
Fine discrim touch powered by 2
Pain and temp powered by 2
A alpha and a beta
A delta and c (fast and slow pain )
8
Proprioceptive info: body and limb position informing ___
Receptors in __, __, and __
Movement
Joints, muscles, tendons
9
Enteroceptive info: __ __ of the body. Ex __ in __ or __
Internal status
Stretch, bladder, gut
10
One thing all sensory receptors (thermal, chemical, pain, etc) is stimuli causes what
Changing membrane permeability to get action potential
11
Receptor potentials can change by 5
Mechanical, chemical, temp, electromagnetic radiation, pain
12
Process same for all receptor potentials when get to what level
Action potential
13
Sensory receptors will adapt either __ or __ to __ stimulation by a variety of mechanisms
Partially or completely, constant
14
Mechanosensitive afferrent fibers __ __ __ or __ __
Tactile fibers fast
Slow adaptation
15
Type I mechanoreceptive afferrent fibers have __ receptive field. Higher density of these fibers leads to better __ __ discrimination
Type II fibers have a ___ receptive field
Small, two point
Large
16
If a pin pricks finger what would type I vs type II tell you
Type I- exactly where prick is
II- something stabbing your finger but can't tell where
17
Fast adapting: get message __ at first and stop __ with time
Slow adapting is ___
Loudly, firing
Opposite
18
What kind of fibers are:
Meisner corpuscles
Pacinian corpuscles
Fast adapting 1
Fast adapting 2
19
What kind of fibers are merkels disks and ruffini endings
Slow adapting 1 and slow adapting 2`
20
More receptors leads to a ___ image
Clearer
21
Receptor potential vs stimulus intensity is a ___ patterned chart because can't sense change above ___
Curved not linear
100%
22
Spatial location: __ of neurons within a __ __
Population, receptive feel
23
Stimulus intensity: frequency of __, __ of sensory receptors involved
Action potential, number
24
Stimulus frequency: ___ interval
Inter stimulus
25
Each nerve tract ___ at a specific point in the CNS and carries a selective sensory modality. (Pain and mechanoreceptors not carried by same tract)
Terminates
26
Sensation is perceived when a specific stimulated __ leads to specific __ in the CNS. Ex separate dedicated cell populations in __ and __ __
Nerve, areas
Thalamus, somatosensory cortex
27
Alteration of the specific nerve tracts activity will only change the __ of the stimulus (___) vs changing the __ of stimulus perceived (__)
Intensity, quantitative, type, qualitative
28
Dorsal column medial leminiscal
1. Highly __ touch
2. __ sensations (__ gradation of intensity)
3. __ sensations (__)
4. __ contact sensation
5. __ position
6. __ sensations
1. Localized
2. Touch, fine
3. Phasic, vibratory
4. Skin
5. Joint
6. Pressure
29
DCML
Composed of __ __ fibers transmitting signals at __-__m/sec
__ spatial orientation
Large myelinated, 30-110, more
30
Anterolateral (spinothalamic) system
1. __
2. ___ sensations
3. __ touch and ___
4. __ and __
5. ___ sensations
Pain
Thermal
Crude, pressure
Tickle and itch
Sexual
31
Spinothalamic system composed of ___ __ fibers carrying signals at __m/sec
__ spatial orientation
Smaller myelinated, 40
Less
32
DCML
Transmits signals __ to the __ via the __ columns in the spinal cord.
Signals synapse in __ __ nuclei
Upward, medulla, dorsal
Dorsal column
33
DCML
Where lower body and leg synapses
Where upper body and arm synapses
Nucleus gracilis
Nucleus cuneatus
34
DCML steps
1. Transmits signal to ___
2. Signals synapse in __ __ __
3. 2nd order neuron axons then __ __ side of medulla and project to the __ via the __ __ (__, __)
1. Medulla
2. Dorsal column nuclei
3. Cross opposite, thalamus, medial lemniscus (pons, midbrain)
35
Spinothalamic
1. Enters the spinal cord from the __ __ __ _ and synapses in the __ __
2. Cross to the __ cord
3. Travel upward through __ and __ __ columns
4. Tracts terminate at all levels of __ __ __ and __
1. Dorsal spinal nerve roots, dorsal horns
2. Contra lateral
3. Anterior and lateral white
4. Lower brain stem, thalamus
36
Which can be modulated by anesthesia more, DCML or spinothalamic
Spinothalamic
37
Somatosensory pathways in __ __ are where signals help us determine __ signal is __ __
Some areas have a __ field and many signals, __ space dedicated to them in ___
Post central gyrus, where, coming from
Large, larger, trunk
38
___ pathway allows us to have conscious awareness of body movements and local ___
These pathways carry both __ and __ info to __ and __ __
Spine cerebellar, reflexes
Cutaneous, proprioceptive, cerebellum, spinal cord
39
A delta (__, __ __ pain) and C fibers (__, __, __ localized) synapse in the __ matter of the __ __ of spinal cord
Fast, well localized
Slow, dull, less
Gray
Dorsal horn
40
A delta synapses at lamina __, __, and __
C synapses at lamina __ and __
I, V, X
I, II
41
Central pain pathways 3
Spinothalamic
Spinoreticular
Spinomesencephalic
42
Dorsal column nuclei: __ order neurons
In the __. The dorsal column __ contain these neurons.
Second
Medulla, nuclei
43
Diff between dorsal column neurons and primary afferrent neurons:
- receptive fields yield __ area (__ primary afferrent fibers synapse on__ dorsal column neuron)
-several types of __ __ neurons (diff modalities) __ on the __ __ __ allowing greater __ in sensory responses
-dorsal column neurons often modulated by __ __ that provide __ to the served receptive fields
-Greater, multiple
-primary afferrent, converge, second order neurons, diversity
-adjacent interneurons, inhibition
44
Thalamus: __ order neurons
-these project to __ __
-__ receptive field
-__ and __ circuits
-__ __ cycle and __ influence excitability
-__ and __ have high somatotopic organization
Third
-somatosensory cortex
-small
-inhibitory and excitatory
- sleep wake, anesthesia
-Vpl, vpm
45
Behavior (reflective and voluntary muscle movement or glandular secretion) is triggered by ___ neurons which activate __ neurons
Central, motor
46
Upper motor neurons __ synapse on lower motor neurons __ __ or __ __ whose axons leave CNS to affect periphery
Brain, spinal cord or anterior root
47
Supplementary motor areas help with what
Fine coordinated movements, complex and require more stim
Posture, vocalization, bilateral movements
48
Premotor area involved in __ __ and have __ neurons which help do what
Complex movement
Mirror neurons- mimic what you see someone else doing
49
Consulate motor areas. __ stimulus needed, imp in __
Stronger, coordination
50
Cerebellum: essential for __, highly __ muscle movements. And for __ of movement. Makes __ adjustments to movement. ___ __, learns from mistakes
Complex, coordinated
Sequencing, corrective
Muscle memory
51
Basal ganglia include __ __, __, __ __, __ __, and __ nucleus
Caudate nucleus
Putamen
Globus pallidus
Substantia Nigra
Subthalamic nucleus
52
Basal ganglia don't receive input from _ _ but do receive direct input from __ __ via the __
Spinal cord
Cerebral cortex, thalamus
53
Basal ganglia: lesions here produce __ __ and __
Abnormal movement and posture
54
Motor neurons controlling somatic musculature form a column of cells in the __ __ of spinal cord
Ventral horn
55
Interneurons communicating between __ __, descending motor axons from brain, and primary ___ are located __/__ horn unless they supply axial muscles then __ ventral horn
Motor neurons
Affarents, intermediate/lateral
Medial
56
Corticospinal tract
__ cells send signals at __m/sec
Betz, 70
57
Upper motor neurons propagate in __ parts of brain depending on __
Different, tract
58
Memory storage via increased __ of synapses between neurons following previous neural activity
Habituation is what
Sensitivity
How we forget things
59
What is facilitation
What is declarative and skill memory
Keeping memories
Memory of time and place, interactions
Muscle memory
60
Short term memory
Lasts a few __ to __
Reverberating circuit- __ circuit if awareness not __ on it
Seconds, minutes
Lose, focused
61
Intermediate long term memory
Lasts __ to __
Habitiuation: progressive __ __ closure
Facilitation: __ released, activates receptor, activates second messenger __, activates a __ that Inactivates a __ channel in min to weeks, prolonged __ __ with large amounts of __ released
Minutes to weeks
Calcium channel
Serotonin,
Camp, kinase, k
Action potential, calcium
62
Long term memory
__ strengthening
1. Increase in vesicle __ sites for secretion of __
2. Increase in number of __ __ released
3. Increase in number of __ __
4. Changes in structures of __ __ that permit transmission of __ signals
__ of memory
Synaptic
Release, transmitter
Transmitter vesicles
Presynaptic
Dendritic spines, stronger
Consolidation | ESSENTIALAI-STEM |
Assessment of the Battle of Long Tan
The Battle of Long Tan took place on 18 August 1966 in Phuoc Tuy Province, South Vietnam during the Vietnam War between Viet Cong and North Vietnamese units from the Viet Cong 275th Regiment, possibly reinforced by at least one North Vietnamese battalion, and D445 Provincial Mobile Battalion, and Australian forces from D Company, 6th Battalion, Royal Australian Regiment (6 RAR). Although the Australians were heavily outnumbered and almost overwhelmed by the Viet Cong the battle ended in a decisive victory for them, establishing their dominance over the province. This perspective however sharply contrasts with competing interpretations in which the D445 Battalion had garnered strong political support in Phuoc Tay. Furthermore, the local D445 Battalion was redeployed northwards against the newly deployed 11th Armored Cavalry Taskforce a month later and so the true significance of the battle is called into question.
However, in the years since it was fought the intentions of the Viet Cong, in particular in mortaring the Australian base at Nui Dat on the night on 16/17 August, have been much debated. This has included the possibility that the Viet Cong had intended to attack and overwhelm Nui Dat, with the initial plan to mortar the base to draw a response force into an ambush after which the base would be attacked and captured, but that they had been prevented from doing so after clashing with D Company, 6 RAR. A second possibility was that they may have had the more limited aim of drawing D Company into an ambush to destroy it and secure a small victory over an isolated force. Finally, it was possible no ambush was planned at all, and that the Viet Cong had been moving on Nui Dat in regimental strength when they unexpectedly ran into D Company, resulting in an encounter battle. Later interviews conducted by an Australian veteran of the battle Terry Burstall, with commanders of the 275th Battalion and D445 Battalion including the battle commander and later Deputy Defense Minister Nguyen Thoi Bung indicate that mortaring was intended to draw out the 6 RAR out of their base, in which an ambush was to occur followed by a retreat before artillery and air support can be utilised, typical of the grab-by-the-belt tactic.
Background
The Battle of Long Tan (18 August 1966) took place in a rubber plantation near Long Tan, in Phuoc Tuy Province, South Vietnam during the Vietnam War. The action was fought between Australian forces and Viet Cong and North Vietnamese units after 108 men from D Company, 6th Battalion, Royal Australian Regiment (6 RAR) clashed with a force of 1,500 to 2,500 from the Viet Cong 275th Regiment, possibly reinforced by at least one North Vietnamese battalion, and D445 Provincial Mobile Battalion. The 1st Australian Task Force (1 ATF) had arrived between April and June 1966, constructing a base at Nui Dat. After two months it had moved beyond the initial requirements of establishing itself and securing its immediate approaches, beginning operations to open the province. Meanwhile, in response to the threat posed by 1 ATF the 275th Regiment was ordered to move against Nui Dat. For several weeks Australian signals intelligence (SIGINT) had tracked a radio transmitter moving westwards to a position just north of Long Tan; however, extensive patrolling failed to find the unit. At 02:43 on the night of 16/17 August, Viet Cong mortars, recoilless rifles (RCLs) and artillery heavily bombarded Nui Dat from a position 2000 m to the east, before being engaged by counter-battery fire. The following morning B Company, 6 RAR departed Nui Dat to locate the firing points and the direction of the Viet Cong withdrawal. A number of weapon pits were subsequently found, as were the positions of the mortars and RCLs.
D Company took over the pursuit around midday on 18 August. At 15:40 the lead element, 11 Platoon, clashed with a Viet Cong squad and forced them to withdraw. Shortly after resuming the advance, at 16:08 the platoon came under small-arms and rocket-propelled grenade fire from a flank after drawing ahead of the other platoons and was isolated. Pinned down, they called for artillery support as a monsoon rain began, reducing visibility. Beginning as an encounter battle, heavy fighting ensued as the advancing battalions of the Viet Cong 275th Regiment attempted to encircle and destroy the Australians. After less than 20 minutes more than a third of 11 Platoon had become casualties, while the platoon commander was killed soon after. 10 Platoon moved up on the left in support but was repulsed. With D Company facing a much larger force, 12 Platoon tried to push up on the right at 17:15. Fighting off an attack on their right before pushing forward another 100 m they sustained increasing casualties after clashing with several groups moving around their western flank to form a cut-off prior to a frontal assault. Opening a path to 11 Platoon yet unable to advance further, they threw smoke to mark their location. Nearly out of ammunition, at 18:00 two UH-1B Iroquois from No. 9 Squadron RAAF arrived overhead to resupply D Company. Meanwhile, the survivors from 11 Platoon withdrew to 12 Platoon during a lull, suffering further losses. Still heavily engaged, both platoons then moved back to the company position covered by artillery.
By 18:10 D Company had reformed but was still in danger of being overrun. A Company, 6 RAR was dispatched in M113 armoured personnel carriers from 3 Troop, 1st APC Squadron to reinforce them. Meanwhile, B Company headquarters and one platoon were still returning to base and were also ordered to assist. Leaving Nui Dat at 17:55, the carriers moved east, crossing a swollen creek before encountering elements of D445 Battalion attempting to outflank D Company and assault it from the rear. The Viet Cong were caught by surprise as the cavalry crashed into their flank and with darkness falling they broke through, while B Company entered the position at 19:00. Arriving at a crucial point, the relief force turned the tide of the battle. The Viet Cong had been massing for another assault which would have likely destroyed D Company, yet the firepower and mobility of the armour broke their will, forcing them to withdraw. Continuing past D Company the relief force assaulted the Viet Cong, before moving back to the company position at 19:10. The artillery had been almost constant throughout and proved critical in ensuring the survival of D Company. A later interview with officers involved in the battle indicate some men of the D445 were killed while capturing two wounded Australians, with all having been killed in the barrage. By 19:15 the firing had ceased and the Australians waited for another attack. However, after no counter-attack occurred they prepared to withdraw 750 m west. With the dead and wounded loaded onto the carriers D Company left at 22:45, while B and A Company departed on foot. A landing zone was then established by the cavalry with the evacuation of the casualties finally completed after midnight. Forming a defensive position ready to repulse an expected attack they remained overnight, enduring the cold and heavy rain.
The Australians returned in strength the next day, sweeping the area and locating a large number of Viet Cong dead. Although initially believing they had suffered a major defeat, as the scale of the Viet Cong's losses were revealed it became clear they had won a significant victory. Two wounded Viet Cong were killed after they moved to engage the Australians, while three were captured. The bodies of the missing from 11 Platoon were also located. Two men had survived despite their wounds, having spent the night in close proximity to the Viet Cong as they attempted to evacuate their own casualties. Due to the likely presence of a sizeable force nearby the Australians remained cautious as they searched for the Viet Cong. Over the next two days they continued to clear the battlefield, uncovering more dead as they did so. Yet with 1 ATF lacking the resources to pursue the withdrawing force, the operation ended on 21 August. Heavily outnumbered but supported by strong artillery fire, D Company held off a regimental assault before a relief force of cavalry and infantry fought their way through and forced the Viet Cong to withdraw. Eighteen Australians were killed and 24 wounded, while Australian official reports claim the Viet Cong lost at least 245 dead which were found over the days that followed. Actual figures are in dispute, by both veterans of the Australian and North Vietnamese side, with allegations of body-count inflation in order to serve public-relations purposes. A decisive Australian victory, Long Tan proved a major local setback for the Viet Cong, indefinitely forestalling an imminent movement against Nui Dat and establishing the task force's dominance over the province. Although there were other large-scale encounters in later years, 1 ATF was not fundamentally challenged again.
Initial Australian hypotheses
In the wake of the battle the Australians were left to speculate on the reason it occurred. One hypothesis was that the Viet Cong had intended to attack and overwhelm Nui Dat, with the initial plan to mortar the base to draw a response force into an ambush after which the base would be attacked and captured, but that they had been prevented from doing so after clashing with D Company. A second possibility was that they may have had the more limited aim of drawing D Company into an ambush to destroy it and secure a small victory over an isolated force. Finally, it was possible no ambush was planned at all, and that the Viet Cong had been moving on Nui Dat in regimental strength when they unexpectedly ran into D Company, resulting in an encounter battle. The evidence suggested they intended an attack on Nui Dat in some form, while the lack of prepared positions from which to mount an ambush made this unlikely. Brigadier David Jackson—Commander 1 ATF—believed the Viet Cong had been on their way to attack Nui Dat on the night of 18/19 August when D Company intercepted them and this was supported by information from a prisoner captured afterwards. They were carrying large quantities of ammunition and may have had sufficient strength to seriously damage the base, even if its defences were likely strong enough to withstand such an attack. Yet, from the earliest Jackson had felt the Viet Cong would have to engage 1 ATF in a major battle if they wished to retain control of Phuoc Tuy, and this interpretation fitted his previous thinking. In dispatching patrols east of Nui Dat following the mortar attack on 16/17 August Jackson seemingly reacted to his opponent's first move, and he may have allowed himself to be shaped into responding as the Viet Cong had intended.
In his after action report Lieutenant Colonel Colin Townsend—Commanding Officer 6 RAR—wrote that he believed D Company had disrupted a regimental attack on the 1 ATF base. Yet years later he stated that he doubted the Viet Cong ever intended attacking Nui Dat. He felt they would have gained more from attacking a soft target such as Ba Ria and that the defences at Nui Dat would have been sufficient to withstand a regimental assault, having been improved significantly in the 11 weeks since its occupation and protected by patrols and overwhelming artillery support, even if they were still to be fully developed. However, there were suspicions a battalion from the 274th Regiment was moving towards Nui Dat from the west at the same time the 275th Regiment approached from the east, and if true such an attack may have been feasible, even if it still would not have achieved the nine to one superiority communist doctrine required. The southern side of the base was only lightly defended and an assault from that direction would have allowed the Viet Cong to attack the gunline first, and if they succeeded in breaking-in would have then crossed 500 m of open ground before reaching Headquarters 1 ATF. On the other hand, Major Noel Ford—Officer Commanding B Company, 6 RAR—believed the mortar attack served to lure an Australian reaction force into an ambush, arguing the Viet Cong would have been unlikely to telegraph their intentions to attack Nui Dat and that they had left a clear trail for any force dispatched to find the mortar base plate and RCL positions. Townsend disagreed, arguing the mortar crews and RCL teams had actually tried to hamper the follow-up by breaking into small groups, indicating that no such trap had been planned. Meanwhile, Major Harry Honnor—Officer Commanding the 161st Battery, Royal New Zealand Artillery attached to 6 RAR in direct support—believed the bombardment had been used by the Viet Cong to register targets and that D Company had stumbled across the force as it was preparing to launch an assault on Nui Dat two days later, with the battle that ensued preventing this from occurring.
A year after, Nguyen Van Nuong (alias Loc), a former Viet Cong soldier who had rallied, claimed to have been second-in-command of a platoon from D445 Battalion at Long Tan. During questioning he stated they had planned to destroy Nui Dat to allow further operations in Phuoc Tuy, with the force consisting of three battalions from the 275th Regiment, D445 Battalion and several medical units; in total some 2,000 men. The Viet Cong had estimated Australian strength at Nui Dat at 3,000 men and planned to mortar the base to draw a response force into an ambush by two battalions from the 275th Regiment and D445 Battalion, while the remaining battalion would capture Nui Dat. They expected to quickly overwhelm the ambushed force and any relief force, thereby leaving the base relatively undefended. Loc said D445 Battalion's role was to close the rear of the ambush and that they taken only light casualties during the battle. Despite Viet Cong claims he believed only 100 Australians had actually been killed or wounded, and that the official number of Viet Cong casualties was 200 dead, although he had seen more than that on the battlefield and believed many more had died during the fighting. According to Loc the Viet Cong were concerned about 1 ATF's capabilities and would attempt to avoid contact in future. In accounting for the reason Nui Dat ultimately escaped attack it was surmised that D Company may have entered the killing zone before the ambush was prepared and because of this the third battalion may have been unable to be released. Other possibilities included the Viet Cong being forced to abandon that part of the plan by the weight of the artillery, or that they had overestimated the size of the Australian force and retained the third battalion to complete the ambush.
The information from Loc was consistent with that known or suspected by 1 ATF, and other than a single battalion overwhelming Nui Dat, was considered plausible. Yet Smith was adamant D Company had not been ambushed, believing the action to have been an encounter battle regardless of what may have been planned. He argued that the troops in the rubber plantation were not sited for an ambush, while the presence of 2,000 to 3,000 men so close to Nui Dat without prepared positions indicated they were still moving when the first contact occurred. Equally, D Company had been left in possession of the dominant terrain and was not drawn into a killing zone as the plantation offered too much concealment, no effort had been made to cut them off from any relief force sent from Nui Dat, no artillery or mortars were fired into the engagement area, while the thick vegetation to the north prevented the Viet Cong manoeuvring into a favourable position. He reasoned that an ambush would have been more effective near the original base plate position as that was the only location they could have been sure the Australians would investigate given they had no way of knowing D Company would move another 1500 m east after the handover with B Company where they contacted the 275th Regiment. Finally, communist ambushes were doctrinally completed in less than three hours, but Long Tan had continued for over four. As such Smith concluded that since the tactics used by the Viet Cong had been contrary to many of the principles of an area ambush the battle was unlikely to have been one. McNeill argues though that too many facts may be missing to make a conclusive assessment of Viet Cong intentions as to date no definitive Vietnamese account is available, while according to Ham those that exist are contradictory or unreliable.
Later Vietnamese claims
In 1988 two former PAVN officers, Nguyen Thanh Hong and Nguyen Van Kiem (a later commander of D445 Battalion)—while being interviewed by the Australian official historian, Ian McNeill—claimed no more than two battalions had been involved, less than half the lowest Australian estimate. Kiem claimed the primary force consisted of D445 Battalion reinforced by one company of North Vietnamese from Headquarters Military Region 7 with a total of 720 men, while Hong said one battalion from the 275th Regiment had also been involved and that with D445 Battalion its total strength was 700 to 800 men. They believed an entire Australian battalion had been engaged along with two squadrons of APCs, and that it had been reinforced by a second battalion the following day, while there had been hundreds of Australian casualties, citing a BBC broadcast which reported 500 killed and 21 tanks destroyed. Against this, Kiem estimated total Viet Cong losses as approximately only 30, mainly from artillery fire. Hong agreed, stating the figure of 245 killed was exaggerated by a factor of 10. Estimated losses from D445 district-commander Colonel Bao stated information he had received at the time was that there was 150 losses including killed and captured for all units involved. Contradictory evidence is also given by the D-Company Commander, who stated he "didn't seen more than 50 bodies and I spent three days in the area."
Yet this was at odds with alleged Viet Cong records to have been captured by US forces of the diary of the 275th Regiment's commander listing that unit's losses as 500 dead. McNeill provides these figures based on the diaries of a future Deputy Defense Minister Nguyen Thoi Bung and overall battle commander; however, according to Earnest Chamberlain actual documentation of these diaries have not been corroborated. Captured soldiers later stated D445 Battalion's casualties had been 70 killed and 100 wounded. These claims were directly contradicted by Australian intelligence reports in which the D245 Unit suffered just 30 casualties. Claims were also contradicted by the Dong Nai history which stated both the 275th Regiment and D445 Battalion had been involved. Indeed, the majority of the dead buried after the battle were wearing green uniforms, and this coupled with their weapons and equipment, indicated they were either main force Viet Cong or North Vietnamese.
One of the three prisoners was from D445 Battalion and the other two were North Vietnamese who claimed to be from the 45th Regiment, perhaps unaware their unit had changed its name to the 275th Regiment when operating in the south. According to them it was the artillery battalion of this regiment which had bombarded Nui Dat. Years later many of Kiem's claims about the role of D445 Battalion were found to be misleading.
Both Kiem and Hong claimed the plan had been to mortar Nui Dat to draw a reaction force into an ambush, not to attack the base. They confirmed the dual military and political aim, emphasising the disruption caused by 1 ATF lodging at Nui Dat and the intention to affect Australian public opinion. The forced evacuation of Long Tan and Long Phuoc had curtailed the Viet Cong who regarded it as a liberated area, and it was chosen as the ambush site to demonstrate to the local population that they were still able to operate despite the Australian presence. Hong explained the ambush was sprung within range of the artillery at Nui Dat because they correctly assumed no reaction force would move outside the cover it provided, and instead planned on rapidly closing with and destroying it before artillery or air support could be brought in. They planned to occupy prepared positions in the rubber plantation and destroy whatever force was sent to locate the mortars following the attack on Nui Dat. A stop force had been placed to the east, while another was to the south to hold the Australians in place, reasoning that the thick undergrowth to the north would force them between the two. D445 Battalion was then to close the rear of the ambush, attacking from the north-west. A larger ambush would then have been staged outside artillery range along the withdrawal route subsequently used by the 275th Regiment. Meanwhile, the 274th Regiment was positioned north of Binh Ba astride Route 2 to ambush US forces should they try to relieve 1 ATF. Hong later asked: "How can you claim a victory when you allowed yourselves to walk into a trap that we had set? Admittedly we did not finish the job, but that was only because time beat us and your reinforcements arrived. I mean you did not even attempt to follow us up. How can you claim a significant victory from that sort of behaviour?"
While the plan outlined by Hong had many of the components of an annihilation ambush, and drawing the enemy out his base area was a standard communist tactic, several weaknesses were evident, including the lack of a means of neutralising the Australian artillery, the absence of indirect fire weapons in the ambush, and the comparatively small size of the ambushing force. Equally the plan to site a second ambush outside artillery range would have been ineffective as the Australians were unlikely to proceed that far unless their guns had followed. Hong believed the ambush failed because the soldiers at the front fired on 11 Platoon before the entire Australian force entered the killing zone, while it should have been opened from the rear against 12 Platoon. Had D Company been attacked from the rear the battle would have been more like an ambush, and they would have been in immediate danger, while it would likely have been irrelevant if the forward Viet Cong troops fired first as the Australians were already well into the plantation. Yet they had been unable to co-ordinate such a manoeuvre and D445 Battalion had more than three hours from the initial contact to close the gap at the rear and failed to do so. Regardless, a few issues cast doubt on this version of events. Firstly, if the Viet Cong had been in the plantation on 17 and 18 August preparing an ambush they would likely have been identified by the patrols from A or B Company, 6 RAR. Secondly, the alleged size of the force is questionable as just 700 men would have been insufficient to be certain of success, while according to communist doctrine it would have required more than a regiment to achieve overwhelming force. In the end the reaction of the Viet Cong indicted they had not detected D Company's presence in the rubber plantation until the first clash with 11 Platoon.
In 2005, Nguyen Nam Hung—deputy commander 274th Regiment—claimed the Viet Cong had indeed intended to destroy 1 ATF and liberate Ba Ria province. He stated that a two-phased offensive had been conceived, planning first to draw them into the open and destroy them in an ambush, and then attack the weakened base at Nui Dat. Ultimately though their goal had been political and the capture of Nui Dat was not considered important. According to the official D445 Battalion history, the officers of the units involved met in early August to finalise plans for the attack. The account claimed that following the mortar attack on 16/17 August, the force had formed up in a 3 km wide semi-circle at 10:15 on 18 August to lie in wait, with the 275th Regiment given the "middle battle" position and tasked with springing the ambush, while other units from the 275th Regiment and one company from D445 Battalion occupied the "front block" position near the village of Long Tan, and two companies from D445 Battalion under command of Major Sau Thu had been tasked with occupying the "back block" position to encircle the Australians by sweeping beneath their "tail" and destroying them. In support, the 80-strong Vo Thi Sau militia company, most of them women, was located nearby to help drag away the wounded following the battle. Thu later confirmed he had been ordered to lure the Australians out of Nui Dat, kill as many as possible, capture their weapons, and overrun the base. Yet this explanation also contains inconsistencies. In particular, the delay of over a day between the mortar attack and the battle suggests another purpose, and it is possible it may have served to test the Australian reaction and the speed with which counter-battery fire could be directed against them in preparation for a full-scale attack.
Conclusion
While Vietnamese sources maintain an ambush was planned at Long Tan, whether they also intended attacking Nui Dat remains uncertain. The fact a large Viet Cong force had not been identified in the area before midday on 18 August suggests no such force was there, and consequently it could not have been occupying an ambush position awaiting the arrival of the reaction force from Nui Dat. Despite this, it seems likely the 5th Division had planned an ambush but were ill-prepared due to a lack of co-ordination between the morning of 17 August and the selection and occupation of the intended site. As a result, they appear to have been unready when D Company entered the plantation and were likely somewhere on its eastern edge instead. The Viet Cong were probably still conducting their reconnaissance and establishing the ambush in the vicinity of where the rubber met the jungle when the battle occurred, while the Australians may have upset their plan by moving faster than the ARVN and US troops they had previously fought. What followed then appears to have been an encounter battle as the two advancing forces clashed on open ground in a meeting engagement. An alternative explanation is that D Company approached from an unexpected direction, physically dislocating the ambush. Indeed, Thu stated "...we didn't know how many... [the Australians] had in Nui Dat. We tried to draw them out... We thought they would go one way but... [they] went the wrong way and came behind us." In July 2006, David Sabben—platoon commander 12 Platoon—and Bob Buick—platoon sergeant 11 Platoon—visited the battlefield for a television story on 60 Minutes, where they met Nguyen Minh Ninh, former vice-commander D445 Battalion. Minh told them: "You won. But we won also. Tactically and militarily you won—but politically, we won. In this battle you acted out of our control—you [escaped] from our trap." According to journalist Cameron Stewart it was the first time a senior North Vietnamese officer had admitted being defeated at Long Tan. | WIKI |
How To Taper off Alcohol
-
External triggers are people, places, things, or times that offer opportunities to drink and remind a person of alcohol. Internal triggers are thoughts, emotions, or physical sensations that cause a person to drink. Being exposed to either form of a trigger can result in unwanted relapse.
The tapering down process can take place for the first several weeks or even months of the alcohol recovery timeline. There are many factors that can affect how long weaning off alcohol will take. Other people use medication-assisted treatment, which can help reduce alcohol cravings as you cut back. Lastly, engaging in alcohol therapy can also make a major difference in your healing journey. A therapist will work with you to create a personalized plan for cutting back and provide ongoing guidance and accountability.
Is it Better to Taper Off Alcohol or Quit “Cold Turkey?”
By weaning yourself from drinking, you give your brain the chance to adjust the amount of GABA it produces. The abrupt stop can shock your system and induce serious side effects due to the physical dependence from prolonged heavy drinking. With physical dependence, your body becomes accustomed to alcohol and reacts negatively when it doesn’t get any more. When coming off drugs or alcohol tapering is the best way to prevent severe withdrawal symptoms. Tapering is the act of gradually reducing alcohol use until completely abstinent. By creating a schedule to monitor your alcohol use you can see just how much of the substance you are drinking.
can you wean yourself off of alcohol
This means that there is little data about the best way to taper your drinking. However, some groups have published tapering examples to help assist those who are trying to quit drinking. Minor symptoms of alcohol withdrawal can start as soon as six hours after the last drink of alcohol. While cirrhosis scars from excessive drinking are irreversible, quitting alcohol and leading a healthier lifestyle can help your liver heal from alcohol-related liver disease. However, even the best-designed tapers can put you at risk for alcohol withdrawal syndrome. For this reason, you should never start an alcohol taper before clearing with your doctor.
Can people successfully use alcohol to taper off?
Her experience in behavioral health training, program development, and organizational leadership lead her to pursue a certification as a Project Management Professional in 2018. Each method has pros and cons, but regardless of which one you choose, you must have the knowledge and resources to make a quit attempt successful. If you’re trying to quit cold turkey and need help, please find https://www.healthworkscollective.com/how-choose-sober-house-tips-to-focus-on/ professional help from an addiction rehab center. Even if you think either option sounds like something that could work for your situation, we still recommend talking to a doctor before proceeding. The final step of tapering off alcohol is to define your alcohol-free days. By setting a specific day or time for a ‘beer-free’ day, you create a reminder of your commitment to sobriety.
• Generally, alcohol withdrawal starts within eight hours of the last drink, but can occur anytime within the first several days after you stop drinking.
• The initial dopamine rush you experience sends a message to the brain that this is pleasurable.
• It is important to only attempt a taper while under a doctor’s care.
• By weaning yourself from drinking, you give your brain the chance to adjust the amount of GABA it produces.
On top of this, quitting immediately — or “cold turkey” as many users and professionals call it — can be dangerous. Withdrawal symptoms are generally uncomfortable to deal with, but they can be fatal. To avoid or reduce the impact of the withdrawal symptoms, people struggling with alcohol may choose to progressively taper off alcohol rather than quit abruptly. Tapering off alcohol at home versus under medical supervision can also lengthen the process, for the sake of safety.
How To Wean Yourself off Alcohol Safely
Stress is a common trigger that makes it hard to modify your alcohol intake. Finding a different, more healthy way to unload stress may go a long way in helping someone succeed in cutting back on their alcohol use. Alcohol withdrawal occurs when neurotransmitters that combat the effects of alcohol on the nervous system suddenly have nothing to counteract them. Essentially, when an individual drinks, the brain amplifies certain activities to counterbalance the depressive effect alcohol has on it. When that numbing sensation disappears entirely, the brain is left dangerously overstimulated.
• The journey to sobriety is challenging, but with the right help and support, it’s an attainable goal.
• This is especially true if you are suffering from an alcohol use disorder.
• Furthermore, connecting with people who have embarked on a similar journey can be incredibly empowering.
• When symptoms become that serious, it can be difficult to seek help.
• Studies suggest that a tapering regimen that gradually decreases doses at fixed intervals can be beneficial.
• John C. Umhau, MD, MPH, CPE is board-certified in addiction medicine and preventative medicine.
It’s vital to speak with a medical professional before you begin weaning off alcohol to ensure you have a plan to do so safely. An alcohol addiction is dangerous, and the best way to reduce the risks of drinking is to stop using alcohol. Tapering your alcohol intake, or slowly reducing it over time, can help you avoid severe alcohol withdrawal symptoms.
Tips for Tapering Off Alcohol
This excess glutamate triggers alcohol withdrawal symptoms, which can be dangerous in some cases. Because alcohol withdrawal symptoms can be life-threatening in some cases, safety is crucial when you work towards sobriety. Little scientific evidence exists regarding tapers, but medical detox has been proven to be a safe and effectiveway to quit drinking. When you slowly taper your alcohol intake over time instead of quitting cold turkey, you reduce the likelihood of withdrawal symptoms.
can you wean yourself off of alcohol
However, achieving sobriety is a process that can take quite some time. To speed up the processes, many choose to try going “cold turkey,” aka, stop drinking and never pick up a glass again. Figuring out where to start your alcohol taper schedule can seem impossible. It may seem simple to count each drink you consume, but all drinks are not created equal. The alcohol content itself is important, and it depends on the percentage of alcohol, the proof of the alcohol and the actual amount of alcohol in the drink. Establishing new habits and routines, and dealing with the underlying causes of your drinking habits, are essential to lasting recovery.
Contact us today to learn more about the insurance we accept and find an alcohol addiction treatment program that can work well for your situation. Once your alcohol tapering schedule is complete, How to Choose a Sober House: Tips to Focus on the work of maintenance begins. Continue to abstain from alcohol and monitor cravings or urges to drink. Don’t try to go through the recovery process alone — reach out for help and support.
For instance, a young man named Alex, after a long day at work, looks forward to the calming embrace of a beer-filled glass. However, over time, that one glass becomes two, then three, and before he knows it, Alex finds himself in the throes of a gripping dependency. Like Alex, many of us may find ourselves caught in this ever-tightening cycle.
Category:
Comments (0)
Dodaj komentarz
Twój adres e-mail nie zostanie opublikowany. | ESSENTIALAI-STEM |
Page:Centennial History of Oregon 1811-1912, Volume 1.djvu/705
Rh washed away by a torrential cloud-burst a dozen years ago, but has since been rebuilt on higher and safer ground. The census shows the followiug growth of population. For the year 1890— 4.211.') ; lOOO— 1.151 ; I'JIU— 4,;557.
Gilliam county was organized in the year 1885, and named in honor of Colonel Cornelius Gilliam, an Oregon pioneer of 1844, and who was accidentally killed at Wells Springs in the territory of that county while in command of a regiment of Oregon volunteers who had gone out to capture the murderers of Dr. Whitman. Gilliam was a good man, a good citizen, a good soldier and deserved the honor, its county seat is Condon, in honor of Thomas Condon.
The growth of the population of the county is shown by the census reports as follows:
For the year 1890—3,600; 1900—3.201; 1910—3,701.
Wallowa county was organized on February 11, 1887, being carved out of the territory of Union county, and is located in the northeastern corner of the State. The county gets its name from the beautiful Lake and river which dis- tinguishes the beautiful mountain valley, the most attractive mountain scenery of the whole State, and not excelled by that of any other region in the world. This beautiful valley was the home of that branch of the Nez Perce tribe of Indians whose government was the rule of the great Indian Chief Joseph, and whose likeness appears on another page. Joseph and his people claimed that they had been unjustly driven out of the valley by the white man, and on being refused restoration to their ancient home went to war in 1877, and being at- tacked by the U. S. Troops under General 0. 0. Howard, Joseph effected such a masterly and successful retreat over the Rockj' Mountains as to win the re- spect and admiration of the General and all his men. To recognize the dis- tinguished Chief the settlers in the valley have named their principal town "Joseph" in honor of the Indian; the only town or county named in honor of an Indian on the Pacific Coast.
The census reports of the county show population as follows: For 1890 — 3,661 ; 1900—5,538 ; 1910—8,364 ; Enterprise is the county seat.
Malheur county was organized by the legislature February 17, 1887. It occupies the southeastern corner of the State. It gets the name from the prin- cipal river in the county; and the river got the name from the fact that the Indians had stolen a cache of furs and goods the Hudson's Bay Co. trapper, Peter Skene Ogden, had hid on the banks of the river. The word is pronounced as if spelled "Maloor, " and is a French tei-m signifying "bad luck." It is as yet a sparsely settled region. But now in this year 1912, the Oregon Short Line iailroad is being constructed westerly across the county.
The census reports population of the county as follows :
For 1890—2,601 : 1900—4,203 ; 1910—8.601 : The County seat is now at tlie town of Vale.
Harney county was created by legislative enactment February 25, 1889, and embraces the great Harnej* Valley, including the large lakes Malheur and Harney. The county is named in honor of ilajor-General William S. Harney, a distinguished soldier of the United States army, who had seen bard service fight- % ing Indians in Florida, Illinois and Oregon, besides active service in the war with Mexico, and finally against the Southern rebels in Missouri, Being given | WIKI |
Anjali Anand
Anjali Anand is an Indian actress who primarily works in Hindi television. She is known for her lead roles in the Star Plus's television shows like Dhhai Kilo Prem, and Kullfi Kumarr Bajewala which earned her major recognition. She made her Hindi film debut with the Dharma Productions film Rocky Aur Rani Kii Prem Kahaani directed by Karan Johar.
Anjali made her acting debut with 2017 web-series Untag. She is also seen as contestant in stunt-based reality show Fear Factor: Khatron Ke Khiladi season 13.
Early life
Anjali Anand was born in Mumbai, Maharashtra. She is the daughter of former actor Dinesh Anand.
Career
Anjali Anand made her acting debut with the web series Untag in 2017.
Anjali played the lead in the television shows Dhhai Kilo Prem in 2017 and Kullfi Kumarr Bajewala in 2018.
In 2023, Anjali appeared in the reality show Fear Factor: Khatron Ke Khiladi season 13 as a contestant. She also made bollywood debut in 2023 with Karan Johar's film Rocky Aur Rani Kii Prem Kahaani. She also appeared in dance reality show Jhalak Dikhhla Jaa (season 11) and got evicted after 11 weeks. | WIKI |
National Highway 06 (Nepal)
NH06 or Tamor Corridor (तमोर करिडोर) is a National Highway of Nepal that connects Terai in Sunsari District to Hills in Panchthar District in Koshi Province. It runs parallel of Tamur River via Sunsari District, Dhankuta District, Tehrathum District and Panchthar District. It starts from Tribeni (Chatara) of Barahakshetra Municipality in Sunsari and ends at Ambarpur (ward no. 1) of Hilihang Rural Municipality in Panchthar District. The total length of the road is 145 km.
NH-06 (Tamor Corridor) merges with NH09 (Madan Bhandari Inner Terai Highway) at Chatara, it crosses NH08 (Koshi Highway) at Mulghat, it again crosses NH03 (Pushpalal Highway) at Majhitar and finalize merging with NH02 (Mechi Highway) about 2.5 km before Ganesh Chowk in Hilihang, Panchthar.
Links
* SNH 2020-2021 | WIKI |
Closed Bug 1197125 Opened 4 years ago Closed 4 years ago
WebMDemuxer will read the entire webm into memory if the file is local
Categories
(Core :: Audio/Video: Playback, defect, P1)
defect
Tracking
()
RESOLVED FIXED
mozilla43
Tracking Status
firefox41 --- unaffected
firefox42 --- fixed
firefox43 --- fixed
People
(Reporter: jya, Assigned: jya)
References
Details
(Keywords: regression)
Attachments
(1 file)
Noticed this problem when reviewing why bug 1195073 was failing on linux.
WebMDemuxer::EnsureUpToDateIndex will call MediaResource::GetCachedRanges() retrieve the array of byte ranges and call WebMBufferedState::WebMBufferedState::UpdateIndex()
this will call MediaResource::MediaReadAt() and read the entire byte range.
However, for local files, the cache byte range is always the entire file.
As such, the entire file will first be read into memory, and then parsed.
So to play a local file, we will potentially allocate a very big array. This will also limit us to play 2GiB files only as a nsTArray can't hold more than 2GiB
Reads should be made using partial blocks, to ensure we allocate too much RAM at once.
Assignee: nobody → jyavenard
Priority: -- → P1
Instead we parse it in chunks of 1MiB max.
Attachment #8653827 - Flags: review?(kinetik)
Attachment #8653827 - Flags: review?(kinetik) → review+
Blocks: 1197083
https://hg.mozilla.org/mozilla-central/rev/df3b5b643439
Status: NEW → RESOLVED
Closed: 4 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla43
Backed out for a youtube playback regression. See Bug 1199573.
https://hg.mozilla.org/releases/mozilla-aurora/rev/5bb661db5c6c
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
Status: REOPENED → RESOLVED
Closed: 4 years ago4 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug. | ESSENTIALAI-STEM |
Juan Godoy
Juan Godoy (1800 – 1842) was a Chilean farmer and miner who in 1832 discovered an outcrop (reventón) of silver 50 km south of Copiapó in Chañarcillo, sparking the Chilean silver rush.
Godoy was born to Flora Normilla, an indigenous woman, in the reduction of San Fernando in 1800. Later, he was baptized in the town of Copiapó. Godoy is referred to in sources as a mestizo, implying his father was not indigenous. His surname Godoy is a hispanization of Normilla. He worked variously as goatherd and farmer with his mother but also as miner and woodcutter before the discovery of Chañarcillo. Godoy was very likely illiterate. It is said that Godoy found the outcrop while hunting guanacos. Godoy was able to recognise the silver outcrop since he had previously worked in mining as explosives driller (barretero) and apire (apir). Another account holds that the outcrop was revealed to Godoy by his mother, Flora Normilla, on her deathbed. According to folklore, Godoy was guided to the riches of Chañarcillo by an alicanto, a bird pertaining to Chilean mythology.
He successfully claimed the associated mining rights for the silver outcrop for himself and his brother José Godoy. Notoriously, local business leader Miguel Gallo also appeared registered as owning a third of the claim from the beginning. Various explanations have been put forward to explain this. One is that Godoy included Gallo in the claim at the request of his mother Flora. The reason is said to have been that Flora had known about the silver outcrop and told Gallo many times about it without him bothering about finding out the truth of it. Following this saying Flora only told her son Juan about it on her death bed, telling him to share it with Gallo. Another explanation is that Juan Godoy decided to share a third of the mining rights with his friend Juan José Callejas; Callejas used to work for Gallo and transferred the rights to him. Godoy and his associates inscribed the discovery as La Descubridora (lit. The Discovery). Just a week later Gallo bought all rights from Godoy and his brother. The finding attracted thousands of people to the place and generated significant wealth. The amount paid for the rights to the Godoy brothers amounted to as little as 0.5% of the earnings of the mine in 1834.
Having squandered the fortune earned from the selling of his minings rights Godoy sought and was granted work in La Descubridora by Gallo. The conditions of work offered by Gallo were favourable and Godoy was able to make a small fortune again which allowed him to quit work and move to the city of La Serena. In La Serena Godoy settled as a farmer and married again. Godoy is known to have died in his 40s and left his second wife and children in poverty. When this came to light the Mining Council of Copiapó (Junta Minera de Copiapó) made a grant to Godoy's widow and sons.
The settlement at the foot of the Chañarcillo mountain was named Pueblo de Juan Godoy in 1846. The mineral juangodoyite (Na2Cu(CO3)2) was named after him in 2005. | WIKI |
Page:The Book of the Thousand Nights and One Night, Vol 9.djvu/93
75 and hearkening with his ears, and he was certified that there was no lewdness in the dervish and said in himself, ‘An he were a lewd fellow, he had not stood out against all this importunity.’ The boy continued to beguile the dervish and every time he addressed himself to prayer, he interrupted him, till at last he waxed exceeding wroth with him and was rough with him and beat him. Kemerezzeman wept and his father came in and wiped away his tears and comforted him. Then said he to the dervish, ‘O my brother, since thou art on this wise, why didst thou weep and sigh, when thou sawest my son? Is there a reason for this?’ ‘Yes,’ answered the dervish; and Abdurrehman continued, ‘When I saw thee weep at sight of my son, I deemed evil of thee and bade the boy do with thee thus, that I might try thee, purposing in myself, if I saw thee require him of lewdness, to come in upon thee and slay thee. But, when I saw thy carriage towards him, I knew thee for one of those who are virtuous to the utmost. But, God on thee, tell me the cause of thy weeping!’
The dervish sighed and said, ‘O my lord, fret not a closed wound.’ But the merchant said, ‘Nothing will serve but thou must tell me.’ ‘Know, then,’ began the other, ‘that I am a dervish who wander in the lands and the countries, admonishing myself by the traces of the Creator of Night and Day. It chanced that one Friday I entered the city of Bassora in the forenoon of the day and saw the shops open and full of all manner wares and goods and meat and drink; but they were deserted and there was in them neither man nor woman nor girl nor boy: nor in the markets and the streets was there dog nor cat nor yet voice heard nor creature seen. I marvelled at this and said to myself, “I wonder whither the people of the city are gone with their dogs and cats and what | WIKI |
Reference : In vitro tubulogenesis of endothelial cells by relaxation of the coupling extracellular ...
Scientific journals : Article
Life sciences : Biochemistry, biophysics & molecular biology
http://hdl.handle.net/2268/63540
In vitro tubulogenesis of endothelial cells by relaxation of the coupling extracellular matrix-cytoskeleton.
English
Deroanne, Christophe mailto [Université de Liège - ULg > Département des sciences biomédicales et précliniques > Laboratoire des tissus conjonctifs >]
Lapiere, C. M. [Université de Liège - ULG > > > > Laboratoire de Biologie des Tissus Conjonctifs > >]
Nusgens, Betty mailto [Université de Liège - ULg > Département des sciences biomédicales et précliniques > Laboratoire de Biologie des Tissus Conjonctifs > >]
2001
Cardiovascular Research
Elsevier Science
49
3
647-58
Yes (verified by ORBi)
International
0008-6363
Amsterdam
The Netherlands
[en] Blotting, Western/methods ; Capillaries ; Cell Adhesion/physiology ; Cells, Cultured ; Collagen ; Cytoskeleton/physiology ; Drug Combinations ; Endothelium, Vascular/physiology/ultrastructure ; Extracellular Matrix/physiology ; Fibroblasts ; Humans ; Laminin ; Microscopy, Phase-Contrast ; Neovascularization, Physiologic/physiology ; Proteoglycans ; Stress, Mechanical ; Umbilical Veins
[en] OBJECTIVE: This investigation aimed at determining the importance of the rigidity of the adhesive support and the participation of the cytoskeleton in tubulogenesis of endothelial cells in vitro. METHODS: The morphotype, biosynthetic phenotype and cytoskeleton organization of human umbilical vein endothelial cells (HUVEC) were analyzed on supports of variable mechanical resistance. RESULTS: Western blot analysis revealed a strong reduction of the expression of actin and focal-adhesion plaque (FAP) proteins in HUVEC organized in tube-like structures (TLS) on soft matrigel or on matrigel co-polymerized with heat-denatured collagen as compared to HUVEC remaining in a monolayer pattern on rigid matrigel-coat or on matrigel co-polymerized with type I collagen. Human skin fibroblasts morphotype was not altered in these culture conditions and the pattern of FAP proteins and actin was not modulated. By using polyacrylamide gels polymerized with various concentrations of bis-acrylamide to modulate the mechanical resistance of the support and cross-linked to a constant amount of gelatin to provide an equal density of attachment sites, it was shown that the less rigid the support, the more endothelial cells switched to a tube-like pattern. Collagen type I-induced tubulogenesis was accompanied by a profound and reversible remodeling of the actin-FAP complex suggesting a weakening of the bridging between extracellular matrix (ECM) and the cytoskeleton. Human skin fibroblasts and smooth muscle cells, used as control cells, adhered strongly to the collagen, did not form TLS and their network of actin stress fibers was not remodeled. The inhibition of collagen type I-induced tubulogenesis by agents altering the actin cytoskeleton-FAP complex including calpain type I inhibitor, orthovanadate, KT5720 and jasplakinolide, further supports the determinant role of mechanical coupling between the cells and the matrix in tubulogenesis. CONCLUSIONS: A reduced tension between the endothelial cells and the extracellular matrix, originating in the support or within the cells is sufficient to trigger an intracellular signaling cascade leading to tubulogenesis, an event mimicking one of the last steps of angiogenesis.
Researchers
http://hdl.handle.net/2268/63540
http://cardiovascres.oxfordjournals.org/content/49/3/647.full.pdf+html
This is a pre-copy-editing, author-produced PDF of an article accepted for publication in Cardiovascular Research following peer review. The definitive publisher-authenticated version [Deroanne, C, Lapière, Ch. M., and Nusgens, B. In vitro tubulogenesis of endothelial cells by relaxation of the coupling extracellular matrix-cytoskeleton, Cardiovascular Res, 49(3): 647-658, 2001] is available online at http://cardiovascres.oxfordjournals.org/content/49/3/647.full.pdf+html
File(s) associated to this reference
Fulltext file(s):
FileCommentaryVersionSizeAccess
Open access
Deroanne2001-CVR-auteur.pdfAuthor postprint1.11 MBView/Open
Bookmark and Share SFX Query
All documents in ORBi are protected by a user license.
| ESSENTIALAI-STEM |
Question
What size did does a Kubernetes node have ?
Posted June 10, 2019 1.4k views
KubernetesUbuntu 18.04
Where do I find more details on nodes, such as disk size (and also OS)
(I know I can provision block storage afterwards, I’m trying to get details on the underlying node)
These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.
×
Submit an Answer
1 answer
When creating a cluster through the cloud panel you have access to several different sizes of nodes anywhere from 1CPU/2GB standard nodes to even CPU optimized nodes. The node pools can really be whatever kinds of droplets you already have access to. This way we can accommodate many types of workloads. The disk sizes also scale up with the resources allocated.
Regards,
John Kwiatkoski
Senior Developer Support Engineer | ESSENTIALAI-STEM |
Talk:Metabolic waste
Proposed merge with Ureotelic
Very small stub already covered in more detail on target page Iztwoz (talk) 18:40, 3 November 2016 (UTC)
Proposed merge with Uricotelic
Small stub covered in more detail on target page and would also join the other types there Iztwoz (talk) 18:42, 3 November 2016 (UTC)
hi Msuhail348 (talk) 15:50, 7 January 2017 (UTC)
Proposed merge with Ammonotelic
Already covered on target page and would be better presented there with the other types Iztwoz (talk) 18:45, 3 November 2016 (UTC)
H2S seems to be missing from the discussion
H2S is not discussed in this article, and presumably many other wastes. 2A02:1812:1638:D600:42F0:2FFF:FEB5:E35E (talk) 21:08, 25 December 2023 (UTC) | WIKI |
Page:Goldenlegendlive00jaco.djvu/163
of God, I purpose to visit and to honour in the same place where they now rest, if thou, Lord, send to me life, health, opportunity and space.'
And when King Canute had reigned in England twenty years, having two sons by the said Emma, that is to wit, Harold and Hardicanute, he died, and when his first son had reigned four years, he exiled his own mother, and died soon after. And after him reigned his brother a little time, and died also, as our Lord had ordained, and then was England delivered from the grievous tribute and thraldom of the Danes. And then the lords and the commons of England remembered the oath that they made in the parliament, which sware that Edward, which was then in his mother's womb, should be their king, and anon sent into Normandy for this holy child Edward. And the lords and the commons received him with great gladness, and then the archbishop of Canterbury and the archbishop of York, with other bishops, did consecrate him, anointed and crowned him king of England.
O good Lord! what joy and gladness was then in England. For when the old felicity of this land was almost despaired, then it was kindled again by the coming of this blessed king S. Edward. Then had the commons rest and peace, and the lords and gentlemen rest and honour, and then holy church received all her liberties again. Then was the sun lifted up and the moon set in his order, that is to say, priests shined in wisdom and in holiness. The monasteries flourished in devotion by holy religion. The clerks gave light and prospered in their offices | WIKI |
Java Code Examples for org.eclipse.microprofile.openapi.models.media.Schema#setNullable()
The following examples show how to use org.eclipse.microprofile.openapi.models.media.Schema#setNullable() . These examples are extracted from open source projects. You can vote up the ones you like or vote down the ones you don't like, and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example 1
/**
* Converts the collection of parameter annotations to properties set on the
* given schema.
*
* @param schema the {@link Schema} on which the properties will be set
* @param encodings map of encodings applicable to the current {@link MediaType} being processed
* @param params the name/value pairs of annotations for conversion to schema properties
*/
void setSchemaProperties(Schema schema,
Map<String, Encoding> encodings,
Map<String, AnnotationInstance> params) {
for (Entry<String, AnnotationInstance> param : params.entrySet()) {
String paramName = param.getKey();
AnnotationTarget paramTarget = param.getValue().target();
addEncoding(encodings, paramName, paramTarget);
Type paramType = getType(paramTarget);
Schema paramSchema = SchemaFactory.typeToSchema(index, paramType, extensions);
Object defaultValue = getDefaultValue(paramTarget);
if (paramSchema.getDefaultValue() == null) {
paramSchema.setDefaultValue(defaultValue);
}
BeanValidationScanner.applyConstraints(paramTarget,
paramSchema,
paramName,
(target, name) -> {
List<String> requiredProperties = schema.getRequired();
if (requiredProperties == null || !requiredProperties.contains(name)) {
schema.addRequired(name);
}
});
if (paramSchema.getNullable() == null && TypeUtil.isOptional(paramType)) {
paramSchema.setNullable(Boolean.TRUE);
}
if (schema.getProperties() != null) {
paramSchema = mergeObjects(schema.getProperties().get(paramName), paramSchema);
}
schema.addProperty(paramName, paramSchema);
}
}
Example 2
/**
* Converts the collection of parameter annotations to properties set on the
* given schema.
*
* @param schema the {@link Schema} on which the properties will be set
* @param encodings map of encodings applicable to the current {@link MediaType} being processed
* @param params the name/value pairs of annotations for conversion to schema properties
*/
void setSchemaProperties(Schema schema,
Map<String, Encoding> encodings,
Map<String, AnnotationInstance> params) {
for (Entry<String, AnnotationInstance> param : params.entrySet()) {
String paramName = param.getKey();
AnnotationTarget paramTarget = param.getValue().target();
Type paramType = getType(paramTarget);
Schema paramSchema = SchemaFactory.typeToSchema(index, paramType, extensions);
Object defaultValue = getDefaultValue(paramTarget);
if (paramSchema.getDefaultValue() == null) {
paramSchema.setDefaultValue(defaultValue);
}
BeanValidationScanner.applyConstraints(paramTarget,
paramSchema,
paramName,
(target, name) -> {
List<String> requiredProperties = schema.getRequired();
if (requiredProperties == null || !requiredProperties.contains(name)) {
schema.addRequired(name);
}
});
if (paramSchema.getNullable() == null && TypeUtil.isOptional(paramType)) {
paramSchema.setNullable(Boolean.TRUE);
}
if (schema.getProperties() != null) {
paramSchema = mergeObjects(schema.getProperties().get(paramName), paramSchema);
}
schema.addProperty(paramName, paramSchema);
}
}
Example 3
void notBlank(AnnotationTarget target, Schema schema) {
AnnotationInstance constraint = getConstraint(target, BV_NOT_BLANK);
if (constraint != null) {
if (schema.getNullable() == null) {
schema.setNullable(Boolean.FALSE);
}
if (schema.getPattern() == null) {
schema.setPattern("\\S");
}
}
}
Example 4
void notEmptyString(AnnotationTarget target, Schema schema) {
AnnotationInstance constraint = getConstraint(target, BV_NOT_EMPTY);
if (constraint != null) {
if (schema.getNullable() == null) {
schema.setNullable(Boolean.FALSE);
}
if (schema.getMinLength() == null) {
schema.setMinLength(1);
}
}
}
Example 5
void notNull(AnnotationTarget target, Schema schema, String propertyKey, RequirementHandler handler) {
AnnotationInstance constraint = getConstraint(target, BV_NOT_NULL);
if (constraint != null) {
if (schema.getNullable() == null) {
schema.setNullable(Boolean.FALSE);
}
if (handler != null && propertyKey != null) {
handler.setRequired(target, propertyKey);
}
}
}
Example 6
/**
* This method will generate a schema for the {@link #annotationTarget} containing one
* of the following :
*
* <ol>
* <li>A schema composed (using {@link Schema#allOf(List) allOf}) of a <code>$ref</code> to the schema of the
* {@link #entityType}
* and the schema attributes scanned or derived from the {@link #annotationTarget} itself that do not
* generally apply to the {@link #entityType}'s schema such as a field-specific <code>description</code>.
* </li>
* <li>A schema containing a <code>$ref</code> to the schema of the {@link #entityType}. This occurs when
* the field does not contribute any additional or different attributes that are not defined by the base
* schema of the {@link #entityType}.
* </li>
* <li>A schema containing only the attributes scanned or derived from the {@link #annotationTarget} which will include
* attributes
* of the {@link #entityType} if it is not able to be registered via
* {@link SchemaRegistry#checkRegistration(Type, TypeResolver, Schema) checkRegistration}.
* </li>
* </ol>
*
* @return the individual or composite schema for the annotationTarget used to create this {@link AnnotationTargetProcessor}
*/
Schema processField() {
final AnnotationInstance schemaAnnotation = TypeUtil.getSchemaAnnotation(annotationTarget);
final String propertyKey = typeResolver.getPropertyName();
final Schema typeSchema;
final Schema registeredTypeSchema;
final Type fieldType;
if (schemaAnnotation != null && JandexUtil.hasImplementation(schemaAnnotation)) {
typeSchema = null;
registeredTypeSchema = null;
fieldType = JandexUtil.value(schemaAnnotation, SchemaConstant.PROP_IMPLEMENTATION);
} else {
// Process the type of the field to derive the typeSchema
TypeProcessor typeProcessor = new TypeProcessor(index, objectStack, parentPathEntry, typeResolver, entityType,
new SchemaImpl(), annotationTarget);
// Type could be replaced (e.g. generics)
fieldType = typeProcessor.processType();
typeSchema = typeProcessor.getSchema();
// Set any default values that apply to the type schema as a result of the TypeProcessor
TypeUtil.applyTypeAttributes(fieldType, typeSchema);
// The registeredTypeSchema will be a reference to typeSchema if registration occurs
Type registrationType = TypeUtil.isOptional(entityType) ? fieldType : entityType;
registeredTypeSchema = SchemaRegistry.checkRegistration(registrationType, typeResolver, typeSchema);
}
Schema fieldSchema;
if (schemaAnnotation != null) {
// Handle field annotated with @Schema.
fieldSchema = readSchemaAnnotatedField(propertyKey, schemaAnnotation, fieldType);
} else {
// Use the type's schema for the field as a starting point (poor man's clone)
fieldSchema = MergeUtil.mergeObjects(new SchemaImpl(), typeSchema);
}
BeanValidationScanner.applyConstraints(annotationTarget, fieldSchema, propertyKey, this);
if (fieldSchema.getNullable() == null && TypeUtil.isOptional(entityType)) {
fieldSchema.setNullable(Boolean.TRUE);
}
// Only when registration was successful (ref is present and the registered type is a different instance)
if (typeSchema != registeredTypeSchema && registeredTypeSchema.getRef() != null) {
// Check if the field specifies something additional or different from the type's schema
if (fieldOverridesType(fieldSchema, typeSchema)) {
TypeUtil.clearMatchingDefaultAttributes(fieldSchema, typeSchema); // Remove duplicates
Schema composition = new SchemaImpl();
composition.addAllOf(registeredTypeSchema); // Reference to the type schema
composition.addAllOf(fieldSchema);
fieldSchema = composition;
} else {
fieldSchema = registeredTypeSchema; // Reference to the type schema
}
} else {
// Registration did not occur, overlay anything defined by the field on the type's schema
fieldSchema = MergeUtil.mergeObjects(typeSchema, fieldSchema);
}
parentPathEntry.getSchema().addProperty(propertyKey, fieldSchema);
return fieldSchema;
}
Example 7
Source Project: smallrye-open-api File: SchemaReader.java License: Apache License 2.0 4 votes vote down vote up
/**
* Reads a {@link Schema} OpenAPI node.
*
* @param node json node
* @return Schema model
*/
public static Schema readSchema(final JsonNode node) {
if (node == null || !node.isObject()) {
return null;
}
IoLogging.log.singleJsonObject("Schema");
String name = JsonUtil.stringProperty(node, SchemaConstant.PROP_NAME);
Schema schema = new SchemaImpl(name);
schema.setRef(JsonUtil.stringProperty(node, Referenceable.PROP_$REF));
schema.setFormat(JsonUtil.stringProperty(node, SchemaConstant.PROP_FORMAT));
schema.setTitle(JsonUtil.stringProperty(node, SchemaConstant.PROP_TITLE));
schema.setDescription(JsonUtil.stringProperty(node, SchemaConstant.PROP_DESCRIPTION));
schema.setDefaultValue(readObject(node.get(SchemaConstant.PROP_DEFAULT)));
schema.setMultipleOf(JsonUtil.bigDecimalProperty(node, SchemaConstant.PROP_MULTIPLE_OF));
schema.setMaximum(JsonUtil.bigDecimalProperty(node, SchemaConstant.PROP_MAXIMUM));
schema.setExclusiveMaximum(JsonUtil.booleanProperty(node, SchemaConstant.PROP_EXCLUSIVE_MAXIMUM).orElse(null));
schema.setMinimum(JsonUtil.bigDecimalProperty(node, SchemaConstant.PROP_MINIMUM));
schema.setExclusiveMinimum(JsonUtil.booleanProperty(node, SchemaConstant.PROP_EXCLUSIVE_MINIMUM).orElse(null));
schema.setMaxLength(JsonUtil.intProperty(node, SchemaConstant.PROP_MAX_LENGTH));
schema.setMinLength(JsonUtil.intProperty(node, SchemaConstant.PROP_MIN_LENGTH));
schema.setPattern(JsonUtil.stringProperty(node, SchemaConstant.PROP_PATTERN));
schema.setMaxItems(JsonUtil.intProperty(node, SchemaConstant.PROP_MAX_ITEMS));
schema.setMinItems(JsonUtil.intProperty(node, SchemaConstant.PROP_MIN_ITEMS));
schema.setUniqueItems(JsonUtil.booleanProperty(node, SchemaConstant.PROP_UNIQUE_ITEMS).orElse(null));
schema.setMaxProperties(JsonUtil.intProperty(node, SchemaConstant.PROP_MAX_PROPERTIES));
schema.setMinProperties(JsonUtil.intProperty(node, SchemaConstant.PROP_MIN_PROPERTIES));
schema.setRequired(JsonUtil.readStringArray(node.get(SchemaConstant.PROP_REQUIRED)).orElse(null));
schema.setEnumeration(JsonUtil.readObjectArray(node.get(SchemaConstant.PROP_ENUM)).orElse(null));
schema.setType(readSchemaType(node.get(SchemaConstant.PROP_TYPE)));
schema.setItems(readSchema(node.get(SchemaConstant.PROP_ITEMS)));
schema.setNot(readSchema(node.get(SchemaConstant.PROP_NOT)));
schema.setAllOf(readSchemaArray(node.get(SchemaConstant.PROP_ALL_OF)).orElse(null));
schema.setProperties(readSchemas(node.get(SchemaConstant.PROP_PROPERTIES)).orElse(null));
if (node.has(SchemaConstant.PROP_ADDITIONAL_PROPERTIES)
&& node.get(SchemaConstant.PROP_ADDITIONAL_PROPERTIES).isObject()) {
schema.setAdditionalPropertiesSchema(readSchema(node.get(SchemaConstant.PROP_ADDITIONAL_PROPERTIES)));
} else {
schema.setAdditionalPropertiesBoolean(
JsonUtil.booleanProperty(node, SchemaConstant.PROP_ADDITIONAL_PROPERTIES).orElse(null));
}
schema.setReadOnly(JsonUtil.booleanProperty(node, SchemaConstant.PROP_READ_ONLY).orElse(null));
schema.setXml(XmlReader.readXML(node.get(SchemaConstant.PROP_XML)));
schema.setExternalDocs(ExternalDocsReader.readExternalDocs(node.get(ExternalDocsConstant.PROP_EXTERNAL_DOCS)));
schema.setExample(readObject(node.get(SchemaConstant.PROP_EXAMPLE)));
schema.setOneOf(readSchemaArray(node.get(SchemaConstant.PROP_ONE_OF)).orElse(null));
schema.setAnyOf(readSchemaArray(node.get(SchemaConstant.PROP_ANY_OF)).orElse(null));
schema.setNot(readSchema(node.get(SchemaConstant.PROP_NOT)));
schema.setDiscriminator(DiscriminatorReader.readDiscriminator(node.get(SchemaConstant.PROP_DISCRIMINATOR)));
schema.setNullable(JsonUtil.booleanProperty(node, SchemaConstant.PROP_NULLABLE).orElse(null));
schema.setWriteOnly(JsonUtil.booleanProperty(node, SchemaConstant.PROP_WRITE_ONLY).orElse(null));
schema.setDeprecated(JsonUtil.booleanProperty(node, SchemaConstant.PROP_DEPRECATED).orElse(null));
ExtensionReader.readExtensions(node, schema);
return schema;
} | ESSENTIALAI-STEM |
These air-free bike tires aim to free us from the pain of fixing a flat
If you’ve ever had a flat tire when biking, then you’ve probably experienced the unique torture that goes into fixing it. Disengage the brakes, get bike grease everywhere, bust up your fingertips trying to get the tube out of the tire, get more grease everywhere, etc. Thankfully, the good people at Bridgestone have stepped forward to say “never again” with their totally genius, air-free bicycle tires. Theses psychedelic looking contraptions use spokes stretching along the inner sides of tires to maintain weight, rather than a tube of inflated air. The company claims the thermoplastic resins that are used in the spokes and rubbers “help realize more efficient use of resources.” The tires require less maintenance, and the fear of a puncture completely vanishes. The concept of “air-free” tires isn’t new. The Tokyo-based tire company has been playing around with the idea since 2013, when it unveiled its first air-free concept for tiny, smart-car sized vehicles. It was a bid to reduce the need for drivers to pull to the side of the road to fix flat tires, as well as reduce CO2 emissions and create a more sustainable drive. Is there a down side to air free tires? I’m not sure, because I haven’t had the chance to try out Bridgestone’s concept. Would they be able to handle the cracks and potholes of a city street? Or the rocks and tree roots of a mountain bike path? And the other big question — how much will these things cost? — will have to be left hanging because Bridgestone has yet to start selling its air-free tires, neither for vehicles nor bikes. The company has patented the technology, but won’t say when it will start offering them to all those beleaguered, grease covered bike-owners. Hopefully soon. I’ve got a Schwinn with two flats in my basement that’s crying out for a pair of these. | NEWS-MULTISOURCE |
National School Walkout: After Parkland, a push for more mass shooting drills in public schools
Students at thousands of schools across the United States walked out of class Wednesday morning to pressure Congress and state lawmakers to pass gun control laws. More than 2,500 students had planned to join the National School Walkout out at 10 am in every time zone, according to organizers. They want Congress to expanding background checks to all gun buyers and banning assault-style weapons, such as the AR-15 used in the Feb. 14 shooting that killed 17 high school students in Parkland, Florida. But so far, the Republican Congress has shown little interest in enacting such provisions. Instead, GOP lawmakers have been more focused on beefing up security at public schools and giving more money for safety training, including mass shooting drills. On Wednesday afternoon, the House of Representatives is scheduled to vote on the STOP School Violence Act, a bill that doesn’t address guns but provides an annual $50 million grant to schools for training programs and upgraded reporting systems. The bill would allow schools to use the money for mass shooting drills, which have become common in public schools since the Columbine school massacre. Since the Parkland shooting, a few states have also taken steps to beef up school security. Lawmakers in New York are considering a bill that would require all school emergency drills to include mass shooting scenarios. South Carolina lawmakers are considering a bill to require schools to carry out active-shooter drills every single month. Last week, Florida passed a school safety law that requires schools to conduct mass shooting drills twice a year. The sad truth is that most public schools in the United States already do some sort of mass shooting drill. Nine out of ten public schools now drill students and teachers to respond to mass shootings, according to the National Center for Education Statistics. These mass shooting drills have become the new normal, and a generation of American students have learned to lock and barricade their classroom doors the same way they learn to drop and roll in case of a fire. Safety training companies, such as the ALICE Institute, regularly stage fake shootings as part of their training programs for schools. Here is how they teach elementary-school children to respond to a “bad guy” who bursts into class: These sessions are a stark reminder of how American schools have changed since the 1999 Columbine school shooting. School administrators and state lawmakers have realized that a mass shooting can happen in any community, in any school, at any time, and that they need to be prepared if it happens. Since Columbine, 32 states have passed laws requiring schools to conduct lockdown drills or some form of emergency drill to keep students safe from intruders. Some states went even further after 20 children died in Newtown, Connecticut, in 2012. Now, six states require specific "active shooter" drills each year. That means the training must be specifically tailored to respond to an armed gunman out to kill. There is no consensus on what these drills should look like, but several states, including Missouri, require shooting simulations with police officers. In the 2003-04 school year, when the National Center for Education Statistics began collecting this data, 46.5 percent of all public schools had conducted active shooter drills with students. By 2013-14, a year after Sandy Hook, that figure had climbed to 70.3 percent. In the most recent data, for 2015-16, “lockdown drills” — a broader category that NCES used for that year’s survey — were being conducted in 94.6 percent of schools. "We are working in schools every day with innocent children who see school as a safe place," Henderson Lewis, Jr., the superintendent of the Orleans Parish School Board in Louisiana, told Vox. "We must do everything we can to prepare our kids for an unfortunate scenario." New Orleans schools have been practicing lockdown drills for years, Lewis said, but they need to do much more. He is finalizing a plan to have school safety officers participate in mass shooting drills with police in empty school buildings. The types of shooting drills vary by state and sometimes by school district. But here's what this data really means: Each year, nearly every student at an American public school is trained to cower under a desk or run for their lives to avoid being murdered by a gunman. The mass shooting at Marjory Stoneman Douglas High School in Broward County, Florida, has brought renewed attention to gun violence in schools. Nikolas Cruz, a troubled 19-year-old former student, has been charged with 17 counts of first-degree murder for allegedly opening fire with an AR-15 on students minutes before the final bell rang. As the shooting was taking place, tweets and video circulating on social media from inside the school showed students under lockdown, barricaded in classrooms, and hiding from the gunman. The Broward County school district has been holding annual lockdown drills at its schools for more than 10 years. There are basically two types of scenarios they train for. The first is the Code Yellow lockdown. This means teachers must lock doors and can continue teaching but cannot unlock the door until an "all clear" announcement has been broadcast over the intercom five times. When I worked as a crime reporter in Broward County, it was normal for a school to go into a Code Yellow lockdown when police were searching for an armed suspect in the surrounding neighborhoods. A Code Red lockdown is for a situation like the one that happened in Parkland — where a gunman or intruder is on school grounds. In this scenario, teachers must lock doors, turn off lights, and move students away from windows. No one is allowed to talk or leave the room until the all clear is given. In both lockdown scenarios, teachers and students must ignore all other fire alarms or bells. Yet a traditional lockdown drill doesn't teach students what to do when they come face to face to with a gunman, and that has led to some new approaches. After the Sandy Hook massacre, federal law enforcement agencies decided to take a closer look at effective ways to respond to school attacks. In one study of 84 mass shootings between 2000 and 2010, about a third (34 percent) involved schools. The FBI analyzed research on mass shootings and school violence and came up with common warning signs that a person might be at risk of undertaking a deadly attack: Few offenders had previous arrests for violent crimes. The FBI's 2013 report, published with the Federal Emergency Management Agency, also urged schools to consider that typical lockdown drills may not enough. They suggested running off school property if possible, or hiding in a locked room if necessary, but even went so far to suggest fighting "the shooter to survive and protect others from harm." That was a new idea for schools, and many districts began to take their advice seriously. The Ohio-based ALICE Training Institute, referenced in the video above, is one of the companies that drills school police officers, teachers, and staff to do more than just hide. They teach students to barricade their classroom doors, run, scream, and throw things at a gunman. About 4,200 school districts and 3,500 police departments have ALICE-trained personnel, according to the company's website. These companies even provide the option of staging elaborate shooting drills, complete with fake blood and masked men with plastic guns (in one instance, involving a different company, a traumatized teacher in Oregon sued the school district for not making clear that it was just a drill). Shortly after the Newtown massacre, a task force created by the Ohio attorney general's office released a report encouraging school staff to be more aggressive: If an intruder enters and begins shooting, any and all actions to stop the shooter are justified. This includes moving about the room to lessen accuracy, throwing items (books, computers, phones, book bags) to create confusion, exiting out windows, and confronting (assault, subdue, choke) to stop the intruder. Tell students to get out anyway possible and move to another location. Not everyone has embraced these tactics. There has been concern among school psychologists about the potential negative impact on children who participate in staged shootings. In 2014, the National Association of School Psychologists issued guidelines asserting that lockdown-based drills are ideal, as research shows they can be effective in minimizing injuries. Not much research has been devoted to the "run, hide, fight" approach, they cautioned, and schools should not make active shooter drills mandatory: While one of the primary goals of crisis preparedness is to develop a sense of empowerment and control, armed assailant drills not conducted appropriately may cause physical and psychological harm to students, staff, and the overall learning environment. All the different views about the best way to train students to respond to mass shootings overlook the sheer insanity that such a conversation is even happening. It's depressing that the normal policy response to these tragic events has been to stage mass shooting drills at public schools, instead of developing policies focused on making the world less violent. "We are going through tough times," said Lewis, the schools superintendent in Louisiana. "The world is changing." | NEWS-MULTISOURCE |
Trembling aspen may be the most enigmatic of aspens
Aspens, also known as poplars or “popple,” are trees in the Populus genus. Vermont is home to four species of poplar: bigtooth aspen (Populus grandidentata), eastern cottonwood (Populus deltoides), balsam poplar (Populus balsamifera) and trembling or “quaking” aspen (Populus tremuloides).
Populus grandidentata
While all the aspen species are unique, trembling aspen is perhaps the most enigmatic of the bunch. It is the most widely distributed tree in North America, with a range that stretches from Alaska to Newfoundland and south into Mexico. It is the only upland deciduous tree in parts of western North America and defines aspen and aspen-birch forests — some of the most common forest types in the lake states and some western states.
All the poplar species’ leaves “tremble” or “quake”— shimmering in the wind. They do so because the petiole – the stem that attaches leaf to twig — is flat. This trembling appears to be an adaptive quality: reducing leaf herbivory, lowering leaf temperature, lowering transpiration (the loss of water from leaves) and helping light reach lower parts of aspen crowns.
Populus deltoides)
Populus deltoides
Trembling aspen is shade-intolerant, requiring nearly complete sunlight to establish. Aspen seeds are small, wind-borne and abundant, spreading far and wide across the landscape. While most of the seeds produced in a given year don’t land on an appropriate site, their mobility increases the chance that a lucky few will — usually the aftermath of a large disturbance.
Once established, aspens grow at a dizzying rate (for a tree) easily out-competing other, slower-growing species before declining and dying young (for a tree) — usually at around 60-80 years of age. Like white birch, trembling aspen is so intolerant of shade that its presence in your forest is almost certainly an indicator of a large natural or human-caused disturbance in the past. If you were to count the rings on one of your aspens, it would tell you about how many years ago that disturbance occurred.
Populus balsamifera
Populus balsamifera
Due to its short lifespan, trembling aspen is often considered a relatively ephemeral species in our forests. However, one of trembling aspen’s most interesting qualities is its resilience. Cutting an aspen tree often results in an abundance of fast-growing root sprouts, clones which may grow 4 or 5 feet tall in a single growing season. Especially in the western United States, this quality means that the life span of an aspen can be indefinite — it can continue to clone itself for generations. An aspen clone in Utah called Pando, or “the Trembling Giant,” is considered by some to be the oldest and most massive organism on Earth, covering more than 100 acres and estimated to be between 14,000 and 80,000 years old.
In Vermont, trembling aspen provides important habitat for many wildlife species, including several bird species in decline. It is important habitat for ruffed grouse, which use aspen stands of several different ages to complete different parts of their life cycle. Trembling aspen is also important for pileated woodpeckers, which forage for grubs and insect larvae in its soft wood, often creating cavities (holes) used by a huge variety of wildlife species for dens and nests.
Populus tremuloides
Populus tremuloides
While not commonly used in lumber, aspen wood is light, soft and pretty, often becoming purple-ish as it ages. It is a poor firewood, although sometimes used by maple sugarmakers for boiling sap. Throughout its range, aspen’s most common use is as pulp for paper. At present in Vermont, demand and prices for aspen timber and pulp are generally poor.
Due to its low market value, aspen is a species that I manage nearly entirely for wildlife. Creating some larger (at least 2-acre) canopy gaps where all or nearly all of the trees are cut creates potential habitat for the species, as well as a variety of other early-successional trees, plants and shrubs, and for the pollinators, birds and mammals that depend on them.
Cutting some larger aspen within these gaps will inspire them to produce clones, creating a vibrant young aspen forest relatively quickly. Outside of canopy gaps, I leave most aspen trees as legacy trees. These trees live out their natural lives, eventually declining, becoming riddled with cavities, dying and becoming dead wood on the forest floor. In life and in death, trembling aspen provides so many benefits to our forests.
(Ethan Tapper is the Chittenden County Forester for the Vermont Department of Forests, Parks and Recreation. See what he’s been up to, check out his YouTube channel, sign up for his e-newsletter and read articles he’s written on his website. | ESSENTIALAI-STEM |
Dimitrie Anghel
Dimitrie Anghel (July 16, 1872 – November 13, 1914) was a Romanian poet.
Anghel was of Aromanian descent from his father. His first poem was published in Contemporanul (1890). His debut editorial Traduceri din Paul Verlaine was published in 1903 and in 1905 he published a volume of his works in În grădină, and in 1909, in Fantazii.
Notable poems, many of which were in collaboration with Ștefan Octavian Iosif, include Legenda funigeilor (dramatic poem, 1907), Cometa (comedy, 1908), Caleidoscopul lui A. Mirea (1908), Carmen saeculare (historical poem, 1909), published in 1910, Cireșul lui Lucullus (proză).
Around 1911 later in life he developed an interest in prose and published Povestea celor necăjiți (1911), Fantome (1911), Oglinda fermecată (1912), Triumful vieții (1912) and Steluța (1913).
He fell in love with Iosif's wife Natalia Negru, who left her husband and divorced him. Anghel and Negru married in November 1911. In the autumn of 1914, during a quarrel, Anghel fired a warning shot at Negru, lightly wounding her. Believing he had killed her, he shot himself in the chest. The resulting wound became infected, and he died of sepsis two weeks later. Anghel was buried at Eternitatea Cemetery where at the funeral, an unknown female reportedly shouted, "You miserable woman, who kills all the country's great people!" to his widow Negru. | WIKI |
United Nations Special Rapporteur on the Promotion of Truth, Justice, Reparation and Guarantees of non-Recurrence
The United Nations Special Rapporteur on the promotion of truth, justice, reparation and guarantees of non-recurrence works independently to inform and advise the United Nations Human Rights Council on the promotion of human rights-compliant approaches to transitional justice.
The position was created by Human Rights Council resolution 18/7 of 29 September 2011, which called for a victim-centred and gender-sensitive approach. The special rapporteur, serving a three-year term renewable once (and expected to work as SR for at least three months per year), reports to the Council and the General Assembly on normative frameworks, country situations and practices related to transitional justice mechanisms, making recommendations for the protection of human rights in post-conflict situations. These recommendations, dealing with such matters as truth-seeking, reparations and avoidance of impunity, are targeted primarily at governments and other United Nations bodies. The Special Rapporteur will also recommend strategies to address serious crimes and human rights breaches.
The first special rapporteur, Pablo de Greiff, was appointed at the conclusion of the 19th HRC session on 23 March 2012. A Colombian, he is based at the International Center for Transitional Justice in New York. The current Special Rapporteur is the argentinian lawyer Fabián Salvioli, appointed on May 1, 2018. | WIKI |
Talk:Scammonden Bridge
Graffiti
The bases of the two most northerly columns are favourite surfaces for graffiti artists e.g.. It's perhaps surprising that these areas have not been made secure to prevent countless successive rounds of art-work and paint-over. Recent highlights have included "Cops and Robbers" and "Cops and Doggers". Martinevans123 (talk) 19:16, 13 June 2012 (UTC) | WIKI |
Talk:List of Houston Astros owners and executives
Untitled
This say its a list of managers and ownership, yet there is only mention of the managers and general managers. Also, couldn't the GMS be put in a neat box similar to the Managers.
Tie?
As a lifelong Astros fan, I don't recall them ever getting a tie... Even in this 2008 season when we only had 161 games played we didn't have a tie. Ddipaolo (talk) 03:06, 4 December 2008 (UTC)
Houston Tie Games
1962 Season, 25 April, game 12 vs. St. Louis;[]
1962 Season, 9 September, game 145 vs. New York; []
1966 Season, 16 July, game 87 vs. Atlanta;[]
1975 Season,25 August, game 133 vs. St. Louis []
2005 Season,30 June, game 77 vs. Cincinnati, [] —Preceding unsigned comment added by <IP_ADDRESS> (talk) 15:37, 4 April 2010 (UTC) | WIKI |
What is Linux and Why is it So Popular?
The Linux kernel is the heart of a computer operating system that powers everything from supercomputers to smartphones. It is an open source software project that is used on a wide range of systems by developers and enthusiasts. The kernel enables hardware to be controlled and software to be run by sending messages from the device to a central computer.
When Linus Torvalds wrote the first version of his kernel, he was doing it for fun. He wanted to read Usenet from home, and he needed a program to operate his terminal emulator. He hacked together an operating system that could handle basic tasks like keyboard and serial port control, emulation of VT100 terminal escape sequences for the screen, and dialing via modem to his university to connect to its Usenet pool.
He called it Linux and released the kernel under the GNU General Public License. This allows anyone to study, modify and redistribute it. It was not well received at first; the commercial Unix cathedrals of Sun, DEC and IBM had their best minds slaving away at stable, tightly-coupled and expensive operating system software, and they were raking in profits from hefty hardware sales and support contracts.
But the free and flexible Linux slot demo started to gain traction among computer hackers and hobbyists, and when the kernel was combined with userspace utilities from the GNU operating system by contributors like Red Hat and Suse, it became a serious contender. Then the world of high-performance computing began to take it seriously, and the pace of development accelerated even more.
Today, Linux runs every kind of computer: from servers to mobile devices to the International Space Station. The operating system is so incredibly scalable that it can be tweaked to suit the needs of almost any hardware platform or application.
This elasticity is one of the reasons why many people choose to adopt Linux. It is a far cry from the one-size-fits-all, this-is-what-comes-with-your-PC vision of Windows or macOS (formerly OS X).
You can get a feel for Linux by trying out a live CD or USB drive. These can be inserted into any computer and booted to provide a full operating system for troubleshooting or scanning for malware. Having one around is also useful for helping you recover files from an unbootable computer, or in the event of a data corruption disaster.
You Might Also Like | ESSENTIALAI-STEM |
The Playboy of the Western World (film)
The Playboy of the Western World is a 1962 film version of the 1907 play written by John Millington Synge. It was directed and co-written by Brian Desmond Hurst and stars Gary Raymond and Siobhán McKenna. Filmed in County Kerry, the film features many of the Abbey Players. The film was produced by the Four Provinces company created in 1952 by Hurst and Michael Morris, 3rd Baron Killanin who had previously produced John Ford’s The Rising of the Moon and Gideon's Day.
Plot
A young man from a far away village appears in County Mayo announcing to all and sundry that he has murdered his father with a blow to the head. With the tale growing in the telling, the young man becomes a local hero, until his angry father comes to fetch him home.
Cast
* Gary Raymond as Christy Mahon
* Siobhán McKenna as Pegeen Mike
* Elspeth March as The Widow Quinn
* Liam Redmond as Michael James
* Niall MacGinnis as Old Man Mahon
Production
The film was shot at Inch Strand on the Dingle Peninsula, County Kerry. William Constable, the art director built a cottage close to the beach.
Home Media
After years of unavailability, the film was remastered from the original film elements and released on both DVD and Blu-Ray by Network Distributing in May 2021. The release includes an image gallery, a trailer, and an interview with Gary Raymond recorded in March 2021. | WIKI |
User:MaximusAlphus
Information
Hello, I am from New Jersey, and I use Wikipedia on a daily basis. I want to help this project progress in any way I can. | WIKI |
Fighting Fallen Arches
OverviewThey make it possible for us to walk, run, and stand. With over two dozen bones, your feet are really a masterpiece of engineering. But sometimes even the best made things have flaws. One common problem is to have flatfeet, or fall…
Understanding Heel Aches
OverviewHeel pain is a very common foot problem. The sufferer usually feels pain either under the heel (planter fasciitis) or just behind it (Achilles tendinitis), where the Achilles tendon connects to the heel bone. Even though heel pain …
Functional Leg Length Discrepancy Exercises
OverviewYour child will be given general anesthetic. We cut the bone and insert metal pins above and below the cut. A metal frame is attached to the pins to support the leg. Over weeks and months, the metal device is adjusted to gradually …
Addressing Mortons Neuroma
OverviewA Morton's neuroma is a benign (noncancerous) swelling along a nerve in the foot that carries sensations from the toes. The reason the nerve starts to swell is unknown. But once swelling begins, the nearby bones and ligaments put p…
How Shoe Lifts Treat Leg Length Imbalances
There are actually two different kinds of leg length discrepancies, congenital and acquired. Congenital indicates you are born with it. One leg is anatomically shorter compared to the other. As a result of developmental stages of aging, th…
Just What Is Calcaneal Spur
Overview A heel spur also known as a calcaneal spur, is a pointed bony outgrowth of the heel bone (calcaneus). Heel spurs do not always cause pain and often are discovered incidentally on X-rays taken for other problems. Heel spurs can occ…
What Are The Signs Or Symptoms Of Inferior Calcaneal Spur
Overview A common cause of heel pain is the heel spur, which is a bony growth on the underside of the heel bone. The spur, visible by X-ray, appears as a protrusion that can extend forward as much as half an inch. When there is no indicati…
What Is Bursitis Of Your Feet?
Overview You might be suffering from Achilles bursitis if you have sharp pain at the back of your heel. You have lump on the back of your heel. You have loss of range of motion walking and the pressure for shoes causes you to limp and you …
Causes Of Hammertoe Problems
Overview A hammertoe is a misshapen second, third, or fourth toe. The toe bends up at the middle joint. The toe becomes a hammertoe because a muscle in the toe isn?t working properly or is too weak, increasing pressure on the tendons and t…
Hammer Toe Cause & Treatment Solution
Overview Hammer toe can occur when feet are crammed into shoes so tight that the front of the toes are pushed against the front of the shoes for prolonged periods of time. One or more toes then remain bent with the middle knuckle pointing …
The Cause Of Bunions?
Overview A bunion is an abnormal bump, or bony enlargement that forms at the base of your big toe. In the early stages, the bunion may be small and the side of your foot may be slightly swollen. As it progresses, the bump gets larger and b…
What Is Over-Pronation Of The Feet
Overview Overpronation is the exaggerated inward rolling of the foot and ankle, which can lead to a collapsed arch and flat feet. Many people overpronate and do not even realize it; one way to tell is to simply look at the foot and see how…
Physiotherapy For Calcaneal Apophysitis
Overview Sever's disease occurs in children when the growth plate (which is the growing part of the heel) is injured. The foot is one of the first body parts to grow to full size. This usually occurs in early puberty. During this time, bon…
Which Are The Principal Causes Of Posterior Tibial Tendon Dysfunction (PTTD) ?
Overview Adult acquired flatfoot deformity (AAFD) is a painful condition resulting from the collapse of the longitudinal (lengthwise) arch of the foot. As the name suggests, this condition is not present at birth or during childhood. It oc…
Foot Pain In The Arch And Ankle
Overview The arch of the foot is made from a complex series of bones tendons and ligaments. According to podiatric practice there is only one important arch of the foot on the medial side. The height of the arch varies and having a flat fo…
Dealing With Achilles Tendonitis Suffering
Overview Achilles-tendinitis is characterized by inflammation and pain at the Achilles tendon (back of the ankle). This tendon, sometimes called the heel cord, is the tendon attachment of the calf muscles from the leg and knee to the heel.…
Fallen Arches Causes, Signs Or Symptoms And Therapy
Overview Flat feet and fallen arches are common conditions that are in most cases asymptomatic. However, in patients who do have symptoms, treatments are available that can help reduce pain and promote efficient movement. Orthotic devices …
Pain In The Arches Cause And Effect
Overview Flat feet are characterized by no arch in the inner foot. It can be a genetic condition or the result of improper body mechanics. Often the whole of the foot will contact the ground. A healthy foot structure supports the body's we… | ESSENTIALAI-STEM |
Persianate society
A Persianate society is a society that is based on or strongly influenced by the Persian language, culture, literature, art and/or identity.
The term "Persianate" is a neologism credited to Marshall Hodgson. In his 1974 book, The Venture of Islam: The expansion of Islam in the Middle Periods, he defined it thus: "The rise of Persian had more than purely literary consequences: it served to carry a new overall cultural orientation within Islamdom.... Most of the more local languages of high culture that later emerged among Muslims... depended upon Persian wholly or in part for their prime literary inspiration. We may call all these cultural traditions, carried in Persian or reflecting Persian inspiration, 'Persianate' by extension."
The term designates ethnic Persians but also societies that may not have been predominantly ethnically Persian but whose linguistic, material or artistic cultural activities were influenced by or based on Persianate culture. Examples of pre-19th-century Persianate societies were the Seljuq, Timurid, Mughal, and Ottoman dynasties.
Western: Central Asia to West Asia
* Samanid Empire (819–999)
* Saffarid (861–1003)
* Abbasid Caliphate (750-1517)
* Rustamid dynasty(777–909)
* Tahirid dynasty(821–873)
* Shirvanshahs(861–1538)
* Alavid (864–928)
* Sajid (889–929)
* Sallarid (919–1062)
* Ziyarid (931–1090)
* Ilyasid (932–968)
* Buyid (934–1062)
* Shaddadid (951–1199)
* Ravadid (955–1070/1116)
* Kakuyid (1008–1141)
* Seljuk Empire (1037–1194)
* Sultanate of Rum (1077–1308)
* Khwarazmian Empire (1077–1231)
* Nizari Ismaili state (1090–1273)
* Mihrabanid (1236–1537)
* Il Khanate (1256–1335)
* Ottoman Empire (1299–1922)
* Muzaffarid (1314–1393)
* Jalairid (1335–1432)
* Injuid (1335–1357)
* Sarbadari (1337–1381)
* Chobanid (1338–1357)
* Afrasiyab (1349–1504)
* Marashiyan (1359–1596)
* Timurid (1370–1507)
* Qara Qoyunlu (1374–1468)
* Sufid (1361–1379)
* Aq Qoyunlu (1378–1503)
* Crimean Khanate (1441–1783)
* Kazakh Khanate (1465–1847)
* Siberian Khanate (1468–1598)
* Safavid Iran (1501–1736)
* Khiva Khanate (1511–1920)
* Afsharid Iran (1736–1796)
* Zand (1751–1794)
* Qajar Iran (1789–1925)
* Pahlavi Iran (1925–1979)
Eastern: Central Asia to South Asia
* Ghurid (before 786–1215)
* Qarakhanid (840–1212)
* Ghaznavid (977–1186)
* Sindh Sultanate (1010–1593) and (1701–1843)
* Delhi Sultanate (1207–1526)
* Chagatai Khanate (1226–1705)
* Kartid (1244–1381)
* Kashmir Sultanate (1320–1589)
* Madurai Sultanate (1335–1378)
* Bahamani Sultanate (1347–1527)
* Bengal Sultanate (1352–1576)
* Khandesh Sultanate (1382–1601)
* Malwa Sultanate (1392–1562)
* Jaunpur Sultanate (1394–1479)
* Gujarat Sultanate (1394–1573)
* Langah Sultanate (1445–1540)
* Malerkotla (1454–1948)
* Berar Sultanate (1490–1572)
* Ahmadnagar Sultanate (1490–1636)
* Janjira (1489–1948)
* Bijapur Sultanate (1490–1686)
* Bidar Sultanate (1492–1619)
* Bukhara Khanate (1501–1785)
* Golconda Sultanate (1518–1687)
* Mughal Empire (1526–1857)
* Sur Empire (1538–1556)
* Kalat Khanate (1666–1955)
* Bhopal (1708–1949)
* Kokanad Khanate (1709–1876)
* Hotak (1709–1738)
* Carnatic Sultanate (1710–1855)
* Rohilkhand (1721–1774)
* Hyderabad (1724–1948)
* Rampur (1774–1947)
* Junagadh (1730–1948)
* Oudh (1732–1856)
* Afghan Empire (1747–1863)
* Bahawalpur (1748–1955)
* Mysore Kingdom (1761–1799)
* Bukhara Emirate (1785–1920)
* Sachin (1791–1948)
* Sikh Empire (1799–1849)
* Tonk (1806–1949)
* Barakzai Afghanistan (1818–1973)
* Jammu and Kashmir (1846–1952)
* Khairpur (1853–1955)
History
Persianate culture flourished for nearly fourteen centuries. It was a mixture of Persian and Islamic cultures that eventually underwent Persification and became the dominant culture of the ruling and elite classes of Greater Iran, Asia Minor, and South Asia.
When the peoples of Greater Iran were conquered by Islamic forces in the 7th and 8th centuries, they became part of an empire much larger than any previous one under Persian rule. While the Islamic conquest led to the Arabization of language and culture in the former Byzantine territories, this did not happen in Persia. Rather, the new Islamic culture evolving there was largely based on pre-Islamic Persian traditions of the area, as well as on the Islamic customs that were introduced to the region by the Arab conquerors.
Persianate culture, especially among the elite classes, spread across the Muslim territories in western, central, and south Asia, although populations across this vast region had conflicting allegiances (sectarian, local, tribal, and ethnic) and spoke many different languages. It was spread by poets, artists, architects, artisans, jurists, and scholars, who maintained relations among their peers in the far-flung cities of the Persianate world, from Anatolia to India.
Persianate culture involved modes of consciousness, ethos, and religious practices that have persisted in the Iranian world against hegemonic Arab Muslim (Sunni) cultural constructs. This formed a calcified Persianate structure of thought and experience of the sacred, entrenched for generations, which later informed history, historical memory, and identity among Alid loyalists and heterodox groups labeled by sharia-minded authorities as ghulāt. In a way, along with investing the notion of heteroglossia, Persianate culture embodies the Iranian past and ways in which this past blended with the Islamic present or became transmuted. The historical change was largely on the basis of a binary model: a struggle between the religious landscapes of late Iranian antiquity and a monotheist paradigm provided by the new religion, Islam.
This duality is symbolically expressed in the Shiite tradition that Husayn ibn Ali, the third Shi'ite Imam, had married Shahrbanu, daughter of Yazdegerd III, the last Sassanid king of Iran. This genealogy makes the later imams, descended from Husayn and Shahrbanu, the inheritors of both the Islamic Prophet Muhammad and of the pre-Islamic Sassanid kings.
Origins
After the Arab Muslim conquest of Iran, Pahlavi, the language of Pre-Islamic Iran, continued to be widely used well into the second Islamic century (8th century) as a medium of administration in the eastern lands of the Caliphate. Despite the Islamization of public affairs, the Iranians retained much of their pre-Islamic outlook and way of life, adjusted to fit the demands of Islam. Towards the end of the 7th century, the population began resenting the cost of sustaining the Arab caliphs, the Umayyads, and in the 8th century, a general Iranian uprising—led by Abu Muslim Khorrasani—brought another Arab family, the Abbasids, to the Caliph's throne.
Under the Abbasids, the capital shifted from Syria to Iraq, which had once been part of the Sassanid Empire and was still considered to be part of the Iranian cultural domain. Persian culture, and the customs of the Persian Barmakid viziers, became the style of the ruling elite. Politically, the Abbasids soon started losing their control over Iranians. The governors of Khurasan, the Tahirids, though appointed by the caliph, were effectively independent. When the Persian Saffarids from Sistan freed the eastern lands, the Buyyids, the Ziyarids and the Samanids in Western Iran, Mazandaran and the north-east respectively, declared their independence.
The separation of the eastern territories from Baghdad was expressed in a distinctive Persianate culture that became dominant in west, central, and south Asia, and was the source of innovations elsewhere in the Islamic world. The Persianate culture was marked by the use of the New Persian language as a medium of administration and intellectual discourse, by the rise of Persianised-Turks to military control, by the new political importance of non-Arab ulama and by the development of an ethnically composite Islamic society.
Pahlavi was the lingua franca of the Sassanian Empire before the Arab invasion, but towards the end of the 7th and the beginning of the 8th century Arabic became a medium of literary expression. In the 9th century, a New Persian language emerged as the idiom of administration and literature. The Tahirid and Saffarid dynasties continued using Persian as an informal language, although for them Arabic was the "language for recording anything worthwhile, from poetry to science", but the Samanids made Persian a language of learning and formal discourse. The language that appeared in the 9th and 10th centuries was a new form of Persian, derivative of the Middle-Persian of pre-Islamic times, but enriched amply by Arabic vocabulary and written in the Arabic script.
The Persian language, according to Marshall Hodgson in his The Venture of Islam, was to form the chief model for the rise of still other languages to the literary level. Like Turkish, most of the more local languages of high culture that later emerged among Muslims were heavily influenced by Persian (Urdu being a prime example). One may call these traditions, carried in Persian or reflecting Persian inspiration, ‘Persianate’ by extension. This seems to be the origin of the term Persianate.
Spread
The Iranian dynasty of the Samanids began recording its court affairs in Persian as well as Arabic, and the earliest great poetry in New Persian was written for the Samanid court. The Samanids encouraged translation of religious works from Arabic into Persian. In addition, the learned authorities of Islam, the ulama, began using the Persian lingua franca in public. The crowning literary achievement in the early New Persian language was the Shahnameh (Book of Kings), presented by its author Ferdowsi to the court of Mahmud of Ghazni (998–1030). This was a kind of Iranian nationalistic resurrection: Ferdowsi galvanized Persian nationalistic sentiment by invoking pre-Islamic Persian heroic imagery and enshrined in literary form the most treasured folk stories.
Ferdowsi's Shahnameh enjoyed a special status in Iranian courtly culture as a historical narrative as well as a mythical one. The powerful effect that this text came to have on the poets of this period is partly due to the value that was attached to it as a legitimizing force, especially for new rulers in the Eastern Islamic world:
"In the Persianate tradition the Shahnameh was viewed as more than literature. It was also a political treatise, as it addressed deeply rooted conceptions of honor, morality, and legitimacy. Illustrated versions of it were considered desirable as expressions of the aspirations and politics of ruling elites in the Iranian world."
The Persianate culture that emerged under the Samanids in Greater Khorasan, in northeast Persia and the borderlands of Turkistan exposed the Turks to Persianate culture; The incorporation of the Turks into the main body of the Middle Eastern Islamic civilization, which was followed by the Ghaznavids, thus began in Khorasan; "not only did the inhabitants of Khurasan not succumb to the language of the nomadic invaders, but they imposed their own tongue on them. The region could even assimilate the Turkic Ghaznavids and Seljuks (11th and 12th centuries), the Timurids (14th and 15th centuries), and the Qajars (19th and 20th centuries).
The Ghaznavids, the rivals and future successors of the Samanids, ruled over the southeastern extremities of Samanid territories from the city of Ghazni. Persian scholars and artists flocked to their court, and the Ghaznavids became patrons of Persianate culture. The Ghaznavids took with them Persianate culture as they subjugated Western and Southern Asia. Apart from Ferdowsi, Rumi, Abu Ali Sina, Al-Biruni, Unsuri Balkhi, Farrukhi Sistani, Sanayi Ghaznawi and Abu Sahl Testari were among the great Iranian scientists and poets of the period under Ghaznavid patronage.
Persianate culture was carried by successive dynasties into Western and Southern Asia, particularly by the Persianized Seljuqs (1040–1118) and their successor states, who presided over Iran, Syria, and Anatolia until the 13th century, and by the Ghaznavids, who in the same period dominated Greater Khorasan and parts of India. These two dynasties together drew the centers of the Islamic world eastward. The institutions stabilized Islamic society into a form that would persist, at least in Western Asia, until the 20th century.
The Ghaznavids moved their capital from Ghazni to Lahore in modern Pakistan, which they turned into another center of Islamic culture. Under their patronage, poets and scholars from Kashgar, Bukhara, Samarkand, Baghdad, Nishapur, Amol and Ghazni congregated in Lahore. Thus, the Persian language and Persianate culture was brought deep into India and carried further in the 13th century. The Seljuqs won a decisive victory over the Ghaznavids and swept into Khorasan; they brought Persianate culture westward into western Persia, Iraq, Anatolia, and Syria. Iran proper along with Central Asia became the heartland of Persian language and culture.
As the Seljuqs came to dominate western Asia, their courts were Persianized as far west as the Mediterranean Sea. Under their rule, many pre-Islamic Iranian traditional arts like Sassanid architecture were resurrected, and great Iranian scholars were patronized. At the same time, the Islamic religious institutions became more organized and Sunni orthodoxy became more codified.
The Persian jurist and theologian Al-Ghazali was among the scholars at the Seljuq court who proposed a synthesis of Sufism and Sharia, which became the basis for a richer Islamic theology. Formulating the Sunni concept of division between temporal and religious authorities, he provided a theological basis for the existence of the Sultanate, a temporal office alongside the Caliphate, which at that time was merely a religious office. The main institutional means of establishing a consensus of the ulama on these dogmatic issues was the Nezamiyeh, better known as the madrasas, named after its founder Nizam al-Mulk, a Persian vizier of the Seljuqs. These schools became the means of uniting Sunni ulama, who legitimized the rule of the Sultans. The bureaucracies were staffed by graduates of the madrasas, so both the ulama and the bureaucracies were under the influence of esteemed professors at the madrasas.
Shahnameh's impact and affirmation of Persianate culture
As the result of the impacts of Persian literature as well as to further political ambitions, it became a custom for rulers in the Persianate lands to not only commission a copy of the Shahnameh, but also to have his own epic, allowing court poets to attempt to reach the level of Ferdowsi:
"Thus, as with any piece of historical writing, the Shahnameh can be evaluated as a historical source on two levels: firstly, for its contribution to the store of basic factual knowledge of a period, and secondly, for the light it sheds, intentionally or otherwise, on contemporary thought and politics."
Iranian and Persianate poets received the Shahnameh and modeled themselves after it. Murtazavi formulates three categories of such works too: poets who took up material not covered in the epic, poets who eulogized their patrons and their ancestors in masnavi form for monetary reward, and poets who wrote poems for rulers who saw themselves as heroes in the Shahnameh, echoing the earlier Samanid trend of patronizing the Shahnameh for legitimizing texts.
First, Persian poets attempted to continue the chronology to a later period, such as the Zafarnamah of the Ilkhanid historian Hamdollah Mostowfi (d. 1334 or 1335), which deals with Iranian history from the Arab conquest to the Mongols and is longer than Ferdowsi's work. The literary value of these works must be considered on an individual basis as Jan Rypka cautions: "all these numerous epics cannot be assessed very highly, to say nothing of those works that were substantially (or literally) copies of Ferdowsi. There are however exceptions, such as the Zafar-Nameh of Hamdu'llah Mustaufi a historically valuable continuation of the Shah-nama" and the Shahanshahnamah (or Changiznamah) of Ahmad Tabrizi in 1337–38, which is a history of the Mongols written for Abu Sa'id.
Second, poets versified the history of a contemporary ruler for reward, such as the Ghazannameh written in 1361–62 by Nur al-Din ibn Shams al-Din. Third, heroes not treated in the Shahnameh and those having minor roles in it became the subjects of their own epics, such as the 11th-century Garshāspnāmeh by Asadi Tusi. This tradition, chiefly a Timurid one, resulted in the creation of Islamic epics of conquests as discussed by Marjan Molé. Also see the classification employed by Z. Safa for epics: milli (national, those inspired by Ferdowsi's epic), tarikhi (historical, those written in imitation of Nizami's Iskandarnamah) and dini for religious works. The other source of inspiration for Persianate culture was another Persian poet, Nizami, a most admired, illustrated and imitated writer of romantic masnavis.
Along with Ferdowsi's and Nizami's works, Amir Khusraw Dehlavi's khamseh came to enjoy tremendous prestige, and multiple copies of it were produced at Persianized courts. Seyller has a useful catalog of all known copies of this text.
Distinction
In the 16th century, Persianate culture became sharply distinct from the Arab world to the west, the dividing zone falling along the Euphrates. Socially the Persianate world was marked by a system of ethnologically defined elite statuses: the rulers and their soldiery were non-Iranians in origin, but the administrative cadres and literati were Iranians. Cultural affairs were marked by a characteristic pattern of language use: New Persian was the language of state affairs, scholarship and literature and Arabic the language of religion.
Safavids and the resurrection of Iranianhood in West Asia
The Safavid dynasty ascended to predominance in Iran in the 16th century—the first native Iranian dynasty since the Buyyids. The Safavids, who were of mixed Kurdish, Turkic, Georgian, Circassian and Pontic Greek ancestry, moved to the Ardabil region in the 11th century. They re-asserted the Persian identity over many parts of West Asia and Central Asia, establishing an independent Persian state, and patronizing Persian culture They made Iran the spiritual bastion of Shi’ism against the onslaughts of orthodox Sunni Islam, and a repository of Persian cultural traditions and self-awareness of Persian identity.
The founder of the dynasty, Shah Isma'il, adopted the title of Persian Emperor Pādišah-ī Īrān, with its implicit notion of an Iranian state stretching from Afghanistan as far as the Euphrates and the North Caucasus, and from the Oxus to the southern territories of the Persian Gulf. Shah Isma'il's successors went further and adopted the title of Shāhanshāh (king of kings). The Safavid kings considered themselves, like their predecessors the Sassanid Emperors, the khudāygān (the shadow of God on earth). They revived Sassanid architecture, build grand mosques and elegant charbagh gardens, collected books (one Safavid ruler had a library of 3,000 volumes), and patronized "Men of the Pen" The Safavids introduced Shiism into Persia to distinguish Persian society from the Ottomans, their Sunni archrivals to the west.
Ottomans
At the beginning of the 14th century, the Ottomans rose to predominance in Asia Minor. The Ottomans patronized Persian literature for five and a half centuries and attracted great numbers of writers and artists, especially in the 16th century. One of the most renowned Persian poets in the Ottoman court was Fethullah Arifi Çelebi, also a painter and historian, and the author of the Süleymanname (or Suleyman-nama), a biography of Süleyman the Magnificent. At the end of the 17th century, they gave up Persian as the court and administrative language, using Turkish instead; a decision that shocked the highly Persianized Mughals in India. The Ottoman Sultan Suleyman wrote an entire divan in Persian language. According to Hodgson:
"The rise of Persian (the language) had more than purely literary consequence: it served to carry a new overall cultural orientation within Islamdom. Henceforth while Arabic held its own as the primary language of the religious disciplines and even, largely, of natural science and philosophy, Persian became, in an increasingly part of Islamdom, the language of polite culture; it even invaded the realm of scholarship with increasing effects. It was to form the chief model of the rise of still other languages. Gradually a third "classical" tongue emerged, Turkish, whose literature was based on Persian tradition."
Toynbee's assessment of the role of the Persian language is worth quoting in more detail, from A Study of History:
"In the Iranian world, before it began to succumb to the process of Westernization, the New Persian language, which had been fashioned into literary form in mighty works of art...gained a currency as a lingua franca; and at its widest, about the turn of the sixteenth and seventeenth centuries of the Christian Era, its range in this role extended, without a break, across the face of South-Eastern Europe and South-Western Asia from the Ottoman pashalyq of Buda, which had been erected out of the wreckage of the Western Christian Kingdom of Hungary after the Ottoman victory at Mohacz in A.D. 1526, to the Muslim "successor-states" which had been carved, after the victory of the Deccanese Muslim princes at Talikota in A.D. 1565, out of the carcass of the slaughtered Hindu Empire of Vijayanagar. For this vast cultural empire the New Persian language was indebted to the arms of Turkish-speaking empire-builders, reared in the Iranian tradition and therefore captivated by the spell of the New Persian literature, whose military and political destiny it had been to provide one universal state for Orthodox Christendom in the shape of the Ottoman Empire and another for the Hindu World in the shape of the Timurid Mughal Raj. These two universal states of Iranian construction on Orthodox Christian and on Hindu ground were duly annexed, in accordance with their builders' own cultural affinities, to the original domain of the New Persian language in the homelands of the Iranian Civilization on the Iranian plateau and in the Basin of the Oxus and the Jaxartes; and in the heyday of the Mughal, Safawi, and Ottoman regimes New Persian was being patronized as the language of literae humaniores by the ruling element over the whole of this huge realm, while it was also being employed as the official language of administration in those two-thirds of its realm that lay within the Safawi and the Mughal frontiers."
E. J. W. Gibb is the author of the standard A Literary History of Ottoman Poetry in six volumes, whose name has lived on in an important series of publications of Arabic, Persian, and Turkish texts, the Gibb Memorial Series. Gibb classifies Ottoman poetry between the "Old School", from the 14th century to about the middle of the 19th century, during which time Persian influence was dominant; and the "Modern School", which came into being as a result of the Western impact. According to Gibb in the introduction (Volume I):
"the Turks very early appropriated the entire Persian literary system down to its minute detail, and that in the same unquestioning and wholehearted fashion in which they had already accepted Islam."
The Saljuqs had, in the words of the same author:
"attained a very considerable degree of culture, thanks entirely to Persian tutorage. About the middle of the eleventh century they [that is, the Saljuqs] had overrun Persia, when, as so often happened, the Barbarian conquerors adopted the culture of their civilized subjects. Rapidly the Seljuq Turks pushed their conquest westward, ever carrying with them Persian culture...[s]o, when some hundred and fifty years later Sulayman's son [the leader of the Ottomans]... penetrated into Asia Minor, they [the Ottomans] found that although Seljuq Turkish was the everyday speech of the people, Persian was the language of the court, while Persian literature and Persian culture reigned supreme. It is to the Seljuqs with whom they were thus fused, that the Ottomans, strictly so called, owe their literary education; this therefore was of necessity Persian as the Seljuqs knew no other. The Turks were not content with learning from the Persians how to express thought; they went to them to learn what to think and in what way to think. In practical matters, in the affairs of everyday life and in the business of government, they preferred their own ideas; but in the sphere of science and literature they went to school with the Persian, intent not merely on acquiring his method, but on entering into his spirit, thinking his thought and feeling his feelings. And in this school they continued so long as there was a master to teach them; for the step thus taken at the outset developed into a practice; it became the rule with the Turkish poets to look ever Persia-ward for guidance and to follow whatever fashion might prevail there. Thus it comes about that for centuries Ottoman poetry continued to reflect as in a glass the several phases through which that of Persia passed...[s]o the first Ottoman poets, and their successors through many a generation, strove with all their strength to write what is little else than Persian poetry in Turkish words. But such was not consciously their aim; of national feeling in poetry they dreamed not; poetry was to them one and indivisible, the language in which it was written merely an unimportant accident."
Persianate culture of South Asia
In general, from its earliest days, Persian culture was brought into the Subcontinent (or South Asia) by various Persianised Turkic and Afghan dynasties. South Asian society was enriched by the influx of Persian-speaking and Islamic scholars, historians, architects, musicians, and other specialists of high Persianate culture who fled the Mongol devastation. The sultans of Delhi, who were of Turko-Afghan origin, modeled their lifestyles after the Persian upper classes. They patronized Persian literature and music, but became especially notable for their architecture, because their builders drew from Irano-Islamic architecture, combining it with Indian traditions to produce a profusion of mosques, palaces, and tombs unmatched in any other Islamic country. The speculative thought of the times at the Mughal court, as in other Persianate courts, leaned towards the eclectic gnostic dimension of Sufi Islam, having similarities with Hindu Vedantism, indigenous Bhakti and popular theosophy.
The Mughals, who were of Turco-Mongol descent, strengthened the Indo-Persian culture, in South Asia. For centuries, Iranian scholar-officials had immigrated to the region where their expertise in Persianate culture and administration secured them honored service within the Mughal Empire. Networks of learned masters and madrasas taught generations of young South Asian men Persian language and literature in addition to Islamic values and sciences. Furthermore, educational institutions such as Farangi Mahall and Delhi College developed innovative and integrated curricula for modernizing Persian-speaking South Asians. They cultivated Persian art, enticing to their courts artists and architects from Bukhara, Tabriz, Herat, Shiraz, and other cities of Greater Iran. The Taj Mahal and its Charbagh were commissioned by the Mughal emperor Shah Jahan for his Iranian bride.
Iranian poets, such as Sa’di, Hafez, Rumi and Nizami, who were great masters of Sufi mysticism from the Persianate world, were the favorite poets of the Mughals. Their works were present in Mughal libraries and counted among the emperors’ prized possessions, which they gave to each other; Akbar and Jahangir often quoted from them, signifying that they had imbibed them to a great extent. An autographed note of both Jahangir and Shah Jahan on a copy of Sa’di's Gulestān states that it was their most precious possession. A gift of a Gulestān was made by Shah Jahan to Jahanara Begum, an incident which is recorded by her with her signature. Shah Jahan also considered the same work worthy enough to be sent as a gift to the king of England in 1628, which is presently in the Chester Beatty Library, Dublin. The emperor often took out auguries from a copy of the diwan of Hafez belonging to his grandfather, Humayun. One such incident is recorded in his own handwriting in the margins of a copy of the diwan, presently in the Khuda Bakhsh Oriental Library, Patna. The court poets Naziri, ‘Urfi, Faizi, Khan-i Khanan, Zuhuri, Sanai, Qodsi, Talib-i Amuli and Abu Talib Kalim were all masters imbued with a similar Sufi spirit, thus following the norms of any Persianate court.
The tendency towards Sufi mysticism through Persianate culture in Mughal court circles is also testified by the inventory of books that were kept in Akbar's library, and are especially mentioned by his historian, Abu'l Fazl, in the Ā’in-ī Akbarī. Some of the books that were read out continually to the emperor include the masnavis of Nizami, the works of Amir Khusrow, Sharaf Manayri and Jami, the Masnavi i-manavi of Rumi, the Jām-i Jam of Awhadi Maraghai, the Hakika o Sanā’i, the Qabusnameh of Keikavus, Sa’di's Gulestān and Būstān, and the diwans of Khaqani and Anvari.
This intellectual symmetry continued until the end of the 19th century, when a Persian newspaper, Miftah al-Zafar (1897), campaigned for the formation of Anjuman-i Ma’arif, an academy devoted to the strengthening of Persian language as a scientific language.
Persian poetry (Sufi poetry)
From about the 12th century, Persian lyric poetry was enriched with a spirituality and devotional depth not to be found in earlier works. This development was due to the pervasive spread of mystical experience within Islam. Sufism developed in all Muslim lands, including the sphere of Persian cultural influence. As a counterpoise to the rigidity of formal Islamic theology and law, Islamic mysticism sought to approach the divine through acts of devotion and love rather than through mere rituals and observance. Love of God being the focus of the Sufis' religious sentiments, it was only natural for them to express it in lyrical terms, and Persian Sufis, often of exceptional sensibility and endowed with poetic verve, did not hesitate to do so. The famous 11th-century Sufi, Abu Sa'id of Mehna frequently used his own love quatrains (as well as others) to express his spiritual yearnings, and with mystic poets such as Attar and Iraqi, mysticism became a legitimate, even fashionable subject of lyric poems among the Persianate societies. Furthermore, as Sufi orders and centers (Khaneghah) spread throughout Persian societies, Persian mystic poetic thought gradually became so much a part of common culture that even poets who did not share Sufi experiences ventured to express mystical ideas and imagery in their work.
Conclusion
As the broad cultural region remained politically divided, the sharp antagonisms between empires stimulated the appearance of variations of Persianate culture. After 1500, the Iranian culture developed distinct features of its own, with interposition of strong pre-Islamic and Shiite Islamic culture. Iran's ancient cultural relationship with Southern Iraq (Sumer/Babylonia) remained strong and endured in spite of the loss of Mesopotamia to the Ottomans. Its ancient cultural and historical relationship with the Caucasus endured until the loss of Azerbaijan, Armenia, eastern Georgia and parts of the North Caucasus to Imperial Russia following the Russo-Persian Wars in the course of the 19th century. The culture of peoples of the eastern Mediterranean in Anatolia, Syria, and Egypt developed somewhat independently; India developed a vibrant and completely distinct South Asian style with little to no remnants of the once patronized Indo-Persian culture by the Mughals. | WIKI |
Администратор пользователя Sonata - Зависимость пользовательских полей
Я расширил класс SonataAdmin для FOSUser и добавил 2 настраиваемых поля (тип выбора из внешнего источника данных):Company и я'Sector
хотел бы сделатьSector зависит отCompanyТаким образом, если пользователь выбирает Компанию, он фильтрует доступные Секторы.
Я хотя и об использовании FormEvents для фильтрации при загрузке страницы, но я недаже не знаю, как получитьCompany значение текущей формы.
Вот часть моего обычаяSectorType
public function buildForm(FormBuilderInterface $builder, array $options)
{
$builder->addEventListener(FormEvents::PRE_SET_DATA
, function(FormEvent $event) {
$data = $event->getData();
$form = $event->getForm();
// Need to get the company value here if set
});
}
public function setDefaultOptions(OptionsResolverInterface $resolver)
{
$resolver->setDefaults(array(
'choices' => $this->getSectors(),
));
}
public function getSectors()
{
$sects = array();
// Need to pass the selected company value to my getList
// (which gets the list of sector as you can imagine)
if (($tmp_sects = $this->ssrs->getList('Sector'))) {
foreach ($tmp_sects as $sect) {
$label = $sect['id'] ? $sect['label'] : '';
$sects[$sect['id']] = $label;
}
}
return $sects;
}
Итак, вопрос:
Как получить выбранныйCompany из моего обычая?SectorType
После этого я'Вам нужно будет обновить сектор с помощью Ajax, но это будет другой вопрос
miragedesign25 июл. 2013 г., 11:41
Посмотрите на этот вопрос, чтобы найти ответ:stackoverflow.com/questions/10118868/…!
Ответы на вопрос(1)
У меня была похожая проблема. Мне нужно было создать объект продажи, который нужно было бы связать во многих отношениях с сущностью предприятия и во многих отношениях со службами. Вот объект продажи:
Дело в том, что сервисы доступны в зависимости от выбранных компаний. Например, услуги a и b могут предоставляться только компании x. А услуги b и c могут предоставляться только компании y. Так что в моем админе в зависимости от выбранной компании мне приходилось отображать доступные сервисы. Для этого мне нужно было сделать 2 вещи:
Сначала создайте динамическую форму с моим администратором продаж, чтобы на стороне сервера я мог получить нужные услуги, доступные для компании, указанной в моем отчете о продажах. И во-вторых, мне пришлось создать собственный тип формы для элемента формы моей компании, чтобы при изменении пользователем на стороне клиента он отправлял ajax-запрос, чтобы получить нужные услуги для выбранной компании.
Что касается моей первой проблемы, я сделал нечто похожее на то, что вы пытались достичь, но вместо того, чтобы создать специальный пользовательский тип для моего элемента services, я добавил слушателя событий непосредственно в администраторе.
Вот сущность Продажа:
/**
*
* @ORM\Table(name="sales")
* @ORM\Entity
* @ORM\HasLifecycleCallbacks()
*/
class Sale
{
/**
* @var integer $id
*
* @ORM\Column(name="id", type="integer", nullable=false)
* @ORM\Id
* @ORM\GeneratedValue(strategy="IDENTITY")
*/
public $id;
/**
* @ORM\ManyToOne(targetEntity="Branch")
* @ORM\JoinColumn(name="branch_id", referencedColumnName="id", nullable = false)
* @Assert\NotBlank(message = "Debe especificar una empresa a la cual asignar el precio de este exámen!")
*/
private $branch;
/** Unidirectional many to many
* @ORM\ManyToMany(targetEntity="Service")
* @ORM\JoinTable(name="sales_services",
* joinColumns={@ORM\JoinColumn(name="sale_id", referencedColumnName="id")},
* inverseJoinColumns={@ORM\JoinColumn(name="service_id", referencedColumnName="id")}
* )
* @Assert\Count(min = "1", minMessage = "Debe especificar al menos un servicio a realizar!")
*/
private $services;
public function __construct() {
$this->services = new \Doctrine\Common\Collections\ArrayCollection();
}
/**
* Get id
*
* @return integer
*/
public function getId()
{
return $this->id;
}
/**
* Set branch
*
* @param Astricom\NeurocienciasBundle\Entity\Branch $branch
*/
//default value always have to be null, because when validation constraint is set to notblank,
//if default is not null, before calling the validation constraint an error will pop up explaining
//that no instance of Branch was passed to the $branch argument.
public function setBranch(\Astricom\NeurocienciasBundle\Entity\Branch $branch = null)
{
$this->branch = $branch;
}
/**
* Get branch
*
* @return Astricom\NeurocienciasBundle\Entity\Branch
*/
public function getBranch()
{
return $this->branch;
}
/**
* Add service
*
* @param \Astricom\NeurocienciasBundle\Entity\Service|null $service
*/
public function addServices(\Astricom\NeurocienciasBundle\Entity\Service $service = null)
{
$this->services[] = $service;
}
/**
* Get services
*
* @return Doctrine\Common\Collections\Collection
*/
public function getServices()
{
return $this->services;
}
/**
* Sets the creation date
*
* @param \DateTime|null $createdAt
*/
public function setCreatedAt(\DateTime $createdAt = null)
{
$this->createdAt = $createdAt;
}
/**
* Returns the creation date
*
* @return \DateTime|null
*/
public function getCreatedAt()
{
return $this->createdAt;
}
/**
* Sets the last update date
*
* @param \DateTime|null $updatedAt
*/
public function setUpdatedAt(\DateTime $updatedAt = null)
{
$this->updatedAt = $updatedAt;
}
Итак, в конструкторе формы администратора:
protected function configureFormFields(FormMapper $formMapper) {
$em = $this->container->get('doctrine')->getEntityManager();
$branchQuery = $em->createQueryBuilder();
$branchQuery->add('select', 'b')
->add('from', 'Astricom\NeurocienciasBundle\Entity\Branch b')
->add('orderBy', 'b.name ASC');
$formMapper
->with('Empresa/Sucursal')
->add('branch','shtumi_ajax_entity_type',array('required' => true, 'label'=>'Empresa/Sucursal','error_bubbling' => true, 'empty_value' => 'Seleccione una empresa/sucursal', 'empty_data' => null, 'entity_alias'=>'sale_branch', 'attr'=>array('add_new'=>false), 'model_manager' => $this->getModelManager(), 'class'=>'Astricom\NeurocienciasBundle\Entity\Branch', 'query' => $branchQuery))
->end()
;
$builder = $formMapper->getFormBuilder();
$factory = $builder->getFormFactory();
$sale = $this->getSubject();
$builder->addEventListener(FormEvents::PRE_SET_DATA,
function(DataEvent $event) use ($sale,$factory, $em) {
$form = $event->getForm();
$servicesQuery = $em->createQueryBuilder();
$servicesQuery->add('select','s')
->add('from','Astricom\NeurocienciasBundle\Entity\Service s');
if (!$sale || !$sale->getId()) {
$servicesQuery
->where($servicesQuery->expr()->eq('s.id', ':id'))
->setParameter('id', 0);
}
else {
$servicesQuery
->join('s.branch', 'b')
->where($servicesQuery->expr()->eq('b.id', ':id'))
->setParameter('id', $sale->getBranch()->getId());
}
$form->add($factory->createNamed('services','entity',null,array('required' => true, 'label'=>'Servicios','error_bubbling' => true, 'attr'=>array('show_value_label'=>true),'class'=>'Astricom\NeurocienciasBundle\Entity\Service','multiple'=>true,'expanded'=>true,'query_builder'=>$servicesQuery)));
}
);
}
Хитрость была в том, чтобы передать данные форм. Это неработать, чтобы использовать evet->getData () в слушателе событийс функцией. Вместо этого я прошел через администратора->метод getSubject (). Затем вместо добавления типа формы sonataadmin внутри слушателя событийЯ должен был использовать простой тип формы Symfony.
Часть Ajax, как вы упомянули, это другой вопрос. В этом отношении все странные вещи в методе добавления веток в конструкторе форм связаны с настраиваемым типом поля. Дон»не беспокойся об этом.
Ваш ответ на вопрос | ESSENTIALAI-STEM |
How to Set Up Feed to Post's Extraction Rules
Extraction rules allow you to remove unwanted material from imported posts’ content. This is particularly useful to remove elements such as social network sharing buttons and adverts.
Each extraction rule is a CSS Selector, coupled with a removal type. The plugin will scan the post content when it is imported, and for each extraction rule, any matching elements are removed according to the removal type chosen.
Usage
To add an extraction rule, visit the Feed Source in question, scroll down to the Extraction Rules meta box, click the Add new button. A new row should appear below any existing extraction rules you might have.
To remove an extraction rule, click the button with the trash icon to the right of the extraction rule. The row containing the extraction rule will then disappear.
Examples
Below is a screenshot of the option’s interface. Each extraction rule is presented as a text field and a drop-down menu, for the CSS Selector and the removal type respectively.
In the above examples:
1. We are removing all <div> elements with the class share-btns.
2. We are removing all <a> elements (links), but keeping their content.
This allows us to remove the link elements, but keep the text, which results in unlinking the text.
3. We are removing all elements that are not <div> elements with the class content.
This allows you to remove everything else and only keep the matched elements and their contents.
Supported Selectors
Feed to Post uses the Ganon PHP library to make the extraction rules possible, and thus supports all selectors provided by Ganon. View the full list of supported CSS selectors here. View the list of selectors specific to Ganon here
Finding a CSS Selector
If you’re not sure how to locate the CSS selector for that particular part of the post that you’re looking to have removed from your site, you can follow the instructions in the post below. This will guide you to finding the extraction rules you need.
If you cannot find one that is unique to the item/text you want to be removed, it might not be possible to use an extraction rule for that item. If you’d like to confirm this you can contact our support team for more details.
For a comprehensive CSS cheat sheet, you can visit this page.
Disclaimer
We are committed to providing flexible and powerful importing solutions to help our customers get the result they need.
However, it is the responsibility of the customer to understand how these rules work. While we will answer any questions with regard to the usage of Extraction Rules, we are not responsible for providing rules for each individual case.
Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.
Still need help? Contact Us Contact Us | ESSENTIALAI-STEM |
Using NI-HSDIO in LabVIEW
NI Digital Waveform Generator/Analyzer Help
Edition Date: June 2013
Part Number: 370520P-01
»View Product Info
Download Help (Windows Only)
This topic assumes that you are using the National Instruments LabVIEW ADE to manage your code development and that you are familiar with the ADE.
To develop an NI-HSDIO application in LabVIEW, follow these general steps:
1. Open an existing or new LabVIEW VI.
2. From the Function Palette, locate the NI-HSDIO VIs at NI Measurements»NI-HSDIO.
3. Select the VIs that you want to use and drop them on the block diagram to build your application.
Example Programs for LabVIEW
If you are using LabVIEW 7.1 or later, you can use the NI Example Finder to search or browse examples. NI-HSDIO examples are classified by keyword, so you can search for a particular device or measurement function.
To browse the NI-HSDIO examples available in LabVIEW, launch LabVIEW, click Open»Examples, and navigate to Hardware Input and Output»Modular Instruments»NI-HSDIO. You can also access the examples using the Start menu, by selecting Start»All Programs»National Instruments»NI-HSDIO»Examples.
WAS THIS ARTICLE HELPFUL?
Not Helpful | ESSENTIALAI-STEM |
Maine and San Francisco have adopted ranked-choice voting. It’s working out.
Looking at the nation’s most intriguing experiments in local policy. The policy: Ranked-choice voting Where: San Francisco In place since: 2002 The problem: In March 2002, San Franciscans were ready for some new voting rules. The city had long used a two-round runoff system for elections, which usually meant a second round in December to get a majority winner. Voters were tired by then. Taxpayers complained of the cost. San Franciscans had experienced runoffs in 2000 and 2001, with turnout declines of 51 percent and 44 percent, respectively. Six of the past eight city elections had asked voters to come back to the polls a month later to ensure all city office holders won a majority of votes. So voters approved Proposition A and became the first US city to adopt instant-runoff voting in the modern era. A coalition of good-government reformers and progressive politicians got behind the voting system, a variation on a system that 24 US cities (including New York City and nearby Sacramento) had adopted between 1915 and 1948 in an earlier era of municipal reform. These days, IRV goes by ranked-choice voting. Same thing, different feature highlighted. As the name suggests, ranked-choice voting lets voters mark their first-choice candidate first, their second-choice candidate second, their third-choice candidate third, and so on. Easy as 1-2-3. Each voter has only one vote but can indicate their backup choices: If one candidate has an outright majority of first-place rankings, that candidate wins, just like a traditional election. But if no candidate has a majority in the first round, the candidate in last place is eliminated. Voters who had ranked that candidate first have their votes transferred to their backup — that is, the candidate they ranked second. This process continues until a single candidate gathers a majority. In San Francisco, there was another selling point besides eliminating costly low-turnout runoffs: Voters could vote with their heart first and their head second, picking their favorite candidate first without feeling they had “wasted” their vote, then picking the lesser of two evils second or third, knowing their vote would still count. But more than anything, the hope was that ranked-choice voting would encourage more civil campaigning, more engagement with voters, and better coalition-building. Candidates would now be angling for second- and third-choice preferences. They’d be nicer to each other as a result. They might even campaign together. How it worked: As San Francisco goes, so goes everyone else. In 2004, Berkeley followed suit; Oakland adopted the practice in 2006. So did Minnesota cities Minneapolis in 2006 and St. Paul in 2009. Unlike San Francisco, Minneapolis and St. Paul didn’t have two-round elections that spent taxpayer dollars on low-turnout December runoffs. They spent it on low-turnout primaries where fewer than one in 10 residents turned out. So why not just have one election, primary and general, rolled into one, where a ranked ballot did the whittling? Most there thought it was a good idea. Minnesotans were also familiar with the shortcomings of simple plurality voting. In 1998, Jesse Ventura became the state’s governor with just 37 percent of the vote in a three-way race. In 2002, Tim Pawlenty won with just 44.4 percent, also in a three-way race, with an independent getting 16.2 percent of the vote. (Pawlenty won again with a mere plurality in 2006 — 46 percent, with an independent getting 6.4 percent.) Against the backdrop of plurality elections producing mere plurality winners, the case for ranked-choice voting got stronger: Shouldn’t the winning candidate have to earn a true majority? Ranked-choice voting meant that once second- and third-choice preferences were counted, the winning candidate was indeed the most broadly preferred — a strong selling point. Twenty cities in the United States have now adopted ranked-choice voting. But the big news was that in 2018, Maine became the first state to adopt it for federal elections. This has catapulted the reform to a national spotlight, with presidential candidates like Sens. Elizabeth Warren and Michael Bennet now championing it. As promised, it has made politics a little less nasty. In cities with ranked-choice voting, candidates spent less time attacking each other, as compared to similar cities that didn’t adopt ranked-choice voting. Voters in these cities reported being more satisfied with local campaigns as a result (again, as compared to similar cities). Ranked-choice voting has also increased the share of racial minority candidates, female candidates, and female minority candidates running compared to similar cities. The scholars who have studied this most closely believe more minority candidates ran because under ranked choice, such candidates could reach out to other communities where they might not be the natural first choice and ask for second-choice votes. They believe women were more likely to run because under traditional winner-take-all elections, “women were deterred from running for office by … negative campaigning.” But with less negative campaigning and more cooperative campaigning, women are more likely to run. They’re also more likely to win, scholar Sarah John and her colleagues concluded. No voting system is perfect. Critics of ranked-choice voting say the task of having to rank multiple candidates unfairly overwhelms low-information voters, and that the added complexity hits poor minorities hardest. The editorial board of the San Francisco Chronicle last year called the process — in place for more than 15 years — “a baffling experience for many voters,” and decried a plan by two San Francisco mayoral candidates to defeat another, London Breed, by “gaming” the ranked-choice system. However, surveys have shown no difference in understanding of ranked-choice voting between white and nonwhite voters, and more than 90 percent of voters who have used the system describe it as simple. Some studies show declines among minority voters. But most likely, when properly accounting for other factors, turnout has probably remained stable, with no declines in poorer precincts. But cities are one thing. The RCV cities are solidly on the political left, and some are technically nonpartisan. How it works at the state level, or even the national level (as many, including me, have proposed) with contested partisan elections, is another. But the national stage is where RCV has its greatest promise. The zero-sum, binary nature of our two-party elections rewards negative campaigning, where winning comes from disqualifying the opponent. It pushes politicians into us-against-them rhetoric so many now decry. Ranked-choice voting would make space for political alternatives to emerge without being spoilers, potentially reorienting our stuck partisan division. Here, we might look not to the handful of reform-oriented cities but to Australia, which has used ranked-choice voting nationally for 101 years, and with a strong track record of moderate and stable politics. Most likely, the next step for ranked-choice voting is for more states to follow Maine’s lead, adopting it statewide. Maine’s first ranked-choice voting run in November went smoothly, though we’re most likely to see effects kick in with the next election, as candidates adjust to the new system. But Maine’s adoption did provoke some backlash from Republicans, including Gov. Paul LePage, who was twice elected with a mere plurality. LePage called it “the most horrific thing in the world.” As for San Francisco, it had a somewhat wild eight-round ranked-choice voting special mayoral election in June 2018. In the end, Breed became the city’s first female African American mayor, with 50.6 percent of the vote after all transfers, even though her two leading opponents joined forces. With 12 years of experience, San Franciscans have learned to use the system. They will use it again this November, for the city’s normally scheduled mayoral election. Lee Drutman is a senior fellow in the political reform program at New America. | NEWS-MULTISOURCE |
Talk:Filippo Sugar
About COI
Hi, I'm removing the section about COI, because SIAE is a society of authors and publishers, and in the course of all its history it obviously always had authors and publishers as representative figures. Furthermore, the 2014 Barnier directive stated that collecting societies should be represented by its members (authors and publishers). So, there is no potential COI. Additionally referenced sources don't talk about COI but tell instead, and with full evidence, that Filippo Sugar is a publisher, it's no secret he is. --Mcfedels84 (talk) 10:40, 27 June 2017 (UTC)
I'm re-adding that section; that fact it is always happened doesn't mean it's right. <IP_ADDRESS> (talk) 17:34, 25 August 2017 (UTC)
* Maybe it's not clear enough that SIAE stands for "Italian Society of Authors and Publishers", there is no possible conflict of interests in belonging to the category of fellows who form the one Society in Italy that only those categories of fellows can join to... You just can't be part of the Society if you aren't an authour or a publisher. I'm consequently reverting the edit, please gather some consensus here before re-adding the point, thank you. --g (talk) 11:26, 14 September 2017 (UTC)
About Paoli
Hi, I'm not removing it, but it is unclear to me why we are talking about tax evasion with regard to Gino Paoli in an article about another person. --Mcfedels84 (talk) 10:42, 27 June 2017 (UTC) | WIKI |
Symbols
[AlOpi]geq
f AlCa(HCO3)2 fAlCaO
Gram equivalents per liter of optimum alum dose First hydroxide complex of the aluminum ion Second hydroxide complex of the aluminum ion Fourth hydroxide complex of the aluminum ion Seventeenth hydroxide complex of the aluminum ion Thirty-fourth hydroxide complex of the aluminum ion Concentration of the first hydroxide complex of the aluminum ion, gmols/L
Concentration of the second hydroxide complex of the aluminum ion, gmols/L
Concentration of the fourth hydroxide complex of the aluminum ion, gmols/L
Concentration of the seventeenth hydroxide complex of the aluminum ion, gmols/L
Concentration of the thirty-fourth hydroxide complex of the aluminum ion, gmols/L
Fraction of MAlkgeq reacted by calcium bicarbonate Fraction of MAlkgeq reacted by lime f Feiica(HcO3)2 Fraction of MFeIIkgeq reacted in the presence of calcium bicarbonate fFeIICaO Fraction of MFeIIkgeq reacted by lime alone f FenICa(HCO3)2 Fraction of MFeIIIkgeq reacted by calcium bicarbonate fFeinCaO Fraction of MFemkgeq reacted by lime
[FeIIcpi]geq Gram equivalents per liter of optimum copperas dose
[FeIIIcpi]geq Gram equivalents per liter optimum dose of any of the two ferric salts
FeOH+ First hydroxide complex of the ferrous ion
Fe(OH)- Third hydroxide complex of the ferrous ion
[FeOH+] Concentration of the first hydroxide complex of the ferrous ion, gmols/L
[Fe(OH)-] Concentration of the first third hydroxide complex of the ferrous ion, gmols/L
FeOH2+ First hydroxide complex of the ferric ion
Fe(OH)+ Second hydroxide complex of the ferric ion
Fe2(OH)42+ Second hydroxide complex of the ferric double ion
Fe(OH)- Fourth hydroxide complex of the ferric ion
[FeOH2+] Concentration of the first hydroxide complex of the ferric ion, gmols/L
[Fe(OH)+] Concentration of the second hydroxide complex of the ferric ion, gmols/L
[Fe2(OH)2+] Concentration of the second hydroxide complex of the ferric double ion, gmols/L [Fe(OH)-] Concentration of the fourth hydroxide complex of the ferric ion, gmols/L
[H+p(] Optimum hydrogen ion concentration, gmoles/L
K Al(OH) Equilibrium constant of Al(OH)2+
K ai2(oh)2 c Equilibrium constant of Al2(OH)2+
K Ai(OH)4 c Equilibrium constant of Al(OH)-
KA^(OH) c Equilibrium constant of Al7(OH)1+
KAl13(OH)34c Equilibrium constant of Al13 (OH)354+
KFeOHc Equilibrium constant of FeOH+
KFeOHc Equilibrium constant of FeOH2+
KFe(OH) c Equilibrium constant of Fe(OH)+
KFe (OH) c Equilibrium constant of Fe2(OH)2
K Fe(OH)4 c Equilibrium constant of Fe(OH)-
K Fe(OH^ c Equilibrium constant of Fe(OH)-
Ksp ,Al(OH) Solubility product constant of Al(OH)3(s)
Ksp ,Fe(OH^ Solubility product constant of Fe(OH)2(s)
Ksp ,Fe(OH)3 Solubility product constant of Fe(OH)3(s)
Kw Ion product of water
MAl Kilograms of alum used
MAlkgeq Kilogram equivalents of alum used
MCa(HCO^Al Kilogram mass of calcium bicarbonate used with alum as coagulant
M Ca(HCO3)2kgeqAl
MCaOAl MCaOkgeqAl M AlOH
Mpell
Ca(HCO3)2FeII Ca(HCO3)2kgeqFeII
MCaOFeII MCaOkgeqFeII M FeOHFeII
Healthy Chemistry For Optimal Health
Healthy Chemistry For Optimal Health
Thousands Have Used Chemicals To Improve Their Medical Condition. This Book Is one Of The Most Valuable Resources In The World When It Comes To Chemicals. Not All Chemicals Are Harmful For Your Body – Find Out Those That Helps To Maintain Your Health.
Get My Free Ebook
Post a comment | ESSENTIALAI-STEM |
Arthur Douglas Carey
Arthur Douglas Carey (c. 1844–1936) was a British civil servant in India, now remembered as a traveller in Central Asia, and in particular for exploration in what is now Xinjiang.
Early life
Carey was educated at the City of London School, and qualified for the Indian Civil Service in 1864. He went out to Bombay in 1865. He was a Collector of Salt Revenue in 1881, and the same year Acting Commissioner of Indian Customs.
Expedition 1885–1887
On his self-financed Central Asian journey while on furlough from the Indian Civil Service, Carey started from Simla. He was accompanied from Leh as interpreter by Andrew Dalgleish. Their group left Leh and crossed the valley of the Chang Chenmo River into the Aksai Chin. For some of the way Carey and Dalgleish were accompanied by H. E. M. James. In Carey's words:
"I struck a bargain for baggage-ponies with the Tartars of the frontier villages on the Pangong Lake, and left Tanksé on the 12th of August with a caravan of thirty-one men and forty-nine ponies."
They travelled east from Nubra, passing the landmark Lake Mungtsa (various spellings) and reaching Tashlik-kul on the edge of the Aksai Chin on day 17. They used a high pass, rising to over 17,500 feet. They headed north to Keriya Town and so to Hotan (Khotan).
In terminology of the time attributed to Carl Ritter, the party had crossed the Kunlun Mountains. This first leg of the journey was 585 miles. The route was not at all well known, but had been documented in 1873 by Kishen Singh, in association with the mission of Douglas Forsyth to Kashgar. Singh went from north to south, rather than south to north, as Carey's party did, and Ney Elias later.
Carey and Dalgleish were the first Europeans to follow the Hotan River from Hotan downstream into the Tarim Basin, and the Yarkand River. At the confluence, they went along the Tarim River to the eastern Kashgar Plain. They visited Karasahr, and went into winter quarters at Kurla to its south. He then turned south to the Lop Nur salt lake region.
Crossing the Altyn-Tagh, the party gained the Tibetan Plateau, and visited the Qaidam Basin, now in Qinghai. Then looping north they crossed the so-called Humboldt Range of the Kunlun Mountains, and made a way back through Hami, Urumchi, and Yarkand. The expedition ended in Ladakh, reached by a more northerly route than on the outbound journey, and the Karakorum pass.
For his leadership of this expedition, Carey was awarded the Founder's Medal of the Royal Geographical Society in 1889.
Later life
Carey was Commissioner of Customs, Salt, Opium and Abkari, 1891. In 1891–2 he was in Lisbon, involved in the Goa Treaty negotiations, at the time of the Anglo-Portuguese Treaty of 1891. He retired from the Indian Civil Service in 1893, and went to live in Switzerland. He died on 11 June 1936, at age 91. | WIKI |
Wikipedia:Articles for deletion/Basilisk (fantasy role play)
The result was delete. I considered a merge but there is little that merits a merge to the main article. Still, let me know if anyone is willing to give it a try and I will provide the content. Tone 08:53, 6 October 2019 (UTC)
Basilisk (fantasy role play)
* – ( View AfD View log Stats )
Just an example farm of various appearances of the monster in fantasy. Fails GNG. ZXCVBNM (TALK) 04:27, 28 September 2019 (UTC)
* Note: This discussion has been included in the list of Fictional elements-related deletion discussions. ZXCVBNM (TALK) 04:27, 28 September 2019 (UTC)
* Note: This discussion has been included in the list of Games-related deletion discussions. ZXCVBNM (TALK) 04:27, 28 September 2019 (UTC)
* There is sourced info there that should be Merged into Basilisk. MarnetteD|Talk 04:39, 28 September 2019 (UTC)
* Delete - I considered a "Merge" to the main article on the mythological creature, but ultimately decided that it would not be appropriate. The information here runs afoul of being a game guide, and the majority of the sources here are not reliable, secondary sources, in some cases being literal game guides. I took a look at the two sources present that don't run afoul of this. In the first (the book by Gilsdorf), the coverage is limited to direct quotes pulled straight from the D&D monster manual, which does not do much to establish any sort of notability, either for a keep or a merge. The second (on the Harry Potter game) is actually not bad, but is not enough on its own to establish notability for a "Fantasy Role Play" variant of the creature. It wouldn't be a bad source to add to Magical_creatures_in_Harry_Potter, though.Rorshacma (talk) 14:55, 28 September 2019 (UTC)
* Merge to Basilisk. --Piotr Konieczny aka Prokonsul Piotrus| reply here 01:09, 30 September 2019 (UTC)
* Note: This discussion has been included in the list of Fantasy-related deletion discussions. Necrothesp (talk) 10:14, 2 October 2019 (UTC)
* Merge to Basilisk.4meter4 (talk) 15:34, 5 October 2019 (UTC)
| WIKI |
spot market
Noun
* 1) A market in which commodities are bought and sold for immediate delivery, with delivery usually taking place in the same or next business day.
* The price on the futures market depends in part on the price on the spot market.
Translations
* Chinese:
* Mandarin: 現貨市場
* Dutch:
* Finnish: spot-markkinat
* Spanish: mercado al contado | WIKI |
Page:History of the War between the United States and Mexico.djvu/166
138 the United States, and assured him and the citizens generally, that their persons, property and religion, would be sacredly respected.
While at the Upper Moro, the scouts sent out by General Kearny reported that the enemy were in force at the Moro Pass, a defile among the mountains about a mile distant from the village. On arriving there his men were drawn up in battle array, and preparations made to dislodge the Mexican forces. Just as the army were advancing, the general was informed that the enemy had retreated to the Pecos Pass, a remarkably strong position still further in the rear. At this place the canon, or valley, is contracted to a narrow gorge not more than twenty yards wide, through which the road passes on a shelf of rock jutting out from the cliffs, which rise almost perpendicular, several hundred feet high, on each side of the pass. Governor Armijo had collected here between three and four thousand men, with an apparent determination to dispute the passage with the American army. At the top of the ascent he planted his artillery, which raked the road, and were protected by a breastwork of felled trees. The mountain barriers securely guarded his flanks, and the position could only have been taken by a coup de main. With resolute defenders it might have been the Thermopylæ of New Mexico; but Armijo and his officers concluded to abandon it without firing a single gun in its defence, and retired in hot haste to Chihuahua. General Kearny passed through the defile, and entered the city of Santa Fé, the capital of New Mexico, on the 18th of August, without encountering the least resistance. Proceeding to the governor's house he took formal possession of the city and province. The American flag was hoisted in the | WIKI |
with import ; { config, pkgs, ... }: { options.krebs.permown = mkOption { default = {}; type = types.attrsOf (types.submodule ({ config, ... }: { options = { directory-mode = mkOption { default = "=rwx"; type = types.str; # TODO }; file-mode = mkOption { default = "=rw"; type = types.str; # TODO }; group = mkOption { apply = x: if x == null then "" else x; default = null; type = types.nullOr types.groupname; }; owner = mkOption { type = types.username; }; path = mkOption { default = config._module.args.name; type = types.absolute-pathname; }; umask = mkOption { default = "0027"; type = types.file-mode; }; }; })); }; config = let plans = attrValues config.krebs.permown; in mkIf (plans != []) { system.activationScripts.permown = let mkdir = plan: /* sh */ '' ${pkgs.coreutils}/bin/mkdir -p ${shell.escape plan.path} ''; in concatMapStrings mkdir plans; systemd.services = genAttrs' plans (plan: { name = "permown.${replaceStrings ["/"] ["_"] plan.path}"; value = { environment = { DIR_MODE = plan.directory-mode; FILE_MODE = plan.file-mode; OWNER_GROUP = "${plan.owner}:${plan.group}"; ROOT_PATH = plan.path; }; path = [ pkgs.coreutils pkgs.findutils pkgs.inotifyTools ]; serviceConfig = { ExecStart = pkgs.writeDash "permown" '' set -efu find "$ROOT_PATH" -exec chown -h "$OWNER_GROUP" {} + find "$ROOT_PATH" -type d -exec chmod "$DIR_MODE" {} + find "$ROOT_PATH" -type f -exec chmod "$FILE_MODE" {} + inotifywait -mrq -e CREATE --format %w%f "$ROOT_PATH" | while read -r path; do if test -d "$path"; then exec "$0" "$@" fi chown -h "$OWNER_GROUP" "$path" if test -f "$path"; then chmod "$FILE_MODE" "$path" fi done ''; Restart = "always"; RestartSec = 10; UMask = plan.umask; }; wantedBy = [ "multi-user.target" ]; }; }); }; } | ESSENTIALAI-STEM |
Choosing the Right Path: DIY Looping vs. Complete Solutions for Managing Diabetes
DIY Looping vs. Complete Solutions for Managing Diabetes
Loop, an innovative iPhone application designed to manage diabetes, offers a wide array of features that forecast and automate blood glucose control. Although Loop provides instructions for a do-it-yourself (DIY) approach, it is vital to consider the potential pitfalls before embarking on this path. In this article, we will explore the risks associated with DIY Looping and highlight the advantages of choosing a complete solution.
Risks of DIY Looping
Limited Support and Technical Assistance: One of the significant drawbacks of the DIY approach is the absence of comprehensive support and technical assistance. Troubleshooting issues, accurately interpreting data, and optimizing Loop’s performance can be challenging without proper guidance. This lack of support may lead to frustration, suboptimal control, and potential health risks.
Regulatory and Safety Concerns: DIY Looping involves modifying and installing software that transforms your iPhone into a medical device. However, Apple has blocked the distribution of Loop due to its lack of clearance from the US FDA. Using unauthorized medical devices raises regulatory concerns and potential safety risks. These devices may not adhere to the rigorous standards required for medical applications, compromising their reliability and accuracy.
Data Collection and Feedback Loop Limitations: By opting for a complete solution, such as T1Pal Nightscout, Loop, and CoPilot coaching, users actively contribute to the data collection necessary for achieving FDA approval. As co-developers, they play an instrumental role in advancing Loop’s capabilities while ensuring its safety and effectiveness. On the other hand, DIY Looping often lacks structured data collection mechanisms, hindering its potential for future advancements.
Benefits of Choosing a Complete Solution
Comprehensive Support and Technical Assistance: Choosing a complete solution grants users access to comprehensive support and technical assistance. T1Pal Nightscout, Loop, and CoPilot coaching offer professional guidance, troubleshooting assistance, and ongoing support. This ensures that users have experts to turn to when facing challenges, allowing them to effectively optimize their blood glucose management.
Regulatory Compliance and Safety: A complete solution that adheres to regulatory guidelines ensures compliance with safety standards. By relying on approved and authorized software, users can have peace of mind knowing that their health management is supported by a trusted and regulated system. Compliance with regulatory requirements protects users from potential risks and provides a reliable foundation for their diabetes management.
Expertise and Reduced Error Risk: Building and configuring Loop independently require technical expertise and an in-depth understanding of diabetes management. Opting for a complete solution eliminates the risk of potential errors that may arise during the DIY process. Professionals who specialize in diabetes management and technology ensure the accurate integration of devices, minimizing the chances of miscalculations and associated health risks.
Long-term Development and Optimization: Choosing a complete solution contributes to the long-term development and optimization of Loop. By being part of a structured program like T1Pal, users actively contribute to data collection, research, and development efforts. This collaborative approach helps advance Loop’s capabilities, paving the way for improved features and enhanced user experiences over time.
Final Thoughts
While the idea of DIY Looping may appeal to some individuals, it is crucial to consider the associated risks and limitations. Limited support, regulatory concerns, potential errors, and insufficient data collection mechanisms are key factors to weigh against the benefits.
Opting for a complete solution like T1Pal Nightscout, Loop, and CoPilot coaching provides comprehensive support, regulatory compliance, expertise, and the opportunity to contribute to ongoing development efforts. Prioritizing safety, effectiveness, and long-term support is essential when managing a critical health condition like diabetes.
FAQ: DIY Looping vs. Complete Solution
Q1: Is DIY Looping suitable for everyone? A1: DIY Looping requires technical expertise and a deep understanding of diabetes management. It is recommended for individuals with the necessary skills, time, and willingness to take on the responsibility of troubleshooting and optimizing the system. Those who prefer a more supported and guided approach may find a complete solution to be a better fit.
Q2: What are the potential risks of DIY Looping? A2: DIY Looping carries risks such as limited support and technical assistance, regulatory and safety concerns, potential errors during configuration, and inadequate data collection mechanisms. These risks can impact blood glucose control, pose regulatory compliance issues, and compromise user safety.
Q3: What does a complete solution offer? A3: A complete solution, such as T1Pal Nightscout, Loop, and CoPilot coaching, provides comprehensive support, technical assistance, regulatory compliance, and expert guidance. It offers a structured program with professionals who specialize in diabetes management and technology, ensuring optimized blood glucose control and minimizing the risk of errors.
Q4: How does a complete solution contribute to the development of Loop? A4: By subscribing to a complete solution, users become co-developers and actively contribute to the data collection needed for Loop’s ongoing development and potential FDA approval. Their participation aids in refining the application, improving its features, and enhancing the user experience over time.
Q5: Can a complete solution address individual needs and preferences? A5: Yes, a complete solution can be customized to meet individual needs and preferences within the established framework. Users can work closely with experts and coaches to tailor the system to their specific requirements while adhering to safety standards and regulatory guidelines.
Q6: Does a complete solution ensure regulatory compliance? A6: Yes, a complete solution undergoes regulatory scrutiny to ensure compliance with safety standards. By relying on authorized software, users can trust that their diabetes management is supported by a regulated system, reducing the potential risks associated with unauthorized medical devices.
Q7: What if I already have technical expertise in diabetes management and technology? A7: If you possess the necessary technical expertise, DIY Looping may be an option for you. However, it is still important to consider the limited support, potential errors, and regulatory implications. Opting for a complete solution may provide additional benefits such as ongoing support, collaboration with experts, and the opportunity to contribute to the development of Loop.
Q8: Can I switch from DIY Looping to a complete solution? A8: Yes, it is possible to transition from DIY Looping to a complete solution. The transition process may involve migrating your data, seeking guidance from the support team, and adjusting the settings to align with the complete solution’s framework. It is advisable to consult with experts for a seamless and successful transition. | ESSENTIALAI-STEM |
re-frame
https://github.com/Day8/re-frame/blob/master/docs/README.md https://github.com/Day8/re-frame/blob/master/docs/External-Resources.md
bastilla 2021-04-27T19:16:59.346100Z
Hi. I just noticed that reg-event-fx ignores db alterations send via {:db alt-db if (and only if) it dispatches to another event via :fx [[:dispatch [::dlg-events/set-dlg {:dlg dlg ...} . As soon as I comment out the :fx part of the return map, db is handled normally, means the returned alterated form gets applied. Somehow :fx [[:dispatch is designed to interrupt here. Intentionally? If so, why? Thanks + best regards!
p-himik 2021-04-27T19:20:23.346200Z
I cannot reproduce it with re-frame 1.2.0. Can you create and share a repo with a minimal reproducible example?
1🙌
bastilla 2021-04-27T19:20:57.346500Z
Pls ignore my question. As it is so often the case, the problem was produced right before the monitor.
bastilla 2021-04-27T19:21:47.346700Z
@p-himik Sorry(!!!) for stirring things up. And Thanks for your quick repsonse!!!!!
p-himik 2021-04-27T19:22:03.346900Z
Ah, a good old case of PEBCAC. :) No problem.
bastilla 2021-04-27T19:22:10.347100Z
lol, right
2021-04-27T20:10:20.348900Z
Folks, I am well and truly stumped. I am adding re-frame-10x version 1.0.2 to my project, but when I compile it, the compile aborts with the error Invalid :refer, var day8.reagent.impl.component/patch-custom-wrapper does not exist in file resources/public/js/out/day8/re_frame_10x.cljs. When I look at the source on github, though, patch-custom-wrapper is plainly there. https://github.com/day8/re-frame-10x/blob/d8dcb17e217449aba2cf64b9f843b0e9f86cfcb6/src/day8/reagent/impl/component.cljs#L80
2021-04-27T20:12:53.351Z
To make it more stump-provoking, if I look at resources/public/js/out/day8/reagent/impl/component.cljs, I find a file that contains two commented-out definitions for original-create-class and create-class, instead of the last three definitions as they appear in the version we find in github.
2021-04-27T20:13:53.352100Z
so it is missing from the file, but where the heck is this crippled version coming from? I’ve checked the history for the file on github, and there are only 2 commits, neither of which contain the crippled version that I’m seeing
2021-04-28T11:15:03.367500Z
Awesome, thanks much! I know it’s weird to have 10x and re-frisk in the same project, but it’s a multi-dev project and we each have our personal preferences, so it’s nice to have them play nicely together.
1👍
p-himik 2021-04-27T20:20:41.352200Z
I am very suspicious of the path resources/public/js/out/day8/reagent/impl/component.cljs. Where does it come from? Why is js/out on your classpath?
2021-04-27T20:23:17.352400Z
It’s not, I’m deducing it from the error message. I’m assuming that’s just a temporary build directory used to construct main.js?
p-himik 2021-04-27T20:26:37.352600Z
Well, it is on your classpath - otherwise the compiler would've complained about some other path. It might not be on the lein process classpath, but it is there for the build process.
2021-04-27T20:29:55.352800Z
True. Temp classpath maybe? It’s got a directory tree that matches the list of dependencies for my cljsbuild, and each file in the tree has foo.cljs, foo.cljs.cache.json, foo.js and foo.js.map (where foo.cljs was the original file in the dependency).
lilactown 2021-04-27T20:38:32.358900Z
@manutter51 does the resources/public/js/out/.../*.cljs file actually exist on disk?
lilactown 2021-04-27T20:38:42.359200Z
or is that just in your browser devtools?
p-himik 2021-04-27T20:39:36.359300Z
I can understand that directory being there. I don't understand it being on the classpath. What's your project.clj?
2021-04-27T20:49:08.359500Z
:cljsbuild {:builds
{:app
{:source-paths ["src/cljs" "src/cljc" "env/local/cljs"]
:figwheel {:on-jsload "infusion.core/mount-components"}
:compiler
{:main "<http://infusion.app|infusion.app>"
:asset-path "/js/out"
:output-to "resources/public/js/main.js"
:output-dir "resources/public/js/out"
:source-map true
:optimizations :none
:infer-externs true
:pretty-print true
:closure-defines {"re_frame.trace.trace_enabled_QMARK_" true
"day8.re_frame.tracing.trace_enabled_QMARK_" true}
:preloads [re-frisk.preload
day8.re-frame-10x.preload]
:external-config {:devtools/config
{:features-to-install [:formatters :hints]}}}}}}
p-himik 2021-04-27T20:52:54.359700Z
Do you have any other mention of :source-paths in the whole file, not just under the :cljsbuild key?
2021-04-27T20:53:26.359900Z
Oh hey, I reposted a generic version of the question in #clojurescript and thheller gave me a super tip. He had me fire up a repl and do
user=> (require '<http://clojure.java.io|clojure.java.io>)
nil
user=> (<http://clojure.java.io/resource|clojure.java.io/resource> "day8/reagent/impl/component.cljs")
#object[java.net.URL 0x6d55862e "jar:file:/Users/marknutter/.m2/repository/re-frisk/re-frisk/1.5.0/re-frisk-1.5.0.jar!/day8/reagent/impl/component.cljs"]
user=>
2021-04-27T20:53:56.360100Z
Apparently re-frisk is the culprit here.
p-himik 2021-04-27T20:54:52.360700Z
Oh, interesting. I still have no idea why the compiler would complain about resources and not the jar or the resource name.
2021-04-27T20:54:55.360900Z
Yeah, it’s there. Check out the threaded replies, I think I have a good lead now.
2021-04-27T20:56:09.361Z
Yeah, I might have a wonky cache somewhere or something.
2021-04-27T20:56:26.361200Z
Definitely a weird one tho.
p-himik 2021-04-27T20:56:54.361400Z
Also might be worth it asking the author of re-frisk why he bundles day8/reagent/impl/component.cljs in there.
caumond 2021-04-27T21:01:24.363500Z
Hi, I'm struggling with internationalization. I have based my website on a value in the db. I wanted to get the accept-language value to be able to set the db value. Could you help me a little bit on how I'm supposed to do that? or a better way?
2021-04-27T21:01:27.363600Z
And especially why he bundles a broken version of it.
p-himik 2021-04-27T21:02:57.363800Z
It might not be broken for his use cases. But re-using namespaces is not great.
caumond 2021-04-27T21:04:19.364Z
I'm using tumpura and have already understood the interest to add the wrap-ring-request, except I don't have understood how to get that in the re-frame/cljs world.
caumond 2021-04-27T21:04:26.364200Z
if it helps
p-himik 2021-04-27T21:05:10.364400Z
Accept-Language is a request header - it's meant for a client to tell a server what language to use when serving the content. So, just serve the HTML with that language stored somewhere. In a <meta> tag, for example.
p-himik 2021-04-27T21:06:09.364600Z
I'm using languages set via URLs. So if there's a request for /, I determine the language via the Accept-Language header, then redirect to e.g. /en/ - this way, people with different browser settings will still be able to share pages that use the same language.
p-himik 2021-04-27T21:06:46.364800Z
And I have an explicit way on my websites to switch the language in a somewhat persistent way, because Accept-Language is not always accurate or preferred.
caumond 2021-04-27T21:12:18.365Z
so 1) you don't use the db at all, if I understood correctly 2) my issue is there, when I would need to retrieve the Accept-language in your / page for instance, I did not understood how to do that, I don't have any request clearly stated in my re-frame app. And when I look for re-frame and request, I find some discussion about effects
p-himik 2021-04-27T21:14:44.365200Z
I use app-db, but the initial value comes from a <meta> tag. You look for Accept-Language on the server side. It doesn't matter what makes the request and how exactly it was made.
caumond 2021-04-27T21:17:21.365400Z
ouch, I was definitely far from that solution
superstructor 2021-04-27T23:48:08.365700Z
Good to hear that is a false alarm, that would be a horrific bug 😱
superstructor 2021-04-27T23:53:20.365900Z
Looks like re-frisk is re-using our reagent monkey patches from re-frame-10x to get internal tracing. It is fine to use the code (10x is MIT license after all), but they should be renaming it like re-frisk.inlined-deps.day8.... or similar, otherwise this is going to burn people like yourself @manutter51 who have run both in the same project which is a totally valid use case that is even supported by the official re-frame-template.
1👍 | ESSENTIALAI-STEM |
Page:Cambridge Modern History Volume 1.djvu/528
The people, too, were polished in their manners. English urbanity struck even a Venetian who visited the country about the year 1500. But Erasmus found in English social intercourse something more than mere urbanity. "Did you but know the endowments of Britain," he writes to his poetical friend Andrelinus, "you would run hither with winged feet, and if the gout stopped you, you would wish yourself a Daedalus. To mention one thing out of many. There are here nymphs of divine beauty, gentle and kind, whom you may well prefer to your Camoenae. Moreover there is a fashion never sufficiently commended. Wherever you go you are received by every one with kisses; when you take leave you are dismissed with kisses. You return, kisses again are renewed. People come to you and kisses are dffered; they take their leave and kisses are again distributed. Wherever you meet there are kisses in abundance; in short wherever you move all things are charged with kisses. And, Faustus, if you once tasted how sweet and fragrant they are, you would be glad to sojourn in England, not for ten years only like Solon, but to your dying day."
Such was English social life before the days of Puritanism; but it must be said, this pleasant freedom of manners was accompanied by much laxity with regard to social ties. Our Venetian visitor found, side by side with English courtesy, an absence of domestic affection which seemed to him altogether amazing: of licentiousness he saw instances in this country, but none of a man in love; and though Englishmen kept jealous guard over their wives, offences against married life could always among them in the end be condoned for money. For their children they seemed to have no affection, sending them out to service in other homes as soon as they reached the age of seven, or nine at the utmost, in order that they might learn manners. These observations are fully confirmed by the evidence of the Paston Letters, where, among other things, we read of a young lady of twenty in a respectable family being repeatedly beaten and having her head broken in two or three places at a time, so that she was inclined to marry an elderly and ill-favoured suitor to escape from her mother's tyranny.
This painful absence of natural feeling was largely owing to the feudal system of wardships, by which heirs under age were disposed of in marriage without their own consent, and that union which lays the foundation of all social life was commonly made a matter of bargain and sale. It was anything but an ideal condition of society; yet the nation was polite, well ordered, and, on the whole, very submissive to authority. The people loved their King, and even when their affection came to be sorely tried, honoured him with a respectful obedience which later generations found it impossible to pay to his successors. | WIKI |
Talk:Victor Banjo
Reliable sources
Wikipedia's Core Content Policy of Verifiability has clearly identified "personal websites, open wikis, personal or group blogs, Internet forum postings, and social media postings" as "largely not acceptable as sources". Furthermore, Wikipedia's content guideline on reliable sources stipulates that "content from websites whose content is largely user-generated is also generally unacceptable". Adding material from self-published sources such as an internet forum board or a wrodpress site is therefore not accepted in Wikipedia. Please refrain from adding material found in self-published sources into this article. Thank you. <IP_ADDRESS> (talk) 20:54, 17 April 2016 (UTC) | WIKI |
The Isle of Retribution/Chapter 29
through the crack in the door Ned saw the girl's act; and her treason was immediately evident to him. Whatever darkness engrossed him at the sight of the ignoble girl, begging for her little life even at the cost of her lover's, showed not at all in his white, set face. Whatever unspeakable despair came upon him at this ruin of his ideals, this destruction of all his hopes, it was evidenced neither in his actions nor in the clear, cool quality of his thought.
No other crisis had ever found him better disciplined. His mind seemed to circumscribe the whole, dread situation in an instant. He turned, met Bess's straightforward gaze, saw her half-smile of complete understanding. As she leaped toward him, he snatched up their two hooded outer coats, and his arm half encircling her, he guided her through the door.
Whether or not she realized what had occurred he did not know, but there was no time to tell her now. Nor were explanations necessary; trusting him to the last she would follow where he led. “We'll have to run for it,” he whispered simply. “Fast as you can.”
Ned had taken in the situation, made his decision, seized the parkas, and guided Bess through the door all in one breath: the drama of Lenore's tragic dishonor was still in progress in the glare of the Northern Lights. Doomsdorf, standing back to them, did not see the two slip out the door, snatch up their snowshoes and fly. Otherwise his pistol would have been quick to halt them. Almost at once they were concealed, except for their strange flickering shadows in the snow, behind the first fringe of stunted spruce.
Ned led her straight toward the ice-bound sea. He realized at once that their least shadow of hope lay in fast flight that might take them to some inhabited island before Doomsdorf could overtake them; never in giving him a chase across his own tundras. Even this chance was tragically small, but it was all they had. To stay, to linger but a moment, meant death from Doomsdorf's pistol—or perhaps from some more ingenious engine that his half-mad cunning might devise.
Only the miles of empty ice stretched before them, covered deep with snow and unworldly in the glimmer of the Northern Lights that still flickered wanly in the sky; yet no other path was open. They halted a single instant in the shelter of the thickets, slipped on their snowshoes, then mushed as fast as they could on to the beach. In scarcely a moment they were venturing out on the ice-bound wastes.
Doomsdorf encountered their tracks as he reached the cabin door, and guessing their intent, raced for the higher ground just above the cabin. But when he caught sight of the fugitives, they were already out of effective pistol range. He fired impotently until the hammer clicked down against an empty breach, and then, still senseless with fury, darted down to the cabin for his rifle.
But he halted before he reached the door. After all, there was no particular hurry. He knew how many miles of ice—some of it almost impassable—lay between his island and Tzar Island, far to the east. It was not the journey for a man and woman, traveling without supplies. There was no need of sending his singing lead after them. Cold and hunger, if he gave them play, would stop them soon enough.
He had, however, other plans. He turned through the cabin door, spoke to the sullen squaw, then began to make preparations for a journey. He took a cold-proof wolf-hide robe, wrapped in it a great sack of pemmican, and made it into a convenient pack for his back. Then he reloaded his pistol, took the rifle down from the wall, and started forth down the trail that Ned and Bess had made.
It was likely true that the cold, though not particularly intense to-night, would master them before ever they could reach Tzar Island. They had no food, and inner fuel is simply a matter of life and death while traveling Arctic ice. They had no guns to procure a fox, or any other living creatures that they might encounter on the ice fields. But yet Doomsdorf was not content. Death of cold was hardly less merciful than that of a bullet. Just destruction would not satisfy the fury in his heart; the strange, dark lust that raced through his veins like poison demanded a more direct vengeance. Particularly he did not want Bess to die on the ice. He would simply follow them, overtake them, and bring them back; then some really diverting thing would likely occur to him.
It would be easy to do. There was no man in the North who could compete with him in a fair race. The two had less than a mile start of him, and to overtake them was but a matter of hours. On the other hand long days of travel, one after another past all endurance, would be necessary before they could ever hope to cross the ice ranges to reach the settlements on Tzar Island.
To Bess first came the realization of the utter hopelessness of their flight. She could not blind herself to this fact. Nor did she try to hide from herself the truth: in these last, bitter months she had found that the way of wisdom was to look truth in the face, struggling against it to the light of her strength, but yielding herself neither to vain hope nor untoward despair. The reason why the flight was hopeless was because she herself could not stand the pace. She did not have the beginning of Ned's strength. Soon he would have to hold back so that she could follow with greater ease, and that meant their remorseless hunter would catch up. The venture had got down simply to a trial of speed between Doomsdorf, whose mighty strength gave him every advantage, and Ned, who braved the ice with neither blankets nor food supplies. Her presence, slowing down Ned's speed, increased the odds against him beyond the last frontier of hope.
Tired though she was from the day's toil, she moved freshly and easily at first. Ned broke trail, she mushed a few feet behind. She had no sensation of cold; hardened to steel, her muscles moved like the sliding parts of a wonderful machine. The ice was wonderfully smooth as yet, almost like the first, thin, bay ice frozen to the depth of safety. But already the killing pace had begun to tell. She couldn't keep it up forever without food and rest. And the brute behind her was tireless, remorseless as death itself.
The Northern Lights died at last in the sky, and the two hastened on in the wan light of a little moon that was already falling toward the west. And now she was made aware that the night was bitter cold. It was getting to her, in spite of her furs. But as yet she gave no sign of distress to Ned. A great bravery had come into her heart, and already she could see the dawn—the first aurora of ineffable beauty—of her far-off and glorious purpose. She would not let herself stop to rest. She would not ask Ned to slacken his pace. She was tired to the point of anguish already; soon she would know the last stages of fatigue; but even then she would not give sign. Out of her love for him a new strength was born—that sublime and unnamable strength of women that is nearest to divinity of anything upon this lowly earth—and she knew that it would hold her up beyond the last limits of physical exhaustion. She would not give way to unconsciousness, thus causing Ned to stop and wait beside her till she died. None of these things would she do. Her spirit soared with the wings of her resolve. Instead, her plan was simply to hasten on—to keep up the pace—until she toppled forward lifeless on the ice. She would master herself until death mastered her. Then Ned, halting but an instant to learn the truth, could speed on alone. Thus he would have no cause to wait for her.
He travels the fastest who travels alone. Out of his chivalry he would never leave her so long as a spark of life remained in her body: her course was simply to stand the pace until the last spark went out. She could fight away unconsciousness. She knew she could; as her physical strength ebbed, she felt this new, wondrous power sweeping through her.
He travels the fastest who travels alone. Without her, his mighty strength of body and spirit might carry him to safety. It was a long chance at best, over the ice mountains; but this man who mushed before her was not of ordinary mold. The terrible training camp through which he had passed had made of him a man of steel, giving him the lungs of a wolf and a lion's heart, and it was conceivable that, after unimagined hardship, he might make Tzar Island. There he could get together a party to rescue Lenore, and though his love for the ignoble girl was dead, his destiny would come out right after all. It was all she dared pray for now,—that he might find life and safety. But he was beaten at the start if he had to wait for her.
On and on through the night they sped, over that wonderfully smooth ice, never daring to halt: strange, wandering figures in the moonlit snow. But Bess was not to carry her brave intent through to the end. She had not counted on Ned's power of observation. He suddenly halted, turned and looked into her face.
It was wan and dim in the pale light; and yet something about its deepening lines quickened his interest. She saw him start; and with a single syllable of an oath, reached his hand under her hood to the track of the artery at her throat. He needed to listen but an instant to the fevered pulse to know the truth.
“We're going too fast,” he told her shortly.
“No—no!” Her tone was desperate, and his eyes narrowed with suspicion. Wrenching back her self-control she tried to speak casually. “I can keep up easily,” she told him. “I don't feel it yet—I'll tell you when I do. We can't ever make it if we slow up.”
He shook his head, wholly unconvinced. “I don't know what's got into you, Bess. You can't fool me. I know I feel it, good and plenty, and you're just running yourself to death. Doomsdorf himself can't do any more than kill us”
“But he can”
“We're going to hit an easier pace. Believe me, he's not running his heart out. He's planning on endurance, rather than speed. I was a fool not to think about you until it began to get me.”
It was true that the killing pace had been using up the vital nervous forces of both their bodies. Ned was suffering scarcely not at all as yet, but he had caught the first danger signals. Bess was already approaching the danger point of fatigue. When Ned started on again he took a quick but fairly easy walking pace.
Yet Bess's only impulse was to give way to tears. If their first gait had been too fast, this was far too slow. While it was the absolute maximum that she could endure—indeed she could not stand it without regular rests that would ultimately put them in Doomsdorf's hands—it was considerably below Ned's limit. He could not make it through at such a pace as this. Because of her, he was destroying his own chance for life and freedom.
They mushed on in silence, not even glancing back to keep track of Doomsdorf. And it came about, in the last hours of the night, that the rest both of them so direly needed was forced upon them by the powers of nature. The moon set; and generally smooth though the ice was, they could not go on by starlight. There was nothing to do but rest till dawn.
“Lie down on the ice,” Ned advised, “and don't worry about waking up.” His voice moved her and thrilled her in the darkness. “I'll set myself to wake up at the first ray; that's one thing I can always do.” She let her tired body slip down on the snow, relying only on her warm fur garments to protect her from it. Ned quickly settled beside her. “And you'd better lie as close to me as you can.”
He was prompted only by the expedience of cold. Yet as she drew near, pressing her body against his, it was as if some dream that she had dared not admit, even to herself, had come true. Nothing could harm her now. The east wind could mock at her in vain, the starry darkness had no terror for her. The warmth of his body sped through her, dear beyond all naming; and such a ghost as but rarely walks those empty ice fields came and enfolded her with loving arms.
It was the Ghost of Happiness. Of course it was not real happiness,—only its shadow, only its dim image built of the unsubstantial stuff of dreams, yet it was an ineffable glory to her aching heart. It was just an apparition that was born of her own vain hopes, yet it was kindly, yielding one hour of unspeakable loveliness in this night of woe and terror. Lying breast to breast, she could pretend that he was hers, to-night. Of course real happiness could not come to her; the heart that beat so steadily close to hers was never hers; yet for this little hour she was one with him, and the ghost seemed very, very near. She could forget the weary wastes of ice, the cold northern stars, their ruthless enemy ever drawing nearer.
Instinctively Ned's arms went about her, pressing her close; and tremulous with this ghost of happiness, the high-born strength of woman's love surged through her again, more compelling than ever before. Once more her purpose flamed, wan and dim at first, then slowly brightening until its ineffable beauty filled her eyes with tears. Once more she saw a course of action whereby Ned might have a fighting chance for life. Her first plan, denied her because of Ned's refusal to lead faster than she could follow, had embodied her own unhappy death from the simple burning up of her life forces from over-exertion; but this that occurred to her now was not so merciful. It might easily preclude a fate that was ten times worse than death. Yet she was only glad that she had thought of it. She suddenly lifted her face, trying to pierce the pressing gloom and behold Ned's.
“I want you to promise me something, Ned,” she told him quietly.
He answered her clearly, from full wakefulness. “What is it?”
“I want you to promise—that if you see there's no hope for me—that you'll go on—without me. Suppose Doomsdorf almost overtook us—and you saw that he could seize me—but you could escape—I want you to promise that you won't wait.”
“To run off and desert you”
“Listen, Ned. Use your good sense. Say I was in a place where I couldn't get away, and you could. Suppose we became separated somehow on the ice, and he should be overtaking me, but you'd have a good chance to go to safety. Oh, you would go on, wouldn't you?” Her tone was one of infinite pleading. “Would there be any use of your returning—and getting killed yourself—when you couldn't possibly save me? Don't you see the thing to do would be to keep on—with the hope of coming out at last—and then getting up an expedition to rescue me? Promise me you won't destroy what little hope we have by doing such a foolish thing as that”
Wondering, mystified by her earnestness, half inclined to believe that she was at the verge of delirium from cold and exertion, his arms tightened about her and he gave her his promise so that she might rest. “Of course I'll do the wise thing,” he told her. “The only thing!”
Her strong little arms responded to the embrace, and slowly, joyously she drew his face toward hers. “Then kiss me, Ned,” she told him, soberly yet happily, as a child might beg a kiss at bedtime. Her love for him welled in her heart. “I want you to kiss me good night.”
Slowly, with all the tenderness of his noble manhood, he pressed his lips to hers. “Good night, Bess,” he told her simply. For an instant, night and cold and danger were forgotten. “Good night, little girl.”
Their lips met again, but now they did not fall away so that he could speak. There was no need for words. His arm about her held her lips to his, and thus they lay, forgetting the wastes of ice about them, for the moment secure from the cruel forces that had hounded them so long. The wind swept by unheard. The fine snow drifted before it, as if it meant to cover them and never yield them up again. The dimmer stars faded and vanished into the recesses of the sky.
The cold's scourge was impotent now. The hour was like some dream of childhood: calm, wondrous, ineffably sweet. The ghost of happiness seemed no longer just a shadow. For the moment Bess's fancy believed it real.
Sleep drifted over Ned. Still with her lips on his, Bess listened till his slow, quiet breathing told her that he was no longer conscious. She waited an instant more, her arms trembling as she pressed him close as she could.
“I love you, Ned,” she whispered. “Whatever I do—it's all for love of you.”
Then, very softly so as not to waken him, she slipped out of his embrace and got to her feet. She started away straight north,—at right angles to the direction that they had gone before. | WIKI |
José Manuel Pando
José Manuel Inocencio Pando Solares (27 December 1849 – 17 June 1917) was a Bolivian soldier and explorer who served as the 25th President of Bolivia from 1899 to 1904. During his government, the Acre War (1899-1903) began, in which Bolivia clashed with Brazil.
Youth and studies
Pando was born in the town of Luribay on December 27, 1848. His parents were Manuel Pando and Petrona Solares. He studied at the Colegio Seminario de La Paz and continued his studies at the Universidad Mayor de San Andrés (UMSA) where he studied medicine, but only reached the sixth year before he abandoned it for a career in politics.
At the age of twenty-three, Pando fought alongside the people of La Paz to overthrow the government of Mariano Melgarejo on January 15, 1871, after which he was incorporated into the Bolivian Army.
Military career
After overthrowing Melgarejo, Bolivian President Agustín Morales appointed Pando as his personal aide-de-camp in 1871. Pando and Morales had an excellent relationship which allowed for the former's career in the army to be propelled to new heights. However, on November 27, 1872, when Morales was assassinated by his nephew and also aide-de-camp, Federico Lafaye, a heartbroken Pando resigned from the position of assistant to the President of Bolivia.
In 1876, after Hilarión Daza's deposition of President Tomas Frías, Pando retired to private life in his Luribay hacienda. However, the outbreak of the War of the Pacific called him back to arms.
During the War of the Pacific, Pando contributed to the Bolivian Army when, in the midst of the war, he took steps to bring artillery pieces from the United States, a task that General Daza had entrusted to him. Pando fought in the Battle of Alto de la Alianza on May 26, 1880, where he was seriously wounded in the left arm and taken prisoner by the Chileans. He would be taken prisoner to Santiago in Chile. Upon his return to Bolivia, Pando led an artillery regiment until 1884.
Explorer and adventurer
Pando was one of the great explorers of Bolivia during the 19th century. Pando's explorations provided a large deal of knowledge and helped in the integration of Northern Bolivia, then known as the National Territory of Colonies (then a largely unknown and obscure part of the country). Today, this territory is composed of the departments of La Paz, Beni and Pando, the latter bears his last name in honor of his expeditions there. Several of his expeditions to the region took place around the Madidi, Madre de Dios, and Mamoré rivers, collective studies were made on the subject and published by the University of La Plata, in Argentina. Furthermore, Pando's exploration greatly contributed to Bolivia's cartography, providing crucial knowledge about uncharted lands in the Amazon Rainforest.
The Liberal Party
He entered as a member of the Liberal Party in 1884, a party of which he started leading after replacing General Eliodoro Camacho in 1894. He was head of the Liberal Party of Bolivia until the end of his presidency. Over the years, Pando became one of the greatest landowners of Bolivia, benefiting from the laws of 1874 and 1880.
As head of the Liberal Party, Pando was a candidate for the presidency of the republic in the 1896 general elections, being defeated by the Conservative Party and its leader, Severo Fernández Alonso. That same year, he assumed the position of senator for the Department of Chuquisaca.
Uprising against the Conservatives
Pando would be the leader of the Federalists when they rose up against the government in 1898, obtaining the support of the Aymaras of the country and of Colonel Pablo Zárate Willca, known as the "Fearsome Willka". Turning several officers to his cause, including Octavio La Faye and Carlos Manuel de Villegas, Pando had large following in the army. Thus, the Bolivian Civil War of 1898-1899 began. After four months of fighting, he triumphed over the conservative forces of President Fernández in the Battle of the Segundo Crucero. A Federal Government Board was created, made up of Pando, Serapio Reyes Ortiz and Macario Pinilla Vargas, which installed the seat of government in La Paz. The Board carried out some institutional reforms and public works, such as the construction of the government palace of La Paz. The Board was dissolved at the National Convention of 1899, when Pando was elected president.
Administration
Pando was fifty years old when he assumed the Presidency. During his administration, the first Bolivian census of the 20th century was carried out in 1900. Moreover, it was discovered that there was a surplus in the trade balance, due to the rubber boom, ensuring that for the following decades the economy would be stable.
Pando ordered the construction of roads going from the valleys to the plains, linking the distant settlements to the major urban centers of Bolivia in an attempt to connect the country and to improve infrastructure. Another crucial event during Pando's presidency was the arrival of the first imported in Bolivia, brought to the country by adventurer Arthur Posnansky.
Internationally, Pando fought the so-called Acre War with Brazil. The region of Acre, located in the north and adjacent to the border with Brazil, had been invaded by Brazilian settlers and rubber tappers in the midst of a rubber boom. The Bolivian government, attempting to assert its influence in that region, founded Puerto Alonso in 1899 and established taxes on rubber tappers. But the rubber tappers rebelled and started a secessionist movement called the First Revolution of Acre, which the Bolivian government was able to crush. The second phase of this war, called the Second Acrean Revolution, occurred in 1902; this time, the Acreans asked to be annexed into Brazil. The Bolivians suffered setbacks at the hands of the Acrean revolutionaries, so Pando personally marched to Acre at the head of an army. This motivated the intervention of Brazil, which considered the area in dispute to be theirs and decided to send its army in support of the Acreans. This disparate situation forced the Bolivians to enter negotiations. Pando signed the Treaty of Petrópolis with Brazil by which Bolivia ceded territory in the north in exchange for significant financial compensation of two million pounds sterling. Shortly after returning to La Paz, at the end of his term, Pando handed over power to Ismael Montes, who succeeded him as leader of the Liberal Party.
Later life and death
Pando was delegate in the territories of the North and Commissioner of Limits with Brazil. He was appointed Brigadier General in the Army of Peru in 1911. Having left the Liberal party, he broke with Ismael Montes and, in 1915, he became the founder of the Republican Party.
Retired, Pando was found dead in a ravine near El Kenko (now El Alto) on June 17, 1917. Many believed it was a political crime, perpetrated at the instigation of the Liberal Party. The murder was attributed to Alfredo Jáuregui, Juan Jáuregui, Néstor Villegas and Simón Choque. In 1927, Alfredo Jáuregui, the youngest of the brothers, was shot as a result of his alleged involvement in the crime against Pando.
Modern investigations, however, maintain that Pando's death was due to natural causes, when he suffered a stroke while he was going from his farm in Catavi to the city of La Paz. According to this hypothesis, the members of the Jáuregui family, in whose hut Pando had stayed shortly before, upon discovering the body on the road, fearing being blamed for his death, threw the body into the ravine. | WIKI |
Page:Thus Spake Zarathustra - Alexander Tille - 1896.djvu/102
68 THUS SPAKE ZARATHUSTRA, I
all over by poisonous flies. Fly where the rough, strong wind bloweth!
Fly into thy loneliness ! Thou hast lived too close unto the small and miserable. Fly from their invisible revenge ! Against thee they are nothing but revenge.
Lift no more thine arm against them ! Innumer- able are they; neither is it thy lot to be a fly-brush.
Innumerable are these small and miserable ones ; and many a proud building the raindrops and weeds have destroyed.
Thou art not a stone, but already thou hast been hollowed out by the many drops. Under the many drops thou wilt break into pieces and burst asunder.
I see thee wearied by poisonous flies and blood drawn at a hundred spots ; and thy pride will not even be angry.
In all innocence they seek to draw blood from thee, their bloodless souls crave for blood and therefore in all innocence they sting.
But thou deep one, thou sufferest too greatly, even from small wounds ; and ere thou art healed, the same poisonous worm creepeth over thy hand.
Thou art, I know, too proud to kill these dainty- mouthed. But take care that it be not thy fate to endure all their poisonous wrong.
They also hum round thee with their praise : their praise is impudence. They seek to have nigh unto them thy skin and thy blood.
�� � | WIKI |
termőföld
Etymology
From, from.
Noun
* 1) cropland, farmland, arable land an area of land that is cultivated to grow crops | WIKI |
Static Styles
The new home for Visual Studio documentation is Visual Studio 2017 Documentation on docs.microsoft.com.
The latest version of this topic can be found at Static Styles.
SS_BITMAP** Specifies a bitmap is to be displayed in the static control. The given text is the name of a bitmap (not a filename) defined elsewhere in the resource file. The style ignores the nWidth and nHeight parameters; the control automatically sizes itself to accommodate the bitmap.
• SS_BLACKFRAME Specifies a box with a frame drawn with the same color as window frames. The default is black.
• SS_BLACKRECT Specifies a rectangle filled with the color used to draw window frames. The default is black.
• SS_CENTER Designates a simple rectangle and displays the given text centered in the rectangle. The text is formatted before it is displayed. Words that would extend past the end of a line are automatically wrapped to the beginning of the next centered line.
• SS_CENTERIMAGE Specifies that, if the bitmap or icon is smaller than the client area of the static control, the rest of the client area is filled with the color of the pixel in the top left corner of the bitmap or icon. If the static control contains a single line of text, the text is centered vertically in the client area of the control.
• SS_ENDELLIPSIS or SS_PATHELLIPSIS Replaces part of the given string with ellipses, if necessary, so that the result fits in the specified rectangle.
You can specify SS_END_ELLIPSIS to replace characters at the end of the string, or SS_PATHELLIPSIS to replace characters in the middle of the string. If the string contains backslash (\) characters, SS_PATHELLIPSIS preserves as much of the text after the last backslash as possible.
• SS_ENHMETAFILE Specifies an enhanced metafile is to be displayed in the static control. The given text is the name of a metafile. An enhanced metafile static control has a fixed size; the metafile is scaled to fit the static control's client area.
• SS_ETCHEDFRAME Draws the frame of the static control using the EDGE_ETCHED edge style.
• SS_ETCHEDHORZ Draws the top and bottom edges of the static control using the EDGE_ETCHED edge style.
• SS_ETCHEDVERT Draws the left and right edges of the static control using the EDGE_ETCHED edge style.
• SS_GRAYFRAME Specifies a box with a frame drawn with the same color as the screen background (desktop). The default is gray.
• SS_GRAYRECT Specifies a rectangle filled with the color used to fill the screen background. The default is gray.
• SS_ICON Designates an icon displayed in the dialog box. The given text is the name of an icon (not a filename) defined elsewhere in the resource file. The nWidth and nHeight parameters are ignored; the icon automatically sizes itself.
• SS_LEFT Designates a simple rectangle and displays the given text flush-left in the rectangle. The text is formatted before it is displayed. Words that would extend past the end of a line are automatically wrapped to the beginning of the next flush-left line.
• SS_LEFTNOWORDWRAP Designates a simple rectangle and displays the given text flush-left in the rectangle. Tabs are expanded, but words are not wrapped. Text that extends past the end of a line is clipped.
• SS_NOPREFIX Unless this style is specified, Windows will interpret any ampersand (&) characters in the control's text to be accelerator prefix characters. In this case, the ampersand is removed and the next character in the string is underlined. If a static control is to contain text where this feature is not wanted, SS_NOPREFIX may be added. This static-control style may be included with any of the defined static controls. You can combine SS_NOPREFIX with other styles by using the bitwise OR operator. This is most often used when filenames or other strings that may contain an ampersand need to be displayed in a static control in a dialog box.
• SS_NOTIFY Sends the parent window STN_CLICKED, STN_DBLCLK, STN_DISABLE, and STN_ENABLE notification messages when the user clicks or double-clicks the control.
• SS_OWNERDRAW Specifies that the owner of the static control is responsible for drawing the control. The owner window receives a WM_DRAWITEM message whenever the control needs to be drawn.
• SS_REALSIZEIMAGE Prevents a static icon or bitmap control (that is, static controls that have the SS_ICON or SS_BITMAP style) from being resized as it is loaded or drawn. If the icon or bitmap is larger than the destination area, the image is clipped.
• SS_RIGHT Designates a simple rectangle and displays the given text flush-right in the rectangle. The text is formatted before it is displayed. Words that would extend past the end of a line are automatically wrapped to the beginning of the next flush-right line.
• SS_RIGHTJUST Specifies that the lower right corner of a static control with the SS_BITMAP or SS_ICON style is to remain fixed when the control is resized. Only the top and left sides are adjusted to accommodate a new bitmap or icon.
• SS_SIMPLE Designates a simple rectangle and displays a single line of text flush-left in the rectangle. The line of text cannot be shortened or altered in any way. (The control's parent window or dialog box must not process the WM_CTLCOLOR message.)
• SS_SUNKEN Draws a half-sunken border around a static control.
• SS_USERITEM Specifies a user-defined item.
• SS_WHITEFRAME Specifies a box with a frame drawn with the same color as the window background. The default is white.
• SS_WHITERECT Specifies a rectangle filled with the color used to fill the window background. The default is white.
• SS_WORDELLIPSIS Truncates text that does not fit and adds ellipses.
Styles Used by MFC
CStatic::Create
DrawEdge
Static Control Styles
Show: | ESSENTIALAI-STEM |
Asian Stocks Fall for Third Week on Greece Crisis, Japan Economy
Asian stocks fell, dragging the
region’s benchmark index to the longest streak of weekly
declines since November, as Greece ’s debt crisis grew, Japan ’s
economy contracted and disappointing U.S. economic data fueled
concern about a global recovery. HSBC Holdings Ltd., Europe ’s largest bank by market value,
slumped 2.5 percent in Hong Kong. Toyota Motor Corp. (7203) , the
world’s No. 1 carmaker, dropped 3.5 percent in Tokyo . Canon Inc. (7751) ,
which counts Europe as its biggest market, slipped 1.5 percent.
Tokyo Electric Power Co., the operator of the crippled nuclear
reactor damaged after Japan’s strongest earthquake and tsunami,
plunged 19 percent after reporting a 1.25 trillion yen ($15
billion) loss. Semiconductor Manufacturing International Corp. (981) ,
China ’s biggest chipmaker, tumbled 20 percent after reporting
net income plunged. The MSCI Asia-Pacific Index declined 1.1 percent to 134.61
this week, its third straight drop. The gauge retreated 1
percent the previous week as China restricted bank lending,
stoking concern anti-inflation policies may slow growth in the
world’s second-biggest economy. “The Greece issue is worrying markets because it’s clear
the situation hasn’t been resolved yet,” said Nader Naeimi, a
Sydney-based strategist for AMP Capital Investors Ltd., which
has almost $100 billion under management. “Global growth has
hit a soft patch, and that’s negative for Asian exporters
overall. Investors have become more risk-averse, with the
defensive sectors taking leadership.” Japan’s Nikkei 225 Stock Average lost 0.4 percent. South
Korea ’s Kospi index dropped 0.4 percent. Australia ’s S&P/ASX 200
Index climbed 0.4 percent in the week. Hong Kong ’s Hang Seng
index slid 0.3 percent while China’s Shanghai Composite Index
lost 0.4 percent. Greece Pressure Authorities stepped up pressure on Greece to sell assets
and deepen spending cuts to win an increase of its 110 billion-
euro ($156 billion) aid package and more time to repay the loans.
In deliberations clouded by the absence of arrested
International Monetary Fund Managing Director Dominique Strauss- Kahn, who resigned on May 19, Europe’s rich countries also
weighed whether to make holders of Greek bonds assume some
losses. A Greek default would be “highly destabilizing” for banks,
causing losses that “far exceed” the size of their loans and
investments there, according to Moody’s Investors Service.
European banks would lose 34.4 billion euros in a worst-case
scenario, less than the total 95 billion euros of outstanding
Greek assets they hold, Moody’s said in a note May 16, citing
public and non-public data for 97 lenders. Overseas Sales HSBC slumped 2.5 percent to HK$81 in Hong Kong. Cosco
Pacific Ltd. (1199) , which operates container facilities at Piraeus,
Greece’s largest port, slipped 2 percent to HK$15.84. Toyota,
which receives 73 percent of its sales abroad, declined 3.5
percent to 3,280 yen. Canon, the world’s biggest camera maker,
dropped 1.5 percent to 3,695 yen. “The European debt issue is reheating and the momentum of
U.S. economic growth may slow,” said Naoteru Teraoka, general
manager at Tokyo-based Chuo Mitsui Asset Management Co., which
oversees about $28 billion. “Investors cannot help avoiding
taking risks.” Manufacturing in the New York region expanded at a slower
pace than anticipated in May as the cost of raw materials surged.
The Federal Reserve Bank of New York’s general economic index
fell to 11.9 from a one-year high of 21.7 in April, the central
bank reported on May 16. Manufacturing growth in the
Philadelphia region also unexpectedly grew in May at the slowest
pace in seven months, the Federal Reserve Bank of Philadelphia’s
general economic index showed on May 19, a sign the U.S. economy
may get less of a boost from the industry that led it out of its
last recession. ‘Investors Are Wary’ “Expectations for the U.S. economic outlook are slightly
decreasing and there’s a mood investors are wary of buying
stocks,” said Norikazu Kitta, a strategist at Tokyo-based Nikko
Cordial Securities Inc. Mitsubishi UFJ Financial Group Inc. (8306) , Japan’s largest
publicly traded lender, slid 2.1 percent to 375 yen. Shinsei
Bank Ltd. (8303) , the Japanese lender partly owned by J. Christopher
Flowers, slumped 14 percent to 83 yen. JFE Holdings Inc. (5411) ,
Japan’s second-largest steelmaker, slumped 3.9 percent to 2,066
yen. Japan’s economy shrank more than estimated in the first
quarter after the March 11 earthquake and tsunami disrupted
production and prompted consumers to cut back spending, Cabinet
Office data showed on May 19, sending the nation to its third
recession in a decade. ‘Weaker Earnings’ “There could be a further weakening in Japanese corporate
earnings following the worse-than-expected contraction in the
nation’s economy,” said Hong Kong-based Michiya Tomita, who
helps oversee about $65 billion for Mitsubishi UFJ Asset
Management Co. “Investors are still skeptical given concerns
over rising inflation and Europe’s debt crisis.” Utility shares fell the most among the 10 industry groups
on the MSCI Asia Pacific Index this week, led by declines from
Tokyo Electric Power. Tokyo Electric Power, also known as Tepco, plunged 19
percent to 367 yen in Tokyo, the biggest loss on the Nikkei 225 (NKY)
this year. The company reported a full-year loss of 1.25
trillion yen, the biggest in Japan in eight years, and said its
president, Masataka Shimizu, 66, resigned to take responsibility
for the loss. Semiconductor Manufacturing International tumbled 21
percent to 70 Hong Kong cents, the biggest loss on the MSCI Asia
Pacific Index this week. The company said first-quarter net
income plunged 85 percent from the previous three-month period. To contact the reporters on this story:
Anna Kitanaka in Tokyo at
akitanaka@bloomberg.net ;
Shani Raja in Sydney at
sraja4@bloomberg.net . To contact the editor responsible for this story:
Nick Gentle at
ngentle2@bloomberg.net . | NEWS-MULTISOURCE |
Christian Provider Service
Essential Activities for the Elderly with Diabetes
Activities for the elderly with diabetes include exercising, monitoring glucose levels, and enjoying a balanced lifestyle.
For seniors managing diabetes, staying active can pose challenges. Issues like limited mobility, neuropathy, or concerns about balancing blood sugar levels during exercise can make starting or maintaining an exercise routine challenging. However, understanding the importance of physical activity is crucial. In this article, we’ll explore the benefits of activities for the elderly with diabetes and provide practical tips to overcome these challenges and incorporate regular exercise into daily life. Let’s discover how exercise, a critical aspect of a diabetes management plan, can play a vital role in managing diabetes and improving overall health for seniors.
What Are the Benefits of Exercise for Seniors With Diabetes?
By incorporating regular physical activity into their routine, older adults with diabetes can experience a range of positive outcomes that enhance their quality of life and help manage their condition more effectively. Let’s explore these benefits in detail:
1. Improving Blood Sugar Levels: Engaging in regular physical activities helps lower blood sugar levels, making it easier to manage diabetes effectively.
2. Enhancing Cardiovascular Health: Exercise contributes to a healthier heart and improved circulation, reducing the risk of cardiovascular complications associated with diabetes.
3. Managing Diabetes Complications: Exercise can help prevent or delay the onset of complications such as nerve damage, kidney disease, and vision problems.
4. Improving Quality of Life: Seniors who exercise regularly often experience better moods, increased energy levels, and improved overall quality of life.
5. Reducing the Risk of Falls: Certain exercises, such as balance and strength training, can enhance stability and reduce the risk of falls, which is particularly important for older adults with diabetes.
Activities for the Elderly with Diabetes
Engaging in regular exercise plays a vital role in managing type 2 diabetes for older adults. Exercise, considered a key form of exercise in the diabetes management plan, offers numerous benefits that contribute to improved health outcomes and better blood sugar control. Incorporating various forms of physical activity, including exercises for diabetes, into their daily routine can positively impact blood glucose levels and the overall well-being of adults living with the condition. Additionally, exercise helps mitigate the risk of common complications and promotes cardiovascular health, essential for older adults with diabetes. Partnering with healthcare professionals and adhering to personalized exercise regimens is crucial for seniors to effectively manage their condition and lead fulfilling lives despite the challenges posed by diabetes.
What Types of Exercises are Recommended for People with Diabetes?
Aerobic Exercises
Engaging in cardiovascular exercises like walking, cycling, or swimming, key activities recommended by the American Diabetes Association, helps improve heart health and boosts circulation, particularly beneficial for adults living with this health condition. Aerobic activities, a form of exercise recommended by the American Diabetes Association, increase insulin sensitivity, allowing better utilization of glucose by the body, which aids in blood sugar control for individuals with diabetes.
Strength Training Exercises
Incorporating resistance training exercises such as weightlifting or using resistance bands helps build muscle mass and improve overall strength. Muscle tissue plays a vital role in glucose metabolism, making strength training an essential component of diabetes management for seniors.
Balance Exercises
Practicing balance exercises like yoga or tai chi enhances stability and reduces the risk of falls, which is particularly important for older adults with diabetes who may experience neuropathy or impaired sensation in their feet.
Flexibility Exercises
Performing flexibility exercises such as stretching or Pilates helps maintain joint mobility and range of motion, promoting better movement and reducing the risk of injury during physical activity.
Low-Impact Exercises
Opting for low-impact exercises like water aerobics or gentle walking minimizes stress on joints while still providing effective cardiovascular benefits. These forms of exercise are ideal for helping a senior loved one manage diabetes. Low-impact activities are suitable for seniors who may have mobility challenges or joint pain, allowing them to safely engage in regular physical activity as part of their daily routine.
By incorporating a variety of exercises into their routine, seniors and older adults with diabetes can effectively manage their condition, improve overall health, and enhance their quality of life. Regular physical activity, tailored to individual needs and abilities, is essential for maintaining optimal blood sugar levels and reducing the risk of diabetes-related complications. This is a cornerstone of any comprehensive diabetes management plan. This is a cornerstone of any comprehensive diabetes management plan.
How Can Elderly Exercise Safely While Managing Diabetes?
For people with diabetes, incorporating exercise into their routine is crucial for managing blood sugar levels and promoting overall health. However, it’s essential to exercise safely to avoid potential complications associated with diabetes. Incorporating regular exercise into a diabetes management plan, under medical guidance, can help achieve this. Here are some tips to help seniors exercise safely while managing diabetes:
1. Consult with a Healthcare Provider: Before starting any exercise program, individuals with diabetes should consult with their healthcare provider, who can offer personalized guidance based on their medical history and current health status.
2. Monitor Blood Sugar Levels: Seniors with diabetes need to monitor their blood sugar levels before, during, and after exercise sessions. This helps prevent episodes of low blood sugar (hypoglycemia) or high blood sugar (hyperglycemia) during physical activity. Such monitoring is crucial for a diabetes management plan. Such monitoring is crucial for a diabetes management plan.
3. Choose Suitable Activities: Seniors with diabetes should select exercises that are appropriate for their fitness level and physical condition. Low-impact activities like walking, swimming, or cycling are often well-tolerated and provide excellent cardiovascular benefits without placing excessive stress on joints.
4. Stay Hydrated: Proper hydration is essential for seniors with diabetes during exercise. Drinking water before, during, and after physical activity helps maintain hydration levels and supports overall well-being.
5. Be Mindful of Foot Care: Individuals with diabetes may experience reduced sensation or neuropathy in their feet, increasing the risk of foot injuries. It’s crucial to wear comfortable, supportive footwear and inspect feet regularly for any signs of injury or infection
Seniors’ Guide to Exercise and Nutrition with Christian Provider Services
Prioritizing exercise and proper nutrition is paramount for older adults. By understanding the significance of physical activity and healthy eating habits, seniors can take proactive steps to control blood sugar levels, improve cardiovascular health, and enhance overall well-being. However, embarking on this journey may pose challenges, which is why seeking support from professionals is crucial.
For personalized guidance and support in managing diabetes, reach out to us at Christian Provider Services. Our dedicated team specializes in holistic care tailored to the unique needs of older adults. From exercise regimens to meal planning, we offer comprehensive assistance to help seniors lead fulfilling lives despite the challenges of diabetes. Take the first step towards better health and wellness by contacting us today.
Frequently Asked Questions
Q: What are the benefits of exercise for older adults managing diabetes?
A: Exercise helps control blood sugar levels, reduce the risk of diabetes complications, and improve overall health and well-being.
Q: How many hours of exercise are recommended for seniors with diabetes?
A: Seniors with diabetes should aim for at least 150 minutes of moderate-intensity exercise per week, as recommended by health experts.
Q: Why is exercise important for managing diabetes in seniors?
A: Exercise is crucial for older adults living with diabetes to help control their blood sugar, maintain stable blood sugar levels, and reduce the risk of complications associated with diabetes.
Q: What types of exercises are recommended for elderly individuals with diabetes?
A: Chair exercises and resistance exercises are often recommended to improve strength, flexibility, and cardiovascular health.
Q: How does exercise benefit blood sugar control in individuals with diabetes?
A: One important advantage of exercise is that it increases insulin sensitivity, helping individuals with diabetes better manage their blood sugar levels.
Q: Are there any specific recommendations for exercise for adults aged 65 and older with type 2 diabetes?
A: Yes, older adults living with diabetes need to engage in both aerobic and strength-training exercises to effectively manage their condition and improve overall health.
Q: What does research suggest about the relationship between diabetes and exercise?
A: One study found that exercise plays a significant role in improving blood sugar control, reducing the need for medication, and preventing diabetes-related complications in individuals with type 2 diabetes. | ESSENTIALAI-STEM |
Ishioka Station
Ishioka Station (石岡駅) is a passenger railway station located in the city of Ishioka, Ibaraki Prefecture, Japan operated by the East Japan Railway Company (JR East).
Lines
Ishioka Station is served by the Joban Line, and is located 80.0 km from the official starting point of the line at Nippori Station. It also used to be the terminal for the Kashima Railway Line until the line closed on 31 March 2007.
Station layout
The station consists of one side platform and one island platform, connected to the station building by a footbridge. The station has a "Midori no Madoguchi" staffed ticket office.
Platforms
There was also a platform and depot for the Kashima Railway Line, from 1922 until it closed on 31 March 2007.
History
The station opened on 4 November 1895. The station was absorbed into the JR East network upon the privatization of the Japanese National Railways (JNR) on 1 April 1987.
Passenger statistics
In fiscal 2019, the station was used by an average of 5591 passengers daily (boarding passengers only).
Surrounding area
There is a bus service from here to Ibaraki Airport, Hokota Station and Shin-Hokota Station.
* Ishioka City Hall
* Ishioka No1. High School | WIKI |
User:Rickymoorhouse
Hi, I'm Ricky. I'm from the UK and work with cloud computing. I'm a Christian, play guitar and am interested in music, languages and technology. | WIKI |
DLIKE AI Answer Engine
How to Use the Circle to Search Feature on Samsung Galaxy S24?
Home > Query
Asked a month ago
The Circle to Search feature on the Samsung Galaxy S24 allows you to automatically search for details about an image or text by drawing a simple circle around the object of interest. To use the Circle to Search feature, follow these steps:
1. Enable Circle to Search: Open Settings > Tap Display > Tap Navigation bar > Enable Circle to Search to On.
2. Navigate to the image: Find an image on your Galaxy phone's screen that you want to search. This feature works on all apps that allow screen capture.
3. Tap and hold the home key: With the image on your screen, tap and hold the home key.
4. Circle or tap the object of interest: Use your finger or an S-pen to circle or tap the object of interest in the image.
5. Remove your finger or S-pen: Once your finger or S-pen is removed from the phone's screen, the web search will begin.
Please note that Circle to Search requires an internet connection to work. Additionally, due to the nature of the search algorithm, searching for the same image may produce different outcomes. | ESSENTIALAI-STEM |
Talk:List of Columbo episodes
Thanks!
Thanks to everyone involved with this page. The brief episode descriptions are incredibly well done. Todd (talk) 17:09, 14 September 2012 (UTC)
Moved Talk from the columbo talk page
Hi all! I moved any relevant talk items to the talk page of this new listing for your convenience. MArcane 04:52, 24 December 2006 (UTC)See below:
This page is way too long...(from Talk:Columbo)
* Would anyone object to creating a separate page to house the list of Columbo episodes?
* Agreed, especially as I'm seeing warnings about the page size when I try to edit. I have created the List of Columbo Episodes page, and linked it in the spot on this page where they appeared previously.MArcane 04:41, 24 December 2006 (UTC)
List of Episodes have far too much POV - they're not meant to be reviews
* Phrases like "one of the most enjoyable endings in the entire series", "An especially enjoyable episode", "a pleasant two hours", etc don't belong on Wikipedia. Also, it would make sense if the individual epsiodes were seperated into their own articles, making this article easier to read and following the style of other such televison series.<IP_ADDRESS> 20:49, 31 October 2006 (UTC)
* Agreed...I removed all that I could find.MArcane 03:45, 16 April 2007 (UTC)
Episode List Format
Maybe we should consider a table format similar to that used for Season One of List of The Sopranos episodes. Our format is bulky and heavy on opinion rather than data about each episode.MArcane 04:52, 24 December 2006 (UTC)
Counting for toc of eps list should start from 0:
* 1) 1 Pilots (1968–1971, 2 episodes)
* 2) 2 First season (1971–1972, 7 episodes)
* 3) 3 Second season (1972–1973, 8 episodes)
this is iritating! 2 is 1st, 3 is 2nd, ...
* The table of contents is a wikipedia feature, it automatically numbers by the headers on the page below.MArcane 03:48, 16 April 2007 (UTC)
Inappropriate tone tag
A lot of this article reads like TV summaries, not an encyclopedic article! Season 1 isn't bad, but it goes downhill from there. Mark83 (talk) 21:10, 22 April 2008 (UTC) I had hardly any knowledge that the topics of Columbo could fit into an Encyclopedia and would need "an appropriate tone". It is the tone of the discussion that is not appropriate !--Alexandre Rongellion (talk) 01:35, 9 November 2009 (UTC)
Seasons 10 and later
Because the Columbo episodes from 1989 to 2003 were aired very infrequently, it appears that there is some dispute over which of the last 14 episodes is part of season 10. The fan site http://www.columbo-site.freeuk.com/ groups them as: 3 for season 10, 3 for season eleven, and 8 specials. However, other sites like TV.com say that season 10 consists of all the last 14 shows. It also appears that based on the DVDs released in Europe, they consider the 10 season covering all of the last 14 episodes too.
Because the way Wikipedia's reliable sources guidelines and other policies are written, this Wikipedia article has to also group these episodes based on a source that is more official like DVD releases rather than what is done on fan sites. Cheers. Zzyzx11 (talk) 17:40, 16 January 2010 (UTC)
* I recommend getting the DVD release tables of contents. They spell out exactly how the seasons have been arranged. There are so few movies and those were 'specials' so it only matters that they be listed along with air dates. Also bear in mind the actual 'specials' were not part of any 'season'. The DVD releases, which I have seen, do not acknowledge the specials as part of any season.-- Djathink imacowboy 01:29, 22 February 2012 (UTC)
* Also, I recommend this site for the seasons as officially listed by just about everyone.-- Djathink imacowboy 01:31, 22 February 2012 (UTC)
What is a 'special'? Because every episode is just an episode, none are double length or anything like that. Middle More Rider (talk) 01:37, 21 December 2021 (UTC)
We need major work here and seasons updates (we're up to 11 seasons on DVD now)
Proposal: We need to move all TV and TV-series-related data from Columbo to this article. I'm afraid I do not trust myslf with the job, and might get accused of vandalising Columbo. Comments, please! I'm placing an rfc above this.-- Djathink imacowboy 16:20, 17 February 2012 (UTC)
What data do you want to move? This list looks OK, unless it misses some episodes. — Dmitrij D. Czarkoff (talk) 02:25, 20 February 2012 (UTC)
* Please see Talk:Columbo. Also the article needs updating because there are (I believe) 11 seasons available now.-- Djathink imacowboy 16:27, 21 February 2012 (UTC)
* Oppose: this article is a list, and it already contains more data then appropriate (see WP:SAL and WP:WORKS). Though, if there are indeed more episodes out there, the list should be amended accordingly. — Dmitrij D. Czarkoff (talk) 18:18, 21 February 2012 (UTC)
* I for one would love it if you had a gander at Talk:Columbo and offered some input there.-- Djathink imacowboy 01:15, 22 February 2012 (UTC)
* Dmitrij D. Czarkoff, wait a minute ... articles are NOT supposed to be lists and this article is certainly not a mere list, though it lists things. Is that what you mean? In which case I have to ask, how short does it have to be?-- Djathink imacowboy 01:34, 22 February 2012 (UTC)
Transplanted data from Columbo and it looks great
...need I post more?-- Djathink imacowboy 21:51, 25 February 2012 (UTC)
page contents
This article shall have only episodes list, brief plot and simple intros...I'm I right? Why is an irrelevant "Series overview" table in this super long page? --B3430715 (talk) 08:28, 26 March 2012 (UTC)
* Because no one opposes it so far except you.— Djathink imacowboy 20:54, 26 March 2012 (UTC)
* No one replies you never equals to they agreed. --B3430715 (talk) 22:18, 26 March 2012 (UTC)
TV Show Links for Guest Stars
I removed the links next to guest stars names because they are unnecessary. Unless there is a plan to include links like that for all other guest stars, which I believe is also unneeded, there's no NPOV way to select who gets a show link and who doesn't. Or what work of the guest is linked to. If a reader wants to know more about a guest star they can follow the link to their article. — Bill W. (Talk) (Contrib) — 15:52, 17 June 2013 (UTC)
short vs. long
Which episodes are short vs. long?-<IP_ADDRESS> (talk) 03:13, 10 July 2013 (UTC)
* Yep, this is basic information that should be included. The main article states there are 30 episodes at 73 minutes and 39 episodes at 98 minutes. But we don't currently document that information anywhere. I'll see if I can at this to the episode list. <IP_ADDRESS> (talk) 03:19, 26 August 2013 (UTC)
* I've updated the original episodes from NBC. I'll try to get the rest later. <IP_ADDRESS> (talk) 04:30, 26 August 2013 (UTC)
Martin Landau
A small bit speaking part about 10 mins from the start of "The Bye-Bye Sky High IQ Murder Case" looks/sounds like Martin Landau?-<IP_ADDRESS> (talk) 03:14, 10 July 2013 (UTC)
* Improbable. On IMDB, Martin Landau does not appear in the credits for that Columbo episode. Neither does that episode appear in the IMDB entry for Martin Landau. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 15:22, 20 October 2015 (UTC)
Guest stars
I see this topic has been aired before, but I'd like to make a suggestion. I do think there is a strong case for a guest stars column. As someone who like the show, but is not an expert, I tend to think of episodes as "the one with Honor Blackman" etc, so a guest star column would be helpful for navigation. Tigerboy1966 11:33, 29 September 2013 (UTC)
2 pilot-episodes ??
I think "Ransom for a Dead Man" (1971) should be listed as episode no 1 instead of pilot no 2. What are the reason for for this ep. being defined as a pilot? It's produced and aired the same year as most of the episodes in season 1. The length are about the same as the other.--Ezzex (talk) 03:21, 9 January 2016 (UTC)
I have seen it listed elsewhere as episode number 1. Has a different character, personality etc. to Columbo in Prescription Murder, but now character is mostly typical to all the following Columbo episodes. Middle More Rider (talk) 01:45, 21 December 2021 (UTC)
Murderer(s) played by
The table of episodes has a column 'Murderer(s) played by'. The row for no 64, "Undercover", as well as the actual murderer, has this addition 'Jon Beshara and an uncredited actor also portray two characters who kill each other)'.
Surely this column is for listing the principal murderer, not the perpetrators of incidental killings.
Guyal of Sfere (talk) 13:19, 20 September 2020 (UTC)
Статьи по всем сериям
Почему в Википедии нельзя сделать отдельные статьи по каждой серии? У сериала много фанатов, а каждая серия индивидуальна. Считаю, что нужно сделать отдельные статьи, как здесь. <IP_ADDRESS> (talk) 19:47, 9 April 2024 (UTC)
* As this is this the English Wikipedia, please use English to communicate on talk pages. Thanks. --Jameboy (talk) 14:34, 24 May 2024 (UTC) | WIKI |
Wikipedia:Today's second feature/December 3, 2005
Today's featured picture
Segovia is a city in Spain, the capital of the province of Segovia in Castile-Leon. It is situated about an hour north of Madrid. The old city is a UNESCO World Heritage Site and has the highest concentration of Romanesque churches in Europe. It is also noted for its 16th century Gothic cathedral (shown here), its Roman aqueduct and fairy-tale castle, or Alcázar.
Photo credit: Óscar Ibáñez Fernández | WIKI |
Lithuania at the Deaflympics
Lithuania has been participating at the Deaflympics since 1993 and has earned a total of 49 medals. | WIKI |
Page:The Zoologist, 3rd series, vol 2 (1878).djvu/100
78 together without years of labour and close observation of the natural aptitude of different individuals. One I took from his work as an engineer, another as a gamekeeper, a third as odd man to an Irish squireen, and it took me just three years to trace one of them whose handiness, as a boy (under the Maharajah), I had remarked long ago, but of whom I had lost sight.
There were other difficulties ten years ago in the way of all who cared to take up falconry, but who could only do so on a small scale. Keeping hawks without a falconer was a drag and a tie. If left behind to the mercy of keepers or stable boys, during the temporary absence of their owners, they were almost certain to come to grief; while taking them about on visits did not always answer. I used to do this until I found my friends so unappreciative with regard to hawks, that if I continued this course I should have very few visits to pay! Having no falconer then, I had to choose between my friends and my hawks. I chose the latter,—to my mind, the truest friends a man can have,—but I cannot quite expect other and less enthusiastic falconers to look at things in exactly the same light as I did.
Many would have enjoyed the use of a hawk or two for the hawking season, who did not care to be bothered with them during the long period of moulting and uselessness. Yet the supply was too uncertain to make it sale to get rid of the hawks when they began to moult, as should always be done except in the case of Goshawks or special favourites. It does not pay to moult a Peregrine or Merlin, since their performances after moulting rarely come up to their first season's form.
So long as the Hereditary GraudGrand [sic] Falconer of England, the Duke of St. Albans kept hawks (for doing—or not doing—which, he receives £1000 a-year from the State) it was, of course, possible to place hawks temporarily, or for the moult, under the care of his falconer, John Pells. Pells was always most obliging, and had plenty of time to attend to the wishes of amateurs, since the Duke's establishment was limited to half-a-dozen hawks, on which, including the falconer's wages, he expended only £-200 a-year out of the £1000 he received and, I believe, still receives. But some ten years since the present Duke, in an economical fit, thought he might as well save a little more of the sum allowed him by the State as Grand Falconer; so, heedless of the motto "noblesse oblige" he broke up the establishment, and sent poor old Pells | WIKI |
Kudlow: 'Most of our supply lines are working pretty well' amid outbreak | TheHill
White House National Economic Council Director Larry KudlowLawrence (Larry) Alan KudlowMORE expressed confidence that U.S. supply lines and the workforce would be largely unaffected by the coronavirus outbreak Sunday. “I’m going to say yes, knowing there may be some exceptions,” Kudlow told CBS’ Margaret Brennan, asked if Americans would be well-positioned to feed themselves amid images of runs on grocery stores. “Most of our supply lines are working pretty well in the domestic United States … there’s a huge economic challenge here, don’t get me wrong—on the other hand, most of America is still working,” he said, but added “the employment story may become more tenuous in the weeks ahead.” “This is a story that will be very challenging in the short run but this is not a story of years, this is a story of weeks and months,” Kudlow added, echoing predictions made by Treasury Secretary Steven MnuchinSteven Terner MnuchinTrump signs coronavirus aid package with paid sick leave, free testing McConnell takes reins of third coronavirus bill GOP embraces big stimulus after years of decrying it MORE earlier Sunday and saying “I think by the end of this year we will be back to a strong economy.” Kudlow predicted that the Senate will take up a raft of measures addressing the virus, whose provisions include paid sick leave for some workers and free virus testing, “pretty rapidly.” Asked about the broad swaths of the workforce that are not covered by the bill’s paid sick leave guarantee, Kudlow responded, “If larger companies get into trouble we will be looking at the possibility of using the full powers of the federal government … we will be looking to helping any individuals who might get left behind.” “We have lots of ways and means to make sure nobody falls through the cracks,” Kudlow added. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2020 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
Contributing
Thank you for considering contributing to Netdata.
We love to receive contributions. Maintaining a platform for monitoring everything imaginable requires a broad understanding of a plethora of technologies, systems and applications. We rely on community contributions and user feedback to continue providing the best monitoring solution out there.
There are many ways to contribute, with varying requirements of skills, explained in detail in the following sections. Specific GitHub issues we need help with can be seen here. Some of them are also labeled as "good first issue".
All NetData Users
Give Netdata a GitHub star
This is the minimum open-source users should contribute back to the projects they use. Github stars help the project gain visibility, stand out. So, if you use Netdata, consider pressing that button. It really matters.
Spread the word
Community growth allows the project to attract new talent willing to contribute. This talent is then developing new features and improves the project. These new features and improvements attract more users and so on. It is a loop. So, post about Netdata, present it to local meetups you attend, let your online social network or twitter, facebook, reddit, etc. know you are using it. The more people involved, the faster the project evolves.
Provide feedback
Is there anything that bothers you about Netdata? Did you experience an issue while installing it or using it? Would you like to see it evolve to you need? Let us know. Open a github issue to discuss it. Feedback is very important for open-source projects. We can't commit we will do everything, but your feedback influences our road-map significantly. We rely on your feedback to make Netdata better.
Translate some documentation
The Netdata localization project contains instructions on how to provide translations for parts of our documentation. Translating the entire documentation is a daunting task, but you can contribute as much as you like, even a single file. The Chinese translation effort has already begun and we are looking forward to more contributions.
Sponsor a part of Netdata
Netdata is a complex system, with many integrations for the various collectors, backends and notification endpoints. As a result, we rely on help from "sponsors", a concept similar to "power users" or "product owners". To become a sponsor, just let us know in any Github issue and we will record your GitHub username in a "CONTRIBUTORS.md" in the appropriate directory.
Sponsor a collector
Netdata is all about simplicity and meaningful presentation. A "sponsor" for a collector does the following:
• Assists the devs with feedback on the charts.
• Specifies the alarms that would make sense for each metric.
• When the implementation passes QA, tests the implementation in production.
• Uses the charts and alarms in his/her day to day work and provides additional feedback.
• Requests additional improvements as things change (e.g. new versions of an API are available).
Sponsor a backend
We already support various backends and we intend to support more. A "sponsor" for a backend:
• Suggests ways in which the information in Netdata could best be exposed to the particular backend, to facilitate meaningful presentation.
• When the implementation passes QA, tests the implementation in production.
• Uses the backend in his/her day to day work and provides additional feedback, after the backend is delivered.
• Requests additional improvements as things change (e.g. new versions of the backend API are available).
Sponsor a notification method
Netdata delivers alarms via various notification methods. A "sponsor" for a notification method:
• Points the devs to the documentation for the API and identifies any unusual features of interest (e.g. the ability in Slack to send a notification either to a channel or to a user).
• Uses the notification method in production and provides feedback.
• Requests additional improvements as things change (e.g. new versions of the API are available).
Experienced Users
Help other users
As the project grows, an increasing share of our time is spent on supporting this community of users in terms of answering questions, of helping users understand how Netdata works and find their way with it. Helping other users is crucial. It allows the developers and maintainers of the project to focus on improving it.
Improve documentation
Our documentation is in need of constant improvement and expansion. As Netdata's features grow, we need to clearly explain how each feature works and document all the possible configurations. And as Netdata's community grows, we need to improve existing documentation to make it more accessible to people of all skill levels.
We also need to produce beginner-level tutorials on using Netdata to monitor common applications, web servers, and more.
Start with the guide for contributing to documentation, and then review the documentation style guide for specifics on how we write our documentation.
Don't be afraid to submit a pull request with your corrections or additions! We need a lot of help and are willing to guide new contributors through the process.
Developers
We expect most contributions to be for new data collection plugins. You can read about how external plugins work here. Additional instructions are available for Node.js plugins and Python plugins.
Of course we appreciate contributions for any other part of the NetData agent, including the daemon, backends for long term archiving, innovative ways of using the REST API to create cool Custom Dashboards or to include NetData charts in other applications, similarly to what can be done with Confluence.
If you are working on the C source code please be aware that we have a standard build configuration that we use. This is meant to keep the source tree clean and free of warnings. When you are preparing to work on the code:
CFLAGS="-O1 -ggdb -Wall -Wextra -Wformat-signedness -fstack-protector-all -DNETDATA_INTERNAL_CHECKS=1 -D_FORTIFY_SOURCE=2 -DNETDATA_VERIFY_LOCKS=1" ./netdata-installer.sh --disable-lto --dont-wait
Typically we will enable LTO during production builds. The reasons for configuring it this way are:
CFLAG / argumentReasoning
-O1This makes the debugger easier to use as it disables optimisations that break the relationship between the source and the state of the debugger
-ggdbEnable debugging symbols in gdb format (this also works with clang / llbdb)
-Wall -Wextra -Wformat-signednessReally, definitely, absolutely all the warnings
-DNETDATA_INTERNAL_CHECKS=1This enables the debug.log and turns on the macro that outputs to it
-D_FORTIFY_SOURCE=2Enable buffer-overflow checks on string-processing functions
-DNETDATA_VERIFY_LOCKS=1Enable extra checks and debug
--disable-lto We enable LTO for production builds, but disable it during development are it can hide errors about missing symbols that have been pruned.
Before submitting a PR we run through this checklist:
• Compilation warnings
• valgrind
• ./netdata-installer.sh
• make dist
• packaging/makeself/build-x86_64-static.sh
• clang-format -style=file
Please be aware that the linting pass at the end is currently messy as we are transitioning between code styles across most of our code-base, but we prefer new contributions that match the linting style.
Contributions Ground Rules
Code of Conduct and CLA
We expect all contributors to abide by the Contributor Covenant Code of Conduct. For a pull request to be accepted, you will also need to accept the Netdata contributors license agreement, as part of the PR process.
Performance and efficiency
Everything on Netdata is about efficiency. We need Netdata to always be the most lightweight monitoring solution available. We will reject to merge PRs that are not optimal in resource utilization and efficiency.
Of course there are cases that such technical excellence is either not reasonable or not feasible. In these cases, we may require the feature or code submitted to be by disabled by default.
Meaningful metrics
Unlike other monitoring solutions, Netdata requires all metrics collected to have some structure attached to them. So, Netdata metrics have a name, units, belong to a chart that has a title, a family, a context, belong to an application, etc.
This structure is what makes Netdata different. Most other monitoring solution collect bulk metrics in terms of name-value pairs and then expect their users to give meaning to these metrics during visualization. This does not work. It is neither practical nor reasonable to give to someone 2000 metrics and let him/her visualize them in a meaningful way.
So, Netdata requires all metrics to have a meaning at the time they are collected. We will reject to merge PRs that loosely collect just a "bunch of metrics", but we are very keen to help you fix this.
Automated Testing
Netdata is a very large application to have automated testing end-to-end. But automated testing is required for crucial functions of it.
Generally, all pull requests should be coupled with automated testing scenarios. However since we do not currently have a framework in place for testing everything little bit of it, we currently require automated tests for parts of Netdata that seem too risky to be changed without automated testing.
Of course, manual testing is always required.
Netdata is a distributed application
Netdata is a distributed monitoring application. A few basic features can become quite complicated for such applications. We may reject features that alter or influence the nature of Netdata, though we usually discuss the requirements with contributors and help them adapt their code to be better suited for Netdata.
Operating systems supported
Netdata should be running everywhere, on every production system out there.
Although we focus on supported operating systems, we still want Netdata to run even on non-supported systems. This, of course, may require some more manual work from the users (to prepare their environment, or enable certain flags, etc).
If your contributions limit the number of operating systems supported we will request from you to improve it.
Documentation
Your contributions should be bundled with related documentation to help users understand how to use the features you introduce.
Maintenance
When you contribute code to Netdata, you are automatically accepting that you will be responsible for maintaining that code in the future. So, if users need help, or report bugs, we will invite you to the related github issues to help them or fix the issues or bugs of your contributions.
Code Style
The single most important rule when writing code is this: check the surrounding code and try to imitate it. Reference
We use several different languages and have had contributions from several people with different styles. When in doubt, you can check similar existing code.
For C contributions in particular, we try to respect the Linux kernel style, with the following exceptions:
• Use 4 space indentation instead of 8
• We occasionally have multiple statements on a single line (e.g. if (a) b;)
• Allow max line length of 120 chars
• Allow opening brace at the end of a function declaration: function() {.
• Allow trailing comments
Your first pull request
There are several guides for pull requests, such as the following:
However, it's not always that simple. Our PR approval process and the several merges we do every day may cause your fork to get behind the Netdata master. If you worked on something that has changed in the meantime, you will be required to do a git rebase, to bring your fork to the correct state. A very easy to follow guide on how to do it without learning all the intricacies of GitHub can be found here
One thing you will need to do only for your first pull request in Netdata is to accept the CLA. Until you do, the automated check for the CLA acceptance will be showing as failed.
PR title guidelines
All verbs in PR titles must be in the past tense. E.g. "Added" instead of "Adds", "Fixed" instead of "Fixes".
Bug fixes must have the title "Fixed [description of the problem as a user would perceive it], by [explanation of the correction]".
Improvements must have the title "[Area or module] : [Added/Refactored/Improved/Corrected/Started to/Stopped/Modified/Optimized][x], [in order to/so that][benefit]". The second part may be left out, if the benefit is obvious from the improvement "x".
New collectors must have the title "[New collector] : [Name of collector]".
Commit messages when PRs are merged
When a PR gets squashed and merged into master, the title of the commit message (first line) must be the PR title followed by the PR number.
The body of the commit message should be a short description of the work, preferably taken from the connected issue.
PR approval process
Each PR automatically requires a review from the code owners specified in .github/CODEOWNERS. Depending on the files contained in your PR, several people may be need to approve it.
We also have a series of automated checks running, such as linters to check code quality and QA tests. If you get an error or warning in any of those checks, you will need to click on the link included in the check to identify the root cause, so you can fix it.
One special type of automated check is the "WIP" check. You may add "[WIP]" to the title of the PR, to tell us that the particular request is "Work In Progress" and should not be merged. You're still not done with it, you created it to get some feedback. When you're ready to get the final approvals and get it merged, just remove the "[WIP]" string from the title of your PR and the "WIP" check will pass.
Last updated on | ESSENTIALAI-STEM |
Ensign (EP)
Ensign's self-titled 7-inch EP was their first release on Orange County, California, record label, Indecision Records. It was released in May, 1996 on 7-inch vinyl only. The production run was limited to 3336 on black vinyl, 330 on grey, 449 on blue and a further 100 on black vinyl with a different cover to coincide with a European tour. This was in line with Indecision Records tradition of putting out releases by new bands on colored and normal vinyl and was carried through to their next release, the Fall from Grace (EP). It was later re-released on CD as part of a retrospective compilation, Three Years Two Months Eleven Days, in April 2000 after the band had left to join Nitro Records in 1998.
Overview
Although the band had relocated to California in 1995, and subsequently signed to an independent label there, their musical roots were firmly back in New Jersey, or more specifically the New York hardcore scene. The songs were short and played at a frenetic pace, with ample use of a refrain, known in the genre as a breakdown. This was to be their sound throughout their stay of three years at Indecision Records.
Track listing
* 1) "Alzheimers" (Ensign) – 1:24
* 2) "Pale Horse" (Ensign) – 2:28
* 3) "Trying Again" (Ensign, Ron Wood) – 1:56
* 4) "Enemy Of My Enemy" (Ensign) – 2:46
Credits
* Tim Shaw – vocals
* John Fraunberger – guitar
* Walt Svekla – bass
* Chris Ross – drums
* Recorded January 11 – 15, 1996 at Sweetwood Sound, New Jersey, USA
* Produced by Pete Koller
* Engineered Alap Momin assisted by Keith Deblasi | WIKI |
Government Debendra College
Government Debendra College is a public college in Manikganj, Manikganj District, Dhaka Division, Bangladesh. It offers bachelor's degrees and master's degrees. It also has a Higher Secondary Certificate (HSC) program. It is affiliated with Bangladesh National University. As of 2015, the principal is Syed Ikbal Moiz and the vice principal is Sirajul Islam.
History
Government Debendra College was established in 1942 as Manikgonj College with the inspiration and cooperation of local zamindar, Siddheswari Prasad Rychowdhury. In 1944, the college was renamed Debendra College after the name of the father name of Ranadaprasad Saha of Mirzapur, Tangail District. The degree courses were introduced in the college in 1947. It opened a science section in the higher secondary level in 1963 and commerce at the degree level in 1964. BSC courses were introduced in the college in 1970 and Honours courses in Bangla language and literature in 1971. The college started courses in agricultural science at the intermediate level in 1976. It was nationalised on 1 March 1980. Since 1989, the college has been offering Honours programmes in political science and accounting and masters programmes in economics, philosophy, history, management and mathematics.
Facilities
Government Debendra College has five academic buildings and three student dormitories: two hostels for women and another for men. There is a playing ground in front of the college. There are two ponds, one on the east side of the college and another on the west side. There is one mosque, beside the playing ground. There is one shahid minar.
Academics
Government Debendra College offers HSC, four years Honours and two year masters course in various majors. The college is affiliated with the National University. As of 2015, the college has more than 16,000 students and 94 teachers. Many students participate in politics.
Notable residents
* Khandkar Manwar Hossain, statistician, educator, researcher.
* Mohammad Ali Reza Khan, Bengal Presidency, British India.
* Mohammad Kaykobad
* Ranadaprasad Saha, businessman
* Muhammad Siddiq Khan, Principal
* Dr. Sadique Swapon | WIKI |
Talk:Castle of Sancti Petri
New studies indicate that it is unlikely that the island was the site of the temple of Hercules: https://elpais.com/cultura/2021-03-07/hercules-descansa-en-la-bahia-de-cadiz.html — Preceding unsigned comment added by <IP_ADDRESS> (talk) 17:28, 8 March 2021 (UTC) | WIKI |
Warren Harding entered office on March 4, 1920, in the midst of the sharp recession following WWI.
Harding’s Treasury Secretary, Andrew Mellon, believed that money was driven underground or overseas as income tax rates increased. Mellon held the heretical belief for that time, that lower tax rates led to greater levels of economic activity and that, as people had more of their own money to work with, the higher activity level resulting would increase tax revenues.
Based on Mellon’s advice, Harding cut taxes, starting in 1922. The top marginal rate was reduced annually in four stages from 73% in 1921 to 25% in 1925. Taxes were cut for lower incomes starting in 1923.
Vice President Calvin Coolidge became President in August 1923, following Harding’s untimely death. Coolidge would follow Harding’s economic policies of low taxation and high growth, the result would become the “Roaring 20s”.
Revenues to the treasury increased substantially, resulting in a 36% reduction of the national debt. President Kennedy tried the same tactic with the same result in the 1960s.
Opponents called it “Voodoo Economics” when President Reagan used the same tactic in the 1980s, but the results were the same. Same thing when President Bush the younger did it in the 2000s.
Economists and historians debate, because that’s what they do, but the results speak for themselves.
Unemployment and inflation both declined throughout the 1920s, while wages, profits and productivity increased. The decline in what Carter-era economists called the “Misery Index”, was the sharpest in history.
The twenties became a time of wealth and excess, and speculation in the stock market increased exponentially. New investors poured into the market in the belief that, like the housing market of the 2000s, prices could never go down. It was a nine year run when the Dow Jones Industrial Average increased tenfold, peaking at 381.17 on September 3, 1929.
Rising share prices encouraged more people to invest, even if they didn’t have the money to do so. Brokers were routinely lending investors up to two thirds of the face value of stocks. Over $8.5 billion hung out on such loans, more than the amount of currency circulating in the entire country, at that time.
As with 2007-08, there were early tremors that showed the bubble was about to burst. Then as now, such signals were seen only in hindsight, as the rising crescendo that was 1929, continued.
There was a brief contraction in March, but the first of the “Crash” began on “Black Thursday”, October 24, 1929. The market lost 11% at the opening bell, amidst heavy trading. To quell the frenzy, Wall Street financial firms Morgan Bank, Chase National and National City Bank of New York stepped up and bought large blocks of US Steel and other “blue chip” stocks, at prices well above where they were trading.
The tactic had the effect of stopping the slide, much as it did during the Panic of 1907. This time however, the relief would be short lived. “Black Tuesday”, October 29, saw the Dow Jones contract by 12% on a volume record which would stand unbroken for forty years. The president of the Chase National Bank said at the time “We are reaping the natural fruit of the orgy of speculation in which millions of people have indulged. It was inevitable, because of the tremendous increase in the number of stockholders in recent years, that the number of sellers would be greater than ever when the boom ended and selling took the place of buying“.
Fears of the Smoot-Hawley tariff act fueled a further contraction in the following weeks. Apparently, for good reason. When President Hoover signed the protectionist measure into law in 1930, American imports and exports shriveled by more than half.
Historians debate whether the stock market crash led to the Great Depression, or if the two events coincided. Only 16% of US households were actually invested in the stock market at the time, but the psychological effect was profound.
Easy credit and unbounded confidence had led to a speculative bubble which had finally burst.
Economists still argue about the interventionist policies, which followed. The guy who needed to support his family was grateful to be put to work on a WPA project, but the government doesn’t produce wealth. Every dollar spent had first to be extracted from the wealth producing, or “private”, part of the economy. You can’t fill a swimming pool, by draining one end of it into the other.
The stock market and unemployment rates staggered throughout the 1930s. It was WWII that finally put people back to work.
Yet that was merely activity, from an economic point of view. War production wasn’t growth, it was more like giving sugar to the kids, and watching them run around the house. A convincing case may be made that it was the Reduction of government spending in the years following WWII, that put wealth back in the pockets of the people who created it in the first place, finally ending the Depression.
An indicator of that wealth, the Dow Jones Industrial Average, wouldn’t retake the high ground of 1929, until 1954.
You must be logged in to post a comment. | FINEWEB-EDU |
Changeset 22518
Show
Ignore:
Timestamp:
28.07.2010 15:06:55 (9 years ago)
Author:
kjdon
Message:
copied the pager code out of printusage and added it to print_single_{plugin,classifier} so that pluginfo and classinfo go to less
Location:
main/trunk/greenstone2/bin/script
Files:
2 modified
Legend:
Unmodified
Added
Removed
• main/trunk/greenstone2/bin/script/classinfo.pl
r21292 r22518
214214 }
215215 else {
216
217 # this causes us to automatically send output to a pager, if one is
218 # set, AND our output is going to a terminal
219 # active state perl on windows doesn't do open(handle, "-|");
220 if ($ENV{'GSDLOS'} !~ /windows/ && -t STDOUT) {
221 my $pager = $ENV{"PAGER"};
222 if (! $pager) {$pager="(less || more)"}
223 my $pid = open(STDIN, "-|"); # this does a fork... see man perlipc(1)
224 if (!defined $pid) {
225 gsprintf(STDERR, "pluginfo.pl - can't fork: $!");
226 } else {
227 if ($pid != 0) { # parent (ie forking) process. child gets 0
228 exec ($pager);
229 }
230 }
231 open(STDERR,">&STDOUT"); # so it's easier to pipe output
232 }
233
216234 &gsprintf(STDERR, "\n{classinfo.passing_options}\n\n");
217235 &gsprintf(STDERR, "{classinfo.option_types}:\n\n");
• main/trunk/greenstone2/bin/script/pluginfo.pl
r22331 r22518
249249 }
250250 else {
251
252 # this causes us to automatically send output to a pager, if one is
253 # set, AND our output is going to a terminal
254 # active state perl on windows doesn't do open(handle, "-|");
255 if ($ENV{'GSDLOS'} !~ /windows/ && -t STDOUT) {
256 my $pager = $ENV{"PAGER"};
257 if (! $pager) {$pager="(less || more)"}
258 my $pid = open(STDIN, "-|"); # this does a fork... see man perlipc(1)
259 if (!defined $pid) {
260 gsprintf(STDERR, "pluginfo.pl - can't fork: $!");
261 } else {
262 if ($pid != 0) { # parent (ie forking) process. child gets 0
263 exec ($pager);
264 }
265 }
266 open(STDERR,">&STDOUT"); # so it's easier to pipe output
267 }
268
251269 gsprintf(STDERR, "\n{pluginfo.passing_options}\n\n");
252270 gsprintf(STDERR, "{pluginfo.option_types}:\n\n"); | ESSENTIALAI-STEM |
Re METROPOLITAN RAILWAY RECEIVERSHIP.
PETITIONS FOR WRITS OF MANDAMUS.
Nos. 11, 12,
Original.
Argued December 9, 1907.
Decided January 13, 1908.
An unsatisfied, justiciable claim of some right involving the jurisdictional amount made by a citizen of one State against a citizen of another State is a controversy or dispute between the parties within the meaning of the statutes defining the jurisdiction of the Circuit Court (acts of March 3, 1875, c. 137, § 1, 18 Stat. 470; March 3, 1887, c. 373, § 1, 24 Stat. 552; August 13, 1888, c. .866, § 1, 25.Stat. 433), and such jurisdiction does not depend upon the denial by the defendant of the existence of the claim or of its amount or validity.
In this case there being such a claim, and the requisite diversity of citizenship, the Circuit Court had jurisdiction although the defendant admitted • the facts and the liability, waived the objection that the complainants were not entitled to equitable relief, and joined in the request for appointment of receivers.
The mere fact that the defendant is engaged in interstate commerce does not give the Circuit Court jurisdiction; in cases in which this court has sustained the jurisdiction of the Circuit Court in the appointment of receivers, jurisdiction existed by reason of diversity of citizenship and not merely because the defendants were engaged in interstate commerce.
The defense in ah equity suit that the complainant has not exhausted his remedy at law, or is not a judgment creditor, may be waived by defendant, and when waived—as it may be by consenting to the appointment of receivers—the case stands as though the objection never existed.
Where the averments of the bill are true, and there is no question as to the diversity of citizenship, or any "evidence that a case was fraudulently created to give jm-isdiction to the Federal court, the ease will not be regarded as collusive merely because the parties preferred to resort to the Federal court instead of to a state court; 'in the absence of any improper act, the motive for bringing the suit is unimportant.
After the Federal court has properly obtained jurisdiction over a corporation and has appointed receivers thereof, an order permitting other parties closely identified therewith to intervene and extending their receivership over them is not of a jurisdictional nature, and in this ease the discretion was, in view of all the facts, properly exercised.
A receivership of a railroad as a going concern, although at times necessary and proper—as in this case, where the refusal to appoint a receiver would have led to sacrifice of property, confusion among the creditors, and great inconvenience to the travelling public—should not be unnecessarily prolonged, and in case of unnecessary delay the court should listen to the application of any creditor upon due notice to the repeiver for the prompt termination of the trust or vacation of the order appointing receivers.
These are original applications to this court for leave to file a petition for a mandamus, or, isn the alternative, for a prohibition, addressed to the Honorable E. Henry Lacombe, one of the Circuit Judges of the Second Circuit, commanding him and the Circuit'Court to dismiss the bill of complaint against the railroad companies hereinafter mentioned, and all proceedings therein, and to vacate injunctions therein issued by such judge, and also to vacate the orders appointing the receivers of such railroads, and to desist from exercising any further jurisdiction over such roads in such suit, or, in the alternative, commanding the judge to allow petitioners intervention, or that a writ of prohibition might issue to obtain the same relief.
It is alleged in. the petition in No. 11 that the petitioners are creditors of the Metropolitan Street Railway Gompany on "account of injuries alleged to have been received by each, through the negligence of the company’s servants—in one case some time prior to June 27, 1895, and in the other on or about June 13, 1892. Actions had been brought by each, and are still pending at the time of this application.
In No. 12 it is alleged that the petitioner is the administrator of one Paul Planovsky, deceased, and as such he recovered a judgment for damages for the death of the decedent against the New York City Street Railway Company for over eight thousand dollars, which is still unpaid, the company having appealed from the judgment to the Appellate Division of the Supreme Court of the State of New York, and the appeal is still pending. The petitioner also alleged a cause of action in his own behalf, arising out of the refusal of the company to give him tickets entitling him to transfers, by which he was, as he alleged, damaged by the payment of additional fares to the amount of at least two hundred dollars.
The further facts set up in each of the petitions are substantially identical.
Upon reading the petitions orders were made allowing them to be filed, and rules to show cause why the petitions should not be granted were thereupon entered, returnable before this court on the ninth of December, 1907.
On that day there was duly filed a return of the Circuit Judge in each proceeding, who gave therein a short history of the litigation culminating in the appointment of receivers of the railroads mentioned, and stating the then condition of such litigation. There were filed, as a part of such returns, copies of the bill of complaint under which the receivers were appointed, and of the answer of the New York City Railway Company, and also copies of certain affidavits made in behalf of complainants and defendant in the suit.
It is upon the case made by the petition for a mandamus and the return of the Circuit Judge that the questions arise for the decision of this court.
It appears from such record that in September, 1907,, the New York City Railway Company and the Metropolitan Railway Company were corporations organized under the laws of the State of New York, and that the New York City Railway Company was operating a system of surface street railroads in New York County, as the owner of some and the lessee of others. The Metropolitan Railway Company was interested, either as owner or as lessee of some eighteen separate and independent railroads, all of which it had leased to the New York City Railway Company, by lease dated February 14, 1902, for 999 years.
While the New York City Railway Company was operating these various railways a bill against it was filed September 24, 1907, in the United States Circuit Court for the Southern District of New York, by the Pennsylvania Steel Company,' a citizen of Pennsylvania, and by the Degnon Contracting Company, a citizen of New Jersey, as complainants, in which the complainants alleged an indebtedness due from the railway company of over $30,000 to the steel company and over $11,000 to the Degnon Company, for rails and other track material and for labor done for the company, at its request, and that payment of the debts had been demanded of the railway company by each of the complainants, and refused. It also appeared that the defendant was insolvent; that it was operating—as owner of some and lessee of other portions— a system of some five hundred miles of track, covering substantially all the surface railroads in New York, comprising many different companies, which owned many different railroads, which had been leased to the Metropolitan Railway Company and by it leased to the defendant company; that all the roads which had been leased to the defendant company were covered by many separate and independent mortgages for different sums, maturing at different times; the New York City Railway Company was under obligations to pay the interest on the funded debt of its lessor, by reason of the lease from the Metropolitan Railway Company -under which it was operating these various roads. Failure to meet the interest on the funded indebtedness as it matured would operate as a default and would render the mortgages enforceable.
One of these mortgages was for over twelve and another for over sixteen millions of dollars, and other mortgages increased the whole mortgage debt, on all the lines, to about one hundred millions of dollars. The New York City Railway Company, as lessee, had expended more than twenty millions of dollars in improvements, and was also indebted in other large sums, aggregating between five and ten millions of dollars more, by reason of expenditures for equipment and for repairs; also for taxes, and also for a large amount of floating indebtedness, besides which there were a great number of suits pending against it to recover damages for- alleged injuries sustained through alleged negligence of its servants, and which were on the calendars of the New York courts, and the plaintiffs, therein were pressing for trial. If judgment were obtained in any of these cases, or in any other of the cases where creditors were pressing their demands, it would result in disastrous consequence to the public, by a possible sale and dismemberment of the system under which the railroads were then operated, and might result in sales of portions of the roads to different individuals or corporations, by reason of which it would be impossible to continue the transfer of passengers from one road to another for one fare, such as was then in operation; and a sale of the roads would probably be for a sum greatly beneath their value, and thus the security for all the creditors for the ultimate payment of their claims would be impaired and very greatly injured. The defendant was, as it is stated, unable to pay these various obligations as they matured.
. For these, and other reasons stated with great detail in the bill, it was asked that the court would take the. road into its possession, and that the creditors of the defendant might be ascertained and the court fully administer the fund, con-' sisting of the entire railroad system and other assets of the defendant; that the assets should be marshalled and the respective liens and priorities existing therein should be ascertained, and that the court should enforce and decree the rights, liens and equities of all the creditors, of the defendant, as the same might be finally ascertained by the court; that, for the . purpose of preserving! the unity of the system, a receiver might be appointed, with power to'collect all the assets of the company, and with' authority to run and operate the railroads, and collect and receive all the rents due and apply the income thereof, under the direction- of the court, for such period as the court should order; and for the purpose of protecting and preserving the railroads and assets and property, real and personal, from being sacrificed under proceedings liable to be taken, which might prejudice the s'ame; and that, tempora'rily and pending the suit, an injunction might issue against the defendant and all persons claiming to act by, through or under it, and all other persons, restraining them from interfering with the receiver taking possession of the property, and that complainants might have such further relief as was proper. '
Upon the filing of this bill a subpoena was duly issued and served.upon the defendant, the New York City Railway Company, and an.answer was put in by that company, which admitted all the allegations of the bill, and it joined in the prayer of the’ bill that the eourt should take possession, by receiver, of the system of railroads operated by the defendant, and that ’ the-receiver should, after taking possession of the entire property; preserve, .manage, operate and control the same, and should pay all the indebtedness'due or to become due, and otherwise discharge all the duties imposed by courts upon receivers in similar cases.
Upon this bill and answer an application was made to the Circuit Judge for the appointment of a receiver and such application was granted, and receivers were duly appointed, with directions to operate the road. They were given power to borrow money, if needful in their judgment, in order to comply with the order, and make appropriate payments on account of accruing rent and,other necessary charges, so far as might be necessary to pay off current expenses for labor- and supplies, but for no other purpose without the order of the court. The defendant- and its officers, and all persons claiming to act under the defendant, and all other persons, were enjoined from interfering in any way with the possession and management of the property by the receivers; and it was ordered that the defendant should show cause on the seventh of October, 1907, why the receivership should not be continued during the pendency of the suit; and upon the hearing thereon, it was ordered that any other creditors of the defendant, or any other party in interest, might be heard.
Prior to the seventh of October, 1907, the Metropolitan Railway Company presented a petition to' the Circuit Court, wherein it asked to be made a party to the. original suit of the steel company and others 'against the New York City Railway Company, and that the receivership under the bill might be extended so as to expressly embrace the interests of the Metropolitan Railway Company in the property. The petition showed the foregoing facts in relation to the lease of the property to the New York .City Railway Company, and it averred that, by reason of these leases and the various mortgages upon portions of the property, and the operation of all the miles of railroad as one system, and because of the fact that the property of the Metropolitan Railway Company was all of it so. leased to the New York City Railway Company that it had to depend on the solvency of the latter company in order that payment might be made on the various mortgages on the ' various roads for which the Metropolitan Railway Company was responsible as lessee, 'and which it had also leased to the New York City Railway Company, the two companies were so . inextricably bound together that if the New York City Railway Company went into the hands of a receiver and all its property were taken possession of by that officer it was necessary, in the interest of all concerned, that the Metropolitan Railway Company should also be made a party to the suit and' the receivership extended to it. Under this petition the court granted . an order making the Metropolitan Railway Company a party defendant and extending the receivership to it, and the injunction was also extended so as to enjoin that company from interfering with the possession of the receivers.
In October, 1907, an application was made to the Circuit Court on the part of those who are now petitioners in this court, in which application, it was alleged that the bill of complaint in the above-mentioned suit, and the answer consenting to the appointment of receivers and admitting the allegations in the bill, were filed collusively for the purpose of avoiding the jurisdiction of .the courts of the State, and for the purpose of creating a case cognizable under the judiciary act of the United States by the United Stated-courts. And it was averred that the suit in which the bill and' answer were filed did not and does not really and substantially involve any dispute between the parties, nor did it involve any real or substantial controversy between them, or any dispute between them which was within .the jurisdiction of the court. (All these averments were-.reiterated in the petitions presented to this court.) Various other facts were included in the petition to the Circuit Court, and it was prayed that an order might' be made dismissing the bill in equity for fraud, collusion and want of jurisdiction and setting aside the order appointing a receiver, or, in case that application was denied, then that the order appointing a receiver should be' amended, by providing that liabilities for personal injuries and.for causing the death of individuals should have the preference over other claims on the distribution of the assets. The petition was subsequently amended so as to add a further prayer that the petitioner, individually and as administrator, might be allowed to intervene in the- suit .on behalf of himself individually and as administrator and on behalf of all other judgment creditors of the defendant who might come in and contribute to the defense of the suit.
In opposition to this application affidavits were presented by the persons who had verified the original bill of complaint in behalf'of the two companies against the -New York City Railway Company (and copies of these affidavits are made part of the returns of the Circuit Judge),, denying that the purpose of the suit or of the application for the receivership was for stock jobbing or other improper purposes, and each admitted that the suit was' brought in the Circuit Court of the United States for the purpose of having that court take jurisdiction, and denied that there was any impropriety or collusion or anything else wrongful in the conduct of the complainants. Each affidavit contained an averment that as non-residents of the State of New York, complainants had an absolute right to decide whether to bring the suit in the courts of the Uni-. ted States or in the courts of the State of New York; and it was denied that the. object of the suit was anything else than appears on the face of the bill, namely, the administration of the assets of the defendant in a proper court having jurisdiction thereof. All. charges of collusion and suppression of facts and of wrongdoing were denied absolutely. And a similar' affidavit was made by the officers of the New York City Railway Company who had verified the answer to the bill of complaint, and copies thereof are also made part óf the returns of the Circuit Judge. The application was denied.
' On October 25, 1907, a décree was entered adjudging the . New York City Railway Company to be insolvent, and order- . ing a.reference to a master to take proof of claims and report to tha court, providing' that all claims should be presented to the master on or before November 30, 1907. and that the ' master should give public notice accordingly, the notice to contain a statement of the time and place of first hearing before the toaster.
On the ninth of November, 1907, the court made a similar order, adjudging the Metropolitan Railway Company insolvent, and adjudging that its assets should be marshalled, and appointing a master asín the other case.
The order continuing the appointment of the receivers permitted all pending suits against the' New York City Railway Company and the Metropolitan Railway Company, which were begun before the receivers were appointed, to be prosecuted ‘ to judgment. In'regard to claims for damages resulting from accidents before the- receivers had been appointed, but in which suit-had not been commenced at the time of such appointment, it was provided that they might be filed with the receivers and might go to a .master for adjustment, and, in any case,fit was ordered that if the plaintiff wished a jury trial he might have it, and the claim, if judgment were obtained, would thereby be liquidated, and would rank with claims . already in suit.
As a reason for commencing these proceedings petitioners averred that they could not appeal from the order of the Circuit Court denying their application for leave to intervene in the suit commenced by the Pennsylvania Steel Company, and others, nor could they take any steps in that suit, and, as they were enjoined from' taking any proceeding in regard to the possession by the receivers of the property of the two railway companies, they were without any remedy looking toward a review of the orders and decrees of the Circuit Court, other than by the application to this court in the manner they are' proceeding.
In the course of his decision on the application to,make the receivers' permanent the Circuit Judge said, in relation to the allegations of collusion, as follows:
“There is no collusion apparent in any legal sense. It is of course manifest that complainants and defendants were entirely in accord and arranged together that the suit should be brought in the Federal court and that the avérments of the bill should be admitted by the answer. But there was no colorable assignment of sonde claim to a citizen of another State, nor any misrepresentation or distortion of facts to mislead the court. . On the contrary, examination of the books shows that the financial situation is precisely such as was averred in the complaint.”
And in relation to extending the receivership to the Metropolitan Railway Company and allowing that company to be .made a party defendant, the court said:
“Having taken its entire property into possession of the court under conditions which left it powerless to recover the same for a year, the receivership left it wholly without means to .meet its obligations and it seems to be clearly the duty of the court which has thus deprived it of its resources to protect it against execution while receivers handle and distribute those resources.”
Mr. Roger Foster for petitioners:
The petitioners are entitled to the remedy by mandamus. Otherwise, they will be enjoined from proceeding in their suits and collecting their claims without a hearing upon a motion to dissolve the injunction, and without any right to review the injunction order and the subsequent order continuing the same.
There are two fundamentals of the common law, which are essentials of that due process .of law which is guaranteed by the Constitution. Where there is a right there is a remedy. Ashby v. White, 1 Salkeld, 19. No person can be denied a hearing before he is prevented from asserting a claim of right. Pennoyer v. Neff, 95 U. S. 734.
Intervenors have no right of appeal, except possibly in the • case of an intervention after -judgment upon án application to share in a fund in court; and they never have a right to appeal from - an order denying their right to' intervene and defend a suit. Ex parte Cutting. 94 U. S. 14; Jones & Laughlins L’d v. Sands, 79 Fed. Rep. 913; Credits Commutation Co. v. United States, 91 Fed. Rep. 570, 573; S. C., 177 U. S. 311; Toledo, St. L. & K. C. R. Co. v. Continental Tr. Co (C. C. A.), 95 Fed. Rep. 497, 536.
If they.attack this judgment collaterally, they cannot object because of a failure of the requisite difference of citizenship between parties to a controversy in the same. Kempe’s Lessee v. Kennedy, 5 Cranch, 173, 185; Skillern’s Ex’rs v. May’s Ex’rs, 6 Cranch, 267; Cameron v. McRoberts, 3 Wheat. 591; Des Moines Nav. Co. v. Iowa H. Co., 123 U. S. 552, 557, 559; Dowell v. Applegate, 152 U. S. 327, 337-341; Pullman’s P. C. Co. v. Washburn, 66 Fed. Rep. 790. See also Ex parte Richards, 117 Fed. Rep. 658; In re Lennon, 166 U. S. 548; Conkling Co. v. Russell, 111 Fed. Rep. 417; Hollins v. Brierfield Coal Co., 150 U. S. 371.
The duty to dismiss the proceedings is statutory. The facts showing that there is no controversy and consequently no jurisdiction, have been found by the judge and are not disputed. There is no room for the exercise by the Circuit Court of judicial judgment or discretion. This court has jurisdiction to issue the appropriate writ in a case like this. Ex parte Wisner, 203 U. S. 449; United States v. Severens, 71 Fed. Rep. 768; S. C., 18 C. C. A. 314.
The entire proceedings are void for want of jurisdiction, and it was the duty of the- Circuit Judge to dismiss the same as soon as that matter was called to his attention. Act of March 3, 1875, c. 137, § 5, 18 Stat. 472. It is the duty of the court to dismiss such a case upon its own motion as soon as it discovers its want of jurisdiction or the improper or collusive joinder. Williams v. Nottawa, 104 U. S. 209; Hartog v. Memory, 116 U. S. 588. In this case it clearly appeared that there was no controversy between citizens of different States. 'There was no controversy of any sort. The complainants did not pray the payment of their respective claims. They merely _ prayed a receivership, coupled with a general administration of the assets, which general administration they have refused to enter a decree directing.
There can be no controversy between the parties when the defendant has requested the plaintiff to bring the case.
There can be no matter in dispute when there' is no. dispute between the parties. The proceeding was not an action at common law; but a bill in equity for the appointment of a receiver. Not having reduced' their claims to judgment, they are not entitled to the relief prayed except by defendant’s consent. Dawson v. Columbia Trust Co., 197 U. S. 178, 181.
There is a distinction between “matter in dispute” and “matter in demand.” Hilton v. Dickinson, 108 U. S. 165, 174; May v. Trust Co., 128 Missouri, 447, 449; Lozano v. Wehmer, 22 Fed. Rep. 755, 757; Gudger v. Western R. Co., 21 Fed. Rep. 81, 84; Keith, v. Levi, 2 Fed. Rep. 743, 745.
There was collusion between the parties. Collusion does not necessarily imply fraud, but the derivation of the word implies ' cooperation or playing together. See Louisville Trust Co. v. Louisville, New Albany & Chicago Ry. Co., 174 U. S. 674, 677, 687, 689; Texas & Pacific Ry. Co. v. Gay, 26 S. W. Rep. 599, 612; S. C., 86 Texas, 571; Balch v. Beach, 95 N. W. Rep. 132, 137. The learned judge who granted these orders was misled by the analogy of certain decisions by the inferior Federal courts upon applications for the appointment of receivers of railway companies engaged in interstate commerce which would be impeded unless receivers were appointed. Such were cases of “property constituting a link in a great continental railway,” and manifestly arose under the Constitution and laws of the United States. Mercantile Tr. Co. v. Atlantic & P. R. Co., 70 Fed. Rep. 518, 524; In re Lennon, 166 U. S. 548, 553.
There was not the slightest justification for the extension of the receivership so as to-reinclude the assets of the Metropolitan Street Railway Company; nor for the joinder of that1 company as a party to the suit. All the assets of that corporation, except its causes of action against its lessee, the directors of both companies and the other persons, who had misappropriated and wasted, its property, were transferred by the lease to the New York City Railway Company. Those assets were, consequently, already under the protection of the court. The only object of the order extending the receivership over the property of the Metropolitan Street Railway Company was. to head off all actions by the state attorney. general, the stockholders and creditors of the lessors, that might be brought to compel the lessee and the'officers and directors of both parties to the lease to. account for the waste of -the lessor^ property.
In cases where trustees represented conflicting interests, the courts have always been accustomed to allow interventions. Farmers’ L. & Tr. Co. v. Nor. Pac. R. Co., 66 Fed. Rep. 169; Farmers’ L. & Tr. Co. v. Cape Fear & Y. V. Ry. Co., 71 Fed. Rep. 38; Grand Tr. Ry. Co. v. Central Vt. Ry. Co., 88 Fed. Rep. 622; Fowler v. Jarvis-Conklin M. Tr. Co., 64 Fed. Rep. 279; Hamlin v. Toledo, St. L. & K. C. R. Co., 78 Fed. Rep. 664, 672; Jones on Corporate Bonds, § 338.
Mr. J. Parker Nirim-for .the respondent in No. 11, Original:
Granting the- order allowing the Metropolitan Street Railway Company to intervene -in- the original suit, for the protection of its own interests, and those of its creditors, in its railway lines Which were in the custody of the court, under the prior receivership, was a legitimate exercise of judicial discretion.
The jurisdiction of the Circuit Court to entertain the application of the Metropolitan Company for leave to intervene seems plain. It rests on two facts: first, that the subject matter of the controversy was in the actual possession of receivers appointed by the court, Freeman, v. Howe, 24 How. 450; Krippendorf v. Hyde, 110 U. S. 276; Gumbel v. Pitkin, 124 U. S. 131; Morgan’s Company v.’Texas Central Ry., 137 U. S. 171; In re Tyler, 149 U. S. 164; Rouse v. Letcher, 156 U. S. 47; Carey v. Houston & Texas Ry., 161 U. S. 115; White v. Ewing, 159 U. S. 36; Pope v. Louisville &c. Ry., 173 U. S. 573; Porter v. Sabin, 149 U. S. 473, 479; Byers v. McAuley, 149 U. S. 608, 618; Price v. Abbott, 17 Fed. Rep. 506; Armstrong v. Trautman,
36 Fed. Rep. 275; Compton v. Jesup, 68 Fed. Rep. 263; S. C., 15 C. C. A. 397; Lanning v. Osborne, 79 Fed. Rep. 657, 662; Toledo &c. R. Co. v. Continental Trust Co., 95 Fed. Rep. 497, 505; S. C., 36 C. C. A. 155; Davis v. Martin, 113 Fed. Rep. 6, 9; S. C., 51 C. C. A. 27; and, second, that the administration of the assets of an insolvent corporation is within the functions of a court of equity, and, the parties being before the court, it has' power to proceed with such administration. Hollins v. Brierfield Coal Co., 150 U. S. 371, 380; see also Quincy, v. Humphreys, 145 U. S. 82, 95.
The right of the Court to permit intervention by a party claiming an interest in the property in the hands of a receiver is not affected by the question of citizenship. Compton v. Jesup, 68 Fed. Rep. 263; Continental Trust Co. v. Toledo Ry., 82 Fed. Rep. 642; Toledo, St. Louis & K. C. R. Co. v. Continental Trust Co., 95 Fed. Rep. 497.
The propriety of making lessors of railways parties defendánt in a suit, either by a creditor, stockholder or mortgagee, to secure' the administration of the assets of an insolvent railway system,- where such system includes leased railways, has been repeatedly recognized in the Federal courts. Central Trust Company v. Wabash Railway Company, 29 Fed. Rep. 618; Central Trust Company v. Wabash Railway Company, 34 Fed. Rep. 259, 260, 261; Quincy &c. Ry. Co. v. Humphreys, 145 U. S. 82, 85-89; St. Joseph &c. Railway Company v. Humphreys, 145 U. S. 105, 106; Ames v. Union Pacific Company, 60 Fed. Rep. 966-968; Central Railroad & Banking Company of Georgia v. Farmers’ Loan & Trust Company, 79 Fed. Rep. 158-160; Mercantile Trust Company v. St. Louis & San Francisco Ry. Co., 71 Fed. Rep; 601, 602; Mercantile Trust Co. v. Farmers’ Loan & Trust Co., 81 Fed. Rep. 254, 255-258.
Mr. James Byrne for the respondent in No. 1?, Original:.
The claim that the decree appointing a receiver is void because made on the application of a simple contract creditor is without merit. While it is true that a court of equity, on the application of a simple contract creditor, will not appoint a receiver if objection is made by the defendant that the creditor has not obtained a judgment on which execution has been issued and returned unsatisfied, it is equally true that the defense is one which may be waived either expressly or by failure to take the objection arid that if it is waived the court has jurisdiction of the parties and its decree appointing the receiver is valid. Hollins v. Brierfield C. & I. Co., 150 U. S. 371; West. Electric Co. v. Reedy, 66 Fed. Rep. 163, 164; Park v. N. Y., Lake Erie & West. R. R. Co., 70 Fed. Rep. 641, 642; Waite v. O’Neill, 72 Fed. Rep. 348; 353; Ross-Meehan Co. v. Iron Co., 72 Fed. Rep. 957, 959; Temple v. Glasgow, 80 Fed. Rep. 441, 444; Schoolfield v. Rhodes, 82 Fed. Rep. 153, 157; Enos v. N. Y. & O. R. Co., 103 Fed. Rep. 47; Horn v. Pere Marquette R. R. Co., 151 Fed. Rep. 626. See also Searight v. Bank, 162 Pa. St. 504; People’s Bank v. Loeffert, 184 Pa. St. 164; Penna. R. R. Co. v. Bogert, 209 Pa. St. 589; Mut. Life Ins. Co. v. Wilkinson, 100 Maryland, 31; Clark v. Flint, 22 Pickering, 231; First Congregational Society v. Trustees, 23 Pickering, 148.
In this case there was absolutely no collusion, no positive action was taken to found a jurisdiction which otherwise would not exist, and the action is genuine and not merely colorable. The suit does, in the words of § 5 of the act of March 3, 1875, “really and substantially involve a dispute or controversy properly within the jurisdiction of said Circuit Court.”
In every case that the court has held to be collusive some positive action had been taken to found a jurisdiction which otherwise would not exist, and the action had been merely colorable and not genuine. Williams v. Nottawa, 104 U. S. 209; Rosenbaum v. Bauer, 120 U. S. 450; Lake County v. Dudley, 173 U. S. 243; Waite v. Santa Cruz, 184 U. S. 302; Morris v. Gilmer, 129 U. S. 315; Lehigh Mining &c. Co. v. Kelley, 160 U. S. 327; Detroit v. Dean, 106 U. S. 537; Dawson v. Columbia Trust Co., 197 U. S. 178. In this case there is absolutely nothing of the sort. The jurisdiction always existed from the time the indebtednesses arose down to the present moment. See also
Blair v. Chicago, 201 U. S. 400; Dickerman v. Trust Co., 176 U. S. 181.
. Mr. Frederic B. Caudert submitted petitions of Paul Fuller,
• J. Hampden Dougherty and Melvin G. Palliser, stating that they had been appointed receivers of the New York City Railway Company, and the Metropolitan Street Railway Company by the Supreme Court of the State of New York on November 29,1907, in actions brought by the Attorney Genera! of that State for the dissolution of such companies, on the ground that they- had been insolvent for more than one year.
These petitioners, while not appearing or intervening in this proceeding and in no manner conceding the jurisdiction of the Circuit Court of the United States to appoint receivers, as stated in the return herein, and without waiving any objection, respectfully advise this court that some of the matters purporting to be presented by the petition and the question of the jurisdiction of the Circuit Court and of alleged collusion between the parties in the action therein brought for the purpose "of creating a case cognizable in the Federal courts may hereafter be presented to this court on behalf of the petitioners as-such receivers appointed by the Supreme Court of the State of New York, and they also prayed that any action herein may be without prejudice to their rights in the premises.
The Docket Titles were, in No. 11, Matter of Reisenberg and'another, and in No. 12, Matter of Konrad and another. The petition in each ease was for a Writ of Mandamus against the Honorable E. Henry Lacombe, Circuit Judge of the United States for the Second Circuit and against the Circuit Court of the United States for the Southern District of New York.
■. Mr; Jus'cice . Peckham,
after making the foregoing statement, delivered the opinion of the court.
The petitioners base their application for relief in this court upon the contention that the Circuit Court had no jurisdiction in the case brought by the Pennsylvania Steel Company, and others,- against the New York City Railway Company, to appoint receivers, or to grant any relief asked for in the bill of complaint in that suit. And, as they have been denied leave to intervene therein, and they cannot appeal from the order denying such request, Ex parte Cutting, 94 U. S. 14; Credits Commutation Co. v. United States, 177 U. S. 311, they assert they are without any remedy, unless it be granted on this application. The basis of their contention, that the Circuit Court was without jurisdiction, rests upon the assertion that there was no controversy or dispute between the parties to that suit. The counsel for-the parties favoring the jurisdiction insist that these petitioners are not entitled to the remedy sought by them in this court, either by mandamus or prohibition, because the case made by them is not such as to authorize the court to issue either writ, as prayed for.
Without going into the question of the right of this court to grant the remedy sought, we prefer to place our decision upon the ground that the Circuit Court had jurisdiction, and that its action in exercising it was, therefore, valid.
The statutes defining the jurisdiction of the Circuit Court (1 Comp. Stat. 507, 508; Act March 3, 1875, c. 137, § 1, 18 Stat. 470; Act March 3,1887, c. 373, § 1,24 Stat. 552; Act August 13,-1888, e. 866, § 1, 25 Stat. 433), confer it, among other cases, where “there shall be a controversy between citizens of different States in which the matter in dispute exceeds, exclusive of interest and costs, the sum or value aforesaid,” ($2,000).
Although the amount involved in the suit in the Circuit Court was sufficient, it is insisted now that there was no dispute or controversy in that case within the meaning of the statute, because the defendant admitted the indebtedness and the other allegations of the bill of complaint, and consented to and . united in the application for the appointment of receivers. Notwithstanding this objection, we think there was such a controversy between these parties as is contemplated by the statute. In the bill filed there was the allegation that a demand of payment of the debt due each of complainants had been made and refused. This was not denied and .has not been. There was therefore- an unsatisfied demand made by complainants and refused by defendant at the time of the filing of the bill. We think that where there is a justiciable claim of some right made by a citizen of one State against a citizen of another State, involving an amount equal to the amount named in the statute, which claim is not satisfied by the party against whom it is made, there is a controversy, or dispute, between the parties within the meaning of the statute. It is not necessary that the defendant should controvert or dispute the claim. .It is sufficient that he does not satisfy it. It might be that he could not truthfully dispute it, and yet, if from inability, or, mayhap, from indisposition, he fails to satisfy it, it cannot be that because the claim is not controverted the Federal court has no jurisdiction of an action brought to enforce it. Jurisdiction does' not depend upon the fact that the defendant denies the existence of the claim made, or its amount or validity. If it were otherwise, then the Circuit Court would have no jurisdiction if the defendant simply admitted his liability and the amount - thereof as claimed, although not paying or satisfying the debt. This would involve the contention that the Federal court might be without jurisdiction in many cases, where, upon bill filed, it was taken pro confesso, or whenever a judgment was entered, by default. These are propositions which, it seems to us, need only to be stated to be condemned. The cases are numerous in which judgments have been entered by consent or default where the other requisites to the jurisdiction of the Federal court existed. Hefner v. Northwestern Life Insurance Company, 123 U. S. 747, 756; Pacific Railroad v. Ketchum, 101 U. S. 289, 296. In-the latter case the proceeding was “by the consent of all the partiés to the suit through their solicitors of record.” It was stated in the opinion by Chief Justice Waite that .the defendant had filed an answer under its corporate seal, in which every material allegation of the bill was confessed, and it was stated that the bonds sued for were in all respects valid obligations of the company, and the . mortgage a subsisting lien. No doubt was expressed as to the jurisdiction of the court, because of the admission Jof the facts by the defendant and its consent to the judgment. We do not doubt.the jurisdiction of the Circuit Court, although the facts were admitted, and the defendant joined with the complainants in a request. tha,t receivers should be appointed.
It is, however, argued, that although there may be jurisdiction in the case of railroads engaged in interstate commerce, yet they are exceptions, because in such a case they arise under the Constitution, although there may not have been an actual controversy between the parties. Such cases, it is said, cannot properly be regarded as precedents for claiming jurisdiction in the case of railroads wholly within the State, and doing no interstate business.
A case under the Constitution or laws of the United States does not arise against a railroad engaged in interstate commerce from that mere fact. It only arises under the Constitution, or laws or treaties of the- United States, when it substantially involves a controversy as to the effect or construction of the Constitution or on the determination of which'the result depends. Defiance Water Co. v. Defiance, 191 U. S. 184; Newburyport Water Co. v. Newburyport, 193 U. S. 561; Bonin v. Gulf Company, 198 U. S. 115; Devine v. Los Angeles, 202 U. S. 313. The appointment of a receiver in the case of a railroad engaged in interstate commerce does not necessarily involve any such controversy. Jurisdiction to appoint a receiver by a Circuit Court of the United States in cases of railroads engaged in. interstate commerce has existed by reason of diversity of citizenship in the various cases between the parties to the litigation, and not because the railroads were engaged in interstate commerce. The necessary diversity of citizenship is alleged to exist in the case before the Circuit Court, and there is no suspicion as to the truth of the averment.
It is also objected that the Circuit Court had no jurisdiction because the complainants were not judgment creditors, but were simply creditors at large of the defendant railways. The’ objection was not taken before the Circuit Court by any of the parties to the suit, but was waived by the defendant consenting to the appointment of the receivers, and admitting all the facts averred in the bill. Hollins v. Brierfield Coal & Iron Company, 150 U. S. 371, 380. That the complainant has not exhausted its -remedy at law—for example, not having obtained any judgment or issued any execution thereon—is a defense in an equity suit which may be. waived, as is stated in the opinion in the above case, and when waived the case stands as though the objection never existed.
In the case in' the Circuit Court the consent of the defendant to the appointment of receivers, without setting up the defense that the complainants were not judgment creditors who had issued an execution which' was returned unsatisfied, in whole or in part, amounted to a waiver of that defense. Brown v. Lake Superior Iron Co., 134 U. S. 530; Town of Mentz v. Cook, 108 N. Y. 504, 508; Horn v. Pare Marquette R. R. Co., 151 Fed. Rep. 626, 633.
It is asserted also, that there was collusion between the complainants and the street railway companies, on account of which the court had no jurisdiction to proceed, and therefore the suit should have been dismissed by the Circuit Court under § 5 of the act of 1875, already cited. By that section it must appear to the satisfaction of the Circuit Court that such suit does not really, and substantially involve a dispute or controversy properly Within the jurisdiction of that court, or that the parties to that suit have been improperly or collusively made or joined for the purpose of creating a. case cognizable under that act, in which case the Circuit Court is directed to proceed no further therein, but to dismiss the suit on that ground. Whether the suit involved a substantial controversy we have already discussed, and the only question which is left under that act is as to collusion. .
In this case we can find no evidence of collusion, and the Circuit Court found there was none. It does appear that the parties to the suit desired that the administration of the railway affairs-should be taken in hand by the Circuit Court of the United States,- -and to that end, when the suit was brought, the defendant admitted the averments in the bill and united in the.-request for the appointment of receivers.. This fact is stated by the Circuit Judge; but there is no claim made that the averments in the bill were untrue, or that the debts, named in the bill as owing to the complainants, did not in fact exist; nor is there any question made as to the citizenship of the complainants, and there is not the slightest evidence of any fraud practiced for the purpose of thereby creating a case tQ. give jurisdiction to the Federal court. That the parties pre-y ferred to take the subject matter of the litigation into the Federal courts, instead of proceeding in one of the courts of the State, is not wrongful. So long as no improper act was done by which the jurisdiction- of the Federal court attached, the motive for bringing the suit there is unimportant. Dickerman v. Northern Trust Co., 176 U. S. 181, 190; South Dakota v. North Carolina, 192 U. S. 286, 311; Blair v. City of Chicago, 201 U. S. 400, 448; Smithers v. Smith, 204 U. S. 632, 644.
The objection to the order permitting the Metropolitan Railway Company to intervene and making it a party defendant in the Circuit Court suit is not of a jurisdictional nature, and the granting of the order was within the. discretion of the court. United States v. Phillips, 107 Fed. Rep. 824; Credits &c. Co. v. United States, 177 U. S. 311. Having jurisdiction over the New York City Railway Company, and receivers having been appointed for it, there was every reason for extending the receivership t.o the Metropolitan Railway Company. The facts showed that it was so tied up with the New York company that a receivership for the latter ought to be extended to 'the former. The Circuit Court Judge so lield, and we think very properly, upon the peculiar facts of the case. See Quincy &c. R. R. Co. v. Humphreys, 145 U. S. 82, 95; Krippendorf v. Hyde, 110 U. S. 276, 283, 284.
From this review of the various questions presented to us. it appears that the Circuit Court had jurisdiction in the suit brought before it, and therefore the application of the petitioners for a mandamus or for a prohibition must be denied.
While so holding we are not unmindful of the fact that a-court is a very unsatisfactory body to administer-the affairs of a railroad as ¿ going concern, and we feel that the possession of such property by. the court through its receivers should not be unnecessarily prolonged. There are cases—and the one in •question seems a very strong -instance—where, in order to preserve the property for all interests, it is a necessity .to resort .to such a remedy.' A refusal to appoint .a receiver would have led in this instance almost inevitably to a very large and useless sacrifice in value of a great property, operated as one system through the various streets of a populous city, and such a refusal would also have led to endless- confusion among the various creditors in their efforts to enforce their claims, and to very great inconvenience to the many thousands of people who necessarily use the road every day of their lives.
The orders appointing the receivers and giving them instruct tions are most conservative and well calculated to bring about the earliest possible resumption of normal conditions when those who may be the owners of the property shall.be in possession of and operate it. We have no doubt,- if unnecessary delays should take place, the'court would listen to an. application by any creditor, upbn due notice to the receivers, for orders requiring the closing of the trust as soon as might be reasonably proper, or else vacating the orders appointing the receivers..
The rules are discharged and the petitions
Dismissed. | CASELAW |
Lepo
Lepo may refer to:
People
* Lepo Mikko (1911–1978), Estonian painter and teacher
* Lepo Sumera (1950–2000), Estonian composer and teacher
Places
* Lepo, East Timor
Other
* Low Exercise Price Option | WIKI |
Comparing Bosch vs. Denso Oxygen Sensors
Regarding engine performance and emissions, vital components of any automobile are oxygen sensors. To keep a vehicle running smoothly, selecting the right type and quality oxygen sensor is crucial to ensure your engine runs at peak efficiency. In this article, we’ll look at two leading brands regarding oxygen sensors – Bosch and Denso. We’ll compare the features and benefits of both brands, helping you make an informed decision when selecting the best oxygen sensor for your vehicle.
What Is an Oxygen Sensor?
An oxygen sensor (or O2 sensor commonly referred to) is an electronic device that measures the oxygen content of the exhaust gasses in a vehicle’s engine. It is a crucial component in controlling the engine’s air-fuel ratio and helps to ensure optimal performance and fuel economy.
The oxygen sensor sends a signal to the vehicle’s computer, which adjusts the air-fuel ratio based on the amount of oxygen detected. This ensures that the engine runs efficiently and that pollutants are kept to a minimum.
Oxygen sensors come in a variety of shapes and sizes. They can be as small as a few millimeters in diameter and are typically located in the engine’s exhaust manifold. Some vehicles may have more than one oxygen sensor, depending on the type of engine and the number of cylinders.
As the engine runs, the exhaust gasses flow through the oxygen sensor. The sensor measures the oxygen content in the gasses and sends a signal to the vehicle’s computer. The computer then adjusts the air-fuel mix accordingly.
Oxygen sensors are an essential component of any engine. Without them, the engine would not be able to properly regulate the air-fuel ratio, leading to decreased performance and increased pollution. Regular maintenance and replacement of oxygen sensors are essential to ensure optimal engine performance.
You might also read: How to remove car mats
Comparison of Bosch vs Denso Oxygen Sensors
Overview
Bosch is a well-known German manufacturer of automotive parts that have been in business for over a century. They offer a wide range of products, including oxygen sensors. Denso is a Japanese manufacturer of auto parts that was founded in the late 1940s. Both companies have a long history of producing quality products.
Design
Bosch oxygen sensors feature a robust design designed to stand up to the rigors of daily driving. The sensors are designed to be heat and vibration resistant, which makes them ideal for use in high-performance applications.
Denso oxygen sensors are designed with a compact, lightweight design that helps reduce the vehicle’s overall weight. The sensors also feature a low-resistance design, which helps ensure accurate readings.
Performance
Bosch oxygen sensors are known for their accuracy and reliability, making them an excellent choice for various applications. The sensors can accurately measure oxygen levels and send the information to the vehicle’s computer. Denso oxygen sensors are also known for their accuracy but are not as reliable as Bosch sensors.
Cost
Regarding cost, Bosch oxygen sensors are typically more expensive than Denso sensors. This is because Bosch sensors are usually of higher quality and are designed to last longer. On the other hand, Denso oxygen sensors can be significantly cheaper, but they may only last for a while.
Durability
It’s challenging to determine which is more durable: Denso or Bosch. Both companies have been producing oxygen sensors for many years and are renowned for their reliability and quality. To give you a better idea of which oxygen sensor is better, let’s take a closer look at the features of each one.
Bosch O2 Sensors
Bosch oxygen sensors are some of the most popular on the market and have been trusted by car manufacturers for decades. Their O2 sensors are known for their long life and reliable performance. They are designed to be durable and withstand extreme temperatures and vibrations without any issues. Plus, they are built with the latest technologies to ensure they last for many miles.
On average, Bosch O2 sensors are known to last for about 60,000 to 90,000 miles. They also come with a wide range of features, including a special coating that helps prevent any dirt, dust, and grime buildup.
Denso O2 Sensors
Denso O2 sensors are also known for their durability and performance. They are designed to withstand the toughest of conditions, and many of them come with a special coating that helps to prevent the buildup of dirt, dust, and grime.
Denso O2 sensors are known to last about 60,000 to 90,000 miles. However, if you have an older car, the lifespan of these sensors may be lower and only last for 30,000 to 50,000 miles.
Overall, both Denso and Bosch oxygen sensors are highly reliable and durable. They can withstand extreme temperatures and vibrations without any issues. Plus, they come with a special coating that helps to prevent the buildup of dirt, dust, and grime.
Compatibility
Bosch oxygen sensors are typically compatible with most vehicle makes and models, making them an excellent choice for various applications. Denso sensors are also compatible with many cars but may only be compatible with some makes and models.
Pros & Cons of Bosch Oxygen Sensors
Pros of Bosch Oxygen Sensors
1. Durability: Bosch oxygen sensors are incredibly durable and have a long life expectancy. This makes them ideal for use in the automotive industry, where they must withstand intense temperatures, vibrations, and other environmental factors.
2. Accuracy: Bosch oxygen sensors are incredibly accurate and essential for adequately functioning the engine. This accuracy helps ensure the engine is running efficiently and smoothly.
3. Cost: Bosch oxygen sensors are generally more affordable than other oxygen sensors, making them an excellent option for those on a tighter budget.
Cons of Bosch Oxygen Sensors
1. Installation: Bosch oxygen sensors can be challenging to install, depending on the type of vehicle. This can be especially true if the car is older and has little room to fit the sensor.
2. Maintenance: Bosch oxygen sensors require regular maintenance and can be a bit more expensive than other oxygen sensors.
Pros & Cons of Denso Oxygen Sensors
Pros of Denso Oxygen Sensors
1. Accurate Measurement: Denso oxygen sensors are designed to measure the amount of oxygen in exhaust gasses accurately. This allows the engine to adjust its air/fuel mixture to prevent excessive emissions.
2. Durability: Denso oxygen sensors are designed to be durable, withstanding the extreme temperatures and vibrations that come with everyday driving. This helps to ensure that the sensors last a long time and don’t need to be replaced frequently.
3. Easy Installation: Denso oxygen sensors are relatively easy to install and don’t require much work to get them up and to run. This helps to make them an excellent choice for DIY enthusiasts who want to save time and money.
Cons of Denso Oxygen Sensors
1. Sensitivity to Heat: The Denso Oxygen Sensor is heat-sensitive and can be easily damaged if exposed to high temperatures.
Which One Is Best for You?
Selecting a suitable oxygen sensor for your vehicle can be a daunting task. With so many available options, deciding which is best for you can be challenging.
When it comes to Asian cars, Denso is the clear winner. Denso is the Original Equipment Manufacturer (OEM) for many Asian-made vehicles, so you can be sure that their sensors are a perfect fit for your car. Their top sellers include the Denso 234-4190 Oxygen Sensor, the Denso 234-4386 Oxygen Sensor, and the Denso 234-4721 Oxygen Sensor. These options work well in Honda, Toyota, and other Asian-made vehicles.
For European vehicles, Bosch oxygen sensors are the best fit. Bosch has a thicker, “fatter” sensor than other aftermarket manufacturers, so it’s more likely to be compatible with your car. Popular Bosch oxygen sensor models include the Bosch 15733 Oxygen Sensor, the Bosch 15736 Oxygen Sensor, and the Bosch 15742 Oxygen Sensor.
No matter which sensor you choose, you can rest assured that you’re getting quality parts for your car. Denso and Bosch are well-known, trusted brands that have proven their reliability over the years. Whichever one you choose, you can be sure you’re getting an excellent oxygen sensor for your vehicle.
Conclusion
Both Bosch and Denso oxygen sensors are reliable and high-quality products that will provide accurate readings and reliable performance in any vehicle. While Bosch may be slightly more expensive, it is a well-established brand with a strong reputation and a history of providing dependable sensors. On the other hand, Denso is a more affordable option, offering similar performance and results that won’t break the bank. Ultimately, the decision between Bosch and Denso will come down to personal preference and budget.
Leave a Comment | ESSENTIALAI-STEM |
Patrick Asselman
Patrick Asselman (born 30 October 1968) is a Belgian former football player and currently assistant coach of Anderlecht in the Belgian Pro League.
Honours
Standard Liège
* Belgian Cup: 1992–93 | WIKI |
Page:The physical training of children (IA<PHONE_NUMBER>6464.med.yale.edu).pdf/28
room ought to be managed;—I will use my best energy to banish injurious practices from the nursery;—I will treat of the means to prevent disease where it be possible;—I will show you the way to preserve the health of the healthy,—and how to strengthen the delicate;—and will strive to make a medical man's task more agreeable to himself,—and more beneficial to his patient,—by dispelling errors and prejudices, and by proving the importance of your strictly adhering to his rules. If I can accomplish any of these objects, I shall be amply repaid by the pleasing satisfaction that I have been of some little service to the rising generation. 2. Then you consider it important that I should be made acquainted with, and be well informed upon, the subjects you have just named?
Certainly. I deem it to be your imperative duty to study the subject well. The proper management of children is a vital question,—a mother's question,—and the most important that can be brought under the consideration of a parent; and, strange to say, it is one that has been more neglected than any other. How many mothers undertake the responsible management of children without previous instruction, or without forethought; they undertake it as though it may be learned either by intuition or by instinct or by affection! The consequence is, that frequently they are in a sea of trouble and uncertainty, tossing about without either rule or compass; until, too often, their hopes and treasures are shipwrecked and lost!
The care and management, and consequently the health and future well-doing of the child, principally devolve upon the mother; "for it is the mother after all that has most to do with the making or the marring of the man." Dr. Guthrie justly remarks that—"Moses might never have been the man he was unless he had been nursed by | WIKI |
The Ultimate Guide To Healthy Weight Management: Diet And Beyond
In the realm of health and wellness, diet and weight loss remain paramount concerns for many. Navigating the complexities of nutrition and maintaining a healthy weight can be a daunting task, often plagued by misinformation and unsustainable trends. This comprehensive guide will delve into the intricacies of diet and weight loss, empowering you with evidence-based knowledge and practical advice to achieve your health goals.
**The Role of Nutrition in Weight Management**
Diet plays a crucial role in weight management, as it provides the body with the nutrients it needs to function optimally. A balanced diet rich in fruits, vegetables, whole grains, and lean protein promotes satiety, supports metabolism, and reduces the risk of chronic diseases. Conversely, diets high in processed foods, sugary drinks, and unhealthy fats can contribute to weight gain and a myriad of health problems.
**Understanding Calorie Deficit and Energy Balance**
Weight loss occurs when you consume fewer calories than you burn. This concept, known as calorie deficit, is essential for creating an energy imbalance that forces the body to utilize stored energy (fat) for fuel. However, extreme calorie deficits can be counterproductive, slowing down metabolism and leading to nutrient deficiencies. Aim for a gradual and sustainable calorie deficit of 500-1,000 calories per day.
**Mindful Eating and Emotional Triggers**
Mindful eating practices involve paying attention to your food and eating slowly, without distractions. This awareness helps you recognize hunger and fullness cues, preventing overeating. Additionally, identifying and addressing emotional triggers that lead to unhealthy eating habits is crucial for lasting weight loss success.
**Exercise: An Integral Component**
In conjunction with a healthy diet, regular exercise is indispensable for weight loss and overall well-being. Physical activity increases calorie expenditure, builds muscle mass (which boosts metabolism), and improves insulin sensitivity. Aim for at least 150 minutes of moderate-intensity exercise or 75 minutes of vigorous-intensity exercise per week.
**Hydration and Water Consumption**
Staying hydrated is essential for overall health and weight management. Water has no calories and can help curb hunger and boost metabolism. Aim for eight glasses of water per day or more, especially before meals and during workouts.
**Sleep and Stress Management**
Sleep deprivation and chronic stress can disrupt hormones that regulate appetite and metabolism, leading to weight gain. Ensure you get 7-9 hours of quality sleep each night. Engage in stress-reducing activities such as yoga, meditation, or spending time in nature to mitigate the negative effects of stress on weight management.
**Realistic Goals and Sustainable Habits**
Setting realistic weight loss goals is crucial for long-term success. Aim to lose 1-2 pounds per week through a combination of diet and exercise. Focus on creating sustainable habits that you can maintain over time rather than resorting to quick fixes or fad diets.
**Conclusion**
Achieving and maintaining a healthy weight is a multifaceted endeavor that requires a holistic approach encompassing nutrition, exercise, mindful eating, and lifestyle modifications. While there is no one-size-fits-all solution, this guide provides a comprehensive framework to navigate the complexities of diet and weight loss. Remember, consistency, patience, and a commitment to your health are the keys to lasting success.
Optimized by Optimole | ESSENTIALAI-STEM |
Blackberries, blueberries, strawberries (and more varieties) are an ideal weight-loss food because they’re relatively low in calories, pack a nutrient-dense punch, and add tons of flavor to otherwise lackluster meals. “Loaded with fiber and antioxidants, these little fruits are great on cereal, yogurt, smoothies, salads, or alone as a snack,” Zeratsky adds. Fruit gets a bad rap when it comes to weight loss because of their natural sugar, but this actually helps relieve the monotony of a diet program. Berries satisfy your sugar cravings without destroying your progress because they’re filling, and can effectively curb your overal calorie intake by slowing digestion and the absorption of fructose.
It might make your breath smell a bit, but each clove of garlic is packed not just with toxin-battling antioxidants, but also a naturally occurring chemical called allicin. When digested, allicin reacts with the blood to create a product capable of killing off many harmful bacteria and viruses that your body may be harbouring – including in the digestive tract. A healthy gut it essential for achieve a flatter tummy – try adding a few raw cloves to your food just before serving to get the most out of it.
The common mistakes people make to lose weight section is decent, however I felt it was lacking. People make a lot more than just 3 common mistakes, which are crash dieting, too much exercise and checking weight too often. I'd like to see this section more fully covered because a better understanding of why these are bad, as well as other mistakes that weren't even mentioned, are going to help people make better choices in the future. Overall this is an important section that was sort of glossed over.
If you’re trying to shed excess weight, use all three calorie-density-reduction strategies. While this study showed that cutting the amount of fat added to foods was the single most effective way to reduce ad libitum calorie intake, it is clear that all three methods were effective. Furthermore, they are not mutually exclusive, so it is likely that using all three in combination would work even better than each one used alone.
Tags: lose weight, lose weight here, lose weight fast, lose weight without dieting, lose weight without dieting or working out, weight loss, weight loss motivation, weight loss for women, weight loss tips, weight loss smoothies, weight loss stories, weight loss books, how to lose weight, how to lose weight fast, how to lose weight without working out, how to lose weight in a week, how to lose weight without dieting, how to lose weight for women, how to lose weight after pregnancy, how to lose weight fasting, how to lose weight naturally
Although adding an exercise routine to your diet overhaul will help you burn fat more quickly than a dietary intervention alone, one JAMA study found that obese patients who change their diets first and begin exercising six months after their diet change will lose the same amount of weight after 12 months as those participants who eat healthier and exercised over the course of the whole year. In short: don’t put off your weight loss goals just because you don’t want to exercise. Change your diet today, exercise later, and you can still lose weight.
Similarly, lemons are a rich source of vitamin C and other nutrients good for weight loss. The health benefits of lemons also include lowering the risk of stroke, preventing asthma, combating cancer. Studies have also suggested that daily consumption of plant foods like lemons reduces your chances of developing diabetes, obesity, heart disease, etc. So, replace your aerated drinks with this delicious detox drink to stay healthy and slim down your waistline.
To transform your body, to get fit, to be healthy and to feel great you gotta exercise. Just like the air you breathe, your body needs physical exercise. And it needs exercise in a way that is so far-reaching that scientists are only just starting to unravel some of the amazing effects exercise has on our bodies. Did you know, that exercise can actually reprogram your DNA? And while you may think that by not doing exercise you’re not doing any harm, lack of exercise itself can alter your DNA – but unfavourably!
Your habits and cravings may both rear their heads at restaurants, where it's easy to blow your diet in seconds. To stick to the plan, says Juge, be diligent in ordering. "Ask them to grill your meat without oil or grease. Ask for steamed vegetables with no butter. Get a salad (no cheese) with either fat-free dressing or a vinaigrette." After his 14 years in bodybuilding, Juge testifies that he's found many restaurants are accommodating, so there's no reason to avoid them as long as they'll cook to your preferences.
At first, Samantha says she hated the bitter taste and had to force herself to drink it. But soon, Samantha was sipping on green tea and lemon every morning. She then began drinking one cup each hour at work and finished off the day with one while watching TV—a total of nine cups of green tea every day. After just one month of this regimen, Samantha dropped nearly 15 pounds.
Brazilian scientists found that participants who consumed three cups of the beverage every day for a week had fewer markers of the cell damage caused by resistance to exercise. That means that green tea can also help you recover faster after an intense workout. In another study—this one on people—participants who combined a daily habit of four to five cups of green tea each day with a 25-minute workout for 12 weeks lost an average of two more pounds than the non-tea-drinking exercisers.
Set (and write down) reasonable expectations for what you plan to achieve during your challenge. “You can absolutely make a difference in 10 days,” says Brooke Alpert, RD, a dietitian in New York City and the author of The Diet Detox, but don’t expect to shed 20 pounds a la The Biggest Loser. “While actual weight loss will be around three to four pounds, you can really notice the difference in the way your body feels in about a week.”
Processed, packaged foods are often loaded with more salt, sugar, and refined carbs than you’d put in the foods you cook for yourself. When you’re looking to drop weight fast, avoid foods that come in packages and stick to whole, unprocessed foods. (Here are the four most harmful ingredients in processed food.) Build your plates with non-starchy veggies, unprocessed whole grains, lean proteins, and healthy fats, and season with spices, not salt.
You don’t need to bust out the measuring cups to properly portion out your food: A serving size of meat is roughly the size of a deck of cards or the size of the palm of your hand. Your entire fist should be the size of a serving of veggies (although the more, the better!). A serving of fat, such as butter or coconut oil, should be the size of your thumb. Your carb serving should be no bigger than what can fit in your cupped hand. For other ways to eyeball your proper serving sizes, check out What the Perfect Food Portion Sizes Actually Look Like.
Authors’ Contribution:Study concept and design: Damoon Ashtary-Larky; field, experimental, and clinical work, and data collection: Damoon Ashtary-Larky, Nasrin Lamuchi-Deli, Mehdi Boustaninejad, Seyedeh Arefeh Payami, and Sara Alavi-Rad; data analysis and interpretation: Matin Ghanavati and Amir Abbasnezhad; preparation of the draft, revisions or providing critique: Meysam Alipour; overall and/or sectional scientific management: Reza Afrisham.
Ghrelin is often referred to as the ‘hunger hormone’. If ghrelin is high, then you are hungrier. Anecdotal studies and personal experience have hinted at the appetite suppressing effect of green tea but this provides some rational basis for explaining how high dose catechin suppresses hunger. Adiponectin was also increased significantly, which is good although the exact significance is unknown. It has known anti-atherogenic and anti-diabetic properties, but this effect is not consistently seen in the literature.
The latest nutritional research proves what you eat AND when you eat both contribute to weight loss. †† We created Rapid Results based on this revolutionary research. With Rapid Results we provide you with a plan that takes maximum advantage of your body’s natural fat-burning ability, so you lose weight faster, plus our consultants have completed new comprehensive training to deliver excellent weight loss guidance for results.
Dr. Shiel received a Bachelor of Science degree with honors from the University of Notre Dame. There he was involved in research in radiation biology and received the Huisking Scholarship. After graduating from St. Louis University School of Medicine, he completed his Internal Medicine residency and Rheumatology fellowship at the University of California, Irvine. He is board-certified in Internal Medicine and Rheumatology.
Keto. Flexitarian. Paleo. Whole 30. Vegan. There are as many diets in existence as there are dangerous weight loss myths. So which eating style should you choose when you’re on a get-fit-quick and have just 10 days? Turns out, numerous studies have found it essentially doesn’t matter which plan you follow for rapid weight loss, be it low-carb or low-fat, as long as you’re eating fewer calories than you’re burning. The key is that it’s sustainable: a strategy that you can keep up for the week and a half—and beyond.
Fermented foods: These enhance the function of good bacteria while inhibiting the growth of bad bacteria. Sauerkraut, kimchi, kefir, yogurt, tempeh, and miso all contain good amounts of probiotics, which help to increase good bacteria. Researchers have studied kimchi widely, and study results suggest that it has anti-obesity effects. Similarly, studies have shown that kefir may help to promote weight loss in overweight women.
Not much of a coffee drinker? Tea is also a natural diuretic, and types of herbal tea such as dandelion or fennel root can also lend a hand. In fact: When a recent study compared the metabolic effect of green tea (in extract) with that of a placebo, researchers found that the green-tea drinkers burned about 70 additional calories in a 24-hour period.
Every day, countless people throw away valuable antioxidants and minerals. While seemingly unimaginable, that’s exactly what happens when you brew a cup of green tea because water can only extract a fraction of green teas benefits. The majority actually remains unused, trapped in the tea leaves. In reality, the only way to truly take advantage of green teas full potential is to consume the entire leaf. But that doesn’t mean you need to start eating tea leaves. The simplest solution is to just enjoy a bowl of matcha. Because matcha is straight, stoneground tea leaves, matcha provides you with green teas powerful arsenal of vitamins, minerals, antioxidants, and amino acids in a way no other green tea can.
Regardless of whether you pick a sensible diet, exercise, behavioural therapy or a drug, our analysis of the literature shows that it’s those who experience the greatest weight loss in the first 2-4 weeks who have the greatest weight loss the following year. So if you’ve lost a lot of weight after one month, you’re more likely to have lost a lot of weight after a year or two.
“One of the keys to long-term and sustainable weight loss is to cut total calorie intake, and there’s no better way to do that than by eating just a little bit less of what you currently eat. Once you get into a habit of reducing portions—especially of sugary, fatty and other nutrient-poor foods—you can fine tune your diet to incorporate more nutrient-rich foods. But paring portions is still the best first step.” — Elisa Zied, MS, RDN, CDN, author of Younger Next Week
“You can’t just say, ‘I want to lose weight…someday.’ It’s that kind of loose talk, without a fence or guideline, that discourages you from getting started and prevents you from succeeding. The way I did it was by tying it to an upcoming event in my life. I never focused on a number and I didn’t set out to lose a certain number of pounds per week or overall. I merely found a target date a year away and I proclaimed to myself that I’d be in better shape by then. — Maria Menounos, author of The Everygirl’s Guide to Diet and Fitness, on how she lost 40 pounds
× | ESSENTIALAI-STEM |
Updated Research Report on Amerisafe - Analyst Blog
On May 21, we issued an updated research report on Amerisafe Inc. ( AMSF ). The company has been benefiting from strong core fundamentals and diversified portfolio initiatives over the past couple of years. However, declining investment returns and moderated growth in premiums raise concern.
This Zacks Rank #3 (Hold) stock has delivered positive earnings surprises in 2 of the last 4 quarters with an average beat of 14.2%. The company's first-quarter earnings lagged the Zacks Consensus Estimate by 11.1% but was higher than the year-ago quarter number by 19.1%.
After posting mid double-digit growth in premiums written for the 12 consecutive quarters until fourth-quarter 2013, these toned-down to about 8% growth in first-quarter 2014. Moreover, although investment income stabilized, investment yield deteriorated to 3.8% at Mar 2014-end from 4.2% in the year-ago period. The higher trend of expenses and lack of any near-term growth catalyst are the other challenges.
Nevertheless, operating leverage continues to remain strong as reflected by improved underwriting results, development reserves, combined ratio and return on equity (ROE). These pillars of growth also support Amerisafe's liquidity, as evident from its strong cash flows and risk-free balance sheet.
We believe that Amerisafe's efficient deployment of excess capital, particularly, hiking regular cash dividends by 50% within a year of the payout initiation, along with the first extraordinary cash dividend payout of $0.50 per share (all in Mar 2014) will keep long-term shareholders invested in the stock.
Overall, a restrained risk-reward balance in the near term has led to negative estimate revisions for 2014 and 2015. As a result, the Zacks Consensus Estimate for 2014 and 2015 are pegged at $2.47 and $2.98 per share, down 7.8% and 7.2%, respectively, in the last 30 days.
Key Picks in the Sector
Currently, we prefer to remain at the periphery regarding Amerisafe. However, some top-ranked stocks in the insurance sector such as AmTrust Financial Services Inc. ( AFSI ), OneBeacon Insurance Group Ltd. ( OB ) and HCI Group Inc. ( HCI ), all sporting a Zacks Rank #1 (Strong Buy), are worth reckoning.
Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report
AMTRUST FIN SVC (AFSI): Free Stock Analysis Report
AMERISAFE INC (AMSF): Free Stock Analysis Report
HCI GROUP INC (HCI): Free Stock Analysis Report
ONEBEACON INSUR (OB): Free Stock Analysis Report
To read this article on Zacks.com click here.
Zacks Investment Research
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Academia Paulista de Letras
The Academia Paulista de Letras (Portuguese: Academy of Literature of São Paulo) is a non-profit organization with the objective of promoting Brazilian literature. The Academia Paulista de Letras was founded on November 27, 1909 by Joaquim José de Carvalho, who served as the organization's first Secretary General.
Writer José Geraldo Vieira was an active member. | WIKI |
While many drivers are diligent in maintaining their vehicle's appearance and engine health, one key aspect of vehicle care often goes unnoticed: the significance of regularly monitoring and maintaining optimal tyre pressure. Proper tyre inflation not only ensures your vehicle's safety and performance but also assists in maximising fuel efficiency and reducing wear and tear, ultimately prolonging the life of your tyres.
Tyre pressure has a substantial impact on the functional aspects of your vehicle, including handling, braking, and ride comfort. Inadequate tyre pressure, either over- or under-inflation, can lead to irregular wear, decreased fuel efficiency, and compromised safety on the road. Furthermore, conditions such as fluctuating outdoor temperatures and driving on diverse road surfaces can cause tyre pressure to vary, highlighting the importance of routine pressure checks.
In this comprehensive article, we will explore the crucial role tyre pressure plays in maintaining the optimal performance and efficiency of your vehicle. We will discuss the potential consequences of improper tyre inflation and provide guidance on regular tyre pressure checks, including determining the ideal pressure levels for your specific tyres and vehicle model. Our goal is to equip you with essential knowledge on tyre pressure and its impact on your vehicle's overall health, helping you make well-informed decisions about tyre care.
The Importance of Proper Tyre Inflation
• Enhanced Safety: Tyres are your vehicle's primary contact with the road, and the correct pressure promotes stability and proper load distribution. Properly inflated tyres improve handling, grip, and braking performance, keeping you safe on the road.
• Improved Fuel Efficiency: Adequate tyre pressure allows your vehicle to roll more efficiently on the road, reducing rolling resistance and saving you money at the petrol station. According to research, fuel consumption can increase by up to 3% when tyre pressure is just 25% below the recommended level.
• Prolonged Tyre Life: Incorrect tyre pressure accelerates tyre wear, shortening their lifespan and increasing the frequency of tyre replacements. Maintaining the recommended pressure contributes to even wear and prolongs the life of your tyres, resulting in long-term savings.
• Better Performance: Well-inflated tyres provide a smoother, more comfortable ride by absorbing road irregularities more effectively. They also offer better vehicle control and responsiveness, enhancing overall driving performance and comfort.
The Dangers of Over- and Under-inflation
• Over-inflation: Over-inflating tyres reduces the contact patch with the road, leading to decreased traction, uneven wear, and reduced tyre life. Moreover, over-inflated tyres are more susceptible to impact damage or punctures due to their limited ability to absorb road imperfections.
• Under-inflation: Under-inflation increases a tyre's contact patch with the road, causing the sidewalls to flex excessively and generate excessive heat. As a result, tyres may wear unevenly, overheat, or even suffer blowouts. Additionally, under-inflated tyres diminish fuel efficiency and handling performance.
Mastering Tyre Pressure Maintenance
• Regular Checks: Experts recommend checking tyre pressure at least once a month, as tyres naturally lose pressure over time. Regular checks will help ensure that your tyres remain properly inflated and that you can address any pressure discrepancies promptly.
• Use a Reliable Tyre Pressure Gauge: Invest in a high-quality tyre pressure gauge to ensure accurate readings. Make the pressure checks when the tyres are cold, preferably in the morning or after the vehicle has been parked for a few hours, as heat can cause tyre pressure to increase temporarily.
• Determine Optimal Pressure Levels: Consult your vehicle's owner's manual, tyre placard (usually located on the driver's door jamb), or tyre manufacturers' websites for the recommended tyre pressure levels specific to your tyres and vehicle model.
• Don't Overlook the Spare: Remember to check your spare tyre's pressure to ensure it's also in optimal condition, so you're prepared in the event of a tyre emergency.
Your Key to Driving with Confidence
Optimal tyre pressure is the cornerstone of a safe and efficient driving experience, ensuring that your vehicle maintains top-notch performance, fuel economy, and longevity. By routinely monitoring and maintaining tyre pressure, you'll be safeguarding your safety on the road, improving your vehicle's handling, and preserving the life of your tyres.
Need help with tyre pressure maintenance or selecting the right tyres for your vehicle? Our team at Keller Tyres is always here to lend a helping hand, providing expert recommendations and guidance tailored to your specific needs. Reach out to us today for professional assistance in keeping your tyre pressure in check and your vehicle performing at its best. | ESSENTIALAI-STEM |
Snowboarding: Americans Mack, Marino secure Olympic spots in Mammoth
MAMMOTH, California (Reuters) - American snowboarder Kyle Mack made up for a disappointing first trip down the slopestyle course on Saturday with two impressive runs to win the U.S. Grand Prix in Mammoth and qualify for next month’s Olympics in Pyeongchang. It will be the first Olympics for the 20-year-old Mack, who will join fellow Americans Chris Corning and Red Gerard on the combined slopestyle and big air Olympic team. “Feeling just amazing, unbelievable feeling right now,” he said. “I’m just excited to go and be a part of it and represent my country.” Americans Julia Marino and Hailey Langland reached the podium in the women’s slopestyle snowboarding final at the World Cup event to qualify along for Pyeongchang with U.S. Grand Prix winner and Sochi gold medalist Jamie Anderson. “This is a really surreal moment right now, it definitely hasn’t sunk in,” Marino said. Torin Yater-Wallace and Alex Ferreira also qualified for the U.S. Olympics team in halfpipe skiing and will join 2014 gold medalist David Wise after impressive runs under the lights on Friday. Pyeongchang will offer Yater-Wallace another chance to add an Olympic medal to his sizable collection of Winter X Games medals after the 22-year-old came up empty-handed in Sochi in 2014. “I am really happy to be feeling better and skiing like myself again,” said Yater-Wallace, who made the team after overcoming a liver infection in 2015 during which he spent 10 days in an induced coma. Pyeongchang will be Ferreira’s first Olympics after narrowly missing the 2014 Sochi Games. “I can not believe it, I seriously can not believe it. I am the happiest human in all the land,” the 23-year-old said. Brita Sigourney also qualified for the U.S. Freeski team after defeating compatriot Devin Logan and Sochi gold medalist Maddie Bowman. Editing by Greg Stutchbury | NEWS-MULTISOURCE |
A man using a smartphone
It’s possible to save your sanity, battery, and data by blocking ads in apps, on the web, and even video ads on Android.
Block ads in apps on Android (including video ads)
Ads on websites and in apps are annoying enough, but apps that pop up a 30 second video ad while you’re going about your business are much harder to put up with. While there’s browsers that block ads on the web, in-app ads are tougher to eliminate. But it’s possible on Android, without root access to your phone.
“But wait! Isn’t that like stealing the app?” you cry. Well, maybe in a sense. When an app has gone from a harmless banner ad to a 30-second, loud, obnoxious video ad for a kid’s video game you’ll never play, I’d suggest it’s fair to block it. But try to support the developer by buying the full version or giving them a donation.
I’ve forgotten what ads look like
I’ve been using this method to keep ads off my Android phone for years now, and I find it impossible to go back. Every app is now a breeze to use, doesn’t shove obnoxious ads in my face, and my sanity has returned. It even uses less battery and data, because the ads won’t be downloaded and played. If it weren’t for this hack, I’d have to switch to an iPhone, where ads are more rare.
It’s a little involved but well worth it
This is how it works. Every time an app tries to request data from the internet, it gets funneled through what’s called a VPN - a virtual private network. But this is a special VPN: it doesn’t let apps request data from ad companies.
Let’s get you set up. It’ll only take a few minutes.
1. Allow side-loading apps
If you haven’t before, you might need to tell your phone to allow you to install apps from outside the Play Store. This is called side-loading. To allow it, go to Settings, Security (or “Lock screen and security” on Samsung), and enable the setting called “Unknown sources”.
This lets you install apps from files called APK files, which have the file extension .apk. Be careful which apps you install though.
Allow side-loading apps on Android
2. Install the DNS66 app
This is a free, open source app. Open source is important here because all your network requests will go through this app, and we need to make sure we can trust it. Because the app is open source, if it was doing anything shady, it would be found out. You can read up about what open source means to learn more.
You can download DNS66 from F-Droid, which is like the Play Store but for open source apps. You can download DNS66 here.
You can either install F-Droid and install DNS66 from it, or you can download it and install it directly as an APK file. If you downloaded the APK file, just open it to install it. You might need to find the .apk file in your Downloads folder.
3. Set up hosts to block
DNS66 uses lists of sites to block called hosts files. DNS66 is handy because it includes well known hosts files that are kept up to date with new ad companies to block as they appear.
These hosts files tend not to include the ad companies that show video ads inside your apps, so if you’re keen to block those, you’ll need to download a hosts file we’ve prepared, and add that to DNS66. Don’t worry, it’s easy.
First download this video ads hosts file to your device. You might need to press on the link and hold and tap “Download link”. We prepared it ourselves by running some common apps, hunting down where the video ads are coming from, and adding them to the list. We might not have got them all, so let us know in the comments if you encounter an ad (and what app you saw it in).
Now go into DNS66, go to the Hosts tab, tap the plus (➕) icon in the bottom right to add a new hosts file. Enter any title you like such as “Video ads”. Then for the location, click the little paperclip symbol and select the “unlikekinds-video-ads-hosts” file you downloaded earlier. Then tap the tick in the top right.
Before you start blocking ads, you’ll need to open DNS66 and tap the Refresh host files button (the circle arrow in the top right). This will refresh all the other hosts files. Remember they’re kept up to date, which means the lists need to be downloaded every now and then. DNS66 will do this automatically.
Set up DNS66 hosts to block ads on Android
4. Enable ad blocking
Now all you have to do is go to the Start tab in DNS66 and tap the big START button at the bottom, and you’re set!
Try opening up an app with ads in it, and they should be gone.
Wait, I still saw an ad!
This can happen from time to time, like if a new ad company comes out that hasn’t made it into a hosts file, or if they started using a new address.
If you see a video ad, let me know in the comments and I’ll add it to the hosts file. Or if you’re really savvy, you can track down the address and add it on your own.
Support app developers
It’s important that free apps continue to be made, and app developers need money to go on doing what they do. So if you can’t stand ads in your apps, try to support them in another way, by making a donation or paying a few bucks for the full version of their app.
After all, if everyone blocked ads, there wouldn’t be free apps anymore. But if the ads are really time consuming or obnoxious, we think you should block them, guilt free.
Get the unlike kinds newsletter
An infrequent summary of top articles in your inbox
Comments
Share your thoughts, post a comment
1 Virbius - 10 months ago
Hey, could you explain how you find the host files for the ads you block? I’ve tried to find out on my own but to no avail. For example, lets say I want to block all ‘Lords mobile’ ads from my phone, how would I go about finding the host files for their domain? Thanks in advance.
1 whalabi - 10 months ago
Hey! Good question, that’s a tricky part of the process.
The way I did it was to record the logs my phone makes, open an app that shows unwanted ads, and search the logs for messages from the app.
They usually put messages in the logs about requesting and downloading ads, including where the ads come from.
You can view the logs of the phone using apps like SysLog or using Logcat.
Hope that helps :)
1 GuyGordon - 11 months ago
Am I correct that only 1 VPN can be active at a time? I have 1.1.1.1 installed to use the CloudFlare DNS service. It is a VPN redirecting DNS requests. I’m guessing I can use DNS66 to direct DNS to 1.1.1.1?
1 whalabi - 11 months ago
You’re correct, as far as I can tell you have to choose 1 VPN.
DNS66 however allows you to specify which DNS service is used for requests it allows, there’s a DNS tab in the app, and CloudFlare’s DNS service is listed by default.
I haven’t tried it myself but I assume you just have to check the CloudFlare box on the DNS tab.
1 kind - 11 months ago
What do you think of using AdGuard DNS? Or do you know an open-source alternative that is easy to setup (e.g. not pi-hole)?
(Also I noticed you are using googletagmanager, blocked by uBlock Origin, on this site)
1 whalabi - 11 months ago
In my experience, the ad host lists don’t include video ad providers, that’s why I prepared a separate list of them.
As far as I can tell, you can’t customise which hosts AdGuard blocks, but if they block everything you need, then by all means.
As for Google Tag Manager, analytics are essential on the web. You’re very welcome to block it. :)
0 ebmat - 6 months ago
Admittedly this is a shameless plug, though by no means an irrelevant one. I recently took what I’ve been doing for my own personal ad blocking on mobile and turned it into a little service called blockerdns (.com if anyone’s interested). I was already blocking ads for years at home by running my own DNS server with a big blocked domains file, and also ran a VPN on a DNS server that I set up on GCP that I would use for mobile blocking. But I always disliked the VPN method because of overhead, etc., so when Android 9 introduced a private DNS setting (which utilizes DNS-over-TLS) I jumped on it and added TLS tunneling to my server and have been blocking ads that way on mobile since last year. And the private DNS setting is phone-wide, so it covers all my apps and browsing. Again, this is a plug I know, but hey, any reader here that’s so inclined can just do the same thing I did and run this sort of system for themselves :) | ESSENTIALAI-STEM |
Why specialization can be a downside in our ever-changing world
Popular wisdom drives home the importance of a head start and specializing early. Not so fast, advises journalist David Epstein. After Epstein wrote about the famed 10,000-hour rule in his first book, The Sports Gene, he was invited to debate Malcolm Gladwell, whose book Outliers had brought the rule into the mainstream. To prepare for the debate, Epstein gathered studies that looked at the development of elite athletes and saw that the trend was not early specialization. Rather, in almost every sport there was a “sampling period” where athletes learned about their own abilities and interests. The athletes who delayed specialization were often better than their specialized peers, who plateaued at lower levels. Epstein filed this information away until he was asked by the Pat Tillman Foundation to give a talk to a group of military veterans. These were people who were changing careers and having doubts that are familiar to many: whether they were doomed to always be behind because they hadn’t stuck to one thing. Epstein became interested in exploring the benefits of being a specialist versus a generalist, and ended up writing Range: Why Generalists Triumph in a Specialized World (Penguin Random House). The Verge spoke to Epstein about “kind” versus “wicked” environments, the importance of doing instead of planning, and the difference between having range and being a dilettante. This interview has been lightly edited for clarity. When did this cult of specialization develop? You mention the 10,000-hour rule, of course, but it was definitely around before then. The 10,000-hour rule just gave it more of a common language and intensified it, basically. I really do think that Tiger Woods himself [whom Epstein writes about in the beginning of the book] helped kick this into high gear when he went on television as a two-year-old. It started this explosion of parents thinking, I have to get my kid doing this. There’s a number of prodigies like this. It’s easy to conceptualize giving someone a head start. We give a lot of lip service to “try and fail,” but we don’t actually encourage it when the rubber meets the road. I also think that sharing videos and movies of prodiges, whether that’s Searching for Bobby Fischer or the Polgár story or the Tiger story — and those things are always in classical music, chess, or golf because those domains are so amenable to that sort of thing — kicked off our natural tendencies to want to give kids a head start. And the 10,000-hour rule codified it and extrapolated it to every other domain, where it doesn’t necessarily belong. Right. One of the key ideas of your book is that early specialization and lots of deliberate practice does work in certain “kind” environments, but it’s not as useful for succeeding in “wicked” environments where it might be better to be a generalist. Tell me more about this distinction. Obviously, Tiger Woods went on to be the best golfer in the world. Nothing I wrote was meant to say this didn’t work, but the problem was extrapolating that to everything else that people want to do. Golf is what psychologist Robin Hogarth called a “kind environment” and Hogarth set out the spectrum from kind to wicked environments. The most kind environment is one where all the information is totally available, you don’t have to search for it, patterns repeat, the possible situations are constrained so you’ll see the same sort of situations over and over, feedback on everything you do is both immediate and 100 percent accurate, there’s no human behavior involved other than your own. Whereas on the opposite side, with wicked environments, not all information is available when you have to make a decision. Typically you’re dealing with dynamic situations that involve other people and judgments, feedback is not automatic, and when you do have feedback it may be partial and it may be inaccurate. Most of the things that people want to do are much more toward the wicked end of the spectrum than golf. You don’t know any of the rules, they’re subject to change without notice at any time, and over and over. Early specialization is not the best way to go. You talk about the importance of a “sampling period.” But how long should this optimal sampling period last? Someone could theoretically just sample forever, but that doesn’t make sense either. That’s the million-dollar question. Or billion-dollar question. In sports, it looks like athletes who want to be the best start cutting out other things in midteen years, around 15. But it’s not clear to me whether that’s the optimal way to do it or if it’s because they are forced to specialize then. We saw in a study of German soccer players, some of whom went on to play in the World Cup, that they were still doing other sports informally past the age of 22. With Cirque du Soleil, they started having their performers learn the basics of other performers’ disciplines — not because they were going to perform it, but because it helped them be more creative for designing new shows and that cut injury rates by a third. But I don’t think we know exactly what would be optimal. In addition to discussing the advantages of being a generalist, the book also touches on the disadvantages of specialization and how that can blind us. Do you have a favorite example of this that you like to talk about? Part of what got me interested in this is that I realized I had committed statistical malpractice in my own master’s degree. I can’t say I “love” talking about it, it’s a little embarrassing. And that research is still published. The problem is, when I went to grad school, in geological sciences, I was rushed into this very specialized research before I’d even been taught how the tools of thinking and science work. So I was studying very specific information, not knowing what was happening when I was pressing the computer buttons and getting statistically significant results, and publishing them and getting a master’s degree for that. There’s a replication crisis in science and a huge amount of it is exactly what I was doing: people not thinking about how their statistics work. You can get big enough data now and there are powerful statistical programs, so you don’t have to know how scientific thinking works. I think that’s a huge problem. At one point in the book, you relay the advice “first act, and then think,” which runs counter to much of what we’re told about the importance of planning. Can you unpack that a bit? That’s from Herminia Ibarra, an organizational behavioral specialist who studies career transitions. She gave me one of my favorite phrases that’s related to the “act and think” one. It’s “We learn who we are in practice, not in theory.” There’s a lot of research that shows we can take personality quizzes and everything, but our insight into ourselves is restricted. It’s similar to the end-of-history illusion, where we recognize that we’ve changed a lot in the past, but think we will not change much in the future, but we’re wrong at every single stage. This industry attempts to just give you a quiz or give commencement advice to sit down and introspect and think about what you want to do, and it’s really contradictory to what we know about how people develop and how personality develops over time. We have to actually do stuff and reflect on it. And that’s how we learn about our skills and interest and possibility for the world, as opposed to having a theory of ourselves and assuming. Try stuff and take time to reflect. The best learners have the trait of reflecting on things they’ve done, because they’re learning about who they are. Another thing that is interesting is the idea of having intellectual range and taking in lots of information. How does that dovetail with all the research on cognitive biases that keep us from believing information that contradicts our beliefs? How do we have intellectual range? It’s really difficult. Algorithms reinforce that and unless you stop yourself and realize what’s being done to you, you don’t think about it. That’s partly what chapter 10 is about. You look at people who develop good judgment about the world, and people who were really specialized and had a narrow focus actually got worse as they accumulated information because they were better able to fit any story or whatever their views were. One of the main traits of people who had better judgment and were able to avoid falling into their own cognitive biases all the time was a trait called “science curiosity.” There were clever studies where people were given statistics to analyze and sometimes it’s just some bland clinical trial of skin cream and other times it’s something very political, like whether gun control reduces deaths. Numerate people often become innumerate when they’re faced with those numbers in that context. It’s not an issue of bright — they could interpret the numbers well when it wasn’t political. The people who bucked the trend were the ones who were highest in science curiosity. Not science knowledge, but science curiosity measured by the fact that when they were faced with information that didn’t agree with their preconceived information, would they follow up and research broadly or would they put that aside and ignore it and leave it there? So I think we have to very proactively try to step outside the algorithm and do the opposite of what our inclination is. We should see if we can falsify our notions. That was a hallmark of what the people with the best judgment do. It ends up with them widely gathering a large array of sources to try and test their own ideas. You can get so much positive feedback for not doing that as long as you stick to your little corner of the universe. For those of us who stick in the same field, is it possible to be a generalist and a specialist? At the end I focused on scientists and scientific research. Scientists, to the outside world, are the epitome of specialization in one sense, and I wanted to make sure that I included people who were viewed that way. Among these people who, compared to the population at large, are very specialized, what does it mean to have range? How do you capture the benefits of range even at the point in your career where you have specialized to a certain degree? So I looked at people like Andre Geim [who has won both the Nobel Prize and Ig Nobel Prize, which is given to “trivial” research]. I called the guy who started the Ig Nobel and they tell people ahead of time so they can decide if they’d rather not have it and turn it down. But I think Geim was proud of it, basically. He talks about how “it’s psychologically unsettling to change what I do every five years, but that’s how I make my most important discoveries.” He says he doesn’t do research, only “search.” I enjoyed that because we all specialize to one degree or another and the question is how we capture the benefits. I loved your book and have recommended it to several friends because it speaks to worries that so many people have, like “Am I just lazy because I can’t stick to one thing?” To an extent, the book helps assuage some of those fears, but I couldn’t help wondering: when do you have range and when are you a dilettante? I don’t think it’s great to give advice like, “Don’t worry about being interested or hard-working at anything.” I like to think of the study of inventors at 3M. They identified generalist and specialist inventors, but there was also a class of inventors who didn’t have that much breadth and who didn’t have that much depth. They didn’t tend to make contributions. They were the dilettantes. They flitted between things to some extent, but didn’t learn about as many different technology classes as the generalists. But also tended not to go deep in any particular technology, so they ended up without an intellectual home, but also without the ability to connect disparate domains in a novel way. I think that’s symbolic of the difference. You have to give a real effort and be ravenously curious about things because part of the hunt for what economists call “match quality” is diving into things in a way that gives you maximum signal about yourself. And if you’re superficially on the surface, I don’t think you’re getting the signal that helps you find where you are in the world. | NEWS-MULTISOURCE |
Wikipedia:Articles for deletion/Lutheran High School North (Texas)
The result was Redirect to Texas Association of Private and Parochial Schools in lieu of deletion. —Quarl (talk) 2007-03-04 02:09Z
Lutheran High School North (Texas)
* – (View AfD) (View log)
Not notable WP:SCHOOLS3 Jemather 16:30, 27 February 2007 (UTC)
* Delete per nom. "Senior car-wash was canceled this weekend due to an hour of rain." Seriously? That's "notable news?" Freshacconci 16:36, 27 February 2007 (UTC)
* Keep High schools are inherently notable, as I argue here, the "News" section can be deleted easily enough without destroying the whole article. Noroton 19:04, 27 February 2007 (UTC)
* Note: This debate has been included in the list of Schools-related deletions. -- Noroton 19:05, 27 February 2007 (UTC)
* Delete The supposed rule that all HS are notable does not have consensus. This is one of the many that are nn.DGG 23:07, 27 February 2007 (UTC)
* Comment — Normally I'm all for keeping most H.S. articles, but this one is perhaps a little too small and undistinguished. Their record of sending 97% of their students on to college is pretty impressive, however. Is there somewhere this page could be merged or summarized? — RJH (talk) 23:42, 27 February 2007 (UTC)
* Delete. The school itself is non-notable, and what little content there is reads like a joke. (Read carefully: it claims The Shocker is their sign for school pride.) Krimpet 03:01, 28 February 2007 (UTC)
* Keep Article has been cleaned-up, but still could be expanded by a more experienced editor. --Masterpedia 04:21, 28 February 2007 (UTC)
* Delete. Notability neither asserted nor evidenced. WMMartin 14:31, 1 March 2007 (UTC)
* Delete. Changed vote. Article lacks greatly and has continuous vandalism. --Masterpedia 02:39, 2 March 2007 (UTC)
* Delete. The article lacks any useful content. There is nothing to indicate the school's notability. None of the statements are supported by verifiable independent references. The 'article' seems to be nothing more than an attempt at self-publicity by the school.Dahliarose 14:46, 2 March 2007 (UTC)
| WIKI |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.